<?xml-stylesheet type="text/xsl" href="updateinfo.xsl"?>
<updates>
<!--Created for Scientific Linux (scientificlinux.org)

Adapted from publicly available data provided by Red Hat, Scientific Linux, and other sources

No support from Red Hat Inc. is provided, implied, or available for Scientific Linux.

Content from Scientific Linux is licensed under the Creative Commons Attribution-ShareAlike 3.0 Unported License. Our changes from cited references primarily consist of removing the upstream product names.  To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/3.0/

Suggested Attribution: Adapted from Scientific Linux (scientificlinux.org) who credits many sources including Red Hat Inc.
-->
<update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>ENHC0003210</id><title>Sl 7.4 Openafs Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openafs-1.6-sl" release="274.sl7" src="openafs.SLx-1.6.21-274.src.rpm" version="1.6.21"><filename>openafs-1.6-sl-1.6.21-274.sl7.x86_64.rpm</filename><sum type="sha256">72bd7451ea238ef89939e5c52e878043a0bda5fb3ba60dcfa9c6535335ae5834</sum></package><package arch="x86_64" name="openafs-1.6-sl-module-tools" release="274.sl7" src="openafs.SLx-1.6.21-274.src.rpm" version="1.6.21"><filename>openafs-1.6-sl-module-tools-1.6.21-274.sl7.x86_64.rpm</filename><sum type="sha256">962a1f178b759204480bd69535fff369ca72e969b0e8cc809b067c3dafaea9dd</sum></package><package arch="x86_64" name="openafs-1.6-sl-compat" release="274.sl7" src="openafs.SLx-1.6.21-274.src.rpm" version="1.6.21"><filename>openafs-1.6-sl-compat-1.6.21-274.sl7.x86_64.rpm</filename><sum type="sha256">8c923e34d9d4a1c32bb8520c402143e7f25e5abf82760185293207b861d27065</sum></package><package arch="x86_64" name="openafs-1.6-sl-devel" release="274.sl7" src="openafs.SLx-1.6.21-274.src.rpm" version="1.6.21"><filename>openafs-1.6-sl-devel-1.6.21-274.sl7.x86_64.rpm</filename><sum type="sha256">d81df32fa95fa955f242beaf8b89262d8c2fe4d44580cb4bf312f826e033e46e</sum></package><package arch="x86_64" name="openafs-1.6-sl-kpasswd" release="274.sl7" src="openafs.SLx-1.6.21-274.src.rpm" version="1.6.21"><filename>openafs-1.6-sl-kpasswd-1.6.21-274.sl7.x86_64.rpm</filename><sum type="sha256">a851c4c1e53b0d7c64ca81ccdc1ebf00f5796713d77c742fb70e3ec04a402449</sum></package><package arch="x86_64" name="openafs-1.6-sl-authlibs" release="274.sl7" src="openafs.SLx-1.6.21-274.src.rpm" version="1.6.21"><filename>openafs-1.6-sl-authlibs-1.6.21-274.sl7.x86_64.rpm</filename><sum type="sha256">0d1b727f42259607ea555ac25cf4b65e56188facc22f30c2a99230bf53130711</sum></package><package arch="x86_64" name="openafs-1.6-sl-krb5" release="274.sl7" src="openafs.SLx-1.6.21-274.src.rpm" version="1.6.21"><filename>openafs-1.6-sl-krb5-1.6.21-274.sl7.x86_64.rpm</filename><sum type="sha256">69201605c734418895134f1cddc4dfc47cba1b17e9281df9eba3d93bcf1b3b11</sum></package><package arch="x86_64" name="openafs-1.6-sl-server" release="274.sl7" src="openafs.SLx-1.6.21-274.src.rpm" version="1.6.21"><filename>openafs-1.6-sl-server-1.6.21-274.sl7.x86_64.rpm</filename><sum type="sha256">637b61e05808ec8c02476cf1c8f246bc4ec07405ed94dfe7ccc0cc2a6db80bcf</sum></package><package arch="x86_64" name="openafs-1.6-sl-kernel-source" release="274.sl7" src="openafs.SLx-1.6.21-274.src.rpm" version="1.6.21"><filename>openafs-1.6-sl-kernel-source-1.6.21-274.sl7.x86_64.rpm</filename><sum type="sha256">04592eae8887475acfa024e02da741c77a5419a5f91d5341929ba0bb1476cbfd</sum></package><package arch="x86_64" name="openafs-1.6-sl-plumbing-tools" release="274.sl7" src="openafs.SLx-1.6.21-274.src.rpm" version="1.6.21"><filename>openafs-1.6-sl-plumbing-tools-1.6.21-274.sl7.x86_64.rpm</filename><sum type="sha256">3d401ef01676b1d9bbd6657be3a4465a71e25457b73192406375cc4d850659b5</sum></package><package arch="x86_64" name="openafs-1.6-sl-client" release="274.sl7" src="openafs.SLx-1.6.21-274.src.rpm" version="1.6.21"><filename>openafs-1.6-sl-client-1.6.21-274.sl7.x86_64.rpm</filename><sum type="sha256">d531b2b577d72e49409249f2c5b4e08c33b147f10619e8d5bde8f5accbd76438</sum></package><package arch="x86_64" name="openafs-1.6-sl-authlibs-devel" release="274.sl7" src="openafs.SLx-1.6.21-274.src.rpm" version="1.6.21"><filename>openafs-1.6-sl-authlibs-devel-1.6.21-274.sl7.x86_64.rpm</filename><sum type="sha256">4246f70345377b0a5b608638da3ffda899a3e4d3934e64db7f0924c711490d66</sum></package><package arch="x86_64" name="kmod-openafs-1.6-sl-693" release="274.sl7.693" src="openafs.SLx-1.6.21-274.src.rpm" version="1.6.21"><filename>kmod-openafs-1.6-sl-693-1.6.21-274.sl7.693.x86_64.rpm</filename><sum type="sha256">a78daf0649ad30083e799cbbd5e924a603f3ee18f2db3d10263c892561974575</sum></package></collection></pkglist><references /></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>ENHC0004616</id><title>Sl 7.7 Artwork Update</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="sl-logos" release="1.sl7" src="sl-logos-70.7.0-1.sl7.src.rpm" version="70.7.0"><filename>sl-logos-70.7.0-1.sl7.noarch.rpm</filename><sum type="sha256">84c525940c491793f6e3fa06f89a406848cc6db70a52b6865c11d9bc8282d6ad</sum></package></collection></pkglist><references /></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>OPENAFS-SA-2016-001-002</id><title>Security Errata Critical: Openafs</title><description>This release fixes the vulnerabilities tracked as OPENAFS-SA-2016-001 and OPENAFS-SA-2016-002.

OPENAFS-SA-2016-001 (CVE-2016-2860): Users from foreign Kerberos realms can create groups as if they were administrators.

OPENAFS-SA-2016-002: Information leakage over the network due to uninitialized memory.</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-03-17 00:00:00" /><reboot_suggested>true</reboot_suggested><restart_suggested>true</restart_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openafs-1.6-sl-plumbing-tools" release="234.sl7" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-1.6-sl-plumbing-tools-1.6.17-234.sl7.x86_64.rpm</filename><sum type="sha256">037cc5a247e1b2b7f47a5b039a1f25d32df574fa7ce3358920e84b57bf54cf0a</sum></package><package arch="x86_64" name="openafs-1.6-sl-kpasswd" release="234.sl7" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-1.6-sl-kpasswd-1.6.17-234.sl7.x86_64.rpm</filename><sum type="sha256">e8ce771b6210d9d199153c50b51a34e4d94888bc11484ae7d0f04f3436b0ab9f</sum></package><package arch="x86_64" name="openafs-1.6-sl-server" release="234.sl7" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-1.6-sl-server-1.6.17-234.sl7.x86_64.rpm</filename><sum type="sha256">22e947b51210e356d9264b31258cb5eb006bfc4c978bf59b9e7a9f97366a23ca</sum></package><package arch="x86_64" name="openafs-1.6-sl-krb5" release="234.sl7" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-1.6-sl-krb5-1.6.17-234.sl7.x86_64.rpm</filename><sum type="sha256">85c1590d17b9dd0d08799f91e01567c64e1acfaf03c283608f15e8f558429e8e</sum></package><package arch="x86_64" name="openafs-1.6-sl-authlibs" release="234.sl7" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-1.6-sl-authlibs-1.6.17-234.sl7.x86_64.rpm</filename><sum type="sha256">ce2071ca7ce229cdc416117a836a577ce9402b3e35307c5ae570decabfe5ff89</sum></package><package arch="x86_64" name="openafs-1.6-sl-devel" release="234.sl7" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-1.6-sl-devel-1.6.17-234.sl7.x86_64.rpm</filename><sum type="sha256">872c51ee503ddea5cb211685718cc3a3a6f058c3c3321dbba3d1940c5dd378d4</sum></package><package arch="x86_64" name="openafs-1.6-sl-kernel-source" release="234.sl7" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-1.6-sl-kernel-source-1.6.17-234.sl7.x86_64.rpm</filename><sum type="sha256">704ec544e1cf81f7f8f4345705a27947292723a19ab684e064fa446dcb600132</sum></package><package arch="x86_64" name="openafs-1.6-sl-module-tools" release="234.sl7" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-1.6-sl-module-tools-1.6.17-234.sl7.x86_64.rpm</filename><sum type="sha256">1f333ab82c7391bc6f8f69b1c3f67fa490522d4483f6c94763cf97e9bf6c48a7</sum></package><package arch="x86_64" name="openafs-1.6-sl-compat" release="234.sl7" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-1.6-sl-compat-1.6.17-234.sl7.x86_64.rpm</filename><sum type="sha256">048e7b3651eccbd7a2ce51e4ed151097a6454743b53dd45884b7595b71dc00b3</sum></package><package arch="x86_64" name="openafs-1.6-sl-client" release="234.sl7" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-1.6-sl-client-1.6.17-234.sl7.x86_64.rpm</filename><sum type="sha256">f8cac1ae3d5ecccb25dfad3b1b2c926fa673b12855d3d25909483a21f0f775d5</sum></package><package arch="x86_64" name="openafs-1.6-sl-authlibs-devel" release="234.sl7" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-1.6-sl-authlibs-devel-1.6.17-234.sl7.x86_64.rpm</filename><sum type="sha256">f552c2888dae671560db39590853892e0640cf8211d6a30687674c5ed10eee57</sum></package><package arch="x86_64" name="openafs-1.6-sl" release="234.sl7" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>openafs-1.6-sl-1.6.17-234.sl7.x86_64.rpm</filename><sum type="sha256">d5b68b478ec950df51042e08598d9d623e7bcbd22325995c5bc46feb72735116</sum></package><package arch="x86_64" name="kmod-openafs-1.6-sl-327" release="234.sl7.327.10.1" src="openafs.SLx-1.6.17-234.src.rpm" version="1.6.17"><filename>kmod-openafs-1.6-sl-327-1.6.17-234.sl7.327.10.1.x86_64.rpm</filename><sum type="sha256">1ed46b8b00eaa3c461ed956d180c3d9870d85c89934c7842b052f87e67998aec</sum></package></collection></pkglist><references /></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>OPENAFS-SA-2016-003</id><title>Security Errata Moderate: Openafs</title><description>Security Fix(es):

There are three different kinds of &#8220;dead&#8221; residual directory entry leaks, each with a different cause:

1. There may be partial name data after the null terminator in a live directory entry. This happens when a previously used directory entry becomes free, then is reused for a directory entry with a shorter name.

2. &#8220;Dead&#8221; directory entries are left uncleared after an object is deleted or renamed.

3. Residual directory entries may be inadvertently picked up when a new directory is created or an existing directory is extended by a 2kiB page.

This happens because the fileserver shares a buffer pool for directories of all AFS users, but does not clear each buffer upon reuse. This is the most severe problem because the leaked information may be from other directories or volumes for which the AFS user is not authorized.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kmod-openafs-1.6-sl-514" release="256.7.514" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>kmod-openafs-1.6-sl-514-1.6.20-256.7.514.x86_64.rpm</filename><sum type="sha256">08ae01b591474dd3dab4b6d3a4110db54ba7864613cf6eabaff0171de235190e</sum></package><package arch="x86_64" name="openafs-1.6-sl-compat" release="256.7" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-1.6-sl-compat-1.6.20-256.7.x86_64.rpm</filename><sum type="sha256">a1f179402f72d058b2879d594ee1a3b84304f2c56085b3762aafcb6aea1f5e32</sum></package><package arch="x86_64" name="openafs-1.6-sl-authlibs" release="256.7" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-1.6-sl-authlibs-1.6.20-256.7.x86_64.rpm</filename><sum type="sha256">86dd20c9bde5321d91e6b06201b4f1efdc712e2c20b0ac1e2b02f211b0ffee59</sum></package><package arch="x86_64" name="openafs-1.6-sl-plumbing-tools" release="256.7" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-1.6-sl-plumbing-tools-1.6.20-256.7.x86_64.rpm</filename><sum type="sha256">180bec3fdfea0b8d61409595eb4c40234fa7c551b6883ef31e7ec2335c2b30e3</sum></package><package arch="x86_64" name="openafs-1.6-sl-client" release="256.7" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-1.6-sl-client-1.6.20-256.7.x86_64.rpm</filename><sum type="sha256">77d3c8fa542261dc40f4078b6395751f4728d1fab251b24ef5d4083432fc9b09</sum></package><package arch="x86_64" name="openafs-1.6-sl-kpasswd" release="256.7" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-1.6-sl-kpasswd-1.6.20-256.7.x86_64.rpm</filename><sum type="sha256">55366e25bd7ccfdf1103a01eadbcfcff406f3dec2d8e2d882964ae9e41b34ec1</sum></package><package arch="x86_64" name="openafs-1.6-sl-krb5" release="256.7" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-1.6-sl-krb5-1.6.20-256.7.x86_64.rpm</filename><sum type="sha256">d28ccbc5a6658433da0876a68210e52d1cd2f4efcd146d6fa71bdcbe2b9d558d</sum></package><package arch="x86_64" name="openafs-1.6-sl-devel" release="256.7" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-1.6-sl-devel-1.6.20-256.7.x86_64.rpm</filename><sum type="sha256">36227d5655b8f6948acdb2f13004a42d77080da2dbfdcc7000fd9709f7338662</sum></package><package arch="x86_64" name="openafs-1.6-sl-server" release="256.7" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-1.6-sl-server-1.6.20-256.7.x86_64.rpm</filename><sum type="sha256">a8ccbbdd355f1c1dbf8afd07fc22bd3caccc7f43df157c0c1d5ab306e4db9bc8</sum></package><package arch="noarch" name="kmod-openafs-1.6-sl" release="1.SL73.el7" src="kmod-openafs-1.6-sl-1.6.19-1.SL73.el7.src.rpm" version="1.6.19"><filename>kmod-openafs-1.6-sl-1.6.19-1.SL73.el7.noarch.rpm</filename><sum type="sha256">92bb1de3af453cdbd69228db777846f46ffb8643a78fcd16477e2d5ca2671b15</sum></package><package arch="x86_64" name="openafs-1.6-sl-kernel-source" release="256.7" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-1.6-sl-kernel-source-1.6.20-256.7.x86_64.rpm</filename><sum type="sha256">5e8a0c63572d3885799a263f24ccb1faef738afcfc8e569b0b085ef8517e4903</sum></package><package arch="x86_64" name="openafs-1.6-sl-authlibs-devel" release="256.7" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-1.6-sl-authlibs-devel-1.6.20-256.7.x86_64.rpm</filename><sum type="sha256">f68daa735937f87917337e9773f21d05fe6b130a97feec4da6b123a455dc5de2</sum></package><package arch="x86_64" name="openafs-1.6-sl" release="256.7" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-1.6-sl-1.6.20-256.7.x86_64.rpm</filename><sum type="sha256">27de2c6e3b70e9c57d5d35f753420e4a611fc6471d84be4cb3c82feb64fef5c6</sum></package><package arch="x86_64" name="openafs-1.6-sl-module-tools" release="256.7" src="openafs.SLx-1.6.20-256.src.rpm" version="1.6.20"><filename>openafs-1.6-sl-module-tools-1.6.20-256.7.x86_64.rpm</filename><sum type="sha256">b96d1c328e53f800da9308beffc2a8a6779c993ef70f47e5a1017aea5595f1c7</sum></package></collection></pkglist><references /></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>OPENAFS-SA-2017-001</id><title>Important: Openafs Security Update</title><description>Security Fix(es): * Certain values transmitted in RX ACK packets were not sanity checked by OpenAFS receiving peers, which could lead to an assertion being triggered during construction of outgoing packets on the same connection, resulting in server process crashes or client kernel panics.</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-12-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openafs-1.6-sl" release="278.sl7" src="openafs.SLx-1.6.22-278.src.rpm" version="1.6.22"><filename>openafs-1.6-sl-1.6.22-278.sl7.x86_64.rpm</filename><sum type="sha256">b1dbfd325c5574fc4cbfbfcea69ceea029eb8e67bd944466e2ebf44302cfb70c</sum></package><package arch="x86_64" name="openafs-1.6-sl-authlibs-devel" release="278.sl7" src="openafs.SLx-1.6.22-278.src.rpm" version="1.6.22"><filename>openafs-1.6-sl-authlibs-devel-1.6.22-278.sl7.x86_64.rpm</filename><sum type="sha256">7a3447ceb5a19ba65478d58b1d7c60b5877075baca1fef71b633817acdcbdcbd</sum></package><package arch="x86_64" name="openafs-1.6-sl-authlibs" release="278.sl7" src="openafs.SLx-1.6.22-278.src.rpm" version="1.6.22"><filename>openafs-1.6-sl-authlibs-1.6.22-278.sl7.x86_64.rpm</filename><sum type="sha256">8473a341939aec3c44f0a42a3db6a240b509f23c36147e3ddd6322f31c990493</sum></package><package arch="x86_64" name="kmod-openafs-1.6-sl-693" release="278.sl7.693.11.1" src="openafs.SLx-1.6.22-278.src.rpm" version="1.6.22"><filename>kmod-openafs-1.6-sl-693-1.6.22-278.sl7.693.11.1.x86_64.rpm</filename><sum type="sha256">de3f0d0a2b8179c10400bf79922ba6c864bb5c7e9fc5aa7ab2539422f0b328b9</sum></package><package arch="x86_64" name="openafs-1.6-sl-krb5" release="278.sl7" src="openafs.SLx-1.6.22-278.src.rpm" version="1.6.22"><filename>openafs-1.6-sl-krb5-1.6.22-278.sl7.x86_64.rpm</filename><sum type="sha256">88922716efde76de648d3b55a81923c1a0b32efc37597939a0ad904adc40db1d</sum></package><package arch="x86_64" name="openafs-1.6-sl-client" release="278.sl7" src="openafs.SLx-1.6.22-278.src.rpm" version="1.6.22"><filename>openafs-1.6-sl-client-1.6.22-278.sl7.x86_64.rpm</filename><sum type="sha256">5bf2f0842b856b72fc2477fe9d1fede32087f62d6206d86486688df7e8a62c8f</sum></package><package arch="x86_64" name="openafs-1.6-sl-plumbing-tools" release="278.sl7" src="openafs.SLx-1.6.22-278.src.rpm" version="1.6.22"><filename>openafs-1.6-sl-plumbing-tools-1.6.22-278.sl7.x86_64.rpm</filename><sum type="sha256">b1bbe6a174d67a71a291a5e70cfc9ab17bfdefbcfd4eda13f3cd0b6ead74b108</sum></package><package arch="x86_64" name="openafs-1.6-sl-kernel-source" release="278.sl7" src="openafs.SLx-1.6.22-278.src.rpm" version="1.6.22"><filename>openafs-1.6-sl-kernel-source-1.6.22-278.sl7.x86_64.rpm</filename><sum type="sha256">e82b1f7e44f8f76139d4aa09b643f1c1d164aa870b5a6f17a701f231a3e9e677</sum></package><package arch="x86_64" name="openafs-1.6-sl-kpasswd" release="278.sl7" src="openafs.SLx-1.6.22-278.src.rpm" version="1.6.22"><filename>openafs-1.6-sl-kpasswd-1.6.22-278.sl7.x86_64.rpm</filename><sum type="sha256">c4e3c1e870952148feeaeb3af64eecad9eb624b417e4c8a112a5796f22196fcb</sum></package><package arch="x86_64" name="openafs-1.6-sl-compat" release="278.sl7" src="openafs.SLx-1.6.22-278.src.rpm" version="1.6.22"><filename>openafs-1.6-sl-compat-1.6.22-278.sl7.x86_64.rpm</filename><sum type="sha256">e55c0c1dd8ce53f764565eb4591d559b629a834c36efb50337fb6c1f237be3aa</sum></package><package arch="x86_64" name="openafs-1.6-sl-server" release="278.sl7" src="openafs.SLx-1.6.22-278.src.rpm" version="1.6.22"><filename>openafs-1.6-sl-server-1.6.22-278.sl7.x86_64.rpm</filename><sum type="sha256">6c97105cf0e01dc77d7cb8bd053de754b987cdcac752a007054429f8a24d9d38</sum></package><package arch="x86_64" name="openafs-1.6-sl-module-tools" release="278.sl7" src="openafs.SLx-1.6.22-278.src.rpm" version="1.6.22"><filename>openafs-1.6-sl-module-tools-1.6.22-278.sl7.x86_64.rpm</filename><sum type="sha256">303607b4f648495f5e35b47aa301952a18bc2247bf7a5fc25255fab60252a16b</sum></package><package arch="x86_64" name="openafs-1.6-sl-devel" release="278.sl7" src="openafs.SLx-1.6.22-278.src.rpm" version="1.6.22"><filename>openafs-1.6-sl-devel-1.6.22-278.sl7.x86_64.rpm</filename><sum type="sha256">176221b579446a96dd062b6913bc4000286f5ea6900846c97857995f0ad20726</sum></package></collection></pkglist><references /></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>OPENAFS-SA-2018-001:2:3</id><title>Moderate: Openafs</title><description>These releases include fixes for three security advisories, OPENAFS-SA-2018-001, OPENAFS-SA-2018-002, and OPENAFS-SA-2018-003. 
OPENAFS-SA-2018-001 only affects deployments that run the 'butc' utility as part of the in-tree backup system, but is of high severity for those sites which are affected -- an anonymous attacker could replace entire volumes with attacker-controlled contents. 
OPENAFS-SA-2018-002 is for information leakage over the network via uninitialized RPC output variables.  A number of RPCs are affected, some of which require the caller to be authenticated, but in some cases hundreds of bytes of data can be leaked per call.  Of note is that cache managers are also subject to (kernel) memory leakage via AFSCB_ RPCs. 
OPENAFS-SA-2018-003 is a denial of service whereby anonymous attackers can cause server processes to consume large quantities of memory for a sustained period of time. 
The changes to fix OPENAFS-SA-2018-001 require behavior change in both butc(8) and backup(8) to use authenticated connections; old and new versions of these utilities will not interoperate absent specific configuration of the new tool to use the old (insecure) behavior. These changes also are expected to cause backup(8)'s interactive mode to be limited to only butc connections requiring (or not requiring) authentication within a given interactive session, based on the initial arguments selected.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-09-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openafs-1.6-sl-server" release="289.sl7" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-1.6-sl-server-1.6.23-289.sl7.x86_64.rpm</filename><sum type="sha256">52a3f1342b2ea41cfc05b3e470b8af66b98f86699ff229b67b8b1ed91fa9ad3b</sum></package><package arch="x86_64" name="openafs-1.6-sl-client" release="289.sl7" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-1.6-sl-client-1.6.23-289.sl7.x86_64.rpm</filename><sum type="sha256">700bac1c09a285ed1242173110ed5251fc05c5228aafce46c4f23590535695ef</sum></package><package arch="x86_64" name="openafs-1.6-sl-kernel-source" release="289.sl7" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-1.6-sl-kernel-source-1.6.23-289.sl7.x86_64.rpm</filename><sum type="sha256">4d8fff746a59783c2124cc42870c696e64ef4abc9866efd30fb0512c4481da6b</sum></package><package arch="x86_64" name="openafs-1.6-sl-devel" release="289.sl7" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-1.6-sl-devel-1.6.23-289.sl7.x86_64.rpm</filename><sum type="sha256">c82f463f70502f7a69318e70e49246989f33971ba4b006cdc7409ef230f54684</sum></package><package arch="x86_64" name="openafs-1.6-sl-module-tools" release="289.sl7" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-1.6-sl-module-tools-1.6.23-289.sl7.x86_64.rpm</filename><sum type="sha256">db893a6714ff00c49814dd2ea79fc8d6807c41763acfb8cc1252ffc32f381503</sum></package><package arch="x86_64" name="openafs-1.6-sl-compat" release="289.sl7" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-1.6-sl-compat-1.6.23-289.sl7.x86_64.rpm</filename><sum type="sha256">5559705838ec96eaa13fced2ca9a9a8fd18b65e394a069c21a6c4f0f59db39bf</sum></package><package arch="x86_64" name="openafs-1.6-sl-authlibs" release="289.sl7" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-1.6-sl-authlibs-1.6.23-289.sl7.x86_64.rpm</filename><sum type="sha256">112b445f1357007b9c0642677172c660484c4613a0d45fc5408f4921cfab0d94</sum></package><package arch="x86_64" name="openafs-1.6-sl-krb5" release="289.sl7" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-1.6-sl-krb5-1.6.23-289.sl7.x86_64.rpm</filename><sum type="sha256">975c8b426574462817df309be25bb18378534ae8de9ac753f622456a1279a190</sum></package><package arch="x86_64" name="kmod-openafs-1.6-sl-862" release="289.sl7.862.11.6" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>kmod-openafs-1.6-sl-862-1.6.23-289.sl7.862.11.6.x86_64.rpm</filename><sum type="sha256">77403a1e318426cf50593bab56973bdcd7830a15514ba4bc46794b503a40897a</sum></package><package arch="x86_64" name="openafs-1.6-sl-plumbing-tools" release="289.sl7" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-1.6-sl-plumbing-tools-1.6.23-289.sl7.x86_64.rpm</filename><sum type="sha256">071fb9a3759bf7c1b6b59e84b9090b229ba2f9d15d5179fabbf26fb8ef07afb5</sum></package><package arch="x86_64" name="openafs-1.6-sl-kpasswd" release="289.sl7" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-1.6-sl-kpasswd-1.6.23-289.sl7.x86_64.rpm</filename><sum type="sha256">7675ba17f0e13c88080b42da559e492006deec4adf1ab32e72a3c0e762aa8262</sum></package><package arch="x86_64" name="openafs-1.6-sl-authlibs-devel" release="289.sl7" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-1.6-sl-authlibs-devel-1.6.23-289.sl7.x86_64.rpm</filename><sum type="sha256">dcd69e18b70f622fad1302c6221746f693f94f92aa72629fc1c0bd20ff53ab37</sum></package><package arch="x86_64" name="openafs-1.6-sl" release="289.sl7" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>openafs-1.6-sl-1.6.23-289.sl7.x86_64.rpm</filename><sum type="sha256">1b2f503e29d8ed89c727d6954c44328773661903471f36feb51a435d420182e6</sum></package></collection></pkglist><references /></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>RHBA-2022:6572</id><title>Ca-Certificates Bug Fix And Enhancement Update</title><description>The ca-certificates package contains a set of Certificate Authority (CA) certificates chosen by the Mozilla Foundation for use with the Internet Public Key Infrastructure (PKI).
Bug Fix(es) and Enhancement(s):
* Annual 2022 ca-certificates update version 2.54 from NSS 3.79 for Firefox 103 (BZ#2099892) * ca-certificates need to add support for signing certs for .NET (BZ#2117796)
</description><issued date="2022-09-20 15:00:20" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ca-certificates" release="74.el7_9" src="ca-certificates-2022.2.54-74.el7_9.src.rpm" version="2022.2.54"><filename>ca-certificates-2022.2.54-74.el7_9.noarch.rpm</filename><sum type="sha256">d7edb786d191c4fefcb03be72b64bef01cb89aac2e81f77f386986058ba9d30d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:6572" id="RHBA-2022:6572" title="Ca-Certificates Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2099892" id="2099892" title="2099892 &#8211; Annual 2022 Ca-Certificates Update Version 2.54 From Nss 3.79 For Firefox 103 [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2117796" id="2117796" title="2117796 &#8211; Ca-Certificates Need To Add Support For Signing Certs For .Net [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>RHBA-2022:6577</id><title>Samba Bug Fix Update</title><description>Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Bug Fix(es):
* Fix possible crash bug in winbind (BZ#2119058)
</description><issued date="2022-09-20 15:00:20" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="samba-client-libs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">cacc282e68d55a8a4df7bdd1d389e5c33ff3eefde6ab7fa892c56f1a03c6d7f8</sum></package><package arch="x86_64" name="samba-common-libs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">2a22d8bf7e49ace37c1836bb6dffc293100d603845800a5a7a00a8934d7307cd</sum></package><package arch="x86_64" name="ctdb-tests" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>ctdb-tests-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">f8d3f5de5d78d57c24f877ab16955ba73987426e386f8ba993cd7c9bc7a3792a</sum></package><package arch="noarch" name="samba-pidl" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-pidl-4.10.16-20.el7_9.noarch.rpm</filename><sum type="sha256">09893b38eca1472f8d54d6ae51d1880e4fd68e7a4271cb71d3ae92e73e68ca8f</sum></package><package arch="x86_64" name="samba" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">7ac313df927797c05b41436e42e604cbd43161be21fd68cdd96d0ecae30d9acf</sum></package><package arch="x86_64" name="libwbclient" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">c5d60bee506bcb302ece1a17611f829ba892e4220d5c8f9c060ff74fc230eb38</sum></package><package arch="noarch" name="samba-common" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-common-4.10.16-20.el7_9.noarch.rpm</filename><sum type="sha256">44a6459695c6006ad82c374924f9f42f0666af0ffb5ce60c07c6f4ae970bce53</sum></package><package arch="i686" name="samba-winbind-modules" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">df8572b335939df919a32ef8bff3ca1b55651cc8fe2ea023eac2ca4fde67fa00</sum></package><package arch="i686" name="libwbclient" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">19466f49d3d87d055974d9b450b0bfacca1de8a5d7e4a247488f52f48433fb8c</sum></package><package arch="i686" name="samba-client-libs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">735fb48a6b667643771efd8f4082fde5fee9571925e0b6ba0364f444c094a479</sum></package><package arch="x86_64" name="samba-python-test" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-python-test-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">84c7a9f5130dd17ef7829c5028c94134cebca4eae40d69d47f2fce2381b58eeb</sum></package><package arch="x86_64" name="samba-client" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-client-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">abb13fc44bf00e6e8e05a15171a49ad22adf187e18a32c41ec75fa7f9b2048a3</sum></package><package arch="i686" name="libsmbclient-devel" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">661414a845a083cac5b3e441a3b4d217b7f90ad66360c013ea11b525fc51d75a</sum></package><package arch="x86_64" name="samba-winbind-modules" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">15d8c7f0ed898c85e546550b168b365f6cf730c57f9b9986da2a1a4c29d1eff7</sum></package><package arch="i686" name="libsmbclient" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">6f8ce0108a5f7d6346ac6a2aff0a646978840494f6b4a74da36da7fded21c4db</sum></package><package arch="x86_64" name="libwbclient-devel" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">c6e8739d3f7024b2c898c6b7d8ea9e580c0122bc467430c5ea453821822c6bfb</sum></package><package arch="x86_64" name="libsmbclient" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">dc1a9465eb7fb4114846196fe2e5c3d33fbc3975f899338b00ca89592e825e26</sum></package><package arch="i686" name="samba-devel" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">7a6b86056ceb34ad19d83caefe29f0ba504db426f62aaf5d4da89ec59db0268a</sum></package><package arch="i686" name="samba-libs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">4dd2497954144c5af89e132a94c2108670d0a4c11ca680e0cabe76d4e7502333</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-vfs-glusterfs-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">f397cc045c0190a87e463e87f86ae18a178e1aae0b5f60c2694a7751c84d3daf</sum></package><package arch="x86_64" name="libsmbclient-devel" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">3660a1bebf97db29376d4bbc2c74e9e146d91dc0f9255c9f59f9bec430ba0447</sum></package><package arch="x86_64" name="samba-winbind-clients" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-clients-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">255996be29ce489ef14234d31a7f1bb4db363760379ad326b76900222d95030a</sum></package><package arch="x86_64" name="samba-winbind" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">0633bba0bdbe5435adc07edbb268e2961ea1c47533d4926264ed5861f3561ab4</sum></package><package arch="x86_64" name="samba-test" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-test-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">a94585adfd140fc3d138f715ad7c9953a047cd8e750af9ceecd08293f1f375e4</sum></package><package arch="x86_64" name="ctdb" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>ctdb-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">46a9e0c3831feec611855045a6424b31e7fd60804974f249b613de9fe2ced97d</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-krb5-locator-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">1f076b7c3d04cd7a81c3b287f238b6daf628b3adb75ec1813de275a73e4badac</sum></package><package arch="x86_64" name="samba-libs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">5a8440321cd0edde5dcd44d28dfe703e734447b3f2af301b009ffe3f85c6fb9d</sum></package><package arch="x86_64" name="samba-common-tools" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-common-tools-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">61a4a9c9929462af1d399b9fbf7974f91a67bf8506124f29447d9931c38ccb84</sum></package><package arch="x86_64" name="samba-python" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">f3139f49bed0ef0301fc615f023d797cd653216f38a551e6f6e4fa9e4b4d6398</sum></package><package arch="x86_64" name="samba-krb5-printing" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-krb5-printing-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">0b38802866912cf2a4cbea96ffa954393582a6de922bb2554ed16975926eec76</sum></package><package arch="x86_64" name="samba-devel" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">7e9a75e73ebe7cea8c107131cdd29cc9dc10563c3643388bc6e049002516abef</sum></package><package arch="i686" name="samba-common-libs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">9dbfa5fd8bb1eb6ed8b84dcd57cd0b1b71c7e20ff7f7ecd44b3b4a6f3866cfde</sum></package><package arch="x86_64" name="samba-dc-libs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-libs-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">f5d8689b8fc2b40e39898be7390a5f496ed7f04cd4a2035e0456bb06344a9475</sum></package><package arch="i686" name="samba-test-libs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">91e0191180ab976e905b15cf945888f31ae2a79a3e211d42d366cd23408c416a</sum></package><package arch="i686" name="libwbclient-devel" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">6db2d2f59f78e800c9e2e03c678771f064d1afb70b8fe9cf27edc47b94f119e0</sum></package><package arch="x86_64" name="samba-test-libs" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">f42aef1f809c15b39b535bd178d6a76df4068d9e4f3cc1ca9f299d6a7d36f482</sum></package><package arch="i686" name="samba-python" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-20.el7_9.i686.rpm</filename><sum type="sha256">0f6fde71a4536f44b6dc4f43b3733a167fa2a745296da54bf854a7e5565968e2</sum></package><package arch="x86_64" name="samba-dc" release="20.el7_9" src="samba-4.10.16-20.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-4.10.16-20.el7_9.x86_64.rpm</filename><sum type="sha256">cec3a3e3bf74d55202d85ffb3be0f8c2456381013381e66067f6375101a942eb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:6577" id="RHBA-2022:6577" title="Samba Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2119058" id="2119058" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>RHSA-2021:2313</id><title>Moderate: Samba Security And Bug Fix Update</title><description>Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token (CVE-2021-20254)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* smb.service stops when samba rpms are updated (BZ#1930747) * samba printing dumps core (BZ#1937867)
</description><issued date="2021-06-15 11:33:35" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ctdb-tests" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>ctdb-tests-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">2528a7abd08712c2e83b2d01510bf14e8f036bf31c2adfaa29f9f4ad9aa971d8</sum></package><package arch="x86_64" name="ctdb" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>ctdb-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">69326f1343382296243313ccb2c28e33cd1f41edd81337f9b06c7f14c92a3417</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2021:2313" id="RHSA-2021:2313" title="Moderate: Samba Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1930747" id="1930747" title="1930747 &#8211; [Rhel7.9] Smb.Service Stops When Samba Rpms Are Updated" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1937867" id="1937867" title="1937867 &#8211; Samba Printing Dumps Core" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>RHSA-2024:3980</id><title>Important: Flatpak Security Update</title><description>Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux.
Security Fix(es):
* flatpak: sandbox escape via RequestBackground portal (CVE-2024-32462)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer the CVE page(s) listed in the References section.
</description><issued date="2024-06-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="flatpak-builder" release="13.el7_9" src="flatpak-1.0.9-13.el7_9.src.rpm" version="1.0.0"><filename>flatpak-builder-1.0.0-13.el7_9.x86_64.rpm</filename><sum type="sha256">4c3c8ef224b14e51d92d2a517e700660afd223d2e04db12da4dae7d610d20bfe</sum></package><package arch="x86_64" name="flatpak-libs" release="13.el7_9" src="flatpak-1.0.9-13.el7_9.src.rpm" version="1.0.9"><filename>flatpak-libs-1.0.9-13.el7_9.x86_64.rpm</filename><sum type="sha256">1a0e87bb9526df4686c6913d11e7ce6f8ebad3b9c44746906d2467e68ac8ad23</sum></package><package arch="x86_64" name="flatpak" release="13.el7_9" src="flatpak-1.0.9-13.el7_9.src.rpm" version="1.0.9"><filename>flatpak-1.0.9-13.el7_9.x86_64.rpm</filename><sum type="sha256">9fa899d97993d2074421d0d5ea94a2be28bc9a7405a273725d5a4bed03f9d18a</sum></package><package arch="x86_64" name="flatpak-devel" release="13.el7_9" src="flatpak-1.0.9-13.el7_9.src.rpm" version="1.0.9"><filename>flatpak-devel-1.0.9-13.el7_9.x86_64.rpm</filename><sum type="sha256">d27f5cb0fbca6ecc57ac43aaa1b60fac929a3b99463c707edccf33b6e3ddb8a4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2024:3980" id="RHSA-2024:3980" title="Important: Flatpak Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>RHSA-2024:4016</id><title>Important: Thunderbird Security Update</title><description>Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.12.1.
Security Fix(es):
* thunderbird: Use-after-free in networking (CVE-2024-5702) * thunderbird: Use-after-free in JavaScript object transplant (CVE-2024-5688) * thunderbird: External protocol handlers leaked by timing attack (CVE-2024-5690) * thunderbird:  Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691) * thunderbird: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693) * thunderbird: Memory Corruption in Text Fragments (CVE-2024-5696) * thunderbird: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><issued date="2024-06-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-115.12.1-1.el7_9.src.rpm" version="115.12.1"><filename>thunderbird-115.12.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">c02679c8d3641a8061ea08965de7674c5c793a0546570d4b49ec370f87bfae28</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2024:4016" id="RHSA-2024:4016" title="Important: Thunderbird Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>RITM0891205</id><title>Important: Openafs</title><description>Security Fixes: * Fix OPENAFS-SA-2019-001: information leakage in failed RPC output Generated RPC handler routines ran output variables through XDR encoding even when the call had failed and would shortly be aborted (and for which uninitialized output variables is common); any complete packets assembled in the process would be sent to the peer, leaking the contents of the uninitialized memory in question. 
* Fix OPENAFS-SA-2019-002: information leakage from uninitialized scalars Generated RPC handler routines did not initialize output variables of scalar (fixed-length) type, since they did not require dedicated logic to free.  Such variables allocated on the stack could remain uninitialized in some cases (including those affected by OPENAFS-SA-2019-001), and the contents of uninitialized memory would be returned to the peer.</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-10-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openafs-1.6-sl-authlibs" release="290.sl7" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-1.6-sl-authlibs-1.6.24-290.sl7.x86_64.rpm</filename><sum type="sha256">6f5887f818d41ef20b6ff4d6cb3a46024e52a86dfead62f8aa77ccb61f3aee70</sum></package><package arch="x86_64" name="openafs-1.6-sl-client" release="290.sl7" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-1.6-sl-client-1.6.24-290.sl7.x86_64.rpm</filename><sum type="sha256">89006ed4705a480fc5f899e6c7326fd2fd140f0824c98ac00c1fdddb3e991417</sum></package><package arch="x86_64" name="openafs-1.6-sl-server" release="290.sl7" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-1.6-sl-server-1.6.24-290.sl7.x86_64.rpm</filename><sum type="sha256">8350de2d12be45089e84d23b4290735bc6c06452a9014faf0151292d8998de5d</sum></package><package arch="x86_64" name="openafs-1.6-sl-module-tools" release="290.sl7" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-1.6-sl-module-tools-1.6.24-290.sl7.x86_64.rpm</filename><sum type="sha256">037c00b5808440bed112b91f2729e274a654835faeb662ce714de45d62e81faa</sum></package><package arch="x86_64" name="openafs-1.6-sl-compat" release="290.sl7" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-1.6-sl-compat-1.6.24-290.sl7.x86_64.rpm</filename><sum type="sha256">6959808badac12f4c3285a9ef94a331af588933e015e78be752ade5379263cc0</sum></package><package arch="x86_64" name="openafs-1.6-sl" release="290.sl7" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-1.6-sl-1.6.24-290.sl7.x86_64.rpm</filename><sum type="sha256">c965ad7022e8de31d7a8a5cad828b2820d723a0d7b4908ce39814332b1660b29</sum></package><package arch="x86_64" name="openafs-1.6-sl-kpasswd" release="290.sl7" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-1.6-sl-kpasswd-1.6.24-290.sl7.x86_64.rpm</filename><sum type="sha256">d3b934930755dabd732640cf2e63f67f8ac55db7ada2ac7a860d82816b5a4765</sum></package><package arch="x86_64" name="kmod-openafs-1.6-sl-1062" release="290.sl7.1062.4.1" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>kmod-openafs-1.6-sl-1062-1.6.24-290.sl7.1062.4.1.x86_64.rpm</filename><sum type="sha256">72b1c824de52ff3c093a2c84480521803d4be7e13c1f4a02f287da52ba7d39b6</sum></package><package arch="x86_64" name="openafs-1.6-sl-krb5" release="290.sl7" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-1.6-sl-krb5-1.6.24-290.sl7.x86_64.rpm</filename><sum type="sha256">ef6f21f2ed5aac083ebd59c22434625744f42ec27d9577e6b853e712ec8b8490</sum></package><package arch="x86_64" name="openafs-1.6-sl-kernel-source" release="290.sl7" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-1.6-sl-kernel-source-1.6.24-290.sl7.x86_64.rpm</filename><sum type="sha256">4a808206ca7e0835f17f9842a24e31d3b6dc928900f82838fabf8d17809a1c1e</sum></package><package arch="x86_64" name="openafs-1.6-sl-plumbing-tools" release="290.sl7" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-1.6-sl-plumbing-tools-1.6.24-290.sl7.x86_64.rpm</filename><sum type="sha256">3885ff49899e4ab65f69647d7404f01f70d553023ed348fd5bd1c11d9781666c</sum></package><package arch="x86_64" name="openafs-1.6-sl-authlibs-devel" release="290.sl7" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-1.6-sl-authlibs-devel-1.6.24-290.sl7.x86_64.rpm</filename><sum type="sha256">d00eeda3a3f8b1903939d7d828cb2fa9fb1e4a0056c5ba0edd9781aec55091bd</sum></package><package arch="x86_64" name="openafs-1.6-sl-devel" release="290.sl7" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>openafs-1.6-sl-devel-1.6.24-290.sl7.x86_64.rpm</filename><sum type="sha256">e690cf873b434918bb3b5ac380d639ad383f31b2edb9e6e93c4e7c540e03bd35</sum></package></collection></pkglist><references /></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SL7.5:selinux</id><title>Reissue Selinux Utils</title><description>This package resolves the issue.</description><release>Scientific Linux</release><issued date="2018-05-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="policycoreutils-gui" release="22.sl7" src="policycoreutils-2.5-22.sl7.src.rpm" version="2.5"><filename>policycoreutils-gui-2.5-22.sl7.x86_64.rpm</filename><sum type="sha256">6a455e91533694bf8b4482089227d96065ced4d2adb7c361fb940293abd007c7</sum></package><package arch="i686" name="libselinux" release="12.sl7" src="libselinux-2.5-12.sl7.src.rpm" version="2.5"><filename>libselinux-2.5-12.sl7.i686.rpm</filename><sum type="sha256">a7e032073e98b240dd8ecdcb487ed2140cd6a2c3653f19226a19452010022f2b</sum></package><package arch="i686" name="libsemanage-devel" release="11.sl7" src="libsemanage-2.5-11.sl7.src.rpm" version="2.5"><filename>libsemanage-devel-2.5-11.sl7.i686.rpm</filename><sum type="sha256">af9bac6487cc239e4139c6415a9cb14502f658058102bfe6c8b3811deebd9e63</sum></package><package arch="x86_64" name="libsemanage-devel" release="11.sl7" src="libsemanage-2.5-11.sl7.src.rpm" version="2.5"><filename>libsemanage-devel-2.5-11.sl7.x86_64.rpm</filename><sum type="sha256">469b0d826455781ea9364f2d48220715a21aa19cb4e67d3aa0b6d8d1842da104</sum></package><package arch="i686" name="libselinux-devel" release="12.sl7" src="libselinux-2.5-12.sl7.src.rpm" version="2.5"><filename>libselinux-devel-2.5-12.sl7.i686.rpm</filename><sum type="sha256">359e5be500134bf6dce55baba2264210509618d3a8e1eede6a4c6d8703a67f9f</sum></package><package arch="i686" name="libsemanage" release="11.sl7" src="libsemanage-2.5-11.sl7.src.rpm" version="2.5"><filename>libsemanage-2.5-11.sl7.i686.rpm</filename><sum type="sha256">7ed59cb64d931ce3f772e5cea8895a440fa4237da4f5f84952d17819ae4313f9</sum></package><package arch="i686" name="libsemanage-static" release="11.sl7" src="libsemanage-2.5-11.sl7.src.rpm" version="2.5"><filename>libsemanage-static-2.5-11.sl7.i686.rpm</filename><sum type="sha256">3e05740408101243b8fff69559fbc85cd3de3bc5adfae68fcdaaa6fbe34637b2</sum></package><package arch="x86_64" name="libselinux-ruby" release="12.sl7" src="libselinux-2.5-12.sl7.src.rpm" version="2.5"><filename>libselinux-ruby-2.5-12.sl7.x86_64.rpm</filename><sum type="sha256">742802fef6c57c9e50962fb368b9d47e13e567f347d02c2f67b70340645c5bc0</sum></package><package arch="i686" name="policycoreutils-devel" release="22.sl7" src="policycoreutils-2.5-22.sl7.src.rpm" version="2.5"><filename>policycoreutils-devel-2.5-22.sl7.i686.rpm</filename><sum type="sha256">b2cc170287161623394a785b24e3520a8bd39e78460ae8082a0c77b5c2a2b444</sum></package><package arch="x86_64" name="libsemanage-python" release="11.sl7" src="libsemanage-2.5-11.sl7.src.rpm" version="2.5"><filename>libsemanage-python-2.5-11.sl7.x86_64.rpm</filename><sum type="sha256">070a9e6d6127280afefd00ffc5112569e1b91292245336b0ca5739eee2bb940e</sum></package><package arch="x86_64" name="libselinux-python" release="12.sl7" src="libselinux-2.5-12.sl7.src.rpm" version="2.5"><filename>libselinux-python-2.5-12.sl7.x86_64.rpm</filename><sum type="sha256">75495cbcaaf339d1a1d766b1990d9b0b5ff734c66dd0af4d597cf5a5157ce22a</sum></package><package arch="x86_64" name="policycoreutils" release="22.sl7" src="policycoreutils-2.5-22.sl7.src.rpm" version="2.5"><filename>policycoreutils-2.5-22.sl7.x86_64.rpm</filename><sum type="sha256">fd09acaab47c1c0bbb2afd077222e5b89da50145c78128739bef0f2f42387df6</sum></package><package arch="x86_64" name="policycoreutils-devel" release="22.sl7" src="policycoreutils-2.5-22.sl7.src.rpm" version="2.5"><filename>policycoreutils-devel-2.5-22.sl7.x86_64.rpm</filename><sum type="sha256">5884e54d22d0548c25df34887488cf03d6b9337bb65abeb0febfe2efab68992c</sum></package><package arch="x86_64" name="libselinux-devel" release="12.sl7" src="libselinux-2.5-12.sl7.src.rpm" version="2.5"><filename>libselinux-devel-2.5-12.sl7.x86_64.rpm</filename><sum type="sha256">8f53812073275cd898f08b575bb6a274d563dd7a02c40403f74bb99f0af86d53</sum></package><package arch="i686" name="libsepol" release="8.1.sl7" src="libsepol-2.5-8.1.sl7.src.rpm" version="2.5"><filename>libsepol-2.5-8.1.sl7.i686.rpm</filename><sum type="sha256">f3a173380c27646923d378224d7f03c8998e0fd89e68c1cc44464e993648e261</sum></package><package arch="x86_64" name="libsepol" release="8.1.sl7" src="libsepol-2.5-8.1.sl7.src.rpm" version="2.5"><filename>libsepol-2.5-8.1.sl7.x86_64.rpm</filename><sum type="sha256">d3fd29eb8f563ef0498c9ca764cb17559711536da03ef9ccf16cfe82fcd55f94</sum></package><package arch="i686" name="libsepol-static" release="8.1.sl7" src="libsepol-2.5-8.1.sl7.src.rpm" version="2.5"><filename>libsepol-static-2.5-8.1.sl7.i686.rpm</filename><sum type="sha256">17b018cf1ea5eb835f9fb83d5568789163721a785c780d5ca2319f9fc0a3ee5c</sum></package><package arch="i686" name="libsepol-devel" release="8.1.sl7" src="libsepol-2.5-8.1.sl7.src.rpm" version="2.5"><filename>libsepol-devel-2.5-8.1.sl7.i686.rpm</filename><sum type="sha256">7789fa2800a6cbac8c6c3af4719b0735b618c1fb036df936e8f9280b034518d8</sum></package><package arch="x86_64" name="libselinux" release="12.sl7" src="libselinux-2.5-12.sl7.src.rpm" version="2.5"><filename>libselinux-2.5-12.sl7.x86_64.rpm</filename><sum type="sha256">c430435e5b62f26ab36e7dfec7ecebd1863361fb4e5b0d8a21626f0068098020</sum></package><package arch="x86_64" name="policycoreutils-newrole" release="22.sl7" src="policycoreutils-2.5-22.sl7.src.rpm" version="2.5"><filename>policycoreutils-newrole-2.5-22.sl7.x86_64.rpm</filename><sum type="sha256">9d50545fe0ed553b53c1239809106685847cef58c7e62c11847259a89e5dde2c</sum></package><package arch="x86_64" name="policycoreutils-python" release="22.sl7" src="policycoreutils-2.5-22.sl7.src.rpm" version="2.5"><filename>policycoreutils-python-2.5-22.sl7.x86_64.rpm</filename><sum type="sha256">7f193e44b5c1136ac16b28e8320e1688a64be7a4d948b54f78c35d446fe3ea3b</sum></package><package arch="x86_64" name="libsepol-devel" release="8.1.sl7" src="libsepol-2.5-8.1.sl7.src.rpm" version="2.5"><filename>libsepol-devel-2.5-8.1.sl7.x86_64.rpm</filename><sum type="sha256">2e140a4109bbba687b5f50833730d5a49e5f744efe5185dc28141ad8bacf3eb7</sum></package><package arch="x86_64" name="libselinux-utils" release="12.sl7" src="libselinux-2.5-12.sl7.src.rpm" version="2.5"><filename>libselinux-utils-2.5-12.sl7.x86_64.rpm</filename><sum type="sha256">e49940a2b9a2dc431965ffa59e006c635e72705fb4c756c1924cbc990f09b9bb</sum></package><package arch="x86_64" name="policycoreutils-sandbox" release="22.sl7" src="policycoreutils-2.5-22.sl7.src.rpm" version="2.5"><filename>policycoreutils-sandbox-2.5-22.sl7.x86_64.rpm</filename><sum type="sha256">12a83c5b6883d4b8d512cceaa0b18468a5dd680bb9e840a7e864b9037a4dbe29</sum></package><package arch="x86_64" name="policycoreutils-restorecond" release="22.sl7" src="policycoreutils-2.5-22.sl7.src.rpm" version="2.5"><filename>policycoreutils-restorecond-2.5-22.sl7.x86_64.rpm</filename><sum type="sha256">c31f6b51a3872ff9f0699eb586dcd326afde70bd43c48cdc32ce17fe972a7968</sum></package><package arch="x86_64" name="libsemanage" release="11.sl7" src="libsemanage-2.5-11.sl7.src.rpm" version="2.5"><filename>libsemanage-2.5-11.sl7.x86_64.rpm</filename><sum type="sha256">d925642fc606989401822d188eaba437a0747b50d64b018b86ecff2ab6b3d82c</sum></package><package arch="x86_64" name="libselinux-static" release="12.sl7" src="libselinux-2.5-12.sl7.src.rpm" version="2.5"><filename>libselinux-static-2.5-12.sl7.x86_64.rpm</filename><sum type="sha256">78cd6f8a22b4b25bc7aade0271291b3a3eb7f9e1167dd2b60196c3aa82ccd177</sum></package><package arch="x86_64" name="libsemanage-static" release="11.sl7" src="libsemanage-2.5-11.sl7.src.rpm" version="2.5"><filename>libsemanage-static-2.5-11.sl7.x86_64.rpm</filename><sum type="sha256">d9b94f28b0d6bf3a002ea6e149b5327296dc949f515125b3c3c6056212097217</sum></package><package arch="i686" name="libselinux-static" release="12.sl7" src="libselinux-2.5-12.sl7.src.rpm" version="2.5"><filename>libselinux-static-2.5-12.sl7.i686.rpm</filename><sum type="sha256">35a13c016be2797bb67f846d619a3423bc5fe6181e705a7be89e017427efa21e</sum></package><package arch="x86_64" name="libsepol-static" release="8.1.sl7" src="libsepol-2.5-8.1.sl7.src.rpm" version="2.5"><filename>libsepol-static-2.5-8.1.sl7.x86_64.rpm</filename><sum type="sha256">d3cae6f9428529231b7603df1096f74f5d86c77d2d7cb82c1ed055e74b3ac735</sum></package></collection></pkglist><references /></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:1445-1</id><title>Lvm2 Bug Fix And Enhancement Update</title><description>The lvm2 packages include complete support for handling read and write operations on physical volumes, creating volume groups from one or more physical volumes, and creating one or more logical volumes in volume groups.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="lvm2-sysvinit" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="2.02.166"><filename>lvm2-sysvinit-2.02.166-1.el7.x86_64.rpm</filename><sum type="sha256">4268b9272122692241fd89bc82dc5ed6e63f4cd8a7914d60bf6befe5c388caa4</sum></package><package arch="i686" epoch="7" name="lvm2-devel" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="2.02.166"><filename>lvm2-devel-2.02.166-1.el7.i686.rpm</filename><sum type="sha256">a1b2175114420f84514ae472a8f8c191965d4d33a24b14c92a0eb3b552dbffb9</sum></package><package arch="x86_64" epoch="7" name="lvm2-devel" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="2.02.166"><filename>lvm2-devel-2.02.166-1.el7.x86_64.rpm</filename><sum type="sha256">ed024e1d927d2099c5fb5b7061c220d732e072a06d702a0a8bfe3c79d49f0443</sum></package><package arch="x86_64" epoch="7" name="lvm2-cluster-standalone" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="2.02.166"><filename>lvm2-cluster-standalone-2.02.166-1.el7.x86_64.rpm</filename><sum type="sha256">f650f9ab1bdcd3f3b5ebef9833b8c54c161fd391fcddb84ff6f15d7595150c40</sum></package><package arch="x86_64" epoch="7" name="lvm2-lockd" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="2.02.166"><filename>lvm2-lockd-2.02.166-1.el7.x86_64.rpm</filename><sum type="sha256">f1c33ee1848e3b78a63ceb3495ab84f49e86d91479bfa72fee55508c53385de4</sum></package><package arch="i686" epoch="7" name="device-mapper-event-libs" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="1.02.135"><filename>device-mapper-event-libs-1.02.135-1.el7.i686.rpm</filename><sum type="sha256">ba743605721b028e8a854de2c23242d90ab25965b06b54903875708bce605fa7</sum></package><package arch="x86_64" epoch="7" name="lvm2-libs" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="2.02.166"><filename>lvm2-libs-2.02.166-1.el7.x86_64.rpm</filename><sum type="sha256">d3c0787bbc028c7be6a5be337ce3967c5a438e20506dca7088618e58114592cc</sum></package><package arch="i686" epoch="7" name="device-mapper-event-devel" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="1.02.135"><filename>device-mapper-event-devel-1.02.135-1.el7.i686.rpm</filename><sum type="sha256">2aa657a82b46359972ed5d7a43860797f8d0e062f5d4f943872a60b9c86651ca</sum></package><package arch="x86_64" epoch="7" name="lvm2" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="2.02.166"><filename>lvm2-2.02.166-1.el7.x86_64.rpm</filename><sum type="sha256">37097e8160c030c848e0ea96e4af4b5af70c7a07fe59ee87763124004ead4e75</sum></package><package arch="i686" epoch="7" name="device-mapper-devel" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="1.02.135"><filename>device-mapper-devel-1.02.135-1.el7.i686.rpm</filename><sum type="sha256">94191588c126142c9d0485111e2e241ea96f1ce40013a7c146d0a7e0568fd178</sum></package><package arch="x86_64" epoch="7" name="device-mapper-libs" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="1.02.135"><filename>device-mapper-libs-1.02.135-1.el7.x86_64.rpm</filename><sum type="sha256">e23c906e0863239e5bda8aae93cd9083402c3bed1b91b55505104332c183bc98</sum></package><package arch="i686" epoch="7" name="device-mapper-libs" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="1.02.135"><filename>device-mapper-libs-1.02.135-1.el7.i686.rpm</filename><sum type="sha256">f6a9e311fdc6fa05af74b7e70549eb5cbe1965ce07a452e4b33e55955beea507</sum></package><package arch="x86_64" epoch="7" name="device-mapper-event-libs" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="1.02.135"><filename>device-mapper-event-libs-1.02.135-1.el7.x86_64.rpm</filename><sum type="sha256">6b8300f6120b6a9ca9c7b4a804397446ae200d1b76be3f73c51e76048d433e60</sum></package><package arch="x86_64" epoch="7" name="device-mapper-devel" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="1.02.135"><filename>device-mapper-devel-1.02.135-1.el7.x86_64.rpm</filename><sum type="sha256">2ba694dc96722cea7284d9cda8b92f556bf57eb273c123c6fbc83439973dab00</sum></package><package arch="x86_64" epoch="7" name="device-mapper" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="1.02.135"><filename>device-mapper-1.02.135-1.el7.x86_64.rpm</filename><sum type="sha256">efbb5c4a7ee3c33cebc638286ac8cd49c497d48f710c5e9fb400750123f95ed8</sum></package><package arch="i686" epoch="7" name="lvm2-libs" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="2.02.166"><filename>lvm2-libs-2.02.166-1.el7.i686.rpm</filename><sum type="sha256">ead35ebf86a084899b9573b3437d23a306711c88e43cb8f489fedb54ce4ae442</sum></package><package arch="x86_64" epoch="7" name="lvm2-cluster" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="2.02.166"><filename>lvm2-cluster-2.02.166-1.el7.x86_64.rpm</filename><sum type="sha256">f16a041c6b18cb51b25586a2dc41bf810644242fa42ecfb4970c59cdf48ed6ed</sum></package><package arch="x86_64" epoch="7" name="device-mapper-event-devel" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="1.02.135"><filename>device-mapper-event-devel-1.02.135-1.el7.x86_64.rpm</filename><sum type="sha256">44284cfa81aad9f942c439166873c248867f0da828110d544087445766bc4ae0</sum></package><package arch="x86_64" epoch="7" name="cmirror-standalone" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="2.02.166"><filename>cmirror-standalone-2.02.166-1.el7.x86_64.rpm</filename><sum type="sha256">2c880f0500e1d10e5eff19c0c9900ca658952a4dc0737c997a0a0431d5e25ed7</sum></package><package arch="x86_64" epoch="7" name="cmirror" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="2.02.166"><filename>cmirror-2.02.166-1.el7.x86_64.rpm</filename><sum type="sha256">286e4d937bb05c1a00945bb1f641183f3963bf4b4ccb87223b2a8a9f0993fbee</sum></package><package arch="x86_64" epoch="7" name="lvm2-python-libs" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="2.02.166"><filename>lvm2-python-libs-2.02.166-1.el7.x86_64.rpm</filename><sum type="sha256">819e3df546cb8d19baaba5beb2df05dc898873ba328d7303922d7b3f26fb0d5c</sum></package><package arch="x86_64" epoch="7" name="device-mapper-event" release="1.el7" src="lvm2-2.02.166-1.el7.src.rpm" version="1.02.135"><filename>device-mapper-event-1.02.135-1.el7.x86_64.rpm</filename><sum type="sha256">ac0d9fe99c79fb768728ffa2d6659b5afcf33b883be9712ef0219bbb1ec24e8e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1445" id="RHBA-2016:1445-1" title="Rhba-2016:1445-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:1526-1</id><title>Ipa And Mod_Auth_Gssapi Bug Fix Update</title><description>The mod_auth_gssapi module is a Generic Security Services API (GSSAPI) authentication module for Apache. It implements an HTTP authentication protocol based on the Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO).

This update fixes the following bug in both the ipa and mod_auth_gssapi packages:

* Previously, in case of multiple concurrent remote procedure call (RPC) requests of the same principal, a race condition occurred on the IdM server. After the first request finished, it deleted the credential cache (ccache) for the principal. Then, if the second request tried to use the ccache, the attempt failed. For example, this problem could cause two concurrent ipa-client-install operations to fail.

With this update, unique ccache names are now used on the server instead of ccache names derived from the principal name. As a result, only one ccache exists for each request, which avoids the described conflicts in ccache names and ensures that multiple concurrent RPC requests on the same principal work as expected.</description><release>Scientific Linux</release><issued date="2016-08-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ipa-python" release="15.sl7_2.18" src="ipa-4.2.0-15.sl7_2.18.src.rpm" version="4.2.0"><filename>ipa-python-4.2.0-15.sl7_2.18.x86_64.rpm</filename><sum type="sha256">4302eabb69233c34942ce46057e1bd61257eba46e22b3d82421534ca82c1f880</sum></package><package arch="x86_64" name="ipa-admintools" release="15.sl7_2.18" src="ipa-4.2.0-15.sl7_2.18.src.rpm" version="4.2.0"><filename>ipa-admintools-4.2.0-15.sl7_2.18.x86_64.rpm</filename><sum type="sha256">02bcdc9c9190faab55a7bea1f10de41c6fbc346c6be2a8220d377086c241ea06</sum></package><package arch="x86_64" name="mod_auth_gssapi" release="3.el7_2" src="mod_auth_gssapi-1.3.1-3.el7_2.src.rpm" version="1.3.1"><filename>mod_auth_gssapi-1.3.1-3.el7_2.x86_64.rpm</filename><sum type="sha256">b3e9d39f320e2c09dc8475b6cb2f6eab03999e982fb75211b705e54d7d34933e</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="15.sl7_2.18" src="ipa-4.2.0-15.sl7_2.18.src.rpm" version="4.2.0"><filename>ipa-server-trust-ad-4.2.0-15.sl7_2.18.x86_64.rpm</filename><sum type="sha256">b72d826aa79c4b8d50f496afba1190099b0209e4e4358944fd587defedd8fd52</sum></package><package arch="x86_64" name="ipa-server-dns" release="15.sl7_2.18" src="ipa-4.2.0-15.sl7_2.18.src.rpm" version="4.2.0"><filename>ipa-server-dns-4.2.0-15.sl7_2.18.x86_64.rpm</filename><sum type="sha256">04c012f69e30776cafacce8bbcdb6e2cd0a8610467d39d44e77ff573790220e7</sum></package><package arch="x86_64" name="ipa-server" release="15.sl7_2.18" src="ipa-4.2.0-15.sl7_2.18.src.rpm" version="4.2.0"><filename>ipa-server-4.2.0-15.sl7_2.18.x86_64.rpm</filename><sum type="sha256">f9bb52cde4c70d78e7976c8b4b6d42add083f1ca686cc834f8c6781e94c44381</sum></package><package arch="x86_64" name="ipa-client" release="15.sl7_2.18" src="ipa-4.2.0-15.sl7_2.18.src.rpm" version="4.2.0"><filename>ipa-client-4.2.0-15.sl7_2.18.x86_64.rpm</filename><sum type="sha256">96e11498614b3266d4bbb62bdb63657f2d07d6a2c4c461255d0465aeecc52b33</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1526" id="RHBA-2016:1526-1" title="Rhba-2016:1526-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347175" id="1347175" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1350305" id="1350305" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:1528-1</id><title>Sssd Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, the System Security Services Daemon (SSSD) was not closing the socket to the LDAP server in case the LDAP connection request was terminated. In consequence, if SSSD was trying to connect to a remote domain controller (DC) during a service discovery, the LDAP connection code was terminated which led to exhausting system resources. A patch has been applied to the SSSD LDAP connection code to close the socket unconditionally. As a result, the LDAP connection code no longer leaks a socket if the connection request is terminated and works like expected.

* When resolving security identifiers (SID), the System Security Services Daemon's (SSSD) libwbclient library returned an error if a single SID could not be translated. As a consequence, the access to Samba shares was denied for the user. A patch has been applied and only permissions that are related to the unresolvable SID are not applied. As a result the user can access Samba shares although some SIDs are not resolvable.

* Previously, the ldap_group_external_member parameter had no default value set. As a consequence, the System Security Services Daemon (SSSD) failed to resolve external members of IdM groups during getgr* requests. A patch has been applied to set a default value for the ldap_group_external_member parameter. As a result, resolving external members of IdM groups works in the described scenario.</description><release>Scientific Linux</release><issued date="2016-08-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libsss_simpleifp-devel" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>libsss_simpleifp-devel-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">1a1d1c2b2a680a01c5725b066fa2bc823638d29978eeac037cdc04e24645f99c</sum></package><package arch="x86_64" name="libsss_nss_idmap-devel" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>libsss_nss_idmap-devel-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">483728fd47e392c43db7b45d8f47e3e365e1b5bd20fdbc24098240fd282dbf08</sum></package><package arch="x86_64" name="libsss_nss_idmap" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>libsss_nss_idmap-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">d47bd8688bc0c2f6295a28ee707c5b162fc882a2e0d2630d8ec098c795a26ca1</sum></package><package arch="x86_64" name="python-sss-murmur" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>python-sss-murmur-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">ddc9711e98fb9ed69e05c6dd2d8e8e1bde23e583b4e347851f41514cdfaa7eac</sum></package><package arch="i686" name="libsss_nss_idmap" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>libsss_nss_idmap-1.13.0-40.el7_2.12.i686.rpm</filename><sum type="sha256">936908881af7fdb64d5864fee7bc10cabba83d5acad10550625ba3bd11342335</sum></package><package arch="x86_64" name="sssd-ldap" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-ldap-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">85f0c7d171725212068958284217f6d64d326fd711d1ab65bc17c2e458e10884</sum></package><package arch="i686" name="sssd-libwbclient" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-libwbclient-1.13.0-40.el7_2.12.i686.rpm</filename><sum type="sha256">8718fad490bcebaf77b41a14ddbad3aa37b9ce3c29ad98083d93702476f61971</sum></package><package arch="x86_64" name="python-libsss_nss_idmap" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>python-libsss_nss_idmap-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">ccbebb6abe21efa04649e202724ecd2d1e03227b76c2b8eaef7e254686e423f0</sum></package><package arch="noarch" name="python-sssdconfig" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>python-sssdconfig-1.13.0-40.el7_2.12.noarch.rpm</filename><sum type="sha256">4a3e354fcea58478d4b3c5138aa305a84b77583454c86b984223dedea43dd8d5</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>libsss_nss_idmap-devel-1.13.0-40.el7_2.12.i686.rpm</filename><sum type="sha256">036a8d4a37031c27f298da621bab854b90a516e9f41032070e6063a551a6fe37</sum></package><package arch="x86_64" name="sssd-proxy" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-proxy-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">bbdb9fbdd8f4bc6ac68f38f1beaa8c5fc1581a877a07e9a9f603663433e7204d</sum></package><package arch="x86_64" name="sssd-dbus" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-dbus-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">070c7506eca6f59c6e642438a47487c7211f6a80d59ec258263f066a441c7851</sum></package><package arch="i686" name="libipa_hbac-devel" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>libipa_hbac-devel-1.13.0-40.el7_2.12.i686.rpm</filename><sum type="sha256">ea6d7e4ad627d9421f5186d2301cfe157b7a892b2bf4eab3971ccad6732d069c</sum></package><package arch="x86_64" name="sssd-ad" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-ad-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">e2083c35248a4005ce5c3ec2b1e29678ea3e1ef44c886e3c4255c2a72a4048bd</sum></package><package arch="i686" name="libsss_simpleifp" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>libsss_simpleifp-1.13.0-40.el7_2.12.i686.rpm</filename><sum type="sha256">26a64b0debf1d3db15f437ce4257a9484dc795d159d45350c774c5693fc6d5bc</sum></package><package arch="i686" name="sssd-libwbclient-devel" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-libwbclient-devel-1.13.0-40.el7_2.12.i686.rpm</filename><sum type="sha256">a9185c690d444d8e74fc210b09e2eaec98c7ff2ec7a5c446380e767d47d1b898</sum></package><package arch="x86_64" name="sssd-libwbclient-devel" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-libwbclient-devel-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">5cb7ca01630a0854fcbaa3357a7b0918b4ef715c636ff0c047e346d42636dbe8</sum></package><package arch="i686" name="libsss_idmap" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>libsss_idmap-1.13.0-40.el7_2.12.i686.rpm</filename><sum type="sha256">010fc8c008b4bc8e1e5894769cacf10be2d5ae103ce072ee028ff2e37b06516a</sum></package><package arch="x86_64" name="python-libipa_hbac" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>python-libipa_hbac-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">f3d2e1fc775283e4bede2dd2bcc3c33c571696e5d08c102b0dd5abb6eee5129d</sum></package><package arch="x86_64" name="sssd-client" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-client-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">c75e6bdbb37abc86bd64fef845d9de2c8dce47dc0bcd60c1be735a9a6544fd56</sum></package><package arch="x86_64" name="sssd-libwbclient" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-libwbclient-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">52f31961fd386d9c03fb7e36f3d76729e98b9b1e6d02d93e1b1d0ee59df6217a</sum></package><package arch="x86_64" name="sssd-common-pac" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-common-pac-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">3a2661b90b3b89ccea276b6dcd650572bdf49973cf8c97bb806b907c0acd33e0</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>libsss_idmap-devel-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">7348520215a96314cb340a93e2d93dd642cbea55c540b17e6327259e7d6815e3</sum></package><package arch="x86_64" name="sssd-krb5-common" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-krb5-common-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">0d1f955d01fd7c90515221b8fc1d19d81d2fbaea031503846b0a22c851c46aea</sum></package><package arch="i686" name="libipa_hbac" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>libipa_hbac-1.13.0-40.el7_2.12.i686.rpm</filename><sum type="sha256">014728ffd116a09d08e3a684ddb5367a45ac20d6872e71a22cddb440a5618727</sum></package><package arch="x86_64" name="libipa_hbac" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>libipa_hbac-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">9daf9f6b6e225f9b704ec58f43c159e1f1b05e1672cfec05189a576d11ba7be6</sum></package><package arch="x86_64" name="sssd" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">7f8e7b2931f0e85305e89fd66a8cb95e841875626ee1e940e4d80a1f10bada4f</sum></package><package arch="x86_64" name="sssd-krb5" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-krb5-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">be6943317abefe0dcadf58c70843ede0733489bfba905a13e5086ceda52e6671</sum></package><package arch="i686" name="sssd-common" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-common-1.13.0-40.el7_2.12.i686.rpm</filename><sum type="sha256">da91403b306cbb299520c7d47d6b27aed713699dab3cc0c3dcb22c8bf1d4a03a</sum></package><package arch="x86_64" name="sssd-common" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-common-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">973154a8b01991b9d5c5d62cfdb3204b6e49d703bdf54e973649195a511a4a53</sum></package><package arch="i686" name="libsss_simpleifp-devel" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>libsss_simpleifp-devel-1.13.0-40.el7_2.12.i686.rpm</filename><sum type="sha256">5eb67922f3220aa23bada8c1aef0138f459e67b7e2e9b7c06ed59766bc1da6a8</sum></package><package arch="x86_64" name="sssd-tools" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-tools-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">33265c555b09420f4861c41b03ab1568945e2c61aa17c4dd83c762a4ea861fba</sum></package><package arch="x86_64" name="libsss_idmap" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>libsss_idmap-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">df54f1fabe2afd961122c5be3384c49eab37198074ff5fc135ef61fe2965cf94</sum></package><package arch="x86_64" name="python-sss" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>python-sss-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">c9b7ca98c4876ba6988ddca600a56c6af19a3c140adb6a98bd1267b24baab002</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>libipa_hbac-devel-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">3cfb7aee91051ca945d2e210ab63ae44fbedaa9d34067fbc066e9d6090c42651</sum></package><package arch="x86_64" name="libsss_simpleifp" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>libsss_simpleifp-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">d025dc219dac4fa013e7979904ab8e1b670c43192784ad511f5216b5fe6f71e6</sum></package><package arch="x86_64" name="sssd-ipa" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-ipa-1.13.0-40.el7_2.12.x86_64.rpm</filename><sum type="sha256">0a8de1417efd066722aa18c850e48283c422867def8ecbed61e68185a229c166</sum></package><package arch="i686" name="libsss_idmap-devel" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>libsss_idmap-devel-1.13.0-40.el7_2.12.i686.rpm</filename><sum type="sha256">50943788c19b5be75edbb5774792dda13648f52da32bd6faed5f112df72fb103</sum></package><package arch="i686" name="sssd-client" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-client-1.13.0-40.el7_2.12.i686.rpm</filename><sum type="sha256">21adf9eaa870078af128e3f9bba12325e5561bf4b2dfc47b862fef4647ac51ba</sum></package><package arch="i686" name="sssd-krb5-common" release="40.el7_2.12" src="sssd-1.13.0-40.el7_2.12.src.rpm" version="1.13.0"><filename>sssd-krb5-common-1.13.0-40.el7_2.12.i686.rpm</filename><sum type="sha256">7a84f2c032e6561b54660dca50672111620212d7262a4d7dae781349989713f7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1528" id="RHBA-2016:1528-1" title="Rhba-2016:1528-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347723" id="1347723" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1353605" id="1353605" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356433" id="1356433" title="Ldap_Group_External_Member Is No Set For The Ipa Provider" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:1540-1</id><title>Slapi-Nis Bug Fix Update</title><description>This update fixes the following bug:

* A previously updated version of slapi-nis introduced incompatibility of the slapi-nis external group-membership with the System Security Services Daemons (SSSD) default_domain_suffix option. As a consequence, the IPA compat-tree got inaccessible because external members of IPA groups could not be resolved during the initialization, and slapi-nis fails to start. A patch has been applied to fix the schema compatibility plug-in to work with SSSD, and slapi-nis is now compatible with the SSSD default_domain_suffix parameter.</description><release>Scientific Linux</release><issued date="2016-08-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="slapi-nis" release="11.el7_2" src="slapi-nis-0.54-11.el7_2.src.rpm" version="0.54"><filename>slapi-nis-0.54-11.el7_2.x86_64.rpm</filename><sum type="sha256">6b9c8bdf02e7cb95e8547d15734a3cafac9625a265edaf74762c306ce545c42b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:1540" id="RHBA-2016:1540-1" title="Rhba-2016:1540-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1350309" id="1350309" title="External Group-Membership Fix Is Incompatible With Sssd'S Default_Domain_Suffix Option." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2096-1</id><title>Tzdata Bug Fix Update</title><description>This update fixes the following bug:

* This update fixes the daylight saving time (DST) date for Palestine. The correct date and time is October 29, 2016 at 01:00.</description><release>Scientific Linux</release><issued date="2016-10-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2016h-1.el7.src.rpm" version="2016h"><filename>tzdata-2016h-1.el7.noarch.rpm</filename><sum type="sha256">8e5ef617706782cf67d7e67c4a4b1857b031e178cc155e8c8b9a87ff1e177b4f</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2016h-1.el7.src.rpm" version="2016h"><filename>tzdata-java-2016h-1.el7.noarch.rpm</filename><sum type="sha256">a96fc02a93e9d35cb03ff8aa613fc56b0d41d02ad671a61f9e7927a81a4da6d3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2096" id="RHBA-2016:2096-1" title="Rhba-2016:2096-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1387368" id="1387368" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1387374" id="1387374" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1387416" id="1387416" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1387419" id="1387419" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2168-1</id><title>Python-Blivet Bug Fix And Enhancement Update</title><description>The python-blivet package contains Blivet, a Python module for examining and modifying storage configuration.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="python-blivet" release="1.el7" src="python-blivet-0.61.15.59-1.el7.src.rpm" version="0.61.15.59"><filename>python-blivet-0.61.15.59-1.el7.noarch.rpm</filename><sum type="sha256">662c3400d9f3642f93cf501a7993d6a044c6ff43e8a9a03ca1c27adfb1424f69</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2168" id="RHBA-2016:2168-1" title="Rhba-2016:2168-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2171-1</id><title>Kmod Bug Fix And Enhancement Update</title><description>The kmod packages provide various programs needed for automatic loading and unloading of modules under 2.6, 3.x, and later kernels, as well as other module management programs.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kmod" release="9.el7" src="kmod-20-9.el7.src.rpm" version="20"><filename>kmod-20-9.el7.x86_64.rpm</filename><sum type="sha256">a76ee39e2b5a1be5123d2e5223c117120cc811007d297476c93f8cba3f901b41</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2171" id="RHBA-2016:2171-1" title="Rhba-2016:2171-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2184-1</id><title>Pykickstart Bug Fix Update</title><description>The pykickstart package contains a Python library for manipulating kickstart files.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="pykickstart" release="1.el7" src="pykickstart-1.99.66.10-1.el7.src.rpm" version="1.99.66.10"><filename>pykickstart-1.99.66.10-1.el7.noarch.rpm</filename><sum type="sha256">883ae68358dd47889f277b8e436e2af387ea193260c7018a1a66fe100d3ba9e2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2184" id="RHBA-2016:2184-1" title="Rhba-2016:2184-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2187-1</id><title>Yum-Utils Bug Fix And Enhancement Update</title><description>The yum-utils packages provide a collection of utilities and examples for the yum package manager to make yum easier and more powerful to use.</description><release>Scientific Linux</release><issued date="2017-01-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="yum-plugin-fs-snapshot" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-fs-snapshot-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">1c497a7b0ccfcfa907cd8c143bed19d86af73a8c6f52059639bb48dd72dcc60d</sum></package><package arch="noarch" name="yum-plugin-priorities" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-priorities-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">bad6140dd0a37083cc055d23ed76378cc6d41e783c870fb90f967c802791f13a</sum></package><package arch="noarch" name="yum-plugin-show-leaves" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-show-leaves-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">c3a623daa4fb5b8eec7a211a244953b5490effd3db857fe628a82377152f6743</sum></package><package arch="noarch" name="yum-plugin-auto-update-debug-info" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-auto-update-debug-info-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">c5248be3456c4336d202606e39a3c9f9c15c7e240b73cff830b71d81e4ad17f3</sum></package><package arch="noarch" name="yum-plugin-post-transaction-actions" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-post-transaction-actions-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">bb746bd6f66ede1873cb31f1540c70f218f5ad60c2400c2e2075824396efbcf9</sum></package><package arch="noarch" name="yum-plugin-fastestmirror" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-fastestmirror-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">750bfc3741fedeb4df9c145bcc22a97b86d385d14d5af93070d376645461554b</sum></package><package arch="noarch" name="yum-utils" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-utils-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">06f4a6950e1323a4316b93bc7b890c3bb4b0468fa5fa9bcda0ae3be943a19195</sum></package><package arch="noarch" name="yum-plugin-tsflags" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-tsflags-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">e4c0f01e329cc273a3569ed30aae8b449cefdd66d666e3fb878a6b6222dbe99e</sum></package><package arch="noarch" name="yum-plugin-tmprepo" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-tmprepo-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">51a069b863c6ca8a2a9b761bbb51d7c252532deb71610b5070e5040ae8f6f7cc</sum></package><package arch="noarch" name="yum-plugin-verify" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-verify-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">0548c39d491dd4e1491a199b7b025f19f1260dd9ff992c263f6c9055a59b255e</sum></package><package arch="noarch" name="yum-plugin-changelog" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-changelog-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">2f9d1845e847f746ccb2a0851b8cc704620e9d7d8a22c37b3df0f92facf18f91</sum></package><package arch="noarch" name="yum-plugin-versionlock" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-versionlock-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">2bc03eb5356c6494920f91c487b7efb01213e84f1589c00d3b54b4bbba82acfc</sum></package><package arch="noarch" name="yum-updateonboot" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-updateonboot-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">e9333c8123671d0dcb7fc4a0b20db28b7f233b650df3c069baba0aa47f122ae8</sum></package><package arch="noarch" name="yum-plugin-ovl" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-ovl-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">938474c265acbbb4114f982baa3a12c8534c00d879fb91361a02488a85c61b1c</sum></package><package arch="noarch" name="yum-plugin-list-data" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-list-data-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">de5cb0fe91d30bc60ff380f880c528fba26a0b38d9d6d7fde797a816bf66d2cb</sum></package><package arch="noarch" name="yum-plugin-rpm-warm-cache" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-rpm-warm-cache-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">98a0c4d590cd06a5cb0a64d9f4a8ee3fffabb281e302dce3b84c72dd49df11b2</sum></package><package arch="noarch" name="yum-plugin-local" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-local-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">8cd6ac1f5290121ab86a70257fc4992ee3f8c5e8b1ff748116c46da33451815d</sum></package><package arch="noarch" name="yum-NetworkManager-dispatcher" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-NetworkManager-dispatcher-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">a99f1c41b18338daff7446b055c821b6cbeac29988deb39fd61d1b075199e962</sum></package><package arch="noarch" name="yum-plugin-protectbase" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-protectbase-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">40761c8f8ba1f8bf9582a46750249fc470063939f4878f5bf3449dc2d9430044</sum></package><package arch="noarch" name="yum-plugin-merge-conf" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-merge-conf-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">d50bc2d8b3758915405835ba6b8739eff90fcad27c1ce7001dd694109f5c3618</sum></package><package arch="noarch" name="yum-plugin-remove-with-leaves" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-remove-with-leaves-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">87cf5d8b3f716717a2bc62c65375a921773eb625111b6e2ca757f09fa1706d96</sum></package><package arch="noarch" name="yum-plugin-filter-data" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-filter-data-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">e55b23b22c4a23c669edbc07292ad4646f3daf66c3a9539d56ca588551dcc22e</sum></package><package arch="noarch" name="yum-plugin-upgrade-helper" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-upgrade-helper-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">768514f6657884e60f979417ffa26ad5eecb78e81b7a288ae1c3a81860fca756</sum></package><package arch="noarch" name="yum-plugin-keys" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-keys-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">3c2784298420f6d9cc39d18663c3b7097c68b77b8e13431263ad5c7bdccabb2f</sum></package><package arch="noarch" name="yum-plugin-aliases" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-aliases-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">a5d17620f6f44dd36c9a75309e55a48fbac5d1e69e4d4f250434e4aae0dbf12d</sum></package><package arch="noarch" name="yum-plugin-ps" release="40.el7" src="yum-utils-1.1.31-40.el7.src.rpm" version="1.1.31"><filename>yum-plugin-ps-1.1.31-40.el7.noarch.rpm</filename><sum type="sha256">9e22027a04032e21020c456afce3b6997baee11133be2e0cb6e6d5a82d01ec23</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2187" id="RHBA-2016:2187-1" title="Rhba-2016:2187-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2206-1</id><title>Evolution-Data-Server Bug Fix Update</title><description>The evolution-data-server packages provide a unified back end for applications which interact with contacts, tasks and calendar information. Evolution Data Server was originally developed as a back end for the Evolution information management application, but is now used by various other applications.</description><release>Scientific Linux</release><issued date="2017-01-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="openchange-devel" release="2.el7" src="openchange-2.3-2.el7.src.rpm" version="2.3"><filename>openchange-devel-2.3-2.el7.i686.rpm</filename><sum type="sha256">56c174de147b1d3793da6c36dbae5d3d6888976415ac6fcb261ba8d9cf03fd47</sum></package><package arch="i686" name="evolution-data-server" release="37.el7" src="evolution-data-server-3.12.11-37.el7.src.rpm" version="3.12.11"><filename>evolution-data-server-3.12.11-37.el7.i686.rpm</filename><sum type="sha256">b243ccec27c0ccca61cee2ef601e095ce059ff7bb367f6485889898db6be2661</sum></package><package arch="i686" name="evolution-data-server-devel" release="37.el7" src="evolution-data-server-3.12.11-37.el7.src.rpm" version="3.12.11"><filename>evolution-data-server-devel-3.12.11-37.el7.i686.rpm</filename><sum type="sha256">39f057203a09fd056fd9607d21a6fe533107550d798b0e43e96a048c567a4d2f</sum></package><package arch="i686" name="evolution-mapi-devel" release="5.el7" src="evolution-mapi-3.12.10-5.el7.src.rpm" version="3.12.10"><filename>evolution-mapi-devel-3.12.10-5.el7.i686.rpm</filename><sum type="sha256">46da3bbb89ae7c0b3c2c10e1450ad512f9f697702c008a894660a07b82127050</sum></package><package arch="x86_64" name="evolution-mapi" release="5.el7" src="evolution-mapi-3.12.10-5.el7.src.rpm" version="3.12.10"><filename>evolution-mapi-3.12.10-5.el7.x86_64.rpm</filename><sum type="sha256">0d0b31ea4e22d8af5f0c714c07f11b31894cb041a31f3d8e617ca201106f13b0</sum></package><package arch="x86_64" name="evolution-mapi-devel" release="5.el7" src="evolution-mapi-3.12.10-5.el7.src.rpm" version="3.12.10"><filename>evolution-mapi-devel-3.12.10-5.el7.x86_64.rpm</filename><sum type="sha256">0e1cb07ce1be9af4607cb0a1a014f2aee363a76ec3943cacfcbe696272e5f512</sum></package><package arch="x86_64" name="openchange-devel" release="2.el7" src="openchange-2.3-2.el7.src.rpm" version="2.3"><filename>openchange-devel-2.3-2.el7.x86_64.rpm</filename><sum type="sha256">8d838b182affceffef18f2965419db90d844b93476c57f104dba878e46bcfdb4</sum></package><package arch="x86_64" name="evolution-data-server" release="37.el7" src="evolution-data-server-3.12.11-37.el7.src.rpm" version="3.12.11"><filename>evolution-data-server-3.12.11-37.el7.x86_64.rpm</filename><sum type="sha256">492ccfda38515b4ab5ff168ae243dd04a9d2eec3749db4d18b61361aee03c5d0</sum></package><package arch="i686" name="evolution-mapi" release="5.el7" src="evolution-mapi-3.12.10-5.el7.src.rpm" version="3.12.10"><filename>evolution-mapi-3.12.10-5.el7.i686.rpm</filename><sum type="sha256">5751d680a00df94c5666842d4701ab8c2e9915ede53f1abb16a27785ef230382</sum></package><package arch="x86_64" name="openchange" release="2.el7" src="openchange-2.3-2.el7.src.rpm" version="2.3"><filename>openchange-2.3-2.el7.x86_64.rpm</filename><sum type="sha256">84bbb9e073ff058a1551b7e16c34c20165ba03b9ca1b8fc38c14a85c44031ad9</sum></package><package arch="x86_64" name="openchange-client" release="2.el7" src="openchange-2.3-2.el7.src.rpm" version="2.3"><filename>openchange-client-2.3-2.el7.x86_64.rpm</filename><sum type="sha256">d51a8fadd4ca693c8501b2604f98cf0642a063f43dd79a0c1cce5209be9bdd97</sum></package><package arch="noarch" name="openchange-devel-docs" release="2.el7" src="openchange-2.3-2.el7.src.rpm" version="2.3"><filename>openchange-devel-docs-2.3-2.el7.noarch.rpm</filename><sum type="sha256">983b4c535d0b2e29d989a98727bd419e0492b461d9d4880dc2827ca4c914bcd3</sum></package><package arch="noarch" name="evolution-data-server-doc" release="37.el7" src="evolution-data-server-3.12.11-37.el7.src.rpm" version="3.12.11"><filename>evolution-data-server-doc-3.12.11-37.el7.noarch.rpm</filename><sum type="sha256">8348351783c6b7a83fbd0a57e511b325b9b740d346fc38d58462c6e798c56ff9</sum></package><package arch="i686" name="evolution-ews" release="9.el7" src="evolution-ews-3.12.11-9.el7.src.rpm" version="3.12.11"><filename>evolution-ews-3.12.11-9.el7.i686.rpm</filename><sum type="sha256">739089c1d78b1e5c6d15ded5e9c33eac334e56057758b7f87cbdf8f2cb0d4da3</sum></package><package arch="x86_64" name="evolution-data-server-devel" release="37.el7" src="evolution-data-server-3.12.11-37.el7.src.rpm" version="3.12.11"><filename>evolution-data-server-devel-3.12.11-37.el7.x86_64.rpm</filename><sum type="sha256">f2a2ec99f5d7c4a66adecf487f1261b4596181ce369d0de2bea382885816f2f0</sum></package><package arch="i686" name="openchange" release="2.el7" src="openchange-2.3-2.el7.src.rpm" version="2.3"><filename>openchange-2.3-2.el7.i686.rpm</filename><sum type="sha256">0adac047ff9056fd8fa98113a609b598012422d0ff089421bf6f71b58ffa1416</sum></package><package arch="x86_64" name="evolution-ews" release="9.el7" src="evolution-ews-3.12.11-9.el7.src.rpm" version="3.12.11"><filename>evolution-ews-3.12.11-9.el7.x86_64.rpm</filename><sum type="sha256">4eac3adc16ab7643e301b971351e3457ff3ba32349ea8eaac2bacc382dedc674</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2206" id="RHBA-2016:2206-1" title="Rhba-2016:2206-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2211-1</id><title>Device-Mapper-Persistent-Data Bug Fix Update</title><description>The device-mapper-persistent-data packages provide device-mapper thin provisioning utilities.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="device-mapper-persistent-data" release="1.el7" src="device-mapper-persistent-data-0.6.3-1.el7.src.rpm" version="0.6.3"><filename>device-mapper-persistent-data-0.6.3-1.el7.x86_64.rpm</filename><sum type="sha256">b28015b74b34b8feacfdef675fc1692ef08c6abeee2c70c26872cba229c6a898</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2211" id="RHBA-2016:2211-1" title="Rhba-2016:2211-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2228-1</id><title>Evolution Bug Fix And Enhancement Update</title><description>Evolution is a GNOME application that provides integrated email, calendar, contact management, and communications functionality.</description><release>Scientific Linux</release><issued date="2017-01-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="evolution" release="22.el7" src="evolution-3.12.11-22.el7.src.rpm" version="3.12.11"><filename>evolution-3.12.11-22.el7.i686.rpm</filename><sum type="sha256">c2a6a4ab0e6ebe02615b0dd6b5b5f26daee952a280f0ad138e65d4adf3f7033e</sum></package><package arch="x86_64" name="evolution-perl" release="22.el7" src="evolution-3.12.11-22.el7.src.rpm" version="3.12.11"><filename>evolution-perl-3.12.11-22.el7.x86_64.rpm</filename><sum type="sha256">cf214fe4d7873b1e46de05102325120ced7942a05058448559fe9ba12333d719</sum></package><package arch="x86_64" name="evolution" release="22.el7" src="evolution-3.12.11-22.el7.src.rpm" version="3.12.11"><filename>evolution-3.12.11-22.el7.x86_64.rpm</filename><sum type="sha256">69d4e3f35c08280caac4526dc769f52687ccc115734ac2999d7c3879f65238c6</sum></package><package arch="noarch" name="evolution-devel-docs" release="22.el7" src="evolution-3.12.11-22.el7.src.rpm" version="3.12.11"><filename>evolution-devel-docs-3.12.11-22.el7.noarch.rpm</filename><sum type="sha256">0497f24146ce7257e5fe47e6063486c752a1377e178dd251d18e13d7c61a5c96</sum></package><package arch="noarch" name="evolution-help" release="22.el7" src="evolution-3.12.11-22.el7.src.rpm" version="3.12.11"><filename>evolution-help-3.12.11-22.el7.noarch.rpm</filename><sum type="sha256">54fa167579725ff27c1547a0f0d4ffd1d0f2b045a1649b086278f1f679259198</sum></package><package arch="x86_64" name="evolution-spamassassin" release="22.el7" src="evolution-3.12.11-22.el7.src.rpm" version="3.12.11"><filename>evolution-spamassassin-3.12.11-22.el7.x86_64.rpm</filename><sum type="sha256">0db7ba1164990aeb1b0b855404435f00856f9f518944d12d98a43b66738a9dd3</sum></package><package arch="i686" name="evolution-devel" release="22.el7" src="evolution-3.12.11-22.el7.src.rpm" version="3.12.11"><filename>evolution-devel-3.12.11-22.el7.i686.rpm</filename><sum type="sha256">ba832f399ef47f8a8ba348f1d2b5d36224533f91ccc7604cbbc56fa2f9f0987f</sum></package><package arch="x86_64" name="evolution-pst" release="22.el7" src="evolution-3.12.11-22.el7.src.rpm" version="3.12.11"><filename>evolution-pst-3.12.11-22.el7.x86_64.rpm</filename><sum type="sha256">52df1a8cb221b7b60e17b8d65235eb6ad84769a69217984b160593e663e99b8d</sum></package><package arch="x86_64" name="evolution-devel" release="22.el7" src="evolution-3.12.11-22.el7.src.rpm" version="3.12.11"><filename>evolution-devel-3.12.11-22.el7.x86_64.rpm</filename><sum type="sha256">e5d9b5f2a5794748c83b86cd17711cbf8d6ada0d78d3ebfcde555f45726c1ed1</sum></package><package arch="x86_64" name="evolution-bogofilter" release="22.el7" src="evolution-3.12.11-22.el7.src.rpm" version="3.12.11"><filename>evolution-bogofilter-3.12.11-22.el7.x86_64.rpm</filename><sum type="sha256">4c01641e17590e8b975222c01b69b2bef21e22b5a5c4df53572e07702b86a81a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2228" id="RHBA-2016:2228-1" title="Rhba-2016:2228-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2236-1</id><title>Kde-Workspace Bug Fix And Enhancement Update</title><description>The kde-workspace packages consist of components providing the KDE graphical desktop environment.</description><release>Scientific Linux</release><issued date="2017-01-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="oxygen-gtk3" release="5.el7" src="oxygen-gtk3-1.1.4-5.el7.src.rpm" version="1.1.4"><filename>oxygen-gtk3-1.1.4-5.el7.x86_64.rpm</filename><sum type="sha256">5fda8f59fbfe720f56cc500a86d605d6bcdb44ec40b45bb2f705a0176bfaedf1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2236" id="RHBA-2016:2236-1" title="Rhba-2016:2236-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2254-1</id><title>Nfs4-Acl-Tools Bug Fix Update</title><description>The nfs4-acl-tools packages provide utilities for managing NFSv4 Access Control Lists (ACLs) on files and directories mounted on ACL-enabled NFSv4 file systems.</description><release>Scientific Linux</release><issued date="2017-01-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nfs4-acl-tools" release="15.el7" src="nfs4-acl-tools-0.3.3-15.el7.src.rpm" version="0.3.3"><filename>nfs4-acl-tools-0.3.3-15.el7.x86_64.rpm</filename><sum type="sha256">873ab34748f50532e49e474fe57593773bf9af10cb3506a0997e0286be69031a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2254" id="RHBA-2016:2254-1" title="Rhba-2016:2254-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2257-1</id><title>Glib2 Bug Fix And Enhancement Update</title><description>GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="glib2-devel" release="4.el7" src="glib2-2.46.2-4.el7.src.rpm" version="2.46.2"><filename>glib2-devel-2.46.2-4.el7.i686.rpm</filename><sum type="sha256">e80b740d698ef6db13548556c4b44b4b326709be63f65daf4bad8e372a70a15d</sum></package><package arch="x86_64" name="glib2" release="4.el7" src="glib2-2.46.2-4.el7.src.rpm" version="2.46.2"><filename>glib2-2.46.2-4.el7.x86_64.rpm</filename><sum type="sha256">f045b9c592e766043ca89027216df0d2620a997da7ec5c3b2dfced3bde39d62e</sum></package><package arch="x86_64" name="glib2-devel" release="4.el7" src="glib2-2.46.2-4.el7.src.rpm" version="2.46.2"><filename>glib2-devel-2.46.2-4.el7.x86_64.rpm</filename><sum type="sha256">926e8081976210b6eec6abcf1ff597aba9548a18368e9b3a7ab11353ae30f474</sum></package><package arch="x86_64" name="glib2-fam" release="4.el7" src="glib2-2.46.2-4.el7.src.rpm" version="2.46.2"><filename>glib2-fam-2.46.2-4.el7.x86_64.rpm</filename><sum type="sha256">c47328893426b289970036cea24e954ceb8199f478ae96f897be07b08f2ef7c5</sum></package><package arch="i686" name="glib2" release="4.el7" src="glib2-2.46.2-4.el7.src.rpm" version="2.46.2"><filename>glib2-2.46.2-4.el7.i686.rpm</filename><sum type="sha256">1a09e04824ebcb1c731ca13bc9f4db259f817d282e7507edfb2dfdb31d135b76</sum></package><package arch="noarch" name="glib2-doc" release="4.el7" src="glib2-2.46.2-4.el7.src.rpm" version="2.46.2"><filename>glib2-doc-2.46.2-4.el7.noarch.rpm</filename><sum type="sha256">b19563fe5c8a32ffd36cdbb19ab67d92a73c30021a270a77958ada2a1c86588d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2257" id="RHBA-2016:2257-1" title="Rhba-2016:2257-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2267-1</id><title>New Packages: Python-Netifaces</title><description>The python-netifaces Python module makes it possible to read information about the system network interfaces from the operating system.

This update adds the python-netifaces packages to Scientific Linux 7.</description><release>Scientific Linux</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-netifaces" release="3.el7" src="python-netifaces-0.10.4-3.el7.src.rpm" version="0.10.4"><filename>python-netifaces-0.10.4-3.el7.x86_64.rpm</filename><sum type="sha256">5ba9903f3c179df166941e5da4a148338397425eb28a96d43c941c3fd91df257</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2267" id="RHBA-2016:2267-1" title="Rhba-2016:2267-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2276-1</id><title>Libselinux Bug Fix And Enhancement Update</title><description>The libselinux packages contain the core library of an SELinux system. The libselinux library provides an API for SELinux applications to get and set process and file security contexts, and to obtain security policy decisions. It is required for any applications that use the SELinux API, and is used by all applications that are SELinux-aware.</description><release>Scientific Linux</release><issued date="2016-11-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libselinux-ruby" release="6.el7" src="libselinux-2.5-6.el7.src.rpm" version="2.5"><filename>libselinux-ruby-2.5-6.el7.x86_64.rpm</filename><sum type="sha256">2c68f79c1319e83490d1ba5aa82c7470b885e01ef421dc70bfe3d94392dc5052</sum></package><package arch="x86_64" name="libselinux-devel" release="6.el7" src="libselinux-2.5-6.el7.src.rpm" version="2.5"><filename>libselinux-devel-2.5-6.el7.x86_64.rpm</filename><sum type="sha256">83f2c461c8366e5a0f0850625231da4aaed1bb07b307092b0d19c0d909473927</sum></package><package arch="x86_64" name="libselinux" release="6.el7" src="libselinux-2.5-6.el7.src.rpm" version="2.5"><filename>libselinux-2.5-6.el7.x86_64.rpm</filename><sum type="sha256">ec512c3d9b7e69d6d749c4446c4296acba5a7bed641b58e4e55c95d8b08b3161</sum></package><package arch="x86_64" name="libselinux-static" release="6.el7" src="libselinux-2.5-6.el7.src.rpm" version="2.5"><filename>libselinux-static-2.5-6.el7.x86_64.rpm</filename><sum type="sha256">5e7b1e83980cc9fa1bf4248ce6e4064357b936f4138ddc08891670cb5c80eb21</sum></package><package arch="i686" name="libselinux-static" release="6.el7" src="libselinux-2.5-6.el7.src.rpm" version="2.5"><filename>libselinux-static-2.5-6.el7.i686.rpm</filename><sum type="sha256">4eb73c009497588dd91599268aa23179c95e46b77945cf44a334deeace289810</sum></package><package arch="x86_64" name="libselinux-utils" release="6.el7" src="libselinux-2.5-6.el7.src.rpm" version="2.5"><filename>libselinux-utils-2.5-6.el7.x86_64.rpm</filename><sum type="sha256">367c14c9bfe4bd64445329a10237e1793dba9af297c5bebf809513e7f013e77d</sum></package><package arch="i686" name="libselinux-devel" release="6.el7" src="libselinux-2.5-6.el7.src.rpm" version="2.5"><filename>libselinux-devel-2.5-6.el7.i686.rpm</filename><sum type="sha256">5e4a2888ea2d17ab911413ca6f9ea8db2a35892c5aa5ffd54c37439de1171015</sum></package><package arch="i686" name="libselinux" release="6.el7" src="libselinux-2.5-6.el7.src.rpm" version="2.5"><filename>libselinux-2.5-6.el7.i686.rpm</filename><sum type="sha256">47387838549832b5da61db2c93f7efab391aa2fee03264e200566b7ac82b8efb</sum></package><package arch="x86_64" name="libselinux-python" release="6.el7" src="libselinux-2.5-6.el7.src.rpm" version="2.5"><filename>libselinux-python-2.5-6.el7.x86_64.rpm</filename><sum type="sha256">2b1ed48d28ec8ada63f23a2b62583bcfa264a39e1144ce40d0009a526fe083f5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2276" id="RHBA-2016:2276-1" title="Rhba-2016:2276-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2285-1</id><title>Svrcore Bug Fix Update</title><description>The svrcore packages contain an API library which provides various methods of handling and managing secure Personal Identification Number (PIN) storage. The svrcore library uses the Mozilla NSS cryptographic library. An example of an application which would use svrcore is one that must be restarted without user intervention, but which requires a PIN to unlock a private key and other cryptographic objects.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="svrcore" release="1.el7" src="svrcore-4.1.2-1.el7.src.rpm" version="4.1.2"><filename>svrcore-4.1.2-1.el7.i686.rpm</filename><sum type="sha256">e4cddad43852e19d722e03251c2689333d993a59cd94cdd82ccf203482a1f63d</sum></package><package arch="x86_64" name="svrcore" release="1.el7" src="svrcore-4.1.2-1.el7.src.rpm" version="4.1.2"><filename>svrcore-4.1.2-1.el7.x86_64.rpm</filename><sum type="sha256">262ce0bdb496159c53295ebfec7f00d5d68bb9aa838e5146905353115ce5ae87</sum></package><package arch="x86_64" name="svrcore-devel" release="1.el7" src="svrcore-4.1.2-1.el7.src.rpm" version="4.1.2"><filename>svrcore-devel-4.1.2-1.el7.x86_64.rpm</filename><sum type="sha256">7de55e2e77ce811c9024ceb3cf31232471aa5004ab2d7739dc76c160c89bb644</sum></package><package arch="i686" name="svrcore-devel" release="1.el7" src="svrcore-4.1.2-1.el7.src.rpm" version="4.1.2"><filename>svrcore-devel-4.1.2-1.el7.i686.rpm</filename><sum type="sha256">3e329f29a0633de53c9e38d12b58fd0e2c4b7d1db9d060332034dbc630aefab9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2285" id="RHBA-2016:2285-1" title="Rhba-2016:2285-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2290-1</id><title>New Packages: Python-Ipaddress</title><description>The python-ipaddress packages include the functions and classes for handling various tasks related to IP addresses, including checking whether or not two hosts are on the same subnet, iterating over all hosts in a particular subnet, checking whether or not a string represents a valid IP address or network definition, and so on.

This update adds the python-ipaddress packages to Scientific Linux 7.</description><release>Scientific Linux</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-ipaddress" release="2.el7" src="python-ipaddress-1.0.16-2.el7.src.rpm" version="1.0.16"><filename>python-ipaddress-1.0.16-2.el7.noarch.rpm</filename><sum type="sha256">e1bf5aec44bf5f70d5ccd40504491a04ad7883324cdac2e296977a826c2c6e6f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2290" id="RHBA-2016:2290-1" title="Rhba-2016:2290-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2331-1</id><title>Initial-Setup Bug Fix Update</title><description>The initial-setup utility runs after installation. It guides the user through a series of steps that allows for easier configuration of the machine.</description><release>Scientific Linux</release><issued date="2017-01-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="initial-setup" release="1.el7" src="initial-setup-0.3.9.36-1.el7.src.rpm" version="0.3.9.36"><filename>initial-setup-0.3.9.36-1.el7.x86_64.rpm</filename><sum type="sha256">ba52b417f9824868d2eb573938e8c00207acae3578762fb36ca0d042b6147fdc</sum></package><package arch="x86_64" name="initial-setup-gui" release="1.el7" src="initial-setup-0.3.9.36-1.el7.src.rpm" version="0.3.9.36"><filename>initial-setup-gui-0.3.9.36-1.el7.x86_64.rpm</filename><sum type="sha256">f48113ba012a09006e7008db222be6c92ffbd86e28231c887a628bebf2a14924</sum></package><package arch="noarch" name="yum-conf-sl7x" release="4.sl7" src="sl-release-7.2-4.sl7.src.rpm" version="7.2"><filename>yum-conf-sl7x-7.2-4.sl7.noarch.rpm</filename><sum type="sha256">ffcd33e62daf459202650e8a3f73c54725f1baa31b409993bbf504b664d69a38</sum></package><package arch="x86_64" name="sl-release" release="4.sl7" src="sl-release-7.2-4.sl7.src.rpm" version="7.2"><filename>sl-release-7.2-4.sl7.x86_64.rpm</filename><sum type="sha256">ca2a67a14217fac1295ce480114e539cf5d8842079fa7ab1a57819f60a937071</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2331" id="RHBA-2016:2331-1" title="Rhba-2016:2331-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2356-1</id><title>Sanlock Bug Fix And Enhancement Update</title><description>The sanlock packages provide a shared storage lock manager. Hosts with shared access to a block device or a file can use sanlock to synchronize their activities. VDSM and libvirt use sanlock to synchronize access to shared devices or files.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="sanlock-python" release="1.el7" src="sanlock-3.4.0-1.el7.src.rpm" version="3.4.0"><filename>sanlock-python-3.4.0-1.el7.x86_64.rpm</filename><sum type="sha256">66d1496f9f857fc1cefeefc0342b9fa8836c07d8e7a7fc3151e2c0d6896d2a88</sum></package><package arch="x86_64" name="sanlock" release="1.el7" src="sanlock-3.4.0-1.el7.src.rpm" version="3.4.0"><filename>sanlock-3.4.0-1.el7.x86_64.rpm</filename><sum type="sha256">44f5ff7a64ff251d97b821dbfc672fa29c73b69cb9c3966392e3ec4cf3c5cd78</sum></package><package arch="x86_64" name="fence-sanlock" release="1.el7" src="sanlock-3.4.0-1.el7.src.rpm" version="3.4.0"><filename>fence-sanlock-3.4.0-1.el7.x86_64.rpm</filename><sum type="sha256">211f5f9904a76c43622429a7683f157367b8fa6230e07b6194f5a6ab5c03edda</sum></package><package arch="x86_64" name="sanlock-devel" release="1.el7" src="sanlock-3.4.0-1.el7.src.rpm" version="3.4.0"><filename>sanlock-devel-3.4.0-1.el7.x86_64.rpm</filename><sum type="sha256">e092a782e223b50cd176635a499e9478c9e0594bedbe55cead0d7f46608b4375</sum></package><package arch="x86_64" name="sanlock-lib" release="1.el7" src="sanlock-3.4.0-1.el7.src.rpm" version="3.4.0"><filename>sanlock-lib-3.4.0-1.el7.x86_64.rpm</filename><sum type="sha256">534de73e1e1c9df591297a3200bea7adcfc1625f5da8c7ee231bc3af5586df9a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2356" id="RHBA-2016:2356-1" title="Rhba-2016:2356-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2374-1</id><title>Anaconda-User-Help Bug Fix Update</title><description>The anaconda-user-help package provides content for the Anaconda built-in help system.</description><release>Scientific Linux</release><issued date="2017-01-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="anaconda-user-help" release="1.el7" src="anaconda-user-help-7.3.2-1.el7.src.rpm" version="7.3.2"><filename>anaconda-user-help-7.3.2-1.el7.noarch.rpm</filename><sum type="sha256">2dda8476a241d212a520fb5445ddf2a13423c91b295876003af90a1899ca6e23</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2374" id="RHBA-2016:2374-1" title="Rhba-2016:2374-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2396-1</id><title>Pki-Core Bug Fix And Enhancement Update</title><description>The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.</description><release>Scientific Linux</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="pki-javadoc" release="10.el7" src="pki-core-10.3.3-10.el7.src.rpm" version="10.3.3"><filename>pki-javadoc-10.3.3-10.el7.noarch.rpm</filename><sum type="sha256">5c07eff93f2b050490390321850b2b6dcadf3b96c6901544bfb19117d3d0dcd8</sum></package><package arch="noarch" name="pki-base-java" release="10.el7" src="pki-core-10.3.3-10.el7.src.rpm" version="10.3.3"><filename>pki-base-java-10.3.3-10.el7.noarch.rpm</filename><sum type="sha256">8cb95cfd53d8e2e2176d65c3a815d2cad447fb27e3e0f2a02aeb6984c9fc09eb</sum></package><package arch="noarch" name="pki-ca" release="10.el7" src="pki-core-10.3.3-10.el7.src.rpm" version="10.3.3"><filename>pki-ca-10.3.3-10.el7.noarch.rpm</filename><sum type="sha256">be4917ccde3e39b8be312454af1acaf9d5e08e21bb8d8cd69b0d2aaa8a889db6</sum></package><package arch="x86_64" name="pki-tools" release="10.el7" src="pki-core-10.3.3-10.el7.src.rpm" version="10.3.3"><filename>pki-tools-10.3.3-10.el7.x86_64.rpm</filename><sum type="sha256">1298b1a831d720c28af14c191b3c4c177649191165ab2c56939b26114cd01468</sum></package><package arch="noarch" name="pki-base" release="10.el7" src="pki-core-10.3.3-10.el7.src.rpm" version="10.3.3"><filename>pki-base-10.3.3-10.el7.noarch.rpm</filename><sum type="sha256">2eb37c66259d8b1143783cdcc6c742869565bf4990a7688735f67cb0332dcb84</sum></package><package arch="x86_64" name="pki-symkey" release="10.el7" src="pki-core-10.3.3-10.el7.src.rpm" version="10.3.3"><filename>pki-symkey-10.3.3-10.el7.x86_64.rpm</filename><sum type="sha256">03acbe9ee068d220247db0ba3adc5bda8e9a9a486945178dc273f2ea55c9d469</sum></package><package arch="noarch" name="pki-server" release="10.el7" src="pki-core-10.3.3-10.el7.src.rpm" version="10.3.3"><filename>pki-server-10.3.3-10.el7.noarch.rpm</filename><sum type="sha256">6aee2c92ab30bcdf9a0763634711d05c4e26e60ffaa406b1542172a4cbdc09a2</sum></package><package arch="noarch" name="pki-kra" release="10.el7" src="pki-core-10.3.3-10.el7.src.rpm" version="10.3.3"><filename>pki-kra-10.3.3-10.el7.noarch.rpm</filename><sum type="sha256">9e282208b50bd1030c5bb4db05a27416f672a518786b410e7aa46ad5ca91e994</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2396" id="RHBA-2016:2396-1" title="Rhba-2016:2396-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2397-1</id><title>Yum Bug Fix And Enhancement Update</title><description>Yum is a command-line utility that allows the user to check for updates and automatically download and install updated RPM packages. Yum automatically obtains and downloads dependencies, prompting the user for permission as necessary.</description><release>Scientific Linux</release><issued date="2017-01-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="yum-cron" release="150.el7" src="yum-3.4.3-150.el7.src.rpm" version="3.4.3"><filename>yum-cron-3.4.3-150.el7.noarch.rpm</filename><sum type="sha256">14e9c1d8a1a7609166f3ee4e7215e86b92c4e60a9d102a8575b937b724e84184</sum></package><package arch="noarch" name="yum" release="150.el7" src="yum-3.4.3-150.el7.src.rpm" version="3.4.3"><filename>yum-3.4.3-150.el7.noarch.rpm</filename><sum type="sha256">e7f4e406da798fb9a2a31de451d9de91f3601f913db774270255a0b1e4952d7e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2397" id="RHBA-2016:2397-1" title="Rhba-2016:2397-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2403-1</id><title>Jss Bug Fix Update</title><description>Java Security Services (JSS) provides an interface between Java Virtual Machine and Network Security Services (NSS). It supports most of the security standards and encryption technologies supported by NSS including communication through SSL/TLS network protocols. JSS is primarily utilized by the Certificate Server as a part of the Identity Management System.</description><release>Scientific Linux</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="jss" release="42.el7" src="jss-4.2.6-42.el7.src.rpm" version="4.2.6"><filename>jss-4.2.6-42.el7.x86_64.rpm</filename><sum type="sha256">6f205c923cbc505f5aeeaa8aa8c1f26a64f745a0bdd4fd0488ac9a94fb81cb54</sum></package><package arch="x86_64" name="jss-javadoc" release="42.el7" src="jss-4.2.6-42.el7.src.rpm" version="4.2.6"><filename>jss-javadoc-4.2.6-42.el7.x86_64.rpm</filename><sum type="sha256">45417eec19adda269a27e3a4a9ba3b502c937e0d1c270cf0da338939b7eca9e2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2403" id="RHBA-2016:2403-1" title="Rhba-2016:2403-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2404-1</id><title>Ipa Bug Fix And Enhancement Update</title><description>IPA (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.</description><release>Scientific Linux</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="mod_auth_gssapi" release="1.el7" src="mod_auth_gssapi-1.4.0-1.el7.src.rpm" version="1.4.0"><filename>mod_auth_gssapi-1.4.0-1.el7.x86_64.rpm</filename><sum type="sha256">73fcd7b22f68c77bab05f1e76a2e796a86ebbed868fe086ca38cd6cdd08508cd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2404" id="RHBA-2016:2404-1" title="Rhba-2016:2404-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2426-1</id><title>Lcms2 Bug Fix Update</title><description>The lcms2 packages contain LittleCMS, a small-footprint, speed optimized color management engine in open source form.</description><release>Scientific Linux</release><issued date="2017-01-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="lcms2" release="3.el7" src="lcms2-2.6-3.el7.src.rpm" version="2.6"><filename>lcms2-2.6-3.el7.x86_64.rpm</filename><sum type="sha256">340f91668751a594371d563d2df974528fa10371d51a44edb50904cb0822170e</sum></package><package arch="x86_64" name="lcms2-utils" release="3.el7" src="lcms2-2.6-3.el7.src.rpm" version="2.6"><filename>lcms2-utils-2.6-3.el7.x86_64.rpm</filename><sum type="sha256">6ad63f9ea6522fd59e960e9b47c2cdd1158fd678c49823f93f7a54b691b8043f</sum></package><package arch="x86_64" name="lcms2-devel" release="3.el7" src="lcms2-2.6-3.el7.src.rpm" version="2.6"><filename>lcms2-devel-2.6-3.el7.x86_64.rpm</filename><sum type="sha256">ef98561c4e4f0f8709b2df7fe9e9b674efc1fa21ddec5d98c81902a28aa00b8e</sum></package><package arch="i686" name="lcms2" release="3.el7" src="lcms2-2.6-3.el7.src.rpm" version="2.6"><filename>lcms2-2.6-3.el7.i686.rpm</filename><sum type="sha256">65c5b84e620f64e5d8a1a29948e3c8100d9efe398c46c3ac625f43c9409c83c5</sum></package><package arch="i686" name="lcms2-devel" release="3.el7" src="lcms2-2.6-3.el7.src.rpm" version="2.6"><filename>lcms2-devel-2.6-3.el7.i686.rpm</filename><sum type="sha256">ed31f61d11c4b68f01008cb6aa62b7d99ba9f427f135a79c8ac1ac2b73390e90</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2426" id="RHBA-2016:2426-1" title="Rhba-2016:2426-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2431-1</id><title>Xfsprogs Bug Fix And Enhancement Update</title><description>The xfsprogs packages contain a set of commands to use the XFS file system, including the mkfs.xfs command to construct an XFS system.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xfsprogs-devel" release="8.el7" src="xfsprogs-4.5.0-8.el7.src.rpm" version="4.5.0"><filename>xfsprogs-devel-4.5.0-8.el7.x86_64.rpm</filename><sum type="sha256">78784cae9da81ee9d1966d1e862fe6c4b93617f85385fbb0dfb8a2318528164e</sum></package><package arch="x86_64" name="xfsprogs" release="8.el7" src="xfsprogs-4.5.0-8.el7.src.rpm" version="4.5.0"><filename>xfsprogs-4.5.0-8.el7.x86_64.rpm</filename><sum type="sha256">c697a97af07d0c8c43b0fece4fb4e72627bddd3de37f9535e08f6129b0cc088c</sum></package><package arch="i686" name="xfsprogs" release="8.el7" src="xfsprogs-4.5.0-8.el7.src.rpm" version="4.5.0"><filename>xfsprogs-4.5.0-8.el7.i686.rpm</filename><sum type="sha256">0903578bfb3e7809dc59bbd7858f59ef42d89f43ce8dcd73497fc156a34e9b17</sum></package><package arch="i686" name="xfsprogs-devel" release="8.el7" src="xfsprogs-4.5.0-8.el7.src.rpm" version="4.5.0"><filename>xfsprogs-devel-4.5.0-8.el7.i686.rpm</filename><sum type="sha256">e90266cbcbb6619375a73854c4190936097ce8b569e6fed09ef41c0df7fceee1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2431" id="RHBA-2016:2431-1" title="Rhba-2016:2431-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2443-1</id><title>Libusbx Bug Fix And Enhancement Update</title><description>The libusbx packages provide a way for applications to access USB devices. The libusbx package is a fork of the original libusb and is not compatible with the original libusb-0.1 series.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libusbx" release="1.el7" src="libusbx-1.0.20-1.el7.src.rpm" version="1.0.20"><filename>libusbx-1.0.20-1.el7.x86_64.rpm</filename><sum type="sha256">07047c04474b8c67b5e5c1312fb5b09465905c34893c79ca4d3701900ccfad05</sum></package><package arch="i686" name="libusbx-devel" release="1.el7" src="libusbx-1.0.20-1.el7.src.rpm" version="1.0.20"><filename>libusbx-devel-1.0.20-1.el7.i686.rpm</filename><sum type="sha256">d36fa94b14ade674a5acc4921f161c52d2a5aeca56581d3c9d9a9797b15bdd95</sum></package><package arch="i686" name="libusbx" release="1.el7" src="libusbx-1.0.20-1.el7.src.rpm" version="1.0.20"><filename>libusbx-1.0.20-1.el7.i686.rpm</filename><sum type="sha256">e169605eb4c23495398dad95a79f74a2c25d3184e0bf97fd0b3b4eeb55dadc5c</sum></package><package arch="x86_64" name="libusbx-devel" release="1.el7" src="libusbx-1.0.20-1.el7.src.rpm" version="1.0.20"><filename>libusbx-devel-1.0.20-1.el7.x86_64.rpm</filename><sum type="sha256">66cdd40d3f6b742e3d36f0d0d8be6bb330a3d0343a079e3b03170874f3e9ec10</sum></package><package arch="noarch" name="libusbx-devel-doc" release="1.el7" src="libusbx-1.0.20-1.el7.src.rpm" version="1.0.20"><filename>libusbx-devel-doc-1.0.20-1.el7.noarch.rpm</filename><sum type="sha256">c97f9ef907610f2e0f1e83aa6df36294f13995261aa4e7ae6430e01425995538</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2443" id="RHBA-2016:2443-1" title="Rhba-2016:2443-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2446-1</id><title>Tomcatjss Bug Fix Update</title><description>The tomcatjss package provides a Java Secure Socket Extension (JSSE) implementation using Java Security Services (JSS) for Tomcat, an open source web server and Java servlet container.</description><release>Scientific Linux</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcatjss" release="3.el7" src="tomcatjss-7.1.2-3.el7.src.rpm" version="7.1.2"><filename>tomcatjss-7.1.2-3.el7.noarch.rpm</filename><sum type="sha256">87991ab37ca20ddb66986fbe825b4215db12a28c1abf9f573650f6f40ac50ecf</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2446" id="RHBA-2016:2446-1" title="Rhba-2016:2446-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2460-1</id><title>Lasso Bug Fix Update</title><description>The lasso packages provide the Lasso library that implements the Liberty Alliance Single Sign-On standards, including the SAML and SAML2 specifications. It allows handling of the whole life-cycle of SAML-based federations and provides bindings for multiple languages.</description><release>Scientific Linux</release><issued date="2017-01-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="lasso" release="2.el7" src="lasso-2.5.1-2.el7.src.rpm" version="2.5.1"><filename>lasso-2.5.1-2.el7.i686.rpm</filename><sum type="sha256">1f0c44e5a5d7a1799d868e0c6dd3a0d3579ba202a8e348ef0a0a7abcb90f375c</sum></package><package arch="x86_64" name="lasso-python" release="2.el7" src="lasso-2.5.1-2.el7.src.rpm" version="2.5.1"><filename>lasso-python-2.5.1-2.el7.x86_64.rpm</filename><sum type="sha256">08165d4041742affb6daec0c48bccfa2b0fb0c7791bf86394a745e0605ee05a3</sum></package><package arch="x86_64" name="lasso" release="2.el7" src="lasso-2.5.1-2.el7.src.rpm" version="2.5.1"><filename>lasso-2.5.1-2.el7.x86_64.rpm</filename><sum type="sha256">22341161e57e0fcb05f6438fc80156681d17aa44ea39f615b729bf9903918c37</sum></package><package arch="x86_64" name="lasso-devel" release="2.el7" src="lasso-2.5.1-2.el7.src.rpm" version="2.5.1"><filename>lasso-devel-2.5.1-2.el7.x86_64.rpm</filename><sum type="sha256">f5f9fb8a31b828b85f4d4d01874780c5c1f471165c81c5bb256067ceea60f429</sum></package><package arch="i686" name="lasso-devel" release="2.el7" src="lasso-2.5.1-2.el7.src.rpm" version="2.5.1"><filename>lasso-devel-2.5.1-2.el7.i686.rpm</filename><sum type="sha256">4cfe6dbf6f1dbdc881ed4414200c2fadbe988a6ea945d970d6d22b5cdb02293e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2460" id="RHBA-2016:2460-1" title="Rhba-2016:2460-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2467-1</id><title>Chkconfig Bug Fix And Enhancement Update</title><description>The chkconfig utility is a basic system utility that updates and queries runlevel information for system services.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ntsysv" release="1.el7" src="chkconfig-1.7.2-1.el7.src.rpm" version="1.7.2"><filename>ntsysv-1.7.2-1.el7.x86_64.rpm</filename><sum type="sha256">e7cc026bfcffce047e89c77ffc4a49b6b8031127c23cd327429d76e0b5f285af</sum></package><package arch="x86_64" name="chkconfig" release="1.el7" src="chkconfig-1.7.2-1.el7.src.rpm" version="1.7.2"><filename>chkconfig-1.7.2-1.el7.x86_64.rpm</filename><sum type="sha256">6e3dbeee8490d07db447cb2771df74ebbcf3779a1ccde8b780a572f4c3f8dc65</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2467" id="RHBA-2016:2467-1" title="Rhba-2016:2467-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2471-1</id><title>Slapi-Nis Bug Fix And Enhancement Update</title><description>The slapi-nis packages contain the NIS server plug-in and the Schema Compatibility plug-in for use with the 389 Directory Server.</description><release>Scientific Linux</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="slapi-nis" release="4.el7" src="slapi-nis-0.56.0-4.el7.src.rpm" version="0.56.0"><filename>slapi-nis-0.56.0-4.el7.x86_64.rpm</filename><sum type="sha256">76b32b30b9a4b80c206b3143251c962ca45e7c7fa053c995b67edc65e32dbd8c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2471" id="RHBA-2016:2471-1" title="Rhba-2016:2471-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2473-1</id><title>Libtalloc Bug Fix Update</title><description>The libtalloc packages provide a library that implements a hierarchical memory allocator with destructors.</description><release>Scientific Linux</release><issued date="2017-01-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libtalloc" release="1.el7" src="libtalloc-2.1.6-1.el7.src.rpm" version="2.1.6"><filename>libtalloc-2.1.6-1.el7.x86_64.rpm</filename><sum type="sha256">22ffd203b6b035db10fae894462f4047a8e94ea873c7573b073996290497a5ce</sum></package><package arch="i686" name="pytalloc-devel" release="1.el7" src="libtalloc-2.1.6-1.el7.src.rpm" version="2.1.6"><filename>pytalloc-devel-2.1.6-1.el7.i686.rpm</filename><sum type="sha256">ba47ba6e3b55287e3950f53b73587a8736feb4bbe008e5648025f0a72ace663f</sum></package><package arch="x86_64" name="pytalloc" release="1.el7" src="libtalloc-2.1.6-1.el7.src.rpm" version="2.1.6"><filename>pytalloc-2.1.6-1.el7.x86_64.rpm</filename><sum type="sha256">ed65601c587ab383b2f06ad801e762be4d0dc06fc052e119f1fe1e3262dd5dc7</sum></package><package arch="x86_64" name="libtalloc-devel" release="1.el7" src="libtalloc-2.1.6-1.el7.src.rpm" version="2.1.6"><filename>libtalloc-devel-2.1.6-1.el7.x86_64.rpm</filename><sum type="sha256">0a3b80c6ee587f640109492e177d403d0a5d2b466acad0a162c08eff38dd69c9</sum></package><package arch="x86_64" name="pytalloc-devel" release="1.el7" src="libtalloc-2.1.6-1.el7.src.rpm" version="2.1.6"><filename>pytalloc-devel-2.1.6-1.el7.x86_64.rpm</filename><sum type="sha256">6812c3c9a87be233f11a157b376026e3852a947d7170f393a5a1d6e2dd328a92</sum></package><package arch="i686" name="libtalloc-devel" release="1.el7" src="libtalloc-2.1.6-1.el7.src.rpm" version="2.1.6"><filename>libtalloc-devel-2.1.6-1.el7.i686.rpm</filename><sum type="sha256">cba99b821abc38e2e91367d8d4e9ead7a02a84a376bc246ad1f99e471e7ece50</sum></package><package arch="i686" name="libtalloc" release="1.el7" src="libtalloc-2.1.6-1.el7.src.rpm" version="2.1.6"><filename>libtalloc-2.1.6-1.el7.i686.rpm</filename><sum type="sha256">d09093816286c03f89d947969bb3dd82944f68ae1783e69f5b3e8a8160451d93</sum></package><package arch="i686" name="pytalloc" release="1.el7" src="libtalloc-2.1.6-1.el7.src.rpm" version="2.1.6"><filename>pytalloc-2.1.6-1.el7.i686.rpm</filename><sum type="sha256">a7091ad198257f738be99d13fedf60b85e2cc337b74afade03fbe18520cd2451</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2473" id="RHBA-2016:2473-1" title="Rhba-2016:2473-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2526-1</id><title>Clufter Bug Fix And Enhancement Update</title><description>The clufter packages contain a utility for transforming and analyzing cluster configuration formats. Notably, clufter assists with migration from an older stack configuration to a newer one that leverages the Pacemaker cluster resource manager. The packages can be used either as a separate command-line utility or as a Python library.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="clufter-lib-general" release="2.el7" src="clufter-0.59.5-2.el7.src.rpm" version="0.59.5"><filename>clufter-lib-general-0.59.5-2.el7.noarch.rpm</filename><sum type="sha256">6f726576aadbbc458121793f7c87cbcf8b8b90042da06e45f9940ebf3ed030b2</sum></package><package arch="noarch" name="clufter-cli" release="2.el7" src="clufter-0.59.5-2.el7.src.rpm" version="0.59.5"><filename>clufter-cli-0.59.5-2.el7.noarch.rpm</filename><sum type="sha256">ae031e693013f40dab4ea8b865974ccdf8a444aa6d74b0ceaf6ecf713f0fb720</sum></package><package arch="noarch" name="clufter-lib-pcs" release="2.el7" src="clufter-0.59.5-2.el7.src.rpm" version="0.59.5"><filename>clufter-lib-pcs-0.59.5-2.el7.noarch.rpm</filename><sum type="sha256">a1562567aae71b8b34a8d269713f5b141323df3b5c6fc75611ddb6af8111f1e6</sum></package><package arch="x86_64" name="python-clufter" release="2.el7" src="clufter-0.59.5-2.el7.src.rpm" version="0.59.5"><filename>python-clufter-0.59.5-2.el7.x86_64.rpm</filename><sum type="sha256">435b8ba77bda6e98589acabc1500f2cdd5959655294a987b1c5016ae5d168ecd</sum></package><package arch="noarch" name="clufter-lib-ccs" release="2.el7" src="clufter-0.59.5-2.el7.src.rpm" version="0.59.5"><filename>clufter-lib-ccs-0.59.5-2.el7.noarch.rpm</filename><sum type="sha256">1eab156eb7f7ad405f6a97eeea72c738fd9d682849e09ed27ec6034cf7b5dc8a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2526" id="RHBA-2016:2526-1" title="Rhba-2016:2526-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2536-1</id><title>Device-Mapper-Multipath Bug Fix And Enhancement Update</title><description>The device-mapper-multipath packages provide tools that use the device- mapper multipath kernel module to manage multipath devices.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="device-mapper-multipath" release="99.el7" src="device-mapper-multipath-0.4.9-99.el7.src.rpm" version="0.4.9"><filename>device-mapper-multipath-0.4.9-99.el7.x86_64.rpm</filename><sum type="sha256">62201499e71a3e8a1e2adf704c04c937321af5c4b55aff91fd3f244d95aa0cee</sum></package><package arch="i686" name="device-mapper-multipath-libs" release="99.el7" src="device-mapper-multipath-0.4.9-99.el7.src.rpm" version="0.4.9"><filename>device-mapper-multipath-libs-0.4.9-99.el7.i686.rpm</filename><sum type="sha256">4dd49bcd427fca8b606d4155e2ac160f514102348d34d05250bad6d77a81b168</sum></package><package arch="x86_64" name="device-mapper-multipath-sysvinit" release="99.el7" src="device-mapper-multipath-0.4.9-99.el7.src.rpm" version="0.4.9"><filename>device-mapper-multipath-sysvinit-0.4.9-99.el7.x86_64.rpm</filename><sum type="sha256">729da4268371ff27b7561dfa9a4d704ea5ea495898e03416e7b50f7d6d43acab</sum></package><package arch="x86_64" name="kpartx" release="99.el7" src="device-mapper-multipath-0.4.9-99.el7.src.rpm" version="0.4.9"><filename>kpartx-0.4.9-99.el7.x86_64.rpm</filename><sum type="sha256">c89d31793e00b0801c57ad10df8ff39a205006629954df96e475b604b2c449be</sum></package><package arch="x86_64" name="device-mapper-multipath-libs" release="99.el7" src="device-mapper-multipath-0.4.9-99.el7.src.rpm" version="0.4.9"><filename>device-mapper-multipath-libs-0.4.9-99.el7.x86_64.rpm</filename><sum type="sha256">ff77b989aab87f55e5805bdcd0108e58c47a93274cf3e329d019642a7a6e9a12</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2536" id="RHBA-2016:2536-1" title="Rhba-2016:2536-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2611-1</id><title>Selinux-Policy Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, when trying to log into a machine with an Identity Management (IdM) account configured with the SELinux user mapping, and simultaneously running System Security Services Daemon (SSSD) under a user without root permissions, the SELinux denial occurred. With this update, the SELinux policy has been changed and the "sssd_selinux_manager_t" domain is now allowed to manage the dictionaries labeled as "default_context_t".

* In Scientific Linux 7.3, the SELinux user space uses the different location for some files, compared to the previous versions of Scientific Linux 7. Consequently, Red Hat Virtualization Host (RHVH) or Red Hat Atomic Host (RHAH) had non-responsive status, in some cases. The migrate script to perform the change from the old modules store structure to the new one is now provided.

* Previously, the SELinux policy prevented the GlusterFS volumes the GlusterFS volumes configurated for the Remote Direct Memory Access (RDMA) transport from starting. With this update, a patch has been applied that fixes this bug, and the SELinux denial no longer occurs in the described situation.

* Prior to this update, SELinux denied access while creating snapshots and clones in Red Hat Gluster Storage (RHGS). The SELinux policy has been updated, and the Access Vector Cache (AVC) denials no longer occur.</description><release>Scientific Linux</release><issued date="2016-11-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy-targeted" release="102.el7_3.4" src="selinux-policy-3.13.1-102.el7_3.4.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-102.el7_3.4.noarch.rpm</filename><sum type="sha256">6d517e72f8a2e45a54ef48c2f4afedfd8dc5532d777096d001ca15bcafb61f69</sum></package><package arch="noarch" name="selinux-policy-mls" release="102.el7_3.4" src="selinux-policy-3.13.1-102.el7_3.4.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-102.el7_3.4.noarch.rpm</filename><sum type="sha256">da3d11ba1fe6c3782a3f47944d469cf3ba38bb26dc36a9bbfce17cba3debeec5</sum></package><package arch="noarch" name="selinux-policy-minimum" release="102.el7_3.4" src="selinux-policy-3.13.1-102.el7_3.4.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-102.el7_3.4.noarch.rpm</filename><sum type="sha256">a2524d7382580a0db87f1a1d7a2e103bd166bc7ce53ef819abfa44345cb047ee</sum></package><package arch="noarch" name="selinux-policy" release="102.el7_3.4" src="selinux-policy-3.13.1-102.el7_3.4.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-102.el7_3.4.noarch.rpm</filename><sum type="sha256">6c00d5b9a4912a262a05dc538cba51a691d3f41381d45f6818e3ea99f93be023</sum></package><package arch="noarch" name="selinux-policy-sandbox" release="102.el7_3.4" src="selinux-policy-3.13.1-102.el7_3.4.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-102.el7_3.4.noarch.rpm</filename><sum type="sha256">47137e7f158c6b58b91e63a74c0d91e50505fe12d2fd4466d6311999d84efca5</sum></package><package arch="noarch" name="selinux-policy-devel" release="102.el7_3.4" src="selinux-policy-3.13.1-102.el7_3.4.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-102.el7_3.4.noarch.rpm</filename><sum type="sha256">45ae58356c3d251596dd21579af365a33a79463fee46c361460903dcc692fe3c</sum></package><package arch="noarch" name="selinux-policy-doc" release="102.el7_3.4" src="selinux-policy-3.13.1-102.el7_3.4.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-102.el7_3.4.noarch.rpm</filename><sum type="sha256">cc7597d6eb44b076afd25ea8a1d97e02a7c2117a95e8f4d28b4919684c1b5cfa</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2611" id="RHBA-2016:2611-1" title="Rhba-2016:2611-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1380687" id="1380687" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1383450" id="1383450" title="Sebooleans Get Reset On Image Based Systems / Rhvh Status Is Non Responsive In Rhvm Side After Upgrade From Rhvh 4.0_7.2 To 4.0_7.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386620" id="1386620" title="[Rhel7] Selinux Prevents Starting Of Rdma Transport Type Volumes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386621" id="1386621" title="Snapshot : Seeing Avc Denied Messages Generated When Snapshot And Clones Are Created" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2612-1</id><title>Java-1.8.0-Openjdk Bug Fix Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="2.b15.el7_3" src="java-1.8.0-openjdk-1.8.0.111-2.b15.el7_3.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.111-2.b15.el7_3.noarch.rpm</filename><sum type="sha256">df4bfddc55a5fb2ad8eed9bcabb54e30b2e191ad0db8ccb360591c8fbaac1e11</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="2.b15.el7_3" src="java-1.8.0-openjdk-1.8.0.111-2.b15.el7_3.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-headless-1.8.0.111-2.b15.el7_3.x86_64.rpm</filename><sum type="sha256">b4c2583a6c87912cb75d6e150b67ab4e72201690322ac502cedb96c3bc251486</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="2.b15.el7_3" src="java-1.8.0-openjdk-1.8.0.111-2.b15.el7_3.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-devel-1.8.0.111-2.b15.el7_3.x86_64.rpm</filename><sum type="sha256">74e0dc24aa9c2d0fae32659f43f8f8fd2058341a4d1b15764c98cb98205208ea</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="2.b15.el7_3" src="java-1.8.0-openjdk-1.8.0.111-2.b15.el7_3.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.111-2.b15.el7_3.x86_64.rpm</filename><sum type="sha256">6f74f187035e690fb9bae1f64d413ce0e67e44cf223ba011f798dd195e1f20e1</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="2.b15.el7_3" src="java-1.8.0-openjdk-1.8.0.111-2.b15.el7_3.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-demo-1.8.0.111-2.b15.el7_3.x86_64.rpm</filename><sum type="sha256">6ec4e287ece3af56078b1cbefd9ba4bc92caedaeafb74ae0d2c252cfbaa6f439</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="2.b15.el7_3" src="java-1.8.0-openjdk-1.8.0.111-2.b15.el7_3.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.111-2.b15.el7_3.noarch.rpm</filename><sum type="sha256">072c83aeb5f1ee40669bb4ae5bc9ff7ac1c84eee1f042de6260b2f8548ba969a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="2.b15.el7_3" src="java-1.8.0-openjdk-1.8.0.111-2.b15.el7_3.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-1.8.0.111-2.b15.el7_3.x86_64.rpm</filename><sum type="sha256">336a1d084af893c25f596d250456cd17f5c5975c6ab4f863358a16b348d4b90a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="2.b15.el7_3" src="java-1.8.0-openjdk-1.8.0.111-2.b15.el7_3.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.111-2.b15.el7_3.x86_64.rpm</filename><sum type="sha256">3294fc068436d958e81562ee5dd9a1ef06cc9e174292a47680777e9ff0ef5726</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="2.b15.el7_3" src="java-1.8.0-openjdk-1.8.0.111-2.b15.el7_3.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-src-debug-1.8.0.111-2.b15.el7_3.x86_64.rpm</filename><sum type="sha256">d7ed4c099477284bf39197fff3a55cc3175ea66386a190edb0d9996bb8bace67</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="2.b15.el7_3" src="java-1.8.0-openjdk-1.8.0.111-2.b15.el7_3.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.111-2.b15.el7_3.x86_64.rpm</filename><sum type="sha256">56ae1a6fdd0603cefed309c49dc7cc11a29635289a57ce80cf02a6f8993f60a9</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="2.b15.el7_3" src="java-1.8.0-openjdk-1.8.0.111-2.b15.el7_3.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-javadoc-1.8.0.111-2.b15.el7_3.noarch.rpm</filename><sum type="sha256">b371ac8875d5bce00f7ff06cb18afc68f8d9d088dac8e4599d058ad6a0d06623</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="2.b15.el7_3" src="java-1.8.0-openjdk-1.8.0.111-2.b15.el7_3.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-src-1.8.0.111-2.b15.el7_3.x86_64.rpm</filename><sum type="sha256">a32aa993948cc2c911d5a33a9bd46e53477505014baf6b8109173b982957b7e2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="2.b15.el7_3" src="java-1.8.0-openjdk-1.8.0.111-2.b15.el7_3.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.111-2.b15.el7_3.x86_64.rpm</filename><sum type="sha256">e360ae24c19bdfd8336534faa82c5ab352967df202e32d57b8c3633b9d817283</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="2.b15.el7_3" src="java-1.8.0-openjdk-1.8.0.111-2.b15.el7_3.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.111-2.b15.el7_3.noarch.rpm</filename><sum type="sha256">95907415d17fb0471a3179054d7a043e18c8c025596eb935bb473e8968b2bdbe</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="2.b15.el7_3" src="java-1.8.0-openjdk-1.8.0.111-2.b15.el7_3.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-accessibility-1.8.0.111-2.b15.el7_3.x86_64.rpm</filename><sum type="sha256">2215929f70fa929c5b6a39b60b9f401fb0fd1c3eff0133b0ce3bd7f83004801c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="2.b15.el7_3" src="java-1.8.0-openjdk-1.8.0.111-2.b15.el7_3.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-debug-1.8.0.111-2.b15.el7_3.x86_64.rpm</filename><sum type="sha256">3735833018ad460158362388ee04604489c6c01ac6fec14a523128a7d5fc3117</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2612" id="RHBA-2016:2612-1" title="Rhba-2016:2612-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2660-1</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages have been updated as follows:

* A new time zone Asia/Famagusta has been created, which is a UTC+03 year round time zone. As of 2016-10-30, Cyprus split into two time zones. Northern Cyprus is now in the Asia/Famagusta time zone.

* The Pacific/Tongatapu time zone will reintroduce Daylight Saving Time (DST) on 2016-11-06.

* The Antarctica/Casey time zone has changed from UTC+08 to UTC+11 on 2016-10-22.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2016i-1.el7.src.rpm" version="2016i"><filename>tzdata-2016i-1.el7.noarch.rpm</filename><sum type="sha256">2dc733d7995475afc9e73e924a9698ba5910aca9493051dc9858d14f0658ca35</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2016i-1.el7.src.rpm" version="2016i"><filename>tzdata-java-2016i-1.el7.noarch.rpm</filename><sum type="sha256">c2892bb6fef9b809a56a6a9248533bc2fc6125f0cff64407153e4f2c48f7e8cf</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2660" id="RHBA-2016:2660-1" title="Rhba-2016:2660-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391304" id="1391304" title="Tzdata-2016I Is Available" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391306" id="1391306" title="Tzdata-2016I Is Available" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391483" id="1391483" title="Tzdata-2016I Is Available" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391486" id="1391486" title="Tzdata-2016I Is Available" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2016:2879-1</id><title>389-Ds-Base Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, Identity Management closed the replication connection in the following scenario: The supplier has the "389-ds-base 1.2.11" package installed on Scientific Linux 6 and the consumer runs the 1.3.4 version or newer. Additionally, the supplier sends a custom schema to the consumer, that is a subset of the custom schema of the consumer. If all conditions met, the schema replication failed and as a consequence, no data is replicated. To fix the problem, the schema replication failure event has been changed from "FATAL" to "NOT FATAL". As a result, a failed schema replication process no longer interrupts the data replication.

* The Directory Server setup script uses the "host" utility to look up host names and IP addresses. As a consequence, on systems that do not have the bind-utils package installed, the setup script fails. To fix the problem, bind-utils has been added as a dependency to the 389-ds-base package. As a result, the Directory Server setup script no longer fails because of a missing dependency.

* When FIPS mode is enabled in the network security services (NSS) database, the token name changes. This prevents the server from reverse decoding the replication manager's password. Consequently, replication sessions using SSL or TLS to a replica server fail. This patch prepares Directory Manager to fix the problem. However, the bug in the nss package will be fixed in a future update of NSS.

* Previously, when "acctPolicySubentry" was not set in the "specattrname" parameter of the account policy plug-in, incorrect base distinguished name (DN) was used. As a consequence, the "ns-accountstatus.pl" script incorrectly showed the wrong status for accounts inactivated by inactivity. To fix the problem, the script now uses the existing config entry to obtain the inactivity limit if no "acctPolicySubentry" is set. As a result, the script now shows the correct status.

* Previously, when the "Trace function calls" option was enabled in the "nsslapd-errorlog-level" parameter, all attributes were logged into the Directory Server's error log file including attributes containing sensitive information. A patch has been applied to filter out values of sensitive attributes. As a result, sensitive information are no longer written to the log files.

After installing this update, the 389 server service will be restarted automatically.</description><release>Scientific Linux</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-devel" release="12.el7_3" src="389-ds-base-1.3.5.10-12.el7_3.src.rpm" version="1.3.5.10"><filename>389-ds-base-devel-1.3.5.10-12.el7_3.x86_64.rpm</filename><sum type="sha256">c8d38beb035ed518b7ad67b71320095daf8533acc8144f73496d02971c95e59f</sum></package><package arch="x86_64" name="389-ds-base-libs" release="12.el7_3" src="389-ds-base-1.3.5.10-12.el7_3.src.rpm" version="1.3.5.10"><filename>389-ds-base-libs-1.3.5.10-12.el7_3.x86_64.rpm</filename><sum type="sha256">fbf210dcaa96e328cba63164cca2202ac3db2a93dc6b8f5c0d8186ef85f903ef</sum></package><package arch="x86_64" name="389-ds-base" release="12.el7_3" src="389-ds-base-1.3.5.10-12.el7_3.src.rpm" version="1.3.5.10"><filename>389-ds-base-1.3.5.10-12.el7_3.x86_64.rpm</filename><sum type="sha256">4f4ac4c395ad95ca5d6b35930eb700e2206daa2a895c36e50e6ba4ea62fac4dc</sum></package><package arch="x86_64" name="389-ds-base-snmp" release="12.el7_3" src="389-ds-base-1.3.5.10-12.el7_3.src.rpm" version="1.3.5.10"><filename>389-ds-base-snmp-1.3.5.10-12.el7_3.x86_64.rpm</filename><sum type="sha256">61875ef538fc2569371a059d900fe2a3572d1b4adcc8d0accb33f68ed42b1328</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2016:2879" id="RHBA-2016:2879-1" title="Rhba-2016:2879-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1384785" id="1384785" title="Replica Install Fails With Old Ipa Master Sometimes During Replication Process" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1388501" id="1388501" title="389-Ds-Base Is Missing Runtime Dependency - Bind-Utils" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1388581" id="1388581" title="Replication Stops Working Only When Fips Mode Is Set To True" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390342" id="1390342" title="Ns-Accountstatus.Pl Shows Wrong Status For Accounts Inactivated By Account Policy Plugin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390343" id="1390343" title="Trace Args Debug Logging Must Be More Restrictive" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0375-1</id><title>Selinux-Policy Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, the pkcsslotd module was renamed to pkcs. As a consequence, system update from Scientific Linux 7.0 to 7.3 failed. The SELinux policy store migration process has been fixed to skip the pkcsslotd module, and the failure during the system update no longer occurs.

* The System Security Services Daemon (SSSD) code was previously updated, and the daemon started using the setpgid() function to set process group ID (PGID). However, an appropriate rule was missing in SELinux. Consequently, SELinux AVC denials for SSSD occurred. The policy rule for setpgid() has been added to the sssd_t context, and SSSD can now set PGID successfully.</description><release>Scientific Linux</release><issued date="2017-03-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy-targeted" release="102.el7_3.15" src="selinux-policy-3.13.1-102.el7_3.15.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-102.el7_3.15.noarch.rpm</filename><sum type="sha256">02ec7ac39bfaf1d2636c8672a3cb507a4b71aca55dbd5e33ad97da54e3303def</sum></package><package arch="noarch" name="selinux-policy-devel" release="102.el7_3.15" src="selinux-policy-3.13.1-102.el7_3.15.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-102.el7_3.15.noarch.rpm</filename><sum type="sha256">518258c69d6434def350c404e5fbaa067483f2e572ead72d545e19685ee9f4e6</sum></package><package arch="noarch" name="selinux-policy-doc" release="102.el7_3.15" src="selinux-policy-3.13.1-102.el7_3.15.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-102.el7_3.15.noarch.rpm</filename><sum type="sha256">248a1829eb7e44aa6faa2af323d8b389ecc5bca9d505900f81ccc80a505a333b</sum></package><package arch="noarch" name="selinux-policy-sandbox" release="102.el7_3.15" src="selinux-policy-3.13.1-102.el7_3.15.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-102.el7_3.15.noarch.rpm</filename><sum type="sha256">db71db1a5302bcf2665ca51be1ba03cb75748d4ed26f92bfc6bdab73e8be8e28</sum></package><package arch="noarch" name="selinux-policy-minimum" release="102.el7_3.15" src="selinux-policy-3.13.1-102.el7_3.15.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-102.el7_3.15.noarch.rpm</filename><sum type="sha256">78331b251c4c2b4a7f2770077a8198f45bc5d6f5358f72b6c41a12f41955d6d1</sum></package><package arch="noarch" name="selinux-policy" release="102.el7_3.15" src="selinux-policy-3.13.1-102.el7_3.15.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-102.el7_3.15.noarch.rpm</filename><sum type="sha256">7518683af0c75a5e683b993b97260cef1a477c4c5ed28ecbaf40a747aa8cb265</sum></package><package arch="noarch" name="selinux-policy-mls" release="102.el7_3.15" src="selinux-policy-3.13.1-102.el7_3.15.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-102.el7_3.15.noarch.rpm</filename><sum type="sha256">478d56ab932b8f107d7830660322e2fa87a4ab32b7c2ce373532c8a0d176a60c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0375" id="RHBA-2017:0375-1" title="Rhba-2017:0375-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1411660" id="1411660" title="Upgrade Fails %Post: Re-Declaration Of Type Pkcsslotd_T" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1419836" id="1419836" title="Update Selinux Policy For Sssd" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0385-1</id><title>389-Ds-Base Bug Fix Update</title><description>This update fixes the following bugs:

* Previously, if the suffix of the "userRoot" default back end was not found in the "nsslapd-suffix" attribute, Directory Server scripts used for registering and unregistering back ends lost the suffix information and failed. A patch has been applied and Directory Server now ignores the empty suffix in the mentioned situation.

* Previously, if the cos_post_op() function was called while the back-end database was locked, a deadlock occurred when rebuilding the Class of Service (CoS) cache. Directory Server now rebuilds the CoS cache without requiring the internal lock. As a result, the deadlock situation no longer occurs in the described situation.

* Due to a bug, the "shadowExpire" attribute was incorrectly set. As a consequence, expired accounts were able to log in. A patch has been provided and Directory Server no longer incorrectly sets the "shadowExpire" attribute. As a result, expired accounts cannot log in. Additionally, this update now only sets the "shadow*" attributes if the password policy is enabled and the corresponding value is configured.

* Previously, if a plug-in operation succeeded, but the operation itself failed and was aborted, the replica update vector (RUV) was in an incorrect state. The change state number (CSN) has been redesigned and now uses a primary and secondary CSN. The primary CSN is associated with the main operation. Other internal operations, including the ones called from the plug-ins, use the secondary CSN. Using the CSN class difference, Directory Server no longer generates an inconsistent state in the RUV in the described situation.

After installing this update, the 389 server service will be restarted automatically.</description><release>Scientific Linux</release><issued date="2017-03-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-libs" release="18.el7_3" src="389-ds-base-1.3.5.10-18.el7_3.src.rpm" version="1.3.5.10"><filename>389-ds-base-libs-1.3.5.10-18.el7_3.x86_64.rpm</filename><sum type="sha256">340680c9e97c9f44944d452221e97d154fbf29e8e90ab894da04ea89eb16cfe2</sum></package><package arch="x86_64" name="389-ds-base-devel" release="18.el7_3" src="389-ds-base-1.3.5.10-18.el7_3.src.rpm" version="1.3.5.10"><filename>389-ds-base-devel-1.3.5.10-18.el7_3.x86_64.rpm</filename><sum type="sha256">57b3f38f11c884424d252651b273fc9208fc32ed84618295622bb12b491048a1</sum></package><package arch="x86_64" name="389-ds-base" release="18.el7_3" src="389-ds-base-1.3.5.10-18.el7_3.src.rpm" version="1.3.5.10"><filename>389-ds-base-1.3.5.10-18.el7_3.x86_64.rpm</filename><sum type="sha256">cd0dd6cf39623ce3f4ec51fac13d70f2aaddec6b711be8ef6f20915891c59800</sum></package><package arch="x86_64" name="389-ds-base-snmp" release="18.el7_3" src="389-ds-base-1.3.5.10-18.el7_3.src.rpm" version="1.3.5.10"><filename>389-ds-base-snmp-1.3.5.10-18.el7_3.x86_64.rpm</filename><sum type="sha256">16c530e0e3e36210884def58739b2492a3ffc6a6c81be1423b8eac94a446f78e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0385" id="RHBA-2017:0385-1" title="Rhba-2017:0385-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1414677" id="1414677" title="(Un)Register/Migration/Remove May Fail If There Is No Suffix On 'Userroot' Backend" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1414678" id="1414678" title="Deadlock On Cos Cache Rebuild" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1414679" id="1414679" title="Release 1.3.5 May Allow Expired Accounts Access To Systems" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416368" id="1416368" title="Aborted Operation Can Leave Ruv In Incorrect State" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0389-1</id><title>Pki-Core Bug Fix And Enhancement Update</title><description>This update fixes the following bugs:

* Previously, entry Update Sequence Numbers (USN) were parsed as bounded integer values. This caused the server to fail to start in cases when the USN exceeded 2147483647. With this update, USNs are parsed as unbounded BigInteger values, and the server now successfully starts if USNs exceed this value.

* The IPv4-specific "127.0.0.1" loopback address was previously used in the default server configuration file as the default AJP host name. This caused connections to fail on servers which run in IPv6-only environments. With this update, the default value is changed to "localhost", which works with both IPv4 and IPv6 protocols. Additionally, an upgrade script is available to automatically change the AJP host name on existing server instances.

* Prior to this update, ECDSA certificates were issued with a NULL value in the "parameter" field. These certificates were not compliant with the RFC 5758 specification which mandates this field to be omitted completely. This bug has been fixed, and ECDSA certificates are now issued without the "parameter" field.

* The issuance date of a certificate is retrieved from the "dateOfCreate" attribute in the LDAP certificate record. When migrating from an existing CA, if an entry was not initially created or if it was not updated during database import, the issuance date could be displayed incorrectly in both the web-based user interface and on the pki command line.

Two new parameters have been added to pkispawn to avoid this problem: "pki_ca_signing_record_create", which accepts boolean values and defaults to "True", and "pki_ca_signing_serial_number". When the first parameter is set to False, the certificate record with the serial number defined in the second parameter is removed before the end of the pkispawn configuration phase of the installation. Consequently, when the LDIF data is imported, the entry for the CA certificate is imported with the correct values, and the problem no longer occurs.

In addition, this update adds the following enhancement:

* This update adds the "tcp.keepAlive" parameter to the CS.cfg configuration file. Use this parameter to configure the TCP keepalive option for all LDAP connections created by the PKI subsystem. The parameter takes a boolean value, and is set to "true" by default.</description><release>Scientific Linux</release><issued date="2017-03-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="pki-base" release="17.el7_3" src="pki-core-10.3.3-17.el7_3.src.rpm" version="10.3.3"><filename>pki-base-10.3.3-17.el7_3.noarch.rpm</filename><sum type="sha256">203816cbd445907a25130b091effc2511d41b8042c2415f2776a7524b184d868</sum></package><package arch="noarch" name="pki-server" release="17.el7_3" src="pki-core-10.3.3-17.el7_3.src.rpm" version="10.3.3"><filename>pki-server-10.3.3-17.el7_3.noarch.rpm</filename><sum type="sha256">4a0a7571de9bb1935e9ed5ddecba6df64dcbd429ed2bae31c27501c214b55d66</sum></package><package arch="noarch" name="pki-ca" release="17.el7_3" src="pki-core-10.3.3-17.el7_3.src.rpm" version="10.3.3"><filename>pki-ca-10.3.3-17.el7_3.noarch.rpm</filename><sum type="sha256">d09d4e531720b0ecfb3d28243ef539ed1c6644961e95b16f06af37b189fe4cf8</sum></package><package arch="noarch" name="pki-kra" release="17.el7_3" src="pki-core-10.3.3-17.el7_3.src.rpm" version="10.3.3"><filename>pki-kra-10.3.3-17.el7_3.noarch.rpm</filename><sum type="sha256">739a29139ce5fd9114d839b299b9ea37197f406814a2160555cd120770bef3a9</sum></package><package arch="noarch" name="pki-base-java" release="17.el7_3" src="pki-core-10.3.3-17.el7_3.src.rpm" version="10.3.3"><filename>pki-base-java-10.3.3-17.el7_3.noarch.rpm</filename><sum type="sha256">14342cdd75f2f21cbf0d03559933af7aabb069351af09c66f9cfab77453b35ab</sum></package><package arch="x86_64" name="pki-tools" release="17.el7_3" src="pki-core-10.3.3-17.el7_3.src.rpm" version="10.3.3"><filename>pki-tools-10.3.3-17.el7_3.x86_64.rpm</filename><sum type="sha256">07b4ea5bc6243424d1e2fb3556a509a0b0ed9d25c8a80e8109a976ee7bd3285f</sum></package><package arch="x86_64" name="pki-symkey" release="17.el7_3" src="pki-core-10.3.3-17.el7_3.src.rpm" version="10.3.3"><filename>pki-symkey-10.3.3-17.el7_3.x86_64.rpm</filename><sum type="sha256">63775aefe61692b368860b5f609bd548bc6b0635378e7f7d29cad186645abd4d</sum></package><package arch="noarch" name="pki-javadoc" release="17.el7_3" src="pki-core-10.3.3-17.el7_3.src.rpm" version="10.3.3"><filename>pki-javadoc-10.3.3-17.el7_3.noarch.rpm</filename><sum type="sha256">a0b035efcc12afda7a9ba8b99380ed3ca9dd1cdc0c4a5a89154fb2046d5a2b45</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0389" id="RHBA-2017:0389-1" title="Rhba-2017:0389-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1417063" id="1417063" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1417065" id="1417065" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1417066" id="1417066" title="Update To 7.3 Ipa With Otpd Bugfixes, Tomcat Will Not Finish Start, Hangs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1417067" id="1417067" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1417190" id="1417190" title="Problem With Default Ajp Hostname In Ipv6 Environment." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0472-1</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages have been updated as follows:

* Mongolia no longer observes DST.

* The Magallanes Region of Chile has moved from a UTC-04/-03 scheme to UTC-03 all year. Starting 2017-05-13 at 23:00, the clocks for the Magallanes Region will differ from America/Santiago. To accommodate for this change, the new America/Punta_Arenas zone has been created.

* The zone1970.tab file has been added to the list of files to be installed with the tzdata packages installation.</description><release>Scientific Linux</release><issued date="2017-04-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2017a-1.el7.src.rpm" version="2017a"><filename>tzdata-2017a-1.el7.noarch.rpm</filename><sum type="sha256">c573d85361162f9c951053616a6b32bb78a3dda3da39a4fbcc1e75bd5bf9fef9</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2017a-1.el7.src.rpm" version="2017a"><filename>tzdata-java-2017a-1.el7.noarch.rpm</filename><sum type="sha256">4cbe5187112021693e30f62f101efed4086be69619a1f678f8309d4d78d2a35a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0472" id="RHBA-2017:0472-1" title="Rhba-2017:0472-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0823-1</id><title>Selinux-Policy Bug Fix Update</title><description>This update fixes the following bug:

* Prior to this update, an SELinux rule for Open vSwitch (OVS) was missing. As a consequence, during boot time, while running SELinux in enforcing mode, the ovs-ctl script was not allowed to run the hostname and ip commands. The missing policy rule has been added, and OVS is now able to configure itself properly during boot time.</description><release>Scientific Linux</release><issued date="2017-03-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy-targeted" release="102.el7_3.16" src="selinux-policy-3.13.1-102.el7_3.16.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-102.el7_3.16.noarch.rpm</filename><sum type="sha256">f0149202940da99d95ff41b4f5a189684f8fe93fb7dda721412d62b184b980cf</sum></package><package arch="noarch" name="selinux-policy-doc" release="102.el7_3.16" src="selinux-policy-3.13.1-102.el7_3.16.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-102.el7_3.16.noarch.rpm</filename><sum type="sha256">c7f8b7b241293555ddf4f44f836b4f36d7e9a4510470acfcd5481c073e594264</sum></package><package arch="noarch" name="selinux-policy-devel" release="102.el7_3.16" src="selinux-policy-3.13.1-102.el7_3.16.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-102.el7_3.16.noarch.rpm</filename><sum type="sha256">c93dab3a451a82375dc837e3540978a649309bd7f4ad5805fee1cd40a6b45d16</sum></package><package arch="noarch" name="selinux-policy-sandbox" release="102.el7_3.16" src="selinux-policy-3.13.1-102.el7_3.16.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-102.el7_3.16.noarch.rpm</filename><sum type="sha256">b3f9257b36cf882d7bd9af3f861ded990465bf8eeb616fde9d1eeeb801093ce6</sum></package><package arch="noarch" name="selinux-policy-mls" release="102.el7_3.16" src="selinux-policy-3.13.1-102.el7_3.16.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-102.el7_3.16.noarch.rpm</filename><sum type="sha256">c5c9c5c75711935076d66117d4017fdf5ae312965b1438bae45fda84e7f863c8</sum></package><package arch="noarch" name="selinux-policy" release="102.el7_3.16" src="selinux-policy-3.13.1-102.el7_3.16.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-102.el7_3.16.noarch.rpm</filename><sum type="sha256">2fc35cac2cd29ef1b35baa88c823cbf79ec5c05ffac2e8ee1636d0e41fa93de8</sum></package><package arch="noarch" name="selinux-policy-minimum" release="102.el7_3.16" src="selinux-policy-3.13.1-102.el7_3.16.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-102.el7_3.16.noarch.rpm</filename><sum type="sha256">c77ae5aaa7a1bea2002d73bba83d54cf6293c82e71875ba257ebf90e57589797</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0823" id="RHBA-2017:0823-1" title="Rhba-2017:0823-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1430751" id="1430751" title="Selinux Blocks Ovs To Run 'Hostname'" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:0839-1</id><title>Tzdata Enhancement Update</title><description>This update adds the following enhancement:

* Haiti began daylight saving time (DST) on March 12, 2017.</description><release>Scientific Linux</release><issued date="2017-04-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2017b-1.el7.src.rpm" version="2017b"><filename>tzdata-2017b-1.el7.noarch.rpm</filename><sum type="sha256">c94f61baac0d8b8e2779a789c892ceed04711d88af3113093babbe2d23832de7</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2017b-1.el7.src.rpm" version="2017b"><filename>tzdata-java-2017b-1.el7.noarch.rpm</filename><sum type="sha256">b972cfa2c89e8188e6a4d87563bd6130c5f66f6b162356eca907396468ff70e4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:0839" id="RHBA-2017:0839-1" title="Rhba-2017:0839-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434144" id="1434144" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434145" id="1434145" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434427" id="1434427" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434433" id="1434433" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:1436-1</id><title>Rpcbind Bug Fix Update</title><description>This update fixes the following bug:

* Prior to this update, the rpcbind utility terminated unexpectedly on start. A patch has been applied, and rpcbind now starts as expected.</description><release>Scientific Linux</release><issued date="2017-06-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="rpcbind" release="38.el7_3.1" src="rpcbind-0.2.0-38.el7_3.1.src.rpm" version="0.2.0"><filename>rpcbind-0.2.0-38.el7_3.1.x86_64.rpm</filename><sum type="sha256">8c0e692d587bed4a9b2621cd350438676e63005b3a81ce3a468f3345e73077d1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:1436" id="RHBA-2017:1436-1" title="Rhba-2017:1436-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1457172" id="1457172" title="Rpcbind Crash On Start [Rhel-7.3.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:1849-1</id><title>Virt-Viewer Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libgovirt-devel" release="5.el7" src="libgovirt-0.3.3-5.el7.src.rpm" version="0.3.3"><filename>libgovirt-devel-0.3.3-5.el7.i686.rpm</filename><sum type="sha256">c650cbfe0f79ecf4a4d86f5794f200617a7d8df469eabbe978efbce8031a940a</sum></package><package arch="x86_64" name="spice-glib" release="6.el7" src="spice-gtk-0.33-6.el7.src.rpm" version="0.33"><filename>spice-glib-0.33-6.el7.x86_64.rpm</filename><sum type="sha256">181571351a4982aa7e22db7737c2e4d8593f6b72365c8b937a9d87da351a0c99</sum></package><package arch="x86_64" name="libgovirt-devel" release="5.el7" src="libgovirt-0.3.3-5.el7.src.rpm" version="0.3.3"><filename>libgovirt-devel-0.3.3-5.el7.x86_64.rpm</filename><sum type="sha256">33611fe062815f38274ffa251ef928b693fbf1545cf5d12d57e5941a18316569</sum></package><package arch="x86_64" name="libgovirt" release="5.el7" src="libgovirt-0.3.3-5.el7.src.rpm" version="0.3.3"><filename>libgovirt-0.3.3-5.el7.x86_64.rpm</filename><sum type="sha256">35c67b9cf59ee879e9de522ae3aff89a66a96b0adcfeb2a5f8142ecb1ecb064a</sum></package><package arch="i686" name="usbredir-devel" release="2.el7" src="usbredir-0.7.1-2.el7.src.rpm" version="0.7.1"><filename>usbredir-devel-0.7.1-2.el7.i686.rpm</filename><sum type="sha256">6a821d0f00c5d89dd24287404f9c482bfd63fbc610fab8b48308d486e7c89f18</sum></package><package arch="noarch" name="spice-protocol" release="2.el7" src="spice-protocol-0.12.12-2.el7.src.rpm" version="0.12.12"><filename>spice-protocol-0.12.12-2.el7.noarch.rpm</filename><sum type="sha256">cd1cc7974dd52ffd90b759b78fc0135774d6df2ce4306ed22ecc983d3bbb7452</sum></package><package arch="x86_64" name="spice-gtk3-devel" release="6.el7" src="spice-gtk-0.33-6.el7.src.rpm" version="0.33"><filename>spice-gtk3-devel-0.33-6.el7.x86_64.rpm</filename><sum type="sha256">a886fbfe7afe4514ce1b0133bdc525212311d8425aca6cc0ff74598a77edbe94</sum></package><package arch="x86_64" name="spice-glib-devel" release="6.el7" src="spice-gtk-0.33-6.el7.src.rpm" version="0.33"><filename>spice-glib-devel-0.33-6.el7.x86_64.rpm</filename><sum type="sha256">59fc9b96189016014a8b8ce4dcbf88d09e7af581ea77ddd835920ec45b7390db</sum></package><package arch="i686" name="spice-gtk3" release="6.el7" src="spice-gtk-0.33-6.el7.src.rpm" version="0.33"><filename>spice-gtk3-0.33-6.el7.i686.rpm</filename><sum type="sha256">25259987e3e8da7d73b039147b3878e07e03c46d2ab42e6fd726cfee2faaf465</sum></package><package arch="i686" name="spice-glib-devel" release="6.el7" src="spice-gtk-0.33-6.el7.src.rpm" version="0.33"><filename>spice-glib-devel-0.33-6.el7.i686.rpm</filename><sum type="sha256">f9c6699e9da0ee007a35e08ffb89a2535d6662196a18dba564bd03b1407dd7a9</sum></package><package arch="i686" name="spice-glib" release="6.el7" src="spice-gtk-0.33-6.el7.src.rpm" version="0.33"><filename>spice-glib-0.33-6.el7.i686.rpm</filename><sum type="sha256">420c985f0b8df457c67b0e7c9b51e4376c8158adfbaa803f2ef51c8a0497caab</sum></package><package arch="x86_64" name="virt-viewer" release="7.el7" src="virt-viewer-5.0-7.el7.src.rpm" version="5.0"><filename>virt-viewer-5.0-7.el7.x86_64.rpm</filename><sum type="sha256">a4df44da9ce016db08a88ab76d2f4b6681d215ef6f9241ac2d0a7e7021d15850</sum></package><package arch="x86_64" name="usbredir" release="2.el7" src="usbredir-0.7.1-2.el7.src.rpm" version="0.7.1"><filename>usbredir-0.7.1-2.el7.x86_64.rpm</filename><sum type="sha256">3b03904702f7ce46e157a1cba8d455060695f1e7677031c78437efa099622965</sum></package><package arch="x86_64" name="spice-gtk-tools" release="6.el7" src="spice-gtk-0.33-6.el7.src.rpm" version="0.33"><filename>spice-gtk-tools-0.33-6.el7.x86_64.rpm</filename><sum type="sha256">03bdeb85348585c8a805aa830b21815992954843d11525471face16e24c0d659</sum></package><package arch="x86_64" name="usbredir-server" release="2.el7" src="usbredir-0.7.1-2.el7.src.rpm" version="0.7.1"><filename>usbredir-server-0.7.1-2.el7.x86_64.rpm</filename><sum type="sha256">e971ab5d95df88bbcc9a525fe9b3dd12d02443024cc881ebbeced933d832aab0</sum></package><package arch="x86_64" name="spice-gtk3" release="6.el7" src="spice-gtk-0.33-6.el7.src.rpm" version="0.33"><filename>spice-gtk3-0.33-6.el7.x86_64.rpm</filename><sum type="sha256">7547865f4ad42e20ced4b4c18cf5f437ba6693c8cc1164f0b677c79b22471c43</sum></package><package arch="x86_64" name="spice-gtk3-vala" release="6.el7" src="spice-gtk-0.33-6.el7.src.rpm" version="0.33"><filename>spice-gtk3-vala-0.33-6.el7.x86_64.rpm</filename><sum type="sha256">516f6882ff85988260db68a83cd91b0d9317e7386851af8f5643986183739d8b</sum></package><package arch="i686" name="libgovirt" release="5.el7" src="libgovirt-0.3.3-5.el7.src.rpm" version="0.3.3"><filename>libgovirt-0.3.3-5.el7.i686.rpm</filename><sum type="sha256">feb82e47b9c124ac482035cda04d7259be8123ba1b5b5b1a5b55959ec789e5d9</sum></package><package arch="x86_64" name="usbredir-devel" release="2.el7" src="usbredir-0.7.1-2.el7.src.rpm" version="0.7.1"><filename>usbredir-devel-0.7.1-2.el7.x86_64.rpm</filename><sum type="sha256">7ceb94f32a91f7f25ff567d93573039c31d08a15abf13d4d64efd207bb57b869</sum></package><package arch="i686" name="spice-gtk3-devel" release="6.el7" src="spice-gtk-0.33-6.el7.src.rpm" version="0.33"><filename>spice-gtk3-devel-0.33-6.el7.i686.rpm</filename><sum type="sha256">9a3194172646b938b8acf56723d982967733bc65b378ea84aec31d00af12b3e8</sum></package><package arch="i686" name="usbredir" release="2.el7" src="usbredir-0.7.1-2.el7.src.rpm" version="0.7.1"><filename>usbredir-0.7.1-2.el7.i686.rpm</filename><sum type="sha256">4e273df0bcb5a929e229e57810186cf485e12020b268094284f9438496ced9ae</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:1849" id="RHBA-2017:1849-1" title="Rhba-2017:1849-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:1857-1</id><title>Libnfsidmap Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-09-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libnfsidmap" release="17.el7" src="libnfsidmap-0.25-17.el7.src.rpm" version="0.25"><filename>libnfsidmap-0.25-17.el7.x86_64.rpm</filename><sum type="sha256">05e38bcccb8a8e0fa6c7e384794fed11cb93592137433ea3cb8ce2d53c55dbac</sum></package><package arch="x86_64" name="libnfsidmap-devel" release="17.el7" src="libnfsidmap-0.25-17.el7.src.rpm" version="0.25"><filename>libnfsidmap-devel-0.25-17.el7.x86_64.rpm</filename><sum type="sha256">fcc6d651877eacee386c6605a2e874abba248a91bb92122ae4debe87324e8e85</sum></package><package arch="i686" name="libnfsidmap-devel" release="17.el7" src="libnfsidmap-0.25-17.el7.src.rpm" version="0.25"><filename>libnfsidmap-devel-0.25-17.el7.i686.rpm</filename><sum type="sha256">81c87556fe0136d4ba504ee8637b42574518424551b820da8ac27dad0ec9e458</sum></package><package arch="i686" name="libnfsidmap" release="17.el7" src="libnfsidmap-0.25-17.el7.src.rpm" version="0.25"><filename>libnfsidmap-0.25-17.el7.i686.rpm</filename><sum type="sha256">5b2d2ee439ef994c3b3507e266d27d46fc1140c006326d498953afdd290f85c8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:1857" id="RHBA-2017:1857-1" title="Rhba-2017:1857-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:1861-1</id><title>Selinux-Policy Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy-sandbox" release="166.el7" src="selinux-policy-3.13.1-166.el7.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-166.el7.noarch.rpm</filename><sum type="sha256">f5e0374d01dc57edfb37664db16db1f1f35bed42e4257815cf1273fffc0b1121</sum></package><package arch="noarch" name="selinux-policy-targeted" release="166.el7" src="selinux-policy-3.13.1-166.el7.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-166.el7.noarch.rpm</filename><sum type="sha256">9d14708360df93e53f3a0a649b4c5f7c7c2a51a0b5cc126134328d47624d5591</sum></package><package arch="noarch" name="selinux-policy-devel" release="166.el7" src="selinux-policy-3.13.1-166.el7.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-166.el7.noarch.rpm</filename><sum type="sha256">fade7c17fdf0b09b3980d749807a794fee8fc1dbfa6515e4dbe469c19c669c1c</sum></package><package arch="noarch" name="selinux-policy-minimum" release="166.el7" src="selinux-policy-3.13.1-166.el7.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-166.el7.noarch.rpm</filename><sum type="sha256">fa1cc1d5b3309be7d15cfbd91ddfa940e6822f8a0cf8778d6e727a1a7c11c601</sum></package><package arch="noarch" name="selinux-policy-doc" release="166.el7" src="selinux-policy-3.13.1-166.el7.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-166.el7.noarch.rpm</filename><sum type="sha256">48fda297e7b7714679fdb22cd2ba8d15c56bd96cf9d29d774b21c6b8c57e03d7</sum></package><package arch="noarch" name="selinux-policy" release="166.el7" src="selinux-policy-3.13.1-166.el7.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-166.el7.noarch.rpm</filename><sum type="sha256">2acd2eccaf0c868225a2e891ebf5e124491db8e0924e0f60dbad3c5bb9240886</sum></package><package arch="noarch" name="selinux-policy-mls" release="166.el7" src="selinux-policy-3.13.1-166.el7.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-166.el7.noarch.rpm</filename><sum type="sha256">f437a9cfe9e305748cb215385d69aaca3e98dc0aa19295d2f62b8e0fbd4cbd0e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:1861" id="RHBA-2017:1861-1" title="Rhba-2017:1861-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:1866-1</id><title>Spice Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="spice-server" release="2.el7" src="spice-0.12.8-2.el7.src.rpm" version="0.12.8"><filename>spice-server-0.12.8-2.el7.x86_64.rpm</filename><sum type="sha256">e7c5bd0d02a3ebf89324066adf36a02cdfac06c16b991b912936845c14318545</sum></package><package arch="x86_64" name="spice-server-devel" release="2.el7" src="spice-0.12.8-2.el7.src.rpm" version="0.12.8"><filename>spice-server-devel-0.12.8-2.el7.x86_64.rpm</filename><sum type="sha256">e9349a9b176f2c5f80f3563877c9877c48229f92d9ce46fab627bdd4367817dc</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:1866" id="RHBA-2017:1866-1" title="Rhba-2017:1866-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:1891-1</id><title>Krb5 Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="krb5-workstation" release="8.el7" src="krb5-1.15.1-8.el7.src.rpm" version="1.15.1"><filename>krb5-workstation-1.15.1-8.el7.x86_64.rpm</filename><sum type="sha256">e80fde04f77929ac0f1da098af4cf2496035c539d79b5c1cb656f44cec3b83b7</sum></package><package arch="x86_64" name="krb5-server" release="8.el7" src="krb5-1.15.1-8.el7.src.rpm" version="1.15.1"><filename>krb5-server-1.15.1-8.el7.x86_64.rpm</filename><sum type="sha256">d1bab7fca6275a803d8b254cdd612cb2969a28ead284ce692cca22fc58c84f44</sum></package><package arch="i686" name="krb5-libs" release="8.el7" src="krb5-1.15.1-8.el7.src.rpm" version="1.15.1"><filename>krb5-libs-1.15.1-8.el7.i686.rpm</filename><sum type="sha256">b60f260b89df6a29c150cff4fb75ff98682fedc703ccb0909119590a76424471</sum></package><package arch="i686" name="libkadm5" release="8.el7" src="krb5-1.15.1-8.el7.src.rpm" version="1.15.1"><filename>libkadm5-1.15.1-8.el7.i686.rpm</filename><sum type="sha256">259e700583950d31e74a693f7d18600d6f041329ef4fe9a31386d7a92a4ef71b</sum></package><package arch="x86_64" name="krb5-devel" release="8.el7" src="krb5-1.15.1-8.el7.src.rpm" version="1.15.1"><filename>krb5-devel-1.15.1-8.el7.x86_64.rpm</filename><sum type="sha256">2a3b5cd6a133c5f926a38acef0a97dd1504a21851bb597525fe01e81e9df92ae</sum></package><package arch="i686" name="krb5-devel" release="8.el7" src="krb5-1.15.1-8.el7.src.rpm" version="1.15.1"><filename>krb5-devel-1.15.1-8.el7.i686.rpm</filename><sum type="sha256">9d634bb97ad6c7fbdd4ff4950cece15fbb82233d1cc4e35f74f7de00f288a1ce</sum></package><package arch="x86_64" name="krb5-libs" release="8.el7" src="krb5-1.15.1-8.el7.src.rpm" version="1.15.1"><filename>krb5-libs-1.15.1-8.el7.x86_64.rpm</filename><sum type="sha256">a9f60e98ede285cf65abd7aa906749f5e5f503961e7f0ef861e9d6af0e471910</sum></package><package arch="x86_64" name="libkadm5" release="8.el7" src="krb5-1.15.1-8.el7.src.rpm" version="1.15.1"><filename>libkadm5-1.15.1-8.el7.x86_64.rpm</filename><sum type="sha256">2e869ced64fcdd80a4c2e03c63a9c7eaa05bea41c56b2040295611c3576fbd6a</sum></package><package arch="x86_64" name="krb5-server-ldap" release="8.el7" src="krb5-1.15.1-8.el7.src.rpm" version="1.15.1"><filename>krb5-server-ldap-1.15.1-8.el7.x86_64.rpm</filename><sum type="sha256">37a5d3e336bb0eaa532cef0ede2ec301336d8b1aac9243339262a388a3a2754d</sum></package><package arch="x86_64" name="krb5-pkinit" release="8.el7" src="krb5-1.15.1-8.el7.src.rpm" version="1.15.1"><filename>krb5-pkinit-1.15.1-8.el7.x86_64.rpm</filename><sum type="sha256">75fe8b44d6a96afde112c4432a6c21553dbdd2f4cab25d2663de65232228126a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:1891" id="RHBA-2017:1891-1" title="Rhba-2017:1891-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:1905-1</id><title>Xorg X11 Server And Drivers Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-drv-libinput-devel" release="2.el7" src="xorg-x11-drv-libinput-0.25.0-2.el7.src.rpm" version="0.25.0"><filename>xorg-x11-drv-libinput-devel-0.25.0-2.el7.x86_64.rpm</filename><sum type="sha256">fc18fc209b60d7d6685a87ee12e7b21d893a4b5aa6b02028159528afd11c3846</sum></package><package arch="x86_64" name="xorg-x11-drv-qxl" release="3.el7" src="xorg-x11-drv-qxl-0.1.5-3.el7.src.rpm" version="0.1.5"><filename>xorg-x11-drv-qxl-0.1.5-3.el7.x86_64.rpm</filename><sum type="sha256">c23634cbc394c2962adfa9697e81fa5adb6a7192074502ab60b3cba50c23b369</sum></package><package arch="x86_64" name="xorg-x11-drv-intel-devel" release="26.20160929.el7" src="xorg-x11-drv-intel-2.99.917-26.20160929.el7.src.rpm" version="2.99.917"><filename>xorg-x11-drv-intel-devel-2.99.917-26.20160929.el7.x86_64.rpm</filename><sum type="sha256">fc1d83a3c30be58b8da689dc8cd660eeac3232fd98a7c2dc38a436ea5444bf6d</sum></package><package arch="x86_64" name="xorg-x11-drv-void" release="2.el7" src="xorg-x11-drv-void-1.4.1-2.el7.src.rpm" version="1.4.1"><filename>xorg-x11-drv-void-1.4.1-2.el7.x86_64.rpm</filename><sum type="sha256">18c165c62ec4c976bf88ee7f9de50472c2c8d9ee4bf90142573a9b0820b91e29</sum></package><package arch="i686" name="xorg-x11-server-devel" release="11.el7" src="xorg-x11-server-1.19.3-11.el7.src.rpm" version="1.19.3"><filename>xorg-x11-server-devel-1.19.3-11.el7.i686.rpm</filename><sum type="sha256">dc20850710553451478cbd3f2b65d9c7593fc98e9462dda1ba5e308cce8dec1c</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="11.el7" src="xorg-x11-server-1.19.3-11.el7.src.rpm" version="1.19.3"><filename>xorg-x11-server-devel-1.19.3-11.el7.x86_64.rpm</filename><sum type="sha256">c169c1016c5502aa73019aaf22f325e944b74f4e30eebf88541ddbcd0ec2fbaf</sum></package><package arch="x86_64" name="xorg-x11-drv-fbdev" release="25.el7" src="xorg-x11-drv-fbdev-0.4.3-25.el7.src.rpm" version="0.4.3"><filename>xorg-x11-drv-fbdev-0.4.3-25.el7.x86_64.rpm</filename><sum type="sha256">b3eebc10e4b36a8b8c907d4acdef9cc8e0f602e71090a387cbcd816c9d2f2728</sum></package><package arch="x86_64" name="xorg-x11-drv-ati" release="3.20160928git3fc839ff.el7" src="xorg-x11-drv-ati-7.7.1-3.20160928git3fc839ff.el7.src.rpm" version="7.7.1"><filename>xorg-x11-drv-ati-7.7.1-3.20160928git3fc839ff.el7.x86_64.rpm</filename><sum type="sha256">601c50821b358a58e5dcccda9526311fbb08203afc78aeb1315bb276476e9208</sum></package><package arch="x86_64" name="xorg-x11-drv-mouse-devel" release="1.el7" src="xorg-x11-drv-mouse-1.9.2-1.el7.src.rpm" version="1.9.2"><filename>xorg-x11-drv-mouse-devel-1.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">86b4e60944d97f901980eb478f7c77462508bcbdc021ffe835670ae80f07d202</sum></package><package arch="x86_64" name="intel-gpu-tools" release="26.20160929.el7" src="xorg-x11-drv-intel-2.99.917-26.20160929.el7.src.rpm" version="2.99.917"><filename>intel-gpu-tools-2.99.917-26.20160929.el7.x86_64.rpm</filename><sum type="sha256">62a8b57003031fdbcac6c76cc855e5202589fc44dd78c5f9ccdfc53575180613</sum></package><package arch="i686" name="xorg-x11-drv-intel-devel" release="26.20160929.el7" src="xorg-x11-drv-intel-2.99.917-26.20160929.el7.src.rpm" version="2.99.917"><filename>xorg-x11-drv-intel-devel-2.99.917-26.20160929.el7.i686.rpm</filename><sum type="sha256">afd1aa1ee7db74b55dc4617675dc21b4c13e5c1279ee28e091b22320e2f79c5e</sum></package><package arch="x86_64" name="xorg-x11-drv-v4l" release="47.el7" src="xorg-x11-drv-v4l-0.2.0-47.el7.src.rpm" version="0.2.0"><filename>xorg-x11-drv-v4l-0.2.0-47.el7.x86_64.rpm</filename><sum type="sha256">c6948ee06d68d7b34a7eb587cc31c4709014bb6f19418c95c1f0fc9e51c4a41b</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="11.el7" src="xorg-x11-server-1.19.3-11.el7.src.rpm" version="1.19.3"><filename>xorg-x11-server-Xnest-1.19.3-11.el7.x86_64.rpm</filename><sum type="sha256">86aa21f9554be40120258302ff85cee07e1fc012726c51c161ecda9745e910e2</sum></package><package arch="i686" name="xorg-x11-drv-libinput-devel" release="2.el7" src="xorg-x11-drv-libinput-0.25.0-2.el7.src.rpm" version="0.25.0"><filename>xorg-x11-drv-libinput-devel-0.25.0-2.el7.i686.rpm</filename><sum type="sha256">d900bd73215a4ebf40a8378ab814658ee36677f7a80fe092882c8ee36a24c2ce</sum></package><package arch="x86_64" name="xorg-x11-drv-evdev-devel" release="2.1.el7" src="xorg-x11-drv-evdev-2.10.5-2.1.el7.src.rpm" version="2.10.5"><filename>xorg-x11-drv-evdev-devel-2.10.5-2.1.el7.x86_64.rpm</filename><sum type="sha256">e4d4c86c9cbbb57d95c8f539e2caf7d6cc8c0e75185eea65cb998c8d939749bd</sum></package><package arch="x86_64" name="xorg-x11-drv-synaptics-devel" release="1.el7" src="xorg-x11-drv-synaptics-1.9.0-1.el7.src.rpm" version="1.9.0"><filename>xorg-x11-drv-synaptics-devel-1.9.0-1.el7.x86_64.rpm</filename><sum type="sha256">aed1cf3d868b25a70abd3ce0075e4425fe4570fb6b0be9fee4fd351c58f78df9</sum></package><package arch="i686" name="xorg-x11-drv-wacom-devel" release="2.el7" src="xorg-x11-drv-wacom-0.34.2-2.el7.src.rpm" version="0.34.2"><filename>xorg-x11-drv-wacom-devel-0.34.2-2.el7.i686.rpm</filename><sum type="sha256">6ea85f59d29f16fada83e2049c2cad7adafd0bcb3274e1aaf9957799d771a4e6</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="11.el7" src="xorg-x11-server-1.19.3-11.el7.src.rpm" version="1.19.3"><filename>xorg-x11-server-Xephyr-1.19.3-11.el7.x86_64.rpm</filename><sum type="sha256">ad5f7c642a929a701a6dd3c0812c9ccf188c3d4d671c0d1e3f9c41e638aefbaf</sum></package><package arch="i686" name="xorg-x11-drv-mouse-devel" release="1.el7" src="xorg-x11-drv-mouse-1.9.2-1.el7.src.rpm" version="1.9.2"><filename>xorg-x11-drv-mouse-devel-1.9.2-1.el7.i686.rpm</filename><sum type="sha256">a38d98d6645ea6150968fb21340e6fb2863924bbf6ff45dbfcafdca2f7852a8c</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="11.el7" src="xorg-x11-server-1.19.3-11.el7.src.rpm" version="1.19.3"><filename>xorg-x11-server-Xvfb-1.19.3-11.el7.x86_64.rpm</filename><sum type="sha256">fe62651fea0a8ad2fbce629f9dd85808a8d64001722c92101e9a7470dcbbcfb2</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="11.el7" src="xorg-x11-server-1.19.3-11.el7.src.rpm" version="1.19.3"><filename>xorg-x11-server-Xdmx-1.19.3-11.el7.x86_64.rpm</filename><sum type="sha256">ebda813f26515391f2936c75595afe71f19bfecc0ca49162d32cb6653e49120c</sum></package><package arch="x86_64" name="xorg-x11-drv-synaptics" release="1.el7" src="xorg-x11-drv-synaptics-1.9.0-1.el7.src.rpm" version="1.9.0"><filename>xorg-x11-drv-synaptics-1.9.0-1.el7.x86_64.rpm</filename><sum type="sha256">ae7998d71f29a935aaaa2194d16164a6b67428e03c60c5692c0411d04e976bae</sum></package><package arch="x86_64" name="xorg-x11-drv-dummy" release="1.el7" src="xorg-x11-drv-dummy-0.3.7-1.el7.src.rpm" version="0.3.7"><filename>xorg-x11-drv-dummy-0.3.7-1.el7.x86_64.rpm</filename><sum type="sha256">dd78a78955b7d44c0a77ac8f706957a6e78263f2ae7462b240f60c08093ec8a7</sum></package><package arch="x86_64" name="xorg-x11-drv-intel" release="26.20160929.el7" src="xorg-x11-drv-intel-2.99.917-26.20160929.el7.src.rpm" version="2.99.917"><filename>xorg-x11-drv-intel-2.99.917-26.20160929.el7.x86_64.rpm</filename><sum type="sha256">227117cbeeed58c5773fe95adffb64ffc73a8bed80aaa56c584f60a8690ddabd</sum></package><package arch="i686" name="xorg-x11-drv-openchrome-devel" release="3.el7" src="xorg-x11-drv-openchrome-0.5.0-3.el7.src.rpm" version="0.5.0"><filename>xorg-x11-drv-openchrome-devel-0.5.0-3.el7.i686.rpm</filename><sum type="sha256">863b0cbce5bc34e5e4086e1c051c82200556d0c1b10c2f1c219fda201b2d750a</sum></package><package arch="x86_64" name="xorg-x11-drv-vmmouse" release="1.el7" src="xorg-x11-drv-vmmouse-13.1.0-1.el7.src.rpm" version="13.1.0"><filename>xorg-x11-drv-vmmouse-13.1.0-1.el7.x86_64.rpm</filename><sum type="sha256">e8e1df0ac9c711058fe7c37a3771df546ce791a3ec1a52666be30d458d9f5687</sum></package><package arch="x86_64" epoch="1" name="xorg-x11-drv-nouveau" release="3.el7" src="xorg-x11-drv-nouveau-1.0.13-3.el7.src.rpm" version="1.0.13"><filename>xorg-x11-drv-nouveau-1.0.13-3.el7.x86_64.rpm</filename><sum type="sha256">5a41d9214cd69a8f8935420e45e9720b62d9a8fadeeac8fb0351204b119304eb</sum></package><package arch="i686" name="xorg-x11-drv-evdev-devel" release="2.1.el7" src="xorg-x11-drv-evdev-2.10.5-2.1.el7.src.rpm" version="2.10.5"><filename>xorg-x11-drv-evdev-devel-2.10.5-2.1.el7.i686.rpm</filename><sum type="sha256">3fe476503c2fb24aae8cff326dd4de618979c4ecf83aaf02997c39bbaaf0451d</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="11.el7" src="xorg-x11-server-1.19.3-11.el7.src.rpm" version="1.19.3"><filename>xorg-x11-server-common-1.19.3-11.el7.x86_64.rpm</filename><sum type="sha256">db15fc14c7322bd6a19fda0633bad1aec4faf030c5f9d8c21242faea2d8c37de</sum></package><package arch="x86_64" name="xorg-x11-drv-openchrome" release="3.el7" src="xorg-x11-drv-openchrome-0.5.0-3.el7.src.rpm" version="0.5.0"><filename>xorg-x11-drv-openchrome-0.5.0-3.el7.x86_64.rpm</filename><sum type="sha256">25d93f77e87cf86359ca344a2a20be54f0626c14c8922a36c8aa64efdbee66b3</sum></package><package arch="x86_64" name="xorg-x11-drv-keyboard" release="1.el7" src="xorg-x11-drv-keyboard-1.9.0-1.el7.src.rpm" version="1.9.0"><filename>xorg-x11-drv-keyboard-1.9.0-1.el7.x86_64.rpm</filename><sum type="sha256">26fb82c2a9394f96a1b5204e1227dcccdb9126f7c0c34fcb3c3e62df5c30b9b8</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="11.el7" src="xorg-x11-server-1.19.3-11.el7.src.rpm" version="1.19.3"><filename>xorg-x11-server-Xorg-1.19.3-11.el7.x86_64.rpm</filename><sum type="sha256">17ba568792b148b3cbb4e54c0fec87621103e7eb82f8db20e2c57a45dc271965</sum></package><package arch="x86_64" name="xorg-x11-drv-wacom-devel" release="2.el7" src="xorg-x11-drv-wacom-0.34.2-2.el7.src.rpm" version="0.34.2"><filename>xorg-x11-drv-wacom-devel-0.34.2-2.el7.x86_64.rpm</filename><sum type="sha256">5d8672396621e2ccbdb8a490240c1223739962a74ca8f2f7b1e8f2c88b9a69fa</sum></package><package arch="x86_64" name="xorg-x11-drv-libinput" release="2.el7" src="xorg-x11-drv-libinput-0.25.0-2.el7.src.rpm" version="0.25.0"><filename>xorg-x11-drv-libinput-0.25.0-2.el7.x86_64.rpm</filename><sum type="sha256">d163868aeea8a447afb40ba9031a1ce268a53621dc939ecd9103444d5298f35d</sum></package><package arch="x86_64" name="xorg-x11-drv-vmware" release="1.el7" src="xorg-x11-drv-vmware-13.2.1-1.el7.src.rpm" version="13.2.1"><filename>xorg-x11-drv-vmware-13.2.1-1.el7.x86_64.rpm</filename><sum type="sha256">3b6165c981a23d49ad66d217369e2eafcc0f1872116ec040733015154f2ba09e</sum></package><package arch="i686" name="xorg-x11-drv-intel" release="26.20160929.el7" src="xorg-x11-drv-intel-2.99.917-26.20160929.el7.src.rpm" version="2.99.917"><filename>xorg-x11-drv-intel-2.99.917-26.20160929.el7.i686.rpm</filename><sum type="sha256">dd4e29e59849a81f0dd27deec763cea7cc7bbd871d071cdb22881a65d1152195</sum></package><package arch="noarch" name="xorg-x11-server-source" release="11.el7" src="xorg-x11-server-1.19.3-11.el7.src.rpm" version="1.19.3"><filename>xorg-x11-server-source-1.19.3-11.el7.noarch.rpm</filename><sum type="sha256">37b35991a3c01e56cbd1c5604de0c01e84ca8e4f2d94143e00e3daa212da598f</sum></package><package arch="x86_64" name="xorg-x11-drv-openchrome-devel" release="3.el7" src="xorg-x11-drv-openchrome-0.5.0-3.el7.src.rpm" version="0.5.0"><filename>xorg-x11-drv-openchrome-devel-0.5.0-3.el7.x86_64.rpm</filename><sum type="sha256">2145db0f43ca630bc09d6e42d804a63d93b4629ccfcb9714c9ab2239531e326d</sum></package><package arch="x86_64" name="xorg-x11-drv-wacom" release="2.el7" src="xorg-x11-drv-wacom-0.34.2-2.el7.src.rpm" version="0.34.2"><filename>xorg-x11-drv-wacom-0.34.2-2.el7.x86_64.rpm</filename><sum type="sha256">dc4d2e7e40f5a0ea1fad2d7e27bbab70345c6dfe2f113e5ebea679d19fa030a5</sum></package><package arch="x86_64" name="xorg-x11-drv-vesa" release="25.1.el7" src="xorg-x11-drv-vesa-2.3.2-25.1.el7.src.rpm" version="2.3.2"><filename>xorg-x11-drv-vesa-2.3.2-25.1.el7.x86_64.rpm</filename><sum type="sha256">0f9b752620b3ec034a1a5a462ed5a2140dc42fab9d818f1e43196ebe7cfe2bda</sum></package><package arch="x86_64" name="xorg-x11-drv-evdev" release="2.1.el7" src="xorg-x11-drv-evdev-2.10.5-2.1.el7.src.rpm" version="2.10.5"><filename>xorg-x11-drv-evdev-2.10.5-2.1.el7.x86_64.rpm</filename><sum type="sha256">2a137b6a680e6a4f3fe5d158bb0f8d6f7d274450212e80805108d9246557d019</sum></package><package arch="i686" name="xorg-x11-drv-openchrome" release="3.el7" src="xorg-x11-drv-openchrome-0.5.0-3.el7.src.rpm" version="0.5.0"><filename>xorg-x11-drv-openchrome-0.5.0-3.el7.i686.rpm</filename><sum type="sha256">f52dd425195ecc6245b5f393049a9df371a037dbca8b970a2b14cf6f0986a01e</sum></package><package arch="i686" name="xorg-x11-drv-synaptics-devel" release="1.el7" src="xorg-x11-drv-synaptics-1.9.0-1.el7.src.rpm" version="1.9.0"><filename>xorg-x11-drv-synaptics-devel-1.9.0-1.el7.i686.rpm</filename><sum type="sha256">71e266f5285b5eefc9b89f60a2072b28bb0229592889a6f95fd267a805a34b26</sum></package><package arch="x86_64" name="xorg-x11-drv-mouse" release="1.el7" src="xorg-x11-drv-mouse-1.9.2-1.el7.src.rpm" version="1.9.2"><filename>xorg-x11-drv-mouse-1.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">bbd4ae0a721ffd7f1c8893005e288d923fe67e3c353f2df097ed1250ec3b9928</sum></package><package arch="x86_64" name="xorg-x11-server-Xspice" release="3.el7" src="xorg-x11-drv-qxl-0.1.5-3.el7.src.rpm" version="0.1.5"><filename>xorg-x11-server-Xspice-0.1.5-3.el7.x86_64.rpm</filename><sum type="sha256">d982c6e113324c9dec41bd64a51d7c045687617955f1dcaadee83370a86e16ec</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:1905" id="RHBA-2017:1905-1" title="Rhba-2017:1905-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:1929-1</id><title>Openssl Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="openssl-devel" release="8.el7" src="openssl-1.0.2k-8.el7.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-8.el7.i686.rpm</filename><sum type="sha256">0d0226e4a5cc0cd544259648d92d54328d7bf206a2620f361c89380c25d45010</sum></package><package arch="x86_64" epoch="1" name="openssl" release="8.el7" src="openssl-1.0.2k-8.el7.src.rpm" version="1.0.2k"><filename>openssl-1.0.2k-8.el7.x86_64.rpm</filename><sum type="sha256">f7798a9de27c2ebea95917d9e64f03e62abd960d0afb01c10254dac53e0a6088</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="8.el7" src="openssl-1.0.2k-8.el7.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-8.el7.x86_64.rpm</filename><sum type="sha256">d18d739cf161cc0f6eaad5532d2aa569c9cab7a457beac882b84b9867ca5ee3e</sum></package><package arch="x86_64" epoch="1" name="openssl-devel" release="8.el7" src="openssl-1.0.2k-8.el7.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-8.el7.x86_64.rpm</filename><sum type="sha256">a9fe642863bfe4576ae76459593ebc04ddbb48be141427ee13a12638e9ab9f56</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="8.el7" src="openssl-1.0.2k-8.el7.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-8.el7.i686.rpm</filename><sum type="sha256">f3871b377b37238878c2c4c4906ba04e4b0a8e36f12a4332cf8bf911db12f966</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="8.el7" src="openssl-1.0.2k-8.el7.src.rpm" version="1.0.2k"><filename>openssl-perl-1.0.2k-8.el7.x86_64.rpm</filename><sum type="sha256">07ff32411f19463dc2a58c1e547b9b8b3681fee0eb2aa7b8c6b9c77f7ad0338f</sum></package><package arch="i686" epoch="1" name="openssl-static" release="8.el7" src="openssl-1.0.2k-8.el7.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-8.el7.i686.rpm</filename><sum type="sha256">0e8202a52452cef75d2021d54c8912ccbd5e9446f59a1062526309c82a1cb387</sum></package><package arch="x86_64" epoch="1" name="openssl-libs" release="8.el7" src="openssl-1.0.2k-8.el7.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-8.el7.x86_64.rpm</filename><sum type="sha256">160188e10a38ef218f5e5f8dcdf900142788fcab7e55c0a69457c2b3068a5219</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:1929" id="RHBA-2017:1929-1" title="Rhba-2017:1929-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:1945-1</id><title>Python-Dns Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-dns" release="4.20150617git465785f.el7" src="python-dns-1.12.0-4.20150617git465785f.el7.src.rpm" version="1.12.0"><filename>python-dns-1.12.0-4.20150617git465785f.el7.noarch.rpm</filename><sum type="sha256">d415353168bc4ac61eb2a486f5c7b6c5dd9110b2c79ac5353ab2734dbfe027e3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:1945" id="RHBA-2017:1945-1" title="Rhba-2017:1945-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:1960-1</id><title>Linux-Firmware Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="iwl4965-firmware" release="56.el7" src="linux-firmware-20170606-56.gitc990aae.el7.src.rpm" version="228.61.2.24"><filename>iwl4965-firmware-228.61.2.24-56.el7.noarch.rpm</filename><sum type="sha256">381f89e0a1c79318ed929b7c6c14c5fb1e15657ff8c938c8083fda49da224339</sum></package><package arch="noarch" name="iwl3160-firmware" release="56.el7" src="linux-firmware-20170606-56.gitc990aae.el7.src.rpm" version="22.0.7.0"><filename>iwl3160-firmware-22.0.7.0-56.el7.noarch.rpm</filename><sum type="sha256">f18fa000682e10263ff337a7b7978336cb3cb64b5ef84e4327c47159d0c2a2df</sum></package><package arch="noarch" name="iwl3945-firmware" release="56.el7" src="linux-firmware-20170606-56.gitc990aae.el7.src.rpm" version="15.32.2.9"><filename>iwl3945-firmware-15.32.2.9-56.el7.noarch.rpm</filename><sum type="sha256">3d93c9c7f5aee25248d3a18c05d9f032b13ae70e9a498cd842f040ab04ceeed8</sum></package><package arch="noarch" name="iwl7265-firmware" release="56.el7" src="linux-firmware-20170606-56.gitc990aae.el7.src.rpm" version="22.0.7.0"><filename>iwl7265-firmware-22.0.7.0-56.el7.noarch.rpm</filename><sum type="sha256">f895b65c3d006f97932f8d50773123b3be5de9b898fb676a21b394726607713e</sum></package><package arch="noarch" epoch="1" name="iwl1000-firmware" release="56.el7" src="linux-firmware-20170606-56.gitc990aae.el7.src.rpm" version="39.31.5.1"><filename>iwl1000-firmware-39.31.5.1-56.el7.noarch.rpm</filename><sum type="sha256">070c678ad927164ffc74d7e6ef598ab2476caa8e84e4fdcaa0833bbf87b8679a</sum></package><package arch="noarch" name="iwl5000-firmware" release="56.el7" src="linux-firmware-20170606-56.gitc990aae.el7.src.rpm" version="8.83.5.1_1"><filename>iwl5000-firmware-8.83.5.1_1-56.el7.noarch.rpm</filename><sum type="sha256">1e7fbf4eb0dbb82582091c6aba2bf237cd02d26519e2b4bad5b1775149e4254c</sum></package><package arch="noarch" name="iwl100-firmware" release="56.el7" src="linux-firmware-20170606-56.gitc990aae.el7.src.rpm" version="39.31.5.1"><filename>iwl100-firmware-39.31.5.1-56.el7.noarch.rpm</filename><sum type="sha256">550a5c13952ed9c0c84abbd73f32e4cfd81a1d35ad0815fca192447f5fcdb092</sum></package><package arch="noarch" name="iwl135-firmware" release="56.el7" src="linux-firmware-20170606-56.gitc990aae.el7.src.rpm" version="18.168.6.1"><filename>iwl135-firmware-18.168.6.1-56.el7.noarch.rpm</filename><sum type="sha256">b148438b1306e4d86fdddbe55e0d5f95cec8588639835043e065765943e8c127</sum></package><package arch="noarch" name="iwl2030-firmware" release="56.el7" src="linux-firmware-20170606-56.gitc990aae.el7.src.rpm" version="18.168.6.1"><filename>iwl2030-firmware-18.168.6.1-56.el7.noarch.rpm</filename><sum type="sha256">4645cf850a9b4d844516fc967e020e117cbd4bd3b8e730b73350d9b3737b2388</sum></package><package arch="noarch" name="iwl6000-firmware" release="56.el7" src="linux-firmware-20170606-56.gitc990aae.el7.src.rpm" version="9.221.4.1"><filename>iwl6000-firmware-9.221.4.1-56.el7.noarch.rpm</filename><sum type="sha256">77a8ffa754f85bfdb9344703b4e6ef79a81ab7a9fed322e0f3365d49d382a9bc</sum></package><package arch="noarch" name="iwl6050-firmware" release="56.el7" src="linux-firmware-20170606-56.gitc990aae.el7.src.rpm" version="41.28.5.1"><filename>iwl6050-firmware-41.28.5.1-56.el7.noarch.rpm</filename><sum type="sha256">5b87d9405ffef7028001e5765a059ef7658201c06efb53d43e18c448a82f7b25</sum></package><package arch="noarch" name="linux-firmware" release="56.gitc990aae.el7" src="linux-firmware-20170606-56.gitc990aae.el7.src.rpm" version="20170606"><filename>linux-firmware-20170606-56.gitc990aae.el7.noarch.rpm</filename><sum type="sha256">45bcdf49ee2e9034e6d8bfe6bca8902c3f1ac934b90897220cf880b1f9b5b1d0</sum></package><package arch="noarch" name="iwl105-firmware" release="56.el7" src="linux-firmware-20170606-56.gitc990aae.el7.src.rpm" version="18.168.6.1"><filename>iwl105-firmware-18.168.6.1-56.el7.noarch.rpm</filename><sum type="sha256">03bf7c8078109955ca43bb4efb4404d0bf76e50c29baf70161810340f302aa1f</sum></package><package arch="noarch" name="iwl2000-firmware" release="56.el7" src="linux-firmware-20170606-56.gitc990aae.el7.src.rpm" version="18.168.6.1"><filename>iwl2000-firmware-18.168.6.1-56.el7.noarch.rpm</filename><sum type="sha256">a275929a7dcdc533e9693dc4b64bbacae34bc81c2f5595df74e486dd947a22c8</sum></package><package arch="noarch" name="iwl5150-firmware" release="56.el7" src="linux-firmware-20170606-56.gitc990aae.el7.src.rpm" version="8.24.2.2"><filename>iwl5150-firmware-8.24.2.2-56.el7.noarch.rpm</filename><sum type="sha256">4a457bddefa30c692754f631495b2599bfc0fa485d1060759c1d3114e775cdad</sum></package><package arch="noarch" name="iwl6000g2a-firmware" release="56.el7" src="linux-firmware-20170606-56.gitc990aae.el7.src.rpm" version="17.168.5.3"><filename>iwl6000g2a-firmware-17.168.5.3-56.el7.noarch.rpm</filename><sum type="sha256">fa44a37d9d717fac8ce2e778dffcf66810a39c25c8001f930e8159a99e342843</sum></package><package arch="noarch" name="iwl6000g2b-firmware" release="56.el7" src="linux-firmware-20170606-56.gitc990aae.el7.src.rpm" version="17.168.5.2"><filename>iwl6000g2b-firmware-17.168.5.2-56.el7.noarch.rpm</filename><sum type="sha256">3732a3b5252f5ab7871edfea56ce5c774d371044ea6a78c2c4548ff93b36ad22</sum></package><package arch="noarch" name="iwl7260-firmware" release="56.el7" src="linux-firmware-20170606-56.gitc990aae.el7.src.rpm" version="22.0.7.0"><filename>iwl7260-firmware-22.0.7.0-56.el7.noarch.rpm</filename><sum type="sha256">03525569b34a780c273811769894dcdaec56c0fb9220b059bbe000db871d79a0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:1960" id="RHBA-2017:1960-1" title="Rhba-2017:1960-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:1974-1</id><title>New Packages: Http-Parser</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="http-parser-devel" release="1.el7" src="http-parser-2.7.1-1.el7.src.rpm" version="2.7.1"><filename>http-parser-devel-2.7.1-1.el7.x86_64.rpm</filename><sum type="sha256">87a498fe0763196cd10f49e952da9aa463b8abeb8db51e74b7f707d4aeaefe46</sum></package><package arch="x86_64" name="http-parser" release="1.el7" src="http-parser-2.7.1-1.el7.src.rpm" version="2.7.1"><filename>http-parser-2.7.1-1.el7.x86_64.rpm</filename><sum type="sha256">0b8fc08ff0938dc906ea797bd5f994c235d931b0126b68f40b4fda952f4dbe1b</sum></package><package arch="i686" name="http-parser-devel" release="1.el7" src="http-parser-2.7.1-1.el7.src.rpm" version="2.7.1"><filename>http-parser-devel-2.7.1-1.el7.i686.rpm</filename><sum type="sha256">61556013e30887eb4cf9e4723af249d49bd83f5e15f2acc36c59e0dd260c71d5</sum></package><package arch="i686" name="http-parser" release="1.el7" src="http-parser-2.7.1-1.el7.src.rpm" version="2.7.1"><filename>http-parser-2.7.1-1.el7.i686.rpm</filename><sum type="sha256">b275b82080d31fb5675f803dcff4fe1bed386e9dfbb3382a1e5bd57261eea188</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:1974" id="RHBA-2017:1974-1" title="Rhba-2017:1974-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:1988-1</id><title>New Packages: Pulseaudio</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="webrtc-audio-processing" release="1.el7" src="webrtc-audio-processing-0.3-1.el7.src.rpm" version="0.3"><filename>webrtc-audio-processing-0.3-1.el7.i686.rpm</filename><sum type="sha256">5523fbc33e1545790e65d29d48d339c480011e90bb749529ad83af63670c1599</sum></package><package arch="x86_64" name="pulseaudio-gdm-hooks" release="3.el7" src="pulseaudio-10.0-3.el7.src.rpm" version="10.0"><filename>pulseaudio-gdm-hooks-10.0-3.el7.x86_64.rpm</filename><sum type="sha256">6bcc1414f833c09ae8512cd5230f000cbe3f19f91170e681d9ab1b0ff63e2401</sum></package><package arch="x86_64" name="pulseaudio-libs-glib2" release="3.el7" src="pulseaudio-10.0-3.el7.src.rpm" version="10.0"><filename>pulseaudio-libs-glib2-10.0-3.el7.x86_64.rpm</filename><sum type="sha256">fca0a28c4f8acd5a117b6a742b027643eb81856de822d41c3dd462deda28491d</sum></package><package arch="x86_64" name="pulseaudio-libs" release="3.el7" src="pulseaudio-10.0-3.el7.src.rpm" version="10.0"><filename>pulseaudio-libs-10.0-3.el7.x86_64.rpm</filename><sum type="sha256">d70d74835dae5680c1f4022b6eb26e8c660c6f2d495234f86051bec4840e53f5</sum></package><package arch="i686" name="pulseaudio-libs" release="3.el7" src="pulseaudio-10.0-3.el7.src.rpm" version="10.0"><filename>pulseaudio-libs-10.0-3.el7.i686.rpm</filename><sum type="sha256">d91dd9fc1a6fa0d4257681864c066225fa636de523fac17585d3828d43db7ea5</sum></package><package arch="x86_64" name="pulseaudio" release="3.el7" src="pulseaudio-10.0-3.el7.src.rpm" version="10.0"><filename>pulseaudio-10.0-3.el7.x86_64.rpm</filename><sum type="sha256">dc96df2bf1f002c06ec8db56014f9fb7255289228b59e398b6878ddec103e5f4</sum></package><package arch="x86_64" name="pulseaudio-module-gconf" release="3.el7" src="pulseaudio-10.0-3.el7.src.rpm" version="10.0"><filename>pulseaudio-module-gconf-10.0-3.el7.x86_64.rpm</filename><sum type="sha256">4e7e0980b9a2dade650bc9a5b7b2617f4478d20f6b6b1b78d95e811beab66ca7</sum></package><package arch="x86_64" name="pulseaudio-module-bluetooth" release="3.el7" src="pulseaudio-10.0-3.el7.src.rpm" version="10.0"><filename>pulseaudio-module-bluetooth-10.0-3.el7.x86_64.rpm</filename><sum type="sha256">42cca9211a94be4c61337f53985c5031a67cd901bc0700ad894465662f293ec9</sum></package><package arch="i686" name="gsound" release="2.el7" src="gsound-1.0.2-2.el7.src.rpm" version="1.0.2"><filename>gsound-1.0.2-2.el7.i686.rpm</filename><sum type="sha256">45e1878e755960d11d483b39c42d4e8fdcdc6a1332b7a9588574823d58cc3a13</sum></package><package arch="i686" name="pulseaudio-libs-devel" release="3.el7" src="pulseaudio-10.0-3.el7.src.rpm" version="10.0"><filename>pulseaudio-libs-devel-10.0-3.el7.i686.rpm</filename><sum type="sha256">54efb1f3d3b7bb730a0dc14bc730d27bd12e9698eb49acba6a30a102ff0610a5</sum></package><package arch="x86_64" name="pulseaudio-module-x11" release="3.el7" src="pulseaudio-10.0-3.el7.src.rpm" version="10.0"><filename>pulseaudio-module-x11-10.0-3.el7.x86_64.rpm</filename><sum type="sha256">318ce01ccbd0b526743671858033d05e4f1ff504cc72f902838c861cb8e892be</sum></package><package arch="x86_64" name="gsound" release="2.el7" src="gsound-1.0.2-2.el7.src.rpm" version="1.0.2"><filename>gsound-1.0.2-2.el7.x86_64.rpm</filename><sum type="sha256">e08153ba2fd57dc22954130e804c0781fdad80ec60b5ccb0b9859f72f794fd86</sum></package><package arch="x86_64" name="webrtc-audio-processing-devel" release="1.el7" src="webrtc-audio-processing-0.3-1.el7.src.rpm" version="0.3"><filename>webrtc-audio-processing-devel-0.3-1.el7.x86_64.rpm</filename><sum type="sha256">91465a3648c83b3b83d8b8baf3d4856d108c552bfa11276f4a926bc7b2338e76</sum></package><package arch="x86_64" name="webrtc-audio-processing" release="1.el7" src="webrtc-audio-processing-0.3-1.el7.src.rpm" version="0.3"><filename>webrtc-audio-processing-0.3-1.el7.x86_64.rpm</filename><sum type="sha256">862ae19bb33a0bae9c435229d6dae0c08c16044acb950853707eabb76aef9d97</sum></package><package arch="i686" name="gsound-devel" release="2.el7" src="gsound-1.0.2-2.el7.src.rpm" version="1.0.2"><filename>gsound-devel-1.0.2-2.el7.i686.rpm</filename><sum type="sha256">a44d31deccae830681ea70e0c67fd7f246446a59ec4cd8712b68e45e1015558c</sum></package><package arch="x86_64" name="pulseaudio-module-zeroconf" release="3.el7" src="pulseaudio-10.0-3.el7.src.rpm" version="10.0"><filename>pulseaudio-module-zeroconf-10.0-3.el7.x86_64.rpm</filename><sum type="sha256">12e6786e6b2a25388aa50dbdfefa62ce160cca34b94c8d61a120a3a8622a116e</sum></package><package arch="x86_64" name="pulseaudio-qpaeq" release="3.el7" src="pulseaudio-10.0-3.el7.src.rpm" version="10.0"><filename>pulseaudio-qpaeq-10.0-3.el7.x86_64.rpm</filename><sum type="sha256">128c1f1cae14920ec134310ff0264f4f8a76ab7447bac66b3ddc20a117be084c</sum></package><package arch="x86_64" name="gsound-devel" release="2.el7" src="gsound-1.0.2-2.el7.src.rpm" version="1.0.2"><filename>gsound-devel-1.0.2-2.el7.x86_64.rpm</filename><sum type="sha256">38d90da6245f892db73e16aa4d89fa760e9a580e7ce4c10cb31aadeb414dae9b</sum></package><package arch="i686" name="pulseaudio-libs-glib2" release="3.el7" src="pulseaudio-10.0-3.el7.src.rpm" version="10.0"><filename>pulseaudio-libs-glib2-10.0-3.el7.i686.rpm</filename><sum type="sha256">a21d287bbc927e180232b3a2e859b309d7c73b9ba9613b214a6bd328c7979f08</sum></package><package arch="i686" name="webrtc-audio-processing-devel" release="1.el7" src="webrtc-audio-processing-0.3-1.el7.src.rpm" version="0.3"><filename>webrtc-audio-processing-devel-0.3-1.el7.i686.rpm</filename><sum type="sha256">54dbd0afed7b3586ff79817e05c952e77b946b7244342629bdab24d4623edefa</sum></package><package arch="x86_64" name="pulseaudio-esound-compat" release="3.el7" src="pulseaudio-10.0-3.el7.src.rpm" version="10.0"><filename>pulseaudio-esound-compat-10.0-3.el7.x86_64.rpm</filename><sum type="sha256">926eb038c320191d2d056c7fa4b90c8a26b683263c8a2d125f57d1580194afd8</sum></package><package arch="x86_64" name="pulseaudio-utils" release="3.el7" src="pulseaudio-10.0-3.el7.src.rpm" version="10.0"><filename>pulseaudio-utils-10.0-3.el7.x86_64.rpm</filename><sum type="sha256">a3af78d58337a3a0df7c241d9d509bdf9d0c47d56d8e725848ad234b36a71867</sum></package><package arch="x86_64" name="pulseaudio-libs-devel" release="3.el7" src="pulseaudio-10.0-3.el7.src.rpm" version="10.0"><filename>pulseaudio-libs-devel-10.0-3.el7.x86_64.rpm</filename><sum type="sha256">c6b04ba0c279c5c536f7cbf82c2cc185d28b334554d5dcd39095839a49f7722d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:1988" id="RHBA-2017:1988-1" title="Rhba-2017:1988-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:1998-1</id><title>Webkitgtk+ Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="webkitgtk4" release="2.el7" src="webkitgtk4-2.14.7-2.el7.src.rpm" version="2.14.7"><filename>webkitgtk4-2.14.7-2.el7.i686.rpm</filename><sum type="sha256">a93f8c4601cadfed9e958299a1e0e6e49fab7d2a248e6ebb0a7b2e8638f83b63</sum></package><package arch="i686" name="webkitgtk4-plugin-process-gtk2" release="2.el7" src="webkitgtk4-2.14.7-2.el7.src.rpm" version="2.14.7"><filename>webkitgtk4-plugin-process-gtk2-2.14.7-2.el7.i686.rpm</filename><sum type="sha256">d81431bf252390ef5159c1588c18716a6b32f51504bb27371904a744b3757d7c</sum></package><package arch="i686" name="webkitgtk4-jsc" release="2.el7" src="webkitgtk4-2.14.7-2.el7.src.rpm" version="2.14.7"><filename>webkitgtk4-jsc-2.14.7-2.el7.i686.rpm</filename><sum type="sha256">4cf2b4692b782ba617cdcf57b54b0e6b67173bef9a7c9e8053adc23ae42e7739</sum></package><package arch="i686" name="webkitgtk3" release="2.el7" src="webkitgtk3-2.4.11-2.el7.src.rpm" version="2.4.11"><filename>webkitgtk3-2.4.11-2.el7.i686.rpm</filename><sum type="sha256">3234a5c4eed9e50a3c7e6bb9ab303be9f33be597e95fe1d7394f11aebb22b4f0</sum></package><package arch="x86_64" name="webkitgtk4" release="2.el7" src="webkitgtk4-2.14.7-2.el7.src.rpm" version="2.14.7"><filename>webkitgtk4-2.14.7-2.el7.x86_64.rpm</filename><sum type="sha256">dab4856a2f2f44ec327e1cacb24ed8141420fd5ba754e2ff115f190329d2b87c</sum></package><package arch="noarch" name="webkitgtk4-doc" release="2.el7" src="webkitgtk4-2.14.7-2.el7.src.rpm" version="2.14.7"><filename>webkitgtk4-doc-2.14.7-2.el7.noarch.rpm</filename><sum type="sha256">6468d7635973a4f3ca06a40a69b41e6aca5bde196e178a1a16d7cfa3d9104337</sum></package><package arch="i686" name="webkitgtk4-devel" release="2.el7" src="webkitgtk4-2.14.7-2.el7.src.rpm" version="2.14.7"><filename>webkitgtk4-devel-2.14.7-2.el7.i686.rpm</filename><sum type="sha256">9227943d65a8ff2ff0a4b58bd353e0dc1c63c73b9c0d589a7a7ef57c036e922d</sum></package><package arch="noarch" name="webkitgtk3-doc" release="2.el7" src="webkitgtk3-2.4.11-2.el7.src.rpm" version="2.4.11"><filename>webkitgtk3-doc-2.4.11-2.el7.noarch.rpm</filename><sum type="sha256">912e54ebeeedb6d259849cabafda2f0ebe12269be421e019b11f1f643a0d108d</sum></package><package arch="x86_64" name="webkitgtk3-devel" release="2.el7" src="webkitgtk3-2.4.11-2.el7.src.rpm" version="2.4.11"><filename>webkitgtk3-devel-2.4.11-2.el7.x86_64.rpm</filename><sum type="sha256">eadaa156efa0f8373bf2bddad72d0f7dc40b19024a49b524b513209397e233d1</sum></package><package arch="x86_64" name="webkitgtk4-jsc-devel" release="2.el7" src="webkitgtk4-2.14.7-2.el7.src.rpm" version="2.14.7"><filename>webkitgtk4-jsc-devel-2.14.7-2.el7.x86_64.rpm</filename><sum type="sha256">607c09b12d3bf70533799e72ebf0eee42f87116383cb9e5fa903bdd721918b23</sum></package><package arch="x86_64" name="webkitgtk4-jsc" release="2.el7" src="webkitgtk4-2.14.7-2.el7.src.rpm" version="2.14.7"><filename>webkitgtk4-jsc-2.14.7-2.el7.x86_64.rpm</filename><sum type="sha256">397a81048328dbee73f96185a23a5edf762bc5df8eded19c046bbc195bb74754</sum></package><package arch="x86_64" name="webkitgtk4-devel" release="2.el7" src="webkitgtk4-2.14.7-2.el7.src.rpm" version="2.14.7"><filename>webkitgtk4-devel-2.14.7-2.el7.x86_64.rpm</filename><sum type="sha256">73c2b8efd0e40d10195c37369c5507177857b9a4da7c111d9e6c4b7ba705935e</sum></package><package arch="i686" name="webkitgtk4-jsc-devel" release="2.el7" src="webkitgtk4-2.14.7-2.el7.src.rpm" version="2.14.7"><filename>webkitgtk4-jsc-devel-2.14.7-2.el7.i686.rpm</filename><sum type="sha256">4dcad35eb2fea97eaefa33c409b9d949a3e14ec5999cc128394e3fa29e86b175</sum></package><package arch="x86_64" name="webkitgtk4-plugin-process-gtk2" release="2.el7" src="webkitgtk4-2.14.7-2.el7.src.rpm" version="2.14.7"><filename>webkitgtk4-plugin-process-gtk2-2.14.7-2.el7.x86_64.rpm</filename><sum type="sha256">b6d443d8e74ad272ab90c6d012caf9ac22cea3c623d8b030a2de39b4f91a2d69</sum></package><package arch="i686" name="webkitgtk3-devel" release="2.el7" src="webkitgtk3-2.4.11-2.el7.src.rpm" version="2.4.11"><filename>webkitgtk3-devel-2.4.11-2.el7.i686.rpm</filename><sum type="sha256">a0609d5a999100657a1c702245b867dd119fbaae22adc6a1551eefa8f16a9089</sum></package><package arch="x86_64" name="webkitgtk3" release="2.el7" src="webkitgtk3-2.4.11-2.el7.src.rpm" version="2.4.11"><filename>webkitgtk3-2.4.11-2.el7.x86_64.rpm</filename><sum type="sha256">6dee3645b03e19036b807480b3a1f35068cd9b167a9b079234d48c8b16d1457b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:1998" id="RHBA-2017:1998-1" title="Rhba-2017:1998-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2005-1</id><title>Vinagre Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="vinagre" release="8.el7" src="vinagre-3.22.0-8.el7.src.rpm" version="3.22.0"><filename>vinagre-3.22.0-8.el7.i686.rpm</filename><sum type="sha256">0217b2edb1c42a0fe4f7a0094eacf7dfef6f54a34f0b9b2b38041ba50ade20f7</sum></package><package arch="x86_64" name="vino" release="3.el7" src="vino-3.22.0-3.el7.src.rpm" version="3.22.0"><filename>vino-3.22.0-3.el7.x86_64.rpm</filename><sum type="sha256">9a1784e1d5dbd8663c98b14ce42ae85346b2ced176761a71f79239db2ae5617b</sum></package><package arch="x86_64" name="vinagre" release="8.el7" src="vinagre-3.22.0-8.el7.src.rpm" version="3.22.0"><filename>vinagre-3.22.0-8.el7.x86_64.rpm</filename><sum type="sha256">8476790c7d111f495e551924460e0c4cd23f9d3eb56647c3bb0182cb3595fb28</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2005" id="RHBA-2017:2005-1" title="Rhba-2017:2005-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2030-1</id><title>Xorg Utilities Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-utils" release="20.el7" src="xorg-x11-server-utils-7.7-20.el7.src.rpm" version="7.7"><filename>xorg-x11-server-utils-7.7-20.el7.x86_64.rpm</filename><sum type="sha256">15dd662905e04eb13b6831a7b60d37c6a4e6fed55e19134d4085dbc183b9a645</sum></package><package arch="x86_64" name="xorg-x11-utils" release="22.el7" src="xorg-x11-utils-7.5-22.el7.src.rpm" version="7.5"><filename>xorg-x11-utils-7.5-22.el7.x86_64.rpm</filename><sum type="sha256">9a499eca9a67f2e3e361f9d729dd32ff6b42873b3812202ab263eb23e287d0cd</sum></package><package arch="x86_64" name="xorg-x11-apps" release="7.el7" src="xorg-x11-apps-7.7-7.el7.src.rpm" version="7.7"><filename>xorg-x11-apps-7.7-7.el7.x86_64.rpm</filename><sum type="sha256">a7074c5c3ee3ed1bdbf9219203a073fb85f6fd5caf948f021a9778108601c633</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2030" id="RHBA-2017:2030-1" title="Rhba-2017:2030-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2033-1</id><title>Gssproxy Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gssproxy" release="4.el7" src="gssproxy-0.7.0-4.el7.src.rpm" version="0.7.0"><filename>gssproxy-0.7.0-4.el7.x86_64.rpm</filename><sum type="sha256">4fffb51b30dcf6a465a8cb65684f619f95d17ef46f27e4b41e23e3414f42da48</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2033" id="RHBA-2017:2033-1" title="Rhba-2017:2033-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2057-1</id><title>Gnome-Contacts And Libchamplain Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gnome-contacts" release="1.el7" src="gnome-contacts-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>gnome-contacts-3.22.1-1.el7.x86_64.rpm</filename><sum type="sha256">63e3c7c69828f6c5b90d5dfa1c6f415d72d857804e01ad848e325a285df3b96c</sum></package><package arch="x86_64" name="libchamplain-gtk" release="1.el7" src="libchamplain-0.12.15-1.el7.src.rpm" version="0.12.15"><filename>libchamplain-gtk-0.12.15-1.el7.x86_64.rpm</filename><sum type="sha256">9bdfc18d20f5c6b568db38c6d51612d84136af12e31e0d22923a0c28889d94b8</sum></package><package arch="i686" name="libchamplain-gtk" release="1.el7" src="libchamplain-0.12.15-1.el7.src.rpm" version="0.12.15"><filename>libchamplain-gtk-0.12.15-1.el7.i686.rpm</filename><sum type="sha256">dbf2da264b1f2b8333c7ef979ca4465049cdb15f45d8acd04bbce06c91a0f886</sum></package><package arch="i686" name="libchamplain" release="1.el7" src="libchamplain-0.12.15-1.el7.src.rpm" version="0.12.15"><filename>libchamplain-0.12.15-1.el7.i686.rpm</filename><sum type="sha256">896affa525a271770b6d287ab53bf39608592d7ed935da12f5e795d8f83bd745</sum></package><package arch="i686" name="libchamplain-devel" release="1.el7" src="libchamplain-0.12.15-1.el7.src.rpm" version="0.12.15"><filename>libchamplain-devel-0.12.15-1.el7.i686.rpm</filename><sum type="sha256">f01991ba27bc1f3c637991d9dfcc3484c3c63fb9bbe8db75ed53fc84da7e1ed5</sum></package><package arch="x86_64" name="libchamplain" release="1.el7" src="libchamplain-0.12.15-1.el7.src.rpm" version="0.12.15"><filename>libchamplain-0.12.15-1.el7.x86_64.rpm</filename><sum type="sha256">2a25faa73ca326259ed2ca8ec389fd1d7567096b0f413189174a57391fb52120</sum></package><package arch="x86_64" name="libchamplain-devel" release="1.el7" src="libchamplain-0.12.15-1.el7.src.rpm" version="0.12.15"><filename>libchamplain-devel-0.12.15-1.el7.x86_64.rpm</filename><sum type="sha256">400f1373c3a0edec5000c81dacc53524d08ab497b6a20e4ff8a3351b67db0488</sum></package><package arch="noarch" name="libchamplain-demos" release="1.el7" src="libchamplain-0.12.15-1.el7.src.rpm" version="0.12.15"><filename>libchamplain-demos-0.12.15-1.el7.noarch.rpm</filename><sum type="sha256">1f5eea971f5e28c0ffdcc2a03e2fd19d28586f1f847f02c635e10e685e0e972c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2057" id="RHBA-2017:2057-1" title="Rhba-2017:2057-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2066-1</id><title>Evolution Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="evolution-data-server-devel" release="6.el7" src="evolution-data-server-3.22.7-6.el7.src.rpm" version="3.22.7"><filename>evolution-data-server-devel-3.22.7-6.el7.x86_64.rpm</filename><sum type="sha256">b595bc57f1c943ec06d887f90f5a8ce4b293bcb58a971c97edb58bc66a0e82b1</sum></package><package arch="i686" name="evolution-data-server-tests" release="6.el7" src="evolution-data-server-3.22.7-6.el7.src.rpm" version="3.22.7"><filename>evolution-data-server-tests-3.22.7-6.el7.i686.rpm</filename><sum type="sha256">f0c5394e205a540ba0d8f5451e579d2af9fdaed09cbfb67fefe92b67ae0f33ed</sum></package><package arch="x86_64" name="libcryptui" release="1.el7" src="libcryptui-3.12.2-1.el7.src.rpm" version="3.12.2"><filename>libcryptui-3.12.2-1.el7.x86_64.rpm</filename><sum type="sha256">c88e972d910ec744f20846cc1741cddd439703d60ca9c15beeeaa022e5cecc7d</sum></package><package arch="i686" name="evolution" release="10.el7" src="evolution-3.22.6-10.el7.src.rpm" version="3.22.6"><filename>evolution-3.22.6-10.el7.i686.rpm</filename><sum type="sha256">1b6e35ddb55ee32ea1656fc59c52c59191210d4a4a4aa6dc04a6c0d644a319cb</sum></package><package arch="i686" name="evolution-mapi-devel" release="1.el7" src="evolution-mapi-3.22.6-1.el7.src.rpm" version="3.22.6"><filename>evolution-mapi-devel-3.22.6-1.el7.i686.rpm</filename><sum type="sha256">d58fe2ce74d5d3380c5a122a22bb3f69bd06d527d58c8c0a60d029f060a07993</sum></package><package arch="x86_64" name="evolution-bogofilter" release="10.el7" src="evolution-3.22.6-10.el7.src.rpm" version="3.22.6"><filename>evolution-bogofilter-3.22.6-10.el7.x86_64.rpm</filename><sum type="sha256">08d0feb1567de0b48fae6a625f32a937a69eb1813254eace54dec2b47b1ff384</sum></package><package arch="noarch" name="evolution-data-server-doc" release="6.el7" src="evolution-data-server-3.22.7-6.el7.src.rpm" version="3.22.7"><filename>evolution-data-server-doc-3.22.7-6.el7.noarch.rpm</filename><sum type="sha256">d6bcc6d909869617f0b8a1d56632cb167a494db87654cf42d6fec621d0602d57</sum></package><package arch="i686" name="evolution-data-server-devel" release="6.el7" src="evolution-data-server-3.22.7-6.el7.src.rpm" version="3.22.7"><filename>evolution-data-server-devel-3.22.7-6.el7.i686.rpm</filename><sum type="sha256">e2e47cd49a597ae6661079a3d8933ac8399a66172cdd28ade7b5970fdb7eacdd</sum></package><package arch="x86_64" name="evolution-data-server-tests" release="6.el7" src="evolution-data-server-3.22.7-6.el7.src.rpm" version="3.22.7"><filename>evolution-data-server-tests-3.22.7-6.el7.x86_64.rpm</filename><sum type="sha256">a10a78fb95e08f76d2c322c76f75759078c64e012046a822dfa8bb45a34f8b05</sum></package><package arch="i686" name="evolution-data-server" release="6.el7" src="evolution-data-server-3.22.7-6.el7.src.rpm" version="3.22.7"><filename>evolution-data-server-3.22.7-6.el7.i686.rpm</filename><sum type="sha256">1ec0de1afc363b87c50e8e792dfb824d6b0f672bebcef67f5a5b6202de382aef</sum></package><package arch="x86_64" name="ekiga" release="7.el7" src="ekiga-4.0.1-7.el7.src.rpm" version="4.0.1"><filename>ekiga-4.0.1-7.el7.x86_64.rpm</filename><sum type="sha256">73d8896774960d58a9ca36e1eae6ddd9f70a7d7e1c3fe47e3f800b2c4ea6599f</sum></package><package arch="x86_64" name="evolution-mapi-devel" release="1.el7" src="evolution-mapi-3.22.6-1.el7.src.rpm" version="3.22.6"><filename>evolution-mapi-devel-3.22.6-1.el7.x86_64.rpm</filename><sum type="sha256">08e66bdb5a88578b95ada9675b4ffa82290472133dc154266719b6ae292430d4</sum></package><package arch="x86_64" name="evolution-data-server-perl" release="6.el7" src="evolution-data-server-3.22.7-6.el7.src.rpm" version="3.22.7"><filename>evolution-data-server-perl-3.22.7-6.el7.x86_64.rpm</filename><sum type="sha256">188964a0f609ced4b7ca1901d1bd8ac1008ba3a1d2655502ef7e14bafbe7577c</sum></package><package arch="x86_64" name="libcryptui-devel" release="1.el7" src="libcryptui-3.12.2-1.el7.src.rpm" version="3.12.2"><filename>libcryptui-devel-3.12.2-1.el7.x86_64.rpm</filename><sum type="sha256">7b7e244e0c24ce026ac069c0212836ba2e79fb6404dcd9ef1d12aec8fd503fcc</sum></package><package arch="x86_64" name="evolution-mapi" release="1.el7" src="evolution-mapi-3.22.6-1.el7.src.rpm" version="3.22.6"><filename>evolution-mapi-3.22.6-1.el7.x86_64.rpm</filename><sum type="sha256">c79e43605e51023b5bf4095fd84dfe92354d956c2e5e8ba0ccf4e7f0c1a52487</sum></package><package arch="noarch" name="evolution-devel-docs" release="10.el7" src="evolution-3.22.6-10.el7.src.rpm" version="3.22.6"><filename>evolution-devel-docs-3.22.6-10.el7.noarch.rpm</filename><sum type="sha256">effded9eff457b6ea23a997e4164fc4ec057356f3ac23ede236327ca018bd9d5</sum></package><package arch="i686" name="evolution-ews" release="6.el7" src="evolution-ews-3.22.6-6.el7.src.rpm" version="3.22.6"><filename>evolution-ews-3.22.6-6.el7.i686.rpm</filename><sum type="sha256">4aead100a337e1f587dc11c099bfc3618529a5a7297a001d68b59e8efbdb0868</sum></package><package arch="i686" name="libcryptui" release="1.el7" src="libcryptui-3.12.2-1.el7.src.rpm" version="3.12.2"><filename>libcryptui-3.12.2-1.el7.i686.rpm</filename><sum type="sha256">16de50a1a220d2a709c8ecb88c0b752a405017899078b66449d5ff302b85d618</sum></package><package arch="x86_64" name="evolution-pst" release="10.el7" src="evolution-3.22.6-10.el7.src.rpm" version="3.22.6"><filename>evolution-pst-3.22.6-10.el7.x86_64.rpm</filename><sum type="sha256">6b2ea6e12bc3e509cdcabf073e6ad3d27e8f0a1948df9f0a4c162b34aa223fac</sum></package><package arch="x86_64" name="evolution-ews" release="6.el7" src="evolution-ews-3.22.6-6.el7.src.rpm" version="3.22.6"><filename>evolution-ews-3.22.6-6.el7.x86_64.rpm</filename><sum type="sha256">7b6a4b60818dc02bd5304e49097f5121cbf031f0ce73d1873e685fd74e7ab278</sum></package><package arch="i686" name="evolution-devel" release="10.el7" src="evolution-3.22.6-10.el7.src.rpm" version="3.22.6"><filename>evolution-devel-3.22.6-10.el7.i686.rpm</filename><sum type="sha256">231c451fe073808daf31a13e6bb20b3181ee9f8cfb37e05a95262a189d215a81</sum></package><package arch="x86_64" name="evolution-devel" release="10.el7" src="evolution-3.22.6-10.el7.src.rpm" version="3.22.6"><filename>evolution-devel-3.22.6-10.el7.x86_64.rpm</filename><sum type="sha256">65f1a8d89c149d1cb2e7fe55f7040f97d52f54895c31091224a2ce30f149d26d</sum></package><package arch="x86_64" name="evolution-data-server" release="6.el7" src="evolution-data-server-3.22.7-6.el7.src.rpm" version="3.22.7"><filename>evolution-data-server-3.22.7-6.el7.x86_64.rpm</filename><sum type="sha256">45d639081fee593263bb2a2e579eef6f0d8e98a6d6b501f4e560ef67beb98cfe</sum></package><package arch="x86_64" name="evolution-perl" release="10.el7" src="evolution-3.22.6-10.el7.src.rpm" version="3.22.6"><filename>evolution-perl-3.22.6-10.el7.x86_64.rpm</filename><sum type="sha256">3c047e9a86db6054dd50c648736edba1f4a8e8ec0d7b07d9297958d03146d982</sum></package><package arch="x86_64" name="evolution" release="10.el7" src="evolution-3.22.6-10.el7.src.rpm" version="3.22.6"><filename>evolution-3.22.6-10.el7.x86_64.rpm</filename><sum type="sha256">54742b2e6e07a230db035d7cdcdf59f5bad69aa5859a13e43b39f51590522530</sum></package><package arch="i686" name="libcryptui-devel" release="1.el7" src="libcryptui-3.12.2-1.el7.src.rpm" version="3.12.2"><filename>libcryptui-devel-3.12.2-1.el7.i686.rpm</filename><sum type="sha256">772a9e8f61cdf0d8350d64b316385abaa386548f3a0eea4cd44806993e9271a0</sum></package><package arch="noarch" name="evolution-help" release="10.el7" src="evolution-3.22.6-10.el7.src.rpm" version="3.22.6"><filename>evolution-help-3.22.6-10.el7.noarch.rpm</filename><sum type="sha256">3db5c1f9417bb6f067abd7306e951b0569702742277b1f1b37ca9a62119a5698</sum></package><package arch="x86_64" name="evolution-spamassassin" release="10.el7" src="evolution-3.22.6-10.el7.src.rpm" version="3.22.6"><filename>evolution-spamassassin-3.22.6-10.el7.x86_64.rpm</filename><sum type="sha256">f96653787b4b3ba6bc6070a6256b61d7b0adef1b686678b35ef315a9bce4b634</sum></package><package arch="i686" name="evolution-mapi" release="1.el7" src="evolution-mapi-3.22.6-1.el7.src.rpm" version="3.22.6"><filename>evolution-mapi-3.22.6-1.el7.i686.rpm</filename><sum type="sha256">735d5ea14d1b266a01cf86c7b10d6c40ccd42b401f55a4950770ce2050e295f6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2066" id="RHBA-2017:2066-1" title="Rhba-2017:2066-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2076-1</id><title>Dracut Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="dracut" release="502.el7" src="dracut-033-502.el7.src.rpm" version="033"><filename>dracut-033-502.el7.x86_64.rpm</filename><sum type="sha256">3e9a8eaad3f0e280f4fbcea860c1831411d42b301457a4aa4b586277b7e75ffb</sum></package><package arch="x86_64" name="dracut-network" release="502.el7" src="dracut-033-502.el7.src.rpm" version="033"><filename>dracut-network-033-502.el7.x86_64.rpm</filename><sum type="sha256">58ef49aec9dea8e2486fd940901fc23fd81811f513765575b6e9975deeddeac5</sum></package><package arch="x86_64" name="dracut-caps" release="502.el7" src="dracut-033-502.el7.src.rpm" version="033"><filename>dracut-caps-033-502.el7.x86_64.rpm</filename><sum type="sha256">4c27d3afd4fb4433100b206457a6ae812831d19b579ef83994bc3221001b4520</sum></package><package arch="x86_64" name="dracut-fips" release="502.el7" src="dracut-033-502.el7.src.rpm" version="033"><filename>dracut-fips-033-502.el7.x86_64.rpm</filename><sum type="sha256">45054cd0b642d339f4df28def50c1e0fadc8922c46f6e2b449768d35eb3da9f7</sum></package><package arch="x86_64" name="dracut-tools" release="502.el7" src="dracut-033-502.el7.src.rpm" version="033"><filename>dracut-tools-033-502.el7.x86_64.rpm</filename><sum type="sha256">ffac90c00536305a975f4a2ef695f087659d7680cc7d28df8c348cef581cf48b</sum></package><package arch="x86_64" name="dracut-fips-aesni" release="502.el7" src="dracut-033-502.el7.src.rpm" version="033"><filename>dracut-fips-aesni-033-502.el7.x86_64.rpm</filename><sum type="sha256">257cd24262166de9dfc6375acc7c409c47c82bcfcc4f8c5551e72e15309c6ad6</sum></package><package arch="x86_64" name="dracut-config-generic" release="502.el7" src="dracut-033-502.el7.src.rpm" version="033"><filename>dracut-config-generic-033-502.el7.x86_64.rpm</filename><sum type="sha256">85e179d2856446746a697f0cf5f4817fda466eaf3d851ffbc08803545521e651</sum></package><package arch="x86_64" name="dracut-config-rescue" release="502.el7" src="dracut-033-502.el7.src.rpm" version="033"><filename>dracut-config-rescue-033-502.el7.x86_64.rpm</filename><sum type="sha256">5645183fd1e3f39f2c00ee3cc41e8c8f7d0b18db658a55c5ed7a7a18e01ce909</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2076" id="RHBA-2017:2076-1" title="Rhba-2017:2076-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2079-1</id><title>Tomcatjss Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcatjss" release="6.el7" src="tomcatjss-7.2.1-6.el7.src.rpm" version="7.2.1"><filename>tomcatjss-7.2.1-6.el7.noarch.rpm</filename><sum type="sha256">4b50989b5c1325ff43f0b2bdca503eaca46559925d06a4f1f9f8a17fa57d7da6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2079" id="RHBA-2017:2079-1" title="Rhba-2017:2079-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2081-1</id><title>Empathy Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="folks" release="1.el7" src="folks-0.11.3-1.el7.src.rpm" version="0.11.3"><filename>folks-0.11.3-1.el7.x86_64.rpm</filename><sum type="sha256">6bc304cfcaa3f19059e27cff5d30213b1d20edd7d9c75fde45bc101bbcaca528</sum></package><package arch="x86_64" epoch="1" name="folks-devel" release="1.el7" src="folks-0.11.3-1.el7.src.rpm" version="0.11.3"><filename>folks-devel-0.11.3-1.el7.x86_64.rpm</filename><sum type="sha256">a4f94e2735f17650f40c9fa4af28b1d7f5106fe2975a406ec61b3763618015f9</sum></package><package arch="x86_64" name="empathy" release="4.el7" src="empathy-3.12.12-4.el7.src.rpm" version="3.12.12"><filename>empathy-3.12.12-4.el7.x86_64.rpm</filename><sum type="sha256">c3af3bf6ff946d0a02449b47a8ab25581985092818cc73f98995e9198be6d802</sum></package><package arch="x86_64" epoch="1" name="folks-tools" release="1.el7" src="folks-0.11.3-1.el7.src.rpm" version="0.11.3"><filename>folks-tools-0.11.3-1.el7.x86_64.rpm</filename><sum type="sha256">bc4ed9951f8ee54be35772ae720e48034a06ee36fc2b1228a369cca0a99eff4c</sum></package><package arch="i686" epoch="1" name="folks-devel" release="1.el7" src="folks-0.11.3-1.el7.src.rpm" version="0.11.3"><filename>folks-devel-0.11.3-1.el7.i686.rpm</filename><sum type="sha256">6b0562c7db17af47a0b06db32119d06267261d88aa37f00161cb5168a8a1ad96</sum></package><package arch="i686" epoch="1" name="folks-tools" release="1.el7" src="folks-0.11.3-1.el7.src.rpm" version="0.11.3"><filename>folks-tools-0.11.3-1.el7.i686.rpm</filename><sum type="sha256">226a8a254b48c90facd63d09bd35e412f93b15dd23eb1f191497b35bccfbb1ca</sum></package><package arch="i686" epoch="1" name="folks" release="1.el7" src="folks-0.11.3-1.el7.src.rpm" version="0.11.3"><filename>folks-0.11.3-1.el7.i686.rpm</filename><sum type="sha256">e533dd58e340a239aca8d6c1a69caede27572e67170746537481cd0d2765892e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2081" id="RHBA-2017:2081-1" title="Rhba-2017:2081-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2086-1</id><title>389-Ds-Base Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-devel" release="16.el7" src="389-ds-base-1.3.6.1-16.el7.src.rpm" version="1.3.6.1"><filename>389-ds-base-devel-1.3.6.1-16.el7.x86_64.rpm</filename><sum type="sha256">0b81228c110692c35b61bfda90804c6e396417bd712c3b08ebe17337640947b6</sum></package><package arch="x86_64" name="389-ds-base-libs" release="16.el7" src="389-ds-base-1.3.6.1-16.el7.src.rpm" version="1.3.6.1"><filename>389-ds-base-libs-1.3.6.1-16.el7.x86_64.rpm</filename><sum type="sha256">4bc41f80eaffaaaf8466788adc5f1fef5a6098d6de2739e2914293f65ce7a2bb</sum></package><package arch="x86_64" name="389-ds-base-snmp" release="16.el7" src="389-ds-base-1.3.6.1-16.el7.src.rpm" version="1.3.6.1"><filename>389-ds-base-snmp-1.3.6.1-16.el7.x86_64.rpm</filename><sum type="sha256">11705cd74f17d87080cb31811c0ecb4057b08163e2955d4d3025779744bb7e18</sum></package><package arch="x86_64" name="389-ds-base" release="16.el7" src="389-ds-base-1.3.6.1-16.el7.src.rpm" version="1.3.6.1"><filename>389-ds-base-1.3.6.1-16.el7.x86_64.rpm</filename><sum type="sha256">519e79d836a88dd5ef501d559754f734170eeb80ee7b25ed90fc19aad3ff534a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2086" id="RHBA-2017:2086-1" title="Rhba-2017:2086-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2087-1</id><title>Svrcore Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-09-05 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="svrcore" release="2.el7" src="svrcore-4.1.3-2.el7.src.rpm" version="4.1.3"><filename>svrcore-4.1.3-2.el7.x86_64.rpm</filename><sum type="sha256">94e168a3aefbaa693138755809d589de54a10d1d4cb05ada699f4484c6f9f0be</sum></package><package arch="x86_64" name="svrcore-devel" release="2.el7" src="svrcore-4.1.3-2.el7.src.rpm" version="4.1.3"><filename>svrcore-devel-4.1.3-2.el7.x86_64.rpm</filename><sum type="sha256">c5170130d1149bc499ce5cf3c149f53f9d9da3694112372bf3c0ab7a469b0d04</sum></package><package arch="i686" name="svrcore" release="2.el7" src="svrcore-4.1.3-2.el7.src.rpm" version="4.1.3"><filename>svrcore-4.1.3-2.el7.i686.rpm</filename><sum type="sha256">08e0976bea3c73e7dd65e78b24c46e0331296f4568f83917ad1ad5684f4b5abb</sum></package><package arch="i686" name="svrcore-devel" release="2.el7" src="svrcore-4.1.3-2.el7.src.rpm" version="4.1.3"><filename>svrcore-devel-4.1.3-2.el7.i686.rpm</filename><sum type="sha256">2757d2c10afa4d712cfef1bc7f82c7ce315d841660526a4b13eae186f02612b1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2087" id="RHBA-2017:2087-1" title="Rhba-2017:2087-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2090-1</id><title>Jss Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="jss-javadoc" release="7.el7" src="jss-4.4.0-7.el7.src.rpm" version="4.4.0"><filename>jss-javadoc-4.4.0-7.el7.x86_64.rpm</filename><sum type="sha256">2eb5ec838dd0fa6682fef96255ea295cf0debf2d4054ae7acf6b2dbdd70853fb</sum></package><package arch="x86_64" name="jss" release="7.el7" src="jss-4.4.0-7.el7.src.rpm" version="4.4.0"><filename>jss-4.4.0-7.el7.x86_64.rpm</filename><sum type="sha256">478b285cf696b94cfc014bddda99755c7d9ef6c137f12e29de3f02972ed6c91a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2090" id="RHBA-2017:2090-1" title="Rhba-2017:2090-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2092-1</id><title>Libmediaart, Tracker, Compat-Libmediaart0 Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="tracker" release="4.el7" src="tracker-1.10.5-4.el7.src.rpm" version="1.10.5"><filename>tracker-1.10.5-4.el7.x86_64.rpm</filename><sum type="sha256">39f246487ec605adf1f00188b6a4af6e662538fa5313f605b475019d546f2c0d</sum></package><package arch="x86_64" name="tracker-preferences" release="4.el7" src="tracker-1.10.5-4.el7.src.rpm" version="1.10.5"><filename>tracker-preferences-1.10.5-4.el7.x86_64.rpm</filename><sum type="sha256">96833e718822f4e079924b2022e2315e4a7d363428ef520f26195c448578dae9</sum></package><package arch="i686" name="compat-libmediaart0" release="1.el7" src="compat-libmediaart0-0.7.0-1.el7.src.rpm" version="0.7.0"><filename>compat-libmediaart0-0.7.0-1.el7.i686.rpm</filename><sum type="sha256">793da379edaf3f25e808a60e7130d6157f0e5931b5c8f9fca53f1a68ca39e344</sum></package><package arch="x86_64" name="libmediaart-tests" release="1.el7" src="libmediaart-1.9.1-1.el7.src.rpm" version="1.9.1"><filename>libmediaart-tests-1.9.1-1.el7.x86_64.rpm</filename><sum type="sha256">2ba2c896fe4595c1e2b7394d25706cac27d4762956557969c76dce17418d1e7d</sum></package><package arch="x86_64" name="tracker-needle" release="4.el7" src="tracker-1.10.5-4.el7.src.rpm" version="1.10.5"><filename>tracker-needle-1.10.5-4.el7.x86_64.rpm</filename><sum type="sha256">1bdc4558958b7f78a5cb4e621de32386afce75cee9c1562d246a970e89d97fb0</sum></package><package arch="x86_64" name="libmediaart" release="1.el7" src="libmediaart-1.9.1-1.el7.src.rpm" version="1.9.1"><filename>libmediaart-1.9.1-1.el7.x86_64.rpm</filename><sum type="sha256">baebc439c026e2147338d5af96fe1ffd3a79cdfa0314841661ee2b21644bcf4a</sum></package><package arch="x86_64" name="tracker-devel" release="4.el7" src="tracker-1.10.5-4.el7.src.rpm" version="1.10.5"><filename>tracker-devel-1.10.5-4.el7.x86_64.rpm</filename><sum type="sha256">888d20fe0b8d6d3766fc78d38bf8c33df79793c976581a74758dab35e0f1cec9</sum></package><package arch="x86_64" name="libmediaart-devel" release="1.el7" src="libmediaart-1.9.1-1.el7.src.rpm" version="1.9.1"><filename>libmediaart-devel-1.9.1-1.el7.x86_64.rpm</filename><sum type="sha256">32ad78a1ee874aa50a967be54176131413150c77b7859c722cf2118ea833f439</sum></package><package arch="i686" name="tracker" release="4.el7" src="tracker-1.10.5-4.el7.src.rpm" version="1.10.5"><filename>tracker-1.10.5-4.el7.i686.rpm</filename><sum type="sha256">3049f13205396a53a5f8d45076ec609b58faf2496d0df0c3c90399dd8cdb494d</sum></package><package arch="i686" name="libmediaart" release="1.el7" src="libmediaart-1.9.1-1.el7.src.rpm" version="1.9.1"><filename>libmediaart-1.9.1-1.el7.i686.rpm</filename><sum type="sha256">27cc27721dad244b6aaf6412c99ca1e5f5cd25d2161865bec7d056450454b52d</sum></package><package arch="noarch" name="tracker-docs" release="4.el7" src="tracker-1.10.5-4.el7.src.rpm" version="1.10.5"><filename>tracker-docs-1.10.5-4.el7.noarch.rpm</filename><sum type="sha256">f8ccd13e3aa0633ca6658e3682139a09f2f4d85a2136d8c2dd13774e978004ad</sum></package><package arch="i686" name="libmediaart-devel" release="1.el7" src="libmediaart-1.9.1-1.el7.src.rpm" version="1.9.1"><filename>libmediaart-devel-1.9.1-1.el7.i686.rpm</filename><sum type="sha256">0b2cad665844613309ded9ee05e5b4ae9e4b5b1aa6e282e5c6eb02e3ec8e36fd</sum></package><package arch="x86_64" name="compat-libmediaart0" release="1.el7" src="compat-libmediaart0-0.7.0-1.el7.src.rpm" version="0.7.0"><filename>compat-libmediaart0-0.7.0-1.el7.x86_64.rpm</filename><sum type="sha256">890acff3e67a2307453d9f0d5a2dedd5555163ebd6a4cbb8ea858f0826a3aa83</sum></package><package arch="i686" name="tracker-devel" release="4.el7" src="tracker-1.10.5-4.el7.src.rpm" version="1.10.5"><filename>tracker-devel-1.10.5-4.el7.i686.rpm</filename><sum type="sha256">f1c4d8a1087cbe6b5ee50c92924bf44d85779a604a2b698c8301db93e14f60cb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2092" id="RHBA-2017:2092-1" title="Rhba-2017:2092-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2096-1</id><title>Control-Center, Accountsservice, Gnome-Settings-Daemon, Libgnomekbd Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="control-center" release="5.el7" src="control-center-3.22.2-5.el7.src.rpm" version="3.22.2"><filename>control-center-3.22.2-5.el7.i686.rpm</filename><sum type="sha256">fa2759dadb4dcb6011126109b8280dd9ec61dadf4a83233f39ed756d3b42212b</sum></package><package arch="i686" name="accountsservice-libs" release="2.el7" src="accountsservice-0.6.45-2.el7.src.rpm" version="0.6.45"><filename>accountsservice-libs-0.6.45-2.el7.i686.rpm</filename><sum type="sha256">d3323ade912973e350a9abba9720795d694977670af0de5bd65c9a2644609399</sum></package><package arch="x86_64" name="gsettings-desktop-schemas" release="1.el7" src="gsettings-desktop-schemas-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gsettings-desktop-schemas-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">c90c2435590692ad9b2b796028a665a91155fb015f5f004f889e2ca2b7bfebce</sum></package><package arch="i686" name="accountsservice-devel" release="2.el7" src="accountsservice-0.6.45-2.el7.src.rpm" version="0.6.45"><filename>accountsservice-devel-0.6.45-2.el7.i686.rpm</filename><sum type="sha256">9fd751ee7798e49c9aa2b1efbb2bbf98e2362fe20de1eeb4b45cf3b09a2e78dd</sum></package><package arch="x86_64" name="gnome-settings-daemon-devel" release="5.el7" src="gnome-settings-daemon-3.22.2-5.el7.src.rpm" version="3.22.2"><filename>gnome-settings-daemon-devel-3.22.2-5.el7.x86_64.rpm</filename><sum type="sha256">9220ef4af59957fc5da6f397d754659c3a096c955be84495b4fc05fbd72540be</sum></package><package arch="i686" name="libgnomekbd-devel" release="1.el7" src="libgnomekbd-3.22.0.1-1.el7.src.rpm" version="3.22.0.1"><filename>libgnomekbd-devel-3.22.0.1-1.el7.i686.rpm</filename><sum type="sha256">706b925f55ffc6c495edc3e4507f8ca0d27a8cf92e0931a08bb22266f2a4d07c</sum></package><package arch="i686" epoch="1" name="gnome-bluetooth-libs-devel" release="1.el7" src="gnome-bluetooth-3.20.1-1.el7.src.rpm" version="3.20.1"><filename>gnome-bluetooth-libs-devel-3.20.1-1.el7.i686.rpm</filename><sum type="sha256">fba3ffdd0b66cf1f47ca2b8763c2896f4bb8c1d39e2636442c34a78e5b9935fe</sum></package><package arch="x86_64" name="gnome-desktop3-devel" release="2.el7" src="gnome-desktop3-3.22.2-2.el7.src.rpm" version="3.22.2"><filename>gnome-desktop3-devel-3.22.2-2.el7.x86_64.rpm</filename><sum type="sha256">fc248f4fc716bd7b61e9aab472e3f4a19df247c664340ed9b9e7dc72948e55f6</sum></package><package arch="x86_64" name="gnome-desktop3" release="2.el7" src="gnome-desktop3-3.22.2-2.el7.src.rpm" version="3.22.2"><filename>gnome-desktop3-3.22.2-2.el7.x86_64.rpm</filename><sum type="sha256">1e8213f36a496ef713c4434d2455c165451103aef6d583b7382f558999e7c18a</sum></package><package arch="x86_64" epoch="1" name="gnome-bluetooth-libs" release="1.el7" src="gnome-bluetooth-3.20.1-1.el7.src.rpm" version="3.20.1"><filename>gnome-bluetooth-libs-3.20.1-1.el7.x86_64.rpm</filename><sum type="sha256">e5d8a9a9cbce1e6916f1d6c2967a4dcaac56055f8f39b0427ff065b14ec311c6</sum></package><package arch="x86_64" name="gnome-desktop3-tests" release="2.el7" src="gnome-desktop3-3.22.2-2.el7.src.rpm" version="3.22.2"><filename>gnome-desktop3-tests-3.22.2-2.el7.x86_64.rpm</filename><sum type="sha256">b268e711f3afadb8086e0e76ac276c0f45336c0cdc0eaaae0455467d9de1458e</sum></package><package arch="x86_64" epoch="1" name="gnome-bluetooth" release="1.el7" src="gnome-bluetooth-3.20.1-1.el7.src.rpm" version="3.20.1"><filename>gnome-bluetooth-3.20.1-1.el7.x86_64.rpm</filename><sum type="sha256">68ea26bb76c58e8d3d311d2e94d1048b28b835b4852a91e0611fc04a0bd0e67c</sum></package><package arch="x86_64" name="compat-gnome-desktop314" release="1.el7" src="compat-gnome-desktop314-3.14.2-1.el7.src.rpm" version="3.14.2"><filename>compat-gnome-desktop314-3.14.2-1.el7.x86_64.rpm</filename><sum type="sha256">a11bb6ea7aaca9144b97b2703d18553b861c238379e95b3afb0b69d0c8580aff</sum></package><package arch="i686" name="gsettings-desktop-schemas-devel" release="1.el7" src="gsettings-desktop-schemas-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gsettings-desktop-schemas-devel-3.22.0-1.el7.i686.rpm</filename><sum type="sha256">180b8b3c60ffc857306d4ab60ec8dbd5ddeb5ac55cc643e97dea2cf6c4ba7f5d</sum></package><package arch="x86_64" epoch="1" name="control-center-filesystem" release="5.el7" src="control-center-3.22.2-5.el7.src.rpm" version="3.22.2"><filename>control-center-filesystem-3.22.2-5.el7.x86_64.rpm</filename><sum type="sha256">aafcfb7f59ab6fa9cb5ce55d8e41356086e19eaea7139390411186fd106ca623</sum></package><package arch="i686" epoch="1" name="gnome-bluetooth" release="1.el7" src="gnome-bluetooth-3.20.1-1.el7.src.rpm" version="3.20.1"><filename>gnome-bluetooth-3.20.1-1.el7.i686.rpm</filename><sum type="sha256">b44782415d32ed0c500af9a6ca704dac50c6c67d561f7002396b21ac88051b95</sum></package><package arch="i686" name="gsettings-desktop-schemas" release="1.el7" src="gsettings-desktop-schemas-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gsettings-desktop-schemas-3.22.0-1.el7.i686.rpm</filename><sum type="sha256">dbd331ae7648c6c10b55d94f17c4ce8c18e1bf6df4f3a3bdc871bfb32547c48f</sum></package><package arch="i686" name="gnome-settings-daemon-devel" release="5.el7" src="gnome-settings-daemon-3.22.2-5.el7.src.rpm" version="3.22.2"><filename>gnome-settings-daemon-devel-3.22.2-5.el7.i686.rpm</filename><sum type="sha256">57231321fa530126840f145eb55ebfcbec0861841ce8aefcf444ab19f3f952f4</sum></package><package arch="i686" name="gnome-settings-daemon" release="5.el7" src="gnome-settings-daemon-3.22.2-5.el7.src.rpm" version="3.22.2"><filename>gnome-settings-daemon-3.22.2-5.el7.i686.rpm</filename><sum type="sha256">31dec109593861ae32d790b9dca14eea1ad7014f5262dd73b09777dda9c7a237</sum></package><package arch="x86_64" name="accountsservice-libs" release="2.el7" src="accountsservice-0.6.45-2.el7.src.rpm" version="0.6.45"><filename>accountsservice-libs-0.6.45-2.el7.x86_64.rpm</filename><sum type="sha256">052b4a4bbf79de6d3e6de5af48bdddcf5e6ff35b35ed4ea942fe74b95a3ec73d</sum></package><package arch="i686" epoch="1" name="gnome-bluetooth-libs" release="1.el7" src="gnome-bluetooth-3.20.1-1.el7.src.rpm" version="3.20.1"><filename>gnome-bluetooth-libs-3.20.1-1.el7.i686.rpm</filename><sum type="sha256">489310110465340de4ee61543ea969ef2bf6d018edf5519b7ef359484966f891</sum></package><package arch="i686" name="libgnomekbd" release="1.el7" src="libgnomekbd-3.22.0.1-1.el7.src.rpm" version="3.22.0.1"><filename>libgnomekbd-3.22.0.1-1.el7.i686.rpm</filename><sum type="sha256">c4975e8c396b9a4649b48aa869e453074e20e9934d7dd965c2f80c0d0040046a</sum></package><package arch="x86_64" epoch="1" name="control-center" release="5.el7" src="control-center-3.22.2-5.el7.src.rpm" version="3.22.2"><filename>control-center-3.22.2-5.el7.x86_64.rpm</filename><sum type="sha256">6828d63ab336f6e40e9567b0a3eb423588268f61c9dce202d907019ea746d6f7</sum></package><package arch="x86_64" name="libgnomekbd" release="1.el7" src="libgnomekbd-3.22.0.1-1.el7.src.rpm" version="3.22.0.1"><filename>libgnomekbd-3.22.0.1-1.el7.x86_64.rpm</filename><sum type="sha256">bb94fda3e305d00d25cb2447f47d702965d0a230d74b8a094ba42e57d8ac1ec2</sum></package><package arch="x86_64" name="gnome-settings-daemon" release="5.el7" src="gnome-settings-daemon-3.22.2-5.el7.src.rpm" version="3.22.2"><filename>gnome-settings-daemon-3.22.2-5.el7.x86_64.rpm</filename><sum type="sha256">2adaccbeb8f37908a222331430079b7b5e865a443e0dcfc37c45fa01835e437b</sum></package><package arch="x86_64" name="gsettings-desktop-schemas-devel" release="1.el7" src="gsettings-desktop-schemas-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gsettings-desktop-schemas-devel-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">0930435012857e865ef7b3503b1622c6e007f0e2e11ebdd656c09867e7e0f0e6</sum></package><package arch="i686" name="compat-gnome-desktop314" release="1.el7" src="compat-gnome-desktop314-3.14.2-1.el7.src.rpm" version="3.14.2"><filename>compat-gnome-desktop314-3.14.2-1.el7.i686.rpm</filename><sum type="sha256">e8e9a155ca6710372b29bdaaface42c3069aeabe067be01005c52e6ebb59d732</sum></package><package arch="x86_64" epoch="1" name="gnome-bluetooth-libs-devel" release="1.el7" src="gnome-bluetooth-3.20.1-1.el7.src.rpm" version="3.20.1"><filename>gnome-bluetooth-libs-devel-3.20.1-1.el7.x86_64.rpm</filename><sum type="sha256">38536ecced86ff0d9888022e884daf7ec57b5bb12ae2de7322d1d3999776ce05</sum></package><package arch="i686" name="gnome-desktop3" release="2.el7" src="gnome-desktop3-3.22.2-2.el7.src.rpm" version="3.22.2"><filename>gnome-desktop3-3.22.2-2.el7.i686.rpm</filename><sum type="sha256">2895062684b8b46929ab71873624bd5bc3236a47d0ce4a1a3a9e1369e2681dbd</sum></package><package arch="i686" name="gnome-desktop3-devel" release="2.el7" src="gnome-desktop3-3.22.2-2.el7.src.rpm" version="3.22.2"><filename>gnome-desktop3-devel-3.22.2-2.el7.i686.rpm</filename><sum type="sha256">55c0cd9d0768b1723cf42367c2d13ad4a3ccb15a8ab344246d5fb67a810a817e</sum></package><package arch="x86_64" name="accountsservice" release="2.el7" src="accountsservice-0.6.45-2.el7.src.rpm" version="0.6.45"><filename>accountsservice-0.6.45-2.el7.x86_64.rpm</filename><sum type="sha256">d8e28a635ca01c45fea3795d507b2cf22cd105336b84b027e2ced85285b01b76</sum></package><package arch="x86_64" name="accountsservice-devel" release="2.el7" src="accountsservice-0.6.45-2.el7.src.rpm" version="0.6.45"><filename>accountsservice-devel-0.6.45-2.el7.x86_64.rpm</filename><sum type="sha256">ab99603c90ee1bfb2dfc126a7c62baf84b958cd47fd144f8b9b391084479cb2c</sum></package><package arch="x86_64" name="libgnomekbd-devel" release="1.el7" src="libgnomekbd-3.22.0.1-1.el7.src.rpm" version="3.22.0.1"><filename>libgnomekbd-devel-3.22.0.1-1.el7.x86_64.rpm</filename><sum type="sha256">a9f663eca46485d1d6a3b95a71d384aae3e128311526636b2794b453e8922362</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2096" id="RHBA-2017:2096-1" title="Rhba-2017:2096-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2098-1</id><title>Gnome-Shell-Extensions, Gnome-Shell, Mutter Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="gnome-shell-extension-drive-menu" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-shell-extension-drive-menu-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">54094cb45b413924bac24b92fd2ae5534075b35059de83f0f51fdc3fdeaf4d7f</sum></package><package arch="noarch" name="gnome-shell-extension-native-window-placement" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-shell-extension-native-window-placement-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">993fd8b0f52b69ebd3b85315239f1ec50f1eeb232622fb682e3c1a0c5c78c161</sum></package><package arch="x86_64" name="mutter-devel" release="11.el7" src="mutter-3.22.3-11.el7.src.rpm" version="3.22.3"><filename>mutter-devel-3.22.3-11.el7.x86_64.rpm</filename><sum type="sha256">6c1e3afe1e77de2d56bcb4c99910daff3f935d76922be95310c54edb32658fc6</sum></package><package arch="noarch" name="gnome-classic-session" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-classic-session-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">8b78de3e3f0c64afbf17a11563f4a44aeeffc71386f9d1ca22ac197562c2c97e</sum></package><package arch="x86_64" name="gnome-shell-browser-plugin" release="17.el7" src="gnome-shell-3.22.3-17.el7.src.rpm" version="3.22.3"><filename>gnome-shell-browser-plugin-3.22.3-17.el7.x86_64.rpm</filename><sum type="sha256">38d73761ddc4a44f38a7659928508f6281be142562d997841cdc78bf1a31ee36</sum></package><package arch="noarch" name="gnome-shell-extension-screenshot-window-sizer" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-shell-extension-screenshot-window-sizer-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">d7614dc8b25c963b1f74f19009bab03883f7f3e71a49532edc13b3410a9d7a5b</sum></package><package arch="noarch" name="gnome-shell-extension-panel-favorites" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-shell-extension-panel-favorites-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">560cc0a409d1ed0a31a4042be1623ec9a7308c331b54d59830dc9f750c8d5436</sum></package><package arch="i686" name="mutter" release="11.el7" src="mutter-3.22.3-11.el7.src.rpm" version="3.22.3"><filename>mutter-3.22.3-11.el7.i686.rpm</filename><sum type="sha256">a86b52e3e10de1ac1efa633b4fbcdc585f98ac1993737bd6a05810386cb289ea</sum></package><package arch="noarch" name="gnome-shell-extension-window-list" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-shell-extension-window-list-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">cc45639f2280ececbe8ad70cb2c2000593f7e67b672c940a5b7913645b0ce486</sum></package><package arch="noarch" name="gnome-shell-extension-auto-move-windows" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-shell-extension-auto-move-windows-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">100ee1831888994ad95321a6c462df2f50c8806eb5a6d72b268fb91f56254cfc</sum></package><package arch="noarch" name="gnome-shell-extension-places-menu" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-shell-extension-places-menu-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">a4c4a4491e9ee7ea8e233bd586cefe2599e2729f72df343e935b240501659891</sum></package><package arch="i686" name="mutter-devel" release="11.el7" src="mutter-3.22.3-11.el7.src.rpm" version="3.22.3"><filename>mutter-devel-3.22.3-11.el7.i686.rpm</filename><sum type="sha256">6006087b823f8cecade6bba103d0bb898c05588a383af31fc1cca7af0ee1ded2</sum></package><package arch="noarch" name="gnome-shell-extension-alternate-tab" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-shell-extension-alternate-tab-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">975c9eb8c0d7aa4eb54751e79beb2c292e3acdfd47b86471876b296e26aefb58</sum></package><package arch="noarch" name="gnome-shell-extension-systemMonitor" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-shell-extension-systemMonitor-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">3616c5f6a8bdaa5c99a3f90fc7f96284903b7230b5fcd70937aa0af14b2b555c</sum></package><package arch="noarch" name="gnome-shell-extension-windowsNavigator" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-shell-extension-windowsNavigator-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">6d46e3bbfc050c2f88baf5ce82c12e86098f37b20b32ef3afeb20d26f5e3dcde</sum></package><package arch="noarch" name="gnome-shell-extension-top-icons" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-shell-extension-top-icons-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">4cec06a572e5a049fe9043e262317a7b514da7964735463eb4c4d81cfa0c5713</sum></package><package arch="noarch" name="gnome-shell-extension-dash-to-dock" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-shell-extension-dash-to-dock-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">d6c964f362801a0f4b7ecf5cb4ba2e93d454b7b270ba36061ec624441dd3dbea</sum></package><package arch="noarch" name="gnome-shell-extension-user-theme" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-shell-extension-user-theme-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">7841db5ac01f82b4091b8e0affda409fd26557b3a05ded608fa0e727b60debaf</sum></package><package arch="noarch" name="gnome-shell-extension-launch-new-instance" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-shell-extension-launch-new-instance-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">553ed579527e6d57800e26c6906b8177413527ceb1e47d771cd5134f81f326f8</sum></package><package arch="x86_64" name="mutter" release="11.el7" src="mutter-3.22.3-11.el7.src.rpm" version="3.22.3"><filename>mutter-3.22.3-11.el7.x86_64.rpm</filename><sum type="sha256">29c0f6bdc679e92d44ce74e7419f4c7d61b4832472586794ad4761a3c6e82327</sum></package><package arch="noarch" name="gnome-shell-extension-apps-menu" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-shell-extension-apps-menu-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">e1a9d7f2c814f8bab4d15586d7f5c6d7cbff2681ed56172e765c04b114b20137</sum></package><package arch="noarch" name="gnome-shell-extension-workspace-indicator" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-shell-extension-workspace-indicator-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">78931dbd78c83dac8631e7440aa01f99be53e0ae415c8b1830e3b09f250ccccc</sum></package><package arch="noarch" name="gnome-shell-extension-updates-dialog" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-shell-extension-updates-dialog-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">018d0552e1d78d760d17e6f10c77ccdff42caa64c3603edeb6fe77e6e69c31c0</sum></package><package arch="x86_64" name="gnome-shell" release="17.el7" src="gnome-shell-3.22.3-17.el7.src.rpm" version="3.22.3"><filename>gnome-shell-3.22.3-17.el7.x86_64.rpm</filename><sum type="sha256">d764b305ee37a54167eea3070ce69cf9658d1c8df03291951bdcac7cf0ee4da8</sum></package><package arch="noarch" name="gnome-shell-extension-common" release="10.el7" src="gnome-shell-extensions-3.22.2-10.el7.src.rpm" version="3.22.2"><filename>gnome-shell-extension-common-3.22.2-10.el7.noarch.rpm</filename><sum type="sha256">b5a9ce05bf262f608aec86596a164f647d95fe7b78dbf27113860e7503fdfccd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2098" id="RHBA-2017:2098-1" title="Rhba-2017:2098-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2100-1</id><title>Gtk+ Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gtk2-devel-docs" release="1.el7" src="gtk2-2.24.31-1.el7.src.rpm" version="2.24.31"><filename>gtk2-devel-docs-2.24.31-1.el7.x86_64.rpm</filename><sum type="sha256">481721377789957dd0c6b2da97a88d10031e1e6379cd954b4c40f7d988fba3aa</sum></package><package arch="x86_64" name="pango" release="1.el7" src="pango-1.40.4-1.el7.src.rpm" version="1.40.4"><filename>pango-1.40.4-1.el7.x86_64.rpm</filename><sum type="sha256">59e3250bf4b477cb48ec4dc67fe09eb2f38d2cc7437d0b1ea01024250dcecb1f</sum></package><package arch="x86_64" name="gtk3-immodule-xim" release="4.el7" src="gtk3-3.22.10-4.el7.src.rpm" version="3.22.10"><filename>gtk3-immodule-xim-3.22.10-4.el7.x86_64.rpm</filename><sum type="sha256">66fef05f6789746197e2d1ad13025e3d20359d349f2c0dc6a09c7b2e206605ce</sum></package><package arch="x86_64" name="cairo-tools" release="2.el7" src="cairo-1.14.8-2.el7.src.rpm" version="1.14.8"><filename>cairo-tools-1.14.8-2.el7.x86_64.rpm</filename><sum type="sha256">3572354a18c3b0a4853188f6153e4b88d5334d6f2c562d8b981390f0c88a6b9f</sum></package><package arch="x86_64" name="gdk-pixbuf2-tests" release="1.el7" src="gdk-pixbuf2-2.36.5-1.el7.src.rpm" version="2.36.5"><filename>gdk-pixbuf2-tests-2.36.5-1.el7.x86_64.rpm</filename><sum type="sha256">8c090f9eac0561b8e1951930715223c0eab9cecfe9cdfb7a9713b4edb5a94864</sum></package><package arch="x86_64" name="at-spi2-core" release="1.el7" src="at-spi2-core-2.22.0-1.el7.src.rpm" version="2.22.0"><filename>at-spi2-core-2.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">dcd2b7cb1d7882db7595dada512f86a4ff7fa99987fd6bca9b43a868ca1345b5</sum></package><package arch="i686" name="atk-devel" release="3.el7" src="atk-2.22.0-3.el7.src.rpm" version="2.22.0"><filename>atk-devel-2.22.0-3.el7.i686.rpm</filename><sum type="sha256">727fb7064aefb4f981e1bf3adf56dc2c62eff9fc622fb9539abbab13cf87b069</sum></package><package arch="x86_64" name="pango-tests" release="1.el7" src="pango-1.40.4-1.el7.src.rpm" version="1.40.4"><filename>pango-tests-1.40.4-1.el7.x86_64.rpm</filename><sum type="sha256">8e459077256fd9f06a30c1e34cf636cc016eb79c30741561daec9444af872b75</sum></package><package arch="x86_64" name="harfbuzz-icu" release="1.el7" src="harfbuzz-1.3.2-1.el7.src.rpm" version="1.3.2"><filename>harfbuzz-icu-1.3.2-1.el7.x86_64.rpm</filename><sum type="sha256">fd54fdadb6c3f665fef3badbbddb4618e8e8c225ba436b66ef8dbf76e7e982ac</sum></package><package arch="i686" name="gtk2" release="1.el7" src="gtk2-2.24.31-1.el7.src.rpm" version="2.24.31"><filename>gtk2-2.24.31-1.el7.i686.rpm</filename><sum type="sha256">5f231b0d0763260006953c40fd1a9b40fe8516ad465a9d0cb2df0f756811add5</sum></package><package arch="i686" name="at-spi2-core-devel" release="1.el7" src="at-spi2-core-2.22.0-1.el7.src.rpm" version="2.22.0"><filename>at-spi2-core-devel-2.22.0-1.el7.i686.rpm</filename><sum type="sha256">2062efc807e40962f4e30b369bf95f9d26403feaceac3da10c8006e01547d90f</sum></package><package arch="x86_64" name="harfbuzz-devel" release="1.el7" src="harfbuzz-1.3.2-1.el7.src.rpm" version="1.3.2"><filename>harfbuzz-devel-1.3.2-1.el7.x86_64.rpm</filename><sum type="sha256">90e3ff66a74e9b13fa121869d12714c2712cd21bc5406cffd76e952d63bb6d8e</sum></package><package arch="x86_64" name="json-glib" release="1.el7" src="json-glib-1.2.6-1.el7.src.rpm" version="1.2.6"><filename>json-glib-1.2.6-1.el7.x86_64.rpm</filename><sum type="sha256">14200668823ae38cae9fb34c1ddb250f7bbd963b19994f9b14e2a05c99524720</sum></package><package arch="x86_64" name="harfbuzz" release="1.el7" src="harfbuzz-1.3.2-1.el7.src.rpm" version="1.3.2"><filename>harfbuzz-1.3.2-1.el7.x86_64.rpm</filename><sum type="sha256">e3fb50c8d970cb450c0e800c340361434f2df12788b64f7ccb7d2d549553a31a</sum></package><package arch="x86_64" name="glib-networking" release="1.el7" src="glib-networking-2.50.0-1.el7.src.rpm" version="2.50.0"><filename>glib-networking-2.50.0-1.el7.x86_64.rpm</filename><sum type="sha256">ef039bf264d4c43a070c1187e0fc6902f2d4d5ae5a14a98da10d5009da1dd30b</sum></package><package arch="i686" name="gtk3" release="4.el7" src="gtk3-3.22.10-4.el7.src.rpm" version="3.22.10"><filename>gtk3-3.22.10-4.el7.i686.rpm</filename><sum type="sha256">c9c86400828516c49f889bc23a0ab13bc785fc5bdf4ec6e09044575be8debfeb</sum></package><package arch="i686" name="at-spi2-atk-devel" release="2.el7" src="at-spi2-atk-2.22.0-2.el7.src.rpm" version="2.22.0"><filename>at-spi2-atk-devel-2.22.0-2.el7.i686.rpm</filename><sum type="sha256">1f8883bd44cdd6815c5a70f9c25125d20b2f8ac77b55e2e355da54de9dd8f07c</sum></package><package arch="i686" name="glib2" release="3.el7" src="glib2-2.50.3-3.el7.src.rpm" version="2.50.3"><filename>glib2-2.50.3-3.el7.i686.rpm</filename><sum type="sha256">2adfabba66752898874a2748a484794b52499fd24b0d8bc95db26d09349c304e</sum></package><package arch="x86_64" name="gtk3-tests" release="4.el7" src="gtk3-3.22.10-4.el7.src.rpm" version="3.22.10"><filename>gtk3-tests-3.22.10-4.el7.x86_64.rpm</filename><sum type="sha256">8a5d5ee0ebcb45fb598d2af25d0ab00a671ac5bdb9fe007936ca6f05179238fe</sum></package><package arch="i686" name="gdk-pixbuf2" release="1.el7" src="gdk-pixbuf2-2.36.5-1.el7.src.rpm" version="2.36.5"><filename>gdk-pixbuf2-2.36.5-1.el7.i686.rpm</filename><sum type="sha256">983fbc556f52266abcd210907efe30b71f7e3d37fc9a0edb2d34d70c02cc280e</sum></package><package arch="x86_64" name="json-glib-tests" release="1.el7" src="json-glib-1.2.6-1.el7.src.rpm" version="1.2.6"><filename>json-glib-tests-1.2.6-1.el7.x86_64.rpm</filename><sum type="sha256">8bb995e0f70b7ea9629edf2212ee80f8518bf4777d1c6363ad63eaa9393bdf38</sum></package><package arch="i686" name="pango" release="1.el7" src="pango-1.40.4-1.el7.src.rpm" version="1.40.4"><filename>pango-1.40.4-1.el7.i686.rpm</filename><sum type="sha256">cffba90c0847f0320a06b4b26e0844d21c61c44bf33598bea9531c8820544813</sum></package><package arch="x86_64" name="gtk2-devel" release="1.el7" src="gtk2-2.24.31-1.el7.src.rpm" version="2.24.31"><filename>gtk2-devel-2.24.31-1.el7.x86_64.rpm</filename><sum type="sha256">a9ec18972e03a9d37f84e361c1d6859a370e93692b6680c11c4a9621b4a4fc25</sum></package><package arch="x86_64" name="json-glib-devel" release="1.el7" src="json-glib-1.2.6-1.el7.src.rpm" version="1.2.6"><filename>json-glib-devel-1.2.6-1.el7.x86_64.rpm</filename><sum type="sha256">c1e97bcf828493b41cdfdda1fbb8b8972715d0a7ce7ffb44252c59f5b50145db</sum></package><package arch="x86_64" name="gdk-pixbuf2" release="1.el7" src="gdk-pixbuf2-2.36.5-1.el7.src.rpm" version="2.36.5"><filename>gdk-pixbuf2-2.36.5-1.el7.x86_64.rpm</filename><sum type="sha256">ffeec13b397ed1b1b499989aa0b2b31e92337b700c97f3b817fe8c9fbebe9711</sum></package><package arch="x86_64" name="gdk-pixbuf2-devel" release="1.el7" src="gdk-pixbuf2-2.36.5-1.el7.src.rpm" version="2.36.5"><filename>gdk-pixbuf2-devel-2.36.5-1.el7.x86_64.rpm</filename><sum type="sha256">e1aec48681101d5af20d8e8ae16a96b0eeb3599c0c7b7e138efad548d64e523e</sum></package><package arch="i686" name="pango-devel" release="1.el7" src="pango-1.40.4-1.el7.src.rpm" version="1.40.4"><filename>pango-devel-1.40.4-1.el7.i686.rpm</filename><sum type="sha256">a0357fade657a714a0b1d0ef8d0ab8613a93126d5e9f9ec444a91e84d0bbf999</sum></package><package arch="x86_64" name="cairo-gobject" release="2.el7" src="cairo-1.14.8-2.el7.src.rpm" version="1.14.8"><filename>cairo-gobject-1.14.8-2.el7.x86_64.rpm</filename><sum type="sha256">66768b69f7d116c2b0cb50b8f172ee1a90934e7714084e34c97c3b28a8f0441c</sum></package><package arch="i686" name="atk" release="3.el7" src="atk-2.22.0-3.el7.src.rpm" version="2.22.0"><filename>atk-2.22.0-3.el7.i686.rpm</filename><sum type="sha256">5840688062c680948843ddf616d5e08603d611152c032ca9c9b0ffecbeeadd10</sum></package><package arch="i686" name="harfbuzz-devel" release="1.el7" src="harfbuzz-1.3.2-1.el7.src.rpm" version="1.3.2"><filename>harfbuzz-devel-1.3.2-1.el7.i686.rpm</filename><sum type="sha256">9d204e33233ca6320be609e7e71f52b202fd975d658ec83ad8cb203bd9f658e0</sum></package><package arch="x86_64" name="cairo-devel" release="2.el7" src="cairo-1.14.8-2.el7.src.rpm" version="1.14.8"><filename>cairo-devel-1.14.8-2.el7.x86_64.rpm</filename><sum type="sha256">935ea0938bef76e21588d99e6903d28a67d274cb1ed5e3113f38340401ba01d6</sum></package><package arch="x86_64" name="cairo" release="2.el7" src="cairo-1.14.8-2.el7.src.rpm" version="1.14.8"><filename>cairo-1.14.8-2.el7.x86_64.rpm</filename><sum type="sha256">9ae48a0656cd31adba7c86e7f26fda258ecbfcb9eb9f12f2a8ef3eda8c00612a</sum></package><package arch="i686" name="gdk-pixbuf2-devel" release="1.el7" src="gdk-pixbuf2-2.36.5-1.el7.src.rpm" version="2.36.5"><filename>gdk-pixbuf2-devel-2.36.5-1.el7.i686.rpm</filename><sum type="sha256">1098f8e26c28f09654941ec523e5dec478a1e631f2802118ba39080bb9f94f41</sum></package><package arch="x86_64" name="pango-devel" release="1.el7" src="pango-1.40.4-1.el7.src.rpm" version="1.40.4"><filename>pango-devel-1.40.4-1.el7.x86_64.rpm</filename><sum type="sha256">51000e4c58e978d09059fb58be2f6c8b42f58de76258460c31f0bd8b02e2b299</sum></package><package arch="i686" name="json-glib-devel" release="1.el7" src="json-glib-1.2.6-1.el7.src.rpm" version="1.2.6"><filename>json-glib-devel-1.2.6-1.el7.i686.rpm</filename><sum type="sha256">ef588d23a2bd73a14b35f0796e2e60d8d072264ddae306be50212f6e4037f591</sum></package><package arch="i686" name="cairo-tools" release="2.el7" src="cairo-1.14.8-2.el7.src.rpm" version="1.14.8"><filename>cairo-tools-1.14.8-2.el7.i686.rpm</filename><sum type="sha256">844a006204c0b01e99d2c28e376140cbdc64214fb04a61770c67002b09e5ff81</sum></package><package arch="noarch" name="pyatspi" release="1.el7" src="pyatspi-2.20.3-1.el7.src.rpm" version="2.20.3"><filename>pyatspi-2.20.3-1.el7.noarch.rpm</filename><sum type="sha256">06abe897eab945fdb6ecf3a2cb737f2c613d6f53b4444751379380d65c90cbaa</sum></package><package arch="x86_64" name="glib2" release="3.el7" src="glib2-2.50.3-3.el7.src.rpm" version="2.50.3"><filename>glib2-2.50.3-3.el7.x86_64.rpm</filename><sum type="sha256">00b30668bf8c66bd98a12cc623c6b753705f0cca29a3ad09d2da63a8f7b5c1fe</sum></package><package arch="i686" name="gtk2-devel" release="1.el7" src="gtk2-2.24.31-1.el7.src.rpm" version="2.24.31"><filename>gtk2-devel-2.24.31-1.el7.i686.rpm</filename><sum type="sha256">1743de1130a57929723e0974f5c408a53336620d80c6aca39ba2311f3f8fe436</sum></package><package arch="x86_64" name="at-spi2-core-devel" release="1.el7" src="at-spi2-core-2.22.0-1.el7.src.rpm" version="2.22.0"><filename>at-spi2-core-devel-2.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">8681d06949a18f477540e855284706348083e00b8f85314acaa6620fc187029f</sum></package><package arch="x86_64" name="gtk-update-icon-cache" release="4.el7" src="gtk3-3.22.10-4.el7.src.rpm" version="3.22.10"><filename>gtk-update-icon-cache-3.22.10-4.el7.x86_64.rpm</filename><sum type="sha256">ce0ea1b4c4204b281a899fa610fd68533f87d19440131190813115b2570a8780</sum></package><package arch="x86_64" name="gtk3-devel-docs" release="4.el7" src="gtk3-3.22.10-4.el7.src.rpm" version="3.22.10"><filename>gtk3-devel-docs-3.22.10-4.el7.x86_64.rpm</filename><sum type="sha256">7a16633af76dabbddd37136fdf788d2c0b079e5be5d16f9a7e6acee08a661141</sum></package><package arch="i686" name="cairo" release="2.el7" src="cairo-1.14.8-2.el7.src.rpm" version="1.14.8"><filename>cairo-1.14.8-2.el7.i686.rpm</filename><sum type="sha256">838c554e9210aca63f892837a297e64b58e358ef1e28df6b66b3f53fb6bf39f9</sum></package><package arch="i686" name="glib-networking" release="1.el7" src="glib-networking-2.50.0-1.el7.src.rpm" version="2.50.0"><filename>glib-networking-2.50.0-1.el7.i686.rpm</filename><sum type="sha256">29c1f1ce5102be69e2b374648f817186dd3bb65e093a43145833f1a13d336ca5</sum></package><package arch="x86_64" name="at-spi2-atk-devel" release="2.el7" src="at-spi2-atk-2.22.0-2.el7.src.rpm" version="2.22.0"><filename>at-spi2-atk-devel-2.22.0-2.el7.x86_64.rpm</filename><sum type="sha256">3fe666ee84fcde30d4157be7acaa3b8b91ad16b2981e44f83051fc9f9d5fe67a</sum></package><package arch="x86_64" name="atk" release="3.el7" src="atk-2.22.0-3.el7.src.rpm" version="2.22.0"><filename>atk-2.22.0-3.el7.x86_64.rpm</filename><sum type="sha256">7a02397c8d207c00c64c574b9b7196e2d2465e1c0fc17b0a6be101ec54430982</sum></package><package arch="x86_64" name="cairo-gobject-devel" release="2.el7" src="cairo-1.14.8-2.el7.src.rpm" version="1.14.8"><filename>cairo-gobject-devel-1.14.8-2.el7.x86_64.rpm</filename><sum type="sha256">74f3e33669f7943942b955ca032f3c0fc7e9f451ed36d4c1a5b4a84d4fce17f7</sum></package><package arch="x86_64" name="gtk2" release="1.el7" src="gtk2-2.24.31-1.el7.src.rpm" version="2.24.31"><filename>gtk2-2.24.31-1.el7.x86_64.rpm</filename><sum type="sha256">c07bdb5b124099dce02f8c5d7604470a70536a041eef8ff889e3bd6f271e7fbf</sum></package><package arch="i686" name="at-spi2-core" release="1.el7" src="at-spi2-core-2.22.0-1.el7.src.rpm" version="2.22.0"><filename>at-spi2-core-2.22.0-1.el7.i686.rpm</filename><sum type="sha256">663d2ccbbee2c73ab56432cbe2f47ff017bd97811be836fe1aa6efb574d56ad4</sum></package><package arch="i686" name="cairo-gobject-devel" release="2.el7" src="cairo-1.14.8-2.el7.src.rpm" version="1.14.8"><filename>cairo-gobject-devel-1.14.8-2.el7.i686.rpm</filename><sum type="sha256">1bdaa148c161f5a22f9e55f8a56affb75c5ce31ca40f2da000ff475d90cd41e7</sum></package><package arch="x86_64" name="glib-networking-tests" release="1.el7" src="glib-networking-2.50.0-1.el7.src.rpm" version="2.50.0"><filename>glib-networking-tests-2.50.0-1.el7.x86_64.rpm</filename><sum type="sha256">2009c282af9f873cf0634dd84d8802adfe44d86b45f336d46f362d72e1f24b4b</sum></package><package arch="i686" name="glib2-static" release="3.el7" src="glib2-2.50.3-3.el7.src.rpm" version="2.50.3"><filename>glib2-static-2.50.3-3.el7.i686.rpm</filename><sum type="sha256">17c78a4d37ce155716f7482645387f2c5d2494885ca01a94c17669d1df5c8a97</sum></package><package arch="i686" name="json-glib" release="1.el7" src="json-glib-1.2.6-1.el7.src.rpm" version="1.2.6"><filename>json-glib-1.2.6-1.el7.i686.rpm</filename><sum type="sha256">906bce98a6c8f32a25a460c2ec66040473e6fe9146d21067ff57f9b2737daa24</sum></package><package arch="noarch" name="glib2-doc" release="3.el7" src="glib2-2.50.3-3.el7.src.rpm" version="2.50.3"><filename>glib2-doc-2.50.3-3.el7.noarch.rpm</filename><sum type="sha256">383d9d71a25056a11796084d55164f927f5c104b9d41f74a91b7ce7ddf2cfaf3</sum></package><package arch="x86_64" name="atk-devel" release="3.el7" src="atk-2.22.0-3.el7.src.rpm" version="2.22.0"><filename>atk-devel-2.22.0-3.el7.x86_64.rpm</filename><sum type="sha256">a24a92707608e77b5c99c72a6a8972ce471ebf4082241fbfba27dee9e3f64cb2</sum></package><package arch="x86_64" name="gtk3-immodules" release="4.el7" src="gtk3-3.22.10-4.el7.src.rpm" version="3.22.10"><filename>gtk3-immodules-3.22.10-4.el7.x86_64.rpm</filename><sum type="sha256">ece5099cd40c0d88f9785b1c5e1e60b7f7d8791a0efb0b3050ac9608ac9221f0</sum></package><package arch="i686" name="gtk2-immodule-xim" release="1.el7" src="gtk2-2.24.31-1.el7.src.rpm" version="2.24.31"><filename>gtk2-immodule-xim-2.24.31-1.el7.i686.rpm</filename><sum type="sha256">d34636679547909e6176a33d87477cd21441921c90472780ab0b75cc32d79aab</sum></package><package arch="i686" name="gtk2-immodules" release="1.el7" src="gtk2-2.24.31-1.el7.src.rpm" version="2.24.31"><filename>gtk2-immodules-2.24.31-1.el7.i686.rpm</filename><sum type="sha256">8c939164f71ec38dfbea9c6526d703de651c34191305e387419cfaad1f2b4128</sum></package><package arch="x86_64" name="gtk3" release="4.el7" src="gtk3-3.22.10-4.el7.src.rpm" version="3.22.10"><filename>gtk3-3.22.10-4.el7.x86_64.rpm</filename><sum type="sha256">82a3adf294bae2b6ec25143ca6d30604c6a5da5603cac24bb4afd18a28ba9676</sum></package><package arch="x86_64" name="gtk3-devel" release="4.el7" src="gtk3-3.22.10-4.el7.src.rpm" version="3.22.10"><filename>gtk3-devel-3.22.10-4.el7.x86_64.rpm</filename><sum type="sha256">38adfb64d882ae769f8d00b8f32f01457df6dd15d39c742254dc6254b0473e15</sum></package><package arch="x86_64" name="glib2-tests" release="3.el7" src="glib2-2.50.3-3.el7.src.rpm" version="2.50.3"><filename>glib2-tests-2.50.3-3.el7.x86_64.rpm</filename><sum type="sha256">a97d18b9450d1f960bacad083fe246e8ff7fd1cf17d199695a883c0e03147716</sum></package><package arch="i686" name="gtk3-devel" release="4.el7" src="gtk3-3.22.10-4.el7.src.rpm" version="3.22.10"><filename>gtk3-devel-3.22.10-4.el7.i686.rpm</filename><sum type="sha256">85f0f57a55dc88549fcb4e95622760ecf0792ad2c68ad80608054122f277ab99</sum></package><package arch="x86_64" name="at-spi2-atk" release="2.el7" src="at-spi2-atk-2.22.0-2.el7.src.rpm" version="2.22.0"><filename>at-spi2-atk-2.22.0-2.el7.x86_64.rpm</filename><sum type="sha256">db477b28d2a890bf9fd67bcd509a95361ddd23253febea19342ce335b72e196c</sum></package><package arch="x86_64" name="glib2-fam" release="3.el7" src="glib2-2.50.3-3.el7.src.rpm" version="2.50.3"><filename>glib2-fam-2.50.3-3.el7.x86_64.rpm</filename><sum type="sha256">d2ce8762abb09baa66d784d7dda94a6e4c87915984efa74f4d3bef1564adfb5e</sum></package><package arch="i686" name="glib2-devel" release="3.el7" src="glib2-2.50.3-3.el7.src.rpm" version="2.50.3"><filename>glib2-devel-2.50.3-3.el7.i686.rpm</filename><sum type="sha256">add43e0f9b4c612e704cf137267055630447c10217ea7a1a68e2f2d4592409f3</sum></package><package arch="i686" name="cairo-devel" release="2.el7" src="cairo-1.14.8-2.el7.src.rpm" version="1.14.8"><filename>cairo-devel-1.14.8-2.el7.i686.rpm</filename><sum type="sha256">d0fa10a5fd42f14b52817f64d57f801e1370b1505a6b0f02de420845773cf50c</sum></package><package arch="i686" name="cairo-gobject" release="2.el7" src="cairo-1.14.8-2.el7.src.rpm" version="1.14.8"><filename>cairo-gobject-1.14.8-2.el7.i686.rpm</filename><sum type="sha256">6c0f5c6ae7ac27956c5bc2499d17759e6e66e278fc6773a4e30d88affea6ed20</sum></package><package arch="x86_64" name="gtk2-immodules" release="1.el7" src="gtk2-2.24.31-1.el7.src.rpm" version="2.24.31"><filename>gtk2-immodules-2.24.31-1.el7.x86_64.rpm</filename><sum type="sha256">1ac702af8b4034188440a2daf4ca65b4bb1bef886de3dc73662d2d6dfcc9f3f4</sum></package><package arch="i686" name="at-spi2-atk" release="2.el7" src="at-spi2-atk-2.22.0-2.el7.src.rpm" version="2.22.0"><filename>at-spi2-atk-2.22.0-2.el7.i686.rpm</filename><sum type="sha256">9a663fd70191c96fa10bd55c37f2d46007116f92b7e5ee74f5192defa41e4c5e</sum></package><package arch="x86_64" name="glib2-devel" release="3.el7" src="glib2-2.50.3-3.el7.src.rpm" version="2.50.3"><filename>glib2-devel-2.50.3-3.el7.x86_64.rpm</filename><sum type="sha256">55f0730c2ac8bf7be01296e591b257182006ec4d1edfae12155a3f31cb940695</sum></package><package arch="i686" name="harfbuzz-icu" release="1.el7" src="harfbuzz-1.3.2-1.el7.src.rpm" version="1.3.2"><filename>harfbuzz-icu-1.3.2-1.el7.i686.rpm</filename><sum type="sha256">bcb71348b0649e64a38f89eed4aba77d2c771dda74c1db545ade7cbf97abaa61</sum></package><package arch="i686" name="harfbuzz" release="1.el7" src="harfbuzz-1.3.2-1.el7.src.rpm" version="1.3.2"><filename>harfbuzz-1.3.2-1.el7.i686.rpm</filename><sum type="sha256">3a630ce5537aaf8d27252fe7a970dd1e14220d95ed7f25f20c3a5063240a0960</sum></package><package arch="x86_64" name="gtk2-immodule-xim" release="1.el7" src="gtk2-2.24.31-1.el7.src.rpm" version="2.24.31"><filename>gtk2-immodule-xim-2.24.31-1.el7.x86_64.rpm</filename><sum type="sha256">ec4e52c5e4eb2a8579e1eb634a83f75d670652b30cba9f93904a3f82b9087c5a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2100" id="RHBA-2017:2100-1" title="Rhba-2017:2100-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2104-1</id><title>Gnome-Themes-Standard Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="adwaita-cursor-theme" release="1.el7" src="adwaita-icon-theme-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>adwaita-cursor-theme-3.22.0-1.el7.noarch.rpm</filename><sum type="sha256">ef5400d1f8c1016c349909f768a0fb1af5f7c3890f1a5f78fd387af81b92729d</sum></package><package arch="x86_64" name="gnome-themes-standard" release="1.el7" src="gnome-themes-standard-3.22.2-1.el7.src.rpm" version="3.22.2"><filename>gnome-themes-standard-3.22.2-1.el7.x86_64.rpm</filename><sum type="sha256">518ded811c456e50c2abdacce94f9faf5f40643c54120b1c965f13d8751470fd</sum></package><package arch="noarch" name="adwaita-icon-theme" release="1.el7" src="adwaita-icon-theme-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>adwaita-icon-theme-3.22.0-1.el7.noarch.rpm</filename><sum type="sha256">fc0dbda1122f4726d4c13eda399a57727e3e10cfda0525c6a0813d276979a597</sum></package><package arch="i686" name="adwaita-gtk2-theme" release="1.el7" src="gnome-themes-standard-3.22.2-1.el7.src.rpm" version="3.22.2"><filename>adwaita-gtk2-theme-3.22.2-1.el7.i686.rpm</filename><sum type="sha256">efb97a1b614aa5d07df1f87c9831fb812cb7490f81fa555de664a5623d6048c3</sum></package><package arch="x86_64" name="adwaita-gtk2-theme" release="1.el7" src="gnome-themes-standard-3.22.2-1.el7.src.rpm" version="3.22.2"><filename>adwaita-gtk2-theme-3.22.2-1.el7.x86_64.rpm</filename><sum type="sha256">d0604fed6526cd269fc94fb86155ec596bf6c7c2dd31ea811db23c3104f57767</sum></package><package arch="noarch" name="adwaita-icon-theme-devel" release="1.el7" src="adwaita-icon-theme-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>adwaita-icon-theme-devel-3.22.0-1.el7.noarch.rpm</filename><sum type="sha256">51bf7e3e9b7017c3f0d6996936bedfee938be0a8d4a7c59dcaa736f78384a6a1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2104" id="RHBA-2017:2104-1" title="Rhba-2017:2104-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2106-1</id><title>Gtkmm Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gtkmm30" release="1.el7" src="gtkmm30-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gtkmm30-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">e4be1db825de42d1df1acae67f4b8e8b17d6e3e0ce5653546825c2f5ad9cba59</sum></package><package arch="i686" name="pangomm-devel" release="1.el7" src="pangomm-2.40.1-1.el7.src.rpm" version="2.40.1"><filename>pangomm-devel-2.40.1-1.el7.i686.rpm</filename><sum type="sha256">18574fe61cdb17f6792ea5e837ff9311a6cc8c5974b2c877eb43773ed390464c</sum></package><package arch="x86_64" name="glibmm24-devel" release="1.el7" src="glibmm24-2.50.0-1.el7.src.rpm" version="2.50.0"><filename>glibmm24-devel-2.50.0-1.el7.x86_64.rpm</filename><sum type="sha256">c2ca207bdf044b5c60e6fdc8f598aeef8f9c59420845758e38e2e804989e4ecc</sum></package><package arch="i686" name="atkmm" release="1.el7" src="atkmm-2.24.2-1.el7.src.rpm" version="2.24.2"><filename>atkmm-2.24.2-1.el7.i686.rpm</filename><sum type="sha256">ca42a2531a8e83e9fec0127d45ae13f0a8068eeb6365ac935ee4be90aed6f6a6</sum></package><package arch="i686" name="gtkmm24-devel" release="1.el7" src="gtkmm24-2.24.5-1.el7.src.rpm" version="2.24.5"><filename>gtkmm24-devel-2.24.5-1.el7.i686.rpm</filename><sum type="sha256">cdfaa805c12ee6ecba377e72f5b48431ba3b97f8600c81404430d57d74db30be</sum></package><package arch="x86_64" name="gtkmm24" release="1.el7" src="gtkmm24-2.24.5-1.el7.src.rpm" version="2.24.5"><filename>gtkmm24-2.24.5-1.el7.x86_64.rpm</filename><sum type="sha256">78d1b419ea1265c260e2abec4744c297960eec29bf25d27e59d0e9b1382d101a</sum></package><package arch="noarch" name="glibmm24-doc" release="1.el7" src="glibmm24-2.50.0-1.el7.src.rpm" version="2.50.0"><filename>glibmm24-doc-2.50.0-1.el7.noarch.rpm</filename><sum type="sha256">e9f2840d31918436af1593bd26c733651f43fc0c09f2e324bfe70d3196bda000</sum></package><package arch="i686" name="gtkmm30" release="1.el7" src="gtkmm30-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gtkmm30-3.22.0-1.el7.i686.rpm</filename><sum type="sha256">6c0d0c5be14ba8a02418dbcb7ae4270f9382bea355dbde5aec0386e87040ba3e</sum></package><package arch="i686" name="cairomm-devel" release="1.el7" src="cairomm-1.12.0-1.el7.src.rpm" version="1.12.0"><filename>cairomm-devel-1.12.0-1.el7.i686.rpm</filename><sum type="sha256">02a2d46520ee1e97ac1d996cf9ecdd4180e020d5b7c431f81592b3a8c7eeb2e9</sum></package><package arch="noarch" name="libsigc++20-doc" release="1.el7" src="libsigc++20-2.10.0-1.el7.src.rpm" version="2.10.0"><filename>libsigc++20-doc-2.10.0-1.el7.noarch.rpm</filename><sum type="sha256">8bc3bb6275d3e8ef98d96ce8c1f9cba7e697a72f6eb0c4ab189a2ae3a581bbf1</sum></package><package arch="x86_64" name="glibmm24" release="1.el7" src="glibmm24-2.50.0-1.el7.src.rpm" version="2.50.0"><filename>glibmm24-2.50.0-1.el7.x86_64.rpm</filename><sum type="sha256">7b1d2364ae92dbb477f1206ea71482c4eba431ca1ab6f509e608185bfb1c2266</sum></package><package arch="i686" name="pangomm" release="1.el7" src="pangomm-2.40.1-1.el7.src.rpm" version="2.40.1"><filename>pangomm-2.40.1-1.el7.i686.rpm</filename><sum type="sha256">efeea05a4796b8b0743830c7548e3cb1ff78a0b518bd16a4165c95ed9fe4ec30</sum></package><package arch="noarch" name="pangomm-doc" release="1.el7" src="pangomm-2.40.1-1.el7.src.rpm" version="2.40.1"><filename>pangomm-doc-2.40.1-1.el7.noarch.rpm</filename><sum type="sha256">884ca5878ea7470756ce4972c96e190f69a3ec02e3c028e4d952c5ea70de1d91</sum></package><package arch="i686" name="atkmm-devel" release="1.el7" src="atkmm-2.24.2-1.el7.src.rpm" version="2.24.2"><filename>atkmm-devel-2.24.2-1.el7.i686.rpm</filename><sum type="sha256">843036d999e48c4b4923ba1ef15c96afee629e9e8aa556089756591e0e5657d0</sum></package><package arch="x86_64" name="atkmm" release="1.el7" src="atkmm-2.24.2-1.el7.src.rpm" version="2.24.2"><filename>atkmm-2.24.2-1.el7.x86_64.rpm</filename><sum type="sha256">33a4df6fe55056121722b055ed81bbed8fb4d2f225c439c86f620a7d63cadbaf</sum></package><package arch="noarch" name="cairomm-doc" release="1.el7" src="cairomm-1.12.0-1.el7.src.rpm" version="1.12.0"><filename>cairomm-doc-1.12.0-1.el7.noarch.rpm</filename><sum type="sha256">63fdee3dabb06c22b7a5ce52db7b1adc434abe112af9ca4327330e7724cfeb72</sum></package><package arch="x86_64" name="cairomm" release="1.el7" src="cairomm-1.12.0-1.el7.src.rpm" version="1.12.0"><filename>cairomm-1.12.0-1.el7.x86_64.rpm</filename><sum type="sha256">4d142e6b18925c1509f9f7783d2d654e2472a9d3d0e53d36c39b0182342594d9</sum></package><package arch="i686" name="gtkmm30-devel" release="1.el7" src="gtkmm30-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gtkmm30-devel-3.22.0-1.el7.i686.rpm</filename><sum type="sha256">4970b1117530e6a95a9a23260b1b31e876d18c99d80d93f2b86a3e0119e1be90</sum></package><package arch="i686" name="cairomm" release="1.el7" src="cairomm-1.12.0-1.el7.src.rpm" version="1.12.0"><filename>cairomm-1.12.0-1.el7.i686.rpm</filename><sum type="sha256">6d139b1a37504ba87e8c5b92c8b49de15b86d5839f30bdeb5772c5ffae15038b</sum></package><package arch="x86_64" name="atkmm-devel" release="1.el7" src="atkmm-2.24.2-1.el7.src.rpm" version="2.24.2"><filename>atkmm-devel-2.24.2-1.el7.x86_64.rpm</filename><sum type="sha256">cc62ea4913190730ca501c0035d34911a6095fe3c790260a0f22f41bca476165</sum></package><package arch="i686" name="gtkmm24" release="1.el7" src="gtkmm24-2.24.5-1.el7.src.rpm" version="2.24.5"><filename>gtkmm24-2.24.5-1.el7.i686.rpm</filename><sum type="sha256">744d475fdf353da8a114ed7d6aa37b1d7eb92159a6a829ec62805205334cf913</sum></package><package arch="x86_64" name="libsigc++20-devel" release="1.el7" src="libsigc++20-2.10.0-1.el7.src.rpm" version="2.10.0"><filename>libsigc++20-devel-2.10.0-1.el7.x86_64.rpm</filename><sum type="sha256">ac02a2cb937e13339095755e491d795ae195dc78b01f2562def6f4dbc08e5f9b</sum></package><package arch="noarch" name="gtkmm24-docs" release="1.el7" src="gtkmm24-2.24.5-1.el7.src.rpm" version="2.24.5"><filename>gtkmm24-docs-2.24.5-1.el7.noarch.rpm</filename><sum type="sha256">b6538bdb9bc3c8601dae7a70105a8277b4da665a4d4ee8dc89fd77d0c7ccf6f3</sum></package><package arch="x86_64" name="cairomm-devel" release="1.el7" src="cairomm-1.12.0-1.el7.src.rpm" version="1.12.0"><filename>cairomm-devel-1.12.0-1.el7.x86_64.rpm</filename><sum type="sha256">3efc54c4bd67c60d97d2aa6552722d62fc82ded6e75f19fd6c4d5bb4d4a7c117</sum></package><package arch="x86_64" name="pangomm" release="1.el7" src="pangomm-2.40.1-1.el7.src.rpm" version="2.40.1"><filename>pangomm-2.40.1-1.el7.x86_64.rpm</filename><sum type="sha256">efee4e5d235407bbbc19f7a9ecf7eff6ce7234eb44c1d7f813af79ea0747921c</sum></package><package arch="i686" name="libsigc++20-devel" release="1.el7" src="libsigc++20-2.10.0-1.el7.src.rpm" version="2.10.0"><filename>libsigc++20-devel-2.10.0-1.el7.i686.rpm</filename><sum type="sha256">ff7311950d7f86f6228069519e97fa9fa1f0f81aab9ca5cbd4296123a7db95e4</sum></package><package arch="i686" name="libsigc++20" release="1.el7" src="libsigc++20-2.10.0-1.el7.src.rpm" version="2.10.0"><filename>libsigc++20-2.10.0-1.el7.i686.rpm</filename><sum type="sha256">d9e7e2585a73d7b4b81aebeaf5ac74d795061fc279b5b5fb8b339916fbd26f24</sum></package><package arch="noarch" name="atkmm-doc" release="1.el7" src="atkmm-2.24.2-1.el7.src.rpm" version="2.24.2"><filename>atkmm-doc-2.24.2-1.el7.noarch.rpm</filename><sum type="sha256">f4568aba10c059a12df4b532fafa98279e1e4a17233743403e8200229286a20e</sum></package><package arch="noarch" name="gtkmm30-doc" release="1.el7" src="gtkmm30-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gtkmm30-doc-3.22.0-1.el7.noarch.rpm</filename><sum type="sha256">c9cf5bf55655c58e58f8f9638ab687eb445d39ceadb83275bb26fa71a5b89263</sum></package><package arch="x86_64" name="libsigc++20" release="1.el7" src="libsigc++20-2.10.0-1.el7.src.rpm" version="2.10.0"><filename>libsigc++20-2.10.0-1.el7.x86_64.rpm</filename><sum type="sha256">90eaf4e65c7f39509ea7624425091987292cade99108a30873c97f6036294ae4</sum></package><package arch="i686" name="glibmm24-devel" release="1.el7" src="glibmm24-2.50.0-1.el7.src.rpm" version="2.50.0"><filename>glibmm24-devel-2.50.0-1.el7.i686.rpm</filename><sum type="sha256">7efb256b3df3d513b6a77cd4e725fa3491d60317442f54320a04363be26f61fe</sum></package><package arch="x86_64" name="gtkmm30-devel" release="1.el7" src="gtkmm30-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gtkmm30-devel-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">aacf4b6e01e06c54e96707db324aefc34a7bd4a0dd4c76c74e64ec8f3b0c3419</sum></package><package arch="x86_64" name="pangomm-devel" release="1.el7" src="pangomm-2.40.1-1.el7.src.rpm" version="2.40.1"><filename>pangomm-devel-2.40.1-1.el7.x86_64.rpm</filename><sum type="sha256">254c93003da67f767725d9180e489f48b422fdee0167975836f69192c880c67a</sum></package><package arch="i686" name="glibmm24" release="1.el7" src="glibmm24-2.50.0-1.el7.src.rpm" version="2.50.0"><filename>glibmm24-2.50.0-1.el7.i686.rpm</filename><sum type="sha256">ee0c82fbb19550b3597661de6a1fab52a20fa2c81ec111a3e5c6851e6b57a842</sum></package><package arch="x86_64" name="gtkmm24-devel" release="1.el7" src="gtkmm24-2.24.5-1.el7.src.rpm" version="2.24.5"><filename>gtkmm24-devel-2.24.5-1.el7.x86_64.rpm</filename><sum type="sha256">9cc677906c52a90309d64b19f86af175c6add78285bebac45689a7bfc343555a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2106" id="RHBA-2017:2106-1" title="Rhba-2017:2106-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2108-1</id><title>Colord Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-09-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="colord-devel" release="1.el7" src="colord-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>colord-devel-1.3.4-1.el7.i686.rpm</filename><sum type="sha256">778efa4433e460e3b72b3102ee9b2b4055ba75c71541f27480d897bdf2f10ba6</sum></package><package arch="i686" name="libgusb" release="1.el7" src="libgusb-0.2.9-1.el7.src.rpm" version="0.2.9"><filename>libgusb-0.2.9-1.el7.i686.rpm</filename><sum type="sha256">043b0dc8f7cf848dcdf6ad71a22aa0d310a52118bd02adc4ea0ec0839b0018f3</sum></package><package arch="i686" name="colord-libs" release="1.el7" src="colord-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>colord-libs-1.3.4-1.el7.i686.rpm</filename><sum type="sha256">d8e09addbea709c8bc8210e7ef9f4bd6b18ff238dfc9283f76550e7a23adf4e7</sum></package><package arch="x86_64" name="colord" release="1.el7" src="colord-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>colord-1.3.4-1.el7.x86_64.rpm</filename><sum type="sha256">d08ac3e5dfc112bdcb51dfd43456b35852d5403fbc7c4c5d8ae0cd19c287416f</sum></package><package arch="noarch" name="colord-devel-docs" release="1.el7" src="colord-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>colord-devel-docs-1.3.4-1.el7.noarch.rpm</filename><sum type="sha256">d34e05453213430bd1e831531d7d138b866caa37aff5186f8468549b39f72ea7</sum></package><package arch="x86_64" name="colord-libs" release="1.el7" src="colord-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>colord-libs-1.3.4-1.el7.x86_64.rpm</filename><sum type="sha256">b4b62fe303d264a5567f3aba52de9fdf781919804cfa3b8d0d147e8f270212a4</sum></package><package arch="x86_64" name="libgusb" release="1.el7" src="libgusb-0.2.9-1.el7.src.rpm" version="0.2.9"><filename>libgusb-0.2.9-1.el7.x86_64.rpm</filename><sum type="sha256">e8be8a9bb1590ec79f2661154638af4ca57981ab824712b693ddc841741ff479</sum></package><package arch="x86_64" name="libgusb-devel" release="1.el7" src="libgusb-0.2.9-1.el7.src.rpm" version="0.2.9"><filename>libgusb-devel-0.2.9-1.el7.x86_64.rpm</filename><sum type="sha256">b1865d51b0cb877c55c407635475d4777d404746b8cb74b2d79ed027d79ad49f</sum></package><package arch="noarch" name="colord-extra-profiles" release="1.el7" src="colord-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>colord-extra-profiles-1.3.4-1.el7.noarch.rpm</filename><sum type="sha256">bd2468fa80ae97ef93f8ee6d80fae770d0a7f4e1b6db8ca12b04e36221b7d03a</sum></package><package arch="i686" name="libgusb-devel" release="1.el7" src="libgusb-0.2.9-1.el7.src.rpm" version="0.2.9"><filename>libgusb-devel-0.2.9-1.el7.i686.rpm</filename><sum type="sha256">b528077f33ef6f3c980742c1a2ac8b07f9f41c47dec8f6857903a75f576ea412</sum></package><package arch="x86_64" name="colord-devel" release="1.el7" src="colord-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>colord-devel-1.3.4-1.el7.x86_64.rpm</filename><sum type="sha256">ef3446b32156594a3b39f454261a7608c7076a82d2ed58c6ad3edbd7aa8fbe94</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2108" id="RHBA-2017:2108-1" title="Rhba-2017:2108-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2113-1</id><title>Libosinfo, Osinfo-Db, And Osinfo-Db-Tools Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-09-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libosinfo" release="1.el7" src="libosinfo-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libosinfo-1.0.0-1.el7.x86_64.rpm</filename><sum type="sha256">ff0ba973282010debc045626e3a689f562074772dadd2f573f492efd29cbb65c</sum></package><package arch="i686" name="libosinfo-devel" release="1.el7" src="libosinfo-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libosinfo-devel-1.0.0-1.el7.i686.rpm</filename><sum type="sha256">98b6fc6b84c4eb71c05d26ef4dff0630d52bc6e98cd8e9e22513fed5b9f3b017</sum></package><package arch="i686" name="libosinfo" release="1.el7" src="libosinfo-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libosinfo-1.0.0-1.el7.i686.rpm</filename><sum type="sha256">e44a683f7e8de7d65f371a33cdf3342047571dfae0bdcdcd05fd9dc4f75add10</sum></package><package arch="x86_64" name="osinfo-db-tools" release="1.el7" src="osinfo-db-tools-1.1.0-1.el7.src.rpm" version="1.1.0"><filename>osinfo-db-tools-1.1.0-1.el7.x86_64.rpm</filename><sum type="sha256">b3b9ae0c4d964ce368250309173f54bc060fe4b4d912e14b3dcae866f18fcbd2</sum></package><package arch="noarch" name="osinfo-db" release="2.el7" src="osinfo-db-20170423-2.el7.src.rpm" version="20170423"><filename>osinfo-db-20170423-2.el7.noarch.rpm</filename><sum type="sha256">c091b060906f451bd617f9e88107be8f2e47fcdd90cfca94024b88ccdb03fd38</sum></package><package arch="x86_64" name="libosinfo-vala" release="1.el7" src="libosinfo-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libosinfo-vala-1.0.0-1.el7.x86_64.rpm</filename><sum type="sha256">a55cc41519650d460421f89665707b9b576e4af81cd22c1e207917647e9114bd</sum></package><package arch="x86_64" name="libosinfo-devel" release="1.el7" src="libosinfo-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libosinfo-devel-1.0.0-1.el7.x86_64.rpm</filename><sum type="sha256">c5b9f575221ae833323945352278a6c4b95a34a6364798bd9e30d32705c58f7b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2113" id="RHBA-2017:2113-1" title="Rhba-2017:2113-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2118-1</id><title>Gettext Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-09-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gettext-devel" release="2.el7" src="gettext-0.19.8.1-2.el7.src.rpm" version="0.19.8.1"><filename>gettext-devel-0.19.8.1-2.el7.x86_64.rpm</filename><sum type="sha256">eb5387a6194e14193bc236187ca28ba8530c7f10cacbed594b415cd6b6adb311</sum></package><package arch="x86_64" name="gettext" release="2.el7" src="gettext-0.19.8.1-2.el7.src.rpm" version="0.19.8.1"><filename>gettext-0.19.8.1-2.el7.x86_64.rpm</filename><sum type="sha256">a3e3b52655e05ec6afe3aa268098de31eb1b42399678453361042f6d3241f29d</sum></package><package arch="noarch" name="gettext-common-devel" release="2.el7" src="gettext-0.19.8.1-2.el7.src.rpm" version="0.19.8.1"><filename>gettext-common-devel-0.19.8.1-2.el7.noarch.rpm</filename><sum type="sha256">d172104d29128012310c26306166953e2bdfc648438b5f87ecf22946723587f2</sum></package><package arch="i686" name="gettext-devel" release="2.el7" src="gettext-0.19.8.1-2.el7.src.rpm" version="0.19.8.1"><filename>gettext-devel-0.19.8.1-2.el7.i686.rpm</filename><sum type="sha256">4ff52defa211e9acedd3de0283a014fe0d6a7109da93f44457008ac41340f6e6</sum></package><package arch="x86_64" name="gettext-libs" release="2.el7" src="gettext-0.19.8.1-2.el7.src.rpm" version="0.19.8.1"><filename>gettext-libs-0.19.8.1-2.el7.x86_64.rpm</filename><sum type="sha256">fc066515192555ed76f8d36a941706afb822a243f320419616f9e697fb4276db</sum></package><package arch="noarch" name="emacs-gettext" release="2.el7" src="gettext-0.19.8.1-2.el7.src.rpm" version="0.19.8.1"><filename>emacs-gettext-0.19.8.1-2.el7.noarch.rpm</filename><sum type="sha256">cff25653e6225feb543c2be51ef399d878a60d6faf39a8f8be1e1e6d0a763f1c</sum></package><package arch="i686" name="gettext-libs" release="2.el7" src="gettext-0.19.8.1-2.el7.src.rpm" version="0.19.8.1"><filename>gettext-libs-0.19.8.1-2.el7.i686.rpm</filename><sum type="sha256">05a25490f19da95bb027048a55d4959fd95860da9638240fa8deba0cc74e58b4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2118" id="RHBA-2017:2118-1" title="Rhba-2017:2118-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2124-1</id><title>Gnome-Boxes Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gnome-boxes" release="4.el7" src="gnome-boxes-3.22.4-4.el7.src.rpm" version="3.22.4"><filename>gnome-boxes-3.22.4-4.el7.x86_64.rpm</filename><sum type="sha256">107344b0a356ba7e038b45aab2be01b4e66d490e1c349d3bc9a6e7ecf36e6e7b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2124" id="RHBA-2017:2124-1" title="Rhba-2017:2124-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2129-1</id><title>Custodia Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="custodia" release="4.el7" src="custodia-0.3.1-4.el7.src.rpm" version="0.3.1"><filename>custodia-0.3.1-4.el7.noarch.rpm</filename><sum type="sha256">d6ee1fb2ab20a51dcb2e186b4899026c3381c4de162a66fd71fa3e87affc1c49</sum></package><package arch="noarch" name="python-custodia-ipa" release="4.el7" src="custodia-0.3.1-4.el7.src.rpm" version="0.3.1"><filename>python-custodia-ipa-0.3.1-4.el7.noarch.rpm</filename><sum type="sha256">308304af155981d851a12fb7528405453b25ce78812ed93211c707d14836fb6a</sum></package><package arch="noarch" name="python-custodia" release="4.el7" src="custodia-0.3.1-4.el7.src.rpm" version="0.3.1"><filename>python-custodia-0.3.1-4.el7.noarch.rpm</filename><sum type="sha256">4ebc58c13804cf0c39bdebc8fc1c43a529e672add979337bbd71509b802dfb21</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2129" id="RHBA-2017:2129-1" title="Rhba-2017:2129-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2130-1</id><title>Gnote Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="gnote" release="1.el7" src="gnote-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>gnote-3.22.1-1.el7.i686.rpm</filename><sum type="sha256">833ce2c7ea4c6e07647bb00133ce43ab83fe2db4eeb57da11efb8516a79b8e2f</sum></package><package arch="x86_64" name="gnote" release="1.el7" src="gnote-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>gnote-3.22.1-1.el7.x86_64.rpm</filename><sum type="sha256">279b990112700202e6113425a1bfe60992dad5a54146fe6d6be81bc7830c9f28</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2130" id="RHBA-2017:2130-1" title="Rhba-2017:2130-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2132-1</id><title>Gnome-Calculator Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gnome-calculator" release="1.el7" src="gnome-calculator-3.22.3-1.el7.src.rpm" version="3.22.3"><filename>gnome-calculator-3.22.3-1.el7.x86_64.rpm</filename><sum type="sha256">c10155ef7445c19210bfad85e94d25caa7f428857aad52aabe067b562faf2fe2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2132" id="RHBA-2017:2132-1" title="Rhba-2017:2132-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2134-1</id><title>Gnome-Clocks Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="geocode-glib" release="1.el7" src="geocode-glib-3.20.1-1.el7.src.rpm" version="3.20.1"><filename>geocode-glib-3.20.1-1.el7.i686.rpm</filename><sum type="sha256">d5e643c2c36264c7f1c1d7b435015147c922b38660d79a94633f3c84d7d57368</sum></package><package arch="i686" name="geoclue2" release="1.el7" src="geoclue2-2.4.5-1.el7.src.rpm" version="2.4.5"><filename>geoclue2-2.4.5-1.el7.i686.rpm</filename><sum type="sha256">a40036a639eb8a9315191552f97f7ce13f2cd1708130af5357619bad83ffab73</sum></package><package arch="x86_64" name="geoclue2-libs" release="1.el7" src="geoclue2-2.4.5-1.el7.src.rpm" version="2.4.5"><filename>geoclue2-libs-2.4.5-1.el7.x86_64.rpm</filename><sum type="sha256">7302fc64d0ebaadd417fdbc0e24242d96947b6241217e14e6d26333714e86069</sum></package><package arch="x86_64" name="geocode-glib" release="1.el7" src="geocode-glib-3.20.1-1.el7.src.rpm" version="3.20.1"><filename>geocode-glib-3.20.1-1.el7.x86_64.rpm</filename><sum type="sha256">9b8224f900c271fab95f92a3eaf3a71dee23bf35ada0037af35b1f6c5663c6da</sum></package><package arch="x86_64" name="geoclue2" release="1.el7" src="geoclue2-2.4.5-1.el7.src.rpm" version="2.4.5"><filename>geoclue2-2.4.5-1.el7.x86_64.rpm</filename><sum type="sha256">6143d90148e3273e771c066bb535ae1107600c9c5b76721735ccdae266799fbe</sum></package><package arch="i686" name="geoclue2-devel" release="1.el7" src="geoclue2-2.4.5-1.el7.src.rpm" version="2.4.5"><filename>geoclue2-devel-2.4.5-1.el7.i686.rpm</filename><sum type="sha256">496be0f7e6d7987b6907b64cef69edb7e6964992fca509b2ab61745ff524b14e</sum></package><package arch="i686" name="geocode-glib-devel" release="1.el7" src="geocode-glib-3.20.1-1.el7.src.rpm" version="3.20.1"><filename>geocode-glib-devel-3.20.1-1.el7.i686.rpm</filename><sum type="sha256">3956d61fa3c2969767d1480f29b9fdb1460efad05c3a9308b306fec331244236</sum></package><package arch="x86_64" name="geoclue2-devel" release="1.el7" src="geoclue2-2.4.5-1.el7.src.rpm" version="2.4.5"><filename>geoclue2-devel-2.4.5-1.el7.x86_64.rpm</filename><sum type="sha256">51779f167f88a6d418c3e2671294fe3f9969a72b731536ef8aa148145d83f011</sum></package><package arch="x86_64" name="gnome-clocks" release="1.el7" src="gnome-clocks-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>gnome-clocks-3.22.1-1.el7.x86_64.rpm</filename><sum type="sha256">b0c33ad10da6da6c210c241cef68c3fc1c3e7ba5a21c3d66cf375f3f7492e4f0</sum></package><package arch="x86_64" name="geoclue2-demos" release="1.el7" src="geoclue2-2.4.5-1.el7.src.rpm" version="2.4.5"><filename>geoclue2-demos-2.4.5-1.el7.x86_64.rpm</filename><sum type="sha256">dd8a65906edaa6a036eabe0f7a49166c56f839562d87b2cf0f623781b1ba7f5c</sum></package><package arch="i686" name="geoclue2-libs" release="1.el7" src="geoclue2-2.4.5-1.el7.src.rpm" version="2.4.5"><filename>geoclue2-libs-2.4.5-1.el7.i686.rpm</filename><sum type="sha256">71fe3409f0d025d86c639d0d50ea133a42746c0444007f80ab4521732490faf6</sum></package><package arch="x86_64" name="geocode-glib-devel" release="1.el7" src="geocode-glib-3.20.1-1.el7.src.rpm" version="3.20.1"><filename>geocode-glib-devel-3.20.1-1.el7.x86_64.rpm</filename><sum type="sha256">038c7854dbaf1ebd318c58ad1b77bd84d33bbb5a2768754e9076c84f20b264a2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2134" id="RHBA-2017:2134-1" title="Rhba-2017:2134-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2136-1</id><title>Gnome-Dictionary Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="gnome-dictionary-devel" release="1.el7" src="gnome-dictionary-3.20.0-1.el7.src.rpm" version="3.20.0"><filename>gnome-dictionary-devel-3.20.0-1.el7.i686.rpm</filename><sum type="sha256">ee6d25fba165c5974ee55c93cbcd4f5e4f623fdce9d826d402af0b9ce2f36035</sum></package><package arch="i686" name="gnome-dictionary" release="1.el7" src="gnome-dictionary-3.20.0-1.el7.src.rpm" version="3.20.0"><filename>gnome-dictionary-3.20.0-1.el7.i686.rpm</filename><sum type="sha256">18709887e1baa6363648156da553e49d2b913195574714cafb398aeb4eeabee2</sum></package><package arch="i686" name="gnome-dictionary-libs" release="1.el7" src="gnome-dictionary-3.20.0-1.el7.src.rpm" version="3.20.0"><filename>gnome-dictionary-libs-3.20.0-1.el7.i686.rpm</filename><sum type="sha256">bc5be29356a331fecbd81caef0364abac3c3fbad0febc02e5d61e6e64a50b937</sum></package><package arch="x86_64" name="gnome-dictionary-devel" release="1.el7" src="gnome-dictionary-3.20.0-1.el7.src.rpm" version="3.20.0"><filename>gnome-dictionary-devel-3.20.0-1.el7.x86_64.rpm</filename><sum type="sha256">1a344d154a141ec3a9a058a15367a806217dab0ac9e0237d61d784ad283603fc</sum></package><package arch="x86_64" name="gnome-dictionary" release="1.el7" src="gnome-dictionary-3.20.0-1.el7.src.rpm" version="3.20.0"><filename>gnome-dictionary-3.20.0-1.el7.x86_64.rpm</filename><sum type="sha256">5f502f4a31c871e7d21221e5c308b2debc09958b111d5da4283da4e5fc2a58f4</sum></package><package arch="x86_64" name="gnome-dictionary-libs" release="1.el7" src="gnome-dictionary-3.20.0-1.el7.src.rpm" version="3.20.0"><filename>gnome-dictionary-libs-3.20.0-1.el7.x86_64.rpm</filename><sum type="sha256">f50db80cb8ffca27305828db5134561e8e0039d134aa2513516e8c056d324567</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2136" id="RHBA-2017:2136-1" title="Rhba-2017:2136-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2137-1</id><title>Nautilus Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="nautilus-devel" release="3.el7" src="nautilus-3.22.3-3.el7.src.rpm" version="3.22.3"><filename>nautilus-devel-3.22.3-3.el7.i686.rpm</filename><sum type="sha256">1f2e256beea209d6b6f2fc396b2598559ad2451575456e13ed1bcf5ae9bcc1e7</sum></package><package arch="i686" name="gvfs-devel" release="3.el7" src="gvfs-1.30.4-3.el7.src.rpm" version="1.30.4"><filename>gvfs-devel-1.30.4-3.el7.i686.rpm</filename><sum type="sha256">374984624a2f0cc18502f3b1c22bc03a8889c5c84317df72974885f79e8d73f4</sum></package><package arch="i686" name="libgphoto2-devel" release="5.el7" src="libgphoto2-2.5.2-5.el7.src.rpm" version="2.5.2"><filename>libgphoto2-devel-2.5.2-5.el7.i686.rpm</filename><sum type="sha256">80196ba7d07d2e076d316b44deb2c525c814b9babc270d99393ad32b2817a498</sum></package><package arch="x86_64" name="gvfs-smb" release="3.el7" src="gvfs-1.30.4-3.el7.src.rpm" version="1.30.4"><filename>gvfs-smb-1.30.4-3.el7.x86_64.rpm</filename><sum type="sha256">d8ee30236a8e1de8f97961ba63dcf772dbd4235d915cc1edab72871103106503</sum></package><package arch="x86_64" name="libplist-python" release="3.el7" src="libplist-1.12-3.el7.src.rpm" version="1.12"><filename>libplist-python-1.12-3.el7.x86_64.rpm</filename><sum type="sha256">d7623dbfd7ca7df1bdd53b6e38cdc4f16b06b162bde6c272063b45313bc28741</sum></package><package arch="x86_64" epoch="1" name="nautilus-sendto" release="1.el7" src="nautilus-sendto-3.8.4-1.el7.src.rpm" version="3.8.4"><filename>nautilus-sendto-3.8.4-1.el7.x86_64.rpm</filename><sum type="sha256">e80f5a803b5db52cf0a229301437c10a3382baae0f6b5d10919b2909ad033fe6</sum></package><package arch="i686" name="nautilus" release="3.el7" src="nautilus-3.22.3-3.el7.src.rpm" version="3.22.3"><filename>nautilus-3.22.3-3.el7.i686.rpm</filename><sum type="sha256">1289f773fe1fac23d4a24d8a75987201fb6ca0bf7bb62da101c527b2cfd9cd83</sum></package><package arch="x86_64" name="libgphoto2-devel" release="5.el7" src="libgphoto2-2.5.2-5.el7.src.rpm" version="2.5.2"><filename>libgphoto2-devel-2.5.2-5.el7.x86_64.rpm</filename><sum type="sha256">caf34fba397c713d06441a8a8fa9c6cc03d1dcf37689eb50e1b6e1c171a5ed2d</sum></package><package arch="x86_64" name="libgphoto2" release="5.el7" src="libgphoto2-2.5.2-5.el7.src.rpm" version="2.5.2"><filename>libgphoto2-2.5.2-5.el7.x86_64.rpm</filename><sum type="sha256">7b8ec1e35b66e231596d0b1dd80d958aecb66e00c122d45bbe6dd40b0a8d0203</sum></package><package arch="x86_64" name="nautilus-devel" release="3.el7" src="nautilus-3.22.3-3.el7.src.rpm" version="3.22.3"><filename>nautilus-devel-3.22.3-3.el7.x86_64.rpm</filename><sum type="sha256">486977d499edc165156a88b5185b8041352fc3f18041d3ed7333b40d893703e8</sum></package><package arch="x86_64" name="gvfs-goa" release="3.el7" src="gvfs-1.30.4-3.el7.src.rpm" version="1.30.4"><filename>gvfs-goa-1.30.4-3.el7.x86_64.rpm</filename><sum type="sha256">cf77535378a229f2025e0f16da23cfecf0468ae203855ce80cc4186636102c0d</sum></package><package arch="x86_64" name="nautilus" release="3.el7" src="nautilus-3.22.3-3.el7.src.rpm" version="3.22.3"><filename>nautilus-3.22.3-3.el7.x86_64.rpm</filename><sum type="sha256">74000268ef85ef308b089e0e0d3f26b671c8418827ce900c13bd717687ccdf8d</sum></package><package arch="x86_64" name="libusbmuxd-devel" release="5.el7" src="libusbmuxd-1.0.10-5.el7.src.rpm" version="1.0.10"><filename>libusbmuxd-devel-1.0.10-5.el7.x86_64.rpm</filename><sum type="sha256">4448dc5a48a7ba2d303c2bcd02e986c16393438caf0675c616a7dd7a20ada11b</sum></package><package arch="x86_64" name="gvfs-tests" release="3.el7" src="gvfs-1.30.4-3.el7.src.rpm" version="1.30.4"><filename>gvfs-tests-1.30.4-3.el7.x86_64.rpm</filename><sum type="sha256">fc43a82fae0758fc690bed979059acbf5801db61d3e65c1ce0e38bd20bc0ec15</sum></package><package arch="x86_64" name="gvfs-fuse" release="3.el7" src="gvfs-1.30.4-3.el7.src.rpm" version="1.30.4"><filename>gvfs-fuse-1.30.4-3.el7.x86_64.rpm</filename><sum type="sha256">ca09f092be3b525d6d878560cfcfd0e322fbb37c1d1670a9fb371b64940cd70a</sum></package><package arch="x86_64" name="gvfs-devel" release="3.el7" src="gvfs-1.30.4-3.el7.src.rpm" version="1.30.4"><filename>gvfs-devel-1.30.4-3.el7.x86_64.rpm</filename><sum type="sha256">0116838db6308219e4a4569d2c9df22e885df0eedb11fb60bb240a3a7159b569</sum></package><package arch="i686" name="gvfs" release="3.el7" src="gvfs-1.30.4-3.el7.src.rpm" version="1.30.4"><filename>gvfs-1.30.4-3.el7.i686.rpm</filename><sum type="sha256">e5025c1228bc1b37a78ec4ea087e8c16979aad0ba086cc75de0840680e43ebad</sum></package><package arch="x86_64" name="gvfs-gphoto2" release="3.el7" src="gvfs-1.30.4-3.el7.src.rpm" version="1.30.4"><filename>gvfs-gphoto2-1.30.4-3.el7.x86_64.rpm</filename><sum type="sha256">501eaa23c29eff4ca531ea71d824c780194e92ee95474d2ba7fd688c18fb6d2a</sum></package><package arch="x86_64" name="gvfs" release="3.el7" src="gvfs-1.30.4-3.el7.src.rpm" version="1.30.4"><filename>gvfs-1.30.4-3.el7.x86_64.rpm</filename><sum type="sha256">b75589ff8c56db3989086905879e29934094a0932c137a305100ef3abe60468f</sum></package><package arch="x86_64" name="gvfs-afc" release="3.el7" src="gvfs-1.30.4-3.el7.src.rpm" version="1.30.4"><filename>gvfs-afc-1.30.4-3.el7.x86_64.rpm</filename><sum type="sha256">40e10b4cbdad8d9f0ed1609d66c111cb93a0e338a64dc2c52b615f7e88cd93ba</sum></package><package arch="i686" name="usbmuxd" release="1.el7" src="usbmuxd-1.1.0-1.el7.src.rpm" version="1.1.0"><filename>usbmuxd-1.1.0-1.el7.i686.rpm</filename><sum type="sha256">57038b434770525c84ef9ad7e94e0fbb8aa6f72412487089873d693a68f44c7c</sum></package><package arch="i686" name="libimobiledevice-devel" release="1.el7" src="libimobiledevice-1.2.0-1.el7.src.rpm" version="1.2.0"><filename>libimobiledevice-devel-1.2.0-1.el7.i686.rpm</filename><sum type="sha256">8d37bc0beaa109ea745585f8308934a5b75de3e5d29ab910fda29835ff99afa7</sum></package><package arch="i686" name="libgphoto2" release="5.el7" src="libgphoto2-2.5.2-5.el7.src.rpm" version="2.5.2"><filename>libgphoto2-2.5.2-5.el7.i686.rpm</filename><sum type="sha256">792fc831d88b2e0f0269c58b4e4d3298082d107b3059d12073f3daa36e6555b8</sum></package><package arch="i686" name="gvfs-client" release="3.el7" src="gvfs-1.30.4-3.el7.src.rpm" version="1.30.4"><filename>gvfs-client-1.30.4-3.el7.i686.rpm</filename><sum type="sha256">8e645b299b2745787f45ff739b418541307725a7b3c3a8599b22fbee9e56589c</sum></package><package arch="i686" name="libplist" release="3.el7" src="libplist-1.12-3.el7.src.rpm" version="1.12"><filename>libplist-1.12-3.el7.i686.rpm</filename><sum type="sha256">f59dad72da195f6a69bb2ee45e7e7425fb247270c0cbb4aeef2ddbf8f766a312</sum></package><package arch="i686" name="libimobiledevice" release="1.el7" src="libimobiledevice-1.2.0-1.el7.src.rpm" version="1.2.0"><filename>libimobiledevice-1.2.0-1.el7.i686.rpm</filename><sum type="sha256">f66b824e6590c8deab53db2fb844ba3c6fdd6f7b36c72e285816354b916a6de1</sum></package><package arch="x86_64" name="usbmuxd" release="1.el7" src="usbmuxd-1.1.0-1.el7.src.rpm" version="1.1.0"><filename>usbmuxd-1.1.0-1.el7.x86_64.rpm</filename><sum type="sha256">4bcea177d1eb3f55ff8f6ce7c9f13ee0ba4520e78974e93fe429a877d53be9c4</sum></package><package arch="x86_64" name="libimobiledevice-devel" release="1.el7" src="libimobiledevice-1.2.0-1.el7.src.rpm" version="1.2.0"><filename>libimobiledevice-devel-1.2.0-1.el7.x86_64.rpm</filename><sum type="sha256">1907b4b2d2c17193b365e2a762ebb64ab58ba18fa34efa1baf10e459318de814</sum></package><package arch="x86_64" name="gvfs-client" release="3.el7" src="gvfs-1.30.4-3.el7.src.rpm" version="1.30.4"><filename>gvfs-client-1.30.4-3.el7.x86_64.rpm</filename><sum type="sha256">40839b22b0df02be7268538f6a39f62deb8ca85b830dab06917623f74ee32e5e</sum></package><package arch="i686" name="libusbmuxd-devel" release="5.el7" src="libusbmuxd-1.0.10-5.el7.src.rpm" version="1.0.10"><filename>libusbmuxd-devel-1.0.10-5.el7.i686.rpm</filename><sum type="sha256">d2f42dbad958a105914cccec0a58f6cfe3ac524549a683d599376bbba3a12f54</sum></package><package arch="x86_64" name="nautilus-extensions" release="3.el7" src="nautilus-3.22.3-3.el7.src.rpm" version="3.22.3"><filename>nautilus-extensions-3.22.3-3.el7.x86_64.rpm</filename><sum type="sha256">ef2370c5b48de8443433ddcae27fb71faaf3223a905ee447abfdd563426d927c</sum></package><package arch="x86_64" name="libplist" release="3.el7" src="libplist-1.12-3.el7.src.rpm" version="1.12"><filename>libplist-1.12-3.el7.x86_64.rpm</filename><sum type="sha256">8262f06a3ae7fb19cc1c0f70aa71b839a88e36630bc0d5239a7fb0267777ac84</sum></package><package arch="x86_64" name="libimobiledevice" release="1.el7" src="libimobiledevice-1.2.0-1.el7.src.rpm" version="1.2.0"><filename>libimobiledevice-1.2.0-1.el7.x86_64.rpm</filename><sum type="sha256">729ee925ba0065d178530312a29c34516b207522ba44d26ceea025f87d7da14d</sum></package><package arch="x86_64" name="libimobiledevice-utils" release="1.el7" src="libimobiledevice-1.2.0-1.el7.src.rpm" version="1.2.0"><filename>libimobiledevice-utils-1.2.0-1.el7.x86_64.rpm</filename><sum type="sha256">5ad03a84021bd27fa5972671f4d7b377e740803770daa930cd3d58bb36a8fa79</sum></package><package arch="x86_64" name="gvfs-archive" release="3.el7" src="gvfs-1.30.4-3.el7.src.rpm" version="1.30.4"><filename>gvfs-archive-1.30.4-3.el7.x86_64.rpm</filename><sum type="sha256">0fe4f8c5443c2719ca24dca3360dca02e269a84396898f06d2519aa4d06556bb</sum></package><package arch="x86_64" name="libusbmuxd" release="5.el7" src="libusbmuxd-1.0.10-5.el7.src.rpm" version="1.0.10"><filename>libusbmuxd-1.0.10-5.el7.x86_64.rpm</filename><sum type="sha256">70964990507e6f734875a169536780cfcc316d23462577b01ae2b33c5d999f50</sum></package><package arch="i686" name="nautilus-extensions" release="3.el7" src="nautilus-3.22.3-3.el7.src.rpm" version="3.22.3"><filename>nautilus-extensions-3.22.3-3.el7.i686.rpm</filename><sum type="sha256">2a091609e4f1d7242cd8db17634e83d06ec23ff26d9c398230638e8d61bf5435</sum></package><package arch="i686" name="libplist-devel" release="3.el7" src="libplist-1.12-3.el7.src.rpm" version="1.12"><filename>libplist-devel-1.12-3.el7.i686.rpm</filename><sum type="sha256">0458ddc0bd2d42b9bf7a4c160981a1757773d1e0bfffec56bfb0daa7f7dfd553</sum></package><package arch="x86_64" name="gvfs-mtp" release="3.el7" src="gvfs-1.30.4-3.el7.src.rpm" version="1.30.4"><filename>gvfs-mtp-1.30.4-3.el7.x86_64.rpm</filename><sum type="sha256">8c12c266dc3dca5bce17a80ab318b2ec00d2d92cc2165fe6af85cc7c91a86033</sum></package><package arch="x86_64" name="libusbmuxd-utils" release="5.el7" src="libusbmuxd-1.0.10-5.el7.src.rpm" version="1.0.10"><filename>libusbmuxd-utils-1.0.10-5.el7.x86_64.rpm</filename><sum type="sha256">b08ade6a00bc9be702abf188628aa58280d59ec5a763a2c7c4a2ed0b103e9a06</sum></package><package arch="x86_64" name="gvfs-afp" release="3.el7" src="gvfs-1.30.4-3.el7.src.rpm" version="1.30.4"><filename>gvfs-afp-1.30.4-3.el7.x86_64.rpm</filename><sum type="sha256">0442632b78eb273ef46aefa9925b8b8a39fac579ba6c32926cc1d6008cf96a6e</sum></package><package arch="x86_64" name="libplist-devel" release="3.el7" src="libplist-1.12-3.el7.src.rpm" version="1.12"><filename>libplist-devel-1.12-3.el7.x86_64.rpm</filename><sum type="sha256">b4a5145198974bd0ee7d17935fed5f748d3efd1fd25538562ca755f05ba27a11</sum></package><package arch="x86_64" name="libimobiledevice-python" release="1.el7" src="libimobiledevice-1.2.0-1.el7.src.rpm" version="1.2.0"><filename>libimobiledevice-python-1.2.0-1.el7.x86_64.rpm</filename><sum type="sha256">9e8258b7ed16eede8eeb8f282cab51637290701ded9288ede917781ffa15b100</sum></package><package arch="i686" name="libusbmuxd" release="5.el7" src="libusbmuxd-1.0.10-5.el7.src.rpm" version="1.0.10"><filename>libusbmuxd-1.0.10-5.el7.i686.rpm</filename><sum type="sha256">6af3d7c6cc913ab1dddaaf938f7c2fd1b99ea574b4eea419d25471e6a0f83ccf</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2137" id="RHBA-2017:2137-1" title="Rhba-2017:2137-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2138-1</id><title>Gnome-Tweak-Tool Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="gnome-tweak-tool" release="1.el7" src="gnome-tweak-tool-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gnome-tweak-tool-3.22.0-1.el7.noarch.rpm</filename><sum type="sha256">8682354a4e7d1c2a146dac7f64d690b357e46f04768b469defaaad496d09f93d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2138" id="RHBA-2017:2138-1" title="Rhba-2017:2138-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2139-1</id><title>Gnome-Font-Viewer Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gnome-font-viewer" release="1.el7" src="gnome-font-viewer-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gnome-font-viewer-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">838421f7e0faa41c327b4a8d200e6d300fede15a8ff2c653118762e0c0424c26</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2139" id="RHBA-2017:2139-1" title="Rhba-2017:2139-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2143-1</id><title>Gnome-Disk-Utility Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gnome-disk-utility" release="1.el7" src="gnome-disk-utility-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>gnome-disk-utility-3.22.1-1.el7.x86_64.rpm</filename><sum type="sha256">f39cb99d92a695cf19e75ca3d748513cdcc5f282cccbee70eb8ac84c4c4d8598</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2143" id="RHBA-2017:2143-1" title="Rhba-2017:2143-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2147-1</id><title>Zenity Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="zenity" release="1.el7" src="zenity-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>zenity-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">54cd7ebaa3f7077c8c0e3e6e73fc964b0b7da23ebb4c7d10c7fe095082fea760</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2147" id="RHBA-2017:2147-1" title="Rhba-2017:2147-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2153-1</id><title>Upower Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="upower" release="2.el7" src="upower-0.99.4-2.el7.src.rpm" version="0.99.4"><filename>upower-0.99.4-2.el7.x86_64.rpm</filename><sum type="sha256">303706697b3190972a4498b4e8e981283f2e62559a8b875d56026a730e1d908a</sum></package><package arch="i686" name="upower-devel" release="2.el7" src="upower-0.99.4-2.el7.src.rpm" version="0.99.4"><filename>upower-devel-0.99.4-2.el7.i686.rpm</filename><sum type="sha256">b227ad698f6fc3d7a8b8024bdead3f7e0c4959ab6d53e70aefe14a7773362f8a</sum></package><package arch="noarch" name="upower-devel-docs" release="2.el7" src="upower-0.99.4-2.el7.src.rpm" version="0.99.4"><filename>upower-devel-docs-0.99.4-2.el7.noarch.rpm</filename><sum type="sha256">b89c9cdda108c9eb67ec6044c69c11467da8f948ae7adeff0ef7f252ae91cb97</sum></package><package arch="i686" name="upower" release="2.el7" src="upower-0.99.4-2.el7.src.rpm" version="0.99.4"><filename>upower-0.99.4-2.el7.i686.rpm</filename><sum type="sha256">01c44767ca21a5a7aaeb192d6075e370e2fb234fa319b68904de1566483b5522</sum></package><package arch="x86_64" name="upower-devel" release="2.el7" src="upower-0.99.4-2.el7.src.rpm" version="0.99.4"><filename>upower-devel-0.99.4-2.el7.x86_64.rpm</filename><sum type="sha256">8478eed23a7be451f38b6f491c47332d1740fd7ec963e4bdefd76e437045e5bb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2153" id="RHBA-2017:2153-1" title="Rhba-2017:2153-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2167-1</id><title>Libmspack Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libmspack" release="0.5.alpha.el7" src="libmspack-0.5-0.5.alpha.el7.src.rpm" version="0.5"><filename>libmspack-0.5-0.5.alpha.el7.i686.rpm</filename><sum type="sha256">1b620ee1ed986c5d20a93135e138b760cdf85298245e3aac5b7d9492ea74e33e</sum></package><package arch="i686" name="libmspack-devel" release="0.5.alpha.el7" src="libmspack-0.5-0.5.alpha.el7.src.rpm" version="0.5"><filename>libmspack-devel-0.5-0.5.alpha.el7.i686.rpm</filename><sum type="sha256">242f72d35b7ab8958f986cb907cb40ccb0535cb3bd04503974d8246dd01978af</sum></package><package arch="x86_64" name="libmspack" release="0.5.alpha.el7" src="libmspack-0.5-0.5.alpha.el7.src.rpm" version="0.5"><filename>libmspack-0.5-0.5.alpha.el7.x86_64.rpm</filename><sum type="sha256">aa5a67baabbd6208f07607dfff9a1e1e453efb1a4914fbdad1ff6e84924eabff</sum></package><package arch="x86_64" name="libmspack-devel" release="0.5.alpha.el7" src="libmspack-0.5-0.5.alpha.el7.src.rpm" version="0.5"><filename>libmspack-devel-0.5-0.5.alpha.el7.x86_64.rpm</filename><sum type="sha256">6e00c058790619578352c699343b682668fd3c5f1d1f0e174788f71ac168e2e1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2167" id="RHBA-2017:2167-1" title="Rhba-2017:2167-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2233-1</id><title>Nfs-Utils Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-09-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="nfs-utils" release="0.48.el7" src="nfs-utils-1.3.0-0.48.el7.src.rpm" version="1.3.0"><filename>nfs-utils-1.3.0-0.48.el7.x86_64.rpm</filename><sum type="sha256">92b14d5e9052f3d459f0b2b94d461add6553c162800185f2e02116b7abbdb6cc</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2233" id="RHBA-2017:2233-1" title="Rhba-2017:2233-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2240-1</id><title>New Packages: Python-Oauthlib</title><description /><release>Scientific Linux</release><issued date="2017-09-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python2-oauthlib" release="8.el7" src="python-oauthlib-2.0.1-8.el7.src.rpm" version="2.0.1"><filename>python2-oauthlib-2.0.1-8.el7.noarch.rpm</filename><sum type="sha256">ebfaaf6536f7e8d8c1eaacc1ca697f8a07afb410540cd486e9790531b29d5569</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2240" id="RHBA-2017:2240-1" title="Rhba-2017:2240-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2242-1</id><title>New Packages: Python-Requests-Oauthlib</title><description /><release>Scientific Linux</release><issued date="2017-09-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python2-requests-oauthlib" release="5.el7" src="python-requests-oauthlib-0.8.0-5.el7.src.rpm" version="0.8.0"><filename>python2-requests-oauthlib-0.8.0-5.el7.noarch.rpm</filename><sum type="sha256">11b5433486a12c51bb1188e537f40e464a77048ec5ac62a46481526b5eccdeee</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2242" id="RHBA-2017:2242-1" title="Rhba-2017:2242-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2257-1</id><title>Oxygen-Gtk Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="oxygen-gtk" release="6.el7" src="oxygen-gtk-1.2.0-6.el7.src.rpm" version="1.2.0"><filename>oxygen-gtk-1.2.0-6.el7.noarch.rpm</filename><sum type="sha256">649d2df5fe738a9207d97faf4601e5da9ad3fe9440c89548862e899e41a4ede7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2257" id="RHBA-2017:2257-1" title="Rhba-2017:2257-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2269-1</id><title>Python-Gssapi Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-gssapi" release="3.el7" src="python-gssapi-1.2.0-3.el7.src.rpm" version="1.2.0"><filename>python-gssapi-1.2.0-3.el7.x86_64.rpm</filename><sum type="sha256">37b33363827da7add381f3bccc394a8e9453973d55b5af9b34e44bf1d096d88f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2269" id="RHBA-2017:2269-1" title="Rhba-2017:2269-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2270-1</id><title>New Packages: Python-Jsonpatch</title><description /><release>Scientific Linux</release><issued date="2017-09-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-jsonpatch" release="4.el7" src="python-jsonpatch-1.2-4.el7.src.rpm" version="1.2"><filename>python-jsonpatch-1.2-4.el7.noarch.rpm</filename><sum type="sha256">31ec47955cae7a492be5176dd7fbce6dba1b5533d4905e1904ae38288cdb7500</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2270" id="RHBA-2017:2270-1" title="Rhba-2017:2270-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2274-1</id><title>New Packages: Python-Prettytable</title><description /><release>Scientific Linux</release><issued date="2017-09-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-prettytable" release="3.el7" src="python-prettytable-0.7.2-3.el7.src.rpm" version="0.7.2"><filename>python-prettytable-0.7.2-3.el7.noarch.rpm</filename><sum type="sha256">be8bb14aa1372b779d56b82dc877aff043d2c2de2cff58d5c73f7f541f4e85ab</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2274" id="RHBA-2017:2274-1" title="Rhba-2017:2274-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2279-1</id><title>Sanlock Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-09-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="sanlock-lib" release="1.el7" src="sanlock-3.5.0-1.el7.src.rpm" version="3.5.0"><filename>sanlock-lib-3.5.0-1.el7.x86_64.rpm</filename><sum type="sha256">204fc09310aadd5beea4869a4f1bf4e88305d70ee1955499eb00c83d4c0be1f6</sum></package><package arch="x86_64" name="sanlock-python" release="1.el7" src="sanlock-3.5.0-1.el7.src.rpm" version="3.5.0"><filename>sanlock-python-3.5.0-1.el7.x86_64.rpm</filename><sum type="sha256">30a74dc486e51651f2b3bfda5a0422e006b631003d8718767a1380422b23a2a9</sum></package><package arch="x86_64" name="fence-sanlock" release="1.el7" src="sanlock-3.5.0-1.el7.src.rpm" version="3.5.0"><filename>fence-sanlock-3.5.0-1.el7.x86_64.rpm</filename><sum type="sha256">d5cf08481e2dc637dae39667c10ffed2958bbe4c94d3b9c9cf06da9c58ee2c8b</sum></package><package arch="x86_64" name="sanlock" release="1.el7" src="sanlock-3.5.0-1.el7.src.rpm" version="3.5.0"><filename>sanlock-3.5.0-1.el7.x86_64.rpm</filename><sum type="sha256">fe074c727d81350b33f8db8ade4a6e476174edd12216900da10e4b911244e353</sum></package><package arch="x86_64" name="sanlock-devel" release="1.el7" src="sanlock-3.5.0-1.el7.src.rpm" version="3.5.0"><filename>sanlock-devel-3.5.0-1.el7.x86_64.rpm</filename><sum type="sha256">1849d632ececa744e0de4fd61699a172cce6fc63e2c5535cfcdf1f21adb4f21c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2279" id="RHBA-2017:2279-1" title="Rhba-2017:2279-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2300-1</id><title>Kexec-Tools Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kexec-tools-anaconda-addon" release="17.el7" src="kexec-tools-2.0.14-17.el7.src.rpm" version="2.0.14"><filename>kexec-tools-anaconda-addon-2.0.14-17.el7.x86_64.rpm</filename><sum type="sha256">c562bcca932cb7e7fec1f78d4cd751d1e0aee66f53df4e6b08ac4049adbd547b</sum></package><package arch="x86_64" name="kexec-tools" release="17.el7" src="kexec-tools-2.0.14-17.el7.src.rpm" version="2.0.14"><filename>kexec-tools-2.0.14-17.el7.x86_64.rpm</filename><sum type="sha256">b01811a15cc93ac170c9f92dcea975a55c8760c874ab4b40edd50dfafde72383</sum></package><package arch="x86_64" name="kexec-tools-eppic" release="17.el7" src="kexec-tools-2.0.14-17.el7.src.rpm" version="2.0.14"><filename>kexec-tools-eppic-2.0.14-17.el7.x86_64.rpm</filename><sum type="sha256">32e094fbb435b5c60ab5e533cad565f6b831c17511efc5468cad37a3e60a6db9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2300" id="RHBA-2017:2300-1" title="Rhba-2017:2300-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2302-1</id><title>Dconf Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="dconf" release="2.el7" src="dconf-0.26.0-2.el7.src.rpm" version="0.26.0"><filename>dconf-0.26.0-2.el7.i686.rpm</filename><sum type="sha256">b20ede4e12c6f9cc71095b0269d453fefa2cc1c0483f703ec1b1452555fdcdeb</sum></package><package arch="x86_64" name="dconf" release="2.el7" src="dconf-0.26.0-2.el7.src.rpm" version="0.26.0"><filename>dconf-0.26.0-2.el7.x86_64.rpm</filename><sum type="sha256">5123d3ce69d48b90c7f102fe812b969ee6c13e646589727aec0b3e600913282b</sum></package><package arch="x86_64" name="dconf-devel" release="2.el7" src="dconf-0.26.0-2.el7.src.rpm" version="0.26.0"><filename>dconf-devel-0.26.0-2.el7.x86_64.rpm</filename><sum type="sha256">943105aeacf10ad860813c8d12b9a09a6d126a5dacad2876174eba9cdd13c8ad</sum></package><package arch="i686" name="dconf-devel" release="2.el7" src="dconf-0.26.0-2.el7.src.rpm" version="0.26.0"><filename>dconf-devel-0.26.0-2.el7.i686.rpm</filename><sum type="sha256">e1e995533cc4641accc3c5bd45eb3a116c157b5f2f2e281263ce1bfad56e8633</sum></package><package arch="x86_64" name="dconf-editor" release="3.el7" src="dconf-editor-3.22.3-3.el7.src.rpm" version="3.22.3"><filename>dconf-editor-3.22.3-3.el7.x86_64.rpm</filename><sum type="sha256">bbc1dcf7403747ac891e08a1127ef9914910fef4687975b0b56c73d8ece60c78</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2302" id="RHBA-2017:2302-1" title="Rhba-2017:2302-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2310-1</id><title>Gnome-Online-Accounts And Libgdata Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="gnome-online-accounts-devel" release="1.el7" src="gnome-online-accounts-3.22.5-1.el7.src.rpm" version="3.22.5"><filename>gnome-online-accounts-devel-3.22.5-1.el7.i686.rpm</filename><sum type="sha256">a5534ba1dfbae446cae27829270421bae8f83cb53c14be800f1e0ed23d49d4ab</sum></package><package arch="i686" name="libgdata-devel" release="1.el7" src="libgdata-0.17.8-1.el7.src.rpm" version="0.17.8"><filename>libgdata-devel-0.17.8-1.el7.i686.rpm</filename><sum type="sha256">8ffe67b85ae8e1f212b958294cd40c31589574a5de458c497f80659f4f860e55</sum></package><package arch="i686" name="gnome-online-accounts" release="1.el7" src="gnome-online-accounts-3.22.5-1.el7.src.rpm" version="3.22.5"><filename>gnome-online-accounts-3.22.5-1.el7.i686.rpm</filename><sum type="sha256">f760b5c7b86a5ec056337438970a1d4139dd4f6a6f74d0988c4522441840a4b5</sum></package><package arch="x86_64" name="libgdata" release="1.el7" src="libgdata-0.17.8-1.el7.src.rpm" version="0.17.8"><filename>libgdata-0.17.8-1.el7.x86_64.rpm</filename><sum type="sha256">549e3ca03b9d24ab250eb3828a2d0dd4ec211889be26c4c4693a4903f03eaba5</sum></package><package arch="x86_64" name="gnome-online-accounts-devel" release="1.el7" src="gnome-online-accounts-3.22.5-1.el7.src.rpm" version="3.22.5"><filename>gnome-online-accounts-devel-3.22.5-1.el7.x86_64.rpm</filename><sum type="sha256">3105477d1b11fa8f9d11b4edc9f2a00ed5cfbb25a19ebd792283ba7550b50157</sum></package><package arch="x86_64" name="libgdata-devel" release="1.el7" src="libgdata-0.17.8-1.el7.src.rpm" version="0.17.8"><filename>libgdata-devel-0.17.8-1.el7.x86_64.rpm</filename><sum type="sha256">8400c46dfd401a56afd79399342ece0236689b77a3ba8e8f1ec2ee824c456853</sum></package><package arch="x86_64" name="gnome-online-accounts" release="1.el7" src="gnome-online-accounts-3.22.5-1.el7.src.rpm" version="3.22.5"><filename>gnome-online-accounts-3.22.5-1.el7.x86_64.rpm</filename><sum type="sha256">eb1dae8a08187a861d91187c819c7fa91eb426e5d832ab9241d115333ded7632</sum></package><package arch="i686" name="libgdata" release="1.el7" src="libgdata-0.17.8-1.el7.src.rpm" version="0.17.8"><filename>libgdata-0.17.8-1.el7.i686.rpm</filename><sum type="sha256">58442b4b268e058344d128fdcd401ed58ce761e0d56955af92780316544d99b0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2310" id="RHBA-2017:2310-1" title="Rhba-2017:2310-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2311-1</id><title>Cheese Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="cheese-camera-service" release="1.el7" src="cheese-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>cheese-camera-service-3.22.1-1.el7.x86_64.rpm</filename><sum type="sha256">bd5d12a6ba637122106dc3c0027db835d54c3ed9d9f96524ef10d6529fc5a9c1</sum></package><package arch="x86_64" epoch="2" name="cheese-libs-devel" release="1.el7" src="cheese-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>cheese-libs-devel-3.22.1-1.el7.x86_64.rpm</filename><sum type="sha256">dab2334195d66442f6e5886b5b7c43eef414f1f8116fd24e837b0ab9fe80a267</sum></package><package arch="x86_64" name="clutter-gst3-devel" release="1.el7" src="clutter-gst3-3.0.22-1.el7.src.rpm" version="3.0.22"><filename>clutter-gst3-devel-3.0.22-1.el7.x86_64.rpm</filename><sum type="sha256">230bd8693f64e2eec05721aebdfbd7c53cfb9352fabdeee53822564052188660</sum></package><package arch="x86_64" name="clutter-gst3" release="1.el7" src="clutter-gst3-3.0.22-1.el7.src.rpm" version="3.0.22"><filename>clutter-gst3-3.0.22-1.el7.x86_64.rpm</filename><sum type="sha256">dac11355acd1f3560fb10176c51832385cf845999919f43f7d70e3884547849d</sum></package><package arch="x86_64" epoch="2" name="cheese-libs" release="1.el7" src="cheese-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>cheese-libs-3.22.1-1.el7.x86_64.rpm</filename><sum type="sha256">367fb993996dd0b3494c4a88dc7608ef3b7d623496449e2cfe8ab326936758e3</sum></package><package arch="x86_64" epoch="2" name="cheese" release="1.el7" src="cheese-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>cheese-3.22.1-1.el7.x86_64.rpm</filename><sum type="sha256">2b3f26d240435873a4e2da355253efd22f42364170f8634f3ad15afb8a45b52c</sum></package><package arch="i686" epoch="2" name="cheese-libs-devel" release="1.el7" src="cheese-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>cheese-libs-devel-3.22.1-1.el7.i686.rpm</filename><sum type="sha256">3f6a839f59c2f4f10b7f2196cf5c79fbb2946e442c9913a2f5077cfc053b6316</sum></package><package arch="i686" name="clutter-gst3-devel" release="1.el7" src="clutter-gst3-3.0.22-1.el7.src.rpm" version="3.0.22"><filename>clutter-gst3-devel-3.0.22-1.el7.i686.rpm</filename><sum type="sha256">5c0e9d06ac09530e5e208c908b4b4e1ba93da0794e02382dbb19e0d1cb02395d</sum></package><package arch="i686" name="compat-cheese314" release="1.el7" src="compat-cheese314-3.14.2-1.el7.src.rpm" version="3.14.2"><filename>compat-cheese314-3.14.2-1.el7.i686.rpm</filename><sum type="sha256">e5516ab2d5deab4299acb501027d2a1880fc18d4256cb6c8f73f405a41058498</sum></package><package arch="i686" epoch="2" name="cheese-libs" release="1.el7" src="cheese-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>cheese-libs-3.22.1-1.el7.i686.rpm</filename><sum type="sha256">7d53d9f691687e4f2960ef935081025d57331f50438fdaa85f1a762aa8c2e721</sum></package><package arch="x86_64" name="compat-cheese314" release="1.el7" src="compat-cheese314-3.14.2-1.el7.src.rpm" version="3.14.2"><filename>compat-cheese314-3.14.2-1.el7.x86_64.rpm</filename><sum type="sha256">43cb801bc17b58053ac9d42d415680965a2fa37cefb63d427502c30b709bf615</sum></package><package arch="i686" name="clutter-gst3" release="1.el7" src="clutter-gst3-3.0.22-1.el7.src.rpm" version="3.0.22"><filename>clutter-gst3-3.0.22-1.el7.i686.rpm</filename><sum type="sha256">ea79396e47352229c4463a188f33d665280d44a15291cf60c66c83b59bc4d708</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2311" id="RHBA-2017:2311-1" title="Rhba-2017:2311-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2312-1</id><title>Gnome-Documents, Gnome-Online-Miners, Libgepub Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libgepub" release="1.el7" src="libgepub-0.4-1.el7.src.rpm" version="0.4"><filename>libgepub-0.4-1.el7.i686.rpm</filename><sum type="sha256">491b63b03d42e1c00b29c57d7236b963401a819181b703e14346ec5e2937dc87</sum></package><package arch="x86_64" name="gnome-documents" release="5.el7" src="gnome-documents-3.22.2-5.el7.src.rpm" version="3.22.2"><filename>gnome-documents-3.22.2-5.el7.x86_64.rpm</filename><sum type="sha256">0b15b77ce606a45453dfb6575e157a4a82f1cbcd7f99000d152a867d594542da</sum></package><package arch="x86_64" name="gnome-documents-libs" release="5.el7" src="gnome-documents-3.22.2-5.el7.src.rpm" version="3.22.2"><filename>gnome-documents-libs-3.22.2-5.el7.x86_64.rpm</filename><sum type="sha256">ec7fa699806111ab07bd640ecfb40e85cfff841014bd44757edece9c5180605a</sum></package><package arch="x86_64" name="gnome-online-miners" release="2.el7" src="gnome-online-miners-3.22.0-2.el7.src.rpm" version="3.22.0"><filename>gnome-online-miners-3.22.0-2.el7.x86_64.rpm</filename><sum type="sha256">f5f21af794cfdc49ed141cc2a082e11ad02c2ef1b865f49135f606d70db64363</sum></package><package arch="x86_64" name="libgepub" release="1.el7" src="libgepub-0.4-1.el7.src.rpm" version="0.4"><filename>libgepub-0.4-1.el7.x86_64.rpm</filename><sum type="sha256">0c951732b673c7c9ab9e2ff6d4ebf5cbb3a37b0fe5847702023f76ba5a8035bb</sum></package><package arch="x86_64" name="libgepub-devel" release="1.el7" src="libgepub-0.4-1.el7.src.rpm" version="0.4"><filename>libgepub-devel-0.4-1.el7.x86_64.rpm</filename><sum type="sha256">af33839c8e342f84667c360a1b4ecd827f1469528a224c24f4545140d3d49a26</sum></package><package arch="i686" name="libgepub-devel" release="1.el7" src="libgepub-0.4-1.el7.src.rpm" version="0.4"><filename>libgepub-devel-0.4-1.el7.i686.rpm</filename><sum type="sha256">630da8dcfc7fcebde28bcb6dde14fb36161216bc0ce376911ba94f7033da92a7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2312" id="RHBA-2017:2312-1" title="Rhba-2017:2312-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2313-1</id><title>Gnome-Terminal And Vte Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="vte291-devel" release="1.el7" src="vte291-0.46.2-1.el7.src.rpm" version="0.46.2"><filename>vte291-devel-0.46.2-1.el7.i686.rpm</filename><sum type="sha256">f54ff19b2141ada6407f0e56e692cc8095e1275e7619f73ea8a842ca6b092392</sum></package><package arch="x86_64" name="gnome-terminal-nautilus" release="2.el7" src="gnome-terminal-3.22.1-2.el7.src.rpm" version="3.22.1"><filename>gnome-terminal-nautilus-3.22.1-2.el7.x86_64.rpm</filename><sum type="sha256">63b5bc35a9169bf0413f14ce16410d876cf24ca4120428d46e2c128a64dab438</sum></package><package arch="i686" name="vte291" release="1.el7" src="vte291-0.46.2-1.el7.src.rpm" version="0.46.2"><filename>vte291-0.46.2-1.el7.i686.rpm</filename><sum type="sha256">6e0227a1c4e8b706db0f7d1391931925fb4a3b9108f8707c83d3f02c3d1fb901</sum></package><package arch="x86_64" name="vte-profile" release="1.el7" src="vte291-0.46.2-1.el7.src.rpm" version="0.46.2"><filename>vte-profile-0.46.2-1.el7.x86_64.rpm</filename><sum type="sha256">04535152440ab24d6e83120a586435947dc143e267650316ef2888e79e08ed8f</sum></package><package arch="x86_64" name="vte291-devel" release="1.el7" src="vte291-0.46.2-1.el7.src.rpm" version="0.46.2"><filename>vte291-devel-0.46.2-1.el7.x86_64.rpm</filename><sum type="sha256">dfc2fe211148b13d8d9149cfa3a6239e2e6f060b3334550a136aadc3572a53d7</sum></package><package arch="x86_64" name="gnome-terminal" release="2.el7" src="gnome-terminal-3.22.1-2.el7.src.rpm" version="3.22.1"><filename>gnome-terminal-3.22.1-2.el7.x86_64.rpm</filename><sum type="sha256">51aa846132e0b387fd9a93208bffcae4dacdd5c8bc959353ea7148bdf8fcff02</sum></package><package arch="x86_64" name="vte291" release="1.el7" src="vte291-0.46.2-1.el7.src.rpm" version="0.46.2"><filename>vte291-0.46.2-1.el7.x86_64.rpm</filename><sum type="sha256">b42af8a626dde6b20e1448f8b8adf33dba5f54a8da5a3346ea82c8d62fb62a8b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2313" id="RHBA-2017:2313-1" title="Rhba-2017:2313-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2315-1</id><title>Rhythmbox, Gom, Grilo, Totem, Libdmapsharing, Compat-Grilo02 Update</title><description>* Bookmarks

* Euronews

* Filesystem

* Flickr

* Freebox

* Gravatar

* iTunes Music Sharing

* Jamendo

* Last.fm

* Local Metadata

* Metadata Store

* Pocket

* Podcasts

* Radio France

* Shoutcast

* The Guardian Videos

* Tracker

* Vimeo</description><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libdmapsharing" release="1.el7" src="libdmapsharing-2.9.37-1.el7.src.rpm" version="2.9.37"><filename>libdmapsharing-2.9.37-1.el7.i686.rpm</filename><sum type="sha256">b996ae6bebdb3a4fee719675789c4f80dcf4f383e659d687aac3a5beb7b2f93d</sum></package><package arch="i686" name="totem-pl-parser" release="1.el7" src="totem-pl-parser-3.10.7-1.el7.src.rpm" version="3.10.7"><filename>totem-pl-parser-3.10.7-1.el7.i686.rpm</filename><sum type="sha256">4f1eda2864e4d015daa8c1dad3a4bef67047e3aed92f8e4110d541a476387f2a</sum></package><package arch="x86_64" name="rhythmbox-devel" release="1.el7" src="rhythmbox-3.4.1-1.el7.src.rpm" version="3.4.1"><filename>rhythmbox-devel-3.4.1-1.el7.x86_64.rpm</filename><sum type="sha256">a70ab5c44788d5eb7c1a4a7b7a6f6de012a3708b11d88aae2a7015412bdf5aae</sum></package><package arch="i686" name="libgpod-devel" release="12.el7" src="libgpod-0.8.2-12.el7.src.rpm" version="0.8.2"><filename>libgpod-devel-0.8.2-12.el7.i686.rpm</filename><sum type="sha256">29a86c61c6a98f8eabf477782f9d80207af68b8144fe37333a2b9ed30787d0e9</sum></package><package arch="x86_64" name="gom" release="1.el7" src="gom-0.3.2-1.el7.src.rpm" version="0.3.2"><filename>gom-0.3.2-1.el7.x86_64.rpm</filename><sum type="sha256">7757f14dbeadcc26abac1181b126ce2fb5c3e2410fee3f5372d9e405618791d2</sum></package><package arch="i686" name="libgpod" release="12.el7" src="libgpod-0.8.2-12.el7.src.rpm" version="0.8.2"><filename>libgpod-0.8.2-12.el7.i686.rpm</filename><sum type="sha256">01416540fd1d300c9ff37af168901635a25539442355a1fad62ca9b99cd7c73f</sum></package><package arch="i686" name="libdmapsharing-devel" release="1.el7" src="libdmapsharing-2.9.37-1.el7.src.rpm" version="2.9.37"><filename>libdmapsharing-devel-2.9.37-1.el7.i686.rpm</filename><sum type="sha256">2eccd2b4f0a079f367abd0781dec534ba51553b32cddab183c4c85946d94f0c4</sum></package><package arch="x86_64" name="libgpod-devel" release="12.el7" src="libgpod-0.8.2-12.el7.src.rpm" version="0.8.2"><filename>libgpod-devel-0.8.2-12.el7.x86_64.rpm</filename><sum type="sha256">71ae559b9b863e22ea3a730c7836c8a78cd2a1384ca83b28c804040b41c09d80</sum></package><package arch="i686" name="grilo-devel" release="1.el7" src="grilo-0.3.3-1.el7.src.rpm" version="0.3.3"><filename>grilo-devel-0.3.3-1.el7.i686.rpm</filename><sum type="sha256">b2f462c972fbccd4fa672de5cacebd044df81f3ace8562b01157ef93fee3da9a</sum></package><package arch="x86_64" name="libgpod-doc" release="12.el7" src="libgpod-0.8.2-12.el7.src.rpm" version="0.8.2"><filename>libgpod-doc-0.8.2-12.el7.x86_64.rpm</filename><sum type="sha256">6c10310fe7b8ad5da0a23e615be270c90353115e3028d08d291d960c4928089b</sum></package><package arch="i686" name="compat-grilo02" release="1.el7" src="compat-grilo02-0.2.12-1.el7.src.rpm" version="0.2.12"><filename>compat-grilo02-0.2.12-1.el7.i686.rpm</filename><sum type="sha256">8379ab4abb3803a6e24158e6db8770f394f2b47180c1b87c48f9a495aea47a2f</sum></package><package arch="i686" name="gom-devel" release="1.el7" src="gom-0.3.2-1.el7.src.rpm" version="0.3.2"><filename>gom-devel-0.3.2-1.el7.i686.rpm</filename><sum type="sha256">01ad7db1fd6d80dcb58f0f9fd263f861e09874521195c8166aa06b627de11785</sum></package><package arch="x86_64" epoch="1" name="totem" release="1.el7" src="totem-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>totem-3.22.1-1.el7.x86_64.rpm</filename><sum type="sha256">8b945158ffc96ec07c8bfa2ed9485a92ae5d11d568dc8ead01efe05d0f105f26</sum></package><package arch="x86_64" name="libgpod" release="12.el7" src="libgpod-0.8.2-12.el7.src.rpm" version="0.8.2"><filename>libgpod-0.8.2-12.el7.x86_64.rpm</filename><sum type="sha256">5d3e5d520ad49497b1f5664dc296aeccddca3731a2e78c0a150f70b888d0f905</sum></package><package arch="i686" name="grilo" release="1.el7" src="grilo-0.3.3-1.el7.src.rpm" version="0.3.3"><filename>grilo-0.3.3-1.el7.i686.rpm</filename><sum type="sha256">19df84e9638319014b2f468b045398a3f0e2aaedc383bd1b269263b6c4f71bbc</sum></package><package arch="x86_64" name="grilo" release="1.el7" src="grilo-0.3.3-1.el7.src.rpm" version="0.3.3"><filename>grilo-0.3.3-1.el7.x86_64.rpm</filename><sum type="sha256">b76501da13b038aa9a91002da12e9d8fd45ff457f8fb8f81d18cce322e459704</sum></package><package arch="x86_64" name="python-gpod" release="12.el7" src="libgpod-0.8.2-12.el7.src.rpm" version="0.8.2"><filename>python-gpod-0.8.2-12.el7.x86_64.rpm</filename><sum type="sha256">31ffd0633ba52f7a5a18354a5c43025322799befa5eff6049b92f47b71b82a27</sum></package><package arch="i686" name="rhythmbox-devel" release="1.el7" src="rhythmbox-3.4.1-1.el7.src.rpm" version="3.4.1"><filename>rhythmbox-devel-3.4.1-1.el7.i686.rpm</filename><sum type="sha256">df29528975135600cf03870d3904c09624221068eb29574a7963e10e176bae34</sum></package><package arch="i686" name="gom" release="1.el7" src="gom-0.3.2-1.el7.src.rpm" version="0.3.2"><filename>gom-0.3.2-1.el7.i686.rpm</filename><sum type="sha256">18598b7c0794290c2890151ba10034886f890e93e4a41ed36f95a3fa2ad4f575</sum></package><package arch="x86_64" name="totem-pl-parser" release="1.el7" src="totem-pl-parser-3.10.7-1.el7.src.rpm" version="3.10.7"><filename>totem-pl-parser-3.10.7-1.el7.x86_64.rpm</filename><sum type="sha256">c26d7fedc29308123a8b89279b5f8c9e32edf21c8f5411baa8ee07a611b29aa0</sum></package><package arch="x86_64" epoch="1" name="totem-devel" release="1.el7" src="totem-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>totem-devel-3.22.1-1.el7.x86_64.rpm</filename><sum type="sha256">86c70dd082130420e964aca5e31f7b8c5460bbd5e546a287d2525574f113b519</sum></package><package arch="x86_64" name="grilo-plugins" release="1.el7" src="grilo-plugins-0.3.4-1.el7.src.rpm" version="0.3.4"><filename>grilo-plugins-0.3.4-1.el7.x86_64.rpm</filename><sum type="sha256">f8ff6a99fb36191f6038e165f68c016b6ac182002f05c5958135e27269092c6f</sum></package><package arch="x86_64" name="totem-pl-parser-devel" release="1.el7" src="totem-pl-parser-3.10.7-1.el7.src.rpm" version="3.10.7"><filename>totem-pl-parser-devel-3.10.7-1.el7.x86_64.rpm</filename><sum type="sha256">74929a3a5e46d391477aee3908e171e098d972e9ef6c883228b5ae16544037b3</sum></package><package arch="i686" name="totem-pl-parser-devel" release="1.el7" src="totem-pl-parser-3.10.7-1.el7.src.rpm" version="3.10.7"><filename>totem-pl-parser-devel-3.10.7-1.el7.i686.rpm</filename><sum type="sha256">24f512f5d9869565e7d0bd92d700c2abe88416a5608e7fd8290a77fd35be5942</sum></package><package arch="x86_64" name="libdmapsharing-devel" release="1.el7" src="libdmapsharing-2.9.37-1.el7.src.rpm" version="2.9.37"><filename>libdmapsharing-devel-2.9.37-1.el7.x86_64.rpm</filename><sum type="sha256">856019f9ca495506406bd1731784a0199f92f0ffd399ff5f03f159b0e83a22d4</sum></package><package arch="i686" name="rhythmbox" release="1.el7" src="rhythmbox-3.4.1-1.el7.src.rpm" version="3.4.1"><filename>rhythmbox-3.4.1-1.el7.i686.rpm</filename><sum type="sha256">8f693a97f3e01be066afa01a5ca554f5e215bec9374d0102339f71cfbca4644b</sum></package><package arch="x86_64" name="grilo-devel" release="1.el7" src="grilo-0.3.3-1.el7.src.rpm" version="0.3.3"><filename>grilo-devel-0.3.3-1.el7.x86_64.rpm</filename><sum type="sha256">56a55e926050bbb51b911a9343b5f999cc0495b9061a538af0b34d20d4efca9e</sum></package><package arch="x86_64" epoch="1" name="totem-nautilus" release="1.el7" src="totem-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>totem-nautilus-3.22.1-1.el7.x86_64.rpm</filename><sum type="sha256">155382772d61ba7e9e2a29b2eedd72bb52b5e9863a62e921ffca911eb707d5b8</sum></package><package arch="x86_64" name="rhythmbox" release="1.el7" src="rhythmbox-3.4.1-1.el7.src.rpm" version="3.4.1"><filename>rhythmbox-3.4.1-1.el7.x86_64.rpm</filename><sum type="sha256">09e5da91bbf82ac244ad00ced3cd7fde5600ba4fdda163fe4fe8c21baa577571</sum></package><package arch="x86_64" name="compat-grilo02" release="1.el7" src="compat-grilo02-0.2.12-1.el7.src.rpm" version="0.2.12"><filename>compat-grilo02-0.2.12-1.el7.x86_64.rpm</filename><sum type="sha256">db16ef66a84f272118c51a198f7b5f4701f1024c4eb7e70edbbad0773f73ea7e</sum></package><package arch="x86_64" name="gom-devel" release="1.el7" src="gom-0.3.2-1.el7.src.rpm" version="0.3.2"><filename>gom-devel-0.3.2-1.el7.x86_64.rpm</filename><sum type="sha256">5618d269d5f32f800fbbc55e99de6c3db2c2dc189072a916acfc0b17d7fc1e29</sum></package><package arch="x86_64" name="libdmapsharing" release="1.el7" src="libdmapsharing-2.9.37-1.el7.src.rpm" version="2.9.37"><filename>libdmapsharing-2.9.37-1.el7.x86_64.rpm</filename><sum type="sha256">a56bdfebe31fa57f8c64837c301c1bd893fbf7c7a7eb4a51b4dc805b95cfcaad</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2315" id="RHBA-2017:2315-1" title="Rhba-2017:2315-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2317-1</id><title>Yelp, Yelp-Xsl Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="yelp-devel" release="1.el7" src="yelp-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>yelp-devel-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">57fec7d9470094a375c14fa5baa67cf2445f2c13559713ab3ee770a58699baa0</sum></package><package arch="noarch" name="yelp-xsl" release="1.el7" src="yelp-xsl-3.20.1-1.el7.src.rpm" version="3.20.1"><filename>yelp-xsl-3.20.1-1.el7.noarch.rpm</filename><sum type="sha256">44eb4ebecb3d07b5e334b16279905131802a92a671bf250942946f1c32d3d44d</sum></package><package arch="x86_64" epoch="1" name="yelp-libs" release="1.el7" src="yelp-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>yelp-libs-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">e9c83110ae7f5cb3724e94d275903f42212273d3c298a4f89773ac990c43339e</sum></package><package arch="i686" epoch="1" name="yelp-libs" release="1.el7" src="yelp-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>yelp-libs-3.22.0-1.el7.i686.rpm</filename><sum type="sha256">fe722642d7b3be74a8d6413674d7082afba1e4a5c650f515a4522ec59a84092f</sum></package><package arch="x86_64" epoch="1" name="yelp" release="1.el7" src="yelp-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>yelp-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">d1b6d01042b2e25166ac37a1a3d9b6b641d4d717cf5e7989025f31285b48859f</sum></package><package arch="noarch" name="yelp-xsl-devel" release="1.el7" src="yelp-xsl-3.20.1-1.el7.src.rpm" version="3.20.1"><filename>yelp-xsl-devel-3.20.1-1.el7.noarch.rpm</filename><sum type="sha256">792c8c28b32eea775c5117919258b3c54bbfd5ac688edee8b8568c1c542aa7cf</sum></package><package arch="i686" epoch="1" name="yelp-devel" release="1.el7" src="yelp-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>yelp-devel-3.22.0-1.el7.i686.rpm</filename><sum type="sha256">749474567c53bcfba92a511bb8d75dda311535c87a2b5b08bc3505d1d999ec8a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2317" id="RHBA-2017:2317-1" title="Rhba-2017:2317-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2318-1</id><title>Gnome-Initial-Setup Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gnome-initial-setup" release="4.el7" src="gnome-initial-setup-3.22.1-4.el7.src.rpm" version="3.22.1"><filename>gnome-initial-setup-3.22.1-4.el7.x86_64.rpm</filename><sum type="sha256">4fc7ff969fac7adbbd036fecf5205c8cd11de5be5e3d12803e57bcd82088a058</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2318" id="RHBA-2017:2318-1" title="Rhba-2017:2318-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2325-1</id><title>Bind Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-51.el7.x86_64.rpm</filename><sum type="sha256">a618300ddf63d27f4de0027af5438017dacfd4bd84860d0e2f6f3a81a3e1f551</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-utils-9.9.4-51.el7.x86_64.rpm</filename><sum type="sha256">81e372effafaf00ec4a23ee3093a8eae897d9faf847946db0685058d8a88f874</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-51.el7.x86_64.rpm</filename><sum type="sha256">6b3af81b6fb8c556f4ca8893978568c9502e2067dc6b00bcaaf5caf9f35ffda1</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-sdb-chroot-9.9.4-51.el7.x86_64.rpm</filename><sum type="sha256">4c4e5cf47d77cfdc47cde6524f59d7186a93f418fca5b787d10076309b2bf333</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-51.el7.i686.rpm</filename><sum type="sha256">e537b3dd2beca4758512b721d3dabe131b9378c77c5aa6bca964d9010e07c58f</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-51.el7.x86_64.rpm</filename><sum type="sha256">21824cec97bfce03c5a9f49e13cc4d54d51ce5c867b15cdd55fd2bd392ab7cc3</sum></package><package arch="noarch" epoch="32" name="bind-license" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-license-9.9.4-51.el7.noarch.rpm</filename><sum type="sha256">1deea3ad0d1c13cd629b0480eafbe6256523cd035bdd140a3d2a02253eb8947b</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-51.el7.x86_64.rpm</filename><sum type="sha256">9b48a017e960ea54afd17540f8d7bc6720374530e5f968f7ca4fd7800faa171d</sum></package><package arch="i686" epoch="32" name="bind-devel" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-51.el7.i686.rpm</filename><sum type="sha256">8e56022a4397340dbfb7145b69087db7d58fd4584ddf2a04e8e1a64701255fa4</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-sdb-9.9.4-51.el7.x86_64.rpm</filename><sum type="sha256">8bb2537c9054ad72092c2c4dc39f50fa34262351b2f75d8be3491dcd3a56d855</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-pkcs11-9.9.4-51.el7.x86_64.rpm</filename><sum type="sha256">ba4d9fc2294aa7ddd63f9ef24dd15b3a0030e3ee2745f896b058032d0fa38455</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-51.el7.i686.rpm</filename><sum type="sha256">70d660a6f20fd1a52f094d42564ac4e3b73d6b9b15cd841520180aa0059f6d6b</sum></package><package arch="x86_64" epoch="32" name="bind" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-9.9.4-51.el7.x86_64.rpm</filename><sum type="sha256">5e73efd87261309ed5970deaa47f7b9dcc450bfb6fc801c1dc6104f0e8789425</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-51.el7.i686.rpm</filename><sum type="sha256">733f347c171227540a882b7be799c090e61356917bd3298cc95824f673555e4f</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-51.el7.x86_64.rpm</filename><sum type="sha256">4d188feed5aff5c365d811bdecceb423fa2ccf6069bf9d8deb5dfe09b6cccb38</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-51.el7.x86_64.rpm</filename><sum type="sha256">19eb6f22eda852c13af9835a34e83e08e1806573a2e505a39664be934958cef2</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-chroot-9.9.4-51.el7.x86_64.rpm</filename><sum type="sha256">6a0688c99da327d09301819f6295003d09b82e7f1a979692cf2d17d48df652c5</sum></package><package arch="i686" epoch="32" name="bind-libs" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-51.el7.i686.rpm</filename><sum type="sha256">421d471a563dab4f7c9edd29c924b80b82afef3c7a25430f428c61a94ba0c73c</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-pkcs11-utils-9.9.4-51.el7.x86_64.rpm</filename><sum type="sha256">fe98d8a6cb9587309cf67452874d452ab2425e17f6f8c8c32a37f4095477a76b</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="51.el7" src="bind-9.9.4-51.el7.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-51.el7.i686.rpm</filename><sum type="sha256">9c9f431a3325f083693768cc7685677f50e606c550d9c3a831a2c95b9fd412fa</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2325" id="RHBA-2017:2325-1" title="Rhba-2017:2325-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2327-1</id><title>Ipa Bug Fix Update</title><description>* Previously, when installing IdM replica, the installer incorrectly set the location and permissions of temporary directories. The IdM management framework requires these temporary directories to operate correctly. As a consequence, after rebooting the newly configured replica, the services tied to the management framework did not work and displayed non-specific error messages. To  the installer now additionally adds a drop-in configuration file that re-creates the directory structure after rebooting. As a result, the IdM replica continues to work correctly after reboot.</description><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ipa-server" release="21.sl7" src="ipa-4.5.0-21.sl7.src.rpm" version="4.5.0"><filename>ipa-server-4.5.0-21.sl7.x86_64.rpm</filename><sum type="sha256">d2e8c39a44ffbe1dbe101907ba698641fb8e306a9ef81017146083385be0548a</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="21.sl7" src="ipa-4.5.0-21.sl7.src.rpm" version="4.5.0"><filename>ipa-server-trust-ad-4.5.0-21.sl7.x86_64.rpm</filename><sum type="sha256">9fef177f50f1e5226e8c93eefbe5a9269afe5d761d26ed4c1dc9c89d68e8ef32</sum></package><package arch="noarch" name="ipa-client-common" release="21.sl7" src="ipa-4.5.0-21.sl7.src.rpm" version="4.5.0"><filename>ipa-client-common-4.5.0-21.sl7.noarch.rpm</filename><sum type="sha256">b1cdf44adcad8e9cc90be70a621cf632c764308858042e4eead6c2b0be95d7e4</sum></package><package arch="noarch" name="ipa-server-dns" release="21.sl7" src="ipa-4.5.0-21.sl7.src.rpm" version="4.5.0"><filename>ipa-server-dns-4.5.0-21.sl7.noarch.rpm</filename><sum type="sha256">3a589e94aab7eae80940f558ab13008dd46bf9589d8d7c4e2ff3a057773ed465</sum></package><package arch="noarch" name="python2-ipaserver" release="21.sl7" src="ipa-4.5.0-21.sl7.src.rpm" version="4.5.0"><filename>python2-ipaserver-4.5.0-21.sl7.noarch.rpm</filename><sum type="sha256">4e77aba23a226cc4f4a7aff2fa16b108f90178ffcde4542430af6ab67260af45</sum></package><package arch="noarch" name="python2-ipalib" release="21.sl7" src="ipa-4.5.0-21.sl7.src.rpm" version="4.5.0"><filename>python2-ipalib-4.5.0-21.sl7.noarch.rpm</filename><sum type="sha256">b218f547268e24f02e488f189602733dd616f3d10eb952ccaf43bd38a1b920df</sum></package><package arch="x86_64" name="ipa-client" release="21.sl7" src="ipa-4.5.0-21.sl7.src.rpm" version="4.5.0"><filename>ipa-client-4.5.0-21.sl7.x86_64.rpm</filename><sum type="sha256">2522ed6ca42591c35fe8bef470e634625d9b07731ea9a097bbd5d59cd09dc690</sum></package><package arch="noarch" name="ipa-common" release="21.sl7" src="ipa-4.5.0-21.sl7.src.rpm" version="4.5.0"><filename>ipa-common-4.5.0-21.sl7.noarch.rpm</filename><sum type="sha256">cfae18e6e9d7c47b652a80a219840c725d86ce903cf99f42b500c5dec39df364</sum></package><package arch="noarch" name="ipa-server-common" release="21.sl7" src="ipa-4.5.0-21.sl7.src.rpm" version="4.5.0"><filename>ipa-server-common-4.5.0-21.sl7.noarch.rpm</filename><sum type="sha256">96b9614b25317c62f8a2caee3ad7b1ea955831101c1c67c5e21d12239b19fa85</sum></package><package arch="noarch" name="python2-ipaclient" release="21.sl7" src="ipa-4.5.0-21.sl7.src.rpm" version="4.5.0"><filename>python2-ipaclient-4.5.0-21.sl7.noarch.rpm</filename><sum type="sha256">23330438add614b42617156b29eec4598df1f11f95bb3d0bd4a0eaf6b5c0ef22</sum></package><package arch="noarch" name="ipa-python-compat" release="21.sl7" src="ipa-4.5.0-21.sl7.src.rpm" version="4.5.0"><filename>ipa-python-compat-4.5.0-21.sl7.noarch.rpm</filename><sum type="sha256">14e1dd948ac778515d85157c52d92f22f3e6d5febef897a2d2a4f1cd26c010c6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2327" id="RHBA-2017:2327-1" title="Rhba-2017:2327-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1469978" id="1469978" title="Bind Package Is Not Automatically Updated During Ipa-Server Upgrade Process" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1470125" id="1470125" title="Replica Install Fails To Configure Ipa-Specific Temporary Files/Directories" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2330-1</id><title>Bind-Dyndb-Ldap Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="bind-dyndb-ldap" release="4.el7" src="bind-dyndb-ldap-11.1-4.el7.src.rpm" version="11.1"><filename>bind-dyndb-ldap-11.1-4.el7.x86_64.rpm</filename><sum type="sha256">36a78ff2c57e5ac10f54f1d4e2d91ca580c32d7fd9b802bfa3fe191f5f81dcef</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2330" id="RHBA-2017:2330-1" title="Rhba-2017:2330-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1469984" id="1469984" title="Required Bind Version Doesn'T Have The Dyndb Interface" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:2921-1</id><title> Selinux-Policy Bug Fix Update</title><description>* Previously, the selinux-policy package missed certain rules related to Identity Management (IdM). As a consequence, the IPA certificate auto-renewal procedure failed and the Tomcat service was not able to connect to the LDAP server. This update adds the SELinux allow rules that enable IdM to auto-renew certificates when running SELinux in enforcing mode, and the described problem no longer occurs.</description><release>Scientific Linux</release><issued date="2017-10-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy-minimum" release="166.el7_4.5" src="selinux-policy-3.13.1-166.el7_4.5.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-166.el7_4.5.noarch.rpm</filename><sum type="sha256">d921f9891f2de6dc25803e0fa0f22f22e347a974e8abb674bf228bfc41fcb383</sum></package><package arch="noarch" name="selinux-policy-targeted" release="166.el7_4.5" src="selinux-policy-3.13.1-166.el7_4.5.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-166.el7_4.5.noarch.rpm</filename><sum type="sha256">73b124e31e32c1172fe63b4d42cc2d96770c482b70c91898fff3e532bd6a6e01</sum></package><package arch="noarch" name="selinux-policy-sandbox" release="166.el7_4.5" src="selinux-policy-3.13.1-166.el7_4.5.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-166.el7_4.5.noarch.rpm</filename><sum type="sha256">1f365fcc4ee5e61c8e90d97aa532af3bba7d5870f0a3852e542617f10e47eef9</sum></package><package arch="noarch" name="selinux-policy-mls" release="166.el7_4.5" src="selinux-policy-3.13.1-166.el7_4.5.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-166.el7_4.5.noarch.rpm</filename><sum type="sha256">6eeb9ba72dfed33233355c3a9128dda168e9eef27d5c00a23ea4a694372bc670</sum></package><package arch="noarch" name="selinux-policy-devel" release="166.el7_4.5" src="selinux-policy-3.13.1-166.el7_4.5.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-166.el7_4.5.noarch.rpm</filename><sum type="sha256">9ae0f0e207cc11ef51584f62ed6b4a45fdd573b9bb976fd0fa397c0e1d212a9d</sum></package><package arch="noarch" name="selinux-policy" release="166.el7_4.5" src="selinux-policy-3.13.1-166.el7_4.5.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-166.el7_4.5.noarch.rpm</filename><sum type="sha256">ed052a6a983d07c1450d8b9ec452a4a8421c5abe492b6a5b075ed3d24c2e402e</sum></package><package arch="noarch" name="selinux-policy-doc" release="166.el7_4.5" src="selinux-policy-3.13.1-166.el7_4.5.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-166.el7_4.5.noarch.rpm</filename><sum type="sha256">18069deb3600f92012c10fb7f8cf49d9b751d9df03f3c042d8e89bca96037a7f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:2921" id="RHBA-2017:2921-1" title="Rhba-2017:2921-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1486552" id="1486552" title="Ipa Certificate Auto Renewal Failed At Unable To Connect To Ldap Server With Authentication Failure [Rhel-7.4.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2017:3305-1</id><title>Selinux-Policy Bug Fix Update</title><description>* Previously, an SELinux allow rule for the Apache Tomcat servlet container was missing, and SELinux prevented Tomcat from connecting to Microsoft SQL Server on port 1433. This rule has been added to the selinux-policy packages, and Tomcat is now able to connect to Microsoft SQL Server. 
* In Scientific Linux 7.4, an SELinux allow rule for the keepalived utility was missing. Consequently, an SELinux denial occurred when keepalived had been run. With this update, the missing rule has been added, and keepalived is now working with SELinux in Enforcing mode. 
* Prior to this update, the /var/log/pacemaker directories for the Pacemaker cluster resource manager were labeled as cluster_var_log_t. Consequently, an SELinux denial occurred when containerized Pacemaker tried to access the /var/log directory. An exception labeling the /var/log/pacemaker/bundles/ directory with the var_log_t label has been added, and Pacemaker is now able to map logging correctly with SELinux in Enforcing mode.</description><release>Scientific Linux</release><issued date="2017-12-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy-devel" release="166.el7_4.7" src="selinux-policy-3.13.1-166.el7_4.7.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-166.el7_4.7.noarch.rpm</filename><sum type="sha256">04fb38c53fdacd31d50ad230be6dcf6524731e721e2b8ca9949ebabc0faa6e0f</sum></package><package arch="noarch" name="selinux-policy" release="166.el7_4.7" src="selinux-policy-3.13.1-166.el7_4.7.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-166.el7_4.7.noarch.rpm</filename><sum type="sha256">e09ed729f888a6b26616f4bdddf504db222bb7f26b34c300320fb1739c7234e5</sum></package><package arch="noarch" name="selinux-policy-doc" release="166.el7_4.7" src="selinux-policy-3.13.1-166.el7_4.7.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-166.el7_4.7.noarch.rpm</filename><sum type="sha256">92e076e5ede9e2f2191826979d352a533302e18c5ca9e3d1d8989733ab37b223</sum></package><package arch="noarch" name="selinux-policy-sandbox" release="166.el7_4.7" src="selinux-policy-3.13.1-166.el7_4.7.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-166.el7_4.7.noarch.rpm</filename><sum type="sha256">a3417d061e4374637bf531f9ad66471159f1bec467e4a545b9a603bf6163af39</sum></package><package arch="noarch" name="selinux-policy-mls" release="166.el7_4.7" src="selinux-policy-3.13.1-166.el7_4.7.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-166.el7_4.7.noarch.rpm</filename><sum type="sha256">093111ea7e62dd2e428c7426ad1f096e2d27639a74d32ca8044084790de3993c</sum></package><package arch="noarch" name="selinux-policy-minimum" release="166.el7_4.7" src="selinux-policy-3.13.1-166.el7_4.7.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-166.el7_4.7.noarch.rpm</filename><sum type="sha256">0e28d6e7f78cc6a0ae630d36deaf08829b0566db1e75a838ec1bfe307d7310a5</sum></package><package arch="noarch" name="selinux-policy-targeted" release="166.el7_4.7" src="selinux-policy-3.13.1-166.el7_4.7.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-166.el7_4.7.noarch.rpm</filename><sum type="sha256">e320461f68a0eadfd4686e7fac286b8df0d759aa71ef2271bbbda356c33e09d1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2017:3305" id="RHBA-2017:3305-1" title="Rhba-2017:3305-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1500697" id="1500697" title="Selinux Denies Name_Connect To Mssql_Port_T For Tomcat_T [Rhel-7.4.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1500813" id="1500813" title="Keepalived 1.3.5 Requires Setpgid Permission [Rhel-7.4.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1513075" id="1513075" title="Selinux Inhibits Pacemaker'S Logging Policy [Rhel-7.4.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0042-1</id><title>Dracut Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-01-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="dracut-tools" release="502.el7_4.1" src="dracut-033-502.el7_4.1.src.rpm" version="033"><filename>dracut-tools-033-502.el7_4.1.x86_64.rpm</filename><sum type="sha256">b4c4d0b23dd8fdc3ae6b08b25ee25d82fbb4911631f029ac1592f2c6ba3d5dca</sum></package><package arch="x86_64" name="dracut-fips-aesni" release="502.el7_4.1" src="dracut-033-502.el7_4.1.src.rpm" version="033"><filename>dracut-fips-aesni-033-502.el7_4.1.x86_64.rpm</filename><sum type="sha256">5dfe1a94623e98b4af339247a231ea40f6e5b47d62000e2bcae14e9d2868bc49</sum></package><package arch="x86_64" name="dracut" release="502.el7_4.1" src="dracut-033-502.el7_4.1.src.rpm" version="033"><filename>dracut-033-502.el7_4.1.x86_64.rpm</filename><sum type="sha256">96f45d9922675712515ca1b16b6c95ed2f2118e9dfe406849a19acc549687fee</sum></package><package arch="x86_64" name="dracut-caps" release="502.el7_4.1" src="dracut-033-502.el7_4.1.src.rpm" version="033"><filename>dracut-caps-033-502.el7_4.1.x86_64.rpm</filename><sum type="sha256">df739f5a7dc5173c9d97a7a5dd3450990fbe03d7f4f629f564b510e98e472c3e</sum></package><package arch="x86_64" name="dracut-config-generic" release="502.el7_4.1" src="dracut-033-502.el7_4.1.src.rpm" version="033"><filename>dracut-config-generic-033-502.el7_4.1.x86_64.rpm</filename><sum type="sha256">b23e6a2db580ffac709d33f80af359c4e066699daea5c235757311b5ab4dab5a</sum></package><package arch="x86_64" name="dracut-config-rescue" release="502.el7_4.1" src="dracut-033-502.el7_4.1.src.rpm" version="033"><filename>dracut-config-rescue-033-502.el7_4.1.x86_64.rpm</filename><sum type="sha256">15cabb88d8954e5cf52d581c3f4d4f74c38b51ce81b1c50e9589ff31b02f2363</sum></package><package arch="x86_64" name="dracut-network" release="502.el7_4.1" src="dracut-033-502.el7_4.1.src.rpm" version="033"><filename>dracut-network-033-502.el7_4.1.x86_64.rpm</filename><sum type="sha256">c69b5cba14906bbe78384b6690b8c6e857db0455ddbca341282373d90b5cac04</sum></package><package arch="x86_64" name="dracut-fips" release="502.el7_4.1" src="dracut-033-502.el7_4.1.src.rpm" version="033"><filename>dracut-fips-033-502.el7_4.1.x86_64.rpm</filename><sum type="sha256">10ba679ac08d575145e489d126184bed7d386179e7d669e6d73a3f9f944a9599</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0042" id="RHBA-2018:0042-1" title="Rhba-2018:0042-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1526943" id="1526943" title="Microcode On Amd Family 16H Processors Not Updated Early In The Boot Process [Rhel-7.4.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0410-1</id><title>Selinux-Policy Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-03-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy-devel" release="166.el7_4.9" src="selinux-policy-3.13.1-166.el7_4.9.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-166.el7_4.9.noarch.rpm</filename><sum type="sha256">76345b5198da20b4a7745df9f4c7e599080d162c8a236565f9b9ea42d79d5584</sum></package><package arch="noarch" name="selinux-policy-targeted" release="166.el7_4.9" src="selinux-policy-3.13.1-166.el7_4.9.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-166.el7_4.9.noarch.rpm</filename><sum type="sha256">c1a720cccd8d0ca8660b2c681ef02be6873c0f3e83bc14b6f261450bcc2c5381</sum></package><package arch="noarch" name="selinux-policy-minimum" release="166.el7_4.9" src="selinux-policy-3.13.1-166.el7_4.9.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-166.el7_4.9.noarch.rpm</filename><sum type="sha256">5a3ebcc563348d4c4c2ef7fdbfffef2d10588f18e59b0092118e42544e24ff76</sum></package><package arch="noarch" name="selinux-policy" release="166.el7_4.9" src="selinux-policy-3.13.1-166.el7_4.9.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-166.el7_4.9.noarch.rpm</filename><sum type="sha256">9e7600c55a88859d537e1da29061f87a5dc352787d7a7782d47f2d547077128d</sum></package><package arch="noarch" name="selinux-policy-sandbox" release="166.el7_4.9" src="selinux-policy-3.13.1-166.el7_4.9.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-166.el7_4.9.noarch.rpm</filename><sum type="sha256">4acdcb439ad7c7b6f27a00b1bb86650f849d4350d68a038d1db1ff69dd4f7e26</sum></package><package arch="noarch" name="selinux-policy-mls" release="166.el7_4.9" src="selinux-policy-3.13.1-166.el7_4.9.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-166.el7_4.9.noarch.rpm</filename><sum type="sha256">f94357b319e72c3197a7e5c5268dec31ca87c146d1a39d79dc63fa12578b3ca0</sum></package><package arch="noarch" name="selinux-policy-doc" release="166.el7_4.9" src="selinux-policy-3.13.1-166.el7_4.9.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-166.el7_4.9.noarch.rpm</filename><sum type="sha256">239dedd8d20c3ac27e9fb386b11a735d65dbdfb5cc9cad984f28a32ee4d98657</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0410" id="RHBA-2018:0410-1" title="Rhba-2018:0410-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1538936" id="1538936" title="Open Vswitch Selinux Policy Needs Updating [Rhel-7.4.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0597-1</id><title>Tzdata Enhancement Update</title><description>* The Antarctica/Casey time zone has been changed from UTC+11 to UTC+8.</description><release>Scientific Linux</release><issued date="2018-04-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2018d-1.el7.src.rpm" version="2018d"><filename>tzdata-java-2018d-1.el7.noarch.rpm</filename><sum type="sha256">c020936b156c04e5688a84ea234bd74f0ea683a28ccf87d2b2b3fe1ec414cf36</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2018d-1.el7.src.rpm" version="2018d"><filename>tzdata-2018d-1.el7.noarch.rpm</filename><sum type="sha256">0902bf03c5d351e238fd8781280418c93b941bd86d8d8aad92f9f61a79feb572</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0597" id="RHBA-2018:0597-1" title="Rhba-2018:0597-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1558700" id="1558700" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1559037" id="1559037" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1559039" id="1559039" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0671-1</id><title>Anaconda Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="anaconda-user-help" release="1.sl7" src="anaconda-user-help-7.5.3-1.sl7.src.rpm" version="7.5.3"><filename>anaconda-user-help-7.5.3-1.sl7.noarch.rpm</filename><sum type="sha256">42f9d1feb4048e05879ddbb2db7a7b9360bdeca80a64fec32a9e874e12956b7e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0671" id="RHBA-2018:0671-1" title="Rhba-2018:0671-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0682-1</id><title>Qt Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="qt-devel" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-devel-4.8.7-2.el7.x86_64.rpm</filename><sum type="sha256">a1771b8cfbcbb61562f0de96d9ef361b5f19998f7221c23494b32eb7e40dd90d</sum></package><package arch="x86_64" epoch="1" name="qt-x11" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-x11-4.8.7-2.el7.x86_64.rpm</filename><sum type="sha256">b5ef3b421834b2fac7424870567881ee804a5ea46c08232d901968a1edae6d28</sum></package><package arch="x86_64" name="adwaita-qt-common" release="1.el7" src="adwaita-qt-1.0-1.el7.src.rpm" version="1.0"><filename>adwaita-qt-common-1.0-1.el7.x86_64.rpm</filename><sum type="sha256">71d31aed369e2b6ab3d5d545de6f8136f8563bba2431648cb7c7c5c28e09d5d9</sum></package><package arch="i686" epoch="1" name="qt-devel" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-devel-4.8.7-2.el7.i686.rpm</filename><sum type="sha256">5827c014abb49560d74f0400ab1489a6164df68b0c6c0f2bbd5fd3f919dc90a6</sum></package><package arch="i686" epoch="1" name="qt" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-4.8.7-2.el7.i686.rpm</filename><sum type="sha256">0859757b6c3495e86965fb1fb9e9c616de89eec51c81035a4d2d00bb06d4ce63</sum></package><package arch="x86_64" epoch="1" name="qt" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-4.8.7-2.el7.x86_64.rpm</filename><sum type="sha256">3c3170edd9d229af361542e7e9bbc68261bd9027c47cdb397190bf01b9a962e0</sum></package><package arch="x86_64" name="highcontrast-qt5" release="2.el7" src="highcontrast-qt-0.1-2.el7.src.rpm" version="0.1"><filename>highcontrast-qt5-0.1-2.el7.x86_64.rpm</filename><sum type="sha256">35634fd2ec96e4b649abe325a66e92e108a80fdfe4020ec4e92fc6fee9fc31e3</sum></package><package arch="i686" epoch="1" name="qt-odbc" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-odbc-4.8.7-2.el7.i686.rpm</filename><sum type="sha256">2d0a87d727b82fb7b3ea952d4064a354262c11b2d138f011f8ccabb0c6f9512e</sum></package><package arch="x86_64" epoch="1" name="qt-config" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-config-4.8.7-2.el7.x86_64.rpm</filename><sum type="sha256">8378fe731ba7ac1087a6a1f29c0db90835b94c934545f4e81d578e9877e21167</sum></package><package arch="x86_64" name="adwaita-qt5" release="1.el7" src="adwaita-qt-1.0-1.el7.src.rpm" version="1.0"><filename>adwaita-qt5-1.0-1.el7.x86_64.rpm</filename><sum type="sha256">b625e3c48972b64bf16868b2be067178abd038415f9b49ae597393ecbcf43838</sum></package><package arch="x86_64" name="highcontrast-qt" release="2.el7" src="highcontrast-qt-0.1-2.el7.src.rpm" version="0.1"><filename>highcontrast-qt-0.1-2.el7.x86_64.rpm</filename><sum type="sha256">ef6376e08287ba27713a348d325893f2f1f2cf9315bfdf3bcdce65b13d5a5060</sum></package><package arch="i686" name="adwaita-qt5" release="1.el7" src="adwaita-qt-1.0-1.el7.src.rpm" version="1.0"><filename>adwaita-qt5-1.0-1.el7.i686.rpm</filename><sum type="sha256">796b20e056a2b23971a932987df4d581bdc3a54114576e6d4fd334bf6ae37400</sum></package><package arch="x86_64" name="adwaita-qt" release="1.el7" src="adwaita-qt-1.0-1.el7.src.rpm" version="1.0"><filename>adwaita-qt-1.0-1.el7.x86_64.rpm</filename><sum type="sha256">97ff9d6effb2090f8d55f6275f859f22b7c0d226f6de3a0cc2d5f85b0012f9de</sum></package><package arch="x86_64" epoch="1" name="qt-demos" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-demos-4.8.7-2.el7.x86_64.rpm</filename><sum type="sha256">f0ae0f4a35d9c0b8433f3d3ce5abd0efb564ed15b0b8e586976be78324b44826</sum></package><package arch="i686" name="highcontrast-qt5" release="2.el7" src="highcontrast-qt-0.1-2.el7.src.rpm" version="0.1"><filename>highcontrast-qt5-0.1-2.el7.i686.rpm</filename><sum type="sha256">23c74f152f155c55d1ab51b5a5d06ff9871a30939fb312946c4d86fbbe83b3f3</sum></package><package arch="x86_64" epoch="1" name="qt-mysql" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-mysql-4.8.7-2.el7.x86_64.rpm</filename><sum type="sha256">477576c71d135b92973461224ceb10bb905f92b9eb3aea074dd1eee45b82c3c9</sum></package><package arch="i686" epoch="1" name="qt-postgresql" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-postgresql-4.8.7-2.el7.i686.rpm</filename><sum type="sha256">27b5a3343e36f56db0e6c0fb67ad1e6ed51ecde08a107cb0a93de60d8c06b683</sum></package><package arch="noarch" epoch="1" name="qt-doc" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-doc-4.8.7-2.el7.noarch.rpm</filename><sum type="sha256">dc8e099093573a1a38b4cfd41d9d10d69d893fb306e1e94304be9d9291ad6d0e</sum></package><package arch="x86_64" epoch="1" name="qt-odbc" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-odbc-4.8.7-2.el7.x86_64.rpm</filename><sum type="sha256">8f28ba2fd5974fbfd018bec8d0aff2157374e555f880dd22ae0fc531bd306fd3</sum></package><package arch="i686" epoch="1" name="qt-x11" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-x11-4.8.7-2.el7.i686.rpm</filename><sum type="sha256">95f74386baccbcc6078c7b8c6317da6f2ec817fae285c72aad81de1fa03782c1</sum></package><package arch="x86_64" name="adwaita-qt4" release="1.el7" src="adwaita-qt-1.0-1.el7.src.rpm" version="1.0"><filename>adwaita-qt4-1.0-1.el7.x86_64.rpm</filename><sum type="sha256">908fa39f0e6046e03327ae34aa084a4f8f970c07291c027c5a0c2b20190cd88a</sum></package><package arch="noarch" epoch="1" name="qt-devel-private" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-devel-private-4.8.7-2.el7.noarch.rpm</filename><sum type="sha256">d43f6494305b2aa70d74ac805126a33d1c837910012f561784361452577ae33a</sum></package><package arch="i686" name="highcontrast-qt4" release="2.el7" src="highcontrast-qt-0.1-2.el7.src.rpm" version="0.1"><filename>highcontrast-qt4-0.1-2.el7.i686.rpm</filename><sum type="sha256">c393ec577fcbed516a38b896c93883404dc16b20392f89bfa07201f25c896846</sum></package><package arch="x86_64" epoch="1" name="qt-qdbusviewer" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-qdbusviewer-4.8.7-2.el7.x86_64.rpm</filename><sum type="sha256">fe44e38758f57f4559d0d77d72fa7aae29ece9ffc2e5a8d3cba9e2828273d67c</sum></package><package arch="x86_64" epoch="1" name="qt-examples" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-examples-4.8.7-2.el7.x86_64.rpm</filename><sum type="sha256">4ebd186b9f62129dd977f1e33e5f65998b7b63615748fb27af0a5fce66894935</sum></package><package arch="i686" epoch="1" name="qt-mysql" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-mysql-4.8.7-2.el7.i686.rpm</filename><sum type="sha256">5f631ccc50537772421d00f86fdfad632723b7cbbd7ea92fc60f3d233822d1e9</sum></package><package arch="x86_64" epoch="1" name="qt-qvfb" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-qvfb-4.8.7-2.el7.x86_64.rpm</filename><sum type="sha256">1cd78fad17a0bccfeef4e87d26dfa4e1c3d5a92dc46a5bc96a2849f1d02360bb</sum></package><package arch="x86_64" epoch="1" name="qt-postgresql" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-postgresql-4.8.7-2.el7.x86_64.rpm</filename><sum type="sha256">0c316a1b8d1e344495310fc52093b909d85a3f3fd3bc8554df809d9d64b98b61</sum></package><package arch="x86_64" name="qgnomeplatform" release="3.el7" src="qgnomeplatform-0.3-3.el7.src.rpm" version="0.3"><filename>qgnomeplatform-0.3-3.el7.x86_64.rpm</filename><sum type="sha256">fed8583fce57b39a3bb957a348a95122e051e64a2452231ce4136ef616488c16</sum></package><package arch="i686" name="adwaita-qt4" release="1.el7" src="adwaita-qt-1.0-1.el7.src.rpm" version="1.0"><filename>adwaita-qt4-1.0-1.el7.i686.rpm</filename><sum type="sha256">bcb0bb6f07a86348c56acaf7be042e36fcd2a6d8ec731633a019607022b2ad4a</sum></package><package arch="x86_64" epoch="1" name="qt-assistant" release="2.el7" src="qt-4.8.7-2.el7.src.rpm" version="4.8.7"><filename>qt-assistant-4.8.7-2.el7.x86_64.rpm</filename><sum type="sha256">04433f84d8a8f8587db256dd2fcd8e0ddfbf6fa69ea007164e56a5c596417af6</sum></package><package arch="x86_64" name="highcontrast-qt4" release="2.el7" src="highcontrast-qt-0.1-2.el7.src.rpm" version="0.1"><filename>highcontrast-qt4-0.1-2.el7.x86_64.rpm</filename><sum type="sha256">bd5912c2f98bb715c2443db04431c3bc711a88e3af9609552dbebf57bb069b8c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0682" id="RHBA-2018:0682-1" title="Rhba-2018:0682-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0685-1</id><title>Exiv2 Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="exiv2-devel" release="3.el7" src="exiv2-0.26-3.el7.src.rpm" version="0.26"><filename>exiv2-devel-0.26-3.el7.x86_64.rpm</filename><sum type="sha256">ed21fdde1e1494b1458fec66506a8d3eefcbeeacdc09cdda22e5b27b5e63e937</sum></package><package arch="x86_64" name="libkexiv2" release="4.el7" src="libkexiv2-4.10.5-4.el7.src.rpm" version="4.10.5"><filename>libkexiv2-4.10.5-4.el7.x86_64.rpm</filename><sum type="sha256">89e8123053666e38069473577f19089f71f73e7f54f1c6f0a3dccbe40014f300</sum></package><package arch="x86_64" name="exiv2" release="3.el7" src="exiv2-0.26-3.el7.src.rpm" version="0.26"><filename>exiv2-0.26-3.el7.x86_64.rpm</filename><sum type="sha256">2388316712e693e22603ae73e33d63db47d695b08516ff6b2d158e48e7bdd928</sum></package><package arch="i686" name="libkexiv2" release="4.el7" src="libkexiv2-4.10.5-4.el7.src.rpm" version="4.10.5"><filename>libkexiv2-4.10.5-4.el7.i686.rpm</filename><sum type="sha256">d00093e1e674a05551fd36bd990ddce5113a01cecf614852feb014dc121277b7</sum></package><package arch="x86_64" name="strigi-libs" release="13.20120626.el7" src="strigi-0.7.7-13.20120626.el7.src.rpm" version="0.7.7"><filename>strigi-libs-0.7.7-13.20120626.el7.x86_64.rpm</filename><sum type="sha256">d585e5316445679ee9887660724eff2c22136600ed9ae0002bab57b066a3960d</sum></package><package arch="x86_64" name="nepomuk-core" release="6.el7" src="nepomuk-core-4.10.5-6.el7.src.rpm" version="4.10.5"><filename>nepomuk-core-4.10.5-6.el7.x86_64.rpm</filename><sum type="sha256">60e0c8c1569c63f2db59cd42b8cc8d62ec9a42ebb8698c11e5d7db84c504b515</sum></package><package arch="i686" name="nepomuk-core-libs" release="6.el7" src="nepomuk-core-4.10.5-6.el7.src.rpm" version="4.10.5"><filename>nepomuk-core-libs-4.10.5-6.el7.i686.rpm</filename><sum type="sha256">a4f1c52addfa9963d5b3e95e3097c93293e017153b7e6da12ff0c831ed5731a3</sum></package><package arch="x86_64" name="libkexiv2-devel" release="4.el7" src="libkexiv2-4.10.5-4.el7.src.rpm" version="4.10.5"><filename>libkexiv2-devel-4.10.5-4.el7.x86_64.rpm</filename><sum type="sha256">7baeaf9ea5157606bab6606ae088dfe2f963385c391047d8d1fe44202e8bf134</sum></package><package arch="x86_64" name="gwenview" release="5.el7" src="gwenview-4.10.5-5.el7.src.rpm" version="4.10.5"><filename>gwenview-4.10.5-5.el7.x86_64.rpm</filename><sum type="sha256">36b60dad89144080e7b50760ce9c46be50a098f20e6a4ec3b5289ab96b3625e8</sum></package><package arch="x86_64" name="gnome-color-manager" release="2.el7" src="gnome-color-manager-3.22.2-2.el7.src.rpm" version="3.22.2"><filename>gnome-color-manager-3.22.2-2.el7.x86_64.rpm</filename><sum type="sha256">5d13249b72a1b9e7551865214e2994497afe8e79673dedccf2130d95259b72d9</sum></package><package arch="x86_64" name="nepomuk-core-libs" release="6.el7" src="nepomuk-core-4.10.5-6.el7.src.rpm" version="4.10.5"><filename>nepomuk-core-libs-4.10.5-6.el7.x86_64.rpm</filename><sum type="sha256">f71ecbcf96b89e5942000aaddbbf1c5b9399eff3a8b670119b822e8abc261958</sum></package><package arch="i686" name="exiv2-devel" release="3.el7" src="exiv2-0.26-3.el7.src.rpm" version="0.26"><filename>exiv2-devel-0.26-3.el7.i686.rpm</filename><sum type="sha256">8b997b210273218ca79d72bf9562133bd46244e3d1572812da356b2e14102ad5</sum></package><package arch="x86_64" name="strigi" release="13.20120626.el7" src="strigi-0.7.7-13.20120626.el7.src.rpm" version="0.7.7"><filename>strigi-0.7.7-13.20120626.el7.x86_64.rpm</filename><sum type="sha256">78a9b18c7db57089a928a10db0a595cf9b15bc16621a4afee9a4e03bb26dfd1e</sum></package><package arch="i686" name="libgexiv2-devel" release="4.el7" src="libgexiv2-0.10.4-4.el7.src.rpm" version="0.10.4"><filename>libgexiv2-devel-0.10.4-4.el7.i686.rpm</filename><sum type="sha256">87c6695e2243f1c3b0fe93395a52d096f3cef8da72a3e350937871462398bd28</sum></package><package arch="i686" name="gnome-color-manager" release="2.el7" src="gnome-color-manager-3.22.2-2.el7.src.rpm" version="3.22.2"><filename>gnome-color-manager-3.22.2-2.el7.i686.rpm</filename><sum type="sha256">930f24acf3fcf1096f344f8ab791df763028830cc4d17e67f55e216987dca2d4</sum></package><package arch="i686" name="strigi-devel" release="13.20120626.el7" src="strigi-0.7.7-13.20120626.el7.src.rpm" version="0.7.7"><filename>strigi-devel-0.7.7-13.20120626.el7.i686.rpm</filename><sum type="sha256">4659e324a15d0072f5278e839d9baa186c864895149768265f8cbdc6ac7326fa</sum></package><package arch="x86_64" name="libgexiv2-devel" release="4.el7" src="libgexiv2-0.10.4-4.el7.src.rpm" version="0.10.4"><filename>libgexiv2-devel-0.10.4-4.el7.x86_64.rpm</filename><sum type="sha256">8041539907e0fa50a13e3f6ec65b091f8dd8afadc32d753d1947be0a5c5c01a5</sum></package><package arch="i686" name="nepomuk-core-devel" release="6.el7" src="nepomuk-core-4.10.5-6.el7.src.rpm" version="4.10.5"><filename>nepomuk-core-devel-4.10.5-6.el7.i686.rpm</filename><sum type="sha256">c6e677e61d4c7360213fba1a4e95ca9e5f4eac4318ef6692731b7e8ab8cf9126</sum></package><package arch="x86_64" name="strigi-devel" release="13.20120626.el7" src="strigi-0.7.7-13.20120626.el7.src.rpm" version="0.7.7"><filename>strigi-devel-0.7.7-13.20120626.el7.x86_64.rpm</filename><sum type="sha256">d874352f1e16a8fbe19dd33a5a68e3d779a110a8f454a3e4ded25dcf9d459a85</sum></package><package arch="i686" name="exiv2-libs" release="3.el7" src="exiv2-0.26-3.el7.src.rpm" version="0.26"><filename>exiv2-libs-0.26-3.el7.i686.rpm</filename><sum type="sha256">b8a9978feb12f16d2f05f85ff30c0c124851e1ded0c267e01a693617f49b9b0e</sum></package><package arch="i686" name="strigi-libs" release="13.20120626.el7" src="strigi-0.7.7-13.20120626.el7.src.rpm" version="0.7.7"><filename>strigi-libs-0.7.7-13.20120626.el7.i686.rpm</filename><sum type="sha256">a4b62f48ca4fabb9b80bdbd4ca0be94eb53dac8a9071574bbe63189eb7c1f1fb</sum></package><package arch="i686" name="libgexiv2" release="4.el7" src="libgexiv2-0.10.4-4.el7.src.rpm" version="0.10.4"><filename>libgexiv2-0.10.4-4.el7.i686.rpm</filename><sum type="sha256">d7630ee8fda486b41aa1ce299d9414cd76e1f80d35305055d99ad4181c163780</sum></package><package arch="x86_64" name="gwenview-libs" release="5.el7" src="gwenview-4.10.5-5.el7.src.rpm" version="4.10.5"><filename>gwenview-libs-4.10.5-5.el7.x86_64.rpm</filename><sum type="sha256">ab8016500deab6759e22bdb0508b24fe121667b41e446fd3da17cd35c87e6103</sum></package><package arch="x86_64" name="exiv2-libs" release="3.el7" src="exiv2-0.26-3.el7.src.rpm" version="0.26"><filename>exiv2-libs-0.26-3.el7.x86_64.rpm</filename><sum type="sha256">e397f5eb9a756d521fa6b47d7d43644ca533590db7f7a5e71e8a59c323b8e2ec</sum></package><package arch="noarch" name="exiv2-doc" release="3.el7" src="exiv2-0.26-3.el7.src.rpm" version="0.26"><filename>exiv2-doc-0.26-3.el7.noarch.rpm</filename><sum type="sha256">a22e305086d26196f962c1fa0e3d73ebe4c92d7082e8c867926f121419286ee4</sum></package><package arch="x86_64" name="nepomuk-core-devel" release="6.el7" src="nepomuk-core-4.10.5-6.el7.src.rpm" version="4.10.5"><filename>nepomuk-core-devel-4.10.5-6.el7.x86_64.rpm</filename><sum type="sha256">3c93635352b10c4b672606258d4114979645aa6268afcd2a53e89e0d28267ee8</sum></package><package arch="x86_64" name="libgexiv2" release="4.el7" src="libgexiv2-0.10.4-4.el7.src.rpm" version="0.10.4"><filename>libgexiv2-0.10.4-4.el7.x86_64.rpm</filename><sum type="sha256">17cf176b40c95d872336be356adc38bab28eef3b1283a664255a6c0fa85e5a18</sum></package><package arch="i686" name="gwenview-libs" release="5.el7" src="gwenview-4.10.5-5.el7.src.rpm" version="4.10.5"><filename>gwenview-libs-4.10.5-5.el7.i686.rpm</filename><sum type="sha256">8a896898b6ba680b9b59b5951a1fbd267f089a80a34a172b90f7439d031e475b</sum></package><package arch="i686" name="libkexiv2-devel" release="4.el7" src="libkexiv2-4.10.5-4.el7.src.rpm" version="4.10.5"><filename>libkexiv2-devel-4.10.5-4.el7.i686.rpm</filename><sum type="sha256">28c6c66847a93799311ed9c9ecad23f7373ca44c679f65f072566d01efd5d6aa</sum></package><package arch="x86_64" name="python2-gexiv2" release="4.el7" src="libgexiv2-0.10.4-4.el7.src.rpm" version="0.10.4"><filename>python2-gexiv2-0.10.4-4.el7.x86_64.rpm</filename><sum type="sha256">adc0708fe7aca014cd1716cce0cc03f91b208844ae500b46a995a6d7727e5902</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0685" id="RHBA-2018:0685-1" title="Rhba-2018:0685-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0710-1</id><title>Qt5 Libraries Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="qt5-qtwebchannel-examples" release="1.el7" src="qt5-qtwebchannel-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtwebchannel-examples-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">de8426afbf4866cdec7c6559d7fa13d5f649b84df652182d66b6a9162d769c4f</sum></package><package arch="i686" name="qt5-qtbase-static" release="3.el7" src="qt5-qtbase-5.9.2-3.el7.src.rpm" version="5.9.2"><filename>qt5-qtbase-static-5.9.2-3.el7.i686.rpm</filename><sum type="sha256">cefe53bee3e829a3420ce770296ba9002bc31c37106f95d5489ce6e03587257b</sum></package><package arch="i686" name="qt5-qtsvg-devel" release="1.el7" src="qt5-qtsvg-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtsvg-devel-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">28bf6711ffa501a9a3e60fb4ffa7d9158b43ae4ced2366ccaec9fc45552212ad</sum></package><package arch="x86_64" name="qt5-qtmultimedia" release="1.el7" src="qt5-qtmultimedia-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtmultimedia-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">304413f98e2f9c21eb66627fbd96311ccdf5f5e59fa0d27ae67e34c74052f739</sum></package><package arch="x86_64" name="qt5-qtdeclarative-examples" release="1.el7" src="qt5-qtdeclarative-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtdeclarative-examples-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">3acd525654a4b8f6e2ddf9089363b65f1cc35b4c30bacc923d118808373ccab7</sum></package><package arch="i686" name="qt5-qtwayland-devel" release="1.el7" src="qt5-qtwayland-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtwayland-devel-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">75fa21af3dba73592f00b27aa1db31f7db04d6debf4de8ff22bd9466dd66e32e</sum></package><package arch="noarch" name="qt5-qttools-common" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qttools-common-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">65fe117d876256ef64bc448dcfc466f5ac311853f0f1d847b35820f6fe2a49ae</sum></package><package arch="i686" name="qt5-qtconnectivity" release="1.el7" src="qt5-qtconnectivity-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtconnectivity-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">8ae21e673bef44170a34564e47b5901c9d575d901f9a272e5a9b95a8d25939de</sum></package><package arch="x86_64" name="qt5-qtlocation" release="1.el7" src="qt5-qtlocation-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtlocation-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">35dd5a18f17f5edcf39b7fd9b6bd7f674ea33a19b04468fff6b29051aee559bf</sum></package><package arch="x86_64" name="qt5-qtwebchannel-devel" release="1.el7" src="qt5-qtwebchannel-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtwebchannel-devel-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">f5fb89ec8aa980b4879041be8ad9e3ab2a83fe9efe1bd0ed321b248b592132a3</sum></package><package arch="i686" name="qt5-qtsvg" release="1.el7" src="qt5-qtsvg-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtsvg-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">1e961be9a572847d5eca0f7a4c57ee6ff1165423b66e57360b2a5d9fe885b359</sum></package><package arch="i686" name="qt5-qtx11extras" release="1.el7" src="qt5-qtx11extras-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtx11extras-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">1fbdcac9c93e3462ac7b71bfb124b1578d31fa83ec8418ecccf96cbf25129714</sum></package><package arch="x86_64" name="qt5-qtx11extras" release="1.el7" src="qt5-qtx11extras-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtx11extras-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">6edaa31f04060d25cc4ed2dd6fd9c06d4a1c60d526178adf57fce9e00b192fa6</sum></package><package arch="noarch" name="qt5-qtdoc" release="1.el7" src="qt5-qtdoc-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtdoc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">1cc32b74a21cf62b6c04f941d49821720ee1e27b0df68d28d46abcf8a5c4a360</sum></package><package arch="x86_64" name="qt5-qttools-libs-help" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qttools-libs-help-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">45174027c7c914b33077b775e0e1db9a5f5af9511617faa6d0c6bd5e768c2f22</sum></package><package arch="x86_64" name="qt5-qtbase-devel" release="3.el7" src="qt5-qtbase-5.9.2-3.el7.src.rpm" version="5.9.2"><filename>qt5-qtbase-devel-5.9.2-3.el7.x86_64.rpm</filename><sum type="sha256">78e66bbccff54471cd90090554f60fac5d5fbb80cbbfb65f2a3970bd493a822c</sum></package><package arch="x86_64" name="qt5-qtimageformats" release="1.el7" src="qt5-qtimageformats-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtimageformats-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">379001ae46c744076ccf16d6a41cd4c1a3bdabd25381f764fee7c76d3aa49530</sum></package><package arch="x86_64" name="qt5-qttools-devel" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qttools-devel-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">221d22f2f770c3dfef8b95ecef153438798541b835748649be98f6eb7f2a05dd</sum></package><package arch="x86_64" name="qt5-qtbase-examples" release="3.el7" src="qt5-qtbase-5.9.2-3.el7.src.rpm" version="5.9.2"><filename>qt5-qtbase-examples-5.9.2-3.el7.x86_64.rpm</filename><sum type="sha256">1d0904c6e7976e4818880c406398cb55bd32bed15248f9bec607009bf4a0c31c</sum></package><package arch="noarch" name="qt5-qt3d-doc" release="1.el7" src="qt5-qt3d-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qt3d-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">1484a9339550c8fc079fcaffe71e9289f48a83993b5a7e37f3bcfab8cf787195</sum></package><package arch="i686" name="qt5-qtmultimedia-examples" release="1.el7" src="qt5-qtmultimedia-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtmultimedia-examples-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">6f6731027407da83a22a4485acbdbfdcf7c040a9a6d974289fd1cb4f649a066e</sum></package><package arch="noarch" name="qt5-qtimageformats-doc" release="1.el7" src="qt5-qtimageformats-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtimageformats-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">53534abc68bbd6278e481b2740d51581960efebf772976f5d3c0caff80c2b935</sum></package><package arch="x86_64" name="qt5-qtbase-doc" release="3.el7" src="qt5-qtbase-5.9.2-3.el7.src.rpm" version="5.9.2"><filename>qt5-qtbase-doc-5.9.2-3.el7.x86_64.rpm</filename><sum type="sha256">e6469937798114a10bbc0a05e8d865cb0b6432d473d60d922da8d5e29823b611</sum></package><package arch="x86_64" name="qt5-qtbase-odbc" release="3.el7" src="qt5-qtbase-5.9.2-3.el7.src.rpm" version="5.9.2"><filename>qt5-qtbase-odbc-5.9.2-3.el7.x86_64.rpm</filename><sum type="sha256">b0cb86f683967b34d5b077ccd40449ab3272dda2de7653ce206cc38ed030e8db</sum></package><package arch="x86_64" name="qt5-qt3d-examples" release="1.el7" src="qt5-qt3d-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qt3d-examples-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">bea7540e058146a8a255988993d136bd9de363c80de6b32b62fb494e3a3ec713</sum></package><package arch="x86_64" name="qt5-qt3d" release="1.el7" src="qt5-qt3d-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qt3d-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">900073c58c6edf3085532e25fc765d3901d1b9ea7c72232751d8b238785af403</sum></package><package arch="noarch" name="qt5-qtwebchannel-doc" release="1.el7" src="qt5-qtwebchannel-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtwebchannel-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">555c87aefacab075269841862880cafd974cba2d41d5c8e208a04a8afe61be05</sum></package><package arch="noarch" name="qt5-qtx11extras-doc" release="1.el7" src="qt5-qtx11extras-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtx11extras-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">e80bff60e23c74c569985c9d33a980681852abf8083bc2a7f16ce24be882f5b7</sum></package><package arch="x86_64" name="qt5-qtconnectivity-devel" release="1.el7" src="qt5-qtconnectivity-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtconnectivity-devel-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">92ae6880c560328c7a0c0f3d46a347b29a32abe757d757412c892af817d1e13a</sum></package><package arch="x86_64" name="qt5-qtscript" release="1.el7" src="qt5-qtscript-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtscript-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">5fcf226a517eaae2c63645f8e7970c15a6c38f759191e8f0c9937588d63ff492</sum></package><package arch="x86_64" name="qt5-qtquickcontrols2-devel" release="1.el7" src="qt5-qtquickcontrols2-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtquickcontrols2-devel-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">bbccbf19a023537126d178933ece6681c3fa02491e3a8f091e8ad482eaf121ef</sum></package><package arch="x86_64" name="qt5-qtwayland" release="1.el7" src="qt5-qtwayland-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtwayland-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">c6fa425e09deda75c0abd2dbdd9175baf259631af0309b8a61a96288a9ea0ac0</sum></package><package arch="x86_64" name="qt5-qtdeclarative-devel" release="1.el7" src="qt5-qtdeclarative-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtdeclarative-devel-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">022244b6a8e34cce2599112ccc3f951161ea75386f6cf28f54d5b03e5e2b432d</sum></package><package arch="noarch" name="qt5-qtxmlpatterns-doc" release="1.el7" src="qt5-qtxmlpatterns-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtxmlpatterns-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">a3c591fb8707796fd999bd8ad9a95c032306a356a3b8885c77a5571834cfc06e</sum></package><package arch="x86_64" name="qt5-qtdeclarative-static" release="1.el7" src="qt5-qtdeclarative-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtdeclarative-static-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">6c04f525e0d4b90c8f229823959462ddc67b0d194673a135aab9b07269e57286</sum></package><package arch="i686" name="qt5-qtwebchannel-devel" release="1.el7" src="qt5-qtwebchannel-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtwebchannel-devel-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">f6141e7aaab5338d8e9fd89f80043cfac668f607316f6189117a1fa862e87873</sum></package><package arch="i686" epoch="1" name="qt5-qtenginio-devel" release="2.el7" src="qt5-qtenginio-1.6.2-2.el7.src.rpm" version="1.6.2"><filename>qt5-qtenginio-devel-1.6.2-2.el7.i686.rpm</filename><sum type="sha256">b3e2cf57b90b2e5ff2d19a3716eb17ca6a9d45b6e189297f2071a7bf1b1771b5</sum></package><package arch="x86_64" name="qt5-qtsensors-examples" release="1.el7" src="qt5-qtsensors-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtsensors-examples-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">01695ff4290b14b49ccfee6ed6f0be6562ca77b9598746489d8eb2b4afef19b8</sum></package><package arch="noarch" name="qt5-qtsvg-doc" release="1.el7" src="qt5-qtsvg-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtsvg-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">2d2d675e025540760b2d61eceeaa2714009ea9bd47f88af419f25847d0c9462a</sum></package><package arch="noarch" name="qt5-qtbase-common" release="3.el7" src="qt5-qtbase-5.9.2-3.el7.src.rpm" version="5.9.2"><filename>qt5-qtbase-common-5.9.2-3.el7.noarch.rpm</filename><sum type="sha256">060b050f1f86aa96b68fe4685b78aac9e14192c3e17cb54764b2c61c68c117ca</sum></package><package arch="i686" name="qt5-qtmultimedia" release="1.el7" src="qt5-qtmultimedia-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtmultimedia-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">55aa10bf8a39b1995d84c66ae0407a30e1baf735950785568a3b86e46e2a9388</sum></package><package arch="x86_64" name="qt5-qtlocation-examples" release="1.el7" src="qt5-qtlocation-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtlocation-examples-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">bdc7d8de4e5ddea93182bfe2fe41ec1223efd517d5402def63fbf2481fa8499c</sum></package><package arch="x86_64" name="qt5-qtscript-examples" release="1.el7" src="qt5-qtscript-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtscript-examples-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">3de9719f206342712845110dc55a12fa21429fbd61b0db0317e88dae2136ad30</sum></package><package arch="x86_64" name="qt5-qtbase-gui" release="3.el7" src="qt5-qtbase-5.9.2-3.el7.src.rpm" version="5.9.2"><filename>qt5-qtbase-gui-5.9.2-3.el7.x86_64.rpm</filename><sum type="sha256">ffac86d0a75d27e9000330f549100a768983e6003851463266d85210e8f6525a</sum></package><package arch="x86_64" name="qt5-linguist" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-linguist-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">549fb6597bc8e8405c360d5caa4f3c632d60e381b52eb974036ef7d74b7696d8</sum></package><package arch="x86_64" name="qt5-qtcanvas3d-examples" release="1.el7" src="qt5-qtcanvas3d-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtcanvas3d-examples-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">a30f744c213a2672549deeae0a19b4b868757755c88d48b6d52c251374e7e518</sum></package><package arch="i686" name="qt5-qt3d" release="1.el7" src="qt5-qt3d-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qt3d-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">d499b41887874c38e8fed8d34e234665676c360ad71271fd81bed080d6cca782</sum></package><package arch="i686" epoch="1" name="qt5-qtenginio" release="2.el7" src="qt5-qtenginio-1.6.2-2.el7.src.rpm" version="1.6.2"><filename>qt5-qtenginio-1.6.2-2.el7.i686.rpm</filename><sum type="sha256">c5d4bb7fc7643e0fa06f71de41acd1105f9c313684973e828a8e842847c9c91e</sum></package><package arch="i686" name="qt5-qtwebchannel" release="1.el7" src="qt5-qtwebchannel-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtwebchannel-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">938fdb75364edb7a2f227b5f54ead787e1605c544db3f8375ef2ba8635e22fb9</sum></package><package arch="x86_64" name="qt5-qtserialbus" release="1.el7" src="qt5-qtserialbus-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtserialbus-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">f22fb804e00fed520b987e757dc9a626452a589cb2276ab6edb59455f136f383</sum></package><package arch="x86_64" name="qt5-qtserialbus-devel" release="1.el7" src="qt5-qtserialbus-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtserialbus-devel-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">85963dcac543b76fa5fdccb4e47f1b1181d0062009e2027097e1b96f0b3af2b1</sum></package><package arch="i686" name="qt5-qttools-devel" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qttools-devel-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">341a8f177b517546305a34cb2976b11889ede0e974826e2566844f66f52563bb</sum></package><package arch="x86_64" name="qt5-qttools-libs-designercomponents" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qttools-libs-designercomponents-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">96f5dc620e9bc3c3415031fe70d47bcb40b80c3abd5f574b282521518dd501e5</sum></package><package arch="noarch" name="qt5-qttools-doc" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qttools-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">e20a70d5ae76880d64906fb7f0760cc7bc51d69615760304cdd54ccd0c281cc4</sum></package><package arch="noarch" name="qt5-qtgraphicaleffects-doc" release="1.el7" src="qt5-qtgraphicaleffects-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtgraphicaleffects-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">7286095cf2bf7354a75e41bcface13d36c5bf67c93b4111b160b67cc053c0b21</sum></package><package arch="x86_64" name="qt5-qtbase-mysql" release="3.el7" src="qt5-qtbase-5.9.2-3.el7.src.rpm" version="5.9.2"><filename>qt5-qtbase-mysql-5.9.2-3.el7.x86_64.rpm</filename><sum type="sha256">b0ecad2cf4ceb199410a6b397e1c3ce14d394dddc9b270cec994a378ca43e112</sum></package><package arch="i686" name="qt5-qtbase-postgresql" release="3.el7" src="qt5-qtbase-5.9.2-3.el7.src.rpm" version="5.9.2"><filename>qt5-qtbase-postgresql-5.9.2-3.el7.i686.rpm</filename><sum type="sha256">866fb88bb3e48e46e28fd305f26ce0ccf1b0324ed0719300e591fc3b6f429d72</sum></package><package arch="x86_64" name="qt5-qtquickcontrols2" release="1.el7" src="qt5-qtquickcontrols2-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtquickcontrols2-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">8c47192ee13982ebe5eb36e6c21f4f618304b3050e19956f463db0ef4904cdd1</sum></package><package arch="x86_64" name="qt5-qtquickcontrols-examples" release="1.el7" src="qt5-qtquickcontrols-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtquickcontrols-examples-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">4658b07b288f534224ce0931fcafd233d6ef6b9cdc23bf05351f4cdddeaa19d7</sum></package><package arch="x86_64" name="qt5-qttools-libs-designer" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qttools-libs-designer-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">881fb1c56b886adcf002234881cdee619fe3f9b20c40d26b65027b2221b14111</sum></package><package arch="x86_64" name="qt5-qtwayland-examples" release="1.el7" src="qt5-qtwayland-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtwayland-examples-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">ccb22a2838b6aa7cfc819fee940f8927824ff4fb31e23a3f03379376b5c910c8</sum></package><package arch="x86_64" name="qt5-qtlocation-devel" release="1.el7" src="qt5-qtlocation-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtlocation-devel-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">c104467714a75e82fe92182430c80689044e0e393963aa052756394f74166e5b</sum></package><package arch="i686" name="qt5-qtx11extras-devel" release="1.el7" src="qt5-qtx11extras-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtx11extras-devel-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">a838d276c0d6b241fbe5defea3b579b8365b80ab511dfce931d3f8d79f3b24ab</sum></package><package arch="noarch" name="qt5-qtconnectivity-doc" release="1.el7" src="qt5-qtconnectivity-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtconnectivity-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">735ee04c8ebd234b48324526f8346124e4ccb115e9cce5b2fdf1e4916e0d98a9</sum></package><package arch="i686" name="qt5-qtserialport" release="1.el7" src="qt5-qtserialport-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtserialport-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">2f7b1c3340230bd78ea6abf1ea21eae3b9d675e523e2464885ef9f89656cb7df</sum></package><package arch="i686" name="qt5-qtwebsockets-devel" release="1.el7" src="qt5-qtwebsockets-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtwebsockets-devel-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">de5d6f5448a4687cfdf86bc048c9d786842e846f4b3aa6ed826810f46e9c06c2</sum></package><package arch="x86_64" epoch="1" name="qt5-qtenginio-devel" release="2.el7" src="qt5-qtenginio-1.6.2-2.el7.src.rpm" version="1.6.2"><filename>qt5-qtenginio-devel-1.6.2-2.el7.x86_64.rpm</filename><sum type="sha256">991c13294c2d403aab9ae39cd0450bbed76676aa8e49ad40c05fab85bc535909</sum></package><package arch="noarch" name="qt5-rpm-macros" release="3.el7" src="qt5-qtbase-5.9.2-3.el7.src.rpm" version="5.9.2"><filename>qt5-rpm-macros-5.9.2-3.el7.noarch.rpm</filename><sum type="sha256">f414f0ad8d3c873f3db321cde9b4231e339ce713dc273f14029ca02a3f89eff0</sum></package><package arch="i686" name="qt5-qtbase-mysql" release="3.el7" src="qt5-qtbase-5.9.2-3.el7.src.rpm" version="5.9.2"><filename>qt5-qtbase-mysql-5.9.2-3.el7.i686.rpm</filename><sum type="sha256">5d519966bd9f52f54099dbd5146a5415f8459fa8cea21c336004946c3aea763b</sum></package><package arch="x86_64" name="qt5-qtwebchannel" release="1.el7" src="qt5-qtwebchannel-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtwebchannel-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">5f1b934210cb4fa33ff9ac249a843e37f882c434a8dfae4835a17a0159bc16a9</sum></package><package arch="x86_64" name="qt5-qtbase-static" release="3.el7" src="qt5-qtbase-5.9.2-3.el7.src.rpm" version="5.9.2"><filename>qt5-qtbase-static-5.9.2-3.el7.x86_64.rpm</filename><sum type="sha256">262872b9bc34b07b20e180c0dfe2206bd1abb87246abf5d81322bb98dffd223f</sum></package><package arch="x86_64" name="qt5-qtwayland-devel" release="1.el7" src="qt5-qtwayland-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtwayland-devel-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">187c2839b456bf7156638c7b77767e89f9b82621a9452ac9501bc6764d2c9433</sum></package><package arch="x86_64" name="qt5-qtmultimedia-examples" release="1.el7" src="qt5-qtmultimedia-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtmultimedia-examples-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">57f1df776424783f3684de252961790a7a108e5efe4921856c5cca8db5b38643</sum></package><package arch="x86_64" name="qt5-qtbase" release="3.el7" src="qt5-qtbase-5.9.2-3.el7.src.rpm" version="5.9.2"><filename>qt5-qtbase-5.9.2-3.el7.x86_64.rpm</filename><sum type="sha256">fa17c8b081911d4323203b7faafcb6f8d673a49560c3c17e545c19707ef8a622</sum></package><package arch="i686" name="qt5-qtscript-devel" release="1.el7" src="qt5-qtscript-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtscript-devel-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">d4eeb5365dab15e1015900b145517feb577cf78271a878c2536b05eeed00c25c</sum></package><package arch="x86_64" name="qt5-designer" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-designer-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">be9042e3d09af2898fa055716cc21e7877fb029baff6af3b1ca007125f1ef9a0</sum></package><package arch="x86_64" name="qt5-qtserialport-examples" release="1.el7" src="qt5-qtserialport-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtserialport-examples-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">0a5576d04b1324b182170c1ca68aad56d85c1aaa27e71b65315e0eb077f9e4c1</sum></package><package arch="noarch" name="qt5-qtlocation-doc" release="1.el7" src="qt5-qtlocation-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtlocation-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">25488a938104500db17fa3b4b4b265ec38fe96223e80d164de9dcaf7929f1ceb</sum></package><package arch="i686" name="qt5-qtbase-gui" release="3.el7" src="qt5-qtbase-5.9.2-3.el7.src.rpm" version="5.9.2"><filename>qt5-qtbase-gui-5.9.2-3.el7.i686.rpm</filename><sum type="sha256">568ad8950ef45bca3ff95b0d94d181e9d3a4e03ead26596219dd4bd22e51d96f</sum></package><package arch="x86_64" name="qt5-qtxmlpatterns-examples" release="1.el7" src="qt5-qtxmlpatterns-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtxmlpatterns-examples-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">e3cb9e7505b2f4c307d00aba62166c1cebadb36348ee4604fcb9ec9d70e0177d</sum></package><package arch="i686" name="qt5-qtsensors" release="1.el7" src="qt5-qtsensors-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtsensors-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">410f7335771457f4b2ef29840b7e12fb4eb0b595cbcc80fbd677006b70bd6af4</sum></package><package arch="noarch" name="qt5-qtwebsockets-doc" release="1.el7" src="qt5-qtwebsockets-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtwebsockets-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">777ad5398b2e96dfa48a642fab5eba1a64e5d78e6273a681ac69522d80ab1133</sum></package><package arch="noarch" name="qt5-qtwayland-doc" release="1.el7" src="qt5-qtwayland-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtwayland-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">8c4a5da80b9fe94e2f7f3cbf6b077fef8d554ae32b6f7a6afc7d3871dfb3b683</sum></package><package arch="noarch" name="qt5-qtquickcontrols-doc" release="1.el7" src="qt5-qtquickcontrols-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtquickcontrols-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">2ac3039e97202ce0fda30184ccb6ba1f7ba646277490a6793db48afbfb26a4b4</sum></package><package arch="noarch" name="qt5-qtmultimedia-doc" release="1.el7" src="qt5-qtmultimedia-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtmultimedia-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">f3d565be05948b6f4818cd71445b5908d671feeeb4ed94fc4ac8bb71ba07bcf2</sum></package><package arch="i686" name="qt5-qtmultimedia-devel" release="1.el7" src="qt5-qtmultimedia-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtmultimedia-devel-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">1a43759b4182dcf51e05e93d309b120f3f5385820c898304f36164d1908a75fd</sum></package><package arch="i686" name="qt5-qtbase" release="3.el7" src="qt5-qtbase-5.9.2-3.el7.src.rpm" version="5.9.2"><filename>qt5-qtbase-5.9.2-3.el7.i686.rpm</filename><sum type="sha256">96222cfd5b7870c5da0f4bc10d4fb8bdecc1e29a77f41395e4028c71ceadc830</sum></package><package arch="x86_64" name="qt5-qt3d-devel" release="1.el7" src="qt5-qt3d-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qt3d-devel-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">6bf3e232c68cd7ff408f31ba9a7104aa1e4cbffce9fd9175f0085468c30db585</sum></package><package arch="i686" name="qt5-qtimageformats" release="1.el7" src="qt5-qtimageformats-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtimageformats-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">6deabc5fae07bbe8daa6d5c631a9e45e8b7e6d4d50bd19d710a16f22d03ca6ea</sum></package><package arch="x86_64" name="qt5-qtxmlpatterns" release="1.el7" src="qt5-qtxmlpatterns-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtxmlpatterns-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">068dcd0523bd6bed878e57e6b28030a579dcead071fbb0a2894ee557f98b7f7f</sum></package><package arch="x86_64" name="qt5-qtquickcontrols" release="1.el7" src="qt5-qtquickcontrols-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtquickcontrols-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">0de862fede658e9903a68650696646fb6c9e79bcb053886c9bc5474bbc82dfc2</sum></package><package arch="x86_64" name="qt5-qtserialport-devel" release="1.el7" src="qt5-qtserialport-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtserialport-devel-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">c8113cf89cef84e85de38aa88d0f46c5dee53c47a3bfb40bb770c733bfbb46cc</sum></package><package arch="x86_64" name="qt5-qtsensors" release="1.el7" src="qt5-qtsensors-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtsensors-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">81fbe834b4ae27d61e50bb2df3894e992c7393fd44601cd8eaf2379be7d3f9c4</sum></package><package arch="i686" name="qt5-qtlocation" release="1.el7" src="qt5-qtlocation-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtlocation-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">378383186a3f540f87c3f7686e2ee42452150066793f7db5d1626e2c4909c673</sum></package><package arch="x86_64" name="qt5-qtx11extras-devel" release="1.el7" src="qt5-qtx11extras-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtx11extras-devel-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">0d6a6129a356b7ed1e175cb4f8c47aa2557f13355a99ccc267289a9aa629babe</sum></package><package arch="x86_64" name="qt5-qtmultimedia-devel" release="1.el7" src="qt5-qtmultimedia-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtmultimedia-devel-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">7601a21862e856e2d72f8ac36d5b3e7297465ab5738b0f55cf0e6e20e85a25a6</sum></package><package arch="i686" name="qt5-qttools-libs-designercomponents" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qttools-libs-designercomponents-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">065eec124f6df28c33d578877f0e4e2f5c42bdf7515a566d561d3ba0977574f1</sum></package><package arch="i686" name="qt5-qttools-libs-designer" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qttools-libs-designer-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">c93cfee96a0b61b1962fccc05cf1dfe63b66d5f4edf89bc23f5cb5bb23e9aef5</sum></package><package arch="x86_64" name="qt5-qttools" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qttools-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">4ce5d204878c67b4d1176e31b56419120dda0218637b6819506e2368d72dac0f</sum></package><package arch="x86_64" name="qt5-doctools" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-doctools-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">1d759c4631883913fad127cbfe388dc1511bf9cc9702389973fa8f14b13f5e21</sum></package><package arch="x86_64" epoch="1" name="qt5-qtenginio-examples" release="2.el7" src="qt5-qtenginio-1.6.2-2.el7.src.rpm" version="1.6.2"><filename>qt5-qtenginio-examples-1.6.2-2.el7.x86_64.rpm</filename><sum type="sha256">55f4be6b174b75ae195fb213351150513774240991be8adc960709514a930cd9</sum></package><package arch="x86_64" name="qt5-qtwebsockets" release="1.el7" src="qt5-qtwebsockets-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtwebsockets-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">c989e9c154cb277aad4d3d3859c7a4082e6553fe7fd16d1b9016e8fe2d63c4f4</sum></package><package arch="x86_64" name="qt5-qdbusviewer" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qdbusviewer-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">22c1e409c3f2c836f9e0e1251af6ecbe30242ecdf533159cdb144ab889dda898</sum></package><package arch="x86_64" name="qt5-qtwebsockets-devel" release="1.el7" src="qt5-qtwebsockets-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtwebsockets-devel-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">aa05d2edcb476ceff42b0feee15e718d222b6269b61a2c0b43c9d446f00cccf6</sum></package><package arch="x86_64" name="qt5-qtquickcontrols2-examples" release="1.el7" src="qt5-qtquickcontrols2-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtquickcontrols2-examples-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">98e2b99afc4527a8ec7b0c280394474cb6823de55876853c0c0b2ece400d7e9c</sum></package><package arch="x86_64" name="qt5-qtquickcontrols2-doc" release="1.el7" src="qt5-qtquickcontrols2-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtquickcontrols2-doc-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">12ba62ed3d39e2d7c82958f976441b5106a49f548ca09e3f96dac21ff34fcfcc</sum></package><package arch="x86_64" name="qt5-qtscript-devel" release="1.el7" src="qt5-qtscript-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtscript-devel-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">3d41109c09d63ccba66cbf6c4a803a41c025c372a735ab3ff4e772d7e31cb55e</sum></package><package arch="x86_64" name="qt5-qtconnectivity" release="1.el7" src="qt5-qtconnectivity-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtconnectivity-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">6ebf1d74125564a2fcf403b35744d282d0bb7ff612436ff336b33b8fdb0fbd29</sum></package><package arch="i686" name="qt5-qtbase-devel" release="3.el7" src="qt5-qtbase-5.9.2-3.el7.src.rpm" version="5.9.2"><filename>qt5-qtbase-devel-5.9.2-3.el7.i686.rpm</filename><sum type="sha256">7bc352fc57ab1eb900be814d083a5a1c237b2d91d12f50caa47ca0ddc1c96209</sum></package><package arch="x86_64" name="qt5-qtsvg-examples" release="1.el7" src="qt5-qtsvg-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtsvg-examples-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">dc3acddcabafd33ddf3c009813db3251c3c12d1c6507e7506ad61eb5c2566466</sum></package><package arch="x86_64" name="qt5-qtxmlpatterns-devel" release="1.el7" src="qt5-qtxmlpatterns-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtxmlpatterns-devel-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">5e87a82e4b389c52350083a8a907785315f655982d99b09262551d6232ea1abf</sum></package><package arch="noarch" name="qt5-qttranslations" release="1.el7" src="qt5-qttranslations-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qttranslations-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">f868fa010ce53ff6e4a1320894cc500903d4be40cee038c3f887e5cd9b0c8eba</sum></package><package arch="i686" name="qt5-qtxmlpatterns" release="1.el7" src="qt5-qtxmlpatterns-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtxmlpatterns-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">44d42e09bc99ce52b6d9e7f45229c6fbc882dbed5b4850f0ad24916e527d3244</sum></package><package arch="x86_64" name="qt5-qtsvg" release="1.el7" src="qt5-qtsvg-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtsvg-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">2555fd470c9806c3e017c84e75d1ffa60521062cf5349199f7eb7a8b31b00c06</sum></package><package arch="x86_64" name="qt5-qtsvg-devel" release="1.el7" src="qt5-qtsvg-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtsvg-devel-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">1a99e2db24b892141fb20677d17cd7c11d3071cb26834a5ddcf81280f5c3d29b</sum></package><package arch="x86_64" name="qt5-qtgraphicaleffects" release="1.el7" src="qt5-qtgraphicaleffects-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtgraphicaleffects-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">84744cb4cf9b6a1d6237e4340343f645e3593c2cd128a7dc15dd25c2b4560f38</sum></package><package arch="x86_64" name="qt5-qtserialbus-examples" release="1.el7" src="qt5-qtserialbus-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtserialbus-examples-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">e61da0147f152b42366a194fc41e710ec3b4831f5b4ef979aa69bf12c441dd6f</sum></package><package arch="x86_64" name="qt5-qtconnectivity-examples" release="1.el7" src="qt5-qtconnectivity-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtconnectivity-examples-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">4e89b8e46b2ff5961eb3a737156380e43598ccaefdd851d3971303dac4a3020b</sum></package><package arch="x86_64" name="qt5-qtdeclarative" release="1.el7" src="qt5-qtdeclarative-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtdeclarative-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">918bf40cececf38cb597b20661b57064fe09d6669b1e8e1397031429b4edb3dc</sum></package><package arch="x86_64" epoch="1" name="qt5-qtenginio" release="2.el7" src="qt5-qtenginio-1.6.2-2.el7.src.rpm" version="1.6.2"><filename>qt5-qtenginio-1.6.2-2.el7.x86_64.rpm</filename><sum type="sha256">338232f690a6253d1dbb9ea3c0a2a46fc96ddfb30e06893d88de17c840eb1792</sum></package><package arch="i686" name="qt5-qttools-static" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qttools-static-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">15cae988e3f34ece319095765e788b0e454c7f391283e960089139b725b1bcab</sum></package><package arch="noarch" name="qt5-qtsensors-doc" release="1.el7" src="qt5-qtsensors-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtsensors-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">265a5b00dc7800615e03d857cd1a0ebbdb3fa8ef93ec5bee9c10f9d68c8cec13</sum></package><package arch="i686" name="qt5-qtlocation-devel" release="1.el7" src="qt5-qtlocation-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtlocation-devel-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">fc984180a4a03e272c5505f107cff8879b5b6593e1cbb470c513c79ddbd57e44</sum></package><package arch="noarch" name="qt5-qtserialport-doc" release="1.el7" src="qt5-qtserialport-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtserialport-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">3bd570688474de6087ed4ae2511d600ea2e309f3e7d26724c6b2784a9a9eb180</sum></package><package arch="i686" name="qt5-qtsensors-devel" release="1.el7" src="qt5-qtsensors-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtsensors-devel-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">43d938a931568d753d2170b1edaf52101837fd0f27637d2e4195b186ea2109db</sum></package><package arch="i686" name="qt5-qtdeclarative-static" release="1.el7" src="qt5-qtdeclarative-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtdeclarative-static-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">988614217aed683d72bafc2f0c32b47dba14c09b1286842f60bbaee1805607f5</sum></package><package arch="i686" name="qt5-designer" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-designer-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">3d3c370325e68f78510e819faefa4f0a19a45271e9f8b069d81538c60a34d0fb</sum></package><package arch="x86_64" name="qt5-qtbase-postgresql" release="3.el7" src="qt5-qtbase-5.9.2-3.el7.src.rpm" version="5.9.2"><filename>qt5-qtbase-postgresql-5.9.2-3.el7.x86_64.rpm</filename><sum type="sha256">d012fb48652ed3ddf756afc13dbe0f7d0de18d83dad1a4a1689ac770a1b361ad</sum></package><package arch="noarch" name="qt5-qtcanvas3d-doc" release="1.el7" src="qt5-qtcanvas3d-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtcanvas3d-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">d1fa1d87b9229b91f590a544a1a9803542ba3fd845e7965af5509bbc1b2fc938</sum></package><package arch="i686" name="qt5-qtscript" release="1.el7" src="qt5-qtscript-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtscript-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">f0e5b87f1f5dea38fe0f116bb75fd002fa248f3b16e2a6b962448303040c1f00</sum></package><package arch="x86_64" name="qt5-qtcanvas3d" release="1.el7" src="qt5-qtcanvas3d-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtcanvas3d-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">7fa4f2ae83a1fdb4b14232522e360dae3bf91ff75846a28b887fc25a51827006</sum></package><package arch="i686" name="qt5-qt3d-devel" release="1.el7" src="qt5-qt3d-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qt3d-devel-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">befde6c862a59adf6e14901d62f51a673fd32d12f715e0e06e044c9f89e02b72</sum></package><package arch="x86_64" name="qt5-qtsensors-devel" release="1.el7" src="qt5-qtsensors-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtsensors-devel-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">8116351ff50d4b3844c5f3a1c9abbd53a79f7fb7ef9fa22d86ee04e32055e513</sum></package><package arch="x86_64" name="qt5-qttools-static" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qttools-static-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">2912292dce1245faaf58bb7dec14a6826328d18071e9c699c9fca51adb5d9ea4</sum></package><package arch="i686" name="qt5-qtserialport-devel" release="1.el7" src="qt5-qtserialport-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtserialport-devel-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">65b940b101a687df3885295e51026b80081519f1fddb309f2af382b9c585a4d0</sum></package><package arch="i686" name="qt5-qtxmlpatterns-devel" release="1.el7" src="qt5-qtxmlpatterns-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtxmlpatterns-devel-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">e1808965db9e113f8506efc0886b8eea169d50e00c7f56b32712a79f7676e5e6</sum></package><package arch="i686" name="qt5-qtwayland" release="1.el7" src="qt5-qtwayland-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtwayland-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">bfe560a56c8d622e03d5e3ffb292d1b2851122ad1f0a425477642ba7e9811def</sum></package><package arch="i686" name="qt5-qtdeclarative-devel" release="1.el7" src="qt5-qtdeclarative-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtdeclarative-devel-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">e20cca5e90e6110ab46c0f3d6d73e904a7ec4238608e09d51e8151d89904f166</sum></package><package arch="noarch" epoch="1" name="qt5-qtenginio-doc" release="2.el7" src="qt5-qtenginio-1.6.2-2.el7.src.rpm" version="1.6.2"><filename>qt5-qtenginio-doc-1.6.2-2.el7.noarch.rpm</filename><sum type="sha256">7d1368cd9852c2263478ab3f29599672004cbec1a2876f310356f3f02e2bb361</sum></package><package arch="i686" name="qt5-qtwebsockets" release="1.el7" src="qt5-qtwebsockets-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtwebsockets-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">e1ae40b9c601c4b187fc5018deadb2f5ebf1174912f43901c32c7df61b05e5d0</sum></package><package arch="x86_64" name="qt5-qtdeclarative-doc" release="1.el7" src="qt5-qtdeclarative-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtdeclarative-doc-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">0ce2cc54033cfb8efd08b8c6ebb7e4bfd5c8adb51deded5d04da9627083b6f7d</sum></package><package arch="noarch" name="qt5-qtserialbus-doc" release="1.el7" src="qt5-qtserialbus-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtserialbus-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">a5ab4ebc3fb08a64731e9955c06ed3fd22c399a9f395519a989beeb747e17e34</sum></package><package arch="i686" name="qt5-qtdeclarative" release="1.el7" src="qt5-qtdeclarative-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtdeclarative-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">7819b6b72106b9cbebb52106dbd273f8737a208536df2592614354f24b064a82</sum></package><package arch="i686" name="qt5-qtbase-odbc" release="3.el7" src="qt5-qtbase-5.9.2-3.el7.src.rpm" version="5.9.2"><filename>qt5-qtbase-odbc-5.9.2-3.el7.i686.rpm</filename><sum type="sha256">ab2f50d0b0324439d12b2a96f2bd5112b866bc813219a6524d0e453316264253</sum></package><package arch="noarch" name="qt5-qtscript-doc" release="1.el7" src="qt5-qtscript-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtscript-doc-5.9.2-1.el7.noarch.rpm</filename><sum type="sha256">6f1cbbe51cb15a23e806cdfbaf57c2c47fdb13a683d20317dc7926598a7c69a4</sum></package><package arch="i686" name="qt5-qtsensors-examples" release="1.el7" src="qt5-qtsensors-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtsensors-examples-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">b87026eebecac4580722a351843898cb26b31fa48fc2d290bbd343237fb9344d</sum></package><package arch="x86_64" name="qt5-qtwebsockets-examples" release="1.el7" src="qt5-qtwebsockets-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtwebsockets-examples-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">b8a76154f0aae311b14b027ae592563a48bc17698d0446f21a6ad14356120968</sum></package><package arch="x86_64" name="qt5-qttools-examples" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qttools-examples-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">3806388fa16a248f2123922e0aad95bcd23155cd97556e89ad6d126097620c2c</sum></package><package arch="i686" name="qt5-qttools-libs-help" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qttools-libs-help-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">df98037f9e8aaa892ec170ff659ffa0ae7f43a30029d8f7693bbcb0366aea257</sum></package><package arch="x86_64" name="qt5-assistant" release="1.el7" src="qt5-qttools-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-assistant-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">f714a658a78694aad9d6cef571d6aa6ce4d4161fae71b72f82787c50335594e1</sum></package><package arch="i686" name="qt5-qtconnectivity-devel" release="1.el7" src="qt5-qtconnectivity-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtconnectivity-devel-5.9.2-1.el7.i686.rpm</filename><sum type="sha256">85318d1264965f286862ebe4651ec3fa25a7eb3fa74081f82f670be7669a9802</sum></package><package arch="x86_64" name="qt5-qtserialport" release="1.el7" src="qt5-qtserialport-5.9.2-1.el7.src.rpm" version="5.9.2"><filename>qt5-qtserialport-5.9.2-1.el7.x86_64.rpm</filename><sum type="sha256">9e2b1e016bb8ae5d54797132ef99aa1b4661fc927db2b88f2ffe33b17b367c16</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0710" id="RHBA-2018:0710-1" title="Rhba-2018:0710-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0713-1</id><title>Xorg-X11-Xinit Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-xinit-session" release="2.el7" src="xorg-x11-xinit-1.3.4-2.el7.src.rpm" version="1.3.4"><filename>xorg-x11-xinit-session-1.3.4-2.el7.x86_64.rpm</filename><sum type="sha256">e21be9fb3a474a35d4acace1ad4e6280f16d484b8b5ab9144d68b7ffe7b12560</sum></package><package arch="x86_64" name="xorg-x11-xinit" release="2.el7" src="xorg-x11-xinit-1.3.4-2.el7.src.rpm" version="1.3.4"><filename>xorg-x11-xinit-1.3.4-2.el7.x86_64.rpm</filename><sum type="sha256">8a44987ae17f9459819e83d7eaabbbb7f4a0d92e13d713694aa9477a073be339</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0713" id="RHBA-2018:0713-1" title="Rhba-2018:0713-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0729-1</id><title>Python-Virtualenv Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-virtualenv" release="2.el7" src="python-virtualenv-15.1.0-2.el7.src.rpm" version="15.1.0"><filename>python-virtualenv-15.1.0-2.el7.noarch.rpm</filename><sum type="sha256">48ae8255677bcfceeb543bc2a25b361bb52b338e4dd054df58144ec4de56c769</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0729" id="RHBA-2018:0729-1" title="Rhba-2018:0729-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0736-1</id><title>X.Org Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="xorg-x11-server-source" release="5.el7" src="xorg-x11-server-1.19.5-5.el7.src.rpm" version="1.19.5"><filename>xorg-x11-server-source-1.19.5-5.el7.noarch.rpm</filename><sum type="sha256">bd15ffa91b76c84b051d0d34c72d926ff60b1b7e5bf7f0e90d38f8c285a42e43</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="5.el7" src="xorg-x11-server-1.19.5-5.el7.src.rpm" version="1.19.5"><filename>xorg-x11-server-Xorg-1.19.5-5.el7.x86_64.rpm</filename><sum type="sha256">e6d5dbdefe5d8b7ef05fbfcbe186c508e9150dd71bb76258e236b28b13f3bf1a</sum></package><package arch="x86_64" name="intel-gpu-tools" release="27.20160929.el7" src="xorg-x11-drv-intel-2.99.917-27.20160929.el7.src.rpm" version="2.99.917"><filename>intel-gpu-tools-2.99.917-27.20160929.el7.x86_64.rpm</filename><sum type="sha256">c6c5e708f24198562d206394b93890428c67e410496ec493142c758610aa2642</sum></package><package arch="i686" name="mesa-libgbm" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libgbm-17.2.3-8.20171019.el7.i686.rpm</filename><sum type="sha256">edb3a9cd8996f992245286b6d90939b0463d28c83e959023b09860fb6075d23b</sum></package><package arch="i686" name="mesa-libxatracker-devel" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libxatracker-devel-17.2.3-8.20171019.el7.i686.rpm</filename><sum type="sha256">5434156b4aac8f276a8e88c879380869d528c8576483d9c226e7dd41bed8cfe2</sum></package><package arch="x86_64" name="libdrm" release="2.el7" src="libdrm-2.4.83-2.el7.src.rpm" version="2.4.83"><filename>libdrm-2.4.83-2.el7.x86_64.rpm</filename><sum type="sha256">37cde9ea11b52120818e30d645ae63d9d3477e0504135f34ba1269c66399186e</sum></package><package arch="x86_64" name="mesa-libOSMesa" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libOSMesa-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">67d03273981f046d4451b7194854fa52986fe3ff669303ed18d3678ed99a58ff</sum></package><package arch="i686" name="xorg-x11-server-devel" release="5.el7" src="xorg-x11-server-1.19.5-5.el7.src.rpm" version="1.19.5"><filename>xorg-x11-server-devel-1.19.5-5.el7.i686.rpm</filename><sum type="sha256">8af856eb77165c44337d3e2c19ed2607d994dbd2057063187f705850c1ea7aaf</sum></package><package arch="i686" name="mesa-libgbm-devel" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libgbm-devel-17.2.3-8.20171019.el7.i686.rpm</filename><sum type="sha256">f59dc460817d8c7d46ac1c571f94ac7f8785eea7fe39f42ab4d7da2b7dcbc7ed</sum></package><package arch="x86_64" name="mesa-libwayland-egl-devel" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libwayland-egl-devel-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">1c2f30b7a62abca84ddd1183afb5be307a7cb84984a801938f43754cbeb587b2</sum></package><package arch="i686" name="xorg-x11-drv-intel-devel" release="27.20160929.el7" src="xorg-x11-drv-intel-2.99.917-27.20160929.el7.src.rpm" version="2.99.917"><filename>xorg-x11-drv-intel-devel-2.99.917-27.20160929.el7.i686.rpm</filename><sum type="sha256">10c7ff6873ae3b4c39df7685da2667ce5c80f22e2b04876847d6636130d4e901</sum></package><package arch="i686" name="xorg-x11-drv-intel" release="27.20160929.el7" src="xorg-x11-drv-intel-2.99.917-27.20160929.el7.src.rpm" version="2.99.917"><filename>xorg-x11-drv-intel-2.99.917-27.20160929.el7.i686.rpm</filename><sum type="sha256">21673d5be8d2e9c05a51480749590931e2cae9de8d1c47496726e336f68a6184</sum></package><package arch="x86_64" name="mesa-libGL" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libGL-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">42b3cfeed4d26a086f8b9af3f7f0f152adac30041ec21b60b77633037b7789b5</sum></package><package arch="x86_64" name="mesa-vdpau-drivers" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-vdpau-drivers-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">fb8f2f8b7c4c1df5ffc92c28f60e9b871cfb37bbd7a7e188d627b5624e848388</sum></package><package arch="i686" name="mesa-libOSMesa" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libOSMesa-17.2.3-8.20171019.el7.i686.rpm</filename><sum type="sha256">fc8ce68c30c83b808f8ee0c2558645557c3f73392ec8703e2d2b704b45d66058</sum></package><package arch="i686" name="mesa-libGL" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libGL-17.2.3-8.20171019.el7.i686.rpm</filename><sum type="sha256">b7ed9a009990102d0a006379e4eaf88b9930a726ccf829cf106122b2bdd7f815</sum></package><package arch="x86_64" name="xorg-x11-drv-wacom-devel" release="4.el7" src="xorg-x11-drv-wacom-0.34.2-4.el7.src.rpm" version="0.34.2"><filename>xorg-x11-drv-wacom-devel-0.34.2-4.el7.x86_64.rpm</filename><sum type="sha256">c6758fe7e8f46cb7fca97cffc80b19f59d2bdbefcbb8443beba680b436fb0071</sum></package><package arch="x86_64" name="mesa-libgbm" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libgbm-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">2bb73ddc7c7b6e9396714c8fe1576c8118edfe7fc5cd983dafe5367c9829cb34</sum></package><package arch="i686" name="mesa-libwayland-egl-devel" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libwayland-egl-devel-17.2.3-8.20171019.el7.i686.rpm</filename><sum type="sha256">173b7540350a6ee8f038f2cf7e5a76faa1c67f8d9a285ead6b39ab591c3362cd</sum></package><package arch="i686" name="mesa-dri-drivers" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-dri-drivers-17.2.3-8.20171019.el7.i686.rpm</filename><sum type="sha256">014185c53c1cfe74ba3207db08fe7323d4143e6b200e86facd28616498b987e5</sum></package><package arch="i686" name="mesa-libGLES" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libGLES-17.2.3-8.20171019.el7.i686.rpm</filename><sum type="sha256">49246a447656fc3e627524ae0dc0661b716f933ef34d8ad84da395a8e545b5a7</sum></package><package arch="i686" name="mesa-libxatracker" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libxatracker-17.2.3-8.20171019.el7.i686.rpm</filename><sum type="sha256">6f669a70cbdd3b3725b443cbd7d94caf635bf472689f87f8dcdad6b138f552db</sum></package><package arch="x86_64" name="mesa-libGL-devel" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libGL-devel-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">421d9cfef03ce45b13ff2afd3a2e3497f354f5caff6f517209a23e150acd3384</sum></package><package arch="x86_64" name="mesa-libglapi" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libglapi-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">f569f4837c06bac08186be8e26d32750c8db6e8c59f81b35f5f65cd4c68237a7</sum></package><package arch="x86_64" name="xorg-x11-drv-ati" release="1.el7" src="xorg-x11-drv-ati-7.10.0-1.el7.src.rpm" version="7.10.0"><filename>xorg-x11-drv-ati-7.10.0-1.el7.x86_64.rpm</filename><sum type="sha256">dfb2b551988b7082006771bcc101f2b9409150e15f0e29c0e1a035cd57a07afb</sum></package><package arch="i686" name="mesa-libEGL-devel" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libEGL-devel-17.2.3-8.20171019.el7.i686.rpm</filename><sum type="sha256">77b3eb0a79c0ae69164b352316a18798132c1510461ceb1cff375744240dc232</sum></package><package arch="x86_64" name="mesa-dri-drivers" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-dri-drivers-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">5f32a0ff2668b72760d5cca84009679d49b33a648ca35cb130921c4b415f7a31</sum></package><package arch="i686" name="mesa-libEGL" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libEGL-17.2.3-8.20171019.el7.i686.rpm</filename><sum type="sha256">20622400e104657956997eea5205c2e7ab4dfdc4534d3a3dad8e990271fdaf52</sum></package><package arch="x86_64" name="mesa-libwayland-egl" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libwayland-egl-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">5da049ec25004c78cc7894492f5e0b85d2af971127329ad56cf6463f377b2ca0</sum></package><package arch="i686" name="libdrm-devel" release="2.el7" src="libdrm-2.4.83-2.el7.src.rpm" version="2.4.83"><filename>libdrm-devel-2.4.83-2.el7.i686.rpm</filename><sum type="sha256">0ba69524998de0dbace16c51c75e1e63722b9f1a74838c273557635b1603836e</sum></package><package arch="x86_64" name="libdrm-devel" release="2.el7" src="libdrm-2.4.83-2.el7.src.rpm" version="2.4.83"><filename>libdrm-devel-2.4.83-2.el7.x86_64.rpm</filename><sum type="sha256">c9ba70f8789db7d1e9bbe2aaae082163987f3ad4c7de3bd93215dc5fb8e555c7</sum></package><package arch="x86_64" name="mesa-libGLES-devel" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libGLES-devel-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">c8e86d249e4d83175c8e5204bd8caca82be72eb33d30746e0cd9d3bd3cb4fcb2</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="5.el7" src="xorg-x11-server-1.19.5-5.el7.src.rpm" version="1.19.5"><filename>xorg-x11-server-Xdmx-1.19.5-5.el7.x86_64.rpm</filename><sum type="sha256">df53d90decbc22fb8df8320da3add79bbec7c3a989ed058275a1234bc9e062c1</sum></package><package arch="x86_64" name="xorg-x11-drv-intel" release="27.20160929.el7" src="xorg-x11-drv-intel-2.99.917-27.20160929.el7.src.rpm" version="2.99.917"><filename>xorg-x11-drv-intel-2.99.917-27.20160929.el7.x86_64.rpm</filename><sum type="sha256">ca7a2689e0fa2e767f1c25544fc026e006d9e4c5454e497949e4cc6ca22fd9fa</sum></package><package arch="i686" name="mesa-libGL-devel" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libGL-devel-17.2.3-8.20171019.el7.i686.rpm</filename><sum type="sha256">9b7ebbe52c4fd692f7da8c4924825dbb9a26f33d6dbc8979d40ce11e605d4a0e</sum></package><package arch="x86_64" name="mesa-libEGL" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libEGL-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">1c864e8b8c51f32dc63c4a3c9780a04b63c3d9b82227ee7f6b5eea3bf24512aa</sum></package><package arch="i686" name="mesa-libGLES-devel" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libGLES-devel-17.2.3-8.20171019.el7.i686.rpm</filename><sum type="sha256">316dd829e07f53bac2813c64b1290081c81022a2771a4379f8643a203f3e5d80</sum></package><package arch="x86_64" name="mesa-libOSMesa-devel" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libOSMesa-devel-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">7d34be14d2a4c2e9f47b91e9e5e523ffac5df8c0afa2559d4e2e71d429a426c2</sum></package><package arch="x86_64" name="mesa-vulkan-drivers" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-vulkan-drivers-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">a2f8f611b52040e20086fb8dee0b514dfba2de8ae67a1dfee4c7a4d0434285b9</sum></package><package arch="x86_64" name="mesa-libxatracker-devel" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libxatracker-devel-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">36ce04219fd5130179f8aed8deb9802a9ccedb6c72f36eae95e4a9c6876f66c7</sum></package><package arch="i686" name="libdrm" release="2.el7" src="libdrm-2.4.83-2.el7.src.rpm" version="2.4.83"><filename>libdrm-2.4.83-2.el7.i686.rpm</filename><sum type="sha256">d03350585a14706bf3161df5475a7fbf90487836dccf0555a36e8068c7223788</sum></package><package arch="i686" name="xorg-x11-drv-wacom-devel" release="4.el7" src="xorg-x11-drv-wacom-0.34.2-4.el7.src.rpm" version="0.34.2"><filename>xorg-x11-drv-wacom-devel-0.34.2-4.el7.i686.rpm</filename><sum type="sha256">8d7d3f2004690819cada2322708e7e3ced771cf666de161b64046fc263d45261</sum></package><package arch="x86_64" name="xorg-x11-drv-intel-devel" release="27.20160929.el7" src="xorg-x11-drv-intel-2.99.917-27.20160929.el7.src.rpm" version="2.99.917"><filename>xorg-x11-drv-intel-devel-2.99.917-27.20160929.el7.x86_64.rpm</filename><sum type="sha256">30ea14dc332665ed3f96ac36f31ede9504dd8ae52e0d74d3124743bcd533a6d6</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="5.el7" src="xorg-x11-server-1.19.5-5.el7.src.rpm" version="1.19.5"><filename>xorg-x11-server-Xnest-1.19.5-5.el7.x86_64.rpm</filename><sum type="sha256">9f7d42b8802f2047905d7a4b5e675ad303afb139120be59b27ea34b58d158ea8</sum></package><package arch="i686" name="mesa-libwayland-egl" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libwayland-egl-17.2.3-8.20171019.el7.i686.rpm</filename><sum type="sha256">b6d08712f78c1a56ef933d27ee84a900e1760b43bb37f877e97c94e400197b9f</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="5.el7" src="xorg-x11-server-1.19.5-5.el7.src.rpm" version="1.19.5"><filename>xorg-x11-server-Xvfb-1.19.5-5.el7.x86_64.rpm</filename><sum type="sha256">1cf02189f240dd02d77a20e98db55afe1950e99208f97ca59d6d46b3e9024bb7</sum></package><package arch="i686" name="mesa-libOSMesa-devel" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libOSMesa-devel-17.2.3-8.20171019.el7.i686.rpm</filename><sum type="sha256">1b089c7f0c0f9112ac991081a7f99348f33642e751ab895b660bfc172b153233</sum></package><package arch="i686" name="mesa-libglapi" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libglapi-17.2.3-8.20171019.el7.i686.rpm</filename><sum type="sha256">1ba092d4509833a23d173421a2303ffb1542a75f2e5dbf754d41e77af3542dfc</sum></package><package arch="x86_64" name="mesa-libgbm-devel" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libgbm-devel-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">1794e8ddc5181e35e633a328efce46147dfb497ad1e408f3819545b020a03b35</sum></package><package arch="x86_64" name="mesa-libEGL-devel" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libEGL-devel-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">911af2d65add4e71a6b909bddc13e750b8d3363c9d873d0653b3b988be5a65b2</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="5.el7" src="xorg-x11-server-1.19.5-5.el7.src.rpm" version="1.19.5"><filename>xorg-x11-server-common-1.19.5-5.el7.x86_64.rpm</filename><sum type="sha256">a3140292c734a405f95a417b9226b59ddcb8bc3b38dae213162917e906de92da</sum></package><package arch="x86_64" name="xorg-x11-drv-wacom" release="4.el7" src="xorg-x11-drv-wacom-0.34.2-4.el7.src.rpm" version="0.34.2"><filename>xorg-x11-drv-wacom-0.34.2-4.el7.x86_64.rpm</filename><sum type="sha256">057cb295d21c190c84e22c06a0e4c5839d474f47a002204e269a188d039952eb</sum></package><package arch="i686" name="mesa-filesystem" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-filesystem-17.2.3-8.20171019.el7.i686.rpm</filename><sum type="sha256">c93558eb75a825d81de4dff48a11841d868dc6e07c5928c6c03826a31686cc73</sum></package><package arch="x86_64" name="mesa-filesystem" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-filesystem-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">f7e85b04264118708ed628af78f992c26c1283cd4f61d225706ca2a4cdf6aa51</sum></package><package arch="x86_64" name="mesa-libxatracker" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libxatracker-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">0b3855940bec5796485091d6ee7faf0803235c860d9d08fab1f4b9ca84a8c432</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="5.el7" src="xorg-x11-server-1.19.5-5.el7.src.rpm" version="1.19.5"><filename>xorg-x11-server-devel-1.19.5-5.el7.x86_64.rpm</filename><sum type="sha256">715f0f914176762f4b235423f5d940116b47f2b76a44df83f36d3856202585d0</sum></package><package arch="x86_64" name="drm-utils" release="2.el7" src="libdrm-2.4.83-2.el7.src.rpm" version="2.4.83"><filename>drm-utils-2.4.83-2.el7.x86_64.rpm</filename><sum type="sha256">8663365f5cfd1df315635533f8ed43ce6bcc05a13de615cc732c3fc3fa802313</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="5.el7" src="xorg-x11-server-1.19.5-5.el7.src.rpm" version="1.19.5"><filename>xorg-x11-server-Xephyr-1.19.5-5.el7.x86_64.rpm</filename><sum type="sha256">757e7afdad896d68bfcad1fa88e098e682ded50d4e43060db4ffbe01399db877</sum></package><package arch="x86_64" name="mesa-libGLES" release="8.20171019.el7" src="mesa-17.2.3-8.20171019.el7.src.rpm" version="17.2.3"><filename>mesa-libGLES-17.2.3-8.20171019.el7.x86_64.rpm</filename><sum type="sha256">5e0d224e41a9cdb96505a714b8409cc8dab3f9ef74b6af9c11d4754cf62c0899</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="5.el7" src="xorg-x11-server-1.19.5-5.el7.src.rpm" version="1.19.5"><filename>xorg-x11-server-Xwayland-1.19.5-5.el7.x86_64.rpm</filename><sum type="sha256">ab6eaa5189b57ff3f74627283cc77d385f63b527c4a321e3818a1ee6f82ed897</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0736" id="RHBA-2018:0736-1" title="Rhba-2018:0736-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0751-1</id><title>Libreoffice Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="libreoffice-help-bn" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-bn-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">794e706b3393b35b3ebe1b5da96149d397b90327bbe929205173c4ba137db4ea</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-fr" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-fr-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">6f80ce69060eabcc1c1aa3df6393b2ae92fc73473fe046d564b16901967b83ec</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hans" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-zh-Hans-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">9f1142f292f607f13e4bdfb4bd344457d9d111b0571f9b9bff3066f6fafc1677</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-sv" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-sv-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">18493d56959e7c27433cdc3bf52cae0fe2125527b767ef98b4087388aca0040c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ta" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ta-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">650ae74dcd50f06f5add786b1b252995f2fd7f1b90d33caf6d339fc508b6a14f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-he" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-he-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">158299d509391fbbe46314ae3eed2fda683073ac4ff366d4523336c2d2e708e3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-dz" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-dz-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">211495226f0ec9f5de6d394e5b49931f4739960c86de05399250477a2461da23</sum></package><package arch="i686" name="libvisio-devel" release="1.el7" src="libvisio-0.1.6-1.el7.src.rpm" version="0.1.6"><filename>libvisio-devel-0.1.6-1.el7.i686.rpm</filename><sum type="sha256">7accdb937eb93568a16a9792a809485aa0e25777f1d76bfe95bb25bb7df1430f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ve" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ve-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">f8934ff96dc8f959d6bdc28c81f7388e046b2630dfb4d2bf3a17d3174e0812a2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ru" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ru-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">2ee9e04d9b4016e6372451e87b2d4f2855c1d5c1d786d101b88b1761ee25ba88</sum></package><package arch="x86_64" name="libcdr-devel" release="1.el7" src="libcdr-0.1.4-1.el7.src.rpm" version="0.1.4"><filename>libcdr-devel-0.1.4-1.el7.x86_64.rpm</filename><sum type="sha256">d525661012b614548c8bf8964a97d82d0287d45fa39397addce11ccb60a5e36d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hi" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-hi-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">9762c47bc6b3ba37514c61fdbf2934ec4f4414b61d1d0b82b89b28767a8eba95</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-st" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-st-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">301992590eae39f3f8310fb6ea89c77c20113f9504ce190e24f8e6be27cf510d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-hi" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-hi-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">e912b08c6e90d8f1f56621cdbeed2b4b4a781eb5c7961b1b4b7f1fefc07dd4bb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-da" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-da-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">2b90c94cc4c131f0e510e5a84e7d6b84c4c62a168be40cd4a490dce43b9cb3ef</sum></package><package arch="x86_64" epoch="1" name="libreoffice-x11" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-x11-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">d1eb5f5aab3f8aafc848f31250d66311df0d52bef45e2ff530d4946c6a23854f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bn" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-bn-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">1877cf9c2c91eba83c1ffab2e65a5bf400df7726d5eabff5d6aee63bbc064dc1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cs" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-cs-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">e9e9c35e8f55a64347b2fb343ff4d5a91d4d8200db49f48179f49a3c6e4e3783</sum></package><package arch="i686" name="libwps-devel" release="1.el7" src="libwps-0.4.7-1.el7.src.rpm" version="0.4.7"><filename>libwps-devel-0.4.7-1.el7.i686.rpm</filename><sum type="sha256">22104b4b1e48f168281b0db0e9724278ae9ff94ddaa14f256cf567ae1b1304c6</sum></package><package arch="x86_64" name="libetonyek-tools" release="1.el7" src="libetonyek-0.1.7-1.el7.src.rpm" version="0.1.7"><filename>libetonyek-tools-0.1.7-1.el7.x86_64.rpm</filename><sum type="sha256">159f5188f735e400ae67ef90e456143014f69ecbc9b11853875d6195b6aa66f5</sum></package><package arch="x86_64" name="liblangtag-gobject" release="1.1.el7" src="liblangtag-0.6.2-1.1.el7.src.rpm" version="0.6.2"><filename>liblangtag-gobject-0.6.2-1.1.el7.x86_64.rpm</filename><sum type="sha256">0471ae81dd41bc75615a556f642ba1a81bb9c2f80d96453bb17f6116b03ed928</sum></package><package arch="noarch" epoch="1" name="autocorr-vi" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-vi-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">adb55a37652437bb1a38b0c38523ecd1f2d4ae2998209d589dee326c7fa6a1a7</sum></package><package arch="x86_64" name="libwps-tools" release="1.el7" src="libwps-0.4.7-1.el7.src.rpm" version="0.4.7"><filename>libwps-tools-0.4.7-1.el7.x86_64.rpm</filename><sum type="sha256">6272a1dc3bd1095a003c19266cc32f7ccaf0bf1a35824d8e43427466fc7d75f1</sum></package><package arch="x86_64" name="libstaroffice" release="1.el7" src="libstaroffice-0.0.4-1.el7.src.rpm" version="0.0.4"><filename>libstaroffice-0.0.4-1.el7.x86_64.rpm</filename><sum type="sha256">1d2cd1be79f37f559e444c5fb4ce3596bb26f9d23352bb2f69cf8060a6965d34</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-PT" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pt-PT-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">f991d8d3586307bf1720e9b190bb650335ae6565d85afdb632330a966d325f5e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-hu" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-hu-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">2fe15953ef08b74b6b3dd700f46da55efdb457f7e9cb588ff56917d4c9b28c12</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ga" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ga-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">00ecc2f3d5c14f846b1621e4782610b48cc4b91a789c4abe290271bc2d6d9150</sum></package><package arch="noarch" epoch="1" name="autocorr-tr" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-tr-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">ec2e04140e78e94816cacc5986e750b82610f847d22f8f6403e7769bf95d901d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-bsh" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-bsh-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">280c2e74cbca4c4d1b57bbdaca8db0e1836bd1cc439abf4e2393075e249356d4</sum></package><package arch="noarch" epoch="1" name="autocorr-it" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-it-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">9d97177b2f526312e5620fa456ca5231ec6e7cc8376186a975181acdb80c32f7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-eu" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-eu-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">76922668769f6dee4327c72f35472201f8534a725ab7187a93e136d4aa576e04</sum></package><package arch="x86_64" name="libetonyek-devel" release="1.el7" src="libetonyek-0.1.7-1.el7.src.rpm" version="0.1.7"><filename>libetonyek-devel-0.1.7-1.el7.x86_64.rpm</filename><sum type="sha256">ca60353ffac3adc42c730976ee1ad35ddf2f0956e7dd16a322f8681a7eba0ab7</sum></package><package arch="i686" name="libvisio" release="1.el7" src="libvisio-0.1.6-1.el7.src.rpm" version="0.1.6"><filename>libvisio-0.1.6-1.el7.i686.rpm</filename><sum type="sha256">f574ac37f8a884cd5d7d97f8934e2164da17d1e844859aa19afb6b194e460a7b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sv" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sv-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">6b3651225f26fce2d9b29c6ca81c83f6175c72e18b27facd58603d03c4e45ee0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-el" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-el-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">d7d360136b281e071c1758fcc01d5756f34495eaf0f2ddb905ccfee266c6d36f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tr" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-tr-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">0947c1877b3eab831c18a629973ef85961a58a1f7d33d3496b520df3bb971043</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-te" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-te-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">32363921126716b3a5a0ea711407286a2a21012c26c3ba6affe3ec922509bf4a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-es" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-es-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">dd8dce8484e5c9d8c0ca626f0a2bce67aaf103de7f34f3dd68cd96586011dbee</sum></package><package arch="x86_64" name="libvisio-tools" release="1.el7" src="libvisio-0.1.6-1.el7.src.rpm" version="0.1.6"><filename>libvisio-tools-0.1.6-1.el7.x86_64.rpm</filename><sum type="sha256">14061c3f5e17851ddf1a8512f29a2e6728b0a5e9abd90669cdc2289952457f52</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bg" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-bg-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">39f4e50cdddc834f43e4ac960ff23f97f5f745767ba392d59c3a2bc3ccb911d7</sum></package><package arch="noarch" epoch="1" name="libreoffice-opensymbol-fonts" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-opensymbol-fonts-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">e3c809da85022a5eea853db0f2d7e3b2a4422dcf0055ed68bb9a4c240c281df6</sum></package><package arch="noarch" epoch="1" name="libreoffice-data" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-data-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">a638b9d1145e59e008d39c27a9cdcc0b3fa420c16443b3f8b14a93d47015dace</sum></package><package arch="noarch" epoch="1" name="autocorr-de" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-de-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">81326c670ae58535f0429ec410ce0c3d8de78af267296bb3c705727aed02377f</sum></package><package arch="i686" name="libcdr-devel" release="1.el7" src="libcdr-0.1.4-1.el7.src.rpm" version="0.1.4"><filename>libcdr-devel-0.1.4-1.el7.i686.rpm</filename><sum type="sha256">7c6d4e19919949cd7eeda49a6aabd8f5651c3033689d719fe0bf357f033859e5</sum></package><package arch="noarch" name="libcdr-doc" release="1.el7" src="libcdr-0.1.4-1.el7.src.rpm" version="0.1.4"><filename>libcdr-doc-0.1.4-1.el7.noarch.rpm</filename><sum type="sha256">029dec54d456cc1f98f4ebedcf4e9d26cc5675b4179a615800abf052e28c9e9e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-or" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-or-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">0f0e4d848591e6316910f429811ba23d34875b71256b4c807934c6d221d21606</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-sdk-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">6af1602fa234011411571deb5782d166e4354adb65796eba40aa4fdb928da982</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-si" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-si-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">398e2eaed316ea88897121da70d0a1838bab404fe2fa89647488c23eeb87763b</sum></package><package arch="i686" name="liblangtag-devel" release="1.1.el7" src="liblangtag-0.6.2-1.1.el7.src.rpm" version="0.6.2"><filename>liblangtag-devel-0.6.2-1.1.el7.i686.rpm</filename><sum type="sha256">1776f7627fbdce61233bbc7fd801ba6fa59c7535cf10c5aaa86c35ef62b7dfa6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mr" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-mr-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">d408946a4df2aca5d8f826855a5809fcbe62c817d85fd68a87a579cfa6497661</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-et" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-et-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">dc224cca9104d5606b7f4ddbd595d97ad8c2fd7357ca6415d155105bb223dd2c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ja" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ja-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">9fa8121c4fe6e7450fbfa8aa4e85005a0d6d2d0465918c63eccca16f23a71e33</sum></package><package arch="x86_64" name="libzmf" release="1.el7" src="libzmf-0.0.2-1.el7.src.rpm" version="0.0.2"><filename>libzmf-0.0.2-1.el7.x86_64.rpm</filename><sum type="sha256">9b72ce6d8cf7291e3b24a39202a04111e73b0bbf13e7c543140cacfdec4a0f46</sum></package><package arch="x86_64" epoch="1" name="libreoffice-math" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-math-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">2f4438283eb8378174fc923fd1ceba1a54a2ec181719de2a6e286d5c90a1d106</sum></package><package arch="x86_64" epoch="1" name="libreoffice-writer" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-writer-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">ae1d9a47d693d1ccf5a1beba0e8a548b895130d6eacea1cc310a4bb4da703296</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kn" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-kn-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">cb3a60dc3f44e111402942db4a24acbe11327bec342b54fa0753578697b48362</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ro" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ro-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">38089d0ae0194e57308b5bded17f32e8757a3c908c0cf8f27a7b324b592911d5</sum></package><package arch="noarch" epoch="1" name="autocorr-hr" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-hr-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">57999d822e23a47f31447e49467c9e35f209b9eb113d7058b43dbffaeff408bd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sr" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sr-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">01c4ec380bd632947a080e1646e05775feb137999cc05d527feca6f002b71228</sum></package><package arch="x86_64" name="liborcus-devel" release="2.el7" src="liborcus-0.12.1-2.el7.src.rpm" version="0.12.1"><filename>liborcus-devel-0.12.1-2.el7.x86_64.rpm</filename><sum type="sha256">5d1a233790e7855253f6a5a01cf2dad165ebae5a14391f5bfe2a13ca8454b305</sum></package><package arch="noarch" name="libzmf-doc" release="1.el7" src="libzmf-0.0.2-1.el7.src.rpm" version="0.0.2"><filename>libzmf-doc-0.0.2-1.el7.noarch.rpm</filename><sum type="sha256">30571fd15fe8123d4497bc3961026df5320f29fbf6b48fee135e648b69956bf8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-es" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-es-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">e50e9ec03ae86eeeeaab3b2049ce737d211dab7445ab0f608e9233de77d26ff0</sum></package><package arch="x86_64" name="liborcus" release="2.el7" src="liborcus-0.12.1-2.el7.src.rpm" version="0.12.1"><filename>liborcus-0.12.1-2.el7.x86_64.rpm</filename><sum type="sha256">5a5aa01027e187238e347af1fbd0b148728100f52c75cbc46e06fc2127f9f084</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nl" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nl-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">0356410eac8a2ed08069180e1c49887231c50be97839933852cbd731f358022a</sum></package><package arch="i686" name="liblangtag-gobject" release="1.1.el7" src="liblangtag-0.6.2-1.1.el7.src.rpm" version="0.6.2"><filename>liblangtag-gobject-0.6.2-1.1.el7.i686.rpm</filename><sum type="sha256">4230c332d6e7bb4c3146f0966790f1221d0cf3ab7ade033b63079bfbf4773990</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gtk3" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-gtk3-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">03403e3cda70f144988641db7248d3adafd5142b7fc45ddf06d5129293d2f16c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-hr" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-hr-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">1c05a431167204d4e35b7e8389436733560778e17d38c3987957747501104fec</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fi" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-fi-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">264284fb79897a0d08fc0da48567e9e9e5051156cfba2594fcd61fe25ef827a6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-br" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-br-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">68f12d54ed1c087957999f232a74cae6da1f7c9087169ef087b68564bc9a6ae1</sum></package><package arch="x86_64" name="libwps-devel" release="1.el7" src="libwps-0.4.7-1.el7.src.rpm" version="0.4.7"><filename>libwps-devel-0.4.7-1.el7.x86_64.rpm</filename><sum type="sha256">917e4e4d1c4ad0b33f87ad26f6e334578fcd48cb5ed2227311f76f121a6d1e03</sum></package><package arch="noarch" epoch="1" name="autocorr-ga" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ga-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">b4d6f3f26293af6e691c70be0b34c4188fedc4143de93ed0649874af5be72d23</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nr" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nr-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">d971fffd8e68a361858760fc3bad8ef0f2bb9ec743f3ac2f33f556cef5e7b59a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-de" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-de-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">05482cb416e1b0a5e11508127e2ee30efec0e4f3d91691bc274c34eb4f52f058</sum></package><package arch="i686" name="libetonyek" release="1.el7" src="libetonyek-0.1.7-1.el7.src.rpm" version="0.1.7"><filename>libetonyek-0.1.7-1.el7.i686.rpm</filename><sum type="sha256">f81f2c53e37106ff6135dfff8e457d878de1542669aaaf2a902f59b4e5040906</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zu" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-zu-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">bf9a953cda9fe0f7163aeade7fbfafcf6b2338a507e3fe5efc6cabec28a47fb8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-pt-BR" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-pt-BR-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">159f4abe6e3d201e1291bc495b2035fdde8084ca19d83091cced288612adc697</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-et" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-et-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">cfa9bf291691aa5ac1a6eb9a6b736366bf057ca2639bc3cc8ddc279032858a57</sum></package><package arch="noarch" name="libstaroffice-doc" release="1.el7" src="libstaroffice-0.0.4-1.el7.src.rpm" version="0.0.4"><filename>libstaroffice-doc-0.0.4-1.el7.noarch.rpm</filename><sum type="sha256">afb67b20f0f1394b90cf36a2ed89fbeb3e5ce243e255b3d860413c6d61f57c66</sum></package><package arch="noarch" epoch="1" name="autocorr-nl" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-nl-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">9bbfb5db7d5c89a8222b6e96580a337d60c82ffa0a78662ef92e8e80f24b2860</sum></package><package arch="noarch" epoch="1" name="autocorr-lb" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-lb-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">12aec6e915d0801d342d58a6c0044f2861013c30fcce29ec1a663c8e413bdf45</sum></package><package arch="x86_64" epoch="1" name="libreoffice-graphicfilter" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-graphicfilter-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">f4a0d85fcf5c769ad2926cc6a0bf36675e0d096c2707369dd7d975705a0c7101</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-en" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-en-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">386bb671750d0ad617bd6d6c7757786cdf388a7b08ef0da8c5a6c594296ab860</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-lt" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-lt-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">eb1dff70ed3a0c8a77d6a91bfb46e1fb0f2cb3a47e39359f19cfed2db6fd2d95</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-sk" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-sk-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">31d495b196e2cdf3f38fbc365449dfd2275a86d57cb37a5c61c8dcf6213cdc23</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-bg" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-bg-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">6dc2f004420d8c9507f2a4192f516d29877199669376198d22b8cb0f17083133</sum></package><package arch="noarch" epoch="1" name="libreoffice-officebean-common" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-officebean-common-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">001c3dfd5f60decd40e82df23df05ab94035b20b98dcd39ad16eefbab01dc9e0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ss" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ss-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">2acd9f667ea7e9bc41d211e1ab2d965afefe076303277625205f7e3c9094b0f9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-id" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-id-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">ec8ac0b45ffd36ae0bde596153966b1edec5fef1aace875077a382d098749896</sum></package><package arch="x86_64" epoch="1" name="libreoffice-glade" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-glade-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">2b02080cafb05a736abe87388eff80a344431507151648b037715d6e5611c84a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-nb" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-nb-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">0af2d3f2d452e9aaa3a96ce73a89e62e77597bf3e870400f4d95682125e04be0</sum></package><package arch="x86_64" name="libstaroffice-tools" release="1.el7" src="libstaroffice-0.0.4-1.el7.src.rpm" version="0.0.4"><filename>libstaroffice-tools-0.0.4-1.el7.x86_64.rpm</filename><sum type="sha256">6e1f2317eb3fe03a8d06994ed68096b07f60d893d4aa5fbc56031651b18137fc</sum></package><package arch="x86_64" name="libetonyek" release="1.el7" src="libetonyek-0.1.7-1.el7.src.rpm" version="0.1.7"><filename>libetonyek-0.1.7-1.el7.x86_64.rpm</filename><sum type="sha256">d7ea0845220e18318e8ab55cbc930440c74a5174ea3c98f2a7a08223eaa1e9d1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-uk" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-uk-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">bca67e5719f64a5293009e0e78f6bb6100ae9618ab0b8213146266902fb2e85e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-af" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-af-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">c6dfe48917c2adc70757fdcab0daf67f7ecf669102cff3cfe96f2ef23861c1e9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hu" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-hu-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">5f2ef5ae9af923af3352012bb6facf0b54d9736ec6669d0fd134c5400dfc53f5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ure" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-ure-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">d6a1fb94e5e7c8baf71a711f95f7f182ba20dc8517c42e6e92c2438c79adbfd3</sum></package><package arch="noarch" name="liblangtag-doc" release="1.1.el7" src="liblangtag-0.6.2-1.1.el7.src.rpm" version="0.6.2"><filename>liblangtag-doc-0.6.2-1.1.el7.noarch.rpm</filename><sum type="sha256">3ce76f8838933c247fa0dadd1801810fadb888ae12210e58999877d3fd07c20e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gl" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-gl-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">e0a045aece7752126df92bbabb31fe882e9a9a648c5eecc839a0c2756c7a3203</sum></package><package arch="noarch" epoch="1" name="autocorr-sl" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-sl-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">e3d2d778bed9396d2feb907dd02804e0c149dde166e53db591ae09b231677f20</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-el" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-el-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">3e65326d9a81bc6d34832a4d6e9a32383f57b732529d750d8ee3156a1470a0ce</sum></package><package arch="noarch" epoch="1" name="autocorr-cs" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-cs-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">84b3595b688bb816d7557fe68d6e1bd6edde2294289615ae8735c947749fe7d0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-gl" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-gl-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">e7b6edfd257df980e8e496b1af496a2c7d95db2d78f33e11b5a740cd657100a3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-pt-PT" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-pt-PT-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">cb5cd525a7a36d1010b73595afc9797a7db489839f5cb068e775ed79f878901b</sum></package><package arch="noarch" epoch="1" name="autocorr-da" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-da-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">fdf0bd4306972b4139b50faf9d62cf779c4781a7357b0eee1c8d941ab06d5fbc</sum></package><package arch="x86_64" epoch="1" name="libreoffice" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">b579c8c32d1b49c589de72846b0216aa0e46e23d785c18d34a51b36d86ca5839</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ko" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ko-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">17983a732b8e1af00a7eb7bd0c9b8638888e8db7015e894e3f4bf01764075de9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-de" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-de-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">811b2a224f4103fd1d2bb92079ae1a48adf988c9ff6bac53a397deb3690d1651</sum></package><package arch="noarch" epoch="1" name="autocorr-ca" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ca-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">0a0ca10b3262fcca180130546f0d262916874234e85321c9aa86ae79f8127f84</sum></package><package arch="x86_64" epoch="1" name="libreoffice-wiki-publisher" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-wiki-publisher-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">92698ec6b1fdf34bf543b1483b217e2a585a32e0706ddbdcddbeaaa621b367e8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ar" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ar-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">89d95eb8ef3ee7667b35b0bb06fe3e30665fb6a16f0b725b3b97edd07ec4b437</sum></package><package arch="noarch" epoch="1" name="autocorr-pl" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-pl-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">96700d981845fcdb9b932b22f0c2c02b810e8c202664d89559c24d21760887e4</sum></package><package arch="noarch" epoch="1" name="libreoffice-ure-common" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-ure-common-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">25837fc0e27c5b5eaba547fc57829431ee6d36b7688ced46c56ebd9c5a8a947d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pdfimport" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-pdfimport-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">794d4a5017218a61aa2e4142b07d30dcc99c272d1dcf59c3f0edd4367219d73b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-base" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-base-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">69c10a03a7a68e8b2dbd97ef2fbaf5221e9f1aae2bf85a1b7f9d3668b93b7292</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-it" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-it-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">fd33504c26a680d768a0e06a4a80bd2d3064dfe80b645ff4b2244decc75fc416</sum></package><package arch="x86_64" epoch="1" name="libreoffice-postgresql" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-postgresql-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">847e400820763067402d30f4b1e7373f96796653c130001dc9ba9f08a75b0396</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lv" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-lv-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">68310da77ae3cc9298953f9ed2f60b6d42407af1e6cbb65401e49c882fc578a7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gu" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-gu-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">e7edff89afbf92f22f5253bdaf048a740f7f2cd3288a7d09535213acd2dd0273</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ta" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ta-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">01f25c25c3a05a19905d376c67719eb8fdaecb8a5315703279bea15f985e2773</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gtk2" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-gtk2-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">f4b3918c1ec55055016ac6fc651dcd173f4f9aac973c1f69b0e0d019f96db8dd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ja" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ja-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">a785ac4c88c7f38babb2761ab60c4b1c9ddc6411a63ff0d16124d355beb4113a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kk" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-kk-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">d7e776530b76ea4d065d5a9c45827444ac266e65502cea75f378739d77853397</sum></package><package arch="noarch" name="mdds-devel" release="1.el7" src="mdds-1.2.3-1.el7.src.rpm" version="1.2.3"><filename>mdds-devel-1.2.3-1.el7.noarch.rpm</filename><sum type="sha256">be55f7a43f61d1e68c1a0806ee3b892317682299bd2a9b8a37ff9a8e142f5bae</sum></package><package arch="noarch" name="liborcus-doc" release="2.el7" src="liborcus-0.12.1-2.el7.src.rpm" version="0.12.1"><filename>liborcus-doc-0.12.1-2.el7.noarch.rpm</filename><sum type="sha256">f3bf18a72acee9a376b29f9a25e3cf9ffe1649dbf98c1fea0d5d48c39064f160</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-fi" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-fi-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">7dca51d2e8f765f1b357e6df34d1f48d146d6a2377b8ba112ce7b7592b729606</sum></package><package arch="noarch" epoch="1" name="autocorr-fr" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-fr-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">30ea58e139e132febac7f7e61e9b29a175d584edc6dda4104bba4f0be1e4fd95</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cy" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-cy-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">cd1c48550d5b84951c7a00a0cc50bdf8101fbc44433189c0a08f9fe47836b43c</sum></package><package arch="x86_64" name="libcdr-tools" release="1.el7" src="libcdr-0.1.4-1.el7.src.rpm" version="0.1.4"><filename>libcdr-tools-0.1.4-1.el7.x86_64.rpm</filename><sum type="sha256">8b9e51ca2eedf9bb98947989ab4c35aae7a95f6b3f013252fae901d2571f7ce6</sum></package><package arch="x86_64" name="liblangtag" release="1.1.el7" src="liblangtag-0.6.2-1.1.el7.src.rpm" version="0.6.2"><filename>liblangtag-0.6.2-1.1.el7.x86_64.rpm</filename><sum type="sha256">59fcff40a02f0d8265751e7bc2dbdeb9daaffb29c2a9521c47e46bbe8355b973</sum></package><package arch="x86_64" name="liborcus-tools" release="2.el7" src="liborcus-0.12.1-2.el7.src.rpm" version="0.12.1"><filename>liborcus-tools-0.12.1-2.el7.x86_64.rpm</filename><sum type="sha256">a9de0b131588e68ed0a7e61b8111f709beb00621001835e3c73dccd118e067db</sum></package><package arch="x86_64" name="libzmf-tools" release="1.el7" src="libzmf-0.0.2-1.el7.src.rpm" version="0.0.2"><filename>libzmf-tools-0.0.2-1.el7.x86_64.rpm</filename><sum type="sha256">aa7f269509d002927b93761b854e820160bd83dcfac0f548af4b10d314556c22</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ca" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ca-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">5e6f2a56bd8521b2ca6c994db31e1f6acf4fde68fef9690b15ddbbca18f3d6fa</sum></package><package arch="noarch" epoch="1" name="autocorr-sk" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-sk-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">3ba2acfd55574f639cfda7de555426e9e6d950e9295fba096f0d7278d9876bc4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-si" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-si-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">c1730c59fb17aecbad121e6ddd106318254983caca4b49dc44a42fee0ccd9505</sum></package><package arch="x86_64" name="libwps" release="1.el7" src="libwps-0.4.7-1.el7.src.rpm" version="0.4.7"><filename>libwps-0.4.7-1.el7.x86_64.rpm</filename><sum type="sha256">76cbb5a98612ba3dc7d56183f2d0b2be9d3dd0ccc203f45446b98088c12be352</sum></package><package arch="noarch" epoch="1" name="autocorr-es" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-es-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">d14bdf2a3b3f29a5c5747948ca0382ff22ee9ab35f28932a0428e82b06ed771d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hr" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-hr-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">c3a4318c8d172fb2ec5527eab1b4064e4c91015ec27fee78db24032f0a1916e4</sum></package><package arch="noarch" epoch="1" name="autocorr-lt" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-lt-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">1cd0c52351142d1d1717666fee158f715bb93a7d881fdbac7c57e606c10d4317</sum></package><package arch="i686" name="liblangtag" release="1.1.el7" src="liblangtag-0.6.2-1.1.el7.src.rpm" version="0.6.2"><filename>liblangtag-0.6.2-1.1.el7.i686.rpm</filename><sum type="sha256">491240d879960bfafb134f2f43f1754ac3d3025e973040b90356fa6a847a4c37</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-tr" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-tr-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">7f8c1c25b807540bd795950716b18535896f25d6b7e0566b1877984bce2c6d01</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-he" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-he-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">0238c29b4c8a1aff416446435d60416a7ec5b4eeaf6c17abd6cc07e69a72676d</sum></package><package arch="x86_64" name="liblangtag-devel" release="1.1.el7" src="liblangtag-0.6.2-1.1.el7.src.rpm" version="0.6.2"><filename>liblangtag-devel-0.6.2-1.1.el7.x86_64.rpm</filename><sum type="sha256">cc5a72134108b6f3bcf9056028e94c635823bef5619603f8fa6b150bef1f5712</sum></package><package arch="x86_64" epoch="1" name="libreoffice-officebean" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-officebean-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">6b376255026be140e8b75f36b7ff2c8774eacefe2252b0298e6f3a63ab207c4d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-cs" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-cs-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">028b9887809e72ac26817f034070a9110503e713e60cf637bf7d30675aec1fc7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sl" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sl-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">eff3da31df3f8b1bc1e5966dd7c5fbe08e72efa93e423e722b609451533dfcc4</sum></package><package arch="x86_64" name="libvisio" release="1.el7" src="libvisio-0.1.6-1.el7.src.rpm" version="0.1.6"><filename>libvisio-0.1.6-1.el7.x86_64.rpm</filename><sum type="sha256">efb4b48d32df3f20e0e3124f5243fc03f878820c9a50e3e0e45337bfe3d0c636</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ts" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ts-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">71d3fc0d0142305761a947ccf7ae823672522d46a0efa79aec01956822f2cabd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ogltrans" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-ogltrans-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">f6119c09abc2ed20edd54b0b999d1a3380c96d34ada9d3d11cd3d4f1c4d52de8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-nlpsolver" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-nlpsolver-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">2b378a6dcd87df2b6c4df34fa75049201d9e71e1e4d52bf1499b1e3098ccd5d8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nso" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nso-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">04b7ee42f4a99b7d2d8a274c7c8a39d468f804f8dcdbe75ba65f830333b3fdc8</sum></package><package arch="i686" name="libwps" release="1.el7" src="libwps-0.4.7-1.el7.src.rpm" version="0.4.7"><filename>libwps-0.4.7-1.el7.i686.rpm</filename><sum type="sha256">e9c9d02c6abbbbcb3559d8b0e457fb17d06a4c62c3aa6aead9f85ca6d3b7e5b0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pl" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pl-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">84845f2cea33db80a883fa836232b3651ca2b39045870b5ef4161c8fa7738e4c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-id" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-id-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">7e99418202a1a25d82c945167ba303ccde41b6ab9726eff938e18b226f560135</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tn" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-tn-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">2ac2bdb9cc0aa04b76e45629b25f593610458253eea8b7f14f69633f7b039ea3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-impress" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-impress-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">ec8fef361b791ab1d55ab7fa04bb2a5732ad1667285cbb0b931fefc27dc51d92</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nn" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nn-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">4b33d0a13af453449b724b7aa6c752fbe6777a04544601ae8793c367bcb70704</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-nn" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-nn-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">55baa8c2104b0ce893508e23f7ad0e2b262093f42ab49d6712590b5e80a7cc66</sum></package><package arch="noarch" epoch="1" name="autocorr-ru" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ru-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">a8b042e4f3d8f20605816f8176e68ef5a835d3a916d53ff634c64f36e6e51676</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pyuno" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-pyuno-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">692277c53eabb31af678f8c6585feae8dd538455c8468a038b605c087a7eea6f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-eu" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-eu-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">37950e36e4ef1c9413334863f6bddccc8a21c43f085f69874e68546ac4406bfa</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk-doc" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-sdk-doc-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">8794c5a5ad0dc72520224a59ca0ab7216218bbf66d722d4f6d186d221c69a3ad</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-BR" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pt-BR-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">8e2caebcaf435e1443feb82b76b6711cd9678fbd265b0f7a700aba3a4dac9c8e</sum></package><package arch="noarch" epoch="1" name="autocorr-is" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-is-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">337e27ca8f7a9abee285f3b5a397efd75a668a4a63a7413543660c1f818f7678</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-uk" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-uk-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">57ab99d6b914388e7d5a72b22f349b3b45ad72601909f71c821413c4bdd0fc11</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mai" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-mai-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">814295b88d17969dd546eeef573a886152a75577248726ec0e5cdc60f46b1d2c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-zh-Hans" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-zh-Hans-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">898597b1876a0b08e4caa5b3bfa9fd81a94b20e5b8544b99a4b1e5a2e0ad22fb</sum></package><package arch="noarch" name="libetonyek-doc" release="1.el7" src="libetonyek-0.1.7-1.el7.src.rpm" version="0.1.7"><filename>libetonyek-doc-0.1.7-1.el7.noarch.rpm</filename><sum type="sha256">fe13ea66fdf80938ebf2b1dbd515a18cdc75203855a96ca37e385b65198b3547</sum></package><package arch="x86_64" epoch="1" name="libreofficekit-devel" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreofficekit-devel-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">186a7ead3132478959da07739a679e44bb3824095500f261fff838a4178c8703</sum></package><package arch="i686" name="liborcus-devel" release="2.el7" src="liborcus-0.12.1-2.el7.src.rpm" version="0.12.1"><filename>liborcus-devel-0.12.1-2.el7.i686.rpm</filename><sum type="sha256">26383435b33dd8767af78933cb39446ee4d4e12fcaeef9f4d5b4a219b89fda8e</sum></package><package arch="noarch" epoch="1" name="autocorr-pt" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-pt-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">08854f2188be7bbf644cbc1702a7c260ec3470e281321c1db1da3fde3de45811</sum></package><package arch="noarch" epoch="1" name="autocorr-fi" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-fi-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">570668e0b30469032583d23508492574cc7419df28adfb0f280e06f8e5e974b0</sum></package><package arch="i686" name="libetonyek-devel" release="1.el7" src="libetonyek-0.1.7-1.el7.src.rpm" version="0.1.7"><filename>libetonyek-devel-0.1.7-1.el7.i686.rpm</filename><sum type="sha256">00ff7c76a82019bab395658fdbf4acb65700b1561c21cd8621c037892fe63e4f</sum></package><package arch="noarch" epoch="1" name="autocorr-bg" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-bg-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">a77f57bc4c3f5e8c9dfa1e30660b71c2c37f8385ac6673f1044f9c99fe73b53e</sum></package><package arch="noarch" epoch="1" name="autocorr-ja" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ja-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">52e516bd38c43df4d0268f417f3d853b64309340abef2388534f9351ce0b5b2b</sum></package><package arch="noarch" epoch="1" name="autocorr-mn" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-mn-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">57a801e615df10d45897beff5a7f840e3fa6bec5605e56432cab194de2188b20</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fr" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-fr-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">1d75f9614bb787c026cac0d2100e03bffd20198291e1200dbd92f8d7ec789b9e</sum></package><package arch="noarch" name="libvisio-doc" release="1.el7" src="libvisio-0.1.6-1.el7.src.rpm" version="0.1.6"><filename>libvisio-doc-0.1.6-1.el7.noarch.rpm</filename><sum type="sha256">afef9cdfb17e696af4daf204f714c3bdc0c31e5424948db9bd297fa7bba866c0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-xsltfilter" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-xsltfilter-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">828203c5c9864da6b749765f8884ae1baebbb5d6dfb3dbf5b165210368485af8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ml" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ml-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">dd7eb6a2aa41a233d257d65d50b8b4dc92a88a8849a745335ffbee87ba1b3aa2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ro" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ro-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">77f1e2978adf0692ffa48f2d25230e22e8321de2c77ce8a657962e555a905536</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-gu" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-gu-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">4d748238775f20aa8531886b64d83124e1ab611e869755823e8bfd422b8ff55f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-da" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-da-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">e235b8ee3862e9fa118c570c5595dab6758d1555c4f73023a5f4c3e7f42288f3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nb" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nb-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">db7bb47d3467651f91c967b61286176aab6c1e2319ec2dd4fd41fe06bd660b8c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sk" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sk-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">7bffc5b495fe23ab1d6c9c4e28f8da9407edb7231f87d9bc29dd49111557b24c</sum></package><package arch="noarch" epoch="1" name="autocorr-en" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-en-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">5da5a5f8dbac553bbe4e11265e1c83dede6be05427e2ef1ef8d16147fa124514</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-sl" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-sl-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">237dc5587d49ef2850ec07a90a4886e334e3e1f161650b40104e13cad04215da</sum></package><package arch="noarch" name="libwps-doc" release="1.el7" src="libwps-0.4.7-1.el7.src.rpm" version="0.4.7"><filename>libwps-doc-0.4.7-1.el7.noarch.rpm</filename><sum type="sha256">195f7d718599d10780e661574cbc25d7bac87c1f25ce52d475e2785a74b16c14</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-zh-Hant" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-zh-Hant-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">e8f113b23dce007c9ed5c61f2f783a5f8e8f60fd51a280eca4375157ea6ef311</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fa" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-fa-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">649a633bb8333829df9ec2b29adaeb859212397e71cbfced0ac40f80ec13f375</sum></package><package arch="x86_64" name="libcdr" release="1.el7" src="libcdr-0.1.4-1.el7.src.rpm" version="0.1.4"><filename>libcdr-0.1.4-1.el7.x86_64.rpm</filename><sum type="sha256">31742f435f5cac80e58dd6c282698a034a35cde9b2ec3bcc155cdf10806f5ab0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-dz" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-dz-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">605454ca16ccf814bad369d785719d3a7b0cf19bd854287504ed3d030897bacb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gdb-debug-support" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-gdb-debug-support-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">566575c3453f17baa1bd8c7a51866b4a5cdd4b01603dd53f423c7a6b42ff8eef</sum></package><package arch="noarch" epoch="1" name="autocorr-sr" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-sr-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">80fad3efc7de35bda8ae97780ffdeb6906ed99019bd4faa682c1d1748da0c3dd</sum></package><package arch="i686" name="liborcus" release="2.el7" src="liborcus-0.12.1-2.el7.src.rpm" version="0.12.1"><filename>liborcus-0.12.1-2.el7.i686.rpm</filename><sum type="sha256">716c9852851e36ea398e1fe61bab09e85b9c5a122d5b07164e60d5c9c95f96da</sum></package><package arch="x86_64" epoch="1" name="libreoffice-filters" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-filters-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">d26dd6e32a8ccf499710e68fe3861003f4a8606784735801b89ae69de9fb0dbd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-nl" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-nl-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">de356eef3dd4e8924351767f9b701b1a2e78b4bcae42de22bd798e33f5b905f7</sum></package><package arch="noarch" epoch="1" name="autocorr-af" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-af-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">0a970dccfba2f62e7d65c1f778a7880de93f14d547bcbefc4fe19fc3e812ed6e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-draw" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-draw-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">e3b4d51769299a2c53c4f2694536dd0a54bdbbb6ec7b4ed05fd1fb582b368ca8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-rhino" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-rhino-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">687ebfeddc01c10c85eb9c353fe7fed9472a69631b82b5e3c245830dcfc55f4e</sum></package><package arch="noarch" epoch="1" name="autocorr-ko" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ko-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">1e21c7322d53d51039669cc7596c746d99da0b796f0abd9ad73eecdf879de32e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ca" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ca-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">5d6b0c18bc1eadf0d60aac0a2547aab4b49360414f1f7ea189da962f3e5664e0</sum></package><package arch="i686" name="libcdr" release="1.el7" src="libcdr-0.1.4-1.el7.src.rpm" version="0.1.4"><filename>libcdr-0.1.4-1.el7.i686.rpm</filename><sum type="sha256">c998ee8841566f6a9d136036c5f187347e4f995059cd08b0327d2f684d10b312</sum></package><package arch="noarch" epoch="1" name="autocorr-ro" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ro-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">e04b339ac63def40adbc64a6e1dc1af829604de964680e3fea020274443564d1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-emailmerge" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-emailmerge-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">6a93d3c3c7832b544808d6d0af8104ffa5a50eddce64ccea6404c96f5664f3c5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hant" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-zh-Hant-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">40eafd308a7fb418ccb65cc60e32ff6de531d5fab04d149dc585521b85f32c92</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-as" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-as-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">4073a5621e23643a2f96e49891a66c9a493a83dd49b47f794d76c356a9db3a4b</sum></package><package arch="x86_64" epoch="1" name="libreofficekit" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreofficekit-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">686e228f45094ad2230f14849e715918fe5f2a99fdb7e59231b59c84a07976d6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-xh" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-xh-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">01607106265178fd9afdc54b94ea1e39642ccb8d442ecee968170e3b7eb58f99</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-lv" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-lv-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">e737cf1d5ac566edd2e9d35b6c6c4fbc4ec32a1f34e91863389a619ebe9d8330</sum></package><package arch="noarch" epoch="1" name="autocorr-hu" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-hu-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">d29908b6ed1a19ee66d5bbfc3add600b4600d2415f619c971dc58f586f232ced</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ru" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ru-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">4ccb0c0525cd9c78abde0058bc0f6fadc6f4eb8ca36085538182e6929554a499</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ar" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ar-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">e7dff92bc81c30b2a183cd479a9cef01e33fdaa4bfe9f7143bc70569ab3e93ae</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lt" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-lt-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">8582ba515a8563f0e97a60e94c0b7280527aeb44085c41f6873af4b19ae15e24</sum></package><package arch="x86_64" epoch="1" name="libreoffice-librelogo" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-librelogo-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">0400400eeaa62d225b104a6a7d3e661ed8191f8c754aabb62c216d02e78432af</sum></package><package arch="x86_64" epoch="1" name="libreoffice-calc" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-calc-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">d4cab9e5a834aae262e9862c136d6482b861a2a1c517c911b12b74b90f9f4f36</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-th" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-th-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">8527788ddea6b500ef27d930d29c46bf6d3c78c1f28e5bedac236b7723022290</sum></package><package arch="noarch" epoch="1" name="autocorr-zh" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-zh-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">9c00fe10be95f7cf81fd3fb471745e59c644d7d450bf76fec06d9b99c1ea100f</sum></package><package arch="x86_64" name="libzmf-devel" release="1.el7" src="libzmf-0.0.2-1.el7.src.rpm" version="0.0.2"><filename>libzmf-devel-0.0.2-1.el7.x86_64.rpm</filename><sum type="sha256">fd85f0736601cf852ee0b97a5ee93d25aecb9b688e3be4d0ba6239de5f54fcf4</sum></package><package arch="noarch" epoch="1" name="autocorr-sv" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-sv-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">2e215b4f05f3e9dc9c735d8c253f6606343204498de28c3f7569c4ae8d54103a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-it" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-it-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">6cd548a16a1c6653cd59e8460c44edf462528e0557994fae6893b880a59a7736</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-pl" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-pl-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">89e110c8d6f0c7dc395bf2760d163f7cce96df96624ea628a52f50fa4e5b954f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ko" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ko-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">6677cc7522b2f9a633ae573fa24d30a9a38121efbf8e9a518212c0610981f1fb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-core" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-core-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">e3bf64305d570e4ca6fef217680fec7a3aac51b61029697a0b5fb09662db2b98</sum></package><package arch="x86_64" name="libvisio-devel" release="1.el7" src="libvisio-0.1.6-1.el7.src.rpm" version="0.1.6"><filename>libvisio-devel-0.1.6-1.el7.x86_64.rpm</filename><sum type="sha256">d4ab93188983edc2d0577f1bfc6a29d12c3d68748b455bc30f1256827dfeb7b5</sum></package><package arch="x86_64" name="libstaroffice-devel" release="1.el7" src="libstaroffice-0.0.4-1.el7.src.rpm" version="0.0.4"><filename>libstaroffice-devel-0.0.4-1.el7.x86_64.rpm</filename><sum type="sha256">230b4ebc30dec8585030d2c7f3fc1f16f93ad9484f8603e2998f4baa4be58b0d</sum></package><package arch="noarch" epoch="1" name="autocorr-fa" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>autocorr-fa-5.3.6.1-10.el7.noarch.rpm</filename><sum type="sha256">edb96fbbf7821c929084b70c7c8d5f7543d6c0d3efb67802b98d6d6b589e7801</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pa" release="10.el7" src="libreoffice-5.3.6.1-10.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pa-5.3.6.1-10.el7.x86_64.rpm</filename><sum type="sha256">eea824f048301c81f4f9c4d3744abb70dcab98c9b69ebbf0137819f068722599</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0751" id="RHBA-2018:0751-1" title="Rhba-2018:0751-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0764-1</id><title>Libsepol Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libsepol-static" release="8.1.el7" src="libsepol-2.5-8.1.el7.src.rpm" version="2.5"><filename>libsepol-static-2.5-8.1.el7.x86_64.rpm</filename><sum type="sha256">2097477fe940b1bcf22d42ca4741fbadcb5775ab398783aca74b285641c28b5d</sum></package><package arch="i686" name="libsepol-static" release="8.1.el7" src="libsepol-2.5-8.1.el7.src.rpm" version="2.5"><filename>libsepol-static-2.5-8.1.el7.i686.rpm</filename><sum type="sha256">bdf9fbea535a0ed21f3cd22841760b541e5e4c0061419296e03f8e10b7612932</sum></package><package arch="x86_64" name="libsepol-devel" release="8.1.el7" src="libsepol-2.5-8.1.el7.src.rpm" version="2.5"><filename>libsepol-devel-2.5-8.1.el7.x86_64.rpm</filename><sum type="sha256">72a2616e157fec9bc40fcf3a1d8ed0085fb0f985071711f93bed7721244e25eb</sum></package><package arch="i686" name="libsepol-devel" release="8.1.el7" src="libsepol-2.5-8.1.el7.src.rpm" version="2.5"><filename>libsepol-devel-2.5-8.1.el7.i686.rpm</filename><sum type="sha256">c006d4a7bfca9049a7550d0e8b7fa1d3360ccb19c17c9499325ec409bc024975</sum></package><package arch="i686" name="libsepol" release="8.1.el7" src="libsepol-2.5-8.1.el7.src.rpm" version="2.5"><filename>libsepol-2.5-8.1.el7.i686.rpm</filename><sum type="sha256">020cad9e207951681385be74636c46c3bac5f8492ea0149bf093a7e64b43ce1d</sum></package><package arch="x86_64" name="libsepol" release="8.1.el7" src="libsepol-2.5-8.1.el7.src.rpm" version="2.5"><filename>libsepol-2.5-8.1.el7.x86_64.rpm</filename><sum type="sha256">2c420bf228deca0b91ca6e20d4804a3d5ef9bae0e9da911444ef1a962346a243</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0764" id="RHBA-2018:0764-1" title="Rhba-2018:0764-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0765-1</id><title>Dbus Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="dbus-x11" release="7.el7" src="dbus-1.10.24-7.el7.src.rpm" version="1.10.24"><filename>dbus-x11-1.10.24-7.el7.x86_64.rpm</filename><sum type="sha256">2f406ce4cab43f7b6c50cc1ebf62ffdc2ccde856bc4d9af6cb545f5d499053f8</sum></package><package arch="noarch" epoch="1" name="dbus-doc" release="7.el7" src="dbus-1.10.24-7.el7.src.rpm" version="1.10.24"><filename>dbus-doc-1.10.24-7.el7.noarch.rpm</filename><sum type="sha256">8e935af1bbb194393256427425df4aaa1df75105d7e68e4123e82f568b4f92b2</sum></package><package arch="i686" epoch="1" name="dbus-libs" release="7.el7" src="dbus-1.10.24-7.el7.src.rpm" version="1.10.24"><filename>dbus-libs-1.10.24-7.el7.i686.rpm</filename><sum type="sha256">630c9b5de938887841e7480c2ed0635cf9266abf037ef3766335d5287b66312c</sum></package><package arch="x86_64" epoch="1" name="dbus-devel" release="7.el7" src="dbus-1.10.24-7.el7.src.rpm" version="1.10.24"><filename>dbus-devel-1.10.24-7.el7.x86_64.rpm</filename><sum type="sha256">4f85f7a09fdf48194d43a32a5f9a4bcbc129a1b14fb7112604749c1db031225f</sum></package><package arch="x86_64" epoch="1" name="dbus-tests" release="7.el7" src="dbus-1.10.24-7.el7.src.rpm" version="1.10.24"><filename>dbus-tests-1.10.24-7.el7.x86_64.rpm</filename><sum type="sha256">34e29be02ed6f88f98fbd227e16fd81e293efc063c38fd36e3a3360ad7221872</sum></package><package arch="i686" epoch="1" name="dbus-devel" release="7.el7" src="dbus-1.10.24-7.el7.src.rpm" version="1.10.24"><filename>dbus-devel-1.10.24-7.el7.i686.rpm</filename><sum type="sha256">6bf303ffb13ddb3a941ec0559a2fc095af1919405f1ae876fc3a5dfdf307ff25</sum></package><package arch="x86_64" epoch="1" name="dbus" release="7.el7" src="dbus-1.10.24-7.el7.src.rpm" version="1.10.24"><filename>dbus-1.10.24-7.el7.x86_64.rpm</filename><sum type="sha256">947d606daff319dd69ec314b594ec1ac5a3531db40806563f04cc04d3216d7df</sum></package><package arch="x86_64" epoch="1" name="dbus-libs" release="7.el7" src="dbus-1.10.24-7.el7.src.rpm" version="1.10.24"><filename>dbus-libs-1.10.24-7.el7.x86_64.rpm</filename><sum type="sha256">4dfef42e8f4f90c057a00d18f2acac00c2949ee82b2e86159bcb908425b809c1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0765" id="RHBA-2018:0765-1" title="Rhba-2018:0765-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0770-1</id><title>Gtk3, Gdm, Gnome-Shell, Gnome-Session Update, New Packages: Wayland</title><description>* This update adds the new wayland packages as a Technology Preview.

For information on scope of support, see the Technology Preview Features Support Scope document.</description><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="wayland-doc" release="2.el7" src="wayland-1.14.0-2.el7.src.rpm" version="1.14.0"><filename>wayland-doc-1.14.0-2.el7.noarch.rpm</filename><sum type="sha256">53b9bd06d93d5ca3ee78d3119fa3eea820327f22021ab4a07690b1ddd2de3e67</sum></package><package arch="i686" name="libwayland-cursor" release="2.el7" src="wayland-1.14.0-2.el7.src.rpm" version="1.14.0"><filename>libwayland-cursor-1.14.0-2.el7.i686.rpm</filename><sum type="sha256">a4b72af5e604411d7902420bb15f07e2cccc4e6cf0c1f57d1e544ca6da08c455</sum></package><package arch="i686" name="wayland-devel" release="2.el7" src="wayland-1.14.0-2.el7.src.rpm" version="1.14.0"><filename>wayland-devel-1.14.0-2.el7.i686.rpm</filename><sum type="sha256">8c1765e90873d04ccf6bb02cf8469aa4c628827a991ee2229ff0ba6ccb7ac6cc</sum></package><package arch="x86_64" name="libwayland-cursor" release="2.el7" src="wayland-1.14.0-2.el7.src.rpm" version="1.14.0"><filename>libwayland-cursor-1.14.0-2.el7.x86_64.rpm</filename><sum type="sha256">19cb6e2bab55a12b078ae6283bebe906d0ee206fd4998faf0ae4647272673977</sum></package><package arch="x86_64" name="libwayland-client" release="2.el7" src="wayland-1.14.0-2.el7.src.rpm" version="1.14.0"><filename>libwayland-client-1.14.0-2.el7.x86_64.rpm</filename><sum type="sha256">0866f314dd9645dc8c9750dbd151fad001f14b9f6cbaa64b867f04b913bb165f</sum></package><package arch="x86_64" name="wayland-devel" release="2.el7" src="wayland-1.14.0-2.el7.src.rpm" version="1.14.0"><filename>wayland-devel-1.14.0-2.el7.x86_64.rpm</filename><sum type="sha256">aaa13924b48cfb20d59dc43692a0a0991b65afded1ae8c6c654f1ab80f22743c</sum></package><package arch="i686" name="libwayland-server" release="2.el7" src="wayland-1.14.0-2.el7.src.rpm" version="1.14.0"><filename>libwayland-server-1.14.0-2.el7.i686.rpm</filename><sum type="sha256">f49394e65e39ac6eed472562b767488d0d89c0e19da1b46ce330999655ca63af</sum></package><package arch="x86_64" name="libwayland-server" release="2.el7" src="wayland-1.14.0-2.el7.src.rpm" version="1.14.0"><filename>libwayland-server-1.14.0-2.el7.x86_64.rpm</filename><sum type="sha256">fca088f34481e9558cb3f83b9a01f07929f20a59a3aaa2c2a6edeca668766dc2</sum></package><package arch="noarch" name="wayland-protocols-devel" release="1.el7" src="wayland-protocols-1.10-1.el7.src.rpm" version="1.10"><filename>wayland-protocols-devel-1.10-1.el7.noarch.rpm</filename><sum type="sha256">ae64de93d83b5a390f71856386b7b2aa3578dd87fee13ea7be757c2f3d961495</sum></package><package arch="i686" name="libwayland-client" release="2.el7" src="wayland-1.14.0-2.el7.src.rpm" version="1.14.0"><filename>libwayland-client-1.14.0-2.el7.i686.rpm</filename><sum type="sha256">02897ba3c6ee264bd6fb46895169bfa38b82c35e4e06065346baf5e417b07718</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0770" id="RHBA-2018:0770-1" title="Rhba-2018:0770-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1481381" id="1481381" title="Rebase Gnome-Shell To 3.26" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1481386" id="1481386" title="Rebase Mutter To 3.26" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1481395" id="1481395" title="Support Fractional Scaling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1481405" id="1481405" title="Rebase Gsettings-Desktop-Schemas To 3.26.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1481407" id="1481407" title="Rebase Control-Center To 3.26" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1481410" id="1481410" title="Rebase Gnome-Settings-Daemon To 3.26" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1481411" id="1481411" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0799-1</id><title>Kmod Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kmod-devel" release="21.el7" src="kmod-20-21.el7.src.rpm" version="20"><filename>kmod-devel-20-21.el7.x86_64.rpm</filename><sum type="sha256">939e779b551382a00697c13dee815b9fcf43e35939b6da90c5a214698bc69f49</sum></package><package arch="x86_64" name="kmod" release="21.el7" src="kmod-20-21.el7.src.rpm" version="20"><filename>kmod-20-21.el7.x86_64.rpm</filename><sum type="sha256">b13a9e18bcb7a71855e237086355e4fcc6d9e992f7d7d7181285e3d605bb2d4c</sum></package><package arch="i686" name="kmod-devel" release="21.el7" src="kmod-20-21.el7.src.rpm" version="20"><filename>kmod-devel-20-21.el7.i686.rpm</filename><sum type="sha256">8133ca55b5239173caa8b5c439dd4187753e4690da8fe68145b9b5fafaa44e6d</sum></package><package arch="x86_64" name="kmod-libs" release="21.el7" src="kmod-20-21.el7.src.rpm" version="20"><filename>kmod-libs-20-21.el7.x86_64.rpm</filename><sum type="sha256">40eb14c78d4c6afb5d784675019cbabcecbc9777a9fc6b06b3f7ef740f69b0d4</sum></package><package arch="i686" name="kmod-libs" release="21.el7" src="kmod-20-21.el7.src.rpm" version="20"><filename>kmod-libs-20-21.el7.i686.rpm</filename><sum type="sha256">65799fb7f8063b5e914d3f2e563c48d394a80a7e6c465131c1a3b2689556d898</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0799" id="RHBA-2018:0799-1" title="Rhba-2018:0799-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0802-1</id><title>Spice Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="spice-protocol" release="2.el7" src="spice-protocol-0.12.13-2.el7.src.rpm" version="0.12.13"><filename>spice-protocol-0.12.13-2.el7.noarch.rpm</filename><sum type="sha256">4acd1ecda8470e42cd3bbd99257477301c48217205c88d022cb5bb526dfe42a0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0802" id="RHBA-2018:0802-1" title="Rhba-2018:0802-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0868-1</id><title>Udisks2 Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python2-bytesize" release="1.el7" src="libbytesize-1.2-1.el7.src.rpm" version="1.2"><filename>python2-bytesize-1.2-1.el7.x86_64.rpm</filename><sum type="sha256">22d2434e48a838a38bb0651e808c12be7a394e7b02ded9a83e4765c8ba25b33c</sum></package><package arch="i686" name="libbytesize" release="1.el7" src="libbytesize-1.2-1.el7.src.rpm" version="1.2"><filename>libbytesize-1.2-1.el7.i686.rpm</filename><sum type="sha256">0899aa5c74d65c7d91a4a427902ca14689a47c35cffefc5c28bd95aac8d3de26</sum></package><package arch="i686" name="libbytesize-devel" release="1.el7" src="libbytesize-1.2-1.el7.src.rpm" version="1.2"><filename>libbytesize-devel-1.2-1.el7.i686.rpm</filename><sum type="sha256">995f2863da23117559cd0f96d74a1676b3df0729074cf2bb560aa0f32a889e9c</sum></package><package arch="x86_64" name="libbytesize" release="1.el7" src="libbytesize-1.2-1.el7.src.rpm" version="1.2"><filename>libbytesize-1.2-1.el7.x86_64.rpm</filename><sum type="sha256">ff6aeafa84188f6fafb84ec06a09371ffdf79606e3dc2f9e09ea21d40fa8c06c</sum></package><package arch="x86_64" name="libbytesize-devel" release="1.el7" src="libbytesize-1.2-1.el7.src.rpm" version="1.2"><filename>libbytesize-devel-1.2-1.el7.x86_64.rpm</filename><sum type="sha256">a2bc9b7ca4fdf18c393080d7fe900b2ba243f3a2d34dca29e6464dc63b11781d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0868" id="RHBA-2018:0868-1" title="Rhba-2018:0868-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0877-1</id><title>Rpm Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="rpm-build-libs" release="32.el7" src="rpm-4.11.3-32.el7.src.rpm" version="4.11.3"><filename>rpm-build-libs-4.11.3-32.el7.i686.rpm</filename><sum type="sha256">0f3e840fcb5d2956c2f6c624f203d060195566bdafcc46b87cb6051a533f2153</sum></package><package arch="i686" name="rpm-libs" release="32.el7" src="rpm-4.11.3-32.el7.src.rpm" version="4.11.3"><filename>rpm-libs-4.11.3-32.el7.i686.rpm</filename><sum type="sha256">b21d8f0175ff215ddf89d78ddd72ad78d7065707e0cfbb8914c060eca0315015</sum></package><package arch="x86_64" name="rpm-build" release="32.el7" src="rpm-4.11.3-32.el7.src.rpm" version="4.11.3"><filename>rpm-build-4.11.3-32.el7.x86_64.rpm</filename><sum type="sha256">27b0bcc0ef9d31af0750b4563213933123cf9644c251aa8f05f1842515d0e068</sum></package><package arch="noarch" name="rpm-cron" release="32.el7" src="rpm-4.11.3-32.el7.src.rpm" version="4.11.3"><filename>rpm-cron-4.11.3-32.el7.noarch.rpm</filename><sum type="sha256">8fbbdf4c9fa6ce997642930bcb985e04aea34af1ca1543b9a502c063f1dc196b</sum></package><package arch="x86_64" name="rpm-plugin-systemd-inhibit" release="32.el7" src="rpm-4.11.3-32.el7.src.rpm" version="4.11.3"><filename>rpm-plugin-systemd-inhibit-4.11.3-32.el7.x86_64.rpm</filename><sum type="sha256">23a9ca9ca49faa093f3e9098027a527e5ff3aef10e190ef948e96ef4b7de30d1</sum></package><package arch="x86_64" name="rpm-libs" release="32.el7" src="rpm-4.11.3-32.el7.src.rpm" version="4.11.3"><filename>rpm-libs-4.11.3-32.el7.x86_64.rpm</filename><sum type="sha256">539b08841e5115f598f4177b11db570c022844e575d6dd0e6c7fbcd54e856d07</sum></package><package arch="x86_64" name="rpm" release="32.el7" src="rpm-4.11.3-32.el7.src.rpm" version="4.11.3"><filename>rpm-4.11.3-32.el7.x86_64.rpm</filename><sum type="sha256">83af6db65631e2938f7bb63d3ddbe52c931553b81beab10f141f72eaea630c61</sum></package><package arch="x86_64" name="rpm-devel" release="32.el7" src="rpm-4.11.3-32.el7.src.rpm" version="4.11.3"><filename>rpm-devel-4.11.3-32.el7.x86_64.rpm</filename><sum type="sha256">3cfe7821a6a30b77564734c72afc09bbcedf4fb39ba1b2f3eb9cb4d4e7f8d857</sum></package><package arch="x86_64" name="rpm-sign" release="32.el7" src="rpm-4.11.3-32.el7.src.rpm" version="4.11.3"><filename>rpm-sign-4.11.3-32.el7.x86_64.rpm</filename><sum type="sha256">2eb35ccdc98ac31428099d95b7f7e21c39a63df3cab1cb305c4cd71e7b7c8d20</sum></package><package arch="i686" name="rpm-devel" release="32.el7" src="rpm-4.11.3-32.el7.src.rpm" version="4.11.3"><filename>rpm-devel-4.11.3-32.el7.i686.rpm</filename><sum type="sha256">07f44b1e4273c862b2c05a8b367c1e057d8eee30e0bc55c48b4ed762356aad04</sum></package><package arch="noarch" name="rpm-apidocs" release="32.el7" src="rpm-4.11.3-32.el7.src.rpm" version="4.11.3"><filename>rpm-apidocs-4.11.3-32.el7.noarch.rpm</filename><sum type="sha256">364a86cd03008d832ed16bc8dfde19fe511c7398893c293be8091b300138886f</sum></package><package arch="x86_64" name="rpm-build-libs" release="32.el7" src="rpm-4.11.3-32.el7.src.rpm" version="4.11.3"><filename>rpm-build-libs-4.11.3-32.el7.x86_64.rpm</filename><sum type="sha256">b79f7abc1733ee3825253f6e276a356eb1a150c1d8ceda8f24a5a4c2375a2597</sum></package><package arch="x86_64" name="rpm-python" release="32.el7" src="rpm-4.11.3-32.el7.src.rpm" version="4.11.3"><filename>rpm-python-4.11.3-32.el7.x86_64.rpm</filename><sum type="sha256">48267ce23b07d86b5d5a45a04b0807e443cc388f0efef8cd68312417ff6befac</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0877" id="RHBA-2018:0877-1" title="Rhba-2018:0877-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0886-1</id><title>Libtdb Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="tdb-tools" release="1.el7" src="libtdb-1.3.15-1.el7.src.rpm" version="1.3.15"><filename>tdb-tools-1.3.15-1.el7.x86_64.rpm</filename><sum type="sha256">ab0ea810e78f4f1621137d44e2cbc7cf2a7c33e3161c32d0811a7afd1fe99afe</sum></package><package arch="x86_64" name="libtdb-devel" release="1.el7" src="libtdb-1.3.15-1.el7.src.rpm" version="1.3.15"><filename>libtdb-devel-1.3.15-1.el7.x86_64.rpm</filename><sum type="sha256">f000736ca3f8d9a47ee7bbf0fc66f04f38a7f56228b2fffb52c38f7a7a229de8</sum></package><package arch="i686" name="libtdb-devel" release="1.el7" src="libtdb-1.3.15-1.el7.src.rpm" version="1.3.15"><filename>libtdb-devel-1.3.15-1.el7.i686.rpm</filename><sum type="sha256">c60c190e1cfb6a561eedcca3f42fb282c22acfcc686b231972c00cb80a7fb70a</sum></package><package arch="i686" name="python-tdb" release="1.el7" src="libtdb-1.3.15-1.el7.src.rpm" version="1.3.15"><filename>python-tdb-1.3.15-1.el7.i686.rpm</filename><sum type="sha256">c2db3616f3b624a2667c6560e9a79b8e356f0ce95d83dfc70624985ca44dc484</sum></package><package arch="i686" name="libtdb" release="1.el7" src="libtdb-1.3.15-1.el7.src.rpm" version="1.3.15"><filename>libtdb-1.3.15-1.el7.i686.rpm</filename><sum type="sha256">a414941a10aced682f06b181d8230d9f1c5356f6d2074de090df8dd975db99a9</sum></package><package arch="x86_64" name="python-tdb" release="1.el7" src="libtdb-1.3.15-1.el7.src.rpm" version="1.3.15"><filename>python-tdb-1.3.15-1.el7.x86_64.rpm</filename><sum type="sha256">1abbdd6cbaaf2db1c59c7ae9f403f89170f4017f9d17e796f3afdc74a60dc1c5</sum></package><package arch="x86_64" name="libtdb" release="1.el7" src="libtdb-1.3.15-1.el7.src.rpm" version="1.3.15"><filename>libtdb-1.3.15-1.el7.x86_64.rpm</filename><sum type="sha256">890110f40151b296458bfdf45d40407dbdba04d763b67e844cfe3a7bb012cceb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0886" id="RHBA-2018:0886-1" title="Rhba-2018:0886-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0899-1</id><title>Ldapjdk Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ldapjdk" release="5.el7" src="ldapjdk-4.19-5.el7.src.rpm" version="4.19"><filename>ldapjdk-4.19-5.el7.noarch.rpm</filename><sum type="sha256">7dbef5ffb520f7f58424e25542822407b98a56d3a7f624df63ea9149856e1162</sum></package><package arch="noarch" name="ldapjdk-javadoc" release="5.el7" src="ldapjdk-4.19-5.el7.src.rpm" version="4.19"><filename>ldapjdk-javadoc-4.19-5.el7.noarch.rpm</filename><sum type="sha256">39ab1955f33a3033bfe6835e71263bc812f18cd18d635a0e6e2bb27866fe9e5a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0899" id="RHBA-2018:0899-1" title="Rhba-2018:0899-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0903-1</id><title>Libselinux Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libselinux-devel" release="12.el7" src="libselinux-2.5-12.el7.src.rpm" version="2.5"><filename>libselinux-devel-2.5-12.el7.x86_64.rpm</filename><sum type="sha256">f59d98b44de34554881ed44fd3bcf386970a866f97f99f252224f6b15ccd13d4</sum></package><package arch="x86_64" name="libselinux-static" release="12.el7" src="libselinux-2.5-12.el7.src.rpm" version="2.5"><filename>libselinux-static-2.5-12.el7.x86_64.rpm</filename><sum type="sha256">df0d8bebc00722f5a2b49100a142cda2a2e352d5c3061400e24ed4e42a857f50</sum></package><package arch="x86_64" name="libselinux-python" release="12.el7" src="libselinux-2.5-12.el7.src.rpm" version="2.5"><filename>libselinux-python-2.5-12.el7.x86_64.rpm</filename><sum type="sha256">e2650ad150a196ffcc0953dbdb9dbc0c32a23b94508999caa0e6c91067ca11f6</sum></package><package arch="i686" name="libselinux-devel" release="12.el7" src="libselinux-2.5-12.el7.src.rpm" version="2.5"><filename>libselinux-devel-2.5-12.el7.i686.rpm</filename><sum type="sha256">de512d984c2927ce0a637265ea2bb03a6209fbafeccdefc081152da5910970d3</sum></package><package arch="x86_64" name="libselinux-ruby" release="12.el7" src="libselinux-2.5-12.el7.src.rpm" version="2.5"><filename>libselinux-ruby-2.5-12.el7.x86_64.rpm</filename><sum type="sha256">78867c8a68604dd89409281dcfa630b73befedd441edd74d672ddec193b2f971</sum></package><package arch="i686" name="libselinux-static" release="12.el7" src="libselinux-2.5-12.el7.src.rpm" version="2.5"><filename>libselinux-static-2.5-12.el7.i686.rpm</filename><sum type="sha256">1a7977cd9a3212525e24755f9bac3b9755d47416aae7e836351c94af6b9d2228</sum></package><package arch="i686" name="libselinux" release="12.el7" src="libselinux-2.5-12.el7.src.rpm" version="2.5"><filename>libselinux-2.5-12.el7.i686.rpm</filename><sum type="sha256">4e1b017d9ace1d146f19a44118e93390d90791320e74f3ae7d42c1649f5fb41e</sum></package><package arch="x86_64" name="libselinux-utils" release="12.el7" src="libselinux-2.5-12.el7.src.rpm" version="2.5"><filename>libselinux-utils-2.5-12.el7.x86_64.rpm</filename><sum type="sha256">150dba389bf075e490f370be09de6e6f42949bf79520d6914d140a958e41a176</sum></package><package arch="x86_64" name="libselinux" release="12.el7" src="libselinux-2.5-12.el7.src.rpm" version="2.5"><filename>libselinux-2.5-12.el7.x86_64.rpm</filename><sum type="sha256">9d3b657855024ff71beeec0fb72f8b8ddd523c14fea5ab432004588bf3ddb8ba</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0903" id="RHBA-2018:0903-1" title="Rhba-2018:0903-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0905-1</id><title>Libsemanage Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libsemanage" release="11.el7" src="libsemanage-2.5-11.el7.src.rpm" version="2.5"><filename>libsemanage-2.5-11.el7.i686.rpm</filename><sum type="sha256">f9b72db23456e91c802e908525fa5d76ded29a4019644a62966e00a11892acb7</sum></package><package arch="x86_64" name="libsemanage-devel" release="11.el7" src="libsemanage-2.5-11.el7.src.rpm" version="2.5"><filename>libsemanage-devel-2.5-11.el7.x86_64.rpm</filename><sum type="sha256">fb500a0bf02802a32dec294837494a44d15a6d32feac4aa09196b3e5c4f500b1</sum></package><package arch="x86_64" name="libsemanage" release="11.el7" src="libsemanage-2.5-11.el7.src.rpm" version="2.5"><filename>libsemanage-2.5-11.el7.x86_64.rpm</filename><sum type="sha256">62b6da53ed3a96fbd234a5aedda3ead054d5085c74f3d6f7863ea38d4f2b18a5</sum></package><package arch="x86_64" name="libsemanage-python" release="11.el7" src="libsemanage-2.5-11.el7.src.rpm" version="2.5"><filename>libsemanage-python-2.5-11.el7.x86_64.rpm</filename><sum type="sha256">7e826c3a20c2ac17e7ac27b8ab13e4ecb54d4ca1ab09b8f55c950e8ca333e4fa</sum></package><package arch="i686" name="libsemanage-static" release="11.el7" src="libsemanage-2.5-11.el7.src.rpm" version="2.5"><filename>libsemanage-static-2.5-11.el7.i686.rpm</filename><sum type="sha256">699d32fab5f8e71a938162e04b7b2ad812f60e6696823ef26932dc1dbe58ec70</sum></package><package arch="i686" name="libsemanage-devel" release="11.el7" src="libsemanage-2.5-11.el7.src.rpm" version="2.5"><filename>libsemanage-devel-2.5-11.el7.i686.rpm</filename><sum type="sha256">d23728593f8437a637f12624038526307c21db22a9863b41b77697c4fc026ad2</sum></package><package arch="x86_64" name="libsemanage-static" release="11.el7" src="libsemanage-2.5-11.el7.src.rpm" version="2.5"><filename>libsemanage-static-2.5-11.el7.x86_64.rpm</filename><sum type="sha256">fbbc47fc47c3627d002ae5a57e0a10944eb948fe52cbebed41259d9c2133a68b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0905" id="RHBA-2018:0905-1" title="Rhba-2018:0905-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0916-1</id><title>Setools Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="setools" release="2.el7" src="setools-3.3.8-2.el7.src.rpm" version="3.3.8"><filename>setools-3.3.8-2.el7.x86_64.rpm</filename><sum type="sha256">10c2d2fbbd727fd7fdf7c57e3bff7b1dbc3c0bf11f3d51cd01ee77e7c9fc80c0</sum></package><package arch="x86_64" name="setools-libs" release="2.el7" src="setools-3.3.8-2.el7.src.rpm" version="3.3.8"><filename>setools-libs-3.3.8-2.el7.x86_64.rpm</filename><sum type="sha256">db0112b2bba61ae780d4b869f19fca2032e5a8bb861b69cb8bf636142ac70fde</sum></package><package arch="x86_64" name="setools-console" release="2.el7" src="setools-3.3.8-2.el7.src.rpm" version="3.3.8"><filename>setools-console-3.3.8-2.el7.x86_64.rpm</filename><sum type="sha256">a32d2010dd47a625f3dbe6f1e45cf102eb31468ce5a06807996075b8b54c793d</sum></package><package arch="i686" name="setools-libs" release="2.el7" src="setools-3.3.8-2.el7.src.rpm" version="3.3.8"><filename>setools-libs-3.3.8-2.el7.i686.rpm</filename><sum type="sha256">1d76d204435810820079a2510d5fbad48cbaba4de8ee18a5dee7e19badedb12a</sum></package><package arch="x86_64" name="setools-gui" release="2.el7" src="setools-3.3.8-2.el7.src.rpm" version="3.3.8"><filename>setools-gui-3.3.8-2.el7.x86_64.rpm</filename><sum type="sha256">12c1303a7bfb3214ff035fcdbffca8d47f3f60d349779a2ebe22f11343725648</sum></package><package arch="i686" name="setools-devel" release="2.el7" src="setools-3.3.8-2.el7.src.rpm" version="3.3.8"><filename>setools-devel-3.3.8-2.el7.i686.rpm</filename><sum type="sha256">978a4ff5cfe060154d797c9e249a1622fa0925028af72afbead81cd7043101e8</sum></package><package arch="x86_64" name="setools-libs-tcl" release="2.el7" src="setools-3.3.8-2.el7.src.rpm" version="3.3.8"><filename>setools-libs-tcl-3.3.8-2.el7.x86_64.rpm</filename><sum type="sha256">197d9bf051b156ae9e2293b630b18a462890f6dbbd237f1ae576842e5dda3657</sum></package><package arch="x86_64" name="setools-devel" release="2.el7" src="setools-3.3.8-2.el7.src.rpm" version="3.3.8"><filename>setools-devel-3.3.8-2.el7.x86_64.rpm</filename><sum type="sha256">123372bf05b2eb7b391c17d1e30ae8476915840cc67756e2c798db848bc2de76</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0916" id="RHBA-2018:0916-1" title="Rhba-2018:0916-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0935-1</id><title>Nss-Pam-Ldapd Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="nss-pam-ldapd" release="16.el7" src="nss-pam-ldapd-0.8.13-16.el7.src.rpm" version="0.8.13"><filename>nss-pam-ldapd-0.8.13-16.el7.i686.rpm</filename><sum type="sha256">329874b902b04a255913b2f5e09bd00ac8bf10ca61738d5297145f6115262c4a</sum></package><package arch="x86_64" name="nss-pam-ldapd" release="16.el7" src="nss-pam-ldapd-0.8.13-16.el7.src.rpm" version="0.8.13"><filename>nss-pam-ldapd-0.8.13-16.el7.x86_64.rpm</filename><sum type="sha256">030531e0f11ace18ad86267ea25758623e63f42240d5bdf276a3f656b2f95a28</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0935" id="RHBA-2018:0935-1" title="Rhba-2018:0935-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0957-1</id><title>Python-Netaddr Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-netaddr" release="9.el7" src="python-netaddr-0.7.5-9.el7.src.rpm" version="0.7.5"><filename>python-netaddr-0.7.5-9.el7.noarch.rpm</filename><sum type="sha256">faa9723b03d6d5367d4cf505367ce083b495eb1581bd98884b5bc790dc2f4a81</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0957" id="RHBA-2018:0957-1" title="Rhba-2018:0957-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:0971-1</id><title>Nuxwdog Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nuxwdog-client-perl" release="7.el7" src="nuxwdog-1.0.3-7.el7.src.rpm" version="1.0.3"><filename>nuxwdog-client-perl-1.0.3-7.el7.x86_64.rpm</filename><sum type="sha256">5f1079550de630bb63ce26d0f4f2c632c24c30750e0206861090ed37716fc0db</sum></package><package arch="i686" name="nuxwdog" release="7.el7" src="nuxwdog-1.0.3-7.el7.src.rpm" version="1.0.3"><filename>nuxwdog-1.0.3-7.el7.i686.rpm</filename><sum type="sha256">bf3154841aa168844e672aa300aea10cd3213c0f268c121f13bf34e7f1cf0075</sum></package><package arch="i686" name="nuxwdog-devel" release="7.el7" src="nuxwdog-1.0.3-7.el7.src.rpm" version="1.0.3"><filename>nuxwdog-devel-1.0.3-7.el7.i686.rpm</filename><sum type="sha256">1288132c687ba230afe2b87e8f8c9f4b70414038dc8c183b255820fd3cd1a323</sum></package><package arch="x86_64" name="nuxwdog-devel" release="7.el7" src="nuxwdog-1.0.3-7.el7.src.rpm" version="1.0.3"><filename>nuxwdog-devel-1.0.3-7.el7.x86_64.rpm</filename><sum type="sha256">afd9bc5add7bac8bde2b6d8abcb6972656b75ebe03f2d0b6f5546b1ca5122315</sum></package><package arch="x86_64" name="nuxwdog" release="7.el7" src="nuxwdog-1.0.3-7.el7.src.rpm" version="1.0.3"><filename>nuxwdog-1.0.3-7.el7.x86_64.rpm</filename><sum type="sha256">f67e4a87ff5791881e6ef695842060cab2965421c42dee5c8d572204d4141fe9</sum></package><package arch="x86_64" name="nuxwdog-client-java" release="7.el7" src="nuxwdog-1.0.3-7.el7.src.rpm" version="1.0.3"><filename>nuxwdog-client-java-1.0.3-7.el7.x86_64.rpm</filename><sum type="sha256">a8112943001d4415fa3f544e5279fab11064b84c6fda88d34b09173bc3a88084</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:0971" id="RHBA-2018:0971-1" title="Rhba-2018:0971-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:1059-1</id><title>Selinux-Policy Bug Fix Update</title><description>* Prior to this update, a rule for the Snapper module was missing in the SELinux policy. Consequently, the snapperd daemon was not able to unmount a file system. With this update, the missing rule has been added to the selinux-policy packages, and snapperd is now able to unmount a file system with SELinux in enforcing mode.</description><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy-sandbox" release="192.el7_5.3" src="selinux-policy-3.13.1-192.el7_5.3.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-192.el7_5.3.noarch.rpm</filename><sum type="sha256">245d2bc6b2585dd90b0c0fd8048c778e3f3dfee0af3eff011aa85d393dbb98c4</sum></package><package arch="noarch" name="selinux-policy-devel" release="192.el7_5.3" src="selinux-policy-3.13.1-192.el7_5.3.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-192.el7_5.3.noarch.rpm</filename><sum type="sha256">7d3057b58e4c4f659ab97cc2ce0a18175cc57e7eb2df82df0f2bed6d60deb04c</sum></package><package arch="noarch" name="selinux-policy-minimum" release="192.el7_5.3" src="selinux-policy-3.13.1-192.el7_5.3.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-192.el7_5.3.noarch.rpm</filename><sum type="sha256">b53a93685bd3684a91c8297f61982ce8ee36ddef0833c5851776ed73dfc913b9</sum></package><package arch="noarch" name="selinux-policy-targeted" release="192.el7_5.3" src="selinux-policy-3.13.1-192.el7_5.3.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-192.el7_5.3.noarch.rpm</filename><sum type="sha256">458ed222a80ad401934612441ecafdfbe877bf130ea4988b2443f57e50531f11</sum></package><package arch="noarch" name="selinux-policy-mls" release="192.el7_5.3" src="selinux-policy-3.13.1-192.el7_5.3.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-192.el7_5.3.noarch.rpm</filename><sum type="sha256">d251e6a67d63ef7c543c6f26390de4255468303c32729da98706296e4f67fc32</sum></package><package arch="noarch" name="selinux-policy-doc" release="192.el7_5.3" src="selinux-policy-3.13.1-192.el7_5.3.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-192.el7_5.3.noarch.rpm</filename><sum type="sha256">6f036054db119803dd713d5cd0e0bca891c00a5b55636901dd54418cffc29af5</sum></package><package arch="noarch" name="selinux-policy" release="192.el7_5.3" src="selinux-policy-3.13.1-192.el7_5.3.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-192.el7_5.3.noarch.rpm</filename><sum type="sha256">1498d2c04a43c6430baa3a480639cc7f7f5af6aad25a5a09ff7014d6c96b8035</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:1059" id="RHBA-2018:1059-1" title="Rhba-2018:1059-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1558656" id="1558656" title="Selinux Is Preventing /Usr/Sbin/Snapperd From Mounton Access [Rhel-7.5.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1561424" id="1561424" title="Selinux Is Preventing Snapperd From Unmount Access On The Filesystem [Rhel-7.5.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:1276-1</id><title>Copy-Jdk-Configs Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-05-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="copy-jdk-configs" release="10.el7_5" src="copy-jdk-configs-3.3-10.el7_5.src.rpm" version="3.3"><filename>copy-jdk-configs-3.3-10.el7_5.noarch.rpm</filename><sum type="sha256">ca07c882253764becf23d5e861c3557beb73252e4e0116a9cd36099bef4a36ef</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:1276" id="RHBA-2018:1276-1" title="Rhba-2018:1276-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1571854" id="1571854" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:1339-1</id><title>Tzdata Enhancement Update</title><description>* In this update, the upstream project now defaults to using the "vanguard" data implementation which includes negative DST offsets. However, we are continuing to provide the "rearguard" format for data which does not use negative DST offsets to provide better compatibility with existing tools.  We intend to transition to the "vanguard" data implementation in the future.</description><release>Scientific Linux</release><issued date="2018-05-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="3.el7" src="tzdata-2018e-3.el7.src.rpm" version="2018e"><filename>tzdata-java-2018e-3.el7.noarch.rpm</filename><sum type="sha256">0cb52d5381c538ef77efe148ef364849a22d533716ea5d5435e1ea637431a4b7</sum></package><package arch="noarch" name="tzdata" release="3.el7" src="tzdata-2018e-3.el7.src.rpm" version="2018e"><filename>tzdata-2018e-3.el7.noarch.rpm</filename><sum type="sha256">cebba6c918562b8b32aaac0f4b313318ae4248dfa4359d3b40d916e35e87f27b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:1339" id="RHBA-2018:1339-1" title="Rhba-2018:1339-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1573295" id="1573295" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1574925" id="1574925" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1574928" id="1574928" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:1989-1</id><title>Jss Bug Fix Update</title><description>This update fixes the following bug:

* Previously, the ECDSA with SHA* signature Algorithm ID in Java Security Services (JSS) allowed for NULL parameter. As a consequence, the certificates did not conform with RFC 5758. The problem has been fixed. As a result, JSS works as expected.</description><release>Scientific Linux</release><issued date="2018-06-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="jss" release="12.el7_5" src="jss-4.4.0-12.el7_5.src.rpm" version="4.4.0"><filename>jss-4.4.0-12.el7_5.x86_64.rpm</filename><sum type="sha256">1b263bf56a21d617b81b8ca81cbbee366ddf34f774ed253408160750d5d4f09b</sum></package><package arch="x86_64" name="jss-javadoc" release="12.el7_5" src="jss-4.4.0-12.el7_5.src.rpm" version="4.4.0"><filename>jss-javadoc-4.4.0-12.el7_5.x86_64.rpm</filename><sum type="sha256">da76fcba9567c7ddecfb0f6150313795715dad487c00b88d4c1ae4ba610dac91</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:1989" id="RHBA-2018:1989-1" title="Rhba-2018:1989-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1579202" id="1579202" title="Jss Has Wrong Encoding For Ecdsa With Sha* Algorithmidentifier [Rhel-7.5.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3018-1</id><title>Certmonger Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="certmonger" release="10.el7" src="certmonger-0.78.4-10.el7.src.rpm" version="0.78.4"><filename>certmonger-0.78.4-10.el7.x86_64.rpm</filename><sum type="sha256">07d03af80be7f2c0946166ec6cddfb1b26ff838b5243bb82a870c0445a9cb7f0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3018" id="RHBA-2018:3018-1" title="Rhba-2018:3018-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3035-1</id><title>Anaconda Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="anaconda-gui" release="1.sl7" src="anaconda-21.48.22.147-1.sl7.src.rpm" version="21.48.22.147"><filename>anaconda-gui-21.48.22.147-1.sl7.x86_64.rpm</filename><sum type="sha256">cc31e73e1350b4549891cfcde760f9ea2deb0b8e825d7ac017fa2971652a51fb</sum></package><package arch="x86_64" name="anaconda-widgets-devel" release="1.sl7" src="anaconda-21.48.22.147-1.sl7.src.rpm" version="21.48.22.147"><filename>anaconda-widgets-devel-21.48.22.147-1.sl7.x86_64.rpm</filename><sum type="sha256">b1a41d9e1a2430d544dfe61f04b3498e96bac124fee33e9ec01fa10babbd5129</sum></package><package arch="x86_64" name="anaconda-core" release="1.sl7" src="anaconda-21.48.22.147-1.sl7.src.rpm" version="21.48.22.147"><filename>anaconda-core-21.48.22.147-1.sl7.x86_64.rpm</filename><sum type="sha256">c5c244ff00f24158c4ca0930a6a3b37cb47bc22455c59e9e265fb4ad6dd3308f</sum></package><package arch="x86_64" name="anaconda-widgets" release="1.sl7" src="anaconda-21.48.22.147-1.sl7.src.rpm" version="21.48.22.147"><filename>anaconda-widgets-21.48.22.147-1.sl7.x86_64.rpm</filename><sum type="sha256">40f09f0a319df1105fb9c5951f591e782201d21217ca7d35ac25b068a347da92</sum></package><package arch="x86_64" name="anaconda-dracut" release="1.sl7" src="anaconda-21.48.22.147-1.sl7.src.rpm" version="21.48.22.147"><filename>anaconda-dracut-21.48.22.147-1.sl7.x86_64.rpm</filename><sum type="sha256">3b887f4814a482e941c4dd83d8345d5b992392eeb2b2e103ee2b7b1402f2a775</sum></package><package arch="x86_64" name="anaconda" release="1.sl7" src="anaconda-21.48.22.147-1.sl7.src.rpm" version="21.48.22.147"><filename>anaconda-21.48.22.147-1.sl7.x86_64.rpm</filename><sum type="sha256">0c5c493dc4b329e59c4eb3b5fcb9f99db75fe6f0066b842a75b010540a77dcd4</sum></package><package arch="x86_64" name="anaconda-tui" release="1.sl7" src="anaconda-21.48.22.147-1.sl7.src.rpm" version="21.48.22.147"><filename>anaconda-tui-21.48.22.147-1.sl7.x86_64.rpm</filename><sum type="sha256">6eb21f270483024125cbb3c990980f37f10d8e4a1f743db724e487a6b2311879</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3035" id="RHBA-2018:3035-1" title="Rhba-2018:3035-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3053-1</id><title>Libldb Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libldb-devel" release="1.el7" src="libldb-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>libldb-devel-1.3.4-1.el7.i686.rpm</filename><sum type="sha256">f0a03ff0c8f8182b0ff98e11229ce12764c07e476124e6ce40c262f1d5bb3486</sum></package><package arch="x86_64" name="pyldb" release="1.el7" src="libldb-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>pyldb-1.3.4-1.el7.x86_64.rpm</filename><sum type="sha256">911ea1c8e8bd3676f62d7b2aef1a64252f4808c50b0a2e9bcc417c299bdc394b</sum></package><package arch="i686" name="libldb" release="1.el7" src="libldb-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>libldb-1.3.4-1.el7.i686.rpm</filename><sum type="sha256">929031f37550440baea8f8e5f32c74bf165a8b92b10156407eaa9fcbef977d28</sum></package><package arch="x86_64" name="libldb-devel" release="1.el7" src="libldb-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>libldb-devel-1.3.4-1.el7.x86_64.rpm</filename><sum type="sha256">8c6df38e77ec42c9acad410d4083c5e45b7f1277b6a10670d087cd1047c399b8</sum></package><package arch="i686" name="pyldb" release="1.el7" src="libldb-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>pyldb-1.3.4-1.el7.i686.rpm</filename><sum type="sha256">2e3e68a1356a16dbb4a28517a743b48f51e768e52dc41e55eaea6fab9a5ed961</sum></package><package arch="x86_64" name="ldb-tools" release="1.el7" src="libldb-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>ldb-tools-1.3.4-1.el7.x86_64.rpm</filename><sum type="sha256">01bf1af242fd06947a389cedd1ad5d2807a5029f30020a1616ef62ef0a954d6a</sum></package><package arch="x86_64" name="libldb" release="1.el7" src="libldb-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>libldb-1.3.4-1.el7.x86_64.rpm</filename><sum type="sha256">e654d5f0d7b6db9561e35566c89355f4577feede455b503cb8347d83b82d2bde</sum></package><package arch="x86_64" name="pyldb-devel" release="1.el7" src="libldb-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>pyldb-devel-1.3.4-1.el7.x86_64.rpm</filename><sum type="sha256">58424b3718aa537415f59ef293a6881057017b4757290af30803a0dfc134720f</sum></package><package arch="i686" name="pyldb-devel" release="1.el7" src="libldb-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>pyldb-devel-1.3.4-1.el7.i686.rpm</filename><sum type="sha256">b667baa29627a17ff041c8ed3532f7fc0ddd65be3d542c5048d6c3ecc2e9ab4f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3053" id="RHBA-2018:3053-1" title="Rhba-2018:3053-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3077-1</id><title>Libsepol Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libsepol-static" release="10.el7" src="libsepol-2.5-10.el7.src.rpm" version="2.5"><filename>libsepol-static-2.5-10.el7.x86_64.rpm</filename><sum type="sha256">6914733d6ce9daa42e4b2fe72afb8b4e7a8d7cdebd07714c69e1436aa0eb22b0</sum></package><package arch="i686" name="libsepol-static" release="10.el7" src="libsepol-2.5-10.el7.src.rpm" version="2.5"><filename>libsepol-static-2.5-10.el7.i686.rpm</filename><sum type="sha256">2b6df625838b59276d23e2eb0ebf9cb11ca4737cf7b6748724589e56a434e65d</sum></package><package arch="i686" name="libsepol-devel" release="10.el7" src="libsepol-2.5-10.el7.src.rpm" version="2.5"><filename>libsepol-devel-2.5-10.el7.i686.rpm</filename><sum type="sha256">e36635c4e8aba14d6144afb007f33e43a236d60bcd8dcc0748a89ee72712b564</sum></package><package arch="i686" name="libsepol" release="10.el7" src="libsepol-2.5-10.el7.src.rpm" version="2.5"><filename>libsepol-2.5-10.el7.i686.rpm</filename><sum type="sha256">7b1e9b61ac3dbe6934b030b58e90f289333ea9136444556f23b5362688adc137</sum></package><package arch="x86_64" name="libsepol" release="10.el7" src="libsepol-2.5-10.el7.src.rpm" version="2.5"><filename>libsepol-2.5-10.el7.x86_64.rpm</filename><sum type="sha256">d9d361483251f55599125a437f53218e625a72bc5f5f9fa86cdc28ca2bef8843</sum></package><package arch="x86_64" name="libsepol-devel" release="10.el7" src="libsepol-2.5-10.el7.src.rpm" version="2.5"><filename>libsepol-devel-2.5-10.el7.x86_64.rpm</filename><sum type="sha256">ee1d6129bdc8cf12ea09bb38afcdad29adf2252fda1d478fecf649b95e52a840</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3077" id="RHBA-2018:3077-1" title="Rhba-2018:3077-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3078-1</id><title>Sane-Backends Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="sane-backends-devel" release="12.el7" src="sane-backends-1.0.24-12.el7.src.rpm" version="1.0.24"><filename>sane-backends-devel-1.0.24-12.el7.i686.rpm</filename><sum type="sha256">49652f365722cae39f6e0859814ceacecdfb84b040d70d08e90834b34fba26bf</sum></package><package arch="i686" name="sane-backends-drivers-scanners" release="12.el7" src="sane-backends-1.0.24-12.el7.src.rpm" version="1.0.24"><filename>sane-backends-drivers-scanners-1.0.24-12.el7.i686.rpm</filename><sum type="sha256">c8bbcd48c77d780d645ea9506d4ca3268ce6812fa6e42d846fb4eec98f49a352</sum></package><package arch="x86_64" name="sane-backends-devel" release="12.el7" src="sane-backends-1.0.24-12.el7.src.rpm" version="1.0.24"><filename>sane-backends-devel-1.0.24-12.el7.x86_64.rpm</filename><sum type="sha256">ff42ed07fb777bc0f9fd492147c359d686201275135fc5b73b305fe520e23ef3</sum></package><package arch="x86_64" name="sane-backends-drivers-cameras" release="12.el7" src="sane-backends-1.0.24-12.el7.src.rpm" version="1.0.24"><filename>sane-backends-drivers-cameras-1.0.24-12.el7.x86_64.rpm</filename><sum type="sha256">e4574151318c79cd83fcccb805555899e8608ab0851df5b8a2b06964325c0887</sum></package><package arch="i686" name="sane-backends-libs" release="12.el7" src="sane-backends-1.0.24-12.el7.src.rpm" version="1.0.24"><filename>sane-backends-libs-1.0.24-12.el7.i686.rpm</filename><sum type="sha256">876cec0f128082992f12d7d341bd0993217863db06a18be831127d0cbd12cf28</sum></package><package arch="noarch" name="sane-backends-doc" release="12.el7" src="sane-backends-1.0.24-12.el7.src.rpm" version="1.0.24"><filename>sane-backends-doc-1.0.24-12.el7.noarch.rpm</filename><sum type="sha256">8cd657bed8166e8840956af02f153e1abad1b21eaeed17a610fc3d979efb7381</sum></package><package arch="x86_64" name="sane-backends-drivers-scanners" release="12.el7" src="sane-backends-1.0.24-12.el7.src.rpm" version="1.0.24"><filename>sane-backends-drivers-scanners-1.0.24-12.el7.x86_64.rpm</filename><sum type="sha256">62673df58e1aa3c93d1a49802c7ade4a9e6ad4bbcf5fedc1fddec90306a07e38</sum></package><package arch="x86_64" name="sane-backends" release="12.el7" src="sane-backends-1.0.24-12.el7.src.rpm" version="1.0.24"><filename>sane-backends-1.0.24-12.el7.x86_64.rpm</filename><sum type="sha256">620edec6344cbd8ed78f2f7f59f1a586c25e796dd26ee2548ff94209b38759a2</sum></package><package arch="i686" name="sane-backends-drivers-cameras" release="12.el7" src="sane-backends-1.0.24-12.el7.src.rpm" version="1.0.24"><filename>sane-backends-drivers-cameras-1.0.24-12.el7.i686.rpm</filename><sum type="sha256">8dd3e220397f348cb2f8d652f472da2f41f1c9ecc0d764d290f2d8230f6976af</sum></package><package arch="x86_64" name="sane-backends-libs" release="12.el7" src="sane-backends-1.0.24-12.el7.src.rpm" version="1.0.24"><filename>sane-backends-libs-1.0.24-12.el7.x86_64.rpm</filename><sum type="sha256">382171e3082c6c38119612c2b900e52f68dbb1794f449c293b204614c49035a7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3078" id="RHBA-2018:3078-1" title="Rhba-2018:3078-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3084-1</id><title>Libselinux Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libselinux-ruby" release="14.1.el7" src="libselinux-2.5-14.1.el7.src.rpm" version="2.5"><filename>libselinux-ruby-2.5-14.1.el7.x86_64.rpm</filename><sum type="sha256">d600fbf1d2e4c6af90faf1835cbc49e531a02435706a35491c1b75fbf8e834b4</sum></package><package arch="x86_64" name="libselinux-devel" release="14.1.el7" src="libselinux-2.5-14.1.el7.src.rpm" version="2.5"><filename>libselinux-devel-2.5-14.1.el7.x86_64.rpm</filename><sum type="sha256">1942a8ff6cee06178ffa7ea68104915e977a82ab7a83374def2c110fcb0f99fc</sum></package><package arch="x86_64" name="libselinux-utils" release="14.1.el7" src="libselinux-2.5-14.1.el7.src.rpm" version="2.5"><filename>libselinux-utils-2.5-14.1.el7.x86_64.rpm</filename><sum type="sha256">bc9bd2e47a059397cf87ee9c4ec74cf23b890a86f5b5f6e16370f369105af74b</sum></package><package arch="x86_64" name="libselinux-python" release="14.1.el7" src="libselinux-2.5-14.1.el7.src.rpm" version="2.5"><filename>libselinux-python-2.5-14.1.el7.x86_64.rpm</filename><sum type="sha256">c2f456c5cb8105dd2717e89e12ee4c0b064291da2c3c621c642c89f8dabff88b</sum></package><package arch="i686" name="libselinux" release="14.1.el7" src="libselinux-2.5-14.1.el7.src.rpm" version="2.5"><filename>libselinux-2.5-14.1.el7.i686.rpm</filename><sum type="sha256">54e7c2f7705ca040af396fac97b799212d362ebc315158e35266d2223e77d780</sum></package><package arch="i686" name="libselinux-static" release="14.1.el7" src="libselinux-2.5-14.1.el7.src.rpm" version="2.5"><filename>libselinux-static-2.5-14.1.el7.i686.rpm</filename><sum type="sha256">38648717a4a0ebd1a47c3d3d8e8e89c7f2960cfce1d1be098c98d3156b02068b</sum></package><package arch="x86_64" name="libselinux-static" release="14.1.el7" src="libselinux-2.5-14.1.el7.src.rpm" version="2.5"><filename>libselinux-static-2.5-14.1.el7.x86_64.rpm</filename><sum type="sha256">377da9fb29e4be1d4f433e51f4d2d6435d529e1501c7cebd4ada3ecadc3bb54e</sum></package><package arch="x86_64" name="libselinux" release="14.1.el7" src="libselinux-2.5-14.1.el7.src.rpm" version="2.5"><filename>libselinux-2.5-14.1.el7.x86_64.rpm</filename><sum type="sha256">e9701910e9dc7c4b5f173978f3cb8879b3b26286b0abe5843fba0de5c1198bd3</sum></package><package arch="i686" name="libselinux-devel" release="14.1.el7" src="libselinux-2.5-14.1.el7.src.rpm" version="2.5"><filename>libselinux-devel-2.5-14.1.el7.i686.rpm</filename><sum type="sha256">a389a779f0719f647bd00acd3f75cd20c71ea30eb4b857d0224c45c4e12aa289</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3084" id="RHBA-2018:3084-1" title="Rhba-2018:3084-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3088-1</id><title>Libsemanage Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libsemanage" release="14.el7" src="libsemanage-2.5-14.el7.src.rpm" version="2.5"><filename>libsemanage-2.5-14.el7.x86_64.rpm</filename><sum type="sha256">56266e2b40fb52a079c95636bf5e0f23d651a3bb60b55c71e60810007a314cde</sum></package><package arch="x86_64" name="libsemanage-static" release="14.el7" src="libsemanage-2.5-14.el7.src.rpm" version="2.5"><filename>libsemanage-static-2.5-14.el7.x86_64.rpm</filename><sum type="sha256">4e1b77b4d608fd1fb696d19ab48cb5422a9005e180f3e673392adbfdb34ea24c</sum></package><package arch="i686" name="libsemanage-static" release="14.el7" src="libsemanage-2.5-14.el7.src.rpm" version="2.5"><filename>libsemanage-static-2.5-14.el7.i686.rpm</filename><sum type="sha256">2c5f2f18c9ca47aea2615e4c4f4d7953442085c0df42c87de66f2493666cfa06</sum></package><package arch="i686" name="libsemanage-devel" release="14.el7" src="libsemanage-2.5-14.el7.src.rpm" version="2.5"><filename>libsemanage-devel-2.5-14.el7.i686.rpm</filename><sum type="sha256">995490631249345db9a809e4983df78da5676fc96e4bf86b13a165c5aae8896c</sum></package><package arch="x86_64" name="libsemanage-python" release="14.el7" src="libsemanage-2.5-14.el7.src.rpm" version="2.5"><filename>libsemanage-python-2.5-14.el7.x86_64.rpm</filename><sum type="sha256">3f85683b6caecf4995eb6311d3560cf1de24586fc0a626c2df5628f6441361f5</sum></package><package arch="x86_64" name="libsemanage-devel" release="14.el7" src="libsemanage-2.5-14.el7.src.rpm" version="2.5"><filename>libsemanage-devel-2.5-14.el7.x86_64.rpm</filename><sum type="sha256">3274d7d47864e339c34472a824facf9b2f232b82c290cae960386b660faeac8a</sum></package><package arch="i686" name="libsemanage" release="14.el7" src="libsemanage-2.5-14.el7.src.rpm" version="2.5"><filename>libsemanage-2.5-14.el7.i686.rpm</filename><sum type="sha256">ff3484d5288ea0a8bd98c740bd45b065833c7c318bb3d68dd520eabcaef209ac</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3088" id="RHBA-2018:3088-1" title="Rhba-2018:3088-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3091-1</id><title>Setools Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="setools-devel" release="4.el7" src="setools-3.3.8-4.el7.src.rpm" version="3.3.8"><filename>setools-devel-3.3.8-4.el7.i686.rpm</filename><sum type="sha256">023ab145c0d3b1d35a57097f772014a6d29b8eb886efba168799f759deb5c185</sum></package><package arch="x86_64" name="setools-libs" release="4.el7" src="setools-3.3.8-4.el7.src.rpm" version="3.3.8"><filename>setools-libs-3.3.8-4.el7.x86_64.rpm</filename><sum type="sha256">f99f30e4053f7f425761c2391ce15b8761e2bc0ef394f2b3a126f8cab2bd525b</sum></package><package arch="i686" name="setools-libs" release="4.el7" src="setools-3.3.8-4.el7.src.rpm" version="3.3.8"><filename>setools-libs-3.3.8-4.el7.i686.rpm</filename><sum type="sha256">90793a1fb96779fd5f8e08f882f20e8e956d82da1db7f567abbebdb8cf639c23</sum></package><package arch="x86_64" name="setools-devel" release="4.el7" src="setools-3.3.8-4.el7.src.rpm" version="3.3.8"><filename>setools-devel-3.3.8-4.el7.x86_64.rpm</filename><sum type="sha256">490c2e4886ad1fe928a6290752b80df627109f3fc7ecf67ea1dfb7c4e7790fd0</sum></package><package arch="x86_64" name="setools" release="4.el7" src="setools-3.3.8-4.el7.src.rpm" version="3.3.8"><filename>setools-3.3.8-4.el7.x86_64.rpm</filename><sum type="sha256">991cd06d55f7bb3be771aab1d2bdeb5421a5819337c81793bae252173717c28e</sum></package><package arch="x86_64" name="setools-libs-tcl" release="4.el7" src="setools-3.3.8-4.el7.src.rpm" version="3.3.8"><filename>setools-libs-tcl-3.3.8-4.el7.x86_64.rpm</filename><sum type="sha256">86e46157df566b391340d8db3dcbd37fe15ddb296a89e388a4f7c8da98af2001</sum></package><package arch="x86_64" name="setools-gui" release="4.el7" src="setools-3.3.8-4.el7.src.rpm" version="3.3.8"><filename>setools-gui-3.3.8-4.el7.x86_64.rpm</filename><sum type="sha256">3e50fd93271551bd5930c4de99620d66a717cb796e82515f649cf2a7565ea21c</sum></package><package arch="x86_64" name="setools-console" release="4.el7" src="setools-3.3.8-4.el7.src.rpm" version="3.3.8"><filename>setools-console-3.3.8-4.el7.x86_64.rpm</filename><sum type="sha256">50874908f3c4ec3b99cc2215d00bd44c8717afaec606191c935b845dee3ad69a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3091" id="RHBA-2018:3091-1" title="Rhba-2018:3091-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3094-1</id><title>Vdo Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="vdo" release="3.el7" src="vdo-6.1.1.125-3.el7.src.rpm" version="6.1.1.125"><filename>vdo-6.1.1.125-3.el7.x86_64.rpm</filename><sum type="sha256">d407a33cd4a56ada8ae12e69585410e216f14771fcc2845c04ea7a512f3d5a23</sum></package><package arch="x86_64" name="kmod-kvdo" release="5.el7" src="kmod-kvdo-6.1.1.125-5.el7.src.rpm" version="6.1.1.125"><filename>kmod-kvdo-6.1.1.125-5.el7.x86_64.rpm</filename><sum type="sha256">4a2d38447081a894438eca1317e7d8fe47de73a6664b312ee5de7e3ee0c3733a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3094" id="RHBA-2018:3094-1" title="Rhba-2018:3094-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3098-1</id><title>Policycoreutils Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="policycoreutils-devel" release="29.el7" src="policycoreutils-2.5-29.el7.src.rpm" version="2.5"><filename>policycoreutils-devel-2.5-29.el7.x86_64.rpm</filename><sum type="sha256">62a937a25e9071ed21516c6765c7a8b0b5d0dc73296d986f60d62a76091ce1a7</sum></package><package arch="x86_64" name="policycoreutils-restorecond" release="29.el7" src="policycoreutils-2.5-29.el7.src.rpm" version="2.5"><filename>policycoreutils-restorecond-2.5-29.el7.x86_64.rpm</filename><sum type="sha256">f0c276132d98b656724dc1e7415ab32d5a32eb0dbe859065e0fbd5ae0e1f0ba6</sum></package><package arch="x86_64" name="policycoreutils" release="29.el7" src="policycoreutils-2.5-29.el7.src.rpm" version="2.5"><filename>policycoreutils-2.5-29.el7.x86_64.rpm</filename><sum type="sha256">cf131bce8fe5f59cc0bfe1f446d4fb2a7098d9e26c4a3b38fcc3eddb340a5b79</sum></package><package arch="x86_64" name="policycoreutils-sandbox" release="29.el7" src="policycoreutils-2.5-29.el7.src.rpm" version="2.5"><filename>policycoreutils-sandbox-2.5-29.el7.x86_64.rpm</filename><sum type="sha256">5e677ef4687c0d452e910d41d33805609e2799a766de82323d4099d63179a766</sum></package><package arch="i686" name="policycoreutils-devel" release="29.el7" src="policycoreutils-2.5-29.el7.src.rpm" version="2.5"><filename>policycoreutils-devel-2.5-29.el7.i686.rpm</filename><sum type="sha256">6482967946b340ea67bfd398d8939115902ec754d9ce2503dc56fc8d2e4830f3</sum></package><package arch="x86_64" name="policycoreutils-newrole" release="29.el7" src="policycoreutils-2.5-29.el7.src.rpm" version="2.5"><filename>policycoreutils-newrole-2.5-29.el7.x86_64.rpm</filename><sum type="sha256">c4d2265c95d2bad9473bbfd5dfa5a00aa4dfeb5d8e6c17dcd5ce196ae1d1d69c</sum></package><package arch="x86_64" name="policycoreutils-python" release="29.el7" src="policycoreutils-2.5-29.el7.src.rpm" version="2.5"><filename>policycoreutils-python-2.5-29.el7.x86_64.rpm</filename><sum type="sha256">b5d465d78ab96342236f400c5e73075692968aeedba85d0c12b2e4b784456fc3</sum></package><package arch="x86_64" name="policycoreutils-gui" release="29.el7" src="policycoreutils-2.5-29.el7.src.rpm" version="2.5"><filename>policycoreutils-gui-2.5-29.el7.x86_64.rpm</filename><sum type="sha256">89ead09a968f37b1484a83f9a9b6bb8699e877bf371468af7e2d76b9e5161ffb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3098" id="RHBA-2018:3098-1" title="Rhba-2018:3098-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3099-1</id><title>Checkpolicy Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="checkpolicy" release="8.el7" src="checkpolicy-2.5-8.el7.src.rpm" version="2.5"><filename>checkpolicy-2.5-8.el7.x86_64.rpm</filename><sum type="sha256">ab76d5d3f7b5713747da2f04d2660e9877c93565859926208e1077acd0a1cf82</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3099" id="RHBA-2018:3099-1" title="Rhba-2018:3099-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3111-1</id><title>Selinux-Policy Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy" release="229.el7" src="selinux-policy-3.13.1-229.el7.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-229.el7.noarch.rpm</filename><sum type="sha256">53b1dfec382144e100ead95576bee7a5db6c460f7224de23ecd8e1110bb26e34</sum></package><package arch="noarch" name="selinux-policy-devel" release="229.el7" src="selinux-policy-3.13.1-229.el7.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-229.el7.noarch.rpm</filename><sum type="sha256">c7e71e95bfb58f1677a134b2ab282fbd74c0ec98f9194113f1dbb7c59d973694</sum></package><package arch="noarch" name="selinux-policy-doc" release="229.el7" src="selinux-policy-3.13.1-229.el7.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-229.el7.noarch.rpm</filename><sum type="sha256">5c3a33b1e1e13e5637fa22df0cfc6cc0b68262750d89477d36c40f621661d0d7</sum></package><package arch="noarch" name="selinux-policy-targeted" release="229.el7" src="selinux-policy-3.13.1-229.el7.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-229.el7.noarch.rpm</filename><sum type="sha256">074a3cf4aee88e83964711c4f4dc1371cfe21146a4bf0e5421c7c91058d78789</sum></package><package arch="noarch" name="selinux-policy-mls" release="229.el7" src="selinux-policy-3.13.1-229.el7.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-229.el7.noarch.rpm</filename><sum type="sha256">fab58f074fdab01d6443ca5c78c158724d3e843232182064f4f6f21b1de8cc24</sum></package><package arch="noarch" name="selinux-policy-sandbox" release="229.el7" src="selinux-policy-3.13.1-229.el7.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-229.el7.noarch.rpm</filename><sum type="sha256">91f63d5bd45dfd35b725c050586571b2e88291f745d4901bd12fc17692387e16</sum></package><package arch="noarch" name="selinux-policy-minimum" release="229.el7" src="selinux-policy-3.13.1-229.el7.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-229.el7.noarch.rpm</filename><sum type="sha256">c20c4438ae7c039f6383bd7b3299f26a08ac206c8326d374f0a9e7508556486d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3111" id="RHBA-2018:3111-1" title="Rhba-2018:3111-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3119-1</id><title>Linux-Firmware Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="iwl3945-firmware" release="69.el7" src="linux-firmware-20180911-69.git85c5d90.el7.src.rpm" version="15.32.2.9"><filename>iwl3945-firmware-15.32.2.9-69.el7.noarch.rpm</filename><sum type="sha256">ed879e0fd2bb46a909fd32359bffd6d64a0f27696265c6c6f2f9c540d952961f</sum></package><package arch="noarch" name="iwl6000g2b-firmware" release="69.el7" src="linux-firmware-20180911-69.git85c5d90.el7.src.rpm" version="17.168.5.2"><filename>iwl6000g2b-firmware-17.168.5.2-69.el7.noarch.rpm</filename><sum type="sha256">7fbc6a08dbc2b3871922189a13591b7a6959b5460eafeb97b4e8330d30b7c602</sum></package><package arch="noarch" name="iwl7265-firmware" release="69.el7" src="linux-firmware-20180911-69.git85c5d90.el7.src.rpm" version="22.0.7.0"><filename>iwl7265-firmware-22.0.7.0-69.el7.noarch.rpm</filename><sum type="sha256">d7dbe3be898a24989a934da539834409e28ba977eef0b4202c71dece556a59c7</sum></package><package arch="noarch" name="iwl100-firmware" release="69.el7" src="linux-firmware-20180911-69.git85c5d90.el7.src.rpm" version="39.31.5.1"><filename>iwl100-firmware-39.31.5.1-69.el7.noarch.rpm</filename><sum type="sha256">7a50fda0ade266a549fb8189d0343ff717a7eccb5ea5ea48f4b3830f8f5906a5</sum></package><package arch="noarch" name="iwl5000-firmware" release="69.el7" src="linux-firmware-20180911-69.git85c5d90.el7.src.rpm" version="8.83.5.1_1"><filename>iwl5000-firmware-8.83.5.1_1-69.el7.noarch.rpm</filename><sum type="sha256">7e81492cd69bd41a2617272619e915c0ec57436980fd009b919a71d40c0682bd</sum></package><package arch="noarch" name="iwl6050-firmware" release="69.el7" src="linux-firmware-20180911-69.git85c5d90.el7.src.rpm" version="41.28.5.1"><filename>iwl6050-firmware-41.28.5.1-69.el7.noarch.rpm</filename><sum type="sha256">94f03907165e454c9662ce2371b72423619fbd29c14c47b3ef58b7a3120e5be9</sum></package><package arch="noarch" name="iwl4965-firmware" release="69.el7" src="linux-firmware-20180911-69.git85c5d90.el7.src.rpm" version="228.61.2.24"><filename>iwl4965-firmware-228.61.2.24-69.el7.noarch.rpm</filename><sum type="sha256">bae20900f3dcb6bc0d1579888ff2f25367428f1ecfe86e57c1b59a6843f96494</sum></package><package arch="noarch" name="iwl135-firmware" release="69.el7" src="linux-firmware-20180911-69.git85c5d90.el7.src.rpm" version="18.168.6.1"><filename>iwl135-firmware-18.168.6.1-69.el7.noarch.rpm</filename><sum type="sha256">3657d4219460a4cfe159e7d1c4acb45a9719d4a834c1d957e0514fc7c6c54014</sum></package><package arch="noarch" name="iwl5150-firmware" release="69.el7" src="linux-firmware-20180911-69.git85c5d90.el7.src.rpm" version="8.24.2.2"><filename>iwl5150-firmware-8.24.2.2-69.el7.noarch.rpm</filename><sum type="sha256">8d50c4e13584dc0acb80cfb1771a1bc08c91d3099345367d775bcb6c43ff6694</sum></package><package arch="noarch" name="iwl105-firmware" release="69.el7" src="linux-firmware-20180911-69.git85c5d90.el7.src.rpm" version="18.168.6.1"><filename>iwl105-firmware-18.168.6.1-69.el7.noarch.rpm</filename><sum type="sha256">7393b8c1c3b2223cb4937b7fb6821284c59f86c104e0f602363fd5af1a291bf5</sum></package><package arch="noarch" name="linux-firmware" release="69.git85c5d90.el7" src="linux-firmware-20180911-69.git85c5d90.el7.src.rpm" version="20180911"><filename>linux-firmware-20180911-69.git85c5d90.el7.noarch.rpm</filename><sum type="sha256">74685bd4fa26b55e242a155973ff4be3285163d972ae160fd2b4fdf54ec373e8</sum></package><package arch="noarch" name="iwl2030-firmware" release="69.el7" src="linux-firmware-20180911-69.git85c5d90.el7.src.rpm" version="18.168.6.1"><filename>iwl2030-firmware-18.168.6.1-69.el7.noarch.rpm</filename><sum type="sha256">b7d8b3fae2528309e60945c05bb0863d0070cdb08fe6af0358aba7ff31cef3c8</sum></package><package arch="noarch" name="iwl7260-firmware" release="69.el7" src="linux-firmware-20180911-69.git85c5d90.el7.src.rpm" version="22.0.7.0"><filename>iwl7260-firmware-22.0.7.0-69.el7.noarch.rpm</filename><sum type="sha256">01dc9fc872cddc0831fe0499139cc7aab31fbe398199492fec60354b930ba603</sum></package><package arch="noarch" epoch="1" name="iwl1000-firmware" release="69.el7" src="linux-firmware-20180911-69.git85c5d90.el7.src.rpm" version="39.31.5.1"><filename>iwl1000-firmware-39.31.5.1-69.el7.noarch.rpm</filename><sum type="sha256">cdbdc852e3c6025c6719260a10bb1bba6806593fda75b34cdc609532b9afbc1c</sum></package><package arch="noarch" name="iwl6000-firmware" release="69.el7" src="linux-firmware-20180911-69.git85c5d90.el7.src.rpm" version="9.221.4.1"><filename>iwl6000-firmware-9.221.4.1-69.el7.noarch.rpm</filename><sum type="sha256">b6cc20a4840ff37f006465321fae4a6c53b1a26418b1a6f40386921d04014abd</sum></package><package arch="noarch" name="iwl2000-firmware" release="69.el7" src="linux-firmware-20180911-69.git85c5d90.el7.src.rpm" version="18.168.6.1"><filename>iwl2000-firmware-18.168.6.1-69.el7.noarch.rpm</filename><sum type="sha256">e7ee7bf23fac82488ecec18aa673eb716677d3e6d32442856db1ae0406f17fe0</sum></package><package arch="noarch" name="iwl6000g2a-firmware" release="69.el7" src="linux-firmware-20180911-69.git85c5d90.el7.src.rpm" version="17.168.5.3"><filename>iwl6000g2a-firmware-17.168.5.3-69.el7.noarch.rpm</filename><sum type="sha256">31348692cdb085c7e44138d6ed560fdcdd94e6a143952c8df876facf41f1b89e</sum></package><package arch="noarch" name="iwl3160-firmware" release="69.el7" src="linux-firmware-20180911-69.git85c5d90.el7.src.rpm" version="22.0.7.0"><filename>iwl3160-firmware-22.0.7.0-69.el7.noarch.rpm</filename><sum type="sha256">b87c09be386a483e3ed09eb9f98d1414a8eded2515bdafd8abbc8d7842cf8f6d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3119" id="RHBA-2018:3119-1" title="Rhba-2018:3119-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3123-1</id><title>Python-S3Transfer Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-s3transfer" release="1.el7" src="python-s3transfer-0.1.13-1.el7.src.rpm" version="0.1.13"><filename>python-s3transfer-0.1.13-1.el7.noarch.rpm</filename><sum type="sha256">94c4acb447f3c4f5b0b7c64f0aa8e1c35389b4a28915ae70a54c90b51c839f00</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3123" id="RHBA-2018:3123-1" title="Rhba-2018:3123-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3124-1</id><title>Python-Boto3 Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-boto3" release="5.el7" src="python-boto3-1.4.6-5.el7.src.rpm" version="1.4.6"><filename>python-boto3-1.4.6-5.el7.noarch.rpm</filename><sum type="sha256">ab7b47c606639371efd13dd592cb426252f9c7d0f9ca590cc4a6688f5631fc3c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3124" id="RHBA-2018:3124-1" title="Rhba-2018:3124-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3160-1</id><title>Ding-Libs Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libpath_utils-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.2.1"><filename>libpath_utils-devel-0.2.1-32.el7.i686.rpm</filename><sum type="sha256">fddec707e075300ef26d09606007fc681ba4e8e3765ded5ab7bc12d8db5c2b66</sum></package><package arch="x86_64" name="libini_config" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="1.3.1"><filename>libini_config-1.3.1-32.el7.x86_64.rpm</filename><sum type="sha256">d158dc00c3dd2b717b4c93c508d3529ec7af0e674b328878c16ed013d2ed1cfc</sum></package><package arch="x86_64" name="libini_config-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="1.3.1"><filename>libini_config-devel-1.3.1-32.el7.x86_64.rpm</filename><sum type="sha256">0adb92226545fcb9479639a961aefab3d5ca6031885fbdc5c9b8928e1c25099d</sum></package><package arch="i686" name="libcollection-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.7.0"><filename>libcollection-devel-0.7.0-32.el7.i686.rpm</filename><sum type="sha256">079e78887385d4983297bc946a5ca1a39fb43c64bfdf2765bd7984fb6e30af2e</sum></package><package arch="i686" name="libref_array-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.1.5"><filename>libref_array-devel-0.1.5-32.el7.i686.rpm</filename><sum type="sha256">1cc9bf073c4b9ccf470b2ca1e82a5156b5332be9145df0f7e8c02a30775b4437</sum></package><package arch="i686" name="libdhash-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.5.0"><filename>libdhash-devel-0.5.0-32.el7.i686.rpm</filename><sum type="sha256">ec4d4c13501046db18518b9ffa9a49965b5daaf143374b2b102ef90a274b5657</sum></package><package arch="i686" name="libdhash" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.5.0"><filename>libdhash-0.5.0-32.el7.i686.rpm</filename><sum type="sha256">74f66387878ac180d4ff009c199cbc8b53ffdb0497d18d3d1ee038ab4749b236</sum></package><package arch="i686" name="libref_array" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.1.5"><filename>libref_array-0.1.5-32.el7.i686.rpm</filename><sum type="sha256">12e0ed95d4c78d5a1d7d2f06b283d8886fbf097afb948553459348af14ce1b63</sum></package><package arch="i686" name="libini_config" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="1.3.1"><filename>libini_config-1.3.1-32.el7.i686.rpm</filename><sum type="sha256">079469d3f3928e17e4c2b2935cd611bd8fc4751ed82ecf272b4d265450fee2d8</sum></package><package arch="i686" name="libbasicobjects" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.1.1"><filename>libbasicobjects-0.1.1-32.el7.i686.rpm</filename><sum type="sha256">e5a8b867c63d89c45ad66978c3600144d5322484bbcdf1248369ec48102a7e45</sum></package><package arch="x86_64" name="libcollection" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.7.0"><filename>libcollection-0.7.0-32.el7.x86_64.rpm</filename><sum type="sha256">561d9dadfd4f6ed0bf1a880212515939d1cb0b0d470709a31c164d50509c75ab</sum></package><package arch="x86_64" name="libdhash" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.5.0"><filename>libdhash-0.5.0-32.el7.x86_64.rpm</filename><sum type="sha256">6ae27cc1d76de7eb2d83e44167fd2a86a91115e26b33db0ede20a3bf32315583</sum></package><package arch="i686" name="libcollection" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.7.0"><filename>libcollection-0.7.0-32.el7.i686.rpm</filename><sum type="sha256">05c21dd1bfbcc702f8680894ce141728d7a3be1de12917dca12165df2f8ae758</sum></package><package arch="x86_64" name="libcollection-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.7.0"><filename>libcollection-devel-0.7.0-32.el7.x86_64.rpm</filename><sum type="sha256">8f98fc629bbc82ebf27ad52a3a4746c15d544be93e03ed06acd3e8b61de77046</sum></package><package arch="i686" name="libbasicobjects-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.1.1"><filename>libbasicobjects-devel-0.1.1-32.el7.i686.rpm</filename><sum type="sha256">d757fa386123abc17785a2717e9429c5975be117da444c8ca2132c8aaf5626de</sum></package><package arch="x86_64" name="libbasicobjects" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.1.1"><filename>libbasicobjects-0.1.1-32.el7.x86_64.rpm</filename><sum type="sha256">28dcdfc925a1a7561726aade00b01595095a0c2213408144235159c64182441b</sum></package><package arch="x86_64" name="libpath_utils-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.2.1"><filename>libpath_utils-devel-0.2.1-32.el7.x86_64.rpm</filename><sum type="sha256">0d8b4c6480c24b608d358349918e31ea9f5c2e47699246e8ffdb384e70c7c465</sum></package><package arch="i686" name="libpath_utils" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.2.1"><filename>libpath_utils-0.2.1-32.el7.i686.rpm</filename><sum type="sha256">72aab9cf9d159dd5c8f41b7d1cd4ad7c2ae92974117c339a6def48ed6a0f020a</sum></package><package arch="x86_64" name="libref_array-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.1.5"><filename>libref_array-devel-0.1.5-32.el7.x86_64.rpm</filename><sum type="sha256">8807db32aae70ad79c17c208994f91e80ef24e2a45b246916696f4be7a7c68ef</sum></package><package arch="x86_64" name="libref_array" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.1.5"><filename>libref_array-0.1.5-32.el7.x86_64.rpm</filename><sum type="sha256">06c8183188dd5d9eba52048e387fce0f70f80cbb6b5dcb2e6a987471797c197f</sum></package><package arch="x86_64" name="libpath_utils" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.2.1"><filename>libpath_utils-0.2.1-32.el7.x86_64.rpm</filename><sum type="sha256">75566a4c7145b891a44a1d57e848387f0cc45a3e94adb258706d6057d16fa655</sum></package><package arch="x86_64" name="libdhash-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.5.0"><filename>libdhash-devel-0.5.0-32.el7.x86_64.rpm</filename><sum type="sha256">5caf696f1c475b0ace376d9bd4ef88369dcf927507c01edee3e71b4d2ec3e206</sum></package><package arch="i686" name="libini_config-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="1.3.1"><filename>libini_config-devel-1.3.1-32.el7.i686.rpm</filename><sum type="sha256">14be63b894aa62fab7b897e966592f49f7a078d76caa9caf5a7c47fe73c30496</sum></package><package arch="x86_64" name="libbasicobjects-devel" release="32.el7" src="ding-libs-0.6.1-32.el7.src.rpm" version="0.1.1"><filename>libbasicobjects-devel-0.1.1-32.el7.x86_64.rpm</filename><sum type="sha256">ac45cf9e2a5d1bb85249629100217f5a469e711537ea8b5f5c426838f30abec5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3160" id="RHBA-2018:3160-1" title="Rhba-2018:3160-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3165-1</id><title>Libsmbios Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="smbios-utils-bin" release="8.el7" src="libsmbios-2.3.3-8.el7.src.rpm" version="2.3.3"><filename>smbios-utils-bin-2.3.3-8.el7.x86_64.rpm</filename><sum type="sha256">c07fd09323d195a79d57f5df8727b6e89ef4116ebf274cf5dcc9b5a6e94c3078</sum></package><package arch="i686" name="libsmbios" release="8.el7" src="libsmbios-2.3.3-8.el7.src.rpm" version="2.3.3"><filename>libsmbios-2.3.3-8.el7.i686.rpm</filename><sum type="sha256">d6edc4043661f60e207efac880ea8528ab17bd53c4b35f226881ddbd05c42ec5</sum></package><package arch="x86_64" name="smbios-utils" release="8.el7" src="libsmbios-2.3.3-8.el7.src.rpm" version="2.3.3"><filename>smbios-utils-2.3.3-8.el7.x86_64.rpm</filename><sum type="sha256">4673ccb9c2ec6b7859148a6b46e7aecd9ced5c568b0360cfd7f4840131773004</sum></package><package arch="x86_64" name="libsmbios-devel" release="8.el7" src="libsmbios-2.3.3-8.el7.src.rpm" version="2.3.3"><filename>libsmbios-devel-2.3.3-8.el7.x86_64.rpm</filename><sum type="sha256">6a6e4d80b59d120168cf170f68b19f657e9e38dd2a5ccdebec8d54d16f5b5bec</sum></package><package arch="i686" name="libsmbios-devel" release="8.el7" src="libsmbios-2.3.3-8.el7.src.rpm" version="2.3.3"><filename>libsmbios-devel-2.3.3-8.el7.i686.rpm</filename><sum type="sha256">6a4b80193e02eb080c80fcca7e92b19bd61e6c24772f65dcf2514edfe63a652f</sum></package><package arch="x86_64" name="libsmbios" release="8.el7" src="libsmbios-2.3.3-8.el7.src.rpm" version="2.3.3"><filename>libsmbios-2.3.3-8.el7.x86_64.rpm</filename><sum type="sha256">d10515d8ee236186b1b51ffa49fa72841f15dad2087afcd7e3a913b8fa5694bc</sum></package><package arch="x86_64" name="smbios-utils-python" release="8.el7" src="libsmbios-2.3.3-8.el7.src.rpm" version="2.3.3"><filename>smbios-utils-python-2.3.3-8.el7.x86_64.rpm</filename><sum type="sha256">59bd12333de51f0919139fc783dfeabda8f214896bb25e7f3143f62f03ea4e42</sum></package><package arch="x86_64" name="python-smbios" release="8.el7" src="libsmbios-2.3.3-8.el7.src.rpm" version="2.3.3"><filename>python-smbios-2.3.3-8.el7.x86_64.rpm</filename><sum type="sha256">63f7e2df5f3bb4082b73d2b5cd6a507cfca261c033629780aa4f3145015432de</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3165" id="RHBA-2018:3165-1" title="Rhba-2018:3165-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3187-1</id><title>Ipa Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ipa-server-dns" release="10.sl7" src="ipa-4.6.4-10.sl7.src.rpm" version="4.6.4"><filename>ipa-server-dns-4.6.4-10.sl7.noarch.rpm</filename><sum type="sha256">c69645a6a868ea43b32315e95f72462070d37dcf1e887c6e17be7349e7853cc0</sum></package><package arch="noarch" name="python2-ipaclient" release="10.sl7" src="ipa-4.6.4-10.sl7.src.rpm" version="4.6.4"><filename>python2-ipaclient-4.6.4-10.sl7.noarch.rpm</filename><sum type="sha256">ef7bcee8068a25f1308589542a81a53d55adac4927f5217f6c5de48e99451052</sum></package><package arch="noarch" name="python2-ipaserver" release="10.sl7" src="ipa-4.6.4-10.sl7.src.rpm" version="4.6.4"><filename>python2-ipaserver-4.6.4-10.sl7.noarch.rpm</filename><sum type="sha256">c8be861e87295a283fa22f6d47003afce2d1af53daa6f03ff03aa5e339baf146</sum></package><package arch="noarch" name="ipa-client-common" release="10.sl7" src="ipa-4.6.4-10.sl7.src.rpm" version="4.6.4"><filename>ipa-client-common-4.6.4-10.sl7.noarch.rpm</filename><sum type="sha256">4e6cf298061e5aed0eb602d3389189d0663f630d77b48e23b3fcdac8457938d3</sum></package><package arch="noarch" name="ipa-common" release="10.sl7" src="ipa-4.6.4-10.sl7.src.rpm" version="4.6.4"><filename>ipa-common-4.6.4-10.sl7.noarch.rpm</filename><sum type="sha256">ffc44619859dc1067e65fd3a5ffa169784ce1c1c8acfa9a13e887385c1fe8840</sum></package><package arch="x86_64" name="ipa-client" release="10.sl7" src="ipa-4.6.4-10.sl7.src.rpm" version="4.6.4"><filename>ipa-client-4.6.4-10.sl7.x86_64.rpm</filename><sum type="sha256">63afedc270d7d87d751df8a0f5b36650022614697a9f07da0f62fcb8ba8b3095</sum></package><package arch="x86_64" name="ipa-server" release="10.sl7" src="ipa-4.6.4-10.sl7.src.rpm" version="4.6.4"><filename>ipa-server-4.6.4-10.sl7.x86_64.rpm</filename><sum type="sha256">5960a1d7d4767a1f5fd38ca4f7d3dc20c3af39416a48e16570ef500ccb28670b</sum></package><package arch="noarch" name="ipa-server-common" release="10.sl7" src="ipa-4.6.4-10.sl7.src.rpm" version="4.6.4"><filename>ipa-server-common-4.6.4-10.sl7.noarch.rpm</filename><sum type="sha256">6c5515c110bf4721a85e4a8d817428f8aa93deacd06042001723a884fc9a930c</sum></package><package arch="noarch" name="ipa-python-compat" release="10.sl7" src="ipa-4.6.4-10.sl7.src.rpm" version="4.6.4"><filename>ipa-python-compat-4.6.4-10.sl7.noarch.rpm</filename><sum type="sha256">ef8fe99e266e9c22da5d4f46ee65d0fcbe3c164feff09e90089b29dafedf14b8</sum></package><package arch="noarch" name="python2-ipalib" release="10.sl7" src="ipa-4.6.4-10.sl7.src.rpm" version="4.6.4"><filename>python2-ipalib-4.6.4-10.sl7.noarch.rpm</filename><sum type="sha256">ce2cd40ede08761d8f145c0acdeb34851295b8a420235e214eee2c8a5df8aca5</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="10.sl7" src="ipa-4.6.4-10.sl7.src.rpm" version="4.6.4"><filename>ipa-server-trust-ad-4.6.4-10.sl7.x86_64.rpm</filename><sum type="sha256">19ac4ae69f5a4d6a279a8ba393d8c8b0f3abf2e43a54a2f4262edcdd72450096</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3187" id="RHBA-2018:3187-1" title="Rhba-2018:3187-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3189-1</id><title>Ceph-Common Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="librbd1" release="4.el7" src="ceph-common-10.2.5-4.el7.src.rpm" version="10.2.5"><filename>librbd1-10.2.5-4.el7.x86_64.rpm</filename><sum type="sha256">1891ea6bcfb6dc1b08b3400b6721f0d061050f9e9be3671bd6b141f57586d224</sum></package><package arch="x86_64" epoch="1" name="librados2" release="4.el7" src="ceph-common-10.2.5-4.el7.src.rpm" version="10.2.5"><filename>librados2-10.2.5-4.el7.x86_64.rpm</filename><sum type="sha256">9829955db89efe6be2cd6a57545c678eff4279af1eebe41c24017fe6ecb06815</sum></package><package arch="x86_64" epoch="1" name="librados2-devel" release="4.el7" src="ceph-common-10.2.5-4.el7.src.rpm" version="10.2.5"><filename>librados2-devel-10.2.5-4.el7.x86_64.rpm</filename><sum type="sha256">1dd37684313e42cdf915b4f37ae75d704d4e14a2e53da22d7bc96aca9003cc6c</sum></package><package arch="x86_64" epoch="1" name="python-rados" release="4.el7" src="ceph-common-10.2.5-4.el7.src.rpm" version="10.2.5"><filename>python-rados-10.2.5-4.el7.x86_64.rpm</filename><sum type="sha256">bfc8a3b4f092bfca61b96490a41c16c14508aacbdab3a6a316c3e4890fb492d2</sum></package><package arch="x86_64" epoch="1" name="ceph-common" release="4.el7" src="ceph-common-10.2.5-4.el7.src.rpm" version="10.2.5"><filename>ceph-common-10.2.5-4.el7.x86_64.rpm</filename><sum type="sha256">32633c773bee0d0eb0078ea76c7093c17660453c0926c1b5b548ef1359a1b71f</sum></package><package arch="i686" epoch="1" name="librbd1-devel" release="4.el7" src="ceph-common-10.2.5-4.el7.src.rpm" version="10.2.5"><filename>librbd1-devel-10.2.5-4.el7.i686.rpm</filename><sum type="sha256">3198c58793a09182e8770f72a6247933f8318daec3f4ff38de801067e3abdbb4</sum></package><package arch="i686" epoch="1" name="librados2" release="4.el7" src="ceph-common-10.2.5-4.el7.src.rpm" version="10.2.5"><filename>librados2-10.2.5-4.el7.i686.rpm</filename><sum type="sha256">f4ea606f9f079836f32d0c4184be7c666c3a453cd549a006fa092f2418f2d6f5</sum></package><package arch="i686" epoch="1" name="librados2-devel" release="4.el7" src="ceph-common-10.2.5-4.el7.src.rpm" version="10.2.5"><filename>librados2-devel-10.2.5-4.el7.i686.rpm</filename><sum type="sha256">c7b474c7bbdaf8be16b3cda94a745afb00dd9e50a2b556b9e5e224afd9458a9f</sum></package><package arch="i686" epoch="1" name="librbd1" release="4.el7" src="ceph-common-10.2.5-4.el7.src.rpm" version="10.2.5"><filename>librbd1-10.2.5-4.el7.i686.rpm</filename><sum type="sha256">4a63e43b7fed285bb97ed2af3847760a97aa1350111816e61709c830e512098f</sum></package><package arch="x86_64" epoch="1" name="python-rbd" release="4.el7" src="ceph-common-10.2.5-4.el7.src.rpm" version="10.2.5"><filename>python-rbd-10.2.5-4.el7.x86_64.rpm</filename><sum type="sha256">639b8cc020b95fc68c2ad5eee3325ba0e950e0b82f82057c7f981ebcf26bfbdb</sum></package><package arch="x86_64" epoch="1" name="librbd1-devel" release="4.el7" src="ceph-common-10.2.5-4.el7.src.rpm" version="10.2.5"><filename>librbd1-devel-10.2.5-4.el7.x86_64.rpm</filename><sum type="sha256">e4d47c1725b5bab49307f509c2eec68857cde8404b70886cc4bfec4af07acfe8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3189" id="RHBA-2018:3189-1" title="Rhba-2018:3189-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3196-1</id><title>Ndctl Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="daxctl-libs" release="1.el7" src="ndctl-62-1.el7.src.rpm" version="62"><filename>daxctl-libs-62-1.el7.x86_64.rpm</filename><sum type="sha256">62bb59a3dd9c522631cc36446f258384bb4dddf7d4fd8fc3925614c57b4120c9</sum></package><package arch="i686" name="ndctl-libs" release="1.el7" src="ndctl-62-1.el7.src.rpm" version="62"><filename>ndctl-libs-62-1.el7.i686.rpm</filename><sum type="sha256">5a32133c30a70d05bbed18c39e1830ede53eaf56d0470be1a79fb5d42baa4bb5</sum></package><package arch="i686" name="ndctl-devel" release="1.el7" src="ndctl-62-1.el7.src.rpm" version="62"><filename>ndctl-devel-62-1.el7.i686.rpm</filename><sum type="sha256">d0eb5af9161f3311b39e08ed858b81a9053090675f306fb59f0c2d7beabceab3</sum></package><package arch="x86_64" name="daxctl-devel" release="1.el7" src="ndctl-62-1.el7.src.rpm" version="62"><filename>daxctl-devel-62-1.el7.x86_64.rpm</filename><sum type="sha256">0f6219e0a571463b31faa51174da9b85bf8ed3f0630dd719417169e9e7fad34d</sum></package><package arch="x86_64" name="ndctl" release="1.el7" src="ndctl-62-1.el7.src.rpm" version="62"><filename>ndctl-62-1.el7.x86_64.rpm</filename><sum type="sha256">799d32a23644bb69ea6772331aeff6aae8fc1c1a1c94b1ce8e5a777efa26de71</sum></package><package arch="i686" name="daxctl-libs" release="1.el7" src="ndctl-62-1.el7.src.rpm" version="62"><filename>daxctl-libs-62-1.el7.i686.rpm</filename><sum type="sha256">577b86c8825d3df040a4d0c7128301ab991ee68830ee73e1be22332978d84e5b</sum></package><package arch="x86_64" name="ndctl-devel" release="1.el7" src="ndctl-62-1.el7.src.rpm" version="62"><filename>ndctl-devel-62-1.el7.x86_64.rpm</filename><sum type="sha256">4749b596fcddf4ecbe3403ea57448eeb773b6b26351474c04c5e09172d39eaa8</sum></package><package arch="i686" name="daxctl-devel" release="1.el7" src="ndctl-62-1.el7.src.rpm" version="62"><filename>daxctl-devel-62-1.el7.i686.rpm</filename><sum type="sha256">d4a5d2abd765fbb04ec0b4d892d7f9c58d786560cb160976a35b243a8526e071</sum></package><package arch="x86_64" name="ndctl-libs" release="1.el7" src="ndctl-62-1.el7.src.rpm" version="62"><filename>ndctl-libs-62-1.el7.x86_64.rpm</filename><sum type="sha256">1e100a1a2906ac26ef4ce466e7acb9ef30ddd63e1853973a59013ab3a764c4e4</sum></package><package arch="x86_64" name="daxctl" release="1.el7" src="ndctl-62-1.el7.src.rpm" version="62"><filename>daxctl-62-1.el7.x86_64.rpm</filename><sum type="sha256">7bb1af1c412a15177216c69a826f0460866019939d801e93817187e7263db9b6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3196" id="RHBA-2018:3196-1" title="Rhba-2018:3196-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3218-1</id><title>Pykickstart Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="pykickstart" release="2.el7" src="pykickstart-1.99.66.19-2.el7.src.rpm" version="1.99.66.19"><filename>pykickstart-1.99.66.19-2.el7.noarch.rpm</filename><sum type="sha256">771ce58511fdb97fb82e1bb5cfa45c9aab3f116a8195ef31c61c9451e8ff6fc6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3218" id="RHBA-2018:3218-1" title="Rhba-2018:3218-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3239-1</id><title>Cryptsetup Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="veritysetup" release="3.el7" src="cryptsetup-2.0.3-3.el7.src.rpm" version="2.0.3"><filename>veritysetup-2.0.3-3.el7.x86_64.rpm</filename><sum type="sha256">28c66235af50169acd55b472596cd81ebb1bff86eb338ffc81298b6d6604536e</sum></package><package arch="x86_64" name="cryptsetup-python" release="3.el7" src="cryptsetup-2.0.3-3.el7.src.rpm" version="2.0.3"><filename>cryptsetup-python-2.0.3-3.el7.x86_64.rpm</filename><sum type="sha256">0eb6750f397087d457853f183581753c4ca2c5ad1f731a8cda25cccac02c37a8</sum></package><package arch="i686" name="cryptsetup-libs" release="3.el7" src="cryptsetup-2.0.3-3.el7.src.rpm" version="2.0.3"><filename>cryptsetup-libs-2.0.3-3.el7.i686.rpm</filename><sum type="sha256">2d79e1d34d4470df69435238fe4e7ebb796081699609d5adf2efd4f7e5921fc8</sum></package><package arch="x86_64" name="cryptsetup-libs" release="3.el7" src="cryptsetup-2.0.3-3.el7.src.rpm" version="2.0.3"><filename>cryptsetup-libs-2.0.3-3.el7.x86_64.rpm</filename><sum type="sha256">ff8be7536edd0cda0569f071d5ad5c33cffaf0d93650aca713cd9e422b92e634</sum></package><package arch="i686" name="cryptsetup-devel" release="3.el7" src="cryptsetup-2.0.3-3.el7.src.rpm" version="2.0.3"><filename>cryptsetup-devel-2.0.3-3.el7.i686.rpm</filename><sum type="sha256">ba83dd867ba39d412155ff5ada77914437907274980ae48f567391a7c9d6b682</sum></package><package arch="x86_64" name="cryptsetup-reencrypt" release="3.el7" src="cryptsetup-2.0.3-3.el7.src.rpm" version="2.0.3"><filename>cryptsetup-reencrypt-2.0.3-3.el7.x86_64.rpm</filename><sum type="sha256">a3e424280ca4dc7286562404de66ee12b53a43db14ea08c3bad5545973ee7819</sum></package><package arch="x86_64" name="cryptsetup" release="3.el7" src="cryptsetup-2.0.3-3.el7.src.rpm" version="2.0.3"><filename>cryptsetup-2.0.3-3.el7.x86_64.rpm</filename><sum type="sha256">a2b6aec2bdab2f72c8e05b988bcbf885f2ea8c18936ab2c37c534d5cc74b187a</sum></package><package arch="x86_64" name="cryptsetup-devel" release="3.el7" src="cryptsetup-2.0.3-3.el7.src.rpm" version="2.0.3"><filename>cryptsetup-devel-2.0.3-3.el7.x86_64.rpm</filename><sum type="sha256">b1bdacb8ae34bd07fd055a61b105aeecff78d02db4a1ffecf420154af2f76057</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3239" id="RHBA-2018:3239-1" title="Rhba-2018:3239-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3247-1</id><title>Libblockdev Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libblockdev-mpath-devel" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-mpath-devel-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">e849491254b2b8e1b59aee1e046501d8e04ddb83ff5ee2b75655740e4da24db1</sum></package><package arch="x86_64" name="libblockdev-mpath" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-mpath-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">89bfe275f13883af6b38c3e9f133c101e662abfa8598bfe60da3b6a9118823e6</sum></package><package arch="x86_64" name="libblockdev-utils-devel" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-utils-devel-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">3358d14cd526f0181bb3ab0cdd5ba2b250aa813c62848c1b8ca7d530baef5158</sum></package><package arch="x86_64" name="libblockdev-lvm-devel" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-lvm-devel-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">243d98e39cf0ac0f3f41b604eeea1fdb3cb078af9e185621ec04c4865f2b99a6</sum></package><package arch="x86_64" name="libblockdev-kbd-devel" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-kbd-devel-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">7ac065b4a653b43406f073335607c25b0775777166e5cb41916f8c7d0544d5eb</sum></package><package arch="x86_64" name="libblockdev-part-devel" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-part-devel-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">a065b76d11ae5e25f2bf26f5bd14c12d324b2357b6cfecd041241b14d9d2594e</sum></package><package arch="x86_64" name="libblockdev-crypto" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-crypto-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">733ccfdec13744b8d59eccfcbe8924fbf611778072eccd2cda585c18e26a7567</sum></package><package arch="x86_64" name="libblockdev-utils" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-utils-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">c46bee3beb72cc2f7e8e3958763457271e81c921b68bbae6cd2a4c76cf5e4ded</sum></package><package arch="x86_64" name="libblockdev-loop" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-loop-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">8e69233dfc3be19c67d905ecfb891cbd006b46527e9408d2008b1430684f82de</sum></package><package arch="x86_64" name="libblockdev-devel" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-devel-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">c4c7bd39f576f5a7a14ac2dde4ac28f9d68f72fc49cf3df2c118bbed6cb4bcec</sum></package><package arch="x86_64" name="libblockdev-plugins-all" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-plugins-all-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">57ae3f9a4695a7f6d6b07c0815e47b7b875371403e2ca2d0afb42435a8d6f957</sum></package><package arch="x86_64" name="libblockdev-mdraid-devel" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-mdraid-devel-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">8c39ee5db36d8af0757dc6a64afd61c6ebeaaab351f8a5720ea851847cac04c8</sum></package><package arch="x86_64" name="libblockdev-nvdimm-devel" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-nvdimm-devel-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">aef373e8a9b3c8712134dee2b19244d2b2820ee8e4c1bf5fb35e6ab01628bda0</sum></package><package arch="x86_64" name="libblockdev-btrfs" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-btrfs-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">95f894b120596e2e98876d7483ba0d6e57d575b31da334cffa568dcf723b4895</sum></package><package arch="x86_64" name="libblockdev-loop-devel" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-loop-devel-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">9314232b4f45472001c07e98a6aff88348d1269c71c8280a64e5320797f7cd33</sum></package><package arch="x86_64" name="libblockdev-btrfs-devel" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-btrfs-devel-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">617d14ba8a2948d6946037e8f2e6ed79c4b087cb225fb447c6d359f39fcb41cd</sum></package><package arch="x86_64" name="libblockdev-fs-devel" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-fs-devel-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">459021e925de78608fdc1cf6f067a8ba791217404c46a1bf4494ecdeef94ec4c</sum></package><package arch="x86_64" name="libblockdev-vdo-devel" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-vdo-devel-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">0dc7b89eb868806a27cab9230a75eb6132e4a595f9be4a1eb033a36bd276b42a</sum></package><package arch="x86_64" name="libblockdev-part" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-part-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">b696489035be6e568d14db15aad37c23d3abce6b494e6ae8196608c73b08208b</sum></package><package arch="x86_64" name="libblockdev-lvm" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-lvm-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">f2b6cc7d458bbe7645ee2d77f37bd50d4c3766e8ffd8824eef4886d1c881b12d</sum></package><package arch="x86_64" name="libblockdev-crypto-devel" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-crypto-devel-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">7346352f46ca8f8fed97f65ba46b1ad4bec168ece610bffc3cc60773d22a4150</sum></package><package arch="x86_64" name="libblockdev-dm" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-dm-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">94aa11c6898d40ba2affc5c72cc5c6be2577253e84a4d293a2cc194c31bd3d32</sum></package><package arch="x86_64" name="libblockdev-swap" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-swap-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">faf0d9f8415cb2798d47fe711a32b97d5a920ef9078332d5b0980fb56cf412c4</sum></package><package arch="x86_64" name="libblockdev-dm-devel" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-dm-devel-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">9f8d8d6dfb1e84a0718d93964cf41349b95ad26f2b805a48a99aa608422f48a5</sum></package><package arch="x86_64" name="libblockdev-swap-devel" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-swap-devel-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">603e66adab0b6584c6006a8f293ab9bbd675325628546d0949fb3061ec25d57b</sum></package><package arch="x86_64" name="libblockdev-kbd" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-kbd-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">cc6c1aa50900eff16fa2cf3217983fd7fa75202a638fb2fddbd60552afebcd26</sum></package><package arch="x86_64" name="libblockdev-mdraid" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-mdraid-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">a87ad8b8fb8b924c23516bab95399a7a9c68cd809071d26f34e8f61d586f34ac</sum></package><package arch="x86_64" name="libblockdev-vdo" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-vdo-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">74cbd33c5953554ffee6601dd19200d8d73b122183bc35a5c2bb8acc5bd77855</sum></package><package arch="x86_64" name="libblockdev-fs" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-fs-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">3e8d629006b96ac31dd35519a29d2df6786750bcfc74318d4fec4e78ef4bcd7a</sum></package><package arch="x86_64" name="libblockdev" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">cc1100099a0293c81ff109bbc68270da622df3f738d4beb84bd77939e8ed5f12</sum></package><package arch="x86_64" name="python2-blockdev" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>python2-blockdev-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">ee4fcb79c3223da4321fe81a9b4b2ae447b4bbde1af004483f9b858c67bcaa40</sum></package><package arch="x86_64" name="libblockdev-nvdimm" release="3.el7" src="libblockdev-2.18-3.el7.src.rpm" version="2.18"><filename>libblockdev-nvdimm-2.18-3.el7.x86_64.rpm</filename><sum type="sha256">62fcd868c66658a21e2f2125c20a3970fc3f5884d000ff5e3ac9065c56eb4780</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3247" id="RHBA-2018:3247-1" title="Rhba-2018:3247-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3270-1</id><title>Python-Blivet Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="python-blivet" release="1.el7" src="python-blivet-0.61.15.72-1.el7.src.rpm" version="0.61.15.72"><filename>python-blivet-0.61.15.72-1.el7.noarch.rpm</filename><sum type="sha256">054aafb4101cd1feba2191f2e7fa538b872193aa9cad1ed05c88c6771201a52d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3270" id="RHBA-2018:3270-1" title="Rhba-2018:3270-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3271-1</id><title>Udisks2 Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="udisks2-iscsi" release="8.el7" src="udisks2-2.7.3-8.el7.src.rpm" version="2.7.3"><filename>udisks2-iscsi-2.7.3-8.el7.x86_64.rpm</filename><sum type="sha256">bdff5dcb07ac097225c40ec8f32db9dc9e55335ba87b948db4b7ed10e585dd70</sum></package><package arch="i686" name="libudisks2" release="8.el7" src="udisks2-2.7.3-8.el7.src.rpm" version="2.7.3"><filename>libudisks2-2.7.3-8.el7.i686.rpm</filename><sum type="sha256">e46c905e730b98000df6fd7dfb5c7fb2acd17b5566873aae3d650e3c3736dd91</sum></package><package arch="x86_64" name="udisks2" release="8.el7" src="udisks2-2.7.3-8.el7.src.rpm" version="2.7.3"><filename>udisks2-2.7.3-8.el7.x86_64.rpm</filename><sum type="sha256">de6ac39ef76f0b22cd574bd158e7afb9a8d0025420e18303901a71213b215088</sum></package><package arch="x86_64" name="libudisks2-devel" release="8.el7" src="udisks2-2.7.3-8.el7.src.rpm" version="2.7.3"><filename>libudisks2-devel-2.7.3-8.el7.x86_64.rpm</filename><sum type="sha256">0c29deeb54bda6f6ebd95d8fe9ccd6974771aee1df1ede901185175676b055ea</sum></package><package arch="x86_64" name="udisks2-lvm2" release="8.el7" src="udisks2-2.7.3-8.el7.src.rpm" version="2.7.3"><filename>udisks2-lvm2-2.7.3-8.el7.x86_64.rpm</filename><sum type="sha256">6279438b91e9e3e864d99189cd09a2bc7261bacd2f7ec66bf832255aa6ea2fff</sum></package><package arch="x86_64" name="libudisks2" release="8.el7" src="udisks2-2.7.3-8.el7.src.rpm" version="2.7.3"><filename>libudisks2-2.7.3-8.el7.x86_64.rpm</filename><sum type="sha256">645d97d1a9efced0418a44356ca1bce4d9003e2c3b0c69387df7c1e71e341d07</sum></package><package arch="i686" name="libudisks2-devel" release="8.el7" src="udisks2-2.7.3-8.el7.src.rpm" version="2.7.3"><filename>libudisks2-devel-2.7.3-8.el7.i686.rpm</filename><sum type="sha256">56753841efa19312b20e24d13bd0fffbc39487ff59b228cef4e001f094a8c7c4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3271" id="RHBA-2018:3271-1" title="Rhba-2018:3271-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3329-1</id><title>Nuxwdog Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="nuxwdog-devel" release="8.el7" src="nuxwdog-1.0.3-8.el7.src.rpm" version="1.0.3"><filename>nuxwdog-devel-1.0.3-8.el7.i686.rpm</filename><sum type="sha256">75f7713856a5f0aeeb13013f010f790e48321b7b964939028ebc7e2dcf5a3136</sum></package><package arch="x86_64" name="nuxwdog-client-perl" release="8.el7" src="nuxwdog-1.0.3-8.el7.src.rpm" version="1.0.3"><filename>nuxwdog-client-perl-1.0.3-8.el7.x86_64.rpm</filename><sum type="sha256">6f7349cb103f60b7a1a882c67484fc580f6d3865355b9b9f6aef5bac7b219187</sum></package><package arch="x86_64" name="nuxwdog" release="8.el7" src="nuxwdog-1.0.3-8.el7.src.rpm" version="1.0.3"><filename>nuxwdog-1.0.3-8.el7.x86_64.rpm</filename><sum type="sha256">623b373ed9c0f6d0ac3109324946d4d11f0824604a76a75160ecc9c8e03f670a</sum></package><package arch="i686" name="nuxwdog" release="8.el7" src="nuxwdog-1.0.3-8.el7.src.rpm" version="1.0.3"><filename>nuxwdog-1.0.3-8.el7.i686.rpm</filename><sum type="sha256">f57f4d3a95a33da2b1962debaa944a082072e287b4b3df439a4689146e279bf0</sum></package><package arch="x86_64" name="nuxwdog-client-java" release="8.el7" src="nuxwdog-1.0.3-8.el7.src.rpm" version="1.0.3"><filename>nuxwdog-client-java-1.0.3-8.el7.x86_64.rpm</filename><sum type="sha256">c7d55b5f898ea3fd850a4f77ce4b765f28392fea5c3743a94f7c3bff01aece2b</sum></package><package arch="x86_64" name="nuxwdog-devel" release="8.el7" src="nuxwdog-1.0.3-8.el7.src.rpm" version="1.0.3"><filename>nuxwdog-devel-1.0.3-8.el7.x86_64.rpm</filename><sum type="sha256">93b8f986097f6aba68a135aa0689128d8750b3e8140764e6a7cd8685b95857df</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3329" id="RHBA-2018:3329-1" title="Rhba-2018:3329-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3340-1</id><title>Selinux-Policy Bug Fix Update</title><description>* Prior to this update of the SELinux policy, rules that allow user domains to use generic pseudoterminal interfaces were missing. As a consequence, the I/O logging function of the sudo utility did not work for SELinux-confined users. The missing rules have been added to the policy, and the I/O logging function no longer fails in the described scenario.</description><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy-devel" release="229.el7_6.5" src="selinux-policy-3.13.1-229.el7_6.5.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-229.el7_6.5.noarch.rpm</filename><sum type="sha256">048059f8cb027baa5387f4f66fcfa8c8d56c150bafc87a3b659a2999c659a11c</sum></package><package arch="noarch" name="selinux-policy-sandbox" release="229.el7_6.5" src="selinux-policy-3.13.1-229.el7_6.5.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-229.el7_6.5.noarch.rpm</filename><sum type="sha256">00b35e73c67aa00e176c116f3619794773634c0a739f77e9a7bdac099b400827</sum></package><package arch="noarch" name="selinux-policy-targeted" release="229.el7_6.5" src="selinux-policy-3.13.1-229.el7_6.5.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-229.el7_6.5.noarch.rpm</filename><sum type="sha256">1d548981075af2a6975010c019138b6bf710ca34f83f192888430e382096d6f2</sum></package><package arch="noarch" name="selinux-policy-doc" release="229.el7_6.5" src="selinux-policy-3.13.1-229.el7_6.5.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-229.el7_6.5.noarch.rpm</filename><sum type="sha256">3d6c6f44b7dd0de7a30ab26d3ccd267d0d9a20ad16926a94875d053fc5fffb76</sum></package><package arch="noarch" name="selinux-policy-mls" release="229.el7_6.5" src="selinux-policy-3.13.1-229.el7_6.5.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-229.el7_6.5.noarch.rpm</filename><sum type="sha256">766547b29ab7d47df30420e0bcb5d6aeccbf7b43f856a3b12bd8ce419fb9a9bd</sum></package><package arch="noarch" name="selinux-policy-minimum" release="229.el7_6.5" src="selinux-policy-3.13.1-229.el7_6.5.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-229.el7_6.5.noarch.rpm</filename><sum type="sha256">0e13eda8667b81166a3f4b6538b10f0f21e233f174a5ab476d12b99acebd2e0b</sum></package><package arch="noarch" name="selinux-policy" release="229.el7_6.5" src="selinux-policy-3.13.1-229.el7_6.5.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-229.el7_6.5.noarch.rpm</filename><sum type="sha256">a4482e90c279b9ad1d9c678e8d21564da888a3e515e60ec318e834d7d2f9d1f4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3340" id="RHBA-2018:3340-1" title="Rhba-2018:3340-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1635704" id="1635704" title="Neutron-Openvswitch-Agent Crashes On Rhel 7.6 Beta With Selinux Enabled [Rhel-7.6.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1638427" id="1638427" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3348-1</id><title>Tzdata Enhancement Update</title><description>* The Pacific/Fiji time zone will end Daylight Saving Time (DST) on January 13, 2019 rather than January 20, 2019.

* Most regions in Chile will end Daylight Saving Time (DST) on the first Sunday in April, 2019.</description><release>Scientific Linux</release><issued date="2018-10-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="2.el7" src="tzdata-2018f-2.el7.src.rpm" version="2018f"><filename>tzdata-2018f-2.el7.noarch.rpm</filename><sum type="sha256">a296b902763d0b7acfbead21cb21a4c9e01e825bc1b2324e41a604563ba759fc</sum></package><package arch="noarch" name="tzdata-java" release="2.el7" src="tzdata-2018f-2.el7.src.rpm" version="2018f"><filename>tzdata-java-2018f-2.el7.noarch.rpm</filename><sum type="sha256">2ff30b6108e6dd2946627980ce4269004e67c066b5fbcbf3be75e77c8d9d04ab</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3348" id="RHBA-2018:3348-1" title="Rhba-2018:3348-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1640803" id="1640803" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3454-1</id><title>Tzdata Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2018g-1.el7.src.rpm" version="2018g"><filename>tzdata-2018g-1.el7.noarch.rpm</filename><sum type="sha256">9cff26eb8b25723083a96d1b4d5132f559730955e788054fe931899f9864212c</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2018g-1.el7.src.rpm" version="2018g"><filename>tzdata-java-2018g-1.el7.noarch.rpm</filename><sum type="sha256">60e988ad90a1fabefeb4077c643af4dd623276ae0308c52acd39ca05fea45def</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3454" id="RHBA-2018:3454-1" title="Rhba-2018:3454-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1643788" id="1643788" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1643789" id="1643789" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1644183" id="1644183" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2018:3664-1</id><title>Selinux-Policy Bug Fix Update</title><description>* Previously, rules that allow the "sysstat_t" domain to read the /var/log/audit/ directory were missing in the SELinux policy. As a consequence, SELinux denied processes while registering a Red Hat Virtualization Host (RHVH) system to the Red Hat Virtualization Manager (RHVM). With this update, the missing rules have been added to the policy, and SELinux denials no longer occur in the described scenario.</description><release>Scientific Linux</release><issued date="2018-12-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy" release="229.el7_6.6" src="selinux-policy-3.13.1-229.el7_6.6.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-229.el7_6.6.noarch.rpm</filename><sum type="sha256">66499baf191f64cc1006612eadb3a0778ae9efbc8b93c4c02091b98e451363f1</sum></package><package arch="noarch" name="selinux-policy-devel" release="229.el7_6.6" src="selinux-policy-3.13.1-229.el7_6.6.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-229.el7_6.6.noarch.rpm</filename><sum type="sha256">fb9e0b2999595ed57e80b8ca654cc494e77fb88e648b2d897c3fce859a904d60</sum></package><package arch="noarch" name="selinux-policy-minimum" release="229.el7_6.6" src="selinux-policy-3.13.1-229.el7_6.6.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-229.el7_6.6.noarch.rpm</filename><sum type="sha256">37bc92439c7b04d5f6f95edba8d4873160bb91081c68310b792c24326c0263bc</sum></package><package arch="noarch" name="selinux-policy-targeted" release="229.el7_6.6" src="selinux-policy-3.13.1-229.el7_6.6.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-229.el7_6.6.noarch.rpm</filename><sum type="sha256">da0360686a2946348397dfbcc1949340e6fde91555a6f1612448c01724e27997</sum></package><package arch="noarch" name="selinux-policy-doc" release="229.el7_6.6" src="selinux-policy-3.13.1-229.el7_6.6.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-229.el7_6.6.noarch.rpm</filename><sum type="sha256">c570dccb5d42f95a4ab09192b6544a44eaf370b4339cc010d1cb4e54f0e234c5</sum></package><package arch="noarch" name="selinux-policy-mls" release="229.el7_6.6" src="selinux-policy-3.13.1-229.el7_6.6.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-229.el7_6.6.noarch.rpm</filename><sum type="sha256">ab8480e2697c09e5248318480ad6608071a26ea9fd6d775ca985f6ffa551a3ea</sum></package><package arch="noarch" name="selinux-policy-sandbox" release="229.el7_6.6" src="selinux-policy-3.13.1-229.el7_6.6.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-229.el7_6.6.noarch.rpm</filename><sum type="sha256">a0eb8d601c3b9911d04fefe47365bf6e9643edbd2853183f7e1635d17fcd1029</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2018:3664" id="RHBA-2018:3664-1" title="Rhba-2018:3664-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1645270" id="1645270" title="On Rhel 7.6 Undercloud Installation Fails On Nova-Api: Sudo In Nova-Rootwrap Blocked By Selinux [Rhel-7.6.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1645271" id="1645271" title="Rhvh 4.2.7: Avc Denied Errors (Getattr) In Audit.Log After Register To Engine [Rhel-7.6.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:0037-1</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages have been updated to version 2018i, which addresses recent time zone changes. Notably:

* Africa/S&#227;o Tom&#233; and Pr&#237;ncipe changed from UTC+01 to UTC+00 on January 01, 2019. * Asia/Qyzylorda, Kazakhstan changed from UTC+06 to UTC+05 on December 21, 2018. * A new time zone, Asia/Qostanay, has been created because Qostanay, Kazakhstan did not transition with the Asia/Qyzylorda change. * America/Metlakatla, Alaska will observe Pacific Standard Time (PST) for this winter only. * Updates to Asia/Casablanca have been implemented based on a prediction that Morocco will continue to adjust clocks around Ramadan. * Changes to Asia/Tehran have been made based on predictions for Iran from 2038 through 2090.</description><release>Scientific Linux</release><issued date="2019-01-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2018i-1.el7.src.rpm" version="2018i"><filename>tzdata-java-2018i-1.el7.noarch.rpm</filename><sum type="sha256">9e0ccc63bc1e6dc3028327b66b0f27f828b73f890c27929cf0b9d6b5653eacef</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2018i-1.el7.src.rpm" version="2018i"><filename>tzdata-2018i-1.el7.noarch.rpm</filename><sum type="sha256">a94fbf60982380d77cd5ce879efe67ceb8a9f56ebe8244ba39fe49ca6a2c172f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:0037" id="RHBA-2019:0037-1" title="Rhba-2019:0037-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:0167-1</id><title>Tomcatjss Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2019-02-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcatjss" release="8.el7_6" src="tomcatjss-7.2.1-8.el7_6.src.rpm" version="7.2.1"><filename>tomcatjss-7.2.1-8.el7_6.noarch.rpm</filename><sum type="sha256">ca23777f95eb5e725840af37969906146faa8ac1809845420711727f08309d76</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:0167" id="RHBA-2019:0167-1" title="Rhba-2019:0167-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1632618" id="1632618" title="Red Hat Bugzilla Is In Maintenace Mode" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:0183-1</id><title>Krb5 Bug Fix Update</title><description>* Previously, Scientific Linux 7.6 build of the krb5 system increased compliance with FIPS-140. As a consequence, certain previously permitted configurations that were prohibited by FIPS-140 stopped working. with this update, the changes have been reverted, because krb5 only needs to work in the FIPS mode, not be FIPS compliant. As a result, SL 7.6.z should work in the same way SL 7.5 did. Please note that Scientific Linux 8 does not support these configurations at the moment.</description><release>Scientific Linux</release><issued date="2019-02-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="krb5-server-ldap" release="37.el7_6" src="krb5-1.15.1-37.el7_6.src.rpm" version="1.15.1"><filename>krb5-server-ldap-1.15.1-37.el7_6.x86_64.rpm</filename><sum type="sha256">f8c9aa8652d725090b984769ed4e84b13b285713adf246a35f397e493a76f4e3</sum></package><package arch="x86_64" name="krb5-pkinit" release="37.el7_6" src="krb5-1.15.1-37.el7_6.src.rpm" version="1.15.1"><filename>krb5-pkinit-1.15.1-37.el7_6.x86_64.rpm</filename><sum type="sha256">e388ad5862111ee13fcb808ec9f0baf0a69662b7b4b74e67946dbc3c4998d12b</sum></package><package arch="x86_64" name="krb5-workstation" release="37.el7_6" src="krb5-1.15.1-37.el7_6.src.rpm" version="1.15.1"><filename>krb5-workstation-1.15.1-37.el7_6.x86_64.rpm</filename><sum type="sha256">129b7d5dd39653aa2ea5ed47af30a222816e305fc97069e6149707b8730f4ee0</sum></package><package arch="x86_64" name="krb5-server" release="37.el7_6" src="krb5-1.15.1-37.el7_6.src.rpm" version="1.15.1"><filename>krb5-server-1.15.1-37.el7_6.x86_64.rpm</filename><sum type="sha256">c563570beb2975822f6d9b2e2140d7f893093042d7df883f52ad911b349a031f</sum></package><package arch="i686" name="krb5-libs" release="37.el7_6" src="krb5-1.15.1-37.el7_6.src.rpm" version="1.15.1"><filename>krb5-libs-1.15.1-37.el7_6.i686.rpm</filename><sum type="sha256">917a02c146e14522fca59a07b64ad5d002ccb21c794e464a3b888fd215194048</sum></package><package arch="i686" name="libkadm5" release="37.el7_6" src="krb5-1.15.1-37.el7_6.src.rpm" version="1.15.1"><filename>libkadm5-1.15.1-37.el7_6.i686.rpm</filename><sum type="sha256">6c6af741ce1e689b3323b0a9ca29ff1fd89788743723aa610fdfd944219ea9a9</sum></package><package arch="x86_64" name="libkadm5" release="37.el7_6" src="krb5-1.15.1-37.el7_6.src.rpm" version="1.15.1"><filename>libkadm5-1.15.1-37.el7_6.x86_64.rpm</filename><sum type="sha256">20260fea19d97ff48781bdb0099c6a796f36749d682e144a95febed87d6294a0</sum></package><package arch="x86_64" name="krb5-devel" release="37.el7_6" src="krb5-1.15.1-37.el7_6.src.rpm" version="1.15.1"><filename>krb5-devel-1.15.1-37.el7_6.x86_64.rpm</filename><sum type="sha256">fa99b78cd2634311dec2b04de4113ae5cb0126abab82616d6f3f6045e12909ec</sum></package><package arch="i686" name="krb5-devel" release="37.el7_6" src="krb5-1.15.1-37.el7_6.src.rpm" version="1.15.1"><filename>krb5-devel-1.15.1-37.el7_6.i686.rpm</filename><sum type="sha256">ce82641f71e895347c095adbaab41955cb767462e7055917481a9d06b16c437a</sum></package><package arch="x86_64" name="krb5-libs" release="37.el7_6" src="krb5-1.15.1-37.el7_6.src.rpm" version="1.15.1"><filename>krb5-libs-1.15.1-37.el7_6.x86_64.rpm</filename><sum type="sha256">54be70a9863437ec0d6a87875c22a92a1ce446341d3eb2b27f9e6d4930c27f16</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:0183" id="RHBA-2019:0183-1" title="Rhba-2019:0183-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1657890" id="1657890" title="1657890 &#8211; Krb5 Memory Ccache Cursors Are Invalidated By Initialize, Likely Crashes [Rhel-7.6.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1659497" id="1659497" title="1659497 &#8211; Updated Krb5-Libs Packages In Rhel 7.6 Will Cause Apps To Crash When Fips Mode Is On [Rhel-7.6.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:0689-1</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages have been updated to version 2019a, which addresses recent time zone changes. Notably:

* The Asia/Hebron and Asia/Gaza zones will start DST on 2019-03-30, rather than 2019-03-23 as previously predicted. * Metlakatla rejoined Alaska time on 2019-01-20, ending its observances of Pacific standard time.</description><release>Scientific Linux</release><issued date="2019-04-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2019a-1.el7.src.rpm" version="2019a"><filename>tzdata-java-2019a-1.el7.noarch.rpm</filename><sum type="sha256">2731206a1abd2e3a7d980dc32f2deb143f5f43eae317ed00b50c29d9df12e984</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2019a-1.el7.src.rpm" version="2019a"><filename>tzdata-2019a-1.el7.noarch.rpm</filename><sum type="sha256">355e009151006b634c77846009aba128388f366bced47a3a7a0e08773256a546</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:0689" id="RHBA-2019:0689-1" title="Rhba-2019:0689-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:1703-1</id><title>Tzdata Enhancement Update</title><description>* The 2019 spring DST transition for Palestine occurred on March 29, not March 30.</description><release>Scientific Linux</release><issued date="2019-07-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2019b-1.el7.src.rpm" version="2019b"><filename>tzdata-2019b-1.el7.noarch.rpm</filename><sum type="sha256">d3436e875cac36e8bcf40497e187a468ba7ce73acc64ddc8c363c9bbe500ab95</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2019b-1.el7.src.rpm" version="2019b"><filename>tzdata-java-2019b-1.el7.noarch.rpm</filename><sum type="sha256">e9bdde794ed5c29ae7ea1d943634249f6f65c99778006bb1932482bf28912637</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:1703" id="RHBA-2019:1703-1" title="Rhba-2019:1703-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1726276" id="1726276" title="1726276 &#8211; Update To Tzdata-2019B : Includes Dst Change For Brazil" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1726278" id="1726278" title="1726278 &#8211; Update To Tzdata-2019B : Includes Dst Change For Brazil" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1726349" id="1726349" title="1726349 &#8211; Update To Tzdata-2019B : Includes Dst Change For Brazil [Rhel-8.0.0.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1726619" id="1726619" title="1726619 &#8211; Update To Tzdata-2019B : Includes Dst Change For Brazil [Rhel-7.6.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2044-1</id><title>Gnome Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libkdcraw" release="7.el7" src="libkdcraw-4.10.5-7.el7.src.rpm" version="4.10.5"><filename>libkdcraw-4.10.5-7.el7.i686.rpm</filename><sum type="sha256">e854d106a5c834be45845d382c6a7bed0a5a45971386dbec9f8e87de204e2f50</sum></package><package arch="x86_64" name="shotwell" release="2.el7" src="shotwell-0.28.4-2.el7.src.rpm" version="0.28.4"><filename>shotwell-0.28.4-2.el7.x86_64.rpm</filename><sum type="sha256">3cf236264134a646e7585022be12452ad2a7d3ccb0eabeff573bc26f48fa9b00</sum></package><package arch="i686" name="libkdcraw-devel" release="7.el7" src="libkdcraw-4.10.5-7.el7.src.rpm" version="4.10.5"><filename>libkdcraw-devel-4.10.5-7.el7.i686.rpm</filename><sum type="sha256">86821c3afc927141490a210bb5994f2f0711e32ff15b106979738a1a0ea1f4c2</sum></package><package arch="x86_64" name="libkdcraw" release="7.el7" src="libkdcraw-4.10.5-7.el7.src.rpm" version="4.10.5"><filename>libkdcraw-4.10.5-7.el7.x86_64.rpm</filename><sum type="sha256">feff07dd01af764cf0f592ee5a0ad623d9085e3c7dec333d0f9183b8a0f72ea5</sum></package><package arch="x86_64" name="libkdcraw-devel" release="7.el7" src="libkdcraw-4.10.5-7.el7.src.rpm" version="4.10.5"><filename>libkdcraw-devel-4.10.5-7.el7.x86_64.rpm</filename><sum type="sha256">d8e0b4a8057651d2e9a967ab756146a75599184615aa1c34ed4e96b5606a21fe</sum></package><package arch="i686" name="shotwell" release="2.el7" src="shotwell-0.28.4-2.el7.src.rpm" version="0.28.4"><filename>shotwell-0.28.4-2.el7.i686.rpm</filename><sum type="sha256">7392d0d111394eb4d26b292cb0ff2e269c390af910726837aa42b753abe2cf15</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2044" id="RHBA-2019:2044-1" title="Rhba-2019:2044-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1433761" id="1433761" title="Notification Icon Disappearing When 'Blink On New Messages' Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1440215" id="1440215" title="Pidgin Sasl Support Is Broken (Can'T Connect To Freenode Irc)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448326" id="1448326" title="Gkbd-Keyboard-Display Segfault With Wrong Layout" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1489977" id="1489977" title="Switching Users In Gnome Session Is Starting New X Servers For The User, And A User Logout Is Making It Unusable." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1493526" id="1493526" title="Gnome-Shell-Extension-Tool Gives An Error When Trying To Run It In A Terminal" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1543597" id="1543597" title="Rebase To 0.19.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1546302" id="1546302" title="Possible Memory Leak In Gnome" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1579257" id="1579257" title="System Boots To Blank Screen When Xinerama Enabled With Nvidia/Nouveau Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1581806" id="1581806" title="[Rhel 7.5] Mutter Ignores Multi-Monitor Layout Defined In Xorg.Conf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1583825" id="1583825" title="[Rfe] Mass-Deployable/Homogenized Display Configuration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1594177" id="1594177" title="(Nautilus:10443): Glib-Gio-Critical" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1596474" id="1596474" title="Gnome-Shell Outputs Error Messages With Gui Login On The Server Which Uses Networkmanager And Bonding" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600161" id="1600161" title="Gnome-Settings-Daemon Account Plugin Polling Accountsservice In A Continous Loop" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600163" id="1600163" title="Nautilus / Brasero-Nautilus Dependency May Lead To Loss Of User Data" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1627056" id="1627056" title="[Abrt] [Faf] Gnome-Session: Raise(): /Usr/Libexec/Gnome-Session-Check-Accelerated-Gles-Helper Killed By 5" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1635392" id="1635392" title="Mutter Causing Odd/Bad Button Mapping Behavior On Wacom Tablets" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1636460" id="1636460" title="Mutter Sometimes Fails To Unblank Screen When Unlocked By A User Switch" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1643501" id="1643501" title="Rfe: Provide A Supported Method For Disabling Gnome Screen Shield" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1647621" id="1647621" title="Xorg Listening On Port 6000 By Default In 7.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1649233" id="1649233" title="Release Desktop-File-Utils-0.23-8 For Rhel7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1652700" id="1652700" title="Rebuild Against New Libraw Soname" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1655751" id="1655751" title="Pango-1.42.4-1.El7.X86_64 References A Symbol That Doesn'T Exist In Base Glib2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1656448" id="1656448" title="Gnome-Boxes Should Rather Promote Rhel And Fedora" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658686" id="1658686" title="Time-Delayed Automatic Login Doesn'T Work When Disabling User List In Gdm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1659260" id="1659260" title="Mouse Left Click Stops Working Under Certain Condition" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1664353" id="1664353" title="Allow Multiple Xdmcp Sessions In Parallel From The Same User Account" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1664407" id="1664407" title="Application Windows And Popups Are Hidden From View When Dragged Below Tray Menu With Gnome Classic" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1667239" id="1667239" title="Pango_Fc_Font_Key_Get_Variations(Key) Causing Crash When Key Is Null" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1680060" id="1680060" title="Cannot Open A Gui Session On Zvm Guest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690023" id="1690023" title="Double Password Asterisks And Boot Log Messages In The &quot;Details&quot; Theme" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690935" id="1690935" title="Doesn'T Show Any Documents When Started Through Search Provider" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1693060" id="1693060" title="Xdmcp Remote Session Cannot Unlock Screen" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1708741" id="1708741" title="Possible Memory Leak In Gnome" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1711308" id="1711308" title="Welcome Page Uses Gnome Logo Rather Than Red Hat Logo" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1713005" id="1713005" title="Gnome-Boxes Does Not Show Rhel-8 Logo In Source Selection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1713776" id="1713776" title="Fix Unresponsive-App Dialog Blocking Other Windows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1722245" id="1722245" title="Bump Version For Glib2" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2064-1</id><title>Libstoragemgmt Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libstoragemgmt-udev" release="3.el7" src="libstoragemgmt-1.7.3-3.el7.src.rpm" version="1.7.3"><filename>libstoragemgmt-udev-1.7.3-3.el7.x86_64.rpm</filename><sum type="sha256">512e8db6c7591852a0b06b5ac4ac9a6e25018c0f277517eb1f38bd09f8412a30</sum></package><package arch="x86_64" name="libstoragemgmt-devel" release="3.el7" src="libstoragemgmt-1.7.3-3.el7.src.rpm" version="1.7.3"><filename>libstoragemgmt-devel-1.7.3-3.el7.x86_64.rpm</filename><sum type="sha256">3e197c90cee9b5716c00394af3adbf2b1ceb54d7eaf0f3dc5ff67e76b68d28ba</sum></package><package arch="noarch" name="libstoragemgmt-smis-plugin" release="3.el7" src="libstoragemgmt-1.7.3-3.el7.src.rpm" version="1.7.3"><filename>libstoragemgmt-smis-plugin-1.7.3-3.el7.noarch.rpm</filename><sum type="sha256">526ee62cd3a968692423e330e7f2f338d01b04b84a963038568dae867b2ac395</sum></package><package arch="i686" name="libstoragemgmt-devel" release="3.el7" src="libstoragemgmt-1.7.3-3.el7.src.rpm" version="1.7.3"><filename>libstoragemgmt-devel-1.7.3-3.el7.i686.rpm</filename><sum type="sha256">c44560d58a682ffc6150bb2279198fd8e26f5b71a53ffdff40cfe5cb0cd3aec4</sum></package><package arch="noarch" name="libstoragemgmt-nstor-plugin" release="3.el7" src="libstoragemgmt-1.7.3-3.el7.src.rpm" version="1.7.3"><filename>libstoragemgmt-nstor-plugin-1.7.3-3.el7.noarch.rpm</filename><sum type="sha256">d8fdb1e13f2875bada7fdf36d07cbad00f4207a5abf84b693af9cc583b966fa3</sum></package><package arch="noarch" name="libstoragemgmt-local-plugin" release="3.el7" src="libstoragemgmt-1.7.3-3.el7.src.rpm" version="1.7.3"><filename>libstoragemgmt-local-plugin-1.7.3-3.el7.noarch.rpm</filename><sum type="sha256">d817be2343694b433241f6de2981f571c201661fdbc6cc20fbf4bdb30071aede</sum></package><package arch="x86_64" name="libstoragemgmt" release="3.el7" src="libstoragemgmt-1.7.3-3.el7.src.rpm" version="1.7.3"><filename>libstoragemgmt-1.7.3-3.el7.x86_64.rpm</filename><sum type="sha256">d5b43e017887b27fe0792b6eafe58eee5c5a4e1bbe803a037be622ce78eb7084</sum></package><package arch="noarch" name="libstoragemgmt-python" release="3.el7" src="libstoragemgmt-1.7.3-3.el7.src.rpm" version="1.7.3"><filename>libstoragemgmt-python-1.7.3-3.el7.noarch.rpm</filename><sum type="sha256">dd1b921630423848e85f956aa9aec0bbeafba6b33c85d306f4200ab92e71a25e</sum></package><package arch="noarch" name="libstoragemgmt-targetd-plugin" release="3.el7" src="libstoragemgmt-1.7.3-3.el7.src.rpm" version="1.7.3"><filename>libstoragemgmt-targetd-plugin-1.7.3-3.el7.noarch.rpm</filename><sum type="sha256">416ee5dfd7d803a40bdd63dce4f86cc740231b40f56131e19cc03622ea549f4b</sum></package><package arch="x86_64" name="libstoragemgmt-python-clibs" release="3.el7" src="libstoragemgmt-1.7.3-3.el7.src.rpm" version="1.7.3"><filename>libstoragemgmt-python-clibs-1.7.3-3.el7.x86_64.rpm</filename><sum type="sha256">706d86fddb6aad743d6bb84b26dfc594ec61bcdaf3e3b7ba479877d01857108e</sum></package><package arch="noarch" name="libstoragemgmt-netapp-plugin" release="3.el7" src="libstoragemgmt-1.7.3-3.el7.src.rpm" version="1.7.3"><filename>libstoragemgmt-netapp-plugin-1.7.3-3.el7.noarch.rpm</filename><sum type="sha256">65214c0ba3ccda168dbfdacad9d26b12d8c044e90395cc0cc46f0684a56ef603</sum></package><package arch="noarch" name="libstoragemgmt-megaraid-plugin" release="3.el7" src="libstoragemgmt-1.7.3-3.el7.src.rpm" version="1.7.3"><filename>libstoragemgmt-megaraid-plugin-1.7.3-3.el7.noarch.rpm</filename><sum type="sha256">32ad977aade18a5670ba110858f678b3d19234d80aed8647b0279c5988442eb3</sum></package><package arch="noarch" name="libstoragemgmt-arcconf-plugin" release="3.el7" src="libstoragemgmt-1.7.3-3.el7.src.rpm" version="1.7.3"><filename>libstoragemgmt-arcconf-plugin-1.7.3-3.el7.noarch.rpm</filename><sum type="sha256">2bd2d69059ce49b8bbe4e61e645b4baa00c0b5459be4320f60e7e5e51313ba96</sum></package><package arch="x86_64" name="libstoragemgmt-nfs-plugin-clibs" release="3.el7" src="libstoragemgmt-1.7.3-3.el7.src.rpm" version="1.7.3"><filename>libstoragemgmt-nfs-plugin-clibs-1.7.3-3.el7.x86_64.rpm</filename><sum type="sha256">0c48ce22414134ed567ac96a94646f9628740202d802ffb7acc17c2c31e079ec</sum></package><package arch="i686" name="libstoragemgmt" release="3.el7" src="libstoragemgmt-1.7.3-3.el7.src.rpm" version="1.7.3"><filename>libstoragemgmt-1.7.3-3.el7.i686.rpm</filename><sum type="sha256">1e4059693022c5c6640b8b6f940afd90997ab23b555d5b798f0855966aead33b</sum></package><package arch="noarch" name="libstoragemgmt-hpsa-plugin" release="3.el7" src="libstoragemgmt-1.7.3-3.el7.src.rpm" version="1.7.3"><filename>libstoragemgmt-hpsa-plugin-1.7.3-3.el7.noarch.rpm</filename><sum type="sha256">604a0aa27fdbb394e595a4ad3c6a1cff96090bbdf95653af01fb7b5e9e74dc5a</sum></package><package arch="noarch" name="libstoragemgmt-nfs-plugin" release="3.el7" src="libstoragemgmt-1.7.3-3.el7.src.rpm" version="1.7.3"><filename>libstoragemgmt-nfs-plugin-1.7.3-3.el7.noarch.rpm</filename><sum type="sha256">d64db63084cb8c1b67410cc3d1ad873059cf29314cd3278f7af1767edc87f6ee</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2064" id="RHBA-2019:2064-1" title="Rhba-2019:2064-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564151" id="1564151" title="Lsmcli Volume-Replicate-Range Is Missing Checking For Src_Starts, Dst_Starts And Count" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1571894" id="1571894" title="Lsmcli [Command] --Init &quot;Wrong&quot; Return --Init-Id &quot;None&quot; In Error Instead Of --Init &quot;Wrong&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1572137" id="1572137" title="Lsmcli Fs-Export --*-Host Does Not Validate The Value" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1583681" id="1583681" title="Lsmcli Iscsi-Chap Should Fail If Given Just User Without Pass Or Vice Versa" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1583741" id="1583741" title="Plugin_Bug(2): Target Volume Is Already A Replication Target For Other Source Volume" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1583763" id="1583763" title="Lsmcli Volume-Replicate-Range Arguments Should Be Limited To Volume Size" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1583765" id="1583765" title="Lsmcli Manpage Is Missing Volume-Enable And Volume-Disable" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1583768" id="1583768" title="Lsmcli Volume-Write-Cache-Policy-Update --Help Typo" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1584243" id="1584243" title="Some Lsmcli List Types Allows More Optional Arguments Than Allowed In Manpage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1591282" id="1591282" title="Lsmcli -U &quot;Sim://&quot; Iscsi-Chap With Just Out-* Passes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1596731" id="1596731" title="Lsmcli Smis Plugin Shows Python Traceback With Invalid Url" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1624398" id="1624398" title="Smis Plugin: Plugin_Bug(2): Not Supported: Changing Volume Size To The Same Value" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1629735" id="1629735" title="Tps: /Run/Lsm(/Ipc) Has Different Permissions Than It Should" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1632438" id="1632438" title="The Libstoragemgmt Tmpfiles Configuration Does Not Match The Rpm Specfile" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1655601" id="1655601" title="Re-Base Libstoragemgmt To Latest Upstream Release" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1667096" id="1667096" title="Lsmcli Fs-Export --Anongid/Anonuid Allows Invalid Values" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1667992" id="1667992" title="Better Describe Optional Arguments In Manpage For Listing Records" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1670077" id="1670077" title="Lsmcli List --Type Snapshots Does Not Allow --Sys Anymore" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1675084" id="1675084" title="Nfs-Utils Not A Dependency To Libstoragemgmt-Nfs-Plugin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1693678" id="1693678" title="Rpm -V Group Ownership Differs Fro /Run/Lsm(/Ipc)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2083-1</id><title>Qgnomeplatform Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="qgnomeplatform" release="5.el7" src="qgnomeplatform-0.3-5.el7.src.rpm" version="0.3"><filename>qgnomeplatform-0.3-5.el7.x86_64.rpm</filename><sum type="sha256">4ab53c707b8292a49aebb2cd5594eb23037d10c91863047635e94a9d13b91122</sum></package><package arch="i686" name="qgnomeplatform" release="5.el7" src="qgnomeplatform-0.3-5.el7.src.rpm" version="0.3"><filename>qgnomeplatform-0.3-5.el7.i686.rpm</filename><sum type="sha256">f73484daea8bd76d0f9ef3f66b903dbe11b07dae83f7b01dbc3a780abb8e5928</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2083" id="RHBA-2019:2083-1" title="Rhba-2019:2083-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1657282" id="1657282" title="Backport Upstream Fix For Font Scaling" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2100-1</id><title>Rdma And Stack Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libpsm2-compat" release="1.el7" src="libpsm2-11.2.78-1.el7.src.rpm" version="11.2.78"><filename>libpsm2-compat-11.2.78-1.el7.x86_64.rpm</filename><sum type="sha256">201903bf9e6914a1ec4799f553d9bd4334239188b179d9b627d8b369d12cfaf9</sum></package><package arch="i686" name="compat-openmpi16-devel" release="10.7.2.el7" src="openmpi-1.10.7-5.el7.src.rpm" version="1.6.4"><filename>compat-openmpi16-devel-1.6.4-10.7.2.el7.i686.rpm</filename><sum type="sha256">b89bf320cd1bba6a9ea681a799386fa4d047be8b7835d9a7ab9f9b16c06ad7a3</sum></package><package arch="x86_64" name="compat-opensm-libs" release="3.el7" src="compat-opensm-libs-3.3.15-3.el7.src.rpm" version="3.3.15"><filename>compat-opensm-libs-3.3.15-3.el7.x86_64.rpm</filename><sum type="sha256">9bfd1142ca027ce7699c11921e7bdf4a474c529a4297e79e76c32a7ba3b08722</sum></package><package arch="x86_64" name="openmpi-devel" release="5.el7" src="openmpi-1.10.7-5.el7.src.rpm" version="1.10.7"><filename>openmpi-devel-1.10.7-5.el7.x86_64.rpm</filename><sum type="sha256">287840f81dc9a3b99ef129915f42cead8a2b06cfc537bb41d4dee067348e5010</sum></package><package arch="i686" name="libfabric" release="1.el7" src="libfabric-1.7.0-1.el7.src.rpm" version="1.7.0"><filename>libfabric-1.7.0-1.el7.i686.rpm</filename><sum type="sha256">d025b2f95721ed02c1ba287a0f9ae89bacaf0d9418b41ad613e06a74c0c425f6</sum></package><package arch="x86_64" name="compat-openmpi16" release="10.7.2.el7" src="openmpi-1.10.7-5.el7.src.rpm" version="1.6.4"><filename>compat-openmpi16-1.6.4-10.7.2.el7.x86_64.rpm</filename><sum type="sha256">f7bb6de271831703638cbd078d9466b1612ea55e41459a3a57d1cca872c04832</sum></package><package arch="i686" name="opensm-static" release="2.el7" src="opensm-3.3.21-2.el7.src.rpm" version="3.3.21"><filename>opensm-static-3.3.21-2.el7.i686.rpm</filename><sum type="sha256">3fd7c0c4851cd534a56f27f633005e7baf7f15477f7ee7aead4ab422026bd20c</sum></package><package arch="x86_64" name="libfabric" release="1.el7" src="libfabric-1.7.0-1.el7.src.rpm" version="1.7.0"><filename>libfabric-1.7.0-1.el7.x86_64.rpm</filename><sum type="sha256">28ea9e99108872eaf8ef519ec48b204ddc6091367afa5f497a515b2f0f02fd9c</sum></package><package arch="i686" name="libfabric-devel" release="1.el7" src="libfabric-1.7.0-1.el7.src.rpm" version="1.7.0"><filename>libfabric-devel-1.7.0-1.el7.i686.rpm</filename><sum type="sha256">3810e53e3de31cbd71973485365d063b90ded1519008a90fdc673804bfc7c217</sum></package><package arch="i686" name="openmpi3" release="2.el7" src="openmpi-1.10.7-5.el7.src.rpm" version="3.1.3"><filename>openmpi3-3.1.3-2.el7.i686.rpm</filename><sum type="sha256">d42a86e851b5bab260b6e227efdace1daba61a2c6f5f080b1be942ac0ca1f475</sum></package><package arch="i686" name="opensm-devel" release="2.el7" src="opensm-3.3.21-2.el7.src.rpm" version="3.3.21"><filename>opensm-devel-3.3.21-2.el7.i686.rpm</filename><sum type="sha256">662b26c3b73674fd68ab7c1614657b5411a07f4009007f75d7d68ad3e13dfe09</sum></package><package arch="x86_64" name="libpsm2-devel" release="1.el7" src="libpsm2-11.2.78-1.el7.src.rpm" version="11.2.78"><filename>libpsm2-devel-11.2.78-1.el7.x86_64.rpm</filename><sum type="sha256">409832b9bda98bd1d4f13e798a2d3a8b8115666a81633ab05c8ae7844dae18a8</sum></package><package arch="x86_64" name="compat-openmpi16-devel" release="10.7.2.el7" src="openmpi-1.10.7-5.el7.src.rpm" version="1.6.4"><filename>compat-openmpi16-devel-1.6.4-10.7.2.el7.x86_64.rpm</filename><sum type="sha256">fea87251607aaf00878b132b9f16b896031346680ce309bcfcacce7722750bb0</sum></package><package arch="i686" name="openmpi3-devel" release="2.el7" src="openmpi-1.10.7-5.el7.src.rpm" version="3.1.3"><filename>openmpi3-devel-3.1.3-2.el7.i686.rpm</filename><sum type="sha256">be1d01cccb8c272a115f94697eedf28c31ccb30cf8bd95cefc4f18b22f7c43fd</sum></package><package arch="i686" name="ibutils-libs" release="14.el7" src="ibutils-1.5.7-14.el7.src.rpm" version="1.5.7"><filename>ibutils-libs-1.5.7-14.el7.i686.rpm</filename><sum type="sha256">4e1fdf40d4bd65e645d3ee03ebe9f620a7c18946ef17fbf184d8896b0465981b</sum></package><package arch="i686" name="openmpi" release="5.el7" src="openmpi-1.10.7-5.el7.src.rpm" version="1.10.7"><filename>openmpi-1.10.7-5.el7.i686.rpm</filename><sum type="sha256">96b6b5adebaabcc75e5aa7e0a9a1efb6c164dcbef731eeb8de0a4cc07f467fca</sum></package><package arch="x86_64" name="libfabric-devel" release="1.el7" src="libfabric-1.7.0-1.el7.src.rpm" version="1.7.0"><filename>libfabric-devel-1.7.0-1.el7.x86_64.rpm</filename><sum type="sha256">8771a3f59c27f5ade454369416bad33d63675a028f548bbf4edf08d0bf5d80f3</sum></package><package arch="x86_64" name="opensm" release="2.el7" src="opensm-3.3.21-2.el7.src.rpm" version="3.3.21"><filename>opensm-3.3.21-2.el7.x86_64.rpm</filename><sum type="sha256">a7bb92ecbe0ccf174204d0a3327b3121adcab295b0ce54a0c04afea1fd6dcc40</sum></package><package arch="x86_64" name="ibutils" release="14.el7" src="ibutils-1.5.7-14.el7.src.rpm" version="1.5.7"><filename>ibutils-1.5.7-14.el7.x86_64.rpm</filename><sum type="sha256">6fb396f05e1f637c276349430f5c24df16f5ec080a0162b99d4618596dcca930</sum></package><package arch="x86_64" name="openmpi" release="5.el7" src="openmpi-1.10.7-5.el7.src.rpm" version="1.10.7"><filename>openmpi-1.10.7-5.el7.x86_64.rpm</filename><sum type="sha256">afef957b29b87fbd8b6c9530302df2f1c284b2dce53776e030f9e789b539c52d</sum></package><package arch="x86_64" name="openmpi3-devel" release="2.el7" src="openmpi-1.10.7-5.el7.src.rpm" version="3.1.3"><filename>openmpi3-devel-3.1.3-2.el7.x86_64.rpm</filename><sum type="sha256">82d4e4c670e068d06bc083e5cf4141104a6205e86470b39944275432a99c74f7</sum></package><package arch="i686" name="compat-openmpi16" release="10.7.2.el7" src="openmpi-1.10.7-5.el7.src.rpm" version="1.6.4"><filename>compat-openmpi16-1.6.4-10.7.2.el7.i686.rpm</filename><sum type="sha256">529c358e79418eb7c939596321c9c5c716ed1f8a2ed8a54829ec84303b83ce50</sum></package><package arch="x86_64" name="opensm-static" release="2.el7" src="opensm-3.3.21-2.el7.src.rpm" version="3.3.21"><filename>opensm-static-3.3.21-2.el7.x86_64.rpm</filename><sum type="sha256">0b488f28e77c4c984bf253f84c4bf3db55309986dfabe1474bbec21c0bf663a3</sum></package><package arch="i686" name="opensm-libs" release="2.el7" src="opensm-3.3.21-2.el7.src.rpm" version="3.3.21"><filename>opensm-libs-3.3.21-2.el7.i686.rpm</filename><sum type="sha256">a9946c04fe43af5303590d1b8d892eb078dd48acaf303e08f10c361bb6b1eb03</sum></package><package arch="x86_64" name="openmpi3" release="2.el7" src="openmpi-1.10.7-5.el7.src.rpm" version="3.1.3"><filename>openmpi3-3.1.3-2.el7.x86_64.rpm</filename><sum type="sha256">bb184f29e53a90100614c9711f66deb9246954f88cda7c9484779b81ecfa51c1</sum></package><package arch="x86_64" name="ibutils-devel" release="14.el7" src="ibutils-1.5.7-14.el7.src.rpm" version="1.5.7"><filename>ibutils-devel-1.5.7-14.el7.x86_64.rpm</filename><sum type="sha256">c0b343a6adfab38fd9b1fcc9eb4a9f3d2510c9fcbeea728ecf1af2d6ad7a2627</sum></package><package arch="x86_64" name="opensm-devel" release="2.el7" src="opensm-3.3.21-2.el7.src.rpm" version="3.3.21"><filename>opensm-devel-3.3.21-2.el7.x86_64.rpm</filename><sum type="sha256">a96c1f4256c774056223949919e6d55ebc6d4d3ca8dd84bffff641ab78d2b824</sum></package><package arch="x86_64" name="ibutils-libs" release="14.el7" src="ibutils-1.5.7-14.el7.src.rpm" version="1.5.7"><filename>ibutils-libs-1.5.7-14.el7.x86_64.rpm</filename><sum type="sha256">efdc80d9120172ab71c1b0a3291cd11c371427a194b21f0cf008b8fc8e1fba28</sum></package><package arch="i686" name="openmpi-devel" release="5.el7" src="openmpi-1.10.7-5.el7.src.rpm" version="1.10.7"><filename>openmpi-devel-1.10.7-5.el7.i686.rpm</filename><sum type="sha256">0a329d26c069dabf530e14485092d25235a5c0a0d094b096ecf371f26e4a2d17</sum></package><package arch="x86_64" name="libpsm2" release="1.el7" src="libpsm2-11.2.78-1.el7.src.rpm" version="11.2.78"><filename>libpsm2-11.2.78-1.el7.x86_64.rpm</filename><sum type="sha256">85b045867d8d69c9406d38f788155b9b13ffbc729f665dc0d9180b4f4a3c60a3</sum></package><package arch="x86_64" name="opensm-libs" release="2.el7" src="opensm-3.3.21-2.el7.src.rpm" version="3.3.21"><filename>opensm-libs-3.3.21-2.el7.x86_64.rpm</filename><sum type="sha256">959234c8a5c0e8b6a2adcb469499c94af5358c1df9c29296efbd57118c2a9139</sum></package><package arch="i686" name="ibutils-devel" release="14.el7" src="ibutils-1.5.7-14.el7.src.rpm" version="1.5.7"><filename>ibutils-devel-1.5.7-14.el7.i686.rpm</filename><sum type="sha256">ff3165253407ede96f55a736fc597c833cb6229369e52b21d1efbe2a765c9bf3</sum></package><package arch="i686" name="compat-opensm-libs" release="3.el7" src="compat-opensm-libs-3.3.15-3.el7.src.rpm" version="3.3.15"><filename>compat-opensm-libs-3.3.15-3.el7.i686.rpm</filename><sum type="sha256">cfa132fcbdd58b95729ea533b4beebb55613ce4cbceac6b5c9c25367b195df25</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2100" id="RHBA-2019:2100-1" title="Rhba-2019:2100-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1535978" id="1535978" title="[Rhel-7.5/Rdma] Opensm Only Honors The First Item Of Mgroup_Flags" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570393" id="1570393" title="[Broadcom Ccx 7.6 Feat]Libbnxt_Re: Add Srq Support On Broadcom Adapters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1653660" id="1653660" title="[Rdma/Rhel-7.7] Update Opensm To Latest Upstream Release 3.3.21" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1653664" id="1653664" title="[Rdma/Rhel-7.7] Recompile Ibutils Against Incoming Opensm-3.3.21" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1678274" id="1678274" title="[Broadcom Ccx 7.7 Feat]Libbnxt_Re: Add Support For Broadcom 57500 Adapters In User Library" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2107-1</id><title>Llvm-Private Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="llvm-private" release="1.el7" src="llvm-private-7.0.1-1.el7.src.rpm" version="7.0.1"><filename>llvm-private-7.0.1-1.el7.x86_64.rpm</filename><sum type="sha256">aed704e1be4abe86f92f15d6db78e1495251a74cf56eb3f632224928a0f53260</sum></package><package arch="x86_64" name="llvm-private-devel" release="1.el7" src="llvm-private-7.0.1-1.el7.src.rpm" version="7.0.1"><filename>llvm-private-devel-7.0.1-1.el7.x86_64.rpm</filename><sum type="sha256">2d211bf0346c792990edc6827d12e2fab61275b92307f72fd358696e740753c6</sum></package><package arch="i686" name="llvm-private-devel" release="1.el7" src="llvm-private-7.0.1-1.el7.src.rpm" version="7.0.1"><filename>llvm-private-devel-7.0.1-1.el7.i686.rpm</filename><sum type="sha256">a167bf41553925bd84717cde9e11549013667da44b5e37441e27b7e54626072e</sum></package><package arch="i686" name="llvm-private" release="1.el7" src="llvm-private-7.0.1-1.el7.src.rpm" version="7.0.1"><filename>llvm-private-7.0.1-1.el7.i686.rpm</filename><sum type="sha256">8c77b75b25a3b788d9fd9246cfdc7e6c73d186d096b06cc5dc26d858abd0c2b1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2107" id="RHBA-2019:2107-1" title="Rhba-2019:2107-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2144-1</id><title>Compat-Libgfortran-41 Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="compat-libgfortran-41" release="45.el7" src="compat-libgfortran-41-4.1.2-45.el7.src.rpm" version="4.1.2"><filename>compat-libgfortran-41-4.1.2-45.el7.x86_64.rpm</filename><sum type="sha256">01576b5fa0c2cb04b28f7995fa60765895339067476afb9820ba5e55c44130bc</sum></package><package arch="i686" name="compat-libgfortran-41" release="45.el7" src="compat-libgfortran-41-4.1.2-45.el7.src.rpm" version="4.1.2"><filename>compat-libgfortran-41-4.1.2-45.el7.i686.rpm</filename><sum type="sha256">9820e13d0d93cc747b29c65935bd0b3b35adbf1c631dc179ac9f71bb40ea439f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2144" id="RHBA-2019:2144-1" title="Rhba-2019:2144-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1628391" id="1628391" title="Missing Libquadmath.So.0 Linkage Causing Unresolved Symbols" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2146-1</id><title>Python-Rpm-Macros Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-srpm-macros" release="32.el7" src="python-rpm-macros-3-32.el7.src.rpm" version="3"><filename>python-srpm-macros-3-32.el7.noarch.rpm</filename><sum type="sha256">2b3afc3399639a9ea2aa3e1ea4a1d3a26b68774d05610ac998e339799738c2d9</sum></package><package arch="noarch" name="python2-rpm-macros" release="32.el7" src="python-rpm-macros-3-32.el7.src.rpm" version="3"><filename>python2-rpm-macros-3-32.el7.noarch.rpm</filename><sum type="sha256">a1716f66e41b546de6e62c951aa52e7031381f29f38bc0120fb48b04aef527a5</sum></package><package arch="noarch" name="python-rpm-macros" release="32.el7" src="python-rpm-macros-3-32.el7.src.rpm" version="3"><filename>python-rpm-macros-3-32.el7.noarch.rpm</filename><sum type="sha256">5e582562081f13d7efc1391c19509803ed58bd33cd9ca7a3dc89da1fc0b52dce</sum></package><package arch="noarch" name="python3-rpm-macros" release="32.el7" src="python-rpm-macros-3-32.el7.src.rpm" version="3"><filename>python3-rpm-macros-3-32.el7.noarch.rpm</filename><sum type="sha256">82c2e86ef85fa8b7d030ddb872fe461a84037109befd20e4959638efe8633c28</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2146" id="RHBA-2019:2146-1" title="Rhba-2019:2146-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2195-1</id><title>Bind-Dyndb-Ldap Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="bind-dyndb-ldap" release="6.el7" src="bind-dyndb-ldap-11.1-6.el7.src.rpm" version="11.1"><filename>bind-dyndb-ldap-11.1-6.el7.x86_64.rpm</filename><sum type="sha256">d9d034e7d69930023056524093855e51c6e9fb96d05f30ff053a3c59b11aae90</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2195" id="RHBA-2019:2195-1" title="Rhba-2019:2195-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1580389" id="1580389" title="Bind-Dyndb-Ldap Post Script Enables Setsetbool Named_Write_Master_Zones On Installation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677373" id="1677373" title="Bind-Dyndb-Ldap Does Not Compile After Bind 9.11 Rebase" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2198-1</id><title>Scap-Security-Guide Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide-doc" release="13.sl7_7" src="scap-security-guide-0.1.43-13.sl7_7.src.rpm" version="0.1.43"><filename>scap-security-guide-doc-0.1.43-13.sl7_7.noarch.rpm</filename><sum type="sha256">f25b6ede00cc937bde81bd7096c3a8fb50d689ca21f21425a05764e57da22c41</sum></package><package arch="noarch" name="scap-security-guide" release="13.sl7_7" src="scap-security-guide-0.1.43-13.sl7_7.src.rpm" version="0.1.43"><filename>scap-security-guide-0.1.43-13.sl7_7.noarch.rpm</filename><sum type="sha256">06bbee1345c58ad9a7f21ef814b1eddc3b09d198b87ea86f202635826bf91c06</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2198" id="RHBA-2019:2198-1" title="Rhba-2019:2198-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1465675" id="1465675" title="14 Audit Related Rules Fail To Remediate On Fresh Installed System" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1599179" id="1599179" title="Inconsistent Memcache_Timeout, Ssh_Known_Hosts_Timeout Wrt Man Sssd.Conf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1630739" id="1630739" title="Rules Not Applicable To Containers Are Not Marked As &quot;Machine Only&quot; Anymore" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1631378" id="1631378" title="Dconf Db Is Not Checked By Oval" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1636392" id="1636392" title="Ansible Remediations Put Colons Into Pam Configuration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1647189" id="1647189" title="Ansible Remediations Generated Using Openscap Exit After Any Failure." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1655614" id="1655614" title="Bug/Typo In Scap-Security-Guide Ansible Fix For Auditd.Conf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1657701" id="1657701" title="Pci Dss - Ensure Log Files Are Owned By Appropriate Group - Checks Group_Id With 4 Instead Of 0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658136" id="1658136" title="Rule Audit_Rules_Kernel_Module_Loading Checks For Syscalls Finit And Create, But Does Not Mention Or Remediate Accordingly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1661709" id="1661709" title="Typo In Remediation Script For Id=&quot;Xccdf_Org.Ssgproject.Content_Rule_Display_Login_Attempts&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1667108" id="1667108" title="Disa Profile Doubles Audit Rules (With Auid Unset And 4294967295) And Prevents Augenrules To Run" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677508" id="1677508" title="Oscap Rule Xccdf_Org.Ssgproject.Content_Rule_Dconf_Gnome_Screensaver_Mode_Blank Fails With Status &quot;Error&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1684545" id="1684545" title="Rebase Scap-Security-Guide In Red Hat Enterprise Linux 7.7 To Latest Upstream Version" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1686005" id="1686005" title="Disa Openscap Remediation Playbook Failing On Correcting File Permissions With Rpm." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1686007" id="1686007" title="Disa Openscap Remediation Playbook Failing On Ssh *.Pub/*.Key Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1687826" id="1687826" title="Remediation Of Stig Disa Profile Double Audit Rules" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1703010" id="1703010" title="Remediation For Ensure_Gpgcheck_Repo_Metadata Prevents Packages Installation And The Rule Has Been Dropped From Recommendations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1703092" id="1703092" title="Rules Have Same Cce Identifier Assigned To" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1711893" id="1711893" title="Disa Stig Profile For Containers Is Too Bloated" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2228-1</id><title>Pki-Core Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="pki-base-java" release="3.el7" src="pki-core-10.5.16-3.el7.src.rpm" version="10.5.16"><filename>pki-base-java-10.5.16-3.el7.noarch.rpm</filename><sum type="sha256">e62bd49288dbe394a8f5a64d26c181ffc88e8acec8d939680234eb1ff1c91c19</sum></package><package arch="x86_64" name="pki-tools" release="3.el7" src="pki-core-10.5.16-3.el7.src.rpm" version="10.5.16"><filename>pki-tools-10.5.16-3.el7.x86_64.rpm</filename><sum type="sha256">ac9483c5c9e3f7d5f7c599b58a4f0b358f0a2120a5b8f851fb0dfbd7c34b203c</sum></package><package arch="x86_64" name="pki-symkey" release="3.el7" src="pki-core-10.5.16-3.el7.src.rpm" version="10.5.16"><filename>pki-symkey-10.5.16-3.el7.x86_64.rpm</filename><sum type="sha256">bf1a0b95ad04744f91f383ecaa24049c3fc68aa98cde39dd5a7170cbb18e97c8</sum></package><package arch="noarch" name="pki-server" release="3.el7" src="pki-core-10.5.16-3.el7.src.rpm" version="10.5.16"><filename>pki-server-10.5.16-3.el7.noarch.rpm</filename><sum type="sha256">67c904e85e56df5370bbb293b561b5d3ec87934f3965b4c6a7f5f75ce34112e2</sum></package><package arch="noarch" name="pki-ca" release="3.el7" src="pki-core-10.5.16-3.el7.src.rpm" version="10.5.16"><filename>pki-ca-10.5.16-3.el7.noarch.rpm</filename><sum type="sha256">3f2148690fe5ad8cec88d954ddca2b0080e0fbb759df3ae7ba449ec02b920e38</sum></package><package arch="noarch" name="pki-javadoc" release="3.el7" src="pki-core-10.5.16-3.el7.src.rpm" version="10.5.16"><filename>pki-javadoc-10.5.16-3.el7.noarch.rpm</filename><sum type="sha256">101f11be61218a2b11adb1031d8c6458c3b799f0fcf4cc10d65e27f864b84d07</sum></package><package arch="noarch" name="pki-base" release="3.el7" src="pki-core-10.5.16-3.el7.src.rpm" version="10.5.16"><filename>pki-base-10.5.16-3.el7.noarch.rpm</filename><sum type="sha256">e04e8aaeace93fec4e8748285380160270619608fac2e7d4d6e36149a7582269</sum></package><package arch="noarch" name="pki-kra" release="3.el7" src="pki-core-10.5.16-3.el7.src.rpm" version="10.5.16"><filename>pki-kra-10.5.16-3.el7.noarch.rpm</filename><sum type="sha256">112318d9e922e9c3f8f7633bc1ef5af9521c96d5a882e3f35101185d4c005f0e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2228" id="RHBA-2019:2228-1" title="Rhba-2019:2228-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1372056" id="1372056" title="Pkidestroy May Not Remove All Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1468348" id="1468348" title="[Rfe] Offline Certificate Renewal System" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1554055" id="1554055" title="Permit Certain Sha384 Fips Ciphers To Be Enabled By Default For Rsa And Ecc . . ." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1578389" id="1578389" title="Unsupported Rsa_ Ciphers Should Be Removed From The Default Ciphers List" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1616134" id="1616134" title="Unable To Install With Admin-Generated Keys" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1617894" id="1617894" title="Auth Plugins Leave Passwords In The Access Log And Audit Log Using Rest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1624097" id="1624097" title="Cc: Identify Version/Release Of Pki-Ca, Pki-Kra, Pki-Ocsp, Pki-Tks, And Pki-Tps Remotely [Rhel]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1628410" id="1628410" title="Cmc: Add Config To Allow Non-Clientauth" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1633422" id="1633422" title="Rebase Pki-Core From 10.5.9 To 10.5.16 (Rhel)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1633761" id="1633761" title="Installation Of Ca Using An Existing Ca Fails" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1638379" id="1638379" title="Pki Startup Initialization Process Should Not Depend On Ldap Operational Attributes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639710" id="1639710" title="Pki Subsystem Process Is Not Shutdown When There Is No Space On The Disk To Write Logs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1641119" id="1641119" title="Cc: Ca/Ocsp Startup Fail On Systemcertsverification If Enableocsp Is True" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1644769" id="1644769" title="Pkispawn Fails Due To Name Collision With /Var/Log/Pki/&lt;Instance&gt;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1653863" id="1653863" title="Cc: Tools Supporting Cmc Requests Output Keyid Needs To Be Captured In File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658293" id="1658293" title="Cc: Simplifying Web Ui Session Timeout Configuration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1666853" id="1666853" title="Cc: Unable To Verify Cert Before Import" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2234-1</id><title>New Package: Adobe-Mappings-Cmap</title><description>All users who require adobe-mappings-cmap are advised to install this new package.</description><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="adobe-mappings-cmap-devel" release="3.el7" src="adobe-mappings-cmap-20171205-3.el7.src.rpm" version="20171205"><filename>adobe-mappings-cmap-devel-20171205-3.el7.noarch.rpm</filename><sum type="sha256">091b2685be7ea465d06f0a0918e454d29b0734962376c4dcf79687e447660998</sum></package><package arch="noarch" name="adobe-mappings-cmap-deprecated" release="3.el7" src="adobe-mappings-cmap-20171205-3.el7.src.rpm" version="20171205"><filename>adobe-mappings-cmap-deprecated-20171205-3.el7.noarch.rpm</filename><sum type="sha256">59b5e032e9da6e5eae0919b71f2c9aee70d9e87612887671d3037eafd84f0086</sum></package><package arch="noarch" name="adobe-mappings-cmap" release="3.el7" src="adobe-mappings-cmap-20171205-3.el7.src.rpm" version="20171205"><filename>adobe-mappings-cmap-20171205-3.el7.noarch.rpm</filename><sum type="sha256">29abb5030459b75f5c9bfa1a1c9f0722ef7d220ffa38deb3bfe1ee89c961d61b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2234" id="RHBA-2019:2234-1" title="Rhba-2019:2234-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2235-1</id><title>New Package: Adobe-Mappings-Pdf</title><description>All users who require adobe-mappings-pdf are advised to install this new package.</description><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="adobe-mappings-pdf" release="1.el7" src="adobe-mappings-pdf-20180407-1.el7.src.rpm" version="20180407"><filename>adobe-mappings-pdf-20180407-1.el7.noarch.rpm</filename><sum type="sha256">6cca064bb7c9bc2fefa399afe49bacf902eacfce37fcb701b1d45f23fed7b28a</sum></package><package arch="noarch" name="adobe-mappings-pdf-devel" release="1.el7" src="adobe-mappings-pdf-20180407-1.el7.src.rpm" version="20180407"><filename>adobe-mappings-pdf-devel-20180407-1.el7.noarch.rpm</filename><sum type="sha256">312e7630478d8abf12cf59b2ba1df5bd1e32504f59eca70e58ca1cf848a885ab</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2235" id="RHBA-2019:2235-1" title="Rhba-2019:2235-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2236-1</id><title>New Package: Urw-Base35-Fonts</title><description>All users who require urw-base35-fonts are advised to install this new package.</description><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="urw-base35-fonts-common" release="10.el7" src="urw-base35-fonts-20170801-10.el7.src.rpm" version="20170801"><filename>urw-base35-fonts-common-20170801-10.el7.noarch.rpm</filename><sum type="sha256">1a73e7035f7c0f43a813e42deacba4afa592f6e185dcdb15523535809681332c</sum></package><package arch="noarch" name="urw-base35-fonts" release="10.el7" src="urw-base35-fonts-20170801-10.el7.src.rpm" version="20170801"><filename>urw-base35-fonts-20170801-10.el7.noarch.rpm</filename><sum type="sha256">f685be2f5e3b07d9c32b5752f69e81a641581fe7de87925209f64ba3b64ffc4f</sum></package><package arch="noarch" name="urw-base35-bookman-fonts" release="10.el7" src="urw-base35-fonts-20170801-10.el7.src.rpm" version="20170801"><filename>urw-base35-bookman-fonts-20170801-10.el7.noarch.rpm</filename><sum type="sha256">2515d06faf24097f8da059e9e503ae05fb06409d15160d0d07b5a5fd19471d66</sum></package><package arch="noarch" name="urw-base35-z003-fonts" release="10.el7" src="urw-base35-fonts-20170801-10.el7.src.rpm" version="20170801"><filename>urw-base35-z003-fonts-20170801-10.el7.noarch.rpm</filename><sum type="sha256">fca2bf3b92dc906e639dab9c656786d8e5a5fe642e3ba90dbb662b549a715c9d</sum></package><package arch="noarch" name="urw-base35-d050000l-fonts" release="10.el7" src="urw-base35-fonts-20170801-10.el7.src.rpm" version="20170801"><filename>urw-base35-d050000l-fonts-20170801-10.el7.noarch.rpm</filename><sum type="sha256">46ee054337fdb51390e3da8352ade4302189f5d486c10a813c7679eb72e1da2a</sum></package><package arch="noarch" name="urw-base35-nimbus-sans-fonts" release="10.el7" src="urw-base35-fonts-20170801-10.el7.src.rpm" version="20170801"><filename>urw-base35-nimbus-sans-fonts-20170801-10.el7.noarch.rpm</filename><sum type="sha256">820c07f4da410e70d0d73203f162143ef150a7ee0b0968eacdaad1eb5591fb1c</sum></package><package arch="noarch" name="urw-base35-gothic-fonts" release="10.el7" src="urw-base35-fonts-20170801-10.el7.src.rpm" version="20170801"><filename>urw-base35-gothic-fonts-20170801-10.el7.noarch.rpm</filename><sum type="sha256">8b84c732768c2969db7300d9f0ade946b5a109bb1e4388de6771a17b0bd269b2</sum></package><package arch="noarch" name="urw-base35-c059-fonts" release="10.el7" src="urw-base35-fonts-20170801-10.el7.src.rpm" version="20170801"><filename>urw-base35-c059-fonts-20170801-10.el7.noarch.rpm</filename><sum type="sha256">17bebfd8e13a612ec8aaf37d6d43c155496cc52a8acebf3eca211c601afd8db4</sum></package><package arch="noarch" name="urw-base35-nimbus-roman-fonts" release="10.el7" src="urw-base35-fonts-20170801-10.el7.src.rpm" version="20170801"><filename>urw-base35-nimbus-roman-fonts-20170801-10.el7.noarch.rpm</filename><sum type="sha256">137720abcbcd1726d15b8f36834cdb452649380ddc0b0a2be56f48062a69eec0</sum></package><package arch="noarch" name="urw-base35-standard-symbols-ps-fonts" release="10.el7" src="urw-base35-fonts-20170801-10.el7.src.rpm" version="20170801"><filename>urw-base35-standard-symbols-ps-fonts-20170801-10.el7.noarch.rpm</filename><sum type="sha256">041e850e7b649b1041fd0cdc0d1cc17cf60db5779ee988adfa5976aa983012cd</sum></package><package arch="noarch" name="urw-base35-fonts-devel" release="10.el7" src="urw-base35-fonts-20170801-10.el7.src.rpm" version="20170801"><filename>urw-base35-fonts-devel-20170801-10.el7.noarch.rpm</filename><sum type="sha256">1fb9c9eaf819198f3bea11f2219ae390954bab6e91b2d1b6c29bb417857f09d9</sum></package><package arch="noarch" name="urw-base35-nimbus-mono-ps-fonts" release="10.el7" src="urw-base35-fonts-20170801-10.el7.src.rpm" version="20170801"><filename>urw-base35-nimbus-mono-ps-fonts-20170801-10.el7.noarch.rpm</filename><sum type="sha256">ae3a987dd2acbc77e69e74f4b5b2b5eece9a1f55db19c8b5ba52901df707d40f</sum></package><package arch="noarch" name="urw-base35-p052-fonts" release="10.el7" src="urw-base35-fonts-20170801-10.el7.src.rpm" version="20170801"><filename>urw-base35-p052-fonts-20170801-10.el7.noarch.rpm</filename><sum type="sha256">1e79cb5b05498a34f059ca4cdc4d59cb162ddde3132a1fb0b8a37a381b67dc30</sum></package><package arch="noarch" name="urw-base35-fonts-legacy" release="10.el7" src="urw-base35-fonts-20170801-10.el7.src.rpm" version="20170801"><filename>urw-base35-fonts-legacy-20170801-10.el7.noarch.rpm</filename><sum type="sha256">eaf98259619a6fac07b30dd22baa52eab68b144dcac9f016a1fb0b1385d1c000</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2236" id="RHBA-2019:2236-1" title="Rhba-2019:2236-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2341-1</id><title>Openscap Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openscap-scanner" release="4.el7" src="openscap-1.2.17-4.el7.src.rpm" version="1.2.17"><filename>openscap-scanner-1.2.17-4.el7.x86_64.rpm</filename><sum type="sha256">e59d78e8a591c99975084d799215fbbc80d8fff07206ae07051d2c04b4e07676</sum></package><package arch="x86_64" name="openscap-engine-sce" release="4.el7" src="openscap-1.2.17-4.el7.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-4.el7.x86_64.rpm</filename><sum type="sha256">d1f33b40613a191e7b2e53341971f903b8b809b785e071f481a5e862eb2d2d64</sum></package><package arch="x86_64" name="openscap-engine-sce-devel" release="4.el7" src="openscap-1.2.17-4.el7.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-4.el7.x86_64.rpm</filename><sum type="sha256">4f52b3f5f9ec896deb0f5c514e82ee1964eda1d69abd5bfad9d07197a290fe77</sum></package><package arch="i686" name="openscap" release="4.el7" src="openscap-1.2.17-4.el7.src.rpm" version="1.2.17"><filename>openscap-1.2.17-4.el7.i686.rpm</filename><sum type="sha256">90e8aaa70fb89d58b068a2fdec73c2a985381c31b46e4a0e6654476652f51ebf</sum></package><package arch="x86_64" name="openscap-utils" release="4.el7" src="openscap-1.2.17-4.el7.src.rpm" version="1.2.17"><filename>openscap-utils-1.2.17-4.el7.x86_64.rpm</filename><sum type="sha256">aa6fe9389bc5b0c3d3a3d6632fa9caddf20c0063f22f6eaf79dbc51db3d03e0f</sum></package><package arch="x86_64" name="openscap-devel" release="4.el7" src="openscap-1.2.17-4.el7.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-4.el7.x86_64.rpm</filename><sum type="sha256">0beb7095bd8713c5f1aa0c5d7a3c2eb462e7903591ef8eded035fbbac1f151af</sum></package><package arch="i686" name="openscap-devel" release="4.el7" src="openscap-1.2.17-4.el7.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-4.el7.i686.rpm</filename><sum type="sha256">6da51ad4de35df9b91f9775c6ee4cd918f2dfe8f4c3651216c6c7d4217b98ca7</sum></package><package arch="x86_64" name="openscap" release="4.el7" src="openscap-1.2.17-4.el7.src.rpm" version="1.2.17"><filename>openscap-1.2.17-4.el7.x86_64.rpm</filename><sum type="sha256">9795ce698d4dfbe2f04e68b3040a8b51df341e98c08009d4d8ad4ae1ae5e6c43</sum></package><package arch="i686" name="openscap-engine-sce-devel" release="4.el7" src="openscap-1.2.17-4.el7.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-4.el7.i686.rpm</filename><sum type="sha256">a7ad6546ba63dc2906879e3921cf2796e902245c255d975720009bfd2c9996a5</sum></package><package arch="x86_64" name="openscap-extra-probes" release="4.el7" src="openscap-1.2.17-4.el7.src.rpm" version="1.2.17"><filename>openscap-extra-probes-1.2.17-4.el7.x86_64.rpm</filename><sum type="sha256">44e9e019d6e6045f7c107e11eb4fa51e63d449a92adcba23cde05fa48054dbad</sum></package><package arch="x86_64" name="openscap-python" release="4.el7" src="openscap-1.2.17-4.el7.src.rpm" version="1.2.17"><filename>openscap-python-1.2.17-4.el7.x86_64.rpm</filename><sum type="sha256">1f894a63a7efa3170a1c248f0d5c6d62cd8fd41364054635d0a9eebf56ad6314</sum></package><package arch="i686" name="openscap-engine-sce" release="4.el7" src="openscap-1.2.17-4.el7.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-4.el7.i686.rpm</filename><sum type="sha256">a16a43e476ddc8b3fff02c9bdc0dd8c85f6b70756af59fd12b9b3fd6fd78490e</sum></package><package arch="noarch" name="openscap-containers" release="4.el7" src="openscap-1.2.17-4.el7.src.rpm" version="1.2.17"><filename>openscap-containers-1.2.17-4.el7.noarch.rpm</filename><sum type="sha256">24e48e3d60fc2c41c2bcdbf7297b126c6a251fb2d526fb1879836d40ea9e8d86</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2341" id="RHBA-2019:2341-1" title="Rhba-2019:2341-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1655943" id="1655943" title="Network-Mounted Filesystems Are Recursed Into Despite The Content Specifies Local-Only Recursion" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1709423" id="1709423" title="Scap 1.3 Datastreams Should Be Evaluated Without Downloading Remote Data" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2350-1</id><title>New Package: Compat-Exiv2-026</title><description>This update adds the compat-exiv2-026 package to Scientific Linux 7.</description><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="compat-exiv2-026" release="1.el7" src="compat-exiv2-026-0.26-1.el7.src.rpm" version="0.26"><filename>compat-exiv2-026-0.26-1.el7.i686.rpm</filename><sum type="sha256">d9d8853d3466c52b93b0aca7dddcff3c9c8d17b60315287742f118ae6feb556a</sum></package><package arch="x86_64" name="compat-exiv2-026" release="1.el7" src="compat-exiv2-026-0.26-1.el7.src.rpm" version="0.26"><filename>compat-exiv2-026-0.26-1.el7.x86_64.rpm</filename><sum type="sha256">9d513b6fbda6a6d24045dfcf50b05a0953e4910549bf24d61943a0c9ce939b0e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2350" id="RHBA-2019:2350-1" title="Rhba-2019:2350-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2355-1</id><title>Selinux-Policy Bug Fix Update</title><description>This update fixes the following bug:

* avc errors reported when using sbd fencing</description><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy-devel" release="252.el7.1" src="selinux-policy-3.13.1-252.el7.1.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-252.el7.1.noarch.rpm</filename><sum type="sha256">fa669426199fc0220d157ab5b6f267f3d0760946a26db2c3308d51f88c22ea71</sum></package><package arch="noarch" name="selinux-policy-doc" release="252.el7.1" src="selinux-policy-3.13.1-252.el7.1.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-252.el7.1.noarch.rpm</filename><sum type="sha256">21eadd6dc1e6f58cf657f863981f3abd9d2e04d1009d62e91f5122bc18d45cf4</sum></package><package arch="noarch" name="selinux-policy-targeted" release="252.el7.1" src="selinux-policy-3.13.1-252.el7.1.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-252.el7.1.noarch.rpm</filename><sum type="sha256">8fa15bbdfae5fd9f9241e449ae05dbd5f1bc6a3f8f2d16666f66c39c50a5e089</sum></package><package arch="noarch" name="selinux-policy-mls" release="252.el7.1" src="selinux-policy-3.13.1-252.el7.1.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-252.el7.1.noarch.rpm</filename><sum type="sha256">651b0bbd9557c5bad41d3cae6bcc8165fc8584838a7b2eb97a50b7b0429adcca</sum></package><package arch="noarch" name="selinux-policy-minimum" release="252.el7.1" src="selinux-policy-3.13.1-252.el7.1.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-252.el7.1.noarch.rpm</filename><sum type="sha256">1c6b98ef50cdb95c03092c9ad7b2f7ca7f863d18a8241f17bdb42c153418375d</sum></package><package arch="noarch" name="selinux-policy" release="252.el7.1" src="selinux-policy-3.13.1-252.el7.1.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-252.el7.1.noarch.rpm</filename><sum type="sha256">98f82227c3863abc00ea3e6041b50e95328a1de0f1da69a79f17b8b63eae976f</sum></package><package arch="noarch" name="selinux-policy-sandbox" release="252.el7.1" src="selinux-policy-3.13.1-252.el7.1.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-252.el7.1.noarch.rpm</filename><sum type="sha256">0dbbdc4b51e811a936eacb82a513dc23ef01a54eaf3eac62f2990c78eb9a706b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2355" id="RHBA-2019:2355-1" title="Rhba-2019:2355-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728593" id="1728593" title="Avc Errors Reported When Using Sbd Fencing [Rhel-7.7.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:2871-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been updated to version 2019c, which addresses recent time zone changes. Notably:

* Fiji will observe the daylight saving time (DST) from November 10, 2019 to January 12, 2020.

* Norfolk Island will start to observe Australian-style DST on November 06, 2019.</description><release>Scientific Linux</release><issued date="2019-08-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2019c-1.el7.src.rpm" version="2019c"><filename>tzdata-java-2019c-1.el7.noarch.rpm</filename><sum type="sha256">25ea4f06b9de07be4a69e4641b69eb39029d49dfa6bd453a717b6a6bcdf15897</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2019c-1.el7.src.rpm" version="2019c"><filename>tzdata-2019c-1.el7.noarch.rpm</filename><sum type="sha256">2aed8f444cc16c1a7c2033e0b94afb7868a8dd2b547f8c9a07ffbdd75967fa52</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:2871" id="RHBA-2019:2871-1" title="Rhba-2019:2871-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:3062-1</id><title>Kpatch Bug Fix Update</title><description>This update fixes the following bug:

* kpatch: clarify that "kpatch unload" isn't supported</description><release>Scientific Linux</release><issued date="2019-10-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kpatch" release="5.el7_7" src="kpatch-0.6.1-5.el7_7.src.rpm" version="0.6.1"><filename>kpatch-0.6.1-5.el7_7.noarch.rpm</filename><sum type="sha256">248170e30031314538f11da067205704744e821a40df4b4deba4f958da3b25a1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:3062" id="RHBA-2019:3062-1" title="Rhba-2019:3062-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2019:3982-1</id><title>Selinux-Policy Bug Fix Update</title><description>This update fixes the following bug:

* AVCs seen on "fuser" when "tmpwatch --fuser ..." is used as a system cron job</description><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy-doc" release="252.el7_7.6" src="selinux-policy-3.13.1-252.el7_7.6.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-252.el7_7.6.noarch.rpm</filename><sum type="sha256">65ff701326e363fcacfc65d6ce5a80af991c3ba9362abd8fbf1e292b7243d725</sum></package><package arch="noarch" name="selinux-policy-targeted" release="252.el7_7.6" src="selinux-policy-3.13.1-252.el7_7.6.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-252.el7_7.6.noarch.rpm</filename><sum type="sha256">05180e34b1952b23bc88e61dad1155a0892605d7e87f36135bd4288a3f159c97</sum></package><package arch="noarch" name="selinux-policy-devel" release="252.el7_7.6" src="selinux-policy-3.13.1-252.el7_7.6.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-252.el7_7.6.noarch.rpm</filename><sum type="sha256">7f20544af0535ca7cc09eb415be4736adfb2f41ee91f284f93213b7d734dc9d3</sum></package><package arch="noarch" name="selinux-policy" release="252.el7_7.6" src="selinux-policy-3.13.1-252.el7_7.6.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-252.el7_7.6.noarch.rpm</filename><sum type="sha256">86b5f248b85caa826d8e564e1d18fdb4919f015c0d2f48b522394f2cd3c54311</sum></package><package arch="noarch" name="selinux-policy-minimum" release="252.el7_7.6" src="selinux-policy-3.13.1-252.el7_7.6.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-252.el7_7.6.noarch.rpm</filename><sum type="sha256">42431e2c31afb2a1c93ce9297cf295103294fc658d7bcfae3efa561fe36e6988</sum></package><package arch="noarch" name="selinux-policy-sandbox" release="252.el7_7.6" src="selinux-policy-3.13.1-252.el7_7.6.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-252.el7_7.6.noarch.rpm</filename><sum type="sha256">8020318fb1ee7cc88ab8a932bbca9bc4aa40ec17c08822ecb4b4629642220444</sum></package><package arch="noarch" name="selinux-policy-mls" release="252.el7_7.6" src="selinux-policy-3.13.1-252.el7_7.6.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-252.el7_7.6.noarch.rpm</filename><sum type="sha256">3b5a1995a7c0f173b3c5c79b7a6de0709826175d470ed92478ebada108171473</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2019:3982" id="RHBA-2019:3982-1" title="Rhba-2019:3982-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1766095" id="1766095" title="Avcs Seen On &quot;Fuser&quot; When &quot;Tmpwatch --Fuser ...&quot; Is Used As A System Cron Job [Rhel-7.7.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:0991-1</id><title>Libtalloc Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libtalloc-devel" release="1.el7" src="libtalloc-2.1.16-1.el7.src.rpm" version="2.1.16"><filename>libtalloc-devel-2.1.16-1.el7.i686.rpm</filename><sum type="sha256">a98926e7cf0376ec2ca75db51c964aa900e3ae1fe69e04a9d1fee08f2fe6ea72</sum></package><package arch="x86_64" name="libtalloc" release="1.el7" src="libtalloc-2.1.16-1.el7.src.rpm" version="2.1.16"><filename>libtalloc-2.1.16-1.el7.x86_64.rpm</filename><sum type="sha256">2da1603b64a260885615e3589386be9f9941c5c3d1b3d31f77a4c2275a3d0b6e</sum></package><package arch="x86_64" name="pytalloc" release="1.el7" src="libtalloc-2.1.16-1.el7.src.rpm" version="2.1.16"><filename>pytalloc-2.1.16-1.el7.x86_64.rpm</filename><sum type="sha256">c6862e9c3ab8939dddae843fc610653aa0e6f803e82493ab700c080e1cb0da00</sum></package><package arch="i686" name="pytalloc" release="1.el7" src="libtalloc-2.1.16-1.el7.src.rpm" version="2.1.16"><filename>pytalloc-2.1.16-1.el7.i686.rpm</filename><sum type="sha256">22828299404e989ddf87ab406a3dadda02f2a852f8f7664d0ae2e5983d837ac5</sum></package><package arch="i686" name="libtalloc" release="1.el7" src="libtalloc-2.1.16-1.el7.src.rpm" version="2.1.16"><filename>libtalloc-2.1.16-1.el7.i686.rpm</filename><sum type="sha256">fb69cccc4077d4915453e6feb35f56e5b77283b699bc1792c04c237aba344af1</sum></package><package arch="i686" name="pytalloc-devel" release="1.el7" src="libtalloc-2.1.16-1.el7.src.rpm" version="2.1.16"><filename>pytalloc-devel-2.1.16-1.el7.i686.rpm</filename><sum type="sha256">ecf6f5126434bd87f16417a44d562dac3932d41df43fbaf83bad2dc75433af4f</sum></package><package arch="x86_64" name="pytalloc-devel" release="1.el7" src="libtalloc-2.1.16-1.el7.src.rpm" version="2.1.16"><filename>pytalloc-devel-2.1.16-1.el7.x86_64.rpm</filename><sum type="sha256">3796e011aae01468a4cc1080dfd545cc7e5bb1eb38ba1de4abd3edbf1c393ba2</sum></package><package arch="x86_64" name="libtalloc-devel" release="1.el7" src="libtalloc-2.1.16-1.el7.src.rpm" version="2.1.16"><filename>libtalloc-devel-2.1.16-1.el7.x86_64.rpm</filename><sum type="sha256">ef554ef7cafb18aef7ca04d8f401090a31e59a79f2e891cccd0fc335f51a218d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:0991" id="RHBA-2020:0991-1" title="Rhba-2020:0991-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1736005" id="1736005" title="Rebase Libtalloc To Version 2.1.16 For Samba" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:1001-1</id><title>Libtdb Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="tdb-tools" release="1.el7" src="libtdb-1.3.18-1.el7.src.rpm" version="1.3.18"><filename>tdb-tools-1.3.18-1.el7.x86_64.rpm</filename><sum type="sha256">571d522d63620a132ebf6b615453f887ea4d256f45204e19eab80ff30d7af734</sum></package><package arch="i686" name="python-tdb" release="1.el7" src="libtdb-1.3.18-1.el7.src.rpm" version="1.3.18"><filename>python-tdb-1.3.18-1.el7.i686.rpm</filename><sum type="sha256">50bee6db25486d21add75cd4ec70aba9ddf1c94b0c9558fcce9db4626419393b</sum></package><package arch="x86_64" name="python-tdb" release="1.el7" src="libtdb-1.3.18-1.el7.src.rpm" version="1.3.18"><filename>python-tdb-1.3.18-1.el7.x86_64.rpm</filename><sum type="sha256">c8805e391f94da88276eb660d646d5470bf441192d3150c761a9b61a3dd71c69</sum></package><package arch="i686" name="libtdb-devel" release="1.el7" src="libtdb-1.3.18-1.el7.src.rpm" version="1.3.18"><filename>libtdb-devel-1.3.18-1.el7.i686.rpm</filename><sum type="sha256">58be27ba7d8f74087fc106838de89bb97d8162085983ca03e69526f5df86dbb7</sum></package><package arch="x86_64" name="libtdb" release="1.el7" src="libtdb-1.3.18-1.el7.src.rpm" version="1.3.18"><filename>libtdb-1.3.18-1.el7.x86_64.rpm</filename><sum type="sha256">148868a33a99c530b598589256ae5596f47da6e1f5d444cb98ad0afc871f1544</sum></package><package arch="x86_64" name="libtdb-devel" release="1.el7" src="libtdb-1.3.18-1.el7.src.rpm" version="1.3.18"><filename>libtdb-devel-1.3.18-1.el7.x86_64.rpm</filename><sum type="sha256">9ab0b0c83c5209d07f8982c6d08d8394f43e97fa7265528e918374da68cc5360</sum></package><package arch="i686" name="libtdb" release="1.el7" src="libtdb-1.3.18-1.el7.src.rpm" version="1.3.18"><filename>libtdb-1.3.18-1.el7.i686.rpm</filename><sum type="sha256">482b7ef769828f728c2bd39249ba8291516643c0641b02ca64533c3fed0866e3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:1001" id="RHBA-2020:1001-1" title="Rhba-2020:1001-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1736003" id="1736003" title="Rebase Libtdb To Version 1.3.18 For Samba" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:1012-1</id><title>Bcc Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="bcc-devel" release="1.el7" src="bcc-0.10.0-1.el7.src.rpm" version="0.10.0"><filename>bcc-devel-0.10.0-1.el7.x86_64.rpm</filename><sum type="sha256">4914a980e6f9b92cf98d80aabf7bb7e87ffc4c66f9f89e6b79f138bca8ef847e</sum></package><package arch="x86_64" name="bcc-tools" release="1.el7" src="bcc-0.10.0-1.el7.src.rpm" version="0.10.0"><filename>bcc-tools-0.10.0-1.el7.x86_64.rpm</filename><sum type="sha256">182f51dc408fcb82875d80410ce35a54aa062e689c3cc4c80c882bdc5d20edd8</sum></package><package arch="x86_64" name="python-bcc" release="1.el7" src="bcc-0.10.0-1.el7.src.rpm" version="0.10.0"><filename>python-bcc-0.10.0-1.el7.x86_64.rpm</filename><sum type="sha256">7e50bf01dba9aaeee79ac762ec2d192db08dab2ff958764d11c35d610494ed04</sum></package><package arch="noarch" name="bcc-doc" release="1.el7" src="bcc-0.10.0-1.el7.src.rpm" version="0.10.0"><filename>bcc-doc-0.10.0-1.el7.noarch.rpm</filename><sum type="sha256">b402475b9480e8e1660e7965606a56376c8c23e0e6055fbf5c1b3e6619711b5d</sum></package><package arch="x86_64" name="bcc" release="1.el7" src="bcc-0.10.0-1.el7.src.rpm" version="0.10.0"><filename>bcc-0.10.0-1.el7.x86_64.rpm</filename><sum type="sha256">66e814087bf69fdfdbe152521646a017129c65dbe514b2162b4ba84046e6a37f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:1012" id="RHBA-2020:1012-1" title="Rhba-2020:1012-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1734910" id="1734910" title="Rebase Bcc To 0.10.0" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:1030-1</id><title>Nuxwdog Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="nuxwdog-devel" release="1.el7" src="nuxwdog-1.0.5-1.el7.src.rpm" version="1.0.5"><filename>nuxwdog-devel-1.0.5-1.el7.i686.rpm</filename><sum type="sha256">7a5d595a260d23e2d1a15f5398edd5df496ab336eb49721116b172c3fba5ff82</sum></package><package arch="x86_64" name="nuxwdog-devel" release="1.el7" src="nuxwdog-1.0.5-1.el7.src.rpm" version="1.0.5"><filename>nuxwdog-devel-1.0.5-1.el7.x86_64.rpm</filename><sum type="sha256">f2d745e465bb96dfda42838ca95a9e7b3f55b46ba8e33dd002e27670a59d097d</sum></package><package arch="x86_64" name="nuxwdog" release="1.el7" src="nuxwdog-1.0.5-1.el7.src.rpm" version="1.0.5"><filename>nuxwdog-1.0.5-1.el7.x86_64.rpm</filename><sum type="sha256">888f7b5e5f08b841b62876eaa8872c224e81ad9d9de081a945c63dca1e8091c3</sum></package><package arch="x86_64" name="nuxwdog-client-perl" release="1.el7" src="nuxwdog-1.0.5-1.el7.src.rpm" version="1.0.5"><filename>nuxwdog-client-perl-1.0.5-1.el7.x86_64.rpm</filename><sum type="sha256">43699a9166fadff4e6fcad822777d3abd027c54b77f1b28f1bab70a6ea160279</sum></package><package arch="i686" name="nuxwdog" release="1.el7" src="nuxwdog-1.0.5-1.el7.src.rpm" version="1.0.5"><filename>nuxwdog-1.0.5-1.el7.i686.rpm</filename><sum type="sha256">406750ff3ab35401faf838b44209ece9bca6f87e27c2cfdca5f5e272dcff48fc</sum></package><package arch="x86_64" name="nuxwdog-client-java" release="1.el7" src="nuxwdog-1.0.5-1.el7.src.rpm" version="1.0.5"><filename>nuxwdog-client-java-1.0.5-1.el7.x86_64.rpm</filename><sum type="sha256">bdd13dd32cf2a75bef793291cdd67b1e717b5412a2322942b4fd61e61f11dad5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:1030" id="RHBA-2020:1030-1" title="Rhba-2020:1030-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1509040" id="1509040" title="Nuxwdog Spec File Has Outdated Source For Tarballs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1634817" id="1634817" title="Re-Base Nuxwdog From 1.0.3 To 1.0.5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:1038-1</id><title>Glusterfs Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="glusterfs-fuse" release="29.sl7" src="glusterfs-6.0-29.sl7.src.rpm" version="6.0"><filename>glusterfs-fuse-6.0-29.sl7.x86_64.rpm</filename><sum type="sha256">7577618930b287706dfd2e4755ed30ba27d895b19fd21117f139d60e0ac92861</sum></package><package arch="noarch" name="glusterfs-resource-agents" release="29.sl7" src="glusterfs-6.0-29.sl7.src.rpm" version="6.0"><filename>glusterfs-resource-agents-6.0-29.sl7.noarch.rpm</filename><sum type="sha256">f3bced8a363247633563c1b7eb88da93f04752e51ce5932511a048bba80acf4c</sum></package><package arch="x86_64" name="glusterfs-geo-replication" release="29.sl7" src="glusterfs-6.0-29.sl7.src.rpm" version="6.0"><filename>glusterfs-geo-replication-6.0-29.sl7.x86_64.rpm</filename><sum type="sha256">fba9cf990d557dd7c06cf95b76609a4b627377bd5632fd56a506c5034aac4121</sum></package><package arch="x86_64" name="glusterfs-api-devel" release="29.sl7" src="glusterfs-6.0-29.sl7.src.rpm" version="6.0"><filename>glusterfs-api-devel-6.0-29.sl7.x86_64.rpm</filename><sum type="sha256">6a87b2f402cf0ec23bdbeb1db9282a5a639aac090237022bc599b4afecb78b59</sum></package><package arch="x86_64" name="glusterfs-server" release="29.sl7" src="glusterfs-6.0-29.sl7.src.rpm" version="6.0"><filename>glusterfs-server-6.0-29.sl7.x86_64.rpm</filename><sum type="sha256">6398a553d2bc216e853fa4a6b6b99c650076e96b1d9f08bea90c6790b6fa06a3</sum></package><package arch="x86_64" name="glusterfs-rdma" release="29.sl7" src="glusterfs-6.0-29.sl7.src.rpm" version="6.0"><filename>glusterfs-rdma-6.0-29.sl7.x86_64.rpm</filename><sum type="sha256">1a47229b8de276bb6939b93f7a6f3747a599498f63e63c52e1e30cbcab5da5c8</sum></package><package arch="x86_64" name="glusterfs" release="29.sl7" src="glusterfs-6.0-29.sl7.src.rpm" version="6.0"><filename>glusterfs-6.0-29.sl7.x86_64.rpm</filename><sum type="sha256">36f41c262247ded5b9597a793c07c20dbb45df06cddc1b18546bd50b2c66bc0b</sum></package><package arch="x86_64" name="glusterfs-api" release="29.sl7" src="glusterfs-6.0-29.sl7.src.rpm" version="6.0"><filename>glusterfs-api-6.0-29.sl7.x86_64.rpm</filename><sum type="sha256">37df7d89ba07246418a0bfc89993a829ee0f8fd4e701a74e59f9bad2b9d542cd</sum></package><package arch="x86_64" name="glusterfs-libs" release="29.sl7" src="glusterfs-6.0-29.sl7.src.rpm" version="6.0"><filename>glusterfs-libs-6.0-29.sl7.x86_64.rpm</filename><sum type="sha256">6e7368c5d7de3b77767187267ee4c69f147e5c7e8140d809c29fd2f18174a4c9</sum></package><package arch="x86_64" name="glusterfs-client-xlators" release="29.sl7" src="glusterfs-6.0-29.sl7.src.rpm" version="6.0"><filename>glusterfs-client-xlators-6.0-29.sl7.x86_64.rpm</filename><sum type="sha256">446f3025e4a925e63528998fd33a3a0b1c46885a20441ba8a4bf882cfd2a533b</sum></package><package arch="x86_64" name="python2-gluster" release="29.sl7" src="glusterfs-6.0-29.sl7.src.rpm" version="6.0"><filename>python2-gluster-6.0-29.sl7.x86_64.rpm</filename><sum type="sha256">13b8d7e408319169ca7703631246c5840139973787dec5685529d105537961d6</sum></package><package arch="x86_64" name="glusterfs-devel" release="29.sl7" src="glusterfs-6.0-29.sl7.src.rpm" version="6.0"><filename>glusterfs-devel-6.0-29.sl7.x86_64.rpm</filename><sum type="sha256">6229cb2f52700df46f323bfdaa36f5ba381ba7dd40160d1bb24e8bc3f01c2def</sum></package><package arch="x86_64" name="glusterfs-cli" release="29.sl7" src="glusterfs-6.0-29.sl7.src.rpm" version="6.0"><filename>glusterfs-cli-6.0-29.sl7.x86_64.rpm</filename><sum type="sha256">5b57babd5811bf3cf5029015a9c7b8934ff88216d64de66481fbdc43bd915013</sum></package><package arch="x86_64" name="glusterfs-cloudsync-plugins" release="29.sl7" src="glusterfs-6.0-29.sl7.src.rpm" version="6.0"><filename>glusterfs-cloudsync-plugins-6.0-29.sl7.x86_64.rpm</filename><sum type="sha256">b1437cefc49c69541059d74db54cb16c0782a8eeb24a982868d0d6b89db9de94</sum></package><package arch="x86_64" name="glusterfs-events" release="29.sl7" src="glusterfs-6.0-29.sl7.src.rpm" version="6.0"><filename>glusterfs-events-6.0-29.sl7.x86_64.rpm</filename><sum type="sha256">735dbce6751c700e7a3eb8240db6deb96bb5014ec387b590a0b0044ee280cae2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:1038" id="RHBA-2020:1038-1" title="Rhba-2020:1038-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1734282" id="1734282" title="[Rebase] Update The Glusterfs Client Rpms At Rhel 7.8 To Higher Rebased Version Available At Rhgs" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:1056-1</id><title>Libtevent Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libtevent" release="1.el7" src="libtevent-0.9.39-1.el7.src.rpm" version="0.9.39"><filename>libtevent-0.9.39-1.el7.x86_64.rpm</filename><sum type="sha256">07adeafab452983bae66a5b81321271a28426c20c9cc557f5463a87aa44a80ed</sum></package><package arch="i686" name="libtevent-devel" release="1.el7" src="libtevent-0.9.39-1.el7.src.rpm" version="0.9.39"><filename>libtevent-devel-0.9.39-1.el7.i686.rpm</filename><sum type="sha256">b8786f5696f25ff3d141b48d4f15ba3ab6add2d895943d06f0befada4185e278</sum></package><package arch="i686" name="libtevent" release="1.el7" src="libtevent-0.9.39-1.el7.src.rpm" version="0.9.39"><filename>libtevent-0.9.39-1.el7.i686.rpm</filename><sum type="sha256">d6138c1ad3ccec3e01ba8838ac30502352988291b408661eb6b6475e8eee341e</sum></package><package arch="x86_64" name="libtevent-devel" release="1.el7" src="libtevent-0.9.39-1.el7.src.rpm" version="0.9.39"><filename>libtevent-devel-0.9.39-1.el7.x86_64.rpm</filename><sum type="sha256">52ec549fedb3b205ac00332951a34f4f7682bc514c0b08e7bb7f040528c33141</sum></package><package arch="x86_64" name="python-tevent" release="1.el7" src="libtevent-0.9.39-1.el7.src.rpm" version="0.9.39"><filename>python-tevent-0.9.39-1.el7.x86_64.rpm</filename><sum type="sha256">69a608b41dd0ec2d684ce916352f8b5320bc341bfb9181a6d768f234c60ec29c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:1056" id="RHBA-2020:1056-1" title="Rhba-2020:1056-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1736006" id="1736006" title="Rebase Libtevent To Version 0.9.39 For Samba" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:1073-1</id><title>Tomcatjss Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcatjss" release="1.el7" src="tomcatjss-7.2.5-1.el7.src.rpm" version="7.2.5"><filename>tomcatjss-7.2.5-1.el7.noarch.rpm</filename><sum type="sha256">c612860830a18587c3ba8c7183f5410390a24ae58b740115e01967a203664871</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:1073" id="RHBA-2020:1073-1" title="Rhba-2020:1073-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1659867" id="1659867" title="Re-Base Tomcatjss From 7.2.1 To 7.2.X" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:1083-1</id><title>Ipa Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-04-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python2-ipalib" release="11.sl7" src="ipa-4.6.6-11.sl7.src.rpm" version="4.6.6"><filename>python2-ipalib-4.6.6-11.sl7.noarch.rpm</filename><sum type="sha256">10a9fa1010a1e3cd2edcbed601fdb4ae144f05da8592fe11c1cec2492ee3d798</sum></package><package arch="noarch" name="ipa-server-common" release="11.sl7" src="ipa-4.6.6-11.sl7.src.rpm" version="4.6.6"><filename>ipa-server-common-4.6.6-11.sl7.noarch.rpm</filename><sum type="sha256">3fdead3dfe03fb2fa147257a6a6c28b580998519fd43565e9ddd2feadd2fed9d</sum></package><package arch="noarch" name="ipa-client-common" release="11.sl7" src="ipa-4.6.6-11.sl7.src.rpm" version="4.6.6"><filename>ipa-client-common-4.6.6-11.sl7.noarch.rpm</filename><sum type="sha256">6df989b4940a925d7d284ed6a3e66374259c15a7bc9a02b2d52b308b2d42c185</sum></package><package arch="x86_64" name="ipa-client" release="11.sl7" src="ipa-4.6.6-11.sl7.src.rpm" version="4.6.6"><filename>ipa-client-4.6.6-11.sl7.x86_64.rpm</filename><sum type="sha256">738130e18b24dfe02d91e666924417d8e9ae47570f125ef4ac980a7fbde70fd3</sum></package><package arch="noarch" name="ipa-server-dns" release="11.sl7" src="ipa-4.6.6-11.sl7.src.rpm" version="4.6.6"><filename>ipa-server-dns-4.6.6-11.sl7.noarch.rpm</filename><sum type="sha256">6c108edd0827ca167c9d5f2a49091b7feebe2ac4c6de96e4ac59bbd419dfa64e</sum></package><package arch="noarch" name="ipa-python-compat" release="11.sl7" src="ipa-4.6.6-11.sl7.src.rpm" version="4.6.6"><filename>ipa-python-compat-4.6.6-11.sl7.noarch.rpm</filename><sum type="sha256">5071d18831bba1e3b6800ad8240cd1b550337c5fc94b6669acd35531a276733b</sum></package><package arch="noarch" name="python2-ipaserver" release="11.sl7" src="ipa-4.6.6-11.sl7.src.rpm" version="4.6.6"><filename>python2-ipaserver-4.6.6-11.sl7.noarch.rpm</filename><sum type="sha256">f8c16c14764c1ea1de5288800f22af97cd8059b866bc0246d2b9196d10cc69b8</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="11.sl7" src="ipa-4.6.6-11.sl7.src.rpm" version="4.6.6"><filename>ipa-server-trust-ad-4.6.6-11.sl7.x86_64.rpm</filename><sum type="sha256">e51b3250fac0b152a600c2fbb9b494bc1ad939fe8bb4c16ce6b621bcf9a03a06</sum></package><package arch="noarch" name="ipa-common" release="11.sl7" src="ipa-4.6.6-11.sl7.src.rpm" version="4.6.6"><filename>ipa-common-4.6.6-11.sl7.noarch.rpm</filename><sum type="sha256">50a93f6b4220130eec236e2db732a5c5112c487b40def6d033314d86fc761760</sum></package><package arch="x86_64" name="ipa-server" release="11.sl7" src="ipa-4.6.6-11.sl7.src.rpm" version="4.6.6"><filename>ipa-server-4.6.6-11.sl7.x86_64.rpm</filename><sum type="sha256">64999ded44313501fd9218568f349cea6316ea5afdca6c3c825823187531429e</sum></package><package arch="noarch" name="python2-ipaclient" release="11.sl7" src="ipa-4.6.6-11.sl7.src.rpm" version="4.6.6"><filename>python2-ipaclient-4.6.6-11.sl7.noarch.rpm</filename><sum type="sha256">1d968a4cc0f4946172e7c9789058c6ce650b2cb4e5d94a93ae546465e9f428b9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:1083" id="RHBA-2020:1083-1" title="Rhba-2020:1083-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1512952" id="1512952" title="Cert Renewal Is Failing When Ipa Ca Cert Is Renewed From Self-Signed &gt; External Ca &gt; Self-Sign" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1544470" id="1544470" title="Cn=Cacert Could Show Expired Certificate" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1581583" id="1581583" title="Error Message Should Be More Useful While Ipa-Backup Fails For Insufficient Space" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1632351" id="1632351" title="Remove &quot;Last Init Status&quot; From Ipa-Replica-Manage List &lt;Node&gt; If It'S None." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1636765" id="1636765" title="Ipa-Restore Set Wrong File Permissions And Ownership For /Var/Log/Dirsrv/Slapd-&lt;Instance&gt; Directory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1702426" id="1702426" title="Ipa-Server-Common Expected File Permissions In Package Don'T Match Runtime Permissions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1711172" id="1711172" title="Removing Tlsv1.0, Tlsv1.1 From Nss.Conf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1714076" id="1714076" title="Issue With Adding Multiple Rhel 7 Ipa Replica To Rhel 6 Ipa Master" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1714921" id="1714921" title="X509.Name -&gt; Ipapython.Dn.Dn Does Not Handle Multi-Valued Rdns" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1720952" id="1720952" title="Cannot Modify Ttl With Ipa Dnsrecord-Mod --Ttl Alone On Command Line" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1721550" id="1721550" title="Staged User Is Not Being Recognized If The User Entry Doesn'T Have An Objectclass &quot;Posixaccount&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1727304" id="1727304" title="Restrict Cipher Lists Used By Openssl Connections" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1733075" id="1733075" title="Rebase Ipa To Latest 4.6.X Version" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1733209" id="1733209" title="Ipa-Client-Automount Needs Option To Specify Domain" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1733265" id="1733265" title="Ipa Webgui Incorrectly Display Number Of Entries In Id Views" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1744926" id="1744926" title="Error Loading Module '/Usr/Lib64/Samba/Pdb/Ipasam.So': /Usr/Lib64/Samba/Pdb/Ipasam.So: Undefined Symbol: Debuglevel_Class" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1745108" id="1745108" title="Bug 1497334 Invalidating Single-Label Domains Introduces Regression Of Usage For Customers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1749788" id="1749788" title="Ipa Host-Find --Pkey-Only Includes Ssh Keys In Output" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1751951" id="1751951" title="When Master'S Ip Address Does Not Resolve To Its Name, Ipa-Replica-Install Fails" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1752005" id="1752005" title="Keyrings Should Not Be Used In Containerized Environment" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1754494" id="1754494" title="Ipa-Replica-Install Does Not Enforce --Server Option" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1755223" id="1755223" title="Sub-Ca Key Replication Failure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1762317" id="1762317" title="Ipa-Backup Command Is Failing On Rhel-7.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1773550" id="1773550" title="Ipa Upgrade Fails For Latest Ipa Package When Adtrust Is Installed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1778777" id="1778777" title="After Upgrade Ad Trust Agents Were Removed From Ldap" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:1098-1</id><title>Libblockdev Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libblockdev-lvm-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-lvm-devel-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">87f56a4b78471c6321fbb6f695c94226cd3daf9bb27cda307104e417de5aa57d</sum></package><package arch="x86_64" name="libblockdev-part-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-part-devel-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">4de94252128d2859aab9c7db5caa17bd5d9306b5aa5c19fd09e011ed7624f332</sum></package><package arch="i686" name="libblockdev-dm-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-dm-devel-2.18-5.el7.i686.rpm</filename><sum type="sha256">69bb367d7158eff505d09e292d1b49a906b7f84ac666dc93da66d02b73355539</sum></package><package arch="i686" name="libblockdev-lvm-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-lvm-devel-2.18-5.el7.i686.rpm</filename><sum type="sha256">5e0ff5ae21a2e7c2819f0d099a9265fcf23a28866806c573eb4d9d9d1797af16</sum></package><package arch="i686" name="libblockdev-part-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-part-devel-2.18-5.el7.i686.rpm</filename><sum type="sha256">6cac8be467cd8d6779ae916d42c49247be60ad8593a2d8b6aa2a7c6860ef2d61</sum></package><package arch="x86_64" name="libblockdev-crypto-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-crypto-devel-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">dd57368a94dcf86b464abe6cc02759b6f985dc1853befaf5ca6254b6466c3aba</sum></package><package arch="i686" name="libblockdev-nvdimm" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-nvdimm-2.18-5.el7.i686.rpm</filename><sum type="sha256">06fea248aaee92046fd9be56bdbab9b37013e008f98051b84b212c6c6411a3a5</sum></package><package arch="i686" name="libblockdev-swap-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-swap-devel-2.18-5.el7.i686.rpm</filename><sum type="sha256">d1daa5f616e12bddae77a52dd4657729dc847baae3f696a95e599f4dd9b102dc</sum></package><package arch="x86_64" name="libblockdev-mpath" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-mpath-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">7795c2f3c9b99d183d6634cbb1b2d6a7bf6503ca607f70a75e42a194505c1f2a</sum></package><package arch="x86_64" name="libblockdev-vdo" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-vdo-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">9e85ac1f5a2e68fa0252c2bf4085ef9af680f197838df8650df73e5a5ffb9304</sum></package><package arch="x86_64" name="libblockdev-fs" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-fs-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">4c184bd9c04e8a312d314ec37c8b24fdcce9078505ea378f9861c668272422ea</sum></package><package arch="i686" name="libblockdev-fs-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-fs-devel-2.18-5.el7.i686.rpm</filename><sum type="sha256">e75f6bcf78dd5644723d6d0c7e3117bd57b3d7d32270a60cfdf123fe7ba47fa3</sum></package><package arch="i686" name="libblockdev-mpath-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-mpath-devel-2.18-5.el7.i686.rpm</filename><sum type="sha256">a159b3a7750681aabd2c696fbbd5ce1deebebe88860f284c469673af9d6f9c7e</sum></package><package arch="x86_64" name="libblockdev-swap" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-swap-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">f8b5b35f3dbf2a5c3d2323876dd8c79002050bf91d7fbabb6edda4dfd9b5734e</sum></package><package arch="i686" name="libblockdev" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-2.18-5.el7.i686.rpm</filename><sum type="sha256">19537dd3699bb7f160358aeec85c1d11195774053eb89dc53a7852585632c410</sum></package><package arch="i686" name="libblockdev-utils-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-utils-devel-2.18-5.el7.i686.rpm</filename><sum type="sha256">43c3a4fa5edfec0ec3b636a117fe6224792b1c7e34b50db86093c081e9bf8be3</sum></package><package arch="x86_64" name="libblockdev-lvm" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-lvm-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">4be75d8b3c5a61b9ac5891b48e2aef546bc04111e00350573f433bf34070f116</sum></package><package arch="x86_64" name="libblockdev-nvdimm-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-nvdimm-devel-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">649218abb4b5e5acaffd3d11be658399104ced6e85d8c53fc23509935db04354</sum></package><package arch="x86_64" name="libblockdev-part" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-part-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">031aaf9af92d8ce6deb2da3bcca95986847f3d9e6ea7efe864e308382c795b99</sum></package><package arch="x86_64" name="libblockdev-mdraid-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-mdraid-devel-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">260e276d172d7059eb7c25b99e7fe9ffa9b0551c1505e8eba8cbc7de00ea4f9a</sum></package><package arch="i686" name="libblockdev-mdraid" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-mdraid-2.18-5.el7.i686.rpm</filename><sum type="sha256">714c633d578db20c0295103851f20113db9406c4275329a4b495f36d04bb6c9f</sum></package><package arch="x86_64" name="libblockdev-fs-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-fs-devel-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">a36ec2cd0e25f82acb2518dff50e98d09570e97ab7b46796ee245ebcd83cfec6</sum></package><package arch="x86_64" name="libblockdev-vdo-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-vdo-devel-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">ed7fb7f87b353df35c399f6baf19860a355cee9740531ce2252e82ced5da5de2</sum></package><package arch="x86_64" name="libblockdev-utils" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-utils-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">bd6dfd48540fdf99b17b462bc27499a2100e7c2f79f0feae671ae668ccfd9c1b</sum></package><package arch="x86_64" name="libblockdev-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-devel-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">ae81f4d2a731b36db9a7d8db4a8a5af22d7779748f6b649c2bbed67c09caed8d</sum></package><package arch="i686" name="libblockdev-dm" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-dm-2.18-5.el7.i686.rpm</filename><sum type="sha256">473d883cecf3c6935830f305209d535aa06b9acff057e7c30ce4798ea88d0b4b</sum></package><package arch="x86_64" name="libblockdev-mpath-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-mpath-devel-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">04f2ee52cf19d9f49ab5e8e4c9aae414cfbcf7666f9f5bbed600eeb21bacd8b9</sum></package><package arch="i686" name="libblockdev-mpath" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-mpath-2.18-5.el7.i686.rpm</filename><sum type="sha256">5c56d570e69330eebdca63494fac22ca49371a1df2f8319f5180605f742bb495</sum></package><package arch="i686" name="libblockdev-btrfs-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-btrfs-devel-2.18-5.el7.i686.rpm</filename><sum type="sha256">7d099bbb69be16a9a1eea10f14365be1a3b963edde268ba14e5633f9f215c7b7</sum></package><package arch="i686" name="libblockdev-swap" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-swap-2.18-5.el7.i686.rpm</filename><sum type="sha256">7014fb0747c9ba598a3519298e9b280adf96acbf7274389a8d02055d35f899b4</sum></package><package arch="i686" name="libblockdev-fs" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-fs-2.18-5.el7.i686.rpm</filename><sum type="sha256">a92ebcc0e66c3e90006635abb9950586d3abdc8b74fa6c7fd7512e8a985ef245</sum></package><package arch="x86_64" name="libblockdev-dm" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-dm-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">2c6f9c29f9d7092a9a11418d0bb192d2c8461a8c23d028906e758d56031eb5ff</sum></package><package arch="x86_64" name="libblockdev-loop-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-loop-devel-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">2489ebd2d6714192ee9fd43163686a32916036b296485b2d2e317736e1575b0a</sum></package><package arch="x86_64" name="libblockdev-dm-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-dm-devel-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">815493e0bfe6174de6047550e8af0520fb5b33f9756ce4acddcc4aab4c67e67a</sum></package><package arch="i686" name="libblockdev-lvm" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-lvm-2.18-5.el7.i686.rpm</filename><sum type="sha256">a31002cc66bf8df5046c5ad0de424d5716c59d20f9b52daaed43a3063be1271f</sum></package><package arch="x86_64" name="python2-blockdev" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>python2-blockdev-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">7213b4a9db922a22314a8f60a50de641c1082da8fd7e9700e74c10da90bd6eeb</sum></package><package arch="x86_64" name="libblockdev" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">facdc8ed2a383cb6e804aa6748066ab7538a4e10cb68a7365b49b74a04a09585</sum></package><package arch="i686" name="libblockdev-part" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-part-2.18-5.el7.i686.rpm</filename><sum type="sha256">4063b08465737a677db55066af37f71e759fe2ccbbe0c916d7c9b4a84bd59dd3</sum></package><package arch="x86_64" name="libblockdev-swap-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-swap-devel-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">09355a77a3dc7cd721ece009ef6279d6389d999e1457625cb811421a5bb8d0e4</sum></package><package arch="i686" name="libblockdev-crypto-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-crypto-devel-2.18-5.el7.i686.rpm</filename><sum type="sha256">68357e4106a541bc11d5c67b1f286ba901da875ce083891fae940b7dd836e57a</sum></package><package arch="x86_64" name="libblockdev-mdraid" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-mdraid-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">8d2968b488c32eb5e092e42e67ca76f480e3337c7dd03c6b58c0c6db4c48f12b</sum></package><package arch="i686" name="libblockdev-utils" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-utils-2.18-5.el7.i686.rpm</filename><sum type="sha256">7780c98ea2752bdb862d64b3957fc311a6a94d176bed772411b944f8f6d1b343</sum></package><package arch="x86_64" name="libblockdev-crypto" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-crypto-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">9e8c95558b0b705b1d93b66e8a4690be8c6d26e961bd5bf652678fd651764bd3</sum></package><package arch="i686" name="libblockdev-crypto" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-crypto-2.18-5.el7.i686.rpm</filename><sum type="sha256">936a815a32259d181a4dc96bbb8a8df72cb553962703321bec4d7fc8db1c0984</sum></package><package arch="i686" name="libblockdev-loop-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-loop-devel-2.18-5.el7.i686.rpm</filename><sum type="sha256">ba78bf4b240a6a45e63b6ec65dfff6684cf911d173d28a31d8590b55a82c38ee</sum></package><package arch="i686" name="libblockdev-btrfs" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-btrfs-2.18-5.el7.i686.rpm</filename><sum type="sha256">84a8f6f4274b9c32f02703bb8fc732f3c0023486835445bae0a7370ee74e4cc1</sum></package><package arch="x86_64" name="libblockdev-loop" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-loop-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">732fbe59336b9cf67e93ec6753d4c6a55adb12d3b738d4a74a693c45122e63e1</sum></package><package arch="i686" name="libblockdev-kbd" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-kbd-2.18-5.el7.i686.rpm</filename><sum type="sha256">2e695f9ebff02c46d73cecb712ea268062c622700b59de9525cd6d41bf506064</sum></package><package arch="x86_64" name="libblockdev-utils-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-utils-devel-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">425c336195ddfeff458c778e69c4a0e5e256778ae55560f0b121521ba0f5c545</sum></package><package arch="i686" name="libblockdev-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-devel-2.18-5.el7.i686.rpm</filename><sum type="sha256">f137548051f95bb8261e109f4879c363fd146a4df4c48eb1a0276527218bb895</sum></package><package arch="i686" name="libblockdev-kbd-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-kbd-devel-2.18-5.el7.i686.rpm</filename><sum type="sha256">0c64ee3a83b5235ddd7b75b7d09a812f93b57ed446ba11196cf9803e283f25ba</sum></package><package arch="i686" name="libblockdev-nvdimm-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-nvdimm-devel-2.18-5.el7.i686.rpm</filename><sum type="sha256">2c69a579cf1091e9e8b31469d50e57cf7bd649ed221a6ee2c7b219922b3cab1f</sum></package><package arch="x86_64" name="libblockdev-btrfs-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-btrfs-devel-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">0e427685393a5161a09ebe90a8d534edbecebffd3716a0dee5d0fd6a9fbda96e</sum></package><package arch="i686" name="libblockdev-mdraid-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-mdraid-devel-2.18-5.el7.i686.rpm</filename><sum type="sha256">a79cedc914211fde2eab0c2a0cf07a9aa96ec7b924b6d56935bd0903c937da71</sum></package><package arch="x86_64" name="libblockdev-kbd" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-kbd-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">da292b5979d8bff5d6b20e5de91ac62f47492d7390364966955324b169af7cd7</sum></package><package arch="x86_64" name="libblockdev-kbd-devel" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-kbd-devel-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">10278e2f346a5b4baae79314ac8dec5d7855e8b5c776925467a2b8189a0092b8</sum></package><package arch="i686" name="libblockdev-loop" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-loop-2.18-5.el7.i686.rpm</filename><sum type="sha256">3189a8d60c5145ac8fce3b200701a90f4d77b38a0a70b9b1224981439bc43a58</sum></package><package arch="x86_64" name="libblockdev-plugins-all" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-plugins-all-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">95fab152ac3334b58b77fb1db204938fdfbfb24226a36f99aa6f81d4ce85c79f</sum></package><package arch="x86_64" name="libblockdev-btrfs" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-btrfs-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">9e9bd9f8c03dc47f75920d70ab76432466abc2bf0667605c3353ecc953bfb3a0</sum></package><package arch="x86_64" name="libblockdev-nvdimm" release="5.el7" src="libblockdev-2.18-5.el7.src.rpm" version="2.18"><filename>libblockdev-nvdimm-2.18-5.el7.x86_64.rpm</filename><sum type="sha256">49ccd8daf3a78b101898e3233e17c440f597c99128bcfe6b90c2869647060c50</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:1098" id="RHBA-2020:1098-1" title="Rhba-2020:1098-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1710507" id="1710507" title="Memory Leak Fixes" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:1105-1</id><title>Vdo And Kmod-Kvdo Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kmod-kvdo" release="5.el7" src="kmod-kvdo-6.1.3.7-5.el7.src.rpm" version="6.1.3.7"><filename>kmod-kvdo-6.1.3.7-5.el7.x86_64.rpm</filename><sum type="sha256">66a4cb37e3feadea748d85322a787430018def0f3d1268788c455e7ee25943d6</sum></package><package arch="x86_64" name="vdo" release="4.el7" src="vdo-6.1.3.4-4.el7.src.rpm" version="6.1.3.4"><filename>vdo-6.1.3.4-4.el7.x86_64.rpm</filename><sum type="sha256">43715263c3d8d5e5311d2377efd26184667d2c7e913dce542f57ef6fdd04c5cc</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:1105" id="RHBA-2020:1105-1" title="Rhba-2020:1105-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1511871" id="1511871" title="Vdoformat Has No Limit For Physical Size If Physical Size Is Over 256T" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1676643" id="1676643" title="System Kernel Panic On Starting Usb Vdo Volume" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1706196" id="1706196" title="Vdo Should Not Flood The Kernel Log With Too Many Messages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1707481" id="1707481" title="Creating Vdo On Pv Fails With &quot;Failed To Make Filelayer From '/Dev/Disk/By-Id/*'&quot; With --Force" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1749000" id="1749000" title="Rare Assertion Failure When Stopping Vdo Device" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:1154-1</id><title>Nfs-Utils Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-05-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="nfs-utils" release="0.66.el7" src="nfs-utils-1.3.0-0.66.el7.src.rpm" version="1.3.0"><filename>nfs-utils-1.3.0-0.66.el7.x86_64.rpm</filename><sum type="sha256">6f149c1a542a438828823c4beea9c8586402a03e1a973a551528a2e8903a9897</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:1154" id="RHBA-2020:1154-1" title="Rhba-2020:1154-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:1982-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been updated to version 2020a, which addresses recent time zone changes. Notably:

In Morocco (the Africa/Casablanca time zone), daylight saving time starts on 2020-05-31 instead of on 2020-05-24.     Canada's Yukon region (the America/Whitehorse and America/Dawson time zones) changed to a year-round UTC-07 time on 2020-03-08.     The America/Godthab time zone has been renamed to America/Nuuk.</description><release>Scientific Linux</release><issued date="2020-05-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2020a-1.el7.src.rpm" version="2020a"><filename>tzdata-2020a-1.el7.noarch.rpm</filename><sum type="sha256">e3408dd82c51df8101216dce2cc2a4ac0757a80d95390db6cd2031e372919bbd</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2020a-1.el7.src.rpm" version="2020a"><filename>tzdata-java-2020a-1.el7.noarch.rpm</filename><sum type="sha256">669adb9c38cf19e0a6927d67d63921cc074c44a004cc853a98a148b3964ab3ff</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:1982" id="RHBA-2020:1982-1" title="Rhba-2020:1982-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:2662-1</id><title>Selinux-Policy Bug Fix And Enhancement Update</title><description>Bug Fix(es) and Enhancement(s):

* Nagios/nrpe no longer allowed to check mail queue</description><release>Scientific Linux</release><issued date="2020-07-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy-doc" release="266.el7_8.1" src="selinux-policy-3.13.1-266.el7_8.1.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-266.el7_8.1.noarch.rpm</filename><sum type="sha256">66c77252389e0ad284c9e4b3f5f16ada69dea1ccfd086cb81461d82258f3ee7f</sum></package><package arch="noarch" name="selinux-policy" release="266.el7_8.1" src="selinux-policy-3.13.1-266.el7_8.1.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-266.el7_8.1.noarch.rpm</filename><sum type="sha256">7030b3132be3700e7ea6cee104b81813d46b5e96d17f6e57b4b9df01d1f9d61f</sum></package><package arch="noarch" name="selinux-policy-mls" release="266.el7_8.1" src="selinux-policy-3.13.1-266.el7_8.1.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-266.el7_8.1.noarch.rpm</filename><sum type="sha256">af35a987fd3383ec2a469b9b85206ca8d49e44aca0f83ea4288b10742f7e98d5</sum></package><package arch="noarch" name="selinux-policy-minimum" release="266.el7_8.1" src="selinux-policy-3.13.1-266.el7_8.1.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-266.el7_8.1.noarch.rpm</filename><sum type="sha256">803fc78199485f14ee354c724d026783ed49fda34413e0da2977803c251faa11</sum></package><package arch="noarch" name="selinux-policy-targeted" release="266.el7_8.1" src="selinux-policy-3.13.1-266.el7_8.1.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-266.el7_8.1.noarch.rpm</filename><sum type="sha256">7e06967b2d42f96c52f257cdf6476d99808853e0d4479f2d452d87f2e86948a2</sum></package><package arch="noarch" name="selinux-policy-devel" release="266.el7_8.1" src="selinux-policy-3.13.1-266.el7_8.1.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-266.el7_8.1.noarch.rpm</filename><sum type="sha256">869c1d1377f718666448a2e475ccded680758fe87735cb59b08ae5f58e2af63b</sum></package><package arch="noarch" name="selinux-policy-sandbox" release="266.el7_8.1" src="selinux-policy-3.13.1-266.el7_8.1.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-266.el7_8.1.noarch.rpm</filename><sum type="sha256">8ad9144c37917688807f089fc60e2b3e3bd5c4570414ad01c94ba03531931f80</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:2662" id="RHBA-2020:2662-1" title="Rhba-2020:2662-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1832219" id="1832219" title="Nagios/Nrpe No Longer Allowed To Check Mail Queue [Rhel-7.8.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:3265-1</id><title>Shim Bug Fix And Enhancement Update</title><description>Bug Fix(es) and Enhancement(s):

* Fix crash on some systems during boot up.</description><release>Scientific Linux</release><issued date="2020-08-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="shim-unsigned-ia32" release="8.el7" src="shim-15-8.el7.src.rpm" version="15"><filename>shim-unsigned-ia32-15-8.el7.x86_64.rpm</filename><sum type="sha256">925f47111dd10b1902e268618733805a7e133e9028655be775ed9605e6333731</sum></package><package arch="x86_64" name="shim-unsigned-x64" release="8.el7" src="shim-15-8.el7.src.rpm" version="15"><filename>shim-unsigned-x64-15-8.el7.x86_64.rpm</filename><sum type="sha256">cf7d4b671310a5f320876f7916fd3434463ca9292be1c834489d3529e5a3d0d1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:3265" id="RHBA-2020:3265-1" title="Rhba-2020:3265-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1862346" id="1862346" title="Grub Or Shim Dies Since Updating To Grub2-2.02-0.86.El7_8 / Shim-X64-15-7.El7_8 [Rhel-7.8.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:3904-1</id><title>Sssd Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libsss_simpleifp-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_simpleifp-devel-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">b6ad09cd762f7c0f9d31aeb021c80f3deb28150434a7ba2ebf2075194901e8c7</sum></package><package arch="x86_64" name="python-libipa_hbac" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>python-libipa_hbac-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">bfb5c319c528fb4a438ca756b55bfcf5b3437e72d040b4bc71c9e4ba776f110d</sum></package><package arch="x86_64" name="sssd-krb5-common" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-krb5-common-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">94075fad1ed400d85fede47d3430fd92c30a52cf9fdda56dbf6be393bfe4cf56</sum></package><package arch="i686" name="libsss_certmap-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_certmap-devel-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">ef30bd623ce6771df6aa383cda4124ace90ce726e8e3481fc5e61e643c105c4e</sum></package><package arch="x86_64" name="libsss_certmap-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_certmap-devel-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">71c4e59346c4971c2691239d58f3ce8518f5db9ebdcd951ee7c37e440f27a9bd</sum></package><package arch="i686" name="sssd-client" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-client-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">4f8617434e11247650ffb0ce727e3f5038b587c12d2635330f054d7a7a1f77f5</sum></package><package arch="i686" name="sssd-libwbclient-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-libwbclient-devel-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">ff4f2f781dd34237de3e565049fdbf751b03fc77f41a729b82d9907fd6afb6f9</sum></package><package arch="x86_64" name="libsss_nss_idmap-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-devel-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">cee913763ba7c946da161254194d4813cafa7e22521e9c777a068d87089d95d9</sum></package><package arch="x86_64" name="sssd-common" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-common-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">b00a2e0101ae1ce0dfe47eb0789a75f37ffa6fec6bbb482e13e17cf9656b6490</sum></package><package arch="x86_64" name="sssd-krb5" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-krb5-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">5aadcd7a4b722450ab2e7f293f8e951c1209eb90e2fcd83c6f949ca19d21c466</sum></package><package arch="x86_64" name="python-sss" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>python-sss-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">cea1a8153fe4dc35563a5191b7182b8181113efa89653742b23d6e65c3473eae</sum></package><package arch="x86_64" name="python-sss-murmur" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>python-sss-murmur-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">1d817c0758ce55eba4693073589512c7abb8002dc1a7fadcbdd0a46ac7bfcec8</sum></package><package arch="x86_64" name="sssd-proxy" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-proxy-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">6c0eedb41607c1e7c089250258d295716ed0dba4394ddf5e99f87b4042a1a1aa</sum></package><package arch="x86_64" name="libsss_nss_idmap" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">7de43beef8408f3adea65aa52d68999eb41e8be477f5f4a61bbaf77958bd45a0</sum></package><package arch="i686" name="libipa_hbac-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libipa_hbac-devel-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">230c3396a490f480e3166912f9baefb94171a242703db84c77e9829021cfe7fd</sum></package><package arch="x86_64" name="libipa_hbac" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libipa_hbac-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">8f07b60bb80ec160a01ac2fa139605099154ef161aa616e8f2b82ffb8ecbe0c5</sum></package><package arch="x86_64" name="sssd-polkit-rules" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-polkit-rules-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">1380cbfd195f71ff2850774e9443be5067ee2a7287741ac43d78c2b491a98bd6</sum></package><package arch="i686" name="libsss_nss_idmap" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">6272c5ce9d04babaa08ba323936e82e2fcae39df41b237e5923206f931e2c369</sum></package><package arch="x86_64" name="libsss_autofs" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_autofs-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">0d89e298936f270ab1711cae70d43e5455cb6bc7e12bc9b7a3525b2ebf0e1082</sum></package><package arch="x86_64" name="sssd-common-pac" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-common-pac-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">d6a3586ae72b0ffe472615b009618cd8b3ecc704a736baf920eb8a646862a7b5</sum></package><package arch="x86_64" name="libsss_simpleifp-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_simpleifp-devel-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">ac3491913ea9478a5743b02fc9f2b21d61a2540db4df0426c2a8b8544ec59f24</sum></package><package arch="x86_64" name="sssd-kcm" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-kcm-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">8d5f30e1f1ed1440239cd912fb101f9112909a1385da61a71cb4073f92a7f539</sum></package><package arch="x86_64" name="sssd-ipa" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-ipa-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">748cde649eb550a724b4261401b29fad1e2c21c4123497d1f80bd2dd0eaec406</sum></package><package arch="i686" name="libsss_certmap" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_certmap-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">2ba1adc110b1fe52315431ce7e168f62fbc777708083caf59c24453b7759fa5d</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-devel-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">c26f6ee86a4dcea5d06a3c7a62075a3c96a8178346176c2b77bde6bafae034ed</sum></package><package arch="x86_64" name="sssd-client" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-client-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">7e12ee2d7c78991cc66c43562cb663158192413f3a065a6ade10aecd736477e5</sum></package><package arch="x86_64" name="sssd" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">7c177b59ca9993ed13a5ebfd0284261feb600b83c905469bcfd4806929ece70d</sum></package><package arch="i686" name="libsss_idmap" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_idmap-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">8df4148e9b940c311035310320c561513b76698bf6f59d25f4f687310c1a0c46</sum></package><package arch="x86_64" name="sssd-libwbclient-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-libwbclient-devel-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">2774474c57023faba365973c87890d09b433f4703185681d4ac33199ee9d7d52</sum></package><package arch="x86_64" name="libsss_idmap" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_idmap-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">46927507311208d6f890916295b1fe2f188a33a9b31b69aa09a1b00efcfd7c27</sum></package><package arch="i686" name="libsss_simpleifp" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_simpleifp-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">40430368c1f2f2dd32efb263f2a0d0063952f0d6faa436faf7ba4c0475c6478d</sum></package><package arch="x86_64" name="libsss_sudo" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_sudo-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">cabb426062d8ee3fc4ec3fdd43706417ef64b3604605d9efe1ae6559c9768194</sum></package><package arch="x86_64" name="sssd-dbus" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-dbus-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">ed5989c76b9a6b84461a2b827a4cb311bb0aba4de34997486afcdbe16455f55d</sum></package><package arch="i686" name="libipa_hbac" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libipa_hbac-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">1ec8549c97feae0e23c0f8ba6908769abef1599dae5a1d1cf3e88f0ba852f3e7</sum></package><package arch="x86_64" name="libsss_certmap" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_certmap-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">5977fb5991f46125ea4b8a1c218b1570543bc389518110ed4cd14336443b023a</sum></package><package arch="i686" name="libsss_idmap-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_idmap-devel-1.16.5-10.el7.i686.rpm</filename><sum type="sha256">06c942ed290379ec4ef526b04628bde59fcc799dd82cdbcd1203be7b99e743f6</sum></package><package arch="x86_64" name="sssd-ad" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-ad-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">27c1e64d5a2fa00752b78a1f330d336c23d6a1f2c34010c09aaf8650f7bc81ee</sum></package><package arch="x86_64" name="python-libsss_nss_idmap" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>python-libsss_nss_idmap-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">bfc4726d4b72440e527bb8c92d79de9b00f4069ca0edc3ef8b82f1e0fcd33e53</sum></package><package arch="x86_64" name="sssd-ldap" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-ldap-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">c70e67210e2a11b6c07f7f6ce409977ba623a8bcc924adf92d36d475ddb7ddf6</sum></package><package arch="x86_64" name="sssd-tools" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-tools-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">48e11e1de67d905e4fbd5840b018b4dacb1d1c3ae9e515d52541145b69d1bd86</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_idmap-devel-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">7af4431d59f5b89ef70447dadefe647df67aff10b6b97bc831f8220b237ebe6e</sum></package><package arch="x86_64" name="sssd-winbind-idmap" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-winbind-idmap-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">d3bbccaf0c4a33abd594aeb9da9042fde0399ad9b1844edc6987529074d02861</sum></package><package arch="x86_64" name="libsss_simpleifp" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libsss_simpleifp-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">2000b33f01b9a0f2c89cdc72f984eb68f173b0f509c226b76e18b09b02c26d9b</sum></package><package arch="x86_64" name="sssd-libwbclient" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>sssd-libwbclient-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">bc96272fa09064f0185ca371bcf124578864bdbbae8107826bdb4c3e5f21aebb</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>libipa_hbac-devel-1.16.5-10.el7.x86_64.rpm</filename><sum type="sha256">cb62befff8b7761a9468259a6e920b172ebc74026bc14870096e26321a0572a5</sum></package><package arch="noarch" name="python-sssdconfig" release="10.el7" src="sssd-1.16.5-10.el7.src.rpm" version="1.16.5"><filename>python-sssdconfig-1.16.5-10.el7.noarch.rpm</filename><sum type="sha256">51ba1016cdb1060babab5efb9631e32153eb613dd33c812ba50ac5a1ca85739b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:3904" id="RHBA-2020:3904-1" title="Rhba-2020:3904-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1507683" id="1507683" title="Gdm Password Prompt When Cert Mapped To Multiple Users And Promptusername Is False" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1513371" id="1513371" title="[Abrt] [Faf] Sssd: Raise(): /Usr/Libexec/Sssd/Sssd_Be[Proxy] Killed By 6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1551077" id="1551077" title="Gdm Failure Loop When No User Mapped For Smart Card" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1553784" id="1553784" title="Document How To Prevent Invalid Selinux Context For Default Home Directories In Sssd-Ad Direct Integration." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568083" id="1568083" title="Subdomain Lookup Fails When Certmaprule Contains Dn" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1683946" id="1683946" title="Sssd Or Sssd-Ad Not Updating Their Dependencies On &quot;Yum Update&quot; Which Breaks Working Setup" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719718" id="1719718" title="Validator Warning Issue :  Attribute 'Dns_Resolver_Op_Timeout' Is Not Allowed In Section 'Domain/Removed'. Check For Typos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1736110" id="1736110" title="Lookup Identity Does Not Work In Some Cases" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1765246" id="1765246" title="Impossible To Enforce Gid On The Ad'S &quot;Domain Users&quot; Group In The Ipa-Ad Trust Setup" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1767159" id="1767159" title="Sssd Is Crashing: Dbus_Watch_Handle() Is Invoked With Corrupted 'Watch' Value" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1773409" id="1773409" title="Sssd Is Failing To Discover Other Subdomains In The Forest If Ldap Entries Do Not Contain Ad Forest Root Information" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1774140" id="1774140" title="Backport Patches For Objectcategory And Smart Refresh Improvements" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1781539" id="1781539" title="Pkinit With Kcm Does Not Work" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1782087" id="1782087" title="Removing An Ipa Sub-Group Should Not Remove The Members From Indirect Parent That Also Belong To Other Subgroups" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1786341" id="1786341" title="Sssd Doesn'T Honour The Customized Id View Created In Ipa" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1789349" id="1789349" title="Id Command Taking 1+ Minute For Returning User Information" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1795960" id="1795960" title="Expecting Appropriate Error Message When New Password Length Is Less Than 8 Characters When Ldap_Pwmodify_Mode = Ldap_Modify In Sssd.Conf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1796352" id="1796352" title="Rebase Sssd For Rhel 7.9" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1800564" id="1800564" title="`Sssd.Api.Conf` And `Sssd.Api.D` Should Belong To `Python-Sssdconfig` Package" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1800571" id="1800571" title="Multiples Kerberos Ticket On Rhel 7.7 After Lock And Unlock Screen" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1804005" id="1804005" title="Sssd Doesn'T Follow The Link Order Of Ad Group Policy Management" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1807070" id="1807070" title="Ldap_Uri Failover Doesn'T Work With Different Ports" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1819013" id="1819013" title="Pam_Sss Reports Pam_Cred_Err When Providing Wrong Password For An Existing Ipa User, But This Error'S Description Is Misleading" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1822461" id="1822461" title="Background Refresh Task Does Not Refresh Updated Netgroup Entries" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1829806" id="1829806" title="[Bug] Reduce Logging About Flat Names" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1834266" id="1834266" title="&quot;Off-By-One Error&quot; In Watchdog Implementation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835813" id="1835813" title="Sssd Boots Offline If Symlink For /Etc/Resolv.Conf Is Broken/Missing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1836910" id="1836910" title="Rhel7.7 Server Have An Issue Regarding Dyndns Update For Ptr-Records Which Is Done By Sssd On Active Directory Dns Servers. It Is Done In Two Steps (Two Different Nsupdate Messages)." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1837545" id="1837545" title="Users Must Be Informed Better When Internal Watchdog Terminates Process." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:3909-1</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide" release="13.sl7" src="scap-security-guide-0.1.49-13.sl7.src.rpm" version="0.1.49"><filename>scap-security-guide-0.1.49-13.sl7.noarch.rpm</filename><sum type="sha256">ed1530365ae6c625a79c06864835f0af3db3bd80f989cb62d0d315646ecba957</sum></package><package arch="noarch" name="scap-security-guide-doc" release="13.sl7" src="scap-security-guide-0.1.49-13.sl7.src.rpm" version="0.1.49"><filename>scap-security-guide-doc-0.1.49-13.sl7.noarch.rpm</filename><sum type="sha256">355d05da740b6bf25b55801b1b52b87ac9df389c19b6e5aa7e8bc5586bcef65a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:3909" id="RHBA-2020:3909-1" title="Rhba-2020:3909-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1494606" id="1494606" title="Rules Requiring Sysctl.Conf Values Have Misleading Descriptions - Sysctl Values Defaults Are Ignored, Description Says Otherwise." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1547642" id="1547642" title="Oval Check For Content_Rule_Bootloader_Audit_Argument Uses Wrong File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549671" id="1549671" title="Check For Module Skipping In Accounts_Passwords_Pam_Faillock_Deny Is Tricked By Comment In Config File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1574586" id="1574586" title="Oscap Rule Xccdf_Org.Ssgproject.Content_Rule_Audit_Rules_Login_Event Remediation Is Not Detected" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1609014" id="1609014" title="Firewall-Cmd Command In Https://Static.Open-Scap.Org/Ssg-Guides/Ssg-Rhel7-Guide-Index.Html Is Breaking Firewalld Functionality" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1691579" id="1691579" title="Disa Stig Does Not Recognize Options On Removable Partitions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1691877" id="1691877" title="Remediation For Xccdf_Org.Ssgproject.Content_Rule_Audit_Rules_Privileged_Commands Rule Doesn'T Fix The System." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1722237" id="1722237" title="Bootloader Options On C2S Show &quot;Notchecked&quot; Even When Manually Selected With A Tailoring File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1776780" id="1776780" title="Rule 'Xccdf_Org.Ssgproject.Content_Rule_Dconf_Gnome_Login_Banner_Text' Fail To Remediate" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1781244" id="1781244" title="Fips Approved Ciphers Need To Be Updated" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791583" id="1791583" title="[Doc] C2S Security Profile - Services Are Now Masked Instead Of Disabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1794402" id="1794402" title="Link In Scap-Security-Guide Rhel6 Datastream Is 404" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1801411" id="1801411" title="The Test If Atd Is Stopped Gives A False Postive On The Service 'Rpc-Statd.Service' Because It Also Contains The Letters 'Atd'." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1815008" id="1815008" title="Rebase Scap-Security-Guide In Red Hat Enterprise Linux 7.9 To Latest Upstream Version" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1821633" id="1821633" title="Ship Cis Aligned Profile In Rhel7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1823576" id="1823576" title="Openscap Ssh Rules Content_Rule_Sshd_Do_Not_Permit_User_Env Content_Rule_Sshd_Allow_Only_Protocol2 Failing After Upgrade" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1829743" id="1829743" title="Undocumented Fact That File Ownership-Related Rules Dont Work With Remote User/Group Backends" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1844431" id="1844431" title="Xccdf_Org.Ssgproject.Content_Rule_Sshd_Do_Not_Permit_User_Env Rule Is Broken" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:3914-1</id><title>Openscap Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="openscap-devel" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-11.el7.i686.rpm</filename><sum type="sha256">5f16a3af77db983ac3a0f5c17a5664f0252f129caf1a54f2e189a549331dc770</sum></package><package arch="x86_64" name="openscap-python" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-python-1.2.17-11.el7.x86_64.rpm</filename><sum type="sha256">5adbaa50cbc340d9d8ad54704c8b5fbc58d49a4eeca65983f161ab014601b4bf</sum></package><package arch="x86_64" name="openscap-extra-probes" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-extra-probes-1.2.17-11.el7.x86_64.rpm</filename><sum type="sha256">90ce2ded320b9ba224b241f5a84c8ee3393ac380899755e165b92000ed0b9380</sum></package><package arch="x86_64" name="openscap-engine-sce-devel" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-11.el7.x86_64.rpm</filename><sum type="sha256">dd39e29e3c6413d14e4c945164f0db6c16272fa7c33aec47a01a97e2f7cb5925</sum></package><package arch="i686" name="openscap" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-1.2.17-11.el7.i686.rpm</filename><sum type="sha256">c1bef430a1cbb4947078fb8367ebe6b97d55a6f2bc080f0894e3c958cf23e892</sum></package><package arch="i686" name="openscap-engine-sce" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-11.el7.i686.rpm</filename><sum type="sha256">4db722c7ef92a16b04ed9b46367dbad108bc23db12b13fae36666366d5fc2408</sum></package><package arch="x86_64" name="openscap-scanner" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-scanner-1.2.17-11.el7.x86_64.rpm</filename><sum type="sha256">84a0793e05b3055291d75259a7a43200e42b30c237ddb33d858ed1df04519418</sum></package><package arch="x86_64" name="openscap-engine-sce" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-11.el7.x86_64.rpm</filename><sum type="sha256">7cca309204759e1dcdd6c129a541b28d16067f00120ee0c4c81c54a5d050f2f0</sum></package><package arch="x86_64" name="openscap-utils" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-utils-1.2.17-11.el7.x86_64.rpm</filename><sum type="sha256">a76dd94183111f060ee049c919c6bbf4ac99ef7a8fac2431c0921af9f3c76780</sum></package><package arch="x86_64" name="openscap-devel" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-11.el7.x86_64.rpm</filename><sum type="sha256">8a2160ba8b1f0cc260177a418cc9bbe9cc3da2a712f07ec78de15ccf12f5b262</sum></package><package arch="noarch" name="openscap-containers" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-containers-1.2.17-11.el7.noarch.rpm</filename><sum type="sha256">81f96ef394b91625ce5216521944902389300695be8c3da85e0b37f6750ad391</sum></package><package arch="i686" name="openscap-engine-sce-devel" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-11.el7.i686.rpm</filename><sum type="sha256">954c57cefbd274046e95f0f9e35f3dfe674f203dc4e3b39bda46d72343963f72</sum></package><package arch="x86_64" name="openscap" release="11.el7" src="openscap-1.2.17-11.el7.src.rpm" version="1.2.17"><filename>openscap-1.2.17-11.el7.x86_64.rpm</filename><sum type="sha256">0c7ebd8f421b7471c3a5442eb6b9d48abc9c10941349130d6720dfc1ea269f27</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:3914" id="RHBA-2020:3914-1" title="Rhba-2020:3914-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1465661" id="1465661" title="Openscap Ships With Outdated Documentation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1478285" id="1478285" title="Probe_Systemdunitdependency Failed With Segmentation Fault" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1640522" id="1640522" title="Selinux Security Context Probe Produces A Flood Of Annoying Messages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642283" id="1642283" title="Null Pointer Dereference In Cvrf_Priv.C:Cvrf_Model_Filter_By_Cpe() With `Oscap Cvrf Eval`" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1803114" id="1803114" title="Oscap-Ssh Fails To Retrieve The Result Files When --Sudo Is Used" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1828779" id="1828779" title="Url Link For Red Hat Errata Needs To Be Updated To &quot;Https://Access.Redhat.Com/Errata&quot;" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:3925-1</id><title>Selinux-Policy Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy-devel" release="268.el7" src="selinux-policy-3.13.1-268.el7.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-268.el7.noarch.rpm</filename><sum type="sha256">6f9e1e4c8beeca7c1d9e661ab2ae35f6ecb6a53b0cdc3ee4ba421a44552e2bf4</sum></package><package arch="noarch" name="selinux-policy" release="268.el7" src="selinux-policy-3.13.1-268.el7.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-268.el7.noarch.rpm</filename><sum type="sha256">ac85f9475feb4c91f58d886a500196603e8436d4846ae4f92c139b48a47569e1</sum></package><package arch="noarch" name="selinux-policy-sandbox" release="268.el7" src="selinux-policy-3.13.1-268.el7.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-268.el7.noarch.rpm</filename><sum type="sha256">959a2efd8d68e27b2dfe4019beac808c07176b399e4d1fa395436719e7c2f030</sum></package><package arch="noarch" name="selinux-policy-mls" release="268.el7" src="selinux-policy-3.13.1-268.el7.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-268.el7.noarch.rpm</filename><sum type="sha256">e71dde05a3abfb984e13302667dabc14a114da914f7b8adc31070bbe11ef84d9</sum></package><package arch="noarch" name="selinux-policy-minimum" release="268.el7" src="selinux-policy-3.13.1-268.el7.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-268.el7.noarch.rpm</filename><sum type="sha256">bd08f54777b5f6991f4956c0321c542c80bcbaf0aa914d5035c2a5980a23be4a</sum></package><package arch="noarch" name="selinux-policy-doc" release="268.el7" src="selinux-policy-3.13.1-268.el7.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-268.el7.noarch.rpm</filename><sum type="sha256">1d0a6325ec4552c2a148378b529c6e1b2e542f4f5ec459768c1a8a151c6bf4ea</sum></package><package arch="noarch" name="selinux-policy-targeted" release="268.el7" src="selinux-policy-3.13.1-268.el7.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-268.el7.noarch.rpm</filename><sum type="sha256">53087bdf24d08cd7310a9037f7d3767c473bde3c75318084f6a9036b3e2fccfd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:3925" id="RHBA-2020:3925-1" title="Rhba-2020:3925-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1770123" id="1770123" title="Pcp Pmsignal Is Not Allowed To Send Signal To Pmdas (Eg. Pmdaproc)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1780332" id="1780332" title="Audit Daemon Does Not Halt The System When The Audit Partition Is Full" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1820298" id="1820298" title="Avc Denial During Ipa-Adtrust-Install --Add-Agents" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1824625" id="1824625" title="Nagios/Nrpe No Longer Allowed To Check Mail Queue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1837461" id="1837461" title="Avc:  Denied  { Search } For Comm=&quot;Rhsmd&quot; Dev=&quot;Proc&quot;" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:3938-1</id><title>Jss Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="jss" release="3.el7" src="jss-4.4.9-3.el7.src.rpm" version="4.4.9"><filename>jss-4.4.9-3.el7.x86_64.rpm</filename><sum type="sha256">100a543a99455b3593ff688cb43e28b179ae8dcd189096979852c03872bead93</sum></package><package arch="x86_64" name="jss-javadoc" release="3.el7" src="jss-4.4.9-3.el7.src.rpm" version="4.4.9"><filename>jss-javadoc-4.4.9-3.el7.x86_64.rpm</filename><sum type="sha256">4e137c200d7f44c21a2e4a5642c37bac068805f42e3dc56c48a898cb7f014c19</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:3938" id="RHBA-2020:3938-1" title="Rhba-2020:3938-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1710105" id="1710105" title="Jss: Add Rsa Pss Support" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1796642" id="1796642" title="Jss -- Remove Hardcoded Native Library /Usr/Lib{64}/Jss/Libjss4.So" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1818631" id="1818631" title="Rebase Jss To V4.4.9 In Rhel 7.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:3961-1</id><title>Gssproxy Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gssproxy" release="29.el7" src="gssproxy-0.7.0-29.el7.src.rpm" version="0.7.0"><filename>gssproxy-0.7.0-29.el7.x86_64.rpm</filename><sum type="sha256">3675d375a146d150b5fb0aaed6a9b4ad4e0574c737e77e4cebb8449dfa586ee4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:3961" id="RHBA-2020:3961-1" title="Rhba-2020:3961-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1373421" id="1373421" title="[Gssproxy] Unspecified Gss Failure Occurs When Mount With Krb5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:3990-1</id><title>Mesa Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="mesa-libGLES" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libGLES-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">41b45b56bfa5930bf6a3c679ca594ec3a966da8f5216b794f1102553a4dc4864</sum></package><package arch="i686" name="mesa-khr-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-khr-devel-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">c85f4b5a8ad57bde4a5a089911989e7ab3dd653f96868b1653d63b1af4812ceb</sum></package><package arch="x86_64" name="mesa-libGLES" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libGLES-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">79794d4968a5f72fcbe19138a774dc18cfad04e5cfb875bc5acbcf5abbb64c74</sum></package><package arch="x86_64" name="mesa-libgbm-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libgbm-devel-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">bc0105a5f0f598340aeb5d02fe846572a7914c819c13110dcda30d743b2b58c0</sum></package><package arch="i686" name="mesa-vdpau-drivers" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-vdpau-drivers-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">0c043f6b4c530b251f59d3ae79475ea475bd2d7c6bcf8a36a6b1f90f08187300</sum></package><package arch="x86_64" name="mesa-libGLES-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libGLES-devel-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">f96a30b81d462af6bb0a2c9787cbd998c357aa53aa91e26c04d1ed2a99377879</sum></package><package arch="i686" name="mesa-libxatracker" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libxatracker-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">1daafe96d0b1b72716947243bb4391eb5f1e1b3eff336552330c6edcbadce7bd</sum></package><package arch="x86_64" name="mesa-libglapi" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libglapi-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">26c2b1f2976e5fd7617c0fd53e0c0fe6f80569f1920ae0d45d834fc496e78f51</sum></package><package arch="i686" name="mesa-vulkan-drivers" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-vulkan-drivers-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">9b7e191ab94d033b8e2757a97e7973da180ff3434edf6f5c7e43e5be3cc93238</sum></package><package arch="x86_64" name="mesa-libGL-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libGL-devel-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">c3f4e9e29548909283ee1d61cb5efedf81b5d2da148b20c555aff5e379992f30</sum></package><package arch="x86_64" name="mesa-khr-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-khr-devel-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">0dfae6c8b5f70289b624b8aea5607a6ecc711ffa17a0509562210d298afdb9f3</sum></package><package arch="x86_64" name="mesa-libOSMesa" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libOSMesa-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">388697bc4c4f6f35465ab9722efd32098b561c77066f3d51b6e955def6c6f781</sum></package><package arch="x86_64" name="mesa-dri-drivers" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-dri-drivers-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">066a833a964b516df838faaba5b827b06895c645c1bc8503d6c670204a13284f</sum></package><package arch="x86_64" name="mesa-libEGL-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libEGL-devel-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">64ad09b0b632ab255b990f4d680fe04f7c3eb30c2175e9212f507f378b418f48</sum></package><package arch="i686" name="mesa-libOSMesa-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libOSMesa-devel-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">262347f806287bba6b9d6fda186e2e9934352059f09eec5106bcf43b413fa33d</sum></package><package arch="i686" name="mesa-dri-drivers" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-dri-drivers-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">2d1a64a7c9fead5feb9d16246d6e7d0c49f70008da11c80a226f504bedb28e24</sum></package><package arch="i686" name="mesa-libGLES-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libGLES-devel-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">10b4387ca836295b14b3f06fd0adf567ab3420b5ee68f0985b2dea52dfc0779d</sum></package><package arch="i686" name="mesa-libgbm" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libgbm-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">3004a5009e8aa50d641126acb450397eff4235ee9a92e62376583c41c661389b</sum></package><package arch="x86_64" name="mesa-libxatracker" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libxatracker-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">00112f5405635a25c888d837e579cc619f5d38cbffbe45429a7aa36b84508807</sum></package><package arch="x86_64" name="mesa-libEGL" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libEGL-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">fe5fe2947b1fbeb80d1d2e072108df41f981ea0c267482362fedb4ff77c1c95b</sum></package><package arch="i686" name="mesa-libxatracker-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libxatracker-devel-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">fd8477fbe2e619c309abe7011b4f1544c40a446a3267bf5d9f72713246ef00fe</sum></package><package arch="x86_64" name="mesa-vdpau-drivers" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-vdpau-drivers-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">764ce6fbd92b18856ee9322db9426a5666ab448dacf4a741e60e823e5e7b44cf</sum></package><package arch="x86_64" name="mesa-libGL" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libGL-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">ab274b94ac80af76c948c29b20541897e6789ebf7484e7f3f8d66342fdf9a011</sum></package><package arch="x86_64" name="mesa-filesystem" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-filesystem-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">d53c74ecb12d5916f1890868e86f729f1e19582d09f0649ec2e7580d66ed6362</sum></package><package arch="x86_64" name="mesa-libgbm" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libgbm-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">d7b656c429f154db0885d0edd57e0a7720c26e37fb12ada34d692515e8430eb5</sum></package><package arch="i686" name="mesa-libGL" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libGL-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">5ac49f3393ec87c6b089b2cba390df5c778ce547c073454316c0fe87c224b69b</sum></package><package arch="i686" name="mesa-libglapi" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libglapi-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">9f8f448ea0cc2d2f5629f7d6400ea34d5bf3c985d2f7446920a72074a5856b32</sum></package><package arch="i686" name="mesa-libGL-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libGL-devel-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">5aa9001775ce4a2c5720e80f57d33be287e9286fe3fc771d5d09f0795854247b</sum></package><package arch="i686" name="mesa-filesystem" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-filesystem-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">c072a0a8caa2ff2ed30ba75d45d30cc55ffb1c4b51074c698df36f7bd073e470</sum></package><package arch="i686" name="mesa-libEGL-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libEGL-devel-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">1c19628db4b3e3f47b6bef6996f1a4bcc24d58cfced9591a76cde5c2afe9ee70</sum></package><package arch="x86_64" name="mesa-libxatracker-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libxatracker-devel-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">3262c507521b2b0b0c7f337a964cccf89a9b7ee7261de0cd5f86bfcce66d904b</sum></package><package arch="x86_64" name="mesa-libOSMesa-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libOSMesa-devel-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">240ba79f360e197a848a9cfa1a80812f25e929215953b5a2e8cafe123877a074</sum></package><package arch="i686" name="mesa-libOSMesa" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libOSMesa-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">4ec4c5964661a7f4a2bee627560eab424b4372a4e9ab3013ad4fea08332f0bd0</sum></package><package arch="x86_64" name="mesa-vulkan-drivers" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-vulkan-drivers-18.3.4-10.el7.x86_64.rpm</filename><sum type="sha256">b9079ff60ce2179710b8fda6c157380b65c3e5f88bc61eca514c17cc24ae0bf9</sum></package><package arch="i686" name="mesa-libEGL" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libEGL-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">d4be5fd3df3465dba0227523c6b527da5e1427df1cd532e9f57a79721fbee997</sum></package><package arch="i686" name="mesa-libgbm-devel" release="10.el7" src="mesa-18.3.4-10.el7.src.rpm" version="18.3.4"><filename>mesa-libgbm-devel-18.3.4-10.el7.i686.rpm</filename><sum type="sha256">890d72575971988fc9647778e9d577c6c96c99e5ee03e945dd82953813b51982</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:3990" id="RHBA-2020:3990-1" title="Rhba-2020:3990-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1843381" id="1843381" title="Webgl Context Lost With Fix For Rhbz#1803811" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:4045-1</id><title>Shim Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="shim-unsigned-ia32" release="9.el7" src="shim-15-9.el7.src.rpm" version="15"><filename>shim-unsigned-ia32-15-9.el7.x86_64.rpm</filename><sum type="sha256">eb5461acd44f5c417de7bac321eb8b4c6740f0aa141957e3a716e9cfda8b4843</sum></package><package arch="x86_64" name="fwupdate" release="6.sl7" src="fwupdate-12-6.sl7.src.rpm" version="12"><filename>fwupdate-12-6.sl7.x86_64.rpm</filename><sum type="sha256">4fa835008eaba7ecd258a12a50c7edc2c262dc91b9f57ef7ab0b68a3f230e5cf</sum></package><package arch="x86_64" name="shim-ia32" release="11.sl7" src="shim-signed-15-11.sl7.src.rpm" version="15"><filename>shim-ia32-15-11.sl7.x86_64.rpm</filename><sum type="sha256">c7666614ad7283b1c36eb793c49b3b93b626d77401fdd99494a2ec20f8c722f0</sum></package><package arch="x86_64" name="fwupdate-devel" release="6.sl7" src="fwupdate-12-6.sl7.src.rpm" version="12"><filename>fwupdate-devel-12-6.sl7.x86_64.rpm</filename><sum type="sha256">9c2ce6e2180c22510fde878ad56abfcacdcf6e7fc1e4fcb8433d06826a5aa096</sum></package><package arch="x86_64" name="mokutil" release="11.sl7" src="shim-signed-15-11.sl7.src.rpm" version="15"><filename>mokutil-15-11.sl7.x86_64.rpm</filename><sum type="sha256">d30740543fd917ca84498aaae16dc3ae1e02dc0e435557bd2b1a79ea70683ac2</sum></package><package arch="x86_64" name="fwupdate-efi" release="6.sl7" src="fwupdate-12-6.sl7.src.rpm" version="12"><filename>fwupdate-efi-12-6.sl7.x86_64.rpm</filename><sum type="sha256">18eafdb03a82cbea9831d61b934bca5e521c92f02831b9d85bd409d159b3eb02</sum></package><package arch="x86_64" name="shim-unsigned-x64" release="9.el7" src="shim-15-9.el7.src.rpm" version="15"><filename>shim-unsigned-x64-15-9.el7.x86_64.rpm</filename><sum type="sha256">ac97d4bbc89cbe4a2867a15b4c5a80b238032fc96f20a097f8ab5eea1826a5f8</sum></package><package arch="x86_64" name="fwupdate-libs" release="6.sl7" src="fwupdate-12-6.sl7.src.rpm" version="12"><filename>fwupdate-libs-12-6.sl7.x86_64.rpm</filename><sum type="sha256">bee8d631ee0009cd3fec3b278011294aff1ea944c5ba0a4c404bd008b46f68d0</sum></package><package arch="x86_64" name="shim-x64" release="11.sl7" src="shim-signed-15-11.sl7.src.rpm" version="15"><filename>shim-x64-15-11.sl7.x86_64.rpm</filename><sum type="sha256">717fb66d267e396cd41eab8585900e45a2b457a95afd82bd20a461b81c53d6c8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:4045" id="RHBA-2020:4045-1" title="Rhba-2020:4045-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1862045" id="1862045" title="Grub Or Shim Dies Since Updating To Grub2-2.02-0.86.El7_8 / Shim-X64-15-7.El7_8" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:4046-1</id><title>Grub2 Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="grub2-efi-x64-cdboot" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-efi-x64-cdboot-2.02-0.87.sl7.x86_64.rpm</filename><sum type="sha256">26f1493108bcf32bcb33ce424772e962c86d311a24695fd87dd4291bf432bb51</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-minimal" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-tools-minimal-2.02-0.87.sl7.x86_64.rpm</filename><sum type="sha256">9654a6edd1745435bf775e6bef3c9a49e476381564c420919d10a65da8e3d770</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32-cdboot" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-efi-ia32-cdboot-2.02-0.87.sl7.x86_64.rpm</filename><sum type="sha256">293f8036a24e2e14d29bc0daafbff547bb3c96b38173fed1465cfc346a512683</sum></package><package arch="x86_64" epoch="1" name="grub2-pc" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-pc-2.02-0.87.sl7.x86_64.rpm</filename><sum type="sha256">6817637dc99e043a6e591f4b7e9fd1449085d3cebfaba565bb7a21b199da87f1</sum></package><package arch="x86_64" epoch="1" name="grub2-tools" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-tools-2.02-0.87.sl7.x86_64.rpm</filename><sum type="sha256">5ca499bac3cc7f39168d4d6dc3440a2942278d213aca164cdec039727fbf97b6</sum></package><package arch="noarch" epoch="1" name="grub2-pc-modules" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-pc-modules-2.02-0.87.sl7.noarch.rpm</filename><sum type="sha256">b941d64d188dfa6d10000be0ee58870eac7bf1a2ac311859c090f7c393266c6a</sum></package><package arch="noarch" epoch="1" name="grub2-efi-x64-modules" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-efi-x64-modules-2.02-0.87.sl7.noarch.rpm</filename><sum type="sha256">f067e1ce69f25cdbe8673cb80d9f3c16eae49fac7029d20388baa149dc0e3fbb</sum></package><package arch="x86_64" epoch="1" name="grub2" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-2.02-0.87.sl7.x86_64.rpm</filename><sum type="sha256">467add357c1a4bccb041d872365fa84fcdf72cdf83bc172377ff167c6bb91de1</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-efi-x64-2.02-0.87.sl7.x86_64.rpm</filename><sum type="sha256">34f05e3a10f2fd1572df65eb075d02d5edccec1c6c761933c49ffa55b0255e7f</sum></package><package arch="noarch" epoch="1" name="grub2-common" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-common-2.02-0.87.sl7.noarch.rpm</filename><sum type="sha256">d4a7df3ae98c2a5817e531af29c5525f47ac123d13df835760448d77d22040be</sum></package><package arch="noarch" epoch="1" name="grub2-efi-ia32-modules" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-efi-ia32-modules-2.02-0.87.sl7.noarch.rpm</filename><sum type="sha256">0c3359bb8b97ef527f9ef247bee46e3f991f6458ab0622ed9442933b5a9dd036</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-extra" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-tools-extra-2.02-0.87.sl7.x86_64.rpm</filename><sum type="sha256">0848767975cfdf7f5e942e607355ac050f3e272baaf9d499ad8982bc4438541b</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32" release="0.87.sl7" src="grub2-2.02-0.87.sl7.src.rpm" version="2.02"><filename>grub2-efi-ia32-2.02-0.87.sl7.x86_64.rpm</filename><sum type="sha256">e802633c2d6655fcdcfdc3d6c75cf853ba51733c06d6425115a7016c374ea80f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:4046" id="RHBA-2020:4046-1" title="Rhba-2020:4046-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1869987" id="1869987" title="Error: ../../Grub-Core/Net/Net.C:1795:Timeout Reading Initrd.Img" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:4180-1</id><title>Kernel Bug Fix Update</title><description>This update fixes the following bugs:

* kernel: scsi: ses: don't ask for diagnostic pages repeatedly during probe

* OVS drops secondary SCTP connection

* Unable to insert 'i10nm_edac.ko' EDAC kernel module on JVL after CPU upgraded

* File corruption when a 1 MB (or bigger) file is pulled from a container running memory mapped AF_PACKET TX ring

* [mlx5] kernel crash at mlx5e_encap_take()

The system must be rebooted for this update to take effect.</description><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kernel-abi-whitelists" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.2.1.el7.noarch.rpm</filename><sum type="sha256">ee38276592d03247c195503a3a84bb788acf4f2375852d5e37e53aa10e5e14ec</sum></package><package arch="x86_64" name="kernel-headers" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">305ee7b1e141efb86dad88ce8f64d891d4499515a0b86cc2492a7afe7354f2cc</sum></package><package arch="x86_64" name="kernel-tools" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">47e102d549470ebe722222c158bf8bbe23ce7edaa9f6dbcf3ac2522f29f4f841</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">05238fa7733a2854c8da926c1cfc153aefeb49566288f67f02062c65d3f5d183</sum></package><package arch="x86_64" name="kernel-debug" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">5134deda0899e9a38e7e47fd0e23fe5b02271f2c23fc669bc6716c59f0a46170</sum></package><package arch="x86_64" name="kernel" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">f64734816b193587747ba3f6f37cef54cb714507a9a60de8dcd9de5e30f6174b</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">12e0cf4a6ac5e1725da5c23f45471c5137290387f7dc775f1a3ab186307231cb</sum></package><package arch="x86_64" name="bpftool" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">cbd170a26667e7100abca4aabfa06d0d24d6bd8ab65264cfb8e8e767de442a5c</sum></package><package arch="x86_64" name="kernel-devel" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">72a1ee6bb71ce33bc004874f657bbdb022ac6f31d44a5f9b87164617d4693673</sum></package><package arch="x86_64" name="python-perf" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">ddca29711b7c5250cc0031df2c682dc3642d51de1ba6b31c4d3fee300d97abde</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">542cbe64be29e0eee7ba6662f92806774a6f86524e5857bb9ebe2a35d9cb552d</sum></package><package arch="noarch" name="kernel-doc" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.2.1.el7.noarch.rpm</filename><sum type="sha256">367bf3076424250e2b5a936305fd9d34309323521cbc12c90ccd88ec4f96a989</sum></package><package arch="x86_64" name="perf" release="1160.2.1.el7" src="kernel-3.10.0-1160.2.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.2.1.el7.x86_64.rpm</filename><sum type="sha256">e1e87432d6037c047a0c13b2fa71288d378d6cf91d2cd94f3d7298c4b980c1a1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:4180" id="RHBA-2020:4180-1" title="Rhba-2020:4180-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:4282-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been updated to version 2020b, which addresses recent time zone changes. Notably:

* Yukon timezones represented by America/Whitehorse and America/Dawson will change time zone rules from -08/-07 to permanent -07 on November 01, 2020, not on August 03, 2020, contrary to what was in the version 2020a.

* The most recent winter(+08)/summer(+11) transition for Casey Station, Antarctica was on April 04, 2020 at 00:01.

* Obsolete pacificnew, systemv, and yearistype.sh files have been removed from the distribution.</description><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="3.el7" src="tzdata-2020b-3.el7.src.rpm" version="2020b"><filename>tzdata-java-2020b-3.el7.noarch.rpm</filename><sum type="sha256">e2e2a484a6f1ee84161056075eb83c7c1fb9608b45fb487cfa3ccf4623f5629c</sum></package><package arch="noarch" name="tzdata" release="3.el7" src="tzdata-2020b-3.el7.src.rpm" version="2020b"><filename>tzdata-2020b-3.el7.noarch.rpm</filename><sum type="sha256">bae5d3ba085cab34024698659c79a9f30feb14b936052f6a4e1ad4af87ac9ce0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:4282" id="RHBA-2020:4282-1" title="Rhba-2020:4282-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:4329-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been updated to version 2020d, which addresses recent time zone changes. Notably:

* Fiji starts the daylight saving time (DST) later than usual on December 20, 2020, rather than the predicted November O8, 2020.

* Palestine will end summer time on October 24, 2020 rather than the predicted October 31, 2020.</description><release>Scientific Linux</release><issued date="2020-10-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="2.el7" src="tzdata-2020d-2.el7.src.rpm" version="2020d"><filename>tzdata-java-2020d-2.el7.noarch.rpm</filename><sum type="sha256">e86d66eb32256341996577a3468858f80ccc4b9e24f0049daf6bb64f596d23e6</sum></package><package arch="noarch" name="tzdata" release="2.el7" src="tzdata-2020d-2.el7.src.rpm" version="2020d"><filename>tzdata-2020d-2.el7.noarch.rpm</filename><sum type="sha256">32dcd49fca4845c52d8522bcd6ee06a92751dbd5bf2f8449c49d779f56716432</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:4329" id="RHBA-2020:4329-1" title="Rhba-2020:4329-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:5017-1</id><title>Openscap Bug Fix And Enhancement Update</title><description>Bug Fix(es) and Enhancement(s):

* Huge memory leak in probe_rpmverifyfile

* OpenSCAP doesn't take advantage of gzip compression when downloading remote content.</description><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openscap-engine-sce" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">26a432b346c85143df5fdde282d9c47924e375ed738a6d801c45e1889c8bfbb0</sum></package><package arch="i686" name="openscap-engine-sce-devel" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-13.el7_9.i686.rpm</filename><sum type="sha256">55deefdf2b8baccf6dcfe7257b32da1358ffad07cf45c4774b6d2da7f42958f4</sum></package><package arch="x86_64" name="openscap-scanner" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-scanner-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">88b70d5aff9e78052b1ef48e3ef10e440554a5c0306783325f1f213c1b5f2de1</sum></package><package arch="noarch" name="openscap-containers" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-containers-1.2.17-13.el7_9.noarch.rpm</filename><sum type="sha256">c1ace00cb7cc2d0d459c60346f512dd63fc382408c65f15647f43f0fd262d2cd</sum></package><package arch="x86_64" name="openscap-devel" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">64a29549d82f9078cb03fd0e266169dcfbab9789a34103b1a314a26944eec89a</sum></package><package arch="x86_64" name="openscap-utils" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-utils-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">b589b72959da4539156217de78bc14092ecd190bf5d5b9959e6850117fe6124d</sum></package><package arch="x86_64" name="openscap-engine-sce-devel" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">3adb46260adf0b3729fb688454a01a951bef015104991962f74a481da3628919</sum></package><package arch="x86_64" name="openscap-extra-probes" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-extra-probes-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">3d8d218227e06c86640e9048c0727f9448126b03d50998f86968af7a7fba4e02</sum></package><package arch="i686" name="openscap-devel" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-13.el7_9.i686.rpm</filename><sum type="sha256">6611815a691ea4ef9286b3dbe25ca75872e61dd1b821777aa27898bc7e926549</sum></package><package arch="x86_64" name="openscap-python" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-python-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">9eda95b4bf068a4dd42578893cec8d34023919dcc2d6d1e5f43e9ae2e04c3f3b</sum></package><package arch="x86_64" name="openscap" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-1.2.17-13.el7_9.x86_64.rpm</filename><sum type="sha256">0f431fc0de2d54d27ef73e8763305530fdafe7e75e8d14971ef6d6dd456740ec</sum></package><package arch="i686" name="openscap-engine-sce" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-13.el7_9.i686.rpm</filename><sum type="sha256">02a2970fe161c63ce93bba1e1800f38b3e7bf320f728029a7a08e948297071d7</sum></package><package arch="i686" name="openscap" release="13.el7_9" src="openscap-1.2.17-13.el7_9.src.rpm" version="1.2.17"><filename>openscap-1.2.17-13.el7_9.i686.rpm</filename><sum type="sha256">e172cb1bfb4d2cb42fdf435dbc33fce6ffb9db9419388628508591f6d41530f3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:5017" id="RHBA-2020:5017-1" title="Rhba-2020:5017-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1861300" id="1861300" title="Huge Memory Leak In Probe_Rpmverifyfile [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1870147" id="1870147" title="Openscap Doesn'T Take Advantage Of Gzip Compression When Downloading Remote Content. [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:5027-1</id><title>Selinux-Policy Bug Fix And Enhancement Update</title><description>Bug Fix(es) and Enhancement(s):

* [SL-7.9]- Selinux policy need to be updated for RHGS to fix permission issues

* Selinux prevents nss from creating directory inside the certs directory.</description><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="selinux-policy-devel" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-devel-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">bf544dffd42e2c80a47b65fbfb4490df371130b42ec4467e85b20839b3ffb0d0</sum></package><package arch="noarch" name="selinux-policy-doc" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-doc-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">ff9576077bc32507c027488b37dc29449d1687a5859e8c9dd6183804f2f65cd8</sum></package><package arch="noarch" name="selinux-policy-minimum" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-minimum-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">4c4425d26098ce827f3d90fb9055b74ad86caaf510c5786578f15f3e97a9ad42</sum></package><package arch="noarch" name="selinux-policy-sandbox" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-sandbox-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">d30d91abee991346cbe1e380d0ec23b629bfe2e39cdaf821f892963542506751</sum></package><package arch="noarch" name="selinux-policy-mls" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-mls-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">a7e1b16a3019fe3300dafdd834094cc64b70668c4afb1e2a448a5afe3774a0b2</sum></package><package arch="noarch" name="selinux-policy-targeted" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-targeted-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">b55b489fad47589263e056c0967fb2386b7504d965aff36c7beb7a936e3cb5e7</sum></package><package arch="noarch" name="selinux-policy" release="268.el7_9.2" src="selinux-policy-3.13.1-268.el7_9.2.src.rpm" version="3.13.1"><filename>selinux-policy-3.13.1-268.el7_9.2.noarch.rpm</filename><sum type="sha256">57914f4194867a8f2455b8d04689c9b5b7f83402a400a1ec5183b01ff64d8533</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:5027" id="RHBA-2020:5027-1" title="Rhba-2020:5027-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1867995" id="1867995" title="[Rhel-7.9]- Selinux Policy Need To Be Updated For Rhgs To Fix Permission Issues [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:5032-1</id><title>Python-Blivet Bug Fix And Enhancement Update</title><description>Bug Fix(es) and Enhancement(s):

* Not closing the fd  if blivet fails to read the device</description><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="python-blivet" release="1.el7_9" src="python-blivet-0.61.15.76-1.el7_9.src.rpm" version="0.61.15.76"><filename>python-blivet-0.61.15.76-1.el7_9.noarch.rpm</filename><sum type="sha256">4ae70a3b7c5aa57c7c8b891f6d4cd92afd4f8e708e75955cbc5e3414fabcc366</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:5032" id="RHBA-2020:5032-1" title="Rhba-2020:5032-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1879920" id="1879920" title="Not Closing The Fd  If Blivet Fails To Read The Device [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2020:5451-1</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>Bug Fix(es) and Enhancement(s):

* The "DISA STIG for Scientific Linux 7" profile in the SCAP Security Guide has been updated to the latest version V3R1. This update adds more coverage and fixes reference problems. The profile is now also more stable and better aligns with the SL7 STIG benchmark provided by the Defense Information Systems Agency (DISA).

You should use only the current version of this profile because the older versions of this profile are no longer valid. The OVAL checks for several rules have changed, and scans using the V3R1 version will fail for systems that were hardened using older versions of SCAP Security Guide. You can fix the rules automatically by running the remediation with the new version of SCAP Security Guide.

WARNING: Automatic remediation might render the system non-functional. Run the remediation in a test environment first.

The following rules have been changed:

CCE-80224-9:: The default value of this SSHD configuration has changed from "delayed" to "yes". You must now provide a value according to recommendations. Check the rule description for information about fixing this problem or run the remediation to fix it automatically.

CCE-80393-2:: xccdf_org.ssgproject.content_rule_audit_rules_execution_chcon CCE-80394-0:: xccdf_org.ssgproject.content_rule_audit_rules_execution_restorecon CCE-80391-6:: xccdf_org.ssgproject.content_rule_audit_rules_execution_semanage CCE-80660-4:: xccdf_org.ssgproject.content_rule_audit_rules_execution_setfiles CCE-80392-4:: xccdf_org.ssgproject.content_rule_audit_rules_execution_setsebool CCE-82362-5:: xccdf_org.ssgproject.content_rule_audit_rules_execution_seunshare CCE-80398-1:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chage CCE-80404-7:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_chsh CCE-80410-4:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_crontab CCE-80397-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_gpasswd CCE-80403-9:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_newgrp CCE-80411-2:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_com mands_pam_timestamp_check CCE-27437-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands CCE-80395-7:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_passwd CCE-80406-2:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_postdrop CCE-80407-0:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_com mands_postqueue CCE-80408-8:: xccdf_org.ssgproject.content_rule_audit_rule s_privileged_commands_ssh_keysign CCE-80402-1:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudoedit CCE-80401-3:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_sudo CCE-80400-5:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_su CCE-80405-4:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_commands_umount CCE-80396-5:: xccdf_org.ssgproject.content_rule_audit_rules_privileged_com mands_unix_chkpwd CCE-80399-9:: xccdf_org.ssgproject.content_rule_audit_ru les_privileged_commands_userhelper</description><release>Scientific Linux</release><issued date="2020-12-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide-doc" release="2.sl7_9" src="scap-security-guide-0.1.52-2.sl7_9.src.rpm" version="0.1.52"><filename>scap-security-guide-doc-0.1.52-2.sl7_9.noarch.rpm</filename><sum type="sha256">a76226596f9cf1af0cf1fb7a48a9bd48b064fb4ea543aa8bf5672aad2b08c5bc</sum></package><package arch="noarch" name="scap-security-guide" release="2.sl7_9" src="scap-security-guide-0.1.52-2.sl7_9.src.rpm" version="0.1.52"><filename>scap-security-guide-0.1.52-2.sl7_9.noarch.rpm</filename><sum type="sha256">c3f704db0ab1790e4b3b80c95b321134d3fd4bef2ad363890a0892ff8f12a9d2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2020:5451" id="RHBA-2020:5451-1" title="Rhba-2020:5451-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665233" id="1665233" title="Latest Rhel7 Stig Is Not Present In Latest Version Of Scap-Security-Guide. [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:0013-1</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages have been updated to version 2020f, which addresses recent time zone changes. Notably:

* Europe/Volgograd will change from UTC+04 to UTC+03 on December 27, 2020.</description><release>Scientific Linux</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2020f-1.el7.src.rpm" version="2020f"><filename>tzdata-2020f-1.el7.noarch.rpm</filename><sum type="sha256">c37375a99001e0ec3742ba21f8b5a51f2034945b5b7e54a211166c3e76ad451d</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2020f-1.el7.src.rpm" version="2020f"><filename>tzdata-java-2020f-1.el7.noarch.rpm</filename><sum type="sha256">8539392e7e8de6c9aecd029b448821e59301400a279fd44b232bc6f76473cfcc</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:0013" id="RHBA-2021:0013-1" title="Rhba-2021:0013-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:0276-1</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages have been updated to version 2021a, which addresses recent time zone changes. Notably:

* South Sudan will change from UTC+03 to UTC+02 on February 1, 2021.</description><release>Scientific Linux</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2021a-1.el7.src.rpm" version="2021a"><filename>tzdata-java-2021a-1.el7.noarch.rpm</filename><sum type="sha256">665540ad82981076b64025f9f7818c8e13241edc37cc0917f95d810de3efdccd</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2021a-1.el7.src.rpm" version="2021a"><filename>tzdata-2021a-1.el7.noarch.rpm</filename><sum type="sha256">e4e436444c61697321d0ce5167151f9c6997ad25cbb4f76b349d4096c59d127a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:0276" id="RHBA-2021:0276-1" title="Rhba-2021:0276-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:1383</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* [RFE] Add ANSSI-BP-028 to SSG (Minimal, Intermediary and Enhanced Levels) (BZ#1497415) * Remove deprecated follow argument from Ansible remediations (BZ#1890111) * Rules of type Service Disabled do not have clear description on which actions the user should take (BZ#1891435) * Latest RHEL7 STIG (V3R2) is not present in latest version of scap-security-guide. (BZ#1921643)
</description><issued date="2021-04-27 15:26:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide-doc" release="3.sl7_9" src="scap-security-guide-0.1.54-3.sl7_9.src.rpm" version="0.1.54"><filename>scap-security-guide-doc-0.1.54-3.sl7_9.noarch.rpm</filename><sum type="sha256">5a48575cc47a52dd21176c83682cf6d2b6e69970bd2f7569345a06e0ec89b86b</sum></package><package arch="noarch" name="scap-security-guide" release="3.sl7_9" src="scap-security-guide-0.1.54-3.sl7_9.src.rpm" version="0.1.54"><filename>scap-security-guide-0.1.54-3.sl7_9.noarch.rpm</filename><sum type="sha256">490f4f763d6c2bf415fa620bde6d30e05157b264820ed1e75c62f520297a507a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:1383" id="RHBA-2021:1383" title="Scap-Security-Guide Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1497415" id="1497415" title="1497415 &#8211; [Rfe] Add Anssi-Bp-028 To Ssg (Minimal, Intermediary And Enhanced Levels) [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1890111" id="1890111" title="1890111 &#8211; Remove Deprecated Follow Argument From Ansible Remediations [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1891435" id="1891435" title="1891435 &#8211; Rules Of Type Service Disabled Do Not Have Clear Description On Which Actions The User Should Take [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1921643" id="1921643" title="1921643 &#8211; Latest Rhel7 Stig (V3R2) Is Not Present In Latest Version Of Scap-Security-Guide. [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:2803</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* Update ANSSI-BP-028 High level profile (BZ#1955180) * Update rhel7 DISA STIG profile to v3r3 (BZ#1958789) * dconf_gnome_login_retries remediation results in error and breaks dconf
configuration file (BZ#1967566)
* Add STIG variant for GUI installations (BZ#1970131)
</description><issued date="2021-07-26 16:08:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide" release="7.sl7_9" src="scap-security-guide-0.1.54-7.sl7_9.src.rpm" version="0.1.54"><filename>scap-security-guide-0.1.54-7.sl7_9.noarch.rpm</filename><sum type="sha256">8584a00307740e79f24152cf8b271df7208391b14b97be9e8822560e49e0deb5</sum></package><package arch="noarch" name="scap-security-guide-rule-playbooks" release="7.sl7_9" src="scap-security-guide-0.1.54-7.sl7_9.src.rpm" version="0.1.54"><filename>scap-security-guide-rule-playbooks-0.1.54-7.sl7_9.noarch.rpm</filename><sum type="sha256">ed957b3e66f6be580be168f954918d6951e1a392d9adc7585299604e799b4825</sum></package><package arch="noarch" name="scap-security-guide-doc" release="7.sl7_9" src="scap-security-guide-0.1.54-7.sl7_9.src.rpm" version="0.1.54"><filename>scap-security-guide-doc-0.1.54-7.sl7_9.noarch.rpm</filename><sum type="sha256">1fb811204dae05a886079d275760ae5ca800b6dd46b9bb4d384e1b2a99e676fb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:2803" id="RHBA-2021:2803" title="Scap-Security-Guide Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1955180" id="1955180" title="1955180 &#8211; Update Anssi-Bp-028 High Level Profile" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1958789" id="1958789" title="1958789 &#8211; Update Rhel7 Disa Stig Profile To V3R3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1967566" id="1967566" title="1967566 &#8211; Dconf_Gnome_Login_Retries Remediation Results In Error And Breaks Dconf Configuration File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1970131" id="1970131" title="1970131 &#8211; Add Stig Variant For Gui Installations" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:3326</id><title>Gvfs Bug Fix And Enhancement Update</title><description>GVFS is the GNOME Desktop Virtual File System layer that allows users to easily access local and remote data using File Transfer Protocol (FTP), Secure Shell File Transfer Protocol (SFTP), Web Distributed Authoring and Versioning (WebDAV), Common Internet File System (CIFS), Server Message Block (SMB), and other protocols. GVFS integrates with the GNOME I/O (GIO) abstraction layer.
Bug Fix(es) and Enhancement(s):
* memory leak in gvfs-udisks2-volume-monitor (BZ#1944813)
</description><issued date="2021-08-31 11:29:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gvfs-archive" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-archive-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">1aca23e2697140a6da45b00779021a5b231a22b372bcc3edab121535d926fb40</sum></package><package arch="x86_64" name="gvfs-fuse" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-fuse-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">0434109b9834c6c9f679d7458edd323cc168a42c0c326e32cdeecb44cef57ee0</sum></package><package arch="x86_64" name="gvfs-gphoto2" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-gphoto2-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">11560e5bbd54521ea0e6bca0318491d2b8673269f5d4fdc9c084e67c90273e47</sum></package><package arch="x86_64" name="gvfs-afc" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-afc-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">afc98b4b4e1ac910f4abefffaf5cf30cb0b545709e78fa080fa79ba7f258ed33</sum></package><package arch="x86_64" name="gvfs-tests" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-tests-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">c4f5fa9a22e86bec97bb0afd34278b0631e8c84d6dbcdb266469105fd0cca994</sum></package><package arch="i686" name="gvfs-client" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-client-1.36.2-5.el7_9.i686.rpm</filename><sum type="sha256">ae3ea04777b15e748e136d4348277956668010867cb6a6fdb656ff397497801e</sum></package><package arch="x86_64" name="gvfs-devel" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-devel-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">50886aff29128c7b0486408a3b5dd822e447fb844d03755370c2c5a151dcef9e</sum></package><package arch="x86_64" name="gvfs-goa" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-goa-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">8a74d5afc3a4679e176ccc0dd4ac8142f23d75065afef64ed61368b3fdb7f559</sum></package><package arch="x86_64" name="gvfs-client" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-client-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">9ea4e39482d284454fc7ff5b2256de153dd924e105c3400370510a1689922337</sum></package><package arch="x86_64" name="gvfs-smb" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-smb-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">8d525cd93e3ea2a99271db99f09ad4d564cb9e886613805250d55be1ad9a936d</sum></package><package arch="x86_64" name="gvfs-afp" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-afp-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">2b7bd38e06c8d0a25e04a78ebb8d92536aa223b8d39954f117dd48e4155bb4a2</sum></package><package arch="x86_64" name="gvfs-mtp" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-mtp-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">6b2a6a73ad2c7d30b771ba301e2652e2dde4f927f70f54bc64e7fe05f162633c</sum></package><package arch="x86_64" name="gvfs" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-1.36.2-5.el7_9.x86_64.rpm</filename><sum type="sha256">deda765e131121c287f623ddef5a409121c54a309045dfbc75169e2da558ffb1</sum></package><package arch="i686" name="gvfs" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-1.36.2-5.el7_9.i686.rpm</filename><sum type="sha256">3f349a1203324c6f5455398298324f6820f42183960f4c215f9ea981b3dc0df2</sum></package><package arch="i686" name="gvfs-devel" release="5.el7_9" src="gvfs-1.36.2-5.el7_9.src.rpm" version="1.36.2"><filename>gvfs-devel-1.36.2-5.el7_9.i686.rpm</filename><sum type="sha256">7a4f19f435a83650765bc7d3568d477bf165fd943c5ec2d3b3db02a753181914</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:3326" id="RHBA-2021:3326" title="Gvfs Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1944813" id="1944813" title="1944813 &#8211; Memory Leak In Gvfs-Udisks2-Volume-Monitor" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:3790</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2021c, which addresses recent time zone changes. Notably:
* Samoa does not switch to the daylight saving time (DST) in 2021.
(BZ#2007732, BZ#2007785, BZ#2008251, BZ#2010126, BZ#2010127, BZ#2010312)
</description><issued date="2021-10-12 15:24:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2021c-1.el7.src.rpm" version="2021c"><filename>tzdata-java-2021c-1.el7.noarch.rpm</filename><sum type="sha256">ce1f65142b07a7c2f539e818e24356a5ababcfa788fe29d9410d9ebb9ea1080c</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2021c-1.el7.src.rpm" version="2021c"><filename>tzdata-2021c-1.el7.noarch.rpm</filename><sum type="sha256">39eb52d8920c1d74883252f632751e5fee35f70add925cbee7199855ace9e2c9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:3790" id="RHBA-2021:3790" title="Tzdata Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2007732" id="2007732" title="2007732 &#8211; Tzdata-2021B - Pacific/Apia No Dst From 25/Sep/2021" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2007785" id="2007785" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2008251" id="2008251" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2010126" id="2010126" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2010127" id="2010127" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2010312" id="2010312" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:3793</id><title>Nss, Nss-Softokn, Nss-Util, And Nspr Bug Fix And Enhancement Update</title><description>Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
The nss-softokn package provides the Network Security Services Softoken Cryptographic Module.
The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries.
Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities.
Bug Fix(es) and Enhancement(s):
* Integrity protection is not active on all database fields (BZ#1879933) * NSS sometimes causes CURL deadlocks (BZ#1896808) * yum gets deadlocked/hung up (indefinitely) waiting for urlgrabber-ext-down (BZ#1909150) * Recursive locks observed in nss-3.53.1 (BZ#1909261) * Need to rebase to NSS 3.66 for Firefox 91 Release [RHEL 7.9] (BZ#1966816) * NSS cannot use SQL databases created by specific versions of NSS (BZ#1978433) * Inconsistent handling of malformed CertificateRequest messages [rhel-7.9z] (BZ#1980046)
</description><issued date="2021-10-18 06:34:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-devel" release="3.el7_9" src="nss-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-devel-3.67.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">2c0f670ad48cb9ba882fdfeacdc869245ff97cb2320eb484022798efa965a473</sum></package><package arch="i686" name="nss-devel" release="3.el7_9" src="nss-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-devel-3.67.0-3.el7_9.i686.rpm</filename><sum type="sha256">87fd30874b2b8b6ea451e0478c5ab0f71c3357ac0524e5197f2d9171912b34d3</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="3.el7_9" src="nss-softokn-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-softokn-freebl-3.67.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">ab996e4b9cdc0e5c0495805a72d005f6bcf3e6c1b7c9f1df9c1c91b85e1ec57f</sum></package><package arch="i686" name="nspr-devel" release="1.el7_9" src="nspr-4.32.0-1.el7_9.src.rpm" version="4.32.0"><filename>nspr-devel-4.32.0-1.el7_9.i686.rpm</filename><sum type="sha256">e36ace0b56dfefa947060cb4e2390383264e9d6a1c072b832cb55c35b11b8b94</sum></package><package arch="x86_64" name="nss-softokn-devel" release="3.el7_9" src="nss-softokn-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-softokn-devel-3.67.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">7beddb7631518604b4e3cff8364e1ab5daff98ecae28da3b679247b241026a1c</sum></package><package arch="i686" name="nss-util-devel" release="1.el7_9" src="nss-util-3.67.0-1.el7_9.src.rpm" version="3.67.0"><filename>nss-util-devel-3.67.0-1.el7_9.i686.rpm</filename><sum type="sha256">e2619a570f375cc27050a73e1be344665a8ec0cd78341148a74adfdbeb382b47</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="3.el7_9" src="nss-softokn-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-softokn-freebl-devel-3.67.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">9bc2727ee996d4b8b416648ccbcc7aa3959454c3dadb7b35c6921ba4ddb73a0d</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el7_9" src="nss-util-3.67.0-1.el7_9.src.rpm" version="3.67.0"><filename>nss-util-devel-3.67.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">649f82efb3ff7a7b30bbb14bafad86e6003fe023b4de9813ed2525a61ee801fb</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="3.el7_9" src="nss-softokn-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-softokn-freebl-devel-3.67.0-3.el7_9.i686.rpm</filename><sum type="sha256">e6ad52307f29b631f9c6bdb14fd5436628349a751beab2462a2b72bf55dee53b</sum></package><package arch="i686" name="nss-util" release="1.el7_9" src="nss-util-3.67.0-1.el7_9.src.rpm" version="3.67.0"><filename>nss-util-3.67.0-1.el7_9.i686.rpm</filename><sum type="sha256">f9f20cb196069ff6fc17ded3d73b7631d948cfcfd718565148b7459eb0a3639c</sum></package><package arch="x86_64" name="nss-tools" release="3.el7_9" src="nss-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-tools-3.67.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">82b5608db91380a02c78ba181395f8263fa772615f25d2dddf58193b096bac18</sum></package><package arch="i686" name="nss-softokn-devel" release="3.el7_9" src="nss-softokn-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-softokn-devel-3.67.0-3.el7_9.i686.rpm</filename><sum type="sha256">d1a9c51ad1cc93aa7cdef20cd6c93bf5d1da6ff3520ad02419b6f83b7cd54af2</sum></package><package arch="x86_64" name="nss" release="3.el7_9" src="nss-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-3.67.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">eda6cfbb071aab353de25677b3b0e107b5ad7e3f59951407bd45450effc0d453</sum></package><package arch="i686" name="nss-pkcs11-devel" release="3.el7_9" src="nss-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-pkcs11-devel-3.67.0-3.el7_9.i686.rpm</filename><sum type="sha256">6da92c396cd6ce357ecfb3faf406ee21f61118003201c1c15997a242b4425999</sum></package><package arch="i686" name="nss-softokn-freebl" release="3.el7_9" src="nss-softokn-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-softokn-freebl-3.67.0-3.el7_9.i686.rpm</filename><sum type="sha256">1d42d82366258ade1c349216ae1f9b90526982e2e2961cec7657a2114e1a5426</sum></package><package arch="x86_64" name="nss-softokn" release="3.el7_9" src="nss-softokn-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-softokn-3.67.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">f71e7ed72ba31abcb53eb5f0c3203e03eaafe5d7f248cd8abbf9603288dedebd</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="3.el7_9" src="nss-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-pkcs11-devel-3.67.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">298b690f8d2735e8fe7b477ecd2defaab30edfd913e692635636320c4201f4d4</sum></package><package arch="i686" name="nspr" release="1.el7_9" src="nspr-4.32.0-1.el7_9.src.rpm" version="4.32.0"><filename>nspr-4.32.0-1.el7_9.i686.rpm</filename><sum type="sha256">58b6fb3d52922d32614c80d2e4376e4bfa7cdd632cf8529cbae89ec994874dc9</sum></package><package arch="i686" name="nss" release="3.el7_9" src="nss-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-3.67.0-3.el7_9.i686.rpm</filename><sum type="sha256">237b8d5deabaeee02c7336476b9136567cbd8f5234849d5672d36f4e98f3e894</sum></package><package arch="x86_64" name="nspr-devel" release="1.el7_9" src="nspr-4.32.0-1.el7_9.src.rpm" version="4.32.0"><filename>nspr-devel-4.32.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">6489403e07ebd577f870a4568713fbbbb883e5a59a7d8ffe4635d32a84e02ec3</sum></package><package arch="x86_64" name="nss-util" release="1.el7_9" src="nss-util-3.67.0-1.el7_9.src.rpm" version="3.67.0"><filename>nss-util-3.67.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">7eafc5254ebcce4f3ed8e5a99677e1a6c714789347e30e1a288b47fac43cbf5e</sum></package><package arch="i686" name="nss-softokn" release="3.el7_9" src="nss-softokn-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-softokn-3.67.0-3.el7_9.i686.rpm</filename><sum type="sha256">ec1f4772a2e82eaaf1e00b556efdf57a3d602819fb2ed1fe813d72cbe3895f71</sum></package><package arch="x86_64" name="nss-sysinit" release="3.el7_9" src="nss-3.67.0-3.el7_9.src.rpm" version="3.67.0"><filename>nss-sysinit-3.67.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">02f8ef2ecaa45b41bbb4ac0debc3d8cddf92bd8f4c975dc8d01b3074f1c83003</sum></package><package arch="x86_64" name="nspr" release="1.el7_9" src="nspr-4.32.0-1.el7_9.src.rpm" version="4.32.0"><filename>nspr-4.32.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">8f352f7a82a458922db56d82dc8d63d1b6e66069cf73a7f4a56e790945c58bd0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:3793" id="RHBA-2021:3793" title="Nss, Nss-Softokn, Nss-Util, And Nspr Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1879933" id="1879933" title="1879933 &#8211; Integrity Protection Is Not Active On All Database Fields" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1896808" id="1896808" title="1896808 &#8211; Nss Sometimes Causes Curl Deadlocks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1909150" id="1909150" title="1909150 &#8211; Yum Gets Deadlocked/Hung Up (Indefinitely) Waiting For Urlgrabber-Ext-Down" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1909261" id="1909261" title="1909261 &#8211; Recursive Locks Observed In Nss-3.53.1 [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1966816" id="1966816" title="1966816 &#8211; Need To Rebase To Nss 3.66 For Firefox 91 Release [Rhel 7.9]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1978433" id="1978433" title="1978433 &#8211; Nss Cannot Use Sql Databases Created By Specific Versions Of Nss [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1980046" id="1980046" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:3800</id><title>Ipa Bug Fix And Enhancement Update</title><description>Red Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Bug Fix(es) and Enhancement(s):
* extdom: LDAP_INVALID_SYNTAX returned instead of LDAP_NO_SUCH_OBJECT
(BZ#2000261)
</description><issued date="2021-10-12 15:24:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python2-ipaserver" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>python2-ipaserver-4.6.8-5.sl7_9.9.noarch.rpm</filename><sum type="sha256">41e0b47432858828cc2106f9874b762fdb184614a04f4726a4236dc8fa4dd7aa</sum></package><package arch="x86_64" name="ipa-client" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>ipa-client-4.6.8-5.sl7_9.9.x86_64.rpm</filename><sum type="sha256">ef17cc21eec485fbe0692bc7a7590be3248479273a74a5545c4c59ac43483971</sum></package><package arch="noarch" name="python2-ipaclient" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>python2-ipaclient-4.6.8-5.sl7_9.9.noarch.rpm</filename><sum type="sha256">a0c91e360b47fb9f3c9642044c349d3b6985bde9261712151d1e2c37705c5bcd</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>ipa-server-trust-ad-4.6.8-5.sl7_9.9.x86_64.rpm</filename><sum type="sha256">95cad1c2465c7cd71b6931c1e54f48dab469d3bd75a26743d3edddadaa08c6ef</sum></package><package arch="noarch" name="python2-ipalib" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>python2-ipalib-4.6.8-5.sl7_9.9.noarch.rpm</filename><sum type="sha256">84d4c7cf560d79075edc1a42b6c9ddc5fa12d371ccf80d15f662efd1d209fd4c</sum></package><package arch="noarch" name="ipa-python-compat" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>ipa-python-compat-4.6.8-5.sl7_9.9.noarch.rpm</filename><sum type="sha256">e4e7127bb63d889f2044cd811cff7a8d141a6f20110f919ca2332852b4e3a301</sum></package><package arch="x86_64" name="ipa-server" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>ipa-server-4.6.8-5.sl7_9.9.x86_64.rpm</filename><sum type="sha256">62d0456d32a15daea2e8aed6b63d3fe97c75f82f5f11465be5331e7d25765316</sum></package><package arch="noarch" name="ipa-server-common" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>ipa-server-common-4.6.8-5.sl7_9.9.noarch.rpm</filename><sum type="sha256">67bc072b25687f470b5ff797415ec5e7cc911d1d31cded229a95d80450c34015</sum></package><package arch="noarch" name="ipa-client-common" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>ipa-client-common-4.6.8-5.sl7_9.9.noarch.rpm</filename><sum type="sha256">80f987c27a87872d59c18c0b4d98af6629791fab56c1e5c97d36a7944bb8a069</sum></package><package arch="noarch" name="ipa-common" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>ipa-common-4.6.8-5.sl7_9.9.noarch.rpm</filename><sum type="sha256">da28eee5f08704830533dcbfbe02070114d97443c679e331e87133a799f511f4</sum></package><package arch="noarch" name="ipa-server-dns" release="5.sl7_9.9" src="ipa-4.6.8-5.sl7_9.9.src.rpm" version="4.6.8"><filename>ipa-server-dns-4.6.8-5.sl7_9.9.noarch.rpm</filename><sum type="sha256">6a032b03a786c53d33b95aa6f53af6c35d69b76cb6a1d25ff429b638c357b431</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:3800" id="RHBA-2021:3800" title="Ipa Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2000261" id="2000261" title="2000261 &#8211; Extdom: Ldap_Invalid_Syntax Returned Instead Of Ldap_No_Such_Object" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:3804</id><title>Pki-Core Bug Fix And Enhancement Update</title><description>The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.
Bug Fix:
* ipa: ERROR: Request failed with status 500: Non-2xx response from CA REST
API: 500 (BZ#1958788)
</description><issued date="2021-10-13 06:45:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="pki-ca" release="17.el7_9" src="pki-core-10.5.18-17.el7_9.src.rpm" version="10.5.18"><filename>pki-ca-10.5.18-17.el7_9.noarch.rpm</filename><sum type="sha256">f13c8a17bd7ad06b0ff1a7f99c4d952ce8c3d27a8439ba4b821557a3246286d7</sum></package><package arch="noarch" name="pki-javadoc" release="17.el7_9" src="pki-core-10.5.18-17.el7_9.src.rpm" version="10.5.18"><filename>pki-javadoc-10.5.18-17.el7_9.noarch.rpm</filename><sum type="sha256">9fb683639d340b9802f01086cdb14ef026bbb4f243f14240b5b1dc4ca5fbf903</sum></package><package arch="x86_64" name="pki-tools" release="17.el7_9" src="pki-core-10.5.18-17.el7_9.src.rpm" version="10.5.18"><filename>pki-tools-10.5.18-17.el7_9.x86_64.rpm</filename><sum type="sha256">3761340e411df2efeb62821c5fb549f3d0ca5765d3a67dc7dbdcc874cfdc96fa</sum></package><package arch="noarch" name="pki-base-java" release="17.el7_9" src="pki-core-10.5.18-17.el7_9.src.rpm" version="10.5.18"><filename>pki-base-java-10.5.18-17.el7_9.noarch.rpm</filename><sum type="sha256">293585ab40dfbecb575e73bd5834c00225d9b0168c02aad8d9852451198debcc</sum></package><package arch="x86_64" name="pki-symkey" release="17.el7_9" src="pki-core-10.5.18-17.el7_9.src.rpm" version="10.5.18"><filename>pki-symkey-10.5.18-17.el7_9.x86_64.rpm</filename><sum type="sha256">cfad3f2a0cba4a572bfa4ed7cb7de3336c7e25dd6a44237a7c12e1e2c862445e</sum></package><package arch="noarch" name="pki-base" release="17.el7_9" src="pki-core-10.5.18-17.el7_9.src.rpm" version="10.5.18"><filename>pki-base-10.5.18-17.el7_9.noarch.rpm</filename><sum type="sha256">9a69fd8ca9191ce9765dca7e90ac0d7676e0457eb56f3bbf662f528aff23200a</sum></package><package arch="noarch" name="pki-server" release="17.el7_9" src="pki-core-10.5.18-17.el7_9.src.rpm" version="10.5.18"><filename>pki-server-10.5.18-17.el7_9.noarch.rpm</filename><sum type="sha256">3e0bc224483605ed81901ddbbaf0ab507896add15347603bdc55710f5c9714ed</sum></package><package arch="noarch" name="pki-kra" release="17.el7_9" src="pki-core-10.5.18-17.el7_9.src.rpm" version="10.5.18"><filename>pki-kra-10.5.18-17.el7_9.noarch.rpm</filename><sum type="sha256">a53dd9436b90bdfca04f79ee43c97898bcfe380022b4edfe07745b6933ecf1b4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:3804" id="RHBA-2021:3804" title="Pki-Core Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1958788" id="1958788" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:4003</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2021e, which addresses recent time zone changes. Notably:
* The Pacific/Fiji timezone has suspended daylight saving time (DST) for the 2021/2022 season. * The 'zic -r' command now marks unspecified timestamps with "-00". * Palestine will end daylight saving time (DST) on October 29, 2021 at 01:00, rather than the predicted October 30, 2021.
(BZ#2015242, BZ#2015246, BZ#2016369)
</description><issued date="2021-10-27 14:12:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2021e-1.el7.src.rpm" version="2021e"><filename>tzdata-java-2021e-1.el7.noarch.rpm</filename><sum type="sha256">9d885a3f4ea1b9ee78acda35303ce6d7ddc39c5414ff955017dabaa410d9b371</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2021e-1.el7.src.rpm" version="2021e"><filename>tzdata-2021e-1.el7.noarch.rpm</filename><sum type="sha256">502a8d632f40de778a2c065bd63517e81f6afd7354c9188b9872859877f35a34</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:4003" id="RHBA-2021:4003" title="Tzdata Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2015242" id="2015242" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2015246" id="2015246" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2016369" id="2016369" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:4780</id><title>Openscap Bug Fix And Enhancement Update</title><description>The OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities.
Bug Fix(es) and Enhancement(s):
* Report shows "pass" while command output shows "fail" items (BZ#1858502) * Memory leaks in probe_file (BZ#1861793) * oscap dies with segfault when using --stig-viewer option and latest XML
file from DoD (BZ#1911999)
* probe_file consumes all the RAM of the system (128GB) (BZ#1932833) * Ansible playbooks for profiles have duplicate variable definitions
(BZ#1944683)
</description><issued date="2021-11-30 11:11:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openscap-utils" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-utils-1.2.17-14.el7_9.x86_64.rpm</filename><sum type="sha256">3d799ea31e47c7922e5cfe2fbbf4686e570d0a127189ea8e806604ffb3a74298</sum></package><package arch="i686" name="openscap" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-1.2.17-14.el7_9.i686.rpm</filename><sum type="sha256">bc4661a363dab8a8c703267149be0e9218834cec03de3c7b9243f2de476c8afb</sum></package><package arch="i686" name="openscap-engine-sce" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-14.el7_9.i686.rpm</filename><sum type="sha256">1bc26a17f1599a69c7104b9a7f02b833edbb7a3d9efe3b62e439813a1f4b39c7</sum></package><package arch="x86_64" name="openscap" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-1.2.17-14.el7_9.x86_64.rpm</filename><sum type="sha256">bd74786e781b5514f67db81b5a657b47b2c804fb640fb1dc6481d3d1692c383e</sum></package><package arch="i686" name="openscap-devel" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-14.el7_9.i686.rpm</filename><sum type="sha256">1a127768c1bd492614f5bdbd5318f52cf7eafedfcdd910557915a00bcaf45a29</sum></package><package arch="i686" name="openscap-engine-sce-devel" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-14.el7_9.i686.rpm</filename><sum type="sha256">a17c9d9cc19b0a06f3d8ea7164f329b2c113e6a9ffd91a4386568ee3a6818e6f</sum></package><package arch="x86_64" name="openscap-scanner" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-scanner-1.2.17-14.el7_9.x86_64.rpm</filename><sum type="sha256">37f640cc29d3c6e8915c6041e8d9b4df67db84e701148845bc09bddb2f9bce79</sum></package><package arch="x86_64" name="openscap-devel" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-14.el7_9.x86_64.rpm</filename><sum type="sha256">7094e2f5a6e417455d4bc02eb74f68e4b91b5239492dfd64fb32162c0c5b4f8e</sum></package><package arch="x86_64" name="openscap-engine-sce" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-14.el7_9.x86_64.rpm</filename><sum type="sha256">3a0a404fa4b80b779631cfeab831338037a2a4f23652bf1cbd92d28b96fb6951</sum></package><package arch="x86_64" name="openscap-engine-sce-devel" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-14.el7_9.x86_64.rpm</filename><sum type="sha256">4ce5595b4468787dc8e5ab4b62438002307e760a34f8e8241ba2122a68a3166f</sum></package><package arch="x86_64" name="openscap-python" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-python-1.2.17-14.el7_9.x86_64.rpm</filename><sum type="sha256">f405937b54e1ebb9762fcc33aa9f922e79a92c243bf92fbf46955187a02eb93f</sum></package><package arch="x86_64" name="openscap-extra-probes" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-extra-probes-1.2.17-14.el7_9.x86_64.rpm</filename><sum type="sha256">90c44cabcea4e43996ec4a90e757d7a294f2b0b5fc5b4a1604ef1b3ad1fc0cba</sum></package><package arch="noarch" name="openscap-containers" release="14.el7_9" src="openscap-1.2.17-14.el7_9.src.rpm" version="1.2.17"><filename>openscap-containers-1.2.17-14.el7_9.noarch.rpm</filename><sum type="sha256">78fa0b4b21a1a3642d66229f016c2db3e7dd37fa25972a201d264a4689c8d479</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:4780" id="RHBA-2021:4780" title="Openscap Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1858502" id="1858502" title="1858502 &#8211; Report Shows 'Pass' While Command Output Shows 'Fail' Items" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1861793" id="1861793" title="1861793 &#8211; Memory Leaks In Probe_File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1911999" id="1911999" title="1911999 &#8211; Oscap Dies With Segfault When Using --Stig-Viewer Option And Latest Xml File From Dod" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1932833" id="1932833" title="1932833 &#8211; Probe_File Consumes All The Ram Of The System (128Gb)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1944683" id="1944683" title="1944683 &#8211; Ansible Playbooks For Profiles Have Duplicate Variable Definitions" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2021:4781</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* xccdf_org.ssgproject.content_rule_package_MFEhiplsm_installed does not
properly check for SELinux (BZ#1944297)
* Insights does not use latest benchmark for CIS compliance (BZ#1953787) * Ansible remediations of 3 dconf_gnome related rules don't work properly
(BZ#1976123)
* Update rhel7 DISA STIG profile to v3r5 (BZ#1996678)
</description><issued date="2021-11-29 18:48:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide" release="4.sl7_9" src="scap-security-guide-0.1.57-4.sl7_9.src.rpm" version="0.1.57"><filename>scap-security-guide-0.1.57-4.sl7_9.noarch.rpm</filename><sum type="sha256">34b51c5bc4b0fdcb126de54e516c912ae49536a750759fa5eb10b185df31f716</sum></package><package arch="noarch" name="scap-security-guide-rule-playbooks" release="4.sl7_9" src="scap-security-guide-0.1.57-4.sl7_9.src.rpm" version="0.1.57"><filename>scap-security-guide-rule-playbooks-0.1.57-4.sl7_9.noarch.rpm</filename><sum type="sha256">f9f68aa9f3fb47b03571e50bacf7d612945de926bf71212d965d2de3a973bb7e</sum></package><package arch="noarch" name="scap-security-guide-doc" release="4.sl7_9" src="scap-security-guide-0.1.57-4.sl7_9.src.rpm" version="0.1.57"><filename>scap-security-guide-doc-0.1.57-4.sl7_9.noarch.rpm</filename><sum type="sha256">b7c847545012d13dfdffe57a3189942a91879a02fae26daf176ef346382ee2f9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2021:4781" id="RHBA-2021:4781" title="Scap-Security-Guide Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1944297" id="1944297" title="1944297 &#8211; Xccdf_Org.Ssgproject.Content_Rule_Package_Mfehiplsm_Installed Does Not Properly Check For Selinux" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1953787" id="1953787" title="1953787 &#8211; Insights Does Not Use Latest Benchmark For Cis Compliance" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1976123" id="1976123" title="1976123 &#8211; Ansible Remediations Of 3 Dconf_Gnome Related Rules Don'T Work Properly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1996678" id="1996678" title="1996678 &#8211; Update Rhel7 Disa Stig Profile To V3R5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:0156</id><title>Openssl Bug Fix Update</title><description>OpenSSL is a toolkit that implements the Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols, as well as a full-strength general-purpose cryptography library.
Bug Fix(es):
* httpd fails to start with double free after updating to openssl-1.0.2k-23.el7_9 (BZ#2039993)
</description><issued date="2022-01-18 08:47:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl-perl" release="24.el7_9" src="openssl-1.0.2k-24.el7_9.src.rpm" version="1.0.2k"><filename>openssl-perl-1.0.2k-24.el7_9.x86_64.rpm</filename><sum type="sha256">d1aebf2a5bc3c316d2c83ac2356bda30edc90f0bcfea12880457f2253793ac2a</sum></package><package arch="i686" epoch="1" name="openssl-static" release="24.el7_9" src="openssl-1.0.2k-24.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-24.el7_9.i686.rpm</filename><sum type="sha256">802945ef14687804c65a5ab6575c29d1283ece79cda956a1404b811ae8edd1da</sum></package><package arch="x86_64" epoch="1" name="openssl-devel" release="24.el7_9" src="openssl-1.0.2k-24.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-24.el7_9.x86_64.rpm</filename><sum type="sha256">39dc3f28c58da872fb5cfe9b993755e4b9e8e2d524d5a7c1b9707b59833830a7</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="24.el7_9" src="openssl-1.0.2k-24.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-24.el7_9.i686.rpm</filename><sum type="sha256">74bacb9457163a747581bf48c74b83077f3522b3ac5b9d5bc6bdf70f29903ea7</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="24.el7_9" src="openssl-1.0.2k-24.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-24.el7_9.x86_64.rpm</filename><sum type="sha256">7c9b4e1adb114e8aa1863aadfe9def96e5c024e2a2b1384e35db36f8c9bfcd27</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="24.el7_9" src="openssl-1.0.2k-24.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-24.el7_9.i686.rpm</filename><sum type="sha256">46836801d59aeab63ec927592fc2441705d340b49b08e6f3d6c5727a457537a5</sum></package><package arch="x86_64" epoch="1" name="openssl" release="24.el7_9" src="openssl-1.0.2k-24.el7_9.src.rpm" version="1.0.2k"><filename>openssl-1.0.2k-24.el7_9.x86_64.rpm</filename><sum type="sha256">b2ab8b852aade7509bb4b1b3653143efdecc58c50fd9abeb3b0cb9893332fcde</sum></package><package arch="x86_64" epoch="1" name="openssl-libs" release="24.el7_9" src="openssl-1.0.2k-24.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-24.el7_9.x86_64.rpm</filename><sum type="sha256">1082492dc5c94ea8089e3109cadc6719b4dc557ce6588c4e890a2331a583c660</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:0156" id="RHBA-2022:0156" title="Openssl Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2039993" id="2039993" title="2039993 &#8211; Httpd Fails To Start With Double Free After Updating To Openssl-1.0.2K-23.El7_9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:0701</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* Update RHEL7 DISA STIG profile to V3R6 (BZ#2049532)
</description><issued date="2022-03-01 06:38:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide-rule-playbooks" release="6.sl7_9" src="scap-security-guide-0.1.57-6.sl7_9.src.rpm" version="0.1.57"><filename>scap-security-guide-rule-playbooks-0.1.57-6.sl7_9.noarch.rpm</filename><sum type="sha256">6cfae01e405036fc6c9bc1dad1f1b2af3cf0b0d0a3527f39a267908754069cf7</sum></package><package arch="noarch" name="scap-security-guide-doc" release="6.sl7_9" src="scap-security-guide-0.1.57-6.sl7_9.src.rpm" version="0.1.57"><filename>scap-security-guide-doc-0.1.57-6.sl7_9.noarch.rpm</filename><sum type="sha256">3ccacefd6ea02017cec03049ebeab09181953aed25356068f40ca92f92fb8531</sum></package><package arch="noarch" name="scap-security-guide" release="6.sl7_9" src="scap-security-guide-0.1.57-6.sl7_9.src.rpm" version="0.1.57"><filename>scap-security-guide-0.1.57-6.sl7_9.noarch.rpm</filename><sum type="sha256">4df0bc8bcdcc1bea9da053779deef090e5f179f6b302c0d6d54efdef352b3a69</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:0701" id="RHBA-2022:0701" title="Scap-Security-Guide Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2049532" id="2049532" title="2049532 &#8211; Update Rhel7 Disa Stig Profile To V3R6" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:1032</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022a, which addresses recent time zone changes. Notably:
* In Palestine the daylight saving time (DST) starts on March 27, 2022, not on March 26. * The zdump -v command now outputs better failure information. * This update provides fixes for a code that read corrupted TZif data.
</description><issued date="2022-03-24 18:33:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2022a-1.el7.src.rpm" version="2022a"><filename>tzdata-2022a-1.el7.noarch.rpm</filename><sum type="sha256">2bd81e7c3b4b394094d0ff8d122a291ca35556608f8141093ea7aaac2b16c70e</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2022a-1.el7.src.rpm" version="2022a"><filename>tzdata-java-2022a-1.el7.noarch.rpm</filename><sum type="sha256">151cfed56b482c8d1befbb66f69fe3839eee9334e1c283fbb3f6d3da36531141</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:1032" id="RHBA-2022:1032" title="Tzdata Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:4647</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* McAfee packages not detected properly by the RHEL7 rules (BZ#2066321) * Update RHEL7 DISA STIG profile to V3R7 (BZ#2079217)
</description><issued date="2022-05-19 17:36:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide-doc" release="8.sl7_9" src="scap-security-guide-0.1.57-8.sl7_9.src.rpm" version="0.1.57"><filename>scap-security-guide-doc-0.1.57-8.sl7_9.noarch.rpm</filename><sum type="sha256">408202f740301c34e37133d0bba9c8c79e27ea0366a76dfedd262f2bc63d5ceb</sum></package><package arch="noarch" name="scap-security-guide" release="8.sl7_9" src="scap-security-guide-0.1.57-8.sl7_9.src.rpm" version="0.1.57"><filename>scap-security-guide-0.1.57-8.sl7_9.noarch.rpm</filename><sum type="sha256">208aebc50b47c17f0d0a4753624c24b0fd4ed743c6fac58bcd0d48ce3ab528fd</sum></package><package arch="noarch" name="scap-security-guide-rule-playbooks" release="8.sl7_9" src="scap-security-guide-0.1.57-8.sl7_9.src.rpm" version="0.1.57"><filename>scap-security-guide-rule-playbooks-0.1.57-8.sl7_9.noarch.rpm</filename><sum type="sha256">a7d8dfb326f66727f85327ebe37848008a74d7f20797a6ece46466ad90686083</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:4647" id="RHBA-2022:4647" title="Scap-Security-Guide Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2066321" id="2066321" title="2066321 &#8211; Mcafee Packages Not Detected Properly By The Rhel7 Rules [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2079217" id="2079217" title="2079217 &#8211; Update Rhel7 Disa Stig Profile To V3R7 [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:6138</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022c, which addresses recent time zone changes. Notably:
* In Chile (the America/Santiago time zone), the daylight saving time (DST) starts on September 11, 2022 instead of September 4.
</description><issued date="2022-08-23 08:32:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2022c-1.el7.src.rpm" version="2022c"><filename>tzdata-2022c-1.el7.noarch.rpm</filename><sum type="sha256">2526692b84bdac51c09de6cee75a9740d154f258e3f1ad4e7c7539b537c5a510</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2022c-1.el7.src.rpm" version="2022c"><filename>tzdata-java-2022c-1.el7.noarch.rpm</filename><sum type="sha256">db8d6f0b1278aa4cdec8aa873f85d6fc25e37b02c372b78b01922680ef29c6f9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:6138" id="RHBA-2022:6138" title="Tzdata Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:6576</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* Align RHEL 7 STIG profile with DISA STIG Benchmark (BZ#1967950) * content_rule_audit_basic_configuration enforces using default buffer size (8192) for audit, which isn't always suitable on busy systems (BZ#1993822) * Rule file_permissions_sshd_private_key fails after kickstart installation (BZ#2021258) * Update source of CVE data in data stream (BZ#2028432) * Remove PCI-DSS-centric XCCDF Benchmark from scap-security-guide (BZ#2038165) * Update RHEL7 DISA STIG profile to V3R8 (BZ#2112939) * Rebase scap-security-guide in Red Hat Enterprise Linux 7.9 to latest upstream version (BZ#2116359)
</description><issued date="2022-09-20 10:15:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide-rule-playbooks" release="1.sl7_9" src="scap-security-guide-0.1.63-1.sl7_9.src.rpm" version="0.1.63"><filename>scap-security-guide-rule-playbooks-0.1.63-1.sl7_9.noarch.rpm</filename><sum type="sha256">f52637667eb5a2187f932a8a5a05586283f500d28d628501fcd653d4d25edec8</sum></package><package arch="noarch" name="scap-security-guide-doc" release="1.sl7_9" src="scap-security-guide-0.1.63-1.sl7_9.src.rpm" version="0.1.63"><filename>scap-security-guide-doc-0.1.63-1.sl7_9.noarch.rpm</filename><sum type="sha256">94a85061d97a42f352b1f371ac22a05bec5536c421266a08e6361b5360d91890</sum></package><package arch="noarch" name="scap-security-guide" release="1.sl7_9" src="scap-security-guide-0.1.63-1.sl7_9.src.rpm" version="0.1.63"><filename>scap-security-guide-0.1.63-1.sl7_9.noarch.rpm</filename><sum type="sha256">dac6ee364834b698e57df24a4eccb73de0db2fe69172681f54532edaf4bfa706</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:6576" id="RHBA-2022:6576" title="Scap-Security-Guide Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1967950" id="1967950" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1993822" id="1993822" title="1993822 &#8211; Content_Rule_Audit_Basic_Configuration Enforces Using Default Buffer Size (8192) For Audit, Which Isn'T Always Suitable On Busy Systems [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2021258" id="2021258" title="2021258 &#8211; Rule File_Permissions_Sshd_Private_Key Fails After Kickstart Installation [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2028432" id="2028432" title="2028432 &#8211; Update Source Of Cve Data In Data Stream [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2038165" id="2038165" title="2038165 &#8211; Remove Pci-Dss-Centric Xccdf Benchmark From Scap-Security-Guide [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2112939" id="2112939" title="2112939 &#8211; Update Rhel7 Disa Stig Profile To V3R8 [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2116359" id="2116359" title="2116359 &#8211; Rebase Scap-Security-Guide In Red Hat Enterprise Linux 7.9 To Latest Upstream Version [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:6712</id><title>Nss, Nss-Softokn, Nss-Util, And Nspr Bug Fix And Enhancement Update</title><description>Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
The nss-softokn package provides the Network Security Services Softoken Cryptographic Module.
The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries.
Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities.
Bug Fix(es) and Enhancement(s):
* Import of PKCS#12 files with Camellia encryption is not supported (BZ#1462297)  * Rebase nss to 3.79 for Firefox 103 ESR (BZ#2064364) * NSS sometimes causes hang for customer application (BZ#2066679) * Rebase nss-util to 3.79 for Firefox 103 ESR (BZ#2093506) * Rebase nss-softokn to 3.79 for Firefox 103 ESR (BZ#2093507) * Rebase nspr to 3.79 for Firefox 103 ESR (BZ#2093508) * update-ca-trust fails with /usr/bin/p11-kit extract calls getting aborted (BZ#2096268) * certmonger startup very slow using default NSS sqlite database backend (BZ#2097811) * selfserv binds on ipv6 only instead of both ipv6 and ipv4 (nss) (BZ#2097842) * selfserv binds on ipv6 only instead of both ipv6 and ipv4 (nspr) (BZ#2097904) * curl segfaults (BZ#2103706)
</description><issued date="2022-09-30 08:37:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-sysinit" release="4.el7_9" src="nss-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-sysinit-3.79.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">717eea39d2aa9e9184975eeed842014f45b14c444f53f59de786621ab7ed2734</sum></package><package arch="i686" name="nss-softokn-devel" release="4.el7_9" src="nss-softokn-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-softokn-devel-3.79.0-4.el7_9.i686.rpm</filename><sum type="sha256">5476523c29380f539332b29dc5309a868c2ff52a91096115d6028f6137883294</sum></package><package arch="i686" name="nspr" release="3.1.el7_9" src="nspr-4.34.0-3.1.el7_9.src.rpm" version="4.34.0"><filename>nspr-4.34.0-3.1.el7_9.i686.rpm</filename><sum type="sha256">7dbdc6ee9f0f8f77fb4b7bcd7ac52016207b3edab103060b5d61050a9c3570d2</sum></package><package arch="i686" name="nss-softokn-freebl" release="4.el7_9" src="nss-softokn-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-softokn-freebl-3.79.0-4.el7_9.i686.rpm</filename><sum type="sha256">a353095c518f10d49c7e80ea897ad387b21e25854313d534075b7b5f2f6465d2</sum></package><package arch="x86_64" name="nss" release="4.el7_9" src="nss-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-3.79.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">13b925723c08f99571a2097f97ee70a74fda215aee270a4c8e620242d73ee852</sum></package><package arch="i686" name="nss-util" release="1.el7_9" src="nss-util-3.79.0-1.el7_9.src.rpm" version="3.79.0"><filename>nss-util-3.79.0-1.el7_9.i686.rpm</filename><sum type="sha256">8d197cc06e73cbe55bfd20060eacc65685601555f77dc85568f5bb490e83fe3a</sum></package><package arch="x86_64" name="nss-softokn-devel" release="4.el7_9" src="nss-softokn-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-softokn-devel-3.79.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">2ca839847c5550bc4f5ddf11e3535fa8e46b0943ac3a65f9b89ca157da090d26</sum></package><package arch="x86_64" name="nss-softokn" release="4.el7_9" src="nss-softokn-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-softokn-3.79.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">167f0a4aeb1c09264bb4ef61f7a6c59de588e06a08195ab7b3e67e52aa2cd101</sum></package><package arch="i686" name="nspr-devel" release="3.1.el7_9" src="nspr-4.34.0-3.1.el7_9.src.rpm" version="4.34.0"><filename>nspr-devel-4.34.0-3.1.el7_9.i686.rpm</filename><sum type="sha256">5402ff5f1241395f94fb3e604641b0b68ca43d1d61a08cf7f806e075df949132</sum></package><package arch="x86_64" name="nspr-devel" release="3.1.el7_9" src="nspr-4.34.0-3.1.el7_9.src.rpm" version="4.34.0"><filename>nspr-devel-4.34.0-3.1.el7_9.x86_64.rpm</filename><sum type="sha256">55e256f8ae60657b3a61612b1991bb4981554b794c75335970a7cb2595f4b6c1</sum></package><package arch="x86_64" name="nss-util" release="1.el7_9" src="nss-util-3.79.0-1.el7_9.src.rpm" version="3.79.0"><filename>nss-util-3.79.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">3142083148f43ab008bce4419a7289209620b024ee7091fa8a9d73a379f56451</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el7_9" src="nss-util-3.79.0-1.el7_9.src.rpm" version="3.79.0"><filename>nss-util-devel-3.79.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">6dcaeaf3e23cd6e103685d1ec84ff38d94c89e7d600bd14b87211b7390f2e222</sum></package><package arch="x86_64" name="nss-tools" release="4.el7_9" src="nss-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-tools-3.79.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">1713aec9855779538668e46177c7e738d0a0892ac2078dd0c538cf154cbb3b3d</sum></package><package arch="x86_64" name="nss-devel" release="4.el7_9" src="nss-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-devel-3.79.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">63584668c447eb2c6b01095d7f6aba35b6a09dac00efaee4964d5c9f0fcfe0ed</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="4.el7_9" src="nss-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-pkcs11-devel-3.79.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">9b0f709efaf08e35bb9eac6973c3d433a4b011a42b860954588e1599105d1d41</sum></package><package arch="i686" name="nss-devel" release="4.el7_9" src="nss-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-devel-3.79.0-4.el7_9.i686.rpm</filename><sum type="sha256">590e47b59ca6cd7241939955196bf27599dde733c01a0fc20a52c5b4861206f1</sum></package><package arch="i686" name="nss-softokn" release="4.el7_9" src="nss-softokn-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-softokn-3.79.0-4.el7_9.i686.rpm</filename><sum type="sha256">72187c2f765bb749d6088a6446d14bbd7ba12da8774af35b2deb35d35b2abae8</sum></package><package arch="i686" name="nss-pkcs11-devel" release="4.el7_9" src="nss-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-pkcs11-devel-3.79.0-4.el7_9.i686.rpm</filename><sum type="sha256">1c83452ff7cc28a33974a11b8e12dea9218f1fd01f632307b37241a6ddf60e12</sum></package><package arch="i686" name="nss-util-devel" release="1.el7_9" src="nss-util-3.79.0-1.el7_9.src.rpm" version="3.79.0"><filename>nss-util-devel-3.79.0-1.el7_9.i686.rpm</filename><sum type="sha256">fff77c933cf38500888db2bf93fc4340097877874490438b3418897cc0937cb5</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="4.el7_9" src="nss-softokn-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-softokn-freebl-devel-3.79.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">db7bbda5be560f602b5594716e7b92829d1f1c41bd9b428eb44f00a44559b9ec</sum></package><package arch="x86_64" name="nspr" release="3.1.el7_9" src="nspr-4.34.0-3.1.el7_9.src.rpm" version="4.34.0"><filename>nspr-4.34.0-3.1.el7_9.x86_64.rpm</filename><sum type="sha256">48b4e6653da1eb4229713d7c9241bc50f81a9d67f2a7e2e14e94d24251b331e0</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="4.el7_9" src="nss-softokn-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-softokn-freebl-3.79.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">c911e5c946a25f1b2a978735330881ecfafd5b1f7f805b1584c866aaa076046b</sum></package><package arch="i686" name="nss" release="4.el7_9" src="nss-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-3.79.0-4.el7_9.i686.rpm</filename><sum type="sha256">ee4b3aed756beb4b69e7cf12635c63492af12edb727fc74b29f0f2ef39291190</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="4.el7_9" src="nss-softokn-3.79.0-4.el7_9.src.rpm" version="3.79.0"><filename>nss-softokn-freebl-devel-3.79.0-4.el7_9.i686.rpm</filename><sum type="sha256">561cba4e0ccb895de95856af3ce838de7cfabafcf6db99c36e4d74f2b4243173</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:6712" id="RHBA-2022:6712" title="Nss, Nss-Softokn, Nss-Util, And Nspr Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1462297" id="1462297" title="1462297 &#8211; Import Of Pkcs#12 Files With Camellia Encryption Is Not Supported" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2064364" id="2064364" title="2064364 &#8211; Rebase Nss To 3.79 For Firefox 103 Esr [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2066679" id="2066679" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2093506" id="2093506" title="2093506 &#8211; Rebase Nss-Util To 3.79 For Firefox 103 Esr [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2093507" id="2093507" title="2093507 &#8211; Rebase Nss-Softokn To 3.79 For Firefox 103 Esr [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2093508" id="2093508" title="2093508 &#8211; Rebase Nspr To 3.79 For Firefox 103 Esr [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2096268" id="2096268" title="2096268 &#8211; Update-Ca-Trust Fails With /Usr/Bin/P11-Kit Extract Calls Getting Aborted [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2097811" id="2097811" title="2097811 &#8211; Certmonger Startup Very Slow Using Default Nss Sqlite Database Backend [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2097842" id="2097842" title="2097842 &#8211; Selfserv Binds On Ipv6 Only Instead Of Both Ipv6 And Ipv4 (Nss) [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2097904" id="2097904" title="2097904 &#8211; Selfserv Binds On Ipv6 Only Instead Of Both Ipv6 And Ipv4 (Nspr) [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2103706" id="2103706" title="2103706 &#8211; Curl Segfaults [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:6827</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022d, which addresses recent time zone changes. Notably:
* Palestine will transition to daylight saving time (DST) on October 29, 2022 instead of October 28, 2022. * Europe/Uzhgorod and Europe/Zaporozhye are moved to the 'backzone' file.
</description><issued date="2022-10-06 12:06:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2022d-1.el7.src.rpm" version="2022d"><filename>tzdata-2022d-1.el7.noarch.rpm</filename><sum type="sha256">e29657e0ab4a9adfc968a48499f95dabe2c9b1b55b91307237bd9ef79589f1d5</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2022d-1.el7.src.rpm" version="2022d"><filename>tzdata-java-2022d-1.el7.noarch.rpm</filename><sum type="sha256">aa8c2791f3c77330bdde1873e5dc9aa039495379b9e49c9bd539636e1453cc3d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:6827" id="RHBA-2022:6827" title="Tzdata Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:7067</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022e, which addresses recent time zone changes. Notably:
* Jordan and Syria cancelled the daylight saving time (DST) transition planned for October 28 2022 and will remain at time offset of +03:00 from the coordinated universal time (UTC) permanently.
</description><issued date="2022-10-21 09:05:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2022e-1.el7.src.rpm" version="2022e"><filename>tzdata-2022e-1.el7.noarch.rpm</filename><sum type="sha256">bb921010ac58172a3a2ded25bde14eeb0b515ba6faef765dea2efb1e10e7256d</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2022e-1.el7.src.rpm" version="2022e"><filename>tzdata-java-2022e-1.el7.noarch.rpm</filename><sum type="sha256">f964a856c27ee43d19659d570924fc1cfe1104b018c8e052165488217e60b08d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:7067" id="RHBA-2022:7067" title="Tzdata Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:7404</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022f, which addresses recent time zone changes. Notably:
* Mexico will stop observing daylight saving time (DST) except near the border with the United Stated of America. * Chihuahua moved to the time offset of -06:00 from the coordinated universal time (UTC) permanently starting on October 30 2022. * Fiji no longer observes daylight saving time (DST).
</description><issued date="2022-11-03 08:02:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2022f-1.el7.src.rpm" version="2022f"><filename>tzdata-java-2022f-1.el7.noarch.rpm</filename><sum type="sha256">419a66f43a09d2d55dad85fe19134693e98ea63126303accf356fbe0d2cb977e</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2022f-1.el7.src.rpm" version="2022f"><filename>tzdata-2022f-1.el7.noarch.rpm</filename><sum type="sha256">2f62960f7056adb2aa0c6f6aa3da568a6588baae81dc6de89e438d64258c0078</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:7404" id="RHBA-2022:7404" title="Tzdata Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2022:8785</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2022g, which addresses recent time zone changes. Notably:
* On November 30, 2022, the northern edge of the Mexican state of Chihuahua has changed time zone to agree with the nearby US locations. * A new Zone America/Ciudad_Juarez that splits from America/Ojinaga has been added.
</description><issued date="2022-12-06 08:16:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2022g-1.el7.src.rpm" version="2022g"><filename>tzdata-java-2022g-1.el7.noarch.rpm</filename><sum type="sha256">68f3b82080120841f4ad82d719ee4570f9fa63177d69fde1ba0aa173448abcf2</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2022g-1.el7.src.rpm" version="2022g"><filename>tzdata-2022g-1.el7.noarch.rpm</filename><sum type="sha256">bb123b23987cd20416556db907bd9564418cfa6e78e9ed20f3a719a4eadc32a7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2022:8785" id="RHBA-2022:8785" title="Tzdata Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:1094</id><title>Openscap Bug Fix And Enhancement Update</title><description>The OpenSCAP suite enables integration of the Security Content Automation Protocol (SCAP) line of standards. The openscap packages provide the OpenSCAP library and the oscap utility that provides various SCAP capabilities.
Bug Fix(es) and Enhancement(s):
* Potential invalid scan results in OpenSCAP. (BZ#2111041)
</description><issued date="2023-03-07 10:48:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="openscap-engine-sce-devel" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-15.el7_9.i686.rpm</filename><sum type="sha256">da53f46a4c67f90b223ab07a1f586c1eba98630e728315fc0f32a28834c7c960</sum></package><package arch="x86_64" name="openscap-engine-sce" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-15.el7_9.x86_64.rpm</filename><sum type="sha256">9eaffc2d4b0b1066f9fd6c24e4d8e060ead83958d736cc3079b4ed8ede000bbd</sum></package><package arch="x86_64" name="openscap-devel" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-15.el7_9.x86_64.rpm</filename><sum type="sha256">b51ca8653da9180796ccb42b29054f561c6e56bc9c4d0b56d9a4d7d36006399b</sum></package><package arch="x86_64" name="openscap-scanner" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-scanner-1.2.17-15.el7_9.x86_64.rpm</filename><sum type="sha256">f0261e7d1cfa92d6fe9e9abd07b22a07067312cdf0390f6a4b4240ed6e6e9545</sum></package><package arch="noarch" name="openscap-containers" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-containers-1.2.17-15.el7_9.noarch.rpm</filename><sum type="sha256">501eb0d76ddd27ce2d3915947213e39cea80ebe499dc423ab3b590fcd88606b2</sum></package><package arch="x86_64" name="openscap-engine-sce-devel" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-devel-1.2.17-15.el7_9.x86_64.rpm</filename><sum type="sha256">2d1d4ce394f8c1b0afc66d49d335f168cab5bbd3f96425edf8698f5e2aa0de9b</sum></package><package arch="x86_64" name="openscap-python" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-python-1.2.17-15.el7_9.x86_64.rpm</filename><sum type="sha256">a7d7997bc2aa8a38b5eb3b000c0b4fa96150a9658f55c84651cd6127f2bcc37f</sum></package><package arch="x86_64" name="openscap-extra-probes" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-extra-probes-1.2.17-15.el7_9.x86_64.rpm</filename><sum type="sha256">204a8cba807ba67c41efda5b48f0a2d2e7e0ff5a15688e3cbd3ad2e687735fa7</sum></package><package arch="x86_64" name="openscap-utils" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-utils-1.2.17-15.el7_9.x86_64.rpm</filename><sum type="sha256">dc2c0db93642b89ee53df753654d9314ae61eaeaf111f35c2d43780482928c45</sum></package><package arch="x86_64" name="openscap" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-1.2.17-15.el7_9.x86_64.rpm</filename><sum type="sha256">c7927ed6542837c5713897ed63c49d7bbdc10e4b4713ae7a018d41c1f55d847f</sum></package><package arch="i686" name="openscap-engine-sce" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-engine-sce-1.2.17-15.el7_9.i686.rpm</filename><sum type="sha256">799ee42a178599fb8fabccbcb8d18289129dcd4654b8de0445f1d033046f9931</sum></package><package arch="i686" name="openscap" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-1.2.17-15.el7_9.i686.rpm</filename><sum type="sha256">cfc2f5c78d541ba22f88885b732a1b652d64d330709a388aa72647fb622cb13b</sum></package><package arch="i686" name="openscap-devel" release="15.el7_9" src="openscap-1.2.17-15.el7_9.src.rpm" version="1.2.17"><filename>openscap-devel-1.2.17-15.el7_9.i686.rpm</filename><sum type="sha256">2af9e67de95817b3a9afba1fde15e4e09e71ba5d8356417d8753ec55bd66b846</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:1094" id="RHBA-2023:1094" title="Openscap Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2111041" id="2111041" title="2111041 &#8211; Potential Invalid Scan Results In Openscap [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:1099</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es) and Enhancement(s):
* file_permissions_sshd_private_key is not aligned with DISA STIG benchmark (BZ#2123284) * audit_rules_usergroup_modification_shadow don't remediate existing audit rule (BZ#2123367) * Update RHEL7 DISA STIG profile to V3R10 (BZ#2152657) * Rebase SSG to latest upstream version in RHEL 7.9 (BZ#2158410) * [SCAP] PCI-DSS Rsyslog log files related rules fails for Rsyslog 8 RainerScript syntax (BZ#2170038)
</description><issued date="2023-03-07 10:48:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide-rule-playbooks" release="1.sl7_9" src="scap-security-guide-0.1.66-1.sl7_9.src.rpm" version="0.1.66"><filename>scap-security-guide-rule-playbooks-0.1.66-1.sl7_9.noarch.rpm</filename><sum type="sha256">8c896e9b2af0229b23afe8b3b521d6edecf8f758349df435ed63be14bb9a19c5</sum></package><package arch="noarch" name="scap-security-guide" release="1.sl7_9" src="scap-security-guide-0.1.66-1.sl7_9.src.rpm" version="0.1.66"><filename>scap-security-guide-0.1.66-1.sl7_9.noarch.rpm</filename><sum type="sha256">51c20f7783a416005f490dd4757723c285cbc4574923a141e6549a56996d089c</sum></package><package arch="noarch" name="scap-security-guide-doc" release="1.sl7_9" src="scap-security-guide-0.1.66-1.sl7_9.src.rpm" version="0.1.66"><filename>scap-security-guide-doc-0.1.66-1.sl7_9.noarch.rpm</filename><sum type="sha256">c77812f9eba2fa7464fd7744d0cd653deb1014d23ec906498f320863a2c2121b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:1099" id="RHBA-2023:1099" title="Scap-Security-Guide Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2123284" id="2123284" title="2123284 &#8211; File_Permissions_Sshd_Private_Key Is Not Aligned With Disa Stig Benchmark [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2123367" id="2123367" title="2123367 &#8211; Audit_Rules_Usergroup_Modification_Shadow Don'T Remediate Existing Audit Rule [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2152657" id="2152657" title="2152657 &#8211; Update Rhel7 Disa Stig Profile To V3R10 [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2158410" id="2158410" title="2158410 &#8211; Rebase Ssg To Latest Upstream Version In Rhel 7.9 [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2170038" id="2170038" title="2170038 &#8211; [Scap] Pci-Dss Rsyslog Log Files Related Rules Fails For Rsyslog 8 Rainerscript Syntax [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:1491</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2023b, which addresses recent time zone changes. Notably:
* Egypt will reintroduce daylight saving time (DST) from April through October. * Morocco will observe DST from April 23, 2023 instead of April 30. * This year, Palestine is delaying the start of DST. * This year, Lebanon is delaying the start of DST until April 20.
</description><issued date="2023-04-04 08:38:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2023b-1.el7.src.rpm" version="2023b"><filename>tzdata-2023b-1.el7.noarch.rpm</filename><sum type="sha256">a6eecba20da600ff330d091e2cf2a518e167cb6a256bb05c7c460e3e52e0b380</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2023b-1.el7.src.rpm" version="2023b"><filename>tzdata-java-2023b-1.el7.noarch.rpm</filename><sum type="sha256">a3326ac04c1bf1f60a6717458e915ce1d654bc263f8c2f8d0828b38f77898fee</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:1491" id="RHBA-2023:1491" title="Tzdata Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:1534</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2023c, which addresses recent time zone changes. Notably:
* The changes added for Lebanon in tzdata-2023b have been reversed. This update reinstates the DST change for Lebanon effective March 25.
</description><issued date="2023-04-04 08:38:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2023c-1.el7.src.rpm" version="2023c"><filename>tzdata-java-2023c-1.el7.noarch.rpm</filename><sum type="sha256">d7986e88f5938d15b2cdb0725f9baa8d5d795f83fde52f1732b3412f4448ed15</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2023c-1.el7.src.rpm" version="2023c"><filename>tzdata-2023c-1.el7.noarch.rpm</filename><sum type="sha256">db1001e6ec93cfa2f1804ca3e89c41cfa944eb81bdff04df3383ca1d3ba15529</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:1534" id="RHBA-2023:1534" title="Tzdata Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:1991</id><title>Shim Bug Fix And Enhancement Update</title><description>The shim package contains a first stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.
Bug Fix(es) and Enhancement(s):
* Shim refuses to boot the system when TPM event logging fails. (BZ#2002648) * Shim loops indefinitely processing certificates when space in mok is smaller than certificate size. (BZ#2007084)
</description><issued date="2023-07-18 09:51:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="mokutil" release="3.sl7" src="shim-signed-15.6-3.sl7.src.rpm" version="15.6"><filename>mokutil-15.6-3.sl7.x86_64.rpm</filename><sum type="sha256">d8932c49f75ea8f4f398e9eeaa80eef43d3f8e48cb174d8da9ef754a43db7cff</sum></package><package arch="x86_64" name="shim-unsigned-x64" release="3.el7" src="shim-15.6-3.el7.src.rpm" version="15.6"><filename>shim-unsigned-x64-15.6-3.el7.x86_64.rpm</filename><sum type="sha256">d4e013392e4e29f8a7d58bb378abd82acb48084535a350ca8a90e591371a6403</sum></package><package arch="x86_64" name="shim-unsigned-ia32" release="3.el7" src="shim-15.6-3.el7.src.rpm" version="15.6"><filename>shim-unsigned-ia32-15.6-3.el7.x86_64.rpm</filename><sum type="sha256">28cad241c3839168fa5f00d1f4c70a73860eb8bb2c0e4640b3ae258c33622d5f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:1991" id="RHBA-2023:1991" title="Shim Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2002648" id="2002648" title="2002648 &#8211; Shim Refuses To Boot The System When Tpm Event Logging Fails [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2007084" id="2007084" title="2007084 &#8211; Shim Loops Indefinitely Processing Certificates When Space In Mok Is Smaller Than Certificate Size" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:4598</id><title>Firefox Bug Fix Update</title><description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Bug Fix:
* Updating Firefox to 102.14.0 prevents all pages from loading. (BZ#2230023)
</description><issued date="2023-08-10 09:17:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="3.el7_9" src="firefox-102.14.0-3.el7_9.src.rpm" version="102.14.0"><filename>firefox-102.14.0-3.el7_9.i686.rpm</filename><sum type="sha256">8a33ccae5f36446832cdebfee806a98620b32eb271ffa4913d5dbf57cd9cd8c0</sum></package><package arch="x86_64" name="firefox" release="3.el7_9" src="firefox-102.14.0-3.el7_9.src.rpm" version="102.14.0"><filename>firefox-102.14.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">ca47117b220a0bbd5c8083dada38c466ccff34032000a9c2cdd83be018c5bccc</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:4598" id="RHBA-2023:4598" title="Firefox Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2230023" id="2230023" title="2230023 &#8211; Updating Firefox To 102.14.0 Prevents All Pages Loading [7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:4599</id><title>Thunderbird Bug Fix Update</title><description>Mozilla Thunderbird is a standalone mail and newsgroup client.
Bug Fix:
* TLS broken for POP3 and SMTP connections. (BZ#2229981)
</description><issued date="2023-08-10 09:17:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="3.el7_9" src="thunderbird-102.14.0-3.el7_9.src.rpm" version="102.14.0"><filename>thunderbird-102.14.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">950ffadc0560f6aee5fc3c3f0202ebd7023c4bc086bbbfb7af5e05fa99f89d59</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:4599" id="RHBA-2023:4599" title="Thunderbird Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2229981" id="2229981" title="2229981 &#8211; Tls Broken For Pop3 And Smtp Connections [7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:4824</id><title>Scap-Security-Guide Bug Fix Update</title><description>The scap-security-guide project provides a guide for configuration of the system from the final system's security point of view. The guidance is specified in the Security Content Automation Protocol (SCAP) format and constitutes a catalog of practical hardening advice, linked to government requirements where applicable. The project bridges the gap between generalized policy requirements and specific implementation guidelines.
Bug Fix(es):
* Update ANSSI BP-028 in RHEL7 to v2.0 (BZ#2155793) * openscap shows IPv6 as enabled even if it is disabled (BZ#2210276) * Rebase scap-security-guide in Red Hat Enterprise Linux 7.9 to latest upstream
version (BZ#2221694)
* Remote resource referenced  from datastream is missing
https://access.redhat.com/security/data/oval/com.redhat.rhsa-RHEL7.xml.bz2 (BZ#2223817)
</description><issued date="2023-08-30 14:40:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide" release="1.sl7_9" src="scap-security-guide-0.1.69-1.sl7_9.src.rpm" version="0.1.69"><filename>scap-security-guide-0.1.69-1.sl7_9.noarch.rpm</filename><sum type="sha256">f127d4b826901e47d24dc9a99c48f66343f06f7d8a2090a14bd23c4fac296b0b</sum></package><package arch="noarch" name="scap-security-guide-rule-playbooks" release="1.sl7_9" src="scap-security-guide-0.1.69-1.sl7_9.src.rpm" version="0.1.69"><filename>scap-security-guide-rule-playbooks-0.1.69-1.sl7_9.noarch.rpm</filename><sum type="sha256">6b6f66cddc9c2482a484b76671b21ae1e39d264deca43657ab958a269f01eaad</sum></package><package arch="noarch" name="scap-security-guide-doc" release="1.sl7_9" src="scap-security-guide-0.1.69-1.sl7_9.src.rpm" version="0.1.69"><filename>scap-security-guide-doc-0.1.69-1.sl7_9.noarch.rpm</filename><sum type="sha256">74e0ee0a5e07d64aa98a46657247ec14c067dc34caa2ea2cbc40b6d52f3d2518</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:4824" id="RHBA-2023:4824" title="Scap-Security-Guide Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2155793" id="2155793" title="2155793 &#8211; Update Anssi Bp-028 In Rhel7 To V2.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2210276" id="2210276" title="2210276 &#8211; Openscap Shows Ipv6 As Enabled Even If It Is Disabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2221694" id="2221694" title="2221694 &#8211; Rebase Scap-Security-Guide In Red Hat Enterprise Linux 7.9 To Latest Upstream Version" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2223817" id="2223817" title="2223817 &#8211; Remote Resource Referenced  From Datastream Is Missing Https://Access.Redhat.Com/Security/Data/Oval/Com.Redhat.Rhsa-Rhel7.Xml.Bz2" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:5478</id><title>Nss And Nspr Bug Fix And Enhancement Update</title><description>Network Security Services (NSS) is a set of libraries designed to support the cross-platform development of security-enabled client and server applications.
Netscape Portable Runtime (NSPR) provides platform independence for non-GUI operating system facilities.
The following packages have been upgraded to a later upstream version: nss (3.90), nss-softokn (3.90), nss-util (3.90), nspr (4.35). (BZ#2211859)
</description><issued date="2023-10-10 06:21:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-pkcs11-devel" release="2.el7_9" src="nss-3.90.0-2.el7_9.src.rpm" version="3.90.0"><filename>nss-pkcs11-devel-3.90.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">833cd6c91d1a08aa3ebe685b7aea647ce01d5a1ffb483ec74587013cdcd51ad8</sum></package><package arch="x86_64" name="nss-softokn-devel" release="6.el7_9" src="nss-softokn-3.90.0-6.el7_9.src.rpm" version="3.90.0"><filename>nss-softokn-devel-3.90.0-6.el7_9.x86_64.rpm</filename><sum type="sha256">e6a5c1b405b29c400e4f2d2f24853391ecb784004266e870c50e85090e570412</sum></package><package arch="i686" name="nss-pkcs11-devel" release="2.el7_9" src="nss-3.90.0-2.el7_9.src.rpm" version="3.90.0"><filename>nss-pkcs11-devel-3.90.0-2.el7_9.i686.rpm</filename><sum type="sha256">6fd9b7e03da8401e9b539f86845c53c9206853efc5b8aa081fbf7d4e9a1e57fa</sum></package><package arch="i686" name="nss-softokn-devel" release="6.el7_9" src="nss-softokn-3.90.0-6.el7_9.src.rpm" version="3.90.0"><filename>nss-softokn-devel-3.90.0-6.el7_9.i686.rpm</filename><sum type="sha256">b00a9b8bf9847ca51a49f00b861d392d6f0f3d6b9230072a10a760e7014897e1</sum></package><package arch="x86_64" name="nspr-devel" release="1.el7_9" src="nspr-4.35.0-1.el7_9.src.rpm" version="4.35.0"><filename>nspr-devel-4.35.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">3ec2bf3d3161853724c484fea24801c07e9d5e62428b300c5fdeafb7a4d75ce3</sum></package><package arch="i686" name="nss-devel" release="2.el7_9" src="nss-3.90.0-2.el7_9.src.rpm" version="3.90.0"><filename>nss-devel-3.90.0-2.el7_9.i686.rpm</filename><sum type="sha256">e0a5d74373fb9ca4da0adf92664deae1f36e575acc5b7a3789b24aed50b95548</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="6.el7_9" src="nss-softokn-3.90.0-6.el7_9.src.rpm" version="3.90.0"><filename>nss-softokn-freebl-3.90.0-6.el7_9.x86_64.rpm</filename><sum type="sha256">a9b91349cf9aff0bd4bcd70493ddbf1e17e67977c72865b1d0c6f79898778c38</sum></package><package arch="x86_64" name="nspr" release="1.el7_9" src="nspr-4.35.0-1.el7_9.src.rpm" version="4.35.0"><filename>nspr-4.35.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">a8e5282a90fa724da81caf2f08726b6ef455b2249b9232d455db53a784dd92ac</sum></package><package arch="x86_64" name="nss-util" release="1.el7_9" src="nss-util-3.90.0-1.el7_9.src.rpm" version="3.90.0"><filename>nss-util-3.90.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">7cf1a5b624097801b794c4c63213821ba51c841f207b6706ab173add0abb3759</sum></package><package arch="x86_64" name="nss-sysinit" release="2.el7_9" src="nss-3.90.0-2.el7_9.src.rpm" version="3.90.0"><filename>nss-sysinit-3.90.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">2c506d27cf3ef2869f5aa4c98bc9fc7cc57cfc6ceb333dfad8102c1a24e1df1b</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="6.el7_9" src="nss-softokn-3.90.0-6.el7_9.src.rpm" version="3.90.0"><filename>nss-softokn-freebl-devel-3.90.0-6.el7_9.i686.rpm</filename><sum type="sha256">5160dd7b34539accf4e74613c5645d6999a9367c1e04fad393c8426a31876929</sum></package><package arch="i686" name="nss-util-devel" release="1.el7_9" src="nss-util-3.90.0-1.el7_9.src.rpm" version="3.90.0"><filename>nss-util-devel-3.90.0-1.el7_9.i686.rpm</filename><sum type="sha256">6bf03cc81b4f1241c7611802a7c7f27279e6be39ceb3f1892024fb1fd54c3fe8</sum></package><package arch="i686" name="nss-softokn" release="6.el7_9" src="nss-softokn-3.90.0-6.el7_9.src.rpm" version="3.90.0"><filename>nss-softokn-3.90.0-6.el7_9.i686.rpm</filename><sum type="sha256">18241dca1d91129301c8556a8b62ffefb6a424b5db11c601fe0462ca61d34f85</sum></package><package arch="x86_64" name="nss" release="2.el7_9" src="nss-3.90.0-2.el7_9.src.rpm" version="3.90.0"><filename>nss-3.90.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">1648b5a87b74c820c9aed6eb6a1d10d1498a2bbd6976445cf34be8c657a3b32f</sum></package><package arch="x86_64" name="nss-softokn" release="6.el7_9" src="nss-softokn-3.90.0-6.el7_9.src.rpm" version="3.90.0"><filename>nss-softokn-3.90.0-6.el7_9.x86_64.rpm</filename><sum type="sha256">c384ccf712d2130439a9fe5c98f3d0d73b3b0b8e603927073425a7f65197294e</sum></package><package arch="i686" name="nss-softokn-freebl" release="6.el7_9" src="nss-softokn-3.90.0-6.el7_9.src.rpm" version="3.90.0"><filename>nss-softokn-freebl-3.90.0-6.el7_9.i686.rpm</filename><sum type="sha256">fb670a39ad0ac44f9739100ef1eb8fe3dbb82c9ca6d4e874598e5597997c8a1a</sum></package><package arch="i686" name="nss" release="2.el7_9" src="nss-3.90.0-2.el7_9.src.rpm" version="3.90.0"><filename>nss-3.90.0-2.el7_9.i686.rpm</filename><sum type="sha256">d6b591087318537794a40f4dc5921268e0467eb57ccf341a78aaa01aff79228b</sum></package><package arch="i686" name="nss-util" release="1.el7_9" src="nss-util-3.90.0-1.el7_9.src.rpm" version="3.90.0"><filename>nss-util-3.90.0-1.el7_9.i686.rpm</filename><sum type="sha256">fa85b3c8810ce262d235b22bbb0e4ede00c0aecca5772ffb60129a8c7c3b8dd1</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el7_9" src="nss-util-3.90.0-1.el7_9.src.rpm" version="3.90.0"><filename>nss-util-devel-3.90.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">2df03fb85e1abc6dcd8cceca2311aaa12c2c60dcc42c2228a70031b4d4f61915</sum></package><package arch="x86_64" name="nss-devel" release="2.el7_9" src="nss-3.90.0-2.el7_9.src.rpm" version="3.90.0"><filename>nss-devel-3.90.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">144718bcc1de8e2e2d3933fdc91e926a0451b51102c883d7ebbc7a3ba8584519</sum></package><package arch="i686" name="nspr" release="1.el7_9" src="nspr-4.35.0-1.el7_9.src.rpm" version="4.35.0"><filename>nspr-4.35.0-1.el7_9.i686.rpm</filename><sum type="sha256">e7517a5cb57ad2758aa5cd91085301e4b16ae5cfe3b2e2d03cfdab3d5134f3e9</sum></package><package arch="i686" name="nspr-devel" release="1.el7_9" src="nspr-4.35.0-1.el7_9.src.rpm" version="4.35.0"><filename>nspr-devel-4.35.0-1.el7_9.i686.rpm</filename><sum type="sha256">210cdbbea75730caea5849bb61ec1926957562090f3e4259b68810f2c0070449</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="6.el7_9" src="nss-softokn-3.90.0-6.el7_9.src.rpm" version="3.90.0"><filename>nss-softokn-freebl-devel-3.90.0-6.el7_9.x86_64.rpm</filename><sum type="sha256">047aa93f55583f55c64b2592ba7b00f67b106f93540b1b6b0c08bba1bd1b0f10</sum></package><package arch="x86_64" name="nss-tools" release="2.el7_9" src="nss-3.90.0-2.el7_9.src.rpm" version="3.90.0"><filename>nss-tools-3.90.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">0d827bd967e29c6c8012e7cf1de16fa724ba482f60039dd2578c26519e5b45e2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:5478" id="RHBA-2023:5478" title="Nss And Nspr Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2211859" id="2211859" title="2211859 &#8211; Rebase Nss To 3.90 For Firefox 115 Esr [ Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2023:5620</id><title>Microcode_Ctl Bug Fix And Enhancement Update</title><description>The microcode_ctl packages provide microcode updates for Intel processors.
Bug Fix(es) and Enhancement(s):
* Update Intel CPU microcode to microcode-20230808 release, which addresses CVE-2022-40982, CVE-2022-41804, and CVE-2023-23908. (BZ#2223994)
</description><issued date="2023-10-11 11:43:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="73.19.el7_9" src="microcode_ctl-2.1-73.19.el7_9.src.rpm" version="2.1"><filename>microcode_ctl-2.1-73.19.el7_9.x86_64.rpm</filename><sum type="sha256">547fb7118701708094c3b5c00ffe046269ed859553dbf86cf402c5302828f3c2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2023:5620" id="RHBA-2023:5620" title="Microcode_Ctl Bug Fix And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2223994" id="2223994" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2024:0350</id><title>Net-Snmp Bug Fix Update</title><description>The net-snmp packages provide various libraries and tools for the Simple Network Management Protocol (SNMP), including an SNMP library, an extensible agent, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl Management Information Base (MIB) browser.
Bug Fix(es):
* net-snmp: fix a crash triggered by wrong passphrase (JIRA:RHEL-2882)
</description><issued date="2024-01-23 14:02:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="net-snmp-devel" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-devel-5.7.2-49.el7_9.4.i686.rpm</filename><sum type="sha256">c658da0ffb451524e8fc09eadad31e74ce67eab1d7a25030959b1a41ba9763c1</sum></package><package arch="i686" epoch="1" name="net-snmp-agent-libs" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-agent-libs-5.7.2-49.el7_9.4.i686.rpm</filename><sum type="sha256">e1810e0e60ef8ff20aa9bd2dde94c85b892ec99d28be6aeac23e789a8c71a6e0</sum></package><package arch="x86_64" epoch="1" name="net-snmp" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-5.7.2-49.el7_9.4.x86_64.rpm</filename><sum type="sha256">c1e7bb09e847ce3bb6c454756a753a7d4d4dad85c7906763daa6306c56563480</sum></package><package arch="x86_64" epoch="1" name="net-snmp-devel" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-devel-5.7.2-49.el7_9.4.x86_64.rpm</filename><sum type="sha256">8ec73a83612f455a74445026b1cd2daa1dfea073c7c8c2d124a3ec0af77468f2</sum></package><package arch="x86_64" epoch="1" name="net-snmp-agent-libs" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-agent-libs-5.7.2-49.el7_9.4.x86_64.rpm</filename><sum type="sha256">671aae63d47d6e21cb4352f75ad02f588ffa53700a552842d721ab4ac3de261e</sum></package><package arch="x86_64" epoch="1" name="net-snmp-perl" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-perl-5.7.2-49.el7_9.4.x86_64.rpm</filename><sum type="sha256">ba1aaf9cc68fe79d17116b8d9c12c19c8e92bf8a264baf936cb628d71e34ea88</sum></package><package arch="i686" epoch="1" name="net-snmp-libs" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-libs-5.7.2-49.el7_9.4.i686.rpm</filename><sum type="sha256">89c86951e7ec026c2d82738ca5c9e597ab13002e329a31e39ea7710144063363</sum></package><package arch="x86_64" epoch="1" name="net-snmp-libs" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-libs-5.7.2-49.el7_9.4.x86_64.rpm</filename><sum type="sha256">5e27b4aa992324800c76d1fad361a54d1a9d667a281fd98f24830a68c5db564e</sum></package><package arch="x86_64" epoch="1" name="net-snmp-gui" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-gui-5.7.2-49.el7_9.4.x86_64.rpm</filename><sum type="sha256">332d57d5e8b8be75894169db2389a1b5d15a86f1d8653de1449baff44b8c043b</sum></package><package arch="x86_64" epoch="1" name="net-snmp-sysvinit" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-sysvinit-5.7.2-49.el7_9.4.x86_64.rpm</filename><sum type="sha256">bb3fb2524a52f113142385015bd9636ef9dd05293bb0bdaf0e3194d63528b110</sum></package><package arch="x86_64" epoch="1" name="net-snmp-utils" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-utils-5.7.2-49.el7_9.4.x86_64.rpm</filename><sum type="sha256">f41bfd2bedb28d96c91a6426110db9c28e5d468234adb2a3c8c1b2d0c3fbfa36</sum></package><package arch="x86_64" epoch="1" name="net-snmp-python" release="49.el7_9.4" src="net-snmp-5.7.2-49.el7_9.4.src.rpm" version="5.7.2"><filename>net-snmp-python-5.7.2-49.el7_9.4.x86_64.rpm</filename><sum type="sha256">77eebfe70b4d96f9e590e535bb09c068d3100e7a465e306fb0f266a9a2ec6426</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2024:0350" id="RHBA-2024:0350" title="Net-Snmp Bug Fix Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2024:0762</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages contain data files with rules for various time zones.
The tzdata packages have been updated to version 2024a, which addresses recent time zone changes. Notably:
* Kazakhstan will transition from UTC+6 to UTC+5 on March 1 2024. * Palestine will transition to the daylight saving time (DST) a week later than previously predicted.
</description><issued date="2024-02-09 16:22:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2024a-1.el7.src.rpm" version="2024a"><filename>tzdata-2024a-1.el7.noarch.rpm</filename><sum type="sha256">269866c2e28a43307abef7ef8968f108fbf18c61bc4da8b5fdf9cbf83425c9c6</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2024a-1.el7.src.rpm" version="2024a"><filename>tzdata-java-2024a-1.el7.noarch.rpm</filename><sum type="sha256">2fbe19464f1e459fda37277248976644b1e9de5afd43ccf1c60472a896b94548</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2024:0762" id="RHBA-2024:0762" title="Tzdata Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2024:0987</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>For detailed information on changes in this release, see the SCAP Security Guide release notes linked from the References section.
</description><issued date="2024-02-28 08:34:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide" release="2.sl7_9" src="scap-security-guide-0.1.72-2.sl7_9.src.rpm" version="0.1.72"><filename>scap-security-guide-0.1.72-2.sl7_9.noarch.rpm</filename><sum type="sha256">b16440341a0b9327f3148a5ba31d74ced89f48a9706a5a62d4bf199041026f0d</sum></package><package arch="noarch" name="scap-security-guide-rule-playbooks" release="2.sl7_9" src="scap-security-guide-0.1.72-2.sl7_9.src.rpm" version="0.1.72"><filename>scap-security-guide-rule-playbooks-0.1.72-2.sl7_9.noarch.rpm</filename><sum type="sha256">9c4b957b491174811c87df2dbccc1a326f8f405d95700a2cd1bd53ebbc8fadc7</sum></package><package arch="noarch" name="scap-security-guide-doc" release="2.sl7_9" src="scap-security-guide-0.1.72-2.sl7_9.src.rpm" version="0.1.72"><filename>scap-security-guide-doc-0.1.72-2.sl7_9.noarch.rpm</filename><sum type="sha256">c28c2c7bb50773bc3f4d71efd4dd7cc7da4a1c6aad6221ce3aeae71538c68166</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2024:0987" id="RHBA-2024:0987" title="Scap-Security-Guide Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2024:1274</id><title>Fence-Agents Bug Fix And Enhancement Update</title><description>The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
</description><issued date="2024-03-19 11:46:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="fence-agents-heuristics-ping" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-heuristics-ping-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">6e56f8d888db37626adf4a5cf03fa719f0d9c3ef25efd0075f1663040facf774</sum></package><package arch="x86_64" name="fence-agents-lpar" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-lpar-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">638d58d089706a31d2be0c25025bd35e01e7a9278ede03309aa6b85e944d5ea5</sum></package><package arch="x86_64" name="fence-agents-vmware-rest" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-vmware-rest-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">a871063f9cce3bcc66cd3cf2ac25c9d70bf602e25bb921155dab40ea1781c8d2</sum></package><package arch="x86_64" name="fence-agents-apc" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-apc-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">d7ea45cebf43de8427192eccad9ecda108c7fd10ceeb278435d18460b45d6c50</sum></package><package arch="x86_64" name="fence-agents-apc-snmp" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-apc-snmp-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">6e2a06f356530081982acb223a1c2be6a48bf5baed4bcfd3104b7edf13b39334</sum></package><package arch="x86_64" name="fence-agents-ilo-moonshot" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-ilo-moonshot-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">6a6ad2c66b11c9cdf2ddea5bbe82370d9b6b164708b9bb7dbf9d1dac1cb7c98e</sum></package><package arch="x86_64" name="fence-agents-ifmib" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-ifmib-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">f4a1666e35f1265dd53678906f6609c66f520382785b8e1031e0dcc3a934883f</sum></package><package arch="x86_64" name="fence-agents-aws" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-aws-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">729d3d4b42073cdf02f841c8576d5fad1fd8a19a3564a22769d8f85c6eb086cf</sum></package><package arch="x86_64" name="fence-agents-bladecenter" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-bladecenter-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">5b60eb76228587229ca3d8e5d4d0ea90e486cba8783f40e04d11665ffa514a30</sum></package><package arch="x86_64" name="fence-agents-ipmilan" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-ipmilan-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">5395bbaa7a5fb8a4da8f5653520324c9aa9900fd809ad450cc1ebacffd3c68bb</sum></package><package arch="x86_64" name="fence-agents-intelmodular" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-intelmodular-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">b0615c8baf5e9497ae674cda01e793c1d1fc2287aa785c2167c8d820a2b152d9</sum></package><package arch="x86_64" name="fence-agents-cisco-ucs" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-cisco-ucs-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">45916e68682a06cd43ddc70f88be74f3127bdb259999e8f37596f9e71a60188f</sum></package><package arch="x86_64" name="fence-agents-ibmblade" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-ibmblade-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">093720a4cf018a240f7b3cfdf9980be6bd71ae0deb28f17c54057a497312b51e</sum></package><package arch="x86_64" name="fence-agents-wti" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-wti-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">c6e1df867d64b9d8c575cdc5c8f20d521fe9a480035b6efe13abab6b75d61671</sum></package><package arch="x86_64" name="fence-agents-vmware-soap" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-vmware-soap-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">ad313e2f86f7f9f15a30074797454e54402bdc725710b1e4d3da594ccc86572d</sum></package><package arch="x86_64" name="fence-agents-ilo2" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-ilo2-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">1a31a065be1222982bb005b03e7bff8eeb2050ac501c0e2111029ba51597e615</sum></package><package arch="x86_64" name="fence-agents-common" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-common-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">24fea275d60c79dce58a7176383cad072cf7c8e473d3a5ed72fda27b240c3f5b</sum></package><package arch="x86_64" name="fence-agents-brocade" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-brocade-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">f74ccc9a9ccabc9bc94afebdaf1a5437409e45caa7dd4a6222fce6dcd87771f8</sum></package><package arch="x86_64" name="fence-agents-emerson" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-emerson-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">3007100b95d7d09f310dce9b0c25925888df5ccb168c662b8275b29834eb2f76</sum></package><package arch="x86_64" name="fence-agents-cisco-mds" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-cisco-mds-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">2d56dca534bc0d47cbf0005dfa7f06aa5db6f605aa404644d40cabe02382d7bc</sum></package><package arch="x86_64" name="fence-agents-hpblade" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-hpblade-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">0db1dbfebaa6b67cdaba3e67577b527b64e56698eaea4cf2a589d0df79168460</sum></package><package arch="x86_64" name="fence-agents-kdump" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-kdump-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">6f026bb6d5cb6dd57133c3569200c8ec9ed027fcbd5ee5307cef771a6abd9292</sum></package><package arch="x86_64" name="fence-agents-rsb" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-rsb-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">7bebb8c1064787a555a4469ff40e48554d16918a871eb16b671974aa13595ab1</sum></package><package arch="x86_64" name="fence-agents-ipdu" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-ipdu-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">88090b817eeace0a716c473bed7160a08270a41126dba116dd8a12841e13134b</sum></package><package arch="x86_64" name="fence-agents-ilo-ssh" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-ilo-ssh-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">8d7480844b7751c1187271ea7625d3e8c5a400ed5233bb15cba956a7793e31ae</sum></package><package arch="x86_64" name="fence-agents-eps" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-eps-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">03180c0590e56a549fcaba9758a0b02f3f7e61aba1dde1b1b98ecc4d326ebfe6</sum></package><package arch="x86_64" name="fence-agents-amt-ws" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-amt-ws-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">44ddedeb3c563db97154db842d530ee79dd8722bfdb79cd38a6a47abb617bdf3</sum></package><package arch="x86_64" name="fence-agents-redfish" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-redfish-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">9e536929558a3814dc846afef01a0f62e69f42a7fa076dbfcc28a7a56a42198e</sum></package><package arch="x86_64" name="fence-agents-gce" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-gce-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">00c3412047b847277ecc5f83e6780032d98ae9542573b634509d9fedba40254d</sum></package><package arch="x86_64" name="fence-agents-rhevm" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-rhevm-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">44d71a555f1ec4e61d0a5429eafba7110715373e8c9f50cc1e983dea5f820e99</sum></package><package arch="x86_64" name="fence-agents-sbd" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-sbd-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">65d81bacfec1b46c22c11750fc9f71c068c11979a038189cf443c66726b6e133</sum></package><package arch="x86_64" name="fence-agents-compute" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-compute-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">be05fc5bf2b2a646e9002fb0c6ed1addb25de9770e84e58e32629068cfc97702</sum></package><package arch="x86_64" name="fence-agents-virsh" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-virsh-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">64f37eb5102cb2d5d582cef7a63e7e0b15948d75854fdc957bb34f870bc7fa13</sum></package><package arch="x86_64" name="fence-agents-mpath" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-mpath-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">5565c5379ce59d1b14416c2451fb3378584a774e5389109fb9d2037ae638217d</sum></package><package arch="x86_64" name="fence-agents-aliyun" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-aliyun-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">f4422b189daadf84e733ea25db0584641130f12dfc81367fa0cbf9e84235a25c</sum></package><package arch="x86_64" name="fence-agents-scsi" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-scsi-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">dd41cac9d96fd46b02b5cc93ec0ef4679c1a81764123f52134f9a5269efd832d</sum></package><package arch="x86_64" name="fence-agents-ilo-mp" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-ilo-mp-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">fb3c799dde831fd12ff6ba60173548d714ca0efe70b2dd78a77c675b0f4d31f4</sum></package><package arch="x86_64" name="fence-agents-rsa" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-rsa-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">1e475576002fd26c9356e09caa762ca00dc258d81774a0fb014ed4b8a23f7eb6</sum></package><package arch="x86_64" name="fence-agents-all" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-all-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">55862915cc9ceee1964cf8abe31bfff5ec229b4775a0c96f9f98ffa73f9b35ea</sum></package><package arch="x86_64" name="fence-agents-drac5" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-drac5-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">a508fb4976a9d173c6d4bfa170ac15e6430deebc08fee08b25012a237dee4948</sum></package><package arch="x86_64" name="fence-agents-eaton-snmp" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-eaton-snmp-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">514ccd0b7f308a16c1eb0ecf498ef88312dc0360ac546574b469e09db0f8ed08</sum></package><package arch="x86_64" name="fence-agents-azure-arm" release="41.el7_9.8" src="fence-agents-4.2.1-41.el7_9.8.src.rpm" version="4.2.1"><filename>fence-agents-azure-arm-4.2.1-41.el7_9.8.x86_64.rpm</filename><sum type="sha256">70007684834fe70c8880f3d5c9370e618dc11ec0117a42898c52831007704510</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2024:1274" id="RHBA-2024:1274" title="Fence-Agents Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2024:1276</id><title>Resource-Agents Bug Fix And Enhancement Update</title><description>The resource-agents packages provide the Pacemaker and RGManager service managers with a set of scripts. These scripts interface with several services to allow operating in a high-availability (HA) environment.
</description><issued date="2024-03-19 09:34:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="resource-agents-aliyun" release="61.el7_9.20" src="resource-agents-4.1.1-61.el7_9.20.src.rpm" version="4.1.1"><filename>resource-agents-aliyun-4.1.1-61.el7_9.20.x86_64.rpm</filename><sum type="sha256">e841523b6d12bfb7e7bf38dbce2dc0dbc0dd3aeca1c9cfe8de269ea3736577f0</sum></package><package arch="x86_64" name="resource-agents-gcp" release="61.el7_9.20" src="resource-agents-4.1.1-61.el7_9.20.src.rpm" version="4.1.1"><filename>resource-agents-gcp-4.1.1-61.el7_9.20.x86_64.rpm</filename><sum type="sha256">92053d13004094b1d5f374d585c4b055e4de5d81c36fe8af96d84849ac02ed17</sum></package><package arch="x86_64" name="resource-agents" release="61.el7_9.20" src="resource-agents-4.1.1-61.el7_9.20.src.rpm" version="4.1.1"><filename>resource-agents-4.1.1-61.el7_9.20.x86_64.rpm</filename><sum type="sha256">c7814974ccf16878f7a15f38101bd8cfc432a27b11ff3e7a5a316a7dd68c966b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2024:1276" id="RHBA-2024:1276" title="Resource-Agents Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="bugfix" version="2.0"><id>SLBA-2024:3624</id><title>Scap-Security-Guide Bug Fix And Enhancement Update</title><description>For detailed information on changes in this release, see the SCAP Security Guide release notes linked from the References section.
</description><issued date="2024-06-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="scap-security-guide" release="1.sl7_9" src="scap-security-guide-0.1.73-1.sl7_9.src.rpm" version="0.1.73"><filename>scap-security-guide-0.1.73-1.sl7_9.noarch.rpm</filename><sum type="sha256">f725062f860358a91f914178fa656fdc5b24aca28abacc677b3afad32a8193cc</sum></package><package arch="noarch" name="scap-security-guide-doc" release="1.sl7_9" src="scap-security-guide-0.1.73-1.sl7_9.src.rpm" version="0.1.73"><filename>scap-security-guide-doc-0.1.73-1.sl7_9.noarch.rpm</filename><sum type="sha256">a8e3d73c8d75b9e04ad93839e41198cd845560d7a2493c8596cbb20191324217</sum></package><package arch="noarch" name="scap-security-guide-rule-playbooks" release="1.sl7_9" src="scap-security-guide-0.1.73-1.sl7_9.src.rpm" version="0.1.73"><filename>scap-security-guide-rule-playbooks-0.1.73-1.sl7_9.noarch.rpm</filename><sum type="sha256">60111515946d2e2906b7a22343ba156c79722b74490f3df1c8268f3604240e28</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHBA-2024:3624" id="RHBA-2024:3624" title="Scap-Security-Guide Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:0154-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been upgraded to upstream version 2016a, which provides a number of bug fixes and enhancements over the previous version, notably:

* Prior to this update, an incorrect assumption was made about the daylight saving time (DST) in the America/Cayman time zone this year, which was reflected in the code. The mentioned time zone will not have DST this year. To  the previous change has been reverted.

* The Asia/Chita time zone switches from +0800 to +0900 on 2016-03-27 at 02:00. This change has been implemented.

* The DST predictions for the Asia/Tehran time zone for the year 2038 and later are now March 21 00:00 to September 21 00:00. This premise has been implemented.

This update also fixes the following bug:

* Starting from 2027, the Java timezone generation tool would incorrectly calculate the Africa/Casablanca time transitions. This bug has been fixed, and the tool will calculate these transitions correctly.

In addition, this update adds the following enhancement:

* At present, in Scientific Linux 6, the /etc/localtime file is not preserved across package updates even when it is a symbolic link. This tzdata version contains preparatory work to support preserving /etc/localtime across package upgrades if it is a symbolic link. Currently, this change is inactive, and the time zone must still be configured through /etc/sysconfig/clock. The change will be supported by a future glibc update.</description><release>Scientific Linux</release><issued date="2016-02-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2016a-1.el7.src.rpm" version="2016a"><filename>tzdata-2016a-1.el7.noarch.rpm</filename><sum type="sha256">d1b6d5fadb3e0842dd6955e5f9e33716f964c7136be9f55496aa4d5ca31bca69</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2016a-1.el7.src.rpm" version="2016a"><filename>tzdata-java-2016a-1.el7.noarch.rpm</filename><sum type="sha256">eb9583ff25f6ec9d4285857f0f7b995d30f8541328368074abb5a0248f22868a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0154" id="RHEA-2016:0154-1" title="Rhea-2016:0154-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1292833" id="1292833" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1292837" id="1292837" title="S8051641: Africa/Casablanca Transitions Is Incorrectly Calculated Starting From 2027 [6.7.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302733" id="1302733" title="Tzdata-2016A Is Available" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302734" id="1302734" title="Tzdata-2016A Is Available" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302740" id="1302740" title="Tzdata-2016A Is Available" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302741" id="1302741" title="Tzdata-2016A Is Available" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:0463-1</id><title>Tzdata</title><description>The tzdata packages have been upgraded to upstream version 2016b, which provides a number of enhancements over the previous version, notably:

* This update introduces a number of new time zones for several regions in the Russian Federation, which will switch time on 2016-03-27 at 02:00 local time: - The Europe/Astrakhan time zone for Astrakhan Oblast, which will switch from UTC +03 to +04. - The Europe/Ulyanovsk time zone for Ulyanovsk Oblast, which will likely switch from UTC +03 to +04. - The Asia/Barnaul time zone for Altai Krai and Altai Republic, which will likely switch from UTC +06 to +07.

* This update takes into account that the Asia/Sakhalin time zone will switch from UTC +10 to +11 on 2016-03-27 at 02:00 local time.

* This update takes into account that Haiti will not observe the Daylight Saving Time (DST) in 2016.

* This update takes into account that Palestine's spring-forward transition will happen on 2016-03-26 at 01:00 local time, not 00:00.</description><release>Scientific Linux</release><issued date="2016-03-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2016b-1.el7.src.rpm" version="2016b"><filename>tzdata-java-2016b-1.el7.noarch.rpm</filename><sum type="sha256">e38f3509f2f10f201126525265302c312d403e9214325716c3d8908683a8faf3</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2016b-1.el7.src.rpm" version="2016b"><filename>tzdata-2016b-1.el7.noarch.rpm</filename><sum type="sha256">fab59d2d39b8c68485b23355fb690453ea2ab684dc97172604ae69d3c3480e50</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0463" id="RHEA-2016:0463-1" title="Rhea-2016:0463-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317703" id="1317703" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317704" id="1317704" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317707" id="1317707" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317708" id="1317708" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:0517-1</id><title>Tzdata</title><description>This update adds the following enhancement:

* This update takes into account that Azerbaijan will no longer observe Daylight Saving Time (DST), and that Chile changes from permanent DST to seasonal DST.</description><release>Scientific Linux</release><issued date="2016-03-29 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2016c-1.el7.src.rpm" version="2016c"><filename>tzdata-java-2016c-1.el7.noarch.rpm</filename><sum type="sha256">dd29c99b84508c3e37ada374c44e723b9b806b94d2005edce0fc8835a6ac47ad</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2016c-1.el7.src.rpm" version="2016c"><filename>tzdata-2016c-1.el7.noarch.rpm</filename><sum type="sha256">5ca6662996c7558b5daeb3966193fcacaccb1c0fd4996bffaf7d4d5219a306cd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0517" id="RHEA-2016:0517-1" title="Rhea-2016:0517-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319304" id="1319304" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319306" id="1319306" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319310" id="1319310" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319311" id="1319311" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:0683-1</id><title>Tzdata</title><description>This update adds the following enhancements:

* Asia/Magadan will switch from UTC+10 to UTC+11 on April 24, 2016 at 02:00.

* America/Caracas will switch from UTC-0430 to UTC-04 on May 01, 2016 at 02:30.

* New zone Asia/Tomsk, split off from Asia/Novosibirsk. It covers Tomsk Oblast, Russia, which will switch from UTC+06 to UTC+07 on May 29, 2016 at 02:00.</description><release>Scientific Linux</release><issued date="2016-04-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2016d-1.el7.src.rpm" version="2016d"><filename>tzdata-java-2016d-1.el7.noarch.rpm</filename><sum type="sha256">b2d1af29776f2186da9e34e6e2fdc71fa4bc56b9d8fb1bb794444ac2b55c69e3</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2016d-1.el7.src.rpm" version="2016d"><filename>tzdata-2016d-1.el7.noarch.rpm</filename><sum type="sha256">a49f76844b0779508f3df16dbdac7aeda20542264547478a6a4073d1eb9c6abf</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:0683" id="RHEA-2016:0683-1" title="Rhea-2016:0683-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326484" id="1326484" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326486" id="1326486" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326490" id="1326490" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326491" id="1326491" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:1982-1</id><title>Tzdata Enhancement Update</title><description>The tzdata packages have been upgraded to upstream version 2016g, which provides a number of enhancements over the previous version, notably:

* This update takes into account that Turkey will not transition out of the DST (+03) time zone on 2016-10-30.

* A new leap second will be added on 2016-12-31 23:59:60 UTC, as specified in the IERS Bulletin C 52.</description><release>Scientific Linux</release><issued date="2016-10-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="2.el7" src="tzdata-2016g-2.el7.src.rpm" version="2016g"><filename>tzdata-java-2016g-2.el7.noarch.rpm</filename><sum type="sha256">694a9bdb4e0e3fde537be730a323da172ed43a07548f70803a73a201012d71af</sum></package><package arch="noarch" name="tzdata" release="2.el7" src="tzdata-2016g-2.el7.src.rpm" version="2016g"><filename>tzdata-2016g-2.el7.noarch.rpm</filename><sum type="sha256">30151827b816cb0af8dfe951c238b4ef2e2b33cda358353c0de5ab0da10414bb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:1982" id="RHEA-2016:1982-1" title="Rhea-2016:1982-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356223" id="1356223" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356224" id="1356224" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377711" id="1377711" title="Turkey Stays On Dst Since 2016" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377715" id="1377715" title="Turkey Stays On Dst Since 2016" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1379602" id="1379602" title="A Positive Leap Second Will Be Added On 31St December 2016" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1379621" id="1379621" title="A Positive Leap Second Will Be Added On 31St December 2016" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1380476" id="1380476" title="Turkey Stays On Dst Since 2016" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1380481" id="1380481" title="Daylight Savings Time To Be Permanent In Turkey" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2053-1</id><title>New Packages: Kmod-Qed, Kmod-Qede</title><description>The kmod-qed packages contain the QLogic FastLinQ 4xxxx Core Module. The kmod-qede packages contain the  QLogic FastLinQ 4xxxx Ethernet Driver, which adds official support for the qede devices. The PCI IDs supported by these packages are 1077:1634, 1077:1636, 1077:1644, 1077:1654, 1077:1656, 1077:1664, 1077:1666.

The kernel modules delivered by this erratum have been made available as part of the Red Hat Driver Update Program, which provides updated kernel modules that add support for selected devices in advance of the next Scientific Linux minor update release. We strongly recommend that  these kernel modules be only used when it is necessary to enable the  specific hardware mentioned in this erratum. Partners and customers  should continue to use the driver that is shipped in the latest Red Hat Enterprise Linux kernel for all other devices that require this driver.</description><release>Scientific Linux</release><issued date="2016-10-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kmod-qede" release="1.el7_2" src="qede-8.7.1.20-1.el7_2.src.rpm" version="8.7.1.20"><filename>kmod-qede-8.7.1.20-1.el7_2.x86_64.rpm</filename><sum type="sha256">02b24a34f7e1438ebbfe621ed4e1c2d5b976aa7664e789d1ed639d724f37fbc5</sum></package><package arch="x86_64" name="kmod-qed-firmware" release="1.el7_2" src="qed-8.7.1.20-1.el7_2.src.rpm" version="8.7.1.20"><filename>kmod-qed-firmware-8.7.1.20-1.el7_2.x86_64.rpm</filename><sum type="sha256">399aca7f7c5b161f2f11f32725e36fe763382017538b28db6e8a86e45c2dcd1e</sum></package><package arch="x86_64" name="kmod-qed" release="1.el7_2" src="qed-8.7.1.20-1.el7_2.src.rpm" version="8.7.1.20"><filename>kmod-qed-8.7.1.20-1.el7_2.x86_64.rpm</filename><sum type="sha256">3ae4237cbbd46a57423510277cc202e2af43650a81791ccfe0bc990f5a6054f5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2053" id="RHEA-2016:2053-1" title="Rhea-2016:2053-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1368350" id="1368350" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2154-1</id><title>Supermin Bug Fix And Enhancement Update</title><description>Supermin packages provide a tool for building supermin appliances. Supermin appliances are tiny appliances, usually around 100 KB in size, which get fully instantiated on-the-fly in a fraction of a second when a user need to boot one of them.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="supermin5" release="4.el7" src="supermin-5.1.16-4.el7.src.rpm" version="5.1.16"><filename>supermin5-5.1.16-4.el7.x86_64.rpm</filename><sum type="sha256">24536f92d99613b5f4dbb1ae809d07ef8aeb15faea3da92ec9ddd9ee96d769dd</sum></package><package arch="x86_64" name="supermin5-devel" release="4.el7" src="supermin-5.1.16-4.el7.src.rpm" version="5.1.16"><filename>supermin5-devel-5.1.16-4.el7.x86_64.rpm</filename><sum type="sha256">3b79361aedbb99a4471a8712856dbe45538ae9fd4b290adda14b81b0f60df791</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2154" id="RHEA-2016:2154-1" title="Rhea-2016:2154-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2158-1</id><title>Anaconda Bug Fix And Enhancement Update</title><description>The anaconda packages contain parts of the Anaconda installation program that allows reconfiguration and advanced installation options.</description><release>Scientific Linux</release><issued date="2017-01-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="anaconda-widgets-devel" release="1.sl7" src="anaconda-21.48.22.93-1.sl7.src.rpm" version="21.48.22.93"><filename>anaconda-widgets-devel-21.48.22.93-1.sl7.x86_64.rpm</filename><sum type="sha256">fbaac78620e30591feb6afc2ae8cbef6c00c0c5c4f7d60731d0b586719b9f6d3</sum></package><package arch="x86_64" name="anaconda" release="1.sl7" src="anaconda-21.48.22.93-1.sl7.src.rpm" version="21.48.22.93"><filename>anaconda-21.48.22.93-1.sl7.x86_64.rpm</filename><sum type="sha256">010e2d9fb411e9ebd091376b6e7e32875a760f1cbfe85011f19b68b24bafb36d</sum></package><package arch="x86_64" name="anaconda-core" release="1.sl7" src="anaconda-21.48.22.93-1.sl7.src.rpm" version="21.48.22.93"><filename>anaconda-core-21.48.22.93-1.sl7.x86_64.rpm</filename><sum type="sha256">4365a6057e0504ec95c071392c9023aeda4645efb7fab5b1b2b4252e4c0cfb46</sum></package><package arch="x86_64" name="anaconda-tui" release="1.sl7" src="anaconda-21.48.22.93-1.sl7.src.rpm" version="21.48.22.93"><filename>anaconda-tui-21.48.22.93-1.sl7.x86_64.rpm</filename><sum type="sha256">90b612245c820fe4a5b0a6090e8a57dd5bbea699cc28132794a3110de829150f</sum></package><package arch="x86_64" name="anaconda-widgets" release="1.sl7" src="anaconda-21.48.22.93-1.sl7.src.rpm" version="21.48.22.93"><filename>anaconda-widgets-21.48.22.93-1.sl7.x86_64.rpm</filename><sum type="sha256">0309de9f22893ae027263af58738d550c7fc82dd2c80eb0aaf3e01517a8fc9d5</sum></package><package arch="x86_64" name="anaconda-gui" release="1.sl7" src="anaconda-21.48.22.93-1.sl7.src.rpm" version="21.48.22.93"><filename>anaconda-gui-21.48.22.93-1.sl7.x86_64.rpm</filename><sum type="sha256">cc8e315cc524c2cfb2ac6c13536c8382a2a8ca07289c611dfa6d528a396d7e21</sum></package><package arch="x86_64" name="anaconda-dracut" release="1.sl7" src="anaconda-21.48.22.93-1.sl7.src.rpm" version="21.48.22.93"><filename>anaconda-dracut-21.48.22.93-1.sl7.x86_64.rpm</filename><sum type="sha256">e554315124d8b74fb6113f5d5ecbc4b1cd97f89809b3c121d36dabbd187fcac5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2158" id="RHEA-2016:2158-1" title="Rhea-2016:2158-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2266-1</id><title>New Packages: Python-Jwcrypto</title><description>The python-nss package provides Python implementations of the JSON Web Key (JWK), JSON Web Signature (JWS), JSON Web Encryption (JWE), and JSON Web Token (JWT) JOSE (JSON Object Signing and Encryption) standards.

This update adds the python-jwcrypto packages to Scientific Linux 7.</description><release>Scientific Linux</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-jwcrypto" release="1.el7" src="python-jwcrypto-0.2.1-1.el7.src.rpm" version="0.2.1"><filename>python-jwcrypto-0.2.1-1.el7.noarch.rpm</filename><sum type="sha256">417092a578e07c32ede756e1be49573e7d95a4a79d884e333cb65fd5411b3e14</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2266" id="RHEA-2016:2266-1" title="Rhea-2016:2266-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2275-1</id><title>Libsepol Bug Fix And Enhancement Update</title><description>The libsepol library provides an API for the manipulation of SELinux binary policies. It is used by checkpolicy (the policy compiler) and similar tools, as well as by programs like load_policy that need to perform specific transformations on binary policies (for example, customizing policy boolean settings).</description><release>Scientific Linux</release><issued date="2016-11-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libsepol-devel" release="6.el7" src="libsepol-2.5-6.el7.src.rpm" version="2.5"><filename>libsepol-devel-2.5-6.el7.x86_64.rpm</filename><sum type="sha256">20521c9d8101064b6ad03161af2f097376c4f57beb1c183697dabdb30176a466</sum></package><package arch="i686" name="libsepol-devel" release="6.el7" src="libsepol-2.5-6.el7.src.rpm" version="2.5"><filename>libsepol-devel-2.5-6.el7.i686.rpm</filename><sum type="sha256">0c2ba74e82081611aa781465bfe1a1f8ffec261ab3b5e95ea4038600f3af72b0</sum></package><package arch="i686" name="libsepol" release="6.el7" src="libsepol-2.5-6.el7.src.rpm" version="2.5"><filename>libsepol-2.5-6.el7.i686.rpm</filename><sum type="sha256">3769cd7f52014b4dcf237f68d3c6c3f633c155bed2c77d39e7b7dc155ce1dc84</sum></package><package arch="x86_64" name="libsepol-static" release="6.el7" src="libsepol-2.5-6.el7.src.rpm" version="2.5"><filename>libsepol-static-2.5-6.el7.x86_64.rpm</filename><sum type="sha256">c002e016071f777818691bcb5ddcffa41970bbb9d993f75911e8eb8d37bfea30</sum></package><package arch="x86_64" name="libsepol" release="6.el7" src="libsepol-2.5-6.el7.src.rpm" version="2.5"><filename>libsepol-2.5-6.el7.x86_64.rpm</filename><sum type="sha256">7cfdc35f20f1370aebc966f4117dde13973e823c5fa1fd4c9a91e5ed7fcbfa18</sum></package><package arch="i686" name="libsepol-static" release="6.el7" src="libsepol-2.5-6.el7.src.rpm" version="2.5"><filename>libsepol-static-2.5-6.el7.i686.rpm</filename><sum type="sha256">aad0ff598e4c0db3c22346931c529ca30e3486d2d5bf0ee9138de432b5558891</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2275" id="RHEA-2016:2275-1" title="Rhea-2016:2275-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2277-1</id><title>Libsemanage Bug Fix And Enhancement Update</title><description>The libsemanage library provides an API for the manipulation of SELinux binary policies. It is used by the checkpolicy compiler and similar utilitlies, as well as by programs such as load_policy, which must perform specific transformations on binary policies, such as customizing policy Boolean settings.</description><release>Scientific Linux</release><issued date="2016-11-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libsemanage" release="4.el7" src="libsemanage-2.5-4.el7.src.rpm" version="2.5"><filename>libsemanage-2.5-4.el7.i686.rpm</filename><sum type="sha256">85e1f07c9ff907d55a356300babd6a185a4e3ec88a4c62e11a948ee90d8f4a83</sum></package><package arch="x86_64" name="libsemanage-devel" release="4.el7" src="libsemanage-2.5-4.el7.src.rpm" version="2.5"><filename>libsemanage-devel-2.5-4.el7.x86_64.rpm</filename><sum type="sha256">6686f2b93cc7ec8d89a3c515a0e9829b2d6c396279606cf69815a4cb36d8b27c</sum></package><package arch="i686" name="libsemanage-devel" release="4.el7" src="libsemanage-2.5-4.el7.src.rpm" version="2.5"><filename>libsemanage-devel-2.5-4.el7.i686.rpm</filename><sum type="sha256">9fba3f5f4932e4e75c04f49dda22a6fc75fbe7a5640a99d6d32dc188602c639d</sum></package><package arch="x86_64" name="libsemanage-python" release="4.el7" src="libsemanage-2.5-4.el7.src.rpm" version="2.5"><filename>libsemanage-python-2.5-4.el7.x86_64.rpm</filename><sum type="sha256">62844290e4dbec4b5623959a533a2c3256efec9f3b13e723b3eafe5de0862705</sum></package><package arch="x86_64" name="libsemanage" release="4.el7" src="libsemanage-2.5-4.el7.src.rpm" version="2.5"><filename>libsemanage-2.5-4.el7.x86_64.rpm</filename><sum type="sha256">1fb1d00ab82aeb3d1afba63bb86900eb12fabb2a746638e366aade98117a06af</sum></package><package arch="i686" name="libsemanage-static" release="4.el7" src="libsemanage-2.5-4.el7.src.rpm" version="2.5"><filename>libsemanage-static-2.5-4.el7.i686.rpm</filename><sum type="sha256">c2d75c95f59a2bb967233b9cd2a3b7dfa71cb0c47f2b3270025e764fe5563fc9</sum></package><package arch="x86_64" name="libsemanage-static" release="4.el7" src="libsemanage-2.5-4.el7.src.rpm" version="2.5"><filename>libsemanage-static-2.5-4.el7.x86_64.rpm</filename><sum type="sha256">fc5811fb9553c327a2442a765a91e1ad3b2fa18a1c38d25aff864c48ab44eca8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2277" id="RHEA-2016:2277-1" title="Rhea-2016:2277-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2278-1</id><title>Setools Enhancement Update</title><description>SETools is a collection of graphical applications, command-line utilities, and libraries used for SELinux policy analysis.</description><release>Scientific Linux</release><issued date="2016-11-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="setools-libs" release="1.1.el7" src="setools-3.3.8-1.1.el7.src.rpm" version="3.3.8"><filename>setools-libs-3.3.8-1.1.el7.i686.rpm</filename><sum type="sha256">7aa6910b59b13b91175edd90bcdc409bacd0fb3087a1283b3e1ee67ec52fa6ae</sum></package><package arch="x86_64" name="setools-gui" release="1.1.el7" src="setools-3.3.8-1.1.el7.src.rpm" version="3.3.8"><filename>setools-gui-3.3.8-1.1.el7.x86_64.rpm</filename><sum type="sha256">a9032c3749dbce9983b033baf93c57c638350dd8ba671affb46352c21e843f2e</sum></package><package arch="x86_64" name="setools-console" release="1.1.el7" src="setools-3.3.8-1.1.el7.src.rpm" version="3.3.8"><filename>setools-console-3.3.8-1.1.el7.x86_64.rpm</filename><sum type="sha256">fbf8dd7bf8cf7942a40ac291e7c556d490893edad81f50fa37c1929d70d7aeb1</sum></package><package arch="x86_64" name="setools-libs" release="1.1.el7" src="setools-3.3.8-1.1.el7.src.rpm" version="3.3.8"><filename>setools-libs-3.3.8-1.1.el7.x86_64.rpm</filename><sum type="sha256">61fd7863e14728d070e1c1bc0aa38e687c8e766714bc6f3c306bad3dce98e187</sum></package><package arch="x86_64" name="setools-devel" release="1.1.el7" src="setools-3.3.8-1.1.el7.src.rpm" version="3.3.8"><filename>setools-devel-3.3.8-1.1.el7.x86_64.rpm</filename><sum type="sha256">4230919a025c650e548a71139e06a58b0f2eb514e1b213a27f7ef83ff596ca5e</sum></package><package arch="x86_64" name="setools" release="1.1.el7" src="setools-3.3.8-1.1.el7.src.rpm" version="3.3.8"><filename>setools-3.3.8-1.1.el7.x86_64.rpm</filename><sum type="sha256">e2716e6fcd05dddecbadd553777fa8873646244bf8efb8be870ae80de617eb5b</sum></package><package arch="i686" name="setools-devel" release="1.1.el7" src="setools-3.3.8-1.1.el7.src.rpm" version="3.3.8"><filename>setools-devel-3.3.8-1.1.el7.i686.rpm</filename><sum type="sha256">0e9c6f0dea816044577126f9ee754dfd8a1234f30e996da28952c6e8c3b40a47</sum></package><package arch="x86_64" name="setools-libs-tcl" release="1.1.el7" src="setools-3.3.8-1.1.el7.src.rpm" version="3.3.8"><filename>setools-libs-tcl-3.3.8-1.1.el7.x86_64.rpm</filename><sum type="sha256">9a26bf524117bd174abf7e363865558ebb5d0fab148d4fba15da245889903cd7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2278" id="RHEA-2016:2278-1" title="Rhea-2016:2278-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2281-1</id><title>Checkpolicy Bug Fix And Enhancement Update</title><description>The checkpolicy packages contain checkpolicy, the policy compiler for Security-Enhanced Linux (SELinux). The checkpolicy utility is required for building SELinux policies.</description><release>Scientific Linux</release><issued date="2016-11-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="checkpolicy" release="4.el7" src="checkpolicy-2.5-4.el7.src.rpm" version="2.5"><filename>checkpolicy-2.5-4.el7.x86_64.rpm</filename><sum type="sha256">7d4337ea5e79aa11a7ac0f06c68b01fd77d9f7066814058cb962d085dbeaa424</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2281" id="RHEA-2016:2281-1" title="Rhea-2016:2281-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2287-1</id><title>New Packages: Custodia</title><description>The custodia packages provide a service to manage and distribute secrets for Identity Management (IdM).

This update adds the custodia packages to Scientific Linux 7.</description><release>Scientific Linux</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-custodia" release="4.el7" src="custodia-0.1.0-4.el7.src.rpm" version="0.1.0"><filename>python-custodia-0.1.0-4.el7.noarch.rpm</filename><sum type="sha256">2ce8d27559fd8a6ca6f9972b59238c1bee621f47eccbe51a6406c0869904873a</sum></package><package arch="noarch" name="custodia" release="4.el7" src="custodia-0.1.0-4.el7.src.rpm" version="0.1.0"><filename>custodia-0.1.0-4.el7.noarch.rpm</filename><sum type="sha256">0cbca1ee3b0164b5ed0dbc6db5b2666a9dd10c0a4f5c12a6802764c25f14ae5c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2287" id="RHEA-2016:2287-1" title="Rhea-2016:2287-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2288-1</id><title>New Packages: Python-Gssapi</title><description>The python-gssapi packages provide a generic security services API (GSSAPI) that is compatible with Python 2 and 3. Identity Management (IdM) uses these packages as a replacement for python-krbV and python- pykerberos, which only support Python 2

This update adds the python-gssapi packages to Scientific Linux 7.</description><release>Scientific Linux</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-gssapi" release="2.el7" src="python-gssapi-1.2.0-2.el7.src.rpm" version="1.2.0"><filename>python-gssapi-1.2.0-2.el7.x86_64.rpm</filename><sum type="sha256">8d2e8950d5756517632bbf4a7cab7c567dbc011b3ab6f6bf83202e9ef43182b2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2288" id="RHEA-2016:2288-1" title="Rhea-2016:2288-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2308-1</id><title>New Packages: Python-Idna</title><description>The python-idna packages provide a library to support the Internationalised Domain Names in Applications (IDNA) protocol as specified in RFC 5891

This update adds the python-idna packages to Scientific Linux 7.</description><release>Scientific Linux</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-idna" release="1.el7" src="python-idna-2.0-1.el7.src.rpm" version="2.0"><filename>python-idna-2.0-1.el7.noarch.rpm</filename><sum type="sha256">febf6179011674ab519bb434af3ee87787da41a929e0a36e7d1d671e137ee483</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2308" id="RHEA-2016:2308-1" title="Rhea-2016:2308-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2309-1</id><title>Rdma Stack Bug Fix And Enhancement Update</title><description>New libvma packages are now available for Scientific Linux 7.

Scientific Linux includes a collection of Infiniband and iWARP utilities, libraries, and development packages for writing applications that use Remote Direct Memory Access (RDMA) technology.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="rdma" release="5.el7" src="rdma-7.3_4.7_rc2-5.el7.src.rpm" version="7.3_4.7_rc2"><filename>rdma-7.3_4.7_rc2-5.el7.noarch.rpm</filename><sum type="sha256">5de394a19fb4799e1c324d84a7bef1dcc2df4ae616ce36ddc47059232adc18f0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2309" id="RHEA-2016:2309-1" title="Rhea-2016:2309-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2315-1</id><title>Python-Pyasn1 Bug Fix Update</title><description>The python-pyasn1 package provides an implementation of ASN.1 types (concrete syntax) and codecs (transfer syntax) for the Python programming language.</description><release>Scientific Linux</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python2-pyasn1" release="7.el7" src="python-pyasn1-0.1.9-7.el7.src.rpm" version="0.1.9"><filename>python2-pyasn1-0.1.9-7.el7.noarch.rpm</filename><sum type="sha256">155553bab82f6ede5178ea75b85b9f6b220d81ff6955e98e9bbe0bf45af374c7</sum></package><package arch="noarch" name="python2-pyasn1-modules" release="7.el7" src="python-pyasn1-0.1.9-7.el7.src.rpm" version="0.1.9"><filename>python2-pyasn1-modules-0.1.9-7.el7.noarch.rpm</filename><sum type="sha256">977b450f31ecd674ba7e71248e64633fc4a2646faeb47b4a280c701c9a92a2cd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2315" id="RHEA-2016:2315-1" title="Rhea-2016:2315-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2317-1</id><title>Linux-Firmware Bug Fix And Enhancement Update</title><description>The linux-firmware packages contain all of the firmware files that are required by various devices to operate.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="iwl135-firmware" release="49.el7" src="linux-firmware-20160830-49.git7534e19.el7.src.rpm" version="18.168.6.1"><filename>iwl135-firmware-18.168.6.1-49.el7.noarch.rpm</filename><sum type="sha256">5df5ec51e036b1ed282e5a8f1e3f9a1be438070ab7629b42b3e1ba0c56184889</sum></package><package arch="noarch" name="iwl6050-firmware" release="49.el7" src="linux-firmware-20160830-49.git7534e19.el7.src.rpm" version="41.28.5.1"><filename>iwl6050-firmware-41.28.5.1-49.el7.noarch.rpm</filename><sum type="sha256">e7bfc5530ecf9e21d1404b4db1a2db3c47bda3719080c9989162e999c46aab20</sum></package><package arch="noarch" name="iwl6000g2b-firmware" release="49.el7" src="linux-firmware-20160830-49.git7534e19.el7.src.rpm" version="17.168.5.2"><filename>iwl6000g2b-firmware-17.168.5.2-49.el7.noarch.rpm</filename><sum type="sha256">0c85a35a7fe665872f82c15a90ace56d5c3ba0e2352e16e49e882735bf9ffa29</sum></package><package arch="noarch" name="iwl2030-firmware" release="49.el7" src="linux-firmware-20160830-49.git7534e19.el7.src.rpm" version="18.168.6.1"><filename>iwl2030-firmware-18.168.6.1-49.el7.noarch.rpm</filename><sum type="sha256">967e5b0604163b9e8e686652f5d15d9ab856e81f25f6deeec29706a31ddee363</sum></package><package arch="noarch" name="iwl6000g2a-firmware" release="49.el7" src="linux-firmware-20160830-49.git7534e19.el7.src.rpm" version="17.168.5.3"><filename>iwl6000g2a-firmware-17.168.5.3-49.el7.noarch.rpm</filename><sum type="sha256">6aa1fde5cab712b5c349cf74dee394e07347c973501bb699f5dce19d31c9ce4f</sum></package><package arch="noarch" name="iwl6000-firmware" release="49.el7" src="linux-firmware-20160830-49.git7534e19.el7.src.rpm" version="9.221.4.1"><filename>iwl6000-firmware-9.221.4.1-49.el7.noarch.rpm</filename><sum type="sha256">89c0995c438a6ee6897d28186a13eb6686f832fc991723430d2103808d043e9c</sum></package><package arch="noarch" name="iwl2000-firmware" release="49.el7" src="linux-firmware-20160830-49.git7534e19.el7.src.rpm" version="18.168.6.1"><filename>iwl2000-firmware-18.168.6.1-49.el7.noarch.rpm</filename><sum type="sha256">2a44d72fc4d44b150fcc97436225204666b7e619d631bb8649c6b40a947f6a66</sum></package><package arch="noarch" epoch="1" name="iwl1000-firmware" release="49.el7" src="linux-firmware-20160830-49.git7534e19.el7.src.rpm" version="39.31.5.1"><filename>iwl1000-firmware-39.31.5.1-49.el7.noarch.rpm</filename><sum type="sha256">66afeb795b24d506564ea4af7e5eb29adec4527dada49c41ddc1b74985a6343d</sum></package><package arch="noarch" name="iwl105-firmware" release="49.el7" src="linux-firmware-20160830-49.git7534e19.el7.src.rpm" version="18.168.6.1"><filename>iwl105-firmware-18.168.6.1-49.el7.noarch.rpm</filename><sum type="sha256">71057d48747f816e8da707503e4af17d836838c06cfa132367a1824b2a503d93</sum></package><package arch="noarch" name="iwl3160-firmware" release="49.el7" src="linux-firmware-20160830-49.git7534e19.el7.src.rpm" version="22.0.7.0"><filename>iwl3160-firmware-22.0.7.0-49.el7.noarch.rpm</filename><sum type="sha256">5bb93aadafef592eb2c9fa3db2ef026033a058da4adfa2a7104ddc023f5cfc4a</sum></package><package arch="noarch" name="iwl7260-firmware" release="49.el7" src="linux-firmware-20160830-49.git7534e19.el7.src.rpm" version="22.0.7.0"><filename>iwl7260-firmware-22.0.7.0-49.el7.noarch.rpm</filename><sum type="sha256">01e378a794a33b683608e86567afab394b3fadce34b331821ef973ae2c7a5f97</sum></package><package arch="noarch" name="iwl7265-firmware" release="49.el7" src="linux-firmware-20160830-49.git7534e19.el7.src.rpm" version="22.0.7.0"><filename>iwl7265-firmware-22.0.7.0-49.el7.noarch.rpm</filename><sum type="sha256">4300d0ede7bcec6ae75bc8c734823ffe41922a78abd1f628c0a07b34fd3bab19</sum></package><package arch="noarch" name="iwl3945-firmware" release="49.el7" src="linux-firmware-20160830-49.git7534e19.el7.src.rpm" version="15.32.2.9"><filename>iwl3945-firmware-15.32.2.9-49.el7.noarch.rpm</filename><sum type="sha256">4591b44cc235f8975a0b3e1dd20b251ce2dae440fb9e5855529c7d666f2911e3</sum></package><package arch="noarch" name="iwl100-firmware" release="49.el7" src="linux-firmware-20160830-49.git7534e19.el7.src.rpm" version="39.31.5.1"><filename>iwl100-firmware-39.31.5.1-49.el7.noarch.rpm</filename><sum type="sha256">c9cd2da425384c1bd2128f6388eba53d3896daf0a3b79e33bee0f3b70afe52d6</sum></package><package arch="noarch" name="iwl4965-firmware" release="49.el7" src="linux-firmware-20160830-49.git7534e19.el7.src.rpm" version="228.61.2.24"><filename>iwl4965-firmware-228.61.2.24-49.el7.noarch.rpm</filename><sum type="sha256">0f864957f8a7efb1d7968961ba036a58bb4237ae44d29409cdda4fd06beeda0e</sum></package><package arch="noarch" name="linux-firmware" release="49.git7534e19.el7" src="linux-firmware-20160830-49.git7534e19.el7.src.rpm" version="20160830"><filename>linux-firmware-20160830-49.git7534e19.el7.noarch.rpm</filename><sum type="sha256">6b3b5dd0e7f00d54e6f54d9b2c0d9706e77356689856814611750041e51c6150</sum></package><package arch="noarch" name="iwl5000-firmware" release="49.el7" src="linux-firmware-20160830-49.git7534e19.el7.src.rpm" version="8.83.5.1_1"><filename>iwl5000-firmware-8.83.5.1_1-49.el7.noarch.rpm</filename><sum type="sha256">4759169ee9babc68b84719b487f787b630059c77c07424c5fdca437717512d4d</sum></package><package arch="noarch" name="iwl5150-firmware" release="49.el7" src="linux-firmware-20160830-49.git7534e19.el7.src.rpm" version="8.24.2.2"><filename>iwl5150-firmware-8.24.2.2-49.el7.noarch.rpm</filename><sum type="sha256">2ece6b4b4a6abf68a98c9f88ec124ff589af4faf27258723b0b89140e0179bcb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2317" id="RHEA-2016:2317-1" title="Rhea-2016:2317-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2371-1</id><title>Python-Cryptography And Python-Cffi Bug Fix And Enhancement Update</title><description>The python-cryptography packages contain a Python Cryptographic Authority's (PyCA's) cryptography library, which provides cryptographic primitives and recipes to Python developers.

The python-cffi packages contain a foreign function interface (FFI) for Python, which provides a convenient and reliable way of calling existing C code from Python.</description><release>Scientific Linux</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-cffi" release="5.el7" src="python-cffi-1.6.0-5.el7.src.rpm" version="1.6.0"><filename>python-cffi-1.6.0-5.el7.x86_64.rpm</filename><sum type="sha256">ab6dbc5a2a98ee04df5736cf02e041308aa8e120982ec9e34bc593b1550eca51</sum></package><package arch="noarch" name="python-cffi-doc" release="5.el7" src="python-cffi-1.6.0-5.el7.src.rpm" version="1.6.0"><filename>python-cffi-doc-1.6.0-5.el7.noarch.rpm</filename><sum type="sha256">0efd745003d1748a55ca139323f4809ee5e1c0f405c7806a7edaab29252c494c</sum></package><package arch="x86_64" name="python2-cryptography" release="3.el7" src="python-cryptography-1.3.1-3.el7.src.rpm" version="1.3.1"><filename>python2-cryptography-1.3.1-3.el7.x86_64.rpm</filename><sum type="sha256">c06c26234d705d491feb56764aeecf55b1c9be08c1b1ae0d2adc3393691bbb6a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2371" id="RHEA-2016:2371-1" title="Rhea-2016:2371-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2375-1</id><title>Bind-Dyndb-Ldap Bug Fix And Enhancement Update</title><description>The dynamic Lightweight Directory Access Protocol (LDAP) back end is a plug-in for BIND that provides back-end capabilities for LDAP databases. It features support for dynamic updates and internal caching that helps to reduce the load on LDAP servers.</description><release>Scientific Linux</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="bind-dyndb-ldap" release="5.el7" src="bind-dyndb-ldap-10.0-5.el7.src.rpm" version="10.0"><filename>bind-dyndb-ldap-10.0-5.el7.x86_64.rpm</filename><sum type="sha256">baf4659d5770dadb38b44fe41f271b0ae81f12d6b82e5872f7aa63e59a9441c6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2375" id="RHEA-2016:2375-1" title="Rhea-2016:2375-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2429-1</id><title>New Packages: Copy-Jdk-Configs</title><description>The copy-jdk-configs packages provide a utility script to transfer JDK configuration files between updates or for archiving.

This update adds the copy-jdk-configs packages to Scientific Linux 7.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="copy-jdk-configs" release="1.el7" src="copy-jdk-configs-1.2-1.el7.src.rpm" version="1.2"><filename>copy-jdk-configs-1.2-1.el7.noarch.rpm</filename><sum type="sha256">69e7fb5531256b03d18f82e04ec8960ba4528597527074184f4526937b081fe9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2429" id="RHEA-2016:2429-1" title="Rhea-2016:2429-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2455-1</id><title>Libecap Bug Fix And Enhancement Update</title><description>The libecap packages contain the libecap library, which implements eCAP API in C++.  eCAP API in C++ is a software interface that allows a network application, such as an HTTP proxy or an ICAP server, to outsource content analysis and adaptation to a loadable module.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libecap" release="1.el7" src="libecap-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libecap-1.0.0-1.el7.x86_64.rpm</filename><sum type="sha256">a60d3bf4e48de66c750cbda98c6144c9907bddc257a06bfbff7774ff567aa29b</sum></package><package arch="x86_64" name="libecap-devel" release="1.el7" src="libecap-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libecap-devel-1.0.0-1.el7.x86_64.rpm</filename><sum type="sha256">9019f4788196aa3176958aa8d52cd6224c3178f527f53d26548bfd0908829b87</sum></package><package arch="i686" name="libecap" release="1.el7" src="libecap-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libecap-1.0.0-1.el7.i686.rpm</filename><sum type="sha256">5ac9589331ffd8015f5f0a6e99e2e479192c180e1567c27dd250b592f9f27bb1</sum></package><package arch="i686" name="libecap-devel" release="1.el7" src="libecap-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libecap-devel-1.0.0-1.el7.i686.rpm</filename><sum type="sha256">df93b3df4b434722b12cdd06d9db494722d5d432a3b31fd526a94c861e4db9e5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2455" id="RHEA-2016:2455-1" title="Rhea-2016:2455-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2476-1</id><title>Sssd Bug Fix And Enhancement Update</title><description>The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.</description><release>Scientific Linux</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="sssd-libwbclient-devel" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-libwbclient-devel-1.14.0-43.el7.i686.rpm</filename><sum type="sha256">2dd5389a4b0141da4dfb752322e6c0063d3cceb206f3623972828cd939692027</sum></package><package arch="i686" name="libsss_autofs" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libsss_autofs-1.14.0-43.el7.i686.rpm</filename><sum type="sha256">fbab7f943e212ecde74ca393f503d6edcb9ba7e03ec6d801b1a5777cf1e2da6b</sum></package><package arch="x86_64" name="sssd-proxy" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-proxy-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">f3def88c7f7c8cfbf9c6197155993d205d2554ab4688c5b5eb0e503c462bd77c</sum></package><package arch="x86_64" name="libsss_autofs" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libsss_autofs-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">21b1d4dc4efc5f9d98eb696f5c58d9b880c64c0ee1c5755f678754b24dfb59a0</sum></package><package arch="x86_64" name="sssd-common-pac" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-common-pac-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">6fd4d535b7e05cb4a051c988311930443718201383f82bf57b9b83973e4ca11b</sum></package><package arch="x86_64" name="libsss_simpleifp" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libsss_simpleifp-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">b5c09635b97d547f800a322526a45b0b0e5e1a5a70a7439695b75feea8029aa4</sum></package><package arch="x86_64" name="libsss_simpleifp-devel" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libsss_simpleifp-devel-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">f36007d578cc8c6138e66b5efc48afaab492623bd6ecb5e1dab9c8ed52d0dcaf</sum></package><package arch="noarch" name="python-sssdconfig" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>python-sssdconfig-1.14.0-43.el7.noarch.rpm</filename><sum type="sha256">fcebd6e61f673b18ed0f2726f5a1285b2ba52fde399af11db24729d6520a2053</sum></package><package arch="x86_64" name="python-libsss_nss_idmap" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>python-libsss_nss_idmap-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">cfcc100474ce30d7e176286498febb4360023de922950c67f91b7ce4d884b116</sum></package><package arch="i686" name="libipa_hbac" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libipa_hbac-1.14.0-43.el7.i686.rpm</filename><sum type="sha256">c4f4796e8a29cf206b5cee6e408f4ce162fd06f1b97a0219c4c56531cdd30862</sum></package><package arch="x86_64" name="sssd-ldap" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-ldap-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">a9b2db0df75431664b5886cd05cf9514501ddb8fe47cac353b3b01361f584012</sum></package><package arch="x86_64" name="sssd-ipa" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-ipa-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">e0fbc6623eba8820d528ff386e6af4668d2e344a372067cf2a7c18c235f800f7</sum></package><package arch="i686" name="sssd-libwbclient" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-libwbclient-1.14.0-43.el7.i686.rpm</filename><sum type="sha256">83be01c52132318d9102de341d0904b4602f358b4471fe841c0784290e0a9c4a</sum></package><package arch="x86_64" name="sssd-client" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-client-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">359784a262c7f3efce4a79c64761c37e494a1a8301f038abe7fc94142a6e6dad</sum></package><package arch="i686" name="sssd-krb5-common" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-krb5-common-1.14.0-43.el7.i686.rpm</filename><sum type="sha256">e9f80d2a1027b2bec91410c61537d937f277d0898f07b5788ed38f93b0508b0d</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libsss_nss_idmap-devel-1.14.0-43.el7.i686.rpm</filename><sum type="sha256">0c013bdb144cf75716276c6ecc4a859546a723437cb0906915271e735ce8cf24</sum></package><package arch="x86_64" name="sssd-libwbclient-devel" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-libwbclient-devel-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">96db3f5e94307fcf49d050bbdbd5be68b713764d2c6004f0852bb2a823275a37</sum></package><package arch="x86_64" name="sssd" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">d5a79207d5e14b9311efffba568365515a991f928ad08d51ab16195937a8eeae</sum></package><package arch="i686" name="libsss_sudo" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libsss_sudo-1.14.0-43.el7.i686.rpm</filename><sum type="sha256">291fb7a076b539240a8a64dbbc5ce09cad0c4bcaa48527d7e935e7d2418708a7</sum></package><package arch="x86_64" name="sssd-polkit-rules" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-polkit-rules-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">33961e4cc28a06bd7740ddd550c77fe3cbd75300d1c58eebdbfa4a80ca578f18</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libipa_hbac-devel-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">77296d1f41479b80521429d276921269e9dc978870ddc3dd677764d9f1278a92</sum></package><package arch="i686" name="libipa_hbac-devel" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libipa_hbac-devel-1.14.0-43.el7.i686.rpm</filename><sum type="sha256">a87d0b79728644fe365c858c0c4455f6a8c554684b0791a39a8308f24f24f21e</sum></package><package arch="x86_64" name="sssd-ad" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-ad-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">a467b3cbd528ae6c7596dda7f8be3ad261f879013ad41ff2a7235a8674055239</sum></package><package arch="i686" name="libsss_nss_idmap" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libsss_nss_idmap-1.14.0-43.el7.i686.rpm</filename><sum type="sha256">762eb8456f7cb39853c4d286c163cd3e12988c08d78cb2fa08629ac3e859cb73</sum></package><package arch="x86_64" name="sssd-krb5-common" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-krb5-common-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">98d6ab733aba70d3276899071796a2f841725128e4cd3267ea2e7bbd3f32a79d</sum></package><package arch="i686" name="libsss_simpleifp" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libsss_simpleifp-1.14.0-43.el7.i686.rpm</filename><sum type="sha256">4710f24498cf7b83e5497d013cb7d177168d259a816dda8685b08f1e2cd10ce6</sum></package><package arch="x86_64" name="python-libipa_hbac" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>python-libipa_hbac-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">0808c4db06094bccf2f6a291e0b10888f094e365d07c62b724eadb1690e48691</sum></package><package arch="x86_64" name="libipa_hbac" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libipa_hbac-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">54f173a067e17fc2c6f4cf9e9e303edd3690852ecef4a3b93511327b438ec304</sum></package><package arch="i686" name="libsss_idmap-devel" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libsss_idmap-devel-1.14.0-43.el7.i686.rpm</filename><sum type="sha256">982060a96a581a3208b4f3f269ba5958399c827253adce880e966d113d6bb9a1</sum></package><package arch="x86_64" name="python-sss-murmur" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>python-sss-murmur-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">6c51736ce02f0fc8094059bae54e26cb15cbf372960bcee65bcbfde706b8b492</sum></package><package arch="x86_64" name="sssd-tools" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-tools-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">27851044de0b89bdcff0bd37f64608e98d5813ee7415b231826eefb39b761b30</sum></package><package arch="x86_64" name="python-sss" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>python-sss-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">56b3934b4a98de928d3dcd5f09ca70a90013aa86c7a95ed3d2c03f30defa6d12</sum></package><package arch="x86_64" name="sssd-krb5" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-krb5-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">19558f18c6829c300e203aaa0857b74af40d3681be759b284a97cfa019b4cdd5</sum></package><package arch="x86_64" name="sssd-common" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-common-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">99d2d580ca0b85f0b5ef3509e561486080856e31c6f4855a9f41661392a26c39</sum></package><package arch="i686" name="sssd-common" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-common-1.14.0-43.el7.i686.rpm</filename><sum type="sha256">ccdf512a8660413d7664cbd79ea23c8d1d87a5991587bd55ee977e81cc1c0aa2</sum></package><package arch="x86_64" name="libsss_sudo" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libsss_sudo-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">a34bd2c7c6b4797cc7eb70a845a4dbc79216de697935f9af7f4d9284870119f1</sum></package><package arch="i686" name="sssd-client" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-client-1.14.0-43.el7.i686.rpm</filename><sum type="sha256">21db77faa42f6242e6ac706a5750aa81b0736dabb7f064c255e6283ed93a03fa</sum></package><package arch="x86_64" name="sssd-libwbclient" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-libwbclient-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">6f7f76874a1c1eb67dea2f8b72eadd05d5536a0d8dfa55075f1ce8defd8ebfec</sum></package><package arch="x86_64" name="libsss_nss_idmap" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libsss_nss_idmap-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">f8057ae1aa07c983a83802eeec8e76861bdbf94f23b24880ea07904850cba79a</sum></package><package arch="x86_64" name="libsss_nss_idmap-devel" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libsss_nss_idmap-devel-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">9ca7c3187d4c90b358b23faae1642ada75fae88a0c029f9bdb4ff4e638e14223</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libsss_idmap-devel-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">2bfa7dfcbce4dc7287c25bec5170fc779a7834e29049f1de7a3587c361885c2d</sum></package><package arch="i686" name="libsss_idmap" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libsss_idmap-1.14.0-43.el7.i686.rpm</filename><sum type="sha256">a55f55f8020bdeace5f72dc2368a688d975b417df4bf0c00796181dd69d53505</sum></package><package arch="x86_64" name="sssd-winbind-idmap" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-winbind-idmap-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">cfbe7221b4e5c08e532af82661ca91c047a28884c21390a4f441f4e45a2a4265</sum></package><package arch="x86_64" name="sssd-dbus" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>sssd-dbus-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">deca238d335191885d70e053cb7bf3044a7c8dfb53b76453b826d67e320f9134</sum></package><package arch="x86_64" name="libsss_idmap" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libsss_idmap-1.14.0-43.el7.x86_64.rpm</filename><sum type="sha256">2a0a52bfbdad44a48aa2e31317333a424beac04fc78249307c3951a181ff0d83</sum></package><package arch="i686" name="libsss_simpleifp-devel" release="43.el7" src="sssd-1.14.0-43.el7.src.rpm" version="1.14.0"><filename>libsss_simpleifp-devel-1.14.0-43.el7.i686.rpm</filename><sum type="sha256">bfe3e6a2962f8c573b96f5299f652c37e349e7724c3a82558bae183f37f26fa6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2476" id="RHEA-2016:2476-1" title="Rhea-2016:2476-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2480-1</id><title>Ding-Libs Bug Fix Update</title><description>The ding-libs packages contain a set of libraries used by the System Security Services Daemon (SSSD) as well as other projects, and provide functions to manipulate file system path names (libpath_utils), a hash table to manage storage and access time properties (libdhash), a data type to collect data in a hierarchical structure (libcollection), a dynamically growing, reference-counted array (libref_array), and a library to process configuration files in initialization format (INI) into a library collection data structure (libini_config).</description><release>Scientific Linux</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libdhash" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.4.3"><filename>libdhash-0.4.3-27.el7.i686.rpm</filename><sum type="sha256">098acabec03af9e79daafbb0466b499c2ff96e0b0629bf45bb55f525f4f1bb4c</sum></package><package arch="i686" name="libbasicobjects" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.1.1"><filename>libbasicobjects-0.1.1-27.el7.i686.rpm</filename><sum type="sha256">0139d332d6cacb123cc2fb2cd5c6b045770baf2d520879c0e413f829f11b1905</sum></package><package arch="i686" name="libref_array" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.1.5"><filename>libref_array-0.1.5-27.el7.i686.rpm</filename><sum type="sha256">c50e99ba95df5d8088cbc70adfc21c1a2b114fe9ad18d0376f37f83ec29f4395</sum></package><package arch="i686" name="libdhash-devel" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.4.3"><filename>libdhash-devel-0.4.3-27.el7.i686.rpm</filename><sum type="sha256">3cd6e7e3b85178336dd1299feacdc2846489e99fff411c3f087c7026eb6ca938</sum></package><package arch="x86_64" name="libbasicobjects" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.1.1"><filename>libbasicobjects-0.1.1-27.el7.x86_64.rpm</filename><sum type="sha256">4bd12cede502d58d4e813ef707f42bd69c46dca3c560a24c270fb06657ce8cb3</sum></package><package arch="i686" name="libref_array-devel" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.1.5"><filename>libref_array-devel-0.1.5-27.el7.i686.rpm</filename><sum type="sha256">673978478a633fb4759563bfe1fb1f4a03795f164b768cbd8e712098a3a8c3d3</sum></package><package arch="x86_64" name="libcollection" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.6.2"><filename>libcollection-0.6.2-27.el7.x86_64.rpm</filename><sum type="sha256">6ba902e9e3d86d0d00e6738a3bcfb64f22b28cad169119a610657bdca99a2508</sum></package><package arch="x86_64" name="libcollection-devel" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.6.2"><filename>libcollection-devel-0.6.2-27.el7.x86_64.rpm</filename><sum type="sha256">78aabc6c50331c144133cf53eb5e7b4c1c0ff42f485c657071b1d9651637b7e8</sum></package><package arch="i686" name="libpath_utils-devel" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.2.1"><filename>libpath_utils-devel-0.2.1-27.el7.i686.rpm</filename><sum type="sha256">6cd15d073ef45c642583ee02afb1480d2bba070514332b19dea042616adc0421</sum></package><package arch="x86_64" name="libdhash" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.4.3"><filename>libdhash-0.4.3-27.el7.x86_64.rpm</filename><sum type="sha256">8abcef83b694fb95a912d37c1b8adb9bfca361d8e89263e44e9dcb0e6794aac0</sum></package><package arch="i686" name="libcollection" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.6.2"><filename>libcollection-0.6.2-27.el7.i686.rpm</filename><sum type="sha256">9739455f6ca16e4adc9664d232b022466c277a04614ffc2718b29623a814fe7e</sum></package><package arch="i686" name="libini_config" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="1.3.0"><filename>libini_config-1.3.0-27.el7.i686.rpm</filename><sum type="sha256">5e713ea7050c85bdce97edf80de15dc34f6628438242fa60588798e205864c6b</sum></package><package arch="x86_64" name="libref_array-devel" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.1.5"><filename>libref_array-devel-0.1.5-27.el7.x86_64.rpm</filename><sum type="sha256">73afebbf855e7f613d44d140e1fe28efd63cedca165d840cd476cd18cb573dc9</sum></package><package arch="x86_64" name="libini_config-devel" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="1.3.0"><filename>libini_config-devel-1.3.0-27.el7.x86_64.rpm</filename><sum type="sha256">1c5a6d8c1213957a8e1cfc6c0fed07b251f23ced9d1e91cd938720d7947f512f</sum></package><package arch="i686" name="libcollection-devel" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.6.2"><filename>libcollection-devel-0.6.2-27.el7.i686.rpm</filename><sum type="sha256">a621ec9ac3c2d73edbe6feb60947ba445a1ceae2e81fc19a5eaeca3bbd69fcbb</sum></package><package arch="i686" name="libbasicobjects-devel" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.1.1"><filename>libbasicobjects-devel-0.1.1-27.el7.i686.rpm</filename><sum type="sha256">d999c0c2badee315f465e28ef28319bc16f5e88310a0797267e763efe7cc096d</sum></package><package arch="x86_64" name="libdhash-devel" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.4.3"><filename>libdhash-devel-0.4.3-27.el7.x86_64.rpm</filename><sum type="sha256">6180c5023e898034b37efb97ee2d47aed0cdf13fe62be17b01670de03728c716</sum></package><package arch="i686" name="libini_config-devel" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="1.3.0"><filename>libini_config-devel-1.3.0-27.el7.i686.rpm</filename><sum type="sha256">70bfb0a216b568900857793ffabc6b45579b5f2bed5bd8836463133cb5bcc9d1</sum></package><package arch="x86_64" name="libbasicobjects-devel" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.1.1"><filename>libbasicobjects-devel-0.1.1-27.el7.x86_64.rpm</filename><sum type="sha256">60d0187b72d346e471e600bbe24a067258f5715419b2b21452f910fabcd6dbce</sum></package><package arch="x86_64" name="libpath_utils" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.2.1"><filename>libpath_utils-0.2.1-27.el7.x86_64.rpm</filename><sum type="sha256">2421769f99fb2457776900f294fec8dc3a2fecc003a834da23d88dda7b629b57</sum></package><package arch="i686" name="libpath_utils" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.2.1"><filename>libpath_utils-0.2.1-27.el7.i686.rpm</filename><sum type="sha256">858da316f498590acb19f5ec7ebf5cc8ac095a9a260bba7d0abe2ca8d350acf1</sum></package><package arch="x86_64" name="libini_config" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="1.3.0"><filename>libini_config-1.3.0-27.el7.x86_64.rpm</filename><sum type="sha256">64a59ee1edf62ab0c50f24b0e41babdd6987ec7b149646613111c6bf7d2237a2</sum></package><package arch="x86_64" name="libpath_utils-devel" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.2.1"><filename>libpath_utils-devel-0.2.1-27.el7.x86_64.rpm</filename><sum type="sha256">9bc2ce6feedeabc3a30ddc77e6d6ebc9d0d1255e597387f1601bdecd77c3b10f</sum></package><package arch="x86_64" name="libref_array" release="27.el7" src="ding-libs-0.6.0-27.el7.src.rpm" version="0.1.5"><filename>libref_array-0.1.5-27.el7.x86_64.rpm</filename><sum type="sha256">79cd150ef9965fdf70373c8518081054ff42b5ad2710ee6fa6a0db1334614a77</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2480" id="RHEA-2016:2480-1" title="Rhea-2016:2480-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2495-1</id><title>Pciutils Bug Fix And Enhancement Update</title><description>The pciutils packages provide various utilities for inspecting and manipulating devices connected to the PCI bus.</description><release>Scientific Linux</release><issued date="2016-11-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pciutils-devel" release="1.el7" src="pciutils-3.5.1-1.el7.src.rpm" version="3.5.1"><filename>pciutils-devel-3.5.1-1.el7.x86_64.rpm</filename><sum type="sha256">a19de6079f6a64c8c7a0acd1959354ec10fdaa9da46754f34fccdfe70ed48932</sum></package><package arch="i686" name="pciutils-devel" release="1.el7" src="pciutils-3.5.1-1.el7.src.rpm" version="3.5.1"><filename>pciutils-devel-3.5.1-1.el7.i686.rpm</filename><sum type="sha256">75d80640cc78873356d94756d63fb0e4d9238b5cf05bb4e73fd1158a258adee6</sum></package><package arch="x86_64" name="pciutils-libs" release="1.el7" src="pciutils-3.5.1-1.el7.src.rpm" version="3.5.1"><filename>pciutils-libs-3.5.1-1.el7.x86_64.rpm</filename><sum type="sha256">cb624ffc7e062a21c12fbdcc477abda2dbe98bbfc34f2a3fddebb14cc589513a</sum></package><package arch="x86_64" name="pciutils" release="1.el7" src="pciutils-3.5.1-1.el7.src.rpm" version="3.5.1"><filename>pciutils-3.5.1-1.el7.x86_64.rpm</filename><sum type="sha256">a5353df28610f5e4ec94f77a26dcf7a9150fcfd789b5eb53b4a3f675f67f44e2</sum></package><package arch="x86_64" name="pciutils-devel-static" release="1.el7" src="pciutils-3.5.1-1.el7.src.rpm" version="3.5.1"><filename>pciutils-devel-static-3.5.1-1.el7.x86_64.rpm</filename><sum type="sha256">b2a3a30407d18fdcc9484a340ab30c7729a2ee71fe5bcd734e8b8ef9ae39ea35</sum></package><package arch="i686" name="pciutils-libs" release="1.el7" src="pciutils-3.5.1-1.el7.src.rpm" version="3.5.1"><filename>pciutils-libs-3.5.1-1.el7.i686.rpm</filename><sum type="sha256">1d641da4d32f099c7e2e808a7c5eddfc8718bdfe10e79b5cf968c7895663032c</sum></package><package arch="i686" name="pciutils-devel-static" release="1.el7" src="pciutils-3.5.1-1.el7.src.rpm" version="3.5.1"><filename>pciutils-devel-static-3.5.1-1.el7.i686.rpm</filename><sum type="sha256">8b6802d6ca054680018acd7127a41f2ecf581259bd1fee9ed5dd33172f74871f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2495" id="RHEA-2016:2495-1" title="Rhea-2016:2495-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2517-1</id><title>Python-Urlgrabber Bug Fix Update</title><description>The python-urlgrabber package provides a high-level cross-protocol url- grabber for the Python programming language. The url-grabber allows Python scripts to fetch data using the HTTP and FTP protocols, as well as from a local file system.</description><release>Scientific Linux</release><issued date="2017-01-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-urlgrabber" release="8.el7" src="python-urlgrabber-3.10-8.el7.src.rpm" version="3.10"><filename>python-urlgrabber-3.10-8.el7.noarch.rpm</filename><sum type="sha256">2c5a6b9f899df456b64a1a404f5fb3aedba2e350a725be3b575799b0eee6fb63</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2517" id="RHEA-2016:2517-1" title="Rhea-2016:2517-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2016:2832-1</id><title>Tzdata Bug Fix And Enhancement Update</title><description>The tzdata packages have been updated as follows:

* The Saratov region of Russia will transition from UTC+03 to UTC+04 on 2016-12-04, resulting in a new time zone Europe/Saratov.</description><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2016j-1.el7.src.rpm" version="2016j"><filename>tzdata-2016j-1.el7.noarch.rpm</filename><sum type="sha256">9c102631c626277847fb8718a7ec0aa2744a43d542caa8276f343a42376c9531</sum></package><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2016j-1.el7.src.rpm" version="2016j"><filename>tzdata-java-2016j-1.el7.noarch.rpm</filename><sum type="sha256">0cd13356c72d1b545a8224ca3bc02cd15a839c8f413dc08bcaa8302c96da2c7a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2016:2832" id="RHEA-2016:2832-1" title="Rhea-2016:2832-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398363" id="1398363" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398364" id="1398364" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398378" id="1398378" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398379" id="1398379" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:0460-1</id><title>Nspr, Nss-Util, And Nss Bug Fix And Enhancement Update</title><description>The following packages have been updated to the latest upstream versions: nspr (4.13.1), nss-util (3.28.2), nss (3.28.2). This provides a number of bug fixes and enhancements over the previous versions. Notable enhancements include: 
* The NSPR and NSS-UTIL libraries now provide new utility functions. In addition, the libraries have received a variety of bug fixes, including several thread safety problems. * The Next Protocol Negotiation (NPN) extension in NSS has been replaced by the Application-Layer Protocol Negotiation (ALPN) extension. * NSS now supports the Finite Field Diffie-Hellman Ephemeral Parameters (FFDHE) negotiation.</description><release>Scientific Linux</release><issued date="2017-03-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-sysinit" release="1.6.el7_3" src="nss-3.28.2-1.6.el7_3.src.rpm" version="3.28.2"><filename>nss-sysinit-3.28.2-1.6.el7_3.x86_64.rpm</filename><sum type="sha256">8797b182e8616aede791f61737eb30aeb78bd7622ab58c73ce19f64c89c3fb54</sum></package><package arch="i686" name="nss-util" release="1.1.el7_3" src="nss-util-3.28.2-1.1.el7_3.src.rpm" version="3.28.2"><filename>nss-util-3.28.2-1.1.el7_3.i686.rpm</filename><sum type="sha256">d99ccebb61e69ef3d6bee6200e3343b3885c5ceb18975d006f88822573bb6219</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="1.6.el7_3" src="nss-3.28.2-1.6.el7_3.src.rpm" version="3.28.2"><filename>nss-pkcs11-devel-3.28.2-1.6.el7_3.x86_64.rpm</filename><sum type="sha256">57cc55cb917446a838bb243a2c53b0e9183b5d50ed83a7af02fe8c1db147cf0f</sum></package><package arch="x86_64" name="nss-util" release="1.1.el7_3" src="nss-util-3.28.2-1.1.el7_3.src.rpm" version="3.28.2"><filename>nss-util-3.28.2-1.1.el7_3.x86_64.rpm</filename><sum type="sha256">fe55e27d249849944d499983d6040c248df7b6e34c64903a813ac258a9efcfcd</sum></package><package arch="i686" name="nss-pkcs11-devel" release="1.6.el7_3" src="nss-3.28.2-1.6.el7_3.src.rpm" version="3.28.2"><filename>nss-pkcs11-devel-3.28.2-1.6.el7_3.i686.rpm</filename><sum type="sha256">fde60fc326a8c47150d5300383b56467292f713b596279170f040081100001cb</sum></package><package arch="x86_64" name="nss-util-devel" release="1.1.el7_3" src="nss-util-3.28.2-1.1.el7_3.src.rpm" version="3.28.2"><filename>nss-util-devel-3.28.2-1.1.el7_3.x86_64.rpm</filename><sum type="sha256">26abdbfb8bfdf5ef344b04c2cdb14949893f789b9187e125f23b460e15bc3a41</sum></package><package arch="x86_64" name="nss-devel" release="1.6.el7_3" src="nss-3.28.2-1.6.el7_3.src.rpm" version="3.28.2"><filename>nss-devel-3.28.2-1.6.el7_3.x86_64.rpm</filename><sum type="sha256">55d57bff753161dd3667680e1a43d6c057144b90cbb52347d7f0e781e0c8c6d8</sum></package><package arch="i686" name="nspr" release="1.0.el7_3" src="nspr-4.13.1-1.0.el7_3.src.rpm" version="4.13.1"><filename>nspr-4.13.1-1.0.el7_3.i686.rpm</filename><sum type="sha256">76fe09e6e808fef8c300870a609ae25a7c241622f3a51f73c6bcf08fc64b63a5</sum></package><package arch="x86_64" name="nspr" release="1.0.el7_3" src="nspr-4.13.1-1.0.el7_3.src.rpm" version="4.13.1"><filename>nspr-4.13.1-1.0.el7_3.x86_64.rpm</filename><sum type="sha256">3c93f030aa7e3d2c9ef0eba88ef611f4a1689c4b8901b131ebb16b4f658d07e1</sum></package><package arch="x86_64" name="nss-tools" release="1.6.el7_3" src="nss-3.28.2-1.6.el7_3.src.rpm" version="3.28.2"><filename>nss-tools-3.28.2-1.6.el7_3.x86_64.rpm</filename><sum type="sha256">a44d06ad9a57a0add259dc9da65d4f616cd95ca604b88de30b007c6d721bb24f</sum></package><package arch="i686" name="nspr-devel" release="1.0.el7_3" src="nspr-4.13.1-1.0.el7_3.src.rpm" version="4.13.1"><filename>nspr-devel-4.13.1-1.0.el7_3.i686.rpm</filename><sum type="sha256">13d1674e0ceae896f31c9370f52ff8319e48c40fbe69bc25dedd5185a1022b1f</sum></package><package arch="i686" name="nss-util-devel" release="1.1.el7_3" src="nss-util-3.28.2-1.1.el7_3.src.rpm" version="3.28.2"><filename>nss-util-devel-3.28.2-1.1.el7_3.i686.rpm</filename><sum type="sha256">9ffa719f7de6b798655bff1126bd3c77c79bbf4bc316931caefe7efd7c712ffc</sum></package><package arch="i686" name="nss-devel" release="1.6.el7_3" src="nss-3.28.2-1.6.el7_3.src.rpm" version="3.28.2"><filename>nss-devel-3.28.2-1.6.el7_3.i686.rpm</filename><sum type="sha256">ae51deb6b36df9df98e7f2056342db3ad0e03bc842d4d4c03e3530ba8dd30ccf</sum></package><package arch="x86_64" name="nss" release="1.6.el7_3" src="nss-3.28.2-1.6.el7_3.src.rpm" version="3.28.2"><filename>nss-3.28.2-1.6.el7_3.x86_64.rpm</filename><sum type="sha256">133bda80c37fc25b60a513031081d50f05ea34c3fb27780441c018ab25fe32f2</sum></package><package arch="x86_64" name="nspr-devel" release="1.0.el7_3" src="nspr-4.13.1-1.0.el7_3.src.rpm" version="4.13.1"><filename>nspr-devel-4.13.1-1.0.el7_3.x86_64.rpm</filename><sum type="sha256">f91ed4928e1dc6004a2e6a6f3126a7c02642bd5c8b2dec6a4b7b0d7b7bd5eeac</sum></package><package arch="i686" name="nss" release="1.6.el7_3" src="nss-3.28.2-1.6.el7_3.src.rpm" version="3.28.2"><filename>nss-3.28.2-1.6.el7_3.i686.rpm</filename><sum type="sha256">50c9adc5bef2c3cec5b4292e6eb7bedc8c162f967528e3a6690c0572e6d53d25</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:0460" id="RHEA-2017:0460-1" title="Rhea-2017:0460-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1421153" id="1421153" title="Rebase Nspr In Rhel 7.3.Z To The Version Required By Firefox 52" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1421157" id="1421157" title="Rebase Nss-Util In Rhel 7.3.Z To The Version Required By Firefox 52" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1421180" id="1421180" title="Rebase Nss In Rhel 7.3.Z To The Version Required By Firefox 52" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:1938-1</id><title>Gnome-Common, Autoconf-Archive Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="gnome-common" release="1.el7" src="gnome-common-3.18.0-1.el7.src.rpm" version="3.18.0"><filename>gnome-common-3.18.0-1.el7.noarch.rpm</filename><sum type="sha256">702f6c5545fc986b2044fa804eb5be3d4768da112e39f1b850391aad07f7150e</sum></package><package arch="noarch" name="autoconf-archive" release="1.el7" src="autoconf-archive-2017.03.21-1.el7.src.rpm" version="2017.03.21"><filename>autoconf-archive-2017.03.21-1.el7.noarch.rpm</filename><sum type="sha256">60c0626b835e46678fc8160a16b2fe91ffee8a36097e698dddf322a5456d5848</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:1938" id="RHEA-2017:1938-1" title="Rhea-2017:1938-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:1940-1</id><title>Yelp-Tools, Mallard-Rng Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-09-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="mallard-rng" release="1.el7" src="mallard-rng-1.0.2-1.el7.src.rpm" version="1.0.2"><filename>mallard-rng-1.0.2-1.el7.noarch.rpm</filename><sum type="sha256">dac43d4a420b81aab823be82e7d98a84b87a7a69837b0e53ada75ae0e78fec02</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:1940" id="RHEA-2017:1940-1" title="Rhea-2017:1940-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:1946-1</id><title>Libtalloc Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libtalloc-devel" release="1.el7" src="libtalloc-2.1.9-1.el7.src.rpm" version="2.1.9"><filename>libtalloc-devel-2.1.9-1.el7.x86_64.rpm</filename><sum type="sha256">b3cf509b7106e841cecd51724fa89aad390ea5a2ca679f2082e7ccccf57cd43d</sum></package><package arch="i686" name="pytalloc" release="1.el7" src="libtalloc-2.1.9-1.el7.src.rpm" version="2.1.9"><filename>pytalloc-2.1.9-1.el7.i686.rpm</filename><sum type="sha256">748dc51aafd6f90208e601975935a02076adcfe8c40d73723bde583e96981651</sum></package><package arch="x86_64" name="libtalloc" release="1.el7" src="libtalloc-2.1.9-1.el7.src.rpm" version="2.1.9"><filename>libtalloc-2.1.9-1.el7.x86_64.rpm</filename><sum type="sha256">54d551d2ef7255c423393cb709f9e7a903a63d9dd6bbfb9f713ce62960d54ff0</sum></package><package arch="i686" name="libtalloc-devel" release="1.el7" src="libtalloc-2.1.9-1.el7.src.rpm" version="2.1.9"><filename>libtalloc-devel-2.1.9-1.el7.i686.rpm</filename><sum type="sha256">e7d6a39c91720a0f64cfd5d5ebb6e65bc9b246500cd45e1f5f4dfd15fece4ecd</sum></package><package arch="x86_64" name="pytalloc" release="1.el7" src="libtalloc-2.1.9-1.el7.src.rpm" version="2.1.9"><filename>pytalloc-2.1.9-1.el7.x86_64.rpm</filename><sum type="sha256">39e1a43b0f7b789b08780da66a917509a1d5bf47c03567ef474aa33a11d40e0f</sum></package><package arch="x86_64" name="pytalloc-devel" release="1.el7" src="libtalloc-2.1.9-1.el7.src.rpm" version="2.1.9"><filename>pytalloc-devel-2.1.9-1.el7.x86_64.rpm</filename><sum type="sha256">724f0bca7fd88a9d54dea094397a66fc6977d8d8a84c083de1acbb1fce65478e</sum></package><package arch="i686" name="libtalloc" release="1.el7" src="libtalloc-2.1.9-1.el7.src.rpm" version="2.1.9"><filename>libtalloc-2.1.9-1.el7.i686.rpm</filename><sum type="sha256">e0d1ea5410e81aac8da07ae928e8c0567a48a6731df1efa787a8b4a83f757c92</sum></package><package arch="i686" name="pytalloc-devel" release="1.el7" src="libtalloc-2.1.9-1.el7.src.rpm" version="2.1.9"><filename>pytalloc-devel-2.1.9-1.el7.i686.rpm</filename><sum type="sha256">f7f182471ad7b4d1bb1e4fb2fa072f95eb883fbaff7686e0812f9f321981e8dd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:1946" id="RHEA-2017:1946-1" title="Rhea-2017:1946-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:1947-1</id><title>Libtevent Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libtevent" release="1.el7" src="libtevent-0.9.31-1.el7.src.rpm" version="0.9.31"><filename>libtevent-0.9.31-1.el7.x86_64.rpm</filename><sum type="sha256">b70420c3c455ce0905e0625ecc78e299d2a27ab2bfd3bfaec96d8cf1f54063a1</sum></package><package arch="i686" name="libtevent-devel" release="1.el7" src="libtevent-0.9.31-1.el7.src.rpm" version="0.9.31"><filename>libtevent-devel-0.9.31-1.el7.i686.rpm</filename><sum type="sha256">dc94c5b9ad90d5ef78c050e723a5610a48b7eebcfd44acaeb2f36095e7bd3f6a</sum></package><package arch="i686" name="libtevent" release="1.el7" src="libtevent-0.9.31-1.el7.src.rpm" version="0.9.31"><filename>libtevent-0.9.31-1.el7.i686.rpm</filename><sum type="sha256">90e3c502a221627688ccb938c24cc32acd6df1be4ae5ae39a19d3b741b49706a</sum></package><package arch="x86_64" name="libtevent-devel" release="1.el7" src="libtevent-0.9.31-1.el7.src.rpm" version="0.9.31"><filename>libtevent-devel-0.9.31-1.el7.x86_64.rpm</filename><sum type="sha256">365bc96ef3bdd9e5f87aca151907b0d09e0c20e60c04aa0d1e5d6c69e80a92b7</sum></package><package arch="x86_64" name="python-tevent" release="1.el7" src="libtevent-0.9.31-1.el7.src.rpm" version="0.9.31"><filename>python-tevent-0.9.31-1.el7.x86_64.rpm</filename><sum type="sha256">a59ef00f928f0f2a53c9c819f5ad7534990021d4ccf66659096c9aca75b1c0a1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:1947" id="RHEA-2017:1947-1" title="Rhea-2017:1947-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:1948-1</id><title>Libtdb Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-tdb" release="2.el7" src="libtdb-1.3.12-2.el7.src.rpm" version="1.3.12"><filename>python-tdb-1.3.12-2.el7.x86_64.rpm</filename><sum type="sha256">fb4e602acd4e0bef7c89f2d42ed5180e6d69be4cb77a60d3dbb71ef875ab7ef9</sum></package><package arch="i686" name="python-tdb" release="2.el7" src="libtdb-1.3.12-2.el7.src.rpm" version="1.3.12"><filename>python-tdb-1.3.12-2.el7.i686.rpm</filename><sum type="sha256">41e1eb80a525958cc9f6744e1a0a61fbbc6095515390fb009705373dbdad8a24</sum></package><package arch="x86_64" name="tdb-tools" release="2.el7" src="libtdb-1.3.12-2.el7.src.rpm" version="1.3.12"><filename>tdb-tools-1.3.12-2.el7.x86_64.rpm</filename><sum type="sha256">8a0d839259ce12c40d3fd3fd1ad7be2b1c8885a51b9783ed0df1ff6a7e074ad7</sum></package><package arch="x86_64" name="libtdb-devel" release="2.el7" src="libtdb-1.3.12-2.el7.src.rpm" version="1.3.12"><filename>libtdb-devel-1.3.12-2.el7.x86_64.rpm</filename><sum type="sha256">629f4ca8a865ae6b8b8558f53efd83ef482797101452720e935a50e56cf17b9f</sum></package><package arch="x86_64" name="libtdb" release="2.el7" src="libtdb-1.3.12-2.el7.src.rpm" version="1.3.12"><filename>libtdb-1.3.12-2.el7.x86_64.rpm</filename><sum type="sha256">a777dc194db46b9900439906a4fda5a08f43592458ac77d0f0f3994290e80332</sum></package><package arch="i686" name="libtdb-devel" release="2.el7" src="libtdb-1.3.12-2.el7.src.rpm" version="1.3.12"><filename>libtdb-devel-1.3.12-2.el7.i686.rpm</filename><sum type="sha256">bd0ddb3f1cdd377ad6263122bb66fe5af370f745e49d11b4f6d98ac0ad3dc0f7</sum></package><package arch="i686" name="libtdb" release="2.el7" src="libtdb-1.3.12-2.el7.src.rpm" version="1.3.12"><filename>libtdb-1.3.12-2.el7.i686.rpm</filename><sum type="sha256">0af73ffa6611695831a95c69643e2b9849250f31c3a551077fe5d10e75692d1f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:1948" id="RHEA-2017:1948-1" title="Rhea-2017:1948-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:1949-1</id><title>Libldb Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libldb" release="1.el7" src="libldb-1.1.29-1.el7.src.rpm" version="1.1.29"><filename>libldb-1.1.29-1.el7.x86_64.rpm</filename><sum type="sha256">69cb1784c5a32eb0e14ce322b4405f5d253a4999f643b2a9e955b8d2f3b5c10d</sum></package><package arch="i686" name="pyldb-devel" release="1.el7" src="libldb-1.1.29-1.el7.src.rpm" version="1.1.29"><filename>pyldb-devel-1.1.29-1.el7.i686.rpm</filename><sum type="sha256">01954de797945fc048d8557aca98a41fcb5eaf6bb09fad3df2094d795b1dc0bf</sum></package><package arch="x86_64" name="pyldb" release="1.el7" src="libldb-1.1.29-1.el7.src.rpm" version="1.1.29"><filename>pyldb-1.1.29-1.el7.x86_64.rpm</filename><sum type="sha256">4122261089a23ec0c944174d29ceba75601de87c7e03d5a401b4f9affe4587bd</sum></package><package arch="x86_64" name="pyldb-devel" release="1.el7" src="libldb-1.1.29-1.el7.src.rpm" version="1.1.29"><filename>pyldb-devel-1.1.29-1.el7.x86_64.rpm</filename><sum type="sha256">5c38bb198dd900702bba37ea1f38a8baf56d543a22aecb72a2437d64246ee3ee</sum></package><package arch="i686" name="libldb-devel" release="1.el7" src="libldb-1.1.29-1.el7.src.rpm" version="1.1.29"><filename>libldb-devel-1.1.29-1.el7.i686.rpm</filename><sum type="sha256">783f8d49534886d1a6b899208c820f7a3210f809ca91495aee0942032743992a</sum></package><package arch="i686" name="libldb" release="1.el7" src="libldb-1.1.29-1.el7.src.rpm" version="1.1.29"><filename>libldb-1.1.29-1.el7.i686.rpm</filename><sum type="sha256">6f96cd00c29a8ead672729f89498b2b913b83293350dfc69dc5a162012164f7b</sum></package><package arch="i686" name="pyldb" release="1.el7" src="libldb-1.1.29-1.el7.src.rpm" version="1.1.29"><filename>pyldb-1.1.29-1.el7.i686.rpm</filename><sum type="sha256">443fb09c3bea7affa5d0443c5552b39627462742ef36cc23489bb6687458aa10</sum></package><package arch="x86_64" name="libldb-devel" release="1.el7" src="libldb-1.1.29-1.el7.src.rpm" version="1.1.29"><filename>libldb-devel-1.1.29-1.el7.x86_64.rpm</filename><sum type="sha256">8f4d75aac60884ec7fe4fe9f70486c37841e503816b9cf04613f83f6c29b458d</sum></package><package arch="x86_64" name="ldb-tools" release="1.el7" src="libldb-1.1.29-1.el7.src.rpm" version="1.1.29"><filename>ldb-tools-1.1.29-1.el7.x86_64.rpm</filename><sum type="sha256">24a5817f6965eb6dfeb552922798fa819e3149d1bc9a53a90974de90483f7427</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:1949" id="RHEA-2017:1949-1" title="Rhea-2017:1949-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:1977-1</id><title>Nss Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="nss" release="8.el7" src="nss-3.28.4-8.el7.src.rpm" version="3.28.4"><filename>nss-3.28.4-8.el7.i686.rpm</filename><sum type="sha256">4ceecc4a0759a4f6776643b58c7d9e43e34e267f0de9d41b4208a008082afb89</sum></package><package arch="i686" name="nss-devel" release="8.el7" src="nss-3.28.4-8.el7.src.rpm" version="3.28.4"><filename>nss-devel-3.28.4-8.el7.i686.rpm</filename><sum type="sha256">99f7dab2b2620fc3c938a5b3e81fc529161a40d9991ea69bc54a692729dedf7c</sum></package><package arch="i686" name="nss-util" release="3.el7" src="nss-util-3.28.4-3.el7.src.rpm" version="3.28.4"><filename>nss-util-3.28.4-3.el7.i686.rpm</filename><sum type="sha256">17a33f9e6461b03b1929fe5c058ae8eb86695983cf929d035a699703a5181597</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="8.el7" src="nss-3.28.4-8.el7.src.rpm" version="3.28.4"><filename>nss-pkcs11-devel-3.28.4-8.el7.x86_64.rpm</filename><sum type="sha256">859e47e3024d8d13a033339aedc4bc63294622e3e4ad5dfa3d308dbb7c27343f</sum></package><package arch="x86_64" name="nss-devel" release="8.el7" src="nss-3.28.4-8.el7.src.rpm" version="3.28.4"><filename>nss-devel-3.28.4-8.el7.x86_64.rpm</filename><sum type="sha256">e41935e9e3b5b8bffcf41142406e01cd4ccd72de0702f2c207593bb8118ccceb</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="6.el7" src="nss-softokn-3.28.3-6.el7.src.rpm" version="3.28.3"><filename>nss-softokn-freebl-3.28.3-6.el7.x86_64.rpm</filename><sum type="sha256">1651d922c1e33d7460505b9f5e14ac82a26cd1ddbe8d364157bc80e6d41639bd</sum></package><package arch="x86_64" name="nss-util" release="3.el7" src="nss-util-3.28.4-3.el7.src.rpm" version="3.28.4"><filename>nss-util-3.28.4-3.el7.x86_64.rpm</filename><sum type="sha256">d7296d0efa0c9ffd7b49857180e7cb09c178f24d8f2276c740234165befa58ee</sum></package><package arch="x86_64" name="nss" release="8.el7" src="nss-3.28.4-8.el7.src.rpm" version="3.28.4"><filename>nss-3.28.4-8.el7.x86_64.rpm</filename><sum type="sha256">8b597323f5c1eb4958ec1727013900bea970fa31e3be50179f343ca1bd1cd494</sum></package><package arch="x86_64" name="nss-softokn" release="6.el7" src="nss-softokn-3.28.3-6.el7.src.rpm" version="3.28.3"><filename>nss-softokn-3.28.3-6.el7.x86_64.rpm</filename><sum type="sha256">1a7e03493b41ae027d804aa34146f6f0023b39797dbc77135f66a22c42ebfce7</sum></package><package arch="x86_64" name="nss-pem" release="4.el7" src="nss-pem-1.0.3-4.el7.src.rpm" version="1.0.3"><filename>nss-pem-1.0.3-4.el7.x86_64.rpm</filename><sum type="sha256">0a43845e85059e0589555c830e451c054fb9a4e98011d9985d4391f37e65371f</sum></package><package arch="x86_64" name="nss-tools" release="8.el7" src="nss-3.28.4-8.el7.src.rpm" version="3.28.4"><filename>nss-tools-3.28.4-8.el7.x86_64.rpm</filename><sum type="sha256">97cbff9f71c21dad4b6f5f0c8a7fa686def62d475b481b2fe5b20ec380427454</sum></package><package arch="x86_64" name="nss-util-devel" release="3.el7" src="nss-util-3.28.4-3.el7.src.rpm" version="3.28.4"><filename>nss-util-devel-3.28.4-3.el7.x86_64.rpm</filename><sum type="sha256">be279a36338db0df02a7c33558432cf12485ea6d4a44feeb6840c3a01a8f8a0f</sum></package><package arch="i686" name="nss-softokn-freebl" release="6.el7" src="nss-softokn-3.28.3-6.el7.src.rpm" version="3.28.3"><filename>nss-softokn-freebl-3.28.3-6.el7.i686.rpm</filename><sum type="sha256">fcec52f9e01a916ef04dded0bb4f015635191a2216dd0c7a71c95f3e2b6018b1</sum></package><package arch="i686" name="nss-pkcs11-devel" release="8.el7" src="nss-3.28.4-8.el7.src.rpm" version="3.28.4"><filename>nss-pkcs11-devel-3.28.4-8.el7.i686.rpm</filename><sum type="sha256">3decf5cc9ee3e6ca560d8f0118b784cb5ec2d97cdd90a043794319abc5516e2b</sum></package><package arch="i686" name="nss-util-devel" release="3.el7" src="nss-util-3.28.4-3.el7.src.rpm" version="3.28.4"><filename>nss-util-devel-3.28.4-3.el7.i686.rpm</filename><sum type="sha256">632a013c447ea92bcf799a2c39804148460dbefdccee37a55bb462072771f2ac</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="6.el7" src="nss-softokn-3.28.3-6.el7.src.rpm" version="3.28.3"><filename>nss-softokn-freebl-devel-3.28.3-6.el7.x86_64.rpm</filename><sum type="sha256">32b4a248ce1b843d5ae00602c0d0f9d0548cafdf3fdc8de286305e2e368ad2f3</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="6.el7" src="nss-softokn-3.28.3-6.el7.src.rpm" version="3.28.3"><filename>nss-softokn-freebl-devel-3.28.3-6.el7.i686.rpm</filename><sum type="sha256">c490e18bb43ec569fcac6bcda6f63027965c1c2dd209147824f3f110d25655b3</sum></package><package arch="i686" name="nss-pem" release="4.el7" src="nss-pem-1.0.3-4.el7.src.rpm" version="1.0.3"><filename>nss-pem-1.0.3-4.el7.i686.rpm</filename><sum type="sha256">4caa7a29148aebe88bcfd7e1265fd9305e0609dfc529a40d725bcb56c76ca03e</sum></package><package arch="x86_64" name="nss-softokn-devel" release="6.el7" src="nss-softokn-3.28.3-6.el7.src.rpm" version="3.28.3"><filename>nss-softokn-devel-3.28.3-6.el7.x86_64.rpm</filename><sum type="sha256">180425152b2c56fb7f0718d5c01d0ff298ae03ec9b27920c3e224398b3ef57a4</sum></package><package arch="i686" name="nss-softokn" release="6.el7" src="nss-softokn-3.28.3-6.el7.src.rpm" version="3.28.3"><filename>nss-softokn-3.28.3-6.el7.i686.rpm</filename><sum type="sha256">e8d296e02813d24ed640ae87665a10fc7828146b5c0919937aa42116a67ac530</sum></package><package arch="i686" name="nss-softokn-devel" release="6.el7" src="nss-softokn-3.28.3-6.el7.src.rpm" version="3.28.3"><filename>nss-softokn-devel-3.28.3-6.el7.i686.rpm</filename><sum type="sha256">c2a0795c792b67061443ecfcfa5b74dde0706fcd728cf557001dd12714c0afa0</sum></package><package arch="x86_64" name="nss-sysinit" release="8.el7" src="nss-3.28.4-8.el7.src.rpm" version="3.28.4"><filename>nss-sysinit-3.28.4-8.el7.x86_64.rpm</filename><sum type="sha256">ea78c2cfd9032f3c5f5ab7e83e2093614e8c4e61adfc5f078e82b826f37550c6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:1977" id="RHEA-2017:1977-1" title="Rhea-2017:1977-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:1981-1</id><title>P11-Kit Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="p11-kit-devel" release="3.el7" src="p11-kit-0.23.5-3.el7.src.rpm" version="0.23.5"><filename>p11-kit-devel-0.23.5-3.el7.i686.rpm</filename><sum type="sha256">5cd13449e20a9c18cf2e37126c9ad175f825547ba73f00d63776eb528e8e6912</sum></package><package arch="x86_64" name="p11-kit" release="3.el7" src="p11-kit-0.23.5-3.el7.src.rpm" version="0.23.5"><filename>p11-kit-0.23.5-3.el7.x86_64.rpm</filename><sum type="sha256">8dc8739a4cda3c1b626585a7afa75a3860618937fbab1d2fdbc01429cc0b4b7f</sum></package><package arch="x86_64" name="p11-kit-trust" release="3.el7" src="p11-kit-0.23.5-3.el7.src.rpm" version="0.23.5"><filename>p11-kit-trust-0.23.5-3.el7.x86_64.rpm</filename><sum type="sha256">52caa07848cb5d26e3d997ac3fa9e5b6da457a426f43f920dc8798e68e0da1c6</sum></package><package arch="noarch" name="p11-kit-doc" release="3.el7" src="p11-kit-0.23.5-3.el7.src.rpm" version="0.23.5"><filename>p11-kit-doc-0.23.5-3.el7.noarch.rpm</filename><sum type="sha256">0ad65f7fceff613d3556808dac0909592cc9561246408de76a708dac14787151</sum></package><package arch="x86_64" name="p11-kit-devel" release="3.el7" src="p11-kit-0.23.5-3.el7.src.rpm" version="0.23.5"><filename>p11-kit-devel-0.23.5-3.el7.x86_64.rpm</filename><sum type="sha256">434badbaad17e5d827a9c90f636a3c2ba783d00d74448c19f97e55e2437e47c0</sum></package><package arch="i686" name="p11-kit" release="3.el7" src="p11-kit-0.23.5-3.el7.src.rpm" version="0.23.5"><filename>p11-kit-0.23.5-3.el7.i686.rpm</filename><sum type="sha256">1ba7b67a554d8e58594171bbc6e13ca4253012f44b6af5aaf81f36dae506985f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:1981" id="RHEA-2017:1981-1" title="Rhea-2017:1981-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2025-1</id><title>New Packages: Perl-Perl4-Corelibs</title><description /><release>Scientific Linux</release><issued date="2017-09-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="perl-Perl4-CoreLibs" release="7.el7" src="perl-Perl4-CoreLibs-0.003-7.el7.src.rpm" version="0.003"><filename>perl-Perl4-CoreLibs-0.003-7.el7.noarch.rpm</filename><sum type="sha256">9f0a3e5bff2cc81cd1c4d088d374f6e8fa6b7ce460891cb25c8953ef5264b2ae</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2025" id="RHEA-2017:2025-1" title="Rhea-2017:2025-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2059-1</id><title>Clutter And Cogl Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="cogl-devel" release="1.el7" src="cogl-1.22.2-1.el7.src.rpm" version="1.22.2"><filename>cogl-devel-1.22.2-1.el7.i686.rpm</filename><sum type="sha256">b99ce326ea0948ae2dfc0d12c6196959b4f74736cbe35973856a62052e021eba</sum></package><package arch="i686" name="clutter-gtk" release="1.el7" src="clutter-gtk-1.8.2-1.el7.src.rpm" version="1.8.2"><filename>clutter-gtk-1.8.2-1.el7.i686.rpm</filename><sum type="sha256">fcd8199b11463dba1e698add4e900374c886ac4f9072572b2f8097d68507aa9c</sum></package><package arch="x86_64" name="clutter-devel" release="1.el7" src="clutter-1.26.0-1.el7.src.rpm" version="1.26.0"><filename>clutter-devel-1.26.0-1.el7.x86_64.rpm</filename><sum type="sha256">0a09102218c284a331a61658653d467b2c7b5a131a1062d30b70db6eefdc2843</sum></package><package arch="x86_64" name="clutter" release="1.el7" src="clutter-1.26.0-1.el7.src.rpm" version="1.26.0"><filename>clutter-1.26.0-1.el7.x86_64.rpm</filename><sum type="sha256">2ebfbcb7823c86dae26c741afad31471da0b939a381cf61820642781154c0ada</sum></package><package arch="x86_64" name="clutter-tests" release="1.el7" src="clutter-1.26.0-1.el7.src.rpm" version="1.26.0"><filename>clutter-tests-1.26.0-1.el7.x86_64.rpm</filename><sum type="sha256">a8388d5380543b1f41648ed0fa190d01bf9439a71fabb77d1033797a7b4f1ab1</sum></package><package arch="i686" name="cogl" release="1.el7" src="cogl-1.22.2-1.el7.src.rpm" version="1.22.2"><filename>cogl-1.22.2-1.el7.i686.rpm</filename><sum type="sha256">3f4d39e6987fa83d64b04b50e8f9edbf12817f38d0cd9adaeb7f14662bfd43ca</sum></package><package arch="i686" name="clutter-devel" release="1.el7" src="clutter-1.26.0-1.el7.src.rpm" version="1.26.0"><filename>clutter-devel-1.26.0-1.el7.i686.rpm</filename><sum type="sha256">62ff98f2724abc06caeab7ad19e67dd4c586022147bb4ba8515d6b561b754175</sum></package><package arch="x86_64" name="cogl-devel" release="1.el7" src="cogl-1.22.2-1.el7.src.rpm" version="1.22.2"><filename>cogl-devel-1.22.2-1.el7.x86_64.rpm</filename><sum type="sha256">cd31c99a996faca2d2417987b2901985d852f40aeb7e018bdd95b13a91b24a66</sum></package><package arch="x86_64" name="cogl-tests" release="1.el7" src="cogl-1.22.2-1.el7.src.rpm" version="1.22.2"><filename>cogl-tests-1.22.2-1.el7.x86_64.rpm</filename><sum type="sha256">19958c51ed90327e5ea132d74457cf65271c71e76f87cb2e52393e922881ba04</sum></package><package arch="x86_64" name="clutter-gtk" release="1.el7" src="clutter-gtk-1.8.2-1.el7.src.rpm" version="1.8.2"><filename>clutter-gtk-1.8.2-1.el7.x86_64.rpm</filename><sum type="sha256">f7fe8e32b461cbb8b64afdfe866018bb503ca9a0074d93b41191dcf72ba9da5c</sum></package><package arch="x86_64" name="clutter-doc" release="1.el7" src="clutter-1.26.0-1.el7.src.rpm" version="1.26.0"><filename>clutter-doc-1.26.0-1.el7.x86_64.rpm</filename><sum type="sha256">52bf9f40409fd80c0b802694f41aa51a52c64e233925933738ca72cb3b74c6a7</sum></package><package arch="i686" name="clutter" release="1.el7" src="clutter-1.26.0-1.el7.src.rpm" version="1.26.0"><filename>clutter-1.26.0-1.el7.i686.rpm</filename><sum type="sha256">6bf62067b29d7f406f9aadf4685e459944ee9e04b3efe0ffa6320e41928c9621</sum></package><package arch="x86_64" name="cogl" release="1.el7" src="cogl-1.22.2-1.el7.src.rpm" version="1.22.2"><filename>cogl-1.22.2-1.el7.x86_64.rpm</filename><sum type="sha256">5e6c756c6d84e0754cc9573db343a8f93b60ea384806555f7a714f55741e90d5</sum></package><package arch="i686" name="clutter-gtk-devel" release="1.el7" src="clutter-gtk-1.8.2-1.el7.src.rpm" version="1.8.2"><filename>clutter-gtk-devel-1.8.2-1.el7.i686.rpm</filename><sum type="sha256">442e9ef2e130c845e2749ce14c8f9bd448bc2abbf48129394df79e30b25051fe</sum></package><package arch="x86_64" name="clutter-gtk-devel" release="1.el7" src="clutter-gtk-1.8.2-1.el7.src.rpm" version="1.8.2"><filename>clutter-gtk-devel-1.8.2-1.el7.x86_64.rpm</filename><sum type="sha256">f3a09c1d2c38d459b4ba9971240e1f48447f103104a624bb4e978733aeb1954f</sum></package><package arch="noarch" name="cogl-doc" release="1.el7" src="cogl-1.22.2-1.el7.src.rpm" version="1.22.2"><filename>cogl-doc-1.22.2-1.el7.noarch.rpm</filename><sum type="sha256">c5bfdbff43ada694e36281dde9b3e98dcdcf951424a679bc9d3165a05e63fcb7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2059" id="RHEA-2017:2059-1" title="Rhea-2017:2059-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2071-1</id><title>Mod_Auth_Gssapi Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="mod_auth_gssapi" release="2.el7" src="mod_auth_gssapi-1.5.1-2.el7.src.rpm" version="1.5.1"><filename>mod_auth_gssapi-1.5.1-2.el7.x86_64.rpm</filename><sum type="sha256">c9fc776267cf9add294c7473a32b2ca91afc57b93e71aed622a91f1c95c064af</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2071" id="RHEA-2017:2071-1" title="Rhea-2017:2071-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2074-1</id><title>Libvirt-Glib Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libvirt-gconfig" release="1.el7" src="libvirt-glib-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libvirt-gconfig-1.0.0-1.el7.x86_64.rpm</filename><sum type="sha256">2d253c334cf4e42bac1d61e5e3d47035adc9ee4e5bc52affa6f8f10401fc51e1</sum></package><package arch="x86_64" name="libvirt-glib" release="1.el7" src="libvirt-glib-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libvirt-glib-1.0.0-1.el7.x86_64.rpm</filename><sum type="sha256">fc35c4004deb85c95f917b6473c477881d78cbb44e9bcce51c1698ca2ec7d9dc</sum></package><package arch="x86_64" name="libvirt-gconfig-devel" release="1.el7" src="libvirt-glib-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libvirt-gconfig-devel-1.0.0-1.el7.x86_64.rpm</filename><sum type="sha256">c93f2b5db9b10d6b05d3fe446c6ba841b35da3000d914c4aae5c853c1b3b1763</sum></package><package arch="i686" name="libvirt-gobject-devel" release="1.el7" src="libvirt-glib-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libvirt-gobject-devel-1.0.0-1.el7.i686.rpm</filename><sum type="sha256">aec39cd218ffeae59ad56b3ba46c65d007665c0f2cd11a120b7f2a45f8bd003a</sum></package><package arch="x86_64" name="libvirt-gobject-devel" release="1.el7" src="libvirt-glib-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libvirt-gobject-devel-1.0.0-1.el7.x86_64.rpm</filename><sum type="sha256">544dc8aff9da52f98c9fe11e6f6d0ff0f47f62a94f25cad46a760eef24f821a6</sum></package><package arch="x86_64" name="libvirt-gobject" release="1.el7" src="libvirt-glib-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libvirt-gobject-1.0.0-1.el7.x86_64.rpm</filename><sum type="sha256">f85428717d387c66729f0e10f3cc572f0d8641f3eba33765c977d0d511585c79</sum></package><package arch="i686" name="libvirt-gconfig" release="1.el7" src="libvirt-glib-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libvirt-gconfig-1.0.0-1.el7.i686.rpm</filename><sum type="sha256">d7160bdd0d89d4d7348df12fcc4e000c48c28b5e992bf0e02aa25b2548d4b3a4</sum></package><package arch="i686" name="libvirt-gobject" release="1.el7" src="libvirt-glib-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libvirt-gobject-1.0.0-1.el7.i686.rpm</filename><sum type="sha256">f791ee526ca5b26edaa489e15e5ed54f4e4ba30907910787fa061019e2bf4973</sum></package><package arch="i686" name="libvirt-glib-devel" release="1.el7" src="libvirt-glib-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libvirt-glib-devel-1.0.0-1.el7.i686.rpm</filename><sum type="sha256">22a102fb63e123e6382812aff53ea467c1b46530cd224118928b54f243f45230</sum></package><package arch="x86_64" name="libvirt-glib-devel" release="1.el7" src="libvirt-glib-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libvirt-glib-devel-1.0.0-1.el7.x86_64.rpm</filename><sum type="sha256">a5d4511da12d90e7ffd206da92c2c12065cffbe03f180aaa2ba1a9bbd46e8e00</sum></package><package arch="i686" name="libvirt-glib" release="1.el7" src="libvirt-glib-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libvirt-glib-1.0.0-1.el7.i686.rpm</filename><sum type="sha256">5c095b900ccc9ee1ed48d79998f1bc55af41e1a392fb3b73f2d318361392b93e</sum></package><package arch="i686" name="libvirt-gconfig-devel" release="1.el7" src="libvirt-glib-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>libvirt-gconfig-devel-1.0.0-1.el7.i686.rpm</filename><sum type="sha256">8dac780b6e66edc55f281e64087e3af9b7e23e699d56a6dca2b1b2c060378d38</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2074" id="RHEA-2017:2074-1" title="Rhea-2017:2074-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2111-1</id><title>Pcre2 Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pcre2" release="2.el7" src="pcre2-10.23-2.el7.src.rpm" version="10.23"><filename>pcre2-10.23-2.el7.x86_64.rpm</filename><sum type="sha256">128b278845aa8e34e278460b7005b550d2784c72a85e76f45ddb5a67a72d1e98</sum></package><package arch="x86_64" name="pcre2-devel" release="2.el7" src="pcre2-10.23-2.el7.src.rpm" version="10.23"><filename>pcre2-devel-10.23-2.el7.x86_64.rpm</filename><sum type="sha256">617075c0a37f1e575d1f7d51e1754c4d1d4de31975832d415bc3d61b82416f59</sum></package><package arch="i686" name="pcre2-static" release="2.el7" src="pcre2-10.23-2.el7.src.rpm" version="10.23"><filename>pcre2-static-10.23-2.el7.i686.rpm</filename><sum type="sha256">c5804cef24478a4258a69b9d96e9eb4de8a2456703a9e782046cdec244e39ea7</sum></package><package arch="i686" name="pcre2-utf16" release="2.el7" src="pcre2-10.23-2.el7.src.rpm" version="10.23"><filename>pcre2-utf16-10.23-2.el7.i686.rpm</filename><sum type="sha256">c36d2d0763a8a36f0c5b1521247316b429135d4b63b47401faca984274c468ce</sum></package><package arch="i686" name="pcre2-utf32" release="2.el7" src="pcre2-10.23-2.el7.src.rpm" version="10.23"><filename>pcre2-utf32-10.23-2.el7.i686.rpm</filename><sum type="sha256">fdb1da51566d1ec25c9d3984b3caa9ec630a20052a7a8284b7cdd41211630a91</sum></package><package arch="i686" name="pcre2" release="2.el7" src="pcre2-10.23-2.el7.src.rpm" version="10.23"><filename>pcre2-10.23-2.el7.i686.rpm</filename><sum type="sha256">70d23c4f7de6bb23ce6f552e3a9402ae67e78d700066efc67555e363ef587371</sum></package><package arch="i686" name="pcre2-devel" release="2.el7" src="pcre2-10.23-2.el7.src.rpm" version="10.23"><filename>pcre2-devel-10.23-2.el7.i686.rpm</filename><sum type="sha256">d77423e4c10a7a235be1455bfe41d7cda355ad3f7131a0d0f3a59ee1f36c2e60</sum></package><package arch="x86_64" name="pcre2-utf16" release="2.el7" src="pcre2-10.23-2.el7.src.rpm" version="10.23"><filename>pcre2-utf16-10.23-2.el7.x86_64.rpm</filename><sum type="sha256">acefda3c890b0ad2c4278668494b2c3373ebb4bd1150c40870be47266fc3165c</sum></package><package arch="x86_64" name="pcre2-utf32" release="2.el7" src="pcre2-10.23-2.el7.src.rpm" version="10.23"><filename>pcre2-utf32-10.23-2.el7.x86_64.rpm</filename><sum type="sha256">6602592a905d87d3f82b746cb00d680f49c341c76bccd47b039fb8276a039d9f</sum></package><package arch="x86_64" name="pcre2-static" release="2.el7" src="pcre2-10.23-2.el7.src.rpm" version="10.23"><filename>pcre2-static-10.23-2.el7.x86_64.rpm</filename><sum type="sha256">1b41bdfeef372d07ace107fb8ff54d83592c347d3af5f47d5d748090e5f025be</sum></package><package arch="x86_64" name="pcre2-tools" release="2.el7" src="pcre2-10.23-2.el7.src.rpm" version="10.23"><filename>pcre2-tools-10.23-2.el7.x86_64.rpm</filename><sum type="sha256">22af5caccfa6ab9adce0fa986bfe7fbe7da3ff29fe6494f2355f1acde7352834</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2111" id="RHEA-2017:2111-1" title="Rhea-2017:2111-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2115-1</id><title>Mod_Lookup_Identity Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="mod_lookup_identity" release="1.el7" src="mod_lookup_identity-1.0.0-1.el7.src.rpm" version="1.0.0"><filename>mod_lookup_identity-1.0.0-1.el7.x86_64.rpm</filename><sum type="sha256">8c4ec310fb56416a6a3840fa0d551715c42a684b245ef1ce651e368a799b74ae</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2115" id="RHEA-2017:2115-1" title="Rhea-2017:2115-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2122-1</id><title>Python-Cryptography Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python2-cryptography" release="1.el7" src="python-cryptography-1.7.2-1.el7.src.rpm" version="1.7.2"><filename>python2-cryptography-1.7.2-1.el7.x86_64.rpm</filename><sum type="sha256">3b6eeba3ebb53720f3f0ce82a3690136196b2020b30737e0b03f05785e5404d5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2122" id="RHEA-2017:2122-1" title="Rhea-2017:2122-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2123-1</id><title>Desktop-File-Utils Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="desktop-file-utils" release="1.el7" src="desktop-file-utils-0.23-1.el7.src.rpm" version="0.23"><filename>desktop-file-utils-0.23-1.el7.x86_64.rpm</filename><sum type="sha256">f6e84e905b6b0d59926b73431955f0af7b1a38a58fc7df1defa9f3a4eab3696b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2123" id="RHEA-2017:2123-1" title="Rhea-2017:2123-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2125-1</id><title>File-Roller Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="file-roller-nautilus" release="1.el7" src="file-roller-3.22.3-1.el7.src.rpm" version="3.22.3"><filename>file-roller-nautilus-3.22.3-1.el7.x86_64.rpm</filename><sum type="sha256">5fe6903917523147f3085d4f3f80a7a895f83d74881cd4ef462e05f820aff075</sum></package><package arch="x86_64" name="file-roller" release="1.el7" src="file-roller-3.22.3-1.el7.src.rpm" version="3.22.3"><filename>file-roller-3.22.3-1.el7.x86_64.rpm</filename><sum type="sha256">388eb1303de475a1e06e35705ee67d3ab0bacdf0c8a420fe1b948ab25e65cc93</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2125" id="RHEA-2017:2125-1" title="Rhea-2017:2125-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2131-1</id><title>Gedit  Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="gedit-devel" release="3.el7" src="gedit-3.22.0-3.el7.src.rpm" version="3.22.0"><filename>gedit-devel-3.22.0-3.el7.x86_64.rpm</filename><sum type="sha256">85c96d97d7f0d5b43c8bed2641d89a25c93370826650f7588add9f4a41e7431c</sum></package><package arch="i686" name="libpeas-loader-python" release="1.el7" src="libpeas-1.20.0-1.el7.src.rpm" version="1.20.0"><filename>libpeas-loader-python-1.20.0-1.el7.i686.rpm</filename><sum type="sha256">207a85a064b1a77055f484ad18e2c4bea5b736e2ae716cb025d1aa0dabac2a87</sum></package><package arch="x86_64" name="gedit-plugin-multiedit" release="1.el7" src="gedit-plugins-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gedit-plugin-multiedit-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">6d52b35ef2fba97f86683c467a5c58ff66b77d9ea40e8332e57f41d8ff840bed</sum></package><package arch="x86_64" name="gedit-plugin-colorschemer" release="1.el7" src="gedit-plugins-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gedit-plugin-colorschemer-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">c49aa8d48ecb0769a602dda437bb9a84bf215b0c73abc9721f27e2bca3ed9e0c</sum></package><package arch="x86_64" name="libpeas-devel" release="1.el7" src="libpeas-1.20.0-1.el7.src.rpm" version="1.20.0"><filename>libpeas-devel-1.20.0-1.el7.x86_64.rpm</filename><sum type="sha256">e24cc55a79155f5e2f229fa4313c733543cb32a4109991a90bc30c591fbb9ad3</sum></package><package arch="x86_64" name="gtksourceview3-devel" release="1.el7" src="gtksourceview3-3.22.2-1.el7.src.rpm" version="3.22.2"><filename>gtksourceview3-devel-3.22.2-1.el7.x86_64.rpm</filename><sum type="sha256">781abad3210d9dd7015595bec94aaaac0c00ceb26c933c6b4b4236374b2155bc</sum></package><package arch="x86_64" name="gedit-plugin-codecomment" release="1.el7" src="gedit-plugins-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gedit-plugin-codecomment-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">e7921d487d1784135b4321f0c198c9eae20aa55edd58341d573505c3b62f84f3</sum></package><package arch="x86_64" name="gedit-plugin-synctex" release="1.el7" src="gedit-plugins-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gedit-plugin-synctex-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">fa32cd5586aeef5493366414fb2da225b067ffdad1cce63bf2abe1e2dca0df39</sum></package><package arch="noarch" name="gspell-doc" release="1.el7" src="gspell-1.2.3-1.el7.src.rpm" version="1.2.3"><filename>gspell-doc-1.2.3-1.el7.noarch.rpm</filename><sum type="sha256">90735a24dcfb4d8cf6782ea525770783f868152248dd550468a6106427fe62dd</sum></package><package arch="i686" epoch="2" name="gedit" release="3.el7" src="gedit-3.22.0-3.el7.src.rpm" version="3.22.0"><filename>gedit-3.22.0-3.el7.i686.rpm</filename><sum type="sha256">f30e0d38c026e786af5c1916289de26fdf9e8c5052e706a174a3e6024050e31b</sum></package><package arch="x86_64" name="gedit-plugins" release="1.el7" src="gedit-plugins-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gedit-plugins-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">e768d4a5905156eb81ea09356848618d4401696506cd4288048decc63e9afbda</sum></package><package arch="x86_64" name="gedit-plugin-wordcompletion" release="1.el7" src="gedit-plugins-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gedit-plugin-wordcompletion-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">c3c4453801e3a4298b2d096ffa6d984c4c1163b37dff1cedde5641cecb8b6910</sum></package><package arch="x86_64" name="gtksourceview3-tests" release="1.el7" src="gtksourceview3-3.22.2-1.el7.src.rpm" version="3.22.2"><filename>gtksourceview3-tests-3.22.2-1.el7.x86_64.rpm</filename><sum type="sha256">71363ff4833a5fe9fd389f8d1525b8ec214bcba2ea12ad70fd967eb30b7ade08</sum></package><package arch="x86_64" name="gtksourceview3" release="1.el7" src="gtksourceview3-3.22.2-1.el7.src.rpm" version="3.22.2"><filename>gtksourceview3-3.22.2-1.el7.x86_64.rpm</filename><sum type="sha256">b4b358be6045ecd433ed8ef58663a9fdac0113986334cfaab750b7edcbd56de1</sum></package><package arch="i686" name="libpeas-gtk" release="1.el7" src="libpeas-1.20.0-1.el7.src.rpm" version="1.20.0"><filename>libpeas-gtk-1.20.0-1.el7.i686.rpm</filename><sum type="sha256">0004c8489f7bc1eb90f2ddfae1f079272a92b123e17020fb237da9ac842b70f9</sum></package><package arch="x86_64" name="gedit-plugin-textsize" release="1.el7" src="gedit-plugins-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gedit-plugin-textsize-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">4284e8fd8ba819951637ac8a8e0df8940253332d9c84c56d47952eb349e51672</sum></package><package arch="i686" name="gspell-devel" release="1.el7" src="gspell-1.2.3-1.el7.src.rpm" version="1.2.3"><filename>gspell-devel-1.2.3-1.el7.i686.rpm</filename><sum type="sha256">78ab86638b8242d32aa30263dd9fdbd4f4e1c2903960bd9cfc372f2ce0cbcad1</sum></package><package arch="x86_64" name="libpeas" release="1.el7" src="libpeas-1.20.0-1.el7.src.rpm" version="1.20.0"><filename>libpeas-1.20.0-1.el7.x86_64.rpm</filename><sum type="sha256">824380040cc7e45c5c540efa7a02b16d4a0af53674a9dcd068270b916d2a27d6</sum></package><package arch="x86_64" name="gedit-plugin-charmap" release="1.el7" src="gedit-plugins-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gedit-plugin-charmap-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">312c61322c31133ccda44097f57daea44325cffb104f12bacca0ad7091f5f62e</sum></package><package arch="x86_64" name="gedit-plugin-bookmarks" release="1.el7" src="gedit-plugins-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gedit-plugin-bookmarks-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">0b2f55435574cf2088bc29ae7c02f115aed349dbf52e57acd5a3f6cb7d17dea1</sum></package><package arch="i686" name="gspell" release="1.el7" src="gspell-1.2.3-1.el7.src.rpm" version="1.2.3"><filename>gspell-1.2.3-1.el7.i686.rpm</filename><sum type="sha256">448571f5cef0886be8097df2e45d3b23b308c8d24a5e2d36ad0c066c001de808</sum></package><package arch="i686" name="gtksourceview3-devel" release="1.el7" src="gtksourceview3-3.22.2-1.el7.src.rpm" version="3.22.2"><filename>gtksourceview3-devel-3.22.2-1.el7.i686.rpm</filename><sum type="sha256">55b573215aa005ed7020fb9bbb87fe4e21b7e06ebfb74c3539c19c0af4e06f9a</sum></package><package arch="x86_64" name="gspell-devel" release="1.el7" src="gspell-1.2.3-1.el7.src.rpm" version="1.2.3"><filename>gspell-devel-1.2.3-1.el7.x86_64.rpm</filename><sum type="sha256">c1b5ab81c7378afbc19295694dcff9feecf45f2ef6bdf960881399144c119035</sum></package><package arch="x86_64" name="gedit-plugin-terminal" release="1.el7" src="gedit-plugins-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gedit-plugin-terminal-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">1a146ca15d22ede328130a82c13d645d60b7a89c0dcb3d5a44d11203eaf91247</sum></package><package arch="x86_64" name="libpeas-loader-python" release="1.el7" src="libpeas-1.20.0-1.el7.src.rpm" version="1.20.0"><filename>libpeas-loader-python-1.20.0-1.el7.x86_64.rpm</filename><sum type="sha256">68e6b8915bcaaff800491f1a0aadc4e0a60dd792ce195a958c3445ac87ee39f8</sum></package><package arch="x86_64" name="gedit-plugin-colorpicker" release="1.el7" src="gedit-plugins-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gedit-plugin-colorpicker-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">e6b004f16e01b132871865b7c29fb6ecfbcb86d40f397ea76bd80e83e9e49ba2</sum></package><package arch="i686" name="libpeas-devel" release="1.el7" src="libpeas-1.20.0-1.el7.src.rpm" version="1.20.0"><filename>libpeas-devel-1.20.0-1.el7.i686.rpm</filename><sum type="sha256">e703589f0daf12c7de94a18b19f75d005653d90049b21e2bfb87b555c4e79a76</sum></package><package arch="x86_64" epoch="2" name="gedit" release="3.el7" src="gedit-3.22.0-3.el7.src.rpm" version="3.22.0"><filename>gedit-3.22.0-3.el7.x86_64.rpm</filename><sum type="sha256">7d7a367769d521188f28ba465119124d54fe62145ade1957f5a4bde40cddcd1e</sum></package><package arch="x86_64" name="gspell" release="1.el7" src="gspell-1.2.3-1.el7.src.rpm" version="1.2.3"><filename>gspell-1.2.3-1.el7.x86_64.rpm</filename><sum type="sha256">666914996ef8066fc3ffcc18c5d0ae3bc31c187308a333559efbdd7ba8cd9ab1</sum></package><package arch="x86_64" name="gedit-plugin-smartspaces" release="1.el7" src="gedit-plugins-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gedit-plugin-smartspaces-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">ac174da8df76efd6135da66596debb5502e8bfffb18e54e36d24ef1d00b6e240</sum></package><package arch="x86_64" name="gedit-plugin-findinfiles" release="1.el7" src="gedit-plugins-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gedit-plugin-findinfiles-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">be1ccd8e6fd25f2969f62bafec27c515fe1fd02059b068819b8dc3d3140cdea2</sum></package><package arch="x86_64" name="gedit-plugin-bracketcompletion" release="1.el7" src="gedit-plugins-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gedit-plugin-bracketcompletion-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">41e2981f21d2fb9cb4551bfcfa668962ec2d1c1b89554cbbb2dcebf69fb76226</sum></package><package arch="i686" name="gtksourceview3" release="1.el7" src="gtksourceview3-3.22.2-1.el7.src.rpm" version="3.22.2"><filename>gtksourceview3-3.22.2-1.el7.i686.rpm</filename><sum type="sha256">35cf5d4c7b34d098fb4bfbc8bca3d92a0bd492014088e2d4dc05222792ecaa7d</sum></package><package arch="i686" epoch="2" name="gedit-devel" release="3.el7" src="gedit-3.22.0-3.el7.src.rpm" version="3.22.0"><filename>gedit-devel-3.22.0-3.el7.i686.rpm</filename><sum type="sha256">9d6e1bb30c3557e6ce0c969b68f0f38cac801a43482e4fa352d2003c5eeaef67</sum></package><package arch="x86_64" name="gedit-plugin-joinlines" release="1.el7" src="gedit-plugins-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gedit-plugin-joinlines-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">5d57afe891994042cd5800906d33d4beb1fee0ed7b710503454b25c29f57f277</sum></package><package arch="x86_64" name="gedit-plugins-data" release="1.el7" src="gedit-plugins-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gedit-plugins-data-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">df282ec6835b93d33dcc1ffe01673b6635fb07f16a76b7e8fb4013ae9cb0b810</sum></package><package arch="x86_64" name="libpeas-gtk" release="1.el7" src="libpeas-1.20.0-1.el7.src.rpm" version="1.20.0"><filename>libpeas-gtk-1.20.0-1.el7.x86_64.rpm</filename><sum type="sha256">bec2035f8a3910cef0508388ea4edf97a9aa39d1c5a06e2ef14e23e932efa355</sum></package><package arch="i686" name="libpeas" release="1.el7" src="libpeas-1.20.0-1.el7.src.rpm" version="1.20.0"><filename>libpeas-1.20.0-1.el7.i686.rpm</filename><sum type="sha256">8276da87d36a53b13812b0b16b04bce65e91099de8bf9822f5a9d7d94bccf087</sum></package><package arch="x86_64" name="gedit-plugin-drawspaces" release="1.el7" src="gedit-plugins-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gedit-plugin-drawspaces-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">2016f66d11685d6d46f92f0066dcbddc92f32d7590ed5c9d7447cf29fb248ca5</sum></package><package arch="x86_64" name="gedit-plugin-commander" release="1.el7" src="gedit-plugins-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gedit-plugin-commander-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">93cd8bbd57a9e6d40e060514d1463984f93c5b14822c335d7d15ee47794d94ca</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2131" id="RHEA-2017:2131-1" title="Rhea-2017:2131-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2133-1</id><title>Gnome-Weather Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libgweather-devel" release="1.el7" src="libgweather-3.20.4-1.el7.src.rpm" version="3.20.4"><filename>libgweather-devel-3.20.4-1.el7.i686.rpm</filename><sum type="sha256">8c972c49013ca8006ce27810137bf51919905625cfebf7a0979c268b9233d661</sum></package><package arch="noarch" name="gnome-weather" release="1.el7" src="gnome-weather-3.20.2-1.el7.src.rpm" version="3.20.2"><filename>gnome-weather-3.20.2-1.el7.noarch.rpm</filename><sum type="sha256">dd1a79a0e5effffad3c2e0cefb160e08bf81e4393eecc4a405157ab5005eb968</sum></package><package arch="x86_64" name="libgweather-devel" release="1.el7" src="libgweather-3.20.4-1.el7.src.rpm" version="3.20.4"><filename>libgweather-devel-3.20.4-1.el7.x86_64.rpm</filename><sum type="sha256">fb6fb97b0f8fce06bcfff19ed1fcfbba9292a98d667c8db6ae902be0850e3d2f</sum></package><package arch="i686" name="libgweather" release="1.el7" src="libgweather-3.20.4-1.el7.src.rpm" version="3.20.4"><filename>libgweather-3.20.4-1.el7.i686.rpm</filename><sum type="sha256">110e670c7d403fcdafc5f609b9108e075e9def0602fb30f963a18e281198f0b5</sum></package><package arch="noarch" name="gnome-weather-tests" release="1.el7" src="gnome-weather-3.20.2-1.el7.src.rpm" version="3.20.2"><filename>gnome-weather-tests-3.20.2-1.el7.noarch.rpm</filename><sum type="sha256">2474976ccf2fdd06521c67e6601a1c349813e0a2faf50bc3fec8c1b0bd7a72f1</sum></package><package arch="x86_64" name="libgweather" release="1.el7" src="libgweather-3.20.4-1.el7.src.rpm" version="3.20.4"><filename>libgweather-3.20.4-1.el7.x86_64.rpm</filename><sum type="sha256">bf21245359843bcb960b71b40157bc907747d1bf7fed6c52d6a2e0f32357719f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2133" id="RHEA-2017:2133-1" title="Rhea-2017:2133-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2140-1</id><title>Gnome-Packagekit Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gnome-packagekit-installer" release="2.el7" src="gnome-packagekit-3.22.1-2.el7.src.rpm" version="3.22.1"><filename>gnome-packagekit-installer-3.22.1-2.el7.x86_64.rpm</filename><sum type="sha256">bc90912ccfa333336e98ebbf8b6d7b37edd86ef5f9266ce49bfcd0029213b229</sum></package><package arch="x86_64" name="gnome-packagekit" release="2.el7" src="gnome-packagekit-3.22.1-2.el7.src.rpm" version="3.22.1"><filename>gnome-packagekit-3.22.1-2.el7.x86_64.rpm</filename><sum type="sha256">30c179f570e4c341a3407a254aac8d437a08a8e6b7b13cb1ff76c2dd0e89ef3c</sum></package><package arch="x86_64" name="gnome-packagekit-common" release="2.el7" src="gnome-packagekit-3.22.1-2.el7.src.rpm" version="3.22.1"><filename>gnome-packagekit-common-3.22.1-2.el7.x86_64.rpm</filename><sum type="sha256">933a8b65dab8f355ac7960f60921be7e196b98e8d13fa5e5e972c62758a30d7f</sum></package><package arch="x86_64" name="gnome-packagekit-updater" release="2.el7" src="gnome-packagekit-3.22.1-2.el7.src.rpm" version="3.22.1"><filename>gnome-packagekit-updater-3.22.1-2.el7.x86_64.rpm</filename><sum type="sha256">baa0dab5f509323b07f15fd9c1ec1249453854146c084ab8ab68c59afebe2eba</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2140" id="RHEA-2017:2140-1" title="Rhea-2017:2140-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2141-1</id><title>Gnome-Screenshot Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gnome-screenshot" release="1.el7" src="gnome-screenshot-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gnome-screenshot-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">91692e7fbcda789edc034fc1b6a42340fdefde6623fc720a5432b32fe6add4fe</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2141" id="RHEA-2017:2141-1" title="Rhea-2017:2141-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2142-1</id><title>Devhelp Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="devhelp-libs" release="1.el7" src="devhelp-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>devhelp-libs-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">3fe41f1f752dd16c0312a9f83535091f2f00da012da9b5dc57974ab7aad25f55</sum></package><package arch="i686" epoch="1" name="devhelp-libs" release="1.el7" src="devhelp-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>devhelp-libs-3.22.0-1.el7.i686.rpm</filename><sum type="sha256">59da2452f8812da30e4121675768aa7481a9e9ecd4d44c4f0ac145bfb84773c7</sum></package><package arch="x86_64" epoch="1" name="devhelp" release="1.el7" src="devhelp-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>devhelp-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">0ecf0ba2ddda7b1c9c93e1a7dfe5b51b574d44bfbb7637213cb774753c64b46e</sum></package><package arch="x86_64" epoch="1" name="devhelp-devel" release="1.el7" src="devhelp-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>devhelp-devel-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">535a697d308f6d95ce5a4340d89095e0c0b8409b5a0e6c6fa084fefef3534606</sum></package><package arch="i686" epoch="1" name="devhelp-devel" release="1.el7" src="devhelp-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>devhelp-devel-3.22.0-1.el7.i686.rpm</filename><sum type="sha256">9d3518077fcd96cd6f6034d942abef3d92b02910805d47342119a22842a7b3a7</sum></package><package arch="i686" epoch="1" name="devhelp" release="1.el7" src="devhelp-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>devhelp-3.22.0-1.el7.i686.rpm</filename><sum type="sha256">579708b4c64f5205b4860f2dd0f52b6291dd341e2030be5eaa1cf3538bf4efe8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2142" id="RHEA-2017:2142-1" title="Rhea-2017:2142-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2146-1</id><title>Libsoup Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libsoup-devel" release="3.el7" src="libsoup-2.56.0-3.el7.src.rpm" version="2.56.0"><filename>libsoup-devel-2.56.0-3.el7.i686.rpm</filename><sum type="sha256">09b55995b95d3b1ef84659b82557c5a55743416ac926b10fd15f1c83fb6b11db</sum></package><package arch="i686" name="libsoup" release="3.el7" src="libsoup-2.56.0-3.el7.src.rpm" version="2.56.0"><filename>libsoup-2.56.0-3.el7.i686.rpm</filename><sum type="sha256">bc559cf8baaa56557b63e93dd7148f489a6694604dded32b317e8d30dcc3fe03</sum></package><package arch="x86_64" name="libsoup" release="3.el7" src="libsoup-2.56.0-3.el7.src.rpm" version="2.56.0"><filename>libsoup-2.56.0-3.el7.x86_64.rpm</filename><sum type="sha256">d0c168223802f30273b21423e5e9425830b20667855c31060d9960dd80fd2e03</sum></package><package arch="x86_64" name="libsoup-devel" release="3.el7" src="libsoup-2.56.0-3.el7.src.rpm" version="2.56.0"><filename>libsoup-devel-2.56.0-3.el7.x86_64.rpm</filename><sum type="sha256">7fb36f925a30481a1f871bc02d4aad1856c9d0651deb071f6583c66de68c5c98</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2146" id="RHEA-2017:2146-1" title="Rhea-2017:2146-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2148-1</id><title>Gnome-Color-Manager Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="gnome-color-manager" release="1.el7" src="gnome-color-manager-3.22.2-1.el7.src.rpm" version="3.22.2"><filename>gnome-color-manager-3.22.2-1.el7.i686.rpm</filename><sum type="sha256">f1d70383a31e834c765d6f62f34e01669de0c0a0c81429ab25ba3d7fc15d7a63</sum></package><package arch="x86_64" name="gnome-color-manager" release="1.el7" src="gnome-color-manager-3.22.2-1.el7.src.rpm" version="3.22.2"><filename>gnome-color-manager-3.22.2-1.el7.x86_64.rpm</filename><sum type="sha256">12faf052007b17c8f756838058dbf8a14a0d2d3e57d0ab2a3fc44f53eb0f35fd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2148" id="RHEA-2017:2148-1" title="Rhea-2017:2148-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2149-1</id><title>Gjs, Gobject-Introspection, Pygobject3 Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gobject-introspection" release="1.el7" src="gobject-introspection-1.50.0-1.el7.src.rpm" version="1.50.0"><filename>gobject-introspection-1.50.0-1.el7.x86_64.rpm</filename><sum type="sha256">b3db3914e6a9655f78075ba6e0ce0c53b047dade766eb80b430ececd06afd0a6</sum></package><package arch="i686" name="gjs-devel" release="1.el7" src="gjs-1.46.0-1.el7.src.rpm" version="1.46.0"><filename>gjs-devel-1.46.0-1.el7.i686.rpm</filename><sum type="sha256">8a279edb05d4ecbdf0c0fb527b2e449547570bef7d580125bf96109066b26ca7</sum></package><package arch="x86_64" name="gjs" release="1.el7" src="gjs-1.46.0-1.el7.src.rpm" version="1.46.0"><filename>gjs-1.46.0-1.el7.x86_64.rpm</filename><sum type="sha256">b249a5c65f330914c2b930d06af57084de6136b7da3cbadfcdd054351d36fd6e</sum></package><package arch="i686" name="gjs" release="1.el7" src="gjs-1.46.0-1.el7.src.rpm" version="1.46.0"><filename>gjs-1.46.0-1.el7.i686.rpm</filename><sum type="sha256">01d947892beca65a0ecd1dcf75287e940588c34a1a9a5b0a3ee7019f6acd455e</sum></package><package arch="i686" name="gobject-introspection" release="1.el7" src="gobject-introspection-1.50.0-1.el7.src.rpm" version="1.50.0"><filename>gobject-introspection-1.50.0-1.el7.i686.rpm</filename><sum type="sha256">4fdff810f0877ce575fce5925a1be45ba74df31aa8f6cfdb744e11d66a8ec952</sum></package><package arch="x86_64" name="python-gobject" release="1.el7" src="pygobject3-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>python-gobject-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">db3391ba13ae56a63c149a853343ca0cc8e3c5157659ac198f93c856544b1985</sum></package><package arch="x86_64" name="python-gobject-base" release="1.el7" src="pygobject3-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>python-gobject-base-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">c56d62313fda2eb6637f5ba4c0f224f2152472b1332556fe14c316f8b74d47e9</sum></package><package arch="x86_64" name="pygobject3-devel" release="1.el7" src="pygobject3-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>pygobject3-devel-3.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">c166d77bf33800fad99b994085c7c014628e2c0df4a6e1d3ad68b36509621112</sum></package><package arch="x86_64" name="gjs-devel" release="1.el7" src="gjs-1.46.0-1.el7.src.rpm" version="1.46.0"><filename>gjs-devel-1.46.0-1.el7.x86_64.rpm</filename><sum type="sha256">ab933e53844ee9cd9b07df2cd7d3c23280c587b5db6f7c85fd263e70282e77bc</sum></package><package arch="x86_64" name="gobject-introspection-devel" release="1.el7" src="gobject-introspection-1.50.0-1.el7.src.rpm" version="1.50.0"><filename>gobject-introspection-devel-1.50.0-1.el7.x86_64.rpm</filename><sum type="sha256">178baafdd66f29e262984c423aea1fc7110aa34a14cc897a8928454fa03cea24</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2149" id="RHEA-2017:2149-1" title="Rhea-2017:2149-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2150-1</id><title>Gnome-Backgrounds Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="gnome-backgrounds" release="1.el7" src="gnome-backgrounds-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>gnome-backgrounds-3.22.1-1.el7.noarch.rpm</filename><sum type="sha256">e888c125c01cf27d6daf728c1f655f3e1e10f10721521f5354a3c7ee97d005f0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2150" id="RHEA-2017:2150-1" title="Rhea-2017:2150-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2152-1</id><title>Gnome-Devel-Docs, Gnome-Getting-Started-Docs, Gnome-User-Docs Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="gnome-getting-started-docs-ru" release="1.el7" src="gnome-getting-started-docs-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gnome-getting-started-docs-ru-3.22.0-1.el7.noarch.rpm</filename><sum type="sha256">ae6242febe1c89c2beb706d032976868b3c554d507e43211e4d28ebaf31ad0bc</sum></package><package arch="noarch" name="gnome-getting-started-docs-es" release="1.el7" src="gnome-getting-started-docs-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gnome-getting-started-docs-es-3.22.0-1.el7.noarch.rpm</filename><sum type="sha256">c4dad7ea10a932a1dab69d3112a2a6935fc834790af7be3035feccf72d65e27e</sum></package><package arch="noarch" name="gnome-getting-started-docs-cs" release="1.el7" src="gnome-getting-started-docs-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gnome-getting-started-docs-cs-3.22.0-1.el7.noarch.rpm</filename><sum type="sha256">b2ce908dd04e08a20bc77c86412c3e11588eb235b374405542251048b5b1e4b5</sum></package><package arch="noarch" name="gnome-getting-started-docs-gl" release="1.el7" src="gnome-getting-started-docs-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gnome-getting-started-docs-gl-3.22.0-1.el7.noarch.rpm</filename><sum type="sha256">8817dab201f666d926eb3272f6badec23d0711c7980f2c4e5b1e61de4cbf2716</sum></package><package arch="noarch" name="gnome-getting-started-docs-de" release="1.el7" src="gnome-getting-started-docs-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gnome-getting-started-docs-de-3.22.0-1.el7.noarch.rpm</filename><sum type="sha256">accc50d1b6b3641cdc42a1f179ac2e05b5765ce368d01172474afa882c231d8c</sum></package><package arch="noarch" name="gnome-getting-started-docs-hu" release="1.el7" src="gnome-getting-started-docs-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gnome-getting-started-docs-hu-3.22.0-1.el7.noarch.rpm</filename><sum type="sha256">10606bf631ecfb848bd802346cf5af97c011d85f0a176f4c0e1a56bd161dd327</sum></package><package arch="noarch" name="gnome-getting-started-docs-it" release="1.el7" src="gnome-getting-started-docs-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gnome-getting-started-docs-it-3.22.0-1.el7.noarch.rpm</filename><sum type="sha256">963d7b975785f50f58cddc0dfe9b0cec57a08cae9611de0d34ead4604be7dded</sum></package><package arch="noarch" name="gnome-getting-started-docs-pt_BR" release="1.el7" src="gnome-getting-started-docs-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gnome-getting-started-docs-pt_BR-3.22.0-1.el7.noarch.rpm</filename><sum type="sha256">98dd5906df54add0fb0537738212568b6fc004d3aa7cb0be8e3f88f4cf06358c</sum></package><package arch="noarch" name="gnome-user-docs" release="1.el7" src="gnome-user-docs-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gnome-user-docs-3.22.0-1.el7.noarch.rpm</filename><sum type="sha256">39e16143af5eecf7187dc4cc9246c4427273fc2ab494d3ab7e47c49e9ddf5024</sum></package><package arch="noarch" name="gnome-getting-started-docs-fr" release="1.el7" src="gnome-getting-started-docs-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gnome-getting-started-docs-fr-3.22.0-1.el7.noarch.rpm</filename><sum type="sha256">6cc54e53453c51758a6e6df193f1310585a8dccd97ce076886ce55ffab902648</sum></package><package arch="noarch" name="gnome-devel-docs" release="1.el7" src="gnome-devel-docs-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>gnome-devel-docs-3.22.1-1.el7.noarch.rpm</filename><sum type="sha256">178a364a397869a86766661f0b2f948e183fd5eb922c517ac426db18a8445191</sum></package><package arch="noarch" name="gnome-getting-started-docs-pl" release="1.el7" src="gnome-getting-started-docs-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gnome-getting-started-docs-pl-3.22.0-1.el7.noarch.rpm</filename><sum type="sha256">3bcc77be5bd1f09ff7a0705701a6560ae1379065f8c76f607d1a520887223734</sum></package><package arch="noarch" name="gnome-getting-started-docs" release="1.el7" src="gnome-getting-started-docs-3.22.0-1.el7.src.rpm" version="3.22.0"><filename>gnome-getting-started-docs-3.22.0-1.el7.noarch.rpm</filename><sum type="sha256">5f98899876f5defef8eba1938b9d4cc920be29f948f9ee42528ff84053872339</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2152" id="RHEA-2017:2152-1" title="Rhea-2017:2152-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2159-1</id><title>Gnome-Keyring Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libgnome-keyring-devel" release="1.el7" src="libgnome-keyring-3.12.0-1.el7.src.rpm" version="3.12.0"><filename>libgnome-keyring-devel-3.12.0-1.el7.i686.rpm</filename><sum type="sha256">46ebc8ae7e1dab3e4a2efd9f464c850e67d138d930d770c2536e9361f947b65b</sum></package><package arch="x86_64" name="libgnome-keyring" release="1.el7" src="libgnome-keyring-3.12.0-1.el7.src.rpm" version="3.12.0"><filename>libgnome-keyring-3.12.0-1.el7.x86_64.rpm</filename><sum type="sha256">da2ab0329b7dd205730bd96051c022881c79caa18a4724251fa31db1dad0d51f</sum></package><package arch="x86_64" name="gnome-keyring" release="3.el7" src="gnome-keyring-3.20.0-3.el7.src.rpm" version="3.20.0"><filename>gnome-keyring-3.20.0-3.el7.x86_64.rpm</filename><sum type="sha256">9396582a2aa182a23aa9a7c2902e2e93809a9127790567516ac576628ccb7c0c</sum></package><package arch="i686" name="libgnome-keyring" release="1.el7" src="libgnome-keyring-3.12.0-1.el7.src.rpm" version="3.12.0"><filename>libgnome-keyring-3.12.0-1.el7.i686.rpm</filename><sum type="sha256">6848c74efde68f66edb12ac2260f0bf5bbd6c6c5aa9ed0534b0f329e7bb250db</sum></package><package arch="x86_64" name="libsecret-devel" release="2.el7" src="libsecret-0.18.5-2.el7.src.rpm" version="0.18.5"><filename>libsecret-devel-0.18.5-2.el7.x86_64.rpm</filename><sum type="sha256">fafbb108690d5667d3fcc8267f11ca2c7a1a52ba130d00f67b9760cf4be8732f</sum></package><package arch="i686" name="libsecret" release="2.el7" src="libsecret-0.18.5-2.el7.src.rpm" version="0.18.5"><filename>libsecret-0.18.5-2.el7.i686.rpm</filename><sum type="sha256">0402501ac6ce28951548a8be7d2f0224fdfb7babfe26aa1219a774be0b7bd252</sum></package><package arch="x86_64" name="libgnome-keyring-devel" release="1.el7" src="libgnome-keyring-3.12.0-1.el7.src.rpm" version="3.12.0"><filename>libgnome-keyring-devel-3.12.0-1.el7.x86_64.rpm</filename><sum type="sha256">7cc366fd231d142454fd6ea6daea0a65d00f0b99211319970c8e2d0b1a5e68bb</sum></package><package arch="x86_64" name="gnome-keyring-pam" release="3.el7" src="gnome-keyring-3.20.0-3.el7.src.rpm" version="3.20.0"><filename>gnome-keyring-pam-3.20.0-3.el7.x86_64.rpm</filename><sum type="sha256">4b4a0d14cb04ed949f670d680cb0c4eb82e3f9b42d7aa5e6923f4198807c402f</sum></package><package arch="i686" name="gnome-keyring-pam" release="3.el7" src="gnome-keyring-3.20.0-3.el7.src.rpm" version="3.20.0"><filename>gnome-keyring-pam-3.20.0-3.el7.i686.rpm</filename><sum type="sha256">a9a682dc1b09ae83d2c2d548f43b28f0b04a1ae07502a5031ae1369f0d301a19</sum></package><package arch="i686" name="gnome-keyring" release="3.el7" src="gnome-keyring-3.20.0-3.el7.src.rpm" version="3.20.0"><filename>gnome-keyring-3.20.0-3.el7.i686.rpm</filename><sum type="sha256">e05e01b25db50ff859f98ad8c9a0ba2a52972985ec7aea4a0fe953919337057a</sum></package><package arch="x86_64" name="libsecret" release="2.el7" src="libsecret-0.18.5-2.el7.src.rpm" version="0.18.5"><filename>libsecret-0.18.5-2.el7.x86_64.rpm</filename><sum type="sha256">445c0509ff4f62396d3bdebab94abbd91d38ff30fa6c094d1d72d4eed74b9251</sum></package><package arch="i686" name="libsecret-devel" release="2.el7" src="libsecret-0.18.5-2.el7.src.rpm" version="0.18.5"><filename>libsecret-devel-0.18.5-2.el7.i686.rpm</filename><sum type="sha256">1938f6ca0fdb5b5fcbb48f84d57b5d6a5f7a7d27b5decb80479d400923e274f1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2159" id="RHEA-2017:2159-1" title="Rhea-2017:2159-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2290-1</id><title>Copy-Jdk-Configs Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="copy-jdk-configs" release="3.el7" src="copy-jdk-configs-2.2-3.el7.src.rpm" version="2.2"><filename>copy-jdk-configs-2.2-3.el7.noarch.rpm</filename><sum type="sha256">6b494c4783144ff75e4810bcd3e0d5c6158cb40f70647393b65538c28aa5f269</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2290" id="RHEA-2017:2290-1" title="Rhea-2017:2290-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2294-1</id><title>Sssd Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libsss_nss_idmap-devel" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libsss_nss_idmap-devel-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">ff0d9caaf609078447afec19410731f6507d5c6a4e67cea4a5513dbd5588d768</sum></package><package arch="x86_64" name="libsss_sudo" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libsss_sudo-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">7fcdc6aaa9893348f92f72091484fab631291da1987642745f7abf98ff2fe19c</sum></package><package arch="x86_64" name="sssd-common-pac" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-common-pac-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">4c7b600e7456cce40e75ef075e4329c93b34ba7345c5369eea57ca934db0861b</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libsss_nss_idmap-devel-1.15.2-50.el7.i686.rpm</filename><sum type="sha256">f81c33c775dd9cb9814cf1206eff8f2abeb712a95173ab10f9525e5f55f3490a</sum></package><package arch="i686" name="libsss_idmap" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libsss_idmap-1.15.2-50.el7.i686.rpm</filename><sum type="sha256">45fc9aaa0635c1f580e30f3c51223ca64752c076360b60204f25a4307458f987</sum></package><package arch="x86_64" name="python-sss-murmur" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>python-sss-murmur-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">3738165b9b2fb6bfc07d77c36e889897218dd3b48998f5933100b54810d2a1de</sum></package><package arch="x86_64" name="libsss_nss_idmap" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libsss_nss_idmap-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">6a15afef86d17c76cb9fd93dd115de74611ffd7cb1b33f66d7138d401ea7938b</sum></package><package arch="x86_64" name="sssd-polkit-rules" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-polkit-rules-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">b92347bcad2318f0bd969bd778130ff82605bd9c0c07608f30b824082ead6a3b</sum></package><package arch="x86_64" name="libsss_simpleifp" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libsss_simpleifp-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">08a5e41329568257ea4b40b8519e62f23ecfe3fdfb25216f5924f6d554e28c2b</sum></package><package arch="noarch" name="python-sssdconfig" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>python-sssdconfig-1.15.2-50.el7.noarch.rpm</filename><sum type="sha256">cde8f69052756c50a3cd7a752191c81380782004e3791b8fd55d00fe1a38eea8</sum></package><package arch="x86_64" name="libsss_simpleifp-devel" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libsss_simpleifp-devel-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">6f45793cfdcdd45fdaf59d5cf16fd8d48b8b7169a5296dc00cc930b41955a075</sum></package><package arch="i686" name="libipa_hbac-devel" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libipa_hbac-devel-1.15.2-50.el7.i686.rpm</filename><sum type="sha256">b51f131724016aa8dce5e725682e59e182016f45e623713fed1cbf384d7f38b4</sum></package><package arch="x86_64" name="libsss_autofs" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libsss_autofs-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">14ef9d1ec3c38cb7539fde8e820ecf86b50c56b557fe668d14eda9d9b98065b2</sum></package><package arch="x86_64" name="sssd-ipa" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-ipa-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">cd1d46ef7d9bd1369144c1b5c8eecc934674ee088fd40452d9dae17378b02523</sum></package><package arch="x86_64" name="sssd-client" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-client-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">11766198151da0e59971df4fa2bd4b94b19615fee228757485c87591c7eec50d</sum></package><package arch="i686" name="libsss_nss_idmap" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libsss_nss_idmap-1.15.2-50.el7.i686.rpm</filename><sum type="sha256">5cb7de3b616d8556023144b6fced79cfc4762dd0b291ec99c7604b0ca200b21c</sum></package><package arch="x86_64" name="libsss_certmap" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libsss_certmap-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">524a73fc26bc6e84c2270d8d1e23e73509d4f004d6f4d782142ce3e3ba2746cb</sum></package><package arch="i686" name="sssd-libwbclient-devel" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-libwbclient-devel-1.15.2-50.el7.i686.rpm</filename><sum type="sha256">e378813cbe4647c00744e82f556ea41cfa8cafaa143bd1567e28a01ce5310354</sum></package><package arch="x86_64" name="sssd" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">4958e25811b1113a4a3313b07a3411b1e78cf1abb1d3dd083354814d71b4819d</sum></package><package arch="x86_64" name="sssd-winbind-idmap" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-winbind-idmap-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">e7ac5fcd7184c323728dca3bbff87b57135cc7368bd63a60b0d6b734133b678c</sum></package><package arch="x86_64" name="sssd-ad" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-ad-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">78f0afb6172821cf60341f57c2532a84554a4a67e0f26a1fbfc85e6ffa783f45</sum></package><package arch="x86_64" name="sssd-libwbclient" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-libwbclient-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">427520b048dfcadcc72944693ba2a0765ee0de8761214715b36881b385ca7464</sum></package><package arch="x86_64" name="libsss_certmap-devel" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libsss_certmap-devel-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">c09a47ffa024d297b38ceb1a279b91796481f63ca98979b45df8bd66ace29201</sum></package><package arch="x86_64" name="sssd-ldap" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-ldap-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">de4298c7a70b30dc0ad6e63e0d5788f6fbd1db1790b40ccc012660cd06c74010</sum></package><package arch="x86_64" name="sssd-common" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-common-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">e7a038d4ab2de06c4ee85e925bca9e47c22ddd44774f224170f6dcc92c8c5f2e</sum></package><package arch="i686" name="libipa_hbac" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libipa_hbac-1.15.2-50.el7.i686.rpm</filename><sum type="sha256">40836af15a24537bcb205cd531096c2ba4c2213160ec5c84b0f32c8d5c0a2c17</sum></package><package arch="i686" name="libsss_simpleifp-devel" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libsss_simpleifp-devel-1.15.2-50.el7.i686.rpm</filename><sum type="sha256">ecb0f6ccedb2971cb65734b9eac698330fb1289d71c7212f7b965e7dd288052c</sum></package><package arch="x86_64" name="python-libsss_nss_idmap" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>python-libsss_nss_idmap-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">1d1dbb529a537e2c807100762b55ac91daf3e26a536c1d84514a123d5d746c00</sum></package><package arch="x86_64" name="sssd-tools" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-tools-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">ff5803665d9f31622467f209328ff3f485b5dfef81f7de1c56c9934a38a461f4</sum></package><package arch="x86_64" name="sssd-dbus" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-dbus-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">cdc4e391cea765b058f248bfcdf6f5fd708a2565f5da528f59d5c8a800b8c4b1</sum></package><package arch="x86_64" name="sssd-krb5" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-krb5-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">d8b6f018fcf59345066409456605d64fc5d0d8b34cb10e8a23eebae4e4c27a17</sum></package><package arch="x86_64" name="python-sss" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>python-sss-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">a71a471bb08cb066a504b51b8ef5cea1eebf06b703e089cc9abbe089b932076f</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libsss_idmap-devel-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">d344d7d9b10b62eacc2503756d60c464c40460847691f42e041c30aabaf3304f</sum></package><package arch="i686" name="libsss_certmap" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libsss_certmap-1.15.2-50.el7.i686.rpm</filename><sum type="sha256">3d0366cb4492075321ef5becbe406eb00b46b5a995d313aa89af5d0c5fbc95bc</sum></package><package arch="i686" name="libsss_certmap-devel" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libsss_certmap-devel-1.15.2-50.el7.i686.rpm</filename><sum type="sha256">afb9271487e7b7335063090f045deb825d08ca0c2fc99eeaae487edf86748601</sum></package><package arch="x86_64" name="sssd-proxy" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-proxy-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">1ae04d070a86048df083a03b1c9033d6b558f6f43fa89af824344fe2284b5a72</sum></package><package arch="i686" name="sssd-client" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-client-1.15.2-50.el7.i686.rpm</filename><sum type="sha256">711722c1866d59cb2dbb5fc9a7d7214f4a30194c95645baf1ef618595fe90d65</sum></package><package arch="x86_64" name="python-libipa_hbac" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>python-libipa_hbac-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">54498302453d36a632c97d6903362a9cb769089f67f58744348e39c99ae2977a</sum></package><package arch="x86_64" name="sssd-krb5-common" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-krb5-common-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">a0e87f047c0daf588189859e21019820bec0cdbb2f9e84215c72a0bb738b6dc2</sum></package><package arch="x86_64" name="libipa_hbac" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libipa_hbac-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">2b528b8fc9bf9e1725cee36c62a5ad10515590d789122eb3913fcc0bf038d15f</sum></package><package arch="i686" name="libsss_simpleifp" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libsss_simpleifp-1.15.2-50.el7.i686.rpm</filename><sum type="sha256">fa7ed30de2e1d9acd93bb5cee288efe4970a092297194451a1f176ba1075f02d</sum></package><package arch="x86_64" name="sssd-libwbclient-devel" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-libwbclient-devel-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">a401fdeef74165d0d79fc427c224bd7e9860501d83c0a4bd1eacb01c1a3fabce</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libipa_hbac-devel-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">8f1c68d6e1c996c1a0df6f92a5891e34adf3409abd9d95e362e2b3d103a5e320</sum></package><package arch="x86_64" name="libsss_idmap" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libsss_idmap-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">e2a78d04e77d75c09d18e115d9093a2b47387290d9fc525a53c083f7bb118c01</sum></package><package arch="x86_64" name="sssd-kcm" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>sssd-kcm-1.15.2-50.el7.x86_64.rpm</filename><sum type="sha256">b4e2d2aca628e31e9da264fa39938bed47389bfd930315dfa8b505d8abb4d573</sum></package><package arch="i686" name="libsss_idmap-devel" release="50.el7" src="sssd-1.15.2-50.el7.src.rpm" version="1.15.2"><filename>libsss_idmap-devel-1.15.2-50.el7.i686.rpm</filename><sum type="sha256">2dcccba9f53621c40e2387e456a69948d09e0a9fff32285b73660c401336eab8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2294" id="RHEA-2017:2294-1" title="Rhea-2017:2294-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2303-1</id><title>Gnome-Software, Libappstream-Glib, Packagekit, Libsolv, Gcab Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libsolv-devel" release="1.el7" src="libsolv-0.6.26-1.el7.src.rpm" version="0.6.26"><filename>libsolv-devel-0.6.26-1.el7.x86_64.rpm</filename><sum type="sha256">ac226f1cc36510df902a662d8eb2c749baa5312f902555ed3a3753e55d961fe7</sum></package><package arch="x86_64" name="libappstream-glib-devel" release="1.el7" src="libappstream-glib-0.6.10-1.el7.src.rpm" version="0.6.10"><filename>libappstream-glib-devel-0.6.10-1.el7.x86_64.rpm</filename><sum type="sha256">0f1e01ac4072008db77c59883555f318882c42d738479b09ccfc212335e60cb6</sum></package><package arch="i686" name="PackageKit-glib" release="1.sl7" src="PackageKit-1.1.5-1.sl7.src.rpm" version="1.1.5"><filename>PackageKit-glib-1.1.5-1.sl7.i686.rpm</filename><sum type="sha256">98b1ec2863641b293940958cd021de750422be3707880349a309a75734c15217</sum></package><package arch="i686" name="libgcab1" release="3.el7" src="gcab-0.7-3.el7.src.rpm" version="0.7"><filename>libgcab1-0.7-3.el7.i686.rpm</filename><sum type="sha256">dbd4f232ed38d6cb278fc8b396ffee12ffa4627b69ca48451052a757b752fbbb</sum></package><package arch="i686" name="libappstream-glib-devel" release="1.el7" src="libappstream-glib-0.6.10-1.el7.src.rpm" version="0.6.10"><filename>libappstream-glib-devel-0.6.10-1.el7.i686.rpm</filename><sum type="sha256">1212c6f990db85e8631a67f9105a6b6afd6993147d8d6d22fe3954dde686f97f</sum></package><package arch="i686" name="PackageKit" release="1.sl7" src="PackageKit-1.1.5-1.sl7.src.rpm" version="1.1.5"><filename>PackageKit-1.1.5-1.sl7.i686.rpm</filename><sum type="sha256">d591f775c0503bd0d5c7de53b60bd05b172368cf1e8857314c1d1f5c9f426a2d</sum></package><package arch="x86_64" name="libsolv-demo" release="1.el7" src="libsolv-0.6.26-1.el7.src.rpm" version="0.6.26"><filename>libsolv-demo-0.6.26-1.el7.x86_64.rpm</filename><sum type="sha256">0850eab74d1178e8ee507fdc4a22ad0eae16d0b69fad6228665fff5c59fb23a9</sum></package><package arch="x86_64" name="PackageKit-cron" release="1.sl7" src="PackageKit-1.1.5-1.sl7.src.rpm" version="1.1.5"><filename>PackageKit-cron-1.1.5-1.sl7.x86_64.rpm</filename><sum type="sha256">a1254e2e4e45cd481fc2978bf3ccef893ae92d32e5282c66360a3ad8b8643936</sum></package><package arch="x86_64" name="PackageKit-command-not-found" release="1.sl7" src="PackageKit-1.1.5-1.sl7.src.rpm" version="1.1.5"><filename>PackageKit-command-not-found-1.1.5-1.sl7.x86_64.rpm</filename><sum type="sha256">d8a87827d150d7f552b7642fc9ecde132c972e3e7d94c2e20c633e132ebba969</sum></package><package arch="i686" name="libgcab1-devel" release="3.el7" src="gcab-0.7-3.el7.src.rpm" version="0.7"><filename>libgcab1-devel-0.7-3.el7.i686.rpm</filename><sum type="sha256">6ca2c5335255a8f29426aaba744cf3b20f11605af7936f4b4dcd9e89b79c1a53</sum></package><package arch="i686" name="gnome-software" release="1.el7" src="gnome-software-3.22.7-1.el7.src.rpm" version="3.22.7"><filename>gnome-software-3.22.7-1.el7.i686.rpm</filename><sum type="sha256">0881a6be0a7ee5c7d071b3916a8452e558c0f7a9cf5d5d9c71cb8e7b2e21a850</sum></package><package arch="x86_64" name="libgcab1" release="3.el7" src="gcab-0.7-3.el7.src.rpm" version="0.7"><filename>libgcab1-0.7-3.el7.x86_64.rpm</filename><sum type="sha256">1c5dd50543e39996d7a3679c05f3593e320a96b14aaad69e444184a78d7cf339</sum></package><package arch="x86_64" name="libappstream-glib" release="1.el7" src="libappstream-glib-0.6.10-1.el7.src.rpm" version="0.6.10"><filename>libappstream-glib-0.6.10-1.el7.x86_64.rpm</filename><sum type="sha256">3dd331db299b7186c4fb5d4cfa5cd63b956c7f9d98c84805f4bc22b89f74538c</sum></package><package arch="x86_64" name="libsolv-tools" release="1.el7" src="libsolv-0.6.26-1.el7.src.rpm" version="0.6.26"><filename>libsolv-tools-0.6.26-1.el7.x86_64.rpm</filename><sum type="sha256">dda132f9ed8abbe8254f85b4abdd0dfac5def6eaae7673eb0af652a0dfcb6e29</sum></package><package arch="i686" name="PackageKit-glib-devel" release="1.sl7" src="PackageKit-1.1.5-1.sl7.src.rpm" version="1.1.5"><filename>PackageKit-glib-devel-1.1.5-1.sl7.i686.rpm</filename><sum type="sha256">b21496d6fe87ee72d4d17045fcdefab02ceb058f9870cc0a980b0f3d82510a70</sum></package><package arch="x86_64" name="libappstream-glib-builder" release="1.el7" src="libappstream-glib-0.6.10-1.el7.src.rpm" version="0.6.10"><filename>libappstream-glib-builder-0.6.10-1.el7.x86_64.rpm</filename><sum type="sha256">bc929ad733656a4397ac83b570c73c7ed2cf6ee3d073ee8647c2574c22b8a285</sum></package><package arch="x86_64" name="PackageKit-yum-plugin" release="1.sl7" src="PackageKit-1.1.5-1.sl7.src.rpm" version="1.1.5"><filename>PackageKit-yum-plugin-1.1.5-1.sl7.x86_64.rpm</filename><sum type="sha256">9f20f67c0fe9fa86106410ea5232a523a6733be05935fc838be28982503d91ae</sum></package><package arch="i686" name="libsolv" release="1.el7" src="libsolv-0.6.26-1.el7.src.rpm" version="0.6.26"><filename>libsolv-0.6.26-1.el7.i686.rpm</filename><sum type="sha256">8825e9b72803805f04ad44aac0cc3b7fd1932a41ee52b118c168ad421b447fff</sum></package><package arch="x86_64" name="libsolv" release="1.el7" src="libsolv-0.6.26-1.el7.src.rpm" version="0.6.26"><filename>libsolv-0.6.26-1.el7.x86_64.rpm</filename><sum type="sha256">95447f7069c5c8f61a308bc6533ca438202b10bedc449a5961c314b404740e95</sum></package><package arch="x86_64" name="gnome-software" release="1.el7" src="gnome-software-3.22.7-1.el7.src.rpm" version="3.22.7"><filename>gnome-software-3.22.7-1.el7.x86_64.rpm</filename><sum type="sha256">6c9da9af19dc4fdbe1a755c399f629347f7623827e8eab6d674a997c34673d4f</sum></package><package arch="i686" name="PackageKit-gtk3-module" release="1.sl7" src="PackageKit-1.1.5-1.sl7.src.rpm" version="1.1.5"><filename>PackageKit-gtk3-module-1.1.5-1.sl7.i686.rpm</filename><sum type="sha256">b73150a2add056eb4cbce7c289606f020e1353895908a11b490ec243d419db5b</sum></package><package arch="x86_64" name="libappstream-glib-builder-devel" release="1.el7" src="libappstream-glib-0.6.10-1.el7.src.rpm" version="0.6.10"><filename>libappstream-glib-builder-devel-0.6.10-1.el7.x86_64.rpm</filename><sum type="sha256">fd6ccf47681607edea0752d6e781a54d7fb17d9d9e28bcbe3db7afe64b3a2d6f</sum></package><package arch="x86_64" name="gnome-software-devel" release="1.el7" src="gnome-software-3.22.7-1.el7.src.rpm" version="3.22.7"><filename>gnome-software-devel-3.22.7-1.el7.x86_64.rpm</filename><sum type="sha256">6b0a6bbc85cf78a7b8c853397292f929b9a6be78def8764dd2cd6302e1fc8a8a</sum></package><package arch="i686" name="libappstream-glib-builder-devel" release="1.el7" src="libappstream-glib-0.6.10-1.el7.src.rpm" version="0.6.10"><filename>libappstream-glib-builder-devel-0.6.10-1.el7.i686.rpm</filename><sum type="sha256">32acda2180f5e206594822a497067763324751b816899680e54a2455c7fc7ae6</sum></package><package arch="x86_64" name="PackageKit-gtk3-module" release="1.sl7" src="PackageKit-1.1.5-1.sl7.src.rpm" version="1.1.5"><filename>PackageKit-gtk3-module-1.1.5-1.sl7.x86_64.rpm</filename><sum type="sha256">0ef635534bf83dd25881fa91ea414ef6c32c1cfb6d6a55ef21aee1385d7132a8</sum></package><package arch="i686" name="libsolv-devel" release="1.el7" src="libsolv-0.6.26-1.el7.src.rpm" version="0.6.26"><filename>libsolv-devel-0.6.26-1.el7.i686.rpm</filename><sum type="sha256">e9116549ff17a331ed241f8c8f5ca6d8c88d5f0ed9b5e1b95b021cbecef493b8</sum></package><package arch="x86_64" name="PackageKit" release="1.sl7" src="PackageKit-1.1.5-1.sl7.src.rpm" version="1.1.5"><filename>PackageKit-1.1.5-1.sl7.x86_64.rpm</filename><sum type="sha256">c0e71d01e71be1666e0cd9909ffc228b209c4dbd1b0d77f61e037683bbaf55da</sum></package><package arch="x86_64" name="PackageKit-gstreamer-plugin" release="1.sl7" src="PackageKit-1.1.5-1.sl7.src.rpm" version="1.1.5"><filename>PackageKit-gstreamer-plugin-1.1.5-1.sl7.x86_64.rpm</filename><sum type="sha256">7fc47aa3bb76e6b86b4af96de50b5bc3058b8090c28f93cdea765c24907e444c</sum></package><package arch="x86_64" name="PackageKit-glib" release="1.sl7" src="PackageKit-1.1.5-1.sl7.src.rpm" version="1.1.5"><filename>PackageKit-glib-1.1.5-1.sl7.x86_64.rpm</filename><sum type="sha256">29bf1f864fbc77a3086ae8fccdd6dd6b88cf3ef8a1db4c111b401436823ebad6</sum></package><package arch="i686" name="libappstream-glib-builder" release="1.el7" src="libappstream-glib-0.6.10-1.el7.src.rpm" version="0.6.10"><filename>libappstream-glib-builder-0.6.10-1.el7.i686.rpm</filename><sum type="sha256">b50d1200a8d36f3dec2c3c2ede9154df8ed1743cf7ff9346a76e9758b7ac0e61</sum></package><package arch="i686" name="libsolv-tools" release="1.el7" src="libsolv-0.6.26-1.el7.src.rpm" version="0.6.26"><filename>libsolv-tools-0.6.26-1.el7.i686.rpm</filename><sum type="sha256">798185ae2b4275708e4fac917752dcc6ed836a5d72b578f230c0ab8b2965272a</sum></package><package arch="x86_64" name="libgcab1-devel" release="3.el7" src="gcab-0.7-3.el7.src.rpm" version="0.7"><filename>libgcab1-devel-0.7-3.el7.x86_64.rpm</filename><sum type="sha256">c11c2367046d039b235ba39f0bf8cdc0d396b633a45673f85c2cb08bc767954a</sum></package><package arch="x86_64" name="PackageKit-glib-devel" release="1.sl7" src="PackageKit-1.1.5-1.sl7.src.rpm" version="1.1.5"><filename>PackageKit-glib-devel-1.1.5-1.sl7.x86_64.rpm</filename><sum type="sha256">11fd7201873b91fb663ef5532fa699d0e42f8be8c8bf4010aac46e9f9dba99c2</sum></package><package arch="x86_64" name="PackageKit-yum" release="1.sl7" src="PackageKit-1.1.5-1.sl7.src.rpm" version="1.1.5"><filename>PackageKit-yum-1.1.5-1.sl7.x86_64.rpm</filename><sum type="sha256">4ec46d2a0221490460098e08fca4cb613780fe8f133205453b7a0e297590cbf4</sum></package><package arch="x86_64" name="gcab" release="3.el7" src="gcab-0.7-3.el7.src.rpm" version="0.7"><filename>gcab-0.7-3.el7.x86_64.rpm</filename><sum type="sha256">3a5af36d669bc7ea8f25493ff6e68625078acd12781c02b944d918323ee1e90a</sum></package><package arch="i686" name="libappstream-glib" release="1.el7" src="libappstream-glib-0.6.10-1.el7.src.rpm" version="0.6.10"><filename>libappstream-glib-0.6.10-1.el7.i686.rpm</filename><sum type="sha256">c79f2893691e08957025d2551e52b18c6f0ce7b2dbfeafbd758aec284e14bae9</sum></package><package arch="i686" name="gnome-software-devel" release="1.el7" src="gnome-software-3.22.7-1.el7.src.rpm" version="3.22.7"><filename>gnome-software-devel-3.22.7-1.el7.i686.rpm</filename><sum type="sha256">3bbf17d51c9411909390ec0e3b3e2d23844984adecd2d3c98de009a1e69877c8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2303" id="RHEA-2017:2303-1" title="Rhea-2017:2303-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2305-1</id><title>Gnome-System-Monitor Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libgtop2-devel" release="1.el7" src="libgtop2-2.34.2-1.el7.src.rpm" version="2.34.2"><filename>libgtop2-devel-2.34.2-1.el7.i686.rpm</filename><sum type="sha256">0dc55f95d71c6a6bb0f2508d8ff854a46d41b49466d826ee7d40913be4413050</sum></package><package arch="x86_64" name="libgtop2" release="1.el7" src="libgtop2-2.34.2-1.el7.src.rpm" version="2.34.2"><filename>libgtop2-2.34.2-1.el7.x86_64.rpm</filename><sum type="sha256">61185eda96505eaac6340c6572e789bc92f2d888e1a4a641fc99118d6f1982a4</sum></package><package arch="x86_64" name="libgtop2-devel" release="1.el7" src="libgtop2-2.34.2-1.el7.src.rpm" version="2.34.2"><filename>libgtop2-devel-2.34.2-1.el7.x86_64.rpm</filename><sum type="sha256">69ec15ec1d9e9c2993c2dc38aa8fd318be8284666e349f8770238f1b6eeba994</sum></package><package arch="x86_64" name="baobab" release="1.el7" src="baobab-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>baobab-3.22.1-1.el7.x86_64.rpm</filename><sum type="sha256">b88c20f61f9059f91b56657616c05688a2c68df9713f85205bfe424206604b0b</sum></package><package arch="x86_64" name="libwnck3" release="1.el7" src="libwnck3-3.20.1-1.el7.src.rpm" version="3.20.1"><filename>libwnck3-3.20.1-1.el7.x86_64.rpm</filename><sum type="sha256">febac954632c0ff71f89d1058590fd29e4f91c8abb314802bcb6ba45619e9522</sum></package><package arch="x86_64" name="gnome-system-monitor" release="2.el7" src="gnome-system-monitor-3.22.2-2.el7.src.rpm" version="3.22.2"><filename>gnome-system-monitor-3.22.2-2.el7.x86_64.rpm</filename><sum type="sha256">97c86dce91f80349699d62e6d508f99549dd9715b6cd5d58116041fa80428d01</sum></package><package arch="x86_64" name="libwnck3-devel" release="1.el7" src="libwnck3-3.20.1-1.el7.src.rpm" version="3.20.1"><filename>libwnck3-devel-3.20.1-1.el7.x86_64.rpm</filename><sum type="sha256">eaae6836937d1a8335d32a2072559688e38ffcf5098ad1046afb6c59289bfb81</sum></package><package arch="i686" name="libgtop2" release="1.el7" src="libgtop2-2.34.2-1.el7.src.rpm" version="2.34.2"><filename>libgtop2-2.34.2-1.el7.i686.rpm</filename><sum type="sha256">05dc2538df296b161a26d4260c1eb650c94b6cc9a34c0ac9bb0a771fb96e2328</sum></package><package arch="i686" name="libwnck3-devel" release="1.el7" src="libwnck3-3.20.1-1.el7.src.rpm" version="3.20.1"><filename>libwnck3-devel-3.20.1-1.el7.i686.rpm</filename><sum type="sha256">02b4f7c81f283fe6adbee79e86993b18aa7952185036a71b262aff7f8cd6961c</sum></package><package arch="i686" name="libwnck3" release="1.el7" src="libwnck3-3.20.1-1.el7.src.rpm" version="3.20.1"><filename>libwnck3-3.20.1-1.el7.i686.rpm</filename><sum type="sha256">6dd4e85c170cc2a6f3f943645cde0c80fbb7fe195187603d2953318b10054722</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2305" id="RHEA-2017:2305-1" title="Rhea-2017:2305-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:2309-1</id><title>New Packages: Flatpak, Xdg-Desktop-Portal, And Xdg-Desktop-Portal-Gtk</title><description /><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="flatpak" release="1.el7" src="flatpak-0.8.7-1.el7.src.rpm" version="0.8.7"><filename>flatpak-0.8.7-1.el7.i686.rpm</filename><sum type="sha256">dae3e925b49b6c1ea3730255deb8aa306f8b6347587877b0a1e765c2427058c4</sum></package><package arch="x86_64" name="flatpak-devel" release="1.el7" src="flatpak-0.8.7-1.el7.src.rpm" version="0.8.7"><filename>flatpak-devel-0.8.7-1.el7.x86_64.rpm</filename><sum type="sha256">fc04edbf1952fb8ee9755a5751d642d6ba6a7fafb8bc3c530452345bac229384</sum></package><package arch="i686" name="xdg-desktop-portal" release="2.el7" src="xdg-desktop-portal-0.5-2.el7.src.rpm" version="0.5"><filename>xdg-desktop-portal-0.5-2.el7.i686.rpm</filename><sum type="sha256">b752701ed39fde60251f6e70a825194c405f8476ffbf98fb57246083f06e2f9b</sum></package><package arch="x86_64" name="xdg-desktop-portal" release="2.el7" src="xdg-desktop-portal-0.5-2.el7.src.rpm" version="0.5"><filename>xdg-desktop-portal-0.5-2.el7.x86_64.rpm</filename><sum type="sha256">247d87b74a714d248fda21157a613467b41a9f3b089e1e27a98f33333b47308e</sum></package><package arch="i686" name="flatpak-devel" release="1.el7" src="flatpak-0.8.7-1.el7.src.rpm" version="0.8.7"><filename>flatpak-devel-0.8.7-1.el7.i686.rpm</filename><sum type="sha256">368b704e4e0ed32e9822a25b275ab15f170e560ffca8d53f6913ce90bead0233</sum></package><package arch="x86_64" name="flatpak-builder" release="1.el7" src="flatpak-0.8.7-1.el7.src.rpm" version="0.8.7"><filename>flatpak-builder-0.8.7-1.el7.x86_64.rpm</filename><sum type="sha256">7d7473da56239a9cb0da4fce9d17222ed9e125adf457ffe9f92649a242012179</sum></package><package arch="i686" name="xdg-desktop-portal-devel" release="2.el7" src="xdg-desktop-portal-0.5-2.el7.src.rpm" version="0.5"><filename>xdg-desktop-portal-devel-0.5-2.el7.i686.rpm</filename><sum type="sha256">e9a0a45044185be3a3c0381521dd36ce857336e5a0de5472a9fa034fc2ddd424</sum></package><package arch="x86_64" name="flatpak-libs" release="1.el7" src="flatpak-0.8.7-1.el7.src.rpm" version="0.8.7"><filename>flatpak-libs-0.8.7-1.el7.x86_64.rpm</filename><sum type="sha256">362b8674a71ddf3403e85ceaf759d59a44bb9f39c642184b644b2062b74c6201</sum></package><package arch="x86_64" name="xdg-desktop-portal-devel" release="2.el7" src="xdg-desktop-portal-0.5-2.el7.src.rpm" version="0.5"><filename>xdg-desktop-portal-devel-0.5-2.el7.x86_64.rpm</filename><sum type="sha256">3e9648c49d1f3b353f06d65764488eef71a83e6d9640d93fe00be1e33590c6ef</sum></package><package arch="x86_64" name="xdg-desktop-portal-gtk" release="1.el7" src="xdg-desktop-portal-gtk-0.5-1.el7.src.rpm" version="0.5"><filename>xdg-desktop-portal-gtk-0.5-1.el7.x86_64.rpm</filename><sum type="sha256">4d9b432d086f03a1713ac7245740db3518e171e5860e4b1cb740864a2c8db295</sum></package><package arch="i686" name="flatpak-libs" release="1.el7" src="flatpak-0.8.7-1.el7.src.rpm" version="0.8.7"><filename>flatpak-libs-0.8.7-1.el7.i686.rpm</filename><sum type="sha256">18a046cbf995f29348f3597cbfe72101ff1aee64d9cadfa5b471437055a9682d</sum></package><package arch="x86_64" name="flatpak" release="1.el7" src="flatpak-0.8.7-1.el7.src.rpm" version="0.8.7"><filename>flatpak-0.8.7-1.el7.x86_64.rpm</filename><sum type="sha256">f2097506d280ba3bbdf8757947f5102acfff2174ba1e2054096b38500c1fd542</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:2309" id="RHEA-2017:2309-1" title="Rhea-2017:2309-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2017:3052-1</id><title>Tzdata Enhancement Update</title><description>* Sudan will switch from UTC+03 to UTC+02 on November 1, 2017. 
* Tonga will no longer use DST (Daylight Saving Time). This change takes effect on November 5, 2017. 
* Fiji ends DST on January 14, 2018 instead of January 21, 2018. 
* Namibia, on September 3, 2017 will switch from UTC+01 with DST to UTC+02 around the year. This change takes effect on April 1, 2018. 
*  On March 11, 2018, the Turks and Caicos Islands will change from UTC-04 to UTC-05 with US DST starting on March 11, 2018. Effective change date is November 4, 2018. 
* tzdata now includes two text versions of the time zone data: the "tzdata.zi" and "leapseconds" files.</description><release>Scientific Linux</release><issued date="2017-10-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2017c-1.el7.src.rpm" version="2017c"><filename>tzdata-java-2017c-1.el7.noarch.rpm</filename><sum type="sha256">4e7e37f24708b371f2f48992346fead7c377f6b03f51559e00ca28f64d1b5525</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2017c-1.el7.src.rpm" version="2017c"><filename>tzdata-2017c-1.el7.noarch.rpm</filename><sum type="sha256">f2d413522a0768368bf84e8e0808039f40a284085bef11c244cac03e9e0a20c5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2017:3052" id="RHEA-2017:3052-1" title="Rhea-2017:3052-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1503823" id="1503823" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1505685" id="1505685" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1505689" id="1505689" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:0232-1</id><title>Tzdata Enhancement Update</title><description>* Brazil's Daylight Saving Time (DST) will start on the first Sunday in November.

* Support has been added for the "-t" option for the zic utility. This enables the user to put the configuration link in the specified file instead of the standard location.</description><release>Scientific Linux</release><issued date="2018-01-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tzdata-java" release="1.el7" src="tzdata-2018c-1.el7.src.rpm" version="2018c"><filename>tzdata-java-2018c-1.el7.noarch.rpm</filename><sum type="sha256">343788fb7298de725337652830f21f4ca0ec30f0093e4466324c142cb9b00a87</sum></package><package arch="noarch" name="tzdata" release="1.el7" src="tzdata-2018c-1.el7.src.rpm" version="2018c"><filename>tzdata-2018c-1.el7.noarch.rpm</filename><sum type="sha256">443617283ca4794d77c7f388df1e9759e8550315cc34fb137347a4f198a61b43</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:0232" id="RHEA-2018:0232-1" title="Rhea-2018:0232-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1536028" id="1536028" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1536031" id="1536031" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1536040" id="1536040" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:0679-1</id><title>Nspr, Nss, And Nss-Util Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-softokn" release="2.el7" src="nss-softokn-3.34.0-2.el7.src.rpm" version="3.34.0"><filename>nss-softokn-3.34.0-2.el7.x86_64.rpm</filename><sum type="sha256">121910777345d1cfe58baf0c2c045b2f099889949cd1ac7bfd57409e7a47a062</sum></package><package arch="x86_64" name="nss-softokn-devel" release="2.el7" src="nss-softokn-3.34.0-2.el7.src.rpm" version="3.34.0"><filename>nss-softokn-devel-3.34.0-2.el7.x86_64.rpm</filename><sum type="sha256">131ee83989f938e7c41b86be717be34eec6022d9024a7b4e62438fd0d0d9ad89</sum></package><package arch="i686" name="nss-softokn-freebl" release="2.el7" src="nss-softokn-3.34.0-2.el7.src.rpm" version="3.34.0"><filename>nss-softokn-freebl-3.34.0-2.el7.i686.rpm</filename><sum type="sha256">66c872521324665106a6a32b88e121781775bf5f52cff6f83fcf46b475b83b49</sum></package><package arch="x86_64" name="nss-util-devel" release="2.el7" src="nss-util-3.34.0-2.el7.src.rpm" version="3.34.0"><filename>nss-util-devel-3.34.0-2.el7.x86_64.rpm</filename><sum type="sha256">20de7f55208bbbad794c7beb61fd4e6904e29a1a6573edfb715338a650303bbc</sum></package><package arch="x86_64" name="nspr-devel" release="1.el7" src="nspr-4.17.0-1.el7.src.rpm" version="4.17.0"><filename>nspr-devel-4.17.0-1.el7.x86_64.rpm</filename><sum type="sha256">072c7318639aadda664277c7579ce74204422e722722994d67cc46e5191d5626</sum></package><package arch="i686" name="nss-util-devel" release="2.el7" src="nss-util-3.34.0-2.el7.src.rpm" version="3.34.0"><filename>nss-util-devel-3.34.0-2.el7.i686.rpm</filename><sum type="sha256">265ccabd6a8b02189f8a6b6ed76cea6aee071e85242eb829de5101d061f97dfb</sum></package><package arch="x86_64" name="nss-util" release="2.el7" src="nss-util-3.34.0-2.el7.src.rpm" version="3.34.0"><filename>nss-util-3.34.0-2.el7.x86_64.rpm</filename><sum type="sha256">c6b4d865eb89b9c54a00a10b3826beec8566ff36334edbe5851a06ef9c75e833</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="2.el7" src="nss-softokn-3.34.0-2.el7.src.rpm" version="3.34.0"><filename>nss-softokn-freebl-3.34.0-2.el7.x86_64.rpm</filename><sum type="sha256">2329cd2813d7c0ae273aa3f351d1c8d6976679c4fc160c8b29b8571ff7cf1e7c</sum></package><package arch="x86_64" name="nss" release="4.el7" src="nss-3.34.0-4.el7.src.rpm" version="3.34.0"><filename>nss-3.34.0-4.el7.x86_64.rpm</filename><sum type="sha256">f5949de194f5cc08b18ad6fa7ae004179628d44d83a633b4ef35d95d9a264a71</sum></package><package arch="i686" name="nspr" release="1.el7" src="nspr-4.17.0-1.el7.src.rpm" version="4.17.0"><filename>nspr-4.17.0-1.el7.i686.rpm</filename><sum type="sha256">213e6bf284b1c0fc5bb1b9e18006afa9dee36be534cf0bb74e4e76b908864305</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="2.el7" src="nss-softokn-3.34.0-2.el7.src.rpm" version="3.34.0"><filename>nss-softokn-freebl-devel-3.34.0-2.el7.x86_64.rpm</filename><sum type="sha256">15831d2bf1275acac654cdffaa97d3f70f99c6716b1a565e8b54f3702885ddd3</sum></package><package arch="i686" name="nss-devel" release="4.el7" src="nss-3.34.0-4.el7.src.rpm" version="3.34.0"><filename>nss-devel-3.34.0-4.el7.i686.rpm</filename><sum type="sha256">3ec5e5a433f1104a474317e25f37bf71243304afc2ffc7753a8731c6993fc046</sum></package><package arch="i686" name="nss-softokn" release="2.el7" src="nss-softokn-3.34.0-2.el7.src.rpm" version="3.34.0"><filename>nss-softokn-3.34.0-2.el7.i686.rpm</filename><sum type="sha256">01a3de820cf399885f956912620f775e70a8b9315f12774362280948de4207de</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="4.el7" src="nss-3.34.0-4.el7.src.rpm" version="3.34.0"><filename>nss-pkcs11-devel-3.34.0-4.el7.x86_64.rpm</filename><sum type="sha256">d861a5d5481bfc284c531d016c9634ba61bf57564ac942791a2ac774c5b6a589</sum></package><package arch="i686" name="nss-softokn-devel" release="2.el7" src="nss-softokn-3.34.0-2.el7.src.rpm" version="3.34.0"><filename>nss-softokn-devel-3.34.0-2.el7.i686.rpm</filename><sum type="sha256">0e8466c1834a0d839f1924e469d0e80552462b3114dce19f5634174c60b20429</sum></package><package arch="i686" name="nss-util" release="2.el7" src="nss-util-3.34.0-2.el7.src.rpm" version="3.34.0"><filename>nss-util-3.34.0-2.el7.i686.rpm</filename><sum type="sha256">d177eff2a61a24e33dfd0ef7ade7fc7c2b3eab6070c7ed819c01811a3c8ac9e2</sum></package><package arch="x86_64" name="nss-tools" release="4.el7" src="nss-3.34.0-4.el7.src.rpm" version="3.34.0"><filename>nss-tools-3.34.0-4.el7.x86_64.rpm</filename><sum type="sha256">0c200b12bffb4e615251342e1f10eb49397153213be1f1aa2cbf5f1a76cd018a</sum></package><package arch="i686" name="nss-pkcs11-devel" release="4.el7" src="nss-3.34.0-4.el7.src.rpm" version="3.34.0"><filename>nss-pkcs11-devel-3.34.0-4.el7.i686.rpm</filename><sum type="sha256">7b765697427a39cc8161a96ae6fa2090a645ddfe82d4ce89871ec54f04df5db5</sum></package><package arch="x86_64" name="nss-devel" release="4.el7" src="nss-3.34.0-4.el7.src.rpm" version="3.34.0"><filename>nss-devel-3.34.0-4.el7.x86_64.rpm</filename><sum type="sha256">126c4043c7b238ae42798234fb3749fe7c91d8f5d45924a29691246d2d645e75</sum></package><package arch="x86_64" name="nspr" release="1.el7" src="nspr-4.17.0-1.el7.src.rpm" version="4.17.0"><filename>nspr-4.17.0-1.el7.x86_64.rpm</filename><sum type="sha256">321c948296eaf41ae75527a6b2cb20320a652cd33486d68e0ff5cc95c227add8</sum></package><package arch="x86_64" name="nss-sysinit" release="4.el7" src="nss-3.34.0-4.el7.src.rpm" version="3.34.0"><filename>nss-sysinit-3.34.0-4.el7.x86_64.rpm</filename><sum type="sha256">5ecfd2c7741f93b6fca33179ef7e9e414c3ee509ba70576ec966654711272ea5</sum></package><package arch="i686" name="nspr-devel" release="1.el7" src="nspr-4.17.0-1.el7.src.rpm" version="4.17.0"><filename>nspr-devel-4.17.0-1.el7.i686.rpm</filename><sum type="sha256">b6e55a317b9eff3a0b0253ac741de038b9827ef012c0008d64e3e7da8d533c14</sum></package><package arch="i686" name="nss" release="4.el7" src="nss-3.34.0-4.el7.src.rpm" version="3.34.0"><filename>nss-3.34.0-4.el7.i686.rpm</filename><sum type="sha256">9e6ef43090b947a562f04f285474065ac7014b8237f4ba827f8d96e2b4f7f954</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="2.el7" src="nss-softokn-3.34.0-2.el7.src.rpm" version="3.34.0"><filename>nss-softokn-freebl-devel-3.34.0-2.el7.i686.rpm</filename><sum type="sha256">fb04fdc22e37ee449c384a91f5df86c5503fad6dfdfc0ccb30699d4b7ce900c0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:0679" id="RHEA-2018:0679-1" title="Rhea-2018:0679-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:0694-1</id><title>Libpcap Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="14" name="libpcap" release="11.el7" src="libpcap-1.5.3-11.el7.src.rpm" version="1.5.3"><filename>libpcap-1.5.3-11.el7.i686.rpm</filename><sum type="sha256">8ab26b05811bb9bec00298890d26710d93cbd165cb64f596edaba8293e26dbba</sum></package><package arch="x86_64" epoch="14" name="libpcap" release="11.el7" src="libpcap-1.5.3-11.el7.src.rpm" version="1.5.3"><filename>libpcap-1.5.3-11.el7.x86_64.rpm</filename><sum type="sha256">39d26db047552317f0f2219f8c063dc4c3265f88df0985f3517119a447287236</sum></package><package arch="x86_64" epoch="14" name="libpcap-devel" release="11.el7" src="libpcap-1.5.3-11.el7.src.rpm" version="1.5.3"><filename>libpcap-devel-1.5.3-11.el7.x86_64.rpm</filename><sum type="sha256">0b987864201eb73dd25baacb7f3d94b7c3b538a6d0081e536293a0ca515368d9</sum></package><package arch="i686" epoch="14" name="libpcap-devel" release="11.el7" src="libpcap-1.5.3-11.el7.src.rpm" version="1.5.3"><filename>libpcap-devel-1.5.3-11.el7.i686.rpm</filename><sum type="sha256">eabfe2200a038cd8b314c66cde61a288587f3a918ee12a46b88e9459ec9231ad</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:0694" id="RHEA-2018:0694-1" title="Rhea-2018:0694-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:0740-1</id><title>Ocaml Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ocaml" release="6.el7" src="ocaml-4.05.0-6.el7.src.rpm" version="4.05.0"><filename>ocaml-4.05.0-6.el7.x86_64.rpm</filename><sum type="sha256">6af8e9111139cfb3303253ebe1f182c4b4b9d59351a3754cd8053630dc737982</sum></package><package arch="x86_64" name="ocaml-emacs" release="6.el7" src="ocaml-4.05.0-6.el7.src.rpm" version="4.05.0"><filename>ocaml-emacs-4.05.0-6.el7.x86_64.rpm</filename><sum type="sha256">e740c8943cdeaf3c62594e94cd1b3ba5e3e3f81d1f96d25a72606f80442a2d3a</sum></package><package arch="x86_64" name="ocaml-ocamldoc" release="6.el7" src="ocaml-4.05.0-6.el7.src.rpm" version="4.05.0"><filename>ocaml-ocamldoc-4.05.0-6.el7.x86_64.rpm</filename><sum type="sha256">b7a8c80034e2acf7012eda9f2c29c0e984b17e5105b30d15d13b0e39cbe5efde</sum></package><package arch="x86_64" name="ocaml-docs" release="6.el7" src="ocaml-4.05.0-6.el7.src.rpm" version="4.05.0"><filename>ocaml-docs-4.05.0-6.el7.x86_64.rpm</filename><sum type="sha256">7c342b08321b493cb0e58c44f5ebf256add4205d3cb2d5944840196fef6f41da</sum></package><package arch="x86_64" name="ocaml-compiler-libs" release="6.el7" src="ocaml-4.05.0-6.el7.src.rpm" version="4.05.0"><filename>ocaml-compiler-libs-4.05.0-6.el7.x86_64.rpm</filename><sum type="sha256">3613f4c134d60d6f1bd51c4e3498926591eeff254145b5499b860a5106fa2f3c</sum></package><package arch="x86_64" name="ocaml-source" release="6.el7" src="ocaml-4.05.0-6.el7.src.rpm" version="4.05.0"><filename>ocaml-source-4.05.0-6.el7.x86_64.rpm</filename><sum type="sha256">0715986e20d4a72714368ec2705ed2bb290af9165d30cda547496b4599dc8159</sum></package><package arch="x86_64" name="ocaml-runtime" release="6.el7" src="ocaml-4.05.0-6.el7.src.rpm" version="4.05.0"><filename>ocaml-runtime-4.05.0-6.el7.x86_64.rpm</filename><sum type="sha256">c7e48494c6e3ca7a7911c2660ea6625c2fcc6426cb0e51a1db021dfb931b405a</sum></package><package arch="x86_64" name="ocaml-x11" release="6.el7" src="ocaml-4.05.0-6.el7.src.rpm" version="4.05.0"><filename>ocaml-x11-4.05.0-6.el7.x86_64.rpm</filename><sum type="sha256">b90c008d39d2c7e631902181ec68cdff3c51e02103ff2dc132082b9a45f9450d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:0740" id="RHEA-2018:0740-1" title="Rhea-2018:0740-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:0830-1</id><title>Open-Vm-Tools Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="open-vm-tools" release="3.el7" src="open-vm-tools-10.1.10-3.el7.src.rpm" version="10.1.10"><filename>open-vm-tools-10.1.10-3.el7.x86_64.rpm</filename><sum type="sha256">202ab234b40bb1404139d8b6db7729ddd6031bf2abb190f19c1f0d5e00a2dc4f</sum></package><package arch="x86_64" name="open-vm-tools-devel" release="3.el7" src="open-vm-tools-10.1.10-3.el7.src.rpm" version="10.1.10"><filename>open-vm-tools-devel-10.1.10-3.el7.x86_64.rpm</filename><sum type="sha256">34a92b35cb56e507fb4438b4787d34b64279166fe52be1d422446f833b79396e</sum></package><package arch="x86_64" name="open-vm-tools-desktop" release="3.el7" src="open-vm-tools-10.1.10-3.el7.src.rpm" version="10.1.10"><filename>open-vm-tools-desktop-10.1.10-3.el7.x86_64.rpm</filename><sum type="sha256">4ac8ba64a1c7cda3ef48ad2eb05feb9cc2c826a5bea0594524bf74c86f788443</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:0830" id="RHEA-2018:0830-1" title="Rhea-2018:0830-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:0836-1</id><title>Libgphoto2 Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kamera" release="5.el7" src="kamera-4.10.5-5.el7.src.rpm" version="4.10.5"><filename>kamera-4.10.5-5.el7.x86_64.rpm</filename><sum type="sha256">5b2f448c2621c91b0f6325357afe21a26ced1af13e677a6fdc8cd8eca9d76494</sum></package><package arch="i686" name="libgphoto2" release="1.el7" src="libgphoto2-2.5.15-1.el7.src.rpm" version="2.5.15"><filename>libgphoto2-2.5.15-1.el7.i686.rpm</filename><sum type="sha256">7e6bd48ed5173e1752c630e25aad32c181e23df25d99c395581d392dde8e32b9</sum></package><package arch="x86_64" name="libgphoto2-devel" release="1.el7" src="libgphoto2-2.5.15-1.el7.src.rpm" version="2.5.15"><filename>libgphoto2-devel-2.5.15-1.el7.x86_64.rpm</filename><sum type="sha256">ca51719e75f96bbdf3991b71138cc36226dd3a8a0b8b44c7677b24f571214d07</sum></package><package arch="x86_64" name="libgphoto2" release="1.el7" src="libgphoto2-2.5.15-1.el7.src.rpm" version="2.5.15"><filename>libgphoto2-2.5.15-1.el7.x86_64.rpm</filename><sum type="sha256">f1f35b14d37869ec79733c32b67b90e139e26785a6958622a4b4f84d5984c550</sum></package><package arch="i686" name="libgphoto2-devel" release="1.el7" src="libgphoto2-2.5.15-1.el7.src.rpm" version="2.5.15"><filename>libgphoto2-devel-2.5.15-1.el7.i686.rpm</filename><sum type="sha256">1fb4b0bd5cad9f943d7c1932f0ade19d6f7c9e58ef61dac17ec205959b90591a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:0836" id="RHEA-2018:0836-1" title="Rhea-2018:0836-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:0865-1</id><title>New Packages: Lz4</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="lz4-devel" release="2.el7" src="lz4-1.7.5-2.el7.src.rpm" version="1.7.5"><filename>lz4-devel-1.7.5-2.el7.i686.rpm</filename><sum type="sha256">5362dd4a8bfbb4013edfed7936581bd98343e4ded07be993ced7979b66b1cadc</sum></package><package arch="x86_64" name="lz4-static" release="2.el7" src="lz4-1.7.5-2.el7.src.rpm" version="1.7.5"><filename>lz4-static-1.7.5-2.el7.x86_64.rpm</filename><sum type="sha256">08198b52303238f773fb2704e7cbfa1721f52bb874cf1402b030353daf9b691f</sum></package><package arch="x86_64" name="lz4-devel" release="2.el7" src="lz4-1.7.5-2.el7.src.rpm" version="1.7.5"><filename>lz4-devel-1.7.5-2.el7.x86_64.rpm</filename><sum type="sha256">cdd9c205dbd5b2585b04b83b6ed9685c2aed556f4d703b66710ca79e30853a71</sum></package><package arch="i686" name="lz4-static" release="2.el7" src="lz4-1.7.5-2.el7.src.rpm" version="1.7.5"><filename>lz4-static-1.7.5-2.el7.i686.rpm</filename><sum type="sha256">3d9b8d2350b0698a883b6cd9225741983e46508a74dc5df3e9609040d3c5e468</sum></package><package arch="i686" name="lz4" release="2.el7" src="lz4-1.7.5-2.el7.src.rpm" version="1.7.5"><filename>lz4-1.7.5-2.el7.i686.rpm</filename><sum type="sha256">b71b987edc16f6603fd612e88f5574f787501da7fc3c89f5592f84b67aa018cb</sum></package><package arch="x86_64" name="lz4" release="2.el7" src="lz4-1.7.5-2.el7.src.rpm" version="1.7.5"><filename>lz4-1.7.5-2.el7.x86_64.rpm</filename><sum type="sha256">59b0339f4a0c9e960a6c87f2131ecfe66806ecf0872e6b95e54a4d74028c3715</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:0865" id="RHEA-2018:0865-1" title="Rhea-2018:0865-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:0867-1</id><title>Redhat-Rpm-Config Bug Fix Update</title><description>The redhat-rpm-config package is used during the build of RPM packages to apply various default distribution options determined by Red Hat. Also, redhat-rpm-config provides a few Red Hat RPM macro customizations, such as those used during the building of Driver Update packages.</description><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="redhat-rpm-config" release="80.sl7" src="redhat-rpm-config-9.1.0-80.sl7.src.rpm" version="9.1.0"><filename>redhat-rpm-config-9.1.0-80.sl7.noarch.rpm</filename><sum type="sha256">6f70aaf6a2b7d8d35963fc3be2ac276a03ab5f156a7d589003ab66e4c431e4ad</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:0867" id="RHEA-2018:0867-1" title="Rhea-2018:0867-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:0874-1</id><title>Linux-Firmware Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="iwl2000-firmware" release="62.el7" src="linux-firmware-20180220-62.git6d51311.el7.src.rpm" version="18.168.6.1"><filename>iwl2000-firmware-18.168.6.1-62.el7.noarch.rpm</filename><sum type="sha256">39b143a2826e869998990af57c83f5b92d68afc1447b161b5c6610d02a488c98</sum></package><package arch="noarch" name="iwl5150-firmware" release="62.el7" src="linux-firmware-20180220-62.git6d51311.el7.src.rpm" version="8.24.2.2"><filename>iwl5150-firmware-8.24.2.2-62.el7.noarch.rpm</filename><sum type="sha256">2ec21d2ae0ea3f35f6224316b3f89dd9f12bfbe13d0784596aef1ae3fe5f6be0</sum></package><package arch="noarch" name="iwl100-firmware" release="62.el7" src="linux-firmware-20180220-62.git6d51311.el7.src.rpm" version="39.31.5.1"><filename>iwl100-firmware-39.31.5.1-62.el7.noarch.rpm</filename><sum type="sha256">458ffa8e168b4533deacbeb67e9a5edb065759a8f0eaf9723e69b88a573bb720</sum></package><package arch="noarch" name="iwl7265-firmware" release="62.el7" src="linux-firmware-20180220-62.git6d51311.el7.src.rpm" version="22.0.7.0"><filename>iwl7265-firmware-22.0.7.0-62.el7.noarch.rpm</filename><sum type="sha256">1cd4227b893e19552008cbc7cbda4af2506e02a35fc46e722143abdf19d54906</sum></package><package arch="noarch" name="iwl2030-firmware" release="62.el7" src="linux-firmware-20180220-62.git6d51311.el7.src.rpm" version="18.168.6.1"><filename>iwl2030-firmware-18.168.6.1-62.el7.noarch.rpm</filename><sum type="sha256">60705f9750b671e6619dc9b13aa7fdae3d2e8aff96e86e815525135275a703a1</sum></package><package arch="noarch" name="iwl6000-firmware" release="62.el7" src="linux-firmware-20180220-62.git6d51311.el7.src.rpm" version="9.221.4.1"><filename>iwl6000-firmware-9.221.4.1-62.el7.noarch.rpm</filename><sum type="sha256">61485a041374a4f3ac36681474e90d37ed6c2aaeb15872e393297b601a359ad6</sum></package><package arch="noarch" name="iwl7260-firmware" release="62.el7" src="linux-firmware-20180220-62.git6d51311.el7.src.rpm" version="22.0.7.0"><filename>iwl7260-firmware-22.0.7.0-62.el7.noarch.rpm</filename><sum type="sha256">e935c4742d99d73cde737d04920eca243713d7db4ae7ab31e408c5833c5c7f77</sum></package><package arch="noarch" name="iwl5000-firmware" release="62.el7" src="linux-firmware-20180220-62.git6d51311.el7.src.rpm" version="8.83.5.1_1"><filename>iwl5000-firmware-8.83.5.1_1-62.el7.noarch.rpm</filename><sum type="sha256">de8cb31ee76e0b648cf55ecc51e513a89b62338c82ef566db75983b246f4946f</sum></package><package arch="noarch" name="iwl3160-firmware" release="62.el7" src="linux-firmware-20180220-62.git6d51311.el7.src.rpm" version="22.0.7.0"><filename>iwl3160-firmware-22.0.7.0-62.el7.noarch.rpm</filename><sum type="sha256">678b6319968f08deb2d7f26dc09c3b2457db5442d81cf21d737a4607fc1666fc</sum></package><package arch="noarch" epoch="1" name="iwl1000-firmware" release="62.el7" src="linux-firmware-20180220-62.git6d51311.el7.src.rpm" version="39.31.5.1"><filename>iwl1000-firmware-39.31.5.1-62.el7.noarch.rpm</filename><sum type="sha256">025864be1e175a08929201328253b8301511bc76dc12f5174ea3dd80c9ab20a4</sum></package><package arch="noarch" name="iwl135-firmware" release="62.el7" src="linux-firmware-20180220-62.git6d51311.el7.src.rpm" version="18.168.6.1"><filename>iwl135-firmware-18.168.6.1-62.el7.noarch.rpm</filename><sum type="sha256">c3a4324dfcee83909d42e42a9f7401cc5a48ea3a0bf9718371e624db263d4f69</sum></package><package arch="noarch" name="iwl3945-firmware" release="62.el7" src="linux-firmware-20180220-62.git6d51311.el7.src.rpm" version="15.32.2.9"><filename>iwl3945-firmware-15.32.2.9-62.el7.noarch.rpm</filename><sum type="sha256">743aea328262d81fea3739c5bcf21294c8def725d772cf33427e0357a4707dd6</sum></package><package arch="noarch" name="iwl6050-firmware" release="62.el7" src="linux-firmware-20180220-62.git6d51311.el7.src.rpm" version="41.28.5.1"><filename>iwl6050-firmware-41.28.5.1-62.el7.noarch.rpm</filename><sum type="sha256">ac676d09e7d5840ed1c6584453f4df08ece58b3a0c97b34f380ac503ddc94038</sum></package><package arch="noarch" name="iwl6000g2b-firmware" release="62.el7" src="linux-firmware-20180220-62.git6d51311.el7.src.rpm" version="17.168.5.2"><filename>iwl6000g2b-firmware-17.168.5.2-62.el7.noarch.rpm</filename><sum type="sha256">4844fcefb02259652d341cf3855e1dcd5e7aef8e0037a3b5befca14571f9ed0d</sum></package><package arch="noarch" name="iwl4965-firmware" release="62.el7" src="linux-firmware-20180220-62.git6d51311.el7.src.rpm" version="228.61.2.24"><filename>iwl4965-firmware-228.61.2.24-62.el7.noarch.rpm</filename><sum type="sha256">1eb2b49ee606007c89b5e462ff605de3b02394d893d8b46270deb7f9377d442a</sum></package><package arch="noarch" name="linux-firmware" release="62.git6d51311.el7" src="linux-firmware-20180220-62.git6d51311.el7.src.rpm" version="20180220"><filename>linux-firmware-20180220-62.git6d51311.el7.noarch.rpm</filename><sum type="sha256">fdf6516361fcbfba3892663c8d31ff1a4a7ca60f53c20cfb40160d8deaa0724a</sum></package><package arch="noarch" name="iwl105-firmware" release="62.el7" src="linux-firmware-20180220-62.git6d51311.el7.src.rpm" version="18.168.6.1"><filename>iwl105-firmware-18.168.6.1-62.el7.noarch.rpm</filename><sum type="sha256">2aa3df0f75e5defb9508199c5f43675047468f57f0c7b38972f62741a3c4abae</sum></package><package arch="noarch" name="iwl6000g2a-firmware" release="62.el7" src="linux-firmware-20180220-62.git6d51311.el7.src.rpm" version="17.168.5.3"><filename>iwl6000g2a-firmware-17.168.5.3-62.el7.noarch.rpm</filename><sum type="sha256">50e5c96781f62b6b22fd7b26180ab1c91f26fe30c44ea155e6488be2f1913baa</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:0874" id="RHEA-2018:0874-1" title="Rhea-2018:0874-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:0890-1</id><title>New Packages: Mpg123</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="gstreamer1-plugins-ugly-free" release="3.el7" src="gstreamer1-plugins-ugly-free-1.10.4-3.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-ugly-free-1.10.4-3.el7.i686.rpm</filename><sum type="sha256">aad5cd55da33ccb5213b7b871144d7bac7795f45d2bc5f8dbfd0123ff97ed63e</sum></package><package arch="x86_64" name="mpg123-devel" release="1.el7" src="mpg123-1.25.6-1.el7.src.rpm" version="1.25.6"><filename>mpg123-devel-1.25.6-1.el7.x86_64.rpm</filename><sum type="sha256">848a5ba47b957b376fec221f8d814ebe7bfe28a177e5b5f85dbb0edc8f877916</sum></package><package arch="i686" name="gstreamer1-plugins-ugly-free-devel" release="3.el7" src="gstreamer1-plugins-ugly-free-1.10.4-3.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-ugly-free-devel-1.10.4-3.el7.i686.rpm</filename><sum type="sha256">fa05fdc6313f52d3b117770bb9714485ad730880e5d9317988a30f544c5bee0a</sum></package><package arch="i686" name="mpg123-devel" release="1.el7" src="mpg123-1.25.6-1.el7.src.rpm" version="1.25.6"><filename>mpg123-devel-1.25.6-1.el7.i686.rpm</filename><sum type="sha256">1af33100c91ab9a24c2ca4f504755a0f1e5927a2bff0a61a11438476e6c86c2c</sum></package><package arch="x86_64" name="gstreamer1-plugins-ugly-free" release="3.el7" src="gstreamer1-plugins-ugly-free-1.10.4-3.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-ugly-free-1.10.4-3.el7.x86_64.rpm</filename><sum type="sha256">bd9e4c63ee83a5232d2ba19f95bc15a0d219a2fc4fc22a16a4b24233874c467c</sum></package><package arch="x86_64" name="gstreamer1-plugins-ugly-free-devel" release="3.el7" src="gstreamer1-plugins-ugly-free-1.10.4-3.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-ugly-free-devel-1.10.4-3.el7.x86_64.rpm</filename><sum type="sha256">3dfac47891df4687f43d92ab5254e17ac4829d73382813dfe734c4737fb5e975</sum></package><package arch="i686" name="mpg123-libs" release="1.el7" src="mpg123-1.25.6-1.el7.src.rpm" version="1.25.6"><filename>mpg123-libs-1.25.6-1.el7.i686.rpm</filename><sum type="sha256">b1192eafddba53d6400c993d5696dcb385598d02ce38ecaf38fe0a2ee012ba3d</sum></package><package arch="x86_64" name="mpg123" release="1.el7" src="mpg123-1.25.6-1.el7.src.rpm" version="1.25.6"><filename>mpg123-1.25.6-1.el7.x86_64.rpm</filename><sum type="sha256">730ef471fc97d881425f1fdd34ec2b1bcc34847ea61625bde1f86bf70fb17e84</sum></package><package arch="x86_64" name="mpg123-plugins-pulseaudio" release="1.el7" src="mpg123-1.25.6-1.el7.src.rpm" version="1.25.6"><filename>mpg123-plugins-pulseaudio-1.25.6-1.el7.x86_64.rpm</filename><sum type="sha256">9967767098309d5445c295a7da65994e47a3c97eafa020597259184f9539bea7</sum></package><package arch="x86_64" name="mpg123-libs" release="1.el7" src="mpg123-1.25.6-1.el7.src.rpm" version="1.25.6"><filename>mpg123-libs-1.25.6-1.el7.x86_64.rpm</filename><sum type="sha256">bb50f6ed862731f22ebc005044beba6c8cd482074699284708e360a355b46b03</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:0890" id="RHEA-2018:0890-1" title="Rhea-2018:0890-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:0894-1</id><title>Llvm-Private Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="llvm-private" release="3.el7" src="llvm-private-5.0.0-3.el7.src.rpm" version="5.0.0"><filename>llvm-private-5.0.0-3.el7.i686.rpm</filename><sum type="sha256">ce9a50f55f3b9fa4f0171afbfb51aa913fc4a6cc6c3c57143cb1fb434fee289b</sum></package><package arch="i686" name="llvm-private-devel" release="3.el7" src="llvm-private-5.0.0-3.el7.src.rpm" version="5.0.0"><filename>llvm-private-devel-5.0.0-3.el7.i686.rpm</filename><sum type="sha256">e63be5e5165b7a39faa105e5473ced1cc64b07864a98e1c3f761d9f9fe7cf4b7</sum></package><package arch="x86_64" name="llvm-private-devel" release="3.el7" src="llvm-private-5.0.0-3.el7.src.rpm" version="5.0.0"><filename>llvm-private-devel-5.0.0-3.el7.x86_64.rpm</filename><sum type="sha256">fdd5e9da66051dcf09fa9ded1b65d9567c0cd5f49fd19ab4c47b3ca988103ce1</sum></package><package arch="x86_64" name="llvm-private" release="3.el7" src="llvm-private-5.0.0-3.el7.src.rpm" version="5.0.0"><filename>llvm-private-5.0.0-3.el7.x86_64.rpm</filename><sum type="sha256">b1a64dcc29ba6c9c9ff05705b616482993827cbd07b31ebdf993d4ec90d0da73</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:0894" id="RHEA-2018:0894-1" title="Rhea-2018:0894-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:1031-1</id><title>New Packages: Python-Isodate</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-isodate" release="8.el7" src="python-isodate-0.5.4-8.el7.src.rpm" version="0.5.4"><filename>python-isodate-0.5.4-8.el7.noarch.rpm</filename><sum type="sha256">aa24870c3637ba78650d9e06b05a0520e696529a4ab90786f635e23a733d00a2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:1031" id="RHEA-2018:1031-1" title="Rhea-2018:1031-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:1032-1</id><title>New Package: Python-Jwt</title><description /><release>Scientific Linux</release><issued date="2018-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-jwt" release="1.el7" src="python-jwt-1.5.3-1.el7.src.rpm" version="1.5.3"><filename>python-jwt-1.5.3-1.el7.noarch.rpm</filename><sum type="sha256">3e90b9d0015012df89c88f2e1ef6defb041047afc97a036a27d32c29213f45a4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:1032" id="RHEA-2018:1032-1" title="Rhea-2018:1032-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:1376-1</id><title>Nspr, Nss-Util, Nss-Softokn, And Nss Bug Fix And Enhancement Update</title><description>* The nspr packages have been upgraded to upstream version 4.19.</description><release>Scientific Linux</release><issued date="2018-05-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-util" release="1.el7_5" src="nss-util-3.36.0-1.el7_5.src.rpm" version="3.36.0"><filename>nss-util-3.36.0-1.el7_5.x86_64.rpm</filename><sum type="sha256">f287602e907de480b4e945a8de2ec06831f1eaa9984b463fc18c2880d135f9a1</sum></package><package arch="i686" name="nss-util" release="1.el7_5" src="nss-util-3.36.0-1.el7_5.src.rpm" version="3.36.0"><filename>nss-util-3.36.0-1.el7_5.i686.rpm</filename><sum type="sha256">5c1b9d3c5718f5a995ffd86b94704c64c28e97aae5602712e5372a02124a5496</sum></package><package arch="x86_64" name="nss-sysinit" release="5.el7_5" src="nss-3.36.0-5.el7_5.src.rpm" version="3.36.0"><filename>nss-sysinit-3.36.0-5.el7_5.x86_64.rpm</filename><sum type="sha256">40b53ec4afe52d43f5fe88b86f50013f9be2dd75010f72d35710567eb1ae5bb4</sum></package><package arch="x86_64" name="nspr" release="1.el7_5" src="nspr-4.19.0-1.el7_5.src.rpm" version="4.19.0"><filename>nspr-4.19.0-1.el7_5.x86_64.rpm</filename><sum type="sha256">54eae8421d7029c75559e78c2720654ef8081d3fcd3e5d67721d2b84994ad735</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="5.el7_5" src="nss-softokn-3.36.0-5.el7_5.src.rpm" version="3.36.0"><filename>nss-softokn-freebl-devel-3.36.0-5.el7_5.i686.rpm</filename><sum type="sha256">aa07d2954d2f1214a201c4b252255fccfab0e3b53070b8f638dd36f5c1854abf</sum></package><package arch="i686" name="nss-softokn" release="5.el7_5" src="nss-softokn-3.36.0-5.el7_5.src.rpm" version="3.36.0"><filename>nss-softokn-3.36.0-5.el7_5.i686.rpm</filename><sum type="sha256">49f78448342408ac78b61f7b61383187879e9ff46ca3bb5ba1e0bd1dc33c6760</sum></package><package arch="i686" name="nss-softokn-devel" release="5.el7_5" src="nss-softokn-3.36.0-5.el7_5.src.rpm" version="3.36.0"><filename>nss-softokn-devel-3.36.0-5.el7_5.i686.rpm</filename><sum type="sha256">32344b97b5a8efa338671ec41b6d22da53a4709c69c239226746b570ed3ec70f</sum></package><package arch="i686" name="nspr-devel" release="1.el7_5" src="nspr-4.19.0-1.el7_5.src.rpm" version="4.19.0"><filename>nspr-devel-4.19.0-1.el7_5.i686.rpm</filename><sum type="sha256">d9d38f1e727c1773e96a580e539cbe4aabb005d3fec5ba17f81365d4e714187d</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el7_5" src="nss-util-3.36.0-1.el7_5.src.rpm" version="3.36.0"><filename>nss-util-devel-3.36.0-1.el7_5.x86_64.rpm</filename><sum type="sha256">babc31b34ac38e5e7614b4a002a0dbc48364d3a009d277520f62fd3fbf409a7e</sum></package><package arch="x86_64" name="nss-devel" release="5.el7_5" src="nss-3.36.0-5.el7_5.src.rpm" version="3.36.0"><filename>nss-devel-3.36.0-5.el7_5.x86_64.rpm</filename><sum type="sha256">c795eaf51dca313c115bad5fad264965b192e948b1dd7016d315dc758e9fbd72</sum></package><package arch="i686" name="nss-util-devel" release="1.el7_5" src="nss-util-3.36.0-1.el7_5.src.rpm" version="3.36.0"><filename>nss-util-devel-3.36.0-1.el7_5.i686.rpm</filename><sum type="sha256">04ef419ca197595150ce5f2698ae277bc5a8463210784608b604f13a83e31d3d</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="5.el7_5" src="nss-softokn-3.36.0-5.el7_5.src.rpm" version="3.36.0"><filename>nss-softokn-freebl-3.36.0-5.el7_5.x86_64.rpm</filename><sum type="sha256">5bc50153c42028c45060c1dbf9c535228443568b3e5c3ffb8e0ed8293b4d358a</sum></package><package arch="x86_64" name="nss-softokn" release="5.el7_5" src="nss-softokn-3.36.0-5.el7_5.src.rpm" version="3.36.0"><filename>nss-softokn-3.36.0-5.el7_5.x86_64.rpm</filename><sum type="sha256">c908b72ec503161a40292eb684e2aae92b32986d20b0b0351810bf4afe0c0ea0</sum></package><package arch="i686" name="nss-devel" release="5.el7_5" src="nss-3.36.0-5.el7_5.src.rpm" version="3.36.0"><filename>nss-devel-3.36.0-5.el7_5.i686.rpm</filename><sum type="sha256">2f120dddf23fca37bd8cb9e6e7df189f02d6134915e26e59c436dffab81da02b</sum></package><package arch="i686" name="nspr" release="1.el7_5" src="nspr-4.19.0-1.el7_5.src.rpm" version="4.19.0"><filename>nspr-4.19.0-1.el7_5.i686.rpm</filename><sum type="sha256">322552f695442dac0c417f60f1ee12522d85e021398d85dd6e0c91b1dd84cf27</sum></package><package arch="x86_64" name="nspr-devel" release="1.el7_5" src="nspr-4.19.0-1.el7_5.src.rpm" version="4.19.0"><filename>nspr-devel-4.19.0-1.el7_5.x86_64.rpm</filename><sum type="sha256">412e7ef7598ec1183cfbc5eea164c7ab52d1bc7369a2d5c82e7e2b4f291e681f</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="5.el7_5" src="nss-softokn-3.36.0-5.el7_5.src.rpm" version="3.36.0"><filename>nss-softokn-freebl-devel-3.36.0-5.el7_5.x86_64.rpm</filename><sum type="sha256">2b77fb46485a686e680da3a8da90f7168360a9014e51068361bfab2d3e988332</sum></package><package arch="i686" name="nss-pkcs11-devel" release="5.el7_5" src="nss-3.36.0-5.el7_5.src.rpm" version="3.36.0"><filename>nss-pkcs11-devel-3.36.0-5.el7_5.i686.rpm</filename><sum type="sha256">d660b206fc5b94d1f8a6a8f42e4bab265e407cd2f701148c8991572865135f82</sum></package><package arch="x86_64" name="nss-softokn-devel" release="5.el7_5" src="nss-softokn-3.36.0-5.el7_5.src.rpm" version="3.36.0"><filename>nss-softokn-devel-3.36.0-5.el7_5.x86_64.rpm</filename><sum type="sha256">3593246f689eba998b13558efc5480ee452b26c0459a50cba4bd5ca31f8fe4ff</sum></package><package arch="i686" name="nss-softokn-freebl" release="5.el7_5" src="nss-softokn-3.36.0-5.el7_5.src.rpm" version="3.36.0"><filename>nss-softokn-freebl-3.36.0-5.el7_5.i686.rpm</filename><sum type="sha256">d0288618da287486c2db041e8ed35d0e3a2efcb5fc65b82ac27196e8c7815b71</sum></package><package arch="i686" name="nss" release="5.el7_5" src="nss-3.36.0-5.el7_5.src.rpm" version="3.36.0"><filename>nss-3.36.0-5.el7_5.i686.rpm</filename><sum type="sha256">b692971233c4f0592cee13ca122849be45e2c1f393295a09503e6393d1b1b3f1</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="5.el7_5" src="nss-3.36.0-5.el7_5.src.rpm" version="3.36.0"><filename>nss-pkcs11-devel-3.36.0-5.el7_5.x86_64.rpm</filename><sum type="sha256">4daa7aaafe2555c492f445bc33a4842f102b5339312118046669f8bd5ab6f649</sum></package><package arch="x86_64" name="nss-tools" release="5.el7_5" src="nss-3.36.0-5.el7_5.src.rpm" version="3.36.0"><filename>nss-tools-3.36.0-5.el7_5.x86_64.rpm</filename><sum type="sha256">71a5d9886c7db37881568f127b87861e930da5057228f9be1bc6efbed42469ca</sum></package><package arch="x86_64" name="nss" release="5.el7_5" src="nss-3.36.0-5.el7_5.src.rpm" version="3.36.0"><filename>nss-3.36.0-5.el7_5.x86_64.rpm</filename><sum type="sha256">1e091cc94ece0d386ccef9ddc06e75253cb097aa0c1decdd2b532974c5acb529</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:1376" id="RHEA-2018:1376-1" title="Rhea-2018:1376-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:1581-1</id><title>Microcode_Ctl Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-05-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="29.2.el7_5" src="microcode_ctl-2.1-29.2.el7_5.src.rpm" version="2.1"><filename>microcode_ctl-2.1-29.2.el7_5.x86_64.rpm</filename><sum type="sha256">de36a7ccf7f6f1a9c4e28bac6ef5efc1a5b4b5f2a39b6ac02d5a7aba8da97d35</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:1581" id="RHEA-2018:1581-1" title="Rhea-2018:1581-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:3033-1</id><title>Llvm-Private Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="llvm-private" release="2.el7" src="llvm-private-6.0.1-2.el7.src.rpm" version="6.0.1"><filename>llvm-private-6.0.1-2.el7.i686.rpm</filename><sum type="sha256">d39ba92fa0e9af2208cbb071e949b5af0519661b02205d28a82c9a0ba73a696b</sum></package><package arch="x86_64" name="llvm-private-devel" release="2.el7" src="llvm-private-6.0.1-2.el7.src.rpm" version="6.0.1"><filename>llvm-private-devel-6.0.1-2.el7.x86_64.rpm</filename><sum type="sha256">7b6364e9ca7ae4dbc967dcf1aa534fb8eec5f97d0928373a28dca7ae86401ad1</sum></package><package arch="x86_64" name="llvm-private" release="2.el7" src="llvm-private-6.0.1-2.el7.src.rpm" version="6.0.1"><filename>llvm-private-6.0.1-2.el7.x86_64.rpm</filename><sum type="sha256">1f1bbe4ca189777c8e040e0131936d1bea33f7dce2c4a19fa1a970c16febe06d</sum></package><package arch="i686" name="llvm-private-devel" release="2.el7" src="llvm-private-6.0.1-2.el7.src.rpm" version="6.0.1"><filename>llvm-private-devel-6.0.1-2.el7.i686.rpm</filename><sum type="sha256">28c221de683190c774f06e9d007cea14b9efcd10cc40dc595ca82dbaee608e87</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:3033" id="RHEA-2018:3033-1" title="Rhea-2018:3033-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:3044-1</id><title>Libtalloc Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libtalloc-devel" release="1.el7" src="libtalloc-2.1.13-1.el7.src.rpm" version="2.1.13"><filename>libtalloc-devel-2.1.13-1.el7.x86_64.rpm</filename><sum type="sha256">93e66de8a9051d8d853b2b44c1d0b3108263708add4a1e5b0345b1f9305fdfa7</sum></package><package arch="i686" name="libtalloc-devel" release="1.el7" src="libtalloc-2.1.13-1.el7.src.rpm" version="2.1.13"><filename>libtalloc-devel-2.1.13-1.el7.i686.rpm</filename><sum type="sha256">bacb0e15b59b29010680195cba9f9ffedb2d81175b274a8fac1a4482ec36bce9</sum></package><package arch="x86_64" name="pytalloc" release="1.el7" src="libtalloc-2.1.13-1.el7.src.rpm" version="2.1.13"><filename>pytalloc-2.1.13-1.el7.x86_64.rpm</filename><sum type="sha256">e379f7139623fc07dcce09087499e9d2812bb3f2cc6e5590667620040ff948a3</sum></package><package arch="i686" name="pytalloc-devel" release="1.el7" src="libtalloc-2.1.13-1.el7.src.rpm" version="2.1.13"><filename>pytalloc-devel-2.1.13-1.el7.i686.rpm</filename><sum type="sha256">8b1885d57b2e110a6650de35528a2bfe6837a1b34aff56f28c73e2a4847c13e1</sum></package><package arch="x86_64" name="libtalloc" release="1.el7" src="libtalloc-2.1.13-1.el7.src.rpm" version="2.1.13"><filename>libtalloc-2.1.13-1.el7.x86_64.rpm</filename><sum type="sha256">07e98925bd856f9a7cf8046cdbb6775c2e1698d774bd87edd855f5f69375f318</sum></package><package arch="x86_64" name="pytalloc-devel" release="1.el7" src="libtalloc-2.1.13-1.el7.src.rpm" version="2.1.13"><filename>pytalloc-devel-2.1.13-1.el7.x86_64.rpm</filename><sum type="sha256">5a31299b793b423da5963153acb9897511acc9977059f38f593fe8cbdd75179c</sum></package><package arch="i686" name="libtalloc" release="1.el7" src="libtalloc-2.1.13-1.el7.src.rpm" version="2.1.13"><filename>libtalloc-2.1.13-1.el7.i686.rpm</filename><sum type="sha256">45125793992f636da22c12639c1741241856789936626f84921eca08e193fb66</sum></package><package arch="i686" name="pytalloc" release="1.el7" src="libtalloc-2.1.13-1.el7.src.rpm" version="2.1.13"><filename>pytalloc-2.1.13-1.el7.i686.rpm</filename><sum type="sha256">0121fe6eafff5bed06b2d8437d3e2ab424bd71273ebbedbc38707f7e714c44be</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:3044" id="RHEA-2018:3044-1" title="Rhea-2018:3044-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:3049-1</id><title>Libtevent Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libtevent-devel" release="1.el7" src="libtevent-0.9.36-1.el7.src.rpm" version="0.9.36"><filename>libtevent-devel-0.9.36-1.el7.i686.rpm</filename><sum type="sha256">8658e6153f4d16f6012d156ebb5ae8194efeb337a99d60d12e5b402e49e2c7ec</sum></package><package arch="x86_64" name="python-tevent" release="1.el7" src="libtevent-0.9.36-1.el7.src.rpm" version="0.9.36"><filename>python-tevent-0.9.36-1.el7.x86_64.rpm</filename><sum type="sha256">d222e26b17fcf7480b6cd5c7306ee12a6bb13bbb23219e34e82c7df108102d2d</sum></package><package arch="x86_64" name="libtevent" release="1.el7" src="libtevent-0.9.36-1.el7.src.rpm" version="0.9.36"><filename>libtevent-0.9.36-1.el7.x86_64.rpm</filename><sum type="sha256">26633ed0e64fdde7ec814e5f50dc48f0e87e601b0513f30760fd623966792b72</sum></package><package arch="x86_64" name="libtevent-devel" release="1.el7" src="libtevent-0.9.36-1.el7.src.rpm" version="0.9.36"><filename>libtevent-devel-0.9.36-1.el7.x86_64.rpm</filename><sum type="sha256">f540b3a76f5763220cc6196eab45b96e01404e466663004396a82cdea49b930e</sum></package><package arch="i686" name="libtevent" release="1.el7" src="libtevent-0.9.36-1.el7.src.rpm" version="0.9.36"><filename>libtevent-0.9.36-1.el7.i686.rpm</filename><sum type="sha256">96d4edeb474b6f217aa951a7f713507591b4cc3f346a342ee52df93c7bf18812</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:3049" id="RHEA-2018:3049-1" title="Rhea-2018:3049-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:3135-1</id><title>Rsyslog Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libfastjson" release="3.el7" src="libfastjson-0.99.4-3.el7.src.rpm" version="0.99.4"><filename>libfastjson-0.99.4-3.el7.i686.rpm</filename><sum type="sha256">da2cfb5fcd1d276f28b30cc5131be94d401d6285daad511b8461519a5f449e39</sum></package><package arch="x86_64" name="libfastjson-devel" release="3.el7" src="libfastjson-0.99.4-3.el7.src.rpm" version="0.99.4"><filename>libfastjson-devel-0.99.4-3.el7.x86_64.rpm</filename><sum type="sha256">4e5b77e4a0969304deea0d9e4bdb86c2f99e598c439c24d00bf6b75b4ba693aa</sum></package><package arch="i686" name="liblognorm-devel" release="3.el7" src="liblognorm-2.0.2-3.el7.src.rpm" version="2.0.2"><filename>liblognorm-devel-2.0.2-3.el7.i686.rpm</filename><sum type="sha256">cb68faa36d3758738a3e5b63465e1db077cf1ee3ac20837483af8f1afdaba879</sum></package><package arch="x86_64" name="libfastjson" release="3.el7" src="libfastjson-0.99.4-3.el7.src.rpm" version="0.99.4"><filename>libfastjson-0.99.4-3.el7.x86_64.rpm</filename><sum type="sha256">b7ea3733fcc7735a559926780885fab9beaeb9df3485b20e1cb3116f1e5b77e3</sum></package><package arch="x86_64" name="librdkafka" release="1.el7" src="librdkafka-0.11.4-1.el7.src.rpm" version="0.11.4"><filename>librdkafka-0.11.4-1.el7.x86_64.rpm</filename><sum type="sha256">6c24e8916101f3899e3ce824a1a39918d0f2b490d9a73ecdf85541dc1aefbced</sum></package><package arch="i686" name="liblognorm" release="3.el7" src="liblognorm-2.0.2-3.el7.src.rpm" version="2.0.2"><filename>liblognorm-2.0.2-3.el7.i686.rpm</filename><sum type="sha256">0770b3e6645a21f01f7228d716a883d08d3c4925ec4499041c790ea2547d6519</sum></package><package arch="x86_64" name="liblognorm-devel" release="3.el7" src="liblognorm-2.0.2-3.el7.src.rpm" version="2.0.2"><filename>liblognorm-devel-2.0.2-3.el7.x86_64.rpm</filename><sum type="sha256">d6f2048265900a272a1e885341aa8c166b28b58e5e375778f59e8fb09f555187</sum></package><package arch="x86_64" name="liblognorm-doc" release="3.el7" src="liblognorm-2.0.2-3.el7.src.rpm" version="2.0.2"><filename>liblognorm-doc-2.0.2-3.el7.x86_64.rpm</filename><sum type="sha256">62bb589a7ce591bd22208494e234a485d8107613bd209a0a9fb559329e278750</sum></package><package arch="x86_64" name="librdkafka-devel" release="1.el7" src="librdkafka-0.11.4-1.el7.src.rpm" version="0.11.4"><filename>librdkafka-devel-0.11.4-1.el7.x86_64.rpm</filename><sum type="sha256">711d3290314a9f931a84ea19e04d5ccef3371c4f5322c4f85effc43652ff9565</sum></package><package arch="i686" name="librdkafka" release="1.el7" src="librdkafka-0.11.4-1.el7.src.rpm" version="0.11.4"><filename>librdkafka-0.11.4-1.el7.i686.rpm</filename><sum type="sha256">2c3e87c90de46df88f709bc03aaa9e993957378bd6c42278d87ef0ed1e207fa4</sum></package><package arch="x86_64" name="liblognorm" release="3.el7" src="liblognorm-2.0.2-3.el7.src.rpm" version="2.0.2"><filename>liblognorm-2.0.2-3.el7.x86_64.rpm</filename><sum type="sha256">bfc00f98b93b168076c9f9c7bf37b78fd3264ca1548ef9372964c708be555b60</sum></package><package arch="i686" name="librdkafka-devel" release="1.el7" src="librdkafka-0.11.4-1.el7.src.rpm" version="0.11.4"><filename>librdkafka-devel-0.11.4-1.el7.i686.rpm</filename><sum type="sha256">5a0af3bd28dd70a010a7ce4497857d3657f327a8096623e112c250d6dff51240</sum></package><package arch="i686" name="libfastjson-devel" release="3.el7" src="libfastjson-0.99.4-3.el7.src.rpm" version="0.99.4"><filename>libfastjson-devel-0.99.4-3.el7.i686.rpm</filename><sum type="sha256">afa3a3722965c85e20bf81bfb023aec5d375cebe1a3d3a0c68879bdaa33d718c</sum></package><package arch="x86_64" name="liblognorm-utils" release="3.el7" src="liblognorm-2.0.2-3.el7.src.rpm" version="2.0.2"><filename>liblognorm-utils-2.0.2-3.el7.x86_64.rpm</filename><sum type="sha256">514edd4a427fe97252e8e990fd29b7aba7cf107dbecf56402568fbd3341b81d2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:3135" id="RHEA-2018:3135-1" title="Rhea-2018:3135-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:3161-1</id><title>New Packages: Python-Subprocess32</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python2-subprocess32" release="13.el7" src="python-subprocess32-3.2.6-13.el7.src.rpm" version="3.2.6"><filename>python2-subprocess32-3.2.6-13.el7.x86_64.rpm</filename><sum type="sha256">df36bd834f616be655f312caf89d3dbfab1ae3504831acbac64ce54126eeb0fe</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:3161" id="RHEA-2018:3161-1" title="Rhea-2018:3161-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:3162-1</id><title>New Package: Python-Futures </title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python2-futures" release="5.el7" src="python-futures-3.1.1-5.el7.src.rpm" version="3.1.1"><filename>python2-futures-3.1.1-5.el7.noarch.rpm</filename><sum type="sha256">4e0ef859dfed0b29cc9a41a9413cdf5e6cf74976f8c840e67dd5101fdefe1d35</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:3162" id="RHEA-2018:3162-1" title="Rhea-2018:3162-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:3164-1</id><title>Efivar Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="efivar" release="11.el7" src="efivar-36-11.el7.src.rpm" version="36"><filename>efivar-36-11.el7.x86_64.rpm</filename><sum type="sha256">125c8b23096ce561ad4c39c3ad68fb4f1368c7306cd272f851e533716b13661f</sum></package><package arch="x86_64" name="efivar-libs" release="11.el7" src="efivar-36-11.el7.src.rpm" version="36"><filename>efivar-libs-36-11.el7.x86_64.rpm</filename><sum type="sha256">a55163fe75a3492e89710b4d37f60afb57397e2394542ec696c4b38eeb81d155</sum></package><package arch="x86_64" name="efivar-devel" release="11.el7" src="efivar-36-11.el7.src.rpm" version="36"><filename>efivar-devel-36-11.el7.x86_64.rpm</filename><sum type="sha256">db8261814335cae75c709038b02e776264c8e786dec8ace34fb831a3ab77f5de</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:3164" id="RHEA-2018:3164-1" title="Rhea-2018:3164-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:3171-1</id><title>Efibootmgr Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="efibootmgr" release="2.el7" src="efibootmgr-17-2.el7.src.rpm" version="17"><filename>efibootmgr-17-2.el7.x86_64.rpm</filename><sum type="sha256">eb12be2456e5e55b55c77c604e42665aeda5994085818b518eae66391a89bccd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:3171" id="RHEA-2018:3171-1" title="Rhea-2018:3171-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2018:3185-1</id><title>Gnu-Efi Bug Fix And Enhancement Update</title><description /><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="gnu-efi-utils" release="2.el7" src="gnu-efi-3.0.8-2.el7.src.rpm" version="3.0.8"><filename>gnu-efi-utils-3.0.8-2.el7.x86_64.rpm</filename><sum type="sha256">4b96c0e1f57202df4069d3c0e9a5124a28dbd70f48fbf921dc5ebe84af346cf9</sum></package><package arch="x86_64" epoch="1" name="gnu-efi" release="2.el7" src="gnu-efi-3.0.8-2.el7.src.rpm" version="3.0.8"><filename>gnu-efi-3.0.8-2.el7.x86_64.rpm</filename><sum type="sha256">ddb5161322c440488007716c97de0f3dbff932d9d0d3dd8cd0360d81faf3d987</sum></package><package arch="x86_64" epoch="1" name="gnu-efi-devel" release="2.el7" src="gnu-efi-3.0.8-2.el7.src.rpm" version="3.0.8"><filename>gnu-efi-devel-3.0.8-2.el7.x86_64.rpm</filename><sum type="sha256">b49d18665e547e5588ebfb5845a7fb6719c07e1b90a7db87c8faa1aa604bf699</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2018:3185" id="RHEA-2018:3185-1" title="Rhea-2018:3185-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2019:1210-1</id><title>Microcode_Ctl Enhancement Update</title><description>This update adds the following enhancement: * The Intel CPU microcode has been updated to the latest upstream version to mitigate CVE-2018-12126, CVE-2018-12126, CVE-2018-12126, and CVE-2019-11091.</description><release>Scientific Linux</release><issued date="2019-05-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="47.2.el7_6" src="microcode_ctl-2.1-47.2.el7_6.src.rpm" version="2.1"><filename>microcode_ctl-2.1-47.2.el7_6.x86_64.rpm</filename><sum type="sha256">cc1dfbc5bd107925854f47c0d30f8346cc3ce73ded3f6e32a220b85cdcd85205</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2019:1210" id="RHEA-2019:1210-1" title="Rhea-2019:1210-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1704374" id="1704374" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2019:2089-1</id><title>Libtevent Bug Fix Update</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-tevent" release="1.el7" src="libtevent-0.9.37-1.el7.src.rpm" version="0.9.37"><filename>python-tevent-0.9.37-1.el7.x86_64.rpm</filename><sum type="sha256">a19805f4912358f434e5ab7485c55e7e5bffd96841bb54042a11278db3dd2e5b</sum></package><package arch="x86_64" name="libtevent" release="1.el7" src="libtevent-0.9.37-1.el7.src.rpm" version="0.9.37"><filename>libtevent-0.9.37-1.el7.x86_64.rpm</filename><sum type="sha256">b812067ca114682b822ae4843675e1aaaf5c2c2df8a8f90170bbc3a66d15d25d</sum></package><package arch="i686" name="libtevent-devel" release="1.el7" src="libtevent-0.9.37-1.el7.src.rpm" version="0.9.37"><filename>libtevent-devel-0.9.37-1.el7.i686.rpm</filename><sum type="sha256">0ef440f15815de159163caca7154e65349c286e31a6421de56afcbbd730b63e9</sum></package><package arch="i686" name="libtevent" release="1.el7" src="libtevent-0.9.37-1.el7.src.rpm" version="0.9.37"><filename>libtevent-0.9.37-1.el7.i686.rpm</filename><sum type="sha256">420a44e9f8d0960bbfc86612b539b7ec1121fae5646dd4da25cc7415dc45441f</sum></package><package arch="x86_64" name="libtevent-devel" release="1.el7" src="libtevent-0.9.37-1.el7.src.rpm" version="0.9.37"><filename>libtevent-devel-0.9.37-1.el7.x86_64.rpm</filename><sum type="sha256">e09ff59c3dc41a33bb3b083b8583947de1245c402c28a78893bebd9700ad38af</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2019:2089" id="RHEA-2019:2089-1" title="Rhea-2019:2089-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658748" id="1658748" title="Rebase Libtevent To Version 0.9.37 For Samba" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2019:2185-1</id><title>New Packages: Python3</title><description>This enhancement update adds the python3 packages to Scientific Linux 7.</description><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="python3" release="10.el7" src="python3-3.6.8-10.el7.src.rpm" version="3.6.8"><filename>python3-3.6.8-10.el7.i686.rpm</filename><sum type="sha256">7eced73b1bc289757efff3f7a4506928f00873625c4f02a7d509c2e3ebc76627</sum></package><package arch="x86_64" name="python3" release="10.el7" src="python3-3.6.8-10.el7.src.rpm" version="3.6.8"><filename>python3-3.6.8-10.el7.x86_64.rpm</filename><sum type="sha256">0e1f2ed25cfd6c967730b0b31b367c42e7f0c358e85e17a1dffbc9f46b377ade</sum></package><package arch="i686" name="python3-tkinter" release="10.el7" src="python3-3.6.8-10.el7.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-10.el7.i686.rpm</filename><sum type="sha256">ccb93ae4c1398bdd757036db184019a93a155915c357b494e801b3157abf313e</sum></package><package arch="x86_64" name="python3-test" release="10.el7" src="python3-3.6.8-10.el7.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-10.el7.x86_64.rpm</filename><sum type="sha256">c28c789b8b177b330cad5da06a72561d5bc89ad687a64b1417988188493c864c</sum></package><package arch="i686" name="python3-debug" release="10.el7" src="python3-3.6.8-10.el7.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-10.el7.i686.rpm</filename><sum type="sha256">844d073015d8f3f65f4fbbe8b528c8eb8b55b1cada78f78f94cb5c6fd3060e23</sum></package><package arch="noarch" name="python3-wheel" release="4.el7" src="python-wheel-0.31.1-4.el7.src.rpm" version="0.31.1"><filename>python3-wheel-0.31.1-4.el7.noarch.rpm</filename><sum type="sha256">bc4622be1ed2e62ff1254c7dd4eddc4ec2dd568cb8e3344d013540ee2c72a418</sum></package><package arch="x86_64" name="python3-libs" release="10.el7" src="python3-3.6.8-10.el7.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-10.el7.x86_64.rpm</filename><sum type="sha256">5fcd811833b81c5751c10b22d4f6b899438fb1eecd6c790ff84dbe0b7158d3c2</sum></package><package arch="x86_64" name="python3-idle" release="10.el7" src="python3-3.6.8-10.el7.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-10.el7.x86_64.rpm</filename><sum type="sha256">7262db1fab04cc90c9b34b4f5e4382bebc8993034fbe18f14f25f41a4ff06221</sum></package><package arch="i686" name="python3-devel" release="10.el7" src="python3-3.6.8-10.el7.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-10.el7.i686.rpm</filename><sum type="sha256">cf97c11e4415073830a8cac9e15f57a3f455ff4147dff715e42f9fd236f14f6d</sum></package><package arch="i686" name="python3-libs" release="10.el7" src="python3-3.6.8-10.el7.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-10.el7.i686.rpm</filename><sum type="sha256">7066426c62d11ba7eeeb86eee2ad95485d1ea19395b55e0f5583685edc9a50cc</sum></package><package arch="x86_64" name="python3-devel" release="10.el7" src="python3-3.6.8-10.el7.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-10.el7.x86_64.rpm</filename><sum type="sha256">20537fd79fbef40fbb0d1afeda1cf999cdfd4898072db1723262f6f39fe1539a</sum></package><package arch="i686" name="python3-idle" release="10.el7" src="python3-3.6.8-10.el7.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-10.el7.i686.rpm</filename><sum type="sha256">d6eb3e5bac8b4f0840bbd2134f1dcf762df514c94ba0c196ca1866cee0aab352</sum></package><package arch="i686" name="python3-test" release="10.el7" src="python3-3.6.8-10.el7.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-10.el7.i686.rpm</filename><sum type="sha256">16536aeea75e91705634288a27290aeaae540d39a650d388982ac2a9611e0a8f</sum></package><package arch="x86_64" name="python3-tkinter" release="10.el7" src="python3-3.6.8-10.el7.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-10.el7.x86_64.rpm</filename><sum type="sha256">05c561000a29c7f9a94887678d22a02ed353c16f79edeaad4908bb50ce9dce16</sum></package><package arch="x86_64" name="python3-debug" release="10.el7" src="python3-3.6.8-10.el7.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-10.el7.x86_64.rpm</filename><sum type="sha256">58a588be705506e17e9714fdba14258786fd878e15fe3e587fca1e1e8bc31b03</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2019:2185" id="RHEA-2019:2185-1" title="Rhea-2019:2185-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2019:2186-1</id><title>Python3-Setuptools</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python3-setuptools" release="10.el7" src="python3-setuptools-39.2.0-10.el7.src.rpm" version="39.2.0"><filename>python3-setuptools-39.2.0-10.el7.noarch.rpm</filename><sum type="sha256">e68119b88286632cae95b2b8689b460575fc976183fce8391293c766200794c0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2019:2186" id="RHEA-2019:2186-1" title="Rhea-2019:2186-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2019:2187-1</id><title>Python-Pip</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python3-pip" release="5.el7" src="python-pip-9.0.3-5.el7.src.rpm" version="9.0.3"><filename>python3-pip-9.0.3-5.el7.noarch.rpm</filename><sum type="sha256">17bad2f75b7844f37ad5808e3c4827bd07473657328efc70c02c83e15ea9cc86</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2019:2187" id="RHEA-2019:2187-1" title="Rhea-2019:2187-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2019:2212-1</id><title>Python-Rpm-Generators</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python3-rpm-generators" release="2.el7" src="python-rpm-generators-6-2.el7.src.rpm" version="6"><filename>python3-rpm-generators-6-2.el7.noarch.rpm</filename><sum type="sha256">9bf54a89f4e8982025f5165e8a1543f6d035574c2304a2b4c9cfe3c3632a9850</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2019:2212" id="RHEA-2019:2212-1" title="Rhea-2019:2212-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2019:2270-1</id><title>Openjpeg2 Bug Fix And</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openjpeg2-tools" release="1.el7" src="openjpeg2-2.3.1-1.el7.src.rpm" version="2.3.1"><filename>openjpeg2-tools-2.3.1-1.el7.x86_64.rpm</filename><sum type="sha256">7555935b0fdf42cf8bba7b7b40bdcc662f66a8e9961df862a0879e5238210ccf</sum></package><package arch="i686" name="openjpeg2-tools" release="1.el7" src="openjpeg2-2.3.1-1.el7.src.rpm" version="2.3.1"><filename>openjpeg2-tools-2.3.1-1.el7.i686.rpm</filename><sum type="sha256">e3b84f080a1c9c55710a94000939ef6e5c5700f27c161da155d30761fb6764b5</sum></package><package arch="noarch" name="openjpeg2-devel-docs" release="1.el7" src="openjpeg2-2.3.1-1.el7.src.rpm" version="2.3.1"><filename>openjpeg2-devel-docs-2.3.1-1.el7.noarch.rpm</filename><sum type="sha256">410aa4acd2f0a84c10412324e3f6de0ade3e9d1670177b93b09911a5b2d243a3</sum></package><package arch="i686" name="openjpeg2-devel" release="1.el7" src="openjpeg2-2.3.1-1.el7.src.rpm" version="2.3.1"><filename>openjpeg2-devel-2.3.1-1.el7.i686.rpm</filename><sum type="sha256">c3cbea41896f0b652241aba058c089b9efa509f68a5dff529e30f527b60c4485</sum></package><package arch="i686" name="openjpeg2" release="1.el7" src="openjpeg2-2.3.1-1.el7.src.rpm" version="2.3.1"><filename>openjpeg2-2.3.1-1.el7.i686.rpm</filename><sum type="sha256">e902144a9f34975cd95d295d561739d208ee24402618f5da91feb51e7727247a</sum></package><package arch="x86_64" name="openjpeg2-devel" release="1.el7" src="openjpeg2-2.3.1-1.el7.src.rpm" version="2.3.1"><filename>openjpeg2-devel-2.3.1-1.el7.x86_64.rpm</filename><sum type="sha256">1a371d5a62f87b1fb589772abd0ec709d709fb61fef8307557e0b785c38aee6f</sum></package><package arch="x86_64" name="openjpeg2" release="1.el7" src="openjpeg2-2.3.1-1.el7.src.rpm" version="2.3.1"><filename>openjpeg2-2.3.1-1.el7.x86_64.rpm</filename><sum type="sha256">01a99c07fd675aa6c61ba33e6dd88c422cd6680e80ed042d5744c347f2721c25</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2019:2270" id="RHEA-2019:2270-1" title="Rhea-2019:2270-1" type="self" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1704253" id="1704253" title="Rebase Openjpeg2 From 2.3.0 To 2.3.1" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2019:2279-1</id><title>New Packages: Ucx</title><description>This enhancement update adds the ucx packages to Scientific Linux 7.</description><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ucx" release="1.el7" src="ucx-1.4.0-1.el7.src.rpm" version="1.4.0"><filename>ucx-1.4.0-1.el7.x86_64.rpm</filename><sum type="sha256">99084531fe40d583eb5ef0828401c7cf0552b9a3136c5f4f084c212b5377417c</sum></package><package arch="x86_64" name="ucx-static" release="1.el7" src="ucx-1.4.0-1.el7.src.rpm" version="1.4.0"><filename>ucx-static-1.4.0-1.el7.x86_64.rpm</filename><sum type="sha256">2f9a10838e0cbaca6190cdc5a2a4044f37e2d5dc72ae73ee0e80d9ddf1c4828c</sum></package><package arch="x86_64" name="ucx-devel" release="1.el7" src="ucx-1.4.0-1.el7.src.rpm" version="1.4.0"><filename>ucx-devel-1.4.0-1.el7.x86_64.rpm</filename><sum type="sha256">fecb6557b460d46748f32a0e9c0a811374b57b76ebdd36ef03834ae1ab4f9464</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2019:2279" id="RHEA-2019:2279-1" title="Rhea-2019:2279-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2019:2323-1</id><title>Python-Adal</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-adal" release="1.el7" src="python-adal-0.6.0-1.el7.src.rpm" version="0.6.0"><filename>python-adal-0.6.0-1.el7.noarch.rpm</filename><sum type="sha256">1ae7ea0cffad288486e131a7a3fef849001b7ce5e0a048b93169153bae40419e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2019:2323" id="RHEA-2019:2323-1" title="Rhea-2019:2323-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2019:2324-1</id><title>Python-Msrest</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-msrest" release="1.el7" src="python-msrest-0.5.4-1.el7.src.rpm" version="0.5.4"><filename>python-msrest-0.5.4-1.el7.noarch.rpm</filename><sum type="sha256">eb3fb38801d51a8df29e7a92dc0b4d05a3eadd11b2e0e3436cf2522413db2729</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2019:2324" id="RHEA-2019:2324-1" title="Rhea-2019:2324-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2019:2325-1</id><title>Python-Msrestazure</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-msrestazure" release="1.el7" src="python-msrestazure-0.5.1-1.el7.src.rpm" version="0.5.1"><filename>python-msrestazure-0.5.1-1.el7.noarch.rpm</filename><sum type="sha256">40dc42bb0f00b2592a956d9cc8f3945e3b8044cd9d11e564f40912b68206ad21</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2019:2325" id="RHEA-2019:2325-1" title="Rhea-2019:2325-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2019:2326-1</id><title>Python-Azure-Sdk</title><description /><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-azure-sdk" release="1.el7" src="python-azure-sdk-4.0.0-1.el7.src.rpm" version="4.0.0"><filename>python-azure-sdk-4.0.0-1.el7.noarch.rpm</filename><sum type="sha256">16e2a20fb3f1e1fd3a690bb47a90e9733c24c3930d47314b3dc57b842bee2983</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2019:2326" id="RHEA-2019:2326-1" title="Rhea-2019:2326-1" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="enhancement" version="2.0"><id>SLEA-2023:7283</id><title>Microcode_Ctl Bug Fix And Enhancement Update</title><description>The microcode_ctl packages provide microcode updates for Intel processors.
Bug Fix(es) and Enhancement(s):
* Update Intel CPU microcode to microcode-20231009 release, which addresses CVE-2023-23583. (RHEL-3920)
</description><issued date="2023-11-17 09:11:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="73.20.el7_9" src="microcode_ctl-2.1-73.20.el7_9.src.rpm" version="2.1"><filename>microcode_ctl-2.1-73.20.el7_9.x86_64.rpm</filename><sum type="sha256">5923cdb7d020178f9cbd103fcf7ca35481fb5db52ccfeb2fd18940c86ee0a80f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHEA-2023:7283" id="RHEA-2023:7283" title="Microcode_Ctl Bug Fix And Enhancement Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2172-1</id><title>Glibc</title><description>It was discovered that the nss_files backend for the Name Service Switch in glibc would return incorrect data to applications or corrupt the heap (depending on adjacent heap contents) in certain cases. A local attacker could potentially use this flaw to escalate their privileges. (CVE-2015-5277)</description><severity>important</severity><release>Scientific Linux</release><issued date="2015-12-21 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="glibc-headers" release="106.el7_2.1" src="glibc-2.17-106.el7_2.1.src.rpm" version="2.17"><filename>glibc-headers-2.17-106.el7_2.1.x86_64.rpm</filename><sum type="sha256">4b2c69e92db0dd1bbbd6ce38645f3680b8b04ca5acb83e263fb76eae8565dc5e</sum></package><package arch="i686" name="glibc-static" release="106.el7_2.1" src="glibc-2.17-106.el7_2.1.src.rpm" version="2.17"><filename>glibc-static-2.17-106.el7_2.1.i686.rpm</filename><sum type="sha256">2025e39c5dc2d0e9773740691b87912945cda326aed27097cd8962c1c1daa9cc</sum></package><package arch="x86_64" name="glibc-devel" release="106.el7_2.1" src="glibc-2.17-106.el7_2.1.src.rpm" version="2.17"><filename>glibc-devel-2.17-106.el7_2.1.x86_64.rpm</filename><sum type="sha256">cfc7a1d60ab2076d2bc337ad5bf11ddeaae47a841ac83fad3677bd272635efd8</sum></package><package arch="x86_64" name="nscd" release="106.el7_2.1" src="glibc-2.17-106.el7_2.1.src.rpm" version="2.17"><filename>nscd-2.17-106.el7_2.1.x86_64.rpm</filename><sum type="sha256">dd287a37fd28de541337d86b8a8080b376204f7198281be67098b462daaee030</sum></package><package arch="x86_64" name="glibc-static" release="106.el7_2.1" src="glibc-2.17-106.el7_2.1.src.rpm" version="2.17"><filename>glibc-static-2.17-106.el7_2.1.x86_64.rpm</filename><sum type="sha256">f8d9f3064ab31aac65d61409e3e36d7568437eb669f48e648b3043a0d24e03f0</sum></package><package arch="i686" name="glibc" release="106.el7_2.1" src="glibc-2.17-106.el7_2.1.src.rpm" version="2.17"><filename>glibc-2.17-106.el7_2.1.i686.rpm</filename><sum type="sha256">ce2bc3c41738757bc04d0a8a5f3960cbaa0bf33a9c595aaa02b1b43c0ca26c0b</sum></package><package arch="x86_64" name="glibc-common" release="106.el7_2.1" src="glibc-2.17-106.el7_2.1.src.rpm" version="2.17"><filename>glibc-common-2.17-106.el7_2.1.x86_64.rpm</filename><sum type="sha256">947d74447e9fad9f3da5a6e7f153cb979da74f485c19154f9abfcf935ab34d88</sum></package><package arch="x86_64" name="glibc" release="106.el7_2.1" src="glibc-2.17-106.el7_2.1.src.rpm" version="2.17"><filename>glibc-2.17-106.el7_2.1.x86_64.rpm</filename><sum type="sha256">f88688d42d43f3aa13ba447166077226800f185a24479e1c7e5fa7d24d6de62d</sum></package><package arch="i686" name="glibc-devel" release="106.el7_2.1" src="glibc-2.17-106.el7_2.1.src.rpm" version="2.17"><filename>glibc-devel-2.17-106.el7_2.1.i686.rpm</filename><sum type="sha256">7c8e8c3e9f98dbdb294bbc6ec5b94a3f19d0e18f4924d547a15ad29b03456172</sum></package><package arch="x86_64" name="glibc-utils" release="106.el7_2.1" src="glibc-2.17-106.el7_2.1.src.rpm" version="2.17"><filename>glibc-utils-2.17-106.el7_2.1.x86_64.rpm</filename><sum type="sha256">0319831e97be1802b9ded0fc767b4abd6435f77b4b19071b9d0c199675624315</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5277" id="CVE-2015-5277" title="Glibc: Data Corruption While Reading The Nss Files Database" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2172" id="RHSA-2015:2172-1" title="Rhsa-2015:2172-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1262914" id="1262914" title="Glibc: Data Corruption While Reading The Nss Files Database" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2505-1</id><title>Abrt And Libreport</title><description>It was found that the ABRT debug information installer (abrt-action- install-debuginfo-to-abrt-cache) did not use temporary directories in a secure way. A local attacker could use the flaw to create symbolic links and files at arbitrary locations as the abrt user. (CVE-2015-5273) 
It was discovered that the kernel-invoked coredump processor provided by ABRT did not handle symbolic links correctly when writing core dumps of ABRT programs to the ABRT dump directory (/var/spool/abrt). A local attacker with write access to an ABRT problem directory could use this flaw to escalate their privileges. (CVE-2015-5287) 
It was found that ABRT may have exposed unintended information to Red Hat Bugzilla during crash reporting. A bug in the libreport library caused changes made by a user in files included in a crash report to be discarded. As a result, Red Hat Bugzilla attachments may contain data that was not intended to be made public, including host names, IP addresses, or command line options. (CVE-2015-5302) 
This flaw did not affect default installations of ABRT on Scientific Linux as they do not post data to Red Hat Bugzilla. This feature can however be enabled, potentially impacting modified ABRT instances.  With this update Scientific Linux will no longer publish the rhel-autoreport tools.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2015-12-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libreport-plugin-kerneloops" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-plugin-kerneloops-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">576fc4cf710626559b814188b653cc747076cf5108f673aa62e212fc50661e51</sum></package><package arch="x86_64" name="libreport-plugin-logger" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-plugin-logger-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">e521c7953fc6319dedad7e10dbb9dbb9087c69519690e43e5f33208ea0e21213</sum></package><package arch="x86_64" name="abrt-python" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-python-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">8154c09a353e8df35def0af0b8d3bdb719f72e0c86fd8b0ec24d3947af89b269</sum></package><package arch="i686" name="abrt-devel" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-devel-2.1.11-35.sl7.i686.rpm</filename><sum type="sha256">16e27474d37315c98663346bbfd2ae99dd0e5e747dc7e88d192fb52176f2e2fc</sum></package><package arch="x86_64" name="libreport-web" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-web-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">5fe6c40bf9d03d9e54c0fa9f3f03d435e33afee2577eee7d724d985b55a84149</sum></package><package arch="x86_64" name="abrt-gui-devel" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-gui-devel-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">136dee88ad097f95ab539b0d946fffb8a2562c56b84cb1859b8c45de6df98b70</sum></package><package arch="i686" name="libreport-web" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-web-2.1.11-31.sl7.i686.rpm</filename><sum type="sha256">c8cae803534608e267fcf32c609f65dc137ac6336c8b949837b2f4a76f6cd33d</sum></package><package arch="x86_64" name="abrt-devel" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-devel-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">fc298693b730bb382a18542fcbd79b0e3243861b734ffba4d0edaf0272aba27a</sum></package><package arch="x86_64" name="abrt-desktop" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-desktop-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">3a374f131f491b7d06ad0d12eca543ac0c68863757d744d7d88b8843f61dd6f0</sum></package><package arch="x86_64" name="libreport-plugin-mailx" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-plugin-mailx-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">bb31c464a4d881f9b4e5f683f520dbf167987e612acb08fd78c05dfa2f04e819</sum></package><package arch="x86_64" name="libreport" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">3a21b7aa2496670ec8cd0ab349a07611d532f99e6bd1fb77fb3d1af6fb828936</sum></package><package arch="i686" name="libreport-gtk-devel" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-gtk-devel-2.1.11-31.sl7.i686.rpm</filename><sum type="sha256">e14ec6924138b185258015b87ae050d5a12a670b924632ab0d29aeff6e318b78</sum></package><package arch="i686" name="abrt-libs" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-libs-2.1.11-35.sl7.i686.rpm</filename><sum type="sha256">010aad4baec41593b0d12e885d206105c12a819b3390aa9a1f62bd882a3de108</sum></package><package arch="x86_64" name="libreport-python" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-python-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">c76e912f826777e4b16131b969e89ffd706cbaba743a505e3029ae90ec4185c9</sum></package><package arch="x86_64" name="abrt-addon-xorg" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-addon-xorg-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">58e0daad2230a7158becebe43dcd89947524e32d1a14b683655b94f4f079a355</sum></package><package arch="x86_64" name="libreport-rhel-anaconda-bugzilla" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-rhel-anaconda-bugzilla-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">bcea95b4a39a97622acc52fd47a45516ed1a1837295e6cb3b9be586d4d89b497</sum></package><package arch="x86_64" name="abrt-dbus" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-dbus-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">1bc8d1789efb8e0234be4e846d83c8bba3d8d7301ef06405aa0e3d8e511596d9</sum></package><package arch="x86_64" name="abrt-tui" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-tui-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">5da69875d6920ae0974c2df97b7ca84c8af70afb1295defeb503be2b744d8ead</sum></package><package arch="x86_64" name="libreport-devel" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-devel-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">8a314913f24c999e4e4f646ec17c45c9ad02b2343579cc11f2cfdad7025680d7</sum></package><package arch="x86_64" name="libreport-gtk-devel" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-gtk-devel-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">7924dd7b2c1e507406e86808f96b00945b68862c17101b5a5c5d2c6127b2bb5d</sum></package><package arch="x86_64" name="abrt-addon-python" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-addon-python-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">4fe05f4cc6d456cf87c4ff1f0484bbf9e85d8576e53337e898a3deb7b89305bb</sum></package><package arch="x86_64" name="abrt-addon-upload-watch" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-addon-upload-watch-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">e255f817098824ff851190da7c7cab56c30d54e793d8f3bd0f09f3400e5664fe</sum></package><package arch="x86_64" name="libreport-plugin-ureport" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-plugin-ureport-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">6ec115671aa3a16765c863048ce2d1e9d3c2bca4ca01c1028c55db10e248f006</sum></package><package arch="x86_64" name="libreport-compat" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-compat-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">fe57b4724016ce836e12e1ddbc909e311dcd525b03f2ad0587f4d95224121995</sum></package><package arch="x86_64" name="abrt-addon-pstoreoops" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-addon-pstoreoops-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">8f25cb5dd923c02a8714e7f60218ba5ecb13a562dc8778769dcbb25e3b55253a</sum></package><package arch="i686" name="abrt-gui-libs" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-gui-libs-2.1.11-35.sl7.i686.rpm</filename><sum type="sha256">b47f62a5403086b503748632e157052bdec1b618ba4bf1feac88148650689248</sum></package><package arch="i686" name="abrt-gui-devel" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-gui-devel-2.1.11-35.sl7.i686.rpm</filename><sum type="sha256">e53c94088bf0f691cd0be539465923a41495a324a5ea8e5db35eb4a03312716e</sum></package><package arch="x86_64" name="abrt-libs" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-libs-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">9f10b492bb24a417791397d3ac22ab2ffaa72098c82cbba736fda0db37db6b81</sum></package><package arch="i686" name="libreport-devel" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-devel-2.1.11-31.sl7.i686.rpm</filename><sum type="sha256">faf190be2d0b618bbc219e9642c51be511d7e8cc977259999f71739bc7fabe10</sum></package><package arch="x86_64" name="libreport-plugin-reportuploader" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-plugin-reportuploader-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">8913c77d88dd22e6bc55937804298095cbb278fe18efac09c9b67ca086f56081</sum></package><package arch="x86_64" name="abrt" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">ca57035c3bbc1a5d745d310aaa29e84bcb7208e5832feccbad012298b6f0b9f3</sum></package><package arch="x86_64" name="abrt-addon-kerneloops" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-addon-kerneloops-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">4a09fc557cdab6fc58f9d10a487bfa774b997e1b99792876c302a3d2d4a64c11</sum></package><package arch="x86_64" name="libreport-gtk" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-gtk-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">8ce6ceb564c14e1c4c69670f00b88a1c8c47ddcc358dbf8507f348c649bc887e</sum></package><package arch="x86_64" name="libreport-rhel" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-rhel-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">498cf7c1a443862dab08e2745556b5f72650c90be18c5db39caee7fec03db625</sum></package><package arch="noarch" name="abrt-python-doc" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-python-doc-2.1.11-35.sl7.noarch.rpm</filename><sum type="sha256">1bb6d7e02110f89c85fa90dc17ff89872c580288b7bb2847f646092c55a14014</sum></package><package arch="x86_64" name="abrt-cli" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-cli-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">b9b867e6f7dcbecbb1696f4989c8fde8a6485465bef959726d9b2bea3a0b386d</sum></package><package arch="x86_64" name="abrt-gui" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-gui-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">b032c622ff9a1fd79bd87a3ab288ab7362d395eb04a283237194344fd1c2fc1b</sum></package><package arch="x86_64" name="libreport-newt" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-newt-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">7fbd43c5ce869c0aef9a94550d567d62efb6df6c9b6b2d72391d9c59f6d63d5a</sum></package><package arch="i686" name="libreport-web-devel" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-web-devel-2.1.11-31.sl7.i686.rpm</filename><sum type="sha256">f442b84967b8e11ba4df9eab762713cb12aeb93b4c98f9eea2f024bbdeafeab0</sum></package><package arch="x86_64" name="abrt-addon-vmcore" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-addon-vmcore-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">cc87618723cac97459d596d4fb5f8f778ca56fad6df0d8141418ba347d5c9494</sum></package><package arch="x86_64" name="libreport-anaconda" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-anaconda-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">52b02432ae7dec61f9091e924384c7e3458d828c501e32d36b1c7e7e76098f8f</sum></package><package arch="x86_64" name="abrt-gui-libs" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-gui-libs-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">3a6af864ae29b86b072bd14019835b3610e71d754290a573e015a66787bc498e</sum></package><package arch="x86_64" name="libreport-plugin-bugzilla" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-plugin-bugzilla-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">23617c9e55f0dedff15290aac17e0016fd55b7397635a74957762a7d68d26866</sum></package><package arch="x86_64" name="libreport-rhel-bugzilla" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-rhel-bugzilla-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">750b8ac4af3e02893f55cc3972e66d6e66900424c8f2ab93778e060336c213d3</sum></package><package arch="i686" name="libreport" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-2.1.11-31.sl7.i686.rpm</filename><sum type="sha256">783b25b1b99de084cf843a39927be41180472a562ef01556574c4e67451418bb</sum></package><package arch="x86_64" name="abrt-retrace-client" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-retrace-client-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">847046605195928416174cd5dbd2e55b7ad6f7d811900b437d97f428980b9164</sum></package><package arch="x86_64" name="abrt-addon-ccpp" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-addon-ccpp-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">782979030aedeb02f65838f07f7a5e5e1049aa46b727a88cf7d2beb526ccb2bb</sum></package><package arch="x86_64" name="libreport-web-devel" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-web-devel-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">adf6a406fc1502b6cad99b7bedc81985affcbbb8802314794122c75376a00ddc</sum></package><package arch="x86_64" name="libreport-filesystem" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-filesystem-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">da0d0eb596b1754ccb49cf4f285c47363bdf4a616976cd69f9c2c497f493f807</sum></package><package arch="x86_64" name="abrt-console-notification" release="35.sl7" src="abrt-2.1.11-35.sl7.src.rpm" version="2.1.11"><filename>abrt-console-notification-2.1.11-35.sl7.x86_64.rpm</filename><sum type="sha256">4810469b99e20cace747145d3aae9d171bfee883e01b5cab24384c1b1b6aaf19</sum></package><package arch="x86_64" name="libreport-cli" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-cli-2.1.11-31.sl7.x86_64.rpm</filename><sum type="sha256">30e5050a987d351bc16a395019aa451ee4365772690e24a4e1c13631d09e54d1</sum></package><package arch="i686" name="libreport-gtk" release="31.sl7" src="libreport-2.1.11-31.sl7.src.rpm" version="2.1.11"><filename>libreport-gtk-2.1.11-31.sl7.i686.rpm</filename><sum type="sha256">2f8d3052bee481d524c85d35bd7d982df54dfc0b6161fe044dd74ad76928da89</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5273" id="CVE-2015-5273" title="Abrt: Insecure Temporary Directory Usage In Abrt-Action-Install-Debuginfo-To-Abrt-Cache" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5287" id="CVE-2015-5287" title="Abrt: Incorrect Permissions On /Var/Spool/Abrt" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5302" id="CVE-2015-5302" title="Libreport: Possible Private Data Leak In Bugzilla Bugs Opened By Abrt" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2505" id="RHSA-2015:2505-1" title="Rhsa-2015:2505-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1262252" id="1262252" title="Abrt: Insecure Temporary Directory Usage In Abrt-Action-Install-Debuginfo-To-Abrt-Cache" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1266837" id="1266837" title="Abrt: Incorrect Permissions On /Var/Spool/Abrt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1270903" id="1270903" title="Libreport: Possible Private Data Leak In Bugzilla Bugs Opened By Abrt" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2519-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-4513, CVE-2015-7189, CVE-2015-7197, CVE-2015-7198, CVE-2015-7199, CVE-2015-7200) 
A same-origin policy bypass flaw was found in the way Thunderbird handled certain cross-origin resource sharing (CORS) requests. A web page containing malicious content could cause Thunderbird to disclose sensitive information. (CVE-2015-7193) 
Note: All of the above issues cannot be exploited by a specially crafted HTML mail message because JavaScript is disabled by default for mail messages. However, they could be exploited in other ways in Thunderbird (for example, by viewing the full remote content of an RSS feed). 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux</release><issued date="2015-11-27 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_2" src="thunderbird-38.4.0-1.el7_2.src.rpm" version="38.4.0"><filename>thunderbird-38.4.0-1.el7_2.x86_64.rpm</filename><sum type="sha256">7105b03aa137e01b41547e5ac8776d4145192ac5867220525c14e7906f270da2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4513" id="CVE-2015-4513" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.4) (Mfsa 2015-116)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7189" id="CVE-2015-7189" title="Mozilla: Buffer Overflow During Image Interactions In Canvas (Mfsa 2015-123)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7193" id="CVE-2015-7193" title="Mozilla: Cors Preflight Is Bypassed When Non-Standard Content-Type Headers Are Received (Mfsa 2015-127)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7197" id="CVE-2015-7197" title="Mozilla: Mixed Content Websocket Policy Bypass Through Workers (Mfsa 2015-132)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7198" id="CVE-2015-7198" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-131)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7199" id="CVE-2015-7199" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-131)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7200" id="CVE-2015-7200" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-131)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2519" id="RHSA-2015:2519-1" title="Rhsa-2015:2519-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277332" id="1277332" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.4) (Mfsa 2015-116)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277344" id="1277344" title="Mozilla: Buffer Overflow During Image Interactions In Canvas (Mfsa 2015-123)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277346" id="1277346" title="Mozilla: Cors Preflight Is Bypassed When Non-Standard Content-Type Headers Are Received (Mfsa 2015-127)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277350" id="1277350" title="Mozilla: Vulnerabilities Found Through Code Inspection (Mfsa 2015-131)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277351" id="1277351" title="Mozilla: Mixed Content Websocket Policy Bypass Through Workers (Mfsa 2015-132)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2522-1</id><title>Apache-Commons-Collections</title><description>It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons- collections library. (CVE-2015-7501) 
With this update, deserialization of certain classes in the commons- collections library is no longer allowed. Applications that require those classes to be deserialized can use the system property "org.apache.commons.collections.enableUnsafeSerialization" to re-enable their deserialization. 
In the interim, the quickest way to resolve this specific deserialization vulnerability is to remove the vulnerable class files (InvokerTransformer, InstantiateFactory, and InstantiateTransformer) in all commons-collections jar files. Any manual changes should be tested to avoid unforseen complications. 
All running applications using the commons-collections library must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux</release><issued date="2015-11-30 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="apache-commons-collections-testframework-javadoc" release="22.el7_2" src="apache-commons-collections-3.2.1-22.el7_2.src.rpm" version="3.2.1"><filename>apache-commons-collections-testframework-javadoc-3.2.1-22.el7_2.noarch.rpm</filename><sum type="sha256">2bda28fc808d0d63555362925d2bc550a3f92c3249bcd9cb1752aade9d575cfc</sum></package><package arch="noarch" name="apache-commons-collections-javadoc" release="22.el7_2" src="apache-commons-collections-3.2.1-22.el7_2.src.rpm" version="3.2.1"><filename>apache-commons-collections-javadoc-3.2.1-22.el7_2.noarch.rpm</filename><sum type="sha256">1876d5239373d3b6cc1ce04a3183703c31bedd0b55dd1d67b065c582fc785d5c</sum></package><package arch="noarch" name="apache-commons-collections" release="22.el7_2" src="apache-commons-collections-3.2.1-22.el7_2.src.rpm" version="3.2.1"><filename>apache-commons-collections-3.2.1-22.el7_2.noarch.rpm</filename><sum type="sha256">83c2c18006a90151289522af696e1d6700413073b91d930b6795b61345b5933c</sum></package><package arch="noarch" name="apache-commons-collections-testframework" release="22.el7_2" src="apache-commons-collections-3.2.1-22.el7_2.src.rpm" version="3.2.1"><filename>apache-commons-collections-testframework-3.2.1-22.el7_2.noarch.rpm</filename><sum type="sha256">b2c6633684de76b941b513a733e34e9d3d1f582a5bee3031a738385c6e988403</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7501" id="CVE-2015-7501" title="Cve-2015-7501" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2522" id="RHSA-2015:2522-1" title="Rhsa-2015:2522-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1279330" id="1279330" title="Apache-Commons-Collections: Invokertransformer Code Execution During Deserialisation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2550-1</id><title>Libxml2</title><description>Several denial of service flaws were found in libxml2, a library providing support for reading, modifying, and writing XML and HTML files. A remote attacker could provide a specially crafted XML or HTML file that, when processed by an application using libxml2, would cause that application to use an excessive amount of CPU, leak potentially sensitive information, or in certain cases crash the application. (CVE-2015-1819, CVE-2015-5312, CVE-2015-7497, CVE-2015-7498, CVE-2015-7499, CVE-2015-7500 CVE-2015-7941, CVE-2015-7942, CVE-2015-8241, CVE-2015-8242, CVE-2015-8317, BZ#1213957, BZ#1281955) 
The desktop must be restarted (log out, then log back in) for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2015-12-21 00:00:00" /><restart_suggested>true</restart_suggested><relogin_suggested>true</relogin_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libxml2" release="6.el7_2.2" src="libxml2-2.9.1-6.el7_2.2.src.rpm" version="2.9.1"><filename>libxml2-2.9.1-6.el7_2.2.x86_64.rpm</filename><sum type="sha256">86b749cb0a50927d559d4c389d4deff9e7ba08f431e936432fdc5497d4b02dea</sum></package><package arch="x86_64" name="libxml2-devel" release="6.el7_2.2" src="libxml2-2.9.1-6.el7_2.2.src.rpm" version="2.9.1"><filename>libxml2-devel-2.9.1-6.el7_2.2.x86_64.rpm</filename><sum type="sha256">029e8136a04f691f02f9670119840def60c9d2e795a89dddac826e7b8fc9bb1d</sum></package><package arch="x86_64" name="libxml2-python" release="6.el7_2.2" src="libxml2-2.9.1-6.el7_2.2.src.rpm" version="2.9.1"><filename>libxml2-python-2.9.1-6.el7_2.2.x86_64.rpm</filename><sum type="sha256">ae31f852b524e8053cf094074a3aaf4d925a74fa8bd58bbc616ab3f5abd65bca</sum></package><package arch="i686" name="libxml2-static" release="6.el7_2.2" src="libxml2-2.9.1-6.el7_2.2.src.rpm" version="2.9.1"><filename>libxml2-static-2.9.1-6.el7_2.2.i686.rpm</filename><sum type="sha256">8a1653b7a9d9e86a72d47ce24c5b0ca194ff1a68ca6ee672c0ef60c60d0020c8</sum></package><package arch="i686" name="libxml2-devel" release="6.el7_2.2" src="libxml2-2.9.1-6.el7_2.2.src.rpm" version="2.9.1"><filename>libxml2-devel-2.9.1-6.el7_2.2.i686.rpm</filename><sum type="sha256">c1266d95e1b4fb0100b511b21b1604314984585bd8f9048cdff67c85d9c027e7</sum></package><package arch="x86_64" name="libxml2-static" release="6.el7_2.2" src="libxml2-2.9.1-6.el7_2.2.src.rpm" version="2.9.1"><filename>libxml2-static-2.9.1-6.el7_2.2.x86_64.rpm</filename><sum type="sha256">da0b96ef2df4e39c3226397fc46d09d69d90f61905e9cb14fc0fd7ae827decfe</sum></package><package arch="i686" name="libxml2" release="6.el7_2.2" src="libxml2-2.9.1-6.el7_2.2.src.rpm" version="2.9.1"><filename>libxml2-2.9.1-6.el7_2.2.i686.rpm</filename><sum type="sha256">dff3cb40e43351418b30c5601de151df3c71f5ce1228b174d9a47b1a188e00e3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1819" id="CVE-2015-1819" title="Libxml2: Denial Of Service Processing A Crafted Xml Document" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5312" id="CVE-2015-5312" title="Libxml2: Cpu Exhaustion When Processing Specially Crafted Xml Input" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7497" id="CVE-2015-7497" title="Libxml2: Heap-Based Buffer Overflow In Xmldictcomputefastqkey" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7498" id="CVE-2015-7498" title="Libxml2: Heap-Based Buffer Overflow In Xmlparsexmldecl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7499" id="CVE-2015-7499" title="Libxml2: Heap-Based Buffer Overflow In Xmlgrow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7500" id="CVE-2015-7500" title="Libxml2: Heap Buffer Overflow In Xmlparsemisc" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7941" id="CVE-2015-7941" title="Libxml2: Out-Of-Bounds Memory Access" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7942" id="CVE-2015-7942" title="Libxml2: Heap-Based Buffer Overflow In Xmlparseconditionalsections()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8241" id="CVE-2015-8241" title="Libxml2: Buffer Overread With Xml Parser In Xmlnextchar" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8242" id="CVE-2015-8242" title="Libxml2: Buffer Overread With Html Parser In Push Mode In Xmlsax2Textnode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8317" id="CVE-2015-8317" title="Libxml2: Out-Of-Bounds Heap Read When Parsing File With Unfinished Xml Declaration" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2550" id="RHSA-2015:2550-1" title="Rhsa-2015:2550-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211278" id="1211278" title="Libxml2: Denial Of Service Processing A Crafted Xml Document" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213957" id="1213957" title="Libxml2: Out-Of-Bounds Memory Access When Parsing An Unclosed Html Comment" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274222" id="1274222" title="Libxml2: Out-Of-Bounds Memory Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1276297" id="1276297" title="Libxml2: Heap-Based Buffer Overflow In Xmlparseconditionalsections()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1276693" id="1276693" title="Libxml2: Cpu Exhaustion When Processing Specially Crafted Xml Input" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281862" id="1281862" title="Libxml2: Heap-Based Buffer Overflow In Xmldictcomputefastqkey" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281879" id="1281879" title="Libxml2: Heap-Based Buffer Overflow In Xmlparsexmldecl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281925" id="1281925" title="Libxml2: Heap-Based Buffer Overflow In Xmlgrow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281930" id="1281930" title="Libxml2: Out-Of-Bounds Heap Read When Parsing File With Unfinished Xml Declaration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281936" id="1281936" title="Libxml2: Buffer Overread With Xml Parser In Xmlnextchar" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281943" id="1281943" title="Libxml2: Heap Buffer Overflow In Xmlparsemisc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281950" id="1281950" title="Libxml2: Buffer Overread With Html Parser In Push Mode In Xmlsax2Textnode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281955" id="1281955" title="Libxml2: Multiple Out-Of-Bounds Reads In Xmldictcomputefastkey.Isra.2 And Xmldictaddstring.Isra.O" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2552-1</id><title>Kernel</title><description>* It was found that the x86 ISA (Instruction Set Architecture) is prone to a denial of service attack inside a virtualized environment in the form of an infinite loop in the microcode due to the way (sequential) delivering of benign exceptions such as #AC (alignment check exception) and #DB (debug exception) is handled. A privileged user inside a guest could use these flaws to create denial of service conditions on the host kernel. (CVE-2015-5307, CVE-2015-8104, Important) 
This update also fixes the following bugs: 
* On Intel Xeon v5 platforms, the processor frequency was always tied to the highest possible frequency. Switching p-states on these client platforms failed. This update sets the idle frequency, busy frequency, and processor frequency values by determining the range and adjusting the minimal and maximal percent limit values. Now, switching p-states on the aforementioned client platforms proceeds successfully. 
* Due to a validation error of in-kernel memory-mapped I/O (MMIO) tracing, a VM became previously unresponsive when connected to RHEV Hypervisor. The provided patch fixes this bug by dropping the check in MMIO handler, and a VM continues running as expected. 
* Due to retry-able command errors, the NVMe driver previously leaked I/O descriptors and DMA mappings. As a consequence, the kernel could become unresponsive during the hot-unplug operation if a driver was removed. This update fixes the driver memory leak bug on command retries, and the kernel no longer hangs in this situation. 
* The hybrid_dma_data() function was not initialized before use, which caused an invalid memory access when hot-plugging a PCI card. As a consequence, a kernel oops occurred. The provided patch makes sure hybrid_dma_data() is initialized before use, and the kernel oops no longer occurs in this situation. 
* When running PowerPC (PPC) KVM guests and the host was experiencing a lot of page faults, for example because it was running low on memory, the host sometimes triggered an incorrect kind of interrupt in the guest: a data storage exception instead of a data segment exception. This caused a kernel panic of the PPC KVM guest. With this update, the host kernel synthesizes a segment fault if the corresponding Segment Lookaside Buffer (SLB) lookup fails, which prevents the kernel panic from occurring. 
* The kernel accessed an incorrect area of the khugepaged process causing Logical Partitioning (LPAR) to become unresponsive, and an oops occurred in medlp5. The backported upstream patch prevents an LPAR hang, and the oops no longer occurs. 
* When the sctp module was loaded and a route to an association endpoint was removed after receiving an Out-of-The-Blue (OOTB) chunk but before incrementing the "dropped because of missing route" SNMP statistic, a Null Pointer Dereference kernel panic previously occurred. This update fixes the race condition between OOTB response and route removal. 
* The cpuscaling test of the certification test suite previously failed due to a rounding bug in the intel-pstate driver. This bug has been fixed and the cpuscaling test now passes. 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux</release><issued date="2015-12-21 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools-libs" release="327.3.1.el7" src="kernel-3.10.0-327.3.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-327.3.1.el7.x86_64.rpm</filename><sum type="sha256">5599ec6cb3b7fbee706df4027d314fbf6b975f66f998c21c1f93da1241b9fe9f</sum></package><package arch="x86_64" name="kernel" release="327.3.1.el7" src="kernel-3.10.0-327.3.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-327.3.1.el7.x86_64.rpm</filename><sum type="sha256">d57fc4ff0dd50e2d4fee4cb70aaca4e61f9a9ced01b2d3e43701185f79555230</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="327.3.1.el7" src="kernel-3.10.0-327.3.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-327.3.1.el7.noarch.rpm</filename><sum type="sha256">90efb9dedaab6d288510f5376e645b566df2c82588906f9a79a09ef9c340689c</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="327.3.1.el7" src="kernel-3.10.0-327.3.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-327.3.1.el7.x86_64.rpm</filename><sum type="sha256">306c63ecab001dc53079eb786fbcb7653ef4a7677b8b882b376d9489e4b55fb1</sum></package><package arch="x86_64" name="kernel-debug-devel" release="327.3.1.el7" src="kernel-3.10.0-327.3.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-327.3.1.el7.x86_64.rpm</filename><sum type="sha256">1d13306ff7776f49bb5bb9f996dff1254e75a1ae4d90a96bce4a90b8267ad2d7</sum></package><package arch="x86_64" name="kernel-tools" release="327.3.1.el7" src="kernel-3.10.0-327.3.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-327.3.1.el7.x86_64.rpm</filename><sum type="sha256">94fb52641c956209e0f2ae42bc1fed8994eb5711ad889be5378888fe57449461</sum></package><package arch="noarch" name="kernel-doc" release="327.3.1.el7" src="kernel-3.10.0-327.3.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-327.3.1.el7.noarch.rpm</filename><sum type="sha256">cfe745e5add46b64f2686b017dbba37860c75fd50cd46bb9d6852e8a26263f82</sum></package><package arch="x86_64" name="kernel-debug" release="327.3.1.el7" src="kernel-3.10.0-327.3.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-327.3.1.el7.x86_64.rpm</filename><sum type="sha256">d74b4eb3069d6a1ac959992f280fae5f787966d07893dca03aa3b070f4742e0a</sum></package><package arch="x86_64" name="perf" release="327.3.1.el7" src="kernel-3.10.0-327.3.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-327.3.1.el7.x86_64.rpm</filename><sum type="sha256">48b7aa1baf6e3e115f9ffb37ce1575fa6a5169de34d637f8a3c44982ce66809f</sum></package><package arch="x86_64" name="kernel-devel" release="327.3.1.el7" src="kernel-3.10.0-327.3.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-327.3.1.el7.x86_64.rpm</filename><sum type="sha256">5554c4f427f44659e3ee25db3d1ab4b50017bdca95726be7a1a6bbe81a1b4fc7</sum></package><package arch="x86_64" name="kernel-headers" release="327.3.1.el7" src="kernel-3.10.0-327.3.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-327.3.1.el7.x86_64.rpm</filename><sum type="sha256">9679c77d335c3980b89a8f94cca638d99098d93fc0c9bfe0cd77e7b97987d30e</sum></package><package arch="x86_64" name="python-perf" release="327.3.1.el7" src="kernel-3.10.0-327.3.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-327.3.1.el7.x86_64.rpm</filename><sum type="sha256">0ca1a8704763750021c7956c0e03d060cfb7e5e10af6c6554ae66756d239836c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5307" id="CVE-2015-5307" title="Virt: Guest To Host Dos By Triggering An Infinite Loop In Microcode Via #Ac Exception" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8104" id="CVE-2015-8104" title="Virt: Guest To Host Dos By Triggering An Infinite Loop In Microcode Via #Db Exception" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2552" id="RHSA-2015:2552-1" title="Rhsa-2015:2552-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277172" id="1277172" title="Virt: Guest To Host Dos By Triggering An Infinite Loop In Microcode Via #Ac Exception" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278496" id="1278496" title="Virt: Guest To Host Dos By Triggering An Infinite Loop In Microcode Via #Db Exception" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2561-1</id><title>Git</title><description>A flaw was found in the way the git-remote-ext helper processed certain URLs. If a user had Git configured to automatically clone submodules from untrusted repositories, an attacker could inject commands into the URL of a submodule, allowing them to execute arbitrary code on the user's system.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2015-12-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="git-cvs" release="6.el7" src="git-1.8.3.1-6.el7.src.rpm" version="1.8.3.1"><filename>git-cvs-1.8.3.1-6.el7.noarch.rpm</filename><sum type="sha256">ac3c99707f7da0c0ef5cb4c0856621cfb1e851ab4b817eab3e0918add9d3f2fe</sum></package><package arch="x86_64" name="git-svn" release="6.el7" src="git-1.8.3.1-6.el7.src.rpm" version="1.8.3.1"><filename>git-svn-1.8.3.1-6.el7.x86_64.rpm</filename><sum type="sha256">a944bbd52f7dfd94359e0c6562eced4604c961194f9571a78f68f5902356bb9f</sum></package><package arch="noarch" name="emacs-git-el" release="6.el7" src="git-1.8.3.1-6.el7.src.rpm" version="1.8.3.1"><filename>emacs-git-el-1.8.3.1-6.el7.noarch.rpm</filename><sum type="sha256">a1e2a1155dac95001b47d834d159fefee94f0cd12de7668e471e3cd56a5a2df4</sum></package><package arch="noarch" name="git-all" release="6.el7" src="git-1.8.3.1-6.el7.src.rpm" version="1.8.3.1"><filename>git-all-1.8.3.1-6.el7.noarch.rpm</filename><sum type="sha256">0fa6369460d9affe3ee23d305f54f13809dcffa102afbdd92fb6cd165e873e25</sum></package><package arch="noarch" name="git-gui" release="6.el7" src="git-1.8.3.1-6.el7.src.rpm" version="1.8.3.1"><filename>git-gui-1.8.3.1-6.el7.noarch.rpm</filename><sum type="sha256">62cda65b624ec820805fba7a3769c5b565eaee325cbb8073ad52b06807f66826</sum></package><package arch="noarch" name="gitweb" release="6.el7" src="git-1.8.3.1-6.el7.src.rpm" version="1.8.3.1"><filename>gitweb-1.8.3.1-6.el7.noarch.rpm</filename><sum type="sha256">9a29d7cecabe6a4f3466b2a7d9631f458f47614f27bd538fc086a574f84efc49</sum></package><package arch="noarch" name="git-p4" release="6.el7" src="git-1.8.3.1-6.el7.src.rpm" version="1.8.3.1"><filename>git-p4-1.8.3.1-6.el7.noarch.rpm</filename><sum type="sha256">88a8dc5eb2c63724eb4299b6f71084089131a455206d7253f08e1de7cef06c4c</sum></package><package arch="x86_64" name="git" release="6.el7" src="git-1.8.3.1-6.el7.src.rpm" version="1.8.3.1"><filename>git-1.8.3.1-6.el7.x86_64.rpm</filename><sum type="sha256">8603a5d0214f5fbd3c12edc1744611128b2d34809ec139e56356828f585006e0</sum></package><package arch="x86_64" name="git-daemon" release="6.el7" src="git-1.8.3.1-6.el7.src.rpm" version="1.8.3.1"><filename>git-daemon-1.8.3.1-6.el7.x86_64.rpm</filename><sum type="sha256">3032e7bfd04a29d67f0eb9cfd927d7c25d003871e1c35439adf7545355581e07</sum></package><package arch="noarch" name="git-bzr" release="6.el7" src="git-1.8.3.1-6.el7.src.rpm" version="1.8.3.1"><filename>git-bzr-1.8.3.1-6.el7.noarch.rpm</filename><sum type="sha256">9f13a542d8db3360cf12f91fbd6e814b917493e7f8bf3efd14fe7284bf60b9e4</sum></package><package arch="noarch" name="git-hg" release="6.el7" src="git-1.8.3.1-6.el7.src.rpm" version="1.8.3.1"><filename>git-hg-1.8.3.1-6.el7.noarch.rpm</filename><sum type="sha256">45a2a1ff460d3ebfebb5b4156d1e0c2ab28693fb6d2aaa82a759576e76895f05</sum></package><package arch="noarch" name="emacs-git" release="6.el7" src="git-1.8.3.1-6.el7.src.rpm" version="1.8.3.1"><filename>emacs-git-1.8.3.1-6.el7.noarch.rpm</filename><sum type="sha256">3cba1f4fff40dcf2773c114808631086d4d7e7b722a9761d7e510bebd185d163</sum></package><package arch="noarch" name="git-email" release="6.el7" src="git-1.8.3.1-6.el7.src.rpm" version="1.8.3.1"><filename>git-email-1.8.3.1-6.el7.noarch.rpm</filename><sum type="sha256">5ba15a045f1f20f3901c3290f2d6c0f4b92d1e3758ae047898c1103121dacea8</sum></package><package arch="noarch" name="perl-Git-SVN" release="6.el7" src="git-1.8.3.1-6.el7.src.rpm" version="1.8.3.1"><filename>perl-Git-SVN-1.8.3.1-6.el7.noarch.rpm</filename><sum type="sha256">171278028c27fe0c8bdbb9b172513588f4418dfa7a57d126414c5a461cc6fc94</sum></package><package arch="noarch" name="gitk" release="6.el7" src="git-1.8.3.1-6.el7.src.rpm" version="1.8.3.1"><filename>gitk-1.8.3.1-6.el7.noarch.rpm</filename><sum type="sha256">65600744991b4323f82ca1a329f9ad091e9b1f14887b41c5aa32804a67607590</sum></package><package arch="noarch" name="perl-Git" release="6.el7" src="git-1.8.3.1-6.el7.src.rpm" version="1.8.3.1"><filename>perl-Git-1.8.3.1-6.el7.noarch.rpm</filename><sum type="sha256">eac02decbfe8d641f597d149401c41262a3b1f00ec7adf902e44701f1b25ced6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2015:2561" id="RHSA-2015:2561-1" title="Rhsa-2015:2561-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269794" id="1269794" title="Git: Arbitrary Code Execution Via Crafted Urls" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2595-1</id><title>Libpng12</title><description>It was discovered that the png_get_PLTE() and png_set_PLTE() functions of libpng did not correctly calculate the maximum palette sizes for bit depths of less than 8. In case an application tried to use these functions in combination with properly calculated palette sizes, this could lead to a buffer overflow or out-of-bounds reads. An attacker could exploit this to cause a crash or potentially execute arbitrary code by tricking an unsuspecting user into processing a specially crafted PNG image. However, the exact impact is dependent on the application using the library. (CVE-2015-8126, CVE-2015-8472) 
An array-indexing error was discovered in the png_convert_to_rfc1123() function of libpng. An attacker could possibly use this flaw to cause an out-of-bounds read by tricking an unsuspecting user into processing a specially crafted PNG image. (CVE-2015-7981)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2015-12-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libpng12" release="7.el7_2" src="libpng12-1.2.50-7.el7_2.src.rpm" version="1.2.50"><filename>libpng12-1.2.50-7.el7_2.x86_64.rpm</filename><sum type="sha256">8d7b0a51f5c202e9ab87fc85f08b69c45604b2bdf03b88f5a07cf384402fe64f</sum></package><package arch="i686" name="libpng12" release="7.el7_2" src="libpng12-1.2.50-7.el7_2.src.rpm" version="1.2.50"><filename>libpng12-1.2.50-7.el7_2.i686.rpm</filename><sum type="sha256">47da969068dbdf63302f5b82ac81621e7064dd7fd1f7ffd49f64be107fc780e2</sum></package><package arch="i686" name="libpng12-devel" release="7.el7_2" src="libpng12-1.2.50-7.el7_2.src.rpm" version="1.2.50"><filename>libpng12-devel-1.2.50-7.el7_2.i686.rpm</filename><sum type="sha256">263e02ad92cac2dab8566a11cfa68876456870e828d1b509d23e0055215e14ce</sum></package><package arch="x86_64" name="libpng12-devel" release="7.el7_2" src="libpng12-1.2.50-7.el7_2.src.rpm" version="1.2.50"><filename>libpng12-devel-1.2.50-7.el7_2.x86_64.rpm</filename><sum type="sha256">2e171b99323b4f7283bf23e127b3220ddb5b8209d43d9065c8dee14cf324aa44</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7981" id="CVE-2015-7981" title="Libpng: Out-Of-Bounds Read In Png_Convert_To_Rfc1123" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" id="CVE-2015-8126" title="Libpng: Buffer Overflow Vulnerabilities In Png_Get_Plte/Png_Set_Plte Functions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8472" id="CVE-2015-8472" title="Libpng: Buffer Overflow Vulnerabilities In Png_Get_Plte/Png_Set_Plte Functions" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2595" id="RHSA-2015:2595-1" title="Rhsa-2015:2595-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1276416" id="1276416" title="Libpng: Out-Of-Bounds Read In Png_Convert_To_Rfc1123" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281756" id="1281756" title="Libpng: Buffer Overflow Vulnerabilities In Png_Get_Plte/Png_Set_Plte Functions" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2596-1</id><title>Libpng</title><description>It was discovered that the png_get_PLTE() and png_set_PLTE() functions of libpng did not correctly calculate the maximum palette sizes for bit depths of less than 8. In case an application tried to use these functions in combination with properly calculated palette sizes, this could lead to a buffer overflow or out-of-bounds reads. An attacker could exploit this to cause a crash or potentially execute arbitrary code by tricking an unsuspecting user into processing a specially crafted PNG image. However, the exact impact is dependent on the application using the library. (CVE-2015-8126, CVE-2015-8472)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2015-12-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="libpng-static" release="7.el7_2" src="libpng-1.5.13-7.el7_2.src.rpm" version="1.5.13"><filename>libpng-static-1.5.13-7.el7_2.x86_64.rpm</filename><sum type="sha256">acfb28e77bdd62f80ab7d0ae0cef25c7b359ca3a0216236dd68891c734109918</sum></package><package arch="i686" epoch="2" name="libpng" release="7.el7_2" src="libpng-1.5.13-7.el7_2.src.rpm" version="1.5.13"><filename>libpng-1.5.13-7.el7_2.i686.rpm</filename><sum type="sha256">15fbcca6ed2e4fb5a4ad2acec16e5e19060db9610cb78e3e6841b7dcd898453f</sum></package><package arch="i686" epoch="2" name="libpng-devel" release="7.el7_2" src="libpng-1.5.13-7.el7_2.src.rpm" version="1.5.13"><filename>libpng-devel-1.5.13-7.el7_2.i686.rpm</filename><sum type="sha256">6d68669065de21413272723d276be3a66efa85cce92e0ac1ce4e045b0e2e1d18</sum></package><package arch="i686" epoch="2" name="libpng-static" release="7.el7_2" src="libpng-1.5.13-7.el7_2.src.rpm" version="1.5.13"><filename>libpng-static-1.5.13-7.el7_2.i686.rpm</filename><sum type="sha256">3f1543cc02cc3f448e9d1175984ba3e24401ea94c483ac6c97d1884ef90f6490</sum></package><package arch="x86_64" epoch="2" name="libpng-devel" release="7.el7_2" src="libpng-1.5.13-7.el7_2.src.rpm" version="1.5.13"><filename>libpng-devel-1.5.13-7.el7_2.x86_64.rpm</filename><sum type="sha256">baeafcbb83fcabbe1fe23b08559d6db113a8a3c4cf5f6963bd3674b8a7908b18</sum></package><package arch="x86_64" epoch="2" name="libpng" release="7.el7_2" src="libpng-1.5.13-7.el7_2.src.rpm" version="1.5.13"><filename>libpng-1.5.13-7.el7_2.x86_64.rpm</filename><sum type="sha256">a63e53637b4ac4c45eb37f488d637ac0bd1aa0be1fcff29f6e9479cf2631ce3d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8126" id="CVE-2015-8126" title="Libpng: Buffer Overflow Vulnerabilities In Png_Get_Plte/Png_Set_Plte Functions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8472" id="CVE-2015-8472" title="Libpng: Buffer Overflow Vulnerabilities In Png_Get_Plte/Png_Set_Plte Functions" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2596" id="RHSA-2015:2596-1" title="Rhsa-2015:2596-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281756" id="1281756" title="Libpng: Buffer Overflow Vulnerabilities In Png_Get_Plte/Png_Set_Plte Functions" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2617-1</id><title>Openssl</title><description>A NULL pointer derefernce flaw was found in the way OpenSSL verified signatures using the RSA PSS algorithm. A remote attacked could possibly use this flaw to crash a TLS/SSL client using OpenSSL, or a TLS/SSL server using OpenSSL if it enabled client authentication. (CVE-2015-3194) 
A memory leak vulnerability was found in the way OpenSSL parsed PKCS#7 and CMS data. A remote attacker could use this flaw to cause an application that parses PKCS#7 or CMS data from untrusted sources to use an excessive amount of memory and possibly crash. (CVE-2015-3195) 
A race condition flaw, leading to a double free, was found in the way OpenSSL handled pre-shared key (PSK) identify hints. A remote attacker could use this flaw to crash a multi-threaded SSL/TLS client using OpenSSL. (CVE-2015-3196) 
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2015-12-15 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl-libs" release="51.el7_2.1" src="openssl-1.0.1e-51.el7_2.1.src.rpm" version="1.0.1e"><filename>openssl-libs-1.0.1e-51.el7_2.1.x86_64.rpm</filename><sum type="sha256">c00ca6d336e5c599ddc2b56ad559baf905745a287bdfc2d72b045c0dc9e885d0</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="51.el7_2.1" src="openssl-1.0.1e-51.el7_2.1.src.rpm" version="1.0.1e"><filename>openssl-libs-1.0.1e-51.el7_2.1.i686.rpm</filename><sum type="sha256">6ac972c2daa38fce5fc555cd1abef20b68b9ec596518c30df15ec1ac882da097</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="51.el7_2.1" src="openssl-1.0.1e-51.el7_2.1.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-51.el7_2.1.x86_64.rpm</filename><sum type="sha256">f60f13622a633cf624cfa28a4ca08639085093a9be635e0fed528d1c13fd861a</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="51.el7_2.1" src="openssl-1.0.1e-51.el7_2.1.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-51.el7_2.1.x86_64.rpm</filename><sum type="sha256">0588b01e5b76135856fe5230615fa17daa720df7278cfffc9d72d1dba769c927</sum></package><package arch="i686" epoch="1" name="openssl-static" release="51.el7_2.1" src="openssl-1.0.1e-51.el7_2.1.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-51.el7_2.1.i686.rpm</filename><sum type="sha256">e14435ebb91257235dab504834088356389bb787e618cd50e1d4b73d49583fa3</sum></package><package arch="x86_64" epoch="1" name="openssl-devel" release="51.el7_2.1" src="openssl-1.0.1e-51.el7_2.1.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-51.el7_2.1.x86_64.rpm</filename><sum type="sha256">35233728450b8857fb0dd8bcfe1f2a777e275b9d8f6c9fb46f7cacdb98d2ea9c</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="51.el7_2.1" src="openssl-1.0.1e-51.el7_2.1.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-51.el7_2.1.i686.rpm</filename><sum type="sha256">4fa0aa6512ba04058d873d6fa2e4271a1b994d41216643442c2fe358948517b2</sum></package><package arch="x86_64" epoch="1" name="openssl" release="51.el7_2.1" src="openssl-1.0.1e-51.el7_2.1.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-51.el7_2.1.x86_64.rpm</filename><sum type="sha256">ba980ce510c4fd6aad3f0c20e0f9d9f12dd543fbd8aaa071d103382f57edc271</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3194" id="CVE-2015-3194" title="Openssl: Certificate Verify Crash With Missing Pss Parameter" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3195" id="CVE-2015-3195" title="Openssl: X509_Attribute Memory Leak" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3196" id="CVE-2015-3196" title="Openssl: Race Condition Handling Psk Identify Hint" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2617" id="RHSA-2015:2617-1" title="Rhsa-2015:2617-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1288320" id="1288320" title="Openssl: Certificate Verify Crash With Missing Pss Parameter" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1288322" id="1288322" title="Openssl: X509_Attribute Memory Leak" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1288326" id="1288326" title="Openssl: Race Condition Handling Psk Identify Hint" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2619-1</id><title>Libreoffice</title><description>It was discovered that LibreOffice did not properly restrict automatic link updates. By tricking a victim into opening specially crafted documents, an attacker could possibly use this flaw to disclose contents of files accessible by the victim. (CVE-2015-4551) 
An integer underflow flaw leading to a heap-based buffer overflow when parsing PrinterSetup data was discovered. By tricking a user into opening a specially crafted document, an attacker could possibly exploit this flaw to execute arbitrary code with the privileges of the user opening the file. (CVE-2015-5212) 
An integer overflow flaw, leading to a heap-based buffer overflow, was found in the way LibreOffice processed certain Microsoft Word .doc files. By tricking a user into opening a specially crafted Microsoft Word .doc document, an attacker could possibly use this flaw to execute arbitrary code with the privileges of the user opening the file. (CVE-2015-5213) 
It was discovered that LibreOffice did not properly sanity check bookmark indexes. By tricking a user into opening a specially crafted document, an attacker could possibly use this flaw to execute arbitrary code with the privileges of the user opening the file. (CVE-2015-5214)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2015-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="libreoffice-core" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-core-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">d9fe5bcaf55d0c0d5781dc4c628f3052642ddd9728452b552650b9c225de4856</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ga" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ga-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">34df2889735d3221d8200ed7794c4dcca7783569247b99e41d867d28ac10a0a3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nb" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-nb-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">f67c01a20c93328cc8ec668c536b42318c35f12847d6d290a955a61c98c67129</sum></package><package arch="noarch" epoch="1" name="autocorr-af" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-af-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">8fb9b116e8ed9215085ab6ea646300a4bf4a13bde1eb701a9cdf84b6bcf070aa</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bn" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-bn-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">a5f2b362b678052b3ca1b365cf6004d079d535a80507db1ba053490cf0de23b8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-xsltfilter" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-xsltfilter-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">0fe54e5672632d6b95c7720f13f09497b5877ba3f04b5756a3adec5a03f161b0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gu" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-gu-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">863cd23dd02e29a4444dca83383cf231f6af4a47f74724cec5ceeae4860c8e77</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-af" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-af-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">c6150f3c2e630933bc3c95df1a077ec6a418c90f069605a622712f9e929c3eda</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-or" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-or-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">cbe55542cb0eadef5da3984b5b8f1f9663267c9c16d1a11d2cbc1e1f301f0f47</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ogltrans" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-ogltrans-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">805892c5e0d091d204d1132dd1e0fc9187cadebe253b0f379aaeedaf7049f168</sum></package><package arch="noarch" epoch="1" name="autocorr-ru" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-ru-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">dcb27dc4c33e640a775d91fc1c8ce9c445f3c412fd203b6a4360475d269baf48</sum></package><package arch="noarch" epoch="1" name="autocorr-mn" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-mn-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">14418d6e01b9ca7eb1b9f604f678526ff6fd0ba3ded2021608eb15175d413639</sum></package><package arch="x86_64" epoch="1" name="libreoffice-graphicfilter" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-graphicfilter-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">37659b1261e5457df692b0382979fc6a0a1ae0eb21e46f7eebebd165f5067b8e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hant" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-zh-Hant-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">d5dc00b2c22045de1bb7ec6454d9c2829fd459d4dec6ae84181725cb7c2adc3a</sum></package><package arch="noarch" epoch="1" name="autocorr-nl" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-nl-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">d9378ccacaff4a34e759926f0debde1263092be88fde81bdb5e5b40a3d56ed4e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hr" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-hr-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">b8c7a0b68cf2142333c5ee013f5db882e7a5988cabaa0ce6e9fc982680859ca7</sum></package><package arch="noarch" epoch="1" name="autocorr-ja" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-ja-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">7bb7dd123d468fb7f7e4a5780dbcc1d0f59fe0fc32db4f9862303ec7e1581769</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gdb-debug-support" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-gdb-debug-support-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">7796a79514d4d7cd3e7ba63d125fc08057c41db1908455c0c1843d065835672d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-si" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-si-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">eb3d774e9b15afed040a02a342ea8522c09ccb4b2e4756d27382e2574ea8cbd7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-as" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-as-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">417387c8f2b441048ecb09283cccea6ade572d2d4256558ee7b0a77d368e3a43</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pa" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-pa-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">a9595442260840cc75f9619c3ea941a9c0213d350beab125ead75d95d700aa58</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-eu" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-eu-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">55e01aafd584839cb2efe63078d38472ea0e3680468aa75053e36a07434e76a8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-he" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-he-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">c57086cf3cf67ebbf35df79a4304f34e6fe2fba87ac09be89e3534d17c9a9e10</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ss" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ss-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">e8083ac45296b39e791ce179fd5ec31ef75b9fcdc8776776ab0572128eb3e34e</sum></package><package arch="noarch" epoch="1" name="autocorr-de" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-de-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">34620c9e311fb99d2c2caa17b987387ef07464adac6b94807230ffdc2a835ebe</sum></package><package arch="noarch" epoch="1" name="autocorr-sl" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-sl-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">53b17a4ee5a8f45cddafd930e17b1a8fa4d36af277620894cd0ebac0c50d852e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ja" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ja-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">579314a88d0fd5d567120375d87ee0ee96b9b3d25455e743e7918def0a0160aa</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sv" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-sv-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">48ec996063284a43a8bf611b511e2c12c5a8d79279e1835d3d4235822c92dd37</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nr" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-nr-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">574ded4a0eae1af4afbee7f38bfc30965e8c6202db3fa49a3180cf9b3fefc8d9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-wiki-publisher" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-wiki-publisher-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">60fb8af5d4645c0fa2663a9449886fea479795a85dbdb5de9d94c764f551c566</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-PT" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-pt-PT-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">a058266da59bce31e72781bfe139c090f1ca34fa0c47d7510a660b1615271d66</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pdfimport" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-pdfimport-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">2e01cde9c5bc6a374e95abbeea8a87fe2baee1f17a7a687e21a568d44e28a838</sum></package><package arch="x86_64" epoch="1" name="libreoffice-base" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-base-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">c4892f71bfab1bf885041dc475a3593ac17b639f5a286b27f81fd0b85d5d338a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ta" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ta-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">51fe2890758c11d7945679c82c380ac7655a26554ff8c11fbeeb70e22997ad23</sum></package><package arch="x86_64" epoch="1" name="libreoffice-postgresql" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-postgresql-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">d1afe2fa0158f75e3765e6531462ae231a946d05abbb1b633c40875f3fcf1c73</sum></package><package arch="noarch" epoch="1" name="autocorr-ca" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-ca-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">5ee3878a73286a7c5cae88fe7d46f15a761752d3e5d2ae3dcdf89f207980532b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sl" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-sl-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">e693d8279b7b1e3695b45a9ee722a59d43860b05f1c0894ffe665fea6d708600</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zu" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-zu-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">59613fb71d9bb82f0646465ec701d011e67aad2db8e0ba2173e7d84dbbae2628</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tn" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-tn-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">f1e73c73bee6e62e9a9110aad8518d6d3551d0c7789a8dde78080ad0946b1a32</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-te" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-te-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">7b07d3526538562a1585a2281b13dbf363d54f565eb400951ead577fc39116dc</sum></package><package arch="noarch" epoch="1" name="autocorr-fi" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-fi-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">82c71ea43d50c936b274f1d8569b2dc575f0c4e74f158662e478278f79809a25</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-it" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-it-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">729be134abd7cc29a7154632ebc4c7e4f0065ad5e4dc56ec6dfef3f3253f5100</sum></package><package arch="noarch" epoch="1" name="autocorr-tr" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-tr-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">26b3845dc802c362ee5f5c738a80e7d8e829b8caec4586f15b1632dc5cbbdc79</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ru" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ru-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">b5a7200c7cf500b70a33889a94dd431cdf477e69e9eee1feb46060b041981b11</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-st" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-st-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">de29586e731e7d7cff582ea32d4ad416e41e1dc618211863d970246817d3ed61</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-br" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-br-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">c0915005ce2f00b9aac54e2fa67765bc47b9d4db49280fd53119c04b8cd469ac</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fr" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-fr-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">2a14c567d61ca537c26df2ceadd20fcb7660975f701155538047710cc9153b5b</sum></package><package arch="noarch" epoch="1" name="autocorr-es" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-es-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">5734b99ec6d93ce9b29a297e5d43faddc64cea11ccb6388919f25ada3247740c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-uk" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-uk-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">f668fe6a1d14e9bb507cb082b2b4738dbef5fa804d8a82b5d357b6ad56f94e57</sum></package><package arch="x86_64" epoch="1" name="libreoffice" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">7522738d3a8c600c55decee1b7c8da046bfed52409b06f424b51237a7a1cce81</sum></package><package arch="noarch" epoch="1" name="autocorr-da" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-da-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">b85bc87bb185da41338baefe0b918a297d4688110061b1954ba648b3807a6796</sum></package><package arch="x86_64" epoch="1" name="libreoffice-nlpsolver" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-nlpsolver-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">f628cdbeb398eea6d4da8ac74e66e5f19f8774f4970bdc7d2f9dca49b15904cb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-librelogo" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-librelogo-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">3716885462eedbbe75c670e9e351f7698f128adf35504763520c9f1d32f0c2e4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-headless" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-headless-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">ff0f7c636a536313ff273dce0fdae2c7e573382f002c47c83146a2a70fedeb07</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lt" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-lt-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">beeb90d6600adb5dda47a8faa1b79ddd54d76a1dbb662ea9120794d60aa4760b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-et" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-et-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">2d81021277b37c74dbfd8570bc9cbe1bec2aad0458d41d2364907d7a16eea071</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gl" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-gl-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">10cc26de3aa1574c1cfbc06c98198834a609ae4f007a17daaef3f0379030ce60</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mai" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-mai-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">8ba638b39048e4b744f150f4ee25408d5f40b6f9e76e466b9c2fdf96a437e861</sum></package><package arch="noarch" epoch="1" name="autocorr-bg" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-bg-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">ae5af088ec01746c0e77c36c693292914cbdea1c6a2d888e95a934df36603fd6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ca" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ca-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">1782ba0f551871880ec4530ca5be85d92c07d5f15d1d5d13eb45fbe6cc82c65c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-calc" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-calc-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">6d608fb82638fc35edaaeb957e7ef016b5c5442d3355ef3239e878681d37e340</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hi" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-hi-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">d872d34a3d20a96ea5e74c54272ecc18d223c2183bc9ffc8a6a6db2e2248932b</sum></package><package arch="noarch" epoch="1" name="autocorr-sv" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-sv-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">dcd4a97e48dd68335e79eed7327b601011dc8039046c3d38f262facaec65c25d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-rhino" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-rhino-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">86d60d057588cf42c000e850feafc338ba8957af259b9c52811532e30fbd7da9</sum></package><package arch="noarch" epoch="1" name="autocorr-sk" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-sk-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">6409e9c13968f692e2da57f2e514ce262fbb229d0fcebe8fca1436f3404346fe</sum></package><package arch="noarch" epoch="1" name="autocorr-vi" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-vi-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">9389c0686a6ec5f65266b8b18dd88aa2e68156dc555571b5072a27aba8644047</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ts" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ts-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">bc85f37d12489750fc5e9ecdb4ad36cd58860d2916450d22b209822c375c336d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-es" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-es-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">b9f2cfdcbad304064693bfa4a2d052fbb0f237b5851da11f3c12020732e36eaf</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cy" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-cy-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">4c58ffb8d6ec4ecd8529a12d760080c6ac49685a29e422083036cb9c0d9d6677</sum></package><package arch="noarch" epoch="1" name="autocorr-it" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-it-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">3ed94dc613a355cb73b9b9d8dfd3f11efb357ef59a637c888fa453888df988db</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ar" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ar-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">ec54ab43590bd0578066cdd332371523383e6d303c15749d2ab3cfd9f1cb8ed7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nso" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-nso-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">938c072c0755139ec2087924f9dcbbec47eef04fc005317c3d95641c0cadd179</sum></package><package arch="noarch" epoch="1" name="autocorr-is" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-is-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">3fdbfc5d1ff16bcf3bf412f9bcc27ab29dd86a2d84eea118284ac6e917159ae9</sum></package><package arch="noarch" epoch="1" name="libreoffice-opensymbol-fonts" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-opensymbol-fonts-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">e2ab2bf5e7c335c6b246e36e5e42217885f46f27efb7f274b9b7a1162e38647a</sum></package><package arch="noarch" epoch="1" name="autocorr-ko" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-ko-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">bd51d228ae0b7aa7b2c19718aa1475bfbbd7d75d279b27e0147e424fcf4afc0a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kn" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-kn-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">0258103c157577a322fac7c2f4994d033f6621695c884884e301bb8990483f91</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pl" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-pl-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">eb58a9ecfcca0c31c85430e808a63682afb663dedfc213a5a8e1199fbfebcab0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-draw" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-draw-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">d4be327649bf479f7a819a8e137f1d60d475f61907e3aca2858fb7dc320b31ac</sum></package><package arch="x86_64" epoch="1" name="libreoffice-impress" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-impress-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">cc5c3bb4f3662326844e651bcbcb020692524882d62f3f5cd1a6950bbe645331</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tr" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-tr-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">5b2a6b9ff1d4601ebe9eec9474e8a2e11dd3500622fa1a5701b3a995c7247a23</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hu" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-hu-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">a1ead4b2b5f077c7fb2519c73a0d20503bad399240954980d573d50d9e6c6f0e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nn" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-nn-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">3f84ff5d40bacb5da624b94445b8f2d56d23633b4ac752a27f281e4bdd41f68f</sum></package><package arch="noarch" epoch="1" name="autocorr-cs" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-cs-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">bc0d8faef7c3a01884e0ac5d4e19f04cdf9a96ad5ba263c5007cad7e47d0afed</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sk" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-sk-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">e5a93894f8f537f0d02fb1e90c8e003cc68a19104e8b88e18ba4d505d140c876</sum></package><package arch="x86_64" epoch="1" name="libreoffice-emailmerge" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-emailmerge-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">e2745e7a7d7b85705f6d85f9189fe3709a7a59f7972cf4a1f0659f9045e31c07</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pyuno" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-pyuno-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">e9cfd980797a790f466d3ef4f0ceb5db04b3a4cbdef0fda7269948ee568d12f1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lv" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-lv-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">71966b1f8257eb2b0c039ad92f521e3e80bf9131ced5c1ef70b71a0abeef8428</sum></package><package arch="noarch" epoch="1" name="autocorr-lt" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-lt-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">44a5a6f97812519d4339ab79a36d9d43e2fc41975ebc29d39a24d5c50c9115ba</sum></package><package arch="x86_64" epoch="1" name="libreoffice-writer" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-writer-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">e22a363effda7bb221f7ea7c051654a8a3fcb70edb0c592e19e96819a4f7f9c4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fa" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-fa-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">b4e7ca9a8f430063e8c4b031a268e2422f9e594166f3ec5ade4986010be3614b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-math" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-math-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">03e20187e01733b0340bcbeebf3d6789889cfea9cf553e1af3e0653461525baa</sum></package><package arch="noarch" epoch="1" name="autocorr-sr" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-sr-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">120ecae787793f9f253130d77a32e5bf9e3463797f10683d477572ed599131c1</sum></package><package arch="noarch" epoch="1" name="autocorr-fr" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-fr-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">e6c90f4f8d1d7c4743c8ae014bd7599a58f5474ca7ef4bf823686ad4d303afc7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-en" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-en-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">774bd8a05a82ff369b482dd83fe4488add9ff7c9693f0f92943495526c89f733</sum></package><package arch="x86_64" epoch="1" name="libreoffice-officebean" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-officebean-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">624970dc93b004d8b379d9b4ca4d28e030845ed52d0e8414ddacd64f3138666a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-da" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-da-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">1da5df3473fe6d6dfdb7399aec2615d3a6cbcd7b984b4bcd74062b964e353f1a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cs" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-cs-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">6b181dfe35f8ebfdc3da3787b0ab8838efadac6434379594b587a1e4278c7b25</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-de" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-de-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">96ed361f5914d7b57c8bc6c152b8c429d0d5d10ca8ff71872dd05dd823b94eee</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sr" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-sr-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">300b50db6f10b70b31d211172348231c418f3c664e4782d08abe644fd0a41231</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hans" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-zh-Hans-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">da1687a83fa1cee6d728876a413971bc09024032611e993155298428c15a5334</sum></package><package arch="noarch" epoch="1" name="autocorr-pt" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-pt-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">4a4042e1264f2724d15d9f8fd48b61db6f0fa459572414552a7ff3c61e9246c9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kk" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-kk-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">c5d40b860e999690217afe6782e6aeb13b90ea7bdd338c09e522652e44499d14</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mr" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-mr-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">ea499661825f8031e4709ac43a12c5db650da15ecb94db780087378d16083d15</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ko" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ko-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">59c29adcf44b68422b7beb1757aa528b235e811d7a093fcf35f40995c71571fc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-glade" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-glade-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">374663b34f6355f6777ff0fb22927904567bb56a1c2e084414883192085b7e30</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ml" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ml-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">00268b566ab11076c8ddaac8394b8c109f29d8cdaa3dee56ba50f7b1ca6841c7</sum></package><package arch="noarch" epoch="1" name="autocorr-hr" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-hr-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">5ce0e60d4839e1475ea10c0b86e0cf56cbe87a47a3aac506fe3a88223e066341</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-dz" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-dz-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">80ce801158ffcf050ae852894f1b382d28942441def0410acb02e4deae318254</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-sdk-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">ace861b89b0a258fd5a7d1cf335f6ac7fc931b426f0b400472064bd0bc4c5f76</sum></package><package arch="noarch" epoch="1" name="autocorr-hu" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-hu-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">c45fda769db8cc0a2621d26472b38451a751fcc93b05345e097b937150c0cbc0</sum></package><package arch="noarch" epoch="1" name="autocorr-lb" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-lb-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">ee2470ab890296857d9d9f18696aad1ad9e9944a297ced25059ba020867c47df</sum></package><package arch="noarch" epoch="1" name="autocorr-ro" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-ro-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">429a1bc932950323a89975ee06612b5d4865efe719684df7f41f95df4cd805d6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bg" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-bg-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">bb8b4bd4471916b65242bc80075231674e6a2e136a725874818d88f734ffd278</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-BR" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-pt-BR-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">3870de7eac8b09a3d439d37ff7a09433440a088bcae17078559e1e8670e13923</sum></package><package arch="i686" epoch="1" name="libreoffice-ure" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-ure-4.3.7.2-5.el7_2.1.i686.rpm</filename><sum type="sha256">11ef77beecdaf47e52c1bab2e56ad082c31a9138459fbfa27842c095787f8d84</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ure" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-ure-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">c30e00fa300f285c37ba1acd11b0927a02885749f42b4739684d8c191e1c36f9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ro" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ro-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">12fe2e310ab7fa0cb63c957cfb3007d2484a0876575ea201f0ffe1a5e1bda926</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-el" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-el-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">6d3008de48bae76ed12be18c45fa1ee189071849d50aa41bdedb60163d57ef79</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-th" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-th-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">cbc626340c5372266d86ddc3ca3f1f01f4856862a1fdabd7d54f6c75326030dd</sum></package><package arch="noarch" epoch="1" name="autocorr-pl" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-pl-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">268be9f1e831babbd3bdfea93833b6cc4dbc92c8f9683734b157e954a8aeebb4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-xh" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-xh-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">02285d7ab9cbeb467fee31835ab3f26cf39539d7c2ed234b84c27408f2e4f0c8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fi" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-fi-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">a8ac4a5b2adad3322600aecdda36303d95d14779084bc4966be2d2d65a41f19f</sum></package><package arch="noarch" epoch="1" name="autocorr-fa" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-fa-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">969c33d623ee85ac19d744699814666f6db051e122f6fc56550bee1c3888bed3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ve" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-ve-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">a5257e49a6254fef534299bab768ce61e2649b640b069add31eafc49922e411c</sum></package><package arch="noarch" epoch="1" name="autocorr-zh" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-zh-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">12bc5f0b732da6fbe1d88b6caa3dbd9ced404ad1eddb0f117ef8c305b5da92fa</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nl" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-langpack-nl-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">c2504cedb74a3f00bede2f2b73b2d647e53d5e7ed038706dd3446251aa1ed1e1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-filters" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-filters-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">7cbcaeaa7cdcc8701b0874f4c1b78fb9d625a5ac1ae1c39bd87084e3a2838f5e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk-doc" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-sdk-doc-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">4b0723b4a5ef25a8780ff263c767a9b6e00a51dd29748ee8276dae8b94dbd9f7</sum></package><package arch="noarch" epoch="1" name="autocorr-ga" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-ga-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">2571324cd277b743383d20e2df4e2be77b272159152c162e6f8625c3959f9863</sum></package><package arch="noarch" epoch="1" name="autocorr-en" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>autocorr-en-4.3.7.2-5.el7_2.1.noarch.rpm</filename><sum type="sha256">195477f407896c758ec0ca7f10494a0867776dc01baa4da1154d57ab97becd6c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-bsh" release="5.el7_2.1" src="libreoffice-4.3.7.2-5.el7_2.1.src.rpm" version="4.3.7.2"><filename>libreoffice-bsh-4.3.7.2-5.el7_2.1.x86_64.rpm</filename><sum type="sha256">f0a677a8fe60b9a15004fa8aa285a2806338f01b3a08bd522f0cccfc75234985</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4551" id="CVE-2015-4551" title="Libreoffice: Arbitrary File Disclosure In Calc And Writer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5212" id="CVE-2015-5212" title="Libreoffice: Integer Underflow In Printersetup Length" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5213" id="CVE-2015-5213" title="Libreoffice: Integer Overflow In Doc Files" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5214" id="CVE-2015-5214" title="Libreoffice: Bookmarks In Doc Documents Are Insufficiently Checked Causing Memory Corruption" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2619" id="RHSA-2015:2619-1" title="Rhsa-2015:2619-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278812" id="1278812" title="Libreoffice: Arbitrary File Disclosure In Calc And Writer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278820" id="1278820" title="Libreoffice: Integer Underflow In Printersetup Length" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278824" id="1278824" title="Libreoffice: Integer Overflow In Doc Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278827" id="1278827" title="Libreoffice: Bookmarks In Doc Documents Are Insufficiently Checked Causing Memory Corruption" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2623-1</id><title>Grub2</title><description>A flaw was found in the way the grub2 handled backspace characters entered in username and password prompts. An attacker with access to the system console could use this flaw to bypass grub2 password protection and gain administrative access to the system. (CVE-2015-8370) 
This update also fixes the following bug: 
* When upgrading from Scientific Linux 7.1 and earlier, a configured boot password was not correctly migrated to the newly introduced user.cfg configuration files. This could possibly prevent system administrators from changing grub2 configuration during system boot even if they provided the correct password. This update corrects the password migration script and the incorrectly generated user.cfg file.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2015-12-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="grub2-efi" release="0.33.el7_2" src="grub2-2.02-0.33.el7_2.src.rpm" version="2.02"><filename>grub2-efi-2.02-0.33.el7_2.x86_64.rpm</filename><sum type="sha256">beee71fcfa70c7ff61e90fe454bd697e8ce4c9fcaca3dd4ec5612f7d9494714b</sum></package><package arch="x86_64" epoch="1" name="grub2" release="0.33.el7_2" src="grub2-2.02-0.33.el7_2.src.rpm" version="2.02"><filename>grub2-2.02-0.33.el7_2.x86_64.rpm</filename><sum type="sha256">9265570fbff6887e71fe31bb40f254753a5fcb32c01b98a76c3d637b632dc379</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-modules" release="0.33.el7_2" src="grub2-2.02-0.33.el7_2.src.rpm" version="2.02"><filename>grub2-efi-modules-2.02-0.33.el7_2.x86_64.rpm</filename><sum type="sha256">28b34494ef1e485e8ffc85922e8d0d3b59654e0a272e7dde70fccd106abe8656</sum></package><package arch="x86_64" epoch="1" name="grub2-tools" release="0.33.el7_2" src="grub2-2.02-0.33.el7_2.src.rpm" version="2.02"><filename>grub2-tools-2.02-0.33.el7_2.x86_64.rpm</filename><sum type="sha256">83263e68bd682fc0f6fe7b15395ee20b33a4d0af866ce190b4c1307233c9ff08</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8370" id="CVE-2015-8370" title="Grub2: Buffer Overflow When Checking Password Entered During Bootup" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2623" id="RHSA-2015:2623-1" title="Rhsa-2015:2623-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1286966" id="1286966" title="Grub2: Buffer Overflow When Checking Password Entered During Bootup" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290089" id="1290089" title="Grub Password Broken By Update From Rhel7.1 To Rhel7.2" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2655-1</id><title>Bind</title><description>A denial of service flaw was found in the way BIND processed certain records with malformed class attributes. A remote attacker could use this flaw to send a query to request a cached record with a malformed class attribute that would cause named functioning as an authoritative or recursive server to crash. (CVE-2015-8000) 
Note: This issue affects authoritative servers as well as recursive servers, however authoritative servers are at limited risk if they perform authentication when making recursive queries to resolve addresses for servers listed in NS RRSETs. 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux</release><issued date="2015-12-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-9.9.4-29.el7_2.1.x86_64.rpm</filename><sum type="sha256">83e1df8675531d3a696a9c172f6f46cf76bb675c823787426169454ba15919fb</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-29.el7_2.1.x86_64.rpm</filename><sum type="sha256">353c9c0beecaa2532ad9f8ff1dddbbdd49aae6bf342a3eeb3e8cb7faa0cc5e33</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-29.el7_2.1.i686.rpm</filename><sum type="sha256">741cedb7892ac9f0d39dd499e59337a3f06ced70085bd303dc281e3dcc81f07d</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-29.el7_2.1.x86_64.rpm</filename><sum type="sha256">7e831ef649afeedba9806e9da4ee39469b0748cd5fe0be0fdeace47bed983d47</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-sdb-chroot-9.9.4-29.el7_2.1.x86_64.rpm</filename><sum type="sha256">9cf8c3059ddb102139af0022bb7f6dcc2a8cb2177340f9bfe4387ad27b9a7ec6</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-29.el7_2.1.i686.rpm</filename><sum type="sha256">bcb5f3fa4c984ed3f7e4ffa0d6503aff7d89f37ea20a78f9e28a6362b16f114c</sum></package><package arch="noarch" epoch="32" name="bind-license" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-license-9.9.4-29.el7_2.1.noarch.rpm</filename><sum type="sha256">abd419e398e3751fc013662d47d1c21788fc3e5211f1411aaf7c73c0c4be30bc</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-sdb-9.9.4-29.el7_2.1.x86_64.rpm</filename><sum type="sha256">a3e3a0d409395e94612b1176fe867c85788c497d676a3b306eeed670137957a6</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-9.9.4-29.el7_2.1.x86_64.rpm</filename><sum type="sha256">839bfed39ec4267f54a8718074cbce65edb701705a70db447f74132e962ece27</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-29.el7_2.1.x86_64.rpm</filename><sum type="sha256">0d548138f5595335dfd6a4f6142208d8eb9fdd5e006aab98eb6bb54092485a22</sum></package><package arch="i686" epoch="32" name="bind-devel" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-29.el7_2.1.i686.rpm</filename><sum type="sha256">17bd6b815a1886bb618b0de342c07fc97ba33344b255130faef412adc7b7dac7</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-29.el7_2.1.x86_64.rpm</filename><sum type="sha256">09e3c1156d684fef7282168ae0c98f777c237a4db4afe63394bebb2e6d109818</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-chroot-9.9.4-29.el7_2.1.x86_64.rpm</filename><sum type="sha256">e9ab38b4f3767cf4c42f89ceb0b64b8fc15d4a0a041b474e80a18dc96396cab6</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-29.el7_2.1.i686.rpm</filename><sum type="sha256">f8d82b88165de829190c7409b7d14ee0fccba3284b13e1ca70792df4beec35f0</sum></package><package arch="i686" epoch="32" name="bind-libs" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-29.el7_2.1.i686.rpm</filename><sum type="sha256">317ec3d968b2f1d7fe87eb3efdda66bd1f518be7bf8daee7c5aef497c853e672</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-29.el7_2.1.x86_64.rpm</filename><sum type="sha256">f146d941eeea97af23d7e33c4bf53c574f6c05faba72bb48dcfbc6d15df9da81</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-29.el7_2.1.x86_64.rpm</filename><sum type="sha256">6392ea3ab777455c031699fe740da8e9fa6794b13b7e2caecebb3ed01adbfbd7</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-utils-9.9.4-29.el7_2.1.x86_64.rpm</filename><sum type="sha256">9b6b1b4a70a681fac23e0bc5992faaa1e683936dd99f3216504102afba539d5d</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-29.el7_2.1.i686.rpm</filename><sum type="sha256">320c0628d3f3870d9dccdac7e9133062003e3e9ae5e672f2f84d3930d9f8607f</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="29.el7_2.1" src="bind-9.9.4-29.el7_2.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-utils-9.9.4-29.el7_2.1.x86_64.rpm</filename><sum type="sha256">3f8a096276dc20f46c9ff6a34b16d2f6ceaa2891f87e60f6d3c590e8d67f5c07</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8000" id="CVE-2015-8000" title="Bind: Responses With A Malformed Class Attribute Can Trigger An Assertion Failure In Db.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2655" id="RHSA-2015:2655-1" title="Rhsa-2015:2655-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291176" id="1291176" title="Bind: Responses With A Malformed Class Attribute Can Trigger An Assertion Failure In Db.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2015:2657-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2015-7201, CVE-2015-7205, CVE-2015-7210, CVE-2015-7212, CVE-2015-7213, CVE-2015-7222) 
A flaw was found in the way Firefox handled content using the 'data:' and 'view-source:' URIs. An attacker could use this flaw to bypass the same- origin policy and read data from cross-site URLs and local files. (CVE-2015-7214) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux</release><issued date="2015-12-17 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="3.el7_2" src="firefox-38.5.0-3.el7_2.src.rpm" version="38.5.0"><filename>firefox-38.5.0-3.el7_2.x86_64.rpm</filename><sum type="sha256">e4acda5b46474cca340995fa06f7fb3ad2b72f148da19671fd74e81da32ebe95</sum></package><package arch="i686" name="firefox" release="3.el7_2" src="firefox-38.5.0-3.el7_2.src.rpm" version="38.5.0"><filename>firefox-38.5.0-3.el7_2.i686.rpm</filename><sum type="sha256">0fd0d737bbe85743dfcf62880ef2b9ff41dca475246a401612a152a6f74b8009</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" id="CVE-2015-7201" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.5) (Mfsa 2015-134)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" id="CVE-2015-7205" title="Mozilla: Underflow Through Code Inspection (Mfsa 2015-145)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7210" id="CVE-2015-7210" title="Mozilla: Use-After-Free In Webrtc When Datachannel Is Used After Being Destroyed (Mfsa 2015-138)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" id="CVE-2015-7212" title="Mozilla: Integer Overflow Allocating Extremely Large Textures (Mfsa 2015-139)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" id="CVE-2015-7213" title="Mozilla: Integer Overflow In Mp4 Playback In 64-Bit Versions (Mfsa 2015-146)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" id="CVE-2015-7214" title="Mozilla: Cross-Site Reading Attack Through Data: And View-Source: Uris (Mfsa 2015-149)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7222" id="CVE-2015-7222" title="Mozilla: Integer Underflow And Buffer Overflow Processing Mp4 Metadata In Libstagefright (Mfsa 2015-147)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2015:2657" id="RHSA-2015:2657-1" title="Rhsa-2015:2657-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291571" id="1291571" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.5) (Mfsa 2015-134)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291585" id="1291585" title="Mozilla: Use-After-Free In Webrtc When Datachannel Is Used After Being Destroyed (Mfsa 2015-138)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291587" id="1291587" title="Mozilla: Integer Overflow Allocating Extremely Large Textures (Mfsa 2015-139)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291595" id="1291595" title="Mozilla: Underflow Through Code Inspection (Mfsa 2015-145)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291596" id="1291596" title="Mozilla: Integer Overflow In Mp4 Playback In 64-Bit Versions (Mfsa 2015-146)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291597" id="1291597" title="Mozilla: Integer Underflow And Buffer Overflow Processing Mp4 Metadata In Libstagefright (Mfsa 2015-147)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291600" id="1291600" title="Mozilla: Cross-Site Reading Attack Through Data: And View-Source: Uris (Mfsa 2015-149)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0001-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2015-7201, CVE-2015-7205, CVE-2015-7212, CVE-2015-7213) 
A flaw was found in the way Thunderbird handled content using the 'data:' and 'view-source:' URIs. An attacker could use this flaw to bypass the same-origin policy and read data from cross-site URLs and local files. (CVE-2015-7214) 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-01-06 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_2" src="thunderbird-38.5.0-1.el7_2.src.rpm" version="38.5.0"><filename>thunderbird-38.5.0-1.el7_2.x86_64.rpm</filename><sum type="sha256">43678d047aa14b6255443159a5c78ba5ff640abcde7a8f947842e44ed514df61</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7201" id="CVE-2015-7201" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.5) (Mfsa 2015-134)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7205" id="CVE-2015-7205" title="Mozilla: Underflow Through Code Inspection (Mfsa 2015-145)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7212" id="CVE-2015-7212" title="Mozilla: Integer Overflow Allocating Extremely Large Textures (Mfsa 2015-139)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7213" id="CVE-2015-7213" title="Mozilla: Integer Overflow In Mp4 Playback In 64-Bit Versions (Mfsa 2015-146)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7214" id="CVE-2015-7214" title="Mozilla: Cross-Site Reading Attack Through Data: And View-Source: Uris (Mfsa 2015-149)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0001" id="RHSA-2016:0001-1" title="Rhsa-2016:0001-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291571" id="1291571" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.5) (Mfsa 2015-134)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291587" id="1291587" title="Mozilla: Integer Overflow Allocating Extremely Large Textures (Mfsa 2015-139)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291595" id="1291595" title="Mozilla: Underflow Through Code Inspection (Mfsa 2015-145)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291596" id="1291596" title="Mozilla: Integer Overflow In Mp4 Playback In 64-Bit Versions (Mfsa 2015-146)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291600" id="1291600" title="Mozilla: Cross-Site Reading Attack Through Data: And View-Source: Uris (Mfsa 2015-149)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0005-1</id><title>Rpcbind</title><description>A use-after-free flaw related to the PMAP_CALLIT operation and TCP/UDP connections was discovered in rpcbind. A remote attacker could possibly exploit this flaw to crash the rpcbind service by performing a series of UDP and TCP calls. (CVE-2015-7236) 
If the rpcbind service is running, it will be automatically restarted after installing this update.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-01-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="rpcbind" release="33.el7_2" src="rpcbind-0.2.0-33.el7_2.src.rpm" version="0.2.0"><filename>rpcbind-0.2.0-33.el7_2.x86_64.rpm</filename><sum type="sha256">5fe525d47c4428c13f576153374718bc86f5c328a349d564e9b7de21832022fc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7236" id="CVE-2015-7236" title="Rpcbind: Use-After-Free Vulnerability In Pmap_Callit" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0005" id="RHSA-2016:0005-1" title="Rhsa-2016:0005-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1264345" id="1264345" title="Rpcbind: Use-After-Free Vulnerability In Pmap_Callit" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0006-1</id><title>Samba</title><description>A denial of service flaw was found in the LDAP server provided by the AD DC in the Samba process daemon. A remote attacker could exploit this flaw by sending a specially crafted packet, which could cause the server to consume an excessive amount of memory and crash. (CVE-2015-7540) 
Multiple buffer over-read flaws were found in the way Samba handled malformed inputs in certain encodings. An authenticated, remote attacker could possibly use these flaws to disclose portions of the server memory. (CVE-2015-5330) 
A man-in-the-middle vulnerability was found in the way "connection signing" was implemented by Samba. A remote attacker could use this flaw to downgrade an existing Samba client connection and force the use of plain text. (CVE-2015-5296) 
A missing access control flaw was found in Samba. A remote, authenticated attacker could use this flaw to view the current snapshot on a Samba share, despite not having DIRECTORY_LIST access rights. (CVE-2015-5299) 
An access flaw was found in the way Samba verified symbolic links when creating new files on a Samba share. A remote attacker could exploit this flaw to gain access to files outside of Samba's share path. (CVE-2015-5252) 
After installing this update, the smb service will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-01-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="samba-test-libs" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-test-libs-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">03bc5ce3b14ad80bbab8c98799a3358464e6891cd2c56be2254f78e797235458</sum></package><package arch="x86_64" name="samba-winbind-clients" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-winbind-clients-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">55db415fc49ad5c6a4db5d2b6ac39826ff7f6a590f4a459c2eb8e2f0101cfc6f</sum></package><package arch="x86_64" name="samba-devel" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-devel-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">a06d3acc2d8ab96a211bd444f264de32c0b5a4f666338c9f7fbd95b1c7e45f92</sum></package><package arch="x86_64" name="samba-test-devel" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-test-devel-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">71e6e088fdad659bbe3302ae86078be537b8f537ac8c23415ad70bca639f0558</sum></package><package arch="i686" name="samba-winbind-modules" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-winbind-modules-4.2.3-11.el7_2.i686.rpm</filename><sum type="sha256">399ae5100e75d10c43d2ef2bd4a3c1de055722537a9a30d342f603523e5c6557</sum></package><package arch="x86_64" name="samba-test" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-test-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">e92dd34b11099f484932ee6354e98e1d7fb0faa1ed342857a12fdcaa78a5f99c</sum></package><package arch="x86_64" name="libsmbclient" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>libsmbclient-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">baa436bcca187f0a604b6bc9d32415203e19d1de1331f91ae1d3ae19cdcd89c9</sum></package><package arch="i686" name="libwbclient" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>libwbclient-4.2.3-11.el7_2.i686.rpm</filename><sum type="sha256">3da64e426560a302c7623034d794ea73493fdc042da8d41f57a915966986ec27</sum></package><package arch="x86_64" name="samba" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">71ee201b2c98913d454036639816e192c2154bb4624c6150f35893a4eec4cfaa</sum></package><package arch="i686" name="libsmbclient" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>libsmbclient-4.2.3-11.el7_2.i686.rpm</filename><sum type="sha256">945ae5e34c020c6e167d4ae35dd672acd8b56e078024ed73607038e5f12a9a21</sum></package><package arch="i686" name="samba-libs" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-libs-4.2.3-11.el7_2.i686.rpm</filename><sum type="sha256">2357772e01476bbeb2b6e0bf77cb9c4442daa17f1b54711fbf8011374a7f3d05</sum></package><package arch="x86_64" name="samba-dc-libs" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-dc-libs-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">ab6b79a3f045baf3b4016520f2fb5499647b84272c5fabfaa4d6d6098bddc8a4</sum></package><package arch="x86_64" name="samba-client-libs" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-client-libs-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">013c2342986affab9ffc0d7f232173e5720e2cbefd60e2993c4f49f22b36e4f7</sum></package><package arch="x86_64" name="samba-winbind-modules" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-winbind-modules-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">6a263cd104c0f865ce5b5bc9c36f8d76d688c59c9b5e85d6ff3fcbe9b3af7ecf</sum></package><package arch="i686" name="samba-client-libs" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-client-libs-4.2.3-11.el7_2.i686.rpm</filename><sum type="sha256">2a0039669b84c4aa34f6bee9fa110bf3d721ad62eaf689067109ec9f9793d461</sum></package><package arch="i686" name="ctdb-devel" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>ctdb-devel-4.2.3-11.el7_2.i686.rpm</filename><sum type="sha256">ffbad5b2495d697da2da3ebf32e5b06ee87a1220b20406d0faec52073468935b</sum></package><package arch="x86_64" name="ctdb" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>ctdb-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">d8ee21c4d30dd570a5b9a5519fc13cf37eda5b7a6412008d1730ffd9ba0aa960</sum></package><package arch="i686" name="samba-test-libs" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-test-libs-4.2.3-11.el7_2.i686.rpm</filename><sum type="sha256">71f2289ed5f575a1eea50c018208e2070d58a9dd952484643199e6badb18fa32</sum></package><package arch="x86_64" name="samba-common-tools" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-common-tools-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">a7fbab90a5886095225e6abd5556e32fccca00af09abbfd1fed9a9dbd6ef697b</sum></package><package arch="x86_64" name="ctdb-devel" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>ctdb-devel-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">6cf15eead667a2ee0703968a7e83c8d8a781e842f35fa9515a15c4e7ab2c2d23</sum></package><package arch="x86_64" name="libwbclient-devel" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>libwbclient-devel-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">64a68b86abe7feb80161fa8764c8f4a3882d82d73eed96ab5daa743c1687bbfc</sum></package><package arch="x86_64" name="samba-client" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-client-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">ade56132973d1a15578151191374990cc1ec34c6922420d7c111e9e89da8ef34</sum></package><package arch="x86_64" name="libwbclient" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>libwbclient-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">a4c7f1fa6a8d1eca9f229d65852893beab5de7753fab55f33f6d87ee9db9b699</sum></package><package arch="noarch" name="samba-common" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-common-4.2.3-11.el7_2.noarch.rpm</filename><sum type="sha256">8a1888091133b575b3da4398884264fd792aed4c4626d1dbd25331dde6be545a</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-winbind-krb5-locator-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">9b29df36998199947781ba520f69fde3814e7982371598c34bf9cf2645edff9c</sum></package><package arch="x86_64" name="ctdb-tests" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>ctdb-tests-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">9d89094b9230fa734f1266f53a66265a149b5e1bdc026fdaa77264f4916d1c2a</sum></package><package arch="noarch" name="samba-pidl" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-pidl-4.2.3-11.el7_2.noarch.rpm</filename><sum type="sha256">1c20aa8ef16cf7246e539618fc2bb08fc09a8bb5db52a18cead6f879d949696f</sum></package><package arch="i686" name="libwbclient-devel" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>libwbclient-devel-4.2.3-11.el7_2.i686.rpm</filename><sum type="sha256">776e9f1e9444762e0cabf1d6bc0215eb1b5163c2dafe332b8a815de6b801d000</sum></package><package arch="x86_64" name="libsmbclient-devel" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>libsmbclient-devel-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">22d6e614f17cf9429fbeb0500c497acabec751b369509937c8a1413224da32f8</sum></package><package arch="i686" name="libsmbclient-devel" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>libsmbclient-devel-4.2.3-11.el7_2.i686.rpm</filename><sum type="sha256">2873c3383bcc382b65f5a4dbd470e96e433ea522d69a3a432606ce34e238f33a</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-vfs-glusterfs-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">8fc97cdbe3c0e8c8bb39b6cbd10531cb80ce650c2a1a37a083c8a7e17c00c4a3</sum></package><package arch="x86_64" name="samba-dc" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-dc-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">ce960b11e34ff9f11edbbb56275b501f29cb387666bb940c21db01bdd11d14c9</sum></package><package arch="x86_64" name="samba-libs" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-libs-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">a58e6ba629e2b816b7fb07ef7d2c08bea476618562a48e14a35be59ab2bca78d</sum></package><package arch="i686" name="samba-devel" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-devel-4.2.3-11.el7_2.i686.rpm</filename><sum type="sha256">e001b21bdee801dca563d2b904da401f5cb1f74835c394ac693ff566e6d3f699</sum></package><package arch="x86_64" name="samba-winbind" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-winbind-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">5bc62eceb86772a6e3ccc452839d6644cb634f6c8f53946294f15634bc05acd0</sum></package><package arch="x86_64" name="samba-python" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-python-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">9d739a67522bf070452041b264e8c36157f09cf7ce9e6608f98274e371085d76</sum></package><package arch="x86_64" name="samba-common-libs" release="11.el7_2" src="samba-4.2.3-11.el7_2.src.rpm" version="4.2.3"><filename>samba-common-libs-4.2.3-11.el7_2.x86_64.rpm</filename><sum type="sha256">670bff2c346f8fab4f601f5ba32f28a42f7451e2763d1f56ca8a294bf22464da</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5252" id="CVE-2015-5252" title="Samba: Insufficient Symlink Verification In Smbd" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5296" id="CVE-2015-5296" title="Samba: Client Requesting Encryption Vulnerable To Downgrade Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5299" id="CVE-2015-5299" title="Samba: Missing Access Control Check In Shadow Copy Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330" id="CVE-2015-5330" title="Samba, Libldb: Remote Memory Read In The Samba Ldap Server" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7540" id="CVE-2015-7540" title="Samba: Dos To Ad-Dc Due To Insufficient Checking Of Asn1 Memory Allocation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0006" id="RHSA-2016:0006-1" title="Rhsa-2016:0006-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1276126" id="1276126" title="Samba: Missing Access Control Check In Shadow Copy Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281326" id="1281326" title="Samba, Libldb: Remote Memory Read In The Samba Ldap Server" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1288451" id="1288451" title="Samba: Dos To Ad-Dc Due To Insufficient Checking Of Asn1 Memory Allocation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290288" id="1290288" title="Samba: Insufficient Symlink Verification In Smbd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290292" id="1290292" title="Samba: Client Requesting Encryption Vulnerable To Downgrade Attack" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0007-1</id><title>Nss</title><description>A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) 
For the update to take effect, all services linked to the NSS library must be restarted, or the system rebooted.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-01-08 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-sysinit" release="19.el7_2" src="nss-3.19.1-19.el7_2.src.rpm" version="3.19.1"><filename>nss-sysinit-3.19.1-19.el7_2.x86_64.rpm</filename><sum type="sha256">2ca13ee6eb2206717c95c83d1df76817853111455743eb73678378e93772b83d</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="19.el7_2" src="nss-3.19.1-19.el7_2.src.rpm" version="3.19.1"><filename>nss-pkcs11-devel-3.19.1-19.el7_2.x86_64.rpm</filename><sum type="sha256">97b69381d8ad5dc7a8662a27907a9035847030d7bbe431beca48c45cb045d76a</sum></package><package arch="x86_64" name="nss-tools" release="19.el7_2" src="nss-3.19.1-19.el7_2.src.rpm" version="3.19.1"><filename>nss-tools-3.19.1-19.el7_2.x86_64.rpm</filename><sum type="sha256">13122672e2b9a2a1c6ff1f95ea35539d125e9f12461aba5137822d3921bb2b9f</sum></package><package arch="i686" name="nss-devel" release="19.el7_2" src="nss-3.19.1-19.el7_2.src.rpm" version="3.19.1"><filename>nss-devel-3.19.1-19.el7_2.i686.rpm</filename><sum type="sha256">55b3325933d37d9ee79aa83b2703576747dfa1663eea64c8e4eb36482260e118</sum></package><package arch="i686" name="nss-pkcs11-devel" release="19.el7_2" src="nss-3.19.1-19.el7_2.src.rpm" version="3.19.1"><filename>nss-pkcs11-devel-3.19.1-19.el7_2.i686.rpm</filename><sum type="sha256">c6fa92cb9a919fcdabdbe46bc0130a38a4f1419e4bce7aedbf32a290fe6a8cc8</sum></package><package arch="i686" name="nss" release="19.el7_2" src="nss-3.19.1-19.el7_2.src.rpm" version="3.19.1"><filename>nss-3.19.1-19.el7_2.i686.rpm</filename><sum type="sha256">35628966dba40e1cab8352cc91b213e02719fa8654714af09e1d088b792e8c56</sum></package><package arch="x86_64" name="nss-devel" release="19.el7_2" src="nss-3.19.1-19.el7_2.src.rpm" version="3.19.1"><filename>nss-devel-3.19.1-19.el7_2.x86_64.rpm</filename><sum type="sha256">dd47c8d73a27cb862645147d45e6e8dfba4f83d98ee5b4e5e5f0c59c2a2978e1</sum></package><package arch="x86_64" name="nss" release="19.el7_2" src="nss-3.19.1-19.el7_2.src.rpm" version="3.19.1"><filename>nss-3.19.1-19.el7_2.x86_64.rpm</filename><sum type="sha256">f5ac6cd653134c3ae35655b18ba0009d0566b90e0ee10028685aa7e455a73b6b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" id="CVE-2015-7575" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0007" id="RHSA-2016:0007-1" title="Rhsa-2016:0007-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289841" id="1289841" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0008-1</id><title>Openssl</title><description>A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) 
For the update to take effect, all services linked to the OpenSSL library must be restarted, or the system rebooted.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-01-08 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="openssl-devel" release="51.el7_2.2" src="openssl-1.0.1e-51.el7_2.2.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-51.el7_2.2.i686.rpm</filename><sum type="sha256">48133ff6002863fcbe72ab9ad8e94dad328bcc5f01d3e04223c288ac36f051fc</sum></package><package arch="x86_64" epoch="1" name="openssl-libs" release="51.el7_2.2" src="openssl-1.0.1e-51.el7_2.2.src.rpm" version="1.0.1e"><filename>openssl-libs-1.0.1e-51.el7_2.2.x86_64.rpm</filename><sum type="sha256">75cfdb8f3b01d4b83a21daac834cc2607ab3279acd12d2b49c06d6535e98a6ca</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="51.el7_2.2" src="openssl-1.0.1e-51.el7_2.2.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-51.el7_2.2.x86_64.rpm</filename><sum type="sha256">567e32ce1e8a63ec664f015e9542702b19aa48502a84b4796c12218c5b87d57d</sum></package><package arch="x86_64" epoch="1" name="openssl" release="51.el7_2.2" src="openssl-1.0.1e-51.el7_2.2.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-51.el7_2.2.x86_64.rpm</filename><sum type="sha256">6047fb4dcd27ce15bbc26878057f1546e4fcde71b5a0e9de9e3c85821b69ecb1</sum></package><package arch="i686" epoch="1" name="openssl-static" release="51.el7_2.2" src="openssl-1.0.1e-51.el7_2.2.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-51.el7_2.2.i686.rpm</filename><sum type="sha256">4b5c1caa8c68b5fd93192dc569eaf5bffa86d8f714f06a2ca61fd13db8d9f7ec</sum></package><package arch="x86_64" epoch="1" name="openssl-devel" release="51.el7_2.2" src="openssl-1.0.1e-51.el7_2.2.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-51.el7_2.2.x86_64.rpm</filename><sum type="sha256">240f07ca2c762e79a15a73bcdee97a3daee8afe3767846e8f0eb88fd71bea282</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="51.el7_2.2" src="openssl-1.0.1e-51.el7_2.2.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-51.el7_2.2.x86_64.rpm</filename><sum type="sha256">0b4852c33d4414a45c3b873aeb95212a93832ee44bdbaf02e169f4f23d396e7e</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="51.el7_2.2" src="openssl-1.0.1e-51.el7_2.2.src.rpm" version="1.0.1e"><filename>openssl-libs-1.0.1e-51.el7_2.2.i686.rpm</filename><sum type="sha256">050f1d3868dc3cc828b97b4bb3a2172e003fb5b748317e0abeec022fc0eeebaf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" id="CVE-2015-7575" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0008" id="RHSA-2016:0008-1" title="Rhsa-2016:0008-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289841" id="1289841" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0009-1</id><title>Libldb</title><description>A denial of service flaw was found in the ldb_wildcard_compare() function of libldb. A remote attacker could send a specially crafted packet that, when processed by an application using libldb (for example the AD LDAP server in Samba), would cause that application to consume an excessive amount of memory and crash. (CVE-2015-3223) 
A memory-read flaw was found in the way the libldb library processed LDB DN records with a null byte. An authenticated, remote attacker could use this flaw to read heap-memory pages from the server. (CVE-2015-5330)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-01-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libldb-devel" release="1.el7_2.2" src="libldb-1.1.20-1.el7_2.2.src.rpm" version="1.1.20"><filename>libldb-devel-1.1.20-1.el7_2.2.i686.rpm</filename><sum type="sha256">1a3ed799925ec0112e65babf30a161c1ad93ce2ae4924112ed15c0c20b381d2c</sum></package><package arch="i686" name="libldb" release="1.el7_2.2" src="libldb-1.1.20-1.el7_2.2.src.rpm" version="1.1.20"><filename>libldb-1.1.20-1.el7_2.2.i686.rpm</filename><sum type="sha256">ee0380bee18e603b72ff0482fb57f630d5878272c0f876cb823911b11f295681</sum></package><package arch="i686" name="pyldb" release="1.el7_2.2" src="libldb-1.1.20-1.el7_2.2.src.rpm" version="1.1.20"><filename>pyldb-1.1.20-1.el7_2.2.i686.rpm</filename><sum type="sha256">662981ab949a28b9f70ff686bc5a9d47c2d3e9973efacfffac0f49c2d7596494</sum></package><package arch="x86_64" name="libldb" release="1.el7_2.2" src="libldb-1.1.20-1.el7_2.2.src.rpm" version="1.1.20"><filename>libldb-1.1.20-1.el7_2.2.x86_64.rpm</filename><sum type="sha256">d3cbc6ac50fa00e6471d0f2fe6e3a11091d01964b39cfabfafdac390a702c53c</sum></package><package arch="x86_64" name="libldb-devel" release="1.el7_2.2" src="libldb-1.1.20-1.el7_2.2.src.rpm" version="1.1.20"><filename>libldb-devel-1.1.20-1.el7_2.2.x86_64.rpm</filename><sum type="sha256">d27fce6bd11c9008f85fdb91da889886ea30729286b9f97111f8386a5dc84640</sum></package><package arch="x86_64" name="pyldb" release="1.el7_2.2" src="libldb-1.1.20-1.el7_2.2.src.rpm" version="1.1.20"><filename>pyldb-1.1.20-1.el7_2.2.x86_64.rpm</filename><sum type="sha256">76cde86bae9a4b1dd951ff2d309c39d894f1cddd276f4574efb052156be3aecb</sum></package><package arch="x86_64" name="pyldb-devel" release="1.el7_2.2" src="libldb-1.1.20-1.el7_2.2.src.rpm" version="1.1.20"><filename>pyldb-devel-1.1.20-1.el7_2.2.x86_64.rpm</filename><sum type="sha256">606321fc7c8c5ae834f15185441580f980e02e458397180a20ea0ad7687d2c22</sum></package><package arch="x86_64" name="ldb-tools" release="1.el7_2.2" src="libldb-1.1.20-1.el7_2.2.src.rpm" version="1.1.20"><filename>ldb-tools-1.1.20-1.el7_2.2.x86_64.rpm</filename><sum type="sha256">87fea4963bb4f563a5965a669a0a203e39d8bfc0e1eb294e0ec056df36116f91</sum></package><package arch="i686" name="pyldb-devel" release="1.el7_2.2" src="libldb-1.1.20-1.el7_2.2.src.rpm" version="1.1.20"><filename>pyldb-devel-1.1.20-1.el7_2.2.i686.rpm</filename><sum type="sha256">2df73c126475670b2d1168926ecde176c5b98c8385a3a5ca276af54ddbb40ca6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3223" id="CVE-2015-3223" title="Libldb: Remote Dos In Samba (Ad) Ldap Server" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5330" id="CVE-2015-5330" title="Samba, Libldb: Remote Memory Read In The Samba Ldap Server" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0009" id="RHSA-2016:0009-1" title="Rhsa-2016:0009-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281326" id="1281326" title="Samba, Libldb: Remote Memory Read In The Samba Ldap Server" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290287" id="1290287" title="Libldb: Remote Dos In Samba (Ad) Ldap Server" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0012-1</id><title>Gnutls</title><description>A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) 
For the update to take effect, all applications linked to the GnuTLS library must be restarted.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-01-08 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="gnutls-dane" release="14.el7_2" src="gnutls-3.3.8-14.el7_2.src.rpm" version="3.3.8"><filename>gnutls-dane-3.3.8-14.el7_2.i686.rpm</filename><sum type="sha256">5142c66a4e95bbb08d8d17a1c4a144ab987dad867f35894b0574f6e7c60efa77</sum></package><package arch="x86_64" name="gnutls" release="14.el7_2" src="gnutls-3.3.8-14.el7_2.src.rpm" version="3.3.8"><filename>gnutls-3.3.8-14.el7_2.x86_64.rpm</filename><sum type="sha256">4e9c0b87b321258a06569b8d4c47b165f99dbadb1076486947c7de71e45c08e0</sum></package><package arch="x86_64" name="gnutls-c++" release="14.el7_2" src="gnutls-3.3.8-14.el7_2.src.rpm" version="3.3.8"><filename>gnutls-c++-3.3.8-14.el7_2.x86_64.rpm</filename><sum type="sha256">3f43f6353954764f668894d51670f144a1546ea72d8b50ad74457892f574cab5</sum></package><package arch="x86_64" name="gnutls-dane" release="14.el7_2" src="gnutls-3.3.8-14.el7_2.src.rpm" version="3.3.8"><filename>gnutls-dane-3.3.8-14.el7_2.x86_64.rpm</filename><sum type="sha256">59017fc0d219d3a62367acb3335adbfe834a34cbc49080f12851492e33439346</sum></package><package arch="x86_64" name="gnutls-utils" release="14.el7_2" src="gnutls-3.3.8-14.el7_2.src.rpm" version="3.3.8"><filename>gnutls-utils-3.3.8-14.el7_2.x86_64.rpm</filename><sum type="sha256">f932b3899bbe2453e4667c1ef3cf75aed844ab271cd9c38577c81e9a36f5e673</sum></package><package arch="i686" name="gnutls-devel" release="14.el7_2" src="gnutls-3.3.8-14.el7_2.src.rpm" version="3.3.8"><filename>gnutls-devel-3.3.8-14.el7_2.i686.rpm</filename><sum type="sha256">6307b98c35bb54cf45b0ad7ec6589fc15ca03ee0942e23345031990bf96c31de</sum></package><package arch="x86_64" name="gnutls-devel" release="14.el7_2" src="gnutls-3.3.8-14.el7_2.src.rpm" version="3.3.8"><filename>gnutls-devel-3.3.8-14.el7_2.x86_64.rpm</filename><sum type="sha256">d5caa707fef6e1ffc762f4582ec581e72f554e8d68eaf9bad35aca5dd379af12</sum></package><package arch="i686" name="gnutls" release="14.el7_2" src="gnutls-3.3.8-14.el7_2.src.rpm" version="3.3.8"><filename>gnutls-3.3.8-14.el7_2.i686.rpm</filename><sum type="sha256">b53e6d745a29ce2ed3e498d79fc42224060a4fb534546e99b52a3d7c43fbe824</sum></package><package arch="i686" name="gnutls-c++" release="14.el7_2" src="gnutls-3.3.8-14.el7_2.src.rpm" version="3.3.8"><filename>gnutls-c++-3.3.8-14.el7_2.i686.rpm</filename><sum type="sha256">25ada5aeb7a23ea906f13f6e2120f12035eb9330f72e99f9d7ddc52c4fcdebfc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" id="CVE-2015-7575" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0012" id="RHSA-2016:0012-1" title="Rhsa-2016:0012-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289841" id="1289841" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0043-1</id><title>Openssh</title><description>An information leak flaw was found in the way the OpenSSH client roaming feature was implemented. A malicious server could potentially use this flaw to leak portions of memory (possibly including private SSH keys) of a successfully authenticated OpenSSH client. (CVE-2016-0777) 
A buffer overflow flaw was found in the way the OpenSSH client roaming feature was implemented. A malicious server could potentially use this flaw to execute arbitrary code on a successfully authenticated OpenSSH client if that client used certain non-default configuration options. (CVE-2016-0778) 
After installing this update, the OpenSSH server daemon (sshd) will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-01-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openssh-clients" release="23.el7_2" src="openssh-6.6.1p1-23.el7_2.src.rpm" version="6.6.1p1"><filename>openssh-clients-6.6.1p1-23.el7_2.x86_64.rpm</filename><sum type="sha256">f253800cea4a070168ea08d867c965fe4162d756970e5ce24ac851de4152ce89</sum></package><package arch="x86_64" name="openssh-server" release="23.el7_2" src="openssh-6.6.1p1-23.el7_2.src.rpm" version="6.6.1p1"><filename>openssh-server-6.6.1p1-23.el7_2.x86_64.rpm</filename><sum type="sha256">14f217991d14626da9f9c6f30be068b82e50fff7b003729d1b04c0239662d23c</sum></package><package arch="x86_64" name="openssh" release="23.el7_2" src="openssh-6.6.1p1-23.el7_2.src.rpm" version="6.6.1p1"><filename>openssh-6.6.1p1-23.el7_2.x86_64.rpm</filename><sum type="sha256">986b0b1c7714899aa0df42362fc5c087a064014069826fdee5a1acd6e4e7f8e2</sum></package><package arch="x86_64" name="openssh-askpass" release="23.el7_2" src="openssh-6.6.1p1-23.el7_2.src.rpm" version="6.6.1p1"><filename>openssh-askpass-6.6.1p1-23.el7_2.x86_64.rpm</filename><sum type="sha256">7b52b3b31bd231dcb0b3f2b17eeff19b6f80fdd253ef66cb07ceb80ba590b7e2</sum></package><package arch="x86_64" name="pam_ssh_agent_auth" release="9.23.el7_2" src="openssh-6.6.1p1-23.el7_2.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-9.23.el7_2.x86_64.rpm</filename><sum type="sha256">71502302ab64ee9fe975b6f41cfe2afdff7e9be09c5c2867f1626daf40928d74</sum></package><package arch="x86_64" name="openssh-ldap" release="23.el7_2" src="openssh-6.6.1p1-23.el7_2.src.rpm" version="6.6.1p1"><filename>openssh-ldap-6.6.1p1-23.el7_2.x86_64.rpm</filename><sum type="sha256">6b1792446c86fd3f61cce3d477e703944c1112e79507e39f1fb8ae13154336c1</sum></package><package arch="i686" name="pam_ssh_agent_auth" release="9.23.el7_2" src="openssh-6.6.1p1-23.el7_2.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-9.23.el7_2.i686.rpm</filename><sum type="sha256">3b37123c8f82cb9da72e2f5f571e92186b855893b9186f081415c9ec06ada3a8</sum></package><package arch="x86_64" name="openssh-server-sysvinit" release="23.el7_2" src="openssh-6.6.1p1-23.el7_2.src.rpm" version="6.6.1p1"><filename>openssh-server-sysvinit-6.6.1p1-23.el7_2.x86_64.rpm</filename><sum type="sha256">090ad5a65812bdcb7db8d0613d5468f8b3992814e1333e03f1c667502031dd6a</sum></package><package arch="x86_64" name="openssh-keycat" release="23.el7_2" src="openssh-6.6.1p1-23.el7_2.src.rpm" version="6.6.1p1"><filename>openssh-keycat-6.6.1p1-23.el7_2.x86_64.rpm</filename><sum type="sha256">c1c395448568dc60297040695ab373af7e150f86492f91bffe07b9c042c6b48d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0777" id="CVE-2016-0777" title="Openssh: Client Information Leak Due To Use Of Roaming Connection Feature" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0778" id="CVE-2016-0778" title="Openssh: Client Buffer-Overflow When Using Roaming Connections" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0043" id="RHSA-2016:0043-1" title="Rhsa-2016:0043-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298032" id="1298032" title="Openssh: Client Information Leak Due To Use Of Roaming Connection Feature" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298033" id="1298033" title="Openssh: Client Buffer-Overflow When Using Roaming Connections" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0049-1</id><title>Java-1.8.0-Openjdk</title><description>An out-of-bounds write flaw was found in the JPEG image format decoder in the AWT component in OpenJDK. A specially crafted JPEG image could cause a Java application to crash or, possibly execute arbitrary code. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. (CVE-2016-0483) 
An integer signedness issue was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2016-0494) 
It was discovered that the password-based encryption (PBE) implementation in the Libraries component in OpenJDK used an incorrect key length. This could, in certain cases, lead to generation of keys that were weaker than expected. (CVE-2016-0475) 
It was discovered that the JAXP component in OpenJDK did not properly enforce the totalEntitySizeLimit limit. An attacker able to make a Java application process a specially crafted XML file could use this flaw to make the application consume an excessive amount of memory. (CVE-2016-0466) 
A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) 
Multiple flaws were discovered in the Networking and JMX components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-0402, CVE-2016-0448) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. 
Note: This update also disallows the use of the MD5 hash algorithm in the certification path processing. The use of MD5 can be re-enabled by removing MD5 from the jdk.certpath.disabledAlgorithms security property defined in the java.security file. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-01-21 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="2.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-headless-1.8.0.71-2.b15.el7_2.x86_64.rpm</filename><sum type="sha256">0ebf588a28bff0b061285c9c5e7e7f712493ccd2442db8dea1304eebe954070a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="2.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.71-2.b15.el7_2.x86_64.rpm</filename><sum type="sha256">6f07f712fdd3ab029778ab94280a12f1cededd3a4c36b7d76ac7d5bd20c4ea32</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="2.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-javadoc-1.8.0.71-2.b15.el7_2.noarch.rpm</filename><sum type="sha256">e9df390930deea29f2b0494b294d00fe3b847fe40287b1cd093911abd8ccc248</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="2.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-accessibility-1.8.0.71-2.b15.el7_2.x86_64.rpm</filename><sum type="sha256">bc0bc7ed210213ea9630f7df96e51b66c6009ed148b7c659c922fad3a817916b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="2.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.71-2.b15.el7_2.x86_64.rpm</filename><sum type="sha256">98e769a7d906a1eb7a31a34351c84b61fd7be9378153049d3cf7a7c555d9b24d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="2.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-demo-1.8.0.71-2.b15.el7_2.x86_64.rpm</filename><sum type="sha256">812f0e5785d94cbd42368553c1b234206809bd6911175699125b4f41bb1bb6ca</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="2.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2.x86_64.rpm</filename><sum type="sha256">5a20a21f74b919ccb215867b0132835908f2eb1f74ebf4615802dfda21b5d134</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="2.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-src-1.8.0.71-2.b15.el7_2.x86_64.rpm</filename><sum type="sha256">b5f1f35b94faf7ecd9fa7b399a6f6eb95a72f08cd6a5430e5f3e38213ebf5f75</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="2.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.71-2.b15.el7_2.x86_64.rpm</filename><sum type="sha256">c2dcf9515f0821146869c65a0494bd06cfb6f2ace2a6dbc4dc29338d2bdb5cf7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="2.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-src-debug-1.8.0.71-2.b15.el7_2.x86_64.rpm</filename><sum type="sha256">f8eef359e57c4452699a85252d703ccde64d226ebb5ea95c6ecb390b3eb10cfe</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="2.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-debug-1.8.0.71-2.b15.el7_2.x86_64.rpm</filename><sum type="sha256">5b9d33813a7d4b74284348580d17b9a047ea7534c5f41f3158b2b199e2dace27</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="2.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.71-2.b15.el7_2.x86_64.rpm</filename><sum type="sha256">1a0ab9231c26189cfabeb376e54b7a83241fbf3f665f3ca854e906595711e2a4</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="2.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.71-2.b15.el7_2.noarch.rpm</filename><sum type="sha256">7154746fe0c9a2409bfb4f024aa391e3a26eefd62da5e8a04f79d0655efe33a2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="2.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.71-2.b15.el7_2.src.rpm" version="1.8.0.71"><filename>java-1.8.0-openjdk-devel-1.8.0.71-2.b15.el7_2.x86_64.rpm</filename><sum type="sha256">9afc3842a32f4cfbc9a55574d828606e39a2e5a8b0b710156e7adce01967f03b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" id="CVE-2015-7575" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402" id="CVE-2016-0402" title="Openjdk: Url Deserialization Inconsistencies (Networking, 8059054)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448" id="CVE-2016-0448" title="Openjdk: Logging Of Rmi Connection Secrets (Jmx, 8130710)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466" id="CVE-2016-0466" title="Openjdk: Insufficient Enforcement Of Totalentitysizelimit (Jaxp, 8133962)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0475" id="CVE-2016-0475" title="Openjdk: Pbe Incorrect Key Lengths (Libraries, 8138589)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483" id="CVE-2016-0483" title="Openjdk: Incorrect Boundary Check In Jpeg Decoder (Awt, 8139017)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494" id="CVE-2016-0494" title="Icu: Integer Signedness Issue In Indicrearrangementprocessor (Openjdk 2D, 8140543)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0049" id="RHSA-2016:0049-1" title="Rhsa-2016:0049-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289841" id="1289841" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298906" id="1298906" title="Icu: Integer Signedness Issue In Indicrearrangementprocessor (Openjdk 2D, 8140543)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298949" id="1298949" title="Openjdk: Pbe Incorrect Key Lengths (Libraries, 8138589)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298957" id="1298957" title="Openjdk: Url Deserialization Inconsistencies (Networking, 8059054)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299073" id="1299073" title="Openjdk: Logging Of Rmi Connection Secrets (Jmx, 8130710)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299385" id="1299385" title="Openjdk: Insufficient Enforcement Of Totalentitysizelimit (Jaxp, 8133962)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299441" id="1299441" title="Openjdk: Incorrect Boundary Check In Jpeg Decoder (Awt, 8139017)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0054-1</id><title>Java-1.7.0-Openjdk</title><description>An out-of-bounds write flaw was found in the JPEG image format decoder in the AWT component in OpenJDK. A specially crafted JPEG image could cause a Java application to crash or, possibly execute arbitrary code. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. (CVE-2016-0483) 
An integer signedness issue was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2016-0494) 
It was discovered that the JAXP component in OpenJDK did not properly enforce the totalEntitySizeLimit limit. An attacker able to make a Java application process a specially crafted XML file could use this flaw to make the application consume an excessive amount of memory. (CVE-2016-0466) 
A flaw was found in the way TLS 1.2 could use the MD5 hash function for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker able to force a TLS connection to use the MD5 hash function could use this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client. (CVE-2015-7575) 
Multiple flaws were discovered in the Libraries, Networking, and JMX components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2015-4871, CVE-2016-0402, CVE-2016-0448) 
Note: This update also disallows the use of the MD5 hash algorithm in the certification path processing. The use of MD5 can be re-enabled by removing MD5 from the jdk.certpath.disabledAlgorithms security property defined in the java.security file. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-01-21 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.4.0.el7_2" src="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el7_2.src.rpm" version="1.7.0.95"><filename>java-1.7.0-openjdk-accessibility-1.7.0.95-2.6.4.0.el7_2.x86_64.rpm</filename><sum type="sha256">2360048af30ad32a5220e092b03a8d845e80e03109907434e4fc6cd94e66b08d</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.4.0.el7_2" src="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el7_2.src.rpm" version="1.7.0.95"><filename>java-1.7.0-openjdk-demo-1.7.0.95-2.6.4.0.el7_2.x86_64.rpm</filename><sum type="sha256">c8064d4c6a5d8cdfc43c501f4b73dd9fa77d63d7e665bc86abd4625b0e343f64</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.4.0.el7_2" src="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el7_2.src.rpm" version="1.7.0.95"><filename>java-1.7.0-openjdk-src-1.7.0.95-2.6.4.0.el7_2.x86_64.rpm</filename><sum type="sha256">c17ec80c0c0352a16bd57aa955b2fff9c77c541101459707153d96343cd39af9</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.4.0.el7_2" src="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el7_2.src.rpm" version="1.7.0.95"><filename>java-1.7.0-openjdk-devel-1.7.0.95-2.6.4.0.el7_2.x86_64.rpm</filename><sum type="sha256">b460438e34fe0be615ecdd93743998ad648773d964934e5ab31e26b3fa490a77</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.4.0.el7_2" src="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el7_2.src.rpm" version="1.7.0.95"><filename>java-1.7.0-openjdk-headless-1.7.0.95-2.6.4.0.el7_2.x86_64.rpm</filename><sum type="sha256">a145e045c98e6f2293ec221c01f8c907c82aa1f1f40e32ddd132bca3411e4e39</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.4.0.el7_2" src="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el7_2.src.rpm" version="1.7.0.95"><filename>java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el7_2.x86_64.rpm</filename><sum type="sha256">b96fb2eff4572ad4421f6a1b5c327cb7c796c057dd8451cbc62bde98330fa69f</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.4.0.el7_2" src="java-1.7.0-openjdk-1.7.0.95-2.6.4.0.el7_2.src.rpm" version="1.7.0.95"><filename>java-1.7.0-openjdk-javadoc-1.7.0.95-2.6.4.0.el7_2.noarch.rpm</filename><sum type="sha256">e029815d331aac92132e9a577d4c58546181f37bc11fa7a8d20f6b96ec668766</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4871" id="CVE-2015-4871" title="Oracle Jdk: Unspecified Vulnerability Fixed In 7U91 (Libraries)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7575" id="CVE-2015-7575" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402" id="CVE-2016-0402" title="Openjdk: Url Deserialization Inconsistencies (Networking, 8059054)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448" id="CVE-2016-0448" title="Openjdk: Logging Of Rmi Connection Secrets (Jmx, 8130710)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466" id="CVE-2016-0466" title="Openjdk: Insufficient Enforcement Of Totalentitysizelimit (Jaxp, 8133962)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483" id="CVE-2016-0483" title="Openjdk: Incorrect Boundary Check In Jpeg Decoder (Awt, 8139017)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494" id="CVE-2016-0494" title="Icu: Integer Signedness Issue In Indicrearrangementprocessor (Openjdk 2D, 8140543)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0054" id="RHSA-2016:0054-1" title="Rhsa-2016:0054-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273859" id="1273859" title="Oracle Jdk: Unspecified Vulnerability Fixed In 7U91 (Libraries)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289841" id="1289841" title="Tls 1.2 Transcipt Collision Attacks Against Md5 In Key Exchange Protocol (Sloth)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298906" id="1298906" title="Icu: Integer Signedness Issue In Indicrearrangementprocessor (Openjdk 2D, 8140543)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298957" id="1298957" title="Openjdk: Url Deserialization Inconsistencies (Networking, 8059054)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299073" id="1299073" title="Openjdk: Logging Of Rmi Connection Secrets (Jmx, 8130710)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299385" id="1299385" title="Openjdk: Insufficient Enforcement Of Totalentitysizelimit (Jaxp, 8133962)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299441" id="1299441" title="Openjdk: Incorrect Boundary Check In Jpeg Decoder (Awt, 8139017)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0063-1</id><title>Ntp</title><description>It was discovered that ntpd as a client did not correctly check the originate timestamp in received packets. A remote attacker could use this flaw to send a crafted packet to an ntpd client that would effectively disable synchronization with the server, or push arbitrary offset/delay measurements to modify the time on the client. (CVE-2015-8138) 
After installing the update, the ntpd daemon will restart automatically.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-01-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ntp-perl" release="22.el7_2.1" src="ntp-4.2.6p5-22.el7_2.1.src.rpm" version="4.2.6p5"><filename>ntp-perl-4.2.6p5-22.el7_2.1.noarch.rpm</filename><sum type="sha256">0e81604fad06a39ec95add007651f4de39f121f3f12ba092990bec00fa5a791e</sum></package><package arch="x86_64" name="ntp" release="22.el7_2.1" src="ntp-4.2.6p5-22.el7_2.1.src.rpm" version="4.2.6p5"><filename>ntp-4.2.6p5-22.el7_2.1.x86_64.rpm</filename><sum type="sha256">d4a049aedac2673157d10d4cc5c59eb32adea8231e2cc309dbd6b3d543f38e48</sum></package><package arch="x86_64" name="sntp" release="22.el7_2.1" src="ntp-4.2.6p5-22.el7_2.1.src.rpm" version="4.2.6p5"><filename>sntp-4.2.6p5-22.el7_2.1.x86_64.rpm</filename><sum type="sha256">a9e19517615376f6d7344fb96454a7f1e2a2646314aadf58308c1ba8085b7c74</sum></package><package arch="x86_64" name="ntpdate" release="22.el7_2.1" src="ntp-4.2.6p5-22.el7_2.1.src.rpm" version="4.2.6p5"><filename>ntpdate-4.2.6p5-22.el7_2.1.x86_64.rpm</filename><sum type="sha256">b737b18fbedb18fb8627cd83438b3d1911da440a524c432d27cdc504c5c3cd15</sum></package><package arch="noarch" name="ntp-doc" release="22.el7_2.1" src="ntp-4.2.6p5-22.el7_2.1.src.rpm" version="4.2.6p5"><filename>ntp-doc-4.2.6p5-22.el7_2.1.noarch.rpm</filename><sum type="sha256">afd96dea8e1a8e9f2dceb4cf79ebcd34518751e155c2ca1f611986001742903a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8138" id="CVE-2015-8138" title="Ntp: Missing Check For Zero Originate Timestamp" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0063" id="RHSA-2016:0063-1" title="Rhsa-2016:0063-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299442" id="1299442" title="Ntp: Missing Check For Zero Originate Timestamp" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0064-1</id><title>Kernel</title><description>* A use-after-free flaw was found in the way the Linux kernel's key management subsystem handled keyring object reference counting in certain error path of the join_session_keyring() function. A local, unprivileged user could use this flaw to escalate their privileges on the system. (CVE-2016-0728, Important) 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-01-25 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools-libs" release="327.4.5.el7" src="kernel-3.10.0-327.4.5.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-327.4.5.el7.x86_64.rpm</filename><sum type="sha256">e57ee34748d4a9c0a6366dc5b2fe0b3eecbcbd8952e6ce9824909de2a79bd8d0</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="327.4.5.el7" src="kernel-3.10.0-327.4.5.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-327.4.5.el7.noarch.rpm</filename><sum type="sha256">4e8bce137d7a0ec94a6ecd2e952035af796baa0709513ccd26e670cd97bca664</sum></package><package arch="x86_64" name="kernel" release="327.4.5.el7" src="kernel-3.10.0-327.4.5.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-327.4.5.el7.x86_64.rpm</filename><sum type="sha256">4f9989ffd007e21ef1469b36e9204646d848b18e7d82b0c12b660d92fd6317bd</sum></package><package arch="x86_64" name="kernel-debug" release="327.4.5.el7" src="kernel-3.10.0-327.4.5.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-327.4.5.el7.x86_64.rpm</filename><sum type="sha256">cca774f5e42d319dbba312e9e03c47b7898fb64e4724b1b00705af253f76a727</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="327.4.5.el7" src="kernel-3.10.0-327.4.5.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-327.4.5.el7.x86_64.rpm</filename><sum type="sha256">b3c9f250ff37af48411caea56091e968574e23da331ab3ad8ce19f5fbb34e0d5</sum></package><package arch="noarch" name="kernel-doc" release="327.4.5.el7" src="kernel-3.10.0-327.4.5.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-327.4.5.el7.noarch.rpm</filename><sum type="sha256">19d331f753eae36ecf126100e467006dd317178c97aae74367b65c1b985dcaec</sum></package><package arch="x86_64" name="perf" release="327.4.5.el7" src="kernel-3.10.0-327.4.5.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-327.4.5.el7.x86_64.rpm</filename><sum type="sha256">932da44e216d6b6ce80dc0d2785804438279912e7890b206078516b4efb2b75a</sum></package><package arch="x86_64" name="kernel-debug-devel" release="327.4.5.el7" src="kernel-3.10.0-327.4.5.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-327.4.5.el7.x86_64.rpm</filename><sum type="sha256">a1823ccb22d369c088b3dcebdf58f3733b31e895cb620af101cba8ffa24ecd28</sum></package><package arch="x86_64" name="kernel-headers" release="327.4.5.el7" src="kernel-3.10.0-327.4.5.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-327.4.5.el7.x86_64.rpm</filename><sum type="sha256">9d50a7ec26e02fbb217ce424ee920a7889f761e3de0a45764d0a3d3946f19873</sum></package><package arch="x86_64" name="kernel-tools" release="327.4.5.el7" src="kernel-3.10.0-327.4.5.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-327.4.5.el7.x86_64.rpm</filename><sum type="sha256">f013a9b514873364df2054f326a3ea8cbd2d5ef234b04c90760d6916f443e11f</sum></package><package arch="x86_64" name="python-perf" release="327.4.5.el7" src="kernel-3.10.0-327.4.5.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-327.4.5.el7.x86_64.rpm</filename><sum type="sha256">a9a5ada5f11855b094d696fddb8e363b5f75355bca8f37b1d8bfa4e28ef4244b</sum></package><package arch="x86_64" name="kernel-devel" release="327.4.5.el7" src="kernel-3.10.0-327.4.5.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-327.4.5.el7.x86_64.rpm</filename><sum type="sha256">93b2b37a7d2b66f6a1943581bad31aabf1ddfc1dfb3ae367e10fa7c8ea50f663</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0728" id="CVE-2016-0728" title="Kernel: Possible Use-After-Free Vulnerability In Keyring Facility" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0064" id="RHSA-2016:0064-1" title="Rhsa-2016:0064-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297475" id="1297475" title="Kernel: Possible Use-After-Free Vulnerability In Keyring Facility" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0067-1</id><title>Java-1.6.0-Openjdk</title><description>An out-of-bounds write flaw was found in the JPEG image format decoder in the AWT component in OpenJDK. A specially crafted JPEG image could cause a Java application to crash or, possibly execute arbitrary code. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions. (CVE-2016-0483) 
An integer signedness issue was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. (CVE-2016-0494) 
It was discovered that the JAXP component in OpenJDK did not properly enforce the totalEntitySizeLimit limit. An attacker able to make a Java application process a specially crafted XML file could use this flaw to make the application consume an excessive amount of memory. (CVE-2016-0466) 
Multiple flaws were discovered in the Networking and JMX components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-0402, CVE-2016-0448) 
Note: This update also disallows the use of the MD5 hash algorithm in the certification path processing. The use of MD5 can be re-enabled by removing MD5 from the jdk.certpath.disabledAlgorithms security property defined in the java.security file. 
All running instances of OpenJDK Java must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-01-26 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.10.0.el7_2" src="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el7_2.src.rpm" version="1.6.0.38"><filename>java-1.6.0-openjdk-demo-1.6.0.38-1.13.10.0.el7_2.x86_64.rpm</filename><sum type="sha256">fccdb7d04258a5b25db60ad08429c7c14dac3d191a0e27a2e88b11181ed1e39f</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.10.0.el7_2" src="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el7_2.src.rpm" version="1.6.0.38"><filename>java-1.6.0-openjdk-javadoc-1.6.0.38-1.13.10.0.el7_2.x86_64.rpm</filename><sum type="sha256">4de0b0cf19558e842460467446aa66dbd428f5d93c44574014a00b6fb772abcf</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk" release="1.13.10.0.el7_2" src="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el7_2.src.rpm" version="1.6.0.38"><filename>java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el7_2.x86_64.rpm</filename><sum type="sha256">6cf13852bd930c6ceae93d4fbc75cd1878769828a9771c812018ddcbeba16d89</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.10.0.el7_2" src="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el7_2.src.rpm" version="1.6.0.38"><filename>java-1.6.0-openjdk-devel-1.6.0.38-1.13.10.0.el7_2.x86_64.rpm</filename><sum type="sha256">767b957bef0146c3858da033bdc69039aec278cd79327f44a5e8541d6e340767</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.10.0.el7_2" src="java-1.6.0-openjdk-1.6.0.38-1.13.10.0.el7_2.src.rpm" version="1.6.0.38"><filename>java-1.6.0-openjdk-src-1.6.0.38-1.13.10.0.el7_2.x86_64.rpm</filename><sum type="sha256">46212997c8a4dfb0a499adc1a98f2982b973725e2eee6f755a96bc9f01540cbe</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0402" id="CVE-2016-0402" title="Openjdk: Url Deserialization Inconsistencies (Networking, 8059054)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0448" id="CVE-2016-0448" title="Openjdk: Logging Of Rmi Connection Secrets (Jmx, 8130710)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0466" id="CVE-2016-0466" title="Openjdk: Insufficient Enforcement Of Totalentitysizelimit (Jaxp, 8133962)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0483" id="CVE-2016-0483" title="Openjdk: Incorrect Boundary Check In Jpeg Decoder (Awt, 8139017)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0494" id="CVE-2016-0494" title="Icu: Integer Signedness Issue In Indicrearrangementprocessor (Openjdk 2D, 8140543)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0067" id="RHSA-2016:0067-1" title="Rhsa-2016:0067-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298906" id="1298906" title="Icu: Integer Signedness Issue In Indicrearrangementprocessor (Openjdk 2D, 8140543)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298957" id="1298957" title="Openjdk: Url Deserialization Inconsistencies (Networking, 8059054)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299073" id="1299073" title="Openjdk: Logging Of Rmi Connection Secrets (Jmx, 8130710)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299385" id="1299385" title="Openjdk: Insufficient Enforcement Of Totalentitysizelimit (Jaxp, 8133962)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299441" id="1299441" title="Openjdk: Incorrect Boundary Check In Jpeg Decoder (Awt, 8139017)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0071-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-1930, CVE-2016-1935) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-01-27 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_2" src="firefox-38.6.0-1.el7_2.src.rpm" version="38.6.0"><filename>firefox-38.6.0-1.el7_2.i686.rpm</filename><sum type="sha256">221b0fef5f001aaf6c3d74d42fa57d1e91703cbca06ed35ef4bc42cda954433d</sum></package><package arch="x86_64" name="firefox" release="1.el7_2" src="firefox-38.6.0-1.el7_2.src.rpm" version="38.6.0"><filename>firefox-38.6.0-1.el7_2.x86_64.rpm</filename><sum type="sha256">967f18769149dd68a3f5a21bb003a1eb2d54469a2b47f15479a41cd76018998f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930" id="CVE-2016-1930" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.6) (Mfsa 2016-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935" id="CVE-2016-1935" title="Mozilla: Buffer Overflow In Webgl After Out Of Memory Allocation (Mfsa 2016-03)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0071" id="RHSA-2016:0071-1" title="Rhsa-2016:0071-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301818" id="1301818" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.6) (Mfsa 2016-01)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301821" id="1301821" title="Mozilla: Buffer Overflow In Webgl After Out Of Memory Allocation (Mfsa 2016-03)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0073-1</id><title>Bind</title><description>A denial of service flaw was found in the way BIND processed certain malformed Address Prefix List (APL) records. A remote, authenticated attacker could use this flaw to cause named to crash. (CVE-2015-8704) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-01-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="32" name="bind-libs" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-29.el7_2.2.i686.rpm</filename><sum type="sha256">54c878e9076ca2efd7bf148db45dea4fe8805bd5f8b2bcec570866de73c42d43</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-chroot-9.9.4-29.el7_2.2.x86_64.rpm</filename><sum type="sha256">6b5479555cf5192408fd2a5dd956bd680149c0b6c80e2dd6eb2f2230c9ce0a60</sum></package><package arch="x86_64" epoch="32" name="bind" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-9.9.4-29.el7_2.2.x86_64.rpm</filename><sum type="sha256">f27bbef0beed3f6b264da3f5935c7ba19e62462ee9086629304f10d0b14f019c</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-29.el7_2.2.i686.rpm</filename><sum type="sha256">783bbd0fb7e8ac755f534d5f809be7f9d00271ba9bc2dfa353e18e9f2602a450</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-29.el7_2.2.x86_64.rpm</filename><sum type="sha256">42cdf2f6552f347a1365d390c6fe0a606ea1062f9bbd5ec808d94c15d3589d58</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-sdb-chroot-9.9.4-29.el7_2.2.x86_64.rpm</filename><sum type="sha256">d0fabb666ce90fffe3e4abcfe982706b3db3403948f07fe7e931a5a4ac88ba8b</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-29.el7_2.2.x86_64.rpm</filename><sum type="sha256">13834493ae5413bffdb87a57236a0796e2ea2bb970715cbd2ce9fc1b2af3f550</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-29.el7_2.2.x86_64.rpm</filename><sum type="sha256">26dc3062c0b698b43057c40ca6eb78e6c82a307223109bb05301101972894019</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-29.el7_2.2.i686.rpm</filename><sum type="sha256">bb36a14fc8853d7afdc344c2789b0b3653e8c54a69dac31531db0a1fed668a91</sum></package><package arch="i686" epoch="32" name="bind-devel" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-29.el7_2.2.i686.rpm</filename><sum type="sha256">a251807f283513a2250867a27518cd93c4010e57ea4ed8d999320fb0ae6a8abb</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-29.el7_2.2.i686.rpm</filename><sum type="sha256">4f69654317343aa44c85d6ae7fd67e66c92de9664b65a0d2e76b73f9ff099fc8</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-pkcs11-utils-9.9.4-29.el7_2.2.x86_64.rpm</filename><sum type="sha256">a2f65e9ff818ce349ba5d838b119596dfdd81067d54bfb59ee1da72b8d0f88a6</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-utils-9.9.4-29.el7_2.2.x86_64.rpm</filename><sum type="sha256">56c0680a8a970a8ce4b7fa0fd2f1a52966a171b9501b8374493a2073668665b9</sum></package><package arch="noarch" epoch="32" name="bind-license" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-license-9.9.4-29.el7_2.2.noarch.rpm</filename><sum type="sha256">c57fbfb34739eb4a687e28ec4fd522138b428758942522563bdfb23c2fa37af9</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-pkcs11-9.9.4-29.el7_2.2.x86_64.rpm</filename><sum type="sha256">aaf6a0195bc1725a41fd9075d1615d47a084dbe439116d8c0a5df141d40ba136</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-sdb-9.9.4-29.el7_2.2.x86_64.rpm</filename><sum type="sha256">a5757dfc0b8d2456b816cc8ca90dc6fa1f2c5c942dba58ef29c586113760f3e5</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-29.el7_2.2.i686.rpm</filename><sum type="sha256">5db942bfcd8a62618324c48d675cc228e21b49d66e81ab7466664094f995aa5c</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-29.el7_2.2.x86_64.rpm</filename><sum type="sha256">d91a1a5402c787a021848896dabb384bd4944e412410e8c34e3e78e5fceeee32</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-29.el7_2.2.x86_64.rpm</filename><sum type="sha256">cf1861d14a8aedc0d7a3f7e96c8db1082d7bf56f55b2217108ab5aad5d4b3734</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="29.el7_2.2" src="bind-9.9.4-29.el7_2.2.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-29.el7_2.2.x86_64.rpm</filename><sum type="sha256">fddfc0197f09dd6c73a2ad504d64141009a9516093b452b72c38620d91b79508</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8704" id="CVE-2015-8704" title="Bind: Specific Apl Data Could Trigger An Insist In Apl_42.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0073" id="RHSA-2016:0073-1" title="Rhsa-2016:0073-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299364" id="1299364" title="Bind: Specific Apl Data Could Trigger An Insist In Apl_42.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0083-1</id><title>Qemu-Kvm</title><description>An out-of-bounds read/write flaw was discovered in the way QEMU's Firmware Configuration device emulation processed certain firmware configurations. A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the QEMU process instance or, potentially, execute arbitrary code on the host with privileges of the QEMU process. (CVE-2016-1714) 
This update also fixes the following bugs: 
* Incorrect handling of the last sector of an image file could trigger an assertion failure in qemu-img. This update changes the handling of the last sector, and no assertion failure occurs. 
After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-01-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="libcacard" release="105.el7_2.3" src="qemu-kvm-1.5.3-105.el7_2.3.src.rpm" version="1.5.3"><filename>libcacard-1.5.3-105.el7_2.3.x86_64.rpm</filename><sum type="sha256">c306af338d268ac3245cf8d795b36fa674c71bd580da435fd7e4738d3e096859</sum></package><package arch="x86_64" epoch="10" name="libcacard-tools" release="105.el7_2.3" src="qemu-kvm-1.5.3-105.el7_2.3.src.rpm" version="1.5.3"><filename>libcacard-tools-1.5.3-105.el7_2.3.x86_64.rpm</filename><sum type="sha256">48b583906470080d6378859517cf81390ffa7ebe1e92662bcbd6d39afab61548</sum></package><package arch="x86_64" epoch="10" name="libcacard-devel" release="105.el7_2.3" src="qemu-kvm-1.5.3-105.el7_2.3.src.rpm" version="1.5.3"><filename>libcacard-devel-1.5.3-105.el7_2.3.x86_64.rpm</filename><sum type="sha256">def736bec400629e30b7835ed15a1e8c82a7bd9670466e7c73aeb788404d1ba6</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="105.el7_2.3" src="qemu-kvm-1.5.3-105.el7_2.3.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-105.el7_2.3.x86_64.rpm</filename><sum type="sha256">edba00f8a9a5b1903c33f8c787a537b38ad26fcd4456c701c95a0d7fe1d19968</sum></package><package arch="i686" epoch="10" name="libcacard" release="105.el7_2.3" src="qemu-kvm-1.5.3-105.el7_2.3.src.rpm" version="1.5.3"><filename>libcacard-1.5.3-105.el7_2.3.i686.rpm</filename><sum type="sha256">230eee66083ab4da53a7e4c2431f17da6057f2735f80a8e02b3027cb6f42208a</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="105.el7_2.3" src="qemu-kvm-1.5.3-105.el7_2.3.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-105.el7_2.3.x86_64.rpm</filename><sum type="sha256">49c0ef9373ea7f5b07c81ebb55fecc3d3b05e8ed213d44f1434a798076523f93</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="105.el7_2.3" src="qemu-kvm-1.5.3-105.el7_2.3.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-105.el7_2.3.x86_64.rpm</filename><sum type="sha256">2431f487cd3d0767e8225d552b7baf529e2ecf49559523096a49204157aec8c9</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="105.el7_2.3" src="qemu-kvm-1.5.3-105.el7_2.3.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-105.el7_2.3.x86_64.rpm</filename><sum type="sha256">bc7568c878a8e09a70400dbb14ef7397c912a1bf1dd1ec1b8cb5ec3b6285b410</sum></package><package arch="i686" epoch="10" name="libcacard-devel" release="105.el7_2.3" src="qemu-kvm-1.5.3-105.el7_2.3.src.rpm" version="1.5.3"><filename>libcacard-devel-1.5.3-105.el7_2.3.i686.rpm</filename><sum type="sha256">b8f11c93ba6fc0268b1838da177bb65021d0823729657e39964f38ab6f5b7454</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1714" id="CVE-2016-1714" title="Qemu: Nvram: Oob R/W Access In Processing Firmware Configurations" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0083" id="RHSA-2016:0083-1" title="Rhsa-2016:0083-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1296060" id="1296060" title="Qemu: Nvram: Oob R/W Access In Processing Firmware Configurations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298828" id="1298828" title="[Abrt] Qemu-Img: Get_Block_Status(): Qemu-Img Killed By Sigabrt" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0176-1</id><title>Glibc</title><description>A stack-based buffer overflow was found in the way the libresolv library performed dual A/AAAA DNS queries. A remote attacker could create a specially crafted DNS response which could cause libresolv to crash or, potentially, execute code with the permissions of the user running the library. Note: this issue is only exposed when libresolv is called from the nss_dns NSS service module. (CVE-2015-7547) 
It was discovered that the calloc implementation in glibc could return memory areas which contain non-zero bytes. This could result in unexpected application behavior such as hangs or crashes. (CVE-2015-5229) 
This update also fixes the following bugs: 
* The existing implementation of the "free" function causes all memory pools beyond the first to return freed memory directly to the operating system as quickly as possible. This can result in performance degradation when the rate of free calls is very high. The first memory pool (the main pool) does provide a method to rate limit the returns via M_TRIM_THRESHOLD, but this method is not available to subsequent memory pools. 
With this update, the M_TRIM_THRESHOLD method is extended to apply to all memory pools, which improves performance for threads with very high amounts of free calls and limits the number of "madvise" system calls. The change also increases the total transient memory usage by processes because the trim threshold must be reached before memory can be freed. 
To return to the previous behavior, you can either set M_TRIM_THRESHOLD using the "mallopt" function, or set the MALLOC_TRIM_THRESHOLD environment variable to 0. 
* On the little-endian variant of 64-bit IBM Power Systems (ppc64le), a bug in the dynamic loader could cause applications compiled with profiling enabled to fail to start with the error "monstartup: out of memory". The bug has been corrected and applications compiled for profiling now start correctly.</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-02-16 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nscd" release="106.el7_2.4" src="glibc-2.17-106.el7_2.4.src.rpm" version="2.17"><filename>nscd-2.17-106.el7_2.4.x86_64.rpm</filename><sum type="sha256">d51f0234cafd2f76c2053a834a87ab8a143fd88eae654c8cb5d699fd894c6082</sum></package><package arch="i686" name="glibc-devel" release="106.el7_2.4" src="glibc-2.17-106.el7_2.4.src.rpm" version="2.17"><filename>glibc-devel-2.17-106.el7_2.4.i686.rpm</filename><sum type="sha256">fd0456c25566a6697194bfa82b84aeb8e6e0b420b2f6542d3c111e09861c0a8c</sum></package><package arch="i686" name="glibc" release="106.el7_2.4" src="glibc-2.17-106.el7_2.4.src.rpm" version="2.17"><filename>glibc-2.17-106.el7_2.4.i686.rpm</filename><sum type="sha256">78dfaf71ae239757e929b1c224384b9688b930ee04c6d3e403b8468cca3dc72a</sum></package><package arch="x86_64" name="glibc-common" release="106.el7_2.4" src="glibc-2.17-106.el7_2.4.src.rpm" version="2.17"><filename>glibc-common-2.17-106.el7_2.4.x86_64.rpm</filename><sum type="sha256">393929472219c87d8a4fcd0ff421021e30c45dcb6db48b0b1131cd9b586dab8a</sum></package><package arch="i686" name="glibc-static" release="106.el7_2.4" src="glibc-2.17-106.el7_2.4.src.rpm" version="2.17"><filename>glibc-static-2.17-106.el7_2.4.i686.rpm</filename><sum type="sha256">fbabc752bdf35bceb009889399eabe831a2ac97f4d81b1c59623098b165f88e9</sum></package><package arch="x86_64" name="glibc-devel" release="106.el7_2.4" src="glibc-2.17-106.el7_2.4.src.rpm" version="2.17"><filename>glibc-devel-2.17-106.el7_2.4.x86_64.rpm</filename><sum type="sha256">f05dd5f583572a3b85a7e60f1d31e24adabea40c03b23ffbfc0c76e2a53c14d3</sum></package><package arch="x86_64" name="glibc-headers" release="106.el7_2.4" src="glibc-2.17-106.el7_2.4.src.rpm" version="2.17"><filename>glibc-headers-2.17-106.el7_2.4.x86_64.rpm</filename><sum type="sha256">93cf31f57be6da3538b490bda48e340c8ff29bafe394a03ae8fb8ec2bb358fd5</sum></package><package arch="x86_64" name="glibc-static" release="106.el7_2.4" src="glibc-2.17-106.el7_2.4.src.rpm" version="2.17"><filename>glibc-static-2.17-106.el7_2.4.x86_64.rpm</filename><sum type="sha256">9154c254ac8a177087ff4061128480118d01f60f1b721f9e48f07e55ef775946</sum></package><package arch="x86_64" name="glibc-utils" release="106.el7_2.4" src="glibc-2.17-106.el7_2.4.src.rpm" version="2.17"><filename>glibc-utils-2.17-106.el7_2.4.x86_64.rpm</filename><sum type="sha256">8ecceae6fafee7555886e8cafdd5d7b70df53a6b319762e44691db7e27cf194d</sum></package><package arch="x86_64" name="glibc" release="106.el7_2.4" src="glibc-2.17-106.el7_2.4.src.rpm" version="2.17"><filename>glibc-2.17-106.el7_2.4.x86_64.rpm</filename><sum type="sha256">9b73f1b48aab63c4339fcbf11feaacedd65f5c137b78a845d0f64356b31c6446</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5229" id="CVE-2015-5229" title="Glibc: Calloc May Return Non-Zero Memory" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7547" id="CVE-2015-7547" title="Glibc: Getaddrinfo Stack-Based Buffer Overflow" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0176" id="RHSA-2016:0176-1" title="Rhsa-2016:0176-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1256285" id="1256285" title="Glibc: Calloc May Return Non-Zero Memory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1293532" id="1293532" title="Glibc: Getaddrinfo Stack-Based Buffer Overflow" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0185-1</id><title>Kernel</title><description>* It was found that the Linux kernel's keys subsystem did not correctly garbage collect uninstantiated keyrings. A local attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system. (CVE-2015-7872, Important) 
* A flaw was found in the way the Linux kernel handled IRET faults during the processing of NMIs. An unprivileged, local user could use this flaw to crash the system or, potentially (although highly unlikely), escalate their privileges on the system. (CVE-2015-5157, Moderate) 
This update also fixes the following bugs: 
* Previously, processing packets with a lot of different IPv6 source addresses caused the kernel to return warnings concerning soft-lockups due to high lock contention and latency increase. With this update, lock contention is reduced by backing off concurrent waiting threads on the lock. As a result, the kernel no longer issues warnings in the described scenario. 
* Prior to this update, block device readahead was artificially limited. As a consequence, the read performance was poor, especially on RAID devices. Now, per-device readahead limits are used for each device instead of a global limit. As a result, read performance has improved, especially on RAID devices. 
* After injecting an EEH error, the host was previously not recovering and observing I/O hangs in HTX tool logs. This update makes sure that when one or both of EEH_STATE_MMIO_ACTIVE and EEH_STATE_MMIO_ENABLED flags is marked in the PE state, the PE's IO path is regarded as enabled as well. As a result, the host no longer hangs and recovers as expected. 
* The genwqe device driver was previously using the GFP_ATOMIC flag for allocating consecutive memory pages from the kernel's atomic memory pool, even in non-atomic situations. This could lead to allocation failures during memory pressure. With this update, the genwqe driver's memory allocations use the GFP_KERNEL flag, and the driver can allocate memory even during memory pressure situations. 
* The nx842 co-processor for IBM Power Systems could in some circumstances provide invalid data due to a data corruption bug during uncompression. With this update, all compression and uncompression calls to the nx842 co- processor contain a cyclic redundancy check (CRC) flag, which forces all compression and uncompression operations to check data integrity and prevents the co-processor from providing corrupted data. 
* A failed "updatepp" operation on the little-endian variant of IBM Power Systems could previously cause a wrong hash value to be used for the next hash insert operation in the page table. This could result in a missing hash pte update or invalidate operation, potentially causing memory corruption. With this update, the hash value is always recalculated after a failed "updatepp" operation, avoiding memory corruption. 
* Large Receive Offload (LRO) flag disabling was not being propagated downwards from above devices in vlan and bond hierarchy, breaking the flow of traffic. This problem has been fixed and LRO flags now propagate correctly. 
* Due to rounding errors in the CPU frequency of the intel_pstate driver, the CPU frequency never reached the value requested by the user. A kernel patch has been applied to fix these rounding errors. 
* When running several containers (up to 100), reports of hung tasks were previously reported. This update fixes the AB-BA deadlock in the dm_destroy() function, and the hung reports no longer occur. 
The system must be rebooted for this update to take effect.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-02-16 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="perf" release="327.10.1.el7" src="kernel-3.10.0-327.10.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-327.10.1.el7.x86_64.rpm</filename><sum type="sha256">3fa858402c3b7b1bd657b1cf494edde6f993e1457e7efb5cb07fcc1dd24267f2</sum></package><package arch="x86_64" name="kernel" release="327.10.1.el7" src="kernel-3.10.0-327.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-327.10.1.el7.x86_64.rpm</filename><sum type="sha256">0fe3b27738c063db242cee970a9cf9f9f3b38c76ad77eb1a9d3885bf35058543</sum></package><package arch="x86_64" name="kernel-debug" release="327.10.1.el7" src="kernel-3.10.0-327.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-327.10.1.el7.x86_64.rpm</filename><sum type="sha256">fc9fb7e7afbfcfbf46b89ed70740ceb202a5d585056cca1af12260c1f912d3e7</sum></package><package arch="x86_64" name="kernel-devel" release="327.10.1.el7" src="kernel-3.10.0-327.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-327.10.1.el7.x86_64.rpm</filename><sum type="sha256">a9d352ccbbf7a78af3ce1b65749fd69f13869be8ab5a5ab8fb91cbb392cdb34d</sum></package><package arch="x86_64" name="kernel-tools-libs" release="327.10.1.el7" src="kernel-3.10.0-327.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-327.10.1.el7.x86_64.rpm</filename><sum type="sha256">760217929f0f82a7c559ae5714d3c3a4626f48987a603e34a59f3eda8099d8fa</sum></package><package arch="x86_64" name="python-perf" release="327.10.1.el7" src="kernel-3.10.0-327.10.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-327.10.1.el7.x86_64.rpm</filename><sum type="sha256">0064ff6c587eeaa507b462643e0abde5d4edcaac4048736fd917dc0e5ae0387c</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="327.10.1.el7" src="kernel-3.10.0-327.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-327.10.1.el7.noarch.rpm</filename><sum type="sha256">4e3d76fb937cd5c9667b666beffe72116c19d4baebb4fa53f732a2b637aafb40</sum></package><package arch="x86_64" name="kernel-debug-devel" release="327.10.1.el7" src="kernel-3.10.0-327.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-327.10.1.el7.x86_64.rpm</filename><sum type="sha256">337e88bd64f4bd48a9efa4cf328a855e636899f936c24d5d817296ea6ae050dd</sum></package><package arch="x86_64" name="kernel-tools" release="327.10.1.el7" src="kernel-3.10.0-327.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-327.10.1.el7.x86_64.rpm</filename><sum type="sha256">e0fad38c9f70eb8f19c088a455e66c1dae798ef51cd9e8aabc11690515f4fa44</sum></package><package arch="noarch" name="kernel-doc" release="327.10.1.el7" src="kernel-3.10.0-327.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-327.10.1.el7.noarch.rpm</filename><sum type="sha256">f9115fcf7805cf26ed3b4260004d169899a0217189a451269a24b369cbd72055</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="327.10.1.el7" src="kernel-3.10.0-327.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-327.10.1.el7.x86_64.rpm</filename><sum type="sha256">fc94c91a37aea7685e09120e549cf3b600399fbc38c1087463ae53cdf08574b7</sum></package><package arch="x86_64" name="kernel-headers" release="327.10.1.el7" src="kernel-3.10.0-327.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-327.10.1.el7.x86_64.rpm</filename><sum type="sha256">fee4e9370e692a179dd3f4805c42c7a5a44c9fa1639bf9b71e24ca1e50ebc591</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5157" id="CVE-2015-5157" title="Kernel: X86-64: Iret Faults During Nmis Processing" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7872" id="CVE-2015-7872" title="Kernel: Keyrings Crash Triggerable By Unprivileged User" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0185" id="RHSA-2016:0185-1" title="Rhsa-2016:0185-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1259577" id="1259577" title="Kernel: X86-64: Iret Faults During Nmis Processing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1272371" id="1272371" title="Kernel: Keyrings Crash Triggerable By Unprivileged User" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0188-1</id><title>Sos</title><description>An insecure temporary file use flaw was found in the way sos created certain sosreport files. A local attacker could possibly use this flaw to perform a symbolic link attack to reveal the contents of sosreport files, or in some cases modify arbitrary files and escalate their privileges on the system. (CVE-2015-7529) 
This update also fixes the following bug: 
* Previously, the sosreport tool was not collecting the /var/lib/ceph and /var/run/ceph directories when run with the ceph plug-in enabled, causing the generated sosreport archive to miss vital troubleshooting information about ceph. With this update, the ceph plug-in for sosreport collects these directories, and the generated report contains more useful information.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-02-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="sos" release="35.el7_2.3" src="sos-3.2-35.el7_2.3.src.rpm" version="3.2"><filename>sos-3.2-35.el7_2.3.noarch.rpm</filename><sum type="sha256">2230af0b96815103abe088c3c52d51be1e47d9393c805c62946d347a9d7d3fa1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7529" id="CVE-2015-7529" title="Sos: Usage Of Predictable Temporary Files Allows Privilege Escalation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0188" id="RHSA-2016:0188-1" title="Rhsa-2016:0188-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1282542" id="1282542" title="Sos: Usage Of Predictable Temporary Files Allows Privilege Escalation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0189-1</id><title>Polkit</title><description>A denial of service flaw was found in how polkit handled authorization requests. A local, unprivileged user could send malicious requests to polkit, which could then cause the polkit daemon to corrupt its memory and crash. (CVE-2015-3256) 
The system must be rebooted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-02-16 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="polkit-devel" release="6.el7_2" src="polkit-0.112-6.el7_2.src.rpm" version="0.112"><filename>polkit-devel-0.112-6.el7_2.i686.rpm</filename><sum type="sha256">592b8d6aaa3deac3d4fda67e91c3268936b1cedb276aba182d6f26a64eb2f408</sum></package><package arch="i686" name="polkit" release="6.el7_2" src="polkit-0.112-6.el7_2.src.rpm" version="0.112"><filename>polkit-0.112-6.el7_2.i686.rpm</filename><sum type="sha256">4737fc1bcbf6472313414d4a22fea38d243979eff20f419b80ef4815ccdea232</sum></package><package arch="x86_64" name="polkit" release="6.el7_2" src="polkit-0.112-6.el7_2.src.rpm" version="0.112"><filename>polkit-0.112-6.el7_2.x86_64.rpm</filename><sum type="sha256">f3f0c8da5f3987da756293fb329a7f0adfc3f50fafb6fe91e344da617640fed4</sum></package><package arch="x86_64" name="polkit-devel" release="6.el7_2" src="polkit-0.112-6.el7_2.src.rpm" version="0.112"><filename>polkit-devel-0.112-6.el7_2.x86_64.rpm</filename><sum type="sha256">312f6ba7fe07b76b031bbef07d20f89da807f0af36d20087e7238009c729dea1</sum></package><package arch="noarch" name="polkit-docs" release="6.el7_2" src="polkit-0.112-6.el7_2.src.rpm" version="0.112"><filename>polkit-docs-0.112-6.el7_2.noarch.rpm</filename><sum type="sha256">7e967b8df63ebd26e51a16b5fb06a422be26d4f54d67cd244c5775c880c78592</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3256" id="CVE-2015-3256" title="Polkit: Memory Corruption Via Javascript Rule Evaluation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0189" id="RHSA-2016:0189-1" title="Rhsa-2016:0189-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1245684" id="1245684" title="Polkit: Memory Corruption Via Javascript Rule Evaluation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0197-1</id><title>Firefox</title><description>Multiple security flaws were found in the graphite2 font library shipped with Firefox. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-1521, CVE-2016-1522, CVE-2016-1523) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-02-16 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_2" src="firefox-38.6.1-1.el7_2.src.rpm" version="38.6.1"><filename>firefox-38.6.1-1.el7_2.x86_64.rpm</filename><sum type="sha256">dc08181b145f3e89be7b1763edf922c2f68196d34c4964c6ab237e502f9e2492</sum></package><package arch="i686" name="firefox" release="1.el7_2" src="firefox-38.6.1-1.el7_2.src.rpm" version="38.6.1"><filename>firefox-38.6.1-1.el7_2.i686.rpm</filename><sum type="sha256">b78664a1f86a097cb96d04e4af00ba2168e49c3b03af1923bba47aa9621998fe</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1521" id="CVE-2016-1521" title="Graphite2: Out-Of-Bound Read Vulnerability Triggered By Crafted Fonts" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1522" id="CVE-2016-1522" title="Graphite2: Null Pointer Dereference And Out-Of-Bounds Access Vulnerabilities" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523" id="CVE-2016-1523" title="Graphite2: Heap-Based Buffer Overflow In Context Item Handling Functionality" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0197" id="RHSA-2016:0197-1" title="Rhsa-2016:0197-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305805" id="1305805" title="Graphite2: Out-Of-Bound Read Vulnerability Triggered By Crafted Fonts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305810" id="1305810" title="Graphite2: Null Pointer Dereference And Out-Of-Bounds Access Vulnerabilities" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305813" id="1305813" title="Graphite2: Heap-Based Buffer Overflow In Context Item Handling Functionality" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1306496" id="1306496" title="Mozilla: Vulnerabilities In Graphite 2 (Mfsa 2016-14)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0204-1</id><title>389-Ds-Base</title><description>An infinite-loop vulnerability was discovered in the 389 directory server, where the server failed to correctly handle unexpectedly closed client connections. A remote attacker able to connect to the server could use this flaw to make the directory server consume an excessive amount of CPU and stop accepting connections (denial of service). (CVE-2016-0741) 
This update fixes the following bugs: 
* Previously, if a simple paged results search failed in the back end, the simple paged results slot was not released. Consequently, the simple paged results slots in a connection object could be accumulated. With this update, the simple paged results slot is released correctly when a search fails, and unused simple paged results slots are no longer left in a connection object. 
* Previously, when several values of the same attribute were deleted using the ldapmodify command, and at least one of them was added again during the same operation, the equality index was not updated. As a consequence, an exact search for the re-added attribute value did not return the entry. The logic of the index code has been modified to update the index if at least one of the values in the entry changes, and the exact search for the re-added attribute value now returns the correct entry. 
* Prior to this update, when the cleanAllRUV task was running, a bogus attrlist_replace error message was logged repeatedly due to a memory corruption. With this update, the appropriate memory copy function memmove is used, which fixes the memory corruption. As a result, the error messages are no longer logged in this scenario. 
* To fix a simple paged results bug, an exclusive lock on a connection was previously added. This consequently caused a self deadlock in a particular case. With this update, the exclusive lock on a connection has been changed to the re-entrant type, and the self deadlock no longer occurs. 
* Previously, an unnecessary lock was sometimes acquired on a connection object, which could consequently cause a deadlock. A patch has been applied to remove the unnecessary locking, and the deadlock no longer occurs. 
After installing this update, the 389 server service will be restarted automatically.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-02-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-libs" release="26.el7_2" src="389-ds-base-1.3.4.0-26.el7_2.src.rpm" version="1.3.4.0"><filename>389-ds-base-libs-1.3.4.0-26.el7_2.x86_64.rpm</filename><sum type="sha256">b5531b1c33d16017bbcdd124a8319283993d7aec36bccb35cf2d22ef268dd395</sum></package><package arch="x86_64" name="389-ds-base-devel" release="26.el7_2" src="389-ds-base-1.3.4.0-26.el7_2.src.rpm" version="1.3.4.0"><filename>389-ds-base-devel-1.3.4.0-26.el7_2.x86_64.rpm</filename><sum type="sha256">fd214c9ffbaea18fec80be5aedead535d99f28e96b1b62e2a60c24137a94bba8</sum></package><package arch="x86_64" name="389-ds-base" release="26.el7_2" src="389-ds-base-1.3.4.0-26.el7_2.src.rpm" version="1.3.4.0"><filename>389-ds-base-1.3.4.0-26.el7_2.x86_64.rpm</filename><sum type="sha256">6f17fbb0de8e345725c57943020ced3b764aadcafe7279cc8ba9c487d2288844</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0741" id="CVE-2016-0741" title="389-Ds-Base: Worker Threads Do Not Detect Abnormally Closed Connections Causing Dos" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0204" id="RHSA-2016:0204-1" title="Rhsa-2016:0204-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290725" id="1290725" title="Simplepagedresults -- In The Search Error Case, Simple Paged Results Slot Was Not Released." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290726" id="1290726" title="The 'Eq' Index Does Not Get Updated Properly When Deleting And Re-Adding Attributes In The Same Ldapmodify Operation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1295684" id="1295684" title="Many Attrlist_Replace Errors In Connection With Cleanallruv" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299346" id="1299346" title="Deadlock On Connection Mutex" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299416" id="1299416" title="389-Ds-Base: Worker Threads Do Not Detect Abnormally Closed Connections Causing Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0258-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-1930, CVE-2016-1935) 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-02-18 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_2" src="thunderbird-38.6.0-1.el7_2.src.rpm" version="38.6.0"><filename>thunderbird-38.6.0-1.el7_2.x86_64.rpm</filename><sum type="sha256">be5753497886dcc50dbdb4567dc94ed7d17f6dd52b41b67979f5294ef3bface3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1930" id="CVE-2016-1930" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.6) (Mfsa 2016-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1935" id="CVE-2016-1935" title="Mozilla: Buffer Overflow In Webgl After Out Of Memory Allocation (Mfsa 2016-03)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0258" id="RHSA-2016:0258-1" title="Rhsa-2016:0258-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301818" id="1301818" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.6) (Mfsa 2016-01)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301821" id="1301821" title="Mozilla: Buffer Overflow In Webgl After Out Of Memory Allocation (Mfsa 2016-03)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0301-1</id><title>Openssl</title><description>A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker can potentially use this flaw to decrypt RSA-encrypted cipher text from a connection using a newer SSL/TLS protocol version, allowing them to decrypt such connections. This cross-protocol attack is publicly referred to as DROWN. (CVE-2016-0800) 
A flaw was found in the way malicious SSLv2 clients could negotiate SSLv2 ciphers that have been disabled on the server. This could result in weak SSLv2 ciphers being used for SSLv2 connections, making them vulnerable to man-in-the-middle attacks. (CVE-2015-3197) 
A side-channel attack was found that makes use of cache-bank conflicts on the Intel Sandy-Bridge microarchitecture. An attacker who has the ability to control code in a thread running on the same hyper-threaded core as the victim's thread that is performing decryption, could use this flaw to recover RSA private keys. (CVE-2016-0702) 
A double-free flaw was found in the way OpenSSL parsed certain malformed DSA (Digital Signature Algorithm) private keys. An attacker could create specially crafted DSA private keys that, when processed by an application compiled against OpenSSL, could cause the application to crash. (CVE-2016-0705) 
An integer overflow flaw, leading to a NULL pointer dereference or a heap- based memory corruption, was found in the way some BIGNUM functions of OpenSSL were implemented. Applications that use these functions with large untrusted input could crash or, potentially, execute arbitrary code. (CVE-2016-0797) 
For the update  to take effect, all services linked to the OpenSSL library must be  restarted, or the system rebooted.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-03-01 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl-libs" release="51.el7_2.4" src="openssl-1.0.1e-51.el7_2.4.src.rpm" version="1.0.1e"><filename>openssl-libs-1.0.1e-51.el7_2.4.x86_64.rpm</filename><sum type="sha256">f860344bb0172cb399191695a0a071b15875dab349985ce5b281ad05e6297d29</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="51.el7_2.4" src="openssl-1.0.1e-51.el7_2.4.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-51.el7_2.4.x86_64.rpm</filename><sum type="sha256">8b028f3ec82f5ff80a856a16dcfd6f5ef85210cfd0e7ebac2837874bbf3d0d5c</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="51.el7_2.4" src="openssl-1.0.1e-51.el7_2.4.src.rpm" version="1.0.1e"><filename>openssl-libs-1.0.1e-51.el7_2.4.i686.rpm</filename><sum type="sha256">d0398bc829ea160458fbe6cba703d157d7aeb74aa3406c812afbd1c7cdfb828c</sum></package><package arch="x86_64" epoch="1" name="openssl-devel" release="51.el7_2.4" src="openssl-1.0.1e-51.el7_2.4.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-51.el7_2.4.x86_64.rpm</filename><sum type="sha256">db9f9715d20b805cf010422d5dc85fb645cd5eae2a5401988dc25a31c5ee3ba7</sum></package><package arch="i686" epoch="1" name="openssl-static" release="51.el7_2.4" src="openssl-1.0.1e-51.el7_2.4.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-51.el7_2.4.i686.rpm</filename><sum type="sha256">73687e91885ddb0f9c96ac4ed03df6e92a4129dc2d5624db62c095cd432de43e</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="51.el7_2.4" src="openssl-1.0.1e-51.el7_2.4.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-51.el7_2.4.i686.rpm</filename><sum type="sha256">75581efb5cfd8cc7bb2ab57d9fe2f23ae630fa1656575835158a309b8c083851</sum></package><package arch="x86_64" epoch="1" name="openssl" release="51.el7_2.4" src="openssl-1.0.1e-51.el7_2.4.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-51.el7_2.4.x86_64.rpm</filename><sum type="sha256">0843d1de797a996ebd49ef59bfe8ecf8e67e34ac3021c1348d82ea17f515e20a</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="51.el7_2.4" src="openssl-1.0.1e-51.el7_2.4.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-51.el7_2.4.x86_64.rpm</filename><sum type="sha256">900c78f4a6a967e35189d4a256df074bf1c1883780e5fd7add7e991ebbdf08b9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197" id="CVE-2015-3197" title="Openssl: Sslv2 Doesn'T Block Disabled Ciphers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0702" id="CVE-2016-0702" title="Openssl: Side Channel Attack On Modular Exponentiation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0705" id="CVE-2016-0705" title="Openssl: Double-Free In Dsa Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0797" id="CVE-2016-0797" title="Openssl: Bn_Hex2Bn/Bn_Dec2Bn Null Pointer Deref/Heap Corruption" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800" id="CVE-2016-0800" title="Ssl/Tls: Cross-Protocol Attack On Tls Using Sslv2 (Drown)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0301" id="RHSA-2016:0301-1" title="Rhsa-2016:0301-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301846" id="1301846" title="Openssl: Sslv2 Doesn'T Block Disabled Ciphers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310593" id="1310593" title="Ssl/Tls: Cross-Protocol Attack On Tls Using Sslv2 (Drown)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310596" id="1310596" title="Openssl: Double-Free In Dsa Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310599" id="1310599" title="Openssl: Side Channel Attack On Modular Exponentiation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311880" id="1311880" title="Openssl: Bn_Hex2Bn/Bn_Dec2Bn Null Pointer Deref/Heap Corruption" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0346-1</id><title>Postgresql</title><description>An integer overflow flaw, leading to a heap-based buffer overflow, was found in the PostgreSQL handling code for regular expressions. A remote attacker could use a specially crafted regular expression to cause PostgreSQL to crash or possibly execute arbitrary code. (CVE-2016-0773) 
If the postgresql service is running, it will be automatically restarted after installing this update.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-03-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="postgresql-plpython" release="1.el7_2" src="postgresql-9.2.15-1.el7_2.src.rpm" version="9.2.15"><filename>postgresql-plpython-9.2.15-1.el7_2.x86_64.rpm</filename><sum type="sha256">287f490657f80427405109693855b8d7916eb7f437dac6a68efe889ca9e18215</sum></package><package arch="x86_64" name="postgresql-plperl" release="1.el7_2" src="postgresql-9.2.15-1.el7_2.src.rpm" version="9.2.15"><filename>postgresql-plperl-9.2.15-1.el7_2.x86_64.rpm</filename><sum type="sha256">2d639591b0e4b93b5941a39f46be286b141410943c74980a5dd7ee5ff6ee307f</sum></package><package arch="x86_64" name="postgresql-server" release="1.el7_2" src="postgresql-9.2.15-1.el7_2.src.rpm" version="9.2.15"><filename>postgresql-server-9.2.15-1.el7_2.x86_64.rpm</filename><sum type="sha256">7505cf709f325510102d3729c186cddc2c396eeb1f8231ea957efd5d2aa0a6f2</sum></package><package arch="x86_64" name="postgresql-test" release="1.el7_2" src="postgresql-9.2.15-1.el7_2.src.rpm" version="9.2.15"><filename>postgresql-test-9.2.15-1.el7_2.x86_64.rpm</filename><sum type="sha256">9b70010a28fc5cec068cb877797774f66a323301bda84c6df50a3be74f1ba1e6</sum></package><package arch="x86_64" name="postgresql-contrib" release="1.el7_2" src="postgresql-9.2.15-1.el7_2.src.rpm" version="9.2.15"><filename>postgresql-contrib-9.2.15-1.el7_2.x86_64.rpm</filename><sum type="sha256">7343e9c9fd73c78f343dab4b65855046213ba921ee93f5171eef660fb4473f6f</sum></package><package arch="i686" name="postgresql" release="1.el7_2" src="postgresql-9.2.15-1.el7_2.src.rpm" version="9.2.15"><filename>postgresql-9.2.15-1.el7_2.i686.rpm</filename><sum type="sha256">af8390a2969ed094c4041d71c24db8e7df009f39548de30bd6a4e93ce488cbd5</sum></package><package arch="x86_64" name="postgresql" release="1.el7_2" src="postgresql-9.2.15-1.el7_2.src.rpm" version="9.2.15"><filename>postgresql-9.2.15-1.el7_2.x86_64.rpm</filename><sum type="sha256">386e0d370bd668d222c73ade34ebf5a8e3e25b300faa1ecb926f25c4981ee2a1</sum></package><package arch="x86_64" name="postgresql-devel" release="1.el7_2" src="postgresql-9.2.15-1.el7_2.src.rpm" version="9.2.15"><filename>postgresql-devel-9.2.15-1.el7_2.x86_64.rpm</filename><sum type="sha256">19b055cca3442157497ea49803fb68b91ec63df4d2c54f7b2b52cf2a3cf33e8f</sum></package><package arch="x86_64" name="postgresql-docs" release="1.el7_2" src="postgresql-9.2.15-1.el7_2.src.rpm" version="9.2.15"><filename>postgresql-docs-9.2.15-1.el7_2.x86_64.rpm</filename><sum type="sha256">5af664c45499db69c1ceafa9414a9de6d6a10b82bc3deec53a6d7f12f8fdeeab</sum></package><package arch="x86_64" name="postgresql-pltcl" release="1.el7_2" src="postgresql-9.2.15-1.el7_2.src.rpm" version="9.2.15"><filename>postgresql-pltcl-9.2.15-1.el7_2.x86_64.rpm</filename><sum type="sha256">faefd5b9c68d21f504bf3305a1382503ea5515a902407ae3edea7404b5c4ab0a</sum></package><package arch="i686" name="postgresql-devel" release="1.el7_2" src="postgresql-9.2.15-1.el7_2.src.rpm" version="9.2.15"><filename>postgresql-devel-9.2.15-1.el7_2.i686.rpm</filename><sum type="sha256">af6e38fb32f264a388c15c3dd14f85d52e8ba4894261dae8d58267a85ed585b9</sum></package><package arch="x86_64" name="postgresql-upgrade" release="1.el7_2" src="postgresql-9.2.15-1.el7_2.src.rpm" version="9.2.15"><filename>postgresql-upgrade-9.2.15-1.el7_2.x86_64.rpm</filename><sum type="sha256">c23de557cbefe21203815eff561bd1b3ed0280a454cc2f14eaf28506cc7ffead</sum></package><package arch="i686" name="postgresql-libs" release="1.el7_2" src="postgresql-9.2.15-1.el7_2.src.rpm" version="9.2.15"><filename>postgresql-libs-9.2.15-1.el7_2.i686.rpm</filename><sum type="sha256">b474568f28902bdee9679cb8138593597aa7f639607161dad6a66d80cb543c7a</sum></package><package arch="x86_64" name="postgresql-libs" release="1.el7_2" src="postgresql-9.2.15-1.el7_2.src.rpm" version="9.2.15"><filename>postgresql-libs-9.2.15-1.el7_2.x86_64.rpm</filename><sum type="sha256">c913be1ee1611211ecde904b1d82f40f7444381a16654a987bcc773bc093fe14</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0773" id="CVE-2016-0773" title="Postgresql: Case Insensitive Range Handling Integer Overflow Leading To Buffer Overflow" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0346" id="RHSA-2016:0346-1" title="Rhsa-2016:0346-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1303832" id="1303832" title="Postgresql: Case Insensitive Range Handling Integer Overflow Leading To Buffer Overflow" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0370-1</id><title>Nss-Util</title><description>A heap-based buffer overflow flaw was found in the way NSS parsed certain ASN.1 structures. An attacker could use this flaw to create a specially crafted certificate which, when parsed by NSS, could cause it to crash, or execute arbitrary code, using the permissions of the user running an application compiled against the NSS library. (CVE-2016-1950) 
For the update to take effect, all applications linked to the nss and nss- util library must be restarted, or the system rebooted.</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-03-09 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="nss-util-devel" release="9.el7_2" src="nss-util-3.19.1-9.el7_2.src.rpm" version="3.19.1"><filename>nss-util-devel-3.19.1-9.el7_2.i686.rpm</filename><sum type="sha256">f0f033ae198ac42e6cb2af50387a69a15d5876ec5ea9d45d87ec315c59d8df8b</sum></package><package arch="x86_64" name="nss-util" release="9.el7_2" src="nss-util-3.19.1-9.el7_2.src.rpm" version="3.19.1"><filename>nss-util-3.19.1-9.el7_2.x86_64.rpm</filename><sum type="sha256">0e9bb69662d165d08bda9dfe20912cf89ee578c3ff57a461d8eb1fdb083c86ca</sum></package><package arch="x86_64" name="nss-util-devel" release="9.el7_2" src="nss-util-3.19.1-9.el7_2.src.rpm" version="3.19.1"><filename>nss-util-devel-3.19.1-9.el7_2.x86_64.rpm</filename><sum type="sha256">d2b0b49b00620e83ee9259ccf2b8e0894da6f4629a6970f6b2bf8a1879289320</sum></package><package arch="i686" name="nss-util" release="9.el7_2" src="nss-util-3.19.1-9.el7_2.src.rpm" version="3.19.1"><filename>nss-util-3.19.1-9.el7_2.i686.rpm</filename><sum type="sha256">fbd9a82d5ee35a0bb4283c67e11c3d71f509f4b251cf0f224e76fc5e83dd57a0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1950" id="CVE-2016-1950" title="Nss: Heap Buffer Overflow Vulnerability In Asn1 Certificate Parsing (Mfsa 2016-35)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0370" id="RHSA-2016:0370-1" title="Rhsa-2016:0370-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310509" id="1310509" title="Nss: Heap Buffer Overflow Vulnerability In Asn1 Certificate Parsing (Mfsa 2016-35)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0372-1</id><title>Openssl098E</title><description>A padding oracle flaw was found in the Secure Sockets Layer version 2.0 (SSLv2) protocol. An attacker can potentially use this flaw to decrypt RSA-encrypted cipher text from a connection using a newer SSL/TLS protocol version, allowing them to decrypt such connections. This cross-protocol attack is publicly referred to as DROWN. (CVE-2016-0800) 
It was discovered that the SSLv2 servers using OpenSSL accepted SSLv2 connection handshakes that indicated non-zero clear key length for non- export cipher suites. An attacker could use this flaw to decrypt recorded SSLv2 sessions with the server by using it as a decryption oracle.(CVE-2016-0703) 
It was discovered that the SSLv2 protocol implementation in OpenSSL did not properly implement the Bleichenbacher protection for export cipher suites. An attacker could use a SSLv2 server using OpenSSL as a Bleichenbacher oracle. (CVE-2016-0704) 
Note: The CVE-2016-0703 and CVE-2016-0704 issues could allow for more efficient exploitation of the CVE-2016-0800 issue via the DROWN attack. 
A denial of service flaw was found in the way OpenSSL handled SSLv2 handshake messages. A remote attacker could use this flaw to cause a TLS/SSL server using OpenSSL to exit on a failed assertion if it had both the SSLv2 protocol and EXPORT-grade cipher suites enabled. (CVE-2015-0293) 
A flaw was found in the way malicious SSLv2 clients could negotiate SSLv2 ciphers that have been disabled on the server. This could result in weak SSLv2 ciphers being used for SSLv2 connections, making them vulnerable to man-in-the-middle attacks. (CVE-2015-3197) 
For the update to take effect, all services linked to the openssl098e library must be restarted, or the system rebooted.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-03-09 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openssl098e" release="29.el7_2.3" src="openssl098e-0.9.8e-29.el7_2.3.src.rpm" version="0.9.8e"><filename>openssl098e-0.9.8e-29.el7_2.3.x86_64.rpm</filename><sum type="sha256">b828e85c2ef68986b60491926435a82078f3fe7259fb9ebeecef337dadf174f2</sum></package><package arch="i686" name="openssl098e" release="29.el7_2.3" src="openssl098e-0.9.8e-29.el7_2.3.src.rpm" version="0.9.8e"><filename>openssl098e-0.9.8e-29.el7_2.3.i686.rpm</filename><sum type="sha256">ce3fafbf8d231d2b0981810d705c3cea815fd15d1dacfb4ed69aae54df77b623</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0293" id="CVE-2015-0293" title="Openssl: Assertion Failure In Sslv2 Servers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3197" id="CVE-2015-3197" title="Openssl: Sslv2 Doesn'T Block Disabled Ciphers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0703" id="CVE-2016-0703" title="Openssl: Divide-And-Conquer Session Key Recovery In Sslv2" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0704" id="CVE-2016-0704" title="Openssl: Sslv2 Bleichenbacher Protection Overwrites Wrong Bytes For Export Ciphers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0800" id="CVE-2016-0800" title="Ssl/Tls: Cross-Protocol Attack On Tls Using Sslv2 (Drown)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0372" id="RHSA-2016:0372-1" title="Rhsa-2016:0372-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1202404" id="1202404" title="Openssl: Assertion Failure In Sslv2 Servers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301846" id="1301846" title="Openssl: Sslv2 Doesn'T Block Disabled Ciphers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310593" id="1310593" title="Ssl/Tls: Cross-Protocol Attack On Tls Using Sslv2 (Drown)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310811" id="1310811" title="Openssl: Divide-And-Conquer Session Key Recovery In Sslv2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310814" id="1310814" title="Openssl: Sslv2 Bleichenbacher Protection Overwrites Wrong Bytes For Export Ciphers" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0373-1</id><title>Firefox</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-1952, CVE-2016-1954, CVE-2016-1957, CVE-2016-1958, CVE-2016-1960, CVE-2016-1961, CVE-2016-1962, CVE-2016-1973, CVE-2016-1974, CVE-2016-1964, CVE-2016-1965, CVE-2016-1966) 
Multiple security flaws were found in the graphite2 font library shipped with Firefox. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-1977, CVE-2016-2790, CVE-2016-2791, CVE-2016-2792, CVE-2016-2793, CVE-2016-2794, CVE-2016-2795, CVE-2016-2796, CVE-2016-2797, CVE-2016-2798, CVE-2016-2799, CVE-2016-2800, CVE-2016-2801, CVE-2016-2802) 
After installing the update, Firefox must be restarted for the changes to take effect.</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-03-09 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_2" src="firefox-38.7.0-1.el7_2.src.rpm" version="38.7.0"><filename>firefox-38.7.0-1.el7_2.x86_64.rpm</filename><sum type="sha256">0e759b86c693060a68826d23746ea887291a12ca39f8590c1418efbd58a8836f</sum></package><package arch="i686" name="firefox" release="1.el7_2" src="firefox-38.7.0-1.el7_2.src.rpm" version="38.7.0"><filename>firefox-38.7.0-1.el7_2.i686.rpm</filename><sum type="sha256">6d6b5fcd3d22171a098f695699815d5da5df0f42a36b663744f13ea3891673ef</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952" id="CVE-2016-1952" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.7) (Mfsa 2016-16)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954" id="CVE-2016-1954" title="Mozilla: Local File Overwriting And Potential Privilege Escalation Through Csp Reports (Mfsa 2016-17)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957" id="CVE-2016-1957" title="Mozilla: Memory Leak In Libstagefright When Deleting An Array During Mp4 Processing (Mfsa 2016-20)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1958" id="CVE-2016-1958" title="Mozilla: Displayed Page Address Can Be Overridden (Mfsa 2016-21)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960" id="CVE-2016-1960" title="Mozilla: Use-After-Free In Html5 String Parser (Mfsa 2016-23)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961" id="CVE-2016-1961" title="Mozilla: Use-After-Free In Setbody (Mfsa 2016-24)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1962" id="CVE-2016-1962" title="Mozilla: Use-After-Free When Using Multiple Webrtc Data Channels (Mfsa 2016-25)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964" id="CVE-2016-1964" title="Mozilla: Use-After-Free During Xml Transformations (Mfsa 2016-27)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1965" id="CVE-2016-1965" title="Mozilla: Addressbar Spoofing Though History Navigation And Location Protocol Property (Mfsa 2016-28)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966" id="CVE-2016-1966" title="Mozilla: Memory Corruption With Malicious Npapi Plugin (Mfsa 2016-31)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1973" id="CVE-2016-1973" title="Mozilla: Use-After-Free In Getstaticinstance In Webrtc (Mfsa 2016-33)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974" id="CVE-2016-1974" title="Mozilla: Out-Of-Bounds Read In Html Parser Following A Failed Allocation (Mfsa 2016-34)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0373" id="RHSA-2016:0373-1" title="Rhsa-2016:0373-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315566" id="1315566" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.7) (Mfsa 2016-16)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315569" id="1315569" title="Mozilla: Local File Overwriting And Potential Privilege Escalation Through Csp Reports (Mfsa 2016-17)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315573" id="1315573" title="Mozilla: Memory Leak In Libstagefright When Deleting An Array During Mp4 Processing (Mfsa 2016-20)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315574" id="1315574" title="Mozilla: Displayed Page Address Can Be Overridden (Mfsa 2016-21)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315576" id="1315576" title="Mozilla: Use-After-Free In Html5 String Parser (Mfsa 2016-23)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315577" id="1315577" title="Mozilla: Use-After-Free In Setbody (Mfsa 2016-24)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315578" id="1315578" title="Mozilla: Use-After-Free When Using Multiple Webrtc Data Channels (Mfsa 2016-25)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315774" id="1315774" title="Mozilla: Use-After-Free During Xml Transformations (Mfsa 2016-27)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315775" id="1315775" title="Mozilla: Addressbar Spoofing Though History Navigation And Location Protocol Property (Mfsa 2016-28)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315778" id="1315778" title="Mozilla: Memory Corruption With Malicious Npapi Plugin (Mfsa 2016-31)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315782" id="1315782" title="Mozilla: Use-After-Free In Getstaticinstance In Webrtc (Mfsa 2016-33)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315785" id="1315785" title="Mozilla: Out-Of-Bounds Read In Html Parser Following A Failed Allocation (Mfsa 2016-34)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315795" id="1315795" title="Mozilla: Font Vulnerabilities In The Graphite 2 Library (Mfsa 2016-37)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0428-1</id><title>Libssh2</title><description>A type confusion issue was found in the way libssh2 generated ephemeral secrets for the diffie-hellman-group1 and diffie-hellman-group14 key exchange methods. This would cause an SSHv2 Diffie-Hellman handshake to use significantly less secure random parameters. (CVE-2016-0787) 
After installing these updated packages, all running applications using libssh2 must be restarted for this update to take effect.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-03-10 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libssh2-devel" release="10.el7_2.1" src="libssh2-1.4.3-10.el7_2.1.src.rpm" version="1.4.3"><filename>libssh2-devel-1.4.3-10.el7_2.1.i686.rpm</filename><sum type="sha256">3e89a0d673c1e017e6aa8c78bedae2e629243d4f4f3f803847dc897ecf21f001</sum></package><package arch="noarch" name="libssh2-docs" release="10.el7_2.1" src="libssh2-1.4.3-10.el7_2.1.src.rpm" version="1.4.3"><filename>libssh2-docs-1.4.3-10.el7_2.1.noarch.rpm</filename><sum type="sha256">51e429cf887c54de82745a9093a1bde7969c5c48db9776329b1c33ccc9f69b05</sum></package><package arch="i686" name="libssh2" release="10.el7_2.1" src="libssh2-1.4.3-10.el7_2.1.src.rpm" version="1.4.3"><filename>libssh2-1.4.3-10.el7_2.1.i686.rpm</filename><sum type="sha256">3bc909bd14b4e2bf742739c68471752403aa7d9e0385b0d8b36ff03cad1a1fa4</sum></package><package arch="x86_64" name="libssh2" release="10.el7_2.1" src="libssh2-1.4.3-10.el7_2.1.src.rpm" version="1.4.3"><filename>libssh2-1.4.3-10.el7_2.1.x86_64.rpm</filename><sum type="sha256">6e1ed5e725ecd4af411cb2eac5cd58201f54373d2169ab9a20bbede1ed1ea885</sum></package><package arch="x86_64" name="libssh2-devel" release="10.el7_2.1" src="libssh2-1.4.3-10.el7_2.1.src.rpm" version="1.4.3"><filename>libssh2-devel-1.4.3-10.el7_2.1.x86_64.rpm</filename><sum type="sha256">4bcc3f6abfbd21f0e25208d99231ce34a013ed532a73a5f2c4866b6f9432858a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0787" id="CVE-2016-0787" title="Libssh2: Bits/Bytes Confusion Resulting In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0428" id="RHSA-2016:0428-1" title="Rhsa-2016:0428-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1306021" id="1306021" title="Libssh2: Bits/Bytes Confusion Resulting In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0430-1</id><title>Xerces-C</title><description>It was discovered that the Xerces-C XML parser did not properly process certain XML input. By providing specially crafted XML data to an application using Xerces-C for XML processing, a remote attacker could exploit this flaw to cause an application crash or, possibly, execute arbitrary code with the privileges of the application. (CVE-2016-0729) 
After installing the update, all applications using Xerces-C must be restarted for the update to take effect.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-03-10 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="xerces-c-doc" release="8.el7_2" src="xerces-c-3.1.1-8.el7_2.src.rpm" version="3.1.1"><filename>xerces-c-doc-3.1.1-8.el7_2.noarch.rpm</filename><sum type="sha256">0b71ad93bc0ffca6ee54cc98a21deaeb3c83a054a09e9d993b0371bf28463768</sum></package><package arch="x86_64" name="xerces-c" release="8.el7_2" src="xerces-c-3.1.1-8.el7_2.src.rpm" version="3.1.1"><filename>xerces-c-3.1.1-8.el7_2.x86_64.rpm</filename><sum type="sha256">d666c91db489aa6ebf264b0a18cf3577b68fa7c07e203655e2f2380ee7fa4395</sum></package><package arch="i686" name="xerces-c-devel" release="8.el7_2" src="xerces-c-3.1.1-8.el7_2.src.rpm" version="3.1.1"><filename>xerces-c-devel-3.1.1-8.el7_2.i686.rpm</filename><sum type="sha256">d62b3bedbde313384e5888a22ec3e660d45dcb71bb99b41e04c0cfb298404562</sum></package><package arch="x86_64" name="xerces-c-devel" release="8.el7_2" src="xerces-c-3.1.1-8.el7_2.src.rpm" version="3.1.1"><filename>xerces-c-devel-3.1.1-8.el7_2.x86_64.rpm</filename><sum type="sha256">7073e640226a84270175d4b4188e97980246de4a8601f98101aea7718dc46a8f</sum></package><package arch="i686" name="xerces-c" release="8.el7_2" src="xerces-c-3.1.1-8.el7_2.src.rpm" version="3.1.1"><filename>xerces-c-3.1.1-8.el7_2.i686.rpm</filename><sum type="sha256">d589732895765185250be2c775602e2ee19260eaa8f5e57081a743f35de8ef76</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0729" id="CVE-2016-0729" title="Xerces-C: Parser Crashes On Malformed Input" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0430" id="RHSA-2016:0430-1" title="Rhsa-2016:0430-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312231" id="1312231" title="Xerces-C: Parser Crashes On Malformed Input" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0448-1</id><title>Samba</title><description>A flaw was found in the way Samba handled ACLs on symbolic links. An authenticated user could use this flaw to gain access to an arbitrary file or directory by overwriting its ACL. (CVE-2015-7560) 
After installing this update, the smb service will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-03-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="samba-client-libs" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-client-libs-4.2.3-12.el7_2.i686.rpm</filename><sum type="sha256">e7709e733bddb686be3c135d73faa326a48a28ec4c2c2e571a75da6b09fea7af</sum></package><package arch="x86_64" name="ctdb-devel" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>ctdb-devel-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">2c5f038bf4d5f7a6151f88bbacdae287cf79b2e3dd1610997e549bb09b2c0528</sum></package><package arch="x86_64" name="samba" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">28c5ccac77053079be0980f2cd6548afe112e1f73450000e0bc9b7ea420b87a9</sum></package><package arch="x86_64" name="samba-client-libs" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-client-libs-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">60a089e93c1b522a0bb6ea5425d4f076ea914a35a1f1849be0958e17c621aaf1</sum></package><package arch="x86_64" name="samba-libs" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-libs-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">c300183ee3473affeb91f392521e701dfe0d80fac3091e4a2716f49b6fc217e0</sum></package><package arch="x86_64" name="samba-dc-libs" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-dc-libs-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">843e7c592815ee749ef20445e320e6add4e3a5635046f1d947191f8780b24230</sum></package><package arch="i686" name="libwbclient" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>libwbclient-4.2.3-12.el7_2.i686.rpm</filename><sum type="sha256">8ca0d736148b6ed875693888c8398fc6abd5b2c707dfd0f2991415e72c292aad</sum></package><package arch="i686" name="samba-libs" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-libs-4.2.3-12.el7_2.i686.rpm</filename><sum type="sha256">032891eb90f6829f772fcbcf1a168d82acc242b591d9b666329bf364a57a2623</sum></package><package arch="x86_64" name="samba-devel" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-devel-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">c2103180ffef88552fdb9709a9b98b950930194d3e934df02e7f5c12086c271d</sum></package><package arch="x86_64" name="samba-winbind" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-winbind-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">58aedb8be5c6510c8b2d8793956e4d398f18e23e871e62b64c7e089a18306f59</sum></package><package arch="x86_64" name="ctdb-tests" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>ctdb-tests-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">84fdbdcc5125d17c23f50d89f6c83538738e3f8f452ebdab5548f55229978270</sum></package><package arch="x86_64" name="samba-test-libs" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-test-libs-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">d61be316f060a7bc50ef745a12e39dab233f59fafacf9752e8808090027de08c</sum></package><package arch="x86_64" name="samba-common-tools" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-common-tools-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">e23e7c0c44aeeb1066312c93155ab5c9bb711840a278dfa4f689689d03604491</sum></package><package arch="i686" name="samba-winbind-modules" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-winbind-modules-4.2.3-12.el7_2.i686.rpm</filename><sum type="sha256">e15c79c2499b9ff0a96d7af350158acfe85f5c925077344e45b6406e7a281568</sum></package><package arch="x86_64" name="libsmbclient-devel" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>libsmbclient-devel-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">47eae0fe56c90fe92d87bc30f299034173a4e55ce6b00f57e04e2468eab671db</sum></package><package arch="i686" name="samba-test-libs" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-test-libs-4.2.3-12.el7_2.i686.rpm</filename><sum type="sha256">e16fbc23e34d9ba5c1a3d7121351015acd43aa9d9bf5e737f744b484ceaf4191</sum></package><package arch="x86_64" name="libwbclient" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>libwbclient-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">ea1b1d9a547b32020e8b22c501290cc99acdfc4e6889f3bddd2953d0fe5bbdb3</sum></package><package arch="i686" name="libsmbclient-devel" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>libsmbclient-devel-4.2.3-12.el7_2.i686.rpm</filename><sum type="sha256">f8e9c2f1bca0906ed2141e237d8d8a9123728f7022166922bd0b68885bd68a3e</sum></package><package arch="x86_64" name="libsmbclient" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>libsmbclient-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">03b378bee192c6f425007d26331961eb3e7c137a0c3591ebe330e5720cb75ce2</sum></package><package arch="x86_64" name="samba-python" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-python-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">4c7755ad2799ab1b1942d572c0f3a78b70cd7313152327835857fffe98096df0</sum></package><package arch="i686" name="libsmbclient" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>libsmbclient-4.2.3-12.el7_2.i686.rpm</filename><sum type="sha256">cf338081d55a703791a42cc486a25a73fa98378ef1ad94c165d6e366d38b26b4</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-winbind-krb5-locator-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">813b138e0655cb6f8b8ef387c19a7a9293d9302300d8f152cd30318f4203c24d</sum></package><package arch="x86_64" name="samba-dc" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-dc-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">f7c4ebfef2e18ca99bb46e551ada24d0d5ffc38e4f72a82a202301cdb0ce26a4</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-vfs-glusterfs-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">af1065f9bae8b17934686a03a74edfb7449baab8a9bf427902cf2496b1a553bf</sum></package><package arch="noarch" name="samba-common" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-common-4.2.3-12.el7_2.noarch.rpm</filename><sum type="sha256">bb3f47122dbe5c188dfbad3f00fecea104d0faa3ea11030d605cf1d79363d1e8</sum></package><package arch="x86_64" name="samba-common-libs" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-common-libs-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">1c4c2ab5ece968037acfea79fc4420ff041b661eb60ed6860f19980eecd5fb12</sum></package><package arch="noarch" name="samba-pidl" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-pidl-4.2.3-12.el7_2.noarch.rpm</filename><sum type="sha256">6d2ec10514ceea3db4938572af49603f25ae5bec6ebd4aa0d1c1afa3901b1416</sum></package><package arch="x86_64" name="samba-winbind-clients" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-winbind-clients-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">7d236dfe6fba0e69dece866504a1840f410d9f5eb9f618945d7260c0b1c6ae40</sum></package><package arch="x86_64" name="samba-winbind-modules" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-winbind-modules-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">04d71a25941ea96c70b4216b1c808fbea09c6543692ee1d14195c6aa36f40e49</sum></package><package arch="i686" name="ctdb-devel" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>ctdb-devel-4.2.3-12.el7_2.i686.rpm</filename><sum type="sha256">4e67cb176c9db55c35f07e043922a0cf1f4d3e851020b24562ac53c510b1fb39</sum></package><package arch="i686" name="samba-devel" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-devel-4.2.3-12.el7_2.i686.rpm</filename><sum type="sha256">450ccbd2e30f988a973acd05949aa19ec25c8ef2f88a1a4c0e78aabfce255509</sum></package><package arch="x86_64" name="samba-test-devel" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-test-devel-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">9383fc2ffecb4c91c755101b275f3b34c68c6a511c0201736a48c7bb2748844f</sum></package><package arch="i686" name="libwbclient-devel" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>libwbclient-devel-4.2.3-12.el7_2.i686.rpm</filename><sum type="sha256">f6a22b04b2cd429494121fc60d35de939d16522f9845383f40e6b32aeb5d7d05</sum></package><package arch="x86_64" name="samba-test" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-test-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">db6b2e77bd5fda778439f80c20552cddfdd646a5d4c83caaed0640a56b619e4e</sum></package><package arch="x86_64" name="libwbclient-devel" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>libwbclient-devel-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">5e58fe0d420d73c1e8f5b78e1241a2946e14fb6a24b366e3e2c01c37b268787b</sum></package><package arch="x86_64" name="ctdb" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>ctdb-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">593d6c58b79ea1ccaa4652d12ab80daa548f0947dc025449d8c9824125ff11d1</sum></package><package arch="x86_64" name="samba-client" release="12.el7_2" src="samba-4.2.3-12.el7_2.src.rpm" version="4.2.3"><filename>samba-client-4.2.3-12.el7_2.x86_64.rpm</filename><sum type="sha256">3b6c6f2c82015e2ef7538afbab6d51a0d13b5f6d86032000f255511bd74eadbb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7560" id="CVE-2015-7560" title="Samba: Incorrect Acl Get/Set Allowed On Symlink Path" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0448" id="RHSA-2016:0448-1" title="Rhsa-2016:0448-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1309992" id="1309992" title="Samba: Incorrect Acl Get/Set Allowed On Symlink Path" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0459-1</id><title>Bind</title><description>A denial of service flaw was found in the way BIND parsed signature records for DNAME records. By sending a specially crafted query, a remote attacker could use this flaw to cause named to crash. (CVE-2016-1286) 
A denial of service flaw was found in the way BIND processed certain control channel input. A remote attacker able to send a malformed packet to the control channel could use this flaw to cause named to crash. (CVE-2016-1285) 
After installing the update, the BIND daemon (named) will be restarted automatically.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-03-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-libs" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-29.el7_2.3.x86_64.rpm</filename><sum type="sha256">a2482e397395f1a59207d41ccedbe84220d955636e031fd78a96078043b95593</sum></package><package arch="i686" epoch="32" name="bind-libs" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-29.el7_2.3.i686.rpm</filename><sum type="sha256">f6f31cc8564777144202832935a05a7b0679759ff68a5ab9ee985192e74d0835</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-pkcs11-utils-9.9.4-29.el7_2.3.x86_64.rpm</filename><sum type="sha256">8b62679eb60c2ad635e7a19417f3bd940593a0b3df2cd4c3f3ad6586167b40f1</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-sdb-9.9.4-29.el7_2.3.x86_64.rpm</filename><sum type="sha256">dea95ece054410abb1f4ff0bc3f5d11fc7633c45891c56cc6a4499585c5c9815</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-29.el7_2.3.x86_64.rpm</filename><sum type="sha256">405dcf0743f98a8886a8ff36406f7ecb6a76b8727a53987815b2658d73cbefd5</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-29.el7_2.3.x86_64.rpm</filename><sum type="sha256">627a1718398691afb524bfced714e3ce7452f816ffe55dc22b63e405133a58a0</sum></package><package arch="i686" epoch="32" name="bind-devel" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-29.el7_2.3.i686.rpm</filename><sum type="sha256">fc990cff06930b62d7d0cf066c93348e02ebab0b406069d2738c70530d49f96c</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-pkcs11-9.9.4-29.el7_2.3.x86_64.rpm</filename><sum type="sha256">f92c12310ae5fff7c05709853a69c5d8535e16670b8eed5def99c97a350f9785</sum></package><package arch="x86_64" epoch="32" name="bind" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-9.9.4-29.el7_2.3.x86_64.rpm</filename><sum type="sha256">fb9725cb3f251068da1a15b34c41af13ea4bcc79ffdf6d4392e1f1139cc9d44b</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-29.el7_2.3.i686.rpm</filename><sum type="sha256">a6833654e9e98b1594a49e7b75d45f1c104768fb9d215191c8f48b698d1bb7b1</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-29.el7_2.3.i686.rpm</filename><sum type="sha256">2847d91fa85782ff906300d4242685e4fb6cbbdb4d75f639d94e0940fdabc37d</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-sdb-chroot-9.9.4-29.el7_2.3.x86_64.rpm</filename><sum type="sha256">5689d840c00f9d3e6dfc9140b625235460e0e517839ebb8e237fa2bee0d800ad</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-29.el7_2.3.i686.rpm</filename><sum type="sha256">a145ffde7a072082202e89c87b0368d60242fb729045d0b733747b0d64c2e816</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-chroot-9.9.4-29.el7_2.3.x86_64.rpm</filename><sum type="sha256">40bee98c110fe28e77b0f39e4651236a8b9390668a1ecfff2a1ef9cb92c42596</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-29.el7_2.3.x86_64.rpm</filename><sum type="sha256">457da863c71953708aed2eaefbd56f677619d5cce6dc7b5b4991ee1e37df0dea</sum></package><package arch="noarch" epoch="32" name="bind-license" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-license-9.9.4-29.el7_2.3.noarch.rpm</filename><sum type="sha256">af1ea348b025df59b6c254493b13b009fd4691fe1fbcc4849e6826ed9b82b733</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-29.el7_2.3.i686.rpm</filename><sum type="sha256">e905b3152884d4dbc47aa80075f7d1b83a9954c9dd4a41751aaa22f590795802</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-29.el7_2.3.x86_64.rpm</filename><sum type="sha256">61d62a45cf5f2dba257dcae99e43411cc9c609eba0d9c989aa69ec50318d3b9e</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-utils-9.9.4-29.el7_2.3.x86_64.rpm</filename><sum type="sha256">bb737402e32abc1af47de9a6d70f2087fe40e60e3f38c30ddb692f6308abc1c8</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="29.el7_2.3" src="bind-9.9.4-29.el7_2.3.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-29.el7_2.3.x86_64.rpm</filename><sum type="sha256">01eeff743524fc83c28a1686d6447c5f08dd6a3ecc7b49334ab0f5d1dcc5e170</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1285" id="CVE-2016-1285" title="Bind: Malformed Packet Sent To Rndc Can Trigger " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1286" id="CVE-2016-1286" title="Bind: Malformed Signature Records For Dname " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0459" id="RHSA-2016:0459-1" title="Rhsa-2016:0459-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315674" id="1315674" title="Bind: Malformed Packet Sent To Rndc Can Trigger " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315680" id="1315680" title="Bind: Malformed Signature Records For Dname " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0460-1</id><title>Thunderbird</title><description>Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-1952, CVE-2016-1954, CVE-2016-1957, CVE-2016-1960, CVE-2016-1961, CVE-2016-1974, CVE-2016-1964, CVE-2016-1966) 
Multiple security flaws were found in the graphite2 font library shipped with Thunderbird. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-1977, CVE-2016-2790, CVE-2016-2791, CVE-2016-2792, CVE-2016-2793, CVE-2016-2794, CVE-2016-2795, CVE-2016-2796, CVE-2016-2797, CVE-2016-2798, CVE-2016-2799, CVE-2016-2800, CVE-2016-2801, CVE-2016-2802) 
After installing the update, Thunderbird must be restarted for the changes to take effect.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-03-16 00:00:00" /><restart_suggested>true</restart_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_2" src="thunderbird-38.7.0-1.el7_2.src.rpm" version="38.7.0"><filename>thunderbird-38.7.0-1.el7_2.x86_64.rpm</filename><sum type="sha256">769e5d94bbbe2693fece85c36ad1df7f1fafae106d27cb43bee615cc0ab841d4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1952" id="CVE-2016-1952" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.7) (Mfsa 2016-16)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1954" id="CVE-2016-1954" title="Mozilla: Local File Overwriting And Potential Privilege Escalation Through Csp Reports (Mfsa 2016-17)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1957" id="CVE-2016-1957" title="Mozilla: Memory Leak In Libstagefright When Deleting An Array During Mp4 Processing (Mfsa 2016-20)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1960" id="CVE-2016-1960" title="Mozilla: Use-After-Free In Html5 String Parser (Mfsa 2016-23)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1961" id="CVE-2016-1961" title="Mozilla: Use-After-Free In Setbody (Mfsa 2016-24)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1964" id="CVE-2016-1964" title="Mozilla: Use-After-Free During Xml Transformations (Mfsa 2016-27)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1966" id="CVE-2016-1966" title="Mozilla: Memory Corruption With Malicious Npapi Plugin (Mfsa 2016-31)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1974" id="CVE-2016-1974" title="Mozilla: Out-Of-Bounds Read In Html Parser Following A Failed Allocation (Mfsa 2016-34)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0460" id="RHSA-2016:0460-1" title="Rhsa-2016:0460-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315566" id="1315566" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:38.7) (Mfsa 2016-16)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315569" id="1315569" title="Mozilla: Local File Overwriting And Potential Privilege Escalation Through Csp Reports (Mfsa 2016-17)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315573" id="1315573" title="Mozilla: Memory Leak In Libstagefright When Deleting An Array During Mp4 Processing (Mfsa 2016-20)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315576" id="1315576" title="Mozilla: Use-After-Free In Html5 String Parser (Mfsa 2016-23)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315577" id="1315577" title="Mozilla: Use-After-Free In Setbody (Mfsa 2016-24)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315774" id="1315774" title="Mozilla: Use-After-Free During Xml Transformations (Mfsa 2016-27)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315778" id="1315778" title="Mozilla: Memory Corruption With Malicious Npapi Plugin (Mfsa 2016-31)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315785" id="1315785" title="Mozilla: Out-Of-Bounds Read In Html Parser Following A Failed Allocation (Mfsa 2016-34)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315795" id="1315795" title="Mozilla: Font Vulnerabilities In The Graphite 2 Library (Mfsa 2016-37)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0465-1</id><title>Openssh</title><description>It was discovered that the OpenSSH server did not sanitize data received in requests to enable X11 forwarding. An authenticated client with restricted SSH access could possibly use this flaw to bypass intended restrictions. (CVE-2016-3115) 
An access flaw was discovered in OpenSSH; the OpenSSH client did not correctly handle failures to generate authentication cookies for untrusted X11 forwarding. A malicious or compromised remote X application could possibly use this flaw to establish a trusted connection to the local X server, even if only untrusted X11 forwarding was requested. (CVE-2016-1908) 
After installing this update, the OpenSSH server daemon (sshd) will be restarted automatically.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-03-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openssh-server-sysvinit" release="25.el7_2" src="openssh-6.6.1p1-25.el7_2.src.rpm" version="6.6.1p1"><filename>openssh-server-sysvinit-6.6.1p1-25.el7_2.x86_64.rpm</filename><sum type="sha256">2692838d9d74842c0c0f2a28f6ddb783210f7f79bd54b4916a2475c303c1d6cd</sum></package><package arch="x86_64" name="openssh-keycat" release="25.el7_2" src="openssh-6.6.1p1-25.el7_2.src.rpm" version="6.6.1p1"><filename>openssh-keycat-6.6.1p1-25.el7_2.x86_64.rpm</filename><sum type="sha256">8f42ec8ff21e470a87ab317ef901060ac1f1ca1b6784a8793715c89a23f07377</sum></package><package arch="x86_64" name="openssh-clients" release="25.el7_2" src="openssh-6.6.1p1-25.el7_2.src.rpm" version="6.6.1p1"><filename>openssh-clients-6.6.1p1-25.el7_2.x86_64.rpm</filename><sum type="sha256">04418d3f6f71d7266a9b9b47b7f4566132b38de2443eba19f3744d1a8e0dc824</sum></package><package arch="x86_64" name="pam_ssh_agent_auth" release="9.25.el7_2" src="openssh-6.6.1p1-25.el7_2.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-9.25.el7_2.x86_64.rpm</filename><sum type="sha256">21459b9d29e4241c5470612de06ee22e2e46123eac193b0753a5abd1a44dbb48</sum></package><package arch="i686" name="pam_ssh_agent_auth" release="9.25.el7_2" src="openssh-6.6.1p1-25.el7_2.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-9.25.el7_2.i686.rpm</filename><sum type="sha256">d3707216dad453b1b364dca94669164611c988dc41563396b0153f77636c9550</sum></package><package arch="x86_64" name="openssh-server" release="25.el7_2" src="openssh-6.6.1p1-25.el7_2.src.rpm" version="6.6.1p1"><filename>openssh-server-6.6.1p1-25.el7_2.x86_64.rpm</filename><sum type="sha256">65cc29ad2edb9a9584b6975cfaa8f7e1fad503b7b753ce7de873070c27ba04b8</sum></package><package arch="x86_64" name="openssh" release="25.el7_2" src="openssh-6.6.1p1-25.el7_2.src.rpm" version="6.6.1p1"><filename>openssh-6.6.1p1-25.el7_2.x86_64.rpm</filename><sum type="sha256">bc28371abcd896cfd929e2fa9e440c8efb7d53bd87483c6e89f45be1b133a50a</sum></package><package arch="x86_64" name="openssh-askpass" release="25.el7_2" src="openssh-6.6.1p1-25.el7_2.src.rpm" version="6.6.1p1"><filename>openssh-askpass-6.6.1p1-25.el7_2.x86_64.rpm</filename><sum type="sha256">52c6385365effb793a137e2bcba1198deab32de1ebae19aac9fa9c7012c6d853</sum></package><package arch="x86_64" name="openssh-ldap" release="25.el7_2" src="openssh-6.6.1p1-25.el7_2.src.rpm" version="6.6.1p1"><filename>openssh-ldap-6.6.1p1-25.el7_2.x86_64.rpm</filename><sum type="sha256">1da6d194ee680ea93eedbab1900711acb14cc0544f9c6a5b983ab434ac166537</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1908" id="CVE-2016-1908" title="Openssh: Possible Fallback From Untrusted To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3115" id="CVE-2016-3115" title="Openssh: Missing Sanitisation Of Input For X11 " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0465" id="RHSA-2016:0465-1" title="Rhsa-2016:0465-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298741" id="1298741" title="Openssh: Possible Fallback From Untrusted To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1316829" id="1316829" title="Openssh: Missing Sanitisation Of Input For X11 " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0496-1</id><title>Git</title><description>An integer truncation flaw and an integer overflow flaw, both leading to a heap-based buffer overflow, were found in the way Git processed certain path information. A remote attacker could create a specially crafted Git repository that would cause a Git client or server to crash or, possibly, execute arbitrary code. (CVE-2016-2315, CVE-2016-2324)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-03-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="perl-Git-SVN" release="6.el7_2.1" src="git-1.8.3.1-6.el7_2.1.src.rpm" version="1.8.3.1"><filename>perl-Git-SVN-1.8.3.1-6.el7_2.1.noarch.rpm</filename><sum type="sha256">45f34251c1c6f1dbd7f23a0f50ecc8b3ddc4b4a68e26199ee864b8a227c825e7</sum></package><package arch="noarch" name="git-p4" release="6.el7_2.1" src="git-1.8.3.1-6.el7_2.1.src.rpm" version="1.8.3.1"><filename>git-p4-1.8.3.1-6.el7_2.1.noarch.rpm</filename><sum type="sha256">956a1d80ac49ddbfb35aad769d908de0e16a5c02e3f5af84984f303a5d7f99bd</sum></package><package arch="noarch" name="perl-Git" release="6.el7_2.1" src="git-1.8.3.1-6.el7_2.1.src.rpm" version="1.8.3.1"><filename>perl-Git-1.8.3.1-6.el7_2.1.noarch.rpm</filename><sum type="sha256">fc48c412559734233698ded920e355b26bbec1946e7a751dc5516b82eda0ec77</sum></package><package arch="noarch" name="git-bzr" release="6.el7_2.1" src="git-1.8.3.1-6.el7_2.1.src.rpm" version="1.8.3.1"><filename>git-bzr-1.8.3.1-6.el7_2.1.noarch.rpm</filename><sum type="sha256">e4e5c040d1c185c6f8a38af8c96a167675430c14d2703214620866e8e761c336</sum></package><package arch="noarch" name="git-gui" release="6.el7_2.1" src="git-1.8.3.1-6.el7_2.1.src.rpm" version="1.8.3.1"><filename>git-gui-1.8.3.1-6.el7_2.1.noarch.rpm</filename><sum type="sha256">0132063cef0c60a58e5582643e6e6222df6c4c4b7c0e4287a161df8e7668be09</sum></package><package arch="noarch" name="gitweb" release="6.el7_2.1" src="git-1.8.3.1-6.el7_2.1.src.rpm" version="1.8.3.1"><filename>gitweb-1.8.3.1-6.el7_2.1.noarch.rpm</filename><sum type="sha256">b2e6f3ee7b01b70937bffa50eee9de883e823102b201999369763826ed4f5302</sum></package><package arch="noarch" name="git-hg" release="6.el7_2.1" src="git-1.8.3.1-6.el7_2.1.src.rpm" version="1.8.3.1"><filename>git-hg-1.8.3.1-6.el7_2.1.noarch.rpm</filename><sum type="sha256">3a9539d160e13f038b217518274245363f4a34010d1cd4f7a90615169aa2784a</sum></package><package arch="x86_64" name="git-svn" release="6.el7_2.1" src="git-1.8.3.1-6.el7_2.1.src.rpm" version="1.8.3.1"><filename>git-svn-1.8.3.1-6.el7_2.1.x86_64.rpm</filename><sum type="sha256">01702dc0ec592db885a08d25494df405394eefe5e65e532cac2c5fbfa7999bbc</sum></package><package arch="noarch" name="git-cvs" release="6.el7_2.1" src="git-1.8.3.1-6.el7_2.1.src.rpm" version="1.8.3.1"><filename>git-cvs-1.8.3.1-6.el7_2.1.noarch.rpm</filename><sum type="sha256">5f1e86accc69035913a63a4fb8675438d3a2dc95f7737c1911b59392b2eaeed9</sum></package><package arch="noarch" name="emacs-git-el" release="6.el7_2.1" src="git-1.8.3.1-6.el7_2.1.src.rpm" version="1.8.3.1"><filename>emacs-git-el-1.8.3.1-6.el7_2.1.noarch.rpm</filename><sum type="sha256">2381f59644fdc232ccaadddcd8f7363fb91e7fdcc6cba70c4006f76a0e8c4176</sum></package><package arch="noarch" name="emacs-git" release="6.el7_2.1" src="git-1.8.3.1-6.el7_2.1.src.rpm" version="1.8.3.1"><filename>emacs-git-1.8.3.1-6.el7_2.1.noarch.rpm</filename><sum type="sha256">290d53fb7eea2a796a19daf54e8543f25946450e99b22c0dcd0b209dd452c40c</sum></package><package arch="noarch" name="git-all" release="6.el7_2.1" src="git-1.8.3.1-6.el7_2.1.src.rpm" version="1.8.3.1"><filename>git-all-1.8.3.1-6.el7_2.1.noarch.rpm</filename><sum type="sha256">a771effab82abec35763b2efec6d99f0b71155096bafbc8dd157bcb698ad6770</sum></package><package arch="noarch" name="git-email" release="6.el7_2.1" src="git-1.8.3.1-6.el7_2.1.src.rpm" version="1.8.3.1"><filename>git-email-1.8.3.1-6.el7_2.1.noarch.rpm</filename><sum type="sha256">2d1f9e308a3b1b23ab5d1b74be86fa9b1f2b5a1c688139e3bb82380ae0ec3138</sum></package><package arch="noarch" name="gitk" release="6.el7_2.1" src="git-1.8.3.1-6.el7_2.1.src.rpm" version="1.8.3.1"><filename>gitk-1.8.3.1-6.el7_2.1.noarch.rpm</filename><sum type="sha256">6850f5b868b9fbe2eb292795c22e323f6deb99cff19b024857ce97f2ab5229c4</sum></package><package arch="x86_64" name="git-daemon" release="6.el7_2.1" src="git-1.8.3.1-6.el7_2.1.src.rpm" version="1.8.3.1"><filename>git-daemon-1.8.3.1-6.el7_2.1.x86_64.rpm</filename><sum type="sha256">7788272a94239d1f81310b41832b11ed7b2672b35c993c903747191ab4831bb8</sum></package><package arch="x86_64" name="git" release="6.el7_2.1" src="git-1.8.3.1-6.el7_2.1.src.rpm" version="1.8.3.1"><filename>git-1.8.3.1-6.el7_2.1.x86_64.rpm</filename><sum type="sha256">b4778ab11263c32b66b1c44a3275cdd004a6af567de307c440f66c321de96977</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2315" id="CVE-2016-2315" title="Git: Path_Name() Integer " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2324" id="CVE-2016-2324" title="Git: Path_Name() Integer " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0496" id="RHSA-2016:0496-1" title="Rhsa-2016:0496-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317981" id="1317981" title="Git: Path_Name() Integer " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0512-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* An improper type safety check was discovered in the Hotspot component. An untrusted Java application or applet could use this flaw to bypass Java Sandbox restrictions. (CVE-2016-0636)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-03-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.5.0.el7_2" src="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el7_2.src.rpm" version="1.7.0.99"><filename>java-1.7.0-openjdk-accessibility-1.7.0.99-2.6.5.0.el7_2.x86_64.rpm</filename><sum type="sha256">59a4e2af3633605629c711d32427982e069cc85dad91a1fd9e232fccf638b67f</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.5.0.el7_2" src="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el7_2.src.rpm" version="1.7.0.99"><filename>java-1.7.0-openjdk-demo-1.7.0.99-2.6.5.0.el7_2.x86_64.rpm</filename><sum type="sha256">6a15adff27b1950af7d34f71bfddb3151d33783233c3b8c93df999f4bcbe6ebd</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.5.0.el7_2" src="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el7_2.src.rpm" version="1.7.0.99"><filename>java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el7_2.x86_64.rpm</filename><sum type="sha256">05f6602826689ab79c983a970e267a2e7c8b122e33793e2854743ccb766c4278</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.5.0.el7_2" src="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el7_2.src.rpm" version="1.7.0.99"><filename>java-1.7.0-openjdk-javadoc-1.7.0.99-2.6.5.0.el7_2.noarch.rpm</filename><sum type="sha256">7baac06f2000b38a60bfb901b6301e57d65c362f9776e47c87828032921d59ac</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.5.0.el7_2" src="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el7_2.src.rpm" version="1.7.0.99"><filename>java-1.7.0-openjdk-devel-1.7.0.99-2.6.5.0.el7_2.x86_64.rpm</filename><sum type="sha256">4f0f33bbe5a2bd3223d619df07c21f917c998b40dab870561d01ee2d3a2628a2</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.5.0.el7_2" src="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el7_2.src.rpm" version="1.7.0.99"><filename>java-1.7.0-openjdk-src-1.7.0.99-2.6.5.0.el7_2.x86_64.rpm</filename><sum type="sha256">f97f7d935a119e88db2929f1e49e54f25d2107cd85413637a1cbb5e302589c30</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.5.0.el7_2" src="java-1.7.0-openjdk-1.7.0.99-2.6.5.0.el7_2.src.rpm" version="1.7.0.99"><filename>java-1.7.0-openjdk-headless-1.7.0.99-2.6.5.0.el7_2.x86_64.rpm</filename><sum type="sha256">9fcdf92a91d0ec81f901e2e6a74af0a9f577ab5cd72e67db83b2c964bbf320b6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636" id="CVE-2016-0636" title="Openjdk: Out-Of-Band Urgent Security Fix " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0512" id="RHSA-2016:0512-1" title="Rhsa-2016:0512-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320650" id="1320650" title="Openjdk: Out-Of-Band Urgent Security Fix " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0513-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* An improper type safety check was discovered in the Hotspot component. An untrusted Java application or applet could use this flaw to bypass Java Sandbox restrictions. (CVE-2016-0636)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-03-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.b03.el7_2" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el7_2.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.77-0.b03.el7_2.x86_64.rpm</filename><sum type="sha256">cba7e38472eaa51879cec44da09c9a1e44b602abc09faa20a4522f4044c20d78</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.b03.el7_2" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el7_2.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-src-debug-1.8.0.77-0.b03.el7_2.x86_64.rpm</filename><sum type="sha256">73b505613c41bcea634679dbbbccc748ba27c6e90a1ba3afbd8e8297bb7d328e</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.b03.el7_2" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el7_2.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-javadoc-1.8.0.77-0.b03.el7_2.noarch.rpm</filename><sum type="sha256">65190817eb968c8bcfb45b87b1bc177883bb33b8cf27441b2b0a217212549ace</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.b03.el7_2" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el7_2.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.77-0.b03.el7_2.x86_64.rpm</filename><sum type="sha256">58f9effdd48eb84be2ea3fcced33f55f480b183815add4f170e405fecca3e2fc</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.b03.el7_2" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el7_2.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-demo-1.8.0.77-0.b03.el7_2.x86_64.rpm</filename><sum type="sha256">d9d2bee278546f481e3be031e4a818dc375f0b1d8113e6d7595d90c4cc21513b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.b03.el7_2" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el7_2.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.77-0.b03.el7_2.x86_64.rpm</filename><sum type="sha256">ac9a0d9ef6deb32be79411d5aa7b332e810aed239bc1b5e58cff83f28d2c6283</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.b03.el7_2" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el7_2.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-accessibility-1.8.0.77-0.b03.el7_2.x86_64.rpm</filename><sum type="sha256">1622a330d543205984426e8f7ef2a4431ba18d209b2cd12d09b6e2afdc44a57f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.b03.el7_2" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el7_2.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-debug-1.8.0.77-0.b03.el7_2.x86_64.rpm</filename><sum type="sha256">163f13228914245c9d6438bc24970849d6fd4e6a5a8d7e91850b83d7e6daabd3</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.b03.el7_2" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el7_2.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.77-0.b03.el7_2.noarch.rpm</filename><sum type="sha256">b9bd0753d87b63915f72e9d3885e93bbdfe80d8778023d4f88be318a65525dc8</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.b03.el7_2" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el7_2.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-1.8.0.77-0.b03.el7_2.x86_64.rpm</filename><sum type="sha256">6b5bbeab2e8776b6b336d67b1e41069487fac0b7fe406831c8bbcf09fa93f340</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.b03.el7_2" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el7_2.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.77-0.b03.el7_2.x86_64.rpm</filename><sum type="sha256">23f545b282cc8f7ba25a87734e1ed81bdd7ba07ecb34afd9bbc351ff4911e762</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.b03.el7_2" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el7_2.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-devel-1.8.0.77-0.b03.el7_2.x86_64.rpm</filename><sum type="sha256">5070366bb1b283dbd863e8c7fa0c8e618318d1d91abf957d6d18e1181aba100f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.b03.el7_2" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el7_2.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-headless-1.8.0.77-0.b03.el7_2.x86_64.rpm</filename><sum type="sha256">482857174b7375a058408c6b9890721abb098e4b9ffbfce76000b8e51f84fee5</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.b03.el7_2" src="java-1.8.0-openjdk-1.8.0.77-0.b03.el7_2.src.rpm" version="1.8.0.77"><filename>java-1.8.0-openjdk-src-1.8.0.77-0.b03.el7_2.x86_64.rpm</filename><sum type="sha256">b83434bd40e29fe93fe3925f33d9d06a85063c0f476fd3f6c85d417c2fd9c031</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0636" id="CVE-2016-0636" title="Openjdk: Out-Of-Band Urgent Security Fix " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0513" id="RHSA-2016:0513-1" title="Rhsa-2016:0513-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320650" id="1320650" title="Openjdk: Out-Of-Band Urgent Security Fix " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0532-1</id><title>Krb5</title><description>Security Fix(es): 
* A memory leak flaw was found in the krb5_unparse_name() function of the MIT Kerberos kadmind service. An authenticated attacker could repeatedly send specially crafted requests to the server, which could cause the server to consume large amounts of memory resources, ultimately leading to a denial of service due to memory exhaustion. (CVE-2015-8631) 
* An out-of-bounds read flaw was found in the kadmind service of MIT Kerberos. An authenticated attacker could send a maliciously crafted message to force kadmind to read beyond the end of allocated memory, and write the memory contents to the KDC database if the attacker has write permission, leading to information disclosure. (CVE-2015-8629) 
* A NULL pointer dereference flaw was found in the procedure used by the MIT Kerberos kadmind service to store policies: the kadm5_create_principal_3() and kadm5_modify_principal() function did not ensure that a policy was given when KADM5_POLICY was set. An authenticated attacker with permissions to modify the database could use this flaw to add or modify a principal with a policy set to NULL, causing the kadmind service to crash. (CVE-2015-8630)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-04-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="krb5-libs" release="12.el7_2" src="krb5-1.13.2-12.el7_2.src.rpm" version="1.13.2"><filename>krb5-libs-1.13.2-12.el7_2.i686.rpm</filename><sum type="sha256">596812f18d9665ae593e8e4b8e3432bdc770f5c9695c6b2c7aa99a852c5f5d33</sum></package><package arch="x86_64" name="krb5-server-ldap" release="12.el7_2" src="krb5-1.13.2-12.el7_2.src.rpm" version="1.13.2"><filename>krb5-server-ldap-1.13.2-12.el7_2.x86_64.rpm</filename><sum type="sha256">f2009ea47f9e5e72b055d355d9cc1cfbc9996cabe370c5afdd58500ce3866780</sum></package><package arch="x86_64" name="krb5-libs" release="12.el7_2" src="krb5-1.13.2-12.el7_2.src.rpm" version="1.13.2"><filename>krb5-libs-1.13.2-12.el7_2.x86_64.rpm</filename><sum type="sha256">5867598ef75ebd47fd06c50ac03bd3c49f011f4b20b5ce723e8aee2fa8bdaba8</sum></package><package arch="x86_64" name="krb5-pkinit" release="12.el7_2" src="krb5-1.13.2-12.el7_2.src.rpm" version="1.13.2"><filename>krb5-pkinit-1.13.2-12.el7_2.x86_64.rpm</filename><sum type="sha256">17fb0b88cc1a5be9ddd6a05cac7603d0755a280a86705a98061058535eb480bb</sum></package><package arch="i686" name="krb5-devel" release="12.el7_2" src="krb5-1.13.2-12.el7_2.src.rpm" version="1.13.2"><filename>krb5-devel-1.13.2-12.el7_2.i686.rpm</filename><sum type="sha256">1b269da740afc47b6575da84f0e1a6e9a90f4d49e5f9a37a9dcf72e453f2e20f</sum></package><package arch="x86_64" name="krb5-server" release="12.el7_2" src="krb5-1.13.2-12.el7_2.src.rpm" version="1.13.2"><filename>krb5-server-1.13.2-12.el7_2.x86_64.rpm</filename><sum type="sha256">1a10e179773c277b88358aa9e01fe5b0539729832095a7db0f0bc10d9f687093</sum></package><package arch="x86_64" name="krb5-devel" release="12.el7_2" src="krb5-1.13.2-12.el7_2.src.rpm" version="1.13.2"><filename>krb5-devel-1.13.2-12.el7_2.x86_64.rpm</filename><sum type="sha256">91540cc88cfae64a61bdf4eb957123396981a449be026a90626d81f962b6deb2</sum></package><package arch="x86_64" name="krb5-workstation" release="12.el7_2" src="krb5-1.13.2-12.el7_2.src.rpm" version="1.13.2"><filename>krb5-workstation-1.13.2-12.el7_2.x86_64.rpm</filename><sum type="sha256">152bbffb1e908ead4211fca1ca0c8cf4baadd21acb9c496741a2488f49c2d885</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8629" id="CVE-2015-8629" title="Krb5: Xdr_Nullstring() Doesn'T Check For " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8630" id="CVE-2015-8630" title="Krb5: Krb5 Doesn'T Check For Null Policy When " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8631" id="CVE-2015-8631" title="Krb5: Memory Leak Caused By Supplying A Null " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0532" id="RHSA-2016:0532-1" title="Rhsa-2016:0532-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302617" id="1302617" title="Krb5: Xdr_Nullstring() Doesn'T Check For " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302632" id="1302632" title="Krb5: Krb5 Doesn'T Check For Null Policy When " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302642" id="1302642" title="Krb5: Memory Leak Caused By Supplying A Null " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0534-1</id><title>Mariadb</title><description>Security Fix(es): 
* It was found that the MariaDB client library did not properly check host names against server identities noted in the X.509 certificates when establishing secure connections using TLS/SSL. A man-in-the-middle attacker could possibly use this flaw to impersonate a server to a client. (CVE-2016-2047) 
(CVE-2015-4792, CVE-2015-4802, CVE-2015-4815, CVE-2015-4816, CVE-2015-4819, CVE-2015-4826, CVE-2015-4830, CVE-2015-4836, CVE-2015-4858, CVE-2015-4861, CVE-2015-4870, CVE-2015-4879, CVE-2015-4913, CVE-2016-0505, CVE-2016-0546, CVE-2016-0596, CVE-2016-0597, CVE-2016-0598, CVE-2016-0600, CVE-2016-0606, CVE-2016-0608, CVE-2016-0609, CVE-2016-0616) 
Bug Fix(es): 
* When more than one INSERT operation was executed concurrently on a non- empty InnoDB table with an AUTO_INCREMENT column defined as a primary key immediately after starting MariaDB, a race condition could occur. As a consequence, one of the concurrent INSERT operations failed with a "Duplicate key" error message. A patch has been applied to prevent the race condition. Now, each row inserted as a result of the concurrent INSERT operations receives a unique primary key, and the operations no longer fail in this scenario.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-04-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="mariadb-embedded" release="1.el7_2" src="mariadb-5.5.47-1.el7_2.src.rpm" version="5.5.47"><filename>mariadb-embedded-5.5.47-1.el7_2.i686.rpm</filename><sum type="sha256">23e19102b0d9aa7167c84ff4963318cd43128dfa2bddc57df6ed15b5cd5982f7</sum></package><package arch="x86_64" epoch="1" name="mariadb-bench" release="1.el7_2" src="mariadb-5.5.47-1.el7_2.src.rpm" version="5.5.47"><filename>mariadb-bench-5.5.47-1.el7_2.x86_64.rpm</filename><sum type="sha256">8221478f439399736d7bc61ecc878996fef2e1968aee701220bdea42f04b423c</sum></package><package arch="x86_64" epoch="1" name="mariadb-libs" release="1.el7_2" src="mariadb-5.5.47-1.el7_2.src.rpm" version="5.5.47"><filename>mariadb-libs-5.5.47-1.el7_2.x86_64.rpm</filename><sum type="sha256">469c496c3a04f0ec9704744b3afbe9bbc9d40eb7fd258059dbf0db5cd5c9c80c</sum></package><package arch="x86_64" epoch="1" name="mariadb-embedded" release="1.el7_2" src="mariadb-5.5.47-1.el7_2.src.rpm" version="5.5.47"><filename>mariadb-embedded-5.5.47-1.el7_2.x86_64.rpm</filename><sum type="sha256">82b8df14bea7b8a32e8b512e40fb98f094d6f8a6f5c9778c3f82c1a49d4764ec</sum></package><package arch="i686" epoch="1" name="mariadb-embedded-devel" release="1.el7_2" src="mariadb-5.5.47-1.el7_2.src.rpm" version="5.5.47"><filename>mariadb-embedded-devel-5.5.47-1.el7_2.i686.rpm</filename><sum type="sha256">cad29599ab8a260d82078ae3e423d9c632203bb5ee7cd627f4ce41a36bd22e03</sum></package><package arch="i686" epoch="1" name="mariadb-libs" release="1.el7_2" src="mariadb-5.5.47-1.el7_2.src.rpm" version="5.5.47"><filename>mariadb-libs-5.5.47-1.el7_2.i686.rpm</filename><sum type="sha256">b84d2a46b526cb52b875788c1db879173502178034a36ab86f73c170884e80ad</sum></package><package arch="x86_64" epoch="1" name="mariadb-embedded-devel" release="1.el7_2" src="mariadb-5.5.47-1.el7_2.src.rpm" version="5.5.47"><filename>mariadb-embedded-devel-5.5.47-1.el7_2.x86_64.rpm</filename><sum type="sha256">0a7a16152145f3599d6e803c1eea280f448e481c38a36bf2db8c2ba6ad9690cd</sum></package><package arch="x86_64" epoch="1" name="mariadb" release="1.el7_2" src="mariadb-5.5.47-1.el7_2.src.rpm" version="5.5.47"><filename>mariadb-5.5.47-1.el7_2.x86_64.rpm</filename><sum type="sha256">ebb2cd5609bc8c301d00843fd1788fc465267ac0c3fbc836dd6802f2d5100b6e</sum></package><package arch="x86_64" epoch="1" name="mariadb-test" release="1.el7_2" src="mariadb-5.5.47-1.el7_2.src.rpm" version="5.5.47"><filename>mariadb-test-5.5.47-1.el7_2.x86_64.rpm</filename><sum type="sha256">44c473f4a4063c48970243149256c6e29142d17b3715a31492c2cfacbb54330a</sum></package><package arch="x86_64" epoch="1" name="mariadb-server" release="1.el7_2" src="mariadb-5.5.47-1.el7_2.src.rpm" version="5.5.47"><filename>mariadb-server-5.5.47-1.el7_2.x86_64.rpm</filename><sum type="sha256">a7df1847a029edca4a65f9f3f1b6b39ccc6d16c86ad41fb6d9c0aba1b66207fb</sum></package><package arch="x86_64" epoch="1" name="mariadb-devel" release="1.el7_2" src="mariadb-5.5.47-1.el7_2.src.rpm" version="5.5.47"><filename>mariadb-devel-5.5.47-1.el7_2.x86_64.rpm</filename><sum type="sha256">e6c8edb544fd31d423a4b613246bd3e2e91a78139b03af632444d5d2e8286686</sum></package><package arch="i686" epoch="1" name="mariadb-devel" release="1.el7_2" src="mariadb-5.5.47-1.el7_2.src.rpm" version="5.5.47"><filename>mariadb-devel-5.5.47-1.el7_2.i686.rpm</filename><sum type="sha256">15b74ff81aee7b598b1bf1889cfa6b1a7a080294757cfa0fd660037f8ea5cf54</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4792" id="CVE-2015-4792" title="Mysql: Unspecified Vulnerability Related To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4802" id="CVE-2015-4802" title="Mysql: Unspecified Vulnerability Related To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4815" id="CVE-2015-4815" title="Mysql: Unspecified Vulnerability Related To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4816" id="CVE-2015-4816" title="Mysql: Unspecified Vulnerability Related To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4819" id="CVE-2015-4819" title="Mysql: Unspecified Vulnerability Related To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4826" id="CVE-2015-4826" title="Mysql: Unspecified Vulnerability Related To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4830" id="CVE-2015-4830" title="Mysql: Unspecified Vulnerability Related To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4836" id="CVE-2015-4836" title="Mysql: Unspecified Vulnerability Related To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4858" id="CVE-2015-4858" title="Mysql: Unspecified Vulnerability Related To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4861" id="CVE-2015-4861" title="Mysql: Unspecified Vulnerability Related To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4870" id="CVE-2015-4870" title="Mysql: Unspecified Vulnerability Related To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4879" id="CVE-2015-4879" title="Mysql: Unspecified Vulnerability Related To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4913" id="CVE-2015-4913" title="Mysql: Unspecified Vulnerability Related To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0505" id="CVE-2016-0505" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0546" id="CVE-2016-0546" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0596" id="CVE-2016-0596" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0597" id="CVE-2016-0597" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0598" id="CVE-2016-0598" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0600" id="CVE-2016-0600" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0606" id="CVE-2016-0606" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0608" id="CVE-2016-0608" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0609" id="CVE-2016-0609" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0616" id="CVE-2016-0616" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2047" id="CVE-2016-2047" title="Mysql: Ssl-Validate-Cert Incorrect Hostname Check" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0534" id="RHSA-2016:0534-1" title="Rhsa-2016:0534-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274752" id="1274752" title="Mysql: Unspecified Vulnerability Related To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274756" id="1274756" title="Mysql: Unspecified Vulnerability Related To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274759" id="1274759" title="Mysql: Unspecified Vulnerability Related To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274761" id="1274761" title="Mysql: Unspecified Vulnerability Related To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274764" id="1274764" title="Mysql: Unspecified Vulnerability Related To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274766" id="1274766" title="Mysql: Unspecified Vulnerability Related To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274767" id="1274767" title="Mysql: Unspecified Vulnerability Related To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274771" id="1274771" title="Mysql: Unspecified Vulnerability Related To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274773" id="1274773" title="Mysql: Unspecified Vulnerability Related To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274776" id="1274776" title="Mysql: Unspecified Vulnerability Related To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274781" id="1274781" title="Mysql: Unspecified Vulnerability Related To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274783" id="1274783" title="Mysql: Unspecified Vulnerability Related To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274794" id="1274794" title="Mysql: Unspecified Vulnerability Related To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301492" id="1301492" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301493" id="1301493" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301496" id="1301496" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301497" id="1301497" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301498" id="1301498" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301501" id="1301501" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301504" id="1301504" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301506" id="1301506" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301507" id="1301507" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301510" id="1301510" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301874" id="1301874" title="Mysql: Ssl-Validate-Cert Incorrect Hostname Check" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1303946" id="1303946" title="Duplicate Key With Auto Increment" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0594-1</id><title>Graphite2</title><description>The following packages have been upgraded to a newer upstream version: graphite2 (1.3.6). 
Security Fix(es): 
* Various vulnerabilities have been discovered in Graphite2. An attacker able to trick an unsuspecting user into opening specially crafted font files in an application using Graphite2 could exploit these flaws to cause the application to crash or, potentially, execute arbitrary code with the privileges of the application. (CVE-2016-1521, CVE-2016-1522, CVE-2016-1523, CVE-2016-1526)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-04-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="graphite2-devel" release="1.el7_2" src="graphite2-1.3.6-1.el7_2.src.rpm" version="1.3.6"><filename>graphite2-devel-1.3.6-1.el7_2.i686.rpm</filename><sum type="sha256">9558b82b4332ce5a507e80ee53064260478df0d1058017335331d7826d9e6a8a</sum></package><package arch="i686" name="graphite2" release="1.el7_2" src="graphite2-1.3.6-1.el7_2.src.rpm" version="1.3.6"><filename>graphite2-1.3.6-1.el7_2.i686.rpm</filename><sum type="sha256">179d26ac931d2c286526f6022504f4473ec4fc5bad3a81cf98783f689c7b2ff9</sum></package><package arch="x86_64" name="graphite2" release="1.el7_2" src="graphite2-1.3.6-1.el7_2.src.rpm" version="1.3.6"><filename>graphite2-1.3.6-1.el7_2.x86_64.rpm</filename><sum type="sha256">e7aeb32c207254a4d3841c4661b97ac344eb569f76e70106f898d4778b14c8a3</sum></package><package arch="x86_64" name="graphite2-devel" release="1.el7_2" src="graphite2-1.3.6-1.el7_2.src.rpm" version="1.3.6"><filename>graphite2-devel-1.3.6-1.el7_2.x86_64.rpm</filename><sum type="sha256">5655556de228d51aea50e4cceda1b21d5d89e14db0992514cfb488fe409f8c67</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1521" id="CVE-2016-1521" title="Graphite2: Out-Of-Bound Read Vulnerability Triggered By Crafted Fonts" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1522" id="CVE-2016-1522" title="Graphite2: Null Pointer Dereference And Out-Of-Bounds Access Vulnerabilities" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1523" id="CVE-2016-1523" title="Graphite2: Heap-Based Buffer Overflow In Context Item Handling Functionality" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1526" id="CVE-2016-1526" title="Graphite2: Out-Of-Bounds Read Vulnerability In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0594" id="RHSA-2016:0594-1" title="Rhsa-2016:0594-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305805" id="1305805" title="Graphite2: Out-Of-Bound Read Vulnerability Triggered By Crafted Fonts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305810" id="1305810" title="Graphite2: Null Pointer Dereference And Out-Of-Bounds Access Vulnerabilities" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305813" id="1305813" title="Graphite2: Heap-Based Buffer Overflow In Context Item Handling Functionality" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1308590" id="1308590" title="Graphite2: Out-Of-Bounds Read Vulnerability In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0612-1</id><title>Samba And Samba4</title><description>Security Fix(es): 
* Multiple flaws were found in Samba's DCE/RPC protocol implementation. A remote, authenticated attacker could use these flaws to cause a denial of service against the Samba server (high CPU load or a crash) or, possibly, execute arbitrary code with the permissions of the user running Samba (root). This flaw could also be used to downgrade a secure DCE/RPC connection by a man-in-the-middle attacker taking control of an Active Directory (AD) object and compromising the security of a Samba Active Directory Domain Controller (DC). (CVE-2015-5370) 
Note: While Samba packages as shipped in Scientific Linux do not support running Samba as an AD DC, this flaw applies to all roles Samba implements. 
* A protocol flaw, publicly referred to as Badlock, was found in the Security Account Manager Remote Protocol (MS-SAMR) and the Local Security Authority (Domain Policy) Remote Protocol (MS-LSAD). Any authenticated DCE/RPC connection that a client initiates against a server could be used by a man-in-the-middle attacker to impersonate the authenticated user against the SAMR or LSA service on the server. As a result, the attacker would be able to get read/write access to the Security Account Manager database, and use this to reveal all passwords or any other potentially sensitive information in that database. (CVE-2016-2118) 
* Several flaws were found in Samba's implementation of NTLMSSP authentication. An unauthenticated, man-in-the-middle attacker could use this flaw to clear the encryption and integrity flags of a connection, causing data to be transmitted in plain text. The attacker could also force the client or server into sending data in plain text even if encryption was explicitly requested for that connection. (CVE-2016-2110) 
* It was discovered that Samba configured as a Domain Controller would establish a secure communication channel with a machine using a spoofed computer name. A remote attacker able to observe network traffic could use this flaw to obtain session-related information about the spoofed machine. (CVE-2016-2111) 
* It was found that Samba's LDAP implementation did not enforce integrity protection for LDAP connections. A man-in-the-middle attacker could use this flaw to downgrade LDAP connections to use no integrity protection, allowing them to hijack such connections. (CVE-2016-2112) 
* It was found that Samba did not validate SSL/TLS certificates in certain connections. A man-in-the-middle attacker could use this flaw to spoof a Samba server using a specially crafted SSL/TLS certificate. (CVE-2016-2113) 
* It was discovered that Samba did not enforce Server Message Block (SMB) signing for clients using the SMB1 protocol. A man-in-the-middle attacker could use this flaw to modify traffic between a client and a server. (CVE-2016-2114) 
* It was found that Samba did not enable integrity protection for IPC traffic by default. A man-in-the-middle attacker could use this flaw to view and modify the data sent between a Samba server and a client. (CVE-2016-2115)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-04-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libldb" release="1.el7_2" src="libldb-1.1.25-1.el7_2.src.rpm" version="1.1.25"><filename>libldb-1.1.25-1.el7_2.x86_64.rpm</filename><sum type="sha256">f05668961c0cf86c2ea910ef67b97807d3ef89f603e442b29f37fc79a7978651</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-vfs-glusterfs-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">4d25314175df8affa19fe7bed11cd77f271ebef1fcf48c56c1fcbffa048ca0d1</sum></package><package arch="x86_64" name="ctdb" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>ctdb-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">6c8de2e3afa94b524cfe4cb5fbd5c0287239ef5f667a64254414aaf49d8c7979</sum></package><package arch="noarch" name="samba-pidl" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-pidl-4.2.10-6.el7_2.noarch.rpm</filename><sum type="sha256">7409c647e8eb9609b204d04007d4b563a83f0370860c82d8d7b9c5a500ebf9ef</sum></package><package arch="x86_64" name="libldb-devel" release="1.el7_2" src="libldb-1.1.25-1.el7_2.src.rpm" version="1.1.25"><filename>libldb-devel-1.1.25-1.el7_2.x86_64.rpm</filename><sum type="sha256">5c51e1b113aab4243b2d7484d0116430fa596f270ec0413bf2615e531ebfe953</sum></package><package arch="i686" name="samba-client-libs" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-client-libs-4.2.10-6.el7_2.i686.rpm</filename><sum type="sha256">0b9e2231fec8b5c3aca89e68b31a69e8d0514f003cf7cef761bed38c1c83d00f</sum></package><package arch="x86_64" name="pytalloc-devel" release="1.el7_2" src="libtalloc-2.1.5-1.el7_2.src.rpm" version="2.1.5"><filename>pytalloc-devel-2.1.5-1.el7_2.x86_64.rpm</filename><sum type="sha256">f689fc4a2759fefbae56e75663c57fd1c5853cea5ce8ab1f916bee9a012f15ab</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-winbind-krb5-locator-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">ce7541a31e2b785feaa4b2d6a786bdb32887234a71249c844c429f75c14e017a</sum></package><package arch="x86_64" name="ldb-tools" release="1.el7_2" src="libldb-1.1.25-1.el7_2.src.rpm" version="1.1.25"><filename>ldb-tools-1.1.25-1.el7_2.x86_64.rpm</filename><sum type="sha256">f695c2c582f67a1560a862e3aa78451934ba131165fb2833f65b5145aeb9abb1</sum></package><package arch="i686" name="libwbclient-devel" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>libwbclient-devel-4.2.10-6.el7_2.i686.rpm</filename><sum type="sha256">7ca72744a3dd448c8e803addc38a3c55d6b8b6e6644a7076bd49494fdaa33430</sum></package><package arch="i686" name="libtalloc" release="1.el7_2" src="libtalloc-2.1.5-1.el7_2.src.rpm" version="2.1.5"><filename>libtalloc-2.1.5-1.el7_2.i686.rpm</filename><sum type="sha256">130df52d9963184feae4fe7444a976e3d9dd43ff182098b135087b84282571ac</sum></package><package arch="x86_64" name="pytalloc" release="1.el7_2" src="libtalloc-2.1.5-1.el7_2.src.rpm" version="2.1.5"><filename>pytalloc-2.1.5-1.el7_2.x86_64.rpm</filename><sum type="sha256">c853d0192c2f4dde77ed85738bfbc17b73b05cf19eb6083af4f02ea3061670f8</sum></package><package arch="x86_64" name="samba-dc-libs" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-dc-libs-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">a64d0982e270bddd73e565dd97ca71bcea030b69a60d2d99e4cd8dfedf9ac6b8</sum></package><package arch="x86_64" name="openchange-client" release="10.el7_2" src="openchange-2.0-10.el7_2.src.rpm" version="2.0"><filename>openchange-client-2.0-10.el7_2.x86_64.rpm</filename><sum type="sha256">d9e3586f924bcc0bb4a98db3a37e05cd120c29402c6c1bdadc4f1a176e509a6e</sum></package><package arch="x86_64" name="samba" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">1e36b60d2264a8cbadee1db398e45f7eb4011f1da2328715771bb3d4917a7aec</sum></package><package arch="x86_64" name="samba-dc" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-dc-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">c4ea1a10f44d1b2e971c5dfda14cff1eaf9fc69dfb05287d9b7829f96ffeb9c4</sum></package><package arch="x86_64" name="python-tdb" release="1.el7_2" src="libtdb-1.3.8-1.el7_2.src.rpm" version="1.3.8"><filename>python-tdb-1.3.8-1.el7_2.x86_64.rpm</filename><sum type="sha256">ddb159a0ae228eb930879e7a6bc326896228f81f33b828f5e08429d4f26a7191</sum></package><package arch="x86_64" name="libtevent" release="1.el7_2" src="libtevent-0.9.26-1.el7_2.src.rpm" version="0.9.26"><filename>libtevent-0.9.26-1.el7_2.x86_64.rpm</filename><sum type="sha256">1a4205830d91aa81b4c1c48d3e3fcffa1866f452d12f91181c9c7c81c225b93b</sum></package><package arch="x86_64" name="samba-common-tools" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-common-tools-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">4d7652a3675ba30aebcd6175792cc8104ac29766bdb9997c8a327acfb68868d6</sum></package><package arch="x86_64" name="python-tevent" release="1.el7_2" src="libtevent-0.9.26-1.el7_2.src.rpm" version="0.9.26"><filename>python-tevent-0.9.26-1.el7_2.x86_64.rpm</filename><sum type="sha256">3e7adeb78edeef852b940483acbf1bbba1926cfeebcb131a3a8bce43d6d3fe87</sum></package><package arch="i686" name="libsmbclient" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>libsmbclient-4.2.10-6.el7_2.i686.rpm</filename><sum type="sha256">477957c3184300a20f5222ae319ded891b410db0b5b10b04fdfba49f1e5737ef</sum></package><package arch="x86_64" name="libsmbclient" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>libsmbclient-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">9535988ffe3d20cf23ecfe632ca58bb161e175297cd7c523cdc0833ba4634140</sum></package><package arch="x86_64" name="samba-winbind-clients" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-winbind-clients-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">7a30f787475854be74e0b3d96cff6e48fff51f996394c4f02002a29527d28353</sum></package><package arch="x86_64" name="samba-client" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-client-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">f1834d4678e19883c6cc710c4dbd6d1eedef09e02b163f061c9f63052cab78d5</sum></package><package arch="noarch" name="openchange-devel-docs" release="10.el7_2" src="openchange-2.0-10.el7_2.src.rpm" version="2.0"><filename>openchange-devel-docs-2.0-10.el7_2.noarch.rpm</filename><sum type="sha256">683c5dcf062e2c486c9a379a02a7021351c3cf195d046ef2f77c6bac25dc1e7b</sum></package><package arch="x86_64" name="samba-common-libs" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-common-libs-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">0630cd33ef4fb4ce856b6a44ffa8880fedf799aad2ba0aefd966f2414ce47ee0</sum></package><package arch="i686" name="libldb" release="1.el7_2" src="libldb-1.1.25-1.el7_2.src.rpm" version="1.1.25"><filename>libldb-1.1.25-1.el7_2.i686.rpm</filename><sum type="sha256">ffd1cfd5006774f2cd5dc3047dbbcad76ebb4c7522177c1e7995e4c76b16e112</sum></package><package arch="i686" name="libldb-devel" release="1.el7_2" src="libldb-1.1.25-1.el7_2.src.rpm" version="1.1.25"><filename>libldb-devel-1.1.25-1.el7_2.i686.rpm</filename><sum type="sha256">d04293c2b616988d4306a4353e13af87bf62e9ef8f174a7416df29ef245336ce</sum></package><package arch="x86_64" name="libtalloc" release="1.el7_2" src="libtalloc-2.1.5-1.el7_2.src.rpm" version="2.1.5"><filename>libtalloc-2.1.5-1.el7_2.x86_64.rpm</filename><sum type="sha256">921861bf3601b390dc20c5cb99d6d865f0ca5fdf0e7557cf5c4c57aa65374531</sum></package><package arch="i686" name="samba-libs" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-libs-4.2.10-6.el7_2.i686.rpm</filename><sum type="sha256">bc485c267f317e9a302a9c1e1017f86b08712fbd5a3111f67a41bc725ba4160f</sum></package><package arch="x86_64" name="samba-test-libs" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-test-libs-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">6de6b5be51f29cf6cf429ff6d716ccfa64632fd97bd509c6f6f226b72ce19ab3</sum></package><package arch="i686" name="libtalloc-devel" release="1.el7_2" src="libtalloc-2.1.5-1.el7_2.src.rpm" version="2.1.5"><filename>libtalloc-devel-2.1.5-1.el7_2.i686.rpm</filename><sum type="sha256">f42fa2d60581841b6eaba72bc93685979fc3bc855a406165b92ec049e48cddf5</sum></package><package arch="x86_64" name="libtdb" release="1.el7_2" src="libtdb-1.3.8-1.el7_2.src.rpm" version="1.3.8"><filename>libtdb-1.3.8-1.el7_2.x86_64.rpm</filename><sum type="sha256">76cd7925bfc58f4725f99359672c2f189d35b6aafc610544dc4f336da0a57a26</sum></package><package arch="i686" name="samba-winbind-modules" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-winbind-modules-4.2.10-6.el7_2.i686.rpm</filename><sum type="sha256">4410aad86ab1a4ed4b97bf2a9a49bd0c47e39e000411e5a792794e83d8c688a6</sum></package><package arch="x86_64" name="tdb-tools" release="1.el7_2" src="libtdb-1.3.8-1.el7_2.src.rpm" version="1.3.8"><filename>tdb-tools-1.3.8-1.el7_2.x86_64.rpm</filename><sum type="sha256">76644a06604039204b15efa910a49f514a810a87931e048e1dcdbcbeb2775c7a</sum></package><package arch="x86_64" name="libwbclient-devel" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>libwbclient-devel-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">94a08dcc5bee840a83dda5d2cc9362af7c9097368b768ec59a2fa8e95d97914e</sum></package><package arch="i686" name="libsmbclient-devel" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>libsmbclient-devel-4.2.10-6.el7_2.i686.rpm</filename><sum type="sha256">edbaef1755a5901933033014f5ca221fdcde89f29ddef38b0b9d5d757288a6be</sum></package><package arch="i686" name="samba-test-libs" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-test-libs-4.2.10-6.el7_2.i686.rpm</filename><sum type="sha256">7809cfb8c5c3f28d84fe2fb5a9def88a5049d3113e2d47e62268178e74828ca2</sum></package><package arch="i686" name="pyldb-devel" release="1.el7_2" src="libldb-1.1.25-1.el7_2.src.rpm" version="1.1.25"><filename>pyldb-devel-1.1.25-1.el7_2.i686.rpm</filename><sum type="sha256">eb5cc360976d9b60c8582501ae82cd7257e570f5221c3239c2496e8d3f3d3770</sum></package><package arch="x86_64" name="openchange-devel" release="10.el7_2" src="openchange-2.0-10.el7_2.src.rpm" version="2.0"><filename>openchange-devel-2.0-10.el7_2.x86_64.rpm</filename><sum type="sha256">6c614146704e4e62dff71379f16bdeb7ec95990a9fff53e7acbffb9d3e99066e</sum></package><package arch="i686" name="openchange" release="10.el7_2" src="openchange-2.0-10.el7_2.src.rpm" version="2.0"><filename>openchange-2.0-10.el7_2.i686.rpm</filename><sum type="sha256">53f4d9d0c1ab76de1cd96f98e100a58e359dafe5443b1d6bfea88a9c21cd399e</sum></package><package arch="i686" name="pytalloc" release="1.el7_2" src="libtalloc-2.1.5-1.el7_2.src.rpm" version="2.1.5"><filename>pytalloc-2.1.5-1.el7_2.i686.rpm</filename><sum type="sha256">cc1f6d3646452a3a8784f79a3655ef55b0ad8b2b40647ac1f3ab210664ddb793</sum></package><package arch="noarch" name="samba-common" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-common-4.2.10-6.el7_2.noarch.rpm</filename><sum type="sha256">4d3c5ad665ad86303bf3de74087a6ddd12aba23b2415a67558e7b7e8b4186982</sum></package><package arch="x86_64" name="samba-winbind-modules" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-winbind-modules-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">7b35bf444d9bc1e21dfe3ae43445ffa57a09f41eb178c913201464be6746d1da</sum></package><package arch="x86_64" name="samba-python" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-python-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">826759aae64d29c56d5887c473777755a7596084b51c183a26a834b140f3ff39</sum></package><package arch="x86_64" name="openchange" release="10.el7_2" src="openchange-2.0-10.el7_2.src.rpm" version="2.0"><filename>openchange-2.0-10.el7_2.x86_64.rpm</filename><sum type="sha256">a7bd6f7077789ca2e3c2c3cc46746eed9651af735b92024f1ae4ba7ae963603a</sum></package><package arch="x86_64" name="libwbclient" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>libwbclient-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">e5a9e45c5046b07151b2dc9816c834b7cf25667064ba21262866445cd2594e4d</sum></package><package arch="i686" name="openchange-devel" release="10.el7_2" src="openchange-2.0-10.el7_2.src.rpm" version="2.0"><filename>openchange-devel-2.0-10.el7_2.i686.rpm</filename><sum type="sha256">fed2136e1779011e7a305dfe5392435a270a014d303d5f89fcb171993fce0a16</sum></package><package arch="i686" name="ctdb-devel" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>ctdb-devel-4.2.10-6.el7_2.i686.rpm</filename><sum type="sha256">22f847b0ea804233377ad4bf29d5d0cd5e5616bbefa82719e88df6704150fcc7</sum></package><package arch="i686" name="libtdb-devel" release="1.el7_2" src="libtdb-1.3.8-1.el7_2.src.rpm" version="1.3.8"><filename>libtdb-devel-1.3.8-1.el7_2.i686.rpm</filename><sum type="sha256">afbcec196d9bc14bede0a4d3d389a16b550b7355fe623b4b0d000f77b845a141</sum></package><package arch="i686" name="samba-devel" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-devel-4.2.10-6.el7_2.i686.rpm</filename><sum type="sha256">ee1c410d40cf58e052f4c73b007d5db695f3d74ecdcfb482cfd807c8d7dc0856</sum></package><package arch="x86_64" name="samba-test-devel" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-test-devel-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">fa436b3f29e85492ba8eb7c115b29d54103e45d30cc4a6300a5f908a14d5c7e1</sum></package><package arch="x86_64" name="samba-winbind" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-winbind-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">425d9c0ba1e41a5caeadcff177accd931344a545b65c0a0876e0749f484b2f44</sum></package><package arch="x86_64" name="libtevent-devel" release="1.el7_2" src="libtevent-0.9.26-1.el7_2.src.rpm" version="0.9.26"><filename>libtevent-devel-0.9.26-1.el7_2.x86_64.rpm</filename><sum type="sha256">6b4fb6393195ebcd9ca18c59d744f88adebde0b26ceb6a739f2cca1dc2fa14f7</sum></package><package arch="i686" name="libtdb" release="1.el7_2" src="libtdb-1.3.8-1.el7_2.src.rpm" version="1.3.8"><filename>libtdb-1.3.8-1.el7_2.i686.rpm</filename><sum type="sha256">9ba3540209a935676ce5e90f5f1a1b3c0d28aac9ced78464f28b8a42714a8a42</sum></package><package arch="x86_64" name="libsmbclient-devel" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>libsmbclient-devel-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">35c2574b696f91e116d3d4586da787814725cbc5043a4dd693a32a9ea09349d0</sum></package><package arch="x86_64" name="pyldb-devel" release="1.el7_2" src="libldb-1.1.25-1.el7_2.src.rpm" version="1.1.25"><filename>pyldb-devel-1.1.25-1.el7_2.x86_64.rpm</filename><sum type="sha256">4921c718aa15f6d132514c3ee35658e02a99752e27d8f798da627e744ab7194d</sum></package><package arch="x86_64" name="ctdb-tests" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>ctdb-tests-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">4a84b31089ba0a919c1adc1fda81395c64145169db3a0e0d7e84a3dfe5e3e640</sum></package><package arch="x86_64" name="libtdb-devel" release="1.el7_2" src="libtdb-1.3.8-1.el7_2.src.rpm" version="1.3.8"><filename>libtdb-devel-1.3.8-1.el7_2.x86_64.rpm</filename><sum type="sha256">7093b01f8395081f0ebed8e63dfe773ecad8c0be9ea5fb3e20dc3b303f4af1db</sum></package><package arch="x86_64" name="samba-devel" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-devel-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">1709a4b5a6351ac7deb7e0ecb7bd6f4ae529611e1e6a75c87bde7d8ad4863690</sum></package><package arch="i686" name="libtevent" release="1.el7_2" src="libtevent-0.9.26-1.el7_2.src.rpm" version="0.9.26"><filename>libtevent-0.9.26-1.el7_2.i686.rpm</filename><sum type="sha256">7a1cb9f4e598b830a4facb25347947c12ab1ba8477f498aaba18d1471a6a7520</sum></package><package arch="i686" name="libtevent-devel" release="1.el7_2" src="libtevent-0.9.26-1.el7_2.src.rpm" version="0.9.26"><filename>libtevent-devel-0.9.26-1.el7_2.i686.rpm</filename><sum type="sha256">148837400abb10bb66ae40c0311abfd4c2039ad1bb89253d8d8d227a4ce36ac0</sum></package><package arch="x86_64" name="libtalloc-devel" release="1.el7_2" src="libtalloc-2.1.5-1.el7_2.src.rpm" version="2.1.5"><filename>libtalloc-devel-2.1.5-1.el7_2.x86_64.rpm</filename><sum type="sha256">969d6242cc8e8b9a1327aa204c24fd93c384e5ad987a8b0538f1818746ea0cbf</sum></package><package arch="i686" name="pytalloc-devel" release="1.el7_2" src="libtalloc-2.1.5-1.el7_2.src.rpm" version="2.1.5"><filename>pytalloc-devel-2.1.5-1.el7_2.i686.rpm</filename><sum type="sha256">a85e2711804b367d9b18de1c807f6b6939a6c41a34adf3d390ee1099f66379c3</sum></package><package arch="x86_64" name="samba-libs" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-libs-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">2c9cdc767252d695cd23aae1ddb1055bccee2107e97a60fda27a517f4d004f4b</sum></package><package arch="x86_64" name="samba-client-libs" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-client-libs-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">96c92f1f53711ad46d2ed79afc1f9f2b2ed2b861378ca51f587a2f53c294df30</sum></package><package arch="x86_64" name="ctdb-devel" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>ctdb-devel-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">781bb5392a0f1197285f9f9435c4e8b1d2d370db07d4e0bffc78a554f86c1b31</sum></package><package arch="x86_64" name="pyldb" release="1.el7_2" src="libldb-1.1.25-1.el7_2.src.rpm" version="1.1.25"><filename>pyldb-1.1.25-1.el7_2.x86_64.rpm</filename><sum type="sha256">8c001452d7b24b2fcd6e2a00e169a6ffaf7df98cb8e21901d7ef7cc3b1f4d458</sum></package><package arch="x86_64" name="samba-test" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>samba-test-4.2.10-6.el7_2.x86_64.rpm</filename><sum type="sha256">47d7d95c24f5f7fc26e797f7f7e321a74649038fdadf9cef0152cbd0f2f79ce1</sum></package><package arch="i686" name="python-tdb" release="1.el7_2" src="libtdb-1.3.8-1.el7_2.src.rpm" version="1.3.8"><filename>python-tdb-1.3.8-1.el7_2.i686.rpm</filename><sum type="sha256">1fb545f68f7575948929b5a6cd46b9c2328181ae883cdb1ae2726dea0fbf0fc4</sum></package><package arch="i686" name="libwbclient" release="6.el7_2" src="samba-4.2.10-6.el7_2.src.rpm" version="4.2.10"><filename>libwbclient-4.2.10-6.el7_2.i686.rpm</filename><sum type="sha256">74ade1cccd507798f5debc8dc286179e1ac9318a9b044edaaa69d5b0ad75498f</sum></package><package arch="i686" name="pyldb" release="1.el7_2" src="libldb-1.1.25-1.el7_2.src.rpm" version="1.1.25"><filename>pyldb-1.1.25-1.el7_2.i686.rpm</filename><sum type="sha256">bebbca7148e1caa5a06d6c392e604d29ad3befe89f0f7e705f1fdf958790414c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5370" id="CVE-2015-5370" title="Samba: Crash In Dcesrv_Auth_Bind_Ack Due To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2110" id="CVE-2016-2110" title="Samba: Man-In-The-Middle Attacks Possible With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2111" id="CVE-2016-2111" title="Samba: Spoofing Vulnerability When Domain " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2112" id="CVE-2016-2112" title="Samba: Missing Downgrade Detection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2113" id="CVE-2016-2113" title="Samba: Server Certificates Not Validated At " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2114" id="CVE-2016-2114" title="Samba: Samba Based Active Directory Domain " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2115" id="CVE-2016-2115" title="Samba: Smb Signing Not Required By Default When " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2118" id="CVE-2016-2118" title="Samba: Samr And Lsa Man In The Middle Attacks" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0612" id="RHSA-2016:0612-1" title="Rhsa-2016:0612-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1309987" id="1309987" title="Samba: Crash In Dcesrv_Auth_Bind_Ack Due To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311893" id="1311893" title="Samba: Man-In-The-Middle Attacks Possible With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311902" id="1311902" title="Samba: Spoofing Vulnerability When Domain " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311903" id="1311903" title="Samba: Missing Downgrade Detection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311910" id="1311910" title="Samba: Server Certificates Not Validated At " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312082" id="1312082" title="Samba: Samba Based Active Directory Domain " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312084" id="1312084" title="Samba: Smb Signing Not Required By Default When " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317990" id="1317990" title="Samba: Samr And Lsa Man In The Middle Attacks" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0650-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were discovered in the Serialization and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-0686, CVE-2016-0687) 
* It was discovered that the RMI server implementation in the JMX component in OpenJDK did not restrict which classes can be deserialized when deserializing authentication credentials. A remote, unauthenticated attacker able to connect to a JMX port could possibly use this flaw to trigger deserialization flaws. (CVE-2016-3427) 
* It was discovered that the JAXP component in OpenJDK failed to properly handle Unicode surrogate pairs used as part of the XML attribute values. Specially crafted XML input could cause a Java application to use an excessive amount of memory when parsed. (CVE-2016-3425) 
* It was discovered that the GCM (Galois/Counter Mode) implementation in the JCE component in OpenJDK used a non-constant time comparison when comparing GCM authentication tags. A remote attacker could possibly use this flaw to determine the value of the authentication tag. (CVE-2016-3426) 
* It was discovered that the Security component in OpenJDK failed to check the digest algorithm strength when generating DSA signatures. The use of a digest weaker than the key strength could lead to the generation of signatures that were weaker than expected. (CVE-2016-0695) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.b14.el7_2" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.91-0.b14.el7_2.noarch.rpm</filename><sum type="sha256">2a63ff24de922b4222b7683ca02280493e67a80c2c2d38bcdf43028dc8f4e87e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.b14.el7_2" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-src-1.8.0.91-0.b14.el7_2.x86_64.rpm</filename><sum type="sha256">8982600eb69bb3bd90d1cc401fedbe42460aa68fc5e1946c672b5107f4af8662</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.b14.el7_2" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.x86_64.rpm</filename><sum type="sha256">7c471326bd960306c4ea744d78e24ceaf27ed1009ac31d28f507a0f983374512</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.b14.el7_2" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-src-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm</filename><sum type="sha256">575b57461a3d9cfcc81e3f66a354b2ae379c37e5d244826bf2b82a92d180acf1</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.b14.el7_2" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm</filename><sum type="sha256">a5cb884881ee9afa22898aebdf887ff53bd3049240b91e69b3a66aedde0bcd84</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.b14.el7_2" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm</filename><sum type="sha256">17ae836818fa1824f5068f639c0d1d7dd97c4b216defca2aae57cad698ad9fcc</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.b14.el7_2" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-javadoc-1.8.0.91-0.b14.el7_2.noarch.rpm</filename><sum type="sha256">99a7e852578ec13254ccc414decef6c28c25367f866542e8f5ff87d68a0bd7f8</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.b14.el7_2" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-devel-1.8.0.91-0.b14.el7_2.x86_64.rpm</filename><sum type="sha256">95b0c186a49b86c8fcb91faf93e8b26b27522eef01074cbc3b95241e1eaaaa75</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.b14.el7_2" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm</filename><sum type="sha256">bf47f31d721fa84593bc192bd221c58b32886922b193810f1d1c40b6aeda4f15</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.b14.el7_2" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm</filename><sum type="sha256">d528f54cedfbe51fdc55c25ad19e7541a0a11de028ed8daa6f75205feb439125</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.b14.el7_2" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-accessibility-1.8.0.91-0.b14.el7_2.x86_64.rpm</filename><sum type="sha256">897c7cd34251e692f47f244f13e740e17144515d006c21bbfa77041900825063</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.b14.el7_2" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-demo-1.8.0.91-0.b14.el7_2.x86_64.rpm</filename><sum type="sha256">4334c46699adb20a82f76200d6d96a08eb3a3495dc93d9ebcc4494c5427115a3</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.b14.el7_2" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-headless-1.8.0.91-0.b14.el7_2.x86_64.rpm</filename><sum type="sha256">db8480d53f5af5f5f2fe8fb903f5dc5414ae32c8e22d31f8275deaeb3b694115</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.b14.el7_2" src="java-1.8.0-openjdk-1.8.0.91-0.b14.el7_2.src.rpm" version="1.8.0.91"><filename>java-1.8.0-openjdk-debug-1.8.0.91-0.b14.el7_2.x86_64.rpm</filename><sum type="sha256">dfc5d44f29ef9782521214f0c14eb66355d1690930e8ba90e3e487560497929d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" id="CVE-2016-0686" title="Openjdk: Insufficient Thread Consistency Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" id="CVE-2016-0687" title="Openjdk: Insufficient Byte Type Checks (Hotspot, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695" id="CVE-2016-0695" title="Openjdk: Insufficient Dsa Key Parameters Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425" id="CVE-2016-3425" title="Openjdk: Incorrect Handling Of Surrogate Pairs " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3426" id="CVE-2016-3426" title="Openjdk: Non-Constant Time Gcm Authentication " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" id="CVE-2016-3427" title="Openjdk: Unrestricted Deserialization Of " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0650" id="RHSA-2016:0650-1" title="Rhsa-2016:0650-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327743" id="1327743" title="Openjdk: Insufficient Thread Consistency Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327749" id="1327749" title="Openjdk: Insufficient Byte Type Checks (Hotspot, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328022" id="1328022" title="Openjdk: Insufficient Dsa Key Parameters Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328040" id="1328040" title="Openjdk: Incorrect Handling Of Surrogate Pairs " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328059" id="1328059" title="Openjdk: Non-Constant Time Gcm Authentication " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328210" id="1328210" title="Openjdk: Unrestricted Deserialization Of " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0676-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were discovered in the Serialization and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-0686, CVE-2016-0687) 
* It was discovered that the RMI server implementation in the JMX component in OpenJDK did not restrict which classes can be deserialized when deserializing authentication credentials. A remote, unauthenticated attacker able to connect to a JMX port could possibly use this flaw to trigger deserialization flaws. (CVE-2016-3427) 
* It was discovered that the JAXP component in OpenJDK failed to properly handle Unicode surrogate pairs used as part of the XML attribute values. Specially crafted XML input could cause a Java application to use an excessive amount of memory when parsed. (CVE-2016-3425) 
* It was discovered that the Security component in OpenJDK failed to check the digest algorithm strength when generating DSA signatures. The use of a digest weaker than the key strength could lead to the generation of signatures that were weaker than expected. (CVE-2016-0695)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-04-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.6.1.el7_2" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-javadoc-1.7.0.101-2.6.6.1.el7_2.noarch.rpm</filename><sum type="sha256">8b679f939388df296c5f476cb972b3df60bf0af3bf602263bdd0a12527e09530</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.6.1.el7_2" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-src-1.7.0.101-2.6.6.1.el7_2.x86_64.rpm</filename><sum type="sha256">f5e0ca74feaad48d1029667cb3d7a1db2fc98e492f0e02173e7048bcdede0e7b</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.6.1.el7_2" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-devel-1.7.0.101-2.6.6.1.el7_2.x86_64.rpm</filename><sum type="sha256">6dd8b566c54f26747efa5fe9fd4842209dfac3f873edce9375baf8d9e27a182b</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.6.1.el7_2" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-accessibility-1.7.0.101-2.6.6.1.el7_2.x86_64.rpm</filename><sum type="sha256">26c859c8bc3df7736cfe89691db0b88983ba9dd085555f7aac7f77123fe116f9</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.6.1.el7_2" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2.x86_64.rpm</filename><sum type="sha256">e1661ca6e58c808431fa5a904d322157865b87dd6b5d18ca1b3cae2b6a7f5835</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.6.1.el7_2" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-headless-1.7.0.101-2.6.6.1.el7_2.x86_64.rpm</filename><sum type="sha256">e533e4434009f0eb401ef078b04486e82ad006e695e3b4b05c2165dd1d1384a6</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.6.1.el7_2" src="java-1.7.0-openjdk-1.7.0.101-2.6.6.1.el7_2.src.rpm" version="1.7.0.101"><filename>java-1.7.0-openjdk-demo-1.7.0.101-2.6.6.1.el7_2.x86_64.rpm</filename><sum type="sha256">5c7a374e297ae167a96db7ec53433cd8a8e89297c2ab15c42a318e4595b859e2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" id="CVE-2016-0686" title="Openjdk: Insufficient Thread Consistency Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" id="CVE-2016-0687" title="Openjdk: Insufficient Byte Type Checks (Hotspot, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695" id="CVE-2016-0695" title="Openjdk: Insufficient Dsa Key Parameters Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425" id="CVE-2016-3425" title="Openjdk: Incorrect Handling Of Surrogate Pairs " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" id="CVE-2016-3427" title="Openjdk: Unrestricted Deserialization Of " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0676" id="RHSA-2016:0676-1" title="Rhsa-2016:0676-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327743" id="1327743" title="Openjdk: Insufficient Thread Consistency Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327749" id="1327749" title="Openjdk: Insufficient Byte Type Checks (Hotspot, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328022" id="1328022" title="Openjdk: Insufficient Dsa Key Parameters Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328040" id="1328040" title="Openjdk: Incorrect Handling Of Surrogate Pairs " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328210" id="1328210" title="Openjdk: Unrestricted Deserialization Of " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0685-1</id><title>Nss, Nspr, Nss-Softokn, And Nss-Util </title><description>The following packages have been upgraded to a newer upstream version: nss (3.21.0), nss-util (3.21.0), nspr (4.11.0). 
Security Fix(es): 
* A use-after-free flaw was found in the way NSS handled DHE (DiffieHellman key exchange) and ECDHE (Elliptic Curve Diffie-Hellman key exchange) handshake messages. A remote attacker could send a specially crafted handshake message that, when parsed by an application linked against NSS, would cause that application to crash or, under certain special conditions, execute arbitrary code using the permissions of the user running the application. (CVE-2016-1978) 
* A use-after-free flaw was found in the way NSS processed certain DER (Distinguished Encoding Rules) encoded cryptographic keys. An attacker could use this flaw to create a specially crafted DER encoded certificate which, when parsed by an application compiled against the NSS library, could cause that application to crash, or execute arbitrary code using the permissions of the user running the application. (CVE-2016-1979) 
Bug Fix(es): 
* The nss-softokn package has been updated to be compatible with NSS 3.21.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-04-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="nspr" release="1.el7_2" src="nspr-4.11.0-1.el7_2.src.rpm" version="4.11.0"><filename>nspr-4.11.0-1.el7_2.i686.rpm</filename><sum type="sha256">be95d0061b69f23ffd57d5ba6090d19f1a8f8037d3665ca03c60edcdc39b65c5</sum></package><package arch="i686" name="nss-softokn-freebl" release="14.2.el7_2" src="nss-softokn-3.16.2.3-14.2.el7_2.src.rpm" version="3.16.2.3"><filename>nss-softokn-freebl-3.16.2.3-14.2.el7_2.i686.rpm</filename><sum type="sha256">39d17a0aa7fc32e06a83fe6f77ceec5d696937ef83c2d40f3af7cba3f277c32a</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="9.el7_2" src="nss-3.21.0-9.el7_2.src.rpm" version="3.21.0"><filename>nss-pkcs11-devel-3.21.0-9.el7_2.x86_64.rpm</filename><sum type="sha256">36c31a3bcd5e9d458ac4a97ace57b1898800449995ccf379e992ba0f24a2440d</sum></package><package arch="i686" name="nss" release="9.el7_2" src="nss-3.21.0-9.el7_2.src.rpm" version="3.21.0"><filename>nss-3.21.0-9.el7_2.i686.rpm</filename><sum type="sha256">1a497b55b215f0838bcbaf21c58058a972fb9fab4d9b2a5b80fe0ffc9adf662b</sum></package><package arch="x86_64" name="nss-util" release="2.2.el7_2" src="nss-util-3.21.0-2.2.el7_2.src.rpm" version="3.21.0"><filename>nss-util-3.21.0-2.2.el7_2.x86_64.rpm</filename><sum type="sha256">b7dbbfa09ed40be761b83f96c524bb8b4dfa3f5b3a7a6840fedf7465cbb338e6</sum></package><package arch="x86_64" name="nss" release="9.el7_2" src="nss-3.21.0-9.el7_2.src.rpm" version="3.21.0"><filename>nss-3.21.0-9.el7_2.x86_64.rpm</filename><sum type="sha256">34225dbbc09895a8628f2f8163b675d87c541f5dcd025e36f1546c77de005723</sum></package><package arch="i686" name="nss-softokn-devel" release="14.2.el7_2" src="nss-softokn-3.16.2.3-14.2.el7_2.src.rpm" version="3.16.2.3"><filename>nss-softokn-devel-3.16.2.3-14.2.el7_2.i686.rpm</filename><sum type="sha256">a6b124dccf566ac65382645cf3a86d75fcfd75c0909d5000c8a5e4ac284f1d2d</sum></package><package arch="x86_64" name="nss-tools" release="9.el7_2" src="nss-3.21.0-9.el7_2.src.rpm" version="3.21.0"><filename>nss-tools-3.21.0-9.el7_2.x86_64.rpm</filename><sum type="sha256">0db1cf8135573de87ab085617d7b62c92b92da93756c4b20486b15b7629fe9a6</sum></package><package arch="i686" name="nspr-devel" release="1.el7_2" src="nspr-4.11.0-1.el7_2.src.rpm" version="4.11.0"><filename>nspr-devel-4.11.0-1.el7_2.i686.rpm</filename><sum type="sha256">981faea52cff528004b850efe029874aa3dfbb2d32e607308e70e8362c31f715</sum></package><package arch="x86_64" name="nss-util-devel" release="2.2.el7_2" src="nss-util-3.21.0-2.2.el7_2.src.rpm" version="3.21.0"><filename>nss-util-devel-3.21.0-2.2.el7_2.x86_64.rpm</filename><sum type="sha256">933ea854be4c73af9ac46e7242099edb90542725c1af33418083e7935c0e0e2c</sum></package><package arch="i686" name="nss-devel" release="9.el7_2" src="nss-3.21.0-9.el7_2.src.rpm" version="3.21.0"><filename>nss-devel-3.21.0-9.el7_2.i686.rpm</filename><sum type="sha256">e015294af9fd0deac92bf67bbf9a24d94cb4e2e62714f08bbc548d0722886ac0</sum></package><package arch="x86_64" name="nss-sysinit" release="9.el7_2" src="nss-3.21.0-9.el7_2.src.rpm" version="3.21.0"><filename>nss-sysinit-3.21.0-9.el7_2.x86_64.rpm</filename><sum type="sha256">7019d1ed57fcb1b3c0df697dbb76aad7f964e75c7bef896575b3874486450010</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="14.2.el7_2" src="nss-softokn-3.16.2.3-14.2.el7_2.src.rpm" version="3.16.2.3"><filename>nss-softokn-freebl-devel-3.16.2.3-14.2.el7_2.i686.rpm</filename><sum type="sha256">a615437b13891073e107d3578a901df2378aeedf1391dd70c811481560f43e6f</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="14.2.el7_2" src="nss-softokn-3.16.2.3-14.2.el7_2.src.rpm" version="3.16.2.3"><filename>nss-softokn-freebl-devel-3.16.2.3-14.2.el7_2.x86_64.rpm</filename><sum type="sha256">502f68f68e3409db8bd85b60796cf958a471e0c34d0187407d72b93ca44d0ce8</sum></package><package arch="i686" name="nss-util-devel" release="2.2.el7_2" src="nss-util-3.21.0-2.2.el7_2.src.rpm" version="3.21.0"><filename>nss-util-devel-3.21.0-2.2.el7_2.i686.rpm</filename><sum type="sha256">4da6689d4d9a826e9248c585233f2e430d5f5153fbd64609930c4afe9a7ed1ee</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="14.2.el7_2" src="nss-softokn-3.16.2.3-14.2.el7_2.src.rpm" version="3.16.2.3"><filename>nss-softokn-freebl-3.16.2.3-14.2.el7_2.x86_64.rpm</filename><sum type="sha256">6db6e8dd0f78e9712e1a9824f4f5f6a0b46720a394e740c218dfe2cdc65209e5</sum></package><package arch="x86_64" name="nspr" release="1.el7_2" src="nspr-4.11.0-1.el7_2.src.rpm" version="4.11.0"><filename>nspr-4.11.0-1.el7_2.x86_64.rpm</filename><sum type="sha256">4144aabd7a39600c1507a1b00093731a147908991ca89c63e12b7c74fb2aed7c</sum></package><package arch="x86_64" name="nss-softokn" release="14.2.el7_2" src="nss-softokn-3.16.2.3-14.2.el7_2.src.rpm" version="3.16.2.3"><filename>nss-softokn-3.16.2.3-14.2.el7_2.x86_64.rpm</filename><sum type="sha256">8ad2f6c1a797549fef8d30aa0beb80c87324e7cdd59cc768f3b5e6414bee0248</sum></package><package arch="i686" name="nss-util" release="2.2.el7_2" src="nss-util-3.21.0-2.2.el7_2.src.rpm" version="3.21.0"><filename>nss-util-3.21.0-2.2.el7_2.i686.rpm</filename><sum type="sha256">bcc8b3a21f9dd039a905a78c9828c8d0fb30cfe2f51f0ba5a2c2b72484cc7faf</sum></package><package arch="x86_64" name="nss-softokn-devel" release="14.2.el7_2" src="nss-softokn-3.16.2.3-14.2.el7_2.src.rpm" version="3.16.2.3"><filename>nss-softokn-devel-3.16.2.3-14.2.el7_2.x86_64.rpm</filename><sum type="sha256">ab89d9ec7d2c55b9be0e252b599e3dbe074a001047c71dcd3cc01c358ce24f5f</sum></package><package arch="x86_64" name="nspr-devel" release="1.el7_2" src="nspr-4.11.0-1.el7_2.src.rpm" version="4.11.0"><filename>nspr-devel-4.11.0-1.el7_2.x86_64.rpm</filename><sum type="sha256">8ddb1223bc838fcc268ac5c303594004e49ccd522ac5044127e40aa76791c262</sum></package><package arch="i686" name="nss-pkcs11-devel" release="9.el7_2" src="nss-3.21.0-9.el7_2.src.rpm" version="3.21.0"><filename>nss-pkcs11-devel-3.21.0-9.el7_2.i686.rpm</filename><sum type="sha256">ef05045df8fb7239dd3fc7995041ba666fd3b7307ec482d544bda68bdf0a4c7b</sum></package><package arch="i686" name="nss-softokn" release="14.2.el7_2" src="nss-softokn-3.16.2.3-14.2.el7_2.src.rpm" version="3.16.2.3"><filename>nss-softokn-3.16.2.3-14.2.el7_2.i686.rpm</filename><sum type="sha256">7b06918ce4ac3df6371c964ec877d6b35ae8e9238d9b40d622bc58375c9b8d5c</sum></package><package arch="x86_64" name="nss-devel" release="9.el7_2" src="nss-3.21.0-9.el7_2.src.rpm" version="3.21.0"><filename>nss-devel-3.21.0-9.el7_2.x86_64.rpm</filename><sum type="sha256">1456760bb6d29e43c78287da826a3a6b9ef7aa759c744e837242f25591705fef</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1978" id="CVE-2016-1978" title="Nss: Use-After-Free In Nss During Ssl " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1979" id="CVE-2016-1979" title="Nss: Use-After-Free During Processing Of Der " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0685" id="RHSA-2016:0685-1" title="Rhsa-2016:0685-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299872" id="1299872" title="Rebase Rhel 7.2.Z To Nspr 4.11 In Preparation For Firefox 45." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1303021" id="1303021" title="Rebase Rhel 7.2.Z To Nss-Util 3.21 In Preparation For Firefox 45." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310581" id="1310581" title="Rebase Rhel 7.2.Z To Nss 3.21 In Preparation For Firefox 45." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315202" id="1315202" title="Nss: Use-After-Free During Processing Of Der " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315565" id="1315565" title="Nss: Use-After-Free In Nss During Ssl " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0695-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.1.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-2805, CVE-2016-2806, CVE-2016-2807, CVE-2016-2808, CVE-2016-2814)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-04-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_2" src="firefox-45.1.0-1.el7_2.src.rpm" version="45.1.0"><filename>firefox-45.1.0-1.el7_2.i686.rpm</filename><sum type="sha256">fa7c75af52deb1e4f1211a3ff245ead9a847e7a25dfad3a29c1c6d82e9ac63ed</sum></package><package arch="x86_64" name="firefox" release="1.el7_2" src="firefox-45.1.0-1.el7_2.src.rpm" version="45.1.0"><filename>firefox-45.1.0-1.el7_2.x86_64.rpm</filename><sum type="sha256">240e3cf6b416c5cae6bc867653498ed7bc17e42958ac18bb03ae2eb073533492</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2805" id="CVE-2016-2805" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2806" id="CVE-2016-2806" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807" id="CVE-2016-2807" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2808" id="CVE-2016-2808" title="Mozilla: Write To Invalid Hashmap Entry Through " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2814" id="CVE-2016-2814" title="Mozilla: Buffer Overflow In Libstagefright With " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0695" id="RHSA-2016:0695-1" title="Rhsa-2016:0695-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330266" id="1330266" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330270" id="1330270" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330271" id="1330271" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330280" id="1330280" title="Mozilla: Buffer Overflow In Libstagefright With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330286" id="1330286" title="Mozilla: Write To Invalid Hashmap Entry Through " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0706-1</id><title>Mercurial</title><description>Security Fix(es): 
* It was discovered that Mercurial failed to properly check Git sub- repository URLs. A Mercurial repository that includes a Git sub-repository with a specially crafted URL could cause Mercurial to execute arbitrary code. (CVE-2016-3068) 
* It was discovered that the Mercurial convert extension failed to sanitize special characters in Git repository names. A Git repository with a specially crafted name could cause Mercurial to execute arbitrary code when the Git repository was converted to a Mercurial repository. (CVE-2016-3069)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-05-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="mercurial" release="6.el7_2" src="mercurial-2.6.2-6.el7_2.src.rpm" version="2.6.2"><filename>mercurial-2.6.2-6.el7_2.x86_64.rpm</filename><sum type="sha256">d80f88ffe560d7d7de1c4e8cfdf963fff2a14eced8f20de6a56d59402ea1ca7b</sum></package><package arch="x86_64" name="mercurial-hgk" release="6.el7_2" src="mercurial-2.6.2-6.el7_2.src.rpm" version="2.6.2"><filename>mercurial-hgk-2.6.2-6.el7_2.x86_64.rpm</filename><sum type="sha256">d99941b078cd03e72d1cfb39c340a92a9c9521c8393a5b7feefed6470cc36742</sum></package><package arch="x86_64" name="emacs-mercurial" release="6.el7_2" src="mercurial-2.6.2-6.el7_2.src.rpm" version="2.6.2"><filename>emacs-mercurial-2.6.2-6.el7_2.x86_64.rpm</filename><sum type="sha256">b96666b64b787631d2de446904cc38bff19fc23d4d0e721dd6a606482731edbd</sum></package><package arch="x86_64" name="emacs-mercurial-el" release="6.el7_2" src="mercurial-2.6.2-6.el7_2.src.rpm" version="2.6.2"><filename>emacs-mercurial-el-2.6.2-6.el7_2.x86_64.rpm</filename><sum type="sha256">157066cddb0e1f2a8e976d6a35c4586020518f0671bd72a36d086c453ce0cd70</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3068" id="CVE-2016-3068" title="Mercurial: Command Injection Via Git " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3069" id="CVE-2016-3069" title="Mercurial: Convert Extension Command Injection " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0706" id="RHSA-2016:0706-1" title="Rhsa-2016:0706-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319768" id="1319768" title="Mercurial: Command Injection Via Git " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320155" id="1320155" title="Mercurial: Convert Extension Command Injection " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0722-1</id><title>Openssl</title><description>Security Fix(es): 
* A flaw was found in the way OpenSSL encoded certain ASN.1 data structures. An attacker could use this flaw to create a specially crafted certificate which, when verified or re-encoded by OpenSSL, could cause it to crash, or execute arbitrary code using the permissions of the user running an application compiled against the OpenSSL library. (CVE-2016-2108) 
* Two integer overflow flaws, leading to buffer overflows, were found in the way the EVP_EncodeUpdate() and EVP_EncryptUpdate() functions of OpenSSL parsed very large amounts of input data. A remote attacker could use these flaws to crash an application using OpenSSL or, possibly, execute arbitrary code with the permissions of the user running that application. (CVE-2016-2105, CVE-2016-2106) 
* It was discovered that OpenSSL leaked timing information when decrypting TLS/SSL and DTLS protocol encrypted records when the connection used the AES CBC cipher suite and the server supported AES-NI. A remote attacker could possibly use this flaw to retrieve plain text from encrypted packets by using a TLS/SSL or DTLS server as a padding oracle. (CVE-2016-2107) 
* Several flaws were found in the way BIO_*printf functions were implemented in OpenSSL. Applications which passed large amounts of untrusted data through these functions could crash or potentially execute code with the permissions of the user running such an application. (CVE-2016-0799, CVE-2016-2842) 
* A denial of service flaw was found in the way OpenSSL parsed certain ASN.1-encoded data from BIO (OpenSSL's I/O abstraction) inputs. An application using OpenSSL that accepts untrusted ASN.1 BIO input could be forced to allocate an excessive amount of data. (CVE-2016-2109)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-05-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl-devel" release="51.el7_2.5" src="openssl-1.0.1e-51.el7_2.5.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-51.el7_2.5.x86_64.rpm</filename><sum type="sha256">ecdebbeca213993cc3ca0839feeef60ce8a19b5829d92cf5b1ce50ef8f8d3eb4</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="51.el7_2.5" src="openssl-1.0.1e-51.el7_2.5.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-51.el7_2.5.i686.rpm</filename><sum type="sha256">d8dda3900bc7639299967da5f22e9811951f82857d0e84384e3df16e2e620410</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="51.el7_2.5" src="openssl-1.0.1e-51.el7_2.5.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-51.el7_2.5.x86_64.rpm</filename><sum type="sha256">3f5e21adacadc91af62c74137490d1873a764eb4340a98cf8defc91045251cb0</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="51.el7_2.5" src="openssl-1.0.1e-51.el7_2.5.src.rpm" version="1.0.1e"><filename>openssl-libs-1.0.1e-51.el7_2.5.i686.rpm</filename><sum type="sha256">e5ad0043a20320f00ca5f4834ee2e631004f3287c750a901e4a0db642ba9ea2c</sum></package><package arch="x86_64" epoch="1" name="openssl-libs" release="51.el7_2.5" src="openssl-1.0.1e-51.el7_2.5.src.rpm" version="1.0.1e"><filename>openssl-libs-1.0.1e-51.el7_2.5.x86_64.rpm</filename><sum type="sha256">4d7b56c61c4203c2620a136160b7fd6e2178269306f5de70a9dd90deda06e8ed</sum></package><package arch="x86_64" epoch="1" name="openssl" release="51.el7_2.5" src="openssl-1.0.1e-51.el7_2.5.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-51.el7_2.5.x86_64.rpm</filename><sum type="sha256">28c30b5a7f8fac8b9f72319df6d92a528d37f280011ff53bd9bfc50002afc3c8</sum></package><package arch="i686" epoch="1" name="openssl-static" release="51.el7_2.5" src="openssl-1.0.1e-51.el7_2.5.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-51.el7_2.5.i686.rpm</filename><sum type="sha256">a75667d64f37920729f689709c66716531d96fb80ead74e952a88fd58d0af135</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="51.el7_2.5" src="openssl-1.0.1e-51.el7_2.5.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-51.el7_2.5.x86_64.rpm</filename><sum type="sha256">fcbbb837bcee3ee045ee0b43e2dd6d7db5f958a13f1dc366a79cc7c5ae951077</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0799" id="CVE-2016-0799" title="Openssl: Fix Memory Issues In Bio_*Printf Functions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2105" id="CVE-2016-2105" title="Openssl: Evp_Encodeupdate Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2106" id="CVE-2016-2106" title="Openssl: Evp_Encryptupdate Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2107" id="CVE-2016-2107" title="Openssl: Padding Oracle In Aes-Ni Cbc Mac Check" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2108" id="CVE-2016-2108" title="Openssl: Memory Corruption In The Asn.1 Encoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2109" id="CVE-2016-2109" title="Openssl: Asn.1 Bio Handling Of Large Amounts Of Data" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2842" id="CVE-2016-2842" title="Openssl: Doapr_Outch Function Does Not Verify " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0722" id="RHSA-2016:0722-1" title="Rhsa-2016:0722-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312219" id="1312219" title="Openssl: Fix Memory Issues In Bio_*Printf Functions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314757" id="1314757" title="Openssl: Doapr_Outch Function Does Not Verify " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330101" id="1330101" title="Openssl: Asn.1 Bio Handling Of Large Amounts Of Data" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331402" id="1331402" title="Openssl: Memory Corruption In The Asn.1 Encoder" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331426" id="1331426" title="Openssl: Padding Oracle In Aes-Ni Cbc Mac Check" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331441" id="1331441" title="Openssl: Evp_Encodeupdate Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331536" id="1331536" title="Openssl: Evp_Encryptupdate Overflow" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0723-1</id><title>Java-1.6.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were discovered in the Serialization and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-0686, CVE-2016-0687) 
* It was discovered that the RMI server implementation in the JMX component in OpenJDK did not restrict which classes can be deserialized when deserializing authentication credentials. A remote, unauthenticated attacker able to connect to a JMX port could possibly use this flaw to trigger deserialization flaws. (CVE-2016-3427) 
* It was discovered that the JAXP component in OpenJDK failed to properly handle Unicode surrogate pairs used as part of the XML attribute values. Specially crafted XML input could cause a Java application to use an excessive amount of memory when parsed. (CVE-2016-3425) 
* It was discovered that the Security component in OpenJDK failed to check the digest algorithm strength when generating DSA signatures. The use of a digest weaker than the key strength could lead to the generation of signatures that were weaker than expected. (CVE-2016-0695)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-05-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.11.0.el7_2" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-demo-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm</filename><sum type="sha256">fff0834238768371801451f1ebd72a37da01010edc180c850eb81b3d5d668d9e</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.11.0.el7_2" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-src-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm</filename><sum type="sha256">52f4ad107473b084e4d0ecc3fb5203b7fd4da6c4bbd67c014948817c77ec9eea</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.11.0.el7_2" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-devel-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm</filename><sum type="sha256">b9cc3cf00c89632ccb362d61f722ff73d59674006d84ba88975cedc0da0f5fd5</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.11.0.el7_2" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-javadoc-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm</filename><sum type="sha256">4cb910e0bfa07c777932dec05d20c91c5b8464c0f0b8bb848acee0b225182da7</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk" release="1.13.11.0.el7_2" src="java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2.src.rpm" version="1.6.0.39"><filename>java-1.6.0-openjdk-1.6.0.39-1.13.11.0.el7_2.x86_64.rpm</filename><sum type="sha256">76417197014d3c466ee180acdfbd9aabb1fe5104a3b44f4a5eb95220c52050f0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0686" id="CVE-2016-0686" title="Openjdk: Insufficient Thread Consistency Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0687" id="CVE-2016-0687" title="Openjdk: Insufficient Byte Type Checks (Hotspot, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0695" id="CVE-2016-0695" title="Openjdk: Insufficient Dsa Key Parameters Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3425" id="CVE-2016-3425" title="Openjdk: Incorrect Handling Of Surrogate Pairs " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3427" id="CVE-2016-3427" title="Openjdk: Unrestricted Deserialization Of " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0723" id="RHSA-2016:0723-1" title="Rhsa-2016:0723-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327743" id="1327743" title="Openjdk: Insufficient Thread Consistency Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327749" id="1327749" title="Openjdk: Insufficient Byte Type Checks (Hotspot, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328022" id="1328022" title="Openjdk: Insufficient Dsa Key Parameters Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328040" id="1328040" title="Openjdk: Incorrect Handling Of Surrogate Pairs " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328210" id="1328210" title="Openjdk: Unrestricted Deserialization Of " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0724-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* An out-of-bounds read/write access flaw was found in the way QEMU's VGA emulation with VESA BIOS Extensions (VBE) support performed read/write operations via I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host's QEMU process. (CVE-2016-3710)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-05-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-img" release="105.el7_2.4" src="qemu-kvm-1.5.3-105.el7_2.4.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-105.el7_2.4.x86_64.rpm</filename><sum type="sha256">bfcb3b21769f3240e3c7a1a5f60a70c45d0295a18b00184109046006ddc43451</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="105.el7_2.4" src="qemu-kvm-1.5.3-105.el7_2.4.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-105.el7_2.4.x86_64.rpm</filename><sum type="sha256">0833487742a890a81854d34ba0707113cc21e4103bb789940d2710fc54711d00</sum></package><package arch="x86_64" epoch="10" name="libcacard-tools" release="105.el7_2.4" src="qemu-kvm-1.5.3-105.el7_2.4.src.rpm" version="1.5.3"><filename>libcacard-tools-1.5.3-105.el7_2.4.x86_64.rpm</filename><sum type="sha256">c237e26c6dbf91c12a622babf887cc8010bc1e856f8a591d9ef624035727c173</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="105.el7_2.4" src="qemu-kvm-1.5.3-105.el7_2.4.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-105.el7_2.4.x86_64.rpm</filename><sum type="sha256">31605fdb953c021850973e381d706dd18171e49ac71e487bdc46d043de497a6e</sum></package><package arch="i686" epoch="10" name="libcacard-devel" release="105.el7_2.4" src="qemu-kvm-1.5.3-105.el7_2.4.src.rpm" version="1.5.3"><filename>libcacard-devel-1.5.3-105.el7_2.4.i686.rpm</filename><sum type="sha256">0b7d9979a9386490e019851a6a91f9b9464a4a50869dd84a1bdbf5d972a9dda4</sum></package><package arch="i686" epoch="10" name="libcacard" release="105.el7_2.4" src="qemu-kvm-1.5.3-105.el7_2.4.src.rpm" version="1.5.3"><filename>libcacard-1.5.3-105.el7_2.4.i686.rpm</filename><sum type="sha256">5a704cfc5591cd14302a74b27e8d38db4b5a9f0f1d22c89b5b03bf4042d03510</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="105.el7_2.4" src="qemu-kvm-1.5.3-105.el7_2.4.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-105.el7_2.4.x86_64.rpm</filename><sum type="sha256">441ba047c4e3a643443e7228db369432b9875162858e2e76944e2f4b1ce69ec3</sum></package><package arch="x86_64" epoch="10" name="libcacard-devel" release="105.el7_2.4" src="qemu-kvm-1.5.3-105.el7_2.4.src.rpm" version="1.5.3"><filename>libcacard-devel-1.5.3-105.el7_2.4.x86_64.rpm</filename><sum type="sha256">019fb62d67d76eafe5a3cf3579adb7e1fed0b45db9f4c75e3b44b9cb18597524</sum></package><package arch="x86_64" epoch="10" name="libcacard" release="105.el7_2.4" src="qemu-kvm-1.5.3-105.el7_2.4.src.rpm" version="1.5.3"><filename>libcacard-1.5.3-105.el7_2.4.x86_64.rpm</filename><sum type="sha256">26f3c387133663221b80060160c7712e5ea685b1da85e9934be90a237ff8827c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3710" id="CVE-2016-3710" title="Qemu: Incorrect Banked Access Bounds Checking In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0724" id="RHSA-2016:0724-1" title="Rhsa-2016:0724-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331401" id="1331401" title="Qemu: Incorrect Banked Access Bounds Checking In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:0726-1</id><title>Imagemagick</title><description>Security Fix(es): 
* It was discovered that ImageMagick did not properly sanitize certain input before passing it to the delegate functionality. A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would lead to arbitrary execution of shell commands with the privileges of the user running the application. (CVE-2016-3714) 
* It was discovered that certain ImageMagick coders and pseudo-protocols did not properly prevent security sensitive operations when processing specially crafted images. A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would allow the attacker to delete, move, or disclose the contents of arbitrary files. (CVE-2016-3715, CVE-2016-3716, CVE-2016-3717) 
* A server-side request forgery flaw was discovered in the way ImageMagick processed certain images. A remote attacker could exploit this flaw to mislead an application using ImageMagick or an unsuspecting user using the ImageMagick utilities into, for example, performing HTTP(S) requests or opening FTP sessions via specially crafted images. (CVE-2016-3718) 
Note: This update contains an updated /etc/ImageMagick/policy.xml file that disables the EPHEMERAL, HTTPS, HTTP, URL, FTP, MVG, MSL, TEXT, and LABEL coders. If you experience any problems after the update, it may be necessary to manually adjust the policy.xml file to match your requirements. Please take additional precautions to ensure that your applications using the ImageMagick library do not process malicious or untrusted files before doing so.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-05-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ImageMagick-devel" release="13.el7_2" src="ImageMagick-6.7.8.9-13.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-devel-6.7.8.9-13.el7_2.x86_64.rpm</filename><sum type="sha256">2cf430b97f16603257a91ef05c92780019b869482316eff691a58ba246be9cb6</sum></package><package arch="i686" name="ImageMagick-c++-devel" release="13.el7_2" src="ImageMagick-6.7.8.9-13.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-c++-devel-6.7.8.9-13.el7_2.i686.rpm</filename><sum type="sha256">310754ba2b08233333be9d9aee26abdeb6378939998e89978d6f17d65539591a</sum></package><package arch="x86_64" name="ImageMagick-doc" release="13.el7_2" src="ImageMagick-6.7.8.9-13.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-doc-6.7.8.9-13.el7_2.x86_64.rpm</filename><sum type="sha256">9abcd48937b6081362e371cdf7c7e2fa9714db86c5325032e789722db55dd6b5</sum></package><package arch="x86_64" name="ImageMagick-c++-devel" release="13.el7_2" src="ImageMagick-6.7.8.9-13.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-c++-devel-6.7.8.9-13.el7_2.x86_64.rpm</filename><sum type="sha256">c25a757546155611ada0e82fbc4cd81d9fd1a4456d7894d6b6a12f70f952729d</sum></package><package arch="x86_64" name="ImageMagick-perl" release="13.el7_2" src="ImageMagick-6.7.8.9-13.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-perl-6.7.8.9-13.el7_2.x86_64.rpm</filename><sum type="sha256">59e4ad860de8fc033a6a87eb4ee22813ac08cd9c60b08ef7a9c0fe98766bef8e</sum></package><package arch="i686" name="ImageMagick" release="13.el7_2" src="ImageMagick-6.7.8.9-13.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-6.7.8.9-13.el7_2.i686.rpm</filename><sum type="sha256">046d76799f4a16520cf10b1b10759f20471181074ccbab676fcb5033029927c0</sum></package><package arch="i686" name="ImageMagick-devel" release="13.el7_2" src="ImageMagick-6.7.8.9-13.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-devel-6.7.8.9-13.el7_2.i686.rpm</filename><sum type="sha256">5b831ec550ae323caedfb849ffe0267b54945417a80bb92fb3a3654a2dd796e0</sum></package><package arch="i686" name="ImageMagick-c++" release="13.el7_2" src="ImageMagick-6.7.8.9-13.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-c++-6.7.8.9-13.el7_2.i686.rpm</filename><sum type="sha256">9ba9023a18c674b8d5d8a01e151ee55c21abdc7925b32680f51d3091073e5df1</sum></package><package arch="x86_64" name="ImageMagick" release="13.el7_2" src="ImageMagick-6.7.8.9-13.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-6.7.8.9-13.el7_2.x86_64.rpm</filename><sum type="sha256">10d35282f5e0474c549e139b973521ba4420dc54073a5393dfad437e4c888bea</sum></package><package arch="x86_64" name="ImageMagick-c++" release="13.el7_2" src="ImageMagick-6.7.8.9-13.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-c++-6.7.8.9-13.el7_2.x86_64.rpm</filename><sum type="sha256">d55d31f348fdcc6797694313eccdcc09e8eb5f142697d38a51c79c172ce202c0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3714" id="CVE-2016-3714" title="Imagemagick: Insufficient Shell Characters Filtering" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3715" id="CVE-2016-3715" title="Imagemagick: File Deletion" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3716" id="CVE-2016-3716" title="Imagemagick: File Moving" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3717" id="CVE-2016-3717" title="Imagemagick: Local File Read" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3718" id="CVE-2016-3718" title="Imagemagick: Ssrf Vulnerability" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:0726" id="RHSA-2016:0726-1" title="Rhsa-2016:0726-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332492" id="1332492" title="Imagemagick: Insufficient Shell Characters Filtering" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332500" id="1332500" title="Imagemagick: File Deletion" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332504" id="1332504" title="Imagemagick: File Moving" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332505" id="1332505" title="Imagemagick: Local File Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332802" id="1332802" title="Imagemagick: Ssrf Vulnerability" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1025-1</id><title>Pcre</title><description>Security Fix(es): 
* Multiple flaws were found in the way PCRE handled malformed regular expressions. An attacker able to make an application using PCRE process a specially crafted regular expression could use these flaws to cause the application to crash or, possibly, execute arbitrary code. (CVE-2015-8385, CVE-2016-3191, CVE-2015-2328, CVE-2015-3217, CVE-2015-5073, CVE-2015-8388, CVE-2015-8391, CVE-2015-8386)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-05-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pcre-static" release="15.el7_2.1" src="pcre-8.32-15.el7_2.1.src.rpm" version="8.32"><filename>pcre-static-8.32-15.el7_2.1.x86_64.rpm</filename><sum type="sha256">b12038fe21b5bd7611f41cfa25211b80cab541d144dd185a3ee58d35d825a747</sum></package><package arch="x86_64" name="pcre" release="15.el7_2.1" src="pcre-8.32-15.el7_2.1.src.rpm" version="8.32"><filename>pcre-8.32-15.el7_2.1.x86_64.rpm</filename><sum type="sha256">2f7b762c58578425420d812e12fda14393d0975d47014151931a18f6d9738e55</sum></package><package arch="i686" name="pcre-static" release="15.el7_2.1" src="pcre-8.32-15.el7_2.1.src.rpm" version="8.32"><filename>pcre-static-8.32-15.el7_2.1.i686.rpm</filename><sum type="sha256">08059030ba9dc696c8231e28710c0fb679f049bf0a98369591259d5bc7f21c4c</sum></package><package arch="x86_64" name="pcre-tools" release="15.el7_2.1" src="pcre-8.32-15.el7_2.1.src.rpm" version="8.32"><filename>pcre-tools-8.32-15.el7_2.1.x86_64.rpm</filename><sum type="sha256">ac79749c80492d60872a60ac7e1a00103f941d8cdd12c4f4e49360d62fa06286</sum></package><package arch="x86_64" name="pcre-devel" release="15.el7_2.1" src="pcre-8.32-15.el7_2.1.src.rpm" version="8.32"><filename>pcre-devel-8.32-15.el7_2.1.x86_64.rpm</filename><sum type="sha256">1c0fb90aa6cc5312ccf85605d1a7e06f452753997351576814e6544be7becee8</sum></package><package arch="i686" name="pcre" release="15.el7_2.1" src="pcre-8.32-15.el7_2.1.src.rpm" version="8.32"><filename>pcre-8.32-15.el7_2.1.i686.rpm</filename><sum type="sha256">7c4016839bb1ef9172217bec5095cb3ffb14227a73d923372f3a90efb8135c15</sum></package><package arch="i686" name="pcre-devel" release="15.el7_2.1" src="pcre-8.32-15.el7_2.1.src.rpm" version="8.32"><filename>pcre-devel-8.32-15.el7_2.1.i686.rpm</filename><sum type="sha256">7a489f5b24eb0a17374c1a21b5cef8ec21bb156a37d981536da4c3e3c6e0b1f6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2328" id="CVE-2015-2328" title="Pcre: Infinite Recursion Compiling Pattern With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3217" id="CVE-2015-3217" title="Pcre: Stack Overflow Caused By Mishandled Group " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5073" id="CVE-2015-5073" title="Pcre: Buffer Overflow For Forward " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8385" id="CVE-2015-8385" title="Pcre: Buffer Overflow Caused By Named Forward " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8386" id="CVE-2015-8386" title="Pcre: Buffer Overflow Caused By Lookbehind " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8388" id="CVE-2015-8388" title="Pcre: Buffer Overflow For Forward " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8391" id="CVE-2015-8391" title="Pcre: Inefficient Posix Character Class Syntax " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3191" id="CVE-2016-3191" title="Pcre: Workspace Overflow For (*Accept) With " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1025" id="RHSA-2016:1025-1" title="Rhsa-2016:1025-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1228283" id="1228283" title="Pcre: Stack Overflow Caused By Mishandled Group " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1237223" id="1237223" title="Pcre: Buffer Overflow For Forward " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1285399" id="1285399" title="Pcre: Infinite Recursion Compiling Pattern With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1287629" id="1287629" title="Pcre: Buffer Overflow Caused By Named Forward " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1287636" id="1287636" title="Pcre: Buffer Overflow Caused By Lookbehind " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1287671" id="1287671" title="Pcre: Inefficient Posix Character Class Syntax " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311503" id="1311503" title="Pcre: Workspace Overflow For (*Accept) With " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1033-1</id><title>Kernel</title><description>Security Fix(es): 
* A flaw was found in the way the Linux kernel's ASN.1 DER decoder processed certain certificate files with tags of indefinite length. A local, unprivileged user could use a specially crafted X.509 certificate DER file to crash the system or, potentially, escalate their privileges on the system. (CVE-2016-0758, Important) 
Bug Fix(es): 
* Under certain conditions, the migration threads could race with the CPU hotplug, which could cause a deadlock. A set of patches has been provided to fix this bug, and the deadlock no longer occurs in the system. 
* A bug in the code that cleans up revoked delegations could previously cause a soft lockup in the NFS server. This patch fixes the underlying source code, so the lockup no longer occurs. 
* The second attempt to reload Common Application Programming Interface (CAPI) devices on the little-endian variant of IBM Power Systems previously failed. The provided set of patches fixes this bug, and reloading works as intended. 
* Due to inconsistencies in page size of IOMMU, the NVMe device, and the kernel, the BUG_ON signal previously occurred in the nvme_setup_prps() function, leading to the system crash while setting up the DMA transfer. The provided patch sets the default NVMe page size to 4k, thus preventing the system crash. 
* Previously, on a system using the Infiniband mlx5 driver used for the SRP stack, a hard lockup previously occurred after the kernel exceeded time with lock held with interrupts blocked. As a consequence, the system panicked. This update fixes this bug, and the system no longer panics in this situation. 
* On the little-endian variant of IBM Power Systems, the kernel previously crashed in the bitmap_weight() function while running the memory affinity script. The provided patch fortifies the topology setup and prevents sd-&gt;child from being set to NULL when it is already NULL. As a result, the memory affinity script runs successfully. 
* When a KVM guest wrote random values to the special-purpose registers (SPR) Instruction Authority Mask Register (IAMR), the guest and the corresponding QEMU process previously hung. This update adds the code which sets SPRs to a suitable neutral value on guest exit, thus fixing this bug. 
* Under heavy iSCSI traffic load, the system previously panicked due to a race in the locking code leading to a list corruption. This update fixes this bug, and the system no longer panics in this situation. 
* During SCSI exception handling (triggered by some irregularities), the driver could previously use an already retired SCSI command. As a consequence, a kernel panic or data corruption occurred. The provided patches fix this bug, and exception handling now proceeds successfully. 
* When the previously opened /dev/tty, which pointed to a pseudo terminal (pty) pair, was the last file closed, a kernel crash could previously occur. The underlying source code has been fixed, preventing this bug. 
* Previously, when using VPLEX and FCoE via the bnx2fc driver, different degrees of data corruption occurred. The provided patch fixes the FCP Response (RSP) residual parsing in bnx2fc, which prevents the aforementioned corruption.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-05-17 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools-libs" release="327.18.2.el7" src="kernel-3.10.0-327.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-327.18.2.el7.x86_64.rpm</filename><sum type="sha256">153a44b680b5521c28baf87b6b7c319cfc7ae1744c62b540c5a423ec12af72b8</sum></package><package arch="x86_64" name="perf" release="327.18.2.el7" src="kernel-3.10.0-327.18.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-327.18.2.el7.x86_64.rpm</filename><sum type="sha256">fdc6979af62ab39db246d69d858fad6c74143d28c6ce02350269a4c1618fe9ad</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="327.18.2.el7" src="kernel-3.10.0-327.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-327.18.2.el7.noarch.rpm</filename><sum type="sha256">b80cab9dd6eb56d2cedf2604a6061a7578855c9f39c62192afd82610b151b4cc</sum></package><package arch="x86_64" name="kernel-devel" release="327.18.2.el7" src="kernel-3.10.0-327.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-327.18.2.el7.x86_64.rpm</filename><sum type="sha256">f7dcaf29694bec33f55e874f90ae6cb448b69ecfbe18973004c4ca8fd8ba9741</sum></package><package arch="x86_64" name="python-perf" release="327.18.2.el7" src="kernel-3.10.0-327.18.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-327.18.2.el7.x86_64.rpm</filename><sum type="sha256">717abeb58b43d2949b1c7e4dfcb62dc9e139fd6bca8aaa72a0acff1c6bc9a457</sum></package><package arch="x86_64" name="kernel-headers" release="327.18.2.el7" src="kernel-3.10.0-327.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-327.18.2.el7.x86_64.rpm</filename><sum type="sha256">c6e09775ca6536041697f8783a9e66a9e61b0d0dc4b0a8218ab6a73db51dd0a5</sum></package><package arch="noarch" name="kernel-doc" release="327.18.2.el7" src="kernel-3.10.0-327.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-327.18.2.el7.noarch.rpm</filename><sum type="sha256">76c5d7ac56be95b6c5b6223fe7cd5474c8a081b62cfb8573d0a70b3489cd9cc4</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="327.18.2.el7" src="kernel-3.10.0-327.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-327.18.2.el7.x86_64.rpm</filename><sum type="sha256">28bdea38d925b8921f289109411e5c730c17f1370ec370503b7070ed44a73863</sum></package><package arch="x86_64" name="kernel-debug" release="327.18.2.el7" src="kernel-3.10.0-327.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-327.18.2.el7.x86_64.rpm</filename><sum type="sha256">2947497edbca974374908ce49171e10d50b1f190af1833451865ebf7165b02e2</sum></package><package arch="x86_64" name="kernel" release="327.18.2.el7" src="kernel-3.10.0-327.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-327.18.2.el7.x86_64.rpm</filename><sum type="sha256">4dbf13a93a99ad03a89021777af8a610cbad16941e1270ea9ad6e83e895abe8c</sum></package><package arch="x86_64" name="kernel-debug-devel" release="327.18.2.el7" src="kernel-3.10.0-327.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-327.18.2.el7.x86_64.rpm</filename><sum type="sha256">02705b957bad9e80d11a5e76b3f9ac8211332b12787c197269f4f46c40fe3f68</sum></package><package arch="x86_64" name="kernel-tools" release="327.18.2.el7" src="kernel-3.10.0-327.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-327.18.2.el7.x86_64.rpm</filename><sum type="sha256">92a3f9f83a65e4b2d21ae0fa671040b266d755b28c94d64bdec1a921dee7ff84</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0758" id="CVE-2016-0758" title="Kernel: Tags With Indefinite Length Can Corrupt " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1033" id="RHSA-2016:1033-1" title="Rhsa-2016:1033-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300257" id="1300257" title="Kernel: Tags With Indefinite Length Can Corrupt " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1041-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 38.8.0. 
Security Fix(es): 
* Two flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-2805, CVE-2016-2807)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-06-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_2" src="thunderbird-38.8.0-1.el7_2.src.rpm" version="38.8.0"><filename>thunderbird-38.8.0-1.el7_2.x86_64.rpm</filename><sum type="sha256">708d402bb0bb055c33b8af2d2572fb1e67eefb4ecdb7c6ae7fa093ac940e00c9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2805" id="CVE-2016-2805" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2807" id="CVE-2016-2807" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1041" id="RHSA-2016:1041-1" title="Rhsa-2016:1041-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330266" id="1330266" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330271" id="1330271" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1086-1</id><title>Libndp</title><description>Security Fix(es): 
* It was found that libndp did not properly validate and check the origin of Neighbor Discovery Protocol (NDP) messages. An attacker on a non-local network could use this flaw to advertise a node as a router, allowing them to perform man-in-the-middle attacks on a connecting client, or disrupt the network connectivity of that client. (CVE-2016-3698)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-05-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libndp" release="6.el7_2" src="libndp-1.2-6.el7_2.src.rpm" version="1.2"><filename>libndp-1.2-6.el7_2.i686.rpm</filename><sum type="sha256">680ee23c4b79db13203a0cac1f9f46f9c225805ce67d3d1e524c58579061c1ca</sum></package><package arch="i686" name="libndp-devel" release="6.el7_2" src="libndp-1.2-6.el7_2.src.rpm" version="1.2"><filename>libndp-devel-1.2-6.el7_2.i686.rpm</filename><sum type="sha256">d9ece21eecadd337115e576704aed441a5f8c921c45f0cecc1957dc4bea64e89</sum></package><package arch="x86_64" name="libndp" release="6.el7_2" src="libndp-1.2-6.el7_2.src.rpm" version="1.2"><filename>libndp-1.2-6.el7_2.x86_64.rpm</filename><sum type="sha256">3c53898bbb1d2ceba7e1295ba4de9f21595685c4a5956c77d4f84948fb2115cd</sum></package><package arch="x86_64" name="libndp-devel" release="6.el7_2" src="libndp-1.2-6.el7_2.src.rpm" version="1.2"><filename>libndp-devel-1.2-6.el7_2.x86_64.rpm</filename><sum type="sha256">fbbf24c00565ddb94307c3ad790bd2a8a3098ad0cef72d55b1cbf2cf46db8b75</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3698" id="CVE-2016-3698" title="Libndp: Denial Of Service Due To Insufficient " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1086" id="RHSA-2016:1086-1" title="Rhsa-2016:1086-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329366" id="1329366" title="Libndp: Denial Of Service Due To Insufficient " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1139-1</id><title>Squid</title><description>Security Fix(es): 
* A buffer overflow flaw was found in the way the Squid cachemgr.cgi utility processed remotely relayed Squid input. When the CGI interface utility is used, a remote attacker could possibly use this flaw to execute arbitrary code. (CVE-2016-4051) 
* Buffer overflow and input validation flaws were found in the way Squid processed ESI responses. If Squid was used as a reverse proxy, or for TLS/HTTPS interception, a remote attacker able to control ESI components on an HTTP server could use these flaws to crash Squid, disclose parts of the stack memory, or possibly execute arbitrary code as the user running Squid. (CVE-2016-4052, CVE-2016-4053, CVE-2016-4054) 
* An input validation flaw was found in the way Squid handled intercepted HTTP Request messages. An attacker could use this flaw to bypass the protection against issues related to CVE-2009-0801, and perform cache poisoning attacks on Squid. (CVE-2016-4553) 
* An input validation flaw was found in Squid's mime_get_header_field() function, which is used to search for headers within HTTP requests. An attacker could send an HTTP request from the client side with specially crafted header Host header that bypasses same-origin security protections, causing Squid operating as interception or reverse-proxy to contact the wrong origin server. It could also be used for cache poisoning for client not following RFC 7230. (CVE-2016-4554) 
* A NULL pointer dereference flaw was found in the way Squid processes ESI responses. If Squid was used as a reverse proxy or for TLS/HTTPS interception, a malicious server could use this flaw to crash the Squid worker process. (CVE-2016-4555) 
* An incorrect reference counting flaw was found in the way Squid processes ESI responses. If Squid is configured as reverse-proxy, for TLS/HTTPS interception, an attacker controlling a server accessed by Squid, could crash the squid worker, causing a Denial of Service attack. (CVE-2016-4556)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-06-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="squid" release="26.el7_2.3" src="squid-3.3.8-26.el7_2.3.src.rpm" version="3.3.8"><filename>squid-3.3.8-26.el7_2.3.x86_64.rpm</filename><sum type="sha256">d59f163354e1d9bb6e135f58d16a9d31b66466b2a968b28b203da1b5c7c21244</sum></package><package arch="x86_64" epoch="7" name="squid-sysvinit" release="26.el7_2.3" src="squid-3.3.8-26.el7_2.3.src.rpm" version="3.3.8"><filename>squid-sysvinit-3.3.8-26.el7_2.3.x86_64.rpm</filename><sum type="sha256">fdf376b088f6d1062e764fb45ea603a836cbfc1d2463f72d2d1e7e4d7aaee840</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4051" id="CVE-2016-4051" title="Squid: Buffer Overflow In Cachemgr.Cgi" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4052" id="CVE-2016-4052" title="Squid: Multiple " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4053" id="CVE-2016-4053" title="Squid: Multiple " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4054" id="CVE-2016-4054" title="Squid: Multiple " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4553" id="CVE-2016-4553" title="Squid: Cache Poisoning Issue In Http Request " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4554" id="CVE-2016-4554" title="Squid: Header Smuggling Issue In Http Request " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4555" id="CVE-2016-4555" title="Squid: Segfault From Esiinclude::Start" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4556" id="CVE-2016-4556" title="Squid: Sigsegv In Esicontext Response Handling" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1139" id="RHSA-2016:1139-1" title="Rhsa-2016:1139-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329126" id="1329126" title="Squid: Buffer Overflow In Cachemgr.Cgi" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329136" id="1329136" title="Squid: Multiple " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334233" id="1334233" title="Squid: Cache Poisoning Issue In Http Request " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334241" id="1334241" title="Squid: Header Smuggling Issue In Http Request " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334246" id="1334246" title="Squid: Segfault From Esiinclude::Start" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334786" id="1334786" title="Squid: Sigsegv In Esicontext Response Handling" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1141-1</id><title>Ntp</title><description>Security Fix(es): 
* It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time. (CVE-2015-7979) 
* A denial of service flaw was found in the way NTP handled preemptable client associations. A remote attacker could send several crypto NAK packets to a victim client, each with a spoofed source address of an existing associated peer, preventing that client from synchronizing its time. (CVE-2016-1547) 
* It was found that an ntpd client could be forced to change from basic client/server mode to the interleaved symmetric mode. A remote attacker could use a spoofed packet that, when processed by an ntpd client, would cause that client to reject all future legitimate server responses, effectively disabling time synchronization on that client. (CVE-2016-1548) 
* A flaw was found in the way NTP's libntp performed message authentication. An attacker able to observe the timing of the comparison function used in packet authentication could potentially use this flaw to recover the message digest. (CVE-2016-1550) 
* An out-of-bounds access flaw was found in the way ntpd processed certain packets. An authenticated attacker could use a crafted packet to create a peer association with hmode of 7 and larger, which could potentially (although highly unlikely) cause ntpd to crash. (CVE-2016-2518) 
The CVE-2016-1548 issue was discovered by Miroslav Lichvar (Red Hat).</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-06-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ntp-perl" release="22.el7_2.2" src="ntp-4.2.6p5-22.el7_2.2.src.rpm" version="4.2.6p5"><filename>ntp-perl-4.2.6p5-22.el7_2.2.noarch.rpm</filename><sum type="sha256">684eb6b5a53164071919884984b0a645dacbde249fc72f368c8f2559a3e69cc9</sum></package><package arch="x86_64" name="ntpdate" release="22.el7_2.2" src="ntp-4.2.6p5-22.el7_2.2.src.rpm" version="4.2.6p5"><filename>ntpdate-4.2.6p5-22.el7_2.2.x86_64.rpm</filename><sum type="sha256">838781520c610f4340947e47890bd7b41615db344155cb3731e3939def9070db</sum></package><package arch="noarch" name="ntp-doc" release="22.el7_2.2" src="ntp-4.2.6p5-22.el7_2.2.src.rpm" version="4.2.6p5"><filename>ntp-doc-4.2.6p5-22.el7_2.2.noarch.rpm</filename><sum type="sha256">96e65ecb032070b9e0edace4c8292d7a0505b169f5efd2f4a4d1bf4e9ddb9876</sum></package><package arch="x86_64" name="ntp" release="22.el7_2.2" src="ntp-4.2.6p5-22.el7_2.2.src.rpm" version="4.2.6p5"><filename>ntp-4.2.6p5-22.el7_2.2.x86_64.rpm</filename><sum type="sha256">a3359dce236fe1dad8ced4e3a342319e44fecf0843413258be8b73290287fe09</sum></package><package arch="x86_64" name="sntp" release="22.el7_2.2" src="ntp-4.2.6p5-22.el7_2.2.src.rpm" version="4.2.6p5"><filename>sntp-4.2.6p5-22.el7_2.2.x86_64.rpm</filename><sum type="sha256">f81f545c5ed2c283c74cbe55340b8c404450c9e4f361ca9b18458d01ec346b29</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979" id="CVE-2015-7979" title="Ntp: Off-Path Denial Of Service On Authenticated " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1547" id="CVE-2016-1547" title="Ntp: Crypto-Nak Preemptable Association Denial " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1548" id="CVE-2016-1548" title="Ntp: Ntpd Switching To Interleaved Mode With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1550" id="CVE-2016-1550" title="Ntp: Libntp Message Digest Disclosure" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2518" id="CVE-2016-2518" title="Ntp: Out-Of-Bounds References On Crafted Packet" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1141" id="RHSA-2016:1141-1" title="Rhsa-2016:1141-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300271" id="1300271" title="Ntp: Off-Path Denial Of Service On Authenticated " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331461" id="1331461" title="Ntp: Crypto-Nak Preemptable Association Denial " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331462" id="1331462" title="Ntp: Ntpd Switching To Interleaved Mode With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331464" id="1331464" title="Ntp: Libntp Message Digest Disclosure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331468" id="1331468" title="Ntp: Out-Of-Bounds References On Crafted Packet" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1205-1</id><title>Spice</title><description>Security Fix(es): 
* A memory allocation flaw, leading to a heap-based buffer overflow, was found in spice's smartcard interaction, which runs under the QEMU-KVM context on the host. A user connecting to a guest VM using spice could potentially use this flaw to crash the QEMU-KVM process or execute arbitrary code with the privileges of the host's QEMU-KVM process. (CVE-2016-0749) 
* A memory access flaw was found in the way spice handled certain guests using crafted primary surface parameters. A user in a guest could use this flaw to read from and write to arbitrary memory locations on the host. (CVE-2016-2150)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-06-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="spice-server" release="15.el7_2.1" src="spice-0.12.4-15.el7_2.1.src.rpm" version="0.12.4"><filename>spice-server-0.12.4-15.el7_2.1.x86_64.rpm</filename><sum type="sha256">785d4c166da9fda162dc937f7aaedfc9b0ad429f93d5c15023cc4ce46e8845f9</sum></package><package arch="x86_64" name="spice-server-devel" release="15.el7_2.1" src="spice-0.12.4-15.el7_2.1.src.rpm" version="0.12.4"><filename>spice-server-devel-0.12.4-15.el7_2.1.x86_64.rpm</filename><sum type="sha256">c982515eca849e56a53655e3256ab8e779d87c2ef7d83d4074087c8c6238b5d1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0749" id="CVE-2016-0749" title="Spice: Heap-Based Memory Corruption Within " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2150" id="CVE-2016-2150" title="Spice: Host Memory Access From Guest With " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1205" id="RHSA-2016:1205-1" title="Rhsa-2016:1205-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300646" id="1300646" title="Spice: Heap-Based Memory Corruption Within " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1313496" id="1313496" title="Spice: Host Memory Access From Guest With " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1217-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.2.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-2818, CVE-2016-2819, CVE-2016-2821, CVE-2016-2822, CVE-2016-2828, CVE-2016-2831)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-06-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_2" src="firefox-45.2.0-1.el7_2.src.rpm" version="45.2.0"><filename>firefox-45.2.0-1.el7_2.i686.rpm</filename><sum type="sha256">b7e91807f6ee2dd4194cdfda7256759c6e44f8dfa4be2c4c7da50ca6f70facd3</sum></package><package arch="x86_64" name="firefox" release="1.el7_2" src="firefox-45.2.0-1.el7_2.src.rpm" version="45.2.0"><filename>firefox-45.2.0-1.el7_2.x86_64.rpm</filename><sum type="sha256">516ead0b1eb6cfddd9defd2c2f7c6df2b57ce31a959fa73ad66e4deb5a4d89ea</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2818" id="CVE-2016-2818" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2819" id="CVE-2016-2819" title="Mozilla: Buffer Overflow Parsing Html5 Fragments " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2821" id="CVE-2016-2821" title="Mozilla: Use-After-Free Deleting Tables From A " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2822" id="CVE-2016-2822" title="Mozilla: Addressbar Spoofing Though The Select " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2828" id="CVE-2016-2828" title="Mozilla: Use-After-Free When Textures Are Used " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2831" id="CVE-2016-2831" title="Mozilla: Entering Fullscreen And Persistent " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1217" id="RHSA-2016:1217-1" title="Rhsa-2016:1217-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342887" id="1342887" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342891" id="1342891" title="Mozilla: Buffer Overflow Parsing Html5 Fragments " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342892" id="1342892" title="Mozilla: Use-After-Free Deleting Tables From A " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342893" id="1342893" title="Mozilla: Addressbar Spoofing Though The Select " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342895" id="1342895" title="Mozilla: Use-After-Free When Textures Are Used " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342898" id="1342898" title="Mozilla: Entering Fullscreen And Persistent " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1237-1</id><title>Imagemagick</title><description>Security Fix(es): 
* It was discovered that ImageMagick did not properly sanitize certain input before using it to invoke processes. A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would lead to arbitrary execution of shell commands with the privileges of the user running the application. (CVE-2016-5118) 
* It was discovered that ImageMagick did not properly sanitize certain input before passing it to the gnuplot delegate functionality. A remote attacker could create a specially crafted image that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would lead to arbitrary execution of shell commands with the privileges of the user running the application. (CVE-2016-5239) 
* Multiple flaws have been discovered in ImageMagick. A remote attacker could, for example, create specially crafted images that, when processed by an application using ImageMagick or an unsuspecting user using the ImageMagick utilities, would result in a memory corruption and, potentially, execution of arbitrary code, a denial of service, or an application crash. (CVE-2015-8896, CVE-2015-8895, CVE-2016-5240, CVE-2015-8897, CVE-2015-8898)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-06-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ImageMagick-devel" release="15.el7_2" src="ImageMagick-6.7.8.9-15.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-devel-6.7.8.9-15.el7_2.x86_64.rpm</filename><sum type="sha256">7a2ecda190447510a7d78dbe8fa6b0f534800d2aee48bbe6f625c34d355619fa</sum></package><package arch="x86_64" name="ImageMagick-c++-devel" release="15.el7_2" src="ImageMagick-6.7.8.9-15.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-c++-devel-6.7.8.9-15.el7_2.x86_64.rpm</filename><sum type="sha256">7a4592997fd3a96af8320633ad75c89ebe0e0412f8a1e5c5e95cbc156c3b59e7</sum></package><package arch="x86_64" name="ImageMagick" release="15.el7_2" src="ImageMagick-6.7.8.9-15.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-6.7.8.9-15.el7_2.x86_64.rpm</filename><sum type="sha256">19a17c427ab5acf3eb998cbaf7236f63e2af23649c29c9b7f9952047f1a24110</sum></package><package arch="i686" name="ImageMagick-c++" release="15.el7_2" src="ImageMagick-6.7.8.9-15.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-c++-6.7.8.9-15.el7_2.i686.rpm</filename><sum type="sha256">22f81213525e79ccf735ba26aea790e6878e73256431d150c993cbd73ecf7afd</sum></package><package arch="i686" name="ImageMagick-c++-devel" release="15.el7_2" src="ImageMagick-6.7.8.9-15.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-c++-devel-6.7.8.9-15.el7_2.i686.rpm</filename><sum type="sha256">cd270ab62cbc42af2583a901280a17f3351fb340d28a7b7944d9caa7dd6d68bd</sum></package><package arch="x86_64" name="ImageMagick-doc" release="15.el7_2" src="ImageMagick-6.7.8.9-15.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-doc-6.7.8.9-15.el7_2.x86_64.rpm</filename><sum type="sha256">7482b361387e217a5d5f664440d947f33935d78ffe4e5f4c24a21cf9e7b3d1ff</sum></package><package arch="x86_64" name="ImageMagick-c++" release="15.el7_2" src="ImageMagick-6.7.8.9-15.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-c++-6.7.8.9-15.el7_2.x86_64.rpm</filename><sum type="sha256">cecd0d91732fc6f778b10a87ad5904c406bcdba56d20856e9578d4482c5ea69d</sum></package><package arch="i686" name="ImageMagick-devel" release="15.el7_2" src="ImageMagick-6.7.8.9-15.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-devel-6.7.8.9-15.el7_2.i686.rpm</filename><sum type="sha256">e6e157b40ca20ba036bd73bac94bcdf14bf472387af9a81547beb1513bd333bc</sum></package><package arch="x86_64" name="ImageMagick-perl" release="15.el7_2" src="ImageMagick-6.7.8.9-15.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-perl-6.7.8.9-15.el7_2.x86_64.rpm</filename><sum type="sha256">15535a7e8aac5317f6c5b421d6f6b90d2f8b95487973ac2f6459e881e9eeb4b1</sum></package><package arch="i686" name="ImageMagick" release="15.el7_2" src="ImageMagick-6.7.8.9-15.el7_2.src.rpm" version="6.7.8.9"><filename>ImageMagick-6.7.8.9-15.el7_2.i686.rpm</filename><sum type="sha256">89d450b0d49760b89fd8220aae5fb4251990e0df26076e73821fcd9423c19bfe</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8895" id="CVE-2015-8895" title="Imagemagick: Integer And Buffer Overflow In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8896" id="CVE-2015-8896" title="Imagemagick: Integer Truncation Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8897" id="CVE-2015-8897" title="Imagemagick: Crash Due To Out Of Bounds Error In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8898" id="CVE-2015-8898" title="Imagemagick: Prevent Null Pointer Access In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5118" id="CVE-2016-5118" title="Imagemagick: Remote Code Execution Via Filename" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5239" id="CVE-2016-5239" title="Imagemagick,Graphicsmagick: Gnuplot Delegate " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5240" id="CVE-2016-5240" title="Imagemagick: Svg Converting Issue Resulting In Dos" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1237" id="RHSA-2016:1237-1" title="Rhsa-2016:1237-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269553" id="1269553" title="Imagemagick: Integer And Buffer Overflow In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269562" id="1269562" title="Imagemagick: Integer Truncation Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333417" id="1333417" title="Imagemagick: Svg Converting Issue Resulting In Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334188" id="1334188" title="Imagemagick,Graphicsmagick: Gnuplot Delegate " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1340814" id="1340814" title="Imagemagick: Remote Code Execution Via Filename" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1344264" id="1344264" title="Imagemagick: Prevent Null Pointer Access In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1344271" id="1344271" title="Imagemagick: Crash Due To Out Of Bounds Error In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1277-1</id><title>Kernel</title><description>To see the complete list of bug fixes, users are directed to the related Knowledge Article: 
Security Fixes: 
* A flaw was found in the way certain interfaces of the Linux kernel's Infiniband subsystem used write() as bi-directional ioctl() replacement, which could lead to insufficient memory security checks when being invoked using the splice() system call. A local unprivileged user on a system with either Infiniband hardware present or RDMA Userspace Connection Manager Access module explicitly loaded, could use this flaw to escalate their privileges on the system. (CVE-2016-4565, Important) 
* A race condition flaw was found in the way the Linux kernel's SCTP implementation handled sctp_accept() during the processing of heartbeat timeout events. A remote attacker could use this flaw to prevent further connections to be accepted by the SCTP server running on the system, resulting in a denial of service. (CVE-2015-8767, Moderate) 
Bug Fixes: 
* When Small Computer System Interface (SCSI) devices were removed or deleted, a system crash could occur due to a race condition between listing all SCSI devices and SCSI device removal. The provided patch ensures that the starting node for the klist_iter_init_node() function is actually a member of the list before using it. As a result, a system crash no longer occurs in the described scenario. 
* This update offers a reworked series of patches for the resizable hash table (rhashtable) including a number of backported bug fixes and enhancements from upstream. 
* Previously, the same value of the mperf Model-Specific Register (MSR) read twice in a row could lead to a kernel panic due to the divide-by-zero error. The provided patch fixes this bug, and the kernel now handles two identical values of mperf gracefully. 
* When a transparent proxy application was running and the number of established connections on the computer exceeded one million, unrelated processes, such as curl or ssh, were unable to bind to a local IP on the box to initiate a connection. The provided patch fixes the cooperation of the REUSEADDR/NOREUSEADDR socket option, and thus prevents the local port from being exhausted. As a result, the aforementioned bug no longer occurs in the described scenario. 
* Previously, the kernel support for non-local bind for the IPv6 protocol was incomplete. As a consequence, an attempt to bind a socket to an IPv6 address that is not assigned to the host could fail. The provided patch includes changes in the ip_nonlocal_bind variable, which is now set to allow binding to an IPv6 address that is not assigned to the host. As a result, Linux servers are now able to bind to non-local IPv6 addresses as expected. 
* On some servers with a faster CPU, USB initialization could previously lead to a kernel hang during boot. If this inconvenience occurred when booting the second kernel during the kdump operation, the kdump service failed and the vmcore was lost. The provided upstream patch fixes this bug, and the kernel no longer hangs after USB initialization. 
* Previously, when running iperf servers using the mlx4_en module, a kernel panic occurred. The underlying source code has been fixed, and the kernel panic no longer occurs in the described scenario.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-06-24 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="perf" release="327.22.2.el7" src="kernel-3.10.0-327.22.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-327.22.2.el7.x86_64.rpm</filename><sum type="sha256">e051aa0e0c60fda0a2f69fc46b06a044ff84f6567b474c09296eaec926469e97</sum></package><package arch="x86_64" name="kernel-headers" release="327.22.2.el7" src="kernel-3.10.0-327.22.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-327.22.2.el7.x86_64.rpm</filename><sum type="sha256">7e66e30a3ff048a78301442477db8f0e3ee7fd287217ed53e952bd9b5dbe0bd6</sum></package><package arch="x86_64" name="kernel-debug-devel" release="327.22.2.el7" src="kernel-3.10.0-327.22.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-327.22.2.el7.x86_64.rpm</filename><sum type="sha256">c36ab7ef919527c33c11800954721841052c27b50546708dea8d9774cba58181</sum></package><package arch="x86_64" name="kernel-tools" release="327.22.2.el7" src="kernel-3.10.0-327.22.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-327.22.2.el7.x86_64.rpm</filename><sum type="sha256">50d83dbe6e5426489052c048e912870f6ae93943c31696ad197c4514826df397</sum></package><package arch="x86_64" name="python-perf" release="327.22.2.el7" src="kernel-3.10.0-327.22.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-327.22.2.el7.x86_64.rpm</filename><sum type="sha256">0428cc40e261626b95c60cf15a20ac1f74cea6f7d9431f25ec66a345a47f6524</sum></package><package arch="x86_64" name="kernel-devel" release="327.22.2.el7" src="kernel-3.10.0-327.22.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-327.22.2.el7.x86_64.rpm</filename><sum type="sha256">021b1e2f1603aaf8bb0b68d2f76b2fc274e7013f41aff8380cddd2d282d64a36</sum></package><package arch="x86_64" name="kernel-tools-libs" release="327.22.2.el7" src="kernel-3.10.0-327.22.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-327.22.2.el7.x86_64.rpm</filename><sum type="sha256">0448f050e2bc3c9412e5bc47aecee3366a17bc53daae928881def863c367c753</sum></package><package arch="x86_64" name="kernel-debug" release="327.22.2.el7" src="kernel-3.10.0-327.22.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-327.22.2.el7.x86_64.rpm</filename><sum type="sha256">08f788151debb1d534c80be71f186ebaac9403150e78219dde9b1aff59e09a1a</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="327.22.2.el7" src="kernel-3.10.0-327.22.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-327.22.2.el7.x86_64.rpm</filename><sum type="sha256">0133a8196c2a0887f6c4a6ebc44bca79af8fdeab9391db17827600353d2af5f4</sum></package><package arch="x86_64" name="kernel" release="327.22.2.el7" src="kernel-3.10.0-327.22.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-327.22.2.el7.x86_64.rpm</filename><sum type="sha256">0e581d8ca9467cbcd85f0b5fb1b1117ec0ac6c580a3fb6084c0eff85d63f910c</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="327.22.2.el7" src="kernel-3.10.0-327.22.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-327.22.2.el7.noarch.rpm</filename><sum type="sha256">6b529cd8de6f481519b3ccbdf0a8e80bf35b7574e18629867f3e6f2cdd4d3d0d</sum></package><package arch="noarch" name="kernel-doc" release="327.22.2.el7" src="kernel-3.10.0-327.22.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-327.22.2.el7.noarch.rpm</filename><sum type="sha256">7fda54360413ce7c2108a40d108e195970085202c7d159061a62dee9552309af</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8767" id="CVE-2015-8767" title="Kernel: Sctp Denial Of Service During Timeout" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4565" id="CVE-2016-4565" title="Kernel: Infiniband: Unprivileged Process Can Overwrite Kernel Memory Using Rdma_Ucm.Ko" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1277" id="RHSA-2016:1277-1" title="Rhsa-2016:1277-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297389" id="1297389" title="Kernel: Sctp Denial Of Service During Timeout" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310570" id="1310570" title="Kernel: Infiniband: Unprivileged Process Can Overwrite Kernel Memory Using Rdma_Ucm.Ko" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1292-1</id><title>Libxml2</title><description>Security Fix(es): 
A heap-based buffer overflow flaw was found in the way libxml2 parsed certain crafted XML input. A remote attacker could provide a specially crafted XML file that, when opened in an application linked against libxml2, would cause the application to crash or execute arbitrary code with the permissions of the user running the application. (CVE-2016-1834, CVE-2016-1840) 
Multiple denial of service flaws were found in libxml2. A remote attacker could provide a specially crafted XML file that, when processed by an application using libxml2, could cause that application to crash. (CVE-2016-1762, CVE-2016-1833, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, CVE-2016-1839, CVE-2016-3627, CVE-2016-3705, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-06-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libxml2" release="6.el7_2.3" src="libxml2-2.9.1-6.el7_2.3.src.rpm" version="2.9.1"><filename>libxml2-2.9.1-6.el7_2.3.i686.rpm</filename><sum type="sha256">2c2eba64f574a21a58c7caf51be9dc8a044658c737f8df4b80fc60c74563b2c3</sum></package><package arch="x86_64" name="libxml2-python" release="6.el7_2.3" src="libxml2-2.9.1-6.el7_2.3.src.rpm" version="2.9.1"><filename>libxml2-python-2.9.1-6.el7_2.3.x86_64.rpm</filename><sum type="sha256">d89ed19b110d53ff0a77425314da684d58aa5bc854831d3efd92627f4543495b</sum></package><package arch="i686" name="libxml2-devel" release="6.el7_2.3" src="libxml2-2.9.1-6.el7_2.3.src.rpm" version="2.9.1"><filename>libxml2-devel-2.9.1-6.el7_2.3.i686.rpm</filename><sum type="sha256">f7b5eceffa2661abc27bfeef52234284566ee9d208fda774fb6d08459e54ac30</sum></package><package arch="x86_64" name="libxml2" release="6.el7_2.3" src="libxml2-2.9.1-6.el7_2.3.src.rpm" version="2.9.1"><filename>libxml2-2.9.1-6.el7_2.3.x86_64.rpm</filename><sum type="sha256">6d5d43a696c3d3d289ad7574f3a1a24d706416f6a6b8447fcb8f81bdfa5eb671</sum></package><package arch="i686" name="libxml2-static" release="6.el7_2.3" src="libxml2-2.9.1-6.el7_2.3.src.rpm" version="2.9.1"><filename>libxml2-static-2.9.1-6.el7_2.3.i686.rpm</filename><sum type="sha256">5edb98c219a4960fe980808bb4aead08391fae24060ad740830d5f64d2fd6fd5</sum></package><package arch="x86_64" name="libxml2-static" release="6.el7_2.3" src="libxml2-2.9.1-6.el7_2.3.src.rpm" version="2.9.1"><filename>libxml2-static-2.9.1-6.el7_2.3.x86_64.rpm</filename><sum type="sha256">2b9cba394afb6af45ad1c5d2b86ec5767c7a8e0555d0992a181683c18f826e85</sum></package><package arch="x86_64" name="libxml2-devel" release="6.el7_2.3" src="libxml2-2.9.1-6.el7_2.3.src.rpm" version="2.9.1"><filename>libxml2-devel-2.9.1-6.el7_2.3.x86_64.rpm</filename><sum type="sha256">f5e1d6ca2935fa14627b223ff3e4c10501e2963b4d29654b4e3ed9f285ddefc3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1762" id="CVE-2016-1762" title="Libxml2: Heap-Based Buffer-Overread In Xmlnextchar" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1833" id="CVE-2016-1833" title="Libxml2: Heap-Based Buffer Overread In Htmlcurrentchar" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1834" id="CVE-2016-1834" title="Libxml2: Heap-Buffer-Overflow In Xmlstrncat" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1835" id="CVE-2016-1835" title="Libxml2: Heap Use-After-Free In Xmlsax2Attributens" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1836" id="CVE-2016-1836" title="Libxml2: Heap Use-After-Free In Xmldictcomputefastkey" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1837" id="CVE-2016-1837" title="Libxml2: Heap Use-After-Free In Htmlparsepubidliteral And Htmlparsesystemiteral" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1838" id="CVE-2016-1838" title="Libxml2: Heap-Based Buffer Overread In Xmlparserprintfilecontextinternal" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1839" id="CVE-2016-1839" title="Libxml2: Heap-Based Buffer Overread In Xmldictaddstring" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1840" id="CVE-2016-1840" title="Libxml2: Heap-Buffer-Overflow In Xmlfaparserposchargroup" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3627" id="CVE-2016-3627" title="Libxml2: Stack Exhaustion While Parsing Xml Files In Recovery Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3705" id="CVE-2016-3705" title="Libxml2: Stack Overflow Before Detecting Invalid Xml File" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4447" id="CVE-2016-4447" title="Libxml2: Heap-Based Buffer Underreads Due To Xmlparsename" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4448" id="CVE-2016-4448" title="Libxml2: Format String Vulnerability" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4449" id="CVE-2016-4449" title="Libxml2: Inappropriate Fetch Of Entities Content" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1292" id="RHSA-2016:1292-1" title="Rhsa-2016:1292-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319829" id="1319829" title="Libxml2: Stack Exhaustion While Parsing Xml Files In Recovery Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332443" id="1332443" title="Libxml2: Stack Overflow Before Detecting Invalid Xml File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338682" id="1338682" title="Libxml2: Heap-Based Buffer Overread In Htmlcurrentchar" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338686" id="1338686" title="Libxml2: Heap-Based Buffer Underreads Due To Xmlparsename" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338691" id="1338691" title="Libxml2: Heap Use-After-Free In Xmlsax2Attributens" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338696" id="1338696" title="Libxml2: Heap Use-After-Free In Htmlparsepubidliteral And Htmlparsesystemiteral" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338700" id="1338700" title="Libxml2: Format String Vulnerability" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338701" id="1338701" title="Libxml2: Inappropriate Fetch Of Entities Content" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338702" id="1338702" title="Libxml2: Heap Use-After-Free In Xmldictcomputefastkey" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338703" id="1338703" title="Libxml2: Heap-Based Buffer Overread In Xmldictaddstring" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338705" id="1338705" title="Libxml2: Heap-Based Buffer Overread In Xmlparserprintfilecontextinternal" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338706" id="1338706" title="Libxml2: Heap-Buffer-Overflow In Xmlfaparserposchargroup" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338708" id="1338708" title="Libxml2: Heap-Buffer-Overflow In Xmlstrncat" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338711" id="1338711" title="Libxml2: Heap-Based Buffer-Overread In Xmlnextchar" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1293-1</id><title>Setroubleshoot And Setroubleshoot-Plugins</title><description>The setroubleshoot-plugins package provides a set of analysis plugins for use with setroubleshoot. Each plugin has the capacity to analyze SELinux AVC data and system data to provide user friendly reports describing how to interpret SELinux AVC denials. 
Security Fix(es): 
* Shell command injection flaws were found in the way the setroubleshoot executed external commands. A local attacker able to trigger certain SELinux denials could use these flaws to execute arbitrary code with privileges of the setroubleshoot user. (CVE-2016-4989) 
* Shell command injection flaws were found in the way the setroubleshoot allow_execmod and allow_execstack plugins executed external commands. A local attacker able to trigger an execmod or execstack SELinux denial could use these flaws to execute arbitrary code with privileges of the setroubleshoot user. (CVE-2016-4444, CVE-2016-4446) 
The CVE-2016-4444 and CVE-2016-4446 issues were discovered by Milos Malik (Red Hat) and the CVE-2016-4989 issue was discovered by Red Hat Product Security. 
Note: On Scientific Linux 7.0 and 7.1, the setroubleshoot is run with root privileges. Therefore, these issues could allow an attacker to execute arbitrary code with root privileges.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-06-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="setroubleshoot-server" release="4.el7_2" src="setroubleshoot-3.2.24-4.el7_2.src.rpm" version="3.2.24"><filename>setroubleshoot-server-3.2.24-4.el7_2.x86_64.rpm</filename><sum type="sha256">1d801bdac28b79ffd14a1064a4addb0756ec1aea69600b266497caa28a335e11</sum></package><package arch="noarch" name="setroubleshoot-plugins" release="2.el7_2" src="setroubleshoot-plugins-3.0.59-2.el7_2.src.rpm" version="3.0.59"><filename>setroubleshoot-plugins-3.0.59-2.el7_2.noarch.rpm</filename><sum type="sha256">b09329f8cfa49772f65a51aeb6af31f55fbb0937512cb29fb280c3c84d7779af</sum></package><package arch="x86_64" name="setroubleshoot" release="4.el7_2" src="setroubleshoot-3.2.24-4.el7_2.src.rpm" version="3.2.24"><filename>setroubleshoot-3.2.24-4.el7_2.x86_64.rpm</filename><sum type="sha256">124ed18241c37b47f530fb4d6495ecb07641af64fd3874ab61ed70e1c45ba497</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4444" id="CVE-2016-4444" title="Setroubleshoot-Plugins: Insecure Commands.Getstatusoutput Use In The Allow_Execmod Plugin" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4446" id="CVE-2016-4446" title="Setroubleshoot-Plugins: Insecure Commands.Getoutput Use In The Allow_Execstack Plugin" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4989" id="CVE-2016-4989" title="Setroubleshoot: Command Injection Issues" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1293" id="RHSA-2016:1293-1" title="Rhsa-2016:1293-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332644" id="1332644" title="Cve-2016-4444 Setroubleshoot-Plugins: Insecure Commands.Getstatusoutput Use In The Allow_Execmod Plugin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1339250" id="1339250" title="Cve-2016-4446 Setroubleshoot-Plugins: Insecure Commands.Getoutput Use In The Allow_Execstack Plugin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346461" id="1346461" title="Cve-2016-4989 Setroubleshoot: Command Injection Issues" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1296-1</id><title>Ocaml</title><description>Security Fix(es): 
* OCaml versions 4.02.3 and earlier have a runtime bug that, on 64-bit platforms, causes size arguments to internal memmove calls to be sign- extended from 32- to 64-bits before being passed to the memmove function. This leads to arguments between 2GiB and 4GiB being interpreted as larger than they are (specifically, a bit below 2^64), causing a buffer overflow. Further, arguments between 4GiB and 6GiB are interpreted as 4GiB smaller than they should be, causing a possible information leak. (CVE-2015-8869)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-07-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ocaml-labltk" release="22.7.el7_2" src="ocaml-4.01.0-22.7.el7_2.src.rpm" version="4.01.0"><filename>ocaml-labltk-4.01.0-22.7.el7_2.x86_64.rpm</filename><sum type="sha256">47ad48329944b763f2353a35498c743a7b99687326f5e03cf334bc804178d1b9</sum></package><package arch="x86_64" name="ocaml-source" release="22.7.el7_2" src="ocaml-4.01.0-22.7.el7_2.src.rpm" version="4.01.0"><filename>ocaml-source-4.01.0-22.7.el7_2.x86_64.rpm</filename><sum type="sha256">ce0ff8e412db0c6d3152a928448e6bba85b9f7c7d1c45a870c720ddc6aa6c117</sum></package><package arch="x86_64" name="ocaml-camlp4" release="22.7.el7_2" src="ocaml-4.01.0-22.7.el7_2.src.rpm" version="4.01.0"><filename>ocaml-camlp4-4.01.0-22.7.el7_2.x86_64.rpm</filename><sum type="sha256">4bdd49a2ee58328f8a2b4e9b558389cf1aa20b0b7e612dd6e82bbb2f4aa63752</sum></package><package arch="x86_64" name="ocaml-ocamldoc" release="22.7.el7_2" src="ocaml-4.01.0-22.7.el7_2.src.rpm" version="4.01.0"><filename>ocaml-ocamldoc-4.01.0-22.7.el7_2.x86_64.rpm</filename><sum type="sha256">8c05fbedef5add3297f7dd2c6807b0c85157d1b5997e0e1bafd57f12ced5a8c5</sum></package><package arch="x86_64" name="ocaml-compiler-libs" release="22.7.el7_2" src="ocaml-4.01.0-22.7.el7_2.src.rpm" version="4.01.0"><filename>ocaml-compiler-libs-4.01.0-22.7.el7_2.x86_64.rpm</filename><sum type="sha256">dee309880dbd092c7f4a54204707c02eb7e8732767966f0ac9a38323d8f81e73</sum></package><package arch="x86_64" name="ocaml-emacs" release="22.7.el7_2" src="ocaml-4.01.0-22.7.el7_2.src.rpm" version="4.01.0"><filename>ocaml-emacs-4.01.0-22.7.el7_2.x86_64.rpm</filename><sum type="sha256">64223b8d16a20c786c62e90fcfd77f2ae658aca54fd42e81b8f210cac7a4db48</sum></package><package arch="x86_64" name="ocaml-x11" release="22.7.el7_2" src="ocaml-4.01.0-22.7.el7_2.src.rpm" version="4.01.0"><filename>ocaml-x11-4.01.0-22.7.el7_2.x86_64.rpm</filename><sum type="sha256">0a83619c91055c1c4650941cbc93ced020ea1d2f3ac76619bd7858be336702e2</sum></package><package arch="x86_64" name="ocaml-labltk-devel" release="22.7.el7_2" src="ocaml-4.01.0-22.7.el7_2.src.rpm" version="4.01.0"><filename>ocaml-labltk-devel-4.01.0-22.7.el7_2.x86_64.rpm</filename><sum type="sha256">0b459be4f32668efc1802a2f5d9fec68948846ec4136e6f4bcaac310205adca3</sum></package><package arch="x86_64" name="ocaml-camlp4-devel" release="22.7.el7_2" src="ocaml-4.01.0-22.7.el7_2.src.rpm" version="4.01.0"><filename>ocaml-camlp4-devel-4.01.0-22.7.el7_2.x86_64.rpm</filename><sum type="sha256">c856c5ba5b1902e490bb9d110b6304d76b13646f410a8b8db0b0d8aa17cded45</sum></package><package arch="x86_64" name="ocaml-docs" release="22.7.el7_2" src="ocaml-4.01.0-22.7.el7_2.src.rpm" version="4.01.0"><filename>ocaml-docs-4.01.0-22.7.el7_2.x86_64.rpm</filename><sum type="sha256">0bbf793b0c424a19b62381961d99be6c81915b5147db4117b0f7d3923538315f</sum></package><package arch="x86_64" name="ocaml" release="22.7.el7_2" src="ocaml-4.01.0-22.7.el7_2.src.rpm" version="4.01.0"><filename>ocaml-4.01.0-22.7.el7_2.x86_64.rpm</filename><sum type="sha256">c67ecb770d5ca37484ad95f9a09d2322c9ef505b065bf0529e5cf174e698e402</sum></package><package arch="x86_64" name="ocaml-runtime" release="22.7.el7_2" src="ocaml-4.01.0-22.7.el7_2.src.rpm" version="4.01.0"><filename>ocaml-runtime-4.01.0-22.7.el7_2.x86_64.rpm</filename><sum type="sha256">d31b41dda8f6d42fe77fbccdc23493ad2ca98b89d42239699fba7d84d92ef091</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8869" id="CVE-2015-8869" title="Ocaml: Sizes Arguments Are Sign-Extended From 32 To 64 Bits" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1296" id="RHSA-2016:1296-1" title="Rhsa-2016:1296-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332090" id="1332090" title="Ocaml: Sizes Arguments Are Sign-Extended From 32 To 64 Bits" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1392-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.2.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-2818)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-07-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_2" src="thunderbird-45.2-1.el7_2.src.rpm" version="45.2"><filename>thunderbird-45.2-1.el7_2.x86_64.rpm</filename><sum type="sha256">8ad8145175805efa5e71bc55632c76cd7ab176ada10ae04ba31846dc341f0de3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2818" id="CVE-2016-2818" title="Mozilla: Miscellaneous Memory Safety Hazards " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1392" id="RHSA-2016:1392-1" title="Rhsa-2016:1392-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342887" id="1342887" title="Mozilla: Miscellaneous Memory Safety Hazards " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1422-1</id><title>Httpd</title><description>Security Fix(es): 
* It was discovered that httpd used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-5387) 
Note: After this update, httpd will no longer pass the value of the Proxy request header to scripts via the HTTP_PROXY environment variable. 
Bug Fix(es): 
* In a caching proxy configuration, the mod_cache module would treat content as stale if the Expires header changed when refreshing a cached response. As a consequence, an origin server returning content without a fixed Expires header would not be treated as cacheable. The mod_cache module has been fixed to ignore changes in the Expires header when refreshing content. As a result, such content is now cacheable, improving performance and reducing load at the origin server. 
* The HTTP status code 451 "Unavailable For Legal Reasons" was not usable in the httpd configuration. As a consequence, modules such as mod_rewrite could not be configured to return a 451 error if required for legal purposes. The 451 status code has been added to the list of available error codes, and modules can now be configured to return a 451 error if required.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-07-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="httpd-manual" release="40.sl7.4" src="httpd-2.4.6-40.sl7.4.src.rpm" version="2.4.6"><filename>httpd-manual-2.4.6-40.sl7.4.noarch.rpm</filename><sum type="sha256">70996c31b01fe96dcc1a8d024dd70e708c1299177e6d35b9aed7ce0f4c70d37c</sum></package><package arch="x86_64" name="httpd-devel" release="40.sl7.4" src="httpd-2.4.6-40.sl7.4.src.rpm" version="2.4.6"><filename>httpd-devel-2.4.6-40.sl7.4.x86_64.rpm</filename><sum type="sha256">da1071cf25a89f67721492616b2dfd0c623a5d10b663f1c7322aa53d022f3ef4</sum></package><package arch="x86_64" epoch="1" name="mod_proxy_html" release="40.sl7.4" src="httpd-2.4.6-40.sl7.4.src.rpm" version="2.4.6"><filename>mod_proxy_html-2.4.6-40.sl7.4.x86_64.rpm</filename><sum type="sha256">864df262141e5668f41094225d16632ce1e5cd50b2f9b070b428f70d56d28525</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="40.sl7.4" src="httpd-2.4.6-40.sl7.4.src.rpm" version="2.4.6"><filename>mod_ssl-2.4.6-40.sl7.4.x86_64.rpm</filename><sum type="sha256">c923d40d3834db58f51067f056b00d965f6092038b5f6e8db192535bcd3def09</sum></package><package arch="x86_64" name="mod_session" release="40.sl7.4" src="httpd-2.4.6-40.sl7.4.src.rpm" version="2.4.6"><filename>mod_session-2.4.6-40.sl7.4.x86_64.rpm</filename><sum type="sha256">ed12662ec7fd165abbab1440eef78dc2a28dacd236696d07ba93b5ecdd3ebeb1</sum></package><package arch="x86_64" name="mod_ldap" release="40.sl7.4" src="httpd-2.4.6-40.sl7.4.src.rpm" version="2.4.6"><filename>mod_ldap-2.4.6-40.sl7.4.x86_64.rpm</filename><sum type="sha256">cfa565b5254a0aa91565c61e34f787603ea1e1fa7b5fc58a865ca46b98ff5920</sum></package><package arch="x86_64" name="httpd-tools" release="40.sl7.4" src="httpd-2.4.6-40.sl7.4.src.rpm" version="2.4.6"><filename>httpd-tools-2.4.6-40.sl7.4.x86_64.rpm</filename><sum type="sha256">32f1518659a2580ee1f0dcddb09ced93606fcc5b691c99ff24c3e6d918d56393</sum></package><package arch="x86_64" name="httpd" release="40.sl7.4" src="httpd-2.4.6-40.sl7.4.src.rpm" version="2.4.6"><filename>httpd-2.4.6-40.sl7.4.x86_64.rpm</filename><sum type="sha256">099f2e6a12d6cff52b7b0f0ba002e24400b7567feba7b27ce007f4d63f685019</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5387" id="CVE-2016-5387" title="Apache Httpd: Sets Environmental Variable Based On User Supplied Proxy Request Header" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1422" id="RHSA-2016:1422-1" title="Rhsa-2016:1422-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347648" id="1347648" title="Apache Can Not Cache Content If Expires Header Is Modified" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1353269" id="1353269" title="Support Sending Http 451 Status Code From Rewriterule" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1353755" id="1353755" title="Apache Httpd: Sets Environmental Variable Based On User Supplied Proxy Request Header" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1458-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were discovered in the Hotspot and Libraries components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-3606, CVE-2016-3587, CVE-2016-3598, CVE-2016-3610) 
* Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2016-3500, CVE-2016-3508) 
* Multiple flaws were found in the CORBA and Hotsport components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-3458, CVE-2016-3550) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-07-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="3.b13.el7_2" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-headless-1.8.0.101-3.b13.el7_2.x86_64.rpm</filename><sum type="sha256">e0846cdd1321b42054fa1977d18301178509a8eb7743815a27bbe71e986ca57f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="3.b13.el7_2" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-src-1.8.0.101-3.b13.el7_2.x86_64.rpm</filename><sum type="sha256">fc92ac458c9f6dd86ff4a89d7afcc35c0dcf76ec1170e18f5683c192822e51b1</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="3.b13.el7_2" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.101-3.b13.el7_2.x86_64.rpm</filename><sum type="sha256">976865952cb2a8c1675ef4ac9d79ed853e4596ab37c7f62c2bbadb8fc37d2722</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="3.b13.el7_2" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-devel-1.8.0.101-3.b13.el7_2.x86_64.rpm</filename><sum type="sha256">d5afd991dc293b5c337672c7b7995c9970398d58e0d26a56ee49140edc792ebc</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="3.b13.el7_2" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.101-3.b13.el7_2.x86_64.rpm</filename><sum type="sha256">7c8bc048ada82e2428f0a25310693ca9a193857eb24f2a87e3cc432ef97a59cf</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="3.b13.el7_2" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-debug-1.8.0.101-3.b13.el7_2.x86_64.rpm</filename><sum type="sha256">d73937d2405a73d17e16bc66c3cfff60287c6693cc8bb9cbadcf721a90e8227c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="3.b13.el7_2" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-src-debug-1.8.0.101-3.b13.el7_2.x86_64.rpm</filename><sum type="sha256">10cd86ae351b1d50290ad13e73be2eb328dd92902072204011cadf5f9f047206</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="3.b13.el7_2" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-accessibility-1.8.0.101-3.b13.el7_2.x86_64.rpm</filename><sum type="sha256">b9ff752cdccf15bba98cc10d23198bb94f16623bfc4573f88412ffb75311ea61</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="3.b13.el7_2" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-javadoc-1.8.0.101-3.b13.el7_2.noarch.rpm</filename><sum type="sha256">be480cc1587b607de85a568e3aa02d95c100d18006392d0fcdb6974fd381089c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="3.b13.el7_2" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.101-3.b13.el7_2.x86_64.rpm</filename><sum type="sha256">943ae204a9a04ef435ae89423165d0e4aab61466aa8f1b3b91e6ea32dd32a392</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="3.b13.el7_2" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2.x86_64.rpm</filename><sum type="sha256">5f22392334592b525545d7b31eebc5489bd8e6661fec4556b7675b69f0c993e0</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="3.b13.el7_2" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.101-3.b13.el7_2.x86_64.rpm</filename><sum type="sha256">1798d294c4ddb88ac4947320e0e8d81e2115a796110b628100cbdb8a7b3149ef</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="3.b13.el7_2" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-demo-1.8.0.101-3.b13.el7_2.x86_64.rpm</filename><sum type="sha256">dd7d518f2c14daf99a25d5f49310f06dc6a934593df385412afeb3f832ccaf04</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="3.b13.el7_2" src="java-1.8.0-openjdk-1.8.0.101-3.b13.el7_2.src.rpm" version="1.8.0.101"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.101-3.b13.el7_2.noarch.rpm</filename><sum type="sha256">354132dba07362de9f56b699992962f52423818892985efc79bd1123167dc45a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458" id="CVE-2016-3458" title="Openjdk: Insufficient Restrictions On The Use Of Custom Valuehandler (Corba, 8079718)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500" id="CVE-2016-3500" title="Openjdk: Maximum Xml Name Limit Not Applied To Namespace Uris (Jaxp, 8148872)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508" id="CVE-2016-3508" title="Openjdk: Missing Entity Replacement Limits (Jaxp, 8149962)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550" id="CVE-2016-3550" title="Openjdk: Integer Overflows In Bytecode Streams (Hotspot, 8152479)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3587" id="CVE-2016-3587" title="Openjdk: Insufficient Protection Of Methodhandle.Invokebasic() (Hotspot, 8154475)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598" id="CVE-2016-3598" title="Openjdk: Incorrect Handling Of Methodhandles.Droparguments() Argument (Libraries, 8155985)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606" id="CVE-2016-3606" title="Openjdk: Insufficient Bytecode Verification (Hotspot, 8155981)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610" id="CVE-2016-3610" title="Openjdk: Insufficient Value Count Check In Methodhandles.Filterreturnvalue() (Libraries, 8158571)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1458" id="RHSA-2016:1458-1" title="Rhsa-2016:1458-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356963" id="1356963" title="Openjdk: Insufficient Bytecode Verification (Hotspot, 8155981)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356971" id="1356971" title="Openjdk: Incorrect Handling Of Methodhandles.Droparguments() Argument (Libraries, 8155985)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356987" id="1356987" title="Openjdk: Insufficient Protection Of Methodhandle.Invokebasic() (Hotspot, 8154475)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356994" id="1356994" title="Openjdk: Insufficient Value Count Check In Methodhandles.Filterreturnvalue() (Libraries, 8158571)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357008" id="1357008" title="Openjdk: Maximum Xml Name Limit Not Applied To Namespace Uris (Jaxp, 8148872)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357015" id="1357015" title="Openjdk: Missing Entity Replacement Limits (Jaxp, 8149962)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357494" id="1357494" title="Openjdk: Insufficient Restrictions On The Use Of Custom Valuehandler (Corba, 8079718)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357506" id="1357506" title="Openjdk: Integer Overflows In Bytecode Streams (Hotspot, 8152479)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1486-1</id><title>Samba</title><description>Security Fix(es): 
* A flaw was found in the way Samba initiated signed DCE/RPC connections. A man-in-the-middle attacker could use this flaw to downgrade the connection to not use signing and therefore impersonate the server. (CVE-2016-2119) 
Bug Fix(es): 
* Previously, the "net" command in some cases failed to join the client to Active Directory (AD) because the permissions setting prevented modification of the supported Kerberos encryption type LDAP attribute. With this update, Samba has been fixed to allow joining an AD domain as a user. In addition, Samba now uses the machine account credentials to set up the Kerberos encryption types within AD for the joined machine. As a result, using "net" to join a domain now works more reliably. 
* Previously, the idmap_hash module worked incorrectly when it was used together with other modules. As a consequence, user and group IDs were not mapped properly. A patch has been applied to skip already configured modules. Now, the hash module can be used as the default idmap configuration back end and IDs are resolved correctly.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-07-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="samba-pidl" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-pidl-4.2.10-7.el7_2.noarch.rpm</filename><sum type="sha256">37e5bcf5ad5abcf172049f86544ecaf54ff06fb52ae41d5b3c881ea63a849589</sum></package><package arch="x86_64" name="samba-test-devel" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-test-devel-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">b18aea518c00e2749963f73886845f04b04b22fb4bcb8e0a7e03b83a9fa9e3ed</sum></package><package arch="i686" name="samba-libs" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-libs-4.2.10-7.el7_2.i686.rpm</filename><sum type="sha256">3c03fcffc6f5ef5c81ad682e9f3667849b4e88e4321c4585c35c8e10b2738bf1</sum></package><package arch="x86_64" name="samba-libs" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-libs-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">2fa8836a27ab4c01591f1b9ba0388ffce16c385ce450362890a500aafc97aafc</sum></package><package arch="x86_64" name="samba-python" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-python-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">ab8c969404ef6e4a6d2c79de83bc12eceea938ba543a1c08d162db749021e8e5</sum></package><package arch="i686" name="samba-winbind-modules" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-winbind-modules-4.2.10-7.el7_2.i686.rpm</filename><sum type="sha256">f6119a5da0d7fe6127a851260569e0b2f6e16ae90c86b19c670d45aa5c445ecb</sum></package><package arch="x86_64" name="samba-devel" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-devel-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">681bf549a43a4d07a13f72b3c24d743ec65db47593fa11b724958567c565bdc0</sum></package><package arch="x86_64" name="samba-test-libs" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-test-libs-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">5ba7e4dfa9b0897c802ae638f47a846ca732f88905864006f8a61b3b72f9356e</sum></package><package arch="i686" name="samba-client-libs" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-client-libs-4.2.10-7.el7_2.i686.rpm</filename><sum type="sha256">90df4fd8c4745c8d6cf79e23046a7bf4767cdf3188f6e65525b869e31132e4f7</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-vfs-glusterfs-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">6310360b5f739c0f0f7246853b6f0bbd6046c594355879cc24bef2e8faf526cb</sum></package><package arch="x86_64" name="samba-common-libs" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-common-libs-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">eb8dc96afcf97f5c3d138a444ae814faf6a882c64ae10347cf880782550ecd85</sum></package><package arch="x86_64" name="samba-client" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-client-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">cbc7b6d564a317d62ebcc474cd670bec2e0ddc2f57445538de1c70e608d48976</sum></package><package arch="x86_64" name="libsmbclient" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>libsmbclient-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">7f93c0895944e18fdbb136cb7f7143d6fd16347f69496504d2e308027f1df129</sum></package><package arch="x86_64" name="samba-client-libs" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-client-libs-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">c3a019e4061be07a7aabfd4549f28aa90c2502150e256c8e634969d33693d627</sum></package><package arch="i686" name="libsmbclient-devel" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>libsmbclient-devel-4.2.10-7.el7_2.i686.rpm</filename><sum type="sha256">43bd8395ce253bd6fdfdcbe5a9dec4c64411cd5fb0c3f56532ef813ee182aa29</sum></package><package arch="x86_64" name="samba-winbind-modules" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-winbind-modules-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">735bc8d0c08bbc5d23953d0b5f9789ca26cedbb8d7d240dfe250c25a16a233fb</sum></package><package arch="x86_64" name="libwbclient-devel" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>libwbclient-devel-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">9dba9bb9f4c9541322b184273fe1a59c05a309974332db8af9e9eb269fdd6448</sum></package><package arch="x86_64" name="samba-winbind-clients" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-winbind-clients-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">876b10139f34565e36b998e83121b44969e3940e6d6174a852d4042cfaf5d156</sum></package><package arch="noarch" name="samba-common" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-common-4.2.10-7.el7_2.noarch.rpm</filename><sum type="sha256">40688ebf20170e34227fd49c0fbe8a64611173d28517b05d706b724463ddb0ad</sum></package><package arch="x86_64" name="samba-common-tools" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-common-tools-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">9d6d662333dbc8073f67a740161519b1ff4d3f069cd2ed4401ab4f656da5a876</sum></package><package arch="x86_64" name="ctdb-tests" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>ctdb-tests-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">4dcc714c41afe05249cf32292081fbeaadebf8a1a3b5b8b0698b5bc4705318e5</sum></package><package arch="i686" name="samba-devel" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-devel-4.2.10-7.el7_2.i686.rpm</filename><sum type="sha256">78a18ec06ee2608c5038541fbc4ed1b827aadb7e25e0d83739eafd752b52558a</sum></package><package arch="i686" name="samba-test-libs" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-test-libs-4.2.10-7.el7_2.i686.rpm</filename><sum type="sha256">b76da3de1d6cd580174d53521fe5d0283393f77e66ebd4c4bd2f71d2218a1a38</sum></package><package arch="x86_64" name="ctdb-devel" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>ctdb-devel-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">e87e31fd96ef7ad1c145bee8dcf005476126529cc17a7752ca87d5bdbac6b079</sum></package><package arch="x86_64" name="ctdb" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>ctdb-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">28af7332a487a7b8897bce92ff404bcfffb9bb683b2488c50f183f743555582f</sum></package><package arch="i686" name="libsmbclient" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>libsmbclient-4.2.10-7.el7_2.i686.rpm</filename><sum type="sha256">b4fa1e361535c1494d8b3d4d33c95b8a97585b65485d0ced22500a229f45c809</sum></package><package arch="x86_64" name="libsmbclient-devel" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>libsmbclient-devel-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">2d128f54b092b241c038764b1bc6bc9dd1df77cd8e24f914187b2869d7dc0b51</sum></package><package arch="i686" name="libwbclient-devel" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>libwbclient-devel-4.2.10-7.el7_2.i686.rpm</filename><sum type="sha256">08100ae44f5aa6b10ef59b3ff94dbe6e484155be9b8831fc16652f93fc487d8c</sum></package><package arch="x86_64" name="samba-dc" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-dc-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">1c3ba01c9edf3d26ea24f6019dbfffbd715d16fbe47821a74ca28c04f988e2a0</sum></package><package arch="x86_64" name="samba" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">12fe90b291abb51c48995b82ed5b0c306f40aec79bf433145c797b727b0fc4fb</sum></package><package arch="x86_64" name="libwbclient" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>libwbclient-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">36b60bda9bd568af1cb9408fff208ad726e5ca2387512580a22047aebded8722</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-winbind-krb5-locator-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">917055051ec56e38c524e2f098752c633b794a3c34c7ad17d583e6a5d3f322da</sum></package><package arch="i686" name="ctdb-devel" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>ctdb-devel-4.2.10-7.el7_2.i686.rpm</filename><sum type="sha256">d3575f253b4bec60eb98928d95ae0d965d0c40cf4bc4620e4acc0881da95fe73</sum></package><package arch="x86_64" name="samba-dc-libs" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-dc-libs-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">884dfc83a460c3c727e0181b056c69ad9ba5184c7d2ea4f3b8f4a8876fcb5b36</sum></package><package arch="x86_64" name="samba-winbind" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-winbind-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">3b297b4988174b885a1662fbf82e6e1a7677ef1ce32b514de9ee48901d0cb0ee</sum></package><package arch="i686" name="libwbclient" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>libwbclient-4.2.10-7.el7_2.i686.rpm</filename><sum type="sha256">044b3662460635ec55149068b5930bfa28e72bfd1b0fde8a89364586849a6441</sum></package><package arch="x86_64" name="samba-test" release="7.el7_2" src="samba-4.2.10-7.el7_2.src.rpm" version="4.2.10"><filename>samba-test-4.2.10-7.el7_2.x86_64.rpm</filename><sum type="sha256">4f17451bcc04038d342cf3ff41320fafd5d099862858a5f9e03afe6511f7adc7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2119" id="CVE-2016-2119" title="Samba: Client Side Smb2/3 Required Signing Can Be Downgraded" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1486" id="RHSA-2016:1486-1" title="Rhsa-2016:1486-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1350759" id="1350759" title="Idmap_Hash Module Works Incorrectly When Used With Other Backend Modules" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351260" id="1351260" title="Net Ads Join Throws &quot;Failed To Join Domain: Failed To Set Machine Kerberos Encryption Types: Insufficient Access&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351955" id="1351955" title="Samba: Client Side Smb2/3 Required Signing Can Be Downgraded" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1504-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were discovered in the Hotspot and Libraries components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2016-3606, CVE-2016-3598, CVE-2016-3610) 
* Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2016-3500, CVE-2016-3508) 
* Multiple flaws were found in the CORBA and Hotsport components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-3458, CVE-2016-3550)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-07-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.7.2.el7_2" src="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el7_2.src.rpm" version="1.7.0.111"><filename>java-1.7.0-openjdk-headless-1.7.0.111-2.6.7.2.el7_2.x86_64.rpm</filename><sum type="sha256">475168b7b3674c82c58ad3f5af017797133720c565a729d97a38ea4bb27c7114</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.7.2.el7_2" src="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el7_2.src.rpm" version="1.7.0.111"><filename>java-1.7.0-openjdk-javadoc-1.7.0.111-2.6.7.2.el7_2.noarch.rpm</filename><sum type="sha256">c980323cb461de97ffba8a6eca44f72e430a90d51688c8d1d169a6e128d80a5f</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.7.2.el7_2" src="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el7_2.src.rpm" version="1.7.0.111"><filename>java-1.7.0-openjdk-accessibility-1.7.0.111-2.6.7.2.el7_2.x86_64.rpm</filename><sum type="sha256">1ef394db33e2dfc3fac2df9ccce5a240590fbd8c499726573120d908d9c24c50</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.7.2.el7_2" src="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el7_2.src.rpm" version="1.7.0.111"><filename>java-1.7.0-openjdk-demo-1.7.0.111-2.6.7.2.el7_2.x86_64.rpm</filename><sum type="sha256">1f2b7315b2c577b2cf926edb1fb0c0a88155392f05eea3d2df5e666cd7c5b85b</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.7.2.el7_2" src="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el7_2.src.rpm" version="1.7.0.111"><filename>java-1.7.0-openjdk-devel-1.7.0.111-2.6.7.2.el7_2.x86_64.rpm</filename><sum type="sha256">01669d028e2bb208c8d8640270107e3c771f7cdadd56e4a9bcb09a4d3f6706b1</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.7.2.el7_2" src="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el7_2.src.rpm" version="1.7.0.111"><filename>java-1.7.0-openjdk-src-1.7.0.111-2.6.7.2.el7_2.x86_64.rpm</filename><sum type="sha256">0165d497cbd2bd3bf67622d6c0358807a7eb1ae46e49ee6a98fdbda7ea035447</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.7.2.el7_2" src="java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el7_2.src.rpm" version="1.7.0.111"><filename>java-1.7.0-openjdk-1.7.0.111-2.6.7.2.el7_2.x86_64.rpm</filename><sum type="sha256">f610a3a5b5f6e3740f777a40c770e7a302c1ab82941ae5aa73d20f98da1cdf30</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458" id="CVE-2016-3458" title="Openjdk: Insufficient Restrictions On The Use Of Custom Valuehandler (Corba, 8079718)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500" id="CVE-2016-3500" title="Openjdk: Maximum Xml Name Limit Not Applied To Namespace Uris (Jaxp, 8148872)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508" id="CVE-2016-3508" title="Openjdk: Missing Entity Replacement Limits (Jaxp, 8149962)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550" id="CVE-2016-3550" title="Openjdk: Integer Overflows In Bytecode Streams (Hotspot, 8152479)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3598" id="CVE-2016-3598" title="Openjdk: Incorrect Handling Of Methodhandles.Droparguments() Argument (Libraries, 8155985)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606" id="CVE-2016-3606" title="Openjdk: Insufficient Bytecode Verification (Hotspot, 8155981)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3610" id="CVE-2016-3610" title="Openjdk: Insufficient Value Count Check In Methodhandles.Filterreturnvalue() (Libraries, 8158571)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1504" id="RHSA-2016:1504-1" title="Rhsa-2016:1504-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356963" id="1356963" title="Openjdk: Insufficient Bytecode Verification (Hotspot, 8155981)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356971" id="1356971" title="Openjdk: Incorrect Handling Of Methodhandles.Droparguments() Argument (Libraries, 8155985)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356994" id="1356994" title="Openjdk: Insufficient Value Count Check In Methodhandles.Filterreturnvalue() (Libraries, 8158571)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357008" id="1357008" title="Openjdk: Maximum Xml Name Limit Not Applied To Namespace Uris (Jaxp, 8148872)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357015" id="1357015" title="Openjdk: Missing Entity Replacement Limits (Jaxp, 8149962)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357494" id="1357494" title="Openjdk: Insufficient Restrictions On The Use Of Custom Valuehandler (Corba, 8079718)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357506" id="1357506" title="Openjdk: Integer Overflows In Bytecode Streams (Hotspot, 8152479)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1538-1</id><title>Golang</title><description>The following packages have been upgraded to a newer upstream version: golang (1.6.3). 
Security Fix(es): 
* An input-validation flaw was discovered in the Go programming language built in CGI implementation, which set the environment variable "HTTP_PROXY" using the incoming "Proxy" HTTP-request header. The environment variable "HTTP_PROXY" is used by numerous web clients, including Go's net/http package, to specify a proxy server to use for HTTP and, in some cases, HTTPS requests. This meant that when a CGI-based web application ran, an attacker could specify a proxy server which the application then used for subsequent outgoing requests, allowing a man-in- the-middle attack. (CVE-2016-5386)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-08-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="golang-src" release="1.el7_2.1" src="golang-1.6.3-1.el7_2.1.src.rpm" version="1.6.3"><filename>golang-src-1.6.3-1.el7_2.1.noarch.rpm</filename><sum type="sha256">4ba74cc08444d418d86a4de38195f28205005ee57c1b607ee881bc1619e8de58</sum></package><package arch="noarch" name="golang-misc" release="1.el7_2.1" src="golang-1.6.3-1.el7_2.1.src.rpm" version="1.6.3"><filename>golang-misc-1.6.3-1.el7_2.1.noarch.rpm</filename><sum type="sha256">971136952b12149a5cef0582f20b7dbe11c50bbbab6a2322eb7ae7e2e2fe8146</sum></package><package arch="noarch" name="golang-tests" release="1.el7_2.1" src="golang-1.6.3-1.el7_2.1.src.rpm" version="1.6.3"><filename>golang-tests-1.6.3-1.el7_2.1.noarch.rpm</filename><sum type="sha256">868cb842e065b9bf0efa3dcaedf9b9f28a1c5e04d3390e4ad0e6690c90ed78ac</sum></package><package arch="noarch" name="golang-docs" release="1.el7_2.1" src="golang-1.6.3-1.el7_2.1.src.rpm" version="1.6.3"><filename>golang-docs-1.6.3-1.el7_2.1.noarch.rpm</filename><sum type="sha256">5c1165040129b4e1967afb9373bc435b6cc4daf175b7afb1305fe2101955b744</sum></package><package arch="x86_64" name="golang" release="1.el7_2.1" src="golang-1.6.3-1.el7_2.1.src.rpm" version="1.6.3"><filename>golang-1.6.3-1.el7_2.1.x86_64.rpm</filename><sum type="sha256">a38de0e8672583c125f59e9e8b2a6503b9b8acfe30b3b96a18bd9f66bd828775</sum></package><package arch="x86_64" name="golang-bin" release="1.el7_2.1" src="golang-1.6.3-1.el7_2.1.src.rpm" version="1.6.3"><filename>golang-bin-1.6.3-1.el7_2.1.x86_64.rpm</filename><sum type="sha256">2409bfa5cbe2747f329a727ec7b2d24195d96140d97641bcb8be32e03d63c74a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5386" id="CVE-2016-5386" title="Go: Sets Environmental Variable  Based On User Supplied Proxy Request Header" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1538" id="RHSA-2016:1538-1" title="Rhsa-2016:1538-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346331" id="1346331" title="Rebase To Golang 1.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1353798" id="1353798" title="Go: Sets Environmental Variable  Based On User Supplied Proxy Request Header" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1539-1</id><title>Kernel</title><description>To see the complete list of bug fixes, users are directed to the related Knowledge Article: 
Security Fix(es): 
* A flaw was found in the Linux kernel's keyring handling code, where in key_reject_and_link() an uninitialised variable would eventually lead to arbitrary free address which could allow attacker to use a use-after-free style attack. (CVE-2016-4470, Important) 
* The ovl_setattr function in fs/overlayfs/inode.c in the Linux kernel through 4.3.3 attempts to merge distinct setattr operations, which allows local users to bypass intended access restrictions and modify the attributes of arbitrary overlay files via a crafted application. (CVE-2015-8660, Moderate) 
* It was reported that on s390x, the fork of a process with four page table levels will cause memory corruption with a variety of symptoms. All processes are created with three level page table and a limit of 4TB for the address space. If the parent process has four page table levels with a limit of 8PB, the function that duplicates the address space will try to copy memory areas outside of the address space limit for the child process. (CVE-2016-2143, Moderate) 
Bug Fix(es): 
* The glibc headers and the Linux headers share certain definitions of key structures that are required to be defined in kernel and in userspace. In some instances both userspace and sanitized kernel headers have to be included in order to get the structure definitions required by the user program. Unfortunately because the glibc and Linux headers don't coordinate this can result in compilation errors. The glibc headers have therefore been fixed to coordinate with Linux UAPI-based headers. With the header coordination compilation errors no longer occur. 
* When running the TCP/IPv6 traffic over the mlx4_en networking interface on the big endian architectures, call traces reporting about a "hw csum failure" could occur. With this update, the mlx4_en driver has been fixed by correction of the checksum calculation for the big endian architectures. As a result, the call trace error no longer appears in the log messages. 
* Under significant load, some applications such as logshifter could generate bursts of log messages too large for the system logger to spool. Due to a race condition, log messages from that application could then be lost even after the log volume dropped to manageable levels. This update fixes the kernel mechanism used to notify the transmitter end of the socket used by the system logger that more space is available on the receiver side, removing a race condition which previously caused the sender to stop transmitting new messages and allowing all log messages to be processed correctly. 
* Previously, after heavy open or close of the Accelerator Function Unit (AFU) contexts, the interrupt packet went out and the AFU context did not see any interrupts. Consequently, a kernel panic could occur. The provided patch set fixes handling of the interrupt requests, and kernel panic no longer occurs in the described situation. 
* net: recvfrom would fail on short buffer. 
* Backport rhashtable changes from upstream. 
* Server Crashing after starting Glusterd &amp; creating volumes. 
* RAID5 reshape deadlock fix. 
* BDX perf uncore support fix.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-08-03 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools" release="327.28.2.el7" src="kernel-3.10.0-327.28.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-327.28.2.el7.x86_64.rpm</filename><sum type="sha256">d35e594715161bc6dcfea6bd5bc3faf4ed83a6ad37584a4db637b3cfa01651fb</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="327.28.2.el7" src="kernel-3.10.0-327.28.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-327.28.2.el7.noarch.rpm</filename><sum type="sha256">3c6d58ade357aa8a1ed23ba558e951303e0f965cc08813f6a44ba653bfa6250d</sum></package><package arch="noarch" name="kernel-doc" release="327.28.2.el7" src="kernel-3.10.0-327.28.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-327.28.2.el7.noarch.rpm</filename><sum type="sha256">9d71f2e44e61bdfb804244e5c6f11280f3e922bc46d878c08f1fef309fc2ea8d</sum></package><package arch="x86_64" name="kernel-tools-libs" release="327.28.2.el7" src="kernel-3.10.0-327.28.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-327.28.2.el7.x86_64.rpm</filename><sum type="sha256">d638943faa1ed787a0f681a1d83b4e458de6e325eb0fa6472f54ee8d1d68c36b</sum></package><package arch="x86_64" name="python-perf" release="327.28.2.el7" src="kernel-3.10.0-327.28.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-327.28.2.el7.x86_64.rpm</filename><sum type="sha256">633398584bdfe08615c0cd4ed5925191b1254d80b939a6086f106d7d028cae21</sum></package><package arch="x86_64" name="kernel-devel" release="327.28.2.el7" src="kernel-3.10.0-327.28.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-327.28.2.el7.x86_64.rpm</filename><sum type="sha256">e2b1f838ca386ca5e8cfa0ed8113b1bd6e62e408a9ab7c9e88cd24034b0a6b0d</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="327.28.2.el7" src="kernel-3.10.0-327.28.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-327.28.2.el7.x86_64.rpm</filename><sum type="sha256">b69f7d0ae073e4915f8062db38e6f2884458d09a8cd136bbc419cd3892a9a466</sum></package><package arch="x86_64" name="kernel-headers" release="327.28.2.el7" src="kernel-3.10.0-327.28.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-327.28.2.el7.x86_64.rpm</filename><sum type="sha256">1e0b64e9a43c32996365887986d0346f38ff0e584f0053c5898d5b9928842584</sum></package><package arch="x86_64" name="kernel" release="327.28.2.el7" src="kernel-3.10.0-327.28.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-327.28.2.el7.x86_64.rpm</filename><sum type="sha256">5cab7596073690045c3c83f0a63ef8edec2d859a8444726969eaa6be548fd330</sum></package><package arch="x86_64" name="perf" release="327.28.2.el7" src="kernel-3.10.0-327.28.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-327.28.2.el7.x86_64.rpm</filename><sum type="sha256">7d0073e096db0d9adaab74e7ef539a2b5119741f25c38954e56dc84f978c9351</sum></package><package arch="x86_64" name="kernel-debug-devel" release="327.28.2.el7" src="kernel-3.10.0-327.28.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-327.28.2.el7.x86_64.rpm</filename><sum type="sha256">972bdb58c42646102a0b77dc11cb57386df0647e610253dea8a10a104853a39b</sum></package><package arch="x86_64" name="kernel-debug" release="327.28.2.el7" src="kernel-3.10.0-327.28.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-327.28.2.el7.x86_64.rpm</filename><sum type="sha256">7b7fbf08c56d29d3c053b657f779673e3d3ab68a95d8b9476db2590431fd958b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8660" id="CVE-2015-8660" title="Kernel: Permission Bypass On Overlayfs During Copy_Up" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2143" id="CVE-2016-2143" title="Kernel: Fork Of Large Process Causes Memory Corruption" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4470" id="CVE-2016-4470" title="Kernel: Uninitialized Variable In Request_Key Handling Causes Kernel Crash In Error Handling Path" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1539" id="RHSA-2016:1539-1" title="Rhsa-2016:1539-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291329" id="1291329" title="Kernel: Permission Bypass On Overlayfs During Copy_Up" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1308908" id="1308908" title="Kernel: Fork Of Large Process Causes Memory Corruption" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1341716" id="1341716" title="Kernel: Uninitialized Variable In Request_Key Handling Causes Kernel Crash In Error Handling Path" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1546-1</id><title>Libtiff</title><description>Security Fix(es): 
* Multiple flaws have been discovered in libtiff. A remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code by tricking an application linked against libtiff into processing specially crafted files. (CVE-2014-9655, CVE-2015-1547, CVE-2015-8784, CVE-2015-8683, CVE-2015-8665, CVE-2015-8781, CVE-2015-8782, CVE-2015-8783, CVE-2016-3990, CVE-2016-5320) 
* Multiple flaws have been discovered in various libtiff tools (bmp2tiff, pal2rgb, thumbnail, tiff2bw, tiff2pdf, tiffcrop, tiffdither, tiffsplit, tiff2rgba). By tricking a user into processing a specially crafted file, a remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code with the privileges of the user running the libtiff tool. (CVE-2014-8127, CVE-2014-8129, CVE-2014-8130, CVE-2014-9330, CVE-2015-7554, CVE-2015-8668, CVE-2016-3632, CVE-2016-3945, CVE-2016-3991)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-08-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libtiff-static" release="25.el7_2" src="libtiff-4.0.3-25.el7_2.src.rpm" version="4.0.3"><filename>libtiff-static-4.0.3-25.el7_2.i686.rpm</filename><sum type="sha256">2fbc036ad747b6bbd588f7277741a8ab0c7c70163023f43ddb81a4898c78978d</sum></package><package arch="x86_64" name="libtiff-static" release="25.el7_2" src="libtiff-4.0.3-25.el7_2.src.rpm" version="4.0.3"><filename>libtiff-static-4.0.3-25.el7_2.x86_64.rpm</filename><sum type="sha256">923785d3379577e2bdf3ad4e59dec75b909f108b33a81f423311875427d9a07d</sum></package><package arch="x86_64" name="libtiff-devel" release="25.el7_2" src="libtiff-4.0.3-25.el7_2.src.rpm" version="4.0.3"><filename>libtiff-devel-4.0.3-25.el7_2.x86_64.rpm</filename><sum type="sha256">8a900a22c9adb840b86a2b97f7ac0b4086995e99ba439643f17c9992ad7f978c</sum></package><package arch="x86_64" name="libtiff-tools" release="25.el7_2" src="libtiff-4.0.3-25.el7_2.src.rpm" version="4.0.3"><filename>libtiff-tools-4.0.3-25.el7_2.x86_64.rpm</filename><sum type="sha256">661e193e74f359e25399284331f4ed00cb782f6d2e775f7989590cd17eeb3215</sum></package><package arch="i686" name="libtiff" release="25.el7_2" src="libtiff-4.0.3-25.el7_2.src.rpm" version="4.0.3"><filename>libtiff-4.0.3-25.el7_2.i686.rpm</filename><sum type="sha256">1bbc1a40f8ce864e8fc36896e4c44669a99c00d41c6a9e1f15f43c94dafc9f6f</sum></package><package arch="x86_64" name="libtiff" release="25.el7_2" src="libtiff-4.0.3-25.el7_2.src.rpm" version="4.0.3"><filename>libtiff-4.0.3-25.el7_2.x86_64.rpm</filename><sum type="sha256">67e450a99905904c54e049c6284a9e7c3d0a2e517c29c73a963050a23e9413a4</sum></package><package arch="i686" name="libtiff-devel" release="25.el7_2" src="libtiff-4.0.3-25.el7_2.src.rpm" version="4.0.3"><filename>libtiff-devel-4.0.3-25.el7_2.i686.rpm</filename><sum type="sha256">beb9decc149fa2a17afc636fb11f337e5c1e7051b24f3892f1ee8d1757563dc6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8127" id="CVE-2014-8127" title="Libtiff: Out-Of-Bounds Read With Malformed Tiff Image In Multiple Tools" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8129" id="CVE-2014-8129" title="Libtiff: Out-Of-Bounds Read/Write With Malformed Tiff Image In Tiff2Pdf" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8130" id="CVE-2014-8130" title="Libtiff: Divide By Zero In The Tiffdither Tool" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9330" id="CVE-2014-9330" title="Libtiff: Out-Of-Bounds Reads Followed By A Crash In Bmp2Tiff" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9655" id="CVE-2014-9655" title="Libtiff: Use Of Uninitialized Memory In Putcontig8Bitycbcr21Tile And Nextdecode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1547" id="CVE-2015-1547" title="Libtiff: Use Of Uninitialized Memory In Nextdecode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7554" id="CVE-2015-7554" title="Libtiff: Invalid-Write In _Tiffvgetfield() When Parsing Some Extension Tags" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8665" id="CVE-2015-8665" title="Libtiff: Out-Of-Bounds Read In Tif_Getimage.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8668" id="CVE-2015-8668" title="Libtiff: Oob Read In Bmp2Tiff" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8683" id="CVE-2015-8683" title="Libtiff: Out-Of-Bounds When Reading Cie Lab Image Format Files" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8781" id="CVE-2015-8781" title="Libtiff: Invalid Assertion" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8782" id="CVE-2015-8782" title="Libtiff: Invalid Assertion" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8783" id="CVE-2015-8783" title="Libtiff: Invalid Assertion" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8784" id="CVE-2015-8784" title="Libtiff: Out-Of-Bound Write In Nextdecode()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3632" id="CVE-2016-3632" title="Libtiff: Out-Of-Bounds Write In _Tiffvgetfield Function" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3945" id="CVE-2016-3945" title="Libtiff: Out-Of-Bounds Write In The Tiff2Rgba Tool" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3990" id="CVE-2016-3990" title="Libtiff: Out-Of-Bounds Write In Horizontaldifference8()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3991" id="CVE-2016-3991" title="Libtiff: Out-Of-Bounds Write In Loadimage() Function" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5320" id="CVE-2016-5320" title="Libtiff: Out-Of-Bounds Write In Pixarlogdecode() Function In Tif_Pixarlog.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1546" id="RHSA-2016:1546-1" title="Rhsa-2016:1546-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1177893" id="1177893" title="Libtiff: Out-Of-Bounds Reads Followed By A Crash In Bmp2Tiff" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1185805" id="1185805" title="Libtiff: Out-Of-Bounds Read With Malformed Tiff Image In Multiple Tools" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1185815" id="1185815" title="Libtiff: Out-Of-Bounds Read/Write With Malformed Tiff Image In Tiff2Pdf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1185817" id="1185817" title="Libtiff: Divide By Zero In The Tiffdither Tool" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1190703" id="1190703" title="Libtiff: Use Of Uninitialized Memory In Putcontig8Bitycbcr21Tile And Nextdecode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1190709" id="1190709" title="Libtiff: Use Of Uninitialized Memory In Nextdecode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1294417" id="1294417" title="Libtiff: Invalid-Write In _Tiffvgetfield() When Parsing Some Extension Tags" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1294425" id="1294425" title="Libtiff: Oob Read In Bmp2Tiff" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1294427" id="1294427" title="Libtiff: Out-Of-Bounds When Reading Cie Lab Image Format Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1294444" id="1294444" title="Libtiff: Out-Of-Bounds Read In Tif_Getimage.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301649" id="1301649" title="Libtiff: Invalid Assertion" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301652" id="1301652" title="Libtiff: Out-Of-Bound Write In Nextdecode()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1325093" id="1325093" title="Libtiff: Out-Of-Bounds Write In The Tiff2Rgba Tool" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1325095" id="1325095" title="Libtiff: Out-Of-Bounds Write In _Tiffvgetfield Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326246" id="1326246" title="Libtiff: Out-Of-Bounds Write In Horizontaldifference8()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326249" id="1326249" title="Libtiff: Out-Of-Bounds Write In Loadimage() Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346687" id="1346687" title="Libtiff: Out-Of-Bounds Write In Pixarlogdecode() Function In Tif_Pixarlog.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1551-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.3.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-2836, CVE-2016-5258, CVE-2016-5259, CVE-2016-5252, CVE-2016-5263, CVE-2016-2830, CVE-2016-2838, CVE-2016-5254, CVE-2016-5262, CVE-2016-5264, CVE-2016-5265, CVE-2016-2837)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-08-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_2" src="firefox-45.3.0-1.el7_2.src.rpm" version="45.3.0"><filename>firefox-45.3.0-1.el7_2.x86_64.rpm</filename><sum type="sha256">0fb3b07188ba1b7f8dafd42be0bda27c2f174f4979738c6de5e4a0dc87414dce</sum></package><package arch="i686" name="firefox" release="1.el7_2" src="firefox-45.3.0-1.el7_2.src.rpm" version="45.3.0"><filename>firefox-45.3.0-1.el7_2.i686.rpm</filename><sum type="sha256">f381db40af85ff836c228c9b28ac55bd9f3a43d53ce96687081220691334a1d2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2830" id="CVE-2016-2830" title="Mozilla: Favicon Network Connection Persists When Page Is Closed (Mfsa 2016-62)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2836" id="CVE-2016-2836" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:45.3) (Mfsa 2016-62)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2837" id="CVE-2016-2837" title="Mozilla: Buffer Overflow In Clearkey Content Decryption Module (Cdm) During Video Playback (Mfsa 2016-77)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2838" id="CVE-2016-2838" title="Mozilla: Buffer Overflow Rendering Svg With Bidirectional Content (Mfsa 2016-64)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5252" id="CVE-2016-5252" title="Mozilla: Stack Underflow During 2D Graphics Rendering (Mfsa 2016-67)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5254" id="CVE-2016-5254" title="Mozilla: Use-After-Free When Using Alt Key And Toplevel Menus (Mfsa 2016-70)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5258" id="CVE-2016-5258" title="Mozilla: Use-After-Free In Dtls During Webrtc Session Shutdown (Mfsa 2016-72)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5259" id="CVE-2016-5259" title="Mozilla: Use-After-Free In Service Workers With Nested Sync Events (Mfsa 2016-73)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5262" id="CVE-2016-5262" title="Mozilla: Scripts On Marquee Tag Can Execute In Sandboxed Iframes (Mfsa 2016-76)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5263" id="CVE-2016-5263" title="Mozilla: Type Confusion In Display Transformation (Mfsa 2016-78)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5264" id="CVE-2016-5264" title="Mozilla: Use-After-Free When Applying Svg Effects (Mfsa 2016-79)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5265" id="CVE-2016-5265" title="Mozilla: Same-Origin Policy Violation Using Local Html File And Saved Shortcut File (Mfsa 2016-80)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1551" id="RHSA-2016:1551-1" title="Rhsa-2016:1551-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342897" id="1342897" title="Mozilla: Favicon Network Connection Persists When Page Is Closed (Mfsa 2016-62)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361974" id="1361974" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:45.3) (Mfsa 2016-62)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361976" id="1361976" title="Mozilla: Buffer Overflow Rendering Svg With Bidirectional Content (Mfsa 2016-64)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361979" id="1361979" title="Mozilla: Stack Underflow During 2D Graphics Rendering (Mfsa 2016-67)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361980" id="1361980" title="Mozilla: Use-After-Free When Using Alt Key And Toplevel Menus (Mfsa 2016-70)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361982" id="1361982" title="Mozilla: Use-After-Free In Dtls During Webrtc Session Shutdown (Mfsa 2016-72)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361984" id="1361984" title="Mozilla: Use-After-Free In Service Workers With Nested Sync Events (Mfsa 2016-73)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361987" id="1361987" title="Mozilla: Scripts On Marquee Tag Can Execute In Sandboxed Iframes (Mfsa 2016-76)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361989" id="1361989" title="Mozilla: Buffer Overflow In Clearkey Content Decryption Module (Cdm) During Video Playback (Mfsa 2016-77)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361991" id="1361991" title="Mozilla: Type Confusion In Display Transformation (Mfsa 2016-78)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361992" id="1361992" title="Mozilla: Use-After-Free When Applying Svg Effects (Mfsa 2016-79)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361994" id="1361994" title="Mozilla: Same-Origin Policy Violation Using Local Html File And Saved Shortcut File (Mfsa 2016-80)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1602-1</id><title>Mariadb</title><description>The following packages have been upgraded to a newer upstream version: mariadb (5.5.50). 
Security Fix(es): 
(CVE-2016-0640, CVE-2016-0641, CVE-2016-0643, CVE-2016-0644, CVE-2016-0646, CVE-2016-0647, CVE-2016-0648, CVE-2016-0649, CVE-2016-0650, CVE-2016-0666, CVE-2016-3452, CVE-2016-3477, CVE-2016-3521, CVE-2016-3615, CVE-2016-5440, CVE-2016-5444)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-08-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="mariadb-embedded" release="1.el7_2" src="mariadb-5.5.50-1.el7_2.src.rpm" version="5.5.50"><filename>mariadb-embedded-5.5.50-1.el7_2.x86_64.rpm</filename><sum type="sha256">39df28ded5a3a00835f882879b7aa8be1a7bbd256679b8e4418adcc3c6e34017</sum></package><package arch="x86_64" epoch="1" name="mariadb-bench" release="1.el7_2" src="mariadb-5.5.50-1.el7_2.src.rpm" version="5.5.50"><filename>mariadb-bench-5.5.50-1.el7_2.x86_64.rpm</filename><sum type="sha256">3de924296162d2a95ac9a606f0885aeff19451df37fc80576e31bfe3107a72c4</sum></package><package arch="i686" epoch="1" name="mariadb-devel" release="1.el7_2" src="mariadb-5.5.50-1.el7_2.src.rpm" version="5.5.50"><filename>mariadb-devel-5.5.50-1.el7_2.i686.rpm</filename><sum type="sha256">d47002d324cc132cac976c8d2652fd52dea513e8530c6b8b025c4bcbfeccbad3</sum></package><package arch="x86_64" epoch="1" name="mariadb-devel" release="1.el7_2" src="mariadb-5.5.50-1.el7_2.src.rpm" version="5.5.50"><filename>mariadb-devel-5.5.50-1.el7_2.x86_64.rpm</filename><sum type="sha256">1b3407ca92085d1cf0afe36f2e9b914cc98b580d8ed4ebd19a6d2ce92e9b6912</sum></package><package arch="x86_64" epoch="1" name="mariadb-test" release="1.el7_2" src="mariadb-5.5.50-1.el7_2.src.rpm" version="5.5.50"><filename>mariadb-test-5.5.50-1.el7_2.x86_64.rpm</filename><sum type="sha256">ed396bb94e61ec9e50ce4a3a628a9e4fbd0bf0b8e8c04b2bbad3cc2eab815321</sum></package><package arch="x86_64" epoch="1" name="mariadb-embedded-devel" release="1.el7_2" src="mariadb-5.5.50-1.el7_2.src.rpm" version="5.5.50"><filename>mariadb-embedded-devel-5.5.50-1.el7_2.x86_64.rpm</filename><sum type="sha256">4034de22d81c7bb3c89b4dd395ec9f9d0d93e81a01e719fd9f1722bacb558c30</sum></package><package arch="i686" epoch="1" name="mariadb-libs" release="1.el7_2" src="mariadb-5.5.50-1.el7_2.src.rpm" version="5.5.50"><filename>mariadb-libs-5.5.50-1.el7_2.i686.rpm</filename><sum type="sha256">12a6939cad3debb58c63ec49a1b503ce7542342b2c619b11e4a128c622e38724</sum></package><package arch="x86_64" epoch="1" name="mariadb-server" release="1.el7_2" src="mariadb-5.5.50-1.el7_2.src.rpm" version="5.5.50"><filename>mariadb-server-5.5.50-1.el7_2.x86_64.rpm</filename><sum type="sha256">20eeb4e7b2cf7664b09e4e8f7b3bf73079d61a91ee81409638617aa843739aa5</sum></package><package arch="i686" epoch="1" name="mariadb-embedded" release="1.el7_2" src="mariadb-5.5.50-1.el7_2.src.rpm" version="5.5.50"><filename>mariadb-embedded-5.5.50-1.el7_2.i686.rpm</filename><sum type="sha256">a5dbf5ddaf8a3b988a730f153902a589ecfe474684079cc060488479084359b3</sum></package><package arch="x86_64" epoch="1" name="mariadb" release="1.el7_2" src="mariadb-5.5.50-1.el7_2.src.rpm" version="5.5.50"><filename>mariadb-5.5.50-1.el7_2.x86_64.rpm</filename><sum type="sha256">36d548cdb0a2db368a87b6f9730e2ef3fcdadb8369be85ee63334b984837955c</sum></package><package arch="x86_64" epoch="1" name="mariadb-libs" release="1.el7_2" src="mariadb-5.5.50-1.el7_2.src.rpm" version="5.5.50"><filename>mariadb-libs-5.5.50-1.el7_2.x86_64.rpm</filename><sum type="sha256">83f5d3a07a21667a25f6f68dae28b25cf17f048399a1793ec1c925cf66181963</sum></package><package arch="i686" epoch="1" name="mariadb-embedded-devel" release="1.el7_2" src="mariadb-5.5.50-1.el7_2.src.rpm" version="5.5.50"><filename>mariadb-embedded-devel-5.5.50-1.el7_2.i686.rpm</filename><sum type="sha256">5b0d6a87ceb897becc2732f4fac51ae222098ec4deb65ced9c792de3837834eb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0640" id="CVE-2016-0640" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0641" id="CVE-2016-0641" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0643" id="CVE-2016-0643" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0644" id="CVE-2016-0644" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0646" id="CVE-2016-0646" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0647" id="CVE-2016-0647" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0648" id="CVE-2016-0648" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0649" id="CVE-2016-0649" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0650" id="CVE-2016-0650" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0666" id="CVE-2016-0666" title="Mysql: Unspecified Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3452" id="CVE-2016-3452" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Security: Encryption (Cpu July 2016)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3477" id="CVE-2016-3477" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Parser (Cpu July 2016)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3521" id="CVE-2016-3521" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Types (Cpu July 2016)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3615" id="CVE-2016-3615" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Dml (Cpu July 2016)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5440" id="CVE-2016-5440" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Rbr (Cpu July 2016)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5444" id="CVE-2016-5444" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Connection (Cpu July 2016)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1602" id="RHSA-2016:1602-1" title="Rhsa-2016:1602-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329239" id="1329239" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329241" id="1329241" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329245" id="1329245" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329247" id="1329247" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329248" id="1329248" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329249" id="1329249" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329251" id="1329251" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329252" id="1329252" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329253" id="1329253" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329270" id="1329270" title="Mysql: Unspecified Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358201" id="1358201" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Security: Encryption (Cpu July 2016)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358205" id="1358205" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Parser (Cpu July 2016)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358209" id="1358209" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Types (Cpu July 2016)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358212" id="1358212" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Dml (Cpu July 2016)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358218" id="1358218" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Rbr (Cpu July 2016)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358223" id="1358223" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Connection (Cpu July 2016)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1606-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* Quick Emulator(Qemu) built with the Block driver for iSCSI images support (virtio-blk) is vulnerable to a heap buffer overflow issue. It could occur while processing iSCSI asynchronous I/O ioctl(2) calls. A user inside guest could use this flaw to crash the Qemu process resulting in DoS or potentially leverage it to execute arbitrary code with privileges of the Qemu process on the host. (CVE-2016-5126) 
* Quick emulator(Qemu) built with the virtio framework is vulnerable to an unbounded memory allocation issue. It was found that a malicious guest user could submit more requests than the virtqueue size permits. Processing a request allocates a VirtQueueElement and therefore causes unbounded memory allocation on the host controlled by the guest. (CVE-2016-5403)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-08-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="105.el7_2.7" src="qemu-kvm-1.5.3-105.el7_2.7.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-105.el7_2.7.x86_64.rpm</filename><sum type="sha256">c16a297cdcffde574a135b3327d969e447b3028398da9e999fc3f518bef915bb</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="105.el7_2.7" src="qemu-kvm-1.5.3-105.el7_2.7.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-105.el7_2.7.x86_64.rpm</filename><sum type="sha256">a4d960ce3c92e05f3e407c5e0db416eb456aa900f90b5138cbbfb388d0a72f0c</sum></package><package arch="x86_64" epoch="10" name="libcacard" release="105.el7_2.7" src="qemu-kvm-1.5.3-105.el7_2.7.src.rpm" version="1.5.3"><filename>libcacard-1.5.3-105.el7_2.7.x86_64.rpm</filename><sum type="sha256">4995429b8d5c4cecb888e265faa1c5c9fc6dc5265f4448ca837b448ad09bb52e</sum></package><package arch="x86_64" epoch="10" name="libcacard-tools" release="105.el7_2.7" src="qemu-kvm-1.5.3-105.el7_2.7.src.rpm" version="1.5.3"><filename>libcacard-tools-1.5.3-105.el7_2.7.x86_64.rpm</filename><sum type="sha256">d7413b57c5fedd5b0d34ddfbaf1c4d365016c37b038daed18c0d90b21d129168</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="105.el7_2.7" src="qemu-kvm-1.5.3-105.el7_2.7.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-105.el7_2.7.x86_64.rpm</filename><sum type="sha256">a1804928cdc95e58d3bbe09f8d65d1954439234e6d568f0428a35e84ba6ad770</sum></package><package arch="x86_64" epoch="10" name="libcacard-devel" release="105.el7_2.7" src="qemu-kvm-1.5.3-105.el7_2.7.src.rpm" version="1.5.3"><filename>libcacard-devel-1.5.3-105.el7_2.7.x86_64.rpm</filename><sum type="sha256">b8486f48b80b3270b27a3c96d04ad32a0ee40768c3c4dd12bdf1b159c896802c</sum></package><package arch="i686" epoch="10" name="libcacard" release="105.el7_2.7" src="qemu-kvm-1.5.3-105.el7_2.7.src.rpm" version="1.5.3"><filename>libcacard-1.5.3-105.el7_2.7.i686.rpm</filename><sum type="sha256">07a01adff8f29d07534c15af8c2d2d379d63d59e792e501b5370f059710166e2</sum></package><package arch="i686" epoch="10" name="libcacard-devel" release="105.el7_2.7" src="qemu-kvm-1.5.3-105.el7_2.7.src.rpm" version="1.5.3"><filename>libcacard-devel-1.5.3-105.el7_2.7.i686.rpm</filename><sum type="sha256">53d33667922e68b169a537b1b2965b045909619966ae3cb8a01b39961bc240ce</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="105.el7_2.7" src="qemu-kvm-1.5.3-105.el7_2.7.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-105.el7_2.7.x86_64.rpm</filename><sum type="sha256">1d4b4affaa53a935c48c81dcc5e1a4cce7830cb059550ac453651a43be0ef2f3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5126" id="CVE-2016-5126" title="Qemu: Block: Iscsi: Buffer Overflow In Iscsi_Aio_Ioctl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5403" id="CVE-2016-5403" title="Qemu: Virtio: Unbounded Memory Allocation On Host Via Guest Leading To Dos" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1606" id="RHSA-2016:1606-1" title="Rhsa-2016:1606-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1340924" id="1340924" title="Qemu: Block: Iscsi: Buffer Overflow In Iscsi_Aio_Ioctl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358359" id="1358359" title="Qemu: Virtio: Unbounded Memory Allocation On Host Via Guest Leading To Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1613-1</id><title>Php</title><description>Security Fix(es): 
* It was discovered that PHP did not properly protect against the HTTP_PROXY variable name clash. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a PHP script to an attacker- controlled proxy via a malicious HTTP request. (CVE-2016-5385) 
Bug Fix(es): 
* Previously, an incorrect logic in the SAPI header callback routine caused that the callback counter was not incremented. Consequently, when a script included a header callback, it could terminate unexpectedly with a segmentation fault. With this update, the callback counter is properly managed, and scripts with a header callback implementation work as expected.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-08-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="php-dba" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-dba-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">c68816f52e18f23a1bece5f4896c233d02e81b110e2a47611c4f250f793d0ff5</sum></package><package arch="x86_64" name="php-xml" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-xml-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">577ce3cc3f26a6c7c837d11517db941dae63bc0ae2dc420dfd11d8f23fe4745b</sum></package><package arch="x86_64" name="php-process" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-process-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">19088a290ccad09de0c44c7aa04f514fd61072be7190226264d5b606e8a5b86a</sum></package><package arch="x86_64" name="php-pspell" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-pspell-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">41a35b9ce473666073c3befe00fa3cc30dc1937ea653de77927899ff3a2543d5</sum></package><package arch="x86_64" name="php-devel" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-devel-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">cb8745f78ff52f286bd3dcd1153fb587b90b62cb876b87e49570afdabba98c9d</sum></package><package arch="x86_64" name="php-odbc" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-odbc-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">bd5997442d8859e859a4d3231a326abd22540947c40fe453e3bf905c6aec3e8e</sum></package><package arch="x86_64" name="php-ldap" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-ldap-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">8979ad955e350fac065dde32bcd8e803a1f7cfa5677ef34974730b706cda0999</sum></package><package arch="x86_64" name="php-embedded" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-embedded-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">983146a8f6b1faac6098c058a51fd6e0d11352e932ac96ab9f6363e3ce348acd</sum></package><package arch="x86_64" name="php-snmp" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-snmp-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">c2c5f81f475fc97ce9f66c14584b1bf7a327675a3ae9eeb0deaed2c6925121fa</sum></package><package arch="x86_64" name="php-soap" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-soap-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">b5fc00fb470a35be9ed3e2299272e651604b3f8a28892d41998ccd20daa2e5ba</sum></package><package arch="x86_64" name="php-enchant" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-enchant-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">1996df7e3226f1132ae36fcb1fdc78f3418de5b28cc4c466ca6440f99c8e4823</sum></package><package arch="x86_64" name="php-common" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-common-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">ebd9a8204ccf4df4d928ceec1e1f43b1d8b1152fcdef7ab21db539df1c32403f</sum></package><package arch="x86_64" name="php-xmlrpc" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-xmlrpc-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">cec55d5b57ba5ee63e2ca84afb89572200971575cbeb495f2f126507cf6f3e85</sum></package><package arch="x86_64" name="php" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">6d50f35255977ec1e3abb1340a9cab0933fcc994f0e3c05a9a04a61392c8bf37</sum></package><package arch="x86_64" name="php-mbstring" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-mbstring-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">6b23c5f83163409e17e31c9a17b0f1fdf7764955fb6c9700414a2e656bc06d6b</sum></package><package arch="x86_64" name="php-cli" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-cli-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">4ee5eb94f3da32e208e8278f3d7d8872a2f90b6746f05ae0326e9a9c3d0579c2</sum></package><package arch="x86_64" name="php-pgsql" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-pgsql-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">7467d46e96504135c0be3ae966440aeb927097be03ef534a368a65c465d97abd</sum></package><package arch="x86_64" name="php-pdo" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-pdo-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">7872de7247bfd1bff568d94007495c44aac46158ec593439dfce762d3f73a620</sum></package><package arch="x86_64" name="php-gd" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-gd-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">deb59f64ef1c1771384d1e63baaa49a4c02a31b66f7832bbeb71f05bcb3cd9c1</sum></package><package arch="x86_64" name="php-mysql" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-mysql-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">cfdc13d3223dd942273238522d87bcfbff44556a7fd14fe0f507ef2cf35768df</sum></package><package arch="x86_64" name="php-mysqlnd" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-mysqlnd-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">44c8acbfe517b83b9af4c15f2c98ceee7fd6d48cf08ce72a9a5770b3760387ad</sum></package><package arch="x86_64" name="php-recode" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-recode-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">44ab1ecfb62ec36740c6017a7cc50abd5ec739a61d0a4f5e48e7a1f2c2ab08d2</sum></package><package arch="x86_64" name="php-fpm" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-fpm-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">b9563bcd85958078bc0ae84c1168a43c6c61b163414a71df8e0a586e5b3ddf11</sum></package><package arch="x86_64" name="php-intl" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-intl-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">ede2921af12c65fe940e1960989519c8931e30ea160d6eaf15c677de624ca897</sum></package><package arch="x86_64" name="php-bcmath" release="36.3.el7_2" src="php-5.4.16-36.3.el7_2.src.rpm" version="5.4.16"><filename>php-bcmath-5.4.16-36.3.el7_2.x86_64.rpm</filename><sum type="sha256">dec25b3d679dca4aa01e7ab9aed0b95164ffbb48de2eabea331e279eb4f69e7e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5385" id="CVE-2016-5385" title="Php: Sets Environmental Variable Based On User Supplied Proxy Request Header" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1613" id="RHSA-2016:1613-1" title="Rhsa-2016:1613-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346758" id="1346758" title="Segmentation Fault While Header_Register_Callback" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1353794" id="1353794" title="Php: Sets Environmental Variable Based On User Supplied Proxy Request Header" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1626-1</id><title>Python</title><description>Security Fix(es): 
* It was discovered that the Python CGIHandler class did not properly protect against the HTTP_PROXY variable name clash in a CGI context. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a Python CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-1000110) 
* It was found that Python's smtplib library did not return an exception when StartTLS failed to be established in the SMTP.starttls() function. A man in the middle attacker could strip out the STARTTLS command without generating an exception on the Python SMTP client application, preventing the establishment of the TLS layer. (CVE-2016-0772) 
* It was found that the Python's httplib library (used by urllib, urllib2 and others) did not properly check HTTPConnection.putheader() function arguments. An attacker could use this flaw to inject additional headers in a Python application that allowed user provided header names or values. (CVE-2016-5699)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-08-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-test" release="38.el7_2" src="python-2.7.5-38.el7_2.src.rpm" version="2.7.5"><filename>python-test-2.7.5-38.el7_2.x86_64.rpm</filename><sum type="sha256">028a50c6ae23af0f87e980dcf835813bd8548c22819d63bed5b70c2258a34441</sum></package><package arch="x86_64" name="tkinter" release="38.el7_2" src="python-2.7.5-38.el7_2.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-38.el7_2.x86_64.rpm</filename><sum type="sha256">09d52e7179638d14e2e3fb2ff2ae9bda056c13c652b2db6e4e183b642976a5cc</sum></package><package arch="x86_64" name="python-debug" release="38.el7_2" src="python-2.7.5-38.el7_2.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-38.el7_2.x86_64.rpm</filename><sum type="sha256">cba4f030d97067c490249e668e0157779167cb71d9f2ceff2f40a4341eaf309a</sum></package><package arch="x86_64" name="python-tools" release="38.el7_2" src="python-2.7.5-38.el7_2.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-38.el7_2.x86_64.rpm</filename><sum type="sha256">4fcf80b816585f5c405e682d311aedff20d2ee23689c4f1d1a03117538383814</sum></package><package arch="x86_64" name="python" release="38.el7_2" src="python-2.7.5-38.el7_2.src.rpm" version="2.7.5"><filename>python-2.7.5-38.el7_2.x86_64.rpm</filename><sum type="sha256">c8292b8b314b61abfce00d9112cf2b1c2605ff83ff4fceb51160b89687a54bf3</sum></package><package arch="x86_64" name="python-libs" release="38.el7_2" src="python-2.7.5-38.el7_2.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-38.el7_2.x86_64.rpm</filename><sum type="sha256">565c59da32839a1162014755f85a09a5c630a64433656ed282c5baebd0c16cd9</sum></package><package arch="x86_64" name="python-devel" release="38.el7_2" src="python-2.7.5-38.el7_2.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-38.el7_2.x86_64.rpm</filename><sum type="sha256">a212882ed780311daa47113270742b17f8034f94cdf5c4d96272e0a036b970e1</sum></package><package arch="i686" name="python-libs" release="38.el7_2" src="python-2.7.5-38.el7_2.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-38.el7_2.i686.rpm</filename><sum type="sha256">92cfd07c8b5470f90ed984d8059392c9346db58c4575626657f7cc9229b9bc9d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0772" id="CVE-2016-0772" title="Python: Smtplib Starttls Stripping Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000110" id="CVE-2016-1000110" title="Python Cgihandler: Sets Environmental Variable Based On User Supplied Proxy Request Header" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5699" id="CVE-2016-5699" title="Python: Http Protocol Steam Injection Attack" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1626" id="RHSA-2016:1626-1" title="Rhsa-2016:1626-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1303647" id="1303647" title="Python: Smtplib Starttls Stripping Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1303699" id="1303699" title="Python: Http Protocol Steam Injection Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351584" id="1351584" title="Python Brew Builds Fail For Rhel 7.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357334" id="1357334" title="Python Cgihandler: Sets Environmental Variable Based On User Supplied Proxy Request Header" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1365200" id="1365200" title="Upstream Tests Cause Building Python Package On Brew Stall And Leave Orphan Processes That Need Manually Kill" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1633-1</id><title>Kernel</title><description>It was found that the RFC 5961 challenge ACK rate limiting as implemented in the Linux kernel's networking subsystem allowed an off-path attacker to leak certain information about a given connection by creating congestion on the global challenge ACK rate limit counter and then measuring the changes  by probing packets. An off-path attacker could use this flaw to either  terminate TCP connection and/or inject payload into non-secured TCP  connection between two endpoints on the network. (CVE-2016-5696, Important)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-08-19 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools-libs-devel" release="327.28.3.el7" src="kernel-3.10.0-327.28.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-327.28.3.el7.x86_64.rpm</filename><sum type="sha256">f73fa41a3d502a532ed92991b8cc2b332ebc2e5e7475b6b08d3086ee72f5b3a8</sum></package><package arch="x86_64" name="kernel" release="327.28.3.el7" src="kernel-3.10.0-327.28.3.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-327.28.3.el7.x86_64.rpm</filename><sum type="sha256">f5998200db0d032521ffd309bbc3c3216db2417cd6dc83401057d3ea59092658</sum></package><package arch="x86_64" name="kernel-headers" release="327.28.3.el7" src="kernel-3.10.0-327.28.3.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-327.28.3.el7.x86_64.rpm</filename><sum type="sha256">a147ce3ece2f5c66ce41c2e50c0a62ad0b80699ecc51eeb748c689d7f5207715</sum></package><package arch="x86_64" name="perf" release="327.28.3.el7" src="kernel-3.10.0-327.28.3.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-327.28.3.el7.x86_64.rpm</filename><sum type="sha256">1699ab7ce6c70d93eba722e39060b3825806b22337029eb0b4cb34a69e6f5a7d</sum></package><package arch="x86_64" name="kernel-debug" release="327.28.3.el7" src="kernel-3.10.0-327.28.3.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-327.28.3.el7.x86_64.rpm</filename><sum type="sha256">43a4b56ebf14d85ed3991ad49e46ce557b781d8608c1acd6111ec35a8f528668</sum></package><package arch="x86_64" name="kernel-debug-devel" release="327.28.3.el7" src="kernel-3.10.0-327.28.3.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-327.28.3.el7.x86_64.rpm</filename><sum type="sha256">310e6f669929ded1da0d08428350a47ee536717f7cd4ee3d2ab97afb5d4db8cd</sum></package><package arch="x86_64" name="python-perf" release="327.28.3.el7" src="kernel-3.10.0-327.28.3.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-327.28.3.el7.x86_64.rpm</filename><sum type="sha256">020e807a6cec721480f7b7cfc1329a773b06ef3243eb75aa3d4edfcd065d04c1</sum></package><package arch="noarch" name="kernel-doc" release="327.28.3.el7" src="kernel-3.10.0-327.28.3.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-327.28.3.el7.noarch.rpm</filename><sum type="sha256">527c88e49011e8cf8f726853e08dfde14866f21434c0e51a6b08d7d53314fd31</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="327.28.3.el7" src="kernel-3.10.0-327.28.3.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-327.28.3.el7.noarch.rpm</filename><sum type="sha256">3b575a5a21b1eb9004ae4d1c021343e5df1814623760e047ef1928bc0a2533e5</sum></package><package arch="x86_64" name="kernel-devel" release="327.28.3.el7" src="kernel-3.10.0-327.28.3.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-327.28.3.el7.x86_64.rpm</filename><sum type="sha256">3c4f6b84da3e5ad429263a8f71ddbe37821731ccf7f87d2b833380dbc88ef21b</sum></package><package arch="x86_64" name="kernel-tools" release="327.28.3.el7" src="kernel-3.10.0-327.28.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-327.28.3.el7.x86_64.rpm</filename><sum type="sha256">025f4401b2b52eaa29350c544bd4a93c4b1a17cdae030188a0f9df76b52bac87</sum></package><package arch="x86_64" name="kernel-tools-libs" release="327.28.3.el7" src="kernel-3.10.0-327.28.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-327.28.3.el7.x86_64.rpm</filename><sum type="sha256">4d85bc640477b522aa56e7a1c0f80c4eb7a08e577b42478540607ce1ac8e66b3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5696" id="CVE-2016-5696" title="Kernel: Challenge Ack Counter Information Disclosure." type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1633" id="RHSA-2016:1633-1" title="Rhsa-2016:1633-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1354708" id="1354708" title="Kernel: Challenge Ack Counter Information Disclosure." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1776-1</id><title>Java-1.6.0-Openjdk</title><description>Security Fix(es): 
* An insufficient bytecode verification flaw was discovered in the Hotspot component in OpenJDK. An untrusted Java application or applet could use this flaw to completely bypass Java sandbox restrictions. (CVE-2016-3606) 
* Multiple denial of service flaws were found in the JAXP component in OpenJDK. A specially crafted XML file could cause a Java application using JAXP to consume an excessive amount of CPU and memory when parsed. (CVE-2016-3500, CVE-2016-3508) 
* Multiple flaws were found in the CORBA and Hotsport components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2016-3458, CVE-2016-3550)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.12.5.el7_2" src="java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2.src.rpm" version="1.6.0.40"><filename>java-1.6.0-openjdk-devel-1.6.0.40-1.13.12.5.el7_2.x86_64.rpm</filename><sum type="sha256">f7ff72ef8622cbff6186313f846a68fa4b42ec6c16db75dad6358e4e5a07f9a9</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.12.5.el7_2" src="java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2.src.rpm" version="1.6.0.40"><filename>java-1.6.0-openjdk-demo-1.6.0.40-1.13.12.5.el7_2.x86_64.rpm</filename><sum type="sha256">259991b546b30dd1edf60207c9306a4480e987017de1d2d489f4c6900fcaaf11</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.12.5.el7_2" src="java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2.src.rpm" version="1.6.0.40"><filename>java-1.6.0-openjdk-javadoc-1.6.0.40-1.13.12.5.el7_2.x86_64.rpm</filename><sum type="sha256">5cd48ef26979da4eedc15f571bd76da4fe7f2d0219813983bd67c043a36558e3</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk" release="1.13.12.5.el7_2" src="java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2.src.rpm" version="1.6.0.40"><filename>java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2.x86_64.rpm</filename><sum type="sha256">3c2a36f0aff8a81c5632bb0b9fff1b75d5d742c9b4f47609abbf7b41b378526c</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.12.5.el7_2" src="java-1.6.0-openjdk-1.6.0.40-1.13.12.5.el7_2.src.rpm" version="1.6.0.40"><filename>java-1.6.0-openjdk-src-1.6.0.40-1.13.12.5.el7_2.x86_64.rpm</filename><sum type="sha256">76d4f2f9e3f9f1679bbd59ebd5e2565ae0b8dd03b8e49130d4ac24a206957f06</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3458" id="CVE-2016-3458" title="Openjdk: Insufficient Restrictions On The Use Of Custom Valuehandler (Corba, 8079718)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3500" id="CVE-2016-3500" title="Openjdk: Maximum Xml Name Limit Not Applied To Namespace Uris (Jaxp, 8148872)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3508" id="CVE-2016-3508" title="Openjdk: Missing Entity Replacement Limits (Jaxp, 8149962)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3550" id="CVE-2016-3550" title="Openjdk: Integer Overflows In Bytecode Streams (Hotspot, 8152479)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3606" id="CVE-2016-3606" title="Openjdk: Insufficient Bytecode Verification (Hotspot, 8155981)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1776" id="RHSA-2016:1776-1" title="Rhsa-2016:1776-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356963" id="1356963" title="Openjdk: Insufficient Bytecode Verification (Hotspot, 8155981)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357008" id="1357008" title="Openjdk: Maximum Xml Name Limit Not Applied To Namespace Uris (Jaxp, 8148872)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357015" id="1357015" title="Openjdk: Missing Entity Replacement Limits (Jaxp, 8149962)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357494" id="1357494" title="Openjdk: Insufficient Restrictions On The Use Of Custom Valuehandler (Corba, 8079718)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357506" id="1357506" title="Openjdk: Integer Overflows In Bytecode Streams (Hotspot, 8152479)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1797-1</id><title>Ipa</title><description>Security Fix(es): 
* An insufficient permission check issue was found in the way IPA server treats certificate revocation requests. An attacker logged in with the 'retrieve certificate' permission enabled could use this flaw to revoke certificates, possibly triggering a denial of service attack. (CVE-2016-5404)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-09-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ipa-server-dns" release="15.sl7_2.19" src="ipa-4.2.0-15.sl7_2.19.src.rpm" version="4.2.0"><filename>ipa-server-dns-4.2.0-15.sl7_2.19.x86_64.rpm</filename><sum type="sha256">2f17555730be9b4fcad2d1c01cae4509fa1f21b6b90de6373991c64fc4ff74b6</sum></package><package arch="x86_64" name="ipa-client" release="15.sl7_2.19" src="ipa-4.2.0-15.sl7_2.19.src.rpm" version="4.2.0"><filename>ipa-client-4.2.0-15.sl7_2.19.x86_64.rpm</filename><sum type="sha256">a4dd86bc57919d594ec6aa1f2519dc81c9c73982262db3ff7b105acea6000a72</sum></package><package arch="x86_64" name="ipa-python" release="15.sl7_2.19" src="ipa-4.2.0-15.sl7_2.19.src.rpm" version="4.2.0"><filename>ipa-python-4.2.0-15.sl7_2.19.x86_64.rpm</filename><sum type="sha256">ecdf6217c564464052855973a251e09b58cf430c48088cbdffa0bd7ab076440b</sum></package><package arch="x86_64" name="ipa-server" release="15.sl7_2.19" src="ipa-4.2.0-15.sl7_2.19.src.rpm" version="4.2.0"><filename>ipa-server-4.2.0-15.sl7_2.19.x86_64.rpm</filename><sum type="sha256">dae57fa1658afb9d87620d6794cf659c343ffd09584f9d8a2d80477ae7595ec3</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="15.sl7_2.19" src="ipa-4.2.0-15.sl7_2.19.src.rpm" version="4.2.0"><filename>ipa-server-trust-ad-4.2.0-15.sl7_2.19.x86_64.rpm</filename><sum type="sha256">eec47ff05e9ea6026b38a968c825dc15c2c9489e0c1ceed18d14da4f7def8886</sum></package><package arch="x86_64" name="ipa-admintools" release="15.sl7_2.19" src="ipa-4.2.0-15.sl7_2.19.src.rpm" version="4.2.0"><filename>ipa-admintools-4.2.0-15.sl7_2.19.x86_64.rpm</filename><sum type="sha256">3801e0e16b1ffc27892265ef4f38bff8563bf571c4d785921fb90de382a1d553</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5404" id="CVE-2016-5404" title="Ipa: Insufficient Privileges Check In Certificate Revocation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1797" id="RHSA-2016:1797-1" title="Rhsa-2016:1797-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351593" id="1351593" title="Ipa: Insufficient Privileges Check In Certificate Revocation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1809-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.3.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-2836)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-09-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_2" src="thunderbird-45.3.0-1.el7_2.src.rpm" version="45.3.0"><filename>thunderbird-45.3.0-1.el7_2.x86_64.rpm</filename><sum type="sha256">f1a8ce04ecaf830ab2a55c8a653db3b4865e3be00b0ac43ced3ef4f56735f513</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2836" id="CVE-2016-2836" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:45.3) (Mfsa 2016-62)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1809" id="RHSA-2016:1809-1" title="Rhsa-2016:1809-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361974" id="1361974" title="Mozilla: Miscellaneous Memory Safety Hazards (Rv:45.3) (Mfsa 2016-62)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1844-1</id><title>Libarchive</title><description>Security Fix(es): 
* A flaw was found in the way libarchive handled hardlink archive entries of non-zero size. Combined with flaws in libarchive's file system sandboxing, this issue could cause an application using libarchive to overwrite arbitrary files with arbitrary data from the archive. (CVE-2016-5418) 
* Multiple out-of-bounds write flaws were found in libarchive. Specially crafted ZIP, 7ZIP, or RAR files could cause a heap overflow, potentially allowing code execution in the context of the application using libarchive. (CVE-2016-1541, CVE-2016-4300, CVE-2016-4302) 
* Multiple out-of-bounds read flaws were found in libarchive. Specially crafted LZA/LZH, AR, MTREE, ZIP, TAR, or RAR files could cause the application to read data out of bounds, potentially disclosing a small amount of application memory, or causing an application crash. (CVE-2015-8919, CVE-2015-8920, CVE-2015-8921, CVE-2015-8923, CVE-2015-8924, CVE-2015-8925, CVE-2015-8926, CVE-2015-8928, CVE-2015-8934) 
* Multiple NULL pointer dereference flaws were found in libarchive. Specially crafted RAR, CAB, or 7ZIP files could cause an application using libarchive to crash. (CVE-2015-8916, CVE-2015-8917, CVE-2015-8922) 
* Multiple infinite loop / resource exhaustion flaws were found in libarchive. Specially crafted GZIP or ISO files could cause the application to consume an excessive amount of resources, eventually leading to a crash on memory exhaustion. (CVE-2016-7166, CVE-2015-8930) 
* A denial of service vulnerability was found in libarchive. A specially crafted CPIO archive containing a symbolic link to a large target path could cause memory allocation to fail, causing an application using libarchive that attempted to view or extract such archive to crash. (CVE-2016-4809) 
* An integer overflow flaw, leading to a buffer overflow, was found in libarchive's construction of ISO9660 volumes. Attempting to create an ISO9660 volume with 2 GB or 4 GB file names could cause the application to attempt to allocate 20 GB of memory. If this were to succeed, it could lead to an out of bounds write on the heap and potential code execution. (CVE-2016-6250) 
* Multiple instances of undefined behavior due to arithmetic overflow were found in libarchive. Specially crafted MTREE archives, Compress streams, or ISO9660 volumes could potentially cause the application to fail to read the archive, or to crash. (CVE-2015-8931, CVE-2015-8932, CVE-2016-5844)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-09-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libarchive" release="10.el7_2" src="libarchive-3.1.2-10.el7_2.src.rpm" version="3.1.2"><filename>libarchive-3.1.2-10.el7_2.x86_64.rpm</filename><sum type="sha256">9e800f144d5e492874cd12ee61b19503dbe0b2a3c6611041387bf595ca623632</sum></package><package arch="i686" name="libarchive" release="10.el7_2" src="libarchive-3.1.2-10.el7_2.src.rpm" version="3.1.2"><filename>libarchive-3.1.2-10.el7_2.i686.rpm</filename><sum type="sha256">2745ea1d59f3a65469a976e815f9b34a66de0df5a157dfd85211af7b88aa0b49</sum></package><package arch="x86_64" name="bsdtar" release="10.el7_2" src="libarchive-3.1.2-10.el7_2.src.rpm" version="3.1.2"><filename>bsdtar-3.1.2-10.el7_2.x86_64.rpm</filename><sum type="sha256">95c94e7c2ca436905e6b149a6e893443d41c2ae27fb823a4a9c4948930cdc951</sum></package><package arch="x86_64" name="bsdcpio" release="10.el7_2" src="libarchive-3.1.2-10.el7_2.src.rpm" version="3.1.2"><filename>bsdcpio-3.1.2-10.el7_2.x86_64.rpm</filename><sum type="sha256">48b550d184d4d09b2f66e60d6933d09e48e3179948f8c7c589476e9ea1007283</sum></package><package arch="i686" name="libarchive-devel" release="10.el7_2" src="libarchive-3.1.2-10.el7_2.src.rpm" version="3.1.2"><filename>libarchive-devel-3.1.2-10.el7_2.i686.rpm</filename><sum type="sha256">580d066bc77a752d0f13618a1edaee88ac1d4702e2a00d1f7f4813d2a3f01ddf</sum></package><package arch="x86_64" name="libarchive-devel" release="10.el7_2" src="libarchive-3.1.2-10.el7_2.src.rpm" version="3.1.2"><filename>libarchive-devel-3.1.2-10.el7_2.x86_64.rpm</filename><sum type="sha256">f0f3c8a40d2613a1d295620b6884c26bf1c60d3b93cc75351725696c7a60dc4f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8916" id="CVE-2015-8916" title="Libarchive: Null Pointer Access In Rar Parser Through Bsdtar" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8917" id="CVE-2015-8917" title="Libarchive: Null Pointer Access In Cab Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8919" id="CVE-2015-8919" title="Libarchive: Heap Out Of Bounds Read In Lha/Lzh Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8920" id="CVE-2015-8920" title="Libarchive: Stack Out Of Bounds Read In Ar Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8921" id="CVE-2015-8921" title="Libarchive: Global Out Of Bounds Read In Mtree Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8922" id="CVE-2015-8922" title="Libarchive: Null Pointer Access In 7Z Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8923" id="CVE-2015-8923" title="Libarchive: Unclear Crashes In Zip Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8924" id="CVE-2015-8924" title="Libarchive: Heap Out Of Bounds Read In Tar Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8925" id="CVE-2015-8925" title="Libarchive: Unclear Invalid Memory Read In Mtree Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8926" id="CVE-2015-8926" title="Libarchive: Null Pointer Access In Rar Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8928" id="CVE-2015-8928" title="Libarchive: Heap Out Of Bounds Read In Mtree Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8930" id="CVE-2015-8930" title="Libarchive: Endless Loop In Iso Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8931" id="CVE-2015-8931" title="Libarchive: Undefined Behavior (Signed Integer Overflow) In Mtree Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8932" id="CVE-2015-8932" title="Libarchive: Undefined Behavior / Invalid Shiftleft In Tar Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8934" id="CVE-2015-8934" title="Libarchive: Out Of Bounds Heap Read In Rar Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1541" id="CVE-2016-1541" title="Libarchive: Zip_Read_Mac_Metadata() Heap-Based Buffer Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4300" id="CVE-2016-4300" title="Libarchive: Heap Buffer Overflow Vulnerability In The 7Zip Read_Substreamsinfo" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4302" id="CVE-2016-4302" title="Libarchive: Heap Buffer Overflow In The Rar Decompression Functionality" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4809" id="CVE-2016-4809" title="Libarchive: Memory Allocate Error With Symbolic Links In Cpio Archives" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5844" id="CVE-2016-5844" title="Libarchive: Undefined Behaviour (Integer Overflow) In Iso Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6250" id="CVE-2016-6250" title="Libarchive: Buffer Overflow When Writing Large Iso9660 Containers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7166" id="CVE-2016-7166" title="Libarchive: Denial Of Service Using A Crafted Gzip File" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1844" id="RHSA-2016:1844-1" title="Rhsa-2016:1844-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334211" id="1334211" title="Libarchive: Zip_Read_Mac_Metadata() Heap-Based Buffer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347084" id="1347084" title="Libarchive: Memory Allocate Error With Symbolic Links In Cpio Archives" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347085" id="1347085" title="Libarchive: Buffer Overflow When Writing Large Iso9660 Containers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347086" id="1347086" title="Libarchive: Denial Of Service Using A Crafted Gzip File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348412" id="1348412" title="Libarchive: Null Pointer Access In Rar Parser Through Bsdtar" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348413" id="1348413" title="Libarchive: Null Pointer Access In Cab Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348414" id="1348414" title="Libarchive: Heap Out Of Bounds Read In Lha/Lzh Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348416" id="1348416" title="Libarchive: Stack Out Of Bounds Read In Ar Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348419" id="1348419" title="Libarchive: Null Pointer Access In 7Z Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348421" id="1348421" title="Libarchive: Heap Out Of Bounds Read In Tar Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348423" id="1348423" title="Libarchive: Unclear Invalid Memory Read In Mtree Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348424" id="1348424" title="Libarchive: Null Pointer Access In Rar Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348429" id="1348429" title="Libarchive: Heap Out Of Bounds Read In Mtree Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348439" id="1348439" title="Libarchive: Heap Buffer Overflow Vulnerability In The 7Zip Read_Substreamsinfo" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348444" id="1348444" title="Libarchive: Heap Buffer Overflow In The Rar Decompression Functionality" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348772" id="1348772" title="Libarchive: Global Out Of Bounds Read In Mtree Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348773" id="1348773" title="Libarchive: Unclear Crashes In Zip Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348779" id="1348779" title="Libarchive: Undefined Behavior (Signed Integer Overflow) In Mtree Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348780" id="1348780" title="Libarchive: Undefined Behavior / Invalid Shiftleft In Tar Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349204" id="1349204" title="Libarchive: Endless Loop In Iso Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349229" id="1349229" title="Libarchive: Out Of Bounds Heap Read In Rar Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1350280" id="1350280" title="Libarchive: Undefined Behaviour (Integer Overflow) In Iso Parser" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1847-1</id><title>Kernel</title><description>Security Fix(es): 
* A security flaw was found in the Linux kernel in the mark_source_chains() function in "net/ipv4/netfilter/ip_tables.c". It is possible for a user-supplied "ipt_entry" structure to have a large "next_offset" field. This field is not bounds checked prior to writing to a counter value at the supplied offset. (CVE-2016-3134, Important) 
* A flaw was discovered in processing setsockopt for 32 bit processes on 64 bit systems. This flaw will allow attackers to alter arbitrary kernel memory when unloading a kernel module. This action is usually restricted to root-privileged users but can also be leveraged if the kernel is compiled with CONFIG_USER_NS and CONFIG_NET_NS and the user is granted elevated privileges. (CVE-2016-4997, Important) 
* An out-of-bounds heap memory access leading to a Denial of Service, heap disclosure, or further impact was found in setsockopt(). The function call is normally restricted to root, however some processes with cap_sys_admin may also be able to trigger this flaw in privileged container environments. (CVE-2016-4998, Moderate) 
Bug Fix(es): 
* In some cases, running the ipmitool command caused a kernel panic due to a race condition in the ipmi message handler. This update fixes the race condition, and the kernel panic no longer occurs in the described scenario. 
* Previously, running I/O-intensive operations in some cases caused the system to terminate unexpectedly after a null pointer dereference in the kernel. With this update, a set of patches has been applied to the 3w-9xxx and 3w-sas drivers that fix this bug. As a result, the system no longer crashes in the described scenario. 
* Previously, the Stream Control Transmission Protocol (SCTP) sockets did not inherit the SELinux labels properly. As a consequence, the sockets were labeled with the unlabeled_t SELinux type which caused SCTP connections to fail. The underlying source code has been modified, and SCTP connections now works as expected. 
* Previously, the bnx2x driver waited for transmission completions when recovering from a parity event, which substantially increased the recovery time. With this update, bnx2x does not wait for transmission completion in the described circumstances. As a result, the recovery of bnx2x after a parity event now takes less time. 
Enhancement(s): 
* With this update, the audit subsystem enables filtering of processes by name besides filtering by PID. Users can now audit by executable name (with the "-F exe=&lt;path-to-executable&gt;" option), which allows expression of many new audit rules. This functionality can be used to create events when specific applications perform a syscall. 
* With this update, the Nonvolatile Memory Express (NVMe) and the multi- queue block layer (blk_mq) have been upgraded to the Linux 4.5 upstream version. Previously, a race condition between timeout and freeing request in blk_mq occurred, which could affect the blk_mq_tag_to_rq() function and consequently a kernel oops could occur. The provided patch fixes this race condition by updating the tags with the active request. The patch simplifies blk_mq_tag_to_rq() and ensures that the two requests are not active at the same time. 
* The Hyper-V storage driver (storvsc) has been upgraded from upstream. This update provides moderate performance improvement of I/O operations when using storvscr for certain workloads.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-09-15 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel" release="327.36.1.el7" src="kernel-3.10.0-327.36.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-327.36.1.el7.x86_64.rpm</filename><sum type="sha256">f6d797019988472cec9507d7bdf8050020e92894716859f9c78ac080aa01773e</sum></package><package arch="x86_64" name="kernel-debug-devel" release="327.36.1.el7" src="kernel-3.10.0-327.36.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-327.36.1.el7.x86_64.rpm</filename><sum type="sha256">a2eba8a814a80a5b0768495fbae75a470835fd4bd4befa205d1ffa4e7246f72d</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="327.36.1.el7" src="kernel-3.10.0-327.36.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-327.36.1.el7.noarch.rpm</filename><sum type="sha256">526dc878809242ef14412af86a72222ec3ac7ec7b12107589fa8d4c2c20a182b</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="327.36.1.el7" src="kernel-3.10.0-327.36.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-327.36.1.el7.x86_64.rpm</filename><sum type="sha256">2afb8635adfb3b28f19f11cac3a997b4413327b8bff696c8a3ae5498144ee39d</sum></package><package arch="x86_64" name="kernel-tools-libs" release="327.36.1.el7" src="kernel-3.10.0-327.36.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-327.36.1.el7.x86_64.rpm</filename><sum type="sha256">89df78c3dd432a0dba78ca434e29413b85f747efc698765b88b029e8bd6bbf01</sum></package><package arch="x86_64" name="kernel-debug" release="327.36.1.el7" src="kernel-3.10.0-327.36.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-327.36.1.el7.x86_64.rpm</filename><sum type="sha256">203d3d4a1e0e755da82cb5188a09ed8213d4172b3ce898a7275d6aadfbce987e</sum></package><package arch="noarch" name="kernel-doc" release="327.36.1.el7" src="kernel-3.10.0-327.36.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-327.36.1.el7.noarch.rpm</filename><sum type="sha256">c94b71dc2be79b752812206634ab4cd437e9ce323118b2b488efc8d62d7ad865</sum></package><package arch="x86_64" name="kernel-tools" release="327.36.1.el7" src="kernel-3.10.0-327.36.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-327.36.1.el7.x86_64.rpm</filename><sum type="sha256">8ac1240f65db11d0f659002b6ab37f433a27ba4f8ec685ab1c5e38b3867939e5</sum></package><package arch="x86_64" name="kernel-headers" release="327.36.1.el7" src="kernel-3.10.0-327.36.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-327.36.1.el7.x86_64.rpm</filename><sum type="sha256">baa2734d47301d59d3e44abe0dea26a206bea357fa746c0eec79fc1d105b007a</sum></package><package arch="x86_64" name="python-perf" release="327.36.1.el7" src="kernel-3.10.0-327.36.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-327.36.1.el7.x86_64.rpm</filename><sum type="sha256">c8d02c03c54d44ec0c67fd551bf3f51e51b51b029e099e328657b6ae6fed9b3d</sum></package><package arch="x86_64" name="kernel-devel" release="327.36.1.el7" src="kernel-3.10.0-327.36.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-327.36.1.el7.x86_64.rpm</filename><sum type="sha256">ceee0c25316470020842af75c81604949ff000fe4e000c68fa8412912f9c5f18</sum></package><package arch="x86_64" name="perf" release="327.36.1.el7" src="kernel-3.10.0-327.36.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-327.36.1.el7.x86_64.rpm</filename><sum type="sha256">59bc7ebddc0b09a284f4446a6f0ced400c37a33e482af860be977e4c7a4283f5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3134" id="CVE-2016-3134" title="Kernel: Netfilter: Missing Bounds Check In Ipt_Entry Structure" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4997" id="CVE-2016-4997" title="Kernel: Compat Ipt_So_Set_Replace Setsockopt" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4998" id="CVE-2016-4998" title="Kernel: Out Of Bounds Reads When Processing Ipt_So_Set_Replace Setsockopt" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1847" id="RHSA-2016:1847-1" title="Rhsa-2016:1847-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317383" id="1317383" title="Kernel: Netfilter: Missing Bounds Check In Ipt_Entry Structure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349722" id="1349722" title="Kernel: Compat Ipt_So_Set_Replace Setsockopt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349886" id="1349886" title="Kernel: Out Of Bounds Reads When Processing Ipt_So_Set_Replace Setsockopt" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1912-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.4.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-5257, CVE-2016-5278, CVE-2016-5270, CVE-2016-5272, CVE-2016-5274, CVE-2016-5276, CVE-2016-5277, CVE-2016-5280, CVE-2016-5281, CVE-2016-5284, CVE-2016-5250, CVE-2016-5261)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-09-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_2" src="firefox-45.4.0-1.el7_2.src.rpm" version="45.4.0"><filename>firefox-45.4.0-1.el7_2.x86_64.rpm</filename><sum type="sha256">537109c5288bf8e7e17390ed5c363c1cae00dc98a9555b39d053c7a909ebb53e</sum></package><package arch="i686" name="firefox" release="1.el7_2" src="firefox-45.4.0-1.el7_2.src.rpm" version="45.4.0"><filename>firefox-45.4.0-1.el7_2.i686.rpm</filename><sum type="sha256">1994576e463c3507505d841c234b19647d907df600d9d1d94d9a43d27edb1890</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5250" id="CVE-2016-5250" title="Mozilla: Resource Timing Api Is Storing Resources Sent By The Previous Page (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5257" id="CVE-2016-5257" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 45.4 (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5261" id="CVE-2016-5261" title="Mozilla: Integer Overflow And Memory Corruption In Websocketchannel (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5270" id="CVE-2016-5270" title="Mozilla: Heap-Buffer-Overflow In Nscasetransformtextrunfactory::Transformstring (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5272" id="CVE-2016-5272" title="Mozilla: Bad Cast In Nsimagegeometrymixin (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5274" id="CVE-2016-5274" title="Mozilla: Use-After-Free In Nsframemanager::Captureframestate (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5276" id="CVE-2016-5276" title="Mozilla: Heap-Use-After-Free In Mozilla::A11Y::Docaccessible::Processinvalidationlist (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5277" id="CVE-2016-5277" title="Mozilla: Heap-Use-After-Free In Nsrefreshdriver::Tick (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5278" id="CVE-2016-5278" title="Mozilla: Heap-Buffer-Overflow In Nsbmpencoder::Addimageframe (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5280" id="CVE-2016-5280" title="Mozilla: Use-After-Free In Mozilla::Nstextnodedirectionalitymap::Removeelementfrommap (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5281" id="CVE-2016-5281" title="Mozilla: Use-After-Free In Domsvglength (Mfsa 2016-86)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5284" id="CVE-2016-5284" title="Mozilla: Add-On Update Site Certificate Pin Expiration (Mfsa 2016-86)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1912" id="RHSA-2016:1912-1" title="Rhsa-2016:1912-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361986" id="1361986" title="Mozilla: Integer Overflow And Memory Corruption In Websocketchannel (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361998" id="1361998" title="Mozilla: Resource Timing Api Is Storing Resources Sent By The Previous Page (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377543" id="1377543" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 45.4 (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377549" id="1377549" title="Mozilla: Heap-Buffer-Overflow In Nsbmpencoder::Addimageframe (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377552" id="1377552" title="Mozilla: Heap-Buffer-Overflow In Nscasetransformtextrunfactory::Transformstring (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377554" id="1377554" title="Mozilla: Bad Cast In Nsimagegeometrymixin (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377557" id="1377557" title="Mozilla: Heap-Use-After-Free In Mozilla::A11Y::Docaccessible::Processinvalidationlist (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377558" id="1377558" title="Mozilla: Use-After-Free In Nsframemanager::Captureframestate (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377559" id="1377559" title="Mozilla: Heap-Use-After-Free In Nsrefreshdriver::Tick (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377561" id="1377561" title="Mozilla: Use-After-Free In Mozilla::Nstextnodedirectionalitymap::Removeelementfrommap (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377563" id="1377563" title="Mozilla: Use-After-Free In Domsvglength (Mfsa 2016-86)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377565" id="1377565" title="Mozilla: Add-On Update Site Certificate Pin Expiration (Mfsa 2016-86)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1940-1</id><title>Openssl</title><description>Security Fix(es): 
* A memory leak flaw was found in the way OpenSSL handled TLS status request extension data during session renegotiation. A remote attacker could cause a TLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory, if it enabled OCSP stapling support. (CVE-2016-6304) 
* It was discovered that OpenSSL did not always use constant time operations when computing Digital Signature Algorithm (DSA) signatures. A local attacker could possibly use this flaw to obtain a private DSA key belonging to another user or service running on the same system. (CVE-2016-2178) 
* It was discovered that the Datagram TLS (DTLS) implementation could fail to release memory in certain cases. A malicious DTLS client could cause a DTLS server using OpenSSL to consume an excessive amount of memory and, possibly, exit unexpectedly after exhausting all available memory. (CVE-2016-2179) 
* A flaw was found in the Datagram TLS (DTLS) replay protection implementation in OpenSSL. A remote attacker could possibly use this flaw to make a DTLS server using OpenSSL to reject further packets sent from a DTLS client over an established DTLS connection. (CVE-2016-2181) 
* An out of bounds write flaw was discovered in the OpenSSL BN_bn2dec() function. An attacker able to make an application using OpenSSL to process a large BIGNUM could cause the application to crash or, possibly, execute arbitrary code. (CVE-2016-2182) 
* A flaw was found in the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) 
This update mitigates the CVE-2016-2183 issue by lowering priority of DES cipher suites so they are not preferred over cipher suites using AES. For compatibility reasons, DES cipher suites remain enabled by default and included in the set of cipher suites identified by the HIGH cipher string. Future updates may move them to MEDIUM or not enable them by default. 
* An integer underflow flaw leading to a buffer over-read was found in the way OpenSSL parsed TLS session tickets. A remote attacker could use this flaw to crash a TLS server using OpenSSL if it used SHA-512 as HMAC for session tickets. (CVE-2016-6302) 
* Multiple integer overflow flaws were found in the way OpenSSL performed pointer arithmetic. A remote attacker could possibly use these flaws to cause a TLS/SSL server or client using OpenSSL to crash. (CVE-2016-2177) 
* An out of bounds read flaw was found in the way OpenSSL formatted Public Key Infrastructure Time-Stamp Protocol data for printing. An attacker could possibly cause an application using OpenSSL to crash if it printed time stamp data from the attacker. (CVE-2016-2180) 
* Multiple out of bounds read flaws were found in the way OpenSSL handled certain TLS/SSL protocol handshake messages. A remote attacker could possibly use these flaws to crash a TLS/SSL server or client using OpenSSL. (CVE-2016-6306)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-09-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl-devel" release="51.el7_2.7" src="openssl-1.0.1e-51.el7_2.7.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-51.el7_2.7.x86_64.rpm</filename><sum type="sha256">c808738e93094286e1556ed3680b370090c904043c13dcf58602758a72f4b2fd</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="51.el7_2.7" src="openssl-1.0.1e-51.el7_2.7.src.rpm" version="1.0.1e"><filename>openssl-libs-1.0.1e-51.el7_2.7.i686.rpm</filename><sum type="sha256">00bee96e58b6ac75454a9bca1f0375f93e7bdfe91dc58be43354e317e33426ca</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="51.el7_2.7" src="openssl-1.0.1e-51.el7_2.7.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-51.el7_2.7.x86_64.rpm</filename><sum type="sha256">388b78066fcab44cf8ab5cefa987f284fe38f67ec8a7a5ad115ad524d3bbd758</sum></package><package arch="i686" epoch="1" name="openssl-static" release="51.el7_2.7" src="openssl-1.0.1e-51.el7_2.7.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-51.el7_2.7.i686.rpm</filename><sum type="sha256">a5e3ce9a898e07c92b74b078f836007b677edfa9f8253140c5f476a570b30c0b</sum></package><package arch="x86_64" epoch="1" name="openssl-libs" release="51.el7_2.7" src="openssl-1.0.1e-51.el7_2.7.src.rpm" version="1.0.1e"><filename>openssl-libs-1.0.1e-51.el7_2.7.x86_64.rpm</filename><sum type="sha256">2aa430c69844d088d7ed491d4e2bc05130069e1eeb96f50f19799394f96ca7a0</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="51.el7_2.7" src="openssl-1.0.1e-51.el7_2.7.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-51.el7_2.7.i686.rpm</filename><sum type="sha256">829ad5436d8e750acbed2a7bd3e318f7e58f102a05ccbb8d59b6d0a84a5cf829</sum></package><package arch="x86_64" epoch="1" name="openssl" release="51.el7_2.7" src="openssl-1.0.1e-51.el7_2.7.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-51.el7_2.7.x86_64.rpm</filename><sum type="sha256">4aecd6f437a7397099352da4c219c8ba5dbbc53b1262d8b70405ef6e66a1415b</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="51.el7_2.7" src="openssl-1.0.1e-51.el7_2.7.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-51.el7_2.7.x86_64.rpm</filename><sum type="sha256">2141a5ce1184176e1ae0a353c61e1bf3fa743f52957c2ace42f8699fb050511b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2177" id="CVE-2016-2177" title="Openssl: Possible Integer Overflow Vulnerabilities In Codebase" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2178" id="CVE-2016-2178" title="Openssl: Non-Constant Time Codepath Followed For Certain Operations In Dsa Implementation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2179" id="CVE-2016-2179" title="Openssl: Dtls Memory Exhaustion Dos When Messages Are Not Removed From Fragment Buffer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2180" id="CVE-2016-2180" title="Openssl: Oob Read In Ts_Obj_Print_Bio()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2181" id="CVE-2016-2181" title="Openssl: Dtls Replay Protection Bypass Allows Dos Against Dtls Connection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2182" id="CVE-2016-2182" title="Openssl: Out-Of-Bounds Write Caused By Unchecked Errors In Bn_Bn2Dec()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183" id="CVE-2016-2183" title="Ssl/Tls: Birthday Attack Against 64-Bit Block Ciphers (Sweet32)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6302" id="CVE-2016-6302" title="Openssl: Insufficient Tls Session Ticket Hmac Length Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6304" id="CVE-2016-6304" title="Openssl: Ocsp Status Request Extension Unbounded Memory Growth" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6306" id="CVE-2016-6306" title="Openssl: Certificate Message Oob Reads" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1940" id="RHSA-2016:1940-1" title="Rhsa-2016:1940-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1341705" id="1341705" title="Openssl: Possible Integer Overflow Vulnerabilities In Codebase" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1343400" id="1343400" title="Openssl: Non-Constant Time Codepath Followed For Certain Operations In Dsa Implementation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1359615" id="1359615" title="Openssl: Oob Read In Ts_Obj_Print_Bio()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367340" id="1367340" title="Openssl: Out-Of-Bounds Write Caused By Unchecked Errors In Bn_Bn2Dec()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369113" id="1369113" title="Openssl: Dtls Replay Protection Bypass Allows Dos Against Dtls Connection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369383" id="1369383" title="Ssl/Tls: Birthday Attack Against 64-Bit Block Ciphers (Sweet32)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369504" id="1369504" title="Openssl: Dtls Memory Exhaustion Dos When Messages Are Not Removed From Fragment Buffer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369855" id="1369855" title="Openssl: Insufficient Tls Session Ticket Hmac Length Checks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377594" id="1377594" title="Openssl: Certificate Message Oob Reads" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377600" id="1377600" title="Openssl: Ocsp Status Request Extension Unbounded Memory Growth" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1944-1</id><title>Bind</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND constructed a response to a query that met certain criteria. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request packet. (CVE-2016-2776)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-09-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="32" name="bind-lite-devel" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-29.el7_2.4.i686.rpm</filename><sum type="sha256">43b1a90078a4f8127fa30a611c4af3a6043b0c30bc6e0dac08c6918cd9f993d1</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-utils-9.9.4-29.el7_2.4.x86_64.rpm</filename><sum type="sha256">0666eaa7fcd84d8989a24ce73ccd1b6f1cb31c1d3aec88319a1bf6af5cb8892d</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-chroot-9.9.4-29.el7_2.4.x86_64.rpm</filename><sum type="sha256">c5ee22881b0dc0987c4d4af5b024fb41b5ead339c58b91a9084e3a358613047b</sum></package><package arch="x86_64" epoch="32" name="bind" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-9.9.4-29.el7_2.4.x86_64.rpm</filename><sum type="sha256">653728d0b628e2ce823d7b42a9ca67638e8163ebf95c55d111a1b07bc5ac0c74</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-29.el7_2.4.i686.rpm</filename><sum type="sha256">17d12d798818754c03c0d521341693da94c4b7e398f4fa254cb1a62bc30ab3e4</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-29.el7_2.4.x86_64.rpm</filename><sum type="sha256">7bc02d795df999db6fea488bac3cb18bcf4dc7d2515732ee3b6f924da7100e3f</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-29.el7_2.4.x86_64.rpm</filename><sum type="sha256">15deed6f136363cbba6a12831ee7044b5a9c4f4c5cdd2e49781746c660b67e60</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-29.el7_2.4.i686.rpm</filename><sum type="sha256">f66bdaba6ca718c0cf8366e79b4aec599061acf43a671d7ede00e21bfd40456b</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-pkcs11-9.9.4-29.el7_2.4.x86_64.rpm</filename><sum type="sha256">581b98dcc58ae4307dadbe3753f7bae4b32144bf65f1649b2f4b976a6cec2c0c</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-29.el7_2.4.x86_64.rpm</filename><sum type="sha256">fd2a9d8f7e3a428d214bb72cd5a9e1977c3ae94f00d693a932a8ff5e959b70d8</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-29.el7_2.4.x86_64.rpm</filename><sum type="sha256">b7160fc7dc6f87d0a3c83e426d399fbf10a52781007131d3df0a726b7b202a48</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-29.el7_2.4.x86_64.rpm</filename><sum type="sha256">4bda337d9d870cc7d23674b392af99a73491ebadfb36428b26bd28212479c0fd</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-29.el7_2.4.x86_64.rpm</filename><sum type="sha256">603c9443803a6d71fb6fdb02f7d738eebd8a6e123580e19e890446c59e4756de</sum></package><package arch="noarch" epoch="32" name="bind-license" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-license-9.9.4-29.el7_2.4.noarch.rpm</filename><sum type="sha256">207df055e34eae3ab937f9d4b7d968b1a890c28f4d70513f3bce824c192cb2e9</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-pkcs11-utils-9.9.4-29.el7_2.4.x86_64.rpm</filename><sum type="sha256">b2a550b1d25db2940d03b90abe7323f3df1a06a211fc0c0b6fd78e2c6df193c7</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-29.el7_2.4.i686.rpm</filename><sum type="sha256">8d1ddaf33f0a936472232b445ae87644916657d93c8d24dd11f0de120db59dec</sum></package><package arch="i686" epoch="32" name="bind-devel" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-29.el7_2.4.i686.rpm</filename><sum type="sha256">5ad0767972dd9249c5eee3a284dbdd673f55c9327d897b930967cefe40765bd5</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-sdb-chroot-9.9.4-29.el7_2.4.x86_64.rpm</filename><sum type="sha256">7ea53c5ae92e95f58ae425691124e343af05b8a4ac1ecd6b1650b7e86b2cb9bb</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-sdb-9.9.4-29.el7_2.4.x86_64.rpm</filename><sum type="sha256">9c06317fd8cc6e5cddbb9d642b88c2175cc0131377ccabf2ef580882995ae02a</sum></package><package arch="i686" epoch="32" name="bind-libs" release="29.el7_2.4" src="bind-9.9.4-29.el7_2.4.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-29.el7_2.4.i686.rpm</filename><sum type="sha256">daf789b58745c0d3f897f5ec7d945014c682d7862d654f1a34352933f40c7231</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2776" id="CVE-2016-2776" title="Bind: Assertion Failure In Buffer.C While Building Responses To A Specifically Constructed Request" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1944" id="RHSA-2016:1944-1" title="Rhsa-2016:1944-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378380" id="1378380" title="Bind: Assertion Failure In Buffer.C While Building Responses To A Specifically Constructed Request" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1978-1</id><title>Python-Twisted-Web</title><description>Security Fix(es): 
* It was discovered that python-twisted-web used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-1000111) 
Note: After this update, python-twisted-web will no longer pass the value of the Proxy request header to scripts via the HTTP_PROXY environment variable.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-09-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-twisted-web" release="5.el7_2" src="python-twisted-web-12.1.0-5.el7_2.src.rpm" version="12.1.0"><filename>python-twisted-web-12.1.0-5.el7_2.x86_64.rpm</filename><sum type="sha256">578ad9245b86f09b8e993cdb3cf3de8b11b769d735b3e141f05f50648a6928bb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000111" id="CVE-2016-1000111" title="Python Twisted: Sets Environmental Variable Based On User Supplied Proxy Request Header" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1978" id="RHSA-2016:1978-1" title="Rhsa-2016:1978-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357345" id="1357345" title="Python Twisted: Sets Environmental Variable Based On User Supplied Proxy Request Header" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:1985-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.4.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-5257)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-10-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_2" src="thunderbird-45.4.0-1.el7_2.src.rpm" version="45.4.0"><filename>thunderbird-45.4.0-1.el7_2.x86_64.rpm</filename><sum type="sha256">589ae4bd3dfa4070a089bff1671488f4aef6172532ce50e70f12966291ba38c3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5257" id="CVE-2016-5257" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 45.4 (Mfsa 2016-86)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:1985" id="RHSA-2016:1985-1" title="Rhsa-2016:1985-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377543" id="1377543" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 45.4 (Mfsa 2016-86)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2046-1</id><title>Tomcat</title><description>Security Fix(es): 
* It was discovered that the Tomcat packages installed configuration file /usr/lib/tmpfiles.d/tomcat.conf writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges. (CVE-2016-5425) 
* It was discovered that the Tomcat packages installed certain configuration files read by the Tomcat initialization script as writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges. (CVE-2016-6325) 
* It was found that the expression language resolver evaluated expressions within a privileged code section. A malicious web application could use this flaw to bypass security manager protections. (CVE-2014-7810) 
* It was discovered that tomcat used the value of the Proxy header from HTTP requests to initialize the HTTP_PROXY environment variable for CGI scripts, which in turn was incorrectly used by certain HTTP client implementations to configure the proxy for outgoing HTTP requests. A remote attacker could possibly use this flaw to redirect HTTP requests performed by a CGI script to an attacker-controlled proxy via a malicious HTTP request. (CVE-2016-5388) 
* A session fixation flaw was found in the way Tomcat recycled the requestedSessionSSL field. If at least one web application was configured to use the SSL session ID as the HTTP session ID, an attacker could reuse a previously used session ID for further requests. (CVE-2015-5346)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-10-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcat-servlet-3.0-api" release="8.el7_2" src="tomcat-7.0.54-8.el7_2.src.rpm" version="7.0.54"><filename>tomcat-servlet-3.0-api-7.0.54-8.el7_2.noarch.rpm</filename><sum type="sha256">10b215f64347b272449e5b3b0397ab94f77c1784e917889df553c4543d6fcf9e</sum></package><package arch="noarch" name="tomcat-webapps" release="8.el7_2" src="tomcat-7.0.54-8.el7_2.src.rpm" version="7.0.54"><filename>tomcat-webapps-7.0.54-8.el7_2.noarch.rpm</filename><sum type="sha256">d6335ede43d8e3be77fc47a651997a63c18fb9427820b6606d81708d5698774b</sum></package><package arch="noarch" name="tomcat-jsvc" release="8.el7_2" src="tomcat-7.0.54-8.el7_2.src.rpm" version="7.0.54"><filename>tomcat-jsvc-7.0.54-8.el7_2.noarch.rpm</filename><sum type="sha256">c7d37a8af4ac18c96f897c2f5dadfeb8a7eee6113604a9c6d2246fd335cfbf45</sum></package><package arch="noarch" name="tomcat-jsp-2.2-api" release="8.el7_2" src="tomcat-7.0.54-8.el7_2.src.rpm" version="7.0.54"><filename>tomcat-jsp-2.2-api-7.0.54-8.el7_2.noarch.rpm</filename><sum type="sha256">168563dce340c24f285618e06aaf8acfa49b18028285808cad0c89af84213e3c</sum></package><package arch="noarch" name="tomcat-lib" release="8.el7_2" src="tomcat-7.0.54-8.el7_2.src.rpm" version="7.0.54"><filename>tomcat-lib-7.0.54-8.el7_2.noarch.rpm</filename><sum type="sha256">193f6b00210cbc8f0ee9bf37664f7286946c43094bb83fa9c2e470354cf46008</sum></package><package arch="noarch" name="tomcat-docs-webapp" release="8.el7_2" src="tomcat-7.0.54-8.el7_2.src.rpm" version="7.0.54"><filename>tomcat-docs-webapp-7.0.54-8.el7_2.noarch.rpm</filename><sum type="sha256">90deddebed35f46f9c00bcee86e336b0d5db413337c28741eff2f649fd3469d2</sum></package><package arch="noarch" name="tomcat-javadoc" release="8.el7_2" src="tomcat-7.0.54-8.el7_2.src.rpm" version="7.0.54"><filename>tomcat-javadoc-7.0.54-8.el7_2.noarch.rpm</filename><sum type="sha256">5053718eacdfefbff7356028cd98368d508e0ba14b64bfdeea4f32f3531d513d</sum></package><package arch="noarch" name="tomcat" release="8.el7_2" src="tomcat-7.0.54-8.el7_2.src.rpm" version="7.0.54"><filename>tomcat-7.0.54-8.el7_2.noarch.rpm</filename><sum type="sha256">14e5bfbad370aefc0e8be43227f2d2db652fa398a754c3bfc03b99ed7c7f5285</sum></package><package arch="noarch" name="tomcat-admin-webapps" release="8.el7_2" src="tomcat-7.0.54-8.el7_2.src.rpm" version="7.0.54"><filename>tomcat-admin-webapps-7.0.54-8.el7_2.noarch.rpm</filename><sum type="sha256">5b4f2c9059c65ef1418aa6a088ab3cd20f29192091c4b8c13339291f1fe3d539</sum></package><package arch="noarch" name="tomcat-el-2.2-api" release="8.el7_2" src="tomcat-7.0.54-8.el7_2.src.rpm" version="7.0.54"><filename>tomcat-el-2.2-api-7.0.54-8.el7_2.noarch.rpm</filename><sum type="sha256">4b37b855e5fc6c1910641aae6bcd27c92d74e2a84665d1d6491456877a5c24fc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7810" id="CVE-2014-7810" title="Cve-2014-7810" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5346" id="CVE-2015-5346" title="Tomcat: Session Fixation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5388" id="CVE-2016-5388" title="Tomcat: Cgi Sets Environmental Variable Based On User Supplied Proxy Request Header" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5425" id="CVE-2016-5425" title="Tomcat: Local Privilege Escalation Via Systemd-Tmpfiles Service" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6325" id="CVE-2016-6325" title="Tomcat: Tomcat Writable Config Files Allow Privilege Escalation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2046" id="RHSA-2016:2046-1" title="Rhsa-2016:2046-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1222573" id="1222573" title="Tomcat/Jbossweb: Security Manager Bypass Via El " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311085" id="1311085" title="Tomcat: Session Fixation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1353809" id="1353809" title="Tomcat: Cgi Sets Environmental Variable Based On User Supplied Proxy Request Header" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1362545" id="1362545" title="Tomcat: Local Privilege Escalation Via Systemd-Tmpfiles Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367447" id="1367447" title="Tomcat: Tomcat Writable Config Files Allow Privilege Escalation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2047-1</id><title>Kernel</title><description>Security Fix(es): 
* Linux kernel built with the 802.1Q/802.1ad VLAN(CONFIG_VLAN_8021Q) OR Virtual eXtensible Local Area Network(CONFIG_VXLAN) with Transparent Ethernet Bridging(TEB) GRO support, is vulnerable to a stack overflow issue. It could occur while receiving large packets via GRO path as an unlimited recursion could unfold in both VLAN and TEB modules leading to a stack corruption in the kernel. (CVE-2016-7039, Important)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-10-11 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel" release="327.36.2.el7" src="kernel-3.10.0-327.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-327.36.2.el7.x86_64.rpm</filename><sum type="sha256">5b619350e85b10c3ccffe284e3b8ef1d9c5688c3c25f55de3f553c07cb503f2a</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="327.36.2.el7" src="kernel-3.10.0-327.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-327.36.2.el7.noarch.rpm</filename><sum type="sha256">86ec62312d4f4781efddceb84a873e4bb9f9941f3e081755d84be77713336d0f</sum></package><package arch="x86_64" name="kernel-debug" release="327.36.2.el7" src="kernel-3.10.0-327.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-327.36.2.el7.x86_64.rpm</filename><sum type="sha256">3dd5bd517f8f9a7542fa31f884c751dd10908af351d24a02a64998faaf562e48</sum></package><package arch="x86_64" name="perf" release="327.36.2.el7" src="kernel-3.10.0-327.36.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-327.36.2.el7.x86_64.rpm</filename><sum type="sha256">07c2e00f659ff47124c74f1e39a784dfb8c95a3ec3445c75e3b0965949b812e6</sum></package><package arch="x86_64" name="kernel-tools-libs" release="327.36.2.el7" src="kernel-3.10.0-327.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-327.36.2.el7.x86_64.rpm</filename><sum type="sha256">7876c9d4605ccf2332c5617af2d78882d20160b8f2f85e01c8ccaef523b62f4d</sum></package><package arch="x86_64" name="kernel-debug-devel" release="327.36.2.el7" src="kernel-3.10.0-327.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-327.36.2.el7.x86_64.rpm</filename><sum type="sha256">2ecb84027aee4d3104b9bc79fe545be846efaf0fae90ec68bf583bf22a491644</sum></package><package arch="noarch" name="kernel-doc" release="327.36.2.el7" src="kernel-3.10.0-327.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-327.36.2.el7.noarch.rpm</filename><sum type="sha256">05be5ea4b90e8f8d24d3c962cfeb5f7d52d04e29efac0da100901214c5835b58</sum></package><package arch="x86_64" name="kernel-tools" release="327.36.2.el7" src="kernel-3.10.0-327.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-327.36.2.el7.x86_64.rpm</filename><sum type="sha256">92fd4716df0bb2eb004e764ed7319032bf75f060af45457ba900881481028510</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="327.36.2.el7" src="kernel-3.10.0-327.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-327.36.2.el7.x86_64.rpm</filename><sum type="sha256">3c6fa4100a0760d82ab10c65eb743a878c918fde0238470d158eb5066a03c123</sum></package><package arch="x86_64" name="kernel-devel" release="327.36.2.el7" src="kernel-3.10.0-327.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-327.36.2.el7.x86_64.rpm</filename><sum type="sha256">e957196e3d8a5ac467dea16546183853bcf25143cbdd53f65b66b00e136204ec</sum></package><package arch="x86_64" name="python-perf" release="327.36.2.el7" src="kernel-3.10.0-327.36.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-327.36.2.el7.x86_64.rpm</filename><sum type="sha256">4f8da894b9bf6b937010a18327789c6e0bf85691f8f471ab88d8f4a2fe636336</sum></package><package arch="x86_64" name="kernel-headers" release="327.36.2.el7" src="kernel-3.10.0-327.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-327.36.2.el7.x86_64.rpm</filename><sum type="sha256">90583ba802603850499fe0ac1de7f9f41c50ebcbc44791bf20b68d1a1488f92f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7039" id="CVE-2016-7039" title="Kernel: Remotely Triggerable Unbounded Recursion In The Vlan Gro Code Leading To A Kernel Crash" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2047" id="RHSA-2016:2047-1" title="Rhsa-2016:2047-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1375944" id="1375944" title="Kernel: Remotely Triggerable Unbounded Recursion In The Vlan Gro Code Leading To A Kernel Crash" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2079-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* It was discovered that the Hotspot component of OpenJDK did not properly check arguments of the System.arraycopy() function in certain cases. An untrusted Java application or applet could use this flaw to corrupt virtual machine's memory and completely bypass Java sandbox restrictions. (CVE-2016-5582) 
* It was discovered that the Hotspot component of OpenJDK did not properly check received Java Debug Wire Protocol (JDWP) packets. An attacker could possibly use this flaw to send debugging commands to a Java program running with debugging enabled if they could make victim's browser send HTTP requests to the JDWP port of the debugged application. (CVE-2016-5573) 
* It was discovered that the Libraries component of OpenJDK did not restrict the set of algorithms used for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2016-5542) 
Note: After this update, MD2 hash algorithm and RSA keys with less than 1024 bits are no longer allowed to be used for Jar integrity verification by default. MD5 hash algorithm is expected to be disabled by default in the future updates. A newly introduced security property jdk.jar.disabledAlgorithms can be used to control the set of disabled algorithms. 
* A flaw was found in the way the JMX component of OpenJDK handled classloaders. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2016-5554) 
* A flaw was found in the way the Networking component of OpenJDK handled HTTP proxy authentication. A Java application could possibly expose HTTPS server authentication credentials via a plain text network connection to an HTTP proxy if proxy asked for authentication. (CVE-2016-5597) 
Note: After this update, Basic HTTP proxy authentication can no longer be used when tunneling HTTPS connection through an HTTP proxy. Newly introduced system properties jdk.http.auth.proxying.disabledSchemes and jdk.http.auth.tunneling.disabledSchemes can be used to control which authentication schemes can be requested by an HTTP proxy when proxying HTTP and HTTPS connections respectively. 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-10-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.111-1.b15.el7_2.x86_64.rpm</filename><sum type="sha256">6f949ef5f7b8aa5a3cb6905fc2e386c94d899aa4fe40ba8f24fe0334f307ade9</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-demo-1.8.0.111-1.b15.el7_2.x86_64.rpm</filename><sum type="sha256">c9a0fe4e3312b4d2e023c84a64b9b633d5bd857a2f2c041a02c315b18f90864e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-devel-1.8.0.111-1.b15.el7_2.x86_64.rpm</filename><sum type="sha256">c9cee4a33924ba28351133ffc3daacedc60e1dadde290283059b44afd416a557</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-headless-1.8.0.111-1.b15.el7_2.x86_64.rpm</filename><sum type="sha256">bd70b02f32d9e60cb2a10be5020ed507c1d7e05625646eeb5ea6f6a51143ab70</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.111-1.b15.el7_2.x86_64.rpm</filename><sum type="sha256">55bd4df51621e8be073c1ce33d21a160eaf9bd644e7e402298f736643ea09a31</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-javadoc-1.8.0.111-1.b15.el7_2.noarch.rpm</filename><sum type="sha256">fbfa814a7dcf3e4eb11cb749828be81720768bee0faad986856a010606c5f3d2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.111-1.b15.el7_2.x86_64.rpm</filename><sum type="sha256">ae35b5060ef9f4369e775a61cc0ca2e2e496a44ef877c5f9ff55cb9d227d98b6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-src-1.8.0.111-1.b15.el7_2.x86_64.rpm</filename><sum type="sha256">cf74bd9dd1ac721d111f55d2409977ae5dba37559f183cabc7244979be15b2fc</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.111-1.b15.el7_2.x86_64.rpm</filename><sum type="sha256">55500e0277e10becc7ae55da5c52a14437015b812c802c8884a1ccceca6703fc</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-accessibility-1.8.0.111-1.b15.el7_2.x86_64.rpm</filename><sum type="sha256">14efbea2e02e6ea079ea9d8ba1ce55c7bdd5c9cdf1da5939878d0688cee9b5d0</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2.x86_64.rpm</filename><sum type="sha256">87fd16a1cdaf62c60c4d2ffbc32da17596a7e56e9bb29238f93411d4324d129f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-src-debug-1.8.0.111-1.b15.el7_2.x86_64.rpm</filename><sum type="sha256">dd023fc325cbdf6ca17cfe35d788f19c0424c8d592f3f3c8bca94d513e8c5cf1</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.111-1.b15.el7_2.noarch.rpm</filename><sum type="sha256">63a0b2b55a6448ad686e0ad2c1de2ceb23acc54dfd8e5e9d57717200ee6df8f9</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.b15.el7_2" src="java-1.8.0-openjdk-1.8.0.111-1.b15.el7_2.src.rpm" version="1.8.0.111"><filename>java-1.8.0-openjdk-debug-1.8.0.111-1.b15.el7_2.x86_64.rpm</filename><sum type="sha256">eb29adeb16485126fd7d61520614557df0bee44686a49adb0d9ecb5c24ed3ec4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542" id="CVE-2016-5542" title="Openjdk: Missing Algorithm Restrictions For Jar Verification (Libraries, 8155973)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554" id="CVE-2016-5554" title="Openjdk: Insufficient Classloader Consistency Checks In Classloaderwithrepository (Jmx, 8157739)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573" id="CVE-2016-5573" title="Openjdk: Insufficient Checks Of Jdwp Packets (Hotspot, 8159519)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582" id="CVE-2016-5582" title="Openjdk: Incomplete Type Checks Of System.Arraycopy Arguments (Hotspot, 8160591)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597" id="CVE-2016-5597" title="Openjdk: Exposure Of Server Authentication Credentials To Proxy (Networking, 8160838)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2079" id="RHSA-2016:2079-1" title="Rhsa-2016:2079-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385402" id="1385402" title="Openjdk: Incomplete Type Checks Of System.Arraycopy Arguments (Hotspot, 8160591)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385544" id="1385544" title="Openjdk: Insufficient Checks Of Jdwp Packets (Hotspot, 8159519)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385714" id="1385714" title="Openjdk: Insufficient Classloader Consistency Checks In Classloaderwithrepository (Jmx, 8157739)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385723" id="1385723" title="Openjdk: Missing Algorithm Restrictions For Jar Verification (Libraries, 8155973)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386103" id="1386103" title="Openjdk: Exposure Of Server Authentication Credentials To Proxy (Networking, 8160838)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2098-1</id><title>Kernel</title><description>Security Fix(es): 
* A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system. (CVE-2016-5195, Important)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-10-24 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="perf" release="327.36.3.el7" src="kernel-3.10.0-327.36.3.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-327.36.3.el7.x86_64.rpm</filename><sum type="sha256">0bed9a2812217a4bcbfcc52ad6441c8ccedb8f0f86614c3e98b079a264976d8b</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="327.36.3.el7" src="kernel-3.10.0-327.36.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-327.36.3.el7.x86_64.rpm</filename><sum type="sha256">aa46955aebedea9db37db6be17fb9875a7f8e3d896e8602b2835d46534ab6183</sum></package><package arch="noarch" name="kernel-doc" release="327.36.3.el7" src="kernel-3.10.0-327.36.3.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-327.36.3.el7.noarch.rpm</filename><sum type="sha256">752954972100c1b9d7a042b38c3814b2c1809203b87840b210c5e36dffa82abd</sum></package><package arch="x86_64" name="kernel-headers" release="327.36.3.el7" src="kernel-3.10.0-327.36.3.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-327.36.3.el7.x86_64.rpm</filename><sum type="sha256">ba3e688ccaf40f1b68a247379d13bd6e8e3d831d2c954d9f77d03009265eccc5</sum></package><package arch="x86_64" name="python-perf" release="327.36.3.el7" src="kernel-3.10.0-327.36.3.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-327.36.3.el7.x86_64.rpm</filename><sum type="sha256">19d627bbae02bd85e273c1e02f4ead58568b1a2eef91d9658d6696723d3eeffb</sum></package><package arch="x86_64" name="kernel-devel" release="327.36.3.el7" src="kernel-3.10.0-327.36.3.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-327.36.3.el7.x86_64.rpm</filename><sum type="sha256">44bccd903dd1ae9bb40d16ccc854da54a6c8861be776faff60c16ca6add1c2c2</sum></package><package arch="x86_64" name="kernel" release="327.36.3.el7" src="kernel-3.10.0-327.36.3.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-327.36.3.el7.x86_64.rpm</filename><sum type="sha256">2d1276ab649950c7e76cc31c2ee03fc6e86f991031936b1df1ff88fa56b7c6cc</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="327.36.3.el7" src="kernel-3.10.0-327.36.3.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-327.36.3.el7.noarch.rpm</filename><sum type="sha256">377db8fecf62b439d61c5c5f5cbc8b26af8fd382173e4ea9d3f2520e5f600979</sum></package><package arch="x86_64" name="kernel-tools" release="327.36.3.el7" src="kernel-3.10.0-327.36.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-327.36.3.el7.x86_64.rpm</filename><sum type="sha256">84ba166e8d705323f4d11fa7e55bb57b60bd5ec79ba82ddf3022fdd7ff336c2b</sum></package><package arch="x86_64" name="kernel-tools-libs" release="327.36.3.el7" src="kernel-3.10.0-327.36.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-327.36.3.el7.x86_64.rpm</filename><sum type="sha256">3a80103dfa968c58c425d808fbbf52bc38484e36cefb6824548bfcefbc549d21</sum></package><package arch="x86_64" name="kernel-debug" release="327.36.3.el7" src="kernel-3.10.0-327.36.3.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-327.36.3.el7.x86_64.rpm</filename><sum type="sha256">05a0f861e0a1a4542f31821f1bbaf7f3794e6d60ce77709041ae90bf4b162f9f</sum></package><package arch="x86_64" name="kernel-debug-devel" release="327.36.3.el7" src="kernel-3.10.0-327.36.3.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-327.36.3.el7.x86_64.rpm</filename><sum type="sha256">cdebf464bc4e1df4911c168e2a18c0923deaf5173ffc915a9b65e6a66a347fb6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5195" id="CVE-2016-5195" title="Kernel: Mm: Privilege Escalation Via Map_Private Cow Breakage" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2098" id="RHSA-2016:2098-1" title="Rhsa-2016:2098-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1384344" id="1384344" title="Kernel: Mm: Privilege Escalation Via Map_Private Cow Breakage" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2573-2</id><title>Glibc</title><description>Security Fix(es): 
* A stack overflow vulnerability was found in _nss_dns_getnetbyname_r. On systems with nsswitch configured to include "networks: dns" with a privileged or network-facing service that would attempt to resolve user- provided network names, an attacker could provide an excessively long network name, resulting in stack corruption and code execution. (CVE-2016-3075) 
This issue was discovered by Florian Weimer (Red Hat). 
Additional Changes:</description><severity>low</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="glibc" release="157.el7" src="glibc-2.17-157.el7.src.rpm" version="2.17"><filename>glibc-2.17-157.el7.i686.rpm</filename><sum type="sha256">c2d23c7e565c11a5bd9a41d20a59fdc3dcf971b179303a9e06ed66428836f521</sum></package><package arch="x86_64" name="glibc" release="157.el7" src="glibc-2.17-157.el7.src.rpm" version="2.17"><filename>glibc-2.17-157.el7.x86_64.rpm</filename><sum type="sha256">a0723018533d986fe0bbf4c13efd7c2b52aff12a94d766cd519c2300297d8cc2</sum></package><package arch="x86_64" name="glibc-static" release="157.el7" src="glibc-2.17-157.el7.src.rpm" version="2.17"><filename>glibc-static-2.17-157.el7.x86_64.rpm</filename><sum type="sha256">54c3414fa620c92d866159eab9ecff3f7fbcb99f85ab6c0ec2cb08625a3dd532</sum></package><package arch="x86_64" name="nscd" release="157.el7" src="glibc-2.17-157.el7.src.rpm" version="2.17"><filename>nscd-2.17-157.el7.x86_64.rpm</filename><sum type="sha256">170afacc2d47a5a64749e864d6b132f86eb0e05310dab85a4245fba057349c14</sum></package><package arch="x86_64" name="glibc-headers" release="157.el7" src="glibc-2.17-157.el7.src.rpm" version="2.17"><filename>glibc-headers-2.17-157.el7.x86_64.rpm</filename><sum type="sha256">d4b19ac762fd39a26b3cdb57785d60eb6d0165ef7b609713cd1f53e721b764ce</sum></package><package arch="x86_64" name="glibc-devel" release="157.el7" src="glibc-2.17-157.el7.src.rpm" version="2.17"><filename>glibc-devel-2.17-157.el7.x86_64.rpm</filename><sum type="sha256">3872e35379332caed8abcf467b4fafa09e14326968a32c03aa5c2b3336c79573</sum></package><package arch="i686" name="glibc-static" release="157.el7" src="glibc-2.17-157.el7.src.rpm" version="2.17"><filename>glibc-static-2.17-157.el7.i686.rpm</filename><sum type="sha256">de6f8daf5220bd74e2068d9ec2dcd8b178cfb8c456ff16fd6178598695993a4a</sum></package><package arch="x86_64" name="glibc-common" release="157.el7" src="glibc-2.17-157.el7.src.rpm" version="2.17"><filename>glibc-common-2.17-157.el7.x86_64.rpm</filename><sum type="sha256">5ad3ea07b49695c49edbfbd6e7f79ce705fedd0fa4ff9b0a9e24910ae6501421</sum></package><package arch="i686" name="glibc-devel" release="157.el7" src="glibc-2.17-157.el7.src.rpm" version="2.17"><filename>glibc-devel-2.17-157.el7.i686.rpm</filename><sum type="sha256">ba3b733c5c942ffb170a909cd155f14abda05f61775353d925bd24bdce426b71</sum></package><package arch="x86_64" name="glibc-utils" release="157.el7" src="glibc-2.17-157.el7.src.rpm" version="2.17"><filename>glibc-utils-2.17-157.el7.x86_64.rpm</filename><sum type="sha256">b48e72c14517127a78ade71802eeff6f9765c636b2e0d82b9cd4179b4d2c9acf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3075" id="CVE-2016-3075" title="Glibc: Stack Overflow In Nss_Dns_Getnetbyname_R" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2573" id="RHSA-2016:2573-2" title="Rhsa-2016:2573-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1027348" id="1027348" title="Sem_Post/Sem_Wait Race Causing Sem_Post To Return Einval" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1064063" id="1064063" title="Test Suite Failure: Tst-Mqueue5" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1140250" id="1140250" title="Unexpected Results From Using Posix_Fallocate With Nfs Target" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211100" id="1211100" title="Ld.So Crash When Audit Modules Provide Path" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1211823" id="1211823" title="Iconv: Missing Support For Hkscs-2008 In Big5-Hkscs In Rhel7 Glibc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1249102" id="1249102" title="&quot;Monstartup: Out Of Memory&quot; On Ppc64Le" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1255822" id="1255822" title="Glibc: Malloc May Fall Back To Calling Mmap Prematurely If Arenas Are Contended" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1276631" id="1276631" title="Glibc: Hide Backtrace From Tst-Malloc-Backtrace" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1276753" id="1276753" title="Malloc: Arena Free List Can Become Cyclic, Increasing Contention" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298354" id="1298354" title="Backport Test-Skeleton.C Conversions." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305406" id="1305406" title="Invalid Fastbin Entry (Free), Missing Glibc Patch" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320596" id="1320596" title="Glibc: Null Pointer Dereference In Stub Resolver With Unconnectable Name Server Addresses" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1321866" id="1321866" title="Glibc: Stack Overflow In Nss_Dns_Getnetbyname_R" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335629" id="1335629" title="Aarch64: Minsigstksz Is (Much) Too Small" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335925" id="1335925" title="Glibc: Fix Aarch64 Abi Issues" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346397" id="1346397" title="Glibc: Debug/Tst-Longjump_Chk2 Calls Printf From A Signal Handler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=971416" id="971416" title="Locale Alias No_No.Iso-8859-1 Not Working." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2574-2</id><title>Kernel</title><description>Security Fix(es): 
* It was found that the Linux kernel's IPv6 implementation mishandled socket options. A local attacker could abuse concurrent access to the socket options to escalate their privileges, or cause a denial of service (use-after-free and system crash) via a crafted sendmsg system call. (CVE-2016-3841, Important) 
(CVE-2013-4312, CVE-2015-8374, CVE-2015-8543, CVE-2015-8812, CVE-2015-8844, CVE-2015-8845, CVE-2016-2053, CVE-2016-2069, CVE-2016-2847, CVE-2016-3156, CVE-2016-4581, CVE-2016-4794, CVE-2016-5412, CVE-2016-5828, CVE-2016-5829, CVE-2016-6136, CVE-2016-6198, CVE-2016-6327, CVE-2016-6480, CVE-2015-8746, CVE-2015-8956, CVE-2016-2117, CVE-2016-2384, CVE-2016-3070, CVE-2016-3699, CVE-2016-4569, CVE-2016-4578) 
Additional Changes:</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel" release="514.el7" src="kernel-3.10.0-514.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-514.el7.x86_64.rpm</filename><sum type="sha256">05ac32143effe7330380aaf8d483079afbce76b2950bd058489881f46865382a</sum></package><package arch="noarch" name="kernel-doc" release="514.el7" src="kernel-3.10.0-514.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-514.el7.noarch.rpm</filename><sum type="sha256">7d3b4cc1096ccb83516c7775b667a8fe9d6201c0c038f25569007f83f2e92cf6</sum></package><package arch="x86_64" name="kernel-headers" release="514.el7" src="kernel-3.10.0-514.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-514.el7.x86_64.rpm</filename><sum type="sha256">82d23f2ae0d5cf45bfce717474015ccd054d1ac63668ed1619bfaa35e9fe458e</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="514.el7" src="kernel-3.10.0-514.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-514.el7.noarch.rpm</filename><sum type="sha256">dffe7648eb62f7589c860ea86291290fc2f9a49a8fb84b3c75e06dbee66d2dfb</sum></package><package arch="x86_64" name="kernel-tools" release="514.el7" src="kernel-3.10.0-514.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-514.el7.x86_64.rpm</filename><sum type="sha256">a2301e038ca469cc23b7a82c86962442f1ba97788258b149c3c0452e8db05846</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="514.el7" src="kernel-3.10.0-514.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-514.el7.x86_64.rpm</filename><sum type="sha256">70b3ff6e6cb0b6cce58012b2d87ac9ee7bd1a1a17d1995a038a28017274510a6</sum></package><package arch="x86_64" name="kernel-debug" release="514.el7" src="kernel-3.10.0-514.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-514.el7.x86_64.rpm</filename><sum type="sha256">d681e117a6779e653087ced8dd79631313baca85cc9fd5a9b613fec04f311272</sum></package><package arch="x86_64" name="perf" release="514.el7" src="kernel-3.10.0-514.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-514.el7.x86_64.rpm</filename><sum type="sha256">718b2627762edce9314cc1f9e28c780f3bdb83929cdfd806b51bee103a6fd78a</sum></package><package arch="x86_64" name="kernel-debug-devel" release="514.el7" src="kernel-3.10.0-514.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-514.el7.x86_64.rpm</filename><sum type="sha256">6b02aa1472dafab86c41974a5dcad16f7e1a0e963819d6c38db18c97fe11eb23</sum></package><package arch="x86_64" name="kernel-tools-libs" release="514.el7" src="kernel-3.10.0-514.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-514.el7.x86_64.rpm</filename><sum type="sha256">0eeb203b6f7abdd7a75d67166852a9c114599e07b3efaf13d492d44fcd4b3dd9</sum></package><package arch="x86_64" name="python-perf" release="514.el7" src="kernel-3.10.0-514.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-514.el7.x86_64.rpm</filename><sum type="sha256">ecee71df78743ddf2081a91203d7231a9630aee006ce89d578ab01354c479a59</sum></package><package arch="x86_64" name="kernel-devel" release="514.el7" src="kernel-3.10.0-514.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-514.el7.x86_64.rpm</filename><sum type="sha256">026da69d9888ad5c45709a965f0ddf786a60b7ed6d980f376f8418ff72484b38</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4312" id="CVE-2013-4312" title="Kernel: File Descriptors Passed Over Unix " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8374" id="CVE-2015-8374" title="Kernel: Information Leak When Truncating Of Compressed/Inlined Extents On Btrfs" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8543" id="CVE-2015-8543" title="Kernel: Ipv6 Connect Causes Dos Via Null Pointer " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8746" id="CVE-2015-8746" title="Kernel: When Nfsv4 Migration Is Executed, Kernel Oops Occurs At Nfs Client" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8812" id="CVE-2015-8812" title="Kernel: Cxgb3: Logic Bug In Return Code Handling Prematurely Frees Key Structures Causing Use After Free Or Kernel Panic." type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8844" id="CVE-2015-8844" title="Kernel: Incorrect Restoration Of Machine Specific Registers From Userspace" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8845" id="CVE-2015-8845" title="Kernel: Incorrect Restoration Of Machine Specific Registers From Userspace" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8956" id="CVE-2015-8956" title="Kernel: Null Dereference In Rfcomm Bind Callback" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2053" id="CVE-2016-2053" title="Kernel: Kernel Panic And System Lockup By Triggering Bug_On() In Public_Key_Verify_Signature()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2069" id="CVE-2016-2069" title=" Kernel: Race Condition In The Tlb Flush Logic" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2117" id="CVE-2016-2117" title="Kernel: Kernel Memory Leakage To Ethernet Frames Due To Buffer Overflow In Ethernet Drivers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2384" id="CVE-2016-2384" title="Kernel: Double-Free In Usb-Audio Triggered By Invalid Usb Descriptor" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2847" id="CVE-2016-2847" title="Kernel: Pipe: Limit The Per-User Amount Of Pages Allocated In Pipes" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3070" id="CVE-2016-3070" title="Kernel: Null Pointer Dereference In Trace_Writeback_Dirty_Page()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3156" id="CVE-2016-3156" title="Kernel: Ipv4: Denial Of Service When Destroying A Network Interface" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3699" id="CVE-2016-3699" title="Kernel: Acpi Table Override Allowed When Securelevel Is Enabled" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3841" id="CVE-2016-3841" title="Kernel: Use-After-Free Via Crafted Ipv6 Sendmsg For Raw / Tcp / Udp / L2Tp Sockets." type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4569" id="CVE-2016-4569" title="Kernel: Information Leak In Linux Sound Module In Timer.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4578" id="CVE-2016-4578" title="Kernel: Information Leak In Events In Timer.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4581" id="CVE-2016-4581" title="Kernel: Slave Being First Propagated Copy Causes Oops In Propagate_Mnt" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4794" id="CVE-2016-4794" title="Kernel: Use After Free In Array_Map_Alloc" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5412" id="CVE-2016-5412" title="Kernel: Powerpc: Kvm: Infinite Loop Via H_Cede Hypercall When Running Under Hypervisor-Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5828" id="CVE-2016-5828" title="Kernel: Powerpc: Tm: Crash Via Exec System Call On Ppc" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5829" id="CVE-2016-5829" title="Kernel: Heap Buffer Overflow In Hiddev Driver" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6136" id="CVE-2016-6136" title="Kernel: Race Condition Vulnerability In Execve Argv Arguments" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6198" id="CVE-2016-6198" title="Kernel: Vfs: Missing Detection Of Hardlinks In Vfs_Rename() On Overlayfs" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6327" id="CVE-2016-6327" title="Kernel: Infiniband: Kernel Crash By Sending Abort_Task Command" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6480" id="CVE-2016-6480" title="Kernel: Scsi: Aacraid: Double Fetch In Ioctl_Send_Fib()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2574" id="RHSA-2016:2574-2" title="Rhsa-2016:2574-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1141249" id="1141249" title="Xen Guests May Hang After Migration Or Suspend/Resume" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1234586" id="1234586" title="Backtrace After Unclean Shutdown With Xfs V5 And Project Quotas" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1267042" id="1267042" title="Xfs Needs To Better Handle Eio And Enospc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278224" id="1278224" title="Panic In Iscsi_Target.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1283341" id="1283341" title="Cannot Mount Rhel7 Nfs Server With Nfsvers=4.1,Sec=Krb5 But Nfsvers=4.0,Sec=Krb5 Works" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1286261" id="1286261" title="Kernel: Information Leak When Truncating Of Compressed/Inlined Extents On Btrfs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1286500" id="1286500" title="Tool Thin_Dump Failing To Show 'Mappings'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290475" id="1290475" title="Kernel: Ipv6 Connect Causes Dos Via Null Pointer " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1292481" id="1292481" title="Device Mapper Hung Tasks On An Openshift/Docker System" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1295802" id="1295802" title="Kernel: When Nfsv4 Migration Is Executed, Kernel Oops Occurs At Nfs Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297813" id="1297813" title="Kernel: File Descriptors Passed Over Unix " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299662" id="1299662" title="Vfio: Include No-Iommu Mode - Not Supported" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300023" id="1300023" title="Soft Lockup In Nfs4_Put_Stid With 3.10.0-327.4.4.El7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300237" id="1300237" title="Kernel: Kernel Panic And System Lockup By Triggering Bug_On() In Public_Key_Verify_Signature()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301893" id="1301893" title=" Kernel: Race Condition In The Tlb Flush Logic" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302166" id="1302166" title="Mac Address Of Vf Is Not Editable Even When Attached To Host" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1303532" id="1303532" title="Kernel: Cxgb3: Logic Bug In Return Code Handling Prematurely Frees Key Structures Causing Use After Free Or Kernel Panic." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305118" id="1305118" title="Xfs Support For Deferred Dio Completion" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1307091" id="1307091" title="Fstrim Failing On Mdadm Raid 5 Device" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1308444" id="1308444" title="Kernel: Double-Free In Usb-Audio Triggered By Invalid Usb Descriptor" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1308846" id="1308846" title="Kernel: Null Pointer Dereference In Trace_Writeback_Dirty_Page()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312298" id="1312298" title="Kernel: Kernel Memory Leakage To Ethernet Frames Due To Buffer Overflow In Ethernet Drivers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1313428" id="1313428" title="Kernel: Pipe: Limit The Per-User Amount Of Pages Allocated In Pipes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1318172" id="1318172" title="Kernel: Ipv4: Denial Of Service When Destroying A Network Interface" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1321096" id="1321096" title="Bug: S390 Socketcall() Syscalls Audited With Wrong Value In Field A0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326540" id="1326540" title="Kernel: Incorrect Restoration Of Machine Specific Registers From Userspace" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329653" id="1329653" title="Kernel: Acpi Table Override Allowed When Securelevel Is Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333712" id="1333712" title="Kernel: Slave Being First Propagated Copy Causes Oops In Propagate_Mnt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334643" id="1334643" title="Kernel: Information Leak In Linux Sound Module In Timer.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335215" id="1335215" title="Kernel: Information Leak In Events In Timer.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335889" id="1335889" title="Kernel: Use After Free In Array_Map_Alloc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349539" id="1349539" title="T460[P/S] Audio Output On Dock Won'T Work" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349916" id="1349916" title="Kernel: Powerpc: Kvm: Infinite Loop Via H_Cede Hypercall When Running Under Hypervisor-Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349917" id="1349917" title="Kernel: Powerpc: Tm: Crash Via Exec System Call On Ppc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1350509" id="1350509" title="Kernel: Heap Buffer Overflow In Hiddev Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1353533" id="1353533" title="Kernel: Race Condition Vulnerability In Execve Argv Arguments" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1354525" id="1354525" title="Kernel: Infiniband: Kernel Crash By Sending Abort_Task Command" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1355654" id="1355654" title="Kernel: Vfs: Missing Detection Of Hardlinks In Vfs_Rename() On Overlayfs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361245" id="1361245" title="[Hyper-V][Rhel 7.2] Vms Panic When Configured With Dynamic Memory As Opposed To Static Memory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1362466" id="1362466" title="Kernel: Scsi: Aacraid: Double Fetch In Ioctl_Send_Fib()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1364971" id="1364971" title="Kernel: Use-After-Free Via Crafted Ipv6 Sendmsg For Raw / Tcp / Udp / L2Tp Sockets." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1383395" id="1383395" title="Kernel: Null Dereference In Rfcomm Bind Callback" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2575-2</id><title>Curl</title><description>Security Fix(es): 
* It was found that the libcurl library did not prevent TLS session resumption when the client certificate had changed. An attacker could potentially use this flaw to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate. (CVE-2016-5419) 
* It was found that the libcurl library did not check the client certificate when choosing the TLS connection to reuse. An attacker could potentially use this flaw to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate. (CVE-2016-5420) 
* It was found that the libcurl library using the NSS (Network Security Services) library as TLS/SSL backend incorrectly re-used client certificates for subsequent TLS connections in certain cases. An attacker could potentially use this flaw to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate. (CVE-2016-7141) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libcurl-devel" release="35.el7" src="curl-7.29.0-35.el7.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-35.el7.i686.rpm</filename><sum type="sha256">50ea99c23efcbd50b23225e34f4e40100e9c67728fe5f0472a38c07299b1b0fb</sum></package><package arch="x86_64" name="curl" release="35.el7" src="curl-7.29.0-35.el7.src.rpm" version="7.29.0"><filename>curl-7.29.0-35.el7.x86_64.rpm</filename><sum type="sha256">20aabd59a0f923667c883ff81dfc5a0783d8a5dcb6676ea62a67b6dad4a963e2</sum></package><package arch="x86_64" name="libcurl-devel" release="35.el7" src="curl-7.29.0-35.el7.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-35.el7.x86_64.rpm</filename><sum type="sha256">f38361651286eb9241aac68ab63bf876387b0b8dd67fc2982efb76727eff853c</sum></package><package arch="x86_64" name="libcurl" release="35.el7" src="curl-7.29.0-35.el7.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-35.el7.x86_64.rpm</filename><sum type="sha256">2b9629c6e04626623c169abe08f50e81d3c17f97ce8560fb180325d5f1476dd4</sum></package><package arch="i686" name="libcurl" release="35.el7" src="curl-7.29.0-35.el7.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-35.el7.i686.rpm</filename><sum type="sha256">813c6f031802d905051c7825f218ed056a87e9a743ae4ca8331bcdbc75d53ea3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5419" id="CVE-2016-5419" title="Curl: Tls Session Resumption Client Cert Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5420" id="CVE-2016-5420" title="Curl: Re-Using Connection With Wrong Client Cert" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7141" id="CVE-2016-7141" title="Curl: Incorrect Reuse Of Client Certificates" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2575" id="RHSA-2016:2575-2" title="Rhsa-2016:2575-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1260178" id="1260178" title="Curl And Libcurl Truncates Username/Password In Url To 255 Characters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305974" id="1305974" title="--Disable-Epsv Option Ignored For Ipv6 Hosts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347904" id="1347904" title="Ceph Rgw Deadlocks In Curl_Multi_Wait" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1362183" id="1362183" title="Curl: Tls Session Resumption Client Cert Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1362190" id="1362190" title="Curl: Re-Using Connection With Wrong Client Cert" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1373229" id="1373229" title="Curl: Incorrect Reuse Of Client Certificates" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2576-2</id><title>Libguestfs And Virt-P2V</title><description>Virt-p2v is a tool for conversion of a physical server to a virtual guest. 
The following packages have been upgraded to a newer upstream version: libguestfs (1.32.7), virt-p2v (1.32.7). 
Security Fix(es): 
* An integer conversion flaw was found in the way OCaml's String handled its length. Certain operations on an excessively long String could trigger a buffer overflow or result in an information leak. (CVE-2015-8869) 
Note: The libguestfs packages in this advisory were rebuilt with a fixed version of OCaml to address this issue. 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="libguestfs-devel" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>libguestfs-devel-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">bc506b87bad66eb17431d00a6569ce7f846dd8e566fddacd1017fa376e4ae7b8</sum></package><package arch="x86_64" epoch="1" name="libguestfs-rescue" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>libguestfs-rescue-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">9d3164b22d60433cccc7ca899183f41706f5d88b6a4f290872f6b23f4f5a3f9a</sum></package><package arch="noarch" epoch="1" name="libguestfs-tools" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>libguestfs-tools-1.32.7-3.el7.noarch.rpm</filename><sum type="sha256">3c4414cdcf712d52fb051e44d34c8de8320056426907287d68e75a5c2f392a77</sum></package><package arch="x86_64" epoch="1" name="ocaml-libguestfs" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>ocaml-libguestfs-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">efdc61920b0a351dfc990d63a7101283619dc15401219cbfc14a9f88efdd1e6b</sum></package><package arch="x86_64" epoch="1" name="perl-Sys-Guestfs" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>perl-Sys-Guestfs-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">39734597b8439a6fceb54cb20babed925c27927ff5d22a099e8f218b73dbb71a</sum></package><package arch="noarch" epoch="1" name="libguestfs-gobject-doc" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>libguestfs-gobject-doc-1.32.7-3.el7.noarch.rpm</filename><sum type="sha256">be9d8625439d42b191e77b97d672514834f35935b36159e49a4881461e3e1e40</sum></package><package arch="noarch" epoch="1" name="libguestfs-javadoc" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>libguestfs-javadoc-1.32.7-3.el7.noarch.rpm</filename><sum type="sha256">461ed1a5a81c2875a70dcb0000bed8f952932e7a268d8cd7880b11c234f21183</sum></package><package arch="x86_64" epoch="1" name="virt-dib" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>virt-dib-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">6cebe35ed00d8ea14afe36b0211635679136fa806ddb517de43ebb1af67a1bf6</sum></package><package arch="x86_64" epoch="1" name="libguestfs" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>libguestfs-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">9360a6d8a054ace103665f6b6c196a9815b76906cb70421e4d002a9fda8d070c</sum></package><package arch="x86_64" epoch="1" name="virt-v2v" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>virt-v2v-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">387c05b3ef535dcd2a9da71f4b4e1d61592244d655e6df95436ae1ae27640dbc</sum></package><package arch="noarch" epoch="1" name="libguestfs-man-pages-ja" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>libguestfs-man-pages-ja-1.32.7-3.el7.noarch.rpm</filename><sum type="sha256">7af7040fcaf6c7e20159ea44cafff272d6de6350f9be0087321f93dd3a716b43</sum></package><package arch="x86_64" epoch="1" name="libguestfs-java" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>libguestfs-java-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">5356a554a5b59231578dddf2cd05c7e192832664900a772993f08ffefbf9aee1</sum></package><package arch="x86_64" epoch="1" name="libguestfs-gobject-devel" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>libguestfs-gobject-devel-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">0f0a8911209b5e7acc8c8d00ecb3e5f69cd7e5e4ab5c4f31cdd840d86315e896</sum></package><package arch="x86_64" epoch="1" name="libguestfs-rsync" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>libguestfs-rsync-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">f278877e562d78a1a67ee6bce6e9e6fd73558cbd091d03733d69c3087cab6c20</sum></package><package arch="x86_64" epoch="1" name="libguestfs-gobject" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>libguestfs-gobject-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">f515d316cc0406bf79769f3cea39f20ad28a54a03e59e8c484ad4170f15fb28a</sum></package><package arch="noarch" epoch="1" name="libguestfs-bash-completion" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>libguestfs-bash-completion-1.32.7-3.el7.noarch.rpm</filename><sum type="sha256">5ded0d051c0633e9cf0db29e531c2ea32052cb4c339642930d634ef5a53f2f65</sum></package><package arch="noarch" epoch="1" name="libguestfs-inspect-icons" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>libguestfs-inspect-icons-1.32.7-3.el7.noarch.rpm</filename><sum type="sha256">4600708d7a5e16c57038542f44f17fa0c5f1ba99f58e295170d8dc4c56176389</sum></package><package arch="noarch" name="virt-p2v" release="2.el7" src="virt-p2v-1.32.7-2.el7.src.rpm" version="1.32.7"><filename>virt-p2v-1.32.7-2.el7.noarch.rpm</filename><sum type="sha256">60e832bc38cc8f12efee279e05667a177d365ce464d08b77de5b7da1eb46578f</sum></package><package arch="x86_64" epoch="1" name="ruby-libguestfs" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>ruby-libguestfs-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">0b69bf4bb7330534ecd080ac612bcb134745035b68740b85793dd19a46462a66</sum></package><package arch="x86_64" epoch="1" name="libguestfs-xfs" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>libguestfs-xfs-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">b2f1a291a162bbef679f8445b9ff73471c4650882bf4b5c72a68f3372f3124be</sum></package><package arch="x86_64" epoch="1" name="ocaml-libguestfs-devel" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>ocaml-libguestfs-devel-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">93a946cd474b619cf5273de6c2ce72d872b352987a8485cd260712db62eabc90</sum></package><package arch="x86_64" epoch="1" name="libguestfs-tools-c" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>libguestfs-tools-c-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">b889fb8e78d1be9b17e059e7aae811ae1ada73d5a9b32358e719dd9bc8ba5f31</sum></package><package arch="noarch" epoch="1" name="libguestfs-man-pages-uk" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>libguestfs-man-pages-uk-1.32.7-3.el7.noarch.rpm</filename><sum type="sha256">e04eaafb7aff92c9f09930840771acf6fcb641da93ba11151e6598be58e3f682</sum></package><package arch="x86_64" epoch="1" name="lua-guestfs" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>lua-guestfs-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">69c287fd51c7cfda052bacfc3a2c4b762115a59b96bc6a2738b5e5fa5b653388</sum></package><package arch="x86_64" epoch="1" name="python-libguestfs" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>python-libguestfs-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">1be683672d8d4289aead2e61ce20e6a249e4d49199e038047da1423e4eb88034</sum></package><package arch="x86_64" epoch="1" name="libguestfs-gfs2" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>libguestfs-gfs2-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">871e8b78317d4908e44bb519d0f374c6ded2d14df33c10d72faca3d0afcf19c3</sum></package><package arch="x86_64" epoch="1" name="libguestfs-java-devel" release="3.el7" src="libguestfs-1.32.7-3.el7.src.rpm" version="1.32.7"><filename>libguestfs-java-devel-1.32.7-3.el7.x86_64.rpm</filename><sum type="sha256">83a2e41e73cd6d6f5c0698c49bdbc3e9ac337f1ed41e53cb98d2e4e5f677768d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8869" id="CVE-2015-8869" title="Ocaml: Sizes Arguments Are Sign-Extended From 32 To 64 Bits" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2576" id="RHSA-2016:2576-2" title="Rhsa-2016:2576-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1064041" id="1064041" title="Virt-Sparsify Fails If A Btrfs Filesystem Contains Readonly Snapshots" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1099976" id="1099976" title="Virt-Builder Gives Gpg Warning Message With Gnupg2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1156298" id="1156298" title="Remove Files In Package Libguestfs-Bash-Completion, These Files Are Bash Completion Files, Some Of The Virt Tool Completion Are Already Implement In Another File, So Can Remove Its Completion File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1164708" id="1164708" title="Set-Label Can Only Set &lt;=127 Bytes For Btrfs And &lt;=126 Bytes For Ntfs Filesystem Which Not Meet The Help Message. Also For Ntfs It Should Give A Warning Message When The Length &gt;128 Bytes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1166057" id="1166057" title="Btrfs Filesystem Will Not Work Well If You Create The Filesystem With Multiple Disks At The Same Time, Such As: Mkfs-Btrfs &quot;/Dev/Sda1 /Dev/Sdb1&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1167916" id="1167916" title="P2V: Invalid Conversion Server Prints Unexpected End Of File Waiting For Password Prompt." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1173695" id="1173695" title="Rfe: Allow Passing In A Pre-Opened Libvirt Connection From Python" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1174551" id="1174551" title="&quot;Lstatnslist&quot; And &quot;Lstatlist&quot; Don'T Give An Error If The Api Is Used Wrongly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1176801" id="1176801" title="File /Etc/Sysconfig/Kernel Isn'T Updated When Convert Xenpv Guest With Regular Kernel Installed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180769" id="1180769" title="Security Context On Image File Gets Reset" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1190669" id="1190669" title="Support Virt-V2V Conversion Of Windows &gt; 7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213324" id="1213324" title="Virt-V2V: Warning: Unknown Guest Operating System: Windows Windows 6.3 When Converting Win8,Win8.1,Win2012,Win2012R2,Win10 To Rhev" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213701" id="1213701" title="Fail To Import Win8/Win2012 To Rhev With Error &quot;Selected Display Type Is Not Supported&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1218766" id="1218766" title="Rebase Libguestfs In Rhel 7.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1225789" id="1225789" title="Wrong Video Driver Is Installed For Rhel5.11 Guest After Conversion To Libvirt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1227599" id="1227599" title="P2V Invalid Password Prints Unexpected End Of File Waiting For Command Prompt." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1227609" id="1227609" title="Virt-P2V: Using &quot;Back&quot; Button Causes Output List To Be Repopulated Multiple Times" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1229119" id="1229119" title="Unrelated Info In Fstab Makes Virt-V2V Fail With Unclear Error Info" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1229386" id="1229386" title="Virt-P2V In Non-Gui Mode Doesn'T Show Any Conversion Progress Or Status" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1238053" id="1238053" title="V2V:Duplicate Disk Target Set When Convert Guest With Cdrom Attached" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1239154" id="1239154" title="Appliance Fails To Start With &quot;Supermin: Ext2Fs_File_Write: /Var/Log/Tallylog: Could Not Allocate Block In Ext2 Filesystem&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242853" id="1242853" title="Mount-Loop Failed To Setup Loop Device: No Such File Or Directory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1260801" id="1260801" title="Virt-Builder --Ssh-Inject Doesn'T Set Proper Permissions On Created Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1261242" id="1261242" title="Virt-V2V Should Prevent Using '-Of' Option Appears Twice On The Command Line" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1261436" id="1261436" title="No Warning Shows When Convert A Win7 Guest With Avg Antivirus Installed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1262959" id="1262959" title="Virt-Builder/Virt-Customize Set Password Does Not Work" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1264835" id="1264835" title="Ppc64Le: Virt-Customize --Install Fail To Detect The Guest Arch" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1267032" id="1267032" title="Guestfish Copy-In Command Behaves Oddly/Unexpectedly With Wildcards" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277074" id="1277074" title="Virt-P2V Client Shouldn'T Present The Vdsm Option Because It'S Not Usable" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277122" id="1277122" title="Rfe: Virt-Sparsify: Make '--In-Place' Sparsification Safe To Abort (Gracefully Or Ungracefully)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1287826" id="1287826" title="Remove Virt-V2V Support For Ppc64Le" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290755" id="1290755" title="Guestfish Should Be Able To Handle Lvm Thin Layouts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1292437" id="1292437" title="Backport Virt-V2V Pull Dcpath From Libvirt &lt;Vmware:Datacenterpath&gt;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1293527" id="1293527" title="There Should Be A Reminder To Avoid User To Edit A Guest Image By Multiple Tools At The Same Time In Guestfish Man Page" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1296606" id="1296606" title="Virt-V2V Doesn'T Remove Virtualbox Additions Correctly Because Of File Quoting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1306557" id="1306557" title="Running 'Git Clone' In Virt-Builder Or Virt-Customize Results In An Error Message" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1308769" id="1308769" title="Virt-V2V Does Not Copy Additional Disks To Glance" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1309580" id="1309580" title="Os Name Of Win8.1 X64 Guest Shows Incorrect In Rhevm3.6 General Info" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1309619" id="1309619" title="Wrong Warning Info &quot;Use Standard Vga&quot; Shows When Converting Windows &gt; 7 By Virt-V2V" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1309706" id="1309706" title="Error: Internal Error: Invalid Floppy Device Name: Hdb" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1309796" id="1309796" title="Filter Perl Provides" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311373" id="1311373" title="Fail To Install Qxl Driver For Windows 2008R2 And Win7 Guest After Conversion By Virt-V2V" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312254" id="1312254" title="Virt-V2V -O Libvirt Doesn'T Preserve Or Use Correct &lt;Graphics Type=&quot;Vnc|Spice&quot;&gt;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314244" id="1314244" title="Rfe: Virt-P2V Log Window Should Process Colour Escapes And Backspaces" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315237" id="1315237" title="Remove Reference Info About --Dcpath In Virt-V2V Manual Page" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1316479" id="1316479" title="V2V Cmd Cannot Exit And &quot;Block I/O Error In Device 'Appliance': No Space Left On Device (28)&quot; Is Printed When Specified &quot;-V -X&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1318440" id="1318440" title="Virt-Sysprep Will Fail Detecting Os If &quot;/Usr&quot; Is A Distinct Partition Mounted In &quot;/&quot; Via Fstab" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1325825" id="1325825" title="Virt-V2V Should Prevent Using Multiple '-B' And '-N' Option Appears On The Command Line" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326266" id="1326266" title="Virt-V2V Should Prevent Multiple Conflicting For &quot;-Oa &quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328766" id="1328766" title="Remove --In-Place Option In Virt-V2V Help" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332025" id="1332025" title="Inspection Does Not Parse /Etc/Redhat-Release Containing &quot;Derived From Red Hat Enterprise Linux 7.1 (Source)&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332090" id="1332090" title="Ocaml: Sizes Arguments Are Sign-Extended From 32 To 64 Bits" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1340407" id="1340407" title="Multiple Network Ports Will Not Be Aligned At P2V Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1340464" id="1340464" title="[Rfe] Suggestion Give User A Reminder For &quot;Cancel Conversion&quot; Button" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1340809" id="1340809" title="Testing Connection Timeout When Input Regular User Of Conversion Server With Checked &quot;Use Sudo......&quot;Button" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1341564" id="1341564" title="Virt-P2V Spinner Should Be Hidden When It Stops Spinning" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1341608" id="1341608" title="Ethtool Command Is Not Supported On P2V Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1341984" id="1341984" title="Virt-Get-Kernel Prompts An 'Invalid Value' Error When Using --Format Auto" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342337" id="1342337" title="Should Remind A Warning About Disk Image Has A Partition When Using Virt-P2V-Make-Disk" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342398" id="1342398" title="Convert A Guest From Rhel By Virt-V2V But Its Origin Info Shows Rhev At Rhevm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342447" id="1342447" title="Ifconfig Command Is Not Supported On P2V Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1343167" id="1343167" title="Failure When Disk Contains An Lv With Activationskip=Y" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1343414" id="1343414" title="Failed Ssh To Conversion Server By Ssh Identity Http Url At P2V Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1343423" id="1343423" title="[Rfe]Should Give A Better Description About 'Curl Error 22' When Failed Using Ssh Identity Http Url At P2V Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1345809" id="1345809" title="Virt-Customize --Truncate-Recursive Should Give An Error Message When Specifying A No-Existing Path" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1345813" id="1345813" title="Virt-Sysprep --Install Always Failed To Install The Packages Specified" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348900" id="1348900" title="Virt-P2V Should Update Error Prompt When 'Test Connection' With A Non-Existing User In Conversion Server" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349237" id="1349237" title="Virt-Inspector Can Not Get Windows Drive Letters For Gpt Disks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349342" id="1349342" title="Error Info Is Not Clear When Failed Ssh To Conversion Server Using Non-Root User With Password On P2V Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1350363" id="1350363" title="Improve Error Info &quot;Remote Server Timeout Unexpectedly Waiting For Password Prompt&quot; When Connect To A Bogus Server At P2V Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1352761" id="1352761" title="Virt-Manager Can'T Show Os Icons Of Win7/Win8/Ubuntu Guest." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1354335" id="1354335" title="Overlay Of Disk Images Does Not Specify The Format Of The Backing File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358142" id="1358142" title="Some Info Will Show When Convert Guest To Libvirt By Virt-V2V With Parameter --Quiet" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1359652" id="1359652" title="Fail To Inspect Windows Iso File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1362354" id="1362354" title="Virt-Dib Failed To Create Image Using Dib_Yum_Repo_Conf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1362357" id="1362357" title="Run_Command Runs Exit Handlers When Execve Fails (E.G. Due To Missing Executable)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1362668" id="1362668" title="Miscellaneous Fixes To Tool Options" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1362669" id="1362669" title="Backport Improved --Selinux-Relabel Support For Virt-Sysprep, Virt-Builder, Virt-Customize" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1364347" id="1364347" title="Virt-Sparsify --In-Place Failed With Uefi System" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1364419" id="1364419" title="[Virt-P2V]Failed To Connect To Conversion Server While Testing Lsi-Mpt2Sas Hardware Which Using Bnx2X Network Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1365005" id="1365005" title="Guest Name Is Incorrect If Convert Guest From Disk Image By Virt-V2V" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1366456" id="1366456" title="Converting Rhel7 Host Installed On Raid:Warning: Fstrim: Fstrim: /Sysroot/: The Discard Operation Is Not Supported" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367615" id="1367615" title="Ovmf File Which Is Built For Rhel7.3  Can'T Be Used For Virt-V2V Uefi Conversion" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1370424" id="1370424" title="Virt-Manager Coredump When Vm With Gluster Image Exists" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=855058" id="855058" title="Rfe: Virt-P2V: Display More Information About Storage Devices" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2577-2</id><title>Libvirt</title><description>The following packages have been upgraded to a newer upstream version: libvirt (2.0.0). 
Security Fix(es): 
* It was found that the libvirt daemon, when using RBD (RADOS Block Device), leaked private credentials to the process list. A local attacker could use this flaw to perform certain privileged operations within the cluster. (CVE-2015-5160) 
* A path-traversal flaw was found in the way the libvirt daemon handled filesystem names for storage volumes. A libvirt user with privileges to create storage volumes and without privileges to create and modify domains could possibly use this flaw to escalate their privileges. (CVE-2015-5313) 
* It was found that setting a VNC password to an empty string in libvirt did not disable all access to the VNC server as documented, instead it allowed access with no authentication required. An attacker could use this flaw to access a VNC server with an empty VNC password without any authentication. (CVE-2016-5008)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libvirt-daemon-config-network" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-daemon-config-network-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">6bacbdbe494d07c00ed04dee99f00a1fba43ef2a8450f0ad83885b960676775b</sum></package><package arch="x86_64" name="libvirt-devel" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-devel-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">82d17da2ac9ba56775a3e87262c715fdf9c7a68a16ac156d793d65c5ba445e57</sum></package><package arch="x86_64" name="libvirt-daemon-config-nwfilter" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-daemon-config-nwfilter-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">01c02b912d3ca11ac6fd79138c3767f7ae1f9fa04be1f459e800c5460f6d4753</sum></package><package arch="x86_64" name="libvirt-daemon-lxc" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-daemon-lxc-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">59904c04a424fb00b30f8002a37211c5df5548b6c386215fdbc0d99c8057f5b4</sum></package><package arch="x86_64" name="libvirt-daemon-driver-qemu" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-daemon-driver-qemu-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">b1211538fd57a49d1b55633b4a5f20e1679acabdc26e57cc3354238af34c7826</sum></package><package arch="x86_64" name="libvirt" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">79f075407ebaed5899117a32379244ceaba391245a5dfae13607af846702a669</sum></package><package arch="x86_64" name="libvirt-client" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-client-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">f43808231e1a43631456947ef45b07208b7d47a449fc0b22a2fb4e5abc40c532</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nodedev" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-daemon-driver-nodedev-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">902fb699920c70386a4761ef765392ca1a8be625d7f036b803c6424095fdf279</sum></package><package arch="x86_64" name="libvirt-daemon-driver-network" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-daemon-driver-network-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">c645d73d0e239a33f7745c41c44ada2843af8ca6efae8f27c0c39cc0b8105ed1</sum></package><package arch="i686" name="libvirt-client" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-client-2.0.0-10.el7.i686.rpm</filename><sum type="sha256">337558e17dc87b1575c45f1f65176f3079ca8e7b14005af14dad6f92b14a4017</sum></package><package arch="x86_64" name="libvirt-daemon-driver-secret" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-daemon-driver-secret-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">caebb9fa28bc150ef9367542faf5b912cc33f9941c0cb47b8c360db423f82d45</sum></package><package arch="i686" name="libvirt-devel" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-devel-2.0.0-10.el7.i686.rpm</filename><sum type="sha256">605ab72126ac5871dc6bfa3d93d5ac597047aa9235de32b4d3195e9128c390ea</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nwfilter" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-daemon-driver-nwfilter-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">e5d97ceffa1815eabfac0e0b41b6ad0571987b426344a5b10334d16992aace9c</sum></package><package arch="x86_64" name="libvirt-daemon-driver-lxc" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-daemon-driver-lxc-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">021d564d7e92b8921d663d47e6e1999f2f3b9ee76eec1e6330beff8dbe1fed92</sum></package><package arch="x86_64" name="libvirt-daemon-kvm" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-daemon-kvm-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">9b9988ad4deec24a136423574d8b770fb6daac1e8776ae5ec1179b06144caf83</sum></package><package arch="x86_64" name="libvirt-nss" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-nss-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">bde3a197aedc5142c5f67724e1d63f562f5a475cb8f6dedd5e9e2934b3259aa2</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-daemon-driver-storage-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">ce411caa50da4c13c6cdea8f7c0f93e53b742cd6b8d03efa17f4dad70b0cb9f0</sum></package><package arch="x86_64" name="libvirt-daemon" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-daemon-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">e3d37158e109f4f7e42335631637aad7e44f245fa93bb548d2cc89017c4d1f16</sum></package><package arch="x86_64" name="libvirt-daemon-driver-interface" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-daemon-driver-interface-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">2fffad30859e7094ffd15750890604d7fc0ef114510c82eac34bb1bb41c3c06f</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-lock-sanlock-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">12541cd62032e8af251646b6b0715537cd00d43b2d5331bbaf6fa4d5bcbe7378</sum></package><package arch="x86_64" name="libvirt-docs" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-docs-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">42518f0f09a13a913465d6248d8bc637f3f7180eaff21e14e5c40849a286df44</sum></package><package arch="i686" name="libvirt-nss" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-nss-2.0.0-10.el7.i686.rpm</filename><sum type="sha256">f86d1ea20656f186a076a1889df5ac472ada5ddb87a8171d617990afe35ab347</sum></package><package arch="x86_64" name="libvirt-login-shell" release="10.el7" src="libvirt-2.0.0-10.el7.src.rpm" version="2.0.0"><filename>libvirt-login-shell-2.0.0-10.el7.x86_64.rpm</filename><sum type="sha256">3616da220af529780623dd9157d2a5fc2ea95ef642b3c62034c2d136a8644bc8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5160" id="CVE-2015-5160" title="Libvirt: Ceph Id/Key Leaked In The Process List" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5313" id="CVE-2015-5313" title="Libvirt: Filesystem Storage Volume Names Path Traversal Flaw" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5008" id="CVE-2016-5008" title="Libvirt: Setting Empty Vnc Password Allows Access To Unauthorized Users" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2577" id="RHSA-2016:2577-2" title="Rhsa-2016:2577-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1002423" id="1002423" title="Libvirt Should Forbid Or Remove The Duplicate &lt;Interface&gt;/&lt;Address&gt; Subelements In &lt;Forward&gt; Element Of Virtual Network" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1004593" id="1004593" title="Libvirt Should Provide A More Useful Error Message When A Pci Controller Is Configured To Plug Into Itself (Bus = Index)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1004602" id="1004602" title="Error Message Need Be Improved For Q35 Guest With Wrong Controller" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1025230" id="1025230" title="Libvirt Activate Pool With Invalid Source." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1026136" id="1026136" title="Volume Download Speed Is Slow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1038888" id="1038888" title="[Doc] 3 Problems In Nwfilter Doc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1046833" id="1046833" title="Warn Users Against Setting Memory Hard Limit Too High When Used For Mlock Or Rdma-Pin-All" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1051350" id="1051350" title="Support The Readonly Attribute For Scsi Passthrough Devices" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1055331" id="1055331" title="Virdevicepciaddressparsexml Check Failed For Pci Device 0000:00:00.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1077068" id="1077068" title="Wrong Allocation Size When Create/Resize Volumes In Nfs Pool" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1097930" id="1097930" title="[Rfe] Hot Un-Plug Cpu - Support Dynamic Virtual Cpu Deallocation - Libvirt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1103314" id="1103314" title="Rfe: Configure Guest Numa Node Locality For Guest Pci Devices" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1103845" id="1103845" title="Glusterfs Backend Does Not Support Discard (Libvirt)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1120053" id="1120053" title="Option Shareable Does Not Take Effect After Injecting A Cdrom To Guest By Attach-Disk" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1134878" id="1134878" title="Libvirt Reports Json &quot;Backing File&quot; Is Missing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1139766" id="1139766" title="Need A Non-Event Way To Determine Qemu'S Current Offset From Utc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151723" id="1151723" title="Migration Will Hang After Use Migrate With --Graphicsuri And Guest Status Will Be Locked" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1159219" id="1159219" title="[Rfe] Update-Device  Support Update Startuppolicy Option To Domain Xml" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1163091" id="1163091" title="Pool Allocation Value Too Large After Volume Creation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1166452" id="1166452" title="Report Better Error Message For Reordered Companion Controllers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168453" id="1168453" title="Disk Should Be Removed While Using No-Exist 'File' Type Volume With Startuppolicy='Optional'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180092" id="1180092" title="When Set/Update Graphics Password To Empty, Log In Guest With Spice And Vnc Show Different Behaviour" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1180486" id="1180486" title="[Power Kvm] Floppy Disk Couldn'T Be Detected On Ppc64 Guest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1195176" id="1195176" title="[Rfe] Add Virtio-Gpu And Virtio-Vga Support" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1196711" id="1196711" title="Block Job Status Is Missing When Zero-Length Copy Job Is In Mirroring Phase" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1197592" id="1197592" title="Blockcopy Always Failed When With Option &quot;--Pivot&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1209802" id="1209802" title="Blockcopy For Lun Device Changes Disk Type=Block To File, However, It'S Unsupported Configuration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1210587" id="1210587" title="When Libvirt Automatically Fill Up Scsi Virtual Disk'S Target Address, It Doesn'T Check Existing Hostdev Scsi Device'S Target Address, And This Will Cause Conflict." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1215968" id="1215968" title="Libvirt Does Not Generate Guest Usb Addresses" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1216281" id="1216281" title="Guest Show Blackscreen After Resume The Guest Which Paused By Watchdog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220702" id="1220702" title="Wrong Display Of Current Memory After Memory Hot-Plug" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1227880" id="1227880" title="Update Floppy Command Line Options For Qemu'S Pc-Q35-Rhel7.2.0+ Machine Types" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1231114" id="1231114" title="[Rfe] Add Virtio-Input Support" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1233003" id="1233003" title="Manually Created Lvm Is Deleted By Virsh Vol-Create-As If It Is Having The Same Name" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1233115" id="1233115" title="Blockcopy Always Fail When Use Options &quot;Granularity&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1235180" id="1235180" title="Guest Will Have Broken Settings If We Cold-Unplug A Vcpu Which Included In Some Domain Vcpu Sched" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1235581" id="1235581" title="Rfe: Enable The Intel-Iommu Device In Qemu" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1240439" id="1240439" title="Add Multiqueue Support For 'Direct' Interface Types." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1243684" id="1243684" title="Virsh Client Doesn'T Print Error Message When The Connection Is Reset By Server On Some Ocassion." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1244128" id="1244128" title="Setvcpu Should Inherit The Cputune Value In Cgroups Was Set Before Via Schedinfo" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1244567" id="1244567" title="Guest Agent Should Report Proper Error While Guest Agent Was Unreachable And Restart Libvirtd Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1245476" id="1245476" title="Error Not Right When Set Memtune But Get Failed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1245525" id="1245525" title="Libvirt Should Reject Metadata Elements Not Belonging To Any Namespace" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1245647" id="1245647" title="Libvirt: Ceph Id/Key Leaked In The Process List" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1247521" id="1247521" title="Rfe: Libvirt: Support Multiple Volume Hosts For Gluster Volumes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1247987" id="1247987" title="Volume Info Has Incorrect Allocation Value For Extended Partition." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1248277" id="1248277" title="No Error Output When Pass A Negative Number To Setvcpus" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1249441" id="1249441" title="Cpu-Stats Returns Error Messages With --Start &lt;Number&gt; (Number &gt;=32)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1249981" id="1249981" title="Iothreadpin Will Pin One Of Libvirtd Thread With Qemu 1.5" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1250287" id="1250287" title="Domfsinfo Do Not Have Output In Quiet Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1250331" id="1250331" title="Change-Media Cannot Insert If Disk Source Element With Startuppolicy" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1251461" id="1251461" title="Libvirt Produced Ambiguous Error Message When Create Disk Pool With A Block Device Which Has No Disk Label" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1253107" id="1253107" title="Blkiotune Cannot Live Update &lt;Weight&gt; Value Into Domain Xml Via --Weight" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1254152" id="1254152" title="Error Should Be Improved When Use Some Virsh Command Get Failure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1256999" id="1256999" title="Libvirt Shouldn'T Add Extra &quot;Auth Type&quot; Into Domain Xml When Using Iscsi Volume Disk With Secret Setting." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1257486" id="1257486" title="Libvirt Could Have A Check To Host Node During Use Numatune" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1260576" id="1260576" title="Guest Which Use Big Maxmemory Will Lose Track After Restart Libvirtd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1260749" id="1260749" title="Rfe: Support Qxl Vram64 Parameter" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1261432" id="1261432" title="Net-Dhcp-Leases Should Return Error When Parse Invalid Mac" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1263574" id="1263574" title="Vpx: Include Dcpath Output In Libvirt Xml" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1264008" id="1264008" title="Libvirt Take Too Much Time To Redefine A Guest When Set A Big Iothreads" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265049" id="1265049" title="Offline Migration Failed With Memory Device When Guest Is Shutoff." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265114" id="1265114" title="Wrong Error When Call Allocpages And Specify A 0 Page Size" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1266078" id="1266078" title="Audit Log Entries For Hot(Un)Plugged Memory Devices Are Sometimes Incorrect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1266982" id="1266982" title="Libvirt Should Emit Warning/Error If Vhostuser Network Device Is Used, But Shared Memory Is Not Configured" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1267256" id="1267256" title="Do Not Crash If A Machine Config In /Etc/Libvirt Is Missing A Machine Type" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269575" id="1269575" title="Guest State &quot;Crashed&quot; Does Not Get Updated After &quot;Virsh Reset&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269715" id="1269715" title="Can'T Start Vm With Memory Modules If Memory Placement Is Auto" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1270427" id="1270427" title="Libvirt Should Escape Possible Invalid Characters." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1270709" id="1270709" title="Volume'S Allocation Should Be Updated Automatically While Doing Virsh Vol-Wipe" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1270715" id="1270715" title="Wrong Display Of Numatune Result If Guest Use Numad Advise" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1271069" id="1271069" title="Change Media Fail With Virtio Scsi Cdrom When Tray Is Open" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1271107" id="1271107" title="The Vaule Of Used Memory In 'Virsh Dominfo' Is 0 When The Guest Is Shut Off" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1272301" id="1272301" title="Virsh Client Crash When Pass An Empty String To Dump Option Format" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273480" id="1273480" title="Ppc64Le: Vfio Doesn'T Work For Small Guests (1 Gib)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273491" id="1273491" title="Vm With Attached Vfio Device Is Powered Off When Trying To Hotplug Increase Memory Of Vm." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273686" id="1273686" title="Libvirt Do Not Check The If The Serial Type Is Changed During Migrate/Save" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1275039" id="1275039" title="Internal Error: Invalid Or Not Yet Handled Value 'Emptybackingstring' For Vmx Entry 'Ide1:0.Filename' For Device Type 'Cdrom-Image'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1276198" id="1276198" title="Fail To Create Pool With A Virtual Hba In Npiv" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277121" id="1277121" title="Libvirt: Filesystem Storage Volume Names Path Traversal Flaw" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277781" id="1277781" title="Libvirtd Segment Fault When Create And Destroy A Fc_Host Pool With A Short Pause" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278068" id="1278068" title="Cannot Start Virtual Machine After Renaming It" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278404" id="1278404" title="Error &quot;Unsupported Migration Cookie Feature Memory-Hotplug&quot; Is Reported Despite Migration Working" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278421" id="1278421" title="Cannot Pxe Boot Using Vf Devices" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278727" id="1278727" title="&quot;Virsh Domjobinfo&quot; Hangs On Destination Host During Migration." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281706" id="1281706" title="Virsh Domcontrol Will Show Different Result To A Inactive Guest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281707" id="1281707" title="Some Virsh Cmd Get Failure Without Set Error Message" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281710" id="1281710" title="It'S Better Support To Delete Snapshots For Rbd Volume" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1282288" id="1282288" title="Unable To Set Permission When A Volume Is Created In Root Squash Netfs Pool" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1282744" id="1282744" title="Actual Downtime - Sometimes Libvirt Doesn'T Report 'Downtime_Net' In Jobstats While Migrating Vm/S" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1282846" id="1282846" title="Libvirt Can Not Start A Vm With Non-Acsii Or Long Names: Invalid Machine Name (From Systemd)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1283085" id="1283085" title="Creating External Disk Snapshot For A Guest Which Has Two Disks With The Same Prefix Name&#65292;The Disks Become The Same Name In Xml" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1285665" id="1285665" title="Fail To Valid The Guest'S Xml While Set The Graphical Listen As Ipv6 Address Which End With &quot;::&quot; On Rhel7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1286679" id="1286679" title="Rebase Libvirt To Current Upstream Release" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1288000" id="1288000" title="Virsh Lacks Support For The Scale (Mib/S Or Bytes/S) For Block Job Bandwidth" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1288690" id="1288690" title="Error Message Misleads Users When 2 Or More Ide Controllers Are Configured" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289288" id="1289288" title="Live Migration Dynamic Cpu Throttling For Auto-Convergence (Libvirt)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289363" id="1289363" title="59-Character Name-Length Limitation When Creating Vms" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289391" id="1289391" title="Libvirt Incorrectly Unplug The Backend When Host Device Frontent Hotplug Fails" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290324" id="1290324" title="Libvirt Should Forbid Set Current Cpu Is 0 In Xml" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1293241" id="1293241" title="Libvirt Should Forbid Set 0,^0 In Cpuset Instead Of Generate A Xml Which Have Broken Settings" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1293804" id="1293804" title="Libvirt Fails To Unlink The Image Disks After Creating Vms Using Virt-Install: Cannot Unlink File 'Foo': Success" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1293899" id="1293899" title="Libvirt Mishandle The Internal Snapshot With Ahci Device" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1294617" id="1294617" title="Migration Fails With -Dname Option When Guest Agent Is Specified" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297020" id="1297020" title="Ppc64 Guests Default To Legacy -Usb Option Instead Of -Device Pci-Ohci" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297690" id="1297690" title="Xml-Rpc Error : Cannot Write Data: Transport Endpoint Is Not Connected" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298065" id="1298065" title="The Size Of Raw Image Is Incorect After Clone Without --Nonsparse" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299696" id="1299696" title="Set Spice Graphic Port To '-1', The Port Allocated To The Guest Can'T Be Used Again After The Guest Is Managedsaved Or Shutoff." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301021" id="1301021" title="Rfe: Add Support For Luks Disk Encryption Format Driver W/ Rbd, Iscsi, And Qcow2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302373" id="1302373" title="Libvirt_Driver_Qemu.So References Libvirt_Driver_Storage.So" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305922" id="1305922" title="Set Cgroup Device Acls To Allow Block Device For Nvram Backing Store" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1306556" id="1306556" title="[Rfe] Allow Specifying Cpu Pinning For Inactive Vcpus" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1308317" id="1308317" title="Libvirt Check The Wrong Cpu Placement Status When Change The Emulator/Iothreadpin Configuration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312188" id="1312188" title="Virtlogd Failed To Open Guest Log File While Doing Migration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1313264" id="1313264" title="Direct Interface With Multiqueue Enabled Donesn'T Support Hotplugging" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1313314" id="1313314" title="Libvirt Will Not Override A Target Name With Prefix Of 'Vif' In Guest'S Xml Interface Part, Which Do Not Conform To The Description In Libvirt.Org" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1313627" id="1313627" title="Fail To Restore Vm With Usb Keyboard Config On Ppc64Le" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314594" id="1314594" title="Libvirt Should Reject To Rename A Domain In Saved Status." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315059" id="1315059" title="Improve The Error When Undefine Transient Network" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1316371" id="1316371" title="Libvirt Auto Remove The Vcpupin Config When Cold-Unplug Vcpu" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1316384" id="1316384" title="Libvirt Report Wrong Error When Parse Vcpupin Info" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1316420" id="1316420" title="Libvirtd Crashed If Set Vcpusched Vcpus Over Maxvcpu" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1316433" id="1316433" title="Cmd Domstats Cause Libvirtd Memleak" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1316465" id="1316465" title="Active Virtual Network Based On Linux Bridge Will Becase Inactive After Libvirtd Restart" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1317531" id="1317531" title="Libvirt Does Not Report Pci_Header_Type In Node Device Xml" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1318569" id="1318569" title="Eject Cdrom Fails Since Tray Is Locked But Next Try Succeeds" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1318993" id="1318993" title="Vol-Create-From Failed For Logical Pool" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319044" id="1319044" title="Log Error When &lt;Bandwidth&gt; Requested On A &lt;Interface Type='Hostdev'&gt;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320447" id="1320447" title="[Rfe] Report Memory Hotunplug Failure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320470" id="1320470" title="Migrating Guest With Default Guest Agent Socket Path From 1.3.X To 1.2.17 Failed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320500" id="1320500" title="Migration From Rhel6.8 To Rhel7.3 Host Failed With Error &quot;Unsupported Migration Cookie Feature Persistent&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320836" id="1320836" title="When Vol-Create-As A Volume With Invalid Name In A Disk Pool, Libvirt Produced Error, But Parted Still Created A Partition And Multipathd Didn'T Generate Symbolic Link In /Dev/Mapper" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320893" id="1320893" title="Libvirt-Python: Rename A Domain With Empty String Will Make It Disappear" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1321546" id="1321546" title="Libvirt Fails To Create A Macvtap Deivce If An Attempted Name Was Already Created By Some Process Other Than Libvirt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1322210" id="1322210" title="Fail To Hotplug Guest Agent With Libvirt-1.3.2-1.El7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1323085" id="1323085" title="Generate Bootindex Even When &lt;Bootmenu Enable='Yes'/&gt; Is Specified" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1324551" id="1324551" title="Hotplug Of Memory/Rng Device Fails After Unplugging Device Of The Same Type That Is Not Last" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1324757" id="1324757" title="Libvirtd Crashed If Destroy Then Start A Guest Which  Have Redirdev Device" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1325043" id="1325043" title="Libvirt Forget Free Priv-&gt;Machinename When Clear Guest Resource" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1325072" id="1325072" title="&quot;Virtlogd --Verbose&quot; Doesn'T Output Verbose Messages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1325075" id="1325075" title="The Old Logging Way(File) Is Used When No Qemu.Conf File Exists" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1325080" id="1325080" title="Virtlogd Doesn'T Release Client Resource After Guest Restore From A Saved File." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1325757" id="1325757" title="Virsh Create Fails If &lt;Video&gt; Element Is Not Set In Xml" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1325996" id="1325996" title="New Nss Module For Host Name Translation Of Domains Managed By Libvirt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326270" id="1326270" title="Migration Failed When Setting Vnc_Auto_Unix_Socket = 1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326660" id="1326660" title="Update-Device Fail To Update Floppy With An Unknown Error" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327499" id="1327499" title="Guest Have Broken Settings After Use Setvcpus --Maximum To Make Vcpu Number &lt; Vcpu Number In Numa" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327537" id="1327537" title="Rfe: Support -Acpitable" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328003" id="1328003" title="Disk Source Format Is Not Properly Set For Disk Type='Volume'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328301" id="1328301" title="Update Floppy Device With Readonly Element Report Cannot Modify Snapshot Error" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328401" id="1328401" title="Watchdog'S Action Moved To 'Pause' Automatically When Start A Guest With Watchdog'S Action Setting To 'Dump'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329041" id="1329041" title="Blkdeviotune Should Limit The Maximum To Some Sensible Number" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329045" id="1329045" title="Guest Got Killed When Restart Libvirtd If Guest Has Cmt Event Enabled But Host Doesn'T Support Cmt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329046" id="1329046" title="&quot;Virsh Perf $Guest --Enable '' &quot; Has Memory Leak." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329819" id="1329819" title="Virsh Nodecpumap --Pretty Shows Wrong Result On Machine With Many Cores" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331228" id="1331228" title="No Error Messages For Cpu-Stats With --Start Option." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332446" id="1332446" title="&quot;Virsh Domdisplay&quot; Recognizes 0.0.0.0 As Localhost" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332705" id="1332705" title="Libvirt Is Incompatible With Qemu-Rhev-2.6 With Empty Cdrom Drive" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332854" id="1332854" title="&lt;Vcpu Max='...'/&gt; In Domacapabilities Should Take Kvm Limits Into Account" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333248" id="1333248" title="Libvirt Rejects Object Name Starting With '.'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333404" id="1333404" title="Libvirtd Allows Sslv3 Connections And Poor Ciphers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334237" id="1334237" title="Dump A Guest With Long Domain Name By Watchdog Failed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335617" id="1335617" title="Print Generic Error To User If Qemu Fails Without Printing Any Error" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1337073" id="1337073" title="Virdomaingetcontrolinfo Hangs After Random Time With Unresponsive Storage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1337490" id="1337490" title="Hot-Plugs Into Root-Port And Downstream-Port Fail" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1337869" id="1337869" title="Libguestfs Could Not Create Appliance Through Libvirt On Aarch64 Because Libvirt Doesn'T Support Dmi-To-Pci-Bridge (I82801B11-Bridge) Controller" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1339900" id="1339900" title="Tiny Issue: Pci Controller'S Index Cannot Be = Bus" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1340976" id="1340976" title="Sometimes Guest Os Paused After Managedsave&amp;Start." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1341415" id="1341415" title="'Virsh Event' Can Not Capture Disk-Change Events" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1341460" id="1341460" title="Update Dns Settings In Network By Net-Update Will Not Take Effect Immediately" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342342" id="1342342" title="Rhel Doc Error About S3/S4 Operations For Guest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342874" id="1342874" title="Owner And Selinux Context Cannot Be Restored After Hot-Unplug Usb Host Device" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342962" id="1342962" title="Libvirt Limits Chassisnr For Pci Bridge To Between 0 And 255, However, Qemu Does Not Support Chassis_Nr=0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1343442" id="1343442" title="The Default Value Of  'Max_Anonymous_Clients' Is Not Correct" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1344892" id="1344892" title="Memory Section In Domxml Stay Unchanged After Memory Hot-Unplug" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1345743" id="1345743" title="Sasl Authentication Failed To Create Client Context When Connecting To Libvirt Daemon" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346723" id="1346723" title="Some Bugs In Function Which Used To Parse Perf Event Xml Element" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346724" id="1346724" title="Cannot Pool-Define/Create Mpath Pool" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346730" id="1346730" title="Libvirt Will Enable Perf Event Which User Want Disable It" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347642" id="1347642" title="Enable /Dev/Urandom As Source Of Entropy For Virtio-Rng" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1350688" id="1350688" title="Libvirtd Crashes After Qemu-Attach In Qemudomainperfrestart()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1350772" id="1350772" title="Memory Locking Is Not Required For Non-Kvm Ppc64 Guests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351057" id="1351057" title="Lxc: When Undefine A Vm First, Cannot Destroy It Successfully." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351473" id="1351473" title="&quot;Virsh Blkiotune&quot; Causes Libvirtd Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351514" id="1351514" title="Libvirt: Setting Empty Vnc Password Allows Access To Unauthorized Users" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1354238" id="1354238" title="Auto_Dump_Path Setting In The Qemu.Conf Not Work" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356436" id="1356436" title="Cannot Pool-Create Iscsi Pool Because Cannot Successfully Login Iscsi Target" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356461" id="1356461" title="Failed &quot;Virsh Connect&quot; Return 0." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356858" id="1356858" title="The Default Uri Should Be Libvirtd:///Session In Non-Root Session" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356937" id="1356937" title="Libvit Should Support Set Iothread Quota Into Cgroup" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357346" id="1357346" title="Libvirtd Memory Leak When Guest Has Hostdev Element" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357363" id="1357363" title="Some Environment Variables Don'T Take Effect For Virt-Admin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357364" id="1357364" title="The Uri_Aliases Setting In Libvirt-Admin.Conf Doesn'T Take Effect." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357776" id="1357776" title="Service Is Not Re-Enabled When Increasing Max_Clients Limit After It Has Been Reached." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357924" id="1357924" title="Incorrect Memory Virtualization In Lxc Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358712" id="1358712" title="Pci-Expander-Bus Should Only Connect To Pci-Root, And Pcie-Expander-Bus Should Only Connect To Pcie-Root" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358728" id="1358728" title="Migration Failed When The Secondary Video Devices Have Different Ram/Vram Sizes." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1359071" id="1359071" title="The Result Of Change-Media --Eject Is Different From The Result In Guest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361172" id="1361172" title="Disallow To Attach Upstream Port To Pxb-Pcie If Root-Port Is Not Attached To Pxb-Pcie" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361948" id="1361948" title="Sasl Info Is Missing In The Output Of &quot;Virt-Admin Client-Info&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1362349" id="1362349" title="Persistent Fs Pool Is Undefined After Startup Fails" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1363627" id="1363627" title="Provide Proper Error Messages When Hot-Plugging Devices Into A Not Hot-Pluggable Pci Controller" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1363636" id="1363636" title="Libvirtd Crashes When Using Vol-Create-From To Create A Raw Vol And Using A Qcow2 Vol As Source" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1363648" id="1363648" title="Add Support To Attach Dmi-To-Pci-Bridge (I82801B11-Bridge) Into Pxb-Pcie" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1363773" id="1363773" title="Libvirtd Crashed When Use Virt-Install To Create A Lxc Container" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1365004" id="1365004" title="Regenerate Docs While Building Downstream Package" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1365500" id="1365500" title="Cpu Feature Cmt Not Found With 2.0.0-1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1365903" id="1365903" title="Virt-Admin Reports A Message Indicating Success When It Fails To Connect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1366097" id="1366097" title="Some Memory Leak In Qemudomainassignaddresses" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1366119" id="1366119" title="Screenshot Does Not Work With Qxl Video Model Type." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1366484" id="1366484" title="Libvirt Report Unknown Error When Iothreadsched Point To Not Exist Iothread" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1366611" id="1366611" title="Core Dumped When Do Secret-Get-Value" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1366989" id="1366989" title="Increase The Queue Size To The Max Allowed, 1024." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367130" id="1367130" title="Usb Address Referencing A Non-Existent Hub Crashes Libvirtd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367259" id="1367259" title="Libvirt Sigsegv When Hot-Plug A Disk With Luks Encryption" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367260" id="1367260" title="Key Mismatched In Http Protocol Of Json Backing Format" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367269" id="1367269" title="The Uri_Default In Libvirt-Admin.Conf Doesn'T Take Effect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1368774" id="1368774" title="Libvirt Changes The Guest Xml On Target Host Even If Migration Failed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1370066" id="1370066" title="Use Setvcpus To Change Maximum Vcpu Number Will Make Guest Have Broken Settings" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1372251" id="1372251" title="Libvirt Wrongly Convert Json To Xml When Attaching Json Glusterfs Backing Images" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1374613" id="1374613" title="Migration Fails With &quot;Info Migration Reply Was Missing Return Status&quot; When Storage Insufficient On Target" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1375783" id="1375783" title="[Ppc64] Vm Config With Hotplugable Vcpus Gets Broken After Libvirtd Restart" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377212" id="1377212" title="Libvirt: Scsi: Hostdev / Controller Host-Plug Related Fixes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=846810" id="846810" title="Automagically Iptables Rules Added By Libvirt Can'T Be Avoided/Disabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=868771" id="868771" title="The Virtual Size Of The Vol Should Not Be Reduced After Wiped" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=921135" id="921135" title="Qemu: Could Not Load Kernel ... Permission Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=986365" id="986365" title="Using Polkit With Virsh For Non-Root Access Does Not Work Via Ssh Or Locally" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=997561" id="997561" title="Rfe: Virsh: Provide Easy Pci-Passthrough Netdev Attach Command" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2578-2</id><title>Pacemaker</title><description>The following packages have been upgraded to a newer upstream version: pacemaker (1.1.15). 
Security Fix(es): 
* It was found that the connection between a pacemaker cluster and a pacemaker_remote node could be shut down using a new unauthenticated connection. A remote attacker could use this flaw to cause a denial of service. (CVE-2016-7797) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="pacemaker-libs-devel" release="11.el7" src="pacemaker-1.1.15-11.el7.src.rpm" version="1.1.15"><filename>pacemaker-libs-devel-1.1.15-11.el7.i686.rpm</filename><sum type="sha256">d969560bfc353716be1592eb893ff8f98a2a29b4af1da462d790b2d1d8a0532b</sum></package><package arch="x86_64" name="pacemaker-cli" release="11.el7" src="pacemaker-1.1.15-11.el7.src.rpm" version="1.1.15"><filename>pacemaker-cli-1.1.15-11.el7.x86_64.rpm</filename><sum type="sha256">75841a38076c9cc447e11f242f5ddaa4dfcb254ba6bbcf12625c12e3b91a4982</sum></package><package arch="x86_64" name="pacemaker-cluster-libs" release="11.el7" src="pacemaker-1.1.15-11.el7.src.rpm" version="1.1.15"><filename>pacemaker-cluster-libs-1.1.15-11.el7.x86_64.rpm</filename><sum type="sha256">497558fc1d2f435195fbe1f959ad93e172e7ab53d10634faded4bf8c949d6f76</sum></package><package arch="i686" name="pacemaker-libs" release="11.el7" src="pacemaker-1.1.15-11.el7.src.rpm" version="1.1.15"><filename>pacemaker-libs-1.1.15-11.el7.i686.rpm</filename><sum type="sha256">5b6b7a69e9a3fc7c6dae49fd753727c0074faba9bcee99c535779deeb494d331</sum></package><package arch="x86_64" name="pacemaker-nagios-plugins-metadata" release="11.el7" src="pacemaker-1.1.15-11.el7.src.rpm" version="1.1.15"><filename>pacemaker-nagios-plugins-metadata-1.1.15-11.el7.x86_64.rpm</filename><sum type="sha256">b37ffe9e6f1355cc2eeae87524ef2f4dd90832aa8c357330b5a34ec8c27d61fa</sum></package><package arch="x86_64" name="pacemaker-remote" release="11.el7" src="pacemaker-1.1.15-11.el7.src.rpm" version="1.1.15"><filename>pacemaker-remote-1.1.15-11.el7.x86_64.rpm</filename><sum type="sha256">c595cd849ad5d33d07a797aefaf2ab9cd9f4bd070b2ccb9b76ea2dd191ed6b0e</sum></package><package arch="x86_64" name="pacemaker-libs" release="11.el7" src="pacemaker-1.1.15-11.el7.src.rpm" version="1.1.15"><filename>pacemaker-libs-1.1.15-11.el7.x86_64.rpm</filename><sum type="sha256">3b64216a267e4ed179aa8171c19639869f319a4c25e9432a409a93ea7d11b059</sum></package><package arch="x86_64" name="pacemaker-libs-devel" release="11.el7" src="pacemaker-1.1.15-11.el7.src.rpm" version="1.1.15"><filename>pacemaker-libs-devel-1.1.15-11.el7.x86_64.rpm</filename><sum type="sha256">cc7614bf24b7e5ddceb23760b58fc6a0b67cdf5a28cb5b05d8e5c1d58c71c232</sum></package><package arch="i686" name="pacemaker-cluster-libs" release="11.el7" src="pacemaker-1.1.15-11.el7.src.rpm" version="1.1.15"><filename>pacemaker-cluster-libs-1.1.15-11.el7.i686.rpm</filename><sum type="sha256">4c7c8e8100fc4966144bb58861a2b71a459630dde01836e2337a8ec54346cc4a</sum></package><package arch="x86_64" name="pacemaker-cts" release="11.el7" src="pacemaker-1.1.15-11.el7.src.rpm" version="1.1.15"><filename>pacemaker-cts-1.1.15-11.el7.x86_64.rpm</filename><sum type="sha256">74fab0ca21a33266c7b729a257dd86ca0e6f3c8a124f7dba906c36fe41368c12</sum></package><package arch="x86_64" name="pacemaker-doc" release="11.el7" src="pacemaker-1.1.15-11.el7.src.rpm" version="1.1.15"><filename>pacemaker-doc-1.1.15-11.el7.x86_64.rpm</filename><sum type="sha256">5deab12f61342e9e6992c903904b0abef79cf4d67296293114624000c25419b2</sum></package><package arch="x86_64" name="pacemaker" release="11.el7" src="pacemaker-1.1.15-11.el7.src.rpm" version="1.1.15"><filename>pacemaker-1.1.15-11.el7.x86_64.rpm</filename><sum type="sha256">d989928d03b9da0b8a508065bab0a8d51088b8b4428ae995bc971c6b4fe7d97e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7797" id="CVE-2016-7797" title="Pacemaker: Pacemaker Remote Nodes Vulnerable To Hijacking, Resulting In A Dos Attack" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2578" id="RHSA-2016:2578-2" title="Rhsa-2016:2578-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1240330" id="1240330" title="Fencing Adjacent Node Occurs Even If The Stonith Resource Is Stopped" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1268313" id="1268313" title="Clvmd/Dlm Resource Agent Monitor Action Should Recognize It Is Hung" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281450" id="1281450" title="Stonith_Admin Strips Description From Fence Agents' Metadata" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1284069" id="1284069" title="Pacemaker'S Lrmd Crashes After Certain Systemd Errors" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1287315" id="1287315" title="Updating A Fencing Device Will Sometimes Result In It No Longer Being Registered" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1288929" id="1288929" title="Service Pacemaker_Remote Stop Causes Node To Be Fenced" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1304771" id="1304771" title="Rebase Pacemaker For Bugfixes And Features" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310486" id="1310486" title="Pacemaker Looses Shutdown Requests Under Some Conditions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312094" id="1312094" title="Crmd Can Crash After Unexpected Remote Connection Takeover" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314157" id="1314157" title="Crm_Report -L Does Not Work Correctly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1323544" id="1323544" title="Better Handling Of Remote Nodes When Generating Crm_Reports" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327469" id="1327469" title="Pengine Wants To Start Services That Should Not Be Started" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338623" id="1338623" title="Pacemaker Does Not Flush The Attrd Cache Fully After A Crm_Node -R Node Removal" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1345876" id="1345876" title="Restarting A Resource In A Resource Group On A Remote Node Restarts Other Services Instead" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346726" id="1346726" title="Backport Upstream Bug Systemd: Return Pcmk_Ocf_Unknown_Error Instead Of Pcmk_Ocf_Not_Installed For Uncertain Errors On Loadunit" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361533" id="1361533" title="Missing Header For The Resources Section In The Crm_Mon Output When Called Without --Inactive Flag" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1372009" id="1372009" title="Pacemaker-Remote Rpm Does Not Properly Restart Pacemaker_Remote During Package Upgrade, Potentially Triggering A Watchdog Fence" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1379784" id="1379784" title="Pacemaker: Pacemaker Remote Nodes Vulnerable To Hijacking, Resulting In A Dos Attack" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2579-2</id><title>Libreoffice</title><description>The following packages have been upgraded to a newer upstream version: libreoffice (5.0.6.2). 
Security Fix(es): 
* Multiple flaws were found in the Lotus Word Pro (LWP) document format parser in LibreOffice. By tricking a user into opening a specially crafted LWP document, an attacker could possibly use this flaw to execute arbitrary code with the privileges of the user opening the file. (CVE-2016-0794, CVE-2016-0795) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="libreoffice-xsltfilter" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-xsltfilter-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">e6d87a3e2e4a13f2fbf0070da588549b8bcb957425a4b568b3e9d99422d8aa7c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-librelogo" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-librelogo-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">057ea40e4d0debc0f264d777b5b45e34008c81427697d9f1e4892b8eb95879d7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kk" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-kk-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">a886486e3278bfa08d42ff814ce8f65d3ef5132492ab7a18448b71fd5fc4a7be</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mai" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-mai-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">a2a0b12931e05c599945d16f94793c9093e50919785905606ee8dca745c15b79</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tn" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-tn-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">0edd08e2b86c51b20a340a909d6485f0f7fee37e6373e80a0c8e0b435b7c70e9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nb" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nb-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">b52b693d1f40f200a3290cf2499b5d61823ae1fe7fd0b880fd95dc5fefef260e</sum></package><package arch="x86_64" name="libpagemaker-devel" release="1.el7" src="libpagemaker-0.0.3-1.el7.src.rpm" version="0.0.3"><filename>libpagemaker-devel-0.0.3-1.el7.x86_64.rpm</filename><sum type="sha256">9c1e17bc9e2286e5202b983b4801b7a7f558338d55a4fd6746e7bcbd388a75f5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nn" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nn-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">2240173d550c5718673ae61eeb86f99de6b55b363011e7ee424fb77c5cba3ec8</sum></package><package arch="noarch" epoch="1" name="autocorr-cs" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-cs-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">9f0e70bb9998077267aa7055448ae5fdf1e5a6f5f9742897d00933327f79146a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-PT" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-pt-PT-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">91f275c465a5772fc75573d778817bc5c46bc6c9d2ffa538bbdcf2c37905b6a5</sum></package><package arch="noarch" epoch="1" name="autocorr-pt" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-pt-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">44d6d514f68e1c654217718960dce723f3cfbfd81bc2ebb576953099dee5ec85</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-as" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-as-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">a0f85cd579d9f3edfc008d7fee3fd08bdea03de61e4686c74763e2731a58a206</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk-doc" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-sdk-doc-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">8a3b81785e7285b38d510b07debc821b0df344032cebdb44745a1d4e7bd8383b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ml" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ml-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">a61f641d6250ea0da6424b955fbb32a77137709d59e0f2bd5e154e06ac2a997c</sum></package><package arch="x86_64" name="libcmis" release="2.el7" src="libcmis-0.5.1-2.el7.src.rpm" version="0.5.1"><filename>libcmis-0.5.1-2.el7.x86_64.rpm</filename><sum type="sha256">555bcac1ac200dde1e2197cf22eced47c53e18862b5cac4621506303bacf06ae</sum></package><package arch="noarch" epoch="1" name="autocorr-tr" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-tr-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">2be8f3b1e6575ba29f58bfc091f39032ac948b8fbe2807647e2e761ecb84eb27</sum></package><package arch="x86_64" epoch="1" name="libreoffice-rhino" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-rhino-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">a1ee7d8ce33bc23c9ca6e8ac82129076fd6788d38452724ae3d2d15a0f36b15a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ro" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ro-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">239aa5824af91793d244fafb5bfbbac79ed91374875817eb45a7883ba69ec944</sum></package><package arch="noarch" epoch="1" name="autocorr-hr" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-hr-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">635c2cc12b04ce3f316432af756ee991973694591a3cc5780fba661b2c1765b2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sk" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-sk-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">47bffdacf7f3d9c29bb357cfa5781094d80ef95e4f783edb463ea6ec4c128240</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-th" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-th-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">142bc7599cb9e3b5c773d7d0623b9e4e795852d8caa23beec165bb5060c01cc5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-xh" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-xh-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">1550c22fea83b211feaef670c334edc05dd8cc52e7854ad295ff32af069f3e23</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ure" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-ure-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">eeb170dde821bfb7ab104996e8e8aed5a057787f7ff5f391505d784719771950</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-el" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-el-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">729162024b95c0bcdf27316d1046e751a5c963392e0c44f03cb64e5614c94502</sum></package><package arch="x86_64" epoch="1" name="libreoffice-glade" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-glade-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">df15e679d076685aa74655f5d6807aa2413a2b014295331f123afc34881efe3f</sum></package><package arch="x86_64" name="libcmis-tools" release="2.el7" src="libcmis-0.5.1-2.el7.src.rpm" version="0.5.1"><filename>libcmis-tools-0.5.1-2.el7.x86_64.rpm</filename><sum type="sha256">924082d78eb596a624298731949ead27e55dfb579d619946d2c5202242d86b0d</sum></package><package arch="noarch" epoch="1" name="autocorr-mn" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-mn-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">d91621c291cba25554d3372a72d138495c6dd373a98ee02c392bac48276d0704</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ga" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ga-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">27c48da18c849a893960fcf2193f8f699fd90414624c63fb8c0229523405fecd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ss" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ss-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">eebdbd9f179f66d9a626e42d41b95ebfb4fe9cf4ad30d845cacb6fdd44e06703</sum></package><package arch="noarch" epoch="1" name="autocorr-ca" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-ca-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">3096aaaf1f804d08610917754a7e798e7958a58b3b94a7d05f9f6cfe91a4e23d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cy" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-cy-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">8995435e1ab831dd4ec5b60f2a027e7705897f353c369b3a9d9276191386590e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-af" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-af-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">22904a86288e561a671b54739421fcdd425cd54e0beadd3b9a1695686b52fb92</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pdfimport" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-pdfimport-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">0b347d17e29eda3f3fbc1ffc75540e8a43bf272d6bcf4931c2c034a66bcaace3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sv" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-sv-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">ab7e50e20c2f52c9d33c7055a328ef227d3cb760f733937bdf1149d7070ca188</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-uk" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-uk-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">d97a428d33b350cc10f007b2b5aaf2c23ec619c81e3028132e94c73ca2f4e2ba</sum></package><package arch="noarch" epoch="1" name="autocorr-ga" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-ga-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">d85ed0cea93a1398675c8fbc8474c36f1a13acdff6ef49a98923488d0186a5c5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ta" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ta-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">1c31b41ef44b4678d8e3b23235f676c1a5beb6dcf022caf0887883274b9b57b6</sum></package><package arch="noarch" epoch="1" name="autocorr-ja" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-ja-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">069c92d26aa2f8f6d8433273fa18c3da04d781d2ec7dc1a8ba02f951090538f4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sl" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-sl-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">e0fc8a51c9c3fec6b3b82b13d475d4dc158552dabed50a4eee833e79690de3b5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-core" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-core-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">a3a5c959964ada9188f1140d91e8ab8be0bc799e88766adc033767d85b55e335</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-BR" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-pt-BR-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">b292daf63c3c6ae4c878f8229f0c34df7ff258fb9f759af88a1077dc24cb580b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gdb-debug-support" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-gdb-debug-support-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">4ecd0ead6184303e0bc37c51ca2269089554695cb7a0787063cc7b5a6eb751bd</sum></package><package arch="noarch" epoch="1" name="autocorr-ro" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-ro-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">3fed1940e7d78332ed18d04e63d0487aa1c3ed5296e3d069e85f1e9dd0be1ffe</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pyuno" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-pyuno-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">11fc7cb0d1cf9b280ae3a801733266a0abab5ad0aaf2db60852882e3753bf5a4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-graphicfilter" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-graphicfilter-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">0a06c5392e7a7a14afa48c39fe9ac6b7022e01ca185f600d66deaebafc1a8244</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fa" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-fa-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">3a78c4a9dfffcac05193e970116ae6124237120832c56a76bb670ebcae9a33c4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-writer" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-writer-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">638373bed4685d278b3e0591f928bb24adb5a0d1f754aa6436443f5c495c3256</sum></package><package arch="noarch" epoch="1" name="autocorr-is" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-is-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">af4c98bf6810b482b31df6ac60a394f0b53bafdc09f12154ae6578550b37a0a0</sum></package><package arch="noarch" epoch="1" name="autocorr-pl" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-pl-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">9c85dd32214702a798afb88571143842283e4730f87b10e8f28f6daca1b761c2</sum></package><package arch="noarch" epoch="1" name="autocorr-da" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-da-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">03e6b3950b0c972ecd15c8afb9abfd5e58c698d0ff2f1b03194df2c0af318e04</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-or" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-or-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">bd76a96c78028df7282533f51b8e0fcc059a5fd671feb75fbf058478301a208b</sum></package><package arch="noarch" epoch="1" name="autocorr-ko" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-ko-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">8afd18a669dbdd400e5171a6fa5ed5ec1d2355ad9e68a3d4a57238fbcaa95a97</sum></package><package arch="x86_64" epoch="1" name="libreoffice-wiki-publisher" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-wiki-publisher-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">4770530fc3fe3a17d196f5474dac2bdd1deca5f57e06e710e12e1517de3b99bf</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hu" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-hu-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">5ae3a02b381b65ec1f44eebacdd4bb2928f15f1f1619c42762469575881c9003</sum></package><package arch="x86_64" epoch="1" name="libreoffice" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">ca3af8d3a90b1ad9b444902610269b9e786767468f51b75fa25a0f718ae83bb3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-dz" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-dz-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">e27768f24092fa3c9f7548543b3c88426566d3d1627e4e531fff22a7e72e70fe</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lv" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-lv-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">92f6ee0749623eb127f736c3ea0f0e75c1daf1a8fc38119cd556a0a95caf6a9a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-it" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-it-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">44dd3f411b929371cc9c460c3b2c78d4446314b7bf7b0e99bbbb62c23eb7eb3a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-math" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-math-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">598ce647f4437135bbddc70b5d9899e3c11f6f4931331a46eec6955da44e3e9f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hi" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-hi-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">efdd6cfa403995bb82a082963a2bb1f317d49927e594d31d68bc27fc7265c07c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-nlpsolver" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-nlpsolver-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">c83a61b1e61df92eae7783b2812455eecb8fffa133ca0f7686546ef23f63fbf4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-te" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-te-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">d40c137e8edc6183ee2982812bf67d0f7b24499be96aa4dc3d9b620de5760d67</sum></package><package arch="noarch" epoch="1" name="autocorr-de" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-de-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">afbf8afe37c2d3cb934ca1c5e71c165b8a7b9e56c4b81c9efb1cce3a39e2ec36</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hant" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-zh-Hant-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">09e6af2a922c6caf7f9e7d609b27f8f850f31e11a6365b4a014c62bc15964ea7</sum></package><package arch="x86_64" name="libcmis-devel" release="2.el7" src="libcmis-0.5.1-2.el7.src.rpm" version="0.5.1"><filename>libcmis-devel-0.5.1-2.el7.x86_64.rpm</filename><sum type="sha256">b897536913fa3d1cf207a8cea8e8d535de8d7e42dd852e0da79a821314875ba5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pl" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-pl-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">5e4a8a0f92502a4fe302513f1013ba9782682d1f84f4ed33d405492c694c763a</sum></package><package arch="noarch" epoch="1" name="autocorr-sr" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-sr-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">9bc0dcaa8a73d688efb3cabed734157b3ae97d7cee41421b2c0c217026ba2d7e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gl" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-gl-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">f82587f884fe9e35a96f72102610fb2247d3be00f37e3b0be1e17237a66a3cf8</sum></package><package arch="noarch" epoch="1" name="autocorr-fi" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-fi-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">148891a12ad66b031d83e7824b84bb157962501eb61c3534c458137c82a84066</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ogltrans" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-ogltrans-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">a77623256341e110891254b28e3c57f6519f6baf4a143988bec509a7b455f934</sum></package><package arch="noarch" epoch="1" name="autocorr-es" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-es-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">0d4b9979b8a8eaa22484bc06b73938328176fdf93c5d302fa7898a1943c1d60f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-officebean" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-officebean-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">4bbb3d227f67a9beed94645dc3d82aeea64cc96d2f5410a7c0dd5ff25ffba21f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cs" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-cs-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">1e738e4ea463cf7b3261ea03c27bd699bddd4115c56d0b8bb4114661aacccf97</sum></package><package arch="noarch" epoch="1" name="autocorr-sv" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-sv-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">ffe1ce4088d652f5b9667a7c9594010c652cf324f65857cd5faba419e63f5cc8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mr" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-mr-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">242513ed60fdc878689dad469a5e2b65fff5af102c128cf7808f745feac333c9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-filters" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-filters-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">bdd2bf97c4c8d9c13a9c1945658aa376d982df26893f55f5224e29a1617a00ff</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-si" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-si-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">839743ddfd006067e6ce010f8445fcee861b1853e4476b9efc98f0abd0706c06</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pa" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-pa-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">6dc90972db05764169b4ced6f36c52a4e1b0d891caf299e2a852bac04516602b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ru" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ru-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">131d18ee76c64e9bd8787ad07cd87bec50e4fd5f09429715e56c54e07dd46cf0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-impress" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-impress-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">fd1e10e745009c3a3cac854688429628f71f42b98a51d272369994335128efce</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-st" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-st-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">05c598be93956c3d1f45336305a1ba18c12e2660d6304e73f9a5144b88292eb4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ja" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ja-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">e19dda495a9a8f4d968b20c9a411a3e062d5801c7f3e3ad4d5e03fffb216a906</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-de" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-de-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">b46bfb5b737040db761ad9e4347d451c2efd3335ea4e0f95bf5cb984a1a29bbb</sum></package><package arch="noarch" epoch="1" name="autocorr-bg" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-bg-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">362f24caddb9568615e424e30b9d3ed163be9ac37180893a43ac9048292b549b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-bsh" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-bsh-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">b1e80936db5b275d22137124901e686503eb5e272e82ecdc3fa618cf174dec7b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-sdk-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">feb87917fb0268131beec3014a7ca22e7fca089ddda5551e2c8feb228dba0176</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-eu" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-eu-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">62405fd08e724c110515488b4b847f94cda9cfadc28df04dab4d12226ef2ab97</sum></package><package arch="x86_64" epoch="1" name="libreoffice-base" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-base-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">daf0d9aac5a44ae4ddd475c32fdc013b315dd601ae7558dfb56a64bd038af9b4</sum></package><package arch="noarch" epoch="1" name="autocorr-lt" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-lt-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">cdc38e2202072710cfea1beb236dc286ca64daf5c7fbf7d73458d211ee5cbd93</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fr" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-fr-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">6abeea56c5ac01f6185563012435582b7f55e95356673d8ea78b4093f9d5d59d</sum></package><package arch="noarch" epoch="1" name="autocorr-af" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-af-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">058695bdcb054dd1e985e2bba8ba58316efba1cf8e989462ab6c69f3d400bead</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sr" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-sr-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">1ac986212cd4c3e20f7e9839d6bee4d5a472a06409e273a1d6faca25e2e0b2e9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gu" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-gu-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">7904275bbf03c7d78df7c9507479fa3bfd7b927dcd54557eff965c086884351c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bg" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-bg-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">287476aae9f0a32615087e5813c0d0abf64b3596baa2c52c0c93fbf63a75b67e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kn" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-kn-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">cb2d8c5bcdc4ea12564fea4e9344c6eea38cc4fb3df8b1735b3f71792d3bcef6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nl" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nl-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">a47d249d1ae75270574c9eab6c7c90c400890f2723c3cedcdecad0603c37e405</sum></package><package arch="x86_64" name="libpagemaker-tools" release="1.el7" src="libpagemaker-0.0.3-1.el7.src.rpm" version="0.0.3"><filename>libpagemaker-tools-0.0.3-1.el7.x86_64.rpm</filename><sum type="sha256">c40c6d05a7b8a1540a5899cd84b29290d42b1b78b9422629868f09fcc4cb859c</sum></package><package arch="noarch" epoch="1" name="autocorr-zh" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-zh-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">e00a4cb2a889ea2c97221b926f1297bb2b2c5afd42eb62dde24f3ed67d88bc42</sum></package><package arch="i686" name="libpagemaker-devel" release="1.el7" src="libpagemaker-0.0.3-1.el7.src.rpm" version="0.0.3"><filename>libpagemaker-devel-0.0.3-1.el7.i686.rpm</filename><sum type="sha256">3e2c23cb8fbba577419327da443f936181cd222ff5bb141f0734899eb00fc109</sum></package><package arch="noarch" epoch="1" name="autocorr-ru" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-ru-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">285db7afcf5a164124b03054189ce99c674cba2bb4af41b73764f4ab308c2d95</sum></package><package arch="noarch" epoch="1" name="autocorr-sl" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-sl-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">5dae86b03286351e2a7797276284cb077f6f7c53984aadf6de9380a093fec3c9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-et" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-et-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">1ea13e42b7f157dbb5aeb83c7f5a8f9589d4e52a76b1922c3779049564680faf</sum></package><package arch="x86_64" epoch="1" name="libreoffice-emailmerge" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-emailmerge-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">5e26ed5f433fb83e4c4886f891783bc9f58c844041cbd5cfb9469115d3035f0a</sum></package><package arch="noarch" name="mdds-devel" release="1.el7" src="mdds-0.12.1-1.el7.src.rpm" version="0.12.1"><filename>mdds-devel-0.12.1-1.el7.noarch.rpm</filename><sum type="sha256">14896ef0f514639ca113f598e57fea282d0311a4e9423536ae0cb81c2c04143d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zu" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-zu-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">f28bde01d667c8080f19c650faae886140cf859043452da2270bc14d55ded254</sum></package><package arch="noarch" name="libpagemaker-doc" release="1.el7" src="libpagemaker-0.0.3-1.el7.src.rpm" version="0.0.3"><filename>libpagemaker-doc-0.0.3-1.el7.noarch.rpm</filename><sum type="sha256">a06a8e6a700a6b80d7c80a01f9fad8871c22017128bbe1a02110fd3a4b44cc2b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ts" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ts-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">9660e9582dc5f25da9f8c965fcd725690599072c01d1594097ae5f4c97953e28</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tr" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-tr-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">9efa8901612b939a1997f1d94a8f0a7938ddf5108c23fd6c1f1ec959aea1dc2a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-en" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-en-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">06925c94529986c3a55b2efb7fe9b715f3b615f0d028a460d04524d8960a0736</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lt" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-lt-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">34e4ddb62773eeb0384b618acae9fa5337958231d0a610cc7ee3880df7f8c81a</sum></package><package arch="noarch" epoch="1" name="autocorr-en" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-en-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">b06598e6950e27a6e887a700c304971afe924a255072483aca121d0ba9ff5c56</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-he" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-he-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">3e578433038d26d6a667a51f096d180a845f6510a676e60ac4015924c6d60579</sum></package><package arch="noarch" epoch="1" name="autocorr-hu" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-hu-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">8ef8fedb9bbec2be4a5fa9e8ebe7e674de532d289f8564bcbd9b6b632d347586</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-br" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-br-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">6a6fb4821f585d0e711da71e8891a0002e24c34915594e9453f9788c9fea35a9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hans" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-zh-Hans-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">8607dcfd0eceba01d58fb31a0fb68b0357b16a2734a7a968c99c6e1896f3e793</sum></package><package arch="i686" name="libpagemaker" release="1.el7" src="libpagemaker-0.0.3-1.el7.src.rpm" version="0.0.3"><filename>libpagemaker-0.0.3-1.el7.i686.rpm</filename><sum type="sha256">c7ab8b32c2d74f9e55b50e862a418cb0b8e221b296976f99e815ed5025d68a61</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nr" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nr-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">37f49838f3702d19bef40bd49b8118b0c91773cb1321ea7b98f2a56c341cfff7</sum></package><package arch="noarch" epoch="1" name="autocorr-sk" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-sk-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">c0da56b30c01c6ae57b19ceea8dab492a1b5c1a7e3392d6bb1ff814fcba8b60e</sum></package><package arch="x86_64" name="libpagemaker" release="1.el7" src="libpagemaker-0.0.3-1.el7.src.rpm" version="0.0.3"><filename>libpagemaker-0.0.3-1.el7.x86_64.rpm</filename><sum type="sha256">0749b6658234135e2487ad14eba72230fe6d3bb15c684b0411f625be69bfac5b</sum></package><package arch="noarch" epoch="1" name="autocorr-lb" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-lb-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">fbc6baf93a5fd3c4b3c59d20b36b31f2eecdd58bb33dfedcd699f7fc0a1ca811</sum></package><package arch="x86_64" epoch="1" name="libreoffice-draw" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-draw-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">c41316cc5744d80a1f05a44e83e00ec70a400646a9bd173d1e1820bb919d300e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ve" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ve-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">5ddd25fe40cc88ea6f3c307fd9d1a8f38abc5c1b6a5c5590f9d4348d95809af3</sum></package><package arch="i686" name="libcmis" release="2.el7" src="libcmis-0.5.1-2.el7.src.rpm" version="0.5.1"><filename>libcmis-0.5.1-2.el7.i686.rpm</filename><sum type="sha256">364a1058edb4b326906a8fff19d21c7ab364b24d906670a16a75728c8cef59ec</sum></package><package arch="x86_64" epoch="1" name="libreoffice-postgresql" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-postgresql-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">f01979f57630587789e8fc251c84c7adf8b7a64b24c9ac09278d05d9bf07288f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-es" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-es-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">a092b6a3b95c44d60b65d768863d0e20b36d17f0b43ee2c37edad38bf2c59632</sum></package><package arch="noarch" epoch="1" name="autocorr-nl" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-nl-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">4c257504ebe735b00e7997b2dfdb62551b9a897925ba50aaf19459ce9c0886ce</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hr" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-hr-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">0f5de89b3eb0e7f11a671342ea5f935b4c4eaabfbdd18b8a5ab81175504ca646</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ar" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ar-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">6346ddc2055b8ce2a9f0ecf5b6a7107c08b13aec818ac574c2edba9191c693c2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fi" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-fi-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">a45b344d76e40fc7c42c21f9b83824dd76221d7021b1a6beee4624eba005722e</sum></package><package arch="noarch" epoch="1" name="autocorr-vi" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-vi-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">5b8b9c66fb0d0956f9b65741e0e64d3bfe075de5cb877dd66261f009154975bb</sum></package><package arch="noarch" epoch="1" name="libreoffice-opensymbol-fonts" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-opensymbol-fonts-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">82a8007b305dc250474a486981366e9f07340f449f9d0199e8ede3e89aa8bd6b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-calc" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-calc-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">d92b1a0a4394d1c54d67364d7ff708ded3b1c5273e8f3ffaa477dc2c9b48b771</sum></package><package arch="i686" name="libcmis-devel" release="2.el7" src="libcmis-0.5.1-2.el7.src.rpm" version="0.5.1"><filename>libcmis-devel-0.5.1-2.el7.i686.rpm</filename><sum type="sha256">d3be676655e08e54488410470b6d98ec4f5bf54561addcf727631535da3b31b3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ca" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ca-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">f8e2f0801824a159367c3bcf7fa49ad7b4e18e9ed74d28d904fbdb32c641ab1f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ko" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ko-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">29285ddee5a18bb5e7ee9c636b61fb370c00d25c11e22862d7cc18430a061b63</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nso" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nso-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">fb767743062fd22145dad11dbfbb582d236a22e11eac4a5d097227a6588b014a</sum></package><package arch="noarch" epoch="1" name="autocorr-fr" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-fr-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">e5485470a37c89b2c6d8766dcf38f1cec00a06120ee714ef121ed879cb4a8554</sum></package><package arch="noarch" epoch="1" name="autocorr-it" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-it-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">79395f0eb78083fc5f4fa0437a8cb609334d6637d0eaa17f10abac2a00b26681</sum></package><package arch="noarch" epoch="1" name="autocorr-fa" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>autocorr-fa-5.0.6.2-3.el7.noarch.rpm</filename><sum type="sha256">bcac177ab3c675f9797761d456e60617bd0e50517960cb68b54e9abce72df612</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-da" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-da-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">e34f427dfaf59bdad31d69ea04d4ee4323d1a28dd7068206b39f5d511e4cc09c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bn" release="3.el7" src="libreoffice-5.0.6.2-3.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-bn-5.0.6.2-3.el7.x86_64.rpm</filename><sum type="sha256">b04ce868a4dd36a1a504a3ba38fd9988f04cb48da5670069d4448cb926155068</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0794" id="CVE-2016-0794" title="Libreoffice: Multiple Out-Of-Bounds Overflows In Lwp Filter" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0795" id="CVE-2016-0795" title="Libreoffice: Multiple Out-Of-Bounds Overflows In Lwp Filter" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2579" id="RHSA-2016:2579-2" title="Rhsa-2016:2579-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1161240" id="1161240" title="[Fix Available]Master Slide Elements Of Footer, Number, And Date Are Not Delectable Easily" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1168757" id="1168757" title="[Fix Available] Selecting Multiple Slides Is Not Reflected In Print Dialog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1238413" id="1238413" title="[Abrt] [Fix-Available] Libreoffice-Core: Sfxviewframe::Getframe() Const(): Soffice.Bin Killed By Sigsegv" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1255811" id="1255811" title="[Fix Available] Calc: Random Number Generator Can'T Be Edited And Applied For Cell Location" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1256843" id="1256843" title="[Fix Available] In Start Center, If You Open Templates, There Is No &quot;Close&quot; Or &quot;X&quot; In Upper Right Corner Of Templates Dialog Box." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1257635" id="1257635" title="[Fix Available] Sometimes Lo Doesn'T See Cups Printers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1263949" id="1263949" title="[Fix Available] Writer Fails To Open Correct Odt File From Webdav Share" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290148" id="1290148" title="Rebase To Libreoffice 5.0 In Rhel 7.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290152" id="1290152" title="Rebase Libcmis To 0.5.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290153" id="1290153" title="Rebase Mdds To 0.12.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1306609" id="1306609" title="Libreoffice: Multiple Out-Of-Bounds Overflows In Lwp Filter" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330591" id="1330591" title="[Fix Available] Not Able To Add Rh Google Drive As A Server" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2580-2</id><title>Poppler</title><description>Security Fix(es): 
* A heap-buffer overflow was found in the poppler library. An attacker could create a malicious PDF file that would cause applications that use poppler (such as Evince) to crash or, potentially, execute arbitrary code when opened. (CVE-2015-8868) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="poppler-qt-devel" release="16.el7" src="poppler-0.26.5-16.el7.src.rpm" version="0.26.5"><filename>poppler-qt-devel-0.26.5-16.el7.x86_64.rpm</filename><sum type="sha256">1470641b9d1bd224269645b16bcf9973b944d616939186a501047b0bdf36bf31</sum></package><package arch="i686" name="poppler" release="16.el7" src="poppler-0.26.5-16.el7.src.rpm" version="0.26.5"><filename>poppler-0.26.5-16.el7.i686.rpm</filename><sum type="sha256">7a9a9fcd2062e0bc3c55771ec3e2518a084dbe0f8e46b2c97ec737dd9e1c53d5</sum></package><package arch="x86_64" name="poppler-glib-devel" release="16.el7" src="poppler-0.26.5-16.el7.src.rpm" version="0.26.5"><filename>poppler-glib-devel-0.26.5-16.el7.x86_64.rpm</filename><sum type="sha256">7bb6cba90bbd652de7c1e40416993a05e3e1c5e7b715c44bba695429fd7d8f91</sum></package><package arch="i686" name="poppler-glib" release="16.el7" src="poppler-0.26.5-16.el7.src.rpm" version="0.26.5"><filename>poppler-glib-0.26.5-16.el7.i686.rpm</filename><sum type="sha256">f2a1a23cefc6c6dce6ac74dea84fe0a2a81af3608aef3c793725b3740e34db16</sum></package><package arch="x86_64" name="poppler-cpp-devel" release="16.el7" src="poppler-0.26.5-16.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-devel-0.26.5-16.el7.x86_64.rpm</filename><sum type="sha256">2dd758610baa0fe6ddae3391c45ef003617c8291822e01fc73f715b63c3cb2b5</sum></package><package arch="x86_64" name="poppler-devel" release="16.el7" src="poppler-0.26.5-16.el7.src.rpm" version="0.26.5"><filename>poppler-devel-0.26.5-16.el7.x86_64.rpm</filename><sum type="sha256">465f7463c8ada9ee2e4dcf0b64e40f215f73c193d61d70b89c1647f54ca20c25</sum></package><package arch="i686" name="poppler-cpp" release="16.el7" src="poppler-0.26.5-16.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-0.26.5-16.el7.i686.rpm</filename><sum type="sha256">0fe4065e84075aab80aa6bf7eaa85164fcc0ad9e2778e818b601d3873c8d8d08</sum></package><package arch="x86_64" name="poppler-utils" release="16.el7" src="poppler-0.26.5-16.el7.src.rpm" version="0.26.5"><filename>poppler-utils-0.26.5-16.el7.x86_64.rpm</filename><sum type="sha256">403058ce7fd805044fb1e90a9197b4600f011aa0fcce479cf570d2dc2f5cd3e6</sum></package><package arch="x86_64" name="poppler-qt" release="16.el7" src="poppler-0.26.5-16.el7.src.rpm" version="0.26.5"><filename>poppler-qt-0.26.5-16.el7.x86_64.rpm</filename><sum type="sha256">eaf569799778141b0cfb9bd1f052a8c201747bfb201dea95899700555d17e1b0</sum></package><package arch="i686" name="poppler-qt-devel" release="16.el7" src="poppler-0.26.5-16.el7.src.rpm" version="0.26.5"><filename>poppler-qt-devel-0.26.5-16.el7.i686.rpm</filename><sum type="sha256">b2a4bd79a56a825f9729c0247392cd2e6594899f5bdb7fbff8c5fd87f8efb6b9</sum></package><package arch="i686" name="poppler-devel" release="16.el7" src="poppler-0.26.5-16.el7.src.rpm" version="0.26.5"><filename>poppler-devel-0.26.5-16.el7.i686.rpm</filename><sum type="sha256">e0f4ad3776308d7a34bc2ce62edc45f61f2cf50345a37dba3147d59fb3fb0564</sum></package><package arch="x86_64" name="poppler" release="16.el7" src="poppler-0.26.5-16.el7.src.rpm" version="0.26.5"><filename>poppler-0.26.5-16.el7.x86_64.rpm</filename><sum type="sha256">2c5b1fcd991ec81c001642540fd08fbef79aa78a640b754da80fd5a7076ff8eb</sum></package><package arch="i686" name="poppler-qt" release="16.el7" src="poppler-0.26.5-16.el7.src.rpm" version="0.26.5"><filename>poppler-qt-0.26.5-16.el7.i686.rpm</filename><sum type="sha256">66cd8ca7919ae08559e4ceb091882f4b574561bf5d94d86892d68592c460aeaf</sum></package><package arch="x86_64" name="poppler-cpp" release="16.el7" src="poppler-0.26.5-16.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-0.26.5-16.el7.x86_64.rpm</filename><sum type="sha256">60878a7ca64100eae30410d3a45d7ef865b8745e28b984dc4966edba2f98e716</sum></package><package arch="x86_64" name="poppler-glib" release="16.el7" src="poppler-0.26.5-16.el7.src.rpm" version="0.26.5"><filename>poppler-glib-0.26.5-16.el7.x86_64.rpm</filename><sum type="sha256">e113f34085f6ec3db24fac0c0a5166419671be8a7bfcfeb8f93e4b4e6c79aa02</sum></package><package arch="i686" name="poppler-cpp-devel" release="16.el7" src="poppler-0.26.5-16.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-devel-0.26.5-16.el7.i686.rpm</filename><sum type="sha256">8ef6a260a81d9ab2bae70498795f7a77348f3e095bd414f75c196161a789ec20</sum></package><package arch="i686" name="poppler-glib-devel" release="16.el7" src="poppler-0.26.5-16.el7.src.rpm" version="0.26.5"><filename>poppler-glib-devel-0.26.5-16.el7.i686.rpm</filename><sum type="sha256">eca2833e3dc067cf8c65f419472d3617afb46865fad0fd74713bfd7bc2fcfa95</sum></package><package arch="x86_64" name="poppler-demos" release="16.el7" src="poppler-0.26.5-16.el7.src.rpm" version="0.26.5"><filename>poppler-demos-0.26.5-16.el7.x86_64.rpm</filename><sum type="sha256">bad60ebda9981d8fc976f76c4407fa2e074a94cc0100775982814c068bf81190</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8868" id="CVE-2015-8868" title="Poppler: Heap Buffer Overflow In Exponentialfunction" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2580" id="RHSA-2016:2580-2" title="Rhsa-2016:2580-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298616" id="1298616" title="Show At Least Characters From Pdfdocencoding In Editable Forms" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326225" id="1326225" title="Poppler: Heap Buffer Overflow In Exponentialfunction" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2581-2</id><title>Networkmanager</title><description>The following packages have been upgraded to a newer upstream version: NetworkManager (1.4.0), NetworkManager-libreswan (1.2.4), network-manager- applet (1.4.0), libnl3 (3.2.28). 
Security Fix(es): 
* A race condition vulnerability was discovered in NetworkManager. Temporary files were created insecurely when saving or updating connection settings, which could allow local users to read connection secrets such as VPN passwords or WiFi keys. (CVE-2016-0764) 
Additional Changes:</description><severity>low</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libnl3" release="2.el7" src="libnl3-3.2.28-2.el7.src.rpm" version="3.2.28"><filename>libnl3-3.2.28-2.el7.x86_64.rpm</filename><sum type="sha256">4bfa8fc281107ab6fdbe6687b8e9d6188c3892073140bb2b54a320ec6555ce8f</sum></package><package arch="i686" name="libnm-gtk" release="2.el7" src="network-manager-applet-1.4.0-2.el7.src.rpm" version="1.4.0"><filename>libnm-gtk-1.4.0-2.el7.i686.rpm</filename><sum type="sha256">d7904441069391d5ae2cd95abc13ee7b273defd8cfe767319a476aa03cc5992a</sum></package><package arch="i686" epoch="1" name="NetworkManager-libnm-devel" release="12.el7" src="NetworkManager-1.4.0-12.el7.src.rpm" version="1.4.0"><filename>NetworkManager-libnm-devel-1.4.0-12.el7.i686.rpm</filename><sum type="sha256">434202a57f0f2d707d3b5877cf102bdb1ebcf07e0da5a17aa7f6e3399037176b</sum></package><package arch="noarch" epoch="1" name="NetworkManager-dispatcher-routing-rules" release="12.el7" src="NetworkManager-1.4.0-12.el7.src.rpm" version="1.4.0"><filename>NetworkManager-dispatcher-routing-rules-1.4.0-12.el7.noarch.rpm</filename><sum type="sha256">426e3dab69ea666545b04596b4fdda98bc44adf1a9965b04bf7c523ff021668e</sum></package><package arch="i686" name="libnl3-cli" release="2.el7" src="libnl3-3.2.28-2.el7.src.rpm" version="3.2.28"><filename>libnl3-cli-3.2.28-2.el7.i686.rpm</filename><sum type="sha256">b5133619c01a9d0d2ff646702d1411682b98b3944879d591992500dc1ff03a20</sum></package><package arch="i686" name="libnma-devel" release="2.el7" src="network-manager-applet-1.4.0-2.el7.src.rpm" version="1.4.0"><filename>libnma-devel-1.4.0-2.el7.i686.rpm</filename><sum type="sha256">9d36ff7cf4e22c5789121acd42a8631d613f3510c183d2c75f367811f0172d8a</sum></package><package arch="i686" name="libnl3" release="2.el7" src="libnl3-3.2.28-2.el7.src.rpm" version="3.2.28"><filename>libnl3-3.2.28-2.el7.i686.rpm</filename><sum type="sha256">9c7d21e3fd8d5b1ad1041d47c4184049ac1aba1804fa8767fead6d0675b610b4</sum></package><package arch="x86_64" name="network-manager-applet" release="2.el7" src="network-manager-applet-1.4.0-2.el7.src.rpm" version="1.4.0"><filename>network-manager-applet-1.4.0-2.el7.x86_64.rpm</filename><sum type="sha256">59c39dba80d97efb70b9cd96e6e3a180a7afae64e0176c58b92cb1f586b7c28f</sum></package><package arch="i686" epoch="1" name="NetworkManager-glib-devel" release="12.el7" src="NetworkManager-1.4.0-12.el7.src.rpm" version="1.4.0"><filename>NetworkManager-glib-devel-1.4.0-12.el7.i686.rpm</filename><sum type="sha256">58688d792e00d1c7fb38fbb41c66399e454d045d37ffdbc08bb44ed83e3d8e0e</sum></package><package arch="x86_64" name="libnl3-doc" release="2.el7" src="libnl3-3.2.28-2.el7.src.rpm" version="3.2.28"><filename>libnl3-doc-3.2.28-2.el7.x86_64.rpm</filename><sum type="sha256">7c9fa5ab69fc31a32d6177b1ec79df3b5eae1e00e86d2e74ebaf16fc454ba0b4</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-wifi" release="12.el7" src="NetworkManager-1.4.0-12.el7.src.rpm" version="1.4.0"><filename>NetworkManager-wifi-1.4.0-12.el7.x86_64.rpm</filename><sum type="sha256">7fd54dfda38dcf096e35219301a5bc60c50f4954325de555374ee62fbcf5f5ba</sum></package><package arch="x86_64" name="libnl3-devel" release="2.el7" src="libnl3-3.2.28-2.el7.src.rpm" version="3.2.28"><filename>libnl3-devel-3.2.28-2.el7.x86_64.rpm</filename><sum type="sha256">14d80d79b81fc22bb127092d177461174ab8fd16547cb2bf23690b091c2b04c2</sum></package><package arch="i686" epoch="1" name="NetworkManager-glib" release="12.el7" src="NetworkManager-1.4.0-12.el7.src.rpm" version="1.4.0"><filename>NetworkManager-glib-1.4.0-12.el7.i686.rpm</filename><sum type="sha256">ff6985859bf7d81d66cce2b59cc69a2f88bf8f51a40047cce746ed2242c19067</sum></package><package arch="x86_64" name="libnma-devel" release="2.el7" src="network-manager-applet-1.4.0-2.el7.src.rpm" version="1.4.0"><filename>libnma-devel-1.4.0-2.el7.x86_64.rpm</filename><sum type="sha256">feced6e0840d71ff31a59d34d6d118192e7b59650afa930ac987a10e8d97a35c</sum></package><package arch="x86_64" name="libnl3-cli" release="2.el7" src="libnl3-3.2.28-2.el7.src.rpm" version="3.2.28"><filename>libnl3-cli-3.2.28-2.el7.x86_64.rpm</filename><sum type="sha256">a596f21a2bee4f73e3a3a9bdca5aa1691f182d01fdf1a01b7f847e73337830bf</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-wwan" release="12.el7" src="NetworkManager-1.4.0-12.el7.src.rpm" version="1.4.0"><filename>NetworkManager-wwan-1.4.0-12.el7.x86_64.rpm</filename><sum type="sha256">905209d4d908fb3b16d3def854f9fc7b36b8243af94214956f167e68770dd515</sum></package><package arch="i686" name="libnm-gtk-devel" release="2.el7" src="network-manager-applet-1.4.0-2.el7.src.rpm" version="1.4.0"><filename>libnm-gtk-devel-1.4.0-2.el7.i686.rpm</filename><sum type="sha256">6995d83ee70b8aa88991dadd275170b1c4898e8e09b0ca7995e0c15c36b2077c</sum></package><package arch="i686" name="libnma" release="2.el7" src="network-manager-applet-1.4.0-2.el7.src.rpm" version="1.4.0"><filename>libnma-1.4.0-2.el7.i686.rpm</filename><sum type="sha256">d7482001313e4e4461fd2e44595ce4880bdadbcd7cef46a6db7215defba15320</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-tui" release="12.el7" src="NetworkManager-1.4.0-12.el7.src.rpm" version="1.4.0"><filename>NetworkManager-tui-1.4.0-12.el7.x86_64.rpm</filename><sum type="sha256">79ec499e420daf071c941fc8a4a70ca63bf2492fdf62b4b9606b3ccba28938e2</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-config-server" release="12.el7" src="NetworkManager-1.4.0-12.el7.src.rpm" version="1.4.0"><filename>NetworkManager-config-server-1.4.0-12.el7.x86_64.rpm</filename><sum type="sha256">4f6daacaa79c5a0d324c981b206a48baced218574e38a35ecf86d017b0600568</sum></package><package arch="x86_64" name="libnm-gtk" release="2.el7" src="network-manager-applet-1.4.0-2.el7.src.rpm" version="1.4.0"><filename>libnm-gtk-1.4.0-2.el7.x86_64.rpm</filename><sum type="sha256">2d90b8e8db70b860a65f52f4a47b61d32384f551061ab6248af7dd3e860729d3</sum></package><package arch="x86_64" name="libnm-gtk-devel" release="2.el7" src="network-manager-applet-1.4.0-2.el7.src.rpm" version="1.4.0"><filename>libnm-gtk-devel-1.4.0-2.el7.x86_64.rpm</filename><sum type="sha256">38618617ba14e4897f4d76c4d033d3f6db6f501c0788d59d438a6a5e4e0484c9</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-glib" release="12.el7" src="NetworkManager-1.4.0-12.el7.src.rpm" version="1.4.0"><filename>NetworkManager-glib-1.4.0-12.el7.x86_64.rpm</filename><sum type="sha256">f3ba229d223f5cd3e4104d09cfdb9fcbaab3b1c8b64316342b76d55c8dff2b12</sum></package><package arch="x86_64" name="libnma" release="2.el7" src="network-manager-applet-1.4.0-2.el7.src.rpm" version="1.4.0"><filename>libnma-1.4.0-2.el7.x86_64.rpm</filename><sum type="sha256">d9582aed2f5b94eba979d1e95c270f750ff83e139d90d9242e707ca176e407fd</sum></package><package arch="x86_64" name="NetworkManager-libreswan-gnome" release="1.el7" src="NetworkManager-libreswan-1.2.4-1.el7.src.rpm" version="1.2.4"><filename>NetworkManager-libreswan-gnome-1.2.4-1.el7.x86_64.rpm</filename><sum type="sha256">cb7f259253548d8a0bfed84c73a6fcd855027e8bece41c2a289d75e3fb97d55f</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-glib-devel" release="12.el7" src="NetworkManager-1.4.0-12.el7.src.rpm" version="1.4.0"><filename>NetworkManager-glib-devel-1.4.0-12.el7.x86_64.rpm</filename><sum type="sha256">3b182c3181a4409a5d904abdd371bfe78e25110d8e2a75844f164c134278553e</sum></package><package arch="x86_64" epoch="1" name="NetworkManager" release="12.el7" src="NetworkManager-1.4.0-12.el7.src.rpm" version="1.4.0"><filename>NetworkManager-1.4.0-12.el7.x86_64.rpm</filename><sum type="sha256">513750294eb4a2d5bc265e5898d3836198d36c6a9088cdad03e8409664a28cf5</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-libnm" release="12.el7" src="NetworkManager-1.4.0-12.el7.src.rpm" version="1.4.0"><filename>NetworkManager-libnm-1.4.0-12.el7.x86_64.rpm</filename><sum type="sha256">4474e974de4cbeabbf3dd16f6336f3fd6564961cff817766b9c141b5733d0166</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-bluetooth" release="12.el7" src="NetworkManager-1.4.0-12.el7.src.rpm" version="1.4.0"><filename>NetworkManager-bluetooth-1.4.0-12.el7.x86_64.rpm</filename><sum type="sha256">cbc53ecf019cef3b83c7620b6c4eb3001b61a09806d2743da271a2dc187e8828</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-team" release="12.el7" src="NetworkManager-1.4.0-12.el7.src.rpm" version="1.4.0"><filename>NetworkManager-team-1.4.0-12.el7.x86_64.rpm</filename><sum type="sha256">863fc5301b3eae234750e07f3ad0e6baebff55abecdc6eabadc6ca5318f8c974</sum></package><package arch="x86_64" name="nm-connection-editor" release="2.el7" src="network-manager-applet-1.4.0-2.el7.src.rpm" version="1.4.0"><filename>nm-connection-editor-1.4.0-2.el7.x86_64.rpm</filename><sum type="sha256">5ef608d818eb226138db7896a72668e1aa8a7e2597b625c4345d1929530dcfeb</sum></package><package arch="x86_64" name="NetworkManager-libreswan" release="1.el7" src="NetworkManager-libreswan-1.2.4-1.el7.src.rpm" version="1.2.4"><filename>NetworkManager-libreswan-1.2.4-1.el7.x86_64.rpm</filename><sum type="sha256">35bc6f87309ee2e712bef1f4c24c3f587a7812cb38ade0019d974ed5d01d501c</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-libnm-devel" release="12.el7" src="NetworkManager-1.4.0-12.el7.src.rpm" version="1.4.0"><filename>NetworkManager-libnm-devel-1.4.0-12.el7.x86_64.rpm</filename><sum type="sha256">66a1636084e51eeee125f88b4880d35b10dfa97bc75040f15f349ca5a944f024</sum></package><package arch="i686" epoch="1" name="NetworkManager-libnm" release="12.el7" src="NetworkManager-1.4.0-12.el7.src.rpm" version="1.4.0"><filename>NetworkManager-libnm-1.4.0-12.el7.i686.rpm</filename><sum type="sha256">a2833c20b96dc2f2d60b387bcdd13c1330a49b41795b87edd68f7791cfa5f249</sum></package><package arch="i686" name="libnl3-devel" release="2.el7" src="libnl3-3.2.28-2.el7.src.rpm" version="3.2.28"><filename>libnl3-devel-3.2.28-2.el7.i686.rpm</filename><sum type="sha256">da48053d0154aa3996a6738a4d66c2a8bc2606397b2239c00164d51501631832</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-adsl" release="12.el7" src="NetworkManager-1.4.0-12.el7.src.rpm" version="1.4.0"><filename>NetworkManager-adsl-1.4.0-12.el7.x86_64.rpm</filename><sum type="sha256">1f12476b9e01eedda1abbe7124417e6bfaf214dc92c6ffd49dd8df80d56b1bb3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0764" id="CVE-2016-0764" title="Networkmanager: Race Condition Allowing Info Leak" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2581" id="RHSA-2016:2581-2" title="Rhsa-2016:2581-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183420" id="1183420" title="Adding Bond Device To Bridge With &quot;Bridge-Slave&quot; Type Doesn'T Work." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1217288" id="1217288" title="[Enh] Configuration Snapshots And Rollbacks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1228707" id="1228707" title="It Would Make Sense For Nm To Allow Specifying An Order For Dns Servers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1243958" id="1243958" title="Network-Online.Target Met Before Ipv6 Is Up" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1255507" id="1255507" title="Networkmanager No Longer Provides Complete Fqdn (Dhcp_Hostname) To Dhclient" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1257237" id="1257237" title="Networkmanager Loops And Takes Cpu Until It Dies When Teamd Is Unresponsive" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1270814" id="1270814" title="Setting Up Team With Invalid Json Config Leads To Inconsistent  State" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1271271" id="1271271" title="Incorrect Completion Of Bluetooth Device In Nmcli" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1271581" id="1271581" title="Available Bluetooth Devices Should Be Listed In Connection Wizard" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277247" id="1277247" title="Nm Crashing When Upping Libreswan Connection As Secondary" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278506" id="1278506" title="[Abrt] Networkmanager: Ipv4Acd_On_Timeout(): Networkmanager Killed By Sigabrt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281301" id="1281301" title="Networkmanager Infiniband Connected Mode Fails With Some Adapters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1284261" id="1284261" title="Default-Route Doesn'T Get Removed When Disconnecting Device Externally (On Lost Carrier, Unplug Cable)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1285367" id="1285367" title="Nm-Libreswan-Service Abort When Trying To Establish Vpn Connection To Rh Intranet" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1286105" id="1286105" title="Ipv6 Address On Team.Vlan Interface Disappear Sometimes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289523" id="1289523" title="Mobile Broadband (Wwan) Connection Not Detected After Suspend" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1294728" id="1294728" title="The Team Connection Becomes Incorrect After I Restart Networkmanager" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1296058" id="1296058" title="Rebase Libnl3 Package To New Upstream Version For Rhel-7.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298732" id="1298732" title="Regression: Fails To Connect To Red Hat Vpn" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300755" id="1300755" title="Ifup Network With An Interface Name With More Than 16 Characters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301389" id="1301389" title="[Abrt] Networkmanager: Check_If_Startup_Complete(): Networkmanager Killed By Sigsegv" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1303968" id="1303968" title="Networkmanager Bridged Team Mtu Fails To Set" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1304641" id="1304641" title="Bond Profile Doubling After Restart With Manual Ipv6 (Or Ignore)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1309899" id="1309899" title="Rhel7.2: Default Route For Vlan Devices Does Not Get Added On Boot" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310435" id="1310435" title="Default Team Profile Should Load Some Default Config" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312281" id="1312281" title="Networkmanager Ignores The Reorder_Hdr Flag For Vlan Connections" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1313091" id="1313091" title="The Restart Of Networkmanager Service Disables A Configured Connection And Creates A Dynamic Connection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1313836" id="1313836" title="Broadband Pin Dialog Wont Appear" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1323571" id="1323571" title="Failed To Disable Userspace Ipv6Ll Address Handling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1324025" id="1324025" title="Networkmanager: Race Condition Allowing Info Leak" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1325752" id="1325752" title="Vlan Devices Do Not Inherit The Bonding Device Mac Address When Bonding Driver Is Reloaded" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330090" id="1330090" title="Fails To Connect To Ethernet After Update To 1:Networkmanager-1.2.0-0.1.Beta3.El7.X86_64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330694" id="1330694" title="Nm Does Not Run Pre-Down Scripts On Suspend/Sleep/Hibernate" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330893" id="1330893" title="Networkmanager.Service Never Reaches Its 'Startup Complete' State Iff Mtu=9000 (Ixgbe Driver)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331395" id="1331395" title="[Abrt] [Faf] Networkmanager: Unknown Function(): /Usr/Sbin/Networkmanager Killed By 11" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333983" id="1333983" title="Restarting Networkmanager Causes Devices To Be Lost From The Network Connections" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334876" id="1334876" title="Rename Package Networkmanager-Config-Routing-Rules To Networkmanager-Dispatcher-Routing-Rules" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334913" id="1334913" title="Networkmanager Spec File Calls Rpm To Determine Ppp Version Which Fails In Mock Builds" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1337222" id="1337222" title="Please Consider Managing /Etc/Resolv.Conf Not A Symlink" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1337300" id="1337300" title="File Completion Doesn'T Work For Libreswan Import" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1339565" id="1339565" title="Can'T Press &quot;Create&quot; Button Via Keyboard When Create Network On P2V Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1341635" id="1341635" title="Ipv6 Address Not Assigned To Vlan Subinterface When Assigned Immediately After Device Creation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1344757" id="1344757" title="Networkmanager Warning/Error On T460S/P During Suspend" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347015" id="1347015" title="Double Up Of Team Leads To Nmc223.6 C651] Tuaps: Ne Workmanager[30546] Trap Int3 Ip:7Fbdd56Bb643 Sp:7Ffc02C09B40 Error:0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347810" id="1347810" title="Gcc Fails When Including Libnl3 Header" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348573" id="1348573" title="Cannot Set Lp_Interval To Bond Balance-Tlb (Or Alb) Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348901" id="1348901" title="Vpn Dns Record Is Not Deleted When Profile Goes Down" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349740" id="1349740" title="20 Seconds Timeout Is Not Sufficient For Vpn Password Entry" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349749" id="1349749" title="[Abrt] [Faf] Networkmanager: G_Logv(): /Usr/Sbin/Networkmanager Killed By 5" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351272" id="1351272" title="Show Name If Ask Is Specified For 802.1X Connections" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351633" id="1351633" title="[Abrt] [Faf] Networkmanager: G_Logv(): /Usr/Sbin/Networkmanager Killed By 5" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1355656" id="1355656" title="Deleting A Bridge With A Slave Attached Leaves The Slave With A Nonexistent Master" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1355740" id="1355740" title="[Abrt] [Faf] Networkmanager: Unknown Function(): /Usr/Bin/Nmcli Killed By 11" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356015" id="1356015" title="Hostname Is 'Localhost.Localdomain' After Distro Installation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357738" id="1357738" title="The Device'S Master Is Unset When Downed Outside Networkmanager" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358335" id="1358335" title="Networkmanager Log Messages Are Missing In /Tmp/Syslog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1362542" id="1362542" title="Warn Nicely About Insufficient Permissions When Changing Logging Level" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1364275" id="1364275" title="Unable To Set Up Mtu On Bonded Interface In Rhel 7.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1366300" id="1366300" title="Network Team Device Configuration In Kickstart Pre Section Not Working" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367180" id="1367180" title="Failure To Configure Team With Ifcfg" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367736" id="1367736" title="After Ipv4.Manual And Ipv4.Addresses Entries Are Added Prompt Gets Stuck" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367737" id="1367737" title="Nmcli Asks For Ipv4 And Ipv6 Method Even If These Were Specified" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1368354" id="1368354" title="[Abrt] [Faf] Networkmanager: Raise(): /Usr/Sbin/Networkmanager Killed By 6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1368355" id="1368355" title="[Abrt] [Faf] Networkmanager: Raise(): /Usr/Sbin/Networkmanager Killed By 5" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1368761" id="1368761" title="[Networkmanager] - 'Nmcli' Bond Slaves Remain With Bootprorto=Dhcp Although We Configured Them With Disabled Method" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1370503" id="1370503" title="Backport &quot;Route/Addr: Address Attributes Based On Object&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1371201" id="1371201" title="[Anaconda Ibft] Ibft Plugin Stopped Working In 7.3 Due To /Sbin/Iscsiadm Failing." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1371623" id="1371623" title="Fatal Failure To Set Mac Address On Wifi" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1371920" id="1371920" title="D-Bus Signal Propertieschanged Emitted For Wrong Interface Type" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1371967" id="1371967" title="Incorrect Team Config Not Refused But Nullified" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1372799" id="1372799" title="Regression In Libnm Serializing &quot;Cloned-Mac-Address&quot; Which Causes Failure To Edit Property In Nmtui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1373276" id="1373276" title="Dhcp Timeout Due To Race Condition Calling Nm-Dhcp-Helper" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1374526" id="1374526" title="Backport Fix For Crash In Libnm'S Nm_Vpn_Plugin_Info_List_Get_Service_Types()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1375933" id="1375933" title="No Tab Completion In Nmcli After Ifname" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1376784" id="1376784" title="Segfault When Reapplying Slave Connection, Without Changes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378809" id="1378809" title="Installation Of 1.4.0 Nm Is Possible Onto 7.2 But It'S Not Working W/O Newer Glib2" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2582-2</id><title>Nettle</title><description>Security Fix(es): 
* Multiple flaws were found in the way nettle implemented elliptic curve scalar multiplication. These flaws could potentially introduce cryptographic weaknesses into nettle's functionality. (CVE-2015-8803, CVE-2015-8804, CVE-2015-8805) 
* It was found that nettle's RSA and DSA decryption code was vulnerable to cache-related side channel attacks. An attacker could use this flaw to recover the private key from a co-located virtual-machine instance. (CVE-2016-6489) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="nettle" release="8.el7" src="nettle-2.7.1-8.el7.src.rpm" version="2.7.1"><filename>nettle-2.7.1-8.el7.i686.rpm</filename><sum type="sha256">a1e97729eee382e96ed1890e098b859bfb0a3dd0eadcb32d6874ed1d10afbe71</sum></package><package arch="x86_64" name="nettle-devel" release="8.el7" src="nettle-2.7.1-8.el7.src.rpm" version="2.7.1"><filename>nettle-devel-2.7.1-8.el7.x86_64.rpm</filename><sum type="sha256">a20926b05cbb0d13cfe9a404263e0a9d473e05498584ffe20e34b2414ce28aa9</sum></package><package arch="x86_64" name="nettle" release="8.el7" src="nettle-2.7.1-8.el7.src.rpm" version="2.7.1"><filename>nettle-2.7.1-8.el7.x86_64.rpm</filename><sum type="sha256">9b697d9fbaab31af87b2043abd0822109e5d97362402bf29a5ada42d290c29e2</sum></package><package arch="i686" name="nettle-devel" release="8.el7" src="nettle-2.7.1-8.el7.src.rpm" version="2.7.1"><filename>nettle-devel-2.7.1-8.el7.i686.rpm</filename><sum type="sha256">90f01cc546291ed8f106f9c87296949e79504e4ae379a4cd06ae4fa77e4f1150</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8803" id="CVE-2015-8803" title="Nettle: Secp256 Calculation Bug" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8804" id="CVE-2015-8804" title="Nettle: Miscalculations On Secp384 Curve" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8805" id="CVE-2015-8805" title="Nettle: Secp256 Calculation Bug" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6489" id="CVE-2016-6489" title="Nettle: Rsa/Dsa Code Is Vulnerable To Cache-Timing Related Attacks" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2582" id="RHSA-2016:2582-2" title="Rhsa-2016:2582-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252936" id="1252936" title="Nettle: Sha3 Implementation Does Not Conform To The Published Version" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1304303" id="1304303" title="Nettle: Secp256 Calculation Bug" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1304379" id="1304379" title="Nettle: Miscalculations On Secp384 Curve" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1304382" id="1304382" title="Nettle: Secp256 Calculation Bug" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1362016" id="1362016" title="Nettle: Rsa/Dsa Code Is Vulnerable To Cache-Timing Related Attacks" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2583-2</id><title>Ntp</title><description>Security Fix(es): 
* It was found that the fix for CVE-2014-9750 was incomplete: three issues were found in the value length checks in NTP's ntp_crypto.c, where a packet with particular autokey operations that contained malicious data was not always being completely validated. A remote attacker could use a specially crafted NTP packet to crash ntpd. (CVE-2015-7691, CVE-2015-7692, CVE-2015-7702) 
* A memory leak flaw was found in ntpd's CRYPTO_ASSOC. If ntpd was configured to use autokey authentication, an attacker could send packets to ntpd that would, after several days of ongoing attack, cause it to run out of memory. (CVE-2015-7701) 
* An off-by-one flaw, leading to a buffer overflow, was found in cookedprint functionality of ntpq. A specially crafted NTP packet could potentially cause ntpq to crash. (CVE-2015-7852) 
* A NULL pointer dereference flaw was found in the way ntpd processed 'ntpdc reslist' commands that queried restriction lists with a large amount of entries. A remote attacker could potentially use this flaw to crash ntpd. (CVE-2015-7977) 
* A stack-based buffer overflow flaw was found in the way ntpd processed 'ntpdc reslist' commands that queried restriction lists with a large amount of entries. A remote attacker could use this flaw to crash ntpd. (CVE-2015-7978) 
* It was found that when NTP was configured in broadcast mode, a remote attacker could broadcast packets with bad authentication to all clients. The clients, upon receiving the malformed packets, would break the association with the broadcast server, causing them to become out of sync over a longer period of time. (CVE-2015-7979) 
* It was found that ntpd could crash due to an uninitialized variable when processing malformed logconfig configuration commands. (CVE-2015-5194) 
* It was found that ntpd would exit with a segmentation fault when a statistics type that was not enabled during compilation (e.g. timingstats) was referenced by the statistics or filegen configuration command. (CVE-2015-5195) 
* It was found that NTP's :config command could be used to set the pidfile and driftfile paths without any restrictions. A remote attacker could use this flaw to overwrite a file on the file system with a file containing the pid of the ntpd process (immediately) or the current estimated drift of the system clock (in hourly intervals). (CVE-2015-5196, CVE-2015-7703) 
* It was discovered that the sntp utility could become unresponsive due to being caught in an infinite loop when processing a crafted NTP packet. (CVE-2015-5219) 
* A flaw was found in the way NTP verified trusted keys during symmetric key authentication. An authenticated client (A) could use this flaw to modify a packet sent between a server (B) and a client (C) using a key that is different from the one known to the client (A). (CVE-2015-7974) 
* A flaw was found in the way the ntpq client processed certain incoming packets in a loop in the getresponse() function. A remote attacker could potentially use this flaw to crash an ntpq client instance. (CVE-2015-8158) 
The CVE-2015-5219 and CVE-2015-7703 issues were discovered by Miroslav Lichvr (Red Hat). 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ntp-perl" release="25.el7" src="ntp-4.2.6p5-25.el7.src.rpm" version="4.2.6p5"><filename>ntp-perl-4.2.6p5-25.el7.noarch.rpm</filename><sum type="sha256">a86d621ec1ce276fb26109040c0f4a80dbc6ce8338f707ff37e813fae945c397</sum></package><package arch="x86_64" name="ntpdate" release="25.el7" src="ntp-4.2.6p5-25.el7.src.rpm" version="4.2.6p5"><filename>ntpdate-4.2.6p5-25.el7.x86_64.rpm</filename><sum type="sha256">18c9b5dd127419a0abbf339a5805d579d84cb660e4fb58765e49ae5d2b43a9e2</sum></package><package arch="noarch" name="ntp-doc" release="25.el7" src="ntp-4.2.6p5-25.el7.src.rpm" version="4.2.6p5"><filename>ntp-doc-4.2.6p5-25.el7.noarch.rpm</filename><sum type="sha256">d57610dc1bc62bc2d9f9f6fb33e860300ecca36a066af47e13ecff3547f48915</sum></package><package arch="x86_64" name="sntp" release="25.el7" src="ntp-4.2.6p5-25.el7.src.rpm" version="4.2.6p5"><filename>sntp-4.2.6p5-25.el7.x86_64.rpm</filename><sum type="sha256">3b1aa53460ba1e7bd32195460c8a463908afd5cf3302adb6ee593fdfee427e0c</sum></package><package arch="x86_64" name="ntp" release="25.el7" src="ntp-4.2.6p5-25.el7.src.rpm" version="4.2.6p5"><filename>ntp-4.2.6p5-25.el7.x86_64.rpm</filename><sum type="sha256">592b78a0e502c3e70eb895d8da25593dd30e9f1b5f75e7703ecec6af8bfa9c24</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5194" id="CVE-2015-5194" title="Ntp: Crash With Crafted Logconfig Configuration " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5195" id="CVE-2015-5195" title="Ntp: Ntpd Crash When Processing Config Commands " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5219" id="CVE-2015-5219" title="Ntp: Infinite Loop In Sntp Processing Crafted Packet" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7691" id="CVE-2015-7691" title="Ntp: Incomplete " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7692" id="CVE-2015-7692" title="Ntp: Incomplete " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7701" id="CVE-2015-7701" title="Ntp: Slow Memory Leak In Crypto_Assoc" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7702" id="CVE-2015-7702" title="Ntp: Incomplete " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7703" id="CVE-2015-7703" title="Ntp: Config Command Can Be Used To Set The " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7852" id="CVE-2015-7852" title="Ntp: Ntpq Atoascii Memory Corruption Vulnerability" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7974" id="CVE-2015-7974" title="Ntp: Missing Key Check Allows Impersonation Between Authenticated Peers (Vu#357792)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7977" id="CVE-2015-7977" title="Ntp: Restriction List Null Pointer Dereference" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7978" id="CVE-2015-7978" title="Ntp: Stack Exhaustion In Recursive Traversal Of " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7979" id="CVE-2015-7979" title="Ntp: Off-Path Denial Of Service On Authenticated " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8158" id="CVE-2015-8158" title="Ntp: Potential Infinite Loop In Ntpq" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2583" id="RHSA-2016:2583-2" title="Rhsa-2016:2583-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1242553" id="1242553" title="Ntpd Doesn'T Reset System Leap Status When Disarming Leap Timer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1254542" id="1254542" title="Ntp: Crash With Crafted Logconfig Configuration " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1254544" id="1254544" title="Ntp: Ntpd Crash When Processing Config Commands " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1254547" id="1254547" title="Ntp: Config Command Can Be Used To Set The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1255118" id="1255118" title="Ntp: Infinite Loop In Sntp Processing Crafted Packet" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274254" id="1274254" title="Ntp: Incomplete " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274255" id="1274255" title="Ntp: Slow Memory Leak In Crypto_Assoc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1274261" id="1274261" title="Ntp: Ntpq Atoascii Memory Corruption Vulnerability" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297471" id="1297471" title="Ntp: Missing Key Check Allows Impersonation Between Authenticated Peers (Vu#357792)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300269" id="1300269" title="Ntp: Restriction List Null Pointer Dereference" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300270" id="1300270" title="Ntp: Stack Exhaustion In Recursive Traversal Of " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300271" id="1300271" title="Ntp: Off-Path Denial Of Service On Authenticated " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300273" id="1300273" title="Ntp: Potential Infinite Loop In Ntpq" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2585-2</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* An integer overflow flaw and an out-of-bounds read flaw were found in the way QEMU's VGA emulator set certain VGA registers while in VBE mode. A privileged guest user could use this flaw to crash the QEMU process instance. (CVE-2016-3712) 
* An infinite loop flaw was found in the way QEMU's e1000 NIC emulation implementation processed data using transmit or receive descriptors under certain conditions. A privileged user inside a guest could use this flaw to crash the QEMU instance. (CVE-2016-1981) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-img" release="126.el7" src="qemu-kvm-1.5.3-126.el7.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-126.el7.x86_64.rpm</filename><sum type="sha256">4a7ea2d51d17b25d7b07992c4a1d2b5206d39cc3408de2fdedd9ed5d962882a4</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="126.el7" src="qemu-kvm-1.5.3-126.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-126.el7.x86_64.rpm</filename><sum type="sha256">f8a0149296ab8213739c6e9dae82f679a89f0c2d1087871301971a6502e97091</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="126.el7" src="qemu-kvm-1.5.3-126.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-126.el7.x86_64.rpm</filename><sum type="sha256">d57df6cde501526f9c0f3da5f6be9b960ee6890109c2b15d30c96daeb1d372c5</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="126.el7" src="qemu-kvm-1.5.3-126.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-126.el7.x86_64.rpm</filename><sum type="sha256">5385f478749e39d14822ed56d61a23f6dbcf4a4d8d1831974753de6a435d4736</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1981" id="CVE-2016-1981" title="Qemu: Net: E1000 Infinite Loop In Start_Xmit And E1000_Receive_Iov Routines" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3712" id="CVE-2016-3712" title="Qemu-Kvm: Out-Of-Bounds Read When Creating Weird Vga Screen Surface" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2585" id="RHSA-2016:2585-2" title="Rhsa-2016:2585-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1156635" id="1156635" title="Libvirt Is Confused That Qemu-Kvm Exposes 'Block-Job-Cancel' But Not 'Block-Stream'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1177318" id="1177318" title="Guest Using Rbd Based Image As Disk Failed To Start When Sandbox Was Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252757" id="1252757" title="[Rhel-7.2-Qmu-Kvm] Package Is 100% Lost When Ping From Host To Win2012R2 Guest With 64000 Size" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1256741" id="1256741" title="&quot;Capslock&quot; Will Work As &quot;\&quot; When Boot A Guest With Usb-Kbd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265427" id="1265427" title="Contents Of Msr_Tsc_Aux Are Not Migrated" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1268345" id="1268345" title="Posix_Fallocate Emulation On Nfs Fails With Bad File Descriptor If Fd Is Opened O_Wronly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269738" id="1269738" title="Vlan Table Display Repeat Four Times In Qmp When Queues=4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1272523" id="1272523" title="Qemu-Kvm Build Failure Race Condition In Tests/Ide-Test" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1276036" id="1276036" title="Crash On Qmp Input Exceeding Limits" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277248" id="1277248" title="Ceph.Conf Properties Override Qemu'S Command-Line Properties" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1283116" id="1283116" title="[Abrt] Qemu-Img: Get_Block_Status(): Qemu-Img Killed By Sigabrt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298570" id="1298570" title="Qemu: Net: E1000 Infinite Loop In Start_Xmit And E1000_Receive_Iov Routines" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299116" id="1299116" title="Qemu-Img Created Vmdk Images Lead To &quot;Not A Supported Disk Format (Sparse Vmdk Version Too Old)&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299250" id="1299250" title="Qemu-Img Created Vmdk Images Are Unbootable" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312289" id="1312289" title="&quot;Qemu-Kvm: /Builddir/Build/Build/Qemu-1.5.3/Hw/Scsi/Virtio-Scsi.C:533: Virtio_Scsi_Push_Event: Assertion `Event == 0' Failed&quot; After Hotplug 20 Virtio-Scsi Disks Then Hotunplug Them" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1318712" id="1318712" title="Qemu-Kvm: Out-Of-Bounds Read When Creating Weird Vga Screen Surface" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330969" id="1330969" title="Match The Oem Id And Oem Table Id Fields Of The Fadt And The Rsdt To Those Of The Slic" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333159" id="1333159" title="Qemu-Kvm Doesn'T Reload Udev Rules Before Triggering For Kvm Device" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1336491" id="1336491" title="Ship Fd Connection Patches Qemu-Kvm Part" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1340971" id="1340971" title="Qemu: Accel=Tcg Does Not Implement Sse 4 Properly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351106" id="1351106" title="Symbol Lookup Error: /Usr/Libexec/Qemu-Kvm: Undefined Symbol: Libusb_Get_Port_Numbers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1360137" id="1360137" title="Glib-Warning **: Gmem.C:482: Custom Memory Allocation Vtable Not Supported" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367040" id="1367040" title="Qemu Crash When Guest Notifies Non-Existent Virtqueue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1371619" id="1371619" title="Flags Xsaveopt Xsavec Xgetbv1 Are Missing On Qemu-Kvm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1376542" id="1376542" title="Rhsa-2016-1756 Breaks Migration Of Instances" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2586-2</id><title>Python</title><description>Security Fix(es): 
* A vulnerability was discovered in Python, in the built-in zipimporter. A specially crafted zip file placed in a module path such that it would be loaded by a later "import" statement could cause a heap overflow, leading to arbitrary code execution. (CVE-2016-5636) 
Additional Changes:</description><severity>low</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="tkinter" release="48.el7" src="python-2.7.5-48.el7.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-48.el7.x86_64.rpm</filename><sum type="sha256">d8af6c1b5688849302fa0077f841d4bb35a6aaaf008faf1c54a1b1c0c1eec0a2</sum></package><package arch="i686" name="python-libs" release="48.el7" src="python-2.7.5-48.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-48.el7.i686.rpm</filename><sum type="sha256">966fb59689717d46bd518e0f620f2b882b7439570d3c1aa84b125205d654abbb</sum></package><package arch="x86_64" name="python-devel" release="48.el7" src="python-2.7.5-48.el7.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-48.el7.x86_64.rpm</filename><sum type="sha256">24fd0bb39844aafa8d519fa843b34b3e3c7bf9f8ebaf69bf3e6b10364437f004</sum></package><package arch="x86_64" name="python-libs" release="48.el7" src="python-2.7.5-48.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-48.el7.x86_64.rpm</filename><sum type="sha256">42ac9f4868fa746efa18af2017521f16c8c0d87a89383267b30085db8faae6b7</sum></package><package arch="x86_64" name="python-tools" release="48.el7" src="python-2.7.5-48.el7.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-48.el7.x86_64.rpm</filename><sum type="sha256">a5a3ec6b573c9f70185a44069242ca8da8b58b92f120e262248fe6913d205a09</sum></package><package arch="x86_64" name="python-test" release="48.el7" src="python-2.7.5-48.el7.src.rpm" version="2.7.5"><filename>python-test-2.7.5-48.el7.x86_64.rpm</filename><sum type="sha256">f13f37f91b6f7c41fce7e3240d6e1e009b223f0d81e4afc52ea43e7ffca0e81b</sum></package><package arch="x86_64" name="python-debug" release="48.el7" src="python-2.7.5-48.el7.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-48.el7.x86_64.rpm</filename><sum type="sha256">0daab48c193fbd14a960bb53dda2cba72131eef91c5a1fde3db47a26605089cd</sum></package><package arch="x86_64" name="python" release="48.el7" src="python-2.7.5-48.el7.src.rpm" version="2.7.5"><filename>python-2.7.5-48.el7.x86_64.rpm</filename><sum type="sha256">5e0f6e9ae6061673c699ad6b0411a6c5cc3bdd59b92b20894ecbeba2932b6887</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5636" id="CVE-2016-5636" title="Python: Heap Overflow In Zipimporter Module" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2586" id="RHSA-2016:2586-2" title="Rhsa-2016:2586-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1268310" id="1268310" title="Man Page Contains $Date$ Instead Of Actual Date" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1271760" id="1271760" title="Python 2.7 Installation Is Not 64 Bit Clean" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1288426" id="1288426" title="/Etc/Tmpfiles.D/Python.Conf Shipped When /Etc/Tmpfiles.D Is Reserved For The Local Administrator" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1295459" id="1295459" title="Python-2.7.5-34 Breaks Hashlib (Md4)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301017" id="1301017" title="I'M Hit By Python Bug #11489, Could The Fix Be Backported?" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1313259" id="1313259" title="Upstream Tests Cause Building Python Package On Brew Stall And Leave Orphan Processes That Need Manually Kill" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315310" id="1315310" title="Python Brew Builds Fail For Rhel 7.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315758" id="1315758" title="Update To The Most Recent Version Of Pep493" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331425" id="1331425" title="Segmentation Fault In Sslwrap Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1345856" id="1345856" title="Python: Heap Overflow In Zipimporter Module" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2587-2</id><title>Wget</title><description>Security Fix(es): 
* It was found that wget used a file name provided by the server for the downloaded file when following an HTTP redirect to a FTP server resource. This could cause wget to create a file with a different name than expected, possibly allowing the server to execute arbitrary code on the client. (CVE-2016-4971)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="wget" release="13.el7" src="wget-1.14-13.el7.src.rpm" version="1.14"><filename>wget-1.14-13.el7.x86_64.rpm</filename><sum type="sha256">658007ef3b90a024a316f08c37bbbe384da002cd09a54979629525b469fef500</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4971" id="CVE-2016-4971" title="Wget: Lack Of Filename Checking Allows Arbitrary File Upload Via Ftp Redirect" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2587" id="RHSA-2016:2587-2" title="Rhsa-2016:2587-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1147572" id="1147572" title="-Nv Documented As Synonymous To Both --No-Verbose And --Report-Speed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1343666" id="1343666" title="Wget: Lack Of Filename Checking Allows Arbitrary File Upload Via Ftp Redirect" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2588-2</id><title>Openssh</title><description>Security Fix(es): 
* It was discovered that the OpenSSH sshd daemon fetched PAM environment settings before running the login program. In configurations with UseLogin=yes and the pam_env PAM module configured to read user environment settings, a local user could use this flaw to execute arbitrary code as root. (CVE-2015-8325) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pam_ssh_agent_auth" release="9.31.el7" src="openssh-6.6.1p1-31.el7.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-9.31.el7.x86_64.rpm</filename><sum type="sha256">3a977ea2168ebc2f3a532cf789da11620205ff16cbec65f9c8efd7fc19129080</sum></package><package arch="x86_64" name="openssh-ldap" release="31.el7" src="openssh-6.6.1p1-31.el7.src.rpm" version="6.6.1p1"><filename>openssh-ldap-6.6.1p1-31.el7.x86_64.rpm</filename><sum type="sha256">e14873c6bac86577f290ade761799b4f62ca07a95896617c13351ecbb0c55302</sum></package><package arch="x86_64" name="openssh-clients" release="31.el7" src="openssh-6.6.1p1-31.el7.src.rpm" version="6.6.1p1"><filename>openssh-clients-6.6.1p1-31.el7.x86_64.rpm</filename><sum type="sha256">58b1e0b43b818d5083abfd0d020dc0f3128cdc84ca0ef83a15b6fc677493213c</sum></package><package arch="x86_64" name="openssh-keycat" release="31.el7" src="openssh-6.6.1p1-31.el7.src.rpm" version="6.6.1p1"><filename>openssh-keycat-6.6.1p1-31.el7.x86_64.rpm</filename><sum type="sha256">b859ec4f2f31fc68c7e92848016b07f1476b88b51beda3d852192381a7e81f47</sum></package><package arch="x86_64" name="openssh-server" release="31.el7" src="openssh-6.6.1p1-31.el7.src.rpm" version="6.6.1p1"><filename>openssh-server-6.6.1p1-31.el7.x86_64.rpm</filename><sum type="sha256">7844f2b925f9ad3e443faa66cec132d5750dbd287a5b801f65690da76894e98c</sum></package><package arch="x86_64" name="openssh" release="31.el7" src="openssh-6.6.1p1-31.el7.src.rpm" version="6.6.1p1"><filename>openssh-6.6.1p1-31.el7.x86_64.rpm</filename><sum type="sha256">6fd11549b6565c7c54d107eae114b3b0486ed7aec3f9b6208fceb80c35fad0aa</sum></package><package arch="i686" name="pam_ssh_agent_auth" release="9.31.el7" src="openssh-6.6.1p1-31.el7.src.rpm" version="0.9.3"><filename>pam_ssh_agent_auth-0.9.3-9.31.el7.i686.rpm</filename><sum type="sha256">e4b850fee59defb8c69fd9ce64c5fb74e1068159d47899b1db69031b56d0654b</sum></package><package arch="x86_64" name="openssh-askpass" release="31.el7" src="openssh-6.6.1p1-31.el7.src.rpm" version="6.6.1p1"><filename>openssh-askpass-6.6.1p1-31.el7.x86_64.rpm</filename><sum type="sha256">78dfc38aa66d2755ffddf47465f56c939d629bf5ed142693e9dc1643fe416ea9</sum></package><package arch="x86_64" name="openssh-server-sysvinit" release="31.el7" src="openssh-6.6.1p1-31.el7.src.rpm" version="6.6.1p1"><filename>openssh-server-sysvinit-6.6.1p1-31.el7.x86_64.rpm</filename><sum type="sha256">4ae8319dd650441b23d9568a8c7056b6b7d87fb174ce0fba9dab50cffa80cef7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8325" id="CVE-2015-8325" title="Openssh: Privilege Escalation Via User'S Pam Environment And Uselogin=Yes" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2588" id="RHSA-2016:2588-2" title="Rhsa-2016:2588-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1237129" id="1237129" title="Sshd -T Does Not Output Authenticationmethods With Default Value" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291172" id="1291172" title="Systemctl Restart/Start Sshd Shows No Error If Start Fails" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310303" id="1310303" title="Remove Glob_Limit_Stat From Openssh" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312013" id="1312013" title="Rhpkg Prep  Fails On Rhel-7.3 Branch" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328012" id="1328012" title="Openssh: Privilege Escalation Via User'S Pam Environment And Uselogin=Yes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328243" id="1328243" title="Openssh Only Looks For .K5Login In User Directory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1344614" id="1344614" title="Sftp -M Modifies Umask And Breaks Permissions On New Directories" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349556" id="1349556" title="Ssh-Copy-Id Not Working When Custom Loglevel Is Quiet" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357859" id="1357859" title="Guest_T Can Run Sudo" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1373297" id="1373297" title="Openssh Can'T Be Installed Without Selinux-Policy" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2589-2</id><title>Gimp</title><description>The following packages have been upgraded to a newer upstream version: gimp (2.8.16), gimp-help (2.8.2). 
Security Fix(es): 
* Multiple use-after-free vulnerabilities were found in GIMP in the channel and layer properties parsing process when loading XCF files. An attacker could create a specially crafted XCF file which could cause GIMP to crash. (CVE-2016-4994) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="gimp-help-ja" release="1.el7" src="gimp-help-2.8.2-1.el7.src.rpm" version="2.8.2"><filename>gimp-help-ja-2.8.2-1.el7.noarch.rpm</filename><sum type="sha256">96c5f973fe65ac306969095ad795a335e9df9e1f7ba841d96363d48e4d9de9d6</sum></package><package arch="noarch" name="gimp-help-zh_CN" release="1.el7" src="gimp-help-2.8.2-1.el7.src.rpm" version="2.8.2"><filename>gimp-help-zh_CN-2.8.2-1.el7.noarch.rpm</filename><sum type="sha256">c049db30767c71bd59a0569f52c1fddebea060e6a84afedfc525cfef25327d23</sum></package><package arch="x86_64" epoch="2" name="gimp" release="3.el7" src="gimp-2.8.16-3.el7.src.rpm" version="2.8.16"><filename>gimp-2.8.16-3.el7.x86_64.rpm</filename><sum type="sha256">058a9acad361bb5e3b43736b815041ee78744bd402819f917f74d2238cea19b0</sum></package><package arch="i686" epoch="2" name="gimp-libs" release="3.el7" src="gimp-2.8.16-3.el7.src.rpm" version="2.8.16"><filename>gimp-libs-2.8.16-3.el7.i686.rpm</filename><sum type="sha256">47fb130a9c2c6060dd88cc2f0bb2bda25e417b6ba09dd48b4b7702e7d35cc6da</sum></package><package arch="noarch" name="gimp-help-pt_BR" release="1.el7" src="gimp-help-2.8.2-1.el7.src.rpm" version="2.8.2"><filename>gimp-help-pt_BR-2.8.2-1.el7.noarch.rpm</filename><sum type="sha256">09b4179df05bb94867fa0eb7c4bf6d33abf16abb3e5609e86a7864ed70bf2fcc</sum></package><package arch="noarch" name="gimp-help-fr" release="1.el7" src="gimp-help-2.8.2-1.el7.src.rpm" version="2.8.2"><filename>gimp-help-fr-2.8.2-1.el7.noarch.rpm</filename><sum type="sha256">0063bc0241cd99f416404a29eaba4e135ca79dc96faf2e32f42625ba49ebc6aa</sum></package><package arch="noarch" name="gimp-help-sv" release="1.el7" src="gimp-help-2.8.2-1.el7.src.rpm" version="2.8.2"><filename>gimp-help-sv-2.8.2-1.el7.noarch.rpm</filename><sum type="sha256">061f9059fe2b8a0d39217a314e86fbbdbb7baa31e232eb7b8bca52bd71af1725</sum></package><package arch="noarch" name="gimp-help-da" release="1.el7" src="gimp-help-2.8.2-1.el7.src.rpm" version="2.8.2"><filename>gimp-help-da-2.8.2-1.el7.noarch.rpm</filename><sum type="sha256">b79a862905ddeef423f09f1bda0cfe9f97526d0a8dcacc5d1c3563a543d68444</sum></package><package arch="x86_64" epoch="2" name="gimp-devel" release="3.el7" src="gimp-2.8.16-3.el7.src.rpm" version="2.8.16"><filename>gimp-devel-2.8.16-3.el7.x86_64.rpm</filename><sum type="sha256">d15bb696c300b2cc059d183193bd1c125e0d42e08b984b568c3435de357ff845</sum></package><package arch="noarch" name="gimp-help-es" release="1.el7" src="gimp-help-2.8.2-1.el7.src.rpm" version="2.8.2"><filename>gimp-help-es-2.8.2-1.el7.noarch.rpm</filename><sum type="sha256">468db0790dd13280557bae833f6af5739c3df990b748e149571fadf78ae2eff3</sum></package><package arch="noarch" name="gimp-help-ca" release="1.el7" src="gimp-help-2.8.2-1.el7.src.rpm" version="2.8.2"><filename>gimp-help-ca-2.8.2-1.el7.noarch.rpm</filename><sum type="sha256">8bc7a8fc6e2b480cc691e50b4ba700c2d44e3eef6ebab8cad12280b3022a7d86</sum></package><package arch="noarch" name="gimp-help" release="1.el7" src="gimp-help-2.8.2-1.el7.src.rpm" version="2.8.2"><filename>gimp-help-2.8.2-1.el7.noarch.rpm</filename><sum type="sha256">602f43de18ac5fe204f6ff4a85ea64aea73523f7b261498d671ee11ec670c5d6</sum></package><package arch="noarch" name="gimp-help-nl" release="1.el7" src="gimp-help-2.8.2-1.el7.src.rpm" version="2.8.2"><filename>gimp-help-nl-2.8.2-1.el7.noarch.rpm</filename><sum type="sha256">de70ecb18b946c15ba5cd4b6bc3151919fb4d39611ec5b7cbdba2a354392d7ef</sum></package><package arch="noarch" name="gimp-help-it" release="1.el7" src="gimp-help-2.8.2-1.el7.src.rpm" version="2.8.2"><filename>gimp-help-it-2.8.2-1.el7.noarch.rpm</filename><sum type="sha256">0b0a22ed3f43764ecea2472ee490e445e89db2f03fffd58cd037cfd8fd34c786</sum></package><package arch="noarch" name="gimp-help-en_GB" release="1.el7" src="gimp-help-2.8.2-1.el7.src.rpm" version="2.8.2"><filename>gimp-help-en_GB-2.8.2-1.el7.noarch.rpm</filename><sum type="sha256">68ee0eee22b23e18ea7993c00c7d76fc83187aa65c288dbf1e71a1148d083419</sum></package><package arch="noarch" name="gimp-help-de" release="1.el7" src="gimp-help-2.8.2-1.el7.src.rpm" version="2.8.2"><filename>gimp-help-de-2.8.2-1.el7.noarch.rpm</filename><sum type="sha256">8a1caaa36082c1340cd441d11baba98d8e11f40a49f8e77932b41f876b10e205</sum></package><package arch="x86_64" epoch="2" name="gimp-libs" release="3.el7" src="gimp-2.8.16-3.el7.src.rpm" version="2.8.16"><filename>gimp-libs-2.8.16-3.el7.x86_64.rpm</filename><sum type="sha256">d788c12b893fcecb869fd9095ffaa75f5e4825e8c742175c6755c2234df74f81</sum></package><package arch="noarch" name="gimp-help-nn" release="1.el7" src="gimp-help-2.8.2-1.el7.src.rpm" version="2.8.2"><filename>gimp-help-nn-2.8.2-1.el7.noarch.rpm</filename><sum type="sha256">a0e6a6e471f1b316d609c9272d97254f8776029542a4f4bdf2a664b43cba9d7f</sum></package><package arch="x86_64" epoch="2" name="gimp-devel-tools" release="3.el7" src="gimp-2.8.16-3.el7.src.rpm" version="2.8.16"><filename>gimp-devel-tools-2.8.16-3.el7.x86_64.rpm</filename><sum type="sha256">ae6ab49c7c8b2c726f924f81cdd6c7a598f67bbd2de0e6c543980f7766d0daab</sum></package><package arch="noarch" name="gimp-help-el" release="1.el7" src="gimp-help-2.8.2-1.el7.src.rpm" version="2.8.2"><filename>gimp-help-el-2.8.2-1.el7.noarch.rpm</filename><sum type="sha256">30f6cb04d4ac10fb2aeb84db0216872ebf49a6cfea64ec0d4b6ff4ed62873821</sum></package><package arch="noarch" name="gimp-help-ru" release="1.el7" src="gimp-help-2.8.2-1.el7.src.rpm" version="2.8.2"><filename>gimp-help-ru-2.8.2-1.el7.noarch.rpm</filename><sum type="sha256">fc1cf59e63a16b49db4a2eb2c2e269960ccb347662b3ce9411509c27971622fe</sum></package><package arch="noarch" name="gimp-help-ko" release="1.el7" src="gimp-help-2.8.2-1.el7.src.rpm" version="2.8.2"><filename>gimp-help-ko-2.8.2-1.el7.noarch.rpm</filename><sum type="sha256">97587c09d0c09b27874a451ca9d9506ee1bdac4a31e7b810b9b765fecee3d591</sum></package><package arch="i686" epoch="2" name="gimp-devel" release="3.el7" src="gimp-2.8.16-3.el7.src.rpm" version="2.8.16"><filename>gimp-devel-2.8.16-3.el7.i686.rpm</filename><sum type="sha256">3b12103d91fbadce8cd91c2b69720fd71a2c3f8b60c06182cd6e16c6232add21</sum></package><package arch="noarch" name="gimp-help-sl" release="1.el7" src="gimp-help-2.8.2-1.el7.src.rpm" version="2.8.2"><filename>gimp-help-sl-2.8.2-1.el7.noarch.rpm</filename><sum type="sha256">5baddb58b83620f76eadaec06358a199003781a774cb1c85d0abcb7d14019b89</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4994" id="CVE-2016-4994" title="Gimp: Use-After-Free Vulnerabilities In The Channel And Layer Properties Parsing Process" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2589" id="RHSA-2016:2589-2" title="Rhsa-2016:2589-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298226" id="1298226" title="Rebase The Gimp To The Latest Stable Release" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348617" id="1348617" title="Gimp: Use-After-Free Vulnerabilities In The Channel And Layer Properties Parsing Process" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1370595" id="1370595" title="Rebase Gimp-Help To Current Upstream/Fedora Version 2.8.2" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2590-2</id><title>Dhcp</title><description>Security Fix(es): 
* A resource-consumption flaw was discovered in the DHCP server. dhcpd did not restrict the number of open connections to OMAPI and failover ports. A remote attacker able to establish TCP connections to one of these ports could use this flaw to cause dhcpd to exit unexpectedly, stop responding requests, or exhaust system sockets (denial of service). (CVE-2016-2774) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="12" name="dhcp-libs" release="47.sl7" src="dhcp-4.2.5-47.sl7.src.rpm" version="4.2.5"><filename>dhcp-libs-4.2.5-47.sl7.x86_64.rpm</filename><sum type="sha256">74d01f0acf9bc780c8de96620d96ebe1436d5ffd9fff78e00fb917ba4da74370</sum></package><package arch="i686" epoch="12" name="dhcp-devel" release="47.sl7" src="dhcp-4.2.5-47.sl7.src.rpm" version="4.2.5"><filename>dhcp-devel-4.2.5-47.sl7.i686.rpm</filename><sum type="sha256">efb84f65a5db0b74191b48f8cd0b3cac4003ed020cf3b06ba677f95688042f15</sum></package><package arch="x86_64" epoch="12" name="dhcp" release="47.sl7" src="dhcp-4.2.5-47.sl7.src.rpm" version="4.2.5"><filename>dhcp-4.2.5-47.sl7.x86_64.rpm</filename><sum type="sha256">181d7e05596fb580d51801239e4649242e36b81c77fc082a8ee4e0de248b65f7</sum></package><package arch="x86_64" epoch="12" name="dhcp-devel" release="47.sl7" src="dhcp-4.2.5-47.sl7.src.rpm" version="4.2.5"><filename>dhcp-devel-4.2.5-47.sl7.x86_64.rpm</filename><sum type="sha256">91489ea8dafbfea8aa6cf7a5b46cb217eaefbaeee9221c03a3cff7a8ac35d6e8</sum></package><package arch="i686" epoch="12" name="dhcp-libs" release="47.sl7" src="dhcp-4.2.5-47.sl7.src.rpm" version="4.2.5"><filename>dhcp-libs-4.2.5-47.sl7.i686.rpm</filename><sum type="sha256">e17190b6d6fa4ec2163b5840c8696125ee70f3818fea9d2132beb614b5989a0e</sum></package><package arch="x86_64" epoch="12" name="dhcp-common" release="47.sl7" src="dhcp-4.2.5-47.sl7.src.rpm" version="4.2.5"><filename>dhcp-common-4.2.5-47.sl7.x86_64.rpm</filename><sum type="sha256">e3a5e09548773a8076e8f1ac0fb896f566970cbbb3bc7941e009225b3d9c6119</sum></package><package arch="x86_64" epoch="12" name="dhclient" release="47.sl7" src="dhcp-4.2.5-47.sl7.src.rpm" version="4.2.5"><filename>dhclient-4.2.5-47.sl7.x86_64.rpm</filename><sum type="sha256">07c7b1318be6c92a4184c0f04a7618b18b8b3f774568aa925f0b8600bf159e3a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2774" id="CVE-2016-2774" title="Dhcp: Unclosed Tcp Connections To Omapi Or Failover Ports Can Cause Dos" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2590" id="RHSA-2016:2590-2" title="Rhsa-2016:2590-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315259" id="1315259" title="Dhcp: Unclosed Tcp Connections To Omapi Or Failover Ports Can Cause Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2591-2</id><title>Krb5</title><description>The following packages have been upgraded to a newer upstream version: krb5 (1.14.1). 
Security Fix(es): 
* A NULL pointer dereference flaw was found in MIT Kerberos kadmind service. An authenticated attacker with permission to modify a principal entry could use this flaw to cause kadmind to dereference a null pointer and crash by supplying an empty DB argument to the modify_principal command, if kadmind was configured to use the LDAP KDB module. (CVE-2016-3119) 
* A NULL pointer dereference flaw was found in MIT Kerberos krb5kdc service. An authenticated attacker could use this flaw to cause krb5kdc to dereference a null pointer and crash by making an S4U2Self request, if the restrict_anonymous_to_tgt option was set to true. (CVE-2016-3120) 
Additional Changes:</description><severity>low</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="krb5-devel" release="26.el7" src="krb5-1.14.1-26.el7.src.rpm" version="1.14.1"><filename>krb5-devel-1.14.1-26.el7.x86_64.rpm</filename><sum type="sha256">a101b343e6479c91cfe72ee0b13858a050094bef80d6160929558e59a14bb7ba</sum></package><package arch="x86_64" name="krb5-server" release="26.el7" src="krb5-1.14.1-26.el7.src.rpm" version="1.14.1"><filename>krb5-server-1.14.1-26.el7.x86_64.rpm</filename><sum type="sha256">c94105f63d7e5cf351f689b7804c89716fbaf729ff365569369bd87786934721</sum></package><package arch="i686" name="krb5-devel" release="26.el7" src="krb5-1.14.1-26.el7.src.rpm" version="1.14.1"><filename>krb5-devel-1.14.1-26.el7.i686.rpm</filename><sum type="sha256">39f62c7a6b01f4833339562320b2390f944a1796abb41854d7eb7aa0093d32c2</sum></package><package arch="i686" name="libkadm5" release="26.el7" src="krb5-1.14.1-26.el7.src.rpm" version="1.14.1"><filename>libkadm5-1.14.1-26.el7.i686.rpm</filename><sum type="sha256">1c30c2faa3055e1b4502e03f4c310e4932e4c1b9a0f9feff25634367a97686cd</sum></package><package arch="x86_64" name="krb5-workstation" release="26.el7" src="krb5-1.14.1-26.el7.src.rpm" version="1.14.1"><filename>krb5-workstation-1.14.1-26.el7.x86_64.rpm</filename><sum type="sha256">50ae303413022ac17fcfac833efad8b58210bb4a68e92872af7f3f30c424f903</sum></package><package arch="x86_64" name="krb5-server-ldap" release="26.el7" src="krb5-1.14.1-26.el7.src.rpm" version="1.14.1"><filename>krb5-server-ldap-1.14.1-26.el7.x86_64.rpm</filename><sum type="sha256">d7da201f150a7c7baac4d848f311d4e3a49663a54a84f10ae439178d55d6b41b</sum></package><package arch="x86_64" name="libkadm5" release="26.el7" src="krb5-1.14.1-26.el7.src.rpm" version="1.14.1"><filename>libkadm5-1.14.1-26.el7.x86_64.rpm</filename><sum type="sha256">7c74630603134451814dcb81080a21bf95e300e6ca90e4632022fba2d9d8689f</sum></package><package arch="x86_64" name="krb5-libs" release="26.el7" src="krb5-1.14.1-26.el7.src.rpm" version="1.14.1"><filename>krb5-libs-1.14.1-26.el7.x86_64.rpm</filename><sum type="sha256">187f3ba043bca16b62e9c39474ff177e18f481ec5959a8d75e50b2c437c19586</sum></package><package arch="x86_64" name="krb5-pkinit" release="26.el7" src="krb5-1.14.1-26.el7.src.rpm" version="1.14.1"><filename>krb5-pkinit-1.14.1-26.el7.x86_64.rpm</filename><sum type="sha256">852adcd39f30781531f4c258da0ada181ed835c7fe13f46b2f2af88958441cfc</sum></package><package arch="i686" name="krb5-libs" release="26.el7" src="krb5-1.14.1-26.el7.src.rpm" version="1.14.1"><filename>krb5-libs-1.14.1-26.el7.i686.rpm</filename><sum type="sha256">674322a17af34e54d0e6022696441e78a78d1d0798dae86db0d4878c14959c32</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3119" id="CVE-2016-3119" title="Krb5: Null Pointer Dereference In Kadmin" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3120" id="CVE-2016-3120" title="Krb5: S4U2Self Kdc Crash When Anon Is Restricted" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2591" id="RHSA-2016:2591-2" title="Rhsa-2016:2591-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1135427" id="1135427" title="Kadmin.Local -Q With Wrong Value In -E Option Doesn'T Return Nonzero  Return Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1146945" id="1146945" title="Rfe: Kerberos Should Support Dropping Configuration Snippets To /Etc/ And /Usr" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1183058" id="1183058" title="Krb5-Server Requires Systemd-Sysv When It Shouldn'T Need To" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1247261" id="1247261" title="Ksu Asks For Password Even If Called By Root" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1256735" id="1256735" title="Krb5Kdc.Log File Is World-Readable On Ipa" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1283902" id="1283902" title="Remove Krb5-Server Dependency On Initscripts Unless It Is Needed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1284987" id="1284987" title="Please Backport Fix For Interposer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290239" id="1290239" title="Update Krb5 Spec File With Changes Made In Fedora" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1292153" id="1292153" title="Rebase Krb5 To 1.14.X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1296241" id="1296241" title="Chrome Crash In Spnego_Gss_Inquire_Context()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297591" id="1297591" title="[Backport] Fix Some Uses Of Installed Files In The Test Suite" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1313457" id="1313457" title="Krb5 Selinux Patch Leaks Memory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314493" id="1314493" title="Skip Unnecessary Mech Calls In Gss_Inquire_Cred" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319616" id="1319616" title="Krb5: Null Pointer Dereference In Kadmin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1340304" id="1340304" title="Otp Module Incorrectly Overwrites As_Key" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349042" id="1349042" title="Incorrect Length Calculation In Libkrad" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361050" id="1361050" title="Krb5: S4U2Self Kdc Crash When Anon Is Restricted" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1363690" id="1363690" title="Ssh Login Permission Denied When Ldap/Krb5 Is Enabled Via Authconfig" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1364993" id="1364993" title="Ms-Kkdcp With Tls Sni Requires Http Host Header" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2592-2</id><title>Subscription-Manager</title><description>* It was found that subscription-manager set weak permissions on files in /var/lib/rhsm/, causing an information disclosure. A local, unprivileged user could use this flaw to access sensitive data that could potentially be used in a social engineering attack. (CVE-2016-4455)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-01-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="subscription-manager-plugin-ostree" release="1.sl7" src="subscription-manager-1.17.15-1.sl7.src.rpm" version="1.17.15"><filename>subscription-manager-plugin-ostree-1.17.15-1.sl7.x86_64.rpm</filename><sum type="sha256">b63525a15147613dfb9700c26177e63335c120131fce359f92fa83d1f1142a26</sum></package><package arch="x86_64" name="python-rhsm" release="1.el7" src="python-rhsm-1.17.9-1.el7.src.rpm" version="1.17.9"><filename>python-rhsm-1.17.9-1.el7.x86_64.rpm</filename><sum type="sha256">d4149ee88f2aa6baee30e2098b5387ff2e72de2ce6b5181458179d9dfef22139</sum></package><package arch="x86_64" name="subscription-manager-initial-setup-addon" release="1.sl7" src="subscription-manager-1.17.15-1.sl7.src.rpm" version="1.17.15"><filename>subscription-manager-initial-setup-addon-1.17.15-1.sl7.x86_64.rpm</filename><sum type="sha256">76bb3f8211637a22a212baf4129be4fee4c12be2441de7d772495fd17dff3812</sum></package><package arch="x86_64" name="subscription-manager" release="1.sl7" src="subscription-manager-1.17.15-1.sl7.src.rpm" version="1.17.15"><filename>subscription-manager-1.17.15-1.sl7.x86_64.rpm</filename><sum type="sha256">8b26c7d89b59d55ddd4759c6a8f0719f44e819fb9329430826bcef871f7073b5</sum></package><package arch="x86_64" name="subscription-manager-plugin-container" release="1.sl7" src="subscription-manager-1.17.15-1.sl7.src.rpm" version="1.17.15"><filename>subscription-manager-plugin-container-1.17.15-1.sl7.x86_64.rpm</filename><sum type="sha256">67a5c3a32e422ab2e43729f2f6abc99b9179bcafcf9a06d35f1a9395e768263b</sum></package><package arch="x86_64" name="subscription-manager-gui" release="1.sl7" src="subscription-manager-1.17.15-1.sl7.src.rpm" version="1.17.15"><filename>subscription-manager-gui-1.17.15-1.sl7.x86_64.rpm</filename><sum type="sha256">82a47c9fbcd159aa235e072ecf50c5dacbc7e844ef76c8ae1ee4523b9405c734</sum></package><package arch="x86_64" name="python-rhsm-certificates" release="1.el7" src="python-rhsm-1.17.9-1.el7.src.rpm" version="1.17.9"><filename>python-rhsm-certificates-1.17.9-1.el7.x86_64.rpm</filename><sum type="sha256">af9b0755768efd2dd596535857d2a4e5300b46186f0fd4a07e40e140a48c33c2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4455" id="CVE-2016-4455" title="Subscription-Manager: Sensitive World Readable Files In /Var/Lib/Rhsm/" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2592" id="RHSA-2016:2592-2" title="Rhsa-2016:2592-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1104332" id="1104332" title="[Rfe] Separate Out The Rhsm Certs Into A Separate Rpm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1251516" id="1251516" title="Traceback On Removing An Import Cert From 'My Subs In Gui'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1257179" id="1257179" title="Subscription-Manager-Initial-Setup-Addon - &quot;Cancel&quot; Button Does Nothing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1262919" id="1262919" title="Exceptions From Connection.Restlibexception During Autosubscribe Should Be Printed To System Error" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1264108" id="1264108" title="The Red Warning Message In Subscription-Manager-Initial-Setup-Addon Should Disappear When Clicking Cancel/Back" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1264470" id="1264470" title="Various Rhel7 Channel Maps To Product Certs Are Missing In Subscription-Manager-Migration-Data" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1264964" id="1264964" title="Subscription-Manager Package Profile Submission Is Sending Profiles With Uuid=None To Sle Endpoint" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1268043" id="1268043" title="Back Button On First Panel Of Subscription-Manager-Gui Workflow Has No Effect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1268094" id="1268094" title="Traceback In Subscription-Manager-Gui From My Subscriptions Tab" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1268307" id="1268307" title="At The End Of Auto Attach, The Back Button Does Nothing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1306004" id="1306004" title="The Cmd &quot;Repos --List --Proxy&quot; With A Fake Proxy Server Url Will Not Stop Running." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315901" id="1315901" title="Stacktrace Displayed When Running Rct Against An Inaccessible File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1325083" id="1325083" title="Available Subscriptions Can Not Be Sorted  By Number In Subscription-Manager-Gui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328553" id="1328553" title="Rebase Subscription-Manager Component To The Latest Upstream Branch For Rhel 7.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328555" id="1328555" title="Rebase Python-Rhsm Component To The Latest Upstream Branch For Rhel 7.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328559" id="1328559" title="Rebase Subscription-Manager-Migration-Data Component To The Latest Upstream Branch For Rhel 7.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328579" id="1328579" title="Subscription-Manager-Migration-Data For Rhel7.3 Needs Rhel7.3 Product Certs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328609" id="1328609" title="Missing Rhn Channel Mappings To Ppc64Le Product Certs For Product Id 279" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328628" id="1328628" title="Rhel-X86_64-Server-7-Ost-7 Channel Maps Are Absent From Channel-Cert-Mapping.Txt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328729" id="1328729" title="Docker Client Doesn'T Link Entitlements Certs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329397" id="1329397" title="Rhsmcertd Healinglib Variable 'Valid_Tomorrow' Referenced Before Assignment" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330021" id="1330021" title="Initial-Setup : No Error Message Is Thrown When User Clicks On Register Button Without Entering Credentials" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330054" id="1330054" title="&quot;Default&quot; Server Url Is Not Configuring  The Port And Prefix Details" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330515" id="1330515" title="Traceback On The Terminal When Used Ctrl+C To Kill The Subscription-Manager-Gui Application" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333545" id="1333545" title="Rhel-X86_64-Server-7-Rhevh Channel Maps Are Absent From Channel-Cert-Mapping.Txt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333904" id="1333904" title="Subscription-Manager-Gui'S Combo &quot;Service Level Preferences&quot; Does Not Change It'S Name If Some Value Is Choosen From At-Spi Perspective" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333906" id="1333906" title="Subscription-Manager-Gui'S Combo &quot;Release Version&quot; Does Not Change It'S Name If Some Value Is Choosen From At-Spi Perspective" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334916" id="1334916" title="Yum Plugins Reconfigure Root Logger" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335371" id="1335371" title="Despite An &quot;Insufficient&quot; Subscription Status, The Gui Is Blocked From Auto-Subscribing By &quot;No Need To Update Subscriptions&quot; Message." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335537" id="1335537" title="Typo In &quot;Proxy Connnection Failed, Please Check Your Settings.&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1336428" id="1336428" title="Rhsm-Icon -I Fails With Libnotify-Critical And  Glib-Gobject-Critical Errors" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1336880" id="1336880" title="[Rfe] Update The 'Rct' Command To Expose The Virt_Limit Attribute To Determine If Virt-Who Is Needed For The Deployment." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1336883" id="1336883" title="[Rfe] Update The 'Rct' Command To Allow Not Outputting Content-Set Data" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1340135" id="1340135" title="Zanata Translations For Subscription-Manager 1.17 Are Not 100%" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1340525" id="1340525" title="Subscription-Manager: Sensitive World Readable Files In /Var/Lib/Rhsm/" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1345962" id="1345962" title="Unbound Method Endheaders() Must Be Called With Httpsconnection Instance As First Argument (Got Rhsmproxyhttpsconnection Instance Instead)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346417" id="1346417" title="[Rfe] Allow Users To Set Socket Timeout." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349533" id="1349533" title="Rhel-X86_64-Server-7-Ost-8 Channel Maps Are Absent From Channel-Cert-Mapping.Txt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349538" id="1349538" title="Rhel-X86_64-Server-7-Rh-Gluster-3-Client Channel Maps Are Absent From Channel-Cert-Mapping.Txt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349584" id="1349584" title="Rhn Rhel Channels 'Rhel-X86_64-&lt;Variant&gt;-7-Thirdparty-Oracle-Java' Map To A '7.2' Version Cert; Should Be '7.3'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349592" id="1349592" title="Rhn Rhel Channels 'Rhel-X86_64-&lt;Variant&gt;-7-Thirdparty-Oracle-Java-Beta' Map To A '7.2' Version Cert; Should Be '7.3 Beta'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351370" id="1351370" title="[Error] Subscription-Manager:31276 @Dbus_Interface.Py:60 - Org.Freedesktop.Dbus.Python.Oserror: Traceback" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1353662" id="1353662" title="Attributeerror: 'Identity' Object Has No Attribute 'Keypath'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1354653" id="1354653" title="Rhel-S390X-Server-Ha-7-Beta Channel Maps Are Absent From Channel-Cert-Mapping.Txt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1354655" id="1354655" title="Rhel-S390X-Server-Rs-7-Beta Channel Maps Are Absent From Channel-Cert-Mapping.Txt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1360909" id="1360909" title="Clients Unable To Access Newly Released Content (Satellite 6.2 Ga)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1365280" id="1365280" title="Default_Log_Level In Rhsm.Conf Should Be Info To Honor Bug 1266935" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1366055" id="1366055" title="Man Page For Rhsm.Conf Is Missing Info On New [Logging] Section" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1366301" id="1366301" title="Subscription-Manager Refresh Causes: Server Error Attempting A Put To /Subscription/Consumers/&lt;Uuid&gt;/Certificates?Lazy_Regen=True Returned Status 404" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1366747" id="1366747" title="Rhn Channel Mapping File '/Usr/Share/Rhsm/Product/Rhel-7/Channel-Cert-Mapping.Txt' Does Not Account For Rhn Base Channel 'Rhel-Ppc64Le-Server-7'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1366799" id="1366799" title="Failed To Use Host Entitlement In Containers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367243" id="1367243" title="'Resource Not Found On The Server' When Running 'Subscription-Manager Refresh'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367657" id="1367657" title="An Empty Error Dialog Message Can Appear In Subscription-Manager-Gui When The Server Response Message Contains A Pair Of &lt; &gt;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369522" id="1369522" title="Rct Cat-Manifest Is Not Bash-Completing New Option --No-Content" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1372673" id="1372673" title="Checking &quot;Manually Attach Subscriptions After Registration&quot; Hangs The Initial-Setup Screen In &quot;Registering&quot; State For Ever" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=874735" id="874735" title="[Rfe] Network Interface Collection/Facts Do Not Support Multiple Address Per Interface" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2593-2</id><title>Sudo</title><description>Security Fix(es): 
* It was discovered that the default sudo configuration preserved the value of INPUTRC from the user's environment, which could lead to information disclosure. A local user with sudo access to a restricted program that uses readline could use this flaw to read content from specially formatted files with elevated privileges provided by sudo. (CVE-2016-7091) 
Note: With this update, INPUTRC was removed from the env_keep list in /etc/sudoers to avoid having sudo preserve the value of this variable when invoking privileged commands. 
Additional Changes:</description><severity>low</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="sudo-devel" release="20.el7" src="sudo-1.8.6p7-20.el7.src.rpm" version="1.8.6p7"><filename>sudo-devel-1.8.6p7-20.el7.x86_64.rpm</filename><sum type="sha256">216277d5d893b8aaa1fa69bcf2116558743d172b8db940be7a2de0d27159d22e</sum></package><package arch="i686" name="sudo-devel" release="20.el7" src="sudo-1.8.6p7-20.el7.src.rpm" version="1.8.6p7"><filename>sudo-devel-1.8.6p7-20.el7.i686.rpm</filename><sum type="sha256">f8287de560dd760af9fe8e7893b1783679b6bf251340f258dd6fdeef5be530ec</sum></package><package arch="x86_64" name="sudo" release="20.el7" src="sudo-1.8.6p7-20.el7.src.rpm" version="1.8.6p7"><filename>sudo-1.8.6p7-20.el7.x86_64.rpm</filename><sum type="sha256">a37f1869cf693cc4201b7f6db57094f5edea13e80f8f55a3905033de8d0dacbe</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7091" id="CVE-2016-7091" title="Sudo: Possible Info Leak Via Inputrc" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2593" id="RHSA-2016:2593-2" title="Rhsa-2016:2593-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1196451" id="1196451" title="Default Requiretty Is Problematic And Breaks Valid Usage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1261998" id="1261998" title="Visudo Accept Non Valid Content" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1268958" id="1268958" title="Sudo - Cmnd_No_Wait Can Cause Child Processes To Ignore Sigpipe" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334360" id="1334360" title="Sudo Option Mail_No_User Doesn'T Work" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1339935" id="1339935" title="Sudo: Possible Info Leak Via Inputrc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1350828" id="1350828" title="[Rhel7] Visudo Ignores -Q Flag" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2594-2</id><title>389-Ds-Base</title><description>The following packages have been upgraded to a newer upstream version: 389 -ds-base (1.3.5.10). 
Security Fix(es): 
* It was found that 389 Directory Server was vulnerable to a flaw in which the default ACI (Access Control Instructions) could be read by an anonymous user. This could lead to leakage of sensitive information. (CVE-2016-5416) 
* An information disclosure flaw was found in 389 Directory Server. A user with no access to objects in certain LDAP sub-tree could send LDAP ADD operations with a specific object name. The error message returned to the user was different based on whether the target object existed or not. (CVE-2016-4992) 
* It was found that 389 Directory Server was vulnerable to a remote password disclosure via timing attack. A remote attacker could possibly use this flaw to retrieve directory server password after many tries. (CVE-2016-5405) 
The CVE-2016-5416 issue was discovered by Viktor Ashirov (Red Hat); the CVE-2016-4992 issue was discovered by Petr Spacek (Red Hat) and Martin Basti (Red Hat); and the CVE-2016-5405 issue was discovered by William Brown (Red Hat). 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base" release="11.el7" src="389-ds-base-1.3.5.10-11.el7.src.rpm" version="1.3.5.10"><filename>389-ds-base-1.3.5.10-11.el7.x86_64.rpm</filename><sum type="sha256">a8d37280b2ef6278219c04a035dc99106bb63674776e3918a5d9d2c7a434aa6e</sum></package><package arch="x86_64" name="389-ds-base-devel" release="11.el7" src="389-ds-base-1.3.5.10-11.el7.src.rpm" version="1.3.5.10"><filename>389-ds-base-devel-1.3.5.10-11.el7.x86_64.rpm</filename><sum type="sha256">299c76a64490426cc9dbc20713a25833070bede25df3144d8c2a60d231f02d23</sum></package><package arch="x86_64" name="389-ds-base-snmp" release="11.el7" src="389-ds-base-1.3.5.10-11.el7.src.rpm" version="1.3.5.10"><filename>389-ds-base-snmp-1.3.5.10-11.el7.x86_64.rpm</filename><sum type="sha256">025f78027a16abd9ecb9b4d8977701a60311b1895ab09328e0b742098c7fbeff</sum></package><package arch="x86_64" name="389-ds-base-libs" release="11.el7" src="389-ds-base-1.3.5.10-11.el7.src.rpm" version="1.3.5.10"><filename>389-ds-base-libs-1.3.5.10-11.el7.x86_64.rpm</filename><sum type="sha256">12ff708f0c69cf220657bc1ceb0794eb56df49192c1a2485c6aae88eb681a349</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4992" id="CVE-2016-4992" title="389-Ds-Base: Information Disclosure Via Repeated Use Of Ldap Add Operation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5405" id="CVE-2016-5405" title="389-Ds-Base: Password Verification Vulnerable To Timing Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5416" id="CVE-2016-5416" title="389-Ds-Base: Aci Readable By Anonymous User" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2594" id="RHSA-2016:2594-2" title="Rhsa-2016:2594-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1018944" id="1018944" title="[Rfe] Enhance Password Change Tracking" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1143066" id="1143066" title="[Rfe] The Dirsrv User/Group Should Be Created In Rpm %Pre, And Ideally With Fixed Uid/Gid" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1160902" id="1160902" title="Search, Matching Rules And Filter Error &quot;Unsupported Type 0Xa9&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1196282" id="1196282" title="Substring Index With Nssubstrbegin: 1 Is Not Being Used With Filters Like (Attr=X*)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1209128" id="1209128" title="[Rfe] Add A Utility To Get The Status Of Directory Server Instances" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1210842" id="1210842" title="Add Pidfile Option To Systemd Service File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1223510" id="1223510" title="Nsslapd-Maxbersize Should Be Ignored In Replication" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1229799" id="1229799" title="389-Ds-Base: Ldclt-Bin Killed By Sigsegv" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1249908" id="1249908" title="No Validation Check For The Value For Nsslapd-Db-Locks." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1254887" id="1254887" title="No Man Page Entry For - Option '-U' Of Dbgen.Pl For Adding Group Entries With Uniquemembers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1255557" id="1255557" title="Db2Index Creates Index Entry From Deleted Records" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1257568" id="1257568" title="/Usr/Lib64/Dirsrv/Libnunc-Stans.So Is Owned By Both -Libs And -Devel" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1258610" id="1258610" title="Total Update Request Must Not Be Lost" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1258611" id="1258611" title="Dna Plugin Needs To Handle Binddn Groups For Authorization" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1259950" id="1259950" title="Add Config Setting To Memberof Plugin To Add Required Objectclass Got Memberof Attribute" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1266510" id="1266510" title="Linked Attributes Plug-In - Wrong Behaviour When Adding Valid And Broken Links" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1266532" id="1266532" title="Linked Attributes Plug-In - Won'T Update Links After Modrdn Operation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1267750" id="1267750" title="Pagedresults - When Timed Out, Search Results Could Have Been Already Freed." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269378" id="1269378" title="Ds-Logpipe.Py With Wrong Arguments - Python Exception In The Output" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1270020" id="1270020" title="Rebase 389-Ds-Base To 1.3.5 In Rhel-7.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1271330" id="1271330" title="Nunc-Stans: Attempt To Release Connection That Is Not Acquired" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273142" id="1273142" title="Crash In Managed Entry Plugin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273549" id="1273549" title="[Rfe] Improve Timestamp Resolution In Logs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273550" id="1273550" title="Deadlock Between Two Mods On The Same Entry Between Entry Cache And Backend Lock" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273555" id="1273555" title="Deadlock In Mep Delete Post Op" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1275763" id="1275763" title="[Rfe] Add Setup-Ds.Pl Option To Disable Instance Specific Scripts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278567" id="1278567" title="Simplepagedresults -- Abandon Could Happen Between The Abandon Check And Sending Results" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278584" id="1278584" title="Share Nsslapd-Threadnumber In The Case Nunc-Stans Is Enabled, As Well." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278755" id="1278755" title="Deadlock On Connection Mutex" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278987" id="1278987" title="Cannot Upgrade A Consumer To Supplier In A Multimaster Environment" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1280123" id="1280123" title="Acl - Regression - Trailing ', (Comma)' In Macro Matched Value Is Not Removed." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1280456" id="1280456" title="Setup-Ds Should Detect If Port Is Already Defined" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1288229" id="1288229" title="Many Attrlist_Replace Errors In Connection With Cleanallruv" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290101" id="1290101" title="Proxyauth Support Does Not Work When Bound As Directory Manager" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290111" id="1290111" title="[Rfe] Support For Rfc3673 '+' To Return Operational Attributes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290141" id="1290141" title="With Exhausted Range, Part Of Dna Shared Configuration Is Deleted After Server Restart" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290242" id="1290242" title="Simplepagedresults -- In The Search Error Case, Simple Paged Results Slot Was Not Released." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290600" id="1290600" title="The 'Eq' Index Does Not Get Updated Properly When Deleting And Re-Adding Attributes In The Same Ldapmodify Operation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1296310" id="1296310" title="Ldclt - Segmentation Fault Error While Binding" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301097" id="1301097" title="Logconv.Pl Displays Negative Operation Speeds" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302823" id="1302823" title="Crash In Slapi_Get_Object_Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1303641" id="1303641" title="Heap Corruption At Schema Replication." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1303794" id="1303794" title="Import Readnsstate.Py From Richm'S Repo" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1304682" id="1304682" title="&quot;Stale&quot; Automember Rule (Associated To A Removed Group) Causes Discrepancies In The Database" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1307151" id="1307151" title="Keep Alive Entries Can Break Replication" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1310848" id="1310848" title="Supplier Can Skip A Failing Update, Although It Should Retry." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312557" id="1312557" title="Dirsrv Service Fails To Start When Nsslapd-Listenhost Is Configured" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314557" id="1314557" title="Change Severity Of Some Messages Related To &quot;Keep Alive&quot; Entries" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314956" id="1314956" title="Moving An Entry Cause Next On-Line Init To Skip Entry Has No Parent, Ending At Line 0 Of File &quot;(Bulk Import)&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315893" id="1315893" title="License Tag Does Not Match Actual License Of Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1316328" id="1316328" title="Search Returns No Entry  When Or Filter Component Contains Non Readable Attribute" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1316580" id="1316580" title="Dirsrv Service Doesn'T Ask For Pin When Pin.Txt Is Missing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1316731" id="1316731" title="Syncrepl Search Returning Error 329; Plugin Sending A Bad Error Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1316741" id="1316741" title="Ldctl Should Support -H  With Ldap Uris" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1316742" id="1316742" title="No Plugin Calls In Tombstone Purging" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319329" id="1319329" title="Add Nsslapd-Auditlog-Logging-Enabled: Off To Template-Dse.Ldif" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320295" id="1320295" title="If Nsssl3 Is On, Even If Ssl V3 Is Not Really Enabled, A Confusing Message Is Logged." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320715" id="1320715" title="Des To Aes Password Conversion Fails If A Backend Is Empty" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1321124" id="1321124" title="Replication Changelog Can Incorrectly Skip Over Updates" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326077" id="1326077" title="Page Result Search Should Return Empty Cookie If There Is No Returned Entry" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326520" id="1326520" title="Db2Index Uses A Buffer Size Derived From Dbcachesize" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328936" id="1328936" title="Objectclass Values Could Be Dropped On The Consumer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329061" id="1329061" title="389-Ds-Base-1.3.4.0-29.El7_2 &quot;Hang&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1331343" id="1331343" title="Paged Results Search Returns The Blank List Of Entries" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332533" id="1332533" title="Ns-Accountstatus.Pl Gives Error Message On Execution Along With Results." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1332709" id="1332709" title="Password History Is Not Updated When An Admin Resets The Password" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333184" id="1333184" title="(389-Ds-Base-1.3.5) Fixing Coverity Issues." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333515" id="1333515" title="Enable Ds To Offer Weaker Dh Params In Nss" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334455" id="1334455" title="Db2Ldif Is Not Taking Into Account Multiple Suffixes Or Backends" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335492" id="1335492" title="Modifier'S Name Is Not Recorded In The Audit Log With Modrdn And Moddn Operations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335618" id="1335618" title="Server Ram Sanity Checks Work In Isolation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338872" id="1338872" title="Wrong Result Code Display In Audit-Failure Log" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1340307" id="1340307" title="Running Db2Index With No Options Breaks Replication" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342609" id="1342609" title="At Startup Des To Aes Password Conversion Causes Timeout In Start Script" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1344414" id="1344414" title="[Rfe] Adding Pre/Post Extop Ability" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347760" id="1347760" title="389-Ds-Base: Information Disclosure Via Repeated Use Of Ldap Add Operation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349540" id="1349540" title="389-Ds-Base: Aci Readable By Anonymous User" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349571" id="1349571" title="Improve Mmr Replication Convergence" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349577" id="1349577" title="Values Of Dbcachetries/Dbcachehits In Cn=Monitor Could Overflow." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1350632" id="1350632" title="Ns-Slapd Shutdown Crashes If Pwdstorageschema Name Is From Stack." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1353592" id="1353592" title="Setup-Ds.Pl --Update Fails" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1353629" id="1353629" title="Ds Shuts Down Automatically If Dnathreshold Is Set To 0 In A Mmr Setup" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1353714" id="1353714" title="If A Cipher Is Disabled, Do Not Attempt To Look It Up" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1354374" id="1354374" title="Upgrade To 389-Ds-Base &gt;= 1.3.5.5 Doesn'T Install 389-Ds-Base-Snmp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1354660" id="1354660" title="Flow Control In Replication Also Blocks Receiving Results" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1355879" id="1355879" title="Nunc-Stans: Ns-Slapd Crashes During Startup With Sigill On Amd Opteron 280" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356261" id="1356261" title="Fixup Tombstone Task Needs To Set Proper Flag When Updating Tombstones" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358865" id="1358865" title="389-Ds-Base: Password Verification Vulnerable To Timing Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1360327" id="1360327" title="Remove-Ds.Pl Deletes An Instance Even If Wrong Prefix Was Specified" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1360447" id="1360447" title="Nsslapd-Workingdir Is Empty When Ns-Slapd Is Started By Systemd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361134" id="1361134" title="When Fine-Grained Policy Is Applied, A Sub-Tree Has A Priority Over A User While Changing Password" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361321" id="1361321" title="Duplicate Collation Entries" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1364190" id="1364190" title="Change Example In /Etc/Sysconfig/Dirsrv To Use Tcmalloc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1368520" id="1368520" title="Crash In Import_Wait_For_Space_In_Fifo()." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1368956" id="1368956" title="Man Page Of Ns-Accountstatus.Pl Shows Redundant Entries For -P Port Option" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369537" id="1369537" title="Passwordminage Attribute Doesn'T Limit The Minimum Age Of The Password" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369570" id="1369570" title="Cleanallruv Changelog Cleaning Incorrectly Impacts All Backends" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1370300" id="1370300" title="Set Proper Update Status To Replication Agreement In  Case Of Failure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1371283" id="1371283" title="Server Side Sorting Crashes The Server." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1371284" id="1371284" title="Disabling Clear Password Storage Scheme Will Crash Server When Setting A Password" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=190862" id="190862" title="[Rfe] Default Password Syntax Settings Don'T Work With Fine-Grained Policies" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2595-2</id><title>Mariadb</title><description>The following packages have been upgraded to a newer upstream version: mariadb (5.5.52). 
Security Fix(es): 
* It was discovered that the MariaDB logging functionality allowed writing to MariaDB configuration files. An administrative database user, or a database user with FILE privileges, could possibly use this flaw to run arbitrary commands with root privileges on the system running the database server. (CVE-2016-6662) 
* A race condition was found in the way MariaDB performed MyISAM engine table repair. A database user with shell access to the server running mysqld could use this flaw to change permissions of arbitrary files writable by the mysql system user. (CVE-2016-6663) 
(CVE-2016-3492, CVE-2016-5612, CVE-2016-5616, CVE-2016-5624, CVE-2016-5626, CVE-2016-5629, CVE-2016-8283) 
Additional Changes:</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="mariadb-test" release="1.el7" src="mariadb-5.5.52-1.el7.src.rpm" version="5.5.52"><filename>mariadb-test-5.5.52-1.el7.x86_64.rpm</filename><sum type="sha256">e121c57fde8fb6f6b9f27a6a43167526266a982d6308def9cb3021348d531417</sum></package><package arch="i686" epoch="1" name="mariadb-embedded-devel" release="1.el7" src="mariadb-5.5.52-1.el7.src.rpm" version="5.5.52"><filename>mariadb-embedded-devel-5.5.52-1.el7.i686.rpm</filename><sum type="sha256">c5bcb896c95f5fd4b48b4bec84db60f65be414c960eab3073189d8e144ecff23</sum></package><package arch="x86_64" epoch="1" name="mariadb" release="1.el7" src="mariadb-5.5.52-1.el7.src.rpm" version="5.5.52"><filename>mariadb-5.5.52-1.el7.x86_64.rpm</filename><sum type="sha256">45247ca599f97596514c363da9a27194c8f842f0e47b99c4892ac635d1f6ce24</sum></package><package arch="x86_64" epoch="1" name="mariadb-devel" release="1.el7" src="mariadb-5.5.52-1.el7.src.rpm" version="5.5.52"><filename>mariadb-devel-5.5.52-1.el7.x86_64.rpm</filename><sum type="sha256">2d3653e3a3eb8d337e9af5c98812bfd6c17904a397d2285b4c6fa22c107d5fc2</sum></package><package arch="i686" epoch="1" name="mariadb-devel" release="1.el7" src="mariadb-5.5.52-1.el7.src.rpm" version="5.5.52"><filename>mariadb-devel-5.5.52-1.el7.i686.rpm</filename><sum type="sha256">a9d469d22d5631a900c290791a6aab022db4e25548451fda8d46e62149ad1901</sum></package><package arch="x86_64" epoch="1" name="mariadb-embedded" release="1.el7" src="mariadb-5.5.52-1.el7.src.rpm" version="5.5.52"><filename>mariadb-embedded-5.5.52-1.el7.x86_64.rpm</filename><sum type="sha256">eea10cdac576571d694131ba46372281769e870bf0336c32020137785b89ad20</sum></package><package arch="i686" epoch="1" name="mariadb-embedded" release="1.el7" src="mariadb-5.5.52-1.el7.src.rpm" version="5.5.52"><filename>mariadb-embedded-5.5.52-1.el7.i686.rpm</filename><sum type="sha256">a543c388d357b8e8f6208c0d2e660a95ef3d6d2f20494205655c3c7b6500c643</sum></package><package arch="x86_64" epoch="1" name="mariadb-embedded-devel" release="1.el7" src="mariadb-5.5.52-1.el7.src.rpm" version="5.5.52"><filename>mariadb-embedded-devel-5.5.52-1.el7.x86_64.rpm</filename><sum type="sha256">136770968dc4c8be4f2b2f333308d639db8a6afef172ec033701f637041f5035</sum></package><package arch="x86_64" epoch="1" name="mariadb-server" release="1.el7" src="mariadb-5.5.52-1.el7.src.rpm" version="5.5.52"><filename>mariadb-server-5.5.52-1.el7.x86_64.rpm</filename><sum type="sha256">726bd1c1c30eda43ccad7691cc2f34db3e1877eced34e940ffc8965c31c2e6b1</sum></package><package arch="x86_64" epoch="1" name="mariadb-bench" release="1.el7" src="mariadb-5.5.52-1.el7.src.rpm" version="5.5.52"><filename>mariadb-bench-5.5.52-1.el7.x86_64.rpm</filename><sum type="sha256">5ec0a40853eac4e2a93f31a0e15c2b5487bf84c5b8123d087330b78d41d46fb8</sum></package><package arch="x86_64" epoch="1" name="mariadb-libs" release="1.el7" src="mariadb-5.5.52-1.el7.src.rpm" version="5.5.52"><filename>mariadb-libs-5.5.52-1.el7.x86_64.rpm</filename><sum type="sha256">4ace9d597810793883dce88ab9777421ee0380b6bfcc3bdfaafd74d35aae4dc9</sum></package><package arch="i686" epoch="1" name="mariadb-libs" release="1.el7" src="mariadb-5.5.52-1.el7.src.rpm" version="5.5.52"><filename>mariadb-libs-5.5.52-1.el7.i686.rpm</filename><sum type="sha256">92bf8042db11a488c02d55d259b9d08e1eb49c0a00f1256d8ae746b2652f0f79</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3492" id="CVE-2016-3492" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Optimizer (Cpu October 2016)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5612" id="CVE-2016-5612" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Dml (Cpu October 2016)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5616" id="CVE-2016-5616" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Myisam (Cpu October 2016)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5624" id="CVE-2016-5624" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Dml (Cpu October 2016)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5626" id="CVE-2016-5626" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Gis (Cpu October 2016)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5629" id="CVE-2016-5629" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Federated (Cpu October 2016)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6662" id="CVE-2016-6662" title="Mysql: General_Log Can Write To Configuration Files, Leading To Privilege Escalation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6663" id="CVE-2016-6663" title="Mysql: Race Condition While Setting Stats During Myisam Table Repair" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8283" id="CVE-2016-8283" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Types (Cpu October 2016)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2595" id="RHSA-2016:2595-2" title="Rhsa-2016:2595-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1138843" id="1138843" title="Dialog.So And Mysql_Clear_Password.So Should Be In Mariadb-Libs Package" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1241623" id="1241623" title="/Usr/Lib/Tmpfiles.D/Mariadb.Conf Is Overwritten When Mariadb Package Is Updated" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300621" id="1300621" title="Duplicate Key With Auto Increment" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335863" id="1335863" title="Non-Daemon Elf Binaries Are Compiled As Pie, But Without Full Relro" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1375198" id="1375198" title="Mysql: General_Log Can Write To Configuration Files, Leading To Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378936" id="1378936" title="Mysql: Race Condition While Setting Stats During Myisam Table Repair" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386554" id="1386554" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Optimizer (Cpu October 2016)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386561" id="1386561" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Dml (Cpu October 2016)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386562" id="1386562" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Myisam (Cpu October 2016)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386566" id="1386566" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Dml (Cpu October 2016)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386568" id="1386568" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Gis (Cpu October 2016)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386572" id="1386572" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Federated (Cpu October 2016)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386585" id="1386585" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Types (Cpu October 2016)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2596-2</id><title>Pcs</title><description>The following packages have been upgraded to a newer upstream version: pcs (0.9.152). 
Security Fix(es): 
* A Cross-Site Request Forgery (CSRF) flaw was found in the pcsd web UI. A remote attacker could provide a specially crafted web page that, when visited by a user with a valid pcsd session, would allow the attacker to trigger requests on behalf of the user, for example removing resources or restarting/removing nodes. (CVE-2016-0720) 
* It was found that pcsd did not invalidate cookies on the server side when a user logged out. This could potentially allow an attacker to perform session fixation attacks on pcsd. (CVE-2016-0721) 
These issues were discovered by Martin Prpic (Red Hat Product Security). 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pcs" release="10.sl7" src="pcs-0.9.152-10.sl7.src.rpm" version="0.9.152"><filename>pcs-0.9.152-10.sl7.x86_64.rpm</filename><sum type="sha256">5be9ce405e3010d7b36c456524faf801947def9d326c012de18ce5562b1d370a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0720" id="CVE-2016-0720" title="Pcs: Cross-Site Request Forgery In Web Ui" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0721" id="CVE-2016-0721" title="Pcs: Cookies Are Not Invalidated Upon Logout" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2596" id="RHSA-2016:2596-2" title="Rhsa-2016:2596-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1158500" id="1158500" title="Add Support For Utilization Attributes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1164402" id="1164402" title="Support For Sbd Configuration Is Needed In Pcs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207405" id="1207405" title="Rfe: Please Adjust Timeouts For Pcsd Check (Or Allow To Disable Them)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1219581" id="1219581" title="[Cli] Particular Help Screens Inconsistent In Indication Of Default Sub^N-Commands" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220512" id="1220512" title="Pcs Resource Cleanup Improvements" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1225423" id="1225423" title="Pcs Should Allow To Remove A Dead Node From A Cluster" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1225946" id="1225946" title="[Cli] Minor Cleanups In Built-In Documentation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1229822" id="1229822" title="[Rfe] Make &quot;Cluster Setup --Start&quot;, &quot;Cluster Start&quot; And &quot;Cluster Standby&quot; Support --Wait As Well" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1231858" id="1231858" title="Resource/Fence Agent Options Form Needs An Overhaul" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1248990" id="1248990" title="Specifying A Non-Existing Id In Acl Role Permission Produces An Invalid Cib" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1249085" id="1249085" title="'Pcs Resource Delete' Doesn'T Delete Resource Referenced In Acl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1252050" id="1252050" title="Rewrite Pcsd Launch Script" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1264360" id="1264360" title="Pcs Web Ui Doesn'T Indicate Unmanaged Resources" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1269242" id="1269242" title="Pcs Needs To Be Able To View Status And Config On Nodes That Are Not Part Of Any Cluster, But Have A Cib.Xml File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281364" id="1281364" title="Colocation Set Constraints Missing In Web Ui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281371" id="1281371" title="Cluster Properties Page In Web Ui Needs An Overhaul" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281391" id="1281391" title="Web Ui Lacks Ability To Move Resources Within A Resource Group" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1286664" id="1286664" title="Pcsd: Deleting Groups/Clones From Older Cluster Returns Internal Server Error" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1287320" id="1287320" title="When Referencing A Stonith/Resource Agent Without A Provider And The Fence/Resource Agents Fails To Get Metadata Causes Pcs To Traceback" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290512" id="1290512" title="Pcs Doesn'T Support Putting Pacemaker Remote Nodes Into Standby" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298585" id="1298585" title="[Rfe] Pcs Status Output Could Be Simpler When Constraints Are In Place" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299614" id="1299614" title="Pcs: Cross-Site Request Forgery In Web Ui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299615" id="1299615" title="Pcs: Cookies Are Not Invalidated Upon Logout" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299847" id="1299847" title="Pcs Rebase Bug For 7.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301993" id="1301993" title="[Rfe] Pcs Property List/Show Could Have A --Node Filter" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302010" id="1302010" title="Pcs Property Show &lt;Property&gt; Shows All Node Properties Unfiltered" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1303136" id="1303136" title="Cannot Create A New Resource With The Same Name Of A One Failed And Deleted Before, Until Cleanup" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305786" id="1305786" title="Unsanitized Input In Username Field On Login Page" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315357" id="1315357" title="[Packaging] Pcsd.Service Shipped Twice (Under Different Locations)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315652" id="1315652" title="Option To Disable Particular Tls Version And Ciphers With Pcsd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315743" id="1315743" title="[Packaging] /Etc/Sysconfig/Pcsd Is Not Marked As A Config File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327739" id="1327739" title="Need A Way To Set Expected Votes On A Live System" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1328066" id="1328066" title="[Cli] Pcs Makes A Disservice To Cib-Accumulate-And-Push Use Cases By Not Coping With &quot;Cib --Config&quot; File (Recommended!) Passed As &quot;-F &lt;File&gt;&quot; To Cib-Modifying Commands" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329472" id="1329472" title="Cannot Recreate Remote Node Resource" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1341114" id="1341114" title="[Packaging] Pcs Should Mark Known (Existing Or Not) %Config Files In The Spec (/Etc/Sysconfig/Pcsd, /Var/Lib/Pcsd/Tokens, ...)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1346852" id="1346852" title="[Gui] Bad Request When Resource Removal Takes Longer Than Pcs Expects" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349465" id="1349465" title="[Bash-Completion] Put It Under $(Pkg-Config --Variable=Completionsdir Bash-Completion) To Allow For Dynamic Loading" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1354498" id="1354498" title="[Cli] Pcs Should Except Keyboardinterrupt At Least Around Raw_Input Builtin Invocation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357945" id="1357945" title="[Clufter Integration] Clufter Is Distribution-Sensitive Wrt. New Features So Pass The Current One On Cluster.Conf/Corosync.Conf Match And Allow User'S Override" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1359154" id="1359154" title="Pcs Authentication Command Does Not Trigger Authentication Of Nodes Against Each Other" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1366307" id="1366307" title="[Pcsd] Badly Designed Usage Of Html Id Attributes May Cause Unexpected Behavior With Certain Resource Names" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2597-2</id><title>Firewalld</title><description>The following packages have been upgraded to a newer upstream version: firewalld (0.4.3.2). 
Security Fix(es): 
* A flaw was found in the way firewalld allowed certain firewall configurations to be modified by unauthenticated users. Any locally logged in user could use this flaw to tamper or change firewall settings. (CVE-2016-5410) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="firewalld" release="8.el7" src="firewalld-0.4.3.2-8.el7.src.rpm" version="0.4.3.2"><filename>firewalld-0.4.3.2-8.el7.noarch.rpm</filename><sum type="sha256">e36a72ff6a117d1542779f1f652255aeb04958881799154f8d0d0a91f48a40ee</sum></package><package arch="noarch" name="python-firewall" release="8.el7" src="firewalld-0.4.3.2-8.el7.src.rpm" version="0.4.3.2"><filename>python-firewall-0.4.3.2-8.el7.noarch.rpm</filename><sum type="sha256">03c5fff55f9b8c1cc0e147cca0641f26c628bbb89b232d86bf48786535e94d9c</sum></package><package arch="noarch" name="firewall-applet" release="8.el7" src="firewalld-0.4.3.2-8.el7.src.rpm" version="0.4.3.2"><filename>firewall-applet-0.4.3.2-8.el7.noarch.rpm</filename><sum type="sha256">cf88a3f664258b1ab736a7cd0dbb8064fed94b595fda0f4045f5d4ebb25a9bac</sum></package><package arch="noarch" name="firewall-config" release="8.el7" src="firewalld-0.4.3.2-8.el7.src.rpm" version="0.4.3.2"><filename>firewall-config-0.4.3.2-8.el7.noarch.rpm</filename><sum type="sha256">b7192f42b765cd97d918a1c476311ff6f26ac7f760f1abf2e27f5a6f314ff170</sum></package><package arch="noarch" name="firewalld-filesystem" release="8.el7" src="firewalld-0.4.3.2-8.el7.src.rpm" version="0.4.3.2"><filename>firewalld-filesystem-0.4.3.2-8.el7.noarch.rpm</filename><sum type="sha256">26749cffeb8b009305ed5d9a51482bd82a2efb2bbefada41ec2b65f783614b5c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5410" id="CVE-2016-5410" title="Firewalld: Firewall Configuration Can Be Modified By Any Logged In User" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2597" id="RHSA-2016:2597-2" title="Rhsa-2016:2597-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1066037" id="1066037" title="Firewall-Config Should Allow Unspecifying Zone Binding For Interface" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1136801" id="1136801" title="A Rule Added Into In_&lt;Zone&gt;_Allow Chain With 'Permanent Direct' Interface Doesn'T Exist After Reload" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1147500" id="1147500" title="Rfe: Add Command To Firewall-Cmd Showing Details Of A Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1147951" id="1147951" title="Firewall-Cmd Should Support A Default Logging Option." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1219717" id="1219717" title="Add Radius Tcp To Policy." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220196" id="1220196" title="Firewalld Missing Policies For Imap And Smtps" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220467" id="1220467" title="Option '--Quiet' Is Needed In Firewall-Offline-Cmd Command Line." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1237242" id="1237242" title="Error: Rt_To_Perm_Failed: Zone 'Dmz' : Zone_Conflict When Doing --Runtime-To-Permanent" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273296" id="1273296" title="[All_Lang][Firewalld] Translation Incomplete" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273888" id="1273888" title="Firewalld Defaultzone Change Breaking On --Reload" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281416" id="1281416" title="Headless Firewall-Config Over Ssh. Firewall-Config Missing Dependencies" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1285769" id="1285769" title="Fails To Start Without Ip6T_Rpfilter Module" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1292926" id="1292926" title="Firewalld --New-Service &amp; Malformed Xml ??" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1296573" id="1296573" title="Xsd Specification Nor Service Daemon Checks Whether Tags Are Specified More Than Once If They Must Not" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301573" id="1301573" title="Firewalld Reporting Errors In Logs For Failed Iptables Commands" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302802" id="1302802" title="Rebase To The New Upstream And New Release" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1303026" id="1303026" title="Firewalld - Mistake In &lt;Ports&gt; Renders Ports Remain Closed, Silently." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305434" id="1305434" title="Firewalld Hangs With A Nis Configuration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1313023" id="1313023" title="Command &quot;Systemctl Reload Firewalld&quot; Stops Firewalld" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1313845" id="1313845" title="Backport After=Dbus.Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1325335" id="1325335" title="[Rfe] Allow Negation Of Icmp-Blocks Zone Configuration Field" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326130" id="1326130" title="Firewalld Stops Traffic From/To 127.0.0.1 When Masquerading Is Enabled In Default Zone" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1326462" id="1326462" title="Rich Rule With Destination And No Element Give Error" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347530" id="1347530" title="Add Port For Corosync-Qnetd To High-Availability Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349903" id="1349903" title="Firewalld Fails To Parse Direct Rules With A Lot Of Destination Addresses" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357050" id="1357050" title="Exit Codes Don'T Match Error Messages In Firewall-Cmd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1360135" id="1360135" title="Firewalld: Firewall Configuration Can Be Modified By Any Logged In User" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1360894" id="1360894" title="Print Errors And Warnings To Stderr" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1365198" id="1365198" title="Firewall-Cmd Ipset --Add-Entries-From-File Broken" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367038" id="1367038" title="Firewall-Cmd Crashes If /Run/Dbus/System_Bus_Socket Does Not Exist" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1368949" id="1368949" title="Trying To Get The Description For A Firewalld Zone From Command Line Throws Error And Prints Traceback Information." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1371116" id="1371116" title="Load Helper Modules In Firewallzonetransaction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1373260" id="1373260" title="An Error In The Permanent Direct Rules Will Make All Other Direct Rules Using A Table Other Than The Filter Table Not Applicable." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1374799" id="1374799" title="Exclude Firewallctl From Firewalld V0.4.3.2 Update" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2598-2</id><title>Php</title><description>Security Fix(es): 
* A flaw was found in the way certain error conditions were handled by bzread() function in PHP. An attacker could use this flaw to upload a specially crafted bz2 archive which, when parsed via the vulnerable function, could cause the application to crash or execute arbitrary code with the permissions of the user running the PHP application. (CVE-2016-5399) 
* An integer overflow flaw, leading to a heap-based buffer overflow was found in the imagecreatefromgd2() function of PHP's gd extension. A remote attacker could use this flaw to crash a PHP application or execute arbitrary code with the privileges of the user running that PHP application using gd via a specially crafted GD2 image. (CVE-2016-5766) 
* An integer overflow flaw, leading to a heap-based buffer overflow was found in the gdImagePaletteToTrueColor() function of PHP's gd extension. A remote attacker could use this flaw to crash a PHP application or execute arbitrary code with the privileges of the user running that PHP application using gd via a specially crafted image buffer. (CVE-2016-5767) 
* A double free flaw was found in the mb_ereg_replace_callback() function of php which is used to perform regex search. This flaw could possibly cause a PHP application to crash. (CVE-2016-5768) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="php-pdo" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-pdo-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">72a374d410443f3a65aed3015719de510f68233cdafc44248f1bf7b2e7584fc3</sum></package><package arch="x86_64" name="php-mysqlnd" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-mysqlnd-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">d14c559c7698dbff740ab87ef1b3eaf556427d63c1618c87c5f6260852990c07</sum></package><package arch="x86_64" name="php-embedded" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-embedded-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">e28bde73717cae26e0b5045c54c8e047ca73f1b6aeccc574e1bc769deda085a1</sum></package><package arch="x86_64" name="php-pgsql" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-pgsql-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">f960fa22393ff828f7121d1447b2afb4fa7511de88e10f3a998e55b7fb67c70f</sum></package><package arch="x86_64" name="php-xml" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-xml-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">731f93baae78f8e791e4540f77b5b03093cfb0ca61f69e1ce4b8c390a7288258</sum></package><package arch="x86_64" name="php-common" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-common-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">274073d3aeea94eaa885cc0c180db79de4a86726cf3492d3a42d41214444f0df</sum></package><package arch="x86_64" name="php-pspell" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-pspell-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">be8f1b3b351f1b48f8d0304c8cfe0d91d7b2791dcd74d073d2550b283f6a46b6</sum></package><package arch="x86_64" name="php-mbstring" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-mbstring-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">b3c288531f7b29c0f304828eb168fa02f44cb649e1ef3386a7d041cae96c2ded</sum></package><package arch="x86_64" name="php-snmp" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-snmp-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">9f8f7ff59d0536557b05e397d2c054c6b8994d9f42cbadc008f3ff51572427fd</sum></package><package arch="x86_64" name="php-ldap" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-ldap-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">b069fdaaa00f36a21a7eb74761d0f50b52a1b115c8388114d5d3ea12ce955c2f</sum></package><package arch="x86_64" name="php-odbc" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-odbc-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">6af244e1310efcfdf6ef463dd150abc6bc6d4000a861ca106fb9556e4243a462</sum></package><package arch="x86_64" name="php-intl" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-intl-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">36e4630f4a2892b1a782488ce41181162607f30de6839fedfe4bc4c50f4cb4bb</sum></package><package arch="x86_64" name="php-bcmath" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-bcmath-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">b35562eaf46c91ff07b69796d60af0dc81b7364d5feabd3f748bb80a2c5057b3</sum></package><package arch="x86_64" name="php-xmlrpc" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-xmlrpc-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">0e7a9dadf70b694fbddd538bed24b9cd713ffcd09f00948e4304c4bc2f516338</sum></package><package arch="x86_64" name="php-mysql" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-mysql-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">5b86dc16709d191e2b492f7b78d2673b8084aebd6e2e79832007e16c2b54b6a4</sum></package><package arch="x86_64" name="php" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">6534096381b3d5a970f8d81b3adcbb7e4ae9d7b4569a30c34e34c583373335b3</sum></package><package arch="x86_64" name="php-soap" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-soap-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">aa6f4bc7f432702625a2e597e3933e703f77d1486de9acfe970f6d3b0699b870</sum></package><package arch="x86_64" name="php-enchant" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-enchant-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">914ad3aea0ade9e5b24302eb3281f1a63403708666c3890eaec4acc42b1e3743</sum></package><package arch="x86_64" name="php-process" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-process-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">2677a4d3306787069e3e5503a9c975174c8a36709ec760bfba3058c0c18a33c6</sum></package><package arch="x86_64" name="php-recode" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-recode-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">c83b1dcc029bb1fe235951e39ba160a2b0b05f6861ea555f95446350e5be723e</sum></package><package arch="x86_64" name="php-gd" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-gd-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">0b4bb305173fe5d56c360f474593efe3acf52982f74e69a3310127a65edcbec5</sum></package><package arch="x86_64" name="php-devel" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-devel-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">74f48a248954126e9bcf2e3353b6d2bc65922ae1984a7797aff839a36f9859ef</sum></package><package arch="x86_64" name="php-cli" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-cli-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">24ccc034cecc8d2c3174e377c8cd2dad12e0ca0627182c4e13d2402ebbd14db9</sum></package><package arch="x86_64" name="php-dba" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-dba-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">fd3da7ec5c3acd746ec44c122902a34cd0f3f7ad045d39aa207fbbb8c2d3fcd5</sum></package><package arch="x86_64" name="php-fpm" release="42.el7" src="php-5.4.16-42.el7.src.rpm" version="5.4.16"><filename>php-fpm-5.4.16-42.el7.x86_64.rpm</filename><sum type="sha256">5a5a6bc0027a3b030d4292174a441fb122e9dfff8a28447cf75008a9e857dd2d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5399" id="CVE-2016-5399" title="Php: Improper Error Handling In Bzread()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5766" id="CVE-2016-5766" title="Gd: Integer Overflow In _Gd2Getheader() Resulting In Heap Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5767" id="CVE-2016-5767" title="Gd: Integer Overflow In Gdimagepalettetotruecolor() Resulting In Heap Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5768" id="CVE-2016-5768" title="Php: Double Free In _Php_Mb_Regex_Ereg_Replace_Exec" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2598" id="RHSA-2016:2598-2" title="Rhsa-2016:2598-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1073388" id="1073388" title="Ext/Openssl: Default_Md Algo Is Md5" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1131979" id="1131979" title="Segfault Running Zendframework Test Suite (Php_Wddx_Serialize_Var)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1289457" id="1289457" title="Httpd Segfault In Php_Module_Shutdown When Opcache Loaded Twice" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291667" id="1291667" title="No Tls1.1 Or Tls1.2 Support For Php Curl Module" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297179" id="1297179" title="Php Crashes With [Core:Notice] [Pid 3864] Ah00052: Child Pid 95199 Exit Signal Segmentation Fault (11)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1344578" id="1344578" title="Segmentation Fault While Header_Register_Callback" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351068" id="1351068" title="Gd: Integer Overflow In _Gd2Getheader() Resulting In Heap Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351069" id="1351069" title="Gd: Integer Overflow In Gdimagepalettetotruecolor() Resulting In Heap Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351168" id="1351168" title="Php: Double Free In _Php_Mb_Regex_Ereg_Replace_Exec" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358395" id="1358395" title="Php: Improper Error Handling In Bzread()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2599-2</id><title>Tomcat</title><description>The following packages have been upgraded to a newer upstream version: tomcat (7.0.69). 
Security Fix(es): 
* A CSRF flaw was found in Tomcat's the index pages for the Manager and Host Manager applications. These applications included a valid CSRF token when issuing a redirect as a result of an unauthenticated request to the root of the web application. This token could then be used by an attacker to perform a CSRF attack. (CVE-2015-5351) 
* It was found that several Tomcat session persistence mechanisms could allow a remote, authenticated user to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that placed a crafted object in a session. (CVE-2016-0714) 
* A security manager bypass flaw was found in Tomcat that could allow remote, authenticated users to access arbitrary application data, potentially resulting in a denial of service. (CVE-2016-0763) 
* A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092) 
* A directory traversal flaw was found in Tomcat's RequestUtil.java. A remote, authenticated user could use this flaw to bypass intended SecurityManager restrictions and list a parent directory via a '/..' in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call. (CVE-2015-5174) 
* It was found that Tomcat could reveal the presence of a directory even when that directory was protected by a security constraint. A user could make a request to a directory via a URL not ending with a slash and, depending on whether Tomcat redirected that request, could confirm whether that directory existed. (CVE-2015-5345) 
* It was found that Tomcat allowed the StatusManagerServlet to be loaded by a web application when a security manager was configured. This allowed a web application to list all deployed web applications and expose sensitive information such as session IDs. (CVE-2016-0706) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcat-admin-webapps" release="10.el7" src="tomcat-7.0.69-10.el7.src.rpm" version="7.0.69"><filename>tomcat-admin-webapps-7.0.69-10.el7.noarch.rpm</filename><sum type="sha256">20a89ebb0fd66fa18aab813d3ff63a967e2a61697e947836bb9a74e54c55626a</sum></package><package arch="noarch" name="tomcat" release="10.el7" src="tomcat-7.0.69-10.el7.src.rpm" version="7.0.69"><filename>tomcat-7.0.69-10.el7.noarch.rpm</filename><sum type="sha256">12edbf67e52da38b670b51ba7f58bff96a8bdf8671c96e1be4c1206893f0a647</sum></package><package arch="noarch" name="tomcat-lib" release="10.el7" src="tomcat-7.0.69-10.el7.src.rpm" version="7.0.69"><filename>tomcat-lib-7.0.69-10.el7.noarch.rpm</filename><sum type="sha256">d28354f6aa28ace029fddbf1d4b6ca53926caaef8f7a6febdb61f08e5ea9dd42</sum></package><package arch="noarch" name="tomcat-webapps" release="10.el7" src="tomcat-7.0.69-10.el7.src.rpm" version="7.0.69"><filename>tomcat-webapps-7.0.69-10.el7.noarch.rpm</filename><sum type="sha256">c4e8cd03724dce3564c2e4e615d57949ef453b7b168f2a121630c67c7447ecf6</sum></package><package arch="noarch" name="tomcat-jsvc" release="10.el7" src="tomcat-7.0.69-10.el7.src.rpm" version="7.0.69"><filename>tomcat-jsvc-7.0.69-10.el7.noarch.rpm</filename><sum type="sha256">e703fd08a3e3a7d18316f02709601288e2568be076ca1bbe3a65ca7c169ccaf2</sum></package><package arch="noarch" name="tomcat-jsp-2.2-api" release="10.el7" src="tomcat-7.0.69-10.el7.src.rpm" version="7.0.69"><filename>tomcat-jsp-2.2-api-7.0.69-10.el7.noarch.rpm</filename><sum type="sha256">0de8f59fc31baf2ed1735f3dcf61fb1dcf72ed3afb8ce1ee9792254de78d284f</sum></package><package arch="noarch" name="tomcat-servlet-3.0-api" release="10.el7" src="tomcat-7.0.69-10.el7.src.rpm" version="7.0.69"><filename>tomcat-servlet-3.0-api-7.0.69-10.el7.noarch.rpm</filename><sum type="sha256">e27724b6995d49c71c972e97dbde475aba380698e188d5526ebc615e9a4e88f6</sum></package><package arch="noarch" name="tomcat-javadoc" release="10.el7" src="tomcat-7.0.69-10.el7.src.rpm" version="7.0.69"><filename>tomcat-javadoc-7.0.69-10.el7.noarch.rpm</filename><sum type="sha256">d7cdceb1069074c95b179bbfaf9e268d7b00589d1d342b8ce5041d13054a79d8</sum></package><package arch="noarch" name="tomcat-el-2.2-api" release="10.el7" src="tomcat-7.0.69-10.el7.src.rpm" version="7.0.69"><filename>tomcat-el-2.2-api-7.0.69-10.el7.noarch.rpm</filename><sum type="sha256">6af7bac8b3654bfd0e36d554b1a5c03592b06aee67a94573558d1fa41df8b6f0</sum></package><package arch="noarch" name="tomcat-docs-webapp" release="10.el7" src="tomcat-7.0.69-10.el7.src.rpm" version="7.0.69"><filename>tomcat-docs-webapp-7.0.69-10.el7.noarch.rpm</filename><sum type="sha256">468f9354023d03473f9963df395e764cb7b4720a0a445996a7396ef62b44c30d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5174" id="CVE-2015-5174" title="Cve-2015-5174" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5345" id="CVE-2015-5345" title="Tomcat: Directory Disclosure" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5351" id="CVE-2015-5351" title="Tomcat: Csrf Token Leak" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0706" id="CVE-2016-0706" title="Tomcat: Security Manager Bypass Via Statusmanagerservlet" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0714" id="CVE-2016-0714" title="Tomcat: Security Manager Bypass Via Persistence Mechanisms" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0763" id="CVE-2016-0763" title="Tomcat: Security Manager Bypass Via Setglobalcontext()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092" id="CVE-2016-3092" title="Tomcat: Usage Of Vulnerable Fileupload Package Can Result In Denial Of Service" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2599" id="RHSA-2016:2599-2" title="Rhsa-2016:2599-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1133070" id="1133070" title="Need To Include Full Implementation Of Tomcat-Juli.Jar And Tomcat-Juli-Adapters.Jar" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1201409" id="1201409" title="Fix The Broken Tomcat-Jsvc Service Unit" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1208402" id="1208402" title="Mark Web.Xml In Tomcat-Admin-Webapps As Config File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1221896" id="1221896" title="Tomcat.Service Loads /Etc/Sysconfig/Tomcat Without Shell Expansion" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1229476" id="1229476" title="Tomcat Startup Only Options" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1240279" id="1240279" title="The Command Tomcat-Digest Doesn'T Work With Rhel 7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265698" id="1265698" title="Tomcat: Url Normalization Issue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277197" id="1277197" title="Tomcat User Has Non-Existing Default Shell Set" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1287928" id="1287928" title="Rebase Tomcat To 7.0.69 Or Backport Features" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311076" id="1311076" title="Tomcat: Csrf Token Leak" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311082" id="1311082" title="Tomcat: Security Manager Bypass Via Persistence Mechanisms" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311087" id="1311087" title="Tomcat: Security Manager Bypass Via Statusmanagerservlet" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311089" id="1311089" title="Tomcat: Directory Disclosure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311093" id="1311093" title="Tomcat: Security Manager Bypass Via Setglobalcontext()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1311622" id="1311622" title="Getting Nosuchelementexception While Handling Attributes With Empty String Value In Tomcat 7.0.54" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1320853" id="1320853" title="Add Hsts Support" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327326" id="1327326" title="Rpm -V Tomcat Fails On /Var/Log/Tomcat/Catalina.Out" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347774" id="1347774" title="The Security Manager Doesn'T Work Correctly (Jsps Cannot Be Compiled)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347860" id="1347860" title="The Systemd Service Unit Does Not Allow Tomcat To Shut Down Gracefully" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349468" id="1349468" title="Tomcat: Usage Of Vulnerable Fileupload Package Can Result In Denial Of Service" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2600-2</id><title>Squid</title><description>The following packages have been upgraded to a newer upstream version: squid (3.5.20). 
Security Fix(es): 
* Incorrect boundary checks were found in the way squid handled headers in HTTP responses, which could lead to an assertion failure. A malicious HTTP server could use this flaw to crash squid using a specially crafted HTTP response. (CVE-2016-2569, CVE-2016-2570) 
* It was found that squid did not properly handle errors when failing to parse an HTTP response, possibly leading to an assertion failure. A malicious HTTP server could use this flaw to crash squid using a specially crafted HTTP response. (CVE-2016-2571, CVE-2016-2572) 
* An incorrect boundary check was found in the way squid handled the Vary header in HTTP responses, which could lead to an assertion failure. A malicious HTTP server could use this flaw to crash squid using a specially crafted HTTP response. (CVE-2016-3948) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="squid-migration-script" release="2.el7" src="squid-3.5.20-2.el7.src.rpm" version="3.5.20"><filename>squid-migration-script-3.5.20-2.el7.x86_64.rpm</filename><sum type="sha256">4579cfdc1cc2fe0f6c2cd0778aab70c9b2df3fb42026ffd20de5e1a9ca2734ea</sum></package><package arch="x86_64" epoch="7" name="squid-sysvinit" release="2.el7" src="squid-3.5.20-2.el7.src.rpm" version="3.5.20"><filename>squid-sysvinit-3.5.20-2.el7.x86_64.rpm</filename><sum type="sha256">e18ecca3b57b48e6758c6184ff7e12ea6f9d7b2b188739e4fc5486766b9e02d5</sum></package><package arch="x86_64" epoch="7" name="squid" release="2.el7" src="squid-3.5.20-2.el7.src.rpm" version="3.5.20"><filename>squid-3.5.20-2.el7.x86_64.rpm</filename><sum type="sha256">876a22618990321df727f5592bc31d9ebfcd4d70996d0fca32b7c3c04a828496</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2569" id="CVE-2016-2569" title="Squid: Some Code Paths Fail To Check Bounds In String Object" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2570" id="CVE-2016-2570" title="Squid: Some Code Paths Fail To Check Bounds In String Object" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2571" id="CVE-2016-2571" title="Squid: Wrong Error Handling For Malformed Http Responses" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2572" id="CVE-2016-2572" title="Squid: Wrong Error Handling For Malformed Http Responses" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3948" id="CVE-2016-3948" title="Squid: Denial Of Service Issue In Http Response Processing" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2600" id="RHSA-2016:2600-2" title="Rhsa-2016:2600-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1254016" id="1254016" title="Ipv4 Fallback Is Not Working When Connecting To A Dualstack Host With Non-Functional Ipv6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1254018" id="1254018" title="Should Buildrequire: G++" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299972" id="1299972" title="Squid File Descriptor Limit Hardcoded To 16384 Via Compile Option In Spec File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312257" id="1312257" title="Squid: Some Code Paths Fail To Check Bounds In String Object" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312262" id="1312262" title="Squid: Wrong Error Handling For Malformed Http Responses" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1323594" id="1323594" title="Squid: Denial Of Service Issue In Http Response Processing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330186" id="1330186" title="Digest Doesn'T Properly Work With Squid 3.3 On Centos 7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1336940" id="1336940" title="Disable Squid Systemd Unit Start/Stop Timeouts" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2601-2</id><title>Fontconfig</title><description>Security Fix(es): 
* It was found that cache files were insufficiently validated in fontconfig. A local attacker could create a specially crafted cache file to trigger arbitrary free() calls, which in turn could lead to arbitrary code execution. (CVE-2016-5384) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="fontconfig-devel" release="10.el7" src="fontconfig-2.10.95-10.el7.src.rpm" version="2.10.95"><filename>fontconfig-devel-2.10.95-10.el7.i686.rpm</filename><sum type="sha256">9857be37cf5ba2ed378c1d46926da6fb32b737ca559598f9133fe44c3bfeda6e</sum></package><package arch="noarch" name="fontconfig-devel-doc" release="10.el7" src="fontconfig-2.10.95-10.el7.src.rpm" version="2.10.95"><filename>fontconfig-devel-doc-2.10.95-10.el7.noarch.rpm</filename><sum type="sha256">eaa134bc625d29447e5eee032aefb63e2563d863957a21b3213655aa333ab680</sum></package><package arch="x86_64" name="fontconfig-devel" release="10.el7" src="fontconfig-2.10.95-10.el7.src.rpm" version="2.10.95"><filename>fontconfig-devel-2.10.95-10.el7.x86_64.rpm</filename><sum type="sha256">932f05a350a31c1c8d95e37ad5b14d3cfa1a98b23645541ffa6f74fd25e0a69b</sum></package><package arch="x86_64" name="fontconfig" release="10.el7" src="fontconfig-2.10.95-10.el7.src.rpm" version="2.10.95"><filename>fontconfig-2.10.95-10.el7.x86_64.rpm</filename><sum type="sha256">7f312f105a65490ad7a01ae1a86eba379154ed4087bf7d9c898a6cfcf9bfa73d</sum></package><package arch="i686" name="fontconfig" release="10.el7" src="fontconfig-2.10.95-10.el7.src.rpm" version="2.10.95"><filename>fontconfig-2.10.95-10.el7.i686.rpm</filename><sum type="sha256">64f2c8ab15754d68be2b76b12f0b42ac5efcd45c3fa500370dba0afa75044f0d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5384" id="CVE-2016-5384" title="Fontconfig: Possible Double Free Due To Insufficiently Validated Cache Files" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2601" id="RHSA-2016:2601-2" title="Rhsa-2016:2601-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1073460" id="1073460" title="Make Alias Consolas Displaying Dejavu Sans Mono" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1350891" id="1350891" title="Fontconfig: Possible Double Free Due To Insufficiently Validated Cache Files" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2602-2</id><title>Mod_Nss</title><description>The following packages have been upgraded to a newer upstream version: mod_nss (1.0.14). 
Security Fix(es): 
* A flaw was found in the way mod_nss parsed certain OpenSSL-style cipher strings. As a result, mod_nss could potentially use ciphers that were not intended to be enabled. (CVE-2016-3099) 
This issue was discovered by Rob Crittenden (Red Hat). 
Additional Changes:</description><severity>low</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="mod_nss" release="7.el7" src="mod_nss-1.0.14-7.el7.src.rpm" version="1.0.14"><filename>mod_nss-1.0.14-7.el7.x86_64.rpm</filename><sum type="sha256">79caf4ba960adc5ffc6969f2d899e66cbb36145e3516eb6bfeb9aea537c8bf51</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3099" id="CVE-2016-3099" title="Mod_Nss: Invalid Handling Of +Cipher Operator" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2602" id="RHSA-2016:2602-2" title="Rhsa-2016:2602-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1053327" id="1053327" title="[Rfe] Add Server-Side Server Name Indication (Sni) Support" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1288471" id="1288471" title="/Etc/Httpd/Alias/Libnssckbi.So Is A Dangling Relative Symlink When /Etc/Httpd/Alias Is Itself Symlinked To Some Other Directory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1296685" id="1296685" title="Segmentation Fault In Httpd/Mod_Nss In The Parent Process While Reloading Via Sighup" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299063" id="1299063" title="Rebase Mod_Nss To 1.0.12 Release" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312491" id="1312491" title="Nssprotocol Is Ignored When Nssfips Is Enabled." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312583" id="1312583" title="Mod_Nss Segmentation Fault When Nsscertificatedatabase Does Not Have Proper Permissions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319052" id="1319052" title="Mod_Nss: Invalid Handling Of +Cipher Operator" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347298" id="1347298" title="Mod_Nss Sets R-&gt;User In Fixup Even If It Was Long Ago Changed By Other Module" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1364560" id="1364560" title="Mod_Nss Leaks Semaphores" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2603-2</id><title>Libreswan</title><description>Security Fix(es): 
* A traffic amplification flaw was found in the Internet Key Exchange version 1 (IKEv1) protocol. A remote attacker could use a libreswan server with IKEv1 enabled in a network traffic amplification denial of service attack against other hosts on the network by sending UDP packets with a spoofed source address to that server. (CVE-2016-5361) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libreswan" release="8.el7" src="libreswan-3.15-8.el7.src.rpm" version="3.15"><filename>libreswan-3.15-8.el7.x86_64.rpm</filename><sum type="sha256">4cbf3b7c37bee2767bd4a5d997d129e1c003a30b3ba56d84558f91e8eadac0ec</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5361" id="CVE-2016-5361" title="Ikev1 Protocol Is Vulnerable To Dos Amplification Attack" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2603" id="RHSA-2016:2603-2" title="Rhsa-2016:2603-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1190526" id="1190526" title="Ipsec Auto --Listcrls Doesn'T Show Crls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1219049" id="1219049" title="Pluto Does Not Handle Delete Message From Responder Site In Ikev1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1229766" id="1229766" title="Pluto Crashes After Stop When I Use Floating Ip Address" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1257079" id="1257079" title="Libreswan Doesn'T Call Networkmanager Helper In Case Of A Connection Error" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1271811" id="1271811" title="Libreswan Fips Test Mistakenly Looks For Non-Existent File Hashes And Reports Fips Failure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1272112" id="1272112" title="Ipsec Whack Man Page Discrepancies" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1278063" id="1278063" title="Unable To Authenticate With Pam For Ikev1 Xauth" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1280449" id="1280449" title="Pam Xauth Method Does Not Work With Pam_Sss" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1283468" id="1283468" title="Keyingtries=0 Is Broken - Meaning It Is Interpreted As Keyingtries=1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290907" id="1290907" title="Ipsec Initnss/Checknss Custom Directory Not Recognized" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297816" id="1297816" title="When Using Sha2 As Prf Algorithm, The Nonce Payload Is Below The Rfc Required Minimum Size" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1308508" id="1308508" title="Ikev1 Protocol Is Vulnerable To Dos Amplification Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1309764" id="1309764" title="Ipsec Barf Does Not Show Pluto Log Correctly In The Output" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1313747" id="1313747" title="Ipsec Pluto Returns Zero Even If It Fails" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1315412" id="1315412" title="Ipsec.Conf Manpage Does Not Contain Any Mention About Crl-Strict Option" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347735" id="1347735" title="Libreswan Needs To Check Additional Crls After Ldap Crl Distributionpoint Fails" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2604-2</id><title>Resteasy-Base</title><description>Security Fix(es): 
* It was discovered that under certain conditions RESTEasy could be forced to parse a request with SerializableProvider, resulting in deserialization of potentially untrusted data. An attacker could possibly use this flaw to execute arbitrary code with the permissions of the application using RESTEasy. (CVE-2016-7050) 
Additional Changes:</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="resteasy-base-javadoc" release="4.el7" src="resteasy-base-3.0.6-4.el7.src.rpm" version="3.0.6"><filename>resteasy-base-javadoc-3.0.6-4.el7.noarch.rpm</filename><sum type="sha256">fa90794cf97370e71df2fad45496a13cc909a4e6379964cebe73272e41e65a76</sum></package><package arch="noarch" name="resteasy-base-resteasy-pom" release="4.el7" src="resteasy-base-3.0.6-4.el7.src.rpm" version="3.0.6"><filename>resteasy-base-resteasy-pom-3.0.6-4.el7.noarch.rpm</filename><sum type="sha256">846fb21b7b488de171509a4b38ab650c80c9818c9305325db6904ffd773cb3a1</sum></package><package arch="noarch" name="resteasy-base-tjws" release="4.el7" src="resteasy-base-3.0.6-4.el7.src.rpm" version="3.0.6"><filename>resteasy-base-tjws-3.0.6-4.el7.noarch.rpm</filename><sum type="sha256">28f21bf089a93b7a2b80a4e5decfab21106521b8d0dfad433b32851ef5314308</sum></package><package arch="noarch" name="resteasy-base-jackson-provider" release="4.el7" src="resteasy-base-3.0.6-4.el7.src.rpm" version="3.0.6"><filename>resteasy-base-jackson-provider-3.0.6-4.el7.noarch.rpm</filename><sum type="sha256">3c454053948350c2728ba151a3f43ef328083358ce263f5347718d125ce74f4d</sum></package><package arch="noarch" name="resteasy-base-jaxb-provider" release="4.el7" src="resteasy-base-3.0.6-4.el7.src.rpm" version="3.0.6"><filename>resteasy-base-jaxb-provider-3.0.6-4.el7.noarch.rpm</filename><sum type="sha256">e0b085508d37e29481b98e92d2688a0dc06c8947113057db97c5e592b13682aa</sum></package><package arch="noarch" name="resteasy-base-jaxrs-all" release="4.el7" src="resteasy-base-3.0.6-4.el7.src.rpm" version="3.0.6"><filename>resteasy-base-jaxrs-all-3.0.6-4.el7.noarch.rpm</filename><sum type="sha256">bd35230c31b5abfdec2063434c9280e26fb51eb2cc1647cfdccca18b9d945265</sum></package><package arch="noarch" name="resteasy-base" release="4.el7" src="resteasy-base-3.0.6-4.el7.src.rpm" version="3.0.6"><filename>resteasy-base-3.0.6-4.el7.noarch.rpm</filename><sum type="sha256">25b1576c35502d7f8fda28cbbcb56fd9d9eb5ff34b697e046dc70fd1d7829207</sum></package><package arch="noarch" name="resteasy-base-atom-provider" release="4.el7" src="resteasy-base-3.0.6-4.el7.src.rpm" version="3.0.6"><filename>resteasy-base-atom-provider-3.0.6-4.el7.noarch.rpm</filename><sum type="sha256">84b1a8c078b87807662086eaf3e4d6870a2580e1e9348ce706d94434923d9de4</sum></package><package arch="noarch" name="resteasy-base-jettison-provider" release="4.el7" src="resteasy-base-3.0.6-4.el7.src.rpm" version="3.0.6"><filename>resteasy-base-jettison-provider-3.0.6-4.el7.noarch.rpm</filename><sum type="sha256">5ce4abe2275a68fc881860b145730f61db3bb390f76f8feabffcaf9c45428475</sum></package><package arch="noarch" name="resteasy-base-jaxrs-api" release="4.el7" src="resteasy-base-3.0.6-4.el7.src.rpm" version="3.0.6"><filename>resteasy-base-jaxrs-api-3.0.6-4.el7.noarch.rpm</filename><sum type="sha256">57814bc4870b900114af1e6accf1fd94e8a01ac59256916ec15594fee30b4672</sum></package><package arch="noarch" name="resteasy-base-client" release="4.el7" src="resteasy-base-3.0.6-4.el7.src.rpm" version="3.0.6"><filename>resteasy-base-client-3.0.6-4.el7.noarch.rpm</filename><sum type="sha256">36c2f33f1603096689836f66c4079e537f781088f245e0a4c1d4ee587a4b0d1a</sum></package><package arch="noarch" name="resteasy-base-jaxrs" release="4.el7" src="resteasy-base-3.0.6-4.el7.src.rpm" version="3.0.6"><filename>resteasy-base-jaxrs-3.0.6-4.el7.noarch.rpm</filename><sum type="sha256">f1fffeba750c55ea95d0cc972defefd6429a95e198ef15220e79091e730784da</sum></package><package arch="noarch" name="resteasy-base-providers-pom" release="4.el7" src="resteasy-base-3.0.6-4.el7.src.rpm" version="3.0.6"><filename>resteasy-base-providers-pom-3.0.6-4.el7.noarch.rpm</filename><sum type="sha256">ab851d23a6310a10f69641e77eb950f1e93832d9164586e39d9486b043114d82</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7050" id="CVE-2016-7050" title="Resteasy:Serializableprovider Enabled By Default And Deserializes Untrusted Data" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2604" id="RHSA-2016:2604-2" title="Rhsa-2016:2604-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1280539" id="1280539" title="Jpp.Resteasy-Base-Resteasy-Pom.Pom: Version Failed To Match The Rpm Version" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357624" id="1357624" title="Rebuilding Of Resteasy-Base Srpm Fails When Java-1.8.0-Openjdk Is Used" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378613" id="1378613" title="Resteasy:Serializableprovider Enabled By Default And Deserializes Untrusted Data" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2605-2</id><title>Util-Linux</title><description>Security Fix(es): 
* It was found that util-linux's libblkid library did not properly handle Extended Boot Record (EBR) partitions when reading MS-DOS partition tables. An attacker with physical USB access to a protected machine could insert a storage device with a specially crafted partition table that could, for example, trigger an infinite loop in systemd-udevd, resulting in a denial of service on that machine. (CVE-2016-5011) 
Additional Changes:</description><severity>low</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libmount" release="33.el7" src="util-linux-2.23.2-33.el7.src.rpm" version="2.23.2"><filename>libmount-2.23.2-33.el7.x86_64.rpm</filename><sum type="sha256">1801fe82c511d6448f7bf525e346a7e60c048562397c36b19bb8b7f601ab0377</sum></package><package arch="x86_64" name="util-linux" release="33.el7" src="util-linux-2.23.2-33.el7.src.rpm" version="2.23.2"><filename>util-linux-2.23.2-33.el7.x86_64.rpm</filename><sum type="sha256">c0e9b19796fe66e5f5435a3b1a5e8780bca5b247f82d3de8469954ce5e19c5a2</sum></package><package arch="i686" name="libuuid-devel" release="33.el7" src="util-linux-2.23.2-33.el7.src.rpm" version="2.23.2"><filename>libuuid-devel-2.23.2-33.el7.i686.rpm</filename><sum type="sha256">6fa95a37fd36797d3836944a97d4da855b860ebdf15fea1222fb0ff64fdf1c25</sum></package><package arch="x86_64" name="libuuid-devel" release="33.el7" src="util-linux-2.23.2-33.el7.src.rpm" version="2.23.2"><filename>libuuid-devel-2.23.2-33.el7.x86_64.rpm</filename><sum type="sha256">085d128c46234fbcd1769d6762c9c59072f4294eeb7902d178178b38c1844fc1</sum></package><package arch="i686" name="util-linux" release="33.el7" src="util-linux-2.23.2-33.el7.src.rpm" version="2.23.2"><filename>util-linux-2.23.2-33.el7.i686.rpm</filename><sum type="sha256">20864e2a3e3615c138090ec75f867189849d79fc8afde3970fc9c7310f924e04</sum></package><package arch="i686" name="libblkid" release="33.el7" src="util-linux-2.23.2-33.el7.src.rpm" version="2.23.2"><filename>libblkid-2.23.2-33.el7.i686.rpm</filename><sum type="sha256">511d64750f113f920ca7d65420859cf98d98bfd4f550f1f9ed64e9dc6ce96451</sum></package><package arch="i686" name="libmount" release="33.el7" src="util-linux-2.23.2-33.el7.src.rpm" version="2.23.2"><filename>libmount-2.23.2-33.el7.i686.rpm</filename><sum type="sha256">30e435e8df235f95328ea6e606fa3caffb0c8bff16d53826221aa55f80d51908</sum></package><package arch="x86_64" name="libblkid-devel" release="33.el7" src="util-linux-2.23.2-33.el7.src.rpm" version="2.23.2"><filename>libblkid-devel-2.23.2-33.el7.x86_64.rpm</filename><sum type="sha256">2350ae710273aedbb70954d698f361e8b0adc71192817d6082223dfcee0c3430</sum></package><package arch="i686" name="libuuid" release="33.el7" src="util-linux-2.23.2-33.el7.src.rpm" version="2.23.2"><filename>libuuid-2.23.2-33.el7.i686.rpm</filename><sum type="sha256">7cac0f3687d60a32bf58460b45b17b4ce35486e4829902179811d6fd9d50c646</sum></package><package arch="i686" name="libblkid-devel" release="33.el7" src="util-linux-2.23.2-33.el7.src.rpm" version="2.23.2"><filename>libblkid-devel-2.23.2-33.el7.i686.rpm</filename><sum type="sha256">a29ae45b558b4b6e270c4c12041fa920b352688cd0c8491053afd0e725a83909</sum></package><package arch="x86_64" name="uuidd" release="33.el7" src="util-linux-2.23.2-33.el7.src.rpm" version="2.23.2"><filename>uuidd-2.23.2-33.el7.x86_64.rpm</filename><sum type="sha256">5ec189423986168b7c4544a40c6cd0439325515389f285e5d9bd1f7eb3ad652d</sum></package><package arch="x86_64" name="libblkid" release="33.el7" src="util-linux-2.23.2-33.el7.src.rpm" version="2.23.2"><filename>libblkid-2.23.2-33.el7.x86_64.rpm</filename><sum type="sha256">238c1aed025bc42d4c655ca4f9b574ba41645670074dc5e71c45bfe5744ffce3</sum></package><package arch="x86_64" name="libuuid" release="33.el7" src="util-linux-2.23.2-33.el7.src.rpm" version="2.23.2"><filename>libuuid-2.23.2-33.el7.x86_64.rpm</filename><sum type="sha256">4036dc20951359783c484216210b780a78cb9ceb5eb001716bb8d8e9ff021f27</sum></package><package arch="i686" name="libmount-devel" release="33.el7" src="util-linux-2.23.2-33.el7.src.rpm" version="2.23.2"><filename>libmount-devel-2.23.2-33.el7.i686.rpm</filename><sum type="sha256">d727d43e5965c31fbc32a8360e6867ee427c83f0522e441f489f9d597a88dac7</sum></package><package arch="x86_64" name="libmount-devel" release="33.el7" src="util-linux-2.23.2-33.el7.src.rpm" version="2.23.2"><filename>libmount-devel-2.23.2-33.el7.x86_64.rpm</filename><sum type="sha256">2761f953fae89259572b84866de4b07ce449f2d1bb14da414997e7724ec8037a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5011" id="CVE-2016-5011" title="Util-Linux: Extended Partition Loop In Mbr Partition Table Leads To Dos" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2605" id="RHSA-2016:2605-2" title="Rhsa-2016:2605-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1007734" id="1007734" title="Blkid Shows Devices As /Dev/Block/$Major:$Minor" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1029385" id="1029385" title="Lack Of Non-Ascii Support" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1248003" id="1248003" title="Mount Only Parses &lt;Param&gt;=&lt;Value&gt; Lines From Fstab Fs_Spec Field Available From Blkid Block Device" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1271850" id="1271850" title="Mount -A Doesn'T Catch A Typo In /Etc/Fstab And A Typo In /Etc/Fstab Can Make A System Not Reboot Properly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1290689" id="1290689" title="Util-Linux: /Bin/Login Does Not Retry Getpwnam_R With Larger Buffers, Leading To Login Failure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291554" id="1291554" title="Lslogins Crash When Executed With Buggy Username" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1296366" id="1296366" title="Bash Completion For More(1) Handles File Names With Spaces Incorrectly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1296521" id="1296521" title="Rhel7: Update Audit Event In Hwclock" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301091" id="1301091" title="[Libblkid] Failed To Get Offset Of The Xfs_External_Log Signature" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1304426" id="1304426" title="[Rfe] /Bin/Su Should Be Improved To Reduce Stack Use" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327886" id="1327886" title="Backport Blkdiscard'S &quot;-Z&quot; Flag To Rhel" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335671" id="1335671" title="Extra Quotes Around Uuid Confuses Findfs In Rhel (But Not In Fedora)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1344482" id="1344482" title="Util-Linux Fails Valid_Pmbr() Size Checks If Device Is &gt; 2.14Tb, Device Label Type: Dos Instead Of Gpt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349536" id="1349536" title="Extended Partition Loop In Mbr Partition Table Leads To Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349741" id="1349741" title="Util-Linux: Extended Partition Loop In Mbr Partition Table Leads To Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2606-2</id><title>Postgresql</title><description>The following packages have been upgraded to a newer upstream version: postgresql (9.2.18). 
Security Fix(es): 
* A flaw was found in the way PostgreSQL server handled certain SQL statements containing CASE/WHEN commands. A remote, authenticated attacker could use a specially crafted SQL statement to cause PostgreSQL to crash or disclose a few bytes of server memory or possibly execute arbitrary code. (CVE-2016-5423) 
* A flaw was found in the way PostgreSQL client programs handled database and role names containing newlines, carriage returns, double quotes, or backslashes. By crafting such an object name, roles with the CREATEDB or CREATEROLE option could escalate their privileges to superuser when a superuser next executes maintenance with a vulnerable client program. (CVE-2016-5424) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="postgresql-devel" release="1.el7" src="postgresql-9.2.18-1.el7.src.rpm" version="9.2.18"><filename>postgresql-devel-9.2.18-1.el7.i686.rpm</filename><sum type="sha256">7884507c1ac76001f3e4398afc7856f79ff0ea116f9af2640f896c0cf94933e3</sum></package><package arch="x86_64" name="postgresql-server" release="1.el7" src="postgresql-9.2.18-1.el7.src.rpm" version="9.2.18"><filename>postgresql-server-9.2.18-1.el7.x86_64.rpm</filename><sum type="sha256">dc9c9610f754ae74fcd0326eb1c789ac2d68e7389012568aa37be85bbf7e1700</sum></package><package arch="x86_64" name="postgresql-plperl" release="1.el7" src="postgresql-9.2.18-1.el7.src.rpm" version="9.2.18"><filename>postgresql-plperl-9.2.18-1.el7.x86_64.rpm</filename><sum type="sha256">3a58cb947ba247ece34d0ddb7a08f23f72308b1daa827f51f0b196d896f153a9</sum></package><package arch="x86_64" name="postgresql" release="1.el7" src="postgresql-9.2.18-1.el7.src.rpm" version="9.2.18"><filename>postgresql-9.2.18-1.el7.x86_64.rpm</filename><sum type="sha256">d1ff8f439000a32dac23cbd437a01596780d55533fa9ce194edaf42199fe3426</sum></package><package arch="x86_64" name="postgresql-pltcl" release="1.el7" src="postgresql-9.2.18-1.el7.src.rpm" version="9.2.18"><filename>postgresql-pltcl-9.2.18-1.el7.x86_64.rpm</filename><sum type="sha256">91d78613463d74a71d936c8919fb6dbad7ef6313088f4b6ec2cbefedb27aebba</sum></package><package arch="x86_64" name="postgresql-devel" release="1.el7" src="postgresql-9.2.18-1.el7.src.rpm" version="9.2.18"><filename>postgresql-devel-9.2.18-1.el7.x86_64.rpm</filename><sum type="sha256">e573ccb1558be79e45d7eccc0ae4ded237cd6d005217e2984e58f702dc1cd505</sum></package><package arch="x86_64" name="postgresql-contrib" release="1.el7" src="postgresql-9.2.18-1.el7.src.rpm" version="9.2.18"><filename>postgresql-contrib-9.2.18-1.el7.x86_64.rpm</filename><sum type="sha256">be67389ec1dc871e51e73a7796da30ce8bb973dd798a4fffa127a4c655c8f924</sum></package><package arch="i686" name="postgresql" release="1.el7" src="postgresql-9.2.18-1.el7.src.rpm" version="9.2.18"><filename>postgresql-9.2.18-1.el7.i686.rpm</filename><sum type="sha256">b34f647292c0b153cc7bd3904c054149926291625fc071021438d96bae472ea9</sum></package><package arch="x86_64" name="postgresql-docs" release="1.el7" src="postgresql-9.2.18-1.el7.src.rpm" version="9.2.18"><filename>postgresql-docs-9.2.18-1.el7.x86_64.rpm</filename><sum type="sha256">7d8ef14441411da2efa2fac3243a6b15b1a4b326c2058055fb3bd114d9c3cba7</sum></package><package arch="x86_64" name="postgresql-libs" release="1.el7" src="postgresql-9.2.18-1.el7.src.rpm" version="9.2.18"><filename>postgresql-libs-9.2.18-1.el7.x86_64.rpm</filename><sum type="sha256">d11ec13d55a0a9656dc7510ef7449b06196077443e02dd30fbafa20a9d9d1eae</sum></package><package arch="x86_64" name="postgresql-upgrade" release="1.el7" src="postgresql-9.2.18-1.el7.src.rpm" version="9.2.18"><filename>postgresql-upgrade-9.2.18-1.el7.x86_64.rpm</filename><sum type="sha256">f56a306f0bb772f69caa31d1b175a53f1dc310cc386766b888e58beb3a393d52</sum></package><package arch="x86_64" name="postgresql-test" release="1.el7" src="postgresql-9.2.18-1.el7.src.rpm" version="9.2.18"><filename>postgresql-test-9.2.18-1.el7.x86_64.rpm</filename><sum type="sha256">38b3595ee212362af14199f6083c9c246c5b6a92655df07d7be819d297ca81f8</sum></package><package arch="i686" name="postgresql-libs" release="1.el7" src="postgresql-9.2.18-1.el7.src.rpm" version="9.2.18"><filename>postgresql-libs-9.2.18-1.el7.i686.rpm</filename><sum type="sha256">4e47ea41f38a8463ea8437296912a46ac6b8eb9abe73e63ed3ed089eeaebdbb2</sum></package><package arch="x86_64" name="postgresql-plpython" release="1.el7" src="postgresql-9.2.18-1.el7.src.rpm" version="9.2.18"><filename>postgresql-plpython-9.2.18-1.el7.x86_64.rpm</filename><sum type="sha256">c52843fb7b75121ac3a3c707b8af69050a1cad86226c71e01407ddb1e634e67f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5423" id="CVE-2016-5423" title="Postgresql: Case/When With Inlining Can Cause Untrusted Pointer Dereference" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5424" id="CVE-2016-5424" title="Postgresql: Privilege Escalation Via Crafted Database And Role Names" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2606" id="RHSA-2016:2606-2" title="Rhsa-2016:2606-2" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1122143" id="1122143" title="Postgresql Won'T Start If User Postgres Is Locked (/Sbin/Nologin)." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1364001" id="1364001" title="Postgresql: Case/When With Inlining Can Cause Untrusted Pointer Dereference" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1364002" id="1364002" title="Postgresql: Privilege Escalation Via Crafted Database And Role Names" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2610-1</id><title>Systemd</title><description>Security Fix(es): 
* A flaw was found in the way systemd handled empty notification messages. A local attacker could use this flaw to make systemd freeze its execution, preventing further management of system services, system shutdown, or zombie process collection via systemd. (CVE-2016-7795) 
Bug Fix(es): 
* Previously, the udev device manager automatically enabled all memory banks on IBM z System installations. As a consequence, hot plug memory was enabled automatically, which was incorrect. With this update, system architecture checks have been added to the udev rules to address the problem. As a result, hot plug memory is no longer automatically enabled.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libgudev1" release="30.el7_3.3" src="systemd-219-30.el7_3.3.src.rpm" version="219"><filename>libgudev1-219-30.el7_3.3.i686.rpm</filename><sum type="sha256">ceb8cf1661224e2594d1e2e32c61db0f6a55bc40d3803de11ca14bec1edc1455</sum></package><package arch="x86_64" name="systemd-journal-gateway" release="30.el7_3.3" src="systemd-219-30.el7_3.3.src.rpm" version="219"><filename>systemd-journal-gateway-219-30.el7_3.3.x86_64.rpm</filename><sum type="sha256">890c0a8f828139a79124b10e9e461970d984e4f850d0174baa076b59b2512cf4</sum></package><package arch="x86_64" name="systemd" release="30.el7_3.3" src="systemd-219-30.el7_3.3.src.rpm" version="219"><filename>systemd-219-30.el7_3.3.x86_64.rpm</filename><sum type="sha256">b3a9267e1f2e01dde650ba2c0f8c6213829c7392ee8ae5914faafea85ddb3956</sum></package><package arch="i686" name="libgudev1-devel" release="30.el7_3.3" src="systemd-219-30.el7_3.3.src.rpm" version="219"><filename>libgudev1-devel-219-30.el7_3.3.i686.rpm</filename><sum type="sha256">7f4a7960f939749a603ed9b3f96e54c788a3ee4bacdcd3242b20a0434a1994f1</sum></package><package arch="x86_64" name="libgudev1-devel" release="30.el7_3.3" src="systemd-219-30.el7_3.3.src.rpm" version="219"><filename>libgudev1-devel-219-30.el7_3.3.x86_64.rpm</filename><sum type="sha256">b841f13a0f82895d620adb5c46555d114ef35342f66f90d7d82e0111b6a29e58</sum></package><package arch="x86_64" name="libgudev1" release="30.el7_3.3" src="systemd-219-30.el7_3.3.src.rpm" version="219"><filename>libgudev1-219-30.el7_3.3.x86_64.rpm</filename><sum type="sha256">c3d433f5204cabd62f1ef22d22365f5914756489b39dfeb8b16268999c1bd4ad</sum></package><package arch="x86_64" name="systemd-networkd" release="30.el7_3.3" src="systemd-219-30.el7_3.3.src.rpm" version="219"><filename>systemd-networkd-219-30.el7_3.3.x86_64.rpm</filename><sum type="sha256">9dcac37d795c1db69fbc0de5274b3700319be17a29bd180f3df21091c5ccb29d</sum></package><package arch="x86_64" name="systemd-python" release="30.el7_3.3" src="systemd-219-30.el7_3.3.src.rpm" version="219"><filename>systemd-python-219-30.el7_3.3.x86_64.rpm</filename><sum type="sha256">a0bf6059e3af855b5c79e86d77656bcee2e361b7ef945a02d9848f2575d38c9d</sum></package><package arch="i686" name="systemd-libs" release="30.el7_3.3" src="systemd-219-30.el7_3.3.src.rpm" version="219"><filename>systemd-libs-219-30.el7_3.3.i686.rpm</filename><sum type="sha256">2a3cf26b8b27538171b5e4d12700cc8c740b47f305ccb2012f729d450ac057b7</sum></package><package arch="x86_64" name="systemd-sysv" release="30.el7_3.3" src="systemd-219-30.el7_3.3.src.rpm" version="219"><filename>systemd-sysv-219-30.el7_3.3.x86_64.rpm</filename><sum type="sha256">0bb4377694294f3df373b100cf5df96898ac8788c52317d96495f559c8b82b0c</sum></package><package arch="x86_64" name="systemd-resolved" release="30.el7_3.3" src="systemd-219-30.el7_3.3.src.rpm" version="219"><filename>systemd-resolved-219-30.el7_3.3.x86_64.rpm</filename><sum type="sha256">aaca8af58b752c738c2cbac8e987c79238090cd076a32360f7b2a5395e7b919e</sum></package><package arch="i686" name="systemd-devel" release="30.el7_3.3" src="systemd-219-30.el7_3.3.src.rpm" version="219"><filename>systemd-devel-219-30.el7_3.3.i686.rpm</filename><sum type="sha256">c6713f98b3f1000b7b1c96050bbb6e36b13448a0bc4ee44d9534ae88baa64024</sum></package><package arch="x86_64" name="systemd-devel" release="30.el7_3.3" src="systemd-219-30.el7_3.3.src.rpm" version="219"><filename>systemd-devel-219-30.el7_3.3.x86_64.rpm</filename><sum type="sha256">cac628070892c093b33a5ce9c11e5ed6c1cb59d13d1134544fa793a207e7a386</sum></package><package arch="i686" name="systemd-resolved" release="30.el7_3.3" src="systemd-219-30.el7_3.3.src.rpm" version="219"><filename>systemd-resolved-219-30.el7_3.3.i686.rpm</filename><sum type="sha256">86a6e8eb3d01db3bea446defb3e0cb9855d3fa1711d2e332af6ee3b0fcf1f612</sum></package><package arch="x86_64" name="systemd-libs" release="30.el7_3.3" src="systemd-219-30.el7_3.3.src.rpm" version="219"><filename>systemd-libs-219-30.el7_3.3.x86_64.rpm</filename><sum type="sha256">dcf030388ec351235c4a3dc260e05ddd6f086abd379f8917c69e69628a1c7a78</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7795" id="CVE-2016-7795" title="Systemd: Assertion Failure When Pid 1 Receives A Zero-Length Message Over Notify Socket" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2610" id="RHSA-2016:2610-1" title="Rhsa-2016:2610-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1380286" id="1380286" title="Systemd: Assertion Failure When Pid 1 Receives A Zero-Length Message Over Notify Socket" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1380686" id="1380686" title="Systemctl Show Changes" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2614-1</id><title>Pacemaker</title><description>Security Fix(es): 
* An authorization flaw was found in Pacemaker, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine. (CVE-2016-7035) 
Bug Fix(es): 
* The version of Pacemaker in Scientific Linux 7.3 incorporated an increase in the version number of the remote node protocol. Consequently, cluster nodes running Pacemaker in Scientific Linux 7.3 and remote nodes running earlier versions of Scientific Linux were not able to communicate with each other unless special precautions were taken. This update preserves the rolling upgrade capability.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pacemaker" release="11.el7_3.2" src="pacemaker-1.1.15-11.el7_3.2.src.rpm" version="1.1.15"><filename>pacemaker-1.1.15-11.el7_3.2.x86_64.rpm</filename><sum type="sha256">0fde1298f180486affdfc84e2245cc0043f7d619d7d3a406c03a759ca9c9eb1e</sum></package><package arch="i686" name="pacemaker-cluster-libs" release="11.el7_3.2" src="pacemaker-1.1.15-11.el7_3.2.src.rpm" version="1.1.15"><filename>pacemaker-cluster-libs-1.1.15-11.el7_3.2.i686.rpm</filename><sum type="sha256">a4e67465cae8fea7bbbc0d8b22c254aa4b770ac6765723d9574c984c38a198f0</sum></package><package arch="x86_64" name="pacemaker-doc" release="11.el7_3.2" src="pacemaker-1.1.15-11.el7_3.2.src.rpm" version="1.1.15"><filename>pacemaker-doc-1.1.15-11.el7_3.2.x86_64.rpm</filename><sum type="sha256">e3361d54b0d520313b88244716efe10701fbb9439985af41c015d9d11f28995a</sum></package><package arch="x86_64" name="pacemaker-libs-devel" release="11.el7_3.2" src="pacemaker-1.1.15-11.el7_3.2.src.rpm" version="1.1.15"><filename>pacemaker-libs-devel-1.1.15-11.el7_3.2.x86_64.rpm</filename><sum type="sha256">f86c6dee5d40c3c1c1ea5fc25bad7161ce1a69fc0fd783af4d3d53f2b86ab840</sum></package><package arch="x86_64" name="pacemaker-cli" release="11.el7_3.2" src="pacemaker-1.1.15-11.el7_3.2.src.rpm" version="1.1.15"><filename>pacemaker-cli-1.1.15-11.el7_3.2.x86_64.rpm</filename><sum type="sha256">182c70de6ff6e265972d01b740cfed4a589b891add2c81fce6e15e335ca737e2</sum></package><package arch="x86_64" name="pacemaker-remote" release="11.el7_3.2" src="pacemaker-1.1.15-11.el7_3.2.src.rpm" version="1.1.15"><filename>pacemaker-remote-1.1.15-11.el7_3.2.x86_64.rpm</filename><sum type="sha256">3d052062d03d58fcb4848bdbab83ef6c2e2be9ce6fe9327f58b612d09753c763</sum></package><package arch="x86_64" name="pacemaker-cts" release="11.el7_3.2" src="pacemaker-1.1.15-11.el7_3.2.src.rpm" version="1.1.15"><filename>pacemaker-cts-1.1.15-11.el7_3.2.x86_64.rpm</filename><sum type="sha256">63bb325adcc44b7faaa0b581126ce591ff3059b7e4be9e47b8124a11c96306e6</sum></package><package arch="x86_64" name="pacemaker-nagios-plugins-metadata" release="11.el7_3.2" src="pacemaker-1.1.15-11.el7_3.2.src.rpm" version="1.1.15"><filename>pacemaker-nagios-plugins-metadata-1.1.15-11.el7_3.2.x86_64.rpm</filename><sum type="sha256">3474b1dc5a73246e8b0b575118eec5f9f011d8319eab09e04d71ec3163080fc5</sum></package><package arch="x86_64" name="pacemaker-libs" release="11.el7_3.2" src="pacemaker-1.1.15-11.el7_3.2.src.rpm" version="1.1.15"><filename>pacemaker-libs-1.1.15-11.el7_3.2.x86_64.rpm</filename><sum type="sha256">e6e792037d09e7cd803b57ad0eb549c8ac3f9f189023fde4404c6c1b94ad9ebe</sum></package><package arch="i686" name="pacemaker-libs-devel" release="11.el7_3.2" src="pacemaker-1.1.15-11.el7_3.2.src.rpm" version="1.1.15"><filename>pacemaker-libs-devel-1.1.15-11.el7_3.2.i686.rpm</filename><sum type="sha256">cf66f989da993c0faafa46424921c746ef49ddd687297e0545cf6e813a0f0349</sum></package><package arch="i686" name="pacemaker-libs" release="11.el7_3.2" src="pacemaker-1.1.15-11.el7_3.2.src.rpm" version="1.1.15"><filename>pacemaker-libs-1.1.15-11.el7_3.2.i686.rpm</filename><sum type="sha256">ee4e4d86fe3e9ecae252fee251f4f6965d0aea11bacbe9d01031d3627e0380e1</sum></package><package arch="x86_64" name="pacemaker-cluster-libs" release="11.el7_3.2" src="pacemaker-1.1.15-11.el7_3.2.src.rpm" version="1.1.15"><filename>pacemaker-cluster-libs-1.1.15-11.el7_3.2.x86_64.rpm</filename><sum type="sha256">67a67715d0e13d8f3f6cf2a4ba9e47921cb5005cf06db904a120cb71f0b7f782</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7035" id="CVE-2016-7035" title="Pacemaker: Privilege Escalation Due To Improper Guarding Of Ipc Communication" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2614" id="RHSA-2016:2614-1" title="Rhsa-2016:2614-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369732" id="1369732" title="Pacemaker: Privilege Escalation Due To Improper Guarding Of Ipc Communication" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1389023" id="1389023" title="Repair Rolling Upgrades From 7.2 -&gt; 7.3" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2615-1</id><title>Bind</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND handled responses containing a DNAME answer. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-8864)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-sdb-chroot-9.9.4-38.el7_3.x86_64.rpm</filename><sum type="sha256">cd05f7ed9a618371dcd9fef1189af6b0ed5df6469e46495149bf09e61d268d39</sum></package><package arch="i686" epoch="32" name="bind-libs" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-38.el7_3.i686.rpm</filename><sum type="sha256">e209bba385f11362798cc33518711480a100ec350fa65054a58f54160804a138</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-38.el7_3.x86_64.rpm</filename><sum type="sha256">1bd7122eac307a237fadf7170f454afed3cdbdf8b79d39d9de22517340e2b5d5</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-chroot-9.9.4-38.el7_3.x86_64.rpm</filename><sum type="sha256">9d5831a9df7d175148636092a4ef30f302509d0002616ec09817e338ddae9881</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-38.el7_3.x86_64.rpm</filename><sum type="sha256">105039fd2f2addd66b1d4ac597562aeffcc57186fbd1ef02981b46336258df0e</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-38.el7_3.x86_64.rpm</filename><sum type="sha256">bdb6c8044956b8d5cd2c4aa907aa238dc16f6bb951eee6a1e4b8132255ed9e90</sum></package><package arch="x86_64" epoch="32" name="bind" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-9.9.4-38.el7_3.x86_64.rpm</filename><sum type="sha256">b657354d2d1df57bfb3ccf7a3088ae84c79308475a7d4616e59c49a654417b65</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-pkcs11-utils-9.9.4-38.el7_3.x86_64.rpm</filename><sum type="sha256">38a568f992671cdc8cf8a344468fd3d17bd0915a5703635f64219004110502ce</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-utils-9.9.4-38.el7_3.x86_64.rpm</filename><sum type="sha256">619077cf4909d8093f24176a97455172a5234c563b4c19db3de52db73d52198b</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-38.el7_3.x86_64.rpm</filename><sum type="sha256">1dd1dc537b00b45bd157633f34f1052958bdc551004dd20797834131f83056b1</sum></package><package arch="noarch" epoch="32" name="bind-license" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-license-9.9.4-38.el7_3.noarch.rpm</filename><sum type="sha256">cc941a2cf45a640099cc53dcbd1d80a48d2244330b70768ad59a2c9b515136b0</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-sdb-9.9.4-38.el7_3.x86_64.rpm</filename><sum type="sha256">766f3f5cbbdcda47cf084f7e54018a0656f56422f1ad6f774e1874cae29a0a4d</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-38.el7_3.i686.rpm</filename><sum type="sha256">1426e21e4f054a2a0b8199fff705ed564b44e3a0db26967dbd71abda322d7f5e</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-38.el7_3.x86_64.rpm</filename><sum type="sha256">4c35081556a7c49e31678e0270b04142bb08c24729857c923a915e1303aa702e</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-38.el7_3.i686.rpm</filename><sum type="sha256">cc2119323b5e18443e2d8ff7a7d647613a9b5677b4b31f7dcc04477073168bb6</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-38.el7_3.i686.rpm</filename><sum type="sha256">7a1b3b0e84c5acaf4af63d258c92ad1e9519b01daa04e67fe7ba3c26a124a579</sum></package><package arch="i686" epoch="32" name="bind-devel" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-38.el7_3.i686.rpm</filename><sum type="sha256">1b2aac08ba905cf38e63511e93808dcaa45c3341f6729c9deb6da322c8a8da3d</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-38.el7_3.i686.rpm</filename><sum type="sha256">037728d58e6519a4d292cac5492c3cf8e9ad84dafdd4810739a4ee3c95d1a48f</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-pkcs11-9.9.4-38.el7_3.x86_64.rpm</filename><sum type="sha256">6b8f8efb03bede0a08caf2882e3f733a884901f39a972cfd549cfd8710fa78ca</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="38.el7_3" src="bind-9.9.4-38.el7_3.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-38.el7_3.x86_64.rpm</filename><sum type="sha256">993f34f6903d41871ecfdb98fb110c38d87102adc3d1a9e3ea52a8a3876477e3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8864" id="CVE-2016-8864" title="Bind: Assertion Failure While Handling Responses Containing A Dname Answer" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2615" id="RHSA-2016:2615-1" title="Rhsa-2016:2615-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1389652" id="1389652" title="Bind: Assertion Failure While Handling Responses Containing A Dname Answer" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2658-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* It was discovered that the Hotspot component of OpenJDK did not properly check arguments of the System.arraycopy() function in certain cases. An untrusted Java application or applet could use this flaw to corrupt virtual machine's memory and completely bypass Java sandbox restrictions. (CVE-2016-5582) 
* It was discovered that the Hotspot component of OpenJDK did not properly check received Java Debug Wire Protocol (JDWP) packets. An attacker could possibly use this flaw to send debugging commands to a Java program running with debugging enabled if they could make victim's browser send HTTP requests to the JDWP port of the debugged application. (CVE-2016-5573) 
* It was discovered that the Libraries component of OpenJDK did not restrict the set of algorithms used for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2016-5542) 
Note: After this update, MD2 hash algorithm and RSA keys with less than 1024 bits are no longer allowed to be used for Jar integrity verification by default. MD5 hash algorithm is expected to be disabled by default in the future updates. A newly introduced security property jdk.jar.disabledAlgorithms can be used to control the set of disabled algorithms. 
* A flaw was found in the way the JMX component of OpenJDK handled classloaders. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2016-5554) 
* A flaw was found in the way the Networking component of OpenJDK handled HTTP proxy authentication. A Java application could possibly expose HTTPS server authentication credentials via a plain text network connection to an HTTP proxy if proxy asked for authentication. (CVE-2016-5597) 
Note: After this update, Basic HTTP proxy authentication can no longer be used when tunneling HTTPS connection through an HTTP proxy. Newly introduced system properties jdk.http.auth.proxying.disabledSchemes and jdk.http.auth.tunneling.disabledSchemes can be used to control which authentication schemes can be requested by an HTTP proxy when proxying HTTP and HTTPS connections respectively.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-11-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.8.0.el7_3" src="java-1.7.0-openjdk-1.7.0.121-2.6.8.0.el7_3.src.rpm" version="1.7.0.121"><filename>java-1.7.0-openjdk-javadoc-1.7.0.121-2.6.8.0.el7_3.noarch.rpm</filename><sum type="sha256">82d504caaa22178fec8ad9b68a2676e93a1c3b92ecdcef4ab0bd2d0acf012833</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.8.0.el7_3" src="java-1.7.0-openjdk-1.7.0.121-2.6.8.0.el7_3.src.rpm" version="1.7.0.121"><filename>java-1.7.0-openjdk-headless-1.7.0.121-2.6.8.0.el7_3.x86_64.rpm</filename><sum type="sha256">6f3cd9c50e3de317e4a0c3f17a0e6a97d5202ed601d1a896435540aadf156d03</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.8.0.el7_3" src="java-1.7.0-openjdk-1.7.0.121-2.6.8.0.el7_3.src.rpm" version="1.7.0.121"><filename>java-1.7.0-openjdk-accessibility-1.7.0.121-2.6.8.0.el7_3.x86_64.rpm</filename><sum type="sha256">f5ba25c5409cdb9c6e7aa52f325e9cbd24c50ed1e7ded6285e5b20936f25b1b9</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.8.0.el7_3" src="java-1.7.0-openjdk-1.7.0.121-2.6.8.0.el7_3.src.rpm" version="1.7.0.121"><filename>java-1.7.0-openjdk-devel-1.7.0.121-2.6.8.0.el7_3.x86_64.rpm</filename><sum type="sha256">a2196f236e804eb44ff6b12a12d9f1e55a17e4c6207b05cd90d61bdc2c151320</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.8.0.el7_3" src="java-1.7.0-openjdk-1.7.0.121-2.6.8.0.el7_3.src.rpm" version="1.7.0.121"><filename>java-1.7.0-openjdk-1.7.0.121-2.6.8.0.el7_3.x86_64.rpm</filename><sum type="sha256">a3aa87a1bd948e0b4960dbeed33150f0f6cadf2c1681b0f68769df3f67c7c4ef</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.8.0.el7_3" src="java-1.7.0-openjdk-1.7.0.121-2.6.8.0.el7_3.src.rpm" version="1.7.0.121"><filename>java-1.7.0-openjdk-demo-1.7.0.121-2.6.8.0.el7_3.x86_64.rpm</filename><sum type="sha256">306d96e50a869b8627c24cd9a7ae768a4e2a2069b4a4cab69cb2b7c48ca984dd</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.8.0.el7_3" src="java-1.7.0-openjdk-1.7.0.121-2.6.8.0.el7_3.src.rpm" version="1.7.0.121"><filename>java-1.7.0-openjdk-src-1.7.0.121-2.6.8.0.el7_3.x86_64.rpm</filename><sum type="sha256">bf427ef28894686388bedbc4af953014a94fd8b385437c1cdaaf727246f52a8d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542" id="CVE-2016-5542" title="Openjdk: Missing Algorithm Restrictions For Jar Verification (Libraries, 8155973)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554" id="CVE-2016-5554" title="Openjdk: Insufficient Classloader Consistency Checks In Classloaderwithrepository (Jmx, 8157739)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573" id="CVE-2016-5573" title="Openjdk: Insufficient Checks Of Jdwp Packets (Hotspot, 8159519)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582" id="CVE-2016-5582" title="Openjdk: Incomplete Type Checks Of System.Arraycopy Arguments (Hotspot, 8160591)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597" id="CVE-2016-5597" title="Openjdk: Exposure Of Server Authentication Credentials To Proxy (Networking, 8160838)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2658" id="RHSA-2016:2658-1" title="Rhsa-2016:2658-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385402" id="1385402" title="Openjdk: Incomplete Type Checks Of System.Arraycopy Arguments (Hotspot, 8160591)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385544" id="1385544" title="Openjdk: Insufficient Checks Of Jdwp Packets (Hotspot, 8159519)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385714" id="1385714" title="Openjdk: Insufficient Classloader Consistency Checks In Classloaderwithrepository (Jmx, 8157739)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385723" id="1385723" title="Openjdk: Missing Algorithm Restrictions For Jar Verification (Libraries, 8155973)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386103" id="1386103" title="Openjdk: Exposure Of Server Authentication Credentials To Proxy (Networking, 8160838)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2674-1</id><title>Libgcrypt</title><description>Security Fix(es): 
* A design flaw was found in the libgcrypt PRNG (Pseudo-Random Number Generator). An attacker able to obtain the first 580 bytes of the PRNG output could predict the following 20 bytes. (CVE-2016-6313)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-11-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libgcrypt-devel" release="13.el7_3.1" src="libgcrypt-1.5.3-13.el7_3.1.src.rpm" version="1.5.3"><filename>libgcrypt-devel-1.5.3-13.el7_3.1.x86_64.rpm</filename><sum type="sha256">53ff06f91accd683bdab7ead22b18ed6d8a6cc1b163eab48319f4cf733fb3128</sum></package><package arch="i686" name="libgcrypt" release="13.el7_3.1" src="libgcrypt-1.5.3-13.el7_3.1.src.rpm" version="1.5.3"><filename>libgcrypt-1.5.3-13.el7_3.1.i686.rpm</filename><sum type="sha256">0995155831ca0c307b8c22bdc0ac0e96e0b90b7cde61bbc31bbd49cd9096c0f5</sum></package><package arch="i686" name="libgcrypt-devel" release="13.el7_3.1" src="libgcrypt-1.5.3-13.el7_3.1.src.rpm" version="1.5.3"><filename>libgcrypt-devel-1.5.3-13.el7_3.1.i686.rpm</filename><sum type="sha256">b7d0100e60e8eac2954d47c9b25b4f518832a2166e62c2ecf4a12775a5b614bf</sum></package><package arch="x86_64" name="libgcrypt" release="13.el7_3.1" src="libgcrypt-1.5.3-13.el7_3.1.src.rpm" version="1.5.3"><filename>libgcrypt-1.5.3-13.el7_3.1.x86_64.rpm</filename><sum type="sha256">8b20e5102b5d53df717c4e52aa6dd4f8f563878f1948d7e02bf9f0db496934b9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6313" id="CVE-2016-6313" title="Libgcrypt: Prng Output Is Predictable" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2674" id="RHSA-2016:2674-1" title="Rhsa-2016:2674-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1366105" id="1366105" title="Libgcrypt: Prng Output Is Predictable" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2702-1</id><title>Policycoreutils</title><description>Security Fix(es): 
* It was found that the sandbox tool provided in policycoreutils was vulnerable to a TIOCSTI ioctl attack. A specially crafted program executed via the sandbox command could use this flaw to execute arbitrary commands in the context of the parent shell, escaping the sandbox. (CVE-2016-7545)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-11-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="policycoreutils-sandbox" release="9.el7" src="policycoreutils-2.5-9.el7.src.rpm" version="2.5"><filename>policycoreutils-sandbox-2.5-9.el7.x86_64.rpm</filename><sum type="sha256">a9dd9785f06949b6efab4dca0a3a65f854e483079b7b344e628819b86090d2e3</sum></package><package arch="x86_64" name="policycoreutils-newrole" release="9.el7" src="policycoreutils-2.5-9.el7.src.rpm" version="2.5"><filename>policycoreutils-newrole-2.5-9.el7.x86_64.rpm</filename><sum type="sha256">0701990dd95d76287b548ad8c73b3d239386b5838f45bbab7601f3b35decc542</sum></package><package arch="x86_64" name="policycoreutils-python" release="9.el7" src="policycoreutils-2.5-9.el7.src.rpm" version="2.5"><filename>policycoreutils-python-2.5-9.el7.x86_64.rpm</filename><sum type="sha256">b6141aada46d2d09fe33677e825b3d42544642eb3f628c5cbda76db95da7bbd6</sum></package><package arch="x86_64" name="policycoreutils-restorecond" release="9.el7" src="policycoreutils-2.5-9.el7.src.rpm" version="2.5"><filename>policycoreutils-restorecond-2.5-9.el7.x86_64.rpm</filename><sum type="sha256">3d0ea5c114a3c7add2cef4672c08772ec6cdbfd0b342e4fb1d9928702bddf527</sum></package><package arch="i686" name="policycoreutils-devel" release="9.el7" src="policycoreutils-2.5-9.el7.src.rpm" version="2.5"><filename>policycoreutils-devel-2.5-9.el7.i686.rpm</filename><sum type="sha256">80163ac88757dcaea2c98cb23242c415eeb514bc38b575fecc963dc22e5cbfd3</sum></package><package arch="x86_64" name="policycoreutils" release="9.el7" src="policycoreutils-2.5-9.el7.src.rpm" version="2.5"><filename>policycoreutils-2.5-9.el7.x86_64.rpm</filename><sum type="sha256">3677b793fa4d98496490a5bb79660ac1773ccc40d3767a1504f01acc18e0383c</sum></package><package arch="x86_64" name="policycoreutils-gui" release="9.el7" src="policycoreutils-2.5-9.el7.src.rpm" version="2.5"><filename>policycoreutils-gui-2.5-9.el7.x86_64.rpm</filename><sum type="sha256">dd2a89999e270df42d6d485bcc8699603af2ccb5e9610bc6bd9966c5cf9bc84c</sum></package><package arch="x86_64" name="policycoreutils-devel" release="9.el7" src="policycoreutils-2.5-9.el7.src.rpm" version="2.5"><filename>policycoreutils-devel-2.5-9.el7.x86_64.rpm</filename><sum type="sha256">983e79d9cbf3ec8ecb90fb4ebbfee13309212f10b4104092497b31826e8ae2d9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7545" id="CVE-2016-7545" title="Policycoreutils: Selinux Sandbox Escape Via Tiocsti Ioctl" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2702" id="RHSA-2016:2702-1" title="Rhsa-2016:2702-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378577" id="1378577" title="Policycoreutils: Selinux Sandbox Escape Via Tiocsti Ioctl" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2779-1</id><title>Nss And Nss-Util</title><description>The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. 
The following packages have been upgraded to a newer upstream version: nss (3.12.3), nss-util (3.12.3). 
Security Fix(es): 
* Multiple buffer handling flaws were found in the way NSS handled cryptographic data from the network. A remote attacker could use these flaws to crash an application using NSS or, possibly, execute arbitrary code with the permission of the user running the application. (CVE-2016-2834) 
* A NULL pointer dereference flaw was found in the way NSS handled invalid Diffie-Hellman keys. A remote client could use this flaw to crash a TLS/SSL server using NSS. (CVE-2016-5285) 
* It was found that Diffie Hellman Client key exchange handling in NSS was vulnerable to small subgroup confinement attack. An attacker could use this flaw to recover private keys by confining the client DH key to small subgroup of the desired group. (CVE-2016-8635)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-11-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss" release="2.el7_3" src="nss-3.21.3-2.el7_3.src.rpm" version="3.21.3"><filename>nss-3.21.3-2.el7_3.x86_64.rpm</filename><sum type="sha256">0d56e6120c265c702ae71e5f9ec7b55d7e77b38d863561dc8d9bd5370b2c80fe</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="2.el7_3" src="nss-3.21.3-2.el7_3.src.rpm" version="3.21.3"><filename>nss-pkcs11-devel-3.21.3-2.el7_3.x86_64.rpm</filename><sum type="sha256">e769f6e55a3a499db9cab9ab6bd8b18eaaae72f8ad677731f7110b0fecfc13c6</sum></package><package arch="i686" name="nss-util-devel" release="1.1.el7_3" src="nss-util-3.21.3-1.1.el7_3.src.rpm" version="3.21.3"><filename>nss-util-devel-3.21.3-1.1.el7_3.i686.rpm</filename><sum type="sha256">99d52094f4b0efd904306535a670b65bc2d5571c55eb09102f7c998a40f730d1</sum></package><package arch="i686" name="nss-pkcs11-devel" release="2.el7_3" src="nss-3.21.3-2.el7_3.src.rpm" version="3.21.3"><filename>nss-pkcs11-devel-3.21.3-2.el7_3.i686.rpm</filename><sum type="sha256">c28f447f8d697bcf6a6d73bfb4e32f5e85f56f1f8a123fe4467387cbb155a1c2</sum></package><package arch="x86_64" name="nss-util-devel" release="1.1.el7_3" src="nss-util-3.21.3-1.1.el7_3.src.rpm" version="3.21.3"><filename>nss-util-devel-3.21.3-1.1.el7_3.x86_64.rpm</filename><sum type="sha256">8e8ab2599c191f6ae90c9b124cd8918dc4f174fb8f79ad5e3486d7266ab0294c</sum></package><package arch="i686" name="nss-devel" release="2.el7_3" src="nss-3.21.3-2.el7_3.src.rpm" version="3.21.3"><filename>nss-devel-3.21.3-2.el7_3.i686.rpm</filename><sum type="sha256">36217bec92c1f8df597598ee8e75f4473e1855c8b6da85606da1c4e6b97ff04c</sum></package><package arch="i686" name="nss" release="2.el7_3" src="nss-3.21.3-2.el7_3.src.rpm" version="3.21.3"><filename>nss-3.21.3-2.el7_3.i686.rpm</filename><sum type="sha256">becf9250029a5474cd1e3e02e562ef1f56309c00ce48d7cc5618b1b7de03272e</sum></package><package arch="x86_64" name="nss-util" release="1.1.el7_3" src="nss-util-3.21.3-1.1.el7_3.src.rpm" version="3.21.3"><filename>nss-util-3.21.3-1.1.el7_3.x86_64.rpm</filename><sum type="sha256">73af0e25da790619e83267240ce5c56467ae2366960362812fb8698c78151b31</sum></package><package arch="i686" name="nss-util" release="1.1.el7_3" src="nss-util-3.21.3-1.1.el7_3.src.rpm" version="3.21.3"><filename>nss-util-3.21.3-1.1.el7_3.i686.rpm</filename><sum type="sha256">fe962c2d3c79131a90a158500f74b756ea382458648cf38b1f12d72fe4f59cf1</sum></package><package arch="x86_64" name="nss-devel" release="2.el7_3" src="nss-3.21.3-2.el7_3.src.rpm" version="3.21.3"><filename>nss-devel-3.21.3-2.el7_3.x86_64.rpm</filename><sum type="sha256">b8924c90567e4fe632f4928982530e951434dfc1ce2ac6628859703068c716df</sum></package><package arch="x86_64" name="nss-tools" release="2.el7_3" src="nss-3.21.3-2.el7_3.src.rpm" version="3.21.3"><filename>nss-tools-3.21.3-2.el7_3.x86_64.rpm</filename><sum type="sha256">e4ce2985c325f999fdd2bd9a97b3699737664af0f359d39add197d9c06eead37</sum></package><package arch="x86_64" name="nss-sysinit" release="2.el7_3" src="nss-3.21.3-2.el7_3.src.rpm" version="3.21.3"><filename>nss-sysinit-3.21.3-2.el7_3.x86_64.rpm</filename><sum type="sha256">c00fb63bd850f70049bdb60c4c0466a67b81bccabb274ba239fe1f013c90315f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2834" id="CVE-2016-2834" title="Nss: Multiple Security Flaws (Mfsa 2016-61)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5285" id="CVE-2016-5285" title="Nss: Missing Null Check In Pk11_Signwithsymkey / Ssl3_Computerecordmacconstanttime Causes Server Crash" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8635" id="CVE-2016-8635" title="Nss: Small-Subgroups Attack Flaw" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2779" id="RHSA-2016:2779-1" title="Rhsa-2016:2779-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347908" id="1347908" title="Nss: Multiple Security Flaws (Mfsa 2016-61)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1383883" id="1383883" title="Nss: Missing Null Check In Pk11_Signwithsymkey / Ssl3_Computerecordmacconstanttime Causes Server Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391818" id="1391818" title="Nss: Small-Subgroups Attack Flaw" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2780-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.5.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-5296, CVE-2016-5297, CVE-2016-9066, CVE-2016-5291, CVE-2016-5290) 
* A flaw was found in the way Add-on update process was handled by Firefox. A Man-in-the-Middle attacker could use this flaw to install a malicious signed add-on update. (CVE-2016-9064)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-11-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_3" src="firefox-45.5.0-1.el7_3.src.rpm" version="45.5.0"><filename>firefox-45.5.0-1.el7_3.i686.rpm</filename><sum type="sha256">5b594adc8b186fa91468cba42c7eff4fe6f7ffa53b71f2675a9057f1de667fa4</sum></package><package arch="x86_64" name="firefox" release="1.el7_3" src="firefox-45.5.0-1.el7_3.src.rpm" version="45.5.0"><filename>firefox-45.5.0-1.el7_3.x86_64.rpm</filename><sum type="sha256">488025cf5981e8f24fced70c085315621a788a006f4f2b06c240695c1eb41e9e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290" id="CVE-2016-5290" title="Mozilla: Memory Safety Bugs Fixed In Firefox 45.5 (Mfsa 2016-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5291" id="CVE-2016-5291" title="Mozilla: Same-Origin Policy Violation Using Local Html File And Saved Shortcut File (Mfsa 2016-89, Mfsa 2016-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5296" id="CVE-2016-5296" title="Mozilla: Heap-Buffer-Overflow Write In Rasterize_Edges_1 (Mfsa 2016-89, Mfsa 2016-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5297" id="CVE-2016-5297" title="Mozilla: Incorrect Argument Length Checking In Javascript (Mfsa 2016-89, Mfsa 2016-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9064" id="CVE-2016-9064" title="Mozilla: Addons Update Must Verify Ids Match Between Current And New Versions (Mfsa 2016-89, Mfsa 2016-90)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9066" id="CVE-2016-9066" title="Mozilla: Integer Overflow Leading To A Buffer Overflow In Nsscriptloadhandler (Mfsa 2016-89, Mfsa 2016-90)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2780" id="RHSA-2016:2780-1" title="Rhsa-2016:2780-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395055" id="1395055" title="Mozilla: Heap-Buffer-Overflow Write In Rasterize_Edges_1 (Mfsa 2016-89, Mfsa 2016-90)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395058" id="1395058" title="Mozilla: Incorrect Argument Length Checking In Javascript (Mfsa 2016-89, Mfsa 2016-90)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395060" id="1395060" title="Mozilla: Addons Update Must Verify Ids Match Between Current And New Versions (Mfsa 2016-89, Mfsa 2016-90)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395061" id="1395061" title="Mozilla: Integer Overflow Leading To A Buffer Overflow In Nsscriptloadhandler (Mfsa 2016-89, Mfsa 2016-90)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395065" id="1395065" title="Mozilla: Same-Origin Policy Violation Using Local Html File And Saved Shortcut File (Mfsa 2016-89, Mfsa 2016-90)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395066" id="1395066" title="Mozilla: Memory Safety Bugs Fixed In Firefox 45.5 (Mfsa 2016-90)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2809-1</id><title>Ipsilon</title><description>Security Fix(es): 
* A vulnerability was found in ipsilon in the SAML2 provider's handling of sessions. An attacker able to hit the logout URL could determine what service providers other users are logged in to and terminate their sessions. (CVE-2016-8638) 
This issue was discovered by Patrick Uiterwijk (Red Hat) and Howard Johnson.</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ipsilon-persona" release="13.el7_3" src="ipsilon-1.0.0-13.el7_3.src.rpm" version="1.0.0"><filename>ipsilon-persona-1.0.0-13.el7_3.noarch.rpm</filename><sum type="sha256">aeee043f6d502ee3480514947c1ab69ecba6e268bc8299a96e5704b996c3e365</sum></package><package arch="noarch" name="ipsilon-authgssapi" release="13.el7_3" src="ipsilon-1.0.0-13.el7_3.src.rpm" version="1.0.0"><filename>ipsilon-authgssapi-1.0.0-13.el7_3.noarch.rpm</filename><sum type="sha256">af52e86e77130a6856ef58fdf7dbe188c96899021af7d28c20acfa679f3e0b7e</sum></package><package arch="noarch" name="ipsilon-filesystem" release="13.el7_3" src="ipsilon-1.0.0-13.el7_3.src.rpm" version="1.0.0"><filename>ipsilon-filesystem-1.0.0-13.el7_3.noarch.rpm</filename><sum type="sha256">181b142abf0f02180f4d93b6de6318b2fddc59fe432ee04c51d9cef985d87b40</sum></package><package arch="noarch" name="ipsilon-infosssd" release="13.el7_3" src="ipsilon-1.0.0-13.el7_3.src.rpm" version="1.0.0"><filename>ipsilon-infosssd-1.0.0-13.el7_3.noarch.rpm</filename><sum type="sha256">5ec9558c494060d366c0296ccf15c04c4be0be14f16c2daecb8c07677373523f</sum></package><package arch="noarch" name="ipsilon-saml2" release="13.el7_3" src="ipsilon-1.0.0-13.el7_3.src.rpm" version="1.0.0"><filename>ipsilon-saml2-1.0.0-13.el7_3.noarch.rpm</filename><sum type="sha256">15bc324e0242f28252782ce9a3cf0b2e54df4ea81628dbb6474f2053d8bd6fff</sum></package><package arch="noarch" name="ipsilon-base" release="13.el7_3" src="ipsilon-1.0.0-13.el7_3.src.rpm" version="1.0.0"><filename>ipsilon-base-1.0.0-13.el7_3.noarch.rpm</filename><sum type="sha256">2a386b8e0295c0787b169ef99d5ebab8b226c8821d02bb69fee30ccb039c95de</sum></package><package arch="noarch" name="ipsilon-tools-ipa" release="13.el7_3" src="ipsilon-1.0.0-13.el7_3.src.rpm" version="1.0.0"><filename>ipsilon-tools-ipa-1.0.0-13.el7_3.noarch.rpm</filename><sum type="sha256">7be03eba8573ba6850c81862ff811d21053c00d1acc04c10c2a2c5fae67133e7</sum></package><package arch="noarch" name="ipsilon-client" release="13.el7_3" src="ipsilon-1.0.0-13.el7_3.src.rpm" version="1.0.0"><filename>ipsilon-client-1.0.0-13.el7_3.noarch.rpm</filename><sum type="sha256">a50cf6de1d25dbad0b362f0ec7f03d927ca888ba4c1165b088868bbb3f4b4bc6</sum></package><package arch="noarch" name="ipsilon-authform" release="13.el7_3" src="ipsilon-1.0.0-13.el7_3.src.rpm" version="1.0.0"><filename>ipsilon-authform-1.0.0-13.el7_3.noarch.rpm</filename><sum type="sha256">44c4bd9cf9b5c6b7d1613ed812d328921aeb555c12a09507ad545956796d1bd8</sum></package><package arch="noarch" name="ipsilon-saml2-base" release="13.el7_3" src="ipsilon-1.0.0-13.el7_3.src.rpm" version="1.0.0"><filename>ipsilon-saml2-base-1.0.0-13.el7_3.noarch.rpm</filename><sum type="sha256">496a0fb9b6c620348eade57864099046e899e07f484c61634caa5f76d4ac11b8</sum></package><package arch="noarch" name="ipsilon-authldap" release="13.el7_3" src="ipsilon-1.0.0-13.el7_3.src.rpm" version="1.0.0"><filename>ipsilon-authldap-1.0.0-13.el7_3.noarch.rpm</filename><sum type="sha256">5435d9d0c305d84421f94fc5b688b19e9ad2e50aaa0ebbad10a3867afb5e85dc</sum></package><package arch="noarch" name="ipsilon" release="13.el7_3" src="ipsilon-1.0.0-13.el7_3.src.rpm" version="1.0.0"><filename>ipsilon-1.0.0-13.el7_3.noarch.rpm</filename><sum type="sha256">7a4245f0a51bf1d65007a71b207aaf2fafee9e7f7a90952ae266daf1ae39a4aa</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8638" id="CVE-2016-8638" title="Ipsilon: Dos Via Logging Out All Open Saml2 Sessions" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2809" id="RHSA-2016:2809-1" title="Rhsa-2016:2809-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1392829" id="1392829" title="Ipsilon: Dos Via Logging Out All Open Saml2 Sessions" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2819-1</id><title>Memcached</title><description>Security Fix(es): 
* Two integer overflow flaws, leading to heap-based buffer overflows, were found in the memcached binary protocol. An attacker could create a specially crafted message that would cause the memcached server to crash or, potentially, execute arbitrary code. (CVE-2016-8704, CVE-2016-8705) 
* An integer overflow flaw, leading to a heap-based buffer overflow, was found in memcached's parsing of SASL authentication messages. An attacker could create a specially crafted message that would cause the memcached server to crash or, potentially, execute arbitrary code. (CVE-2016-8706)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="memcached" release="10.el7_3.1" src="memcached-1.4.15-10.el7_3.1.src.rpm" version="1.4.15"><filename>memcached-1.4.15-10.el7_3.1.x86_64.rpm</filename><sum type="sha256">7c183db2b957e8e68cf143f283d5fb8874c85a9fcd90c7fdd5868a7c77217a20</sum></package><package arch="x86_64" name="memcached-devel" release="10.el7_3.1" src="memcached-1.4.15-10.el7_3.1.src.rpm" version="1.4.15"><filename>memcached-devel-1.4.15-10.el7_3.1.x86_64.rpm</filename><sum type="sha256">afa46f776c556cf2c03bb10ecaddf8d51588ceee5508e21f718bfc36fdaa4bb4</sum></package><package arch="i686" name="memcached-devel" release="10.el7_3.1" src="memcached-1.4.15-10.el7_3.1.src.rpm" version="1.4.15"><filename>memcached-devel-1.4.15-10.el7_3.1.i686.rpm</filename><sum type="sha256">b15ce8af75cc172c3665cee8c583a50a898f474716566c5d2a028b160d807d71</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8704" id="CVE-2016-8704" title="Memcached: Server Append/Prepend Remote Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8705" id="CVE-2016-8705" title="Memcached: Server Update Remote Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8706" id="CVE-2016-8706" title="Memcached: Sasl Authentication Remote Code Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2819" id="RHSA-2016:2819-1" title="Rhsa-2016:2819-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390510" id="1390510" title="Memcached: Server Append/Prepend Remote Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390511" id="1390511" title="Memcached: Server Update Remote Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390512" id="1390512" title="Memcached: Sasl Authentication Remote Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2824-1</id><title>Expat</title><description>Security Fix(es): 
* An out-of-bounds read flaw was found in the way Expat processed certain input. A remote attacker could send specially crafted XML that, when parsed by an application using the Expat library, would cause that application to crash or, possibly, execute arbitrary code with the permission of the user running the application. (CVE-2016-0718)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="expat" release="10.el7_3" src="expat-2.1.0-10.el7_3.src.rpm" version="2.1.0"><filename>expat-2.1.0-10.el7_3.x86_64.rpm</filename><sum type="sha256">392a4ccf8a0d5388ea0afa882f70d07c31a866e296aed8ce971ccbc1d9ec4566</sum></package><package arch="x86_64" name="expat-static" release="10.el7_3" src="expat-2.1.0-10.el7_3.src.rpm" version="2.1.0"><filename>expat-static-2.1.0-10.el7_3.x86_64.rpm</filename><sum type="sha256">186eb08bbdf2bd57ad90dffc8703faeb92be8139e3f225772620f49f05d01459</sum></package><package arch="i686" name="expat-static" release="10.el7_3" src="expat-2.1.0-10.el7_3.src.rpm" version="2.1.0"><filename>expat-static-2.1.0-10.el7_3.i686.rpm</filename><sum type="sha256">2098b5b81556b07ac0824266b04c30ca0e76fd19e6c98a5f27c19fc88011e124</sum></package><package arch="i686" name="expat-devel" release="10.el7_3" src="expat-2.1.0-10.el7_3.src.rpm" version="2.1.0"><filename>expat-devel-2.1.0-10.el7_3.i686.rpm</filename><sum type="sha256">ff89281bee577b2d1395ef8313a268ea4a47451245f08f11240b76702b6d755c</sum></package><package arch="i686" name="expat" release="10.el7_3" src="expat-2.1.0-10.el7_3.src.rpm" version="2.1.0"><filename>expat-2.1.0-10.el7_3.i686.rpm</filename><sum type="sha256">15dc6cc9f497c5e9c11ab5795039a8f69125952c31f5c7d7c601e700479c7dbc</sum></package><package arch="x86_64" name="expat-devel" release="10.el7_3" src="expat-2.1.0-10.el7_3.src.rpm" version="2.1.0"><filename>expat-devel-2.1.0-10.el7_3.x86_64.rpm</filename><sum type="sha256">9c49ba3bd5bfad811381d6751100fdb2a3e22bca0bfdcaa2a25784d12e9f9efc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0718" id="CVE-2016-0718" title="Expat: Out-Of-Bounds Heap Read On Crafted Input Causing Crash" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2824" id="RHSA-2016:2824-1" title="Rhsa-2016:2824-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1296102" id="1296102" title="Expat: Out-Of-Bounds Heap Read On Crafted Input Causing Crash" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2825-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.5.0 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-5290)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_3" src="thunderbird-45.5.0-1.el7_3.src.rpm" version="45.5.0"><filename>thunderbird-45.5.0-1.el7_3.x86_64.rpm</filename><sum type="sha256">5a5ede76cad07bb619adb879f6943623b4fbe5af70e61d14b0778a41672ded16</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5290" id="CVE-2016-5290" title="Mozilla: Memory Safety Bugs Fixed In Firefox 45.5 (Mfsa 2016-90)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2825" id="RHSA-2016:2825-1" title="Rhsa-2016:2825-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395066" id="1395066" title="Mozilla: Memory Safety Bugs Fixed In Firefox 45.5 (Mfsa 2016-90)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2843-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.5.1 ESR. 
Security Fix(es): 
* A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-9079)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_3" src="firefox-45.5.1-1.el7_3.src.rpm" version="45.5.1"><filename>firefox-45.5.1-1.el7_3.x86_64.rpm</filename><sum type="sha256">23c4a752046db39df2a8a43e7cefec657b52c81805e5fb75b2dd806859bdd968</sum></package><package arch="i686" name="firefox" release="1.el7_3" src="firefox-45.5.1-1.el7_3.src.rpm" version="45.5.1"><filename>firefox-45.5.1-1.el7_3.i686.rpm</filename><sum type="sha256">f165bb052a893e8616604677230edc923466595c4ac9bc131b5521e9797a5e5d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079" id="CVE-2016-9079" title="Mozilla: Firefox Svg Animation Remote Code Execution (Mfsa 2016-92)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2843" id="RHSA-2016:2843-1" title="Rhsa-2016:2843-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1400376" id="1400376" title="Mozilla: Firefox Svg Animation Remote Code Execution (Mfsa 2016-92)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2850-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.5.1. 
Security Fix(es): 
* A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-9079)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_3" src="thunderbird-45.5.1-1.el7_3.src.rpm" version="45.5.1"><filename>thunderbird-45.5.1-1.el7_3.x86_64.rpm</filename><sum type="sha256">fad1a08ed117ffc75948127b1835f4a02886da2f03be77f6de76fe4ecd5320a4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9079" id="CVE-2016-9079" title="Mozilla: Firefox Svg Animation Remote Code Execution (Mfsa 2016-92)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2850" id="RHSA-2016:2850-1" title="Rhsa-2016:2850-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1400376" id="1400376" title="Mozilla: Firefox Svg Animation Remote Code Execution (Mfsa 2016-92)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2872-1</id><title>Sudo</title><description>Security Fix(es): 
* It was discovered that the sudo noexec restriction could have been bypassed if application run via sudo executed system(), popen(), or wordexp() C library functions with a user supplied argument. A local user permitted to run such application via sudo with noexec restriction could use these flaws to execute arbitrary commands with elevated privileges. (CVE-2016-7032, CVE-2016-7076) 
These issues were discovered by Florian Weimer (Red Hat).</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="sudo" release="21.el7_3" src="sudo-1.8.6p7-21.el7_3.src.rpm" version="1.8.6p7"><filename>sudo-1.8.6p7-21.el7_3.x86_64.rpm</filename><sum type="sha256">16aad4585c79d4a5304b47bdab4c7a26c51fffdb53fb90aa569bda585a8d5f03</sum></package><package arch="i686" name="sudo-devel" release="21.el7_3" src="sudo-1.8.6p7-21.el7_3.src.rpm" version="1.8.6p7"><filename>sudo-devel-1.8.6p7-21.el7_3.i686.rpm</filename><sum type="sha256">59dd6e6e380abc94d8350615422b4a517f9744ba31003da442c491b3984d9a59</sum></package><package arch="x86_64" name="sudo-devel" release="21.el7_3" src="sudo-1.8.6p7-21.el7_3.src.rpm" version="1.8.6p7"><filename>sudo-devel-1.8.6p7-21.el7_3.x86_64.rpm</filename><sum type="sha256">262c1e5b2d712d713440b69481e34be9d3406bb6478cb0dfb29cf807ebfa8051</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7032" id="CVE-2016-7032" title="Sudo: Noexec Bypass Via System() And Popen()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7076" id="CVE-2016-7076" title="Sudo: Noexec Bypass Via Wordexp()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2872" id="RHSA-2016:2872-1" title="Rhsa-2016:2872-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1372830" id="1372830" title="Sudo: Noexec Bypass Via System() And Popen()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1384982" id="1384982" title="Sudo: Noexec Bypass Via Wordexp()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2946-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.6.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2016-9893, CVE-2016-9899, CVE-2016-9895, CVE-2016-9897, CVE-2016-9898, CVE-2016-9900, CVE-2016-9901, CVE-2016-9902, CVE-2016-9904, CVE-2016-9905)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2016-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_3" src="firefox-45.6.0-1.el7_3.src.rpm" version="45.6.0"><filename>firefox-45.6.0-1.el7_3.x86_64.rpm</filename><sum type="sha256">4216f50d79b70e8e99d171d186a52c5e739e195cf5d0f98dfb05246c6705d1dc</sum></package><package arch="i686" name="firefox" release="1.el7_3" src="firefox-45.6.0-1.el7_3.src.rpm" version="45.6.0"><filename>firefox-45.6.0-1.el7_3.i686.rpm</filename><sum type="sha256">3e8d0d7f35e7e3ccd54b42fe08ed9d207f020a0b038ca8a90bbb9f0425c7fc34</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9893" id="CVE-2016-9893" title="Mozilla: Memory Safety Bugs Fixed In Firefox 50.1 And Firefox Esr 45.6 (Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9895" id="CVE-2016-9895" title="Mozilla: Csp Bypass Using Marquee Tag (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9897" id="CVE-2016-9897" title="Mozilla: Memory Corruption In Libgles (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9898" id="CVE-2016-9898" title="Mozilla: Use-After-Free In Editor While Manipulating Dom Subtrees (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9899" id="CVE-2016-9899" title="Mozilla: Use-After-Free While Manipulating Dom Events And Audio Elements (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9900" id="CVE-2016-9900" title="Mozilla: Restricted External Resources Can Be Loaded By Svg Images Through Data Urls (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9901" id="CVE-2016-9901" title="Mozilla: Data From Pocket Server Improperly Sanitized Before Execution (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9902" id="CVE-2016-9902" title="Mozilla: Pocket Extension Does Not Validate The Origin Of Events (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9904" id="CVE-2016-9904" title="Mozilla: Cross-Origin Information Leak In Shared Atoms (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9905" id="CVE-2016-9905" title="Mozilla: Crash In Enumeratesubdocuments (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2946" id="RHSA-2016:2946-1" title="Rhsa-2016:2946-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404083" id="1404083" title="Mozilla: Use-After-Free While Manipulating Dom Events And Audio Elements (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404086" id="1404086" title="Mozilla: Csp Bypass Using Marquee Tag (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404087" id="1404087" title="Mozilla: Memory Corruption In Libgles (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404089" id="1404089" title="Mozilla: Use-After-Free In Editor While Manipulating Dom Subtrees (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404090" id="1404090" title="Mozilla: Restricted External Resources Can Be Loaded By Svg Images Through Data Urls (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404091" id="1404091" title="Mozilla: Cross-Origin Information Leak In Shared Atoms (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404094" id="1404094" title="Mozilla: Crash In Enumeratesubdocuments (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404096" id="1404096" title="Mozilla: Memory Safety Bugs Fixed In Firefox 50.1 And Firefox Esr 45.6 (Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404358" id="1404358" title="Mozilla: Data From Pocket Server Improperly Sanitized Before Execution (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404359" id="1404359" title="Mozilla: Pocket Extension Does Not Validate The Origin Of Events (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2972-1</id><title>Vim</title><description>Security Fix(es): 
* A vulnerability was found in vim in how certain modeline options were treated. An attacker could craft a file that, when opened in vim with modelines enabled, could execute arbitrary commands with privileges of the user running vim. (CVE-2016-1248)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2016-12-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="vim-enhanced" release="1.el7_3.1" src="vim-7.4.160-1.el7_3.1.src.rpm" version="7.4.160"><filename>vim-enhanced-7.4.160-1.el7_3.1.x86_64.rpm</filename><sum type="sha256">f5b71dce78460109c34cc4d15c3f4a4017c5cb17e9f94e9d34d569475f3ca165</sum></package><package arch="x86_64" epoch="2" name="vim-X11" release="1.el7_3.1" src="vim-7.4.160-1.el7_3.1.src.rpm" version="7.4.160"><filename>vim-X11-7.4.160-1.el7_3.1.x86_64.rpm</filename><sum type="sha256">cbaed8c12a3bfcd758abc002a1000544e2cdd9cc5fe81a022a37471db14651de</sum></package><package arch="x86_64" epoch="2" name="vim-common" release="1.el7_3.1" src="vim-7.4.160-1.el7_3.1.src.rpm" version="7.4.160"><filename>vim-common-7.4.160-1.el7_3.1.x86_64.rpm</filename><sum type="sha256">74be6ec8369bf1a0187dfa720d0d8173e671965791e872a1cc600d1b5295289a</sum></package><package arch="x86_64" epoch="2" name="vim-filesystem" release="1.el7_3.1" src="vim-7.4.160-1.el7_3.1.src.rpm" version="7.4.160"><filename>vim-filesystem-7.4.160-1.el7_3.1.x86_64.rpm</filename><sum type="sha256">612fdbd103fae5e3fcd73c0342f9f7e79690b6bb5e77309a6dc380674a0d86ab</sum></package><package arch="x86_64" epoch="2" name="vim-minimal" release="1.el7_3.1" src="vim-7.4.160-1.el7_3.1.src.rpm" version="7.4.160"><filename>vim-minimal-7.4.160-1.el7_3.1.x86_64.rpm</filename><sum type="sha256">97c631447b5adc21f9f26ef4b0aa8a255d3a329c4b88968122976f5d9dbdc107</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1248" id="CVE-2016-1248" title="Vim: Lack Of Validation Of Values For Few Options Results In Code Exection" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2972" id="RHSA-2016:2972-1" title="Rhsa-2016:2972-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398227" id="1398227" title="Vim: Lack Of Validation Of Values For Few Options Results In Code Exection" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2016:2973-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.6.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2016-9893, CVE-2016-9899, CVE-2016-9895, CVE-2016-9900, CVE-2016-9901, CVE-2016-9902, CVE-2016-9905)</description><severity>important</severity><release>Scientific Linux</release><issued date="2016-12-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_3" src="thunderbird-45.6.0-1.el7_3.src.rpm" version="45.6.0"><filename>thunderbird-45.6.0-1.el7_3.x86_64.rpm</filename><sum type="sha256">64cddfa67b2234b5a934955d8fa292f5ad8625079b7f45bb5c8838f7e0f3a9c5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9893" id="CVE-2016-9893" title="Mozilla: Memory Safety Bugs Fixed In Firefox 50.1 And Firefox Esr 45.6 (Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9895" id="CVE-2016-9895" title="Mozilla: Csp Bypass Using Marquee Tag (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9899" id="CVE-2016-9899" title="Mozilla: Use-After-Free While Manipulating Dom Events And Audio Elements (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9900" id="CVE-2016-9900" title="Mozilla: Restricted External Resources Can Be Loaded By Svg Images Through Data Urls (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9901" id="CVE-2016-9901" title="Mozilla: Data From Pocket Server Improperly Sanitized Before Execution (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9902" id="CVE-2016-9902" title="Mozilla: Pocket Extension Does Not Validate The Origin Of Events (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9905" id="CVE-2016-9905" title="Mozilla: Crash In Enumeratesubdocuments (Mfsa 2016-94, Mfsa 2016-95)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2016:2973" id="RHSA-2016:2973-1" title="Rhsa-2016:2973-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404083" id="1404083" title="Mozilla: Use-After-Free While Manipulating Dom Events And Audio Elements (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404086" id="1404086" title="Mozilla: Csp Bypass Using Marquee Tag (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404090" id="1404090" title="Mozilla: Restricted External Resources Can Be Loaded By Svg Images Through Data Urls (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404094" id="1404094" title="Mozilla: Crash In Enumeratesubdocuments (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404096" id="1404096" title="Mozilla: Memory Safety Bugs Fixed In Firefox 50.1 And Firefox Esr 45.6 (Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404358" id="1404358" title="Mozilla: Data From Pocket Server Improperly Sanitized Before Execution (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404359" id="1404359" title="Mozilla: Pocket Extension Does Not Validate The Origin Of Events (Mfsa 2016-94, Mfsa 2016-95)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0001-1</id><title>Ipa</title><description>Security Fix(es): 
* It was discovered that the default IdM password policies that lock out accounts after a certain number of failed login attempts were also applied to host and service accounts. A remote unauthenticated user could use this flaw to cause a denial of service attack against kerberized services. (CVE-2016-7030) 
* It was found that IdM's certprofile-mod command did not properly check the user's permissions while modifying certificate profiles. An authenticated, unprivileged attacker could use this flaw to modify profiles to issue certificates with arbitrary naming or key usage information and subsequently use such certificates for other attacks. (CVE-2016-9575)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python2-ipaclient" release="14.sl7_3.1.1" src="ipa-4.4.0-14.sl7_3.1.1.src.rpm" version="4.4.0"><filename>python2-ipaclient-4.4.0-14.sl7_3.1.1.noarch.rpm</filename><sum type="sha256">10221ba328220ad086a8b0fa2a88c3898ee08a48907004a02dd493ec47b511e8</sum></package><package arch="noarch" name="ipa-admintools" release="14.sl7_3.1.1" src="ipa-4.4.0-14.sl7_3.1.1.src.rpm" version="4.4.0"><filename>ipa-admintools-4.4.0-14.sl7_3.1.1.noarch.rpm</filename><sum type="sha256">76270f4523c58d998be08d63ea94267a7ad0556459351ba66bf06b7b9373075e</sum></package><package arch="noarch" name="ipa-common" release="14.sl7_3.1.1" src="ipa-4.4.0-14.sl7_3.1.1.src.rpm" version="4.4.0"><filename>ipa-common-4.4.0-14.sl7_3.1.1.noarch.rpm</filename><sum type="sha256">dfbb4704f872bf3c6a44244bb17fc3e02bec1bfa2faa8610be1e31bf0b9b5ca9</sum></package><package arch="noarch" name="ipa-server-common" release="14.sl7_3.1.1" src="ipa-4.4.0-14.sl7_3.1.1.src.rpm" version="4.4.0"><filename>ipa-server-common-4.4.0-14.sl7_3.1.1.noarch.rpm</filename><sum type="sha256">66a516edf64d594b854be4ba3d52734284950225575fe259704c1ca3cdbe96a5</sum></package><package arch="x86_64" name="ipa-server" release="14.sl7_3.1.1" src="ipa-4.4.0-14.sl7_3.1.1.src.rpm" version="4.4.0"><filename>ipa-server-4.4.0-14.sl7_3.1.1.x86_64.rpm</filename><sum type="sha256">65e91afe1539425b0cb666bf779aa5bd828431501283bb4e23aba73c65e0cd83</sum></package><package arch="noarch" name="ipa-python-compat" release="14.sl7_3.1.1" src="ipa-4.4.0-14.sl7_3.1.1.src.rpm" version="4.4.0"><filename>ipa-python-compat-4.4.0-14.sl7_3.1.1.noarch.rpm</filename><sum type="sha256">c30d133093757877667255e12b339906847fd3c8330fff3ecc85368552502e77</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="14.sl7_3.1.1" src="ipa-4.4.0-14.sl7_3.1.1.src.rpm" version="4.4.0"><filename>ipa-server-trust-ad-4.4.0-14.sl7_3.1.1.x86_64.rpm</filename><sum type="sha256">e9a103e3b9f3fd9974c0e8f801727476e78b8aa42f0b9097073ea2eec5a4337b</sum></package><package arch="noarch" name="python2-ipaserver" release="14.sl7_3.1.1" src="ipa-4.4.0-14.sl7_3.1.1.src.rpm" version="4.4.0"><filename>python2-ipaserver-4.4.0-14.sl7_3.1.1.noarch.rpm</filename><sum type="sha256">a3b10f38d19f7e8ab660f213a85d90f124736c50d639a79cb8dd69a91465f9b4</sum></package><package arch="noarch" name="ipa-server-dns" release="14.sl7_3.1.1" src="ipa-4.4.0-14.sl7_3.1.1.src.rpm" version="4.4.0"><filename>ipa-server-dns-4.4.0-14.sl7_3.1.1.noarch.rpm</filename><sum type="sha256">20b7d6b336df5ff76ca16abc3b8a0999ce1510181748991cd0a1c76c566be1fb</sum></package><package arch="noarch" name="ipa-client-common" release="14.sl7_3.1.1" src="ipa-4.4.0-14.sl7_3.1.1.src.rpm" version="4.4.0"><filename>ipa-client-common-4.4.0-14.sl7_3.1.1.noarch.rpm</filename><sum type="sha256">bfe1d0f6df2d0946fc4c2aca1d54b6a1762c1e62a29339250802b7075d00c5db</sum></package><package arch="noarch" name="python2-ipalib" release="14.sl7_3.1.1" src="ipa-4.4.0-14.sl7_3.1.1.src.rpm" version="4.4.0"><filename>python2-ipalib-4.4.0-14.sl7_3.1.1.noarch.rpm</filename><sum type="sha256">2ddcae42f005c5a595b3995fab7ce537d8dd0987f7526e10748304e7744930ca</sum></package><package arch="x86_64" name="ipa-client" release="14.sl7_3.1.1" src="ipa-4.4.0-14.sl7_3.1.1.src.rpm" version="4.4.0"><filename>ipa-client-4.4.0-14.sl7_3.1.1.x86_64.rpm</filename><sum type="sha256">40eaad9fd4949a6f5bba53852e36b5c978d307e94f04ebdc7b026d2a1d553f57</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7030" id="CVE-2016-7030" title="Ipa: Dos Attack Against Kerberized Services By Abusing Password Policy" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9575" id="CVE-2016-9575" title="Ipa: Insufficient Permission Check In Certprofile-Mod" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0001" id="RHSA-2017:0001-1" title="Rhsa-2017:0001-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1370493" id="1370493" title="Ipa: Dos Attack Against Kerberized Services By Abusing Password Policy" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395311" id="1395311" title="Ipa: Insufficient Permission Check In Certprofile-Mod" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0013-1</id><title>Ghostscript</title><description>Security Fix(es): 
* It was found that the ghostscript functions getenv, filenameforall and .libfile did not honor the -dSAFER option, usually used when processing untrusted documents, leading to information disclosure. A specially crafted postscript document could read environment variable, list directory and retrieve file content respectively, from the target. (CVE-2013-5653, CVE-2016-7977) 
* It was found that the ghostscript function .setdevice suffered a use- after-free vulnerability due to an incorrect reference count. A specially crafted postscript document could trigger code execution in the context of the gs process. (CVE-2016-7978) 
* It was found that the ghostscript function .initialize_dsc_parser did not validate its parameter before using it, allowing a type confusion flaw. A specially crafted postscript document could cause a crash code execution in the context of the gs process. (CVE-2016-7979) 
* It was found that ghostscript did not sufficiently check the validity of parameters given to the .sethalftone5 function. A specially crafted postscript document could cause a crash, or execute arbitrary code in the context of the gs process. (CVE-2016-8602)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-01-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ghostscript-gtk" release="20.el7_3.1" src="ghostscript-9.07-20.el7_3.1.src.rpm" version="9.07"><filename>ghostscript-gtk-9.07-20.el7_3.1.x86_64.rpm</filename><sum type="sha256">005eec47edacc057c169cc4e3e37acc09ffa71fed84ceaa54c11aec9b5f1b546</sum></package><package arch="x86_64" name="ghostscript-cups" release="20.el7_3.1" src="ghostscript-9.07-20.el7_3.1.src.rpm" version="9.07"><filename>ghostscript-cups-9.07-20.el7_3.1.x86_64.rpm</filename><sum type="sha256">1f3d63800ed67f09e9024a7d21139721a1c6cd282b548b955183a49e7ff0fcc6</sum></package><package arch="i686" name="ghostscript-devel" release="20.el7_3.1" src="ghostscript-9.07-20.el7_3.1.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-20.el7_3.1.i686.rpm</filename><sum type="sha256">8faa6f3b99ff1ebb3c6d67d5c89645c5b71ab86b3d0ba9fea843805e914bb57e</sum></package><package arch="x86_64" name="ghostscript-devel" release="20.el7_3.1" src="ghostscript-9.07-20.el7_3.1.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-20.el7_3.1.x86_64.rpm</filename><sum type="sha256">7dda3abadefea1de1bf106eaa2381bf1a9f34ab8b101834119ec7b94fd2c3a99</sum></package><package arch="x86_64" name="ghostscript" release="20.el7_3.1" src="ghostscript-9.07-20.el7_3.1.src.rpm" version="9.07"><filename>ghostscript-9.07-20.el7_3.1.x86_64.rpm</filename><sum type="sha256">4f2f822a482d7e85a83cb2c8687101f6f015069f076b21577a44480461ae0b82</sum></package><package arch="i686" name="ghostscript" release="20.el7_3.1" src="ghostscript-9.07-20.el7_3.1.src.rpm" version="9.07"><filename>ghostscript-9.07-20.el7_3.1.i686.rpm</filename><sum type="sha256">92b4063437abb70e639ebfa9bfbdb515c66beb04b767d1b05add8b7794acfc29</sum></package><package arch="noarch" name="ghostscript-doc" release="20.el7_3.1" src="ghostscript-9.07-20.el7_3.1.src.rpm" version="9.07"><filename>ghostscript-doc-9.07-20.el7_3.1.noarch.rpm</filename><sum type="sha256">987cd47ecc92c8cceb575087a67e1e0aa63cb7edd7ec3b9edd86305c1dc9306a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-5653" id="CVE-2013-5653" title="Ghostscript: Getenv And Filenameforall Ignore -Dsafer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7977" id="CVE-2016-7977" title="Ghostscript: .Libfile Does Not Honor -Dsafer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7978" id="CVE-2016-7978" title="Ghostscript: Reference Leak In .Setdevice Allows Use-After-Free And Remote Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7979" id="CVE-2016-7979" title="Ghostscript: Type Confusion In .Initialize_Dsc_Parser Allows Remote Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8602" id="CVE-2016-8602" title="Ghostscript: Check For Sufficient Params In .Sethalftone5" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0013" id="RHSA-2017:0013-1" title="Rhsa-2017:0013-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1380327" id="1380327" title="Ghostscript: Getenv And Filenameforall Ignore -Dsafer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1380415" id="1380415" title="Ghostscript: .Libfile Does Not Honor -Dsafer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1382300" id="1382300" title="Ghostscript: Reference Leak In .Setdevice Allows Use-After-Free And Remote Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1382305" id="1382305" title="Ghostscript: Type Confusion In .Initialize_Dsc_Parser Allows Remote Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1383940" id="1383940" title="Ghostscript: Check For Sufficient Params In .Sethalftone5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0018-1</id><title>Gstreamer-Plugins-Bad-Free</title><description>Security Fix(es): 
* An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer's VMware VMnc video file format decoding plug-in. A remote attacker could use this flaw to cause an application using GStreamer to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2016-9445) 
* A memory corruption flaw was found in GStreamer's Nintendo NSF music file format decoding plug-in. A remote attacker could use this flaw to cause an application using GStreamer to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2016-9447) 
* An out-of-bounds heap read flaw was found in GStreamer's H.264 parser. A remote attacker could use this flaw to cause an application using GStreamer to crash. (CVE-2016-9809) 
Note: This update removes the vulnerable Nintendo NSF plug-in.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-01-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="gstreamer-plugins-bad-free" release="22.el7_3" src="gstreamer-plugins-bad-free-0.10.23-22.el7_3.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-0.10.23-22.el7_3.i686.rpm</filename><sum type="sha256">7b96a953da70a3ceca2480ef1d630a4146baef4b352daf2b7f42ccfbb0a40c05</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free" release="22.el7_3" src="gstreamer-plugins-bad-free-0.10.23-22.el7_3.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-0.10.23-22.el7_3.x86_64.rpm</filename><sum type="sha256">ba14b3de5272a4469cf86dcc04eac023e45cdf576b63816dd14060ba8ce589b3</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free-devel" release="22.el7_3" src="gstreamer-plugins-bad-free-0.10.23-22.el7_3.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-devel-0.10.23-22.el7_3.x86_64.rpm</filename><sum type="sha256">290ece7699af99fa959dc50cc979c370841f3e60efaf0309c785d01a8fc505fa</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free-devel-docs" release="22.el7_3" src="gstreamer-plugins-bad-free-0.10.23-22.el7_3.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-devel-docs-0.10.23-22.el7_3.x86_64.rpm</filename><sum type="sha256">274ef9a76cbbde652ee01a0af3491576a0f0c1515a9530d00cf98bb27c936190</sum></package><package arch="i686" name="gstreamer-plugins-bad-free-devel" release="22.el7_3" src="gstreamer-plugins-bad-free-0.10.23-22.el7_3.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-devel-0.10.23-22.el7_3.i686.rpm</filename><sum type="sha256">b30d5a806660b197e8d46ed95d3b8ecbb1638e3134810e7d16167b68aa5384ba</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9445" id="CVE-2016-9445" title="Gstreamer-Plugins-Bad-Free: Integer Overflow When Allocating Render Buffer In Vmnc Decoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9447" id="CVE-2016-9447" title="Gstreamer-Plugins-Bad-Free: Memory Corruption Flaw In Nsf Decoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9809" id="CVE-2016-9809" title="Gstreamer-Plugins-Bad-Free: Off-By-One Read In Gst_H264_Parse_Set_Caps" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0018" id="RHSA-2017:0018-1" title="Rhsa-2017:0018-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395126" id="1395126" title="Gstreamer-Plugins-Bad-Free: Memory Corruption Flaw In Nsf Decoder" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395767" id="1395767" title="Gstreamer-Plugins-Bad-Free: Integer Overflow When Allocating Render Buffer In Vmnc Decoder" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401880" id="1401880" title="Gstreamer-Plugins-Bad-Free: Off-By-One Read In Gst_H264_Parse_Set_Caps" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0019-1</id><title>Gstreamer-Plugins-Good</title><description>Security Fix(es): 
* Multiple flaws were discovered in GStreamer's FLC/FLI/FLX media file format decoding plug-in. A remote attacker could use these flaws to cause an application using GStreamer to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2016-9634, CVE-2016-9635, CVE-2016-9636, CVE-2016-9808) 
* An invalid memory read access flaw was found in GStreamer's FLC/FLI/FLX media file format decoding plug-in. A remote attacker could use this flaw to cause an application using GStreamer to crash. (CVE-2016-9807) 
Note: This update removes the vulnerable FLC/FLI/FLX plug-in.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-01-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gstreamer-plugins-good" release="12.el7_3" src="gstreamer-plugins-good-0.10.31-12.el7_3.src.rpm" version="0.10.31"><filename>gstreamer-plugins-good-0.10.31-12.el7_3.x86_64.rpm</filename><sum type="sha256">5260ccdceb0c4701bcac28a5cb6c5b0be609e6fc00f8160ef73b24ed3a49697c</sum></package><package arch="noarch" name="gstreamer-plugins-good-devel-docs" release="12.el7_3" src="gstreamer-plugins-good-0.10.31-12.el7_3.src.rpm" version="0.10.31"><filename>gstreamer-plugins-good-devel-docs-0.10.31-12.el7_3.noarch.rpm</filename><sum type="sha256">da48fbbe9e3a46ba7508729a0eb638e7f7634456e6bc5b7bd7044efee68390e9</sum></package><package arch="i686" name="gstreamer-plugins-good" release="12.el7_3" src="gstreamer-plugins-good-0.10.31-12.el7_3.src.rpm" version="0.10.31"><filename>gstreamer-plugins-good-0.10.31-12.el7_3.i686.rpm</filename><sum type="sha256">d8ec0ca9afb6237ec9afc1b326978e51312e13c17740ad2a2c5471e62a9519ec</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634" id="CVE-2016-9634" title="Gstreamer-Plugins-Good: Heap Buffer Overflow In Flic Decoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635" id="CVE-2016-9635" title="Gstreamer-Plugins-Good: Heap Buffer Overflow In Flic Decoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636" id="CVE-2016-9636" title="Gstreamer-Plugins-Good: Heap Buffer Overflow In Flic Decoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9807" id="CVE-2016-9807" title="Gstreamer-Plugins-Good: Invalid Memory Read In Flx_Decode_Chunks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9808" id="CVE-2016-9808" title="Gstreamer-Plugins-Good: Heap Buffer Overflow In Flic Decoder" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0019" id="RHSA-2017:0019-1" title="Rhsa-2017:0019-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397441" id="1397441" title="Gstreamer-Plugins-Good: Heap Buffer Overflow In Flic Decoder" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401874" id="1401874" title="Gstreamer-Plugins-Good: Invalid Memory Read In Flx_Decode_Chunks" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0020-1</id><title>Gstreamer1-Plugins-Good</title><description>Security Fix(es): 
* Multiple flaws were discovered in GStreamer's FLC/FLI/FLX media file format decoding plug-in. A remote attacker could use these flaws to cause an application using GStreamer to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2016-9634, CVE-2016-9635, CVE-2016-9636, CVE-2016-9808) 
* An invalid memory read access flaw was found in GStreamer's FLC/FLI/FLX media file format decoding plug-in. A remote attacker could use this flaw to cause an application using GStreamer to crash. (CVE-2016-9807) 
Note: This update removes the vulnerable FLC/FLI/FLX plug-in.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-01-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gstreamer1-plugins-good" release="3.el7_3" src="gstreamer1-plugins-good-1.4.5-3.el7_3.src.rpm" version="1.4.5"><filename>gstreamer1-plugins-good-1.4.5-3.el7_3.x86_64.rpm</filename><sum type="sha256">a76ba5cec43fe5fb65c1e05391b844428c050b3756cbab727779866abb4081ae</sum></package><package arch="i686" name="gstreamer1-plugins-good" release="3.el7_3" src="gstreamer1-plugins-good-1.4.5-3.el7_3.src.rpm" version="1.4.5"><filename>gstreamer1-plugins-good-1.4.5-3.el7_3.i686.rpm</filename><sum type="sha256">e2f76169f213d8eef943edeade794691f9ad27dd67167915a7eefc047601bfee</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9634" id="CVE-2016-9634" title="Gstreamer-Plugins-Good: Heap Buffer Overflow In Flic Decoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9635" id="CVE-2016-9635" title="Gstreamer-Plugins-Good: Heap Buffer Overflow In Flic Decoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9636" id="CVE-2016-9636" title="Gstreamer-Plugins-Good: Heap Buffer Overflow In Flic Decoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9807" id="CVE-2016-9807" title="Gstreamer-Plugins-Good: Invalid Memory Read In Flx_Decode_Chunks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9808" id="CVE-2016-9808" title="Gstreamer-Plugins-Good: Heap Buffer Overflow In Flic Decoder" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0020" id="RHSA-2017:0020-1" title="Rhsa-2017:0020-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397441" id="1397441" title="Gstreamer-Plugins-Good: Heap Buffer Overflow In Flic Decoder" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401874" id="1401874" title="Gstreamer-Plugins-Good: Invalid Memory Read In Flx_Decode_Chunks" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0021-1</id><title>Gstreamer1-Plugins-Bad-Free</title><description>Security Fix(es): 
* An integer overflow flaw, leading to a heap-based buffer overflow, was found in GStreamer's VMware VMnc video file format decoding plug-in. A remote attacker could use this flaw to cause an application using GStreamer to crash or, potentially, execute arbitrary code with the privileges of the user running the application. (CVE-2016-9445) 
* Multiple flaws were discovered in GStreamer's H.264 and MPEG-TS plug- ins. A remote attacker could use these flaws to cause an application using GStreamer to crash. (CVE-2016-9809, CVE-2016-9812, CVE-2016-9813)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-01-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="gstreamer1-plugins-bad-free-devel" release="6.el7_3" src="gstreamer1-plugins-bad-free-1.4.5-6.el7_3.src.rpm" version="1.4.5"><filename>gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.i686.rpm</filename><sum type="sha256">5ec773d86ab063295c2ee44ce66e0f25d476cff6c4c20026c6aa8a77947b843d</sum></package><package arch="i686" name="gstreamer1-plugins-bad-free" release="6.el7_3" src="gstreamer1-plugins-bad-free-1.4.5-6.el7_3.src.rpm" version="1.4.5"><filename>gstreamer1-plugins-bad-free-1.4.5-6.el7_3.i686.rpm</filename><sum type="sha256">5996c31b82802ce9ce5bfa36acc6b753d2d6735305c20f13c81b34726eb55b5b</sum></package><package arch="x86_64" name="gstreamer1-plugins-bad-free-devel" release="6.el7_3" src="gstreamer1-plugins-bad-free-1.4.5-6.el7_3.src.rpm" version="1.4.5"><filename>gstreamer1-plugins-bad-free-devel-1.4.5-6.el7_3.x86_64.rpm</filename><sum type="sha256">c4c6f4b59e045b931b1b066b61ea2caa6194e00d4bc530b9c61759ab309036ec</sum></package><package arch="x86_64" name="gstreamer1-plugins-bad-free" release="6.el7_3" src="gstreamer1-plugins-bad-free-1.4.5-6.el7_3.src.rpm" version="1.4.5"><filename>gstreamer1-plugins-bad-free-1.4.5-6.el7_3.x86_64.rpm</filename><sum type="sha256">43b8f469b6684509eebce18bf17b55e202fbc6133d64f2b2b5fb3f0ec3a4bf36</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9445" id="CVE-2016-9445" title="Gstreamer-Plugins-Bad-Free: Integer Overflow When Allocating Render Buffer In Vmnc Decoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9809" id="CVE-2016-9809" title="Gstreamer-Plugins-Bad-Free: Off-By-One Read In Gst_H264_Parse_Set_Caps" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9812" id="CVE-2016-9812" title="Gstreamer1-Plugins-Bad-Free: Out-Of-Bounds Read In Gst_Mpegts_Section_New" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9813" id="CVE-2016-9813" title="Gstreamer-Plugins-Bad-Free: Null Pointer Dereference In Mpegts Parser" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0021" id="RHSA-2017:0021-1" title="Rhsa-2017:0021-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395767" id="1395767" title="Gstreamer-Plugins-Bad-Free: Integer Overflow When Allocating Render Buffer In Vmnc Decoder" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401880" id="1401880" title="Gstreamer-Plugins-Bad-Free: Off-By-One Read In Gst_H264_Parse_Set_Caps" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401930" id="1401930" title="Gstreamer1-Plugins-Bad-Free: Out-Of-Bounds Read In Gst_Mpegts_Section_New" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401934" id="1401934" title="Gstreamer-Plugins-Bad-Free: Null Pointer Dereference In Mpegts Parser" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0061-1</id><title>Java-1.6.0-Openjdk</title><description>Security Fix(es): 
* It was discovered that the Hotspot component of OpenJDK did not properly check arguments of the System.arraycopy() function in certain cases. An untrusted Java application or applet could use this flaw to corrupt virtual machine's memory and completely bypass Java sandbox restrictions. (CVE-2016-5582) 
* It was discovered that the Hotspot component of OpenJDK did not properly check received Java Debug Wire Protocol (JDWP) packets. An attacker could possibly use this flaw to send debugging commands to a Java program running with debugging enabled if they could make victim's browser send HTTP requests to the JDWP port of the debugged application. (CVE-2016-5573) 
* It was discovered that the Libraries component of OpenJDK did not restrict the set of algorithms used for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2016-5542) 
Note: After this update, MD2 hash algorithm and RSA keys with less than 1024 bits are no longer allowed to be used for Jar integrity verification by default. MD5 hash algorithm is expected to be disabled by default in the future updates. A newly introduced security property jdk.jar.disabledAlgorithms can be used to control the set of disabled algorithms. 
* A flaw was found in the way the JMX component of OpenJDK handled classloaders. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2016-5554) 
* A flaw was found in the way the Networking component of OpenJDK handled HTTP proxy authentication. A Java application could possibly expose HTTPS server authentication credentials via a plain text network connection to an HTTP proxy if proxy asked for authentication. (CVE-2016-5597) 
Note: After this update, Basic HTTP proxy authentication can no longer be used when tunneling HTTPS connection through an HTTP proxy. Newly introduced system properties jdk.http.auth.proxying.disabledSchemes and jdk.http.auth.tunneling.disabledSchemes can be used to control which authentication schemes can be requested by an HTTP proxy when proxying HTTP and HTTPS connections respectively.</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-01-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk" release="1.13.13.1.el7_3" src="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3.src.rpm" version="1.6.0.41"><filename>java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3.x86_64.rpm</filename><sum type="sha256">669f50250d5e90be61067f76dba19646a6f377c749933d9df9b41658fe7f41ed</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-demo" release="1.13.13.1.el7_3" src="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3.src.rpm" version="1.6.0.41"><filename>java-1.6.0-openjdk-demo-1.6.0.41-1.13.13.1.el7_3.x86_64.rpm</filename><sum type="sha256">403d6777fea1e33ae991f74990b6a8c3a64e74f3930c601b30471a6ddea8818a</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-javadoc" release="1.13.13.1.el7_3" src="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3.src.rpm" version="1.6.0.41"><filename>java-1.6.0-openjdk-javadoc-1.6.0.41-1.13.13.1.el7_3.x86_64.rpm</filename><sum type="sha256">36213308d0a43159a3f169f6d0cf8952392fbc5e2f55a67b31306130e7b9ecc1</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-src" release="1.13.13.1.el7_3" src="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3.src.rpm" version="1.6.0.41"><filename>java-1.6.0-openjdk-src-1.6.0.41-1.13.13.1.el7_3.x86_64.rpm</filename><sum type="sha256">36f29efa9c6f1ed3192c80ad81063aa2f7cb56469e32c440a02592dd3e895822</sum></package><package arch="x86_64" epoch="1" name="java-1.6.0-openjdk-devel" release="1.13.13.1.el7_3" src="java-1.6.0-openjdk-1.6.0.41-1.13.13.1.el7_3.src.rpm" version="1.6.0.41"><filename>java-1.6.0-openjdk-devel-1.6.0.41-1.13.13.1.el7_3.x86_64.rpm</filename><sum type="sha256">cddf0d610a009173f38c8bdb3f8ee363e98430df1d8acf24566edb4ae8e26673</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5542" id="CVE-2016-5542" title="Openjdk: Missing Algorithm Restrictions For Jar Verification (Libraries, 8155973)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5554" id="CVE-2016-5554" title="Openjdk: Insufficient Classloader Consistency Checks In Classloaderwithrepository (Jmx, 8157739)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5573" id="CVE-2016-5573" title="Openjdk: Insufficient Checks Of Jdwp Packets (Hotspot, 8159519)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5582" id="CVE-2016-5582" title="Openjdk: Incomplete Type Checks Of System.Arraycopy Arguments (Hotspot, 8160591)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5597" id="CVE-2016-5597" title="Openjdk: Exposure Of Server Authentication Credentials To Proxy (Networking, 8160838)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0061" id="RHSA-2017:0061-1" title="Rhsa-2017:0061-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385402" id="1385402" title="Openjdk: Incomplete Type Checks Of System.Arraycopy Arguments (Hotspot, 8160591)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385544" id="1385544" title="Openjdk: Insufficient Checks Of Jdwp Packets (Hotspot, 8159519)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385714" id="1385714" title="Openjdk: Insufficient Classloader Consistency Checks In Classloaderwithrepository (Jmx, 8157739)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385723" id="1385723" title="Openjdk: Missing Algorithm Restrictions For Jar Verification (Libraries, 8155973)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386103" id="1386103" title="Openjdk: Exposure Of Server Authentication Credentials To Proxy (Networking, 8160838)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0062-1</id><title>Bind</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND processed a response to an ANY query. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9131) 
* A denial of service flaw was found in the way BIND handled a query response containing inconsistent DNSSEC information. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9147) 
* A denial of service flaw was found in the way BIND handled an unusually- formed DS record response. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2016-9444)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-01-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="32" name="bind-devel" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-38.el7_3.1.i686.rpm</filename><sum type="sha256">d71ab1c5196f6760b49a6e758a8cb47a97152ef4bafedb6e0d64e6b2d6b8e172</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-38.el7_3.1.x86_64.rpm</filename><sum type="sha256">652f4223062af22c35742ef7d4cea69c6bfecaeae08d3c21a003a56e52dac1c0</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-utils-9.9.4-38.el7_3.1.x86_64.rpm</filename><sum type="sha256">9917b73b35074f806eaeed222eaeedf713bf3189dd4e52f0a604b50c3092409b</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-38.el7_3.1.i686.rpm</filename><sum type="sha256">97fe2e8e13bd928c086796f55a2d4e7935b51434fcb7222c3c7f02fe69aba440</sum></package><package arch="x86_64" epoch="32" name="bind" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-9.9.4-38.el7_3.1.x86_64.rpm</filename><sum type="sha256">9c448e820fc702d40d167a64194f92e14d3638d7ad8f6b07cd522cc7d6bd4c6e</sum></package><package arch="noarch" epoch="32" name="bind-license" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-license-9.9.4-38.el7_3.1.noarch.rpm</filename><sum type="sha256">0f2b86e57f54d5f4482470bb631b2ba5bb205792e0364644e723edbb40771f4b</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-38.el7_3.1.i686.rpm</filename><sum type="sha256">a04f80143f4ea5669dc4ccac1a4f95d63329d8c774eb04f1cd45f0c0c9452c44</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-sdb-9.9.4-38.el7_3.1.x86_64.rpm</filename><sum type="sha256">2f1a261ed6917681f347fa5b66526ada7dab3a99a7a14eefd427aeff67202935</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-utils-9.9.4-38.el7_3.1.x86_64.rpm</filename><sum type="sha256">5c3e00b7071740e1c1f8c06b5ba11ab0a1dde2e2209262e8fba36894019a69c6</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-38.el7_3.1.x86_64.rpm</filename><sum type="sha256">a5062be78e13d670f669bfded52dc0fb437a1765d9a9f384d805add1b6d685c6</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-sdb-chroot-9.9.4-38.el7_3.1.x86_64.rpm</filename><sum type="sha256">e654745ab26d0f5d39b1875925b8358506336c2b0aec2486531aca50a2758dfc</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-9.9.4-38.el7_3.1.x86_64.rpm</filename><sum type="sha256">75afb6f8f0e853739f9e396fe3aa354d9701621a1ea68c3ffb8ecf85229f064a</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-38.el7_3.1.x86_64.rpm</filename><sum type="sha256">8b0d21439eefe0e8fa389ad434612ebff3b2f2eb4788594a8536c26d350c296a</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-chroot-9.9.4-38.el7_3.1.x86_64.rpm</filename><sum type="sha256">4775f6d4d160e213c71e1a613ce3cccd39a7acea1adbc4239bee49ee4ceecb20</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-38.el7_3.1.x86_64.rpm</filename><sum type="sha256">0c6d7a04b431dd3005acd00c488097081c7a4a630c36d53cca2ca5f5978942ce</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-38.el7_3.1.x86_64.rpm</filename><sum type="sha256">7b3cdaa0eec2f71a33b58eca9a0c210f285d3b22a45460853c8f8e9c3c9ca0e3</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-38.el7_3.1.i686.rpm</filename><sum type="sha256">a45de2b293218271b9f5fb890853895513103416ff4254463587241f2761171a</sum></package><package arch="i686" epoch="32" name="bind-libs" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-38.el7_3.1.i686.rpm</filename><sum type="sha256">ae40a14769c7074ab17e77aeda03b22e0e21f2507b693aeba6458f6e6a623a83</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-38.el7_3.1.i686.rpm</filename><sum type="sha256">98ded33ddeebd1d787cfe32e51779369c9ecabfc085a8cd4bb24612b97548de1</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="38.el7_3.1" src="bind-9.9.4-38.el7_3.1.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-38.el7_3.1.x86_64.rpm</filename><sum type="sha256">5a980870e6377304a9c7823df9d159e1f69e173beb679a9efec62b2ec6e5627e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9131" id="CVE-2016-9131" title="Bind: Assertion Failure While Processing Response To An Any Query" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9147" id="CVE-2016-9147" title="Bind: Assertion Failure While Handling A Query Response Containing Inconsistent Dnssec Information" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9444" id="CVE-2016-9444" title="Bind: Assertion Failure While Handling An Unusually-Formed Ds Record Response" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0062" id="RHSA-2017:0062-1" title="Rhsa-2017:0062-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1411348" id="1411348" title="Bind: Assertion Failure While Processing Response To An Any Query" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1411367" id="1411367" title="Bind: Assertion Failure While Handling A Query Response Containing Inconsistent Dnssec Information" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1411377" id="1411377" title="Bind: Assertion Failure While Handling An Unusually-Formed Ds Record Response" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0083-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* An out-of-bounds read-access flaw was found in the QEMU emulator built with IP checksum routines. The flaw could occur when computing a TCP/UDP packet's checksum, because a QEMU function used the packet's payload length without checking against the data buffer's size. A user inside a guest could use this flaw to crash the QEMU process (denial of service). (CVE-2016-2857) 
Bug Fix(es): 
* Previously, rebooting a guest virtual machine more than 128 times in a short period of time caused the guest to shut down instead of rebooting, because the virtqueue was not cleaned properly. This update ensures that the virtqueue is cleaned more reliably, which prevents the described problem from occurring.</description><severity>low</severity><release>Scientific Linux</release><issued date="2017-01-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-img" release="126.el7_3.3" src="qemu-kvm-1.5.3-126.el7_3.3.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-126.el7_3.3.x86_64.rpm</filename><sum type="sha256">413e98e8eec2dd33e7edd38972a42b056a7f446c05c17ad5eb5793580ae55144</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="126.el7_3.3" src="qemu-kvm-1.5.3-126.el7_3.3.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-126.el7_3.3.x86_64.rpm</filename><sum type="sha256">700170146349094b32e8417bb09ceb26f9601d2cb6e36bde878006f58729fa0c</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="126.el7_3.3" src="qemu-kvm-1.5.3-126.el7_3.3.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-126.el7_3.3.x86_64.rpm</filename><sum type="sha256">1d4ab59aec5001c1080040f79236b5da652f512e9b9314ea80bd59ae81853ef2</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="126.el7_3.3" src="qemu-kvm-1.5.3-126.el7_3.3.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-126.el7_3.3.x86_64.rpm</filename><sum type="sha256">d9024427be1eab019e7ef2d27ba099a676c21d556085a4337eaed8dcc9fb6d30</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2857" id="CVE-2016-2857" title="Qemu: Net: Out Of Bounds Read In Net_Checksum_Calculate()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0083" id="RHSA-2017:0083-1" title="Rhsa-2017:0083-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1296567" id="1296567" title="Qemu: Net: Out Of Bounds Read In Net_Checksum_Calculate()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0086-1</id><title>Kernel</title><description>To see the complete list of bug fixes, users are directed to the related Knowledge Article: 
Security Fix(es): 
* A use-after-free vulnerability was found in the kernel's socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important) 
* A use-after-free vulnerability was found in tcp_xmit_retransmit_queue and other tcp_* functions. This condition could allow an attacker to send an incorrect selective acknowledgment to existing connections, possibly resetting a connection. (CVE-2016-6828, Moderate) 
* A flaw was found in the Linux kernel's implementation of the SCTP protocol. A remote attacker could trigger an out-of-bounds read with an offset of up to 64kB potentially causing the system to crash. (CVE-2016-9555, Moderate) 
Bug Fix(es): 
* Previously, the performance of Internet Protocol over InfiniBand (IPoIB) was suboptimal due to a conflict of IPoIB with the Generic Receive Offload (GRO) infrastructure. With this update, the data cached by the IPoIB driver has been moved from a control block into the IPoIB hard header, thus avoiding the GRO problem and the corruption of IPoIB address information. As a result, the performance of IPoIB has been improved. 
* Previously, when a virtual machine (VM) with PCI-Passthrough interfaces was recreated, a race condition between the eventfd daemon and the virqfd daemon occurred. Consequently, the operating system rebooted. This update fixes the race condition. As a result, the operating system no longer reboots in the described situation. 
* Previously, a packet loss occurred when the team driver in round-robin mode was sending a large number of packets. This update fixes counting of the packets in the round-robin runner of the team driver, and the packet loss no longer occurs in the described situation. 
* Previously, the virtual network devices contained in the deleted namespace could be deleted in any order. If the loopback device was not deleted as the last item, other netns devices, such as vxlan devices, could end up with dangling references to the loopback device. Consequently, deleting a network namespace (netns) occasionally ended by a kernel oops. With this update, the underlying source code has been fixed to ensure the correct order when deleting the virtual network devices on netns deletion. As a result, the kernel oops no longer occurs under the described circumstances. 
* Previously, a Kabylake system with a Sunrise Point Platform Controller Hub (PCH) with a PCI device ID of 0xA149 showed the following warning messages during the boot: 
"Unknown Intel PCH (0xa149) detected."     "Warning: Intel Kabylake processor with unknown PCH - this hardware has not undergone testing ..." 
The messages were shown because this PCH was not properly recognized. With this update, the problem has been fixed, and the operating system now boots without displaying the warning messages. 
* Previously, the operating system occasionally became unresponsive after a long run. This was caused by a race condition between the try_to_wake_up() function and a woken up task in the core scheduler. With this update, the race condition has been fixed, and the operating system no longer locks up in the described scenario.</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-01-17 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-debug" release="514.6.1.el7" src="kernel-3.10.0-514.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-514.6.1.el7.x86_64.rpm</filename><sum type="sha256">7de9db7864a59cfb6127112785e9b4240810204f4fc3f31315de65ef38bfbbd0</sum></package><package arch="x86_64" name="python-perf" release="514.6.1.el7" src="kernel-3.10.0-514.6.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-514.6.1.el7.x86_64.rpm</filename><sum type="sha256">200976cd177427c74bfa12419ac486fef53422b3721ebf8bc5f5f751907dc87d</sum></package><package arch="x86_64" name="kernel-headers" release="514.6.1.el7" src="kernel-3.10.0-514.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-514.6.1.el7.x86_64.rpm</filename><sum type="sha256">de32b3d762748fde3aa1a1f195c378ffaad189040a78c5a0df54ef8fc1a018cd</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="514.6.1.el7" src="kernel-3.10.0-514.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-514.6.1.el7.noarch.rpm</filename><sum type="sha256">87c71e0825972782e264465673fd1850580c3107115d160d5b490014757a10fc</sum></package><package arch="x86_64" name="kernel" release="514.6.1.el7" src="kernel-3.10.0-514.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-514.6.1.el7.x86_64.rpm</filename><sum type="sha256">b54468059df05d9c32b987da946d3b479a37bdaaaefbb2ad870464eeb6f85770</sum></package><package arch="x86_64" name="kernel-tools-libs" release="514.6.1.el7" src="kernel-3.10.0-514.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-514.6.1.el7.x86_64.rpm</filename><sum type="sha256">53938bf79afb5c340c3c499ec58fa343335679d2aaa7d06a22239be5b178393e</sum></package><package arch="x86_64" name="kernel-devel" release="514.6.1.el7" src="kernel-3.10.0-514.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-514.6.1.el7.x86_64.rpm</filename><sum type="sha256">dff37314fbbec1515d6925acdcc83f1b44ff141f2401bcea02996d276c12ca61</sum></package><package arch="x86_64" name="kernel-tools" release="514.6.1.el7" src="kernel-3.10.0-514.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-514.6.1.el7.x86_64.rpm</filename><sum type="sha256">5b5ba7a6859721424e6a2346e618b8dc8fb600f8b8b33276d3622dc3b0ca98d6</sum></package><package arch="x86_64" name="kernel-debug-devel" release="514.6.1.el7" src="kernel-3.10.0-514.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-514.6.1.el7.x86_64.rpm</filename><sum type="sha256">30fe87fe3793e9a336cfd1287a724f75ee25e8566aca60c63c36747a2c5b1a63</sum></package><package arch="x86_64" name="perf" release="514.6.1.el7" src="kernel-3.10.0-514.6.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-514.6.1.el7.x86_64.rpm</filename><sum type="sha256">e137fd218643dbaa9eb3e85a1cb913719e55262395a65ee9b98f9e22a3b0466d</sum></package><package arch="noarch" name="kernel-doc" release="514.6.1.el7" src="kernel-3.10.0-514.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-514.6.1.el7.noarch.rpm</filename><sum type="sha256">4ff309c3abe8b008fc7f5f323d6791423196e971121df33846f110d46e9ff727</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="514.6.1.el7" src="kernel-3.10.0-514.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-514.6.1.el7.x86_64.rpm</filename><sum type="sha256">7776043890be8aeae9ed1f7f2bde9c06f82dda2e9ef9b8147c1ee0ba439cae40</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6828" id="CVE-2016-6828" title="Kernel: Use After Free In Tcp_Xmit_Retransmit_Queue" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7117" id="CVE-2016-7117" title="Kernel: Use-After-Free In The Recvmmsg Exit Path" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9555" id="CVE-2016-9555" title="Kernel: Slab Out-Of-Bounds Access In Sctp_Sf_Ootb()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0086" id="RHSA-2017:0086-1" title="Rhsa-2017:0086-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367091" id="1367091" title="Kernel: Use After Free In Tcp_Xmit_Retransmit_Queue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1382268" id="1382268" title="Kernel: Use-After-Free In The Recvmmsg Exit Path" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397930" id="1397930" title="Kernel: Slab Out-Of-Bounds Access In Sctp_Sf_Ootb()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0180-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* It was discovered that the RMI registry and DCG implementations in the RMI component of OpenJDK performed deserialization of untrusted inputs. A remote attacker could possibly use this flaw to execute arbitrary code with the privileges of RMI registry or a Java RMI application. (CVE-2017-3241) 
This issue was addressed by introducing whitelists of classes that can be deserialized by RMI registry or DCG. These whitelists can be customized using the newly introduced sun.rmi.registry.registryFilter and sun.rmi.transport.dgcFilter security properties. 
* Multiple flaws were discovered in the Libraries and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-3272, CVE-2017-3289) 
* A covert timing channel flaw was found in the DSA implementation in the Libraries component of OpenJDK. A remote attacker could possibly use this flaw to extract certain information about the used key via a timing side channel. (CVE-2016-5548) 
* It was discovered that the Libraries component of OpenJDK accepted ECSDA signatures using non-canonical DER encoding. This could cause a Java application to accept signature in an incorrect format not accepted by other cryptographic tools. (CVE-2016-5546) 
* It was discovered that the 2D component of OpenJDK performed parsing of iTXt and zTXt PNG image chunks even when configured to ignore metadata. An attacker able to make a Java application parse a specially crafted PNG image could cause the application to consume an excessive amount of memory. (CVE-2017-3253) 
* It was discovered that the Libraries component of OpenJDK did not validate the length of the object identifier read from the DER input before allocating memory to store the OID. An attacker able to make a Java application decode a specially crafted DER input could cause the application to consume an excessive amount of memory. (CVE-2016-5547) 
* It was discovered that the JAAS component of OpenJDK did not use the correct way to extract user DN from the result of the user search LDAP query. A specially crafted user LDAP entry could cause the application to use an incorrect DN. (CVE-2017-3252) 
* It was discovered that the Networking component of OpenJDK failed to properly parse user info from the URL. A remote attacker could cause a Java application to incorrectly parse an attacker supplied URL and interpret it differently from other applications processing the same URL. (CVE-2016-5552) 
* Multiple flaws were found in the Networking components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2017-3261, CVE-2017-3231) 
* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) 
This update mitigates the CVE-2016-2183 issue by adding 3DES cipher suites to the list of legacy algorithms (defined using the jdk.tls.legacyAlgorithms security property) so they are only used if connecting TLS/SSL client and server do not share any other non-legacy cipher suite. 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.</description><severity>critical</severity><release>Scientific Linux</release><issued date="2017-01-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.b13.el7_3" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.121-0.b13.el7_3.x86_64.rpm</filename><sum type="sha256">536d28b863ac815d3cc2c6bda734e5fd40dc5079047e3176fd6cb9a2ab2db62f</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.b13.el7_3" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.121-0.b13.el7_3.noarch.rpm</filename><sum type="sha256">2bccd93621baf59b98be27f80ce8617f9ca33be5985edd6b8cd549bbb9cf7084</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="0.b13.el7_3" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.121-0.b13.el7_3.noarch.rpm</filename><sum type="sha256">e87491b0ad6e089a960e594639fecde1db6486900a99f7a9a66033430c8c050e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.b13.el7_3" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-demo-1.8.0.121-0.b13.el7_3.x86_64.rpm</filename><sum type="sha256">6e43593c97b64d9f41121dea57c7eb717a186f4c4a013f60d4ff7f56bd1b5987</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.b13.el7_3" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.121-0.b13.el7_3.x86_64.rpm</filename><sum type="sha256">e79c0226c6666e0bbfdc88bd991a556cf5234c8142d209ee0d1f7c38276b861d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.b13.el7_3" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-src-debug-1.8.0.121-0.b13.el7_3.x86_64.rpm</filename><sum type="sha256">190a3d0c509f5fb6ae80703c5f180507c4026671e6bf088cb69a2a74be794620</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.b13.el7_3" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-debug-1.8.0.121-0.b13.el7_3.x86_64.rpm</filename><sum type="sha256">9616568c601326d89aecb8f717b07fdc74c3bbc4d87828b98b98cb3f37de09d5</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.b13.el7_3" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-headless-1.8.0.121-0.b13.el7_3.x86_64.rpm</filename><sum type="sha256">c8a571e36c28ddd08442f35380bae293ff052b96b3e41b031899dfc5a757bf46</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.b13.el7_3" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-src-1.8.0.121-0.b13.el7_3.x86_64.rpm</filename><sum type="sha256">3788d184823af09c10b42194c34253d8cbfce9cdba11f103e3abf5aff5c05e71</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.b13.el7_3" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3.x86_64.rpm</filename><sum type="sha256">2dca6cac4031567d09f53b17bea7a66f443c48412628f6bd439462cb4587b94c</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.b13.el7_3" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-javadoc-1.8.0.121-0.b13.el7_3.noarch.rpm</filename><sum type="sha256">9b28b5f260b4aefa94fb30c077a211cd8286dfd11476fb3c66b42962710cb34a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.b13.el7_3" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.121-0.b13.el7_3.x86_64.rpm</filename><sum type="sha256">2b630153511574f5fee19f870cb95cb118f54b35274e00fd6d7951c50f199352</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.b13.el7_3" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-accessibility-1.8.0.121-0.b13.el7_3.x86_64.rpm</filename><sum type="sha256">a12fad790d82e3f7b685587a24f48a9ffed246811194cfc55b69215e45401aa0</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.b13.el7_3" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-devel-1.8.0.121-0.b13.el7_3.x86_64.rpm</filename><sum type="sha256">c0ab2ec8d4444ec045490c0e21ff663db38a320679395a17180a28279ff8becc</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.b13.el7_3" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.121-0.b13.el7_3.x86_64.rpm</filename><sum type="sha256">5b2402db5374a51112f342300374f9a657fe50e32ad825b4c5390cdb991cfa04</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="0.b13.el7_3" src="java-1.8.0-openjdk-1.8.0.121-0.b13.el7_3.src.rpm" version="1.8.0.121"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.121-0.b13.el7_3.noarch.rpm</filename><sum type="sha256">bd1c98a97fe37274130b53ff5de95c1e3c6c4669837a77dac266b2700ee69364</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183" id="CVE-2016-2183" title="Ssl/Tls: Birthday Attack Against 64-Bit Block Ciphers (Sweet32)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" id="CVE-2016-5546" title="Openjdk: Incorrect Ecdsa Signature Extraction From The Der Input (Libraries, 8168714)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" id="CVE-2016-5547" title="Openjdk: Missing Objectidentifier Length Check (Libraries, 8168705)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" id="CVE-2016-5548" title="Openjdk: Dsa Implementation Timing Attack (Libraries, 8168728)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" id="CVE-2016-5552" title="Openjdk: Incorrect Url Parsing In Urlstreamhandler (Networking, 8167223)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" id="CVE-2017-3231" title="Openjdk: Urlclassloader Insufficient Access Control Checks (Networking, 8151934)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" id="CVE-2017-3241" title="Openjdk: Untrusted Input Deserialization In Rmi Registry And Dcg (Rmi, 8156802)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" id="CVE-2017-3252" title="Openjdk: Ldaploginmodule Incorrect Userdn Extraction (Jaas, 8161743)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" id="CVE-2017-3253" title="Openjdk: Imageio Pngimagereader Failed To Honor Ignoremetadata For Itxt And Ztxt Chunks (2D, 8166988)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" id="CVE-2017-3261" title="Openjdk: Integer Overflow In Socketoutputstream Boundary Check (Networking, 8164147)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" id="CVE-2017-3272" title="Openjdk: Insufficient Protected Field Access Checks In Atomic Field Updaters (Libraries, 8165344)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" id="CVE-2017-3289" title="Openjdk: Insecure Class Construction (Hotspot, 8167104)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0180" id="RHSA-2017:0180-1" title="Rhsa-2017:0180-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369383" id="1369383" title="Ssl/Tls: Birthday Attack Against 64-Bit Block Ciphers (Sweet32)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413554" id="1413554" title="Openjdk: Insufficient Protected Field Access Checks In Atomic Field Updaters (Libraries, 8165344)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413562" id="1413562" title="Openjdk: Insecure Class Construction (Hotspot, 8167104)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413583" id="1413583" title="Openjdk: Imageio Pngimagereader Failed To Honor Ignoremetadata For Itxt And Ztxt Chunks (2D, 8166988)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413653" id="1413653" title="Openjdk: Integer Overflow In Socketoutputstream Boundary Check (Networking, 8164147)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413717" id="1413717" title="Openjdk: Urlclassloader Insufficient Access Control Checks (Networking, 8151934)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413764" id="1413764" title="Openjdk: Missing Objectidentifier Length Check (Libraries, 8168705)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413882" id="1413882" title="Openjdk: Incorrect Url Parsing In Urlstreamhandler (Networking, 8167223)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413906" id="1413906" title="Openjdk: Ldaploginmodule Incorrect Userdn Extraction (Jaas, 8161743)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413911" id="1413911" title="Openjdk: Incorrect Ecdsa Signature Extraction From The Der Input (Libraries, 8168714)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413920" id="1413920" title="Openjdk: Dsa Implementation Timing Attack (Libraries, 8168728)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413955" id="1413955" title="Openjdk: Untrusted Input Deserialization In Rmi Registry And Dcg (Rmi, 8156802)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0182-1</id><title>Squid</title><description>Security Fix(es): 
* It was found that squid did not properly remove connection specific headers when answering conditional requests using a cached request. A remote attacker could send a specially crafted request to an HTTP server via the squid proxy and steal private data from other connections. (CVE-2016-10002)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-01-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="squid" release="2.el7_3.2" src="squid-3.5.20-2.el7_3.2.src.rpm" version="3.5.20"><filename>squid-3.5.20-2.el7_3.2.x86_64.rpm</filename><sum type="sha256">70af8f17479b4e70cec3167bc401ee919890309ff9a3d5dc4e35dc24c471480a</sum></package><package arch="x86_64" epoch="7" name="squid-sysvinit" release="2.el7_3.2" src="squid-3.5.20-2.el7_3.2.src.rpm" version="3.5.20"><filename>squid-sysvinit-3.5.20-2.el7_3.2.x86_64.rpm</filename><sum type="sha256">567f7920b31f983b8419fea2112445e3a213278943ae9658c6ea28e4ea27b9da</sum></package><package arch="x86_64" epoch="7" name="squid-migration-script" release="2.el7_3.2" src="squid-3.5.20-2.el7_3.2.src.rpm" version="3.5.20"><filename>squid-migration-script-3.5.20-2.el7_3.2.x86_64.rpm</filename><sum type="sha256">31cb765b5bc0a0854d254b6d179a145d9e0124d435eb543d233c259d35aec7b9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10002" id="CVE-2016-10002" title="Squid: Information Disclosure In Http Request Processing" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0182" id="RHSA-2017:0182-1" title="Rhsa-2017:0182-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1405941" id="1405941" title="Squid: Information Disclosure In Http Request Processing" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0190-1</id><title>Firefox</title><description>This update upgrades Firefox to version 45.7.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5373, CVE-2017-5375, CVE-2017-5376, CVE-2017-5378, CVE-2017-5380, CVE-2017-5383, CVE-2017-5386, CVE-2017-5390, CVE-2017-5396)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2017-01-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_3" src="firefox-45.7.0-1.el7_3.src.rpm" version="45.7.0"><filename>firefox-45.7.0-1.el7_3.i686.rpm</filename><sum type="sha256">016761b937ef8d7c506d3a41de074f1df29c91ad18318d3534cf2dd7b4cab59f</sum></package><package arch="x86_64" name="firefox" release="2.el7_3" src="firefox-45.7.0-2.el7_3.src.rpm" version="45.7.0"><filename>firefox-45.7.0-2.el7_3.x86_64.rpm</filename><sum type="sha256">0bd13e279e00ae9e335c36b9b99875f5a8b71549088498413905be3e1e52ff2d</sum></package><package arch="x86_64" name="firefox" release="1.el7_3" src="firefox-45.7.0-1.el7_3.src.rpm" version="45.7.0"><filename>firefox-45.7.0-1.el7_3.x86_64.rpm</filename><sum type="sha256">37ab691b6a8c3ce6d7f0bb8cfa0969ea61f96e457829037eb630388212a08c43</sum></package><package arch="i686" name="firefox" release="2.el7_3" src="firefox-45.7.0-2.el7_3.src.rpm" version="45.7.0"><filename>firefox-45.7.0-2.el7_3.i686.rpm</filename><sum type="sha256">c2fba23947bf6d3d57b6ab532bccba1815fba819f28ba1a577e231269a586732</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5373" id="CVE-2017-5373" title="Mozilla: Memory Safety Bugs Fixed In Firefox 51 And Firefox Esr 45.7 (Mfsa 2017-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5375" id="CVE-2017-5375" title="Mozilla: Excessive Jit Code Allocation Allows Bypass Of Aslr And Dep (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5376" id="CVE-2017-5376" title="Mozilla: Use-After-Free In Xsl (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5378" id="CVE-2017-5378" title="Mozilla: Pointer And Frame Data Leakage Of Javascript Objects (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5380" id="CVE-2017-5380" title="Mozilla: Potential Use-After-Free During Dom Manipulations (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5383" id="CVE-2017-5383" title="Mozilla:Location Bar Spoofing With Unicode Characters (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5386" id="CVE-2017-5386" title="Mozilla: Webextensions Can Use Data: Protocol To Affect Other Extensions (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5390" id="CVE-2017-5390" title="Mozilla: Insecure Communication Methods In Developer Tools Json Viewer (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5396" id="CVE-2017-5396" title="Mozilla: Use-After-Free With Media Decoder (Mfsa 2017-02)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0190" id="RHSA-2017:0190-1" title="Rhsa-2017:0190-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1415924" id="1415924" title="Mozilla: Memory Safety Bugs Fixed In Firefox 51 And Firefox Esr 45.7 (Mfsa 2017-01)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416271" id="1416271" title="Mozilla: Excessive Jit Code Allocation Allows Bypass Of Aslr And Dep (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416272" id="1416272" title="Mozilla: Use-After-Free In Xsl (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416273" id="1416273" title="Mozilla: Pointer And Frame Data Leakage Of Javascript Objects (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416274" id="1416274" title="Mozilla: Potential Use-After-Free During Dom Manipulations (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416279" id="1416279" title="Mozilla: Insecure Communication Methods In Developer Tools Json Viewer (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416280" id="1416280" title="Mozilla: Use-After-Free With Media Decoder (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416281" id="1416281" title="Mozilla:Location Bar Spoofing With Unicode Characters (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416282" id="1416282" title="Mozilla: Webextensions Can Use Data: Protocol To Affect Other Extensions (Mfsa 2017-02)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0225-1</id><title>Libtiff</title><description>Security Fix(es): 
* Multiple flaws have been discovered in libtiff. A remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code by tricking an application linked against libtiff into processing specially crafted files. (CVE-2016-9533, CVE-2016-9534, CVE-2016-9535) 
* Multiple flaws have been discovered in various libtiff tools (tiff2pdf, tiffcrop, tiffcp, bmp2tiff). By tricking a user into processing a specially crafted file, a remote attacker could exploit these flaws to cause a crash or memory corruption and, possibly, execute arbitrary code with the privileges of the user running the libtiff tool. (CVE-2015-8870, CVE-2016-5652, CVE-2016-9540, CVE-2016-9537, CVE-2016-9536)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-02-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libtiff" release="27.el7_3" src="libtiff-4.0.3-27.el7_3.src.rpm" version="4.0.3"><filename>libtiff-4.0.3-27.el7_3.i686.rpm</filename><sum type="sha256">01832cb1da2d6ca2fc9970c574f8bf4eacd3d3350cf1e4868aa44ed02d256ca0</sum></package><package arch="i686" name="libtiff-devel" release="27.el7_3" src="libtiff-4.0.3-27.el7_3.src.rpm" version="4.0.3"><filename>libtiff-devel-4.0.3-27.el7_3.i686.rpm</filename><sum type="sha256">e643552193d4553687ec12868d0efd83b4e337758f9e1df92aa77c545683728e</sum></package><package arch="i686" name="libtiff-static" release="27.el7_3" src="libtiff-4.0.3-27.el7_3.src.rpm" version="4.0.3"><filename>libtiff-static-4.0.3-27.el7_3.i686.rpm</filename><sum type="sha256">33431cd32bd4cdf5d42d214bedc7257db78bb0f973eeea0731808f32947e795a</sum></package><package arch="x86_64" name="libtiff" release="27.el7_3" src="libtiff-4.0.3-27.el7_3.src.rpm" version="4.0.3"><filename>libtiff-4.0.3-27.el7_3.x86_64.rpm</filename><sum type="sha256">1c373bfb63bea120cafe40e05ebbc26f11b8d3a175cff92ec4a38f47883c588e</sum></package><package arch="x86_64" name="libtiff-static" release="27.el7_3" src="libtiff-4.0.3-27.el7_3.src.rpm" version="4.0.3"><filename>libtiff-static-4.0.3-27.el7_3.x86_64.rpm</filename><sum type="sha256">08f8c3e49002ab780ea740cb07e16924f15bf9845b411854008007e2bb69a349</sum></package><package arch="x86_64" name="libtiff-tools" release="27.el7_3" src="libtiff-4.0.3-27.el7_3.src.rpm" version="4.0.3"><filename>libtiff-tools-4.0.3-27.el7_3.x86_64.rpm</filename><sum type="sha256">8f42f18e540050a389d5cdf68fb0b1f3979de7ac11f2cf449cc631b2105aeac6</sum></package><package arch="x86_64" name="libtiff-devel" release="27.el7_3" src="libtiff-4.0.3-27.el7_3.src.rpm" version="4.0.3"><filename>libtiff-devel-4.0.3-27.el7_3.x86_64.rpm</filename><sum type="sha256">7b6ecf9124a6264776e22bdee6df3decfac3a97a3e3a64644ec780fb8833f22f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8870" id="CVE-2015-8870" title="Libtiff: Integer Overflow In Tools/Bmp2Tiff.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5652" id="CVE-2016-5652" title="Libtiff: Tiff2Pdf Jpeg Compression Tables Heap Buffer Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9533" id="CVE-2016-9533" title="Libtiff: Pixarlog Horizontaldifference Heap-Buffer-Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9534" id="CVE-2016-9534" title="Libtiff: Tiffflushdata1 Heap-Buffer-Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9535" id="CVE-2016-9535" title="Libtiff: Predictor Heap-Buffer-Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9536" id="CVE-2016-9536" title="Libtiff: T2P_Process_Jpeg_Strip Heap-Buffer-Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9537" id="CVE-2016-9537" title="Libtiff: Out-Of-Bounds Write Vulnerabilities In Tools/Tiffcrop.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9540" id="CVE-2016-9540" title="Libtiff: Cpstriptotile Heap-Buffer-Overflow" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0225" id="RHSA-2017:0225-1" title="Rhsa-2017:0225-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1389222" id="1389222" title="Libtiff: Tiff2Pdf Jpeg Compression Tables Heap Buffer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397751" id="1397751" title="Libtiff: Tiffflushdata1 Heap-Buffer-Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397755" id="1397755" title="Libtiff: Predictor Heap-Buffer-Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397758" id="1397758" title="Libtiff: T2P_Process_Jpeg_Strip Heap-Buffer-Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397760" id="1397760" title="Libtiff: Out-Of-Bounds Write Vulnerabilities In Tools/Tiffcrop.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397768" id="1397768" title="Libtiff: Cpstriptotile Heap-Buffer-Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397769" id="1397769" title="Libtiff: Pixarlog Horizontaldifference Heap-Buffer-Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1402778" id="1402778" title="Libtiff: Integer Overflow In Tools/Bmp2Tiff.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0238-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.7.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-5373, CVE-2017-5375, CVE-2017-5376, CVE-2017-5378, CVE-2017-5380, CVE-2017-5383, CVE-2017-5390, CVE-2017-5396)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-02-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_3" src="thunderbird-45.7.0-1.el7_3.src.rpm" version="45.7.0"><filename>thunderbird-45.7.0-1.el7_3.x86_64.rpm</filename><sum type="sha256">1cc9f117aa334af50f57e83804ee04a276b4b21a40a1df127a36ee089796ae7b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5373" id="CVE-2017-5373" title="Mozilla: Memory Safety Bugs Fixed In Firefox 51 And Firefox Esr 45.7 (Mfsa 2017-01)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5375" id="CVE-2017-5375" title="Mozilla: Excessive Jit Code Allocation Allows Bypass Of Aslr And Dep (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5376" id="CVE-2017-5376" title="Mozilla: Use-After-Free In Xsl (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5378" id="CVE-2017-5378" title="Mozilla: Pointer And Frame Data Leakage Of Javascript Objects (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5380" id="CVE-2017-5380" title="Mozilla: Potential Use-After-Free During Dom Manipulations (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5383" id="CVE-2017-5383" title="Mozilla:Location Bar Spoofing With Unicode Characters (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5390" id="CVE-2017-5390" title="Mozilla: Insecure Communication Methods In Developer Tools Json Viewer (Mfsa 2017-02)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5396" id="CVE-2017-5396" title="Mozilla: Use-After-Free With Media Decoder (Mfsa 2017-02)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0238" id="RHSA-2017:0238-1" title="Rhsa-2017:0238-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1415924" id="1415924" title="Mozilla: Memory Safety Bugs Fixed In Firefox 51 And Firefox Esr 45.7 (Mfsa 2017-01)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416271" id="1416271" title="Mozilla: Excessive Jit Code Allocation Allows Bypass Of Aslr And Dep (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416272" id="1416272" title="Mozilla: Use-After-Free In Xsl (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416273" id="1416273" title="Mozilla: Pointer And Frame Data Leakage Of Javascript Objects (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416274" id="1416274" title="Mozilla: Potential Use-After-Free During Dom Manipulations (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416279" id="1416279" title="Mozilla: Insecure Communication Methods In Developer Tools Json Viewer (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416280" id="1416280" title="Mozilla: Use-After-Free With Media Decoder (Mfsa 2017-02)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416281" id="1416281" title="Mozilla:Location Bar Spoofing With Unicode Characters (Mfsa 2017-02)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0252-1</id><title>Ntp</title><description>Security Fix(es): 
* It was found that when ntp is configured with rate limiting for all associations the limits are also applied to responses received from its configured sources. A remote attacker who knows the sources can cause a denial of service by preventing ntpd from accepting valid responses from its sources. (CVE-2016-7426) 
* A flaw was found in the control mode functionality of ntpd. A remote attacker could send a crafted control mode packet which could lead to information disclosure or result in DDoS amplification attacks. (CVE-2016-9310) 
* A flaw was found in the way ntpd implemented the trap service. A remote attacker could send a specially crafted packet to cause a null pointer dereference that will crash ntpd, resulting in a denial of service. (CVE-2016-9311) 
* A flaw was found in the way ntpd running on a host with multiple network interfaces handled certain server responses. A remote attacker could use this flaw which would cause ntpd to not synchronize with the source. (CVE-2016-7429) 
* A flaw was found in the way ntpd calculated the root delay. A remote attacker could send a specially-crafted spoofed packet to cause denial of service or in some special cases even crash. (CVE-2016-7433)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-02-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ntp" release="25.el7_3.1" src="ntp-4.2.6p5-25.el7_3.1.src.rpm" version="4.2.6p5"><filename>ntp-4.2.6p5-25.el7_3.1.x86_64.rpm</filename><sum type="sha256">26e42c80bac7b2e852e8ab3a650c28adda4d1578d339050b1f0db62b4af562f0</sum></package><package arch="noarch" name="ntp-perl" release="25.el7_3.1" src="ntp-4.2.6p5-25.el7_3.1.src.rpm" version="4.2.6p5"><filename>ntp-perl-4.2.6p5-25.el7_3.1.noarch.rpm</filename><sum type="sha256">d996e0e11d803529bd880e6438a6530307aeb337301f5bdef12e71891b76d63c</sum></package><package arch="x86_64" name="ntpdate" release="25.el7_3.1" src="ntp-4.2.6p5-25.el7_3.1.src.rpm" version="4.2.6p5"><filename>ntpdate-4.2.6p5-25.el7_3.1.x86_64.rpm</filename><sum type="sha256">3cc05a68f7070364b40efce5696ee30e3d797145c56966e758afc2690562097f</sum></package><package arch="x86_64" name="sntp" release="25.el7_3.1" src="ntp-4.2.6p5-25.el7_3.1.src.rpm" version="4.2.6p5"><filename>sntp-4.2.6p5-25.el7_3.1.x86_64.rpm</filename><sum type="sha256">7bf8436bc85a15e9a9433fbd88e0913a70aeea25403efac4e23f234d1906548a</sum></package><package arch="noarch" name="ntp-doc" release="25.el7_3.1" src="ntp-4.2.6p5-25.el7_3.1.src.rpm" version="4.2.6p5"><filename>ntp-doc-4.2.6p5-25.el7_3.1.noarch.rpm</filename><sum type="sha256">02e635b980d03c456947da5c93040f9b4f23da1d8ff76796a9eae0555bc5720d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7426" id="CVE-2016-7426" title="Ntp: Client Rate Limiting And Server Responses" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7429" id="CVE-2016-7429" title="Ntp: Attack On Interface Selection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7433" id="CVE-2016-7433" title="Ntp: Broken Initial Sync Calculations Regression" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9310" id="CVE-2016-9310" title="Ntp: Mode 6 Unauthenticated Trap Information Disclosure And Ddos Vector" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9311" id="CVE-2016-9311" title="Ntp: Null Pointer Dereference When Trap Service Is Enabled" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0252" id="RHSA-2017:0252-1" title="Rhsa-2017:0252-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397319" id="1397319" title="Ntp: Mode 6 Unauthenticated Trap Information Disclosure And Ddos Vector" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397341" id="1397341" title="Ntp: Attack On Interface Selection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397345" id="1397345" title="Ntp: Client Rate Limiting And Server Responses" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397347" id="1397347" title="Ntp: Broken Initial Sync Calculations Regression" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398350" id="1398350" title="Ntp: Null Pointer Dereference When Trap Service Is Enabled" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0254-1</id><title>Spice</title><description>Security Fix(es): 
* A vulnerability was discovered in spice in the server's protocol handling. An authenticated attacker could send crafted messages to the spice server causing a heap overflow leading to a crash or possible code execution. (CVE-2016-9577) 
* A vulnerability was discovered in spice in the server's protocol handling. An attacker able to connect to the spice server could send crafted messages which would cause the process to crash. (CVE-2016-9578)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-02-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="spice-server" release="20.el7_3" src="spice-0.12.4-20.el7_3.src.rpm" version="0.12.4"><filename>spice-server-0.12.4-20.el7_3.x86_64.rpm</filename><sum type="sha256">8a963a00eb568ce4983b23bbc2e163a1ec2d53954f0a5c75384a0f0856e93733</sum></package><package arch="x86_64" name="spice-server-devel" release="20.el7_3" src="spice-0.12.4-20.el7_3.src.rpm" version="0.12.4"><filename>spice-server-devel-0.12.4-20.el7_3.x86_64.rpm</filename><sum type="sha256">a50770b5382a90ac433e0fb4b3423c396d40415fd6265d3e3ef859be9813c059</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9577" id="CVE-2016-9577" title="Spice: Buffer Overflow In Main_Channel_Alloc_Msg_Rcv_Buf When Reading Large Messages" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9578" id="CVE-2016-9578" title="Spice: Remote Dos Via Crafted Message" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0254" id="RHSA-2017:0254-1" title="Rhsa-2017:0254-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1399566" id="1399566" title="Spice: Remote Dos Via Crafted Message" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401603" id="1401603" title="Spice: Buffer Overflow In Main_Channel_Alloc_Msg_Rcv_Buf When Reading Large Messages" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0269-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* It was discovered that the RMI registry and DCG implementations in the RMI component of OpenJDK performed deserialization of untrusted inputs. A remote attacker could possibly use this flaw to execute arbitrary code with the privileges of RMI registry or a Java RMI application. (CVE-2017-3241) 
This issue was addressed by introducing whitelists of classes that can be deserialized by RMI registry or DCG. These whitelists can be customized using the newly introduced sun.rmi.registry.registryFilter and sun.rmi.transport.dgcFilter security properties. 
* Multiple flaws were discovered in the Libraries and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-3272, CVE-2017-3289) 
* A covert timing channel flaw was found in the DSA implementation in the Libraries component of OpenJDK. A remote attacker could possibly use this flaw to extract certain information about the used key via a timing side channel. (CVE-2016-5548) 
* It was discovered that the Libraries component of OpenJDK accepted ECSDA signatures using non-canonical DER encoding. This could cause a Java application to accept signature in an incorrect format not accepted by other cryptographic tools. (CVE-2016-5546) 
* It was discovered that the 2D component of OpenJDK performed parsing of iTXt and zTXt PNG image chunks even when configured to ignore metadata. An attacker able to make a Java application parse a specially crafted PNG image could cause the application to consume an excessive amount of memory. (CVE-2017-3253) 
* It was discovered that the Libraries component of OpenJDK did not validate the length of the object identifier read from the DER input before allocating memory to store the OID. An attacker able to make a Java application decode a specially crafted DER input could cause the application to consume an excessive amount of memory. (CVE-2016-5547) 
* It was discovered that the JAAS component of OpenJDK did not use the correct way to extract user DN from the result of the user search LDAP query. A specially crafted user LDAP entry could cause the application to use an incorrect DN. (CVE-2017-3252) 
* It was discovered that the Networking component of OpenJDK failed to properly parse user info from the URL. A remote attacker could cause a Java application to incorrectly parse an attacker supplied URL and interpret it differently from other applications processing the same URL. (CVE-2016-5552) 
* Multiple flaws were found in the Networking components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2017-3261, CVE-2017-3231) 
* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) 
This update mitigates the CVE-2016-2183 issue by adding 3DES cipher suites to the list of legacy algorithms (defined using the jdk.tls.legacyAlgorithms security property) so they are only used if connecting TLS/SSL client and server do not share any other non-legacy cipher suite.</description><severity>critical</severity><release>Scientific Linux</release><issued date="2017-02-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.9.0.el7_3" src="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3.src.rpm" version="1.7.0.131"><filename>java-1.7.0-openjdk-accessibility-1.7.0.131-2.6.9.0.el7_3.x86_64.rpm</filename><sum type="sha256">85150d382d715de809af287048efe342c8e0f9d2b27edb3ef617679232d248f7</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.9.0.el7_3" src="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3.src.rpm" version="1.7.0.131"><filename>java-1.7.0-openjdk-headless-1.7.0.131-2.6.9.0.el7_3.x86_64.rpm</filename><sum type="sha256">9101fdfcbfcc56231e0bfd85fb164e0fac98a10043706b178d41396294e15356</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.9.0.el7_3" src="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3.src.rpm" version="1.7.0.131"><filename>java-1.7.0-openjdk-demo-1.7.0.131-2.6.9.0.el7_3.x86_64.rpm</filename><sum type="sha256">1724533a62e50f9dc73130c7e4c5495284073eaef3ac6773fa5856dff11a6bf7</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.9.0.el7_3" src="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3.src.rpm" version="1.7.0.131"><filename>java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3.x86_64.rpm</filename><sum type="sha256">95faf11b5df10be642b3f0ff480a903f973d43a559290b8d835e40f1d2191458</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.9.0.el7_3" src="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3.src.rpm" version="1.7.0.131"><filename>java-1.7.0-openjdk-javadoc-1.7.0.131-2.6.9.0.el7_3.noarch.rpm</filename><sum type="sha256">4f9a2514105e6daf40d01f73bbad54d14405ad29bea2cf2075af7e9d40bff328</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.9.0.el7_3" src="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3.src.rpm" version="1.7.0.131"><filename>java-1.7.0-openjdk-devel-1.7.0.131-2.6.9.0.el7_3.x86_64.rpm</filename><sum type="sha256">7de6f23ba1a5f74eb8f33194facad787488982e2399b98a5965df677da8ac6a8</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.9.0.el7_3" src="java-1.7.0-openjdk-1.7.0.131-2.6.9.0.el7_3.src.rpm" version="1.7.0.131"><filename>java-1.7.0-openjdk-src-1.7.0.131-2.6.9.0.el7_3.x86_64.rpm</filename><sum type="sha256">d06b235e2c5362b59940d975bf0199ad5e19f3bf3ccfb3f0647a9950bdd7de9a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183" id="CVE-2016-2183" title="Ssl/Tls: Birthday Attack Against 64-Bit Block Ciphers (Sweet32)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5546" id="CVE-2016-5546" title="Openjdk: Incorrect Ecdsa Signature Extraction From The Der Input (Libraries, 8168714)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5547" id="CVE-2016-5547" title="Openjdk: Missing Objectidentifier Length Check (Libraries, 8168705)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5548" id="CVE-2016-5548" title="Openjdk: Dsa Implementation Timing Attack (Libraries, 8168728)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5552" id="CVE-2016-5552" title="Openjdk: Incorrect Url Parsing In Urlstreamhandler (Networking, 8167223)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3231" id="CVE-2017-3231" title="Openjdk: Urlclassloader Insufficient Access Control Checks (Networking, 8151934)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3241" id="CVE-2017-3241" title="Openjdk: Untrusted Input Deserialization In Rmi Registry And Dcg (Rmi, 8156802)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3252" id="CVE-2017-3252" title="Openjdk: Ldaploginmodule Incorrect Userdn Extraction (Jaas, 8161743)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3253" id="CVE-2017-3253" title="Openjdk: Imageio Pngimagereader Failed To Honor Ignoremetadata For Itxt And Ztxt Chunks (2D, 8166988)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3261" id="CVE-2017-3261" title="Openjdk: Integer Overflow In Socketoutputstream Boundary Check (Networking, 8164147)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3272" id="CVE-2017-3272" title="Openjdk: Insufficient Protected Field Access Checks In Atomic Field Updaters (Libraries, 8165344)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3289" id="CVE-2017-3289" title="Openjdk: Insecure Class Construction (Hotspot, 8167104)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0269" id="RHSA-2017:0269-1" title="Rhsa-2017:0269-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369383" id="1369383" title="Ssl/Tls: Birthday Attack Against 64-Bit Block Ciphers (Sweet32)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413554" id="1413554" title="Openjdk: Insufficient Protected Field Access Checks In Atomic Field Updaters (Libraries, 8165344)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413562" id="1413562" title="Openjdk: Insecure Class Construction (Hotspot, 8167104)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413583" id="1413583" title="Openjdk: Imageio Pngimagereader Failed To Honor Ignoremetadata For Itxt And Ztxt Chunks (2D, 8166988)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413653" id="1413653" title="Openjdk: Integer Overflow In Socketoutputstream Boundary Check (Networking, 8164147)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413717" id="1413717" title="Openjdk: Urlclassloader Insufficient Access Control Checks (Networking, 8151934)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413764" id="1413764" title="Openjdk: Missing Objectidentifier Length Check (Libraries, 8168705)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413882" id="1413882" title="Openjdk: Incorrect Url Parsing In Urlstreamhandler (Networking, 8167223)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413906" id="1413906" title="Openjdk: Ldaploginmodule Incorrect Userdn Extraction (Jaas, 8161743)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413911" id="1413911" title="Openjdk: Incorrect Ecdsa Signature Extraction From The Der Input (Libraries, 8168714)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413920" id="1413920" title="Openjdk: Dsa Implementation Timing Attack (Libraries, 8168728)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413955" id="1413955" title="Openjdk: Untrusted Input Deserialization In Rmi Registry And Dcg (Rmi, 8156802)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0276-1</id><title>Bind</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND handled query responses when both DNS64 and RPZ were used. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure or a null pointer dereference via a specially crafted DNS response. (CVE-2017-3135)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-02-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-devel" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-38.el7_3.2.x86_64.rpm</filename><sum type="sha256">4f2be4613ffa0fde33ebb33469e8fd28a69508608b6344db7d5b7ed8f18162bd</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-38.el7_3.2.x86_64.rpm</filename><sum type="sha256">0e943e77ee08cedb36afa5d2ebf1c342c31b5f3aeca031c50ba3da63124a503b</sum></package><package arch="i686" epoch="32" name="bind-libs" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-38.el7_3.2.i686.rpm</filename><sum type="sha256">d1ce9c7b585ab1873ee1cd0d6416b674fd78443910a063ede8fee9794e5f24a5</sum></package><package arch="x86_64" epoch="32" name="bind" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-9.9.4-38.el7_3.2.x86_64.rpm</filename><sum type="sha256">ab3dd61cfbc284d5894d57122b4655445512f2eb78554d10cc1b658f89413bc3</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-chroot-9.9.4-38.el7_3.2.x86_64.rpm</filename><sum type="sha256">849aab71f8426cc574d1b22309a34bdff58862eb8b3a2eda4a42793858d97631</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-utils-9.9.4-38.el7_3.2.x86_64.rpm</filename><sum type="sha256">02b0d3825390b955cc36b656d21551fb2aad8d4114c5bc12e79e83068b5b1659</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-38.el7_3.2.i686.rpm</filename><sum type="sha256">3f01bb06cf9feab1fa2918ac725f4be3cb8cee2869bc1cc0e052e141e9274d5a</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-38.el7_3.2.i686.rpm</filename><sum type="sha256">cfbe89512540cd0e25a4c36dcf91794f48ca8b852dcdef078c7951072000886a</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-sdb-chroot-9.9.4-38.el7_3.2.x86_64.rpm</filename><sum type="sha256">df037fa21e82ec13a6d4f4d0f9616bc5e97ad190d2eeb552fdb0d2efe85bbc52</sum></package><package arch="i686" epoch="32" name="bind-devel" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-38.el7_3.2.i686.rpm</filename><sum type="sha256">83d3f86f3f48393345799e30c741ef2ca37bd387863fbca6f8f143654bf51dac</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-38.el7_3.2.i686.rpm</filename><sum type="sha256">845131c1a454077a98f70d322a08bab61efb9c66e39b8582e970606361870a68</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-38.el7_3.2.x86_64.rpm</filename><sum type="sha256">447f3e5b9a2592591a2ee559fd378e2b8ca9c771aadffb160edb65c928e249c4</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-38.el7_3.2.x86_64.rpm</filename><sum type="sha256">5ceae3380f47cbe12788dfbf03e4cd3135a20148becf70143322c442697fde02</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-38.el7_3.2.i686.rpm</filename><sum type="sha256">f089b72a5c83decf8b645689ef5a113badb5d487eccda92c17145e4326d3fed0</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-pkcs11-9.9.4-38.el7_3.2.x86_64.rpm</filename><sum type="sha256">8d23446cdd6fd3e8c2021ca01d1a5fac44423cea63141be54f202b3bd1bdbc30</sum></package><package arch="noarch" epoch="32" name="bind-license" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-license-9.9.4-38.el7_3.2.noarch.rpm</filename><sum type="sha256">ba38e1fce9262f2c0c2db9d7c88d34c7905f87b1beb32e9d8a7d577c3e59ea38</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-pkcs11-utils-9.9.4-38.el7_3.2.x86_64.rpm</filename><sum type="sha256">b9e6e1422185e9612e4f806e162575741324b68b3b3c05e645cbc62a07087271</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-38.el7_3.2.x86_64.rpm</filename><sum type="sha256">fb0952d34ab4e7b7f90d03ad39ab94a556051ea4cf75ed8377029fe17a47567e</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-sdb-9.9.4-38.el7_3.2.x86_64.rpm</filename><sum type="sha256">e500c4726fa9d8e1e6f7a15047e8d359860de04e4438bbed2691e5e5ac414a76</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="38.el7_3.2" src="bind-9.9.4-38.el7_3.2.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-38.el7_3.2.x86_64.rpm</filename><sum type="sha256">a78e8e80c5f597b638f1baa94fd8de0d2a2f8cc93d1e9fe5a3db2d6bd632e56c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3135" id="CVE-2017-3135" title="Bind: Assertion Failure When Using Dns64 And Rpz Can Lead To Crash" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0276" id="RHSA-2017:0276-1" title="Rhsa-2017:0276-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1420193" id="1420193" title="Bind: Assertion Failure When Using Dns64 And Rpz Can Lead To Crash" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0286-1</id><title>Openssl</title><description>Security Fix(es): 
* An integer underflow leading to an out of bounds read flaw was found in OpenSSL. A remote attacker could possibly use this flaw to crash a 32-bit TLS/SSL server or client using OpenSSL if it used the RC4-MD5 cipher suite. (CVE-2017-3731) 
* A denial of service flaw was found in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections form other clients. (CVE-2016-8610)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-02-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="openssl-devel" release="60.el7_3.1" src="openssl-1.0.1e-60.el7_3.1.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-60.el7_3.1.i686.rpm</filename><sum type="sha256">e56035332dc97502ef5766ac0dd3a9d1aff18e4df1763209ecceeac21fc491fe</sum></package><package arch="x86_64" epoch="1" name="openssl-devel" release="60.el7_3.1" src="openssl-1.0.1e-60.el7_3.1.src.rpm" version="1.0.1e"><filename>openssl-devel-1.0.1e-60.el7_3.1.x86_64.rpm</filename><sum type="sha256">f5bbe674ad696d0c776d89c3977bf05e066a8c400ae8de337050d21c9d5238b1</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="60.el7_3.1" src="openssl-1.0.1e-60.el7_3.1.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-60.el7_3.1.x86_64.rpm</filename><sum type="sha256">863f6c44847373c6bd6d382c900b8a886ddea4ae41c24a77f00512aaa6125ec2</sum></package><package arch="i686" epoch="1" name="openssl-static" release="60.el7_3.1" src="openssl-1.0.1e-60.el7_3.1.src.rpm" version="1.0.1e"><filename>openssl-static-1.0.1e-60.el7_3.1.i686.rpm</filename><sum type="sha256">de68d1d704f6ea3ff9ec3a565380c26f5c1912a18c76e435837479b34a3657e5</sum></package><package arch="x86_64" epoch="1" name="openssl" release="60.el7_3.1" src="openssl-1.0.1e-60.el7_3.1.src.rpm" version="1.0.1e"><filename>openssl-1.0.1e-60.el7_3.1.x86_64.rpm</filename><sum type="sha256">cc34fe1e46b3a90fda0d7cef4c81f7faf8e5f8d3f4da92a0704181658c4bcc2c</sum></package><package arch="x86_64" epoch="1" name="openssl-libs" release="60.el7_3.1" src="openssl-1.0.1e-60.el7_3.1.src.rpm" version="1.0.1e"><filename>openssl-libs-1.0.1e-60.el7_3.1.x86_64.rpm</filename><sum type="sha256">12def1d900dbed3017f6a7c28be3b339e45b750c3a130426537b93b1fa31e117</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="60.el7_3.1" src="openssl-1.0.1e-60.el7_3.1.src.rpm" version="1.0.1e"><filename>openssl-libs-1.0.1e-60.el7_3.1.i686.rpm</filename><sum type="sha256">995fba6bee3f1195aa24cd6844623aa7bbbbe43d6db065355a1ea112074b5494</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="60.el7_3.1" src="openssl-1.0.1e-60.el7_3.1.src.rpm" version="1.0.1e"><filename>openssl-perl-1.0.1e-60.el7_3.1.x86_64.rpm</filename><sum type="sha256">ab0c125600df37c1c22fb7cdff9a338954f00fd96115f811c33397c8cd3f7388</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8610" id="CVE-2016-8610" title="Ssl/Tls: Malformed Plain-Text Alert Packets Could Cause Remote Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3731" id="CVE-2017-3731" title="Openssl: Truncated Packet Could Crash Via Oob Read" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0286" id="RHSA-2017:0286-1" title="Rhsa-2017:0286-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1384743" id="1384743" title="Ssl/Tls: Malformed Plain-Text Alert Packets Could Cause Remote Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416852" id="1416852" title="Openssl: Truncated Packet Could Crash Via Oob Read" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0294-1</id><title>Kernel</title><description>Security Fix(es): 
* A use-after-free flaw was found in the way the Linux kernel's Datagram Congestion Control Protocol (DCCP) implementation freed SKB (socket buffer) resources for a DCCP_PKT_REQUEST packet when the IPV6_RECVPKTINFO option is set on the socket. A local, unprivileged user could use this flaw to alter the kernel memory, allowing them to escalate their privileges on the system. (CVE-2017-6074, Important)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-02-23 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kernel-doc" release="514.6.2.el7" src="kernel-3.10.0-514.6.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-514.6.2.el7.noarch.rpm</filename><sum type="sha256">015061c3245222194841f6db28f5a496d03dfbb570b10cf06021e1a525d97d32</sum></package><package arch="x86_64" name="python-perf" release="514.6.2.el7" src="kernel-3.10.0-514.6.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-514.6.2.el7.x86_64.rpm</filename><sum type="sha256">321be9d8a8c01ee0d3fe0f7a1c9857fd6ce5f46a7f7e2cf66f5f5b1541469673</sum></package><package arch="x86_64" name="kernel-devel" release="514.6.2.el7" src="kernel-3.10.0-514.6.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-514.6.2.el7.x86_64.rpm</filename><sum type="sha256">ca5d187fe244edf4264e0c906bb8de85c1ba831d872a997364b8aa01760bbf36</sum></package><package arch="x86_64" name="perf" release="514.6.2.el7" src="kernel-3.10.0-514.6.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-514.6.2.el7.x86_64.rpm</filename><sum type="sha256">624b13070e56e7eb2355faa86c1802b266aa8e80e2b566140e5c9a48c2c69031</sum></package><package arch="x86_64" name="kernel-debug-devel" release="514.6.2.el7" src="kernel-3.10.0-514.6.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-514.6.2.el7.x86_64.rpm</filename><sum type="sha256">09d00d1fc8f43b7ffb34f4076f04c804036b849aa3452f0801e761c106383154</sum></package><package arch="x86_64" name="kernel-tools-libs" release="514.6.2.el7" src="kernel-3.10.0-514.6.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-514.6.2.el7.x86_64.rpm</filename><sum type="sha256">05b6c23daacb854db851ca18f58237cb31a1db70efc853b204eeb2032d63d529</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="514.6.2.el7" src="kernel-3.10.0-514.6.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-514.6.2.el7.x86_64.rpm</filename><sum type="sha256">439276a92740c8400f02ab7c63d79cdfa921f5597b2e92d5923d636e407f7948</sum></package><package arch="x86_64" name="kernel-tools" release="514.6.2.el7" src="kernel-3.10.0-514.6.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-514.6.2.el7.x86_64.rpm</filename><sum type="sha256">b6ba06c018dcaee395e3b05a492299eb72a40fe1aa0ee92e5582197b81e4dd08</sum></package><package arch="x86_64" name="kernel-headers" release="514.6.2.el7" src="kernel-3.10.0-514.6.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-514.6.2.el7.x86_64.rpm</filename><sum type="sha256">62cc2f890569ce04514a98d2215529121688158bac4269fa65877fd138e10d2d</sum></package><package arch="x86_64" name="kernel" release="514.6.2.el7" src="kernel-3.10.0-514.6.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-514.6.2.el7.x86_64.rpm</filename><sum type="sha256">faf47ce1a00ffdc3d2742bbff77ad20fdc6e64286b2a77239a1c9fb2af24300a</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="514.6.2.el7" src="kernel-3.10.0-514.6.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-514.6.2.el7.noarch.rpm</filename><sum type="sha256">42b7e3954a1db1aa51a3fcf110b89a39253200cb8282d3c3646a1df6d55c4f8c</sum></package><package arch="x86_64" name="kernel-debug" release="514.6.2.el7" src="kernel-3.10.0-514.6.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-514.6.2.el7.x86_64.rpm</filename><sum type="sha256">8021394bed07ace2fa450ca973cfaff6291b158342aa050182256c5d09b126dd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6074" id="CVE-2017-6074" title="Kernel: Use After Free In Dccp Protocol" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0294" id="RHSA-2017:0294-1" title="Rhsa-2017:0294-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1423071" id="1423071" title="Kernel: Use After Free In Dccp Protocol" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0386-1</id><title>Kernel</title><description>Security Fix(es): 
* Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support is vulnerable to a null pointer dereference flaw. It could occur on x86 platform, when emulating an undefined instruction. An attacker could use this flaw to crash the host kernel resulting in DoS. (CVE-2016-8630, Important) 
* A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system. (CVE-2016-8655, Important) 
* A flaw was discovered in the Linux kernel's implementation of VFIO. An attacker issuing an ioctl can create a situation where memory is corrupted and modify memory outside of the expected area. This may overwrite kernel memory and subvert kernel execution. (CVE-2016-9083, Important) 
* The use of a kzalloc with an integer multiplication allowed an integer overflow condition to be reached in vfio_pci_intrs.c. This combined with CVE-2016-9083 may allow an attacker to craft an attack and use unallocated memory, potentially crashing the machine. (CVE-2016-9084, Moderate)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-03-02 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kernel-doc" release="514.10.2.el7" src="kernel-3.10.0-514.10.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-514.10.2.el7.noarch.rpm</filename><sum type="sha256">d2c5470b9f9af78447d8b6deec7ffe7f72510b1184b639fc55d12357ab94a24a</sum></package><package arch="x86_64" name="kernel-debug" release="514.10.2.el7" src="kernel-3.10.0-514.10.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-514.10.2.el7.x86_64.rpm</filename><sum type="sha256">21437880f98048c8233e4d93ca9c3efeebdd09a4692e60eee4329569b699ca12</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="514.10.2.el7" src="kernel-3.10.0-514.10.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-514.10.2.el7.x86_64.rpm</filename><sum type="sha256">29169057239839bb9b58bcd47141ab940e37403cfd52db4b9a8891bc18d6f66d</sum></package><package arch="x86_64" name="kernel-tools" release="514.10.2.el7" src="kernel-3.10.0-514.10.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-514.10.2.el7.x86_64.rpm</filename><sum type="sha256">b50e30412b2dd5b372788e6caca8ba6e4665f309cfe2ef101c32afcd0d3533d4</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="514.10.2.el7" src="kernel-3.10.0-514.10.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-514.10.2.el7.noarch.rpm</filename><sum type="sha256">1568f76d039a361f64370e756fd8623191298ae70226c61fb8cfc9c84b6dbda8</sum></package><package arch="x86_64" name="kernel-devel" release="514.10.2.el7" src="kernel-3.10.0-514.10.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-514.10.2.el7.x86_64.rpm</filename><sum type="sha256">f64c6173c98ee4ac6a4df9329a2d60bb951277a0ea93197f7ca0b6c87f6fa5c0</sum></package><package arch="x86_64" name="kernel-headers" release="514.10.2.el7" src="kernel-3.10.0-514.10.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-514.10.2.el7.x86_64.rpm</filename><sum type="sha256">a992be3ad9207ff06555f4ea2cc7a0f5c7286805234a0b71d327399ad8626d65</sum></package><package arch="x86_64" name="kernel" release="514.10.2.el7" src="kernel-3.10.0-514.10.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-514.10.2.el7.x86_64.rpm</filename><sum type="sha256">aa60d144d858a258191d5a088286a649780e0b91215bc650b0c90402e97fb9fe</sum></package><package arch="x86_64" name="perf" release="514.10.2.el7" src="kernel-3.10.0-514.10.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-514.10.2.el7.x86_64.rpm</filename><sum type="sha256">8ba454ce495c9be4f6c87ac5fc45aa18e208d7debe9c5df5af25e81a6fb7056d</sum></package><package arch="x86_64" name="kernel-debug-devel" release="514.10.2.el7" src="kernel-3.10.0-514.10.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-514.10.2.el7.x86_64.rpm</filename><sum type="sha256">44fb8028228ce2bd0e1116677017d80803b575b0f978837f7c4f68ba0ecde005</sum></package><package arch="x86_64" name="kernel-tools-libs" release="514.10.2.el7" src="kernel-3.10.0-514.10.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-514.10.2.el7.x86_64.rpm</filename><sum type="sha256">cccc2d16f6c3c882cf397bbb8292c695a94d2ddff8cf8c57b02a225ae7ad5d9d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8630" id="CVE-2016-8630" title="Kernel: Kvm: X86: Null Pointer Dereference During Instruction Decode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8655" id="CVE-2016-8655" title="Kernel: Race Condition In Packet_Set_Ring Leads To Use After Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9083" id="CVE-2016-9083" title="Kernel: State Machine Confusion Bug In Vfio Driver Leading To Memory Corruption" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9084" id="CVE-2016-9084" title="Kernel: Integer Overflow When Using Kzalloc In Vfio Driver" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0386" id="RHSA-2017:0386-1" title="Rhsa-2017:0386-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1389258" id="1389258" title="Kernel: State Machine Confusion Bug In Vfio Driver Leading To Memory Corruption" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1389259" id="1389259" title="Kernel: Integer Overflow When Using Kzalloc In Vfio Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1393350" id="1393350" title="Kernel: Kvm: X86: Null Pointer Dereference During Instruction Decode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1400019" id="1400019" title="Kernel: Race Condition In Packet_Set_Ring Leads To Use After Free" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0388-1</id><title>Ipa</title><description>Security Fix(es): 
* It was found that IdM's ca-del, ca-disable, and ca-enable commands did not properly check the user's permissions while modifying CAs in Dogtag. An authenticated, unauthorized attacker could use this flaw to delete, disable, or enable CAs causing various denial of service problems with certificate issuance, OCSP signing, and deletion of secret keys. (CVE-2017-2590) 
Bug Fix(es): 
* Previously, during an Identity Management (IdM) replica installation that runs on domain level "1" or higher, Directory Server was not configured to use TLS encryption. As a consequence, installing a certificate authority (CA) on that replica failed. Directory Server is now configured to use TLS encryption during the replica installation and as a result, the CA installation works as expected. 
* Previously, the Identity Management (IdM) public key infrastructure (PKI) component was configured to listen on the "::1" IPv6 localhost address. In environments have the the IPv6 protocol disabled, the replica installer was unable to retrieve the Directory Server certificate, and the installation failed. The default listening address of the PKI connector has been updated from the IP address to "localhost". As a result, the PKI connector now listens on the correct addresses in IPv4 and IPv6 environments. 
* Previously, when installing a certificate authority (CA) on a replica, Identity Management (IdM) was unable to provide third-party CA certificates to the Certificate System CA installer. As a consequence, the installer was unable to connect to the remote master if the remote master used a third-party server certificate, and the installation failed. This updates applies a patch and as a result, installing a CA replica works as expected in the described situation. 
* When installing a replica, the web server service entry is created on the Identity Management (IdM) master and replicated to all IdM servers. Previously, when installing a replica without a certificate authority (CA), in certain situations the service entry was not replicated to the new replica on time, and the installation failed. The replica installer has been updated and now waits until the web server service entry is replicated. As a result, the replica installation no longer fails in the described situation.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-03-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ipa-admintools" release="14.sl7_3.6" src="ipa-4.4.0-14.sl7_3.6.src.rpm" version="4.4.0"><filename>ipa-admintools-4.4.0-14.sl7_3.6.noarch.rpm</filename><sum type="sha256">7e8f85c21b7a9523ca66242a8a608bd8a1ad04556acab1a2dba039ee94f0ca6b</sum></package><package arch="noarch" name="python2-ipalib" release="14.sl7_3.6" src="ipa-4.4.0-14.sl7_3.6.src.rpm" version="4.4.0"><filename>python2-ipalib-4.4.0-14.sl7_3.6.noarch.rpm</filename><sum type="sha256">456da0b3537d57f200bb641ebb40319c13c0b3aae0f36cefc2f3eb2861322b2b</sum></package><package arch="noarch" name="python2-ipaserver" release="14.sl7_3.6" src="ipa-4.4.0-14.sl7_3.6.src.rpm" version="4.4.0"><filename>python2-ipaserver-4.4.0-14.sl7_3.6.noarch.rpm</filename><sum type="sha256">a42b13612929fac940f4bfdc02e8ef461647327e09a0073287dbddb1ada22b43</sum></package><package arch="x86_64" name="ipa-server" release="14.sl7_3.6" src="ipa-4.4.0-14.sl7_3.6.src.rpm" version="4.4.0"><filename>ipa-server-4.4.0-14.sl7_3.6.x86_64.rpm</filename><sum type="sha256">717de0315d4757efe68b3b8d41faa4924a7905309507ddd0b275d06dce2905db</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="14.sl7_3.6" src="ipa-4.4.0-14.sl7_3.6.src.rpm" version="4.4.0"><filename>ipa-server-trust-ad-4.4.0-14.sl7_3.6.x86_64.rpm</filename><sum type="sha256">3d09046d02635a37a120616a787e49cb3ec41b66acc012cf9e7d9f7339d64880</sum></package><package arch="noarch" name="python2-ipaclient" release="14.sl7_3.6" src="ipa-4.4.0-14.sl7_3.6.src.rpm" version="4.4.0"><filename>python2-ipaclient-4.4.0-14.sl7_3.6.noarch.rpm</filename><sum type="sha256">3600151a25b3e32d46355da6478f6ac7d398f00b0c2750261da578a5d59ab143</sum></package><package arch="x86_64" name="ipa-client" release="14.sl7_3.6" src="ipa-4.4.0-14.sl7_3.6.src.rpm" version="4.4.0"><filename>ipa-client-4.4.0-14.sl7_3.6.x86_64.rpm</filename><sum type="sha256">5c46cd6bf10770ea13fb140f1a81b9ad6e3cd60a2d5720647e7d1bb816df8200</sum></package><package arch="noarch" name="ipa-server-common" release="14.sl7_3.6" src="ipa-4.4.0-14.sl7_3.6.src.rpm" version="4.4.0"><filename>ipa-server-common-4.4.0-14.sl7_3.6.noarch.rpm</filename><sum type="sha256">ec521ea1a0e52faefb8817404ed67adb40750d9ec4e412ee20dd6e014a127e2d</sum></package><package arch="noarch" name="ipa-python-compat" release="14.sl7_3.6" src="ipa-4.4.0-14.sl7_3.6.src.rpm" version="4.4.0"><filename>ipa-python-compat-4.4.0-14.sl7_3.6.noarch.rpm</filename><sum type="sha256">f688ad6e121763054e7da9d0a74ecc39931338644982c1f327318130dd5018fe</sum></package><package arch="noarch" name="ipa-server-dns" release="14.sl7_3.6" src="ipa-4.4.0-14.sl7_3.6.src.rpm" version="4.4.0"><filename>ipa-server-dns-4.4.0-14.sl7_3.6.noarch.rpm</filename><sum type="sha256">e5427298a5ec5f6fc755b0e8563cba58c96212adeb7d239d4d9ee96be71ecc5a</sum></package><package arch="noarch" name="ipa-client-common" release="14.sl7_3.6" src="ipa-4.4.0-14.sl7_3.6.src.rpm" version="4.4.0"><filename>ipa-client-common-4.4.0-14.sl7_3.6.noarch.rpm</filename><sum type="sha256">01fe8454be686dbd4ba158e51b0779d8cd1349e5295e8580cb3d93aae52a5703</sum></package><package arch="noarch" name="ipa-common" release="14.sl7_3.6" src="ipa-4.4.0-14.sl7_3.6.src.rpm" version="4.4.0"><filename>ipa-common-4.4.0-14.sl7_3.6.noarch.rpm</filename><sum type="sha256">8d96c7797f7c8630dc89c3b96a9580de1e15a0b031c6416d7087e65819d1c982</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2590" id="CVE-2017-2590" title="Ipa: Insufficient Permission Check For Ca-Del, Ca-Disable And Ca-Enable Commands" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0388" id="RHSA-2017:0388-1" title="Rhsa-2017:0388-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1410760" id="1410760" title="Ipa-Ca-Install Fails On Replica When Ipa Master Is Installed Without Ca" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413137" id="1413137" title="Ipa: Insufficient Permission Check For Ca-Del, Ca-Disable And Ca-Enable Commands" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1415158" id="1415158" title="Ipa-Ca-Install Fails On Replica When Ipa Server Is Converted From Ca-Less To Ca-Full" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416481" id="1416481" title="Ipa Replica Install Fails With Dirsrv Errors." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416488" id="1416488" title="Replication Race Condition Prevents Ipa To Install" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0396-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host. (CVE-2017-2615) 
* Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process. (CVE-2017-2620) 
Bug Fix(es): 
* When using the virtio-blk driver on a guest virtual machine with no space on the virtual hard drive, the guest terminated unexpectedly with a "block I/O error in device" message and the qemu-kvm process exited with a segmentation fault. This update fixes how the system_reset QEMU signal is handled in the above scenario. As a result, if a guest crashes due to no space left on the device, qemu-kvm continues running and the guest can be reset as expected.</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-03-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="126.el7_3.5" src="qemu-kvm-1.5.3-126.el7_3.5.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-126.el7_3.5.x86_64.rpm</filename><sum type="sha256">69e71d5f989852636480d4e3a8d81f0a73c33d31fb0f0950136f74bc589df699</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="126.el7_3.5" src="qemu-kvm-1.5.3-126.el7_3.5.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-126.el7_3.5.x86_64.rpm</filename><sum type="sha256">a78fed283cc7da01c41d49001a5abaa333a8df70db02d0b706c6b81060a3684a</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="126.el7_3.5" src="qemu-kvm-1.5.3-126.el7_3.5.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-126.el7_3.5.x86_64.rpm</filename><sum type="sha256">b42343c9b3fa13c91b5eb80144910f090b17870ea44b1f383253d8a880126b5f</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="126.el7_3.5" src="qemu-kvm-1.5.3-126.el7_3.5.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-126.el7_3.5.x86_64.rpm</filename><sum type="sha256">7934116fad919a5142d0a829f5f80a0789b3551705598a9f6b6b3eecd5dea008</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2615" id="CVE-2017-2615" title="Qemu: Display: Cirrus: Oob Access While Doing Bitblt Copy Backward Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2620" id="CVE-2017-2620" title="Qemu: Display: Cirrus: Potential Arbitrary Code Execution Via Cirrus_Bitblt_Cputovideo" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0396" id="RHSA-2017:0396-1" title="Rhsa-2017:0396-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418200" id="1418200" title="Qemu: Display: Cirrus: Oob Access While Doing Bitblt Copy Backward Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1420049" id="1420049" title="System_Reset Should Clear Pending Request For Error (Virtio-Blk)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1420428" id="1420428" title="Remove Dependencies Required By Spice On Ppc64Le" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1420484" id="1420484" title="Qemu: Display: Cirrus: Potential Arbitrary Code Execution Via Cirrus_Bitblt_Cputovideo" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0461-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5398, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5404, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410, CVE-2017-5405)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2017-03-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="4.el7_3" src="firefox-52.0-4.el7_3.src.rpm" version="52.0"><filename>firefox-52.0-4.el7_3.i686.rpm</filename><sum type="sha256">6cc82c78604b18c48d8730b2882ad99eb1e92a9176d36706497a05182ba19842</sum></package><package arch="x86_64" name="firefox" release="4.el7_3" src="firefox-52.0-4.el7_3.src.rpm" version="52.0"><filename>firefox-52.0-4.el7_3.x86_64.rpm</filename><sum type="sha256">2af64d43c23a8e43f0e237b37f2c11a223680ac16774256535810c5541a0bad0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5398" id="CVE-2017-5398" title="Mozilla: Memory Safety Bugs Fixed In Firefox 52 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5400" id="CVE-2017-5400" title="Mozilla: Asm.Js Jit-Spray Bypass Of Aslr And Dep " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5401" id="CVE-2017-5401" title="Mozilla: Memory Corruption When Handling " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5402" id="CVE-2017-5402" title="Mozilla: Use-After-Free Working With Events In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5404" id="CVE-2017-5404" title="Mozilla: Use-After-Free Working With Ranges In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5405" id="CVE-2017-5405" title="Mozilla: Ftp Response Codes Can Cause Use Of " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5407" id="CVE-2017-5407" title="Mozilla: Pixel And History Stealing Via " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5408" id="CVE-2017-5408" title="Mozilla: Cross-Origin Reading Of Video Captions " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5410" id="CVE-2017-5410" title="Mozilla: Memory Corruption During Javascript " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0461" id="RHSA-2017:0461-1" title="Rhsa-2017:0461-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429778" id="1429778" title="Mozilla: Asm.Js Jit-Spray Bypass Of Aslr And Dep " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429779" id="1429779" title="Mozilla: Memory Corruption When Handling " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429780" id="1429780" title="Mozilla: Use-After-Free Working With Events In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429781" id="1429781" title="Mozilla: Use-After-Free Working With Ranges In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429782" id="1429782" title="Mozilla: Pixel And History Stealing Via " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429783" id="1429783" title="Mozilla: Memory Corruption During Javascript " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429784" id="1429784" title="Mozilla: Cross-Origin Reading Of Video Captions " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429785" id="1429785" title="Mozilla: Ftp Response Codes Can Cause Use Of " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429786" id="1429786" title="Mozilla: Memory Safety Bugs Fixed In Firefox 52 " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0498-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 45.8.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-5398, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5404, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410, CVE-2017-5405)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-03-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_3" src="thunderbird-45.8.0-1.el7_3.src.rpm" version="45.8.0"><filename>thunderbird-45.8.0-1.el7_3.x86_64.rpm</filename><sum type="sha256">323e8d55f618cd56da20399366f60b7838d2bf7dcd5acd94d7bca0276dcdd865</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5398" id="CVE-2017-5398" title="Mozilla: Memory Safety Bugs Fixed In Firefox 52 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5400" id="CVE-2017-5400" title="Mozilla: Asm.Js Jit-Spray Bypass Of Aslr And Dep " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5401" id="CVE-2017-5401" title="Mozilla: Memory Corruption When Handling " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5402" id="CVE-2017-5402" title="Mozilla: Use-After-Free Working With Events In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5404" id="CVE-2017-5404" title="Mozilla: Use-After-Free Working With Ranges In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5405" id="CVE-2017-5405" title="Mozilla: Ftp Response Codes Can Cause Use Of " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5407" id="CVE-2017-5407" title="Mozilla: Pixel And History Stealing Via " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5408" id="CVE-2017-5408" title="Mozilla: Cross-Origin Reading Of Video Captions " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5410" id="CVE-2017-5410" title="Mozilla: Memory Corruption During Javascript " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0498" id="RHSA-2017:0498-1" title="Rhsa-2017:0498-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429778" id="1429778" title="Mozilla: Asm.Js Jit-Spray Bypass Of Aslr And Dep " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429779" id="1429779" title="Mozilla: Memory Corruption When Handling " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429780" id="1429780" title="Mozilla: Use-After-Free Working With Events In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429781" id="1429781" title="Mozilla: Use-After-Free Working With Ranges In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429782" id="1429782" title="Mozilla: Pixel And History Stealing Via " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429783" id="1429783" title="Mozilla: Memory Corruption During Javascript " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429784" id="1429784" title="Mozilla: Cross-Origin Reading Of Video Captions " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429785" id="1429785" title="Mozilla: Ftp Response Codes Can Cause Use Of " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429786" id="1429786" title="Mozilla: Memory Safety Bugs Fixed In Firefox 52 " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0558-1</id><title>Firefox</title><description>Security Fix(es): 
* A flaw was found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5428)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2017-03-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="5.el7_3" src="firefox-52.0-5.el7_3.src.rpm" version="52.0"><filename>firefox-52.0-5.el7_3.x86_64.rpm</filename><sum type="sha256">84d70b85685001deedd878453fd315cb4cd49d4104b557a4c91e5d059c58a503</sum></package><package arch="i686" name="firefox" release="5.el7_3" src="firefox-52.0-5.el7_3.src.rpm" version="52.0"><filename>firefox-52.0-5.el7_3.i686.rpm</filename><sum type="sha256">fe1273b0a0c474d925b4d64a949e758617676a1e88f3a14bf0fbec9feb7e0097</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5428" id="CVE-2017-5428" title="Mozilla: Integer Overflow In Createimagebitmap() (Mfsa 2017-08)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0558" id="RHSA-2017:0558-1" title="Rhsa-2017:0558-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1433202" id="1433202" title="Mozilla: Integer Overflow In Createimagebitmap() (Mfsa 2017-08)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0837-1</id><title>Icoutils</title><description>Security Fix(es): 
* Multiple vulnerabilities were found in icoutils, in the wrestool program. An attacker could create a crafted executable that, when read by wrestool, could result in memory corruption leading to a crash or potential code execution. (CVE-2017-5208, CVE-2017-5333, CVE-2017-6009) 
* A vulnerability was found in icoutils, in the wrestool program. An attacker could create a crafted executable that, when read by wrestool, could result in failure to allocate memory or an over-large memcpy operation, leading to a crash. (CVE-2017-5332) 
* Multiple vulnerabilities were found in icoutils, in the icotool program. An attacker could create a crafted ICO or CUR file that, when read by icotool, could result in memory corruption leading to a crash or potential code execution. (CVE-2017-6010, CVE-2017-6011)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-03-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="icoutils" release="1.el7_3" src="icoutils-0.31.3-1.el7_3.src.rpm" version="0.31.3"><filename>icoutils-0.31.3-1.el7_3.x86_64.rpm</filename><sum type="sha256">1bb75e9ec026e44dc987159563ef235468822c56b548a145194f6925ce13283a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5208" id="CVE-2017-5208" title="Icoutils: Check_Offset Overflow On 64-Bit Systems" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5332" id="CVE-2017-5332" title="Icoutils: Access To Unallocated Memory Possible In Extract.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5333" id="CVE-2017-5333" title="Icoutils: Integer Overflow Vulnerability In Extract.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6009" id="CVE-2017-6009" title="Icoutils: Buffer Overflow In The Decode_Ne_Resource_Id Function" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6010" id="CVE-2017-6010" title="Icoutils: Buffer Overflow In The Extract_Icons Function" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6011" id="CVE-2017-6011" title="Icoutils: Buffer Overflow In The Simple_Vec Function" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0837" id="RHSA-2017:0837-1" title="Rhsa-2017:0837-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1411251" id="1411251" title="Icoutils: Check_Offset Overflow On 64-Bit Systems" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1412259" id="1412259" title="Icoutils: Integer Overflow Vulnerability In Extract.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1412263" id="1412263" title="Icoutils: Access To Unallocated Memory Possible In Extract.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1422906" id="1422906" title="Icoutils: Buffer Overflow In The Decode_Ne_Resource_Id Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1422907" id="1422907" title="Icoutils: Buffer Overflow In The Extract_Icons Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1422908" id="1422908" title="Icoutils: Buffer Overflow In The Simple_Vec Function" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0838-1</id><title>Openjpeg</title><description>Security Fix(es): 
* Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in OpenJPEG. A specially crafted JPEG2000 image could cause an application using OpenJPEG to crash or, potentially, execute arbitrary code. (CVE-2016-5139, CVE-2016-5158, CVE-2016-5159, CVE-2016-7163) 
* An out-of-bounds read vulnerability was found in OpenJPEG, in the j2k_to_image tool. Converting a specially crafted JPEG2000 file to another format could cause the application to crash or, potentially, disclose some data from the heap. (CVE-2016-9573) 
* A heap-based buffer overflow vulnerability was found in OpenJPEG. A specially crafted JPEG2000 image, when read by an application using OpenJPEG, could cause the application to crash or, potentially, execute arbitrary code. (CVE-2016-9675)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-03-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openjpeg" release="16.el7_3" src="openjpeg-1.5.1-16.el7_3.src.rpm" version="1.5.1"><filename>openjpeg-1.5.1-16.el7_3.x86_64.rpm</filename><sum type="sha256">ba47f3e4ead62bc20a25c84afbeeb62fb0e9e365535a24d33c70848b4800ae8d</sum></package><package arch="i686" name="openjpeg-devel" release="16.el7_3" src="openjpeg-1.5.1-16.el7_3.src.rpm" version="1.5.1"><filename>openjpeg-devel-1.5.1-16.el7_3.i686.rpm</filename><sum type="sha256">4404546795f84c8b5d6dd1af8c943c85fc7133ae33efe5117cae3e02d4608f71</sum></package><package arch="i686" name="openjpeg-libs" release="16.el7_3" src="openjpeg-1.5.1-16.el7_3.src.rpm" version="1.5.1"><filename>openjpeg-libs-1.5.1-16.el7_3.i686.rpm</filename><sum type="sha256">d0e0f733cf36ea4e6fff83fe12a1dd6e109e4ac2d1225bc7097fc18e9d530dff</sum></package><package arch="x86_64" name="openjpeg-devel" release="16.el7_3" src="openjpeg-1.5.1-16.el7_3.src.rpm" version="1.5.1"><filename>openjpeg-devel-1.5.1-16.el7_3.x86_64.rpm</filename><sum type="sha256">9e93b8e0e9d9f38af21f78acbe1f2e9fa9d207c856105303652520460c0d0517</sum></package><package arch="x86_64" name="openjpeg-libs" release="16.el7_3" src="openjpeg-1.5.1-16.el7_3.src.rpm" version="1.5.1"><filename>openjpeg-libs-1.5.1-16.el7_3.x86_64.rpm</filename><sum type="sha256">1b56b745474c231c92b2f23e03f0791b6cd675be9edc7191161bd77bac667c50</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5139" id="CVE-2016-5139" title="Chromium-Browser: Heap Overflow In Pdfium" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5158" id="CVE-2016-5158" title="Chromium-Browser: Heap Overflow In Pdfium" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5159" id="CVE-2016-5159" title="Chromium-Browser: Heap Overflow In Pdfium" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7163" id="CVE-2016-7163" title="Openjpeg: Integer Overflow In Opj_Pi_Create_Decode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9573" id="CVE-2016-9573" title="Openjpeg: Heap Out-Of-Bounds Read Due To Insufficient Check In Imagetopnm()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9675" id="CVE-2016-9675" title="Openjpeg: Incorrect Fix For Cve-2013-6045" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0838" id="RHSA-2017:0838-1" title="Rhsa-2017:0838-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1363982" id="1363982" title="Chromium-Browser: Heap Overflow In Pdfium" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1372219" id="1372219" title="Chromium-Browser: Heap Overflow In Pdfium" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1372220" id="1372220" title="Chromium-Browser: Heap Overflow In Pdfium" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1374329" id="1374329" title="Openjpeg: Integer Overflow In Opj_Pi_Create_Decode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1382202" id="1382202" title="Openjpeg: Incorrect Fix For Cve-2013-6045" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1402711" id="1402711" title="Openjpeg: Heap Out-Of-Bounds Read Due To Insufficient Check In Imagetopnm()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0906-1</id><title>Httpd</title><description>Security Fix(es):

* It was discovered that the mod_session_crypto module of httpd did not use any mechanisms to verify integrity of the encrypted session data stored in the user's browser. A remote attacker could use this flaw to decrypt and modify session data using a padding oracle attack. (CVE-2016-0736)

* It was discovered that the mod_auth_digest module of httpd did not properly check for memory allocation failures. A remote attacker could use this flaw to cause httpd child processes to repeatedly crash if the server used HTTP digest authentication. (CVE-2016-2161)

* It was discovered that the HTTP parser in httpd incorrectly allowed certain characters not permitted by the HTTP protocol specification to appear unencoded in HTTP request headers. If httpd was used in conjunction with a proxy or backend server that interpreted those characters differently, a remote attacker could possibly use this flaw to inject data into HTTP responses, resulting in proxy cache poisoning. (CVE-2016-8743)

Note: The fix for the CVE-2016-8743 issue causes httpd to return "400 Bad Request" error to HTTP clients which do not strictly follow HTTP protocol specification. A newly introduced configuration directive "HttpProtocolOptions Unsafe" can be used to re-enable the old less strict parsing. However, such setting also re-introduces the CVE-2016-8743 issue.

Bug Fix(es):

* When waking up child processes during a graceful restart, the httpd parent process could attempt to open more connections than necessary if a large number of child processes had been active prior to the restart. Consequently, a graceful restart could take a long time to complete. With this update, httpd has been fixed to limit the number of connections opened during a graceful restart to the number of active children, and the described problem no longer occurs.

* Previously, httpd running in a container returned the 500 HTTP status code (Internal Server Error) when a connection to a WebSocket server was closed. As a consequence, the httpd server failed to deliver the correct HTTP status and data to a client. With this update, httpd correctly handles all proxied requests to the WebSocket server, and the described problem no longer occurs.

* In a configuration using LDAP authentication with the mod_authnz_ldap module, the name set using the AuthLDAPBindDN directive was not correctly used to bind to the LDAP server for all queries. Consequently, authorization attempts failed. The LDAP modules have been fixed to ensure the configured name is correctly bound for LDAP queries, and authorization using LDAP no longer fails.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-04-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="mod_proxy_html" release="45.sl7.4" src="httpd-2.4.6-45.sl7.4.src.rpm" version="2.4.6"><filename>mod_proxy_html-2.4.6-45.sl7.4.x86_64.rpm</filename><sum type="sha256">ec8b7c62272f09632a5051f2e52432ea213411f64fd5dda4090a9118d7540933</sum></package><package arch="x86_64" name="mod_session" release="45.sl7.4" src="httpd-2.4.6-45.sl7.4.src.rpm" version="2.4.6"><filename>mod_session-2.4.6-45.sl7.4.x86_64.rpm</filename><sum type="sha256">fb54524075f1d5b939eb1404faa6901af77364d558d4ef79fc5cce502fca722a</sum></package><package arch="x86_64" name="mod_ldap" release="45.sl7.4" src="httpd-2.4.6-45.sl7.4.src.rpm" version="2.4.6"><filename>mod_ldap-2.4.6-45.sl7.4.x86_64.rpm</filename><sum type="sha256">37d06533511a17adf1294d55a1db4cc81bcf26c9f273d99dd71d319707ef14e2</sum></package><package arch="noarch" name="httpd-manual" release="45.sl7.4" src="httpd-2.4.6-45.sl7.4.src.rpm" version="2.4.6"><filename>httpd-manual-2.4.6-45.sl7.4.noarch.rpm</filename><sum type="sha256">5085f29aec70d0f28f85426a2bb3abc195ba7c9644188e127e5343ce7aad5f94</sum></package><package arch="x86_64" name="httpd-tools" release="45.sl7.4" src="httpd-2.4.6-45.sl7.4.src.rpm" version="2.4.6"><filename>httpd-tools-2.4.6-45.sl7.4.x86_64.rpm</filename><sum type="sha256">d84e3665ae2682ed0a6ade2bb4b6e79f9e571fe10c75e40ac745835c3246f620</sum></package><package arch="x86_64" name="httpd" release="45.sl7.4" src="httpd-2.4.6-45.sl7.4.src.rpm" version="2.4.6"><filename>httpd-2.4.6-45.sl7.4.x86_64.rpm</filename><sum type="sha256">678ed93bffa67e561cbc3b0ecc269fdb92cb5cbf72b4a187d69ed7584ead7f02</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="45.sl7.4" src="httpd-2.4.6-45.sl7.4.src.rpm" version="2.4.6"><filename>mod_ssl-2.4.6-45.sl7.4.x86_64.rpm</filename><sum type="sha256">0e1269c098eb3a981e705c496301083f3a6bbe1082fad9d5db0674f642f737e2</sum></package><package arch="x86_64" name="httpd-devel" release="45.sl7.4" src="httpd-2.4.6-45.sl7.4.src.rpm" version="2.4.6"><filename>httpd-devel-2.4.6-45.sl7.4.x86_64.rpm</filename><sum type="sha256">0157091b3a7e9f1fa31148af5b18796b95a492ed7dcd7af2619b218f89604204</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0736" id="CVE-2016-0736" title="Httpd: Padding Oracle In Apache Mod_Session_Crypto" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2161" id="CVE-2016-2161" title="Httpd: Dos Vulnerability In Mod_Auth_Digest" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8743" id="CVE-2016-8743" title="Httpd: Apache Http Request Parsing Whitespace " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0906" id="RHSA-2017:0906-1" title="Rhsa-2017:0906-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1406744" id="1406744" title="Httpd: Padding Oracle In Apache Mod_Session_Crypto" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1406753" id="1406753" title="Httpd: Dos Vulnerability In Mod_Auth_Digest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1406822" id="1406822" title="Httpd: Apache Http Request Parsing Whitespace " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1420002" id="1420002" title="Backport Fix For Issue With Graceful Restart Taking Very Long " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1420047" id="1420047" title="Authldapbinddn Might Not Be Used For Some Ldap Searches " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429947" id="1429947" title="Backport: Mod_Proxy_Wstunnel - Ah02447: Err/Hup On Backconn" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0907-1</id><title>Util-Linux</title><description>Security Fix(es):

* A race condition was found in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions. (CVE-2017-2616)

Bug Fix(es):

* The "findmnt --target &lt;path&gt;" command prints all file systems where the mount point directory is &lt;path&gt;. Previously, when used in the chroot environment, "findmnt --target &lt;path&gt;" incorrectly displayed all mount points. The command has been fixed so that it now checks the mount point path and returns information only for the relevant mount point.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-04-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libuuid-devel" release="33.el7_3.2" src="util-linux-2.23.2-33.el7_3.2.src.rpm" version="2.23.2"><filename>libuuid-devel-2.23.2-33.el7_3.2.i686.rpm</filename><sum type="sha256">d9763f9d358245e400fdaf3eefe47e6a8a896f2da75e2d49286b972d3724a943</sum></package><package arch="x86_64" name="util-linux" release="33.el7_3.2" src="util-linux-2.23.2-33.el7_3.2.src.rpm" version="2.23.2"><filename>util-linux-2.23.2-33.el7_3.2.x86_64.rpm</filename><sum type="sha256">ef1ced826714b066860aba28d7e7cd1779828c38794b0bc8c27b3cd74d4fe318</sum></package><package arch="x86_64" name="uuidd" release="33.el7_3.2" src="util-linux-2.23.2-33.el7_3.2.src.rpm" version="2.23.2"><filename>uuidd-2.23.2-33.el7_3.2.x86_64.rpm</filename><sum type="sha256">3610a9f5e22c9eb778830f55a0f2bfbf5fa5dc8674113fce1dc1793c365501a7</sum></package><package arch="x86_64" name="libblkid" release="33.el7_3.2" src="util-linux-2.23.2-33.el7_3.2.src.rpm" version="2.23.2"><filename>libblkid-2.23.2-33.el7_3.2.x86_64.rpm</filename><sum type="sha256">8ce1918997d06240694d78506a64e1440609dde8d82f5f74ed76769ff5c73a70</sum></package><package arch="i686" name="util-linux" release="33.el7_3.2" src="util-linux-2.23.2-33.el7_3.2.src.rpm" version="2.23.2"><filename>util-linux-2.23.2-33.el7_3.2.i686.rpm</filename><sum type="sha256">20b90b3cc3a9b8570f860668e634e7c8c1f7ac21e8c8a4bf33cbed5ffc2f0fe4</sum></package><package arch="i686" name="libmount" release="33.el7_3.2" src="util-linux-2.23.2-33.el7_3.2.src.rpm" version="2.23.2"><filename>libmount-2.23.2-33.el7_3.2.i686.rpm</filename><sum type="sha256">97490f4a13152248b776b5534deb28459a61529872083753ed7715b9e6c688b0</sum></package><package arch="x86_64" name="libblkid-devel" release="33.el7_3.2" src="util-linux-2.23.2-33.el7_3.2.src.rpm" version="2.23.2"><filename>libblkid-devel-2.23.2-33.el7_3.2.x86_64.rpm</filename><sum type="sha256">308e6b562008dd1d220e3f9a570d96350c129a69dd55f76fea8443ad26d88f66</sum></package><package arch="x86_64" name="libuuid-devel" release="33.el7_3.2" src="util-linux-2.23.2-33.el7_3.2.src.rpm" version="2.23.2"><filename>libuuid-devel-2.23.2-33.el7_3.2.x86_64.rpm</filename><sum type="sha256">04b5e8144aee8fbe116d713b973c0b5934c9085b0b4f71ffa1a1422bca98ebac</sum></package><package arch="i686" name="libmount-devel" release="33.el7_3.2" src="util-linux-2.23.2-33.el7_3.2.src.rpm" version="2.23.2"><filename>libmount-devel-2.23.2-33.el7_3.2.i686.rpm</filename><sum type="sha256">74d315babfadcec7c19710e3b175e9c9a3349006e33e87faf09fbe99a03e053c</sum></package><package arch="i686" name="libblkid-devel" release="33.el7_3.2" src="util-linux-2.23.2-33.el7_3.2.src.rpm" version="2.23.2"><filename>libblkid-devel-2.23.2-33.el7_3.2.i686.rpm</filename><sum type="sha256">0786a536cc0c34c680035a333fccde33387d8fe68da69e9262c21dfc6bd621f5</sum></package><package arch="x86_64" name="libuuid" release="33.el7_3.2" src="util-linux-2.23.2-33.el7_3.2.src.rpm" version="2.23.2"><filename>libuuid-2.23.2-33.el7_3.2.x86_64.rpm</filename><sum type="sha256">d6fb842e78badb2bb98b11b4d5affa4c386248919713e58343b9c472f11fc3a3</sum></package><package arch="i686" name="libuuid" release="33.el7_3.2" src="util-linux-2.23.2-33.el7_3.2.src.rpm" version="2.23.2"><filename>libuuid-2.23.2-33.el7_3.2.i686.rpm</filename><sum type="sha256">9773d29facc0cc2e934ec7771f99d57897598e15dee27e9af22ea8edfc00c257</sum></package><package arch="x86_64" name="libmount" release="33.el7_3.2" src="util-linux-2.23.2-33.el7_3.2.src.rpm" version="2.23.2"><filename>libmount-2.23.2-33.el7_3.2.x86_64.rpm</filename><sum type="sha256">016df18dd4ee25194ddcdcc562fb1d6be0db14c553f6bf7db33a9ef20fcd858c</sum></package><package arch="x86_64" name="libmount-devel" release="33.el7_3.2" src="util-linux-2.23.2-33.el7_3.2.src.rpm" version="2.23.2"><filename>libmount-devel-2.23.2-33.el7_3.2.x86_64.rpm</filename><sum type="sha256">1145e07ddc999daeb5a76fffabf61141f5e06f2deab948d2ea2b1d9936528917</sum></package><package arch="i686" name="libblkid" release="33.el7_3.2" src="util-linux-2.23.2-33.el7_3.2.src.rpm" version="2.23.2"><filename>libblkid-2.23.2-33.el7_3.2.i686.rpm</filename><sum type="sha256">eaf7eca8b2a21d395d69de80eed3106ed65e724a9003b4f9ab75ba0bca82b56c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2616" id="CVE-2017-2616" title="Util-Linux: Sending Sigkill To Other Processes With Root Privileges Via Su" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0907" id="RHSA-2017:0907-1" title="Rhsa-2017:0907-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1414481" id="1414481" title="Findmnt --Target Behaviour Changed In 7.3, Shows All " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418710" id="1418710" title="Util-Linux: Sending Sigkill To Other Processes With Root Privileges Via Su" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0914-1</id><title>Libreoffice</title><description>Security Fix(es):

* It was found that LibreOffice disclosed contents of a file specified in an embedded object's preview. An attacker could potentially use this flaw to expose details of a system running LibreOffice as an online service via a crafted document. (CVE-2017-3157)

Bug Fix(es):

* Previously, an improper resource management caused the LibreOffice Calc spreadsheet application to terminate unexpectedly after closing a dialog window with accessibility support enabled. The resource management has been improved, and the described problem no longer occurs.

* Previously, when an incorrect password was entered for a password protected document, the document has been considered as valid and a fallback attempt to open it as plain text has been made. As a consequence, it could appear that the document succesfully loaded, while just the encrypted unreadable content was shown. A fix has been made to terminate import attempts after entering incorrect password, and now nothing is loaded when a wrong password is entered.

* Previously, an improper resource management caused the LibreOffice Calc spreadsheet application to terminate unexpectedly during exit, after the Text Import dialog for CSV (Comma-separated Value) files closed, when accessibility support was enabled. The resource management has been improved, and the described problem no longer occurs.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-04-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="libreoffice-langpack-de" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-de-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">73afa5e9c2c257427cd548f640f73f80dc860e1e3655fcf5784190570cf4839f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ru" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ru-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">88ead14d156528a8be795d6eb53b74ec4a343587c2de9ffa3487142eb3b1ee94</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cs" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-cs-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">60efbf860212ca0be7dcc1e6e88dc2297ecc13a7aa5cdabcfe0232c6fd61f2c2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-el" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-el-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">0a07c9d889a7dbc36343ef6d1f11a4a17199bcd00e7fe796f04e1a471bcfbb3a</sum></package><package arch="noarch" epoch="1" name="autocorr-da" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-da-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">cd18018086dbb678c6432573a0078e93a8a018abbefe610ed10f945b7090d67d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-glade" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-glade-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">d79b052ef7175f27a2dea6edc2b15e6106daa55536fcb9941ac7967a85e119c7</sum></package><package arch="noarch" epoch="1" name="autocorr-lb" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-lb-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">adeaed32e3ffe8011ed5754bf6d9cf0e6836d7169bbb393b3d530ee47c9b6519</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kk" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-kk-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">cdf1187843e87b313327f18ea8b3af550c9beec3ba44746722325227442a4fb0</sum></package><package arch="noarch" epoch="1" name="autocorr-ko" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-ko-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">bea3e06bec0714e6a23546db0ef3731f83ba4583c1251ee042f52261707c2514</sum></package><package arch="noarch" epoch="1" name="autocorr-lt" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-lt-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">4062b3b1255acb74a3b8973b8ca172e39b6ef11f7425378253908d62e655ea6c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-et" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-et-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">9250f0c020e8df6d2676f2622dc911d4439c0fb8d4fa0ad490355cddfe634a12</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lv" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-lv-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">109d0d3247456e942fb363ab1c563ebbc4803f6a44953bb35b0bfa277a8f14bd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-st" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-st-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">f81c48c411f0584aaf3cdc2a0be6c7d7900459b2587df180637b387226722756</sum></package><package arch="noarch" epoch="1" name="autocorr-vi" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-vi-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">10ffb017f30cf6ac33b6ae87e965104db71d5779ff9fdf581e224e40132b3647</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-eu" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-eu-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">dbf1bc866fc05c9b6b84baa1a3fecd04146995a7b42a4f54e1f0799beaf9156d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nb" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nb-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">1e2ec49f43d9b0ddeec37012142f0941496beb1c6f7808fff91c48b80c8b70df</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mai" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-mai-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">49cde912a25d367d7555b9d4db341ae8d0a44215e4d6d48c3ca473844f8fe4cb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tn" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-tn-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">d2cf2ebc082165401ccd55118a2b4595c02b29ddf59ba126e4b4a2f1b187c62f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-te" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-te-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">8c58513a5bf39e0d5cfcc50da61f72feac976595a435a95ad6a62ef5a1699eea</sum></package><package arch="x86_64" epoch="1" name="libreoffice-nlpsolver" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-nlpsolver-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">59dae67fdfb8cfb47b4df5cddfe2b2564b1fd1274f386507bf205c8abef4cebf</sum></package><package arch="noarch" epoch="1" name="libreoffice-opensymbol-fonts" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-opensymbol-fonts-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">c1a79ae43d0690888b3ea6cb21656128898bacd32a2dbd22bbe9499060438eee</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bg" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-bg-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">e124486c61cee001bab7d7e0bf977414eb5adcf091a956e92b7e81678abd55f4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ve" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ve-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">f8e297b94515ae4b11ecfd2527e1c5f216adc1ce7e5ebcbaffda9a27ad595453</sum></package><package arch="noarch" epoch="1" name="autocorr-fi" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-fi-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">83df22436cf3d6f3b01986775d91e7f6843ad96a61193fb880f328d351a20ca0</sum></package><package arch="noarch" epoch="1" name="autocorr-ca" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-ca-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">188b9375209b995e8cca49aab8c10a2ed7a717ec75ea31a8be8dcd0e867fd58c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-writer" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-writer-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">323a39343c0142a882775c4122d791a927161430542127527667bc6a2384ab1e</sum></package><package arch="noarch" epoch="1" name="autocorr-nl" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-nl-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">3144b15aca418058a68935d9b14f6bc295027dcfed6d7eb73e0d6f45695d7f65</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lt" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-lt-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">0e362d72ae7192f581a256f63e2cb14c5f4cec55bb5968fb2d03ced157193ff6</sum></package><package arch="noarch" epoch="1" name="autocorr-mn" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-mn-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">a6ca9ad893f7e3eaa094953c5ca0b838a41fee66348a24cf6ac723a925a9cfb7</sum></package><package arch="noarch" epoch="1" name="autocorr-hr" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-hr-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">6fedfba5ccd4e5e678df36cd3a7d8426322871c942b92748d55181182d2de3de</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nr" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nr-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">3f075e8209b0198aabd3228100188d5045080cfb1bcdbf21050947f536dcd116</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ss" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ss-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">fb1aa1fde890dc87942da4e75956116b88de83de8f4c0d3b4ce47390e709e185</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-br" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-br-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">5eb2747d9785a7dc073702e6f73fdbf9ff399a2723cc71a5b1a9b1868be807d0</sum></package><package arch="noarch" epoch="1" name="autocorr-is" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-is-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">f9d616b583705aa8db70bc8acc0185191571100ba97ab07d8f03fee56ac7f0cb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-rhino" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-rhino-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">7de61507814fe506525108a7fb378eef1d6b87e87f56e68d8639ab9b5d51b670</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-xh" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-xh-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">f7f3b7c93a6dedd2189749565feb4560370d3c70c4ff2e06fb9e5bb8d68972ff</sum></package><package arch="x86_64" epoch="1" name="libreoffice-draw" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-draw-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">e49c14444086fe42c15d4cf1333b4b1bce50810efce15bdfdcc5de8da6dc4b99</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-th" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-th-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">7a9e19369e722ecd8fa8be14297ab1bd1ad63555cb32ee3cb603a369c19e78d4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sv" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-sv-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">ec60cd65c274c3c038d327355fd858d1acc0fa97917fee95388701be3314ee83</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk-doc" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-sdk-doc-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">95e9ef288ad0195b59490e7af31f861a29732d12a18d94b2a12252dfdeea6cd5</sum></package><package arch="noarch" epoch="1" name="autocorr-en" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-en-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">3e2f13dc0685d40fb5c38455409f5b91803f6f8da7187cd960a8d47e01a8b7d4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-officebean" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-officebean-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">c1fb84b982e87e33a79303bcf7e801874d5238e7a0dcf026f60fbece17548011</sum></package><package arch="noarch" epoch="1" name="autocorr-ja" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-ja-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">6865c2dee19d88a9ccff4e04b0c1b6ae1b0c7213c5ba80bf84d2ba8e2d8d465a</sum></package><package arch="noarch" epoch="1" name="autocorr-sv" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-sv-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">72f75bb831ecbee653f8bec30609703c6fcc4ad9d091a334bd8b470fdac9f62a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-BR" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-pt-BR-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">c22efa738671ff20625803cbcc5ce3b854b4dee8d8d849bc0d100bdedd347564</sum></package><package arch="x86_64" epoch="1" name="libreoffice-bsh" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-bsh-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">437055ce05a232aa9857b6185c2085bd2e454e3c92a7028b9d6122efe178825a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-postgresql" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-postgresql-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">dfa3f5def0bd34392ecf6275e73bace8c29b7ce7a3e38ce5ec45bca197950fe8</sum></package><package arch="noarch" epoch="1" name="autocorr-sr" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-sr-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">b8f003372f7f377d4a083a13aaacfa07d963644e34ad502175e211c423511ade</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zu" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-zu-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">e4b7407721b65422d27b7835bb783cdd03e5518a177d855284fd33939acfdd73</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-da" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-da-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">ee526164815daf8ee3cb244adf1d519f14a381989436acd191b3c47b0b299665</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nl" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nl-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">32df051363c1c1706c3459bf5533288cd63063e0f73f9e6a33554c16f18dbf99</sum></package><package arch="x86_64" epoch="1" name="libreoffice-filters" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-filters-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">20a1ec7681efef6d3c9de20ea80dd62848beed6c914a05cdb06f94e303b552a3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-uk" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-uk-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">c63f8c57531b8d6109b6dee2023fd08543ea7a6c5fea4cf25d70e3c02ab82956</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hant" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-zh-Hant-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">e45ca88e0639d2aea47cf1aa2ddae9624d7c356cd5a8f36b65988f26e8d0389a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-emailmerge" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-emailmerge-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">b306fb4ba6787862c5b98d3679bf69e1963dd4adf0c35f7fd7e04d56461c8bcc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fr" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-fr-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">c5da6f177db5a059ec4566a6651fdbc4498b8a3a249224ee906caac3ffa17bdc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nn" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nn-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">c97145a81f56cc2c78255700aed82f21e8f9097b01c475935d69b34729738c2a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ja" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ja-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">073b09ed6edda627da6ae4a734416cfef2007946c19b343e3983705a632bf8b4</sum></package><package arch="noarch" epoch="1" name="autocorr-fa" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-fa-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">5835c8768c30070dedba3727a0eb1c558340afb884205923ee7c16b7de26cf1c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hans" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-zh-Hans-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">75f30b255b60d89508f840037cf6d60cf21c314bef14d13fa2f96a7001d70a5a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-PT" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-pt-PT-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">e62174b8efa06d7f4452836622c02d8b8cfbd7acae4643f283cd972a79c7af6f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-librelogo" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-librelogo-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">6faf4671fcd54727c494a86759a2d4ed5e2415a0f3b89190da7c6394a8908cc1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ml" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ml-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">81ea27dacfc8656d0d7cc6954e96a7e8330a85af34d7e8f39fe33846a5e608d2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-xsltfilter" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-xsltfilter-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">a4c107b73b741e32182d7cd6ca987b2ed7b20f073cd57b67df527ed8aac1c73c</sum></package><package arch="noarch" epoch="1" name="autocorr-hu" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-hu-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">ccca6e2a45827aff7749b50f078a20730e41ac23094f9ee6425f001d037d8f38</sum></package><package arch="noarch" epoch="1" name="autocorr-bg" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-bg-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">a5dfd1a8c4db8e006c1221dd4b50db2516697d0b4507ec02d38b732592fdb223</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ta" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ta-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">217b38dea03e0fbb68328545b4ca8459a99eab9f12da597ce8c8e2af5fa38bee</sum></package><package arch="noarch" epoch="1" name="autocorr-de" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-de-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">1085e8fd0614f1e2e87921fe145b84ee8fc3f00b98d07fc2eba9d37afe89e49a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ga" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ga-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">b895636be3a7e6f5e1e5b86d914e57a55537735683548ea0edb64b7a43fa411b</sum></package><package arch="noarch" epoch="1" name="autocorr-ro" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-ro-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">7b99cf09870af1d389fa5ad740063f48e001531a1d3ce0a903a3fb794e9a2d88</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-he" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-he-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">fa93c72c465b0f42253e973603bcc2ccba7ea39ce61800d91584426b527eaecf</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pl" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-pl-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">671f434da060327eae60191f76ca6bfd1f2fd16dcec269e11766574082f26313</sum></package><package arch="x86_64" epoch="1" name="libreoffice-math" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-math-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">12a974dbae224b8a7b1c4b69e268550762d9f496f016706929dc22a968925a94</sum></package><package arch="noarch" epoch="1" name="autocorr-es" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-es-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">bb6521848b8e94a3559efa4b0990094905e9b27609fc4d532dfc0bb837c3cc7b</sum></package><package arch="noarch" epoch="1" name="autocorr-sk" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-sk-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">cfb94d13c4d06df2e97426d9ffe377d5bdcaccc34c6bd915705e46523716e6df</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kn" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-kn-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">7f2d086ff40a3053ec03e74d6d30f46e671e2a938ed32b7aebf44c2df4117d1b</sum></package><package arch="noarch" epoch="1" name="autocorr-ru" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-ru-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">a46f17b277caec8d4d0bdbac4f0eacfd1649552f9cc08fc78063adc4ea183bae</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gl" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-gl-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">417ce3ab7df207ed67f7722b68ad9b2014e9cb091216b7d633042b5bb27896c2</sum></package><package arch="x86_64" epoch="1" name="libreoffice" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">4a7475e18bd75f9c511aafd25940fe2353d477b336950ccf176424ea72c48394</sum></package><package arch="noarch" epoch="1" name="autocorr-fr" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-fr-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">12e3c962c119852391e8a63b010a221faef5f1d699f2fd122dcde0f88dc2062c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nso" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nso-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">a0e1c292bb0cb6c00edb164c3c98cc485bed4ea22dfc4467e2864183a0069fe1</sum></package><package arch="i686" epoch="1" name="libreoffice-ure" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-ure-5.0.6.2-5.el7_3.1.i686.rpm</filename><sum type="sha256">f893981d928d1018833a7959d54ecb9f56592df6ba7d938906f08c76a7d56dc2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-dz" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-dz-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">7c81ee7bb5bf7fa41a5876195b788dd0d0f48f1980e82ddc890e5f505a3a27b1</sum></package><package arch="noarch" epoch="1" name="autocorr-pt" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-pt-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">79ea895cbcaacc172301677c893659e052a69dd3bf5a319d55ff38a869e69977</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-it" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-it-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">ef5a2cb225c76a9423631323962bbecfc9c72791f128f91d4dfb8140127eab92</sum></package><package arch="noarch" epoch="1" name="autocorr-af" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-af-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">3fdfae5a5ce276cfe8e5af78136c820568fbdc5f1b7acc33c4f3a759fff645c8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sl" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-sl-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">8e1dcf6ff75879bb6f32f631f3055d280b40b3894296d982cb61cfbd7cf09e9b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pyuno" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-pyuno-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">9493e6136368c13983e8549ee4410c66e6df21df19e27f19fa23a661b448362b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-base" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-base-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">81d5498b9abbdce968d17b04b2b0fb90ecd86ae2bee6ccd001f383358b14da46</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ar" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ar-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">f412b63d26e800b9fe446ab3454f6de3d027ec0830a6406fae96c55b6f8ff6a3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fi" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-fi-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">735d93f31b1be3fedc8671dbc94d65823c9b02a1e50c12327c2f2c1eab80c347</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-sdk-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">e7496363c73d517caec8c7f03ae1a692657d7a3204e61b02948dd7dffef568f4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-impress" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-impress-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">f82bcd97d8870351dafba58cf39626844f41b0476c6a215c9212c91c36ab5878</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-as" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-as-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">b7b54d8794221bbb1d6278ac8d07e3f347569b7e9a04c580aa164d1ddc21c12a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-or" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-or-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">705244be10ac9cddf875cb63e625cc4a7c62d9acfc12fd3110e888cc6c616a18</sum></package><package arch="x86_64" epoch="1" name="libreoffice-graphicfilter" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-graphicfilter-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">e92b1348c79a322d7d24ea9ee35180baac7408a0925939792e8590099ae32109</sum></package><package arch="noarch" epoch="1" name="autocorr-cs" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-cs-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">fd09e4adffe8185dc97e14ac7233151af5b4a7d32647fa3883bd8f881e158b3f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ts" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ts-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">8c583bc41bab9d5e28412027b363ac85efaea468592d86e7db9ffc2aa68f048b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mr" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-mr-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">7537e24c0635babf670a055467b35624b823df3d4b1b4e412970d2a7ea151840</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gdb-debug-support" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-gdb-debug-support-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">413aa5f733ad2caa9a4746942f3fc89e116b48404c89d47fba45701197b73c26</sum></package><package arch="noarch" epoch="1" name="autocorr-tr" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-tr-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">6b60f616d6ddc32a19472dfd705e22dd257a99ebeb2da112e98db17317d421a9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ko" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ko-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">cb5a432afcab78b5814ac2ac66e61d0c4ef2d3a02f6aa5ffe21094106c10d1c9</sum></package><package arch="noarch" epoch="1" name="autocorr-pl" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-pl-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">15f26dca4a89a3b92287a710fc878609416ca5f40acae66c9e312bcd26380f2e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ro" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ro-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">f23a33aeb1d42ef7a1df6a3447068f9e91d7158974e45c5396889015715a6ca4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ca" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ca-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">290327101c775c2bd0c265d5b105be0d88a998f0dc583eb23e251a9c44716ab1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-core" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-core-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">abff4fdd7cb0b6a131943040734a68a80862ec52c057364233cdae91fd589fd7</sum></package><package arch="noarch" epoch="1" name="autocorr-zh" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-zh-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">936c523b7c75ce7cc3e9b0e3a0f0041d02ed6f4a7cd06e2490ac15883cac44b8</sum></package><package arch="noarch" epoch="1" name="autocorr-sl" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-sl-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">3dbed17d953f416f45c85f8bb656ba059e70ba688ba79ec1e28cbee80ef866d0</sum></package><package arch="noarch" epoch="1" name="autocorr-ga" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-ga-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">21d454c8e9b19345e65ffdce1843cab0ea449b20c7362f2a625e5dab68a477f5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gu" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-gu-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">7e3069638b8121135b3885f1fd05677123b5a2c766bef6a566d32c5eed08b8b7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-en" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-en-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">d88381223834f1eb5a89f36c32d04ddf746098246badeda525ea672792693236</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-es" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-es-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">de9fd9ec0cccde94bff2b28271c6e931dfa32b7849e407b22c881a7d01cbee79</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sr" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-sr-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">04e73d6639cfe207fc9a576b0579a0856a81992031352486a021750f93a94653</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pa" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-pa-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">7e3be18a723ba5e84a854fd685c7e34cbe3e9cb23b0de07ffa089324f62bbe04</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bn" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-bn-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">891d54fb1341e2b721db52b995e543b6837cda83aa23aa107d0d24493cf40e3a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fa" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-fa-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">d73751403f572ba3563cf4d3e8afffbe9135f6c30569269bc4dec9dbea45bb26</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cy" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-cy-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">7266a42adc28e77149b1016eeb311dc9a919efe4939b91fb85fd6e57fafb2050</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-af" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-af-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">f2c1a5d924ce7879fbb8ec69351ff7dd74ebdc8fc6a738dde7b330a95265b1f6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ure" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-ure-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">9a7a153e88acd42a76a2bd4380d6347986e3f041ff3e05d4463bae2d1d00320f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hi" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-hi-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">ef81fa3dd74413f72cb98278bbfe5ff59acf8ef2a10ea20d3fac379893b82b01</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sk" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-sk-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">84e9e34c23ffc0ab080652724727c29ff7304cd1a036a3121b103f62b17add45</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hu" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-hu-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">446d00a60c143965bf3d742a3a7900f7ce84427049ff190fd59e26c3121ee0cc</sum></package><package arch="noarch" epoch="1" name="autocorr-it" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>autocorr-it-5.0.6.2-5.el7_3.1.noarch.rpm</filename><sum type="sha256">01a40f7cf58530ff8df5144d0184bffbfa2f93c27627e52cfc6aeced0b9ea0e1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ogltrans" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-ogltrans-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">cf0deacc8ec9a83341040919ead1e71ca33b106d1292a4d72eed86c184ff99cd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-si" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-si-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">2f32cb80c79c56561569eb240b6a1b07bbdcaa0f1648ef976d112316f60f66ee</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tr" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-tr-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">523323e005d1c0bbdb09678e7e87fff088fb69328c9b13c12e78efae281c9921</sum></package><package arch="x86_64" epoch="1" name="libreoffice-calc" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-calc-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">bec569515e56692a7623b6c25fa30efdc4b70b4813adc06632cef3c8c16bd956</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hr" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-hr-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">f15be6acdc9be65138ca255e40ebbec97eef99d26cd059c7e5bd5cc928c43a83</sum></package><package arch="x86_64" epoch="1" name="libreoffice-wiki-publisher" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-wiki-publisher-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">430e55ec87cd1031216203ca7f1269a679e97ab7bbda1cd91b552fbeada927d7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pdfimport" release="5.el7_3.1" src="libreoffice-5.0.6.2-5.el7_3.1.src.rpm" version="5.0.6.2"><filename>libreoffice-pdfimport-5.0.6.2-5.el7_3.1.x86_64.rpm</filename><sum type="sha256">e8936ef6084fd963df8eb5cc9af7311973ef53f14ebc0d4f6952c1370a2e7283</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3157" id="CVE-2017-3157" title="Libreoffice: Arbitrary File Disclosure In Calc " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0914" id="RHSA-2017:0914-1" title="Rhsa-2017:0914-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1425536" id="1425536" title="[Fix Available] Crash In Calc After Closing Dialog Box With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1425844" id="1425844" title="Libreoffice: Arbitrary File Disclosure In Calc " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1426348" id="1426348" title="[Fix Available] Password Protected (Encrypted) Files Opening " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0920-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* An invalid pointer dereference flaw was found in the way 389-ds-base handled LDAP bind requests. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service. (CVE-2017-2668) 
Bug Fix(es): 
* Previously, when adding a filtered role definition that uses the "nsrole" virtual attribute in the filter, Directory Server terminated unexpectedly. A patch has been applied, and now the roles plug-in ignores all virtual attributes. As a result, an error message is logged when an invalid filter is used. Additionally, the role is deactivated and Directory Server no longer fails. 
* In a replication topology, Directory Server incorrectly calculated the size of string format entries when a lot of entries were deleted. The calculated size of entries was smaller than the actual required size. Consequently, Directory Server allocated insufficient memory and terminated unexpectedly when the data was written to it. With this update, the size of string format entries is now calculated correctly in the described situation and Directory Server no longer terminates unexpectedly.</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-04-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-snmp" release="20.el7_3" src="389-ds-base-1.3.5.10-20.el7_3.src.rpm" version="1.3.5.10"><filename>389-ds-base-snmp-1.3.5.10-20.el7_3.x86_64.rpm</filename><sum type="sha256">4aacb145e315ffd65340d5c34c1303ba7394194d9949adba575bddad869936bc</sum></package><package arch="x86_64" name="389-ds-base" release="20.el7_3" src="389-ds-base-1.3.5.10-20.el7_3.src.rpm" version="1.3.5.10"><filename>389-ds-base-1.3.5.10-20.el7_3.x86_64.rpm</filename><sum type="sha256">195c8d7eba97284eb6d7574f19089608281e98a2df34e148116ac49b7cb360c6</sum></package><package arch="x86_64" name="389-ds-base-devel" release="20.el7_3" src="389-ds-base-1.3.5.10-20.el7_3.src.rpm" version="1.3.5.10"><filename>389-ds-base-devel-1.3.5.10-20.el7_3.x86_64.rpm</filename><sum type="sha256">f5b90a137d7cda665e46b5dd2d352ef3d0391155682c9492f29186b8d24f2473</sum></package><package arch="x86_64" name="389-ds-base-libs" release="20.el7_3" src="389-ds-base-1.3.5.10-20.el7_3.src.rpm" version="1.3.5.10"><filename>389-ds-base-libs-1.3.5.10-20.el7_3.x86_64.rpm</filename><sum type="sha256">258f52af6eaffcbe8577d66c94dd3d2842e7d0ad8affbdd915e845bf0228adf6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2668" id="CVE-2017-2668" title="389-Ds-Base: Remote Crash Via Crafted Ldap Messages" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0920" id="RHSA-2017:0920-1" title="Rhsa-2017:0920-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429495" id="1429495" title="Ns-Slapd Dies Under Heavy Load" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429498" id="1429498" title="A Filtered Nsrole That Specifies An Empty Nsrole In Its " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1436575" id="1436575" title="389-Ds-Base: Remote Crash Via Crafted Ldap Messages" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0933-1</id><title>Kernel</title><description>Security Fix(es): 
* A race condition flaw was found in the N_HLDC Linux kernel driver when accessing n_hdlc.tbuf list that can lead to double free. A local, unprivileged user able to set the HDLC line discipline on the tty device could use this flaw to increase their privileges on the system. (CVE-2017-2636, Important) 
* A flaw was found in the Linux kernel key management subsystem in which a local attacker could crash the kernel or corrupt the stack and additional memory (denial of service) by supplying a specially crafted RSA key. This flaw panics the machine during the verification of the RSA key. (CVE-2016-8650, Moderate) 
* A flaw was found in the Linux kernel's implementation of setsockopt for the SO_{SND|RCV}BUFFORCE setsockopt() system call. Users with non- namespace CAP_NET_ADMIN are able to trigger this call and create a situation in which the sockets sendbuff data size could be negative. This could adversely affect memory allocations and create situations where the system could crash or cause memory corruption. (CVE-2016-9793, Moderate) 
* A flaw was found in the Linux kernel's handling of clearing SELinux attributes on /proc/pid/attr files. An empty (null) write to this file can crash the system by causing the system to attempt to access unmapped kernel memory. (CVE-2017-2618, Moderate)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-04-12 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools-libs" release="514.16.1.el7" src="kernel-3.10.0-514.16.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-514.16.1.el7.x86_64.rpm</filename><sum type="sha256">7ce12b4e5798bda9b8d3d511f782f39ef350cf7150be6d148f7eae44077c1f00</sum></package><package arch="x86_64" name="python-perf" release="514.16.1.el7" src="kernel-3.10.0-514.16.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-514.16.1.el7.x86_64.rpm</filename><sum type="sha256">c645dd810bdcd6a9f02123945f4bcda63b5cf898ac892293a6a290e560288a32</sum></package><package arch="x86_64" name="kernel-devel" release="514.16.1.el7" src="kernel-3.10.0-514.16.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-514.16.1.el7.x86_64.rpm</filename><sum type="sha256">eb4c14d6fb4230e8f928b3c65a030d8e70565f74adaaf029237824aff19404d3</sum></package><package arch="x86_64" name="kernel" release="514.16.1.el7" src="kernel-3.10.0-514.16.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-514.16.1.el7.x86_64.rpm</filename><sum type="sha256">17b4419673c90af0d1a478b4f7735d365bb0f18356e205f425a76282cdc8c261</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="514.16.1.el7" src="kernel-3.10.0-514.16.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-514.16.1.el7.x86_64.rpm</filename><sum type="sha256">53efdceacf601b7e320d9a5a9b79673c358970dd09711578acb2ba95c18d6571</sum></package><package arch="x86_64" name="perf" release="514.16.1.el7" src="kernel-3.10.0-514.16.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-514.16.1.el7.x86_64.rpm</filename><sum type="sha256">617edfa42981b365efaa34b21529753fa7ef8feb9a7a15af725e135b1a286b6a</sum></package><package arch="x86_64" name="kernel-debug-devel" release="514.16.1.el7" src="kernel-3.10.0-514.16.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-514.16.1.el7.x86_64.rpm</filename><sum type="sha256">1e78e42bb872b16ae29d05346f27b2a814e6f8fe20f672811f0cc0fe4036558e</sum></package><package arch="x86_64" name="kernel-headers" release="514.16.1.el7" src="kernel-3.10.0-514.16.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-514.16.1.el7.x86_64.rpm</filename><sum type="sha256">40b02e70df87bd4e734b48cf09fb940ba0066242431ef6a02e7162ce3976c340</sum></package><package arch="x86_64" name="kernel-tools" release="514.16.1.el7" src="kernel-3.10.0-514.16.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-514.16.1.el7.x86_64.rpm</filename><sum type="sha256">646db0dfa033051126daef925a0146a7f7a5ae9eabed0c52b4883e97bc95e43b</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="514.16.1.el7" src="kernel-3.10.0-514.16.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-514.16.1.el7.noarch.rpm</filename><sum type="sha256">9bdcf38b63e8148221d98fc77c78c42d6216ef7c314db603b80e242755f53d82</sum></package><package arch="x86_64" name="kernel-debug" release="514.16.1.el7" src="kernel-3.10.0-514.16.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-514.16.1.el7.x86_64.rpm</filename><sum type="sha256">65ebee0466b48d9dad13a2bbbc217109501328b48b74b6d3321632b65034c51f</sum></package><package arch="noarch" name="kernel-doc" release="514.16.1.el7" src="kernel-3.10.0-514.16.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-514.16.1.el7.noarch.rpm</filename><sum type="sha256">a3965f16ef87695b7caaaeeb570b750901365157316bd3ddd5817f5cac6487b5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8650" id="CVE-2016-8650" title="Kernel: Null Pointer Dereference Via Keyctl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9793" id="CVE-2016-9793" title="Kernel: Signed Overflow For So_{Snd|Rcv}Bufforce" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2618" id="CVE-2017-2618" title="Kernel: Off-By-One Error In Selinux_Setprocattr (/Proc/Self/Attr/Fscreate)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2636" id="CVE-2017-2636" title="Kernel: Race Condition Access To N_Hdlc.Tbuf Causes Double Free In N_Hdlc_Release()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0933" id="RHSA-2017:0933-1" title="Rhsa-2017:0933-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395187" id="1395187" title="Kernel: Null Pointer Dereference Via Keyctl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1402013" id="1402013" title="Kernel: Signed Overflow For So_{Snd|Rcv}Bufforce" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1419916" id="1419916" title="Kernel: Off-By-One Error In Selinux_Setprocattr (/Proc/Self/Attr/Fscreate)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1428319" id="1428319" title="Kernel: Race Condition Access To N_Hdlc.Tbuf Causes Double Free In N_Hdlc_Release()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0935-1</id><title>Tomcat</title><description>Security Fix(es): 
* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own. (CVE-2016-6816) 
Note: This fix causes Tomcat to respond with an HTTP 400 Bad Request error when request contains characters that are not permitted by the HTTP specification to appear not encoded, even though they were previously accepted. The newly introduced system property tomcat.util.http.parser.HttpParser.requestTargetAllow can be used to configure Tomcat to accept curly braces ({ and }) and the pipe symbol (|) in not encoded form, as these are often used in URLs without being properly encoded. 
* A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body. (CVE-2016-8745)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-04-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcat-admin-webapps" release="11.el7_3" src="tomcat-7.0.69-11.el7_3.src.rpm" version="7.0.69"><filename>tomcat-admin-webapps-7.0.69-11.el7_3.noarch.rpm</filename><sum type="sha256">f155d4dfc266ffacdb668e49cde7b1ff847e15853184235b0bdff8de6777896e</sum></package><package arch="noarch" name="tomcat-webapps" release="11.el7_3" src="tomcat-7.0.69-11.el7_3.src.rpm" version="7.0.69"><filename>tomcat-webapps-7.0.69-11.el7_3.noarch.rpm</filename><sum type="sha256">3dc7e91c6d5d68054cc0e0a4855a0c96a08871b79fd31a9cbf567dca3ec14805</sum></package><package arch="noarch" name="tomcat-lib" release="11.el7_3" src="tomcat-7.0.69-11.el7_3.src.rpm" version="7.0.69"><filename>tomcat-lib-7.0.69-11.el7_3.noarch.rpm</filename><sum type="sha256">81616cba12d5aeaae21107fd1f096b20d0eae6e475d69a3ca6f2fe122ff4c5ef</sum></package><package arch="noarch" name="tomcat-javadoc" release="11.el7_3" src="tomcat-7.0.69-11.el7_3.src.rpm" version="7.0.69"><filename>tomcat-javadoc-7.0.69-11.el7_3.noarch.rpm</filename><sum type="sha256">2996eb19e6ac64e720da318126a279c6074205a9ead663460c912850da87229b</sum></package><package arch="noarch" name="tomcat-docs-webapp" release="11.el7_3" src="tomcat-7.0.69-11.el7_3.src.rpm" version="7.0.69"><filename>tomcat-docs-webapp-7.0.69-11.el7_3.noarch.rpm</filename><sum type="sha256">0e9bf12168c4aa41fb875a5410934b3fbae6491ca3f4fd3cf3acc39a10fbc5e4</sum></package><package arch="noarch" name="tomcat" release="11.el7_3" src="tomcat-7.0.69-11.el7_3.src.rpm" version="7.0.69"><filename>tomcat-7.0.69-11.el7_3.noarch.rpm</filename><sum type="sha256">167673c479d8e7c4360367980426e5097ff1e95bf5460547b25cdb1958802d0c</sum></package><package arch="noarch" name="tomcat-jsp-2.2-api" release="11.el7_3" src="tomcat-7.0.69-11.el7_3.src.rpm" version="7.0.69"><filename>tomcat-jsp-2.2-api-7.0.69-11.el7_3.noarch.rpm</filename><sum type="sha256">ca142ccaea7aaaa1fda2db874efbcfb08490225364e7444382a48f5158730e65</sum></package><package arch="noarch" name="tomcat-el-2.2-api" release="11.el7_3" src="tomcat-7.0.69-11.el7_3.src.rpm" version="7.0.69"><filename>tomcat-el-2.2-api-7.0.69-11.el7_3.noarch.rpm</filename><sum type="sha256">add19d15771cfd524d6f5bbac5861ead5371a8b9cb6fd451049c25f5a535aba3</sum></package><package arch="noarch" name="tomcat-jsvc" release="11.el7_3" src="tomcat-7.0.69-11.el7_3.src.rpm" version="7.0.69"><filename>tomcat-jsvc-7.0.69-11.el7_3.noarch.rpm</filename><sum type="sha256">e2c854cb8483c1acbf1ece3c0c2fe9eec4542fcf2e6891c2dc3d358a5ed916c1</sum></package><package arch="noarch" name="tomcat-servlet-3.0-api" release="11.el7_3" src="tomcat-7.0.69-11.el7_3.src.rpm" version="7.0.69"><filename>tomcat-servlet-3.0-api-7.0.69-11.el7_3.noarch.rpm</filename><sum type="sha256">318c3c0193c25f159523e7559bd730a43e40857d31c5a217b2646bb7f2bc48c3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6816" id="CVE-2016-6816" title="Tomcat: Http Request Smuggling Vulnerability Due To Permitting Invalid Character In Http Requests" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8745" id="CVE-2016-8745" title="Tomcat: Information Disclosure Due To Incorrect Processor Sharing" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0935" id="RHSA-2017:0935-1" title="Rhsa-2017:0935-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397484" id="1397484" title="Tomcat: Http Request Smuggling Vulnerability Due To Permitting Invalid Character In Http Requests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1403824" id="1403824" title="Tomcat: Information Disclosure Due To Incorrect Processor Sharing" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:0987-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* A heap buffer overflow flaw was found in QEMU's Cirrus CLGD 54xx VGA emulator's VNC display driver support; the issue could occur when a VNC client attempted to update its display after a VGA operation is performed by a guest. A privileged user/process inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process. (CVE-2016-9603)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-04-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm" release="126.el7_3.6" src="qemu-kvm-1.5.3-126.el7_3.6.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-126.el7_3.6.x86_64.rpm</filename><sum type="sha256">9856e5003f6a1d75de7a240826f4f475b9684fb02a467ae44c4e565d3c425d58</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="126.el7_3.6" src="qemu-kvm-1.5.3-126.el7_3.6.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-126.el7_3.6.x86_64.rpm</filename><sum type="sha256">dfef6cd472181a4f2b4b1f69a6a0a25e3884019d8ff2817bd4e878e3f7f881d7</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="126.el7_3.6" src="qemu-kvm-1.5.3-126.el7_3.6.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-126.el7_3.6.x86_64.rpm</filename><sum type="sha256">d008a571a975c2af53fb400d4a3ca4e2dd6b2ae24bcc6492fa205376cd28f21c</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="126.el7_3.6" src="qemu-kvm-1.5.3-126.el7_3.6.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-126.el7_3.6.x86_64.rpm</filename><sum type="sha256">91b268c7e278fd9ee0f2b0a53f5182e825e7c1af0529dc1a53e816637074822b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9603" id="CVE-2016-9603" title="Qemu: Cirrus: Heap Buffer Overflow Via Vnc Connection" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:0987" id="RHSA-2017:0987-1" title="Rhsa-2017:0987-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1430056" id="1430056" title="Qemu: Cirrus: Heap Buffer Overflow Via Vnc Connection" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1095-1</id><title>Bind</title><description>Security Fix(es): 
* A denial of service flaw was found in the way BIND handled a query response containing CNAME or DNAME resource records in an unusual order. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS response. (CVE-2017-3137) 
* A denial of service flaw was found in the way BIND handled query requests when using DNS64 with "break-dnssec yes" option. A remote attacker could use this flaw to make named exit unexpectedly with an assertion failure via a specially crafted DNS request. (CVE-2017-3136)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-04-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-sdb-chroot-9.9.4-38.el7_3.3.x86_64.rpm</filename><sum type="sha256">b40502fc3d5dc630f421d70c4f6924002891c8d0cc39f0721352dadfbd89dd31</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-38.el7_3.3.i686.rpm</filename><sum type="sha256">b4aa9526f1b199d58f2f0388c587a3890c225f20a8e547c4852f85fe5eb1ef53</sum></package><package arch="noarch" epoch="32" name="bind-license" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-license-9.9.4-38.el7_3.3.noarch.rpm</filename><sum type="sha256">03a4389f1856c7441eb961919935f9e88fccd17d1ad40b6bc933163b8da95bb8</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-pkcs11-utils-9.9.4-38.el7_3.3.x86_64.rpm</filename><sum type="sha256">e5a6237cd5a945ceea745f13462c9320010d024969c4cbccf13c2ecf8d02485e</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-38.el7_3.3.x86_64.rpm</filename><sum type="sha256">5cbc07cea12e78fd027dffa8d4b381eda72474550cb3c19dc07a94fc80f3c719</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-pkcs11-9.9.4-38.el7_3.3.x86_64.rpm</filename><sum type="sha256">cb39979ec6932df434a2c762f93fee1b4c5a9c722efeff889f17b8edb91f6985</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-38.el7_3.3.x86_64.rpm</filename><sum type="sha256">17169f1ef6ec3f4fe599b157b618ef07424d49ac66296c9301c8c2d14d61cb4c</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-38.el7_3.3.x86_64.rpm</filename><sum type="sha256">abab66c07eed8344d49c30081cddd3067f436ca746cb472bab11633f6d6eda19</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-38.el7_3.3.x86_64.rpm</filename><sum type="sha256">ea0b27a16471355b68bf91cfd713d042075bc2ecdd7c2fe480592fc1c0518134</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-38.el7_3.3.x86_64.rpm</filename><sum type="sha256">197952cbb78a3fe7bbb1f201392769e79170c4333dd132a93dbf9f291664a6fb</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-chroot-9.9.4-38.el7_3.3.x86_64.rpm</filename><sum type="sha256">c9a9b647688d6cc18cd6218553ac4a4061fa6fbc5527d6e3479af7b0d964f882</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-38.el7_3.3.x86_64.rpm</filename><sum type="sha256">fcaad4d932d34bc44056e7dc19d7c617edf3ac724594c3cb68bdc2e6d82412fe</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-sdb-9.9.4-38.el7_3.3.x86_64.rpm</filename><sum type="sha256">1a29b7c1ab3e16d512368b20f347b69125e53ed5e24181f25552a99c17fda347</sum></package><package arch="x86_64" epoch="32" name="bind" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-9.9.4-38.el7_3.3.x86_64.rpm</filename><sum type="sha256">f88830cad506933672d57d5f5061063c82aea1636e9157e13533310d800818fd</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-38.el7_3.3.i686.rpm</filename><sum type="sha256">7f70a7cddef61c4280e0f431235fc4f9893faa7739ef5bf821f0685eaa52dad3</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-38.el7_3.3.i686.rpm</filename><sum type="sha256">b171446335ed8f949df04e71009e614fabd6bf07ce717f5892a094c4f1e61d0d</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-utils-9.9.4-38.el7_3.3.x86_64.rpm</filename><sum type="sha256">5504049b81f223dcaad54c778b64e13e6abb16f3f9e11a7674e9360f4755835f</sum></package><package arch="i686" epoch="32" name="bind-devel" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-38.el7_3.3.i686.rpm</filename><sum type="sha256">67563c686ea1f755b50ad571a94e65960b2408cf8f2c6f59fd870e6d4a83c34f</sum></package><package arch="i686" epoch="32" name="bind-libs" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-38.el7_3.3.i686.rpm</filename><sum type="sha256">a8c51a2f6c4d0f06392e52ae72bf14ca1e038e6693d82893f5e0fcec7a54f2f1</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="38.el7_3.3" src="bind-9.9.4-38.el7_3.3.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-38.el7_3.3.i686.rpm</filename><sum type="sha256">38559787b9de2f82d75943e10228c1d809b74ca9644eeb37cc0dd26f5f7bf858</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3136" id="CVE-2017-3136" title="Bind: Incorrect Error Handling Causes Assertion Failure When Using Dns64 With &quot;Break-Dnssec Yes;&quot;" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3137" id="CVE-2017-3137" title="Bind: Processing A Response Containing Cname Or Dname With Unusual Order Can Crash Resolver" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1095" id="RHSA-2017:1095-1" title="Rhsa-2017:1095-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1441125" id="1441125" title="Bind: Incorrect Error Handling Causes Assertion Failure When Using Dns64 With &quot;Break-Dnssec Yes;&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1441133" id="1441133" title="Bind: Processing A Response Containing Cname Or Dname With Unusual Order Can Crash Resolver" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1100-1</id><title>Nss And Nss-Util</title><description>The nss-util packages provide utilities for use with the Network Security Services (NSS) libraries. 
The following packages have been upgraded to a newer upstream version: nss (3.28.4), nss-util (3.28.4). 
Security Fix(es): 
* An out-of-bounds write flaw was found in the way NSS performed certain Base64-decoding operations. An attacker could use this flaw to create a specially crafted certificate which, when parsed by NSS, could cause it to crash or execute arbitrary code, using the permissions of the user running an application compiled against the NSS library. (CVE-2017-5461)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2017-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-devel" release="1.0.el7_3" src="nss-3.28.4-1.0.el7_3.src.rpm" version="3.28.4"><filename>nss-devel-3.28.4-1.0.el7_3.x86_64.rpm</filename><sum type="sha256">e6f46ad54323380f3fe58ca461818b2f2b59119eded5952f32b888d77d13b102</sum></package><package arch="i686" name="nss-devel" release="1.0.el7_3" src="nss-3.28.4-1.0.el7_3.src.rpm" version="3.28.4"><filename>nss-devel-3.28.4-1.0.el7_3.i686.rpm</filename><sum type="sha256">880849a06711abf3141e3b89741f4abc0b0b05389a45fc49b60e77dbcdc102ea</sum></package><package arch="x86_64" name="nss-util" release="1.0.el7_3" src="nss-util-3.28.4-1.0.el7_3.src.rpm" version="3.28.4"><filename>nss-util-3.28.4-1.0.el7_3.x86_64.rpm</filename><sum type="sha256">af814dfbebb631258af1ec80847365670818673c036e3c39820a5601806be7e7</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="1.0.el7_3" src="nss-3.28.4-1.0.el7_3.src.rpm" version="3.28.4"><filename>nss-pkcs11-devel-3.28.4-1.0.el7_3.x86_64.rpm</filename><sum type="sha256">c7a4f70b25ee16b22df249a536e69bf8bee43b3e55f8d7fdbbb2bab9b2698150</sum></package><package arch="x86_64" name="nss-tools" release="1.0.el7_3" src="nss-3.28.4-1.0.el7_3.src.rpm" version="3.28.4"><filename>nss-tools-3.28.4-1.0.el7_3.x86_64.rpm</filename><sum type="sha256">efbcf4cf71ef109b8d0107ceb6093a4cf55059e01c7f0f073585e84cc187caa1</sum></package><package arch="i686" name="nss" release="1.0.el7_3" src="nss-3.28.4-1.0.el7_3.src.rpm" version="3.28.4"><filename>nss-3.28.4-1.0.el7_3.i686.rpm</filename><sum type="sha256">7d9ee96dcf6f74734201296cdd30610e0f2662bdb239b672da5ee34a3e56003c</sum></package><package arch="i686" name="nss-util-devel" release="1.0.el7_3" src="nss-util-3.28.4-1.0.el7_3.src.rpm" version="3.28.4"><filename>nss-util-devel-3.28.4-1.0.el7_3.i686.rpm</filename><sum type="sha256">113be40aef07464e26d29d55e6d84affae94c0d8255d88adac4b7d1418c37843</sum></package><package arch="i686" name="nss-pkcs11-devel" release="1.0.el7_3" src="nss-3.28.4-1.0.el7_3.src.rpm" version="3.28.4"><filename>nss-pkcs11-devel-3.28.4-1.0.el7_3.i686.rpm</filename><sum type="sha256">d9d1045bfe23b8b7163f82d5148e660b20e45f452d10cdc97f41692c819d0c65</sum></package><package arch="x86_64" name="nss" release="1.0.el7_3" src="nss-3.28.4-1.0.el7_3.src.rpm" version="3.28.4"><filename>nss-3.28.4-1.0.el7_3.x86_64.rpm</filename><sum type="sha256">479eefc16f6ed8e7fa0546f22bf50763696716a14a1cc9f3d4699d3b31e105a3</sum></package><package arch="x86_64" name="nss-sysinit" release="1.0.el7_3" src="nss-3.28.4-1.0.el7_3.src.rpm" version="3.28.4"><filename>nss-sysinit-3.28.4-1.0.el7_3.x86_64.rpm</filename><sum type="sha256">3663acbeb0ccb6036a33997b6d4de0c6fdc2bdc58dbda345aed918fa680645fa</sum></package><package arch="x86_64" name="nss-util-devel" release="1.0.el7_3" src="nss-util-3.28.4-1.0.el7_3.src.rpm" version="3.28.4"><filename>nss-util-devel-3.28.4-1.0.el7_3.x86_64.rpm</filename><sum type="sha256">295a133520a9d3adfc417edbbf46914dca0d7c74ad8751c127db2bdfa844d738</sum></package><package arch="i686" name="nss-util" release="1.0.el7_3" src="nss-util-3.28.4-1.0.el7_3.src.rpm" version="3.28.4"><filename>nss-util-3.28.4-1.0.el7_3.i686.rpm</filename><sum type="sha256">5a7e7d2a4b382a894f93991ac04b7c915c2ada3cce0704e390def7c5d6d9483d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5461" id="CVE-2017-5461" title="Nss: Write Beyond Bounds Caused By Bugs In Base64 De/Encoding In Nssb64D.C And Nssb64E.C (Mfsa 2017-10)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1100" id="RHSA-2017:1100-1" title="Rhsa-2017:1100-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1440080" id="1440080" title="Nss: Write Beyond Bounds Caused By Bugs In Base64 De/Encoding In Nssb64D.C And Nssb64E.C (Mfsa 2017-10)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1106-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.1.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5429, CVE-2017-5430, CVE-2017-5432, CVE-2017-5433, CVE-2017-5434, CVE-2017-5435, CVE-2017-5436, CVE-2017-5437, CVE-2017-5438, CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017-5442, CVE-2017-5443, CVE-2017-5444, CVE-2017-5445, CVE-2017-5446, CVE-2017-5447, CVE-2017-5448, CVE-2017-5449, CVE-2017-5451, CVE-2017-5454, CVE-2017-5455, CVE-2017-5456, CVE-2017-5459, CVE-2017-5460, CVE-2017-5464, CVE-2017-5465, CVE-2017-5466, CVE-2017-5467, CVE-2017-5469)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2017-04-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="2.el7_3" src="firefox-52.1.0-2.el7_3.src.rpm" version="52.1.0"><filename>firefox-52.1.0-2.el7_3.x86_64.rpm</filename><sum type="sha256">4680809dafd2c54223cff7894d60cfdfc07142de68d714d2519ff1ecb8dbf129</sum></package><package arch="i686" name="firefox" release="2.el7_3" src="firefox-52.1.0-2.el7_3.src.rpm" version="52.1.0"><filename>firefox-52.1.0-2.el7_3.i686.rpm</filename><sum type="sha256">b38106e785263d56d281e274abb612fae3e7e1b4ebe63b061567a5fd1a503a1c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429" id="CVE-2017-5429" title="Mozilla: Memory Safety Bugs Fixed In Firefox 53, Firefox Esr 45.9, And Firefox Esr 52.1 (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5430" id="CVE-2017-5430" title="Mozilla: Memory Safety Bugs Fixed In Firefox 53 And Firefox Esr 52.1 (Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432" id="CVE-2017-5432" title="Mozilla: Use-After-Free In Text Input Selection (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433" id="CVE-2017-5433" title="Mozilla: Use-After-Free In Smil Animation Functions (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434" id="CVE-2017-5434" title="Mozilla: Use-After-Free During Focus Handling (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435" id="CVE-2017-5435" title="Mozilla: Use-After-Free During Transaction Processing In The Editor (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436" id="CVE-2017-5436" title="Mozilla: Out-Of-Bounds Write With Malicious Font In Graphite 2 (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5437" id="CVE-2017-5437" title="Mozilla: Vulnerabilities In Libevent Library (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438" id="CVE-2017-5438" title="Mozilla: Use-After-Free In Nsautoptr During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439" id="CVE-2017-5439" title="Mozilla: Use-After-Free In Nstarray Length() During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440" id="CVE-2017-5440" title="Mozilla: Use-After-Free In Txexecutionstate Destructor During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441" id="CVE-2017-5441" title="Mozilla: Use-After-Free With Selection During Scroll Events (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442" id="CVE-2017-5442" title="Mozilla: Use-After-Free During Style Changes (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443" id="CVE-2017-5443" title="Mozilla: Out-Of-Bounds Write During Binhex Decoding (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444" id="CVE-2017-5444" title="Mozilla: Buffer Overflow While Parsing Application/Http-Index-Format Content (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445" id="CVE-2017-5445" title="Mozilla: Uninitialized Values Used While Parsing Application/Http-Index-Format Content (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446" id="CVE-2017-5446" title="Mozilla: Out-Of-Bounds Read When Http/2 Data Frames Are Sent With Incorrect Data (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447" id="CVE-2017-5447" title="Mozilla: Out-Of-Bounds Read During Glyph Processing (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5448" id="CVE-2017-5448" title="Mozilla: Out-Of-Bounds Write In Clearkeydecryptor (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5449" id="CVE-2017-5449" title="Mozilla: Crash During Bidirectional Unicode Manipulation With Animation (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5451" id="CVE-2017-5451" title="Mozilla: Addressbar Spoofing With Onblur Event (Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5454" id="CVE-2017-5454" title="Mozilla: Sandbox Escape Allowing File System Read Access Through File Picker (Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5455" id="CVE-2017-5455" title="Mozilla: Sandbox Escape Through Internal Feed Reader Apis (Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5456" id="CVE-2017-5456" title="Mozilla: Sandbox Escape Allowing Local File System Read Access (Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459" id="CVE-2017-5459" title="Mozilla: Buffer Overflow In Webgl (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460" id="CVE-2017-5460" title="Mozilla: Use-After-Free In Frame Selection (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464" id="CVE-2017-5464" title="Mozilla: Memory Corruption With Accessibility And Dom Manipulation (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465" id="CVE-2017-5465" title="Mozilla: Out-Of-Bounds Read In Convolvepixel (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5466" id="CVE-2017-5466" title="Mozilla: Origin Confusion When Reloading Isolated Data:Text/Html Url (Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5467" id="CVE-2017-5467" title="Mozilla: Memory Corruption When Drawing Skia Content (Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469" id="CVE-2017-5469" title="Mozilla: Potential Buffer Overflow In Flex-Generated Code (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1106" id="RHSA-2017:1106-1" title="Rhsa-2017:1106-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443297" id="1443297" title="Mozilla: Sandbox Escape Allowing Local File System Read Access (Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443298" id="1443298" title="Mozilla: Use-After-Free During Style Changes (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443299" id="1443299" title="Mozilla: Out-Of-Bounds Write During Binhex Decoding (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443301" id="1443301" title="Mozilla: Memory Safety Bugs Fixed In Firefox 53, Firefox Esr 45.9, And Firefox Esr 52.1 (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443303" id="1443303" title="Mozilla: Memory Corruption With Accessibility And Dom Manipulation (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443304" id="1443304" title="Mozilla: Out-Of-Bounds Read In Convolvepixel (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443305" id="1443305" title="Mozilla: Origin Confusion When Reloading Isolated Data:Text/Html Url (Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443307" id="1443307" title="Mozilla: Memory Corruption When Drawing Skia Content (Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443308" id="1443308" title="Mozilla: Use-After-Free In Frame Selection (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443310" id="1443310" title="Mozilla: Out-Of-Bounds Write In Clearkeydecryptor (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443311" id="1443311" title="Mozilla: Crash During Bidirectional Unicode Manipulation With Animation (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443312" id="1443312" title="Mozilla: Out-Of-Bounds Read When Http/2 Data Frames Are Sent With Incorrect Data (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443313" id="1443313" title="Mozilla: Out-Of-Bounds Read During Glyph Processing (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443314" id="1443314" title="Mozilla: Buffer Overflow While Parsing Application/Http-Index-Format Content (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443315" id="1443315" title="Mozilla: Uninitialized Values Used While Parsing Application/Http-Index-Format Content (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443317" id="1443317" title="Mozilla: Potential Buffer Overflow In Flex-Generated Code (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443322" id="1443322" title="Mozilla: Use-After-Free In Txexecutionstate Destructor During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443323" id="1443323" title="Mozilla: Use-After-Free With Selection During Scroll Events (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443324" id="1443324" title="Mozilla: Use-After-Free In Nstarray Length() During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443325" id="1443325" title="Mozilla: Use-After-Free In Nsautoptr During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443326" id="1443326" title="Mozilla: Vulnerabilities In Libevent Library (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443327" id="1443327" title="Mozilla: Out-Of-Bounds Write With Malicious Font In Graphite 2 (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443328" id="1443328" title="Mozilla: Use-After-Free During Transaction Processing In The Editor (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443329" id="1443329" title="Mozilla: Use-After-Free During Focus Handling (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443330" id="1443330" title="Mozilla: Use-After-Free In Smil Animation Functions (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443331" id="1443331" title="Mozilla: Memory Safety Bugs Fixed In Firefox 53 And Firefox Esr 52.1 (Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443332" id="1443332" title="Mozilla: Use-After-Free In Text Input Selection (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443333" id="1443333" title="Mozilla: Buffer Overflow In Webgl (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443334" id="1443334" title="Mozilla: Sandbox Escape Through Internal Feed Reader Apis (Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443338" id="1443338" title="Mozilla: Sandbox Escape Allowing File System Read Access Through File Picker (Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443340" id="1443340" title="Mozilla: Addressbar Spoofing With Onblur Event (Mfsa 2017-12)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1108-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* An untrusted library search path flaw was found in the JCE component of OpenJDK. A local attacker could possibly use this flaw to cause a Java application using JCE to load an attacker-controlled library and hence escalate their privileges. (CVE-2017-3511) 
* It was found that the JAXP component of OpenJDK failed to correctly enforce parse tree size limits when parsing XML document. An attacker able to make a Java application parse a specially crafted XML document could use this flaw to make it consume an excessive amount of CPU and memory. (CVE-2017-3526) 
* It was discovered that the HTTP client implementation in the Networking component of OpenJDK could cache and re-use an NTLM authenticated connection in a different security context. A remote attacker could possibly use this flaw to make a Java application perform HTTP requests authenticated with credentials of a different user. (CVE-2017-3509) 
Note: This update adds support for the "jdk.ntlm.cache" system property which, when set to false, prevents caching of NTLM connections and authentications and hence prevents this issue. However, caching remains enabled by default. 
* It was discovered that the Security component of OpenJDK did not allow users to restrict the set of algorithms allowed for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2017-3539) 
Note: This updates extends the fix for CVE-2016-5542 released as part of the SLSA-2016:2079 erratum to no longer allow the MD5 hash algorithm during the Jar integrity verification by adding it to the jdk.jar.disabledAlgorithms security property. 
* Newline injection flaws were discovered in FTP and SMTP client implementations in the Networking component in OpenJDK. A remote attacker could possibly use these flaws to manipulate FTP or SMTP connections established by a Java application. (CVE-2017-3533, CVE-2017-3544) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. 
Bug Fix(es): 
* When a method is called using the Java Debug Wire Protocol (JDWP) "invokeMethod" command in a target Java virtual machine, JDWP creates global references for every Object that is implied in the method invocation, as well as for the returned argument of the reference type. Previously, the global references created for such arguments were not collected (deallocated) by the garbage collector after "invokeMethod" finished. This consequently caused memory leaks, and because references to such objects were never released, the debugged application could be terminated with an Out of Memory error. This bug has been fixed, and the described problem no longer occurs.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-04-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-demo-1.8.0.131-2.b11.el7_3.x86_64.rpm</filename><sum type="sha256">a9840d0dac19d58f90310da1852c362d736167eb68895a1a73273fc11c98a06f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.131-2.b11.el7_3.i686.rpm</filename><sum type="sha256">33d7f61c90fe1e7552db5ccbfad8bb379d4bfa49e858b6c981af02a54c2f444e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.131-2.b11.el7_3.x86_64.rpm</filename><sum type="sha256">5228b64a1962a7eff068d080d65ab2b7cfe4a3de852637fab543c86ad53f8dc6</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.131-2.b11.el7_3.i686.rpm</filename><sum type="sha256">a37f09f33bea242c4098bb99b0ff43b0dfa53e27f3b92f000306a10b0518f291</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-javadoc-1.8.0.131-2.b11.el7_3.noarch.rpm</filename><sum type="sha256">e832fb7d0ea3fb48c51d38ca42a1a34b40dfbee56bfb10c9f19102b41c1de289</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-devel-1.8.0.131-2.b11.el7_3.i686.rpm</filename><sum type="sha256">3117afb12c614a7e1f80212c8d4c8c735aa3e5013d3a6e6e184b8edb35672256</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-src-1.8.0.131-2.b11.el7_3.x86_64.rpm</filename><sum type="sha256">82005e9c79a6e0aade2aebf804858a1271a6577edcde68c10ddddfaa8d94f4a3</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-devel-1.8.0.131-2.b11.el7_3.x86_64.rpm</filename><sum type="sha256">5d11b75a7f047ae611d1159fac4663c4229b5af16f93724a252bc78444b9d05f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-accessibility-1.8.0.131-2.b11.el7_3.x86_64.rpm</filename><sum type="sha256">1f4a4ce3d4678cc8769cb05bc88f1f7deeda21ba353bf2fa065b15c06c3d7066</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-debug-1.8.0.131-2.b11.el7_3.i686.rpm</filename><sum type="sha256">db5f616fcaee3af784de2656f1e406cb816e71a54bb196ad9f798617c3f78c95</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-headless-1.8.0.131-2.b11.el7_3.i686.rpm</filename><sum type="sha256">ef51ecbe600c59ae4c1ba2edd5b92f62dd5118e70a2b93b0fd29f42826fafedc</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-debug-1.8.0.131-2.b11.el7_3.x86_64.rpm</filename><sum type="sha256">745668b7ca934f1efc7f66c58f865091e3770fba8b4db93e8cf28c71830a03b2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-src-debug-1.8.0.131-2.b11.el7_3.x86_64.rpm</filename><sum type="sha256">a5d63bfc7b1bcd0e276ae48f30f2c07862f732bde3d582b1e8762de78117c1d7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.x86_64.rpm</filename><sum type="sha256">3686ebdbee5fd064e23e51418d91e28115c8c721bce0201ecbaba2a0ad3fa018</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.131-2.b11.el7_3.x86_64.rpm</filename><sum type="sha256">0343ef921f93a12e28d5bb79a17cc26fc03e86227a1e09ad78a006a9a7ef3ce7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.131-2.b11.el7_3.x86_64.rpm</filename><sum type="sha256">d402cee72cfcf4dd5d3ce15ed571b58b79b5e1c737bb04d80925ddfa4fad69c6</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.131-2.b11.el7_3.noarch.rpm</filename><sum type="sha256">2931e4ccc15e9e2f482c6e1b7295e619dfbe591fca969188364ad261ae8151dd</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.i686.rpm</filename><sum type="sha256">c8f627b4a98855eeabcf7c48495629100fdf33f30dc78525e2f63f9e9d26e689</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.131-2.b11.el7_3.noarch.rpm</filename><sum type="sha256">4059c29398085c958c4bf01a79ef17441aa74869994e5fab0fd3788ffc7c611b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-headless-1.8.0.131-2.b11.el7_3.x86_64.rpm</filename><sum type="sha256">3c0276c00d66bb8b931d7652ea4df8be157c6306b472d41a3bb1b525cc7be9cf</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.131-2.b11.el7_3.x86_64.rpm</filename><sum type="sha256">692a2ab8f15edddbd53e1200872d272e1011ea7123a5708fcfd3030df5863a59</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="2.b11.el7_3" src="java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3.src.rpm" version="1.8.0.131"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.131-2.b11.el7_3.noarch.rpm</filename><sum type="sha256">35df27fd9fd66b32a1c2dd440ce414fc65e87ad9daef3dc3b8151800896ec1bf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509" id="CVE-2017-3509" title="Openjdk: Improper Re-Use Of Ntlm Authenticated Connections (Networking, 8163520)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511" id="CVE-2017-3511" title="Openjdk: Untrusted Extension Directories Search Path In Launcher (Jce, 8163528)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526" id="CVE-2017-3526" title="Openjdk: Incomplete Xml Parse Tree Size Enforcement (Jaxp, 8169011)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533" id="CVE-2017-3533" title="Openjdk: Newline Injection In The Ftp Client (Networking, 8170222)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539" id="CVE-2017-3539" title="Openjdk: Md5 Allowed For Jar Verification (Security, 8171121)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544" id="CVE-2017-3544" title="Openjdk: Newline Injection In The Smtp Client (Networking, 8171533)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1108" id="RHSA-2017:1108-1" title="Rhsa-2017:1108-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1442162" id="1442162" title="Using Jdb Triggers Oome On The Debugged Application" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443007" id="1443007" title="Openjdk: Untrusted Extension Directories Search Path In Launcher (Jce, 8163528)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443052" id="1443052" title="Openjdk: Improper Re-Use Of Ntlm Authenticated Connections (Networking, 8163520)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443068" id="1443068" title="Openjdk: Newline Injection In The Smtp Client (Networking, 8171533)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443083" id="1443083" title="Openjdk: Newline Injection In The Ftp Client (Networking, 8170222)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443097" id="1443097" title="Openjdk: Md5 Allowed For Jar Verification (Security, 8171121)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443252" id="1443252" title="Openjdk: Incomplete Xml Parse Tree Size Enforcement (Jaxp, 8169011)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1201-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.1.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-5429, CVE-2017-5433, CVE-2017-5435, CVE-2017-5436, CVE-2017-5459, CVE-2017-5466, CVE-2017-5432, CVE-2017-5434, CVE-2017-5438, CVE-2017-5439, CVE-2017-5440, CVE-2017-5441, CVE-2017-5442, CVE-2017-5443, CVE-2017-5444, CVE-2017-5446, CVE-2017-5447, CVE-2017-5454, CVE-2017-5460, CVE-2017-5464, CVE-2017-5465, CVE-2017-5469, CVE-2016-10195, CVE-2016-10196, CVE-2017-5445, CVE-2017-5449, CVE-2017-5451, CVE-2017-5467, CVE-2016-10197)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-05-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_3" src="thunderbird-52.1.0-1.el7_3.src.rpm" version="52.1.0"><filename>thunderbird-52.1.0-1.el7_3.x86_64.rpm</filename><sum type="sha256">3fbda790bd40f46f879c286102a8ee644b342e3272ad3e722f1adc837b40bb26</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10195" id="CVE-2016-10195" title="Libevent: Stack-Buffer Overflow In The Name_Parse() Function" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10196" id="CVE-2016-10196" title="Libevent: Stack-Buffer Overflow In Evutil_Parse_Sockaddr_Port()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10197" id="CVE-2016-10197" title="Libevent: Out-Of-Bounds Read In Search_Make_New()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5429" id="CVE-2017-5429" title="Mozilla: Memory Safety Bugs Fixed In Firefox 53, Firefox Esr 45.9, And Firefox Esr 52.1 (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5432" id="CVE-2017-5432" title="Mozilla: Use-After-Free In Text Input Selection (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5433" id="CVE-2017-5433" title="Mozilla: Use-After-Free In Smil Animation Functions (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5434" id="CVE-2017-5434" title="Mozilla: Use-After-Free During Focus Handling (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5435" id="CVE-2017-5435" title="Mozilla: Use-After-Free During Transaction Processing In The Editor (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5436" id="CVE-2017-5436" title="Mozilla: Out-Of-Bounds Write With Malicious Font In Graphite 2 (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5438" id="CVE-2017-5438" title="Mozilla: Use-After-Free In Nsautoptr During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5439" id="CVE-2017-5439" title="Mozilla: Use-After-Free In Nstarray Length() During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5440" id="CVE-2017-5440" title="Mozilla: Use-After-Free In Txexecutionstate Destructor During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5441" id="CVE-2017-5441" title="Mozilla: Use-After-Free With Selection During Scroll Events (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5442" id="CVE-2017-5442" title="Mozilla: Use-After-Free During Style Changes (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5443" id="CVE-2017-5443" title="Mozilla: Out-Of-Bounds Write During Binhex Decoding (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5444" id="CVE-2017-5444" title="Mozilla: Buffer Overflow While Parsing Application/Http-Index-Format Content (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5445" id="CVE-2017-5445" title="Mozilla: Uninitialized Values Used While Parsing Application/Http-Index-Format Content (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5446" id="CVE-2017-5446" title="Mozilla: Out-Of-Bounds Read When Http/2 Data Frames Are Sent With Incorrect Data (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5447" id="CVE-2017-5447" title="Mozilla: Out-Of-Bounds Read During Glyph Processing (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5449" id="CVE-2017-5449" title="Mozilla: Crash During Bidirectional Unicode Manipulation With Animation (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5451" id="CVE-2017-5451" title="Mozilla: Addressbar Spoofing With Onblur Event (Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5454" id="CVE-2017-5454" title="Mozilla: Sandbox Escape Allowing File System Read Access Through File Picker (Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5459" id="CVE-2017-5459" title="Mozilla: Buffer Overflow In Webgl (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5460" id="CVE-2017-5460" title="Mozilla: Use-After-Free In Frame Selection (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5464" id="CVE-2017-5464" title="Mozilla: Memory Corruption With Accessibility And Dom Manipulation (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5465" id="CVE-2017-5465" title="Mozilla: Out-Of-Bounds Read In Convolvepixel (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5466" id="CVE-2017-5466" title="Mozilla: Origin Confusion When Reloading Isolated Data:Text/Html Url (Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5467" id="CVE-2017-5467" title="Mozilla: Memory Corruption When Drawing Skia Content (Mfsa 2017-12)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5469" id="CVE-2017-5469" title="Mozilla: Potential Buffer Overflow In Flex-Generated Code (Mfsa 2017-11, Mfsa 2017-12)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1201" id="RHSA-2017:1201-1" title="Rhsa-2017:1201-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418608" id="1418608" title="Libevent: Stack-Buffer Overflow In The Name_Parse() Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418611" id="1418611" title="Libevent: Stack-Buffer Overflow In Evutil_Parse_Sockaddr_Port()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418612" id="1418612" title="Libevent: Out-Of-Bounds Read In Search_Make_New()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443298" id="1443298" title="Mozilla: Use-After-Free During Style Changes (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443299" id="1443299" title="Mozilla: Out-Of-Bounds Write During Binhex Decoding (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443301" id="1443301" title="Mozilla: Memory Safety Bugs Fixed In Firefox 53, Firefox Esr 45.9, And Firefox Esr 52.1 (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443303" id="1443303" title="Mozilla: Memory Corruption With Accessibility And Dom Manipulation (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443304" id="1443304" title="Mozilla: Out-Of-Bounds Read In Convolvepixel (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443305" id="1443305" title="Mozilla: Origin Confusion When Reloading Isolated Data:Text/Html Url (Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443307" id="1443307" title="Mozilla: Memory Corruption When Drawing Skia Content (Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443308" id="1443308" title="Mozilla: Use-After-Free In Frame Selection (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443311" id="1443311" title="Mozilla: Crash During Bidirectional Unicode Manipulation With Animation (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443312" id="1443312" title="Mozilla: Out-Of-Bounds Read When Http/2 Data Frames Are Sent With Incorrect Data (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443313" id="1443313" title="Mozilla: Out-Of-Bounds Read During Glyph Processing (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443314" id="1443314" title="Mozilla: Buffer Overflow While Parsing Application/Http-Index-Format Content (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443315" id="1443315" title="Mozilla: Uninitialized Values Used While Parsing Application/Http-Index-Format Content (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443317" id="1443317" title="Mozilla: Potential Buffer Overflow In Flex-Generated Code (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443322" id="1443322" title="Mozilla: Use-After-Free In Txexecutionstate Destructor During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443323" id="1443323" title="Mozilla: Use-After-Free With Selection During Scroll Events (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443324" id="1443324" title="Mozilla: Use-After-Free In Nstarray Length() During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443325" id="1443325" title="Mozilla: Use-After-Free In Nsautoptr During Xslt Processing (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443327" id="1443327" title="Mozilla: Out-Of-Bounds Write With Malicious Font In Graphite 2 (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443328" id="1443328" title="Mozilla: Use-After-Free During Transaction Processing In The Editor (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443329" id="1443329" title="Mozilla: Use-After-Free During Focus Handling (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443330" id="1443330" title="Mozilla: Use-After-Free In Smil Animation Functions (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443332" id="1443332" title="Mozilla: Use-After-Free In Text Input Selection (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443333" id="1443333" title="Mozilla: Buffer Overflow In Webgl (Mfsa 2017-11, Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443338" id="1443338" title="Mozilla: Sandbox Escape Allowing File System Read Access Through File Picker (Mfsa 2017-12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443340" id="1443340" title="Mozilla: Addressbar Spoofing With Onblur Event (Mfsa 2017-12)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1204-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* An untrusted library search path flaw was found in the JCE component of OpenJDK. A local attacker could possibly use this flaw to cause a Java application using JCE to load an attacker-controlled library and hence escalate their privileges. (CVE-2017-3511) 
* It was found that the JAXP component of OpenJDK failed to correctly enforce parse tree size limits when parsing XML document. An attacker able to make a Java application parse a specially crafted XML document could use this flaw to make it consume an excessive amount of CPU and memory. (CVE-2017-3526) 
* It was discovered that the HTTP client implementation in the Networking component of OpenJDK could cache and re-use an NTLM authenticated connection in a different security context. A remote attacker could possibly use this flaw to make a Java application perform HTTP requests authenticated with credentials of a different user. (CVE-2017-3509) 
Note: This update adds support for the "jdk.ntlm.cache" system property which, when set to false, prevents caching of NTLM connections and authentications and hence prevents this issue. However, caching remains enabled by default. 
* It was discovered that the Security component of OpenJDK did not allow users to restrict the set of algorithms allowed for Jar integrity verification. This flaw could allow an attacker to modify content of the Jar file that used weak signing key or hash algorithm. (CVE-2017-3539) 
Note: This updates extends the fix for CVE-2016-5542 released as part of the SLSA-2016:2658 erratum to no longer allow the MD5 hash algorithm during the Jar integrity verification by adding it to the jdk.jar.disabledAlgorithms security property. 
* Newline injection flaws were discovered in FTP and SMTP client implementations in the Networking component in OpenJDK. A remote attacker could possibly use these flaws to manipulate FTP or SMTP connections established by a Java application. (CVE-2017-3533, CVE-2017-3544)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-05-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.10.1.el7_3" src="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el7_3.src.rpm" version="1.7.0.141"><filename>java-1.7.0-openjdk-demo-1.7.0.141-2.6.10.1.el7_3.x86_64.rpm</filename><sum type="sha256">a9a3056ffdcd727eb28229b883d24477f23d2bfe65d8d070feafbfb4ac5016f9</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.10.1.el7_3" src="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el7_3.src.rpm" version="1.7.0.141"><filename>java-1.7.0-openjdk-accessibility-1.7.0.141-2.6.10.1.el7_3.x86_64.rpm</filename><sum type="sha256">73dbddb2bb40b4046c2ed14b8a2457a77234bd5e2de9561bb345c65c5ff4cbbd</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.10.1.el7_3" src="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el7_3.src.rpm" version="1.7.0.141"><filename>java-1.7.0-openjdk-headless-1.7.0.141-2.6.10.1.el7_3.x86_64.rpm</filename><sum type="sha256">abd9926c97fb180c271256bcb1291a368cba524ede8338a8af9ebb29ca5f42c7</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.10.1.el7_3" src="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el7_3.src.rpm" version="1.7.0.141"><filename>java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el7_3.x86_64.rpm</filename><sum type="sha256">49a9a347f360906df86767dec548fcb9e2635c33bad5205315a41591ad347e56</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.10.1.el7_3" src="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el7_3.src.rpm" version="1.7.0.141"><filename>java-1.7.0-openjdk-javadoc-1.7.0.141-2.6.10.1.el7_3.noarch.rpm</filename><sum type="sha256">7ee184333a194bb985dc81d485ed119c94c1fcf637868a85fe5915704f9cd0a2</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.10.1.el7_3" src="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el7_3.src.rpm" version="1.7.0.141"><filename>java-1.7.0-openjdk-src-1.7.0.141-2.6.10.1.el7_3.x86_64.rpm</filename><sum type="sha256">2936e5fd4716eea354e8201c72b1a484239e1bbbdb829decae18679db59ea06f</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.10.1.el7_3" src="java-1.7.0-openjdk-1.7.0.141-2.6.10.1.el7_3.src.rpm" version="1.7.0.141"><filename>java-1.7.0-openjdk-devel-1.7.0.141-2.6.10.1.el7_3.x86_64.rpm</filename><sum type="sha256">854dfd6b200fe2bd169f0eb02a182fcae20980e1d9f23953cd0070cfa61978a8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3509" id="CVE-2017-3509" title="Openjdk: Improper Re-Use Of Ntlm Authenticated Connections (Networking, 8163520)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3511" id="CVE-2017-3511" title="Openjdk: Untrusted Extension Directories Search Path In Launcher (Jce, 8163528)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3526" id="CVE-2017-3526" title="Openjdk: Incomplete Xml Parse Tree Size Enforcement (Jaxp, 8169011)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3533" id="CVE-2017-3533" title="Openjdk: Newline Injection In The Ftp Client (Networking, 8170222)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3539" id="CVE-2017-3539" title="Openjdk: Md5 Allowed For Jar Verification (Security, 8171121)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3544" id="CVE-2017-3544" title="Openjdk: Newline Injection In The Smtp Client (Networking, 8171533)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1204" id="RHSA-2017:1204-1" title="Rhsa-2017:1204-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443007" id="1443007" title="Openjdk: Untrusted Extension Directories Search Path In Launcher (Jce, 8163528)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443052" id="1443052" title="Openjdk: Improper Re-Use Of Ntlm Authenticated Connections (Networking, 8163520)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443068" id="1443068" title="Openjdk: Newline Injection In The Smtp Client (Networking, 8171533)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443083" id="1443083" title="Openjdk: Newline Injection In The Ftp Client (Networking, 8170222)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443097" id="1443097" title="Openjdk: Md5 Allowed For Jar Verification (Security, 8171121)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443252" id="1443252" title="Openjdk: Incomplete Xml Parse Tree Size Enforcement (Jaxp, 8169011)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1208-1</id><title>Jasper</title><description>Security Fix(es): 
Multiple flaws were found in the way JasPer decoded JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash or, possibly, execute arbitrary code. (CVE-2016-8654, CVE-2016-9560, CVE-2016-10249, CVE-2015-5203, CVE-2015-5221, CVE-2016-1577, CVE-2016-8690, CVE-2016-8693, CVE-2016-8884, CVE-2016-8885, CVE-2016-9262, CVE-2016-9591) 
Multiple flaws were found in the way JasPer decoded JPEG 2000 image files. A specially crafted file could cause an application using JasPer to crash. (CVE-2016-1867, CVE-2016-2089, CVE-2016-2116, CVE-2016-8691, CVE-2016-8692, CVE-2016-8883, CVE-2016-9387, CVE-2016-9388, CVE-2016-9389, CVE-2016-9390, CVE-2016-9391, CVE-2016-9392, CVE-2016-9393, CVE-2016-9394, CVE-2016-9583, CVE-2016-9600, CVE-2016-10248, CVE-2016-10251)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-05-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="jasper-devel" release="30.el7_3" src="jasper-1.900.1-30.el7_3.src.rpm" version="1.900.1"><filename>jasper-devel-1.900.1-30.el7_3.x86_64.rpm</filename><sum type="sha256">b2383dc7b72b2d84fc34baebe654aa6f8e40ef27db419f96764bdff5a279ebbb</sum></package><package arch="x86_64" name="jasper-utils" release="30.el7_3" src="jasper-1.900.1-30.el7_3.src.rpm" version="1.900.1"><filename>jasper-utils-1.900.1-30.el7_3.x86_64.rpm</filename><sum type="sha256">89958a055175f696043917ce90431df8162c1dc3b2543189d46eb3729595ec7f</sum></package><package arch="x86_64" name="jasper" release="30.el7_3" src="jasper-1.900.1-30.el7_3.src.rpm" version="1.900.1"><filename>jasper-1.900.1-30.el7_3.x86_64.rpm</filename><sum type="sha256">9696d3279493c737f75c366276826f9c86d8ac527df01fa26d75817920c9bc2b</sum></package><package arch="i686" name="jasper-libs" release="30.el7_3" src="jasper-1.900.1-30.el7_3.src.rpm" version="1.900.1"><filename>jasper-libs-1.900.1-30.el7_3.i686.rpm</filename><sum type="sha256">2048af8ff090bd7eb5293209cc72cf0385a73e9380a31535369d2c4337f036bf</sum></package><package arch="i686" name="jasper-devel" release="30.el7_3" src="jasper-1.900.1-30.el7_3.src.rpm" version="1.900.1"><filename>jasper-devel-1.900.1-30.el7_3.i686.rpm</filename><sum type="sha256">d2a248dc31006b4b6b2ec7a670e717b5291011a5989999cfd0268d4d3b27bb5c</sum></package><package arch="x86_64" name="jasper-libs" release="30.el7_3" src="jasper-1.900.1-30.el7_3.src.rpm" version="1.900.1"><filename>jasper-libs-1.900.1-30.el7_3.x86_64.rpm</filename><sum type="sha256">4ab994bfc3cc70eb1713c2eb254539ccf3e4ae832e14deddd9460609a23eefe0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5203" id="CVE-2015-5203" title="Jasper: Integer Overflow In Jas_Image_Cmpt_Create()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5221" id="CVE-2015-5221" title="Jasper: Use-After-Free And Double-Free Flaws In Mif_Process_Cmpt()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10248" id="CVE-2016-10248" title="Jasper: Null Pointer Dereference In Jpc_Tsfb_Synthesize()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10249" id="CVE-2016-10249" title="Jasper: Integer Overflow In Jas_Matrix_Create()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10251" id="CVE-2016-10251" title="Jasper: Integer Overflow In Jpc_Pi_Nextcprl(), Leading To Out-Of-Bounds Read" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1577" id="CVE-2016-1577" title="Jasper: Double Free Issue In Jas_Iccattrval_Destroy()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1867" id="CVE-2016-1867" title="Jasper: Out-Of-Bounds Read In Jpc_Pi_Nextcprl()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2089" id="CVE-2016-2089" title="Jasper: Matrix Rows_ Null Pointer Dereference In Jas_Matrix_Clip()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2116" id="CVE-2016-2116" title="Jasper: Memory Leak In Jas_Iccprof_Createfrombuf()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8654" id="CVE-2016-8654" title="Jasper: Heap-Based Buffer Overflow In Qmfb Code In Jpc Codec" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8690" id="CVE-2016-8690" title="Jasper: Missing Jas_Matrix_Create() Parameter Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8691" id="CVE-2016-8691" title="Jasper: Missing Siz Marker Segment Xrsiz And Yrsiz Fields Range Check" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8692" id="CVE-2016-8692" title="Jasper: Missing Siz Marker Segment Xrsiz And Yrsiz Fields Range Check" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8693" id="CVE-2016-8693" title="Jasper: Incorrect Handling Of Bufsize 0 In Mem_Resize()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8883" id="CVE-2016-8883" title="Jasper: Reachable Asserts In Jpc_Dec_Tiledecode()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8884" id="CVE-2016-8884" title="Jasper: Missing Jas_Matrix_Create() Parameter Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8885" id="CVE-2016-8885" title="Jasper: Missing Jas_Matrix_Create() Parameter Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9262" id="CVE-2016-9262" title="Jasper: Integer Truncation In Jas_Image_Cmpt_Create()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9387" id="CVE-2016-9387" title="Jasper: Integer Overflow In Jpc_Dec_Process_Siz()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9388" id="CVE-2016-9388" title="Jasper: Reachable Assertions In Ras Encoder/Decoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9389" id="CVE-2016-9389" title="Jasper: Reachable Assertions Caused By Insufficient Component Domains Checks In Ict/Rct In Jpc Codec" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9390" id="CVE-2016-9390" title="Jasper: Insufficient Siz Marker Tilexoff And Tileyoff Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9391" id="CVE-2016-9391" title="Jasper: Reachable Assertions In The Jpc Bitstream Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9392" id="CVE-2016-9392" title="Jasper: Insufficient Siz Marker Segment Data Sanity Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9393" id="CVE-2016-9393" title="Jasper: Insufficient Siz Marker Segment Data Sanity Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9394" id="CVE-2016-9394" title="Jasper: Insufficient Siz Marker Segment Data Sanity Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9560" id="CVE-2016-9560" title="Jasper: Stack-Based Buffer Overflow In Jpc_Dec_Tileinit()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9583" id="CVE-2016-9583" title="Jasper: Integer Overflows Leading To Out Of Bounds Read In Packet Iterators In Jpc Decoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9591" id="CVE-2016-9591" title="Jasper: Use-After-Free / Double-Free In Jpc Encoder" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9600" id="CVE-2016-9600" title="Jasper: Jp2 Encoder Null Pointer Dereference Due To Uninitialized Cmprof_" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1208" id="RHSA-2017:1208-1" title="Rhsa-2017:1208-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1254242" id="1254242" title="Jasper: Integer Overflow In Jas_Image_Cmpt_Create()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1255710" id="1255710" title="Jasper: Use-After-Free And Double-Free Flaws In Mif_Process_Cmpt()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298135" id="1298135" title="Jasper: Out-Of-Bounds Read In Jpc_Pi_Nextcprl()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1302636" id="1302636" title="Jasper: Matrix Rows_ Null Pointer Dereference In Jas_Matrix_Clip()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314466" id="1314466" title="Jasper: Double Free Issue In Jas_Iccattrval_Destroy()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314472" id="1314472" title="Jasper: Memory Leak In Jas_Iccprof_Createfrombuf()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385499" id="1385499" title="Jasper: Missing Jas_Matrix_Create() Parameter Checks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385502" id="1385502" title="Jasper: Missing Siz Marker Segment Xrsiz And Yrsiz Fields Range Check" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385507" id="1385507" title="Jasper: Incorrect Handling Of Bufsize 0 In Mem_Resize()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1388840" id="1388840" title="Jasper: Integer Overflow In Jas_Matrix_Create()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1388870" id="1388870" title="Jasper: Reachable Asserts In Jpc_Dec_Tiledecode()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1393882" id="1393882" title="Jasper: Integer Truncation In Jas_Image_Cmpt_Create()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396959" id="1396959" title="Jasper: Integer Overflow In Jpc_Dec_Process_Siz()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396962" id="1396962" title="Jasper: Reachable Assertions In Ras Encoder/Decoder" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396963" id="1396963" title="Jasper: Reachable Assertions Caused By Insufficient Component Domains Checks In Ict/Rct In Jpc Codec" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396965" id="1396965" title="Jasper: Insufficient Siz Marker Tilexoff And Tileyoff Checks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396967" id="1396967" title="Jasper: Reachable Assertions In The Jpc Bitstream Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396971" id="1396971" title="Jasper: Insufficient Siz Marker Segment Data Sanity Checks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398256" id="1398256" title="Jasper: Stack-Based Buffer Overflow In Jpc_Dec_Tileinit()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1399167" id="1399167" title="Jasper: Heap-Based Buffer Overflow In Qmfb Code In Jpc Codec" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1405148" id="1405148" title="Jasper: Integer Overflows Leading To Out Of Bounds Read In Packet Iterators In Jpc Decoder" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1406405" id="1406405" title="Jasper: Use-After-Free / Double-Free In Jpc Encoder" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1410026" id="1410026" title="Jasper: Jp2 Encoder Null Pointer Dereference Due To Uninitialized Cmprof_" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434447" id="1434447" title="Jasper: Null Pointer Dereference In Jpc_Tsfb_Synthesize()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434461" id="1434461" title="Jasper: Integer Overflow In Jpc_Pi_Nextcprl(), Leading To Out-Of-Bounds Read" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1230-1</id><title>Ghostscript</title><description>Security Fix(es): 
* It was found that ghostscript did not properly validate the parameters passed to the .rsdparams and .eqproc functions. During its execution, a specially crafted PostScript document could execute code in the context of the ghostscript process, bypassing the -dSAFER protection. (CVE-2017-8291)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-05-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ghostscript-doc" release="20.el7_3.5" src="ghostscript-9.07-20.el7_3.5.src.rpm" version="9.07"><filename>ghostscript-doc-9.07-20.el7_3.5.noarch.rpm</filename><sum type="sha256">02d6c1130932298a285178204d3997a25d2454da9c40bff99c6eb394af86795f</sum></package><package arch="i686" name="ghostscript-devel" release="20.el7_3.5" src="ghostscript-9.07-20.el7_3.5.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-20.el7_3.5.i686.rpm</filename><sum type="sha256">39409ab5e7d0ce7a3d46deac26a49e42c6db0a5fcd616b9ab311e7bcfdc7f095</sum></package><package arch="x86_64" name="ghostscript-devel" release="20.el7_3.5" src="ghostscript-9.07-20.el7_3.5.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-20.el7_3.5.x86_64.rpm</filename><sum type="sha256">3874cd0fc3578d9349aa746f7699b2398dc674754525d009fc0477f619bbb0f0</sum></package><package arch="x86_64" name="ghostscript" release="20.el7_3.5" src="ghostscript-9.07-20.el7_3.5.src.rpm" version="9.07"><filename>ghostscript-9.07-20.el7_3.5.x86_64.rpm</filename><sum type="sha256">264ff0af40f90443462cdab4d2bfa8f7e4cb889935b960cbb054408b400543cf</sum></package><package arch="i686" name="ghostscript" release="20.el7_3.5" src="ghostscript-9.07-20.el7_3.5.src.rpm" version="9.07"><filename>ghostscript-9.07-20.el7_3.5.i686.rpm</filename><sum type="sha256">5928356b981ba2a60e0590061ea9bb5c5221e397a5aaea6d5b28dfa3ac694211</sum></package><package arch="x86_64" name="ghostscript-gtk" release="20.el7_3.5" src="ghostscript-9.07-20.el7_3.5.src.rpm" version="9.07"><filename>ghostscript-gtk-9.07-20.el7_3.5.x86_64.rpm</filename><sum type="sha256">6c6f217e44dbb5a47288d1fff661e6601a544c178ef16c11912ead83472faf62</sum></package><package arch="x86_64" name="ghostscript-cups" release="20.el7_3.5" src="ghostscript-9.07-20.el7_3.5.src.rpm" version="9.07"><filename>ghostscript-cups-9.07-20.el7_3.5.x86_64.rpm</filename><sum type="sha256">169891555d7400babfe3db5040d739269cc881379a6869f46438e5f0b31377e1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8291" id="CVE-2017-8291" title="Ghostscript: Corruption Of Operand Stack" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1230" id="RHSA-2017:1230-1" title="Rhsa-2017:1230-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1446063" id="1446063" title="Ghostscript: Corruption Of Operand Stack" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1262-1</id><title>Rpcbind</title><description>Security Fix(es): 
* It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-05-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="rpcbind" release="38.el7_3" src="rpcbind-0.2.0-38.el7_3.src.rpm" version="0.2.0"><filename>rpcbind-0.2.0-38.el7_3.x86_64.rpm</filename><sum type="sha256">907f0b3ac6b2fe253b98209268f559583771fe67ae7972f00855eed0c8700263</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779" id="CVE-2017-8779" title="Rpcbind, Libtirpc, Libntirpc: Memory Leak When Failing To Parse Xdr Strings Or Bytearrays" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1262" id="RHSA-2017:1262-1" title="Rhsa-2017:1262-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448124" id="1448124" title="Rpcbind, Libtirpc, Libntirpc: Memory Leak When Failing To Parse Xdr Strings Or Bytearrays" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1263-1</id><title>Libtirpc</title><description>Security Fix(es): 
* It was found that due to the way rpcbind uses libtirpc (libntirpc), a memory leak can occur when parsing specially crafted XDR messages. An attacker sending thousands of messages to rpcbind could cause its memory usage to grow without bound, eventually causing it to be terminated by the OOM killer. (CVE-2017-8779)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-05-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libtirpc" release="0.8.el7_3" src="libtirpc-0.2.4-0.8.el7_3.src.rpm" version="0.2.4"><filename>libtirpc-0.2.4-0.8.el7_3.i686.rpm</filename><sum type="sha256">3a23b2d2454ac7c4060beff45a6fc7b3497db26ca28f9cf19d62c41c834bac64</sum></package><package arch="i686" name="libtirpc-devel" release="0.8.el7_3" src="libtirpc-0.2.4-0.8.el7_3.src.rpm" version="0.2.4"><filename>libtirpc-devel-0.2.4-0.8.el7_3.i686.rpm</filename><sum type="sha256">c2001f94e692581a097067b924ff4b4d494bd0ad83e624647a5ccd378912250c</sum></package><package arch="x86_64" name="libtirpc" release="0.8.el7_3" src="libtirpc-0.2.4-0.8.el7_3.src.rpm" version="0.2.4"><filename>libtirpc-0.2.4-0.8.el7_3.x86_64.rpm</filename><sum type="sha256">781c842cd793bead379be8240f7daf8159186b5178e9036ce93480125952c66b</sum></package><package arch="x86_64" name="libtirpc-devel" release="0.8.el7_3" src="libtirpc-0.2.4-0.8.el7_3.src.rpm" version="0.2.4"><filename>libtirpc-devel-0.2.4-0.8.el7_3.x86_64.rpm</filename><sum type="sha256">b8c25b44e6925ddf19ae3f107fe581452e8681d5a9411c28ad067d79a22a2f47</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8779" id="CVE-2017-8779" title="Rpcbind, Libtirpc, Libntirpc: Memory Leak When Failing To Parse Xdr Strings Or Bytearrays" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1263" id="RHSA-2017:1263-1" title="Rhsa-2017:1263-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448124" id="1448124" title="Rpcbind, Libtirpc, Libntirpc: Memory Leak When Failing To Parse Xdr Strings Or Bytearrays" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1264-1</id><title>Kdelibs</title><description>Security Fix(es): 
* A privilege escalation flaw was found in the way kdelibs handled D-Bus messages. A local user could potentially use this flaw to gain root privileges by spoofing a callerID and leveraging a privileged helper application. (CVE-2017-8422)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-05-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="6" name="kdelibs-ktexteditor" release="6.el7_3" src="kdelibs-4.14.8-6.el7_3.src.rpm" version="4.14.8"><filename>kdelibs-ktexteditor-4.14.8-6.el7_3.x86_64.rpm</filename><sum type="sha256">befd0fc022b4a3475b1177b4b2fbbe20f4ec5b164927b217bcc7a1d15ed5a13a</sum></package><package arch="noarch" epoch="6" name="kdelibs-apidocs" release="6.el7_3" src="kdelibs-4.14.8-6.el7_3.src.rpm" version="4.14.8"><filename>kdelibs-apidocs-4.14.8-6.el7_3.noarch.rpm</filename><sum type="sha256">97d5d155334178a9c2b1d5f22c1b88fd95ad9090557e860feab83610932061d1</sum></package><package arch="i686" epoch="6" name="kdelibs" release="6.el7_3" src="kdelibs-4.14.8-6.el7_3.src.rpm" version="4.14.8"><filename>kdelibs-4.14.8-6.el7_3.i686.rpm</filename><sum type="sha256">cfd8cd690c4f7f4bfee02d8faf90acdfe02834f3499148bc722055fa7ba5ec39</sum></package><package arch="x86_64" epoch="6" name="kdelibs" release="6.el7_3" src="kdelibs-4.14.8-6.el7_3.src.rpm" version="4.14.8"><filename>kdelibs-4.14.8-6.el7_3.x86_64.rpm</filename><sum type="sha256">72b8217d05f66a5e6cac687e836eeee74fecdd19b776bc0c2146b0cfe353e3e7</sum></package><package arch="i686" epoch="6" name="kdelibs-devel" release="6.el7_3" src="kdelibs-4.14.8-6.el7_3.src.rpm" version="4.14.8"><filename>kdelibs-devel-4.14.8-6.el7_3.i686.rpm</filename><sum type="sha256">779ca6766a399158d399516ed12eef7c9d72a437f6b0df884174db02244b7e2f</sum></package><package arch="i686" epoch="6" name="kdelibs-ktexteditor" release="6.el7_3" src="kdelibs-4.14.8-6.el7_3.src.rpm" version="4.14.8"><filename>kdelibs-ktexteditor-4.14.8-6.el7_3.i686.rpm</filename><sum type="sha256">9197b9d460bb93cca6a376ec926c95126139e61696dc384df78ee3b47cfac21b</sum></package><package arch="x86_64" epoch="6" name="kdelibs-devel" release="6.el7_3" src="kdelibs-4.14.8-6.el7_3.src.rpm" version="4.14.8"><filename>kdelibs-devel-4.14.8-6.el7_3.x86_64.rpm</filename><sum type="sha256">b91acdb10cf6d973866bdd7a5ea6862e2904b3067a82eabb3ce52530598b3668</sum></package><package arch="x86_64" epoch="6" name="kdelibs-common" release="6.el7_3" src="kdelibs-4.14.8-6.el7_3.src.rpm" version="4.14.8"><filename>kdelibs-common-4.14.8-6.el7_3.x86_64.rpm</filename><sum type="sha256">b922156bb53038c4fcf942643d52ea3d279dd3d0d17f62d383153a74cab137db</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8422" id="CVE-2017-8422" title="Kauth: Service Invoking Dbus Is Not Properly Checked And Allows Local Privilege Escalation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1264" id="RHSA-2017:1264-1" title="Rhsa-2017:1264-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1449647" id="1449647" title="Kauth: Service Invoking Dbus Is Not Properly Checked And Allows Local Privilege Escalation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1265-1</id><title>Samba</title><description>Security Fix(es): 
* It was found that Samba always requested forwardable tickets when using Kerberos authentication. A service to which Samba authenticated using Kerberos could subsequently use the ticket to impersonate Samba to other services or domain users. (CVE-2016-2125) 
* A flaw was found in the way Samba handled PAC (Privilege Attribute Certificate) checksums. A remote, authenticated attacker could use this flaw to crash the winbindd process. (CVE-2016-2126) 
* A race condition was found in samba server. A malicious samba client could use this flaw to access files and directories, in areas of the server file system not exported under the share definitions. (CVE-2017-2619)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-05-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="samba-client-libs" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-client-libs-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">afac801e4d7a4c55c2ba890c745cbe02d4b2e2923ac40f7d308145f3a3a17255</sum></package><package arch="x86_64" name="samba-dc" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-dc-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">55ac8cca10dfaeec6a5665d4b22a890da53ce6b35b38dc6dab113d138fa76ead</sum></package><package arch="i686" name="libwbclient" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>libwbclient-4.4.4-13.el7_3.i686.rpm</filename><sum type="sha256">66333aac385ef80638f0a1abc0244273f3b7e85bcf3f5ea014b61c127107a6c9</sum></package><package arch="x86_64" name="samba-test-libs" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-test-libs-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">0633b7c8fb7ca9f016c8721dd91559bf8ead7e02e61abec2c5d28f1655d69f92</sum></package><package arch="x86_64" name="samba-test" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-test-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">605589db6c5ccebb1488d0fe408151cfa47241776b41d7e25ad9719971493203</sum></package><package arch="x86_64" name="libwbclient-devel" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>libwbclient-devel-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">8d0e00a6174482ffc626811389d2ba02490624f64606daf3782c7d124960745f</sum></package><package arch="x86_64" name="samba-krb5-printing" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-krb5-printing-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">8a9963b3599c8955f7d5f529549623063a0994d0d29e84f4d36992f2843fdd12</sum></package><package arch="i686" name="samba-libs" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-libs-4.4.4-13.el7_3.i686.rpm</filename><sum type="sha256">e1722477dc9c531a9a1c09a48d387148fddf882a61f2376e931796fa4c7a22c0</sum></package><package arch="i686" name="samba-test-libs" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-test-libs-4.4.4-13.el7_3.i686.rpm</filename><sum type="sha256">b895ec728f1e829b9ae8da75d225952164bdb044225b7619d6df0bfd5a4a48df</sum></package><package arch="noarch" name="samba-pidl" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-pidl-4.4.4-13.el7_3.noarch.rpm</filename><sum type="sha256">e506476f358d8a1558241c04c115159813ea196201ad40d73dc44cfc7d32996b</sum></package><package arch="x86_64" name="libsmbclient-devel" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>libsmbclient-devel-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">dfa4cf2ef813664225cd99be6892a9f764b841994055120a5741eedd78ed5d7c</sum></package><package arch="x86_64" name="samba" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">fe238709900120e113c4c26197adf257b172a717a8113437a1ddd9602d45c518</sum></package><package arch="noarch" name="samba-common" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-common-4.4.4-13.el7_3.noarch.rpm</filename><sum type="sha256">3fab77c1b6c21a376bed0988ab464c42c2640d0c62557525559758b7023643c6</sum></package><package arch="x86_64" name="libsmbclient" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>libsmbclient-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">9788d8451b6dc3d4a08686f34fe4d685fcedf100ab95d61c8a856de9878f5d4d</sum></package><package arch="x86_64" name="samba-libs" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-libs-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">1c92210c82cc72d185d9dc526081486e8317bcebf232bae5a4ee712ec6c3b9a9</sum></package><package arch="x86_64" name="samba-winbind-clients" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-winbind-clients-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">6299409f63e2e2c3d80f190070f58e69e5f412b1556eb1be47e6bbab9e7c1c94</sum></package><package arch="i686" name="samba-winbind-modules" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-winbind-modules-4.4.4-13.el7_3.i686.rpm</filename><sum type="sha256">95ce8dffce0e5c5a5992f2eba4145ee2ff0c2404e9ae98c0c0c684e59f2cafc5</sum></package><package arch="x86_64" name="samba-client" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-client-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">e430437e2b96c189c85f7f83dfa74b8509f117862346a4902e6c9859e8d3858e</sum></package><package arch="x86_64" name="samba-python" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-python-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">9c79a8883ee2cff80ab548fd885be2b04e1d98f3421e0c5ea32721b9f79d4fbd</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-winbind-krb5-locator-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">1c85470bb4029af728ece4745f00953cc05141a95a9ea7ca8e46023226928feb</sum></package><package arch="x86_64" name="samba-devel" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-devel-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">556ed7bb28ff4e84b7c51fb9488b1474dc11a9e80eb9b0f4818e69fa80d96cc6</sum></package><package arch="i686" name="samba-devel" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-devel-4.4.4-13.el7_3.i686.rpm</filename><sum type="sha256">3618b44a1b9aaec7a8da5efea0e865f3606a596f9e2ed5005509d7b9afabd0bf</sum></package><package arch="x86_64" name="samba-winbind" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-winbind-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">e7cc8bfed9f34819d72b7271fac6ad7bf9349ae92a56a94d16b5b17ea463de72</sum></package><package arch="i686" name="libsmbclient" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>libsmbclient-4.4.4-13.el7_3.i686.rpm</filename><sum type="sha256">bf1082dbc6661b648046749fc0f1758f04648c6c149ac3341a9bbeae4bb69975</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-vfs-glusterfs-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">0c4e1a4690ed86892c90f89f797489aaa9939c2d5397785964a86eb67f7a394e</sum></package><package arch="x86_64" name="libwbclient" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>libwbclient-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">78d0da4a1526388208ec472bafec5107de7fad13c9f35c825d73c8300cc67f1c</sum></package><package arch="i686" name="libsmbclient-devel" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>libsmbclient-devel-4.4.4-13.el7_3.i686.rpm</filename><sum type="sha256">d7fdfeecefb4b94c189f03b61a695e75f47647d0622fb084007f60f3d87aad77</sum></package><package arch="x86_64" name="samba-common-libs" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-common-libs-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">77f7832ef17ac0d700b615b26f11929e70be44b5e51951aec182706276ee4727</sum></package><package arch="i686" name="libwbclient-devel" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>libwbclient-devel-4.4.4-13.el7_3.i686.rpm</filename><sum type="sha256">a1f3ec2e2a6d7c33d4cb6e36060310d4a33108a7d09689158727b7a4f53244cc</sum></package><package arch="x86_64" name="samba-winbind-modules" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-winbind-modules-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">e30c9fda76255286a3b7526b4135089db3b2a7f3c36e3f3610d7aae1d1b6158c</sum></package><package arch="x86_64" name="samba-dc-libs" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-dc-libs-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">dedeea4b6a60bf919c0c171a02ace75757c6f4f8f064159097950d6fff44a954</sum></package><package arch="x86_64" name="ctdb-tests" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>ctdb-tests-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">fe15b8034fff89c9d3db3d99a3b2834676b1206225d499135400034875851765</sum></package><package arch="x86_64" name="ctdb" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>ctdb-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">1dfca464d032ca51de481c76d14dd17bf9ea059d7ad05c0021b95039ce2b3684</sum></package><package arch="x86_64" name="samba-common-tools" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-common-tools-4.4.4-13.el7_3.x86_64.rpm</filename><sum type="sha256">c4049833ae57298b2f6a70b4b30d625fbe1d3249f657268fc0772254857d02e0</sum></package><package arch="i686" name="samba-client-libs" release="13.el7_3" src="samba-4.4.4-13.el7_3.src.rpm" version="4.4.4"><filename>samba-client-libs-4.4.4-13.el7_3.i686.rpm</filename><sum type="sha256">b0dbe5db8a02303b5c23ea021fe3d61f138d5d324ade88b4313cd43b398d5310</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2125" id="CVE-2016-2125" title="Samba: Unconditional Privilege Delegation To Kerberos Servers In Trusted Realms" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2126" id="CVE-2016-2126" title="Samba: Flaws In Kerberos Pac Validation Can Trigger Privilege Elevation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2619" id="CVE-2017-2619" title="Samba: Symlink Race Permits Opening Files Outside Share Directory" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1265" id="RHSA-2017:1265-1" title="Rhsa-2017:1265-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1403114" id="1403114" title="Samba: Unconditional Privilege Delegation To Kerberos Servers In Trusted Realms" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1403115" id="1403115" title="Samba: Flaws In Kerberos Pac Validation Can Trigger Privilege Elevation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429472" id="1429472" title="Samba: Symlink Race Permits Opening Files Outside Share Directory" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1270-1</id><title>Samba</title><description>Security Fix(es): 
* A remote code execution flaw was found in Samba. A malicious authenticated samba client, having write access to the samba share, could use this flaw to execute arbitrary code as root. (CVE-2017-7494)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-05-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="samba-test-libs" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-test-libs-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">1276adae6c587839afcaf6a1fb4cc8edb20980b855928b10d780e62110b41555</sum></package><package arch="x86_64" name="samba" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">d0f6e82d4d9d000cb486c5457ea01b819b588d4630aa6ee0d22ca8e4b4267d6f</sum></package><package arch="x86_64" name="samba-winbind-clients" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-winbind-clients-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">30388c2da72fc1e9628b70202901e0462744710ded9477b50803e1e86bc39b8d</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-vfs-glusterfs-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">e95615b6b870f47cceeecd3840862a6a4dfc409a9e0b3c9d12547f241ccf4245</sum></package><package arch="x86_64" name="libsmbclient-devel" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>libsmbclient-devel-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">e2123b5d2910631f8b856584c32f4288abe03107bc48ef50822fae966e25b20e</sum></package><package arch="noarch" name="samba-common" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-common-4.4.4-14.el7_3.noarch.rpm</filename><sum type="sha256">7e3924e1073d4dcbe4f39e8dbd4e738929a041dbc783bdb02f8272bbb88d7976</sum></package><package arch="x86_64" name="samba-dc" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-dc-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">48274f1b6577a27920404383af64ee33ca59dd11b2c5a414fffe75d88fefd775</sum></package><package arch="i686" name="libwbclient" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>libwbclient-4.4.4-14.el7_3.i686.rpm</filename><sum type="sha256">1e6fcefd49b9caab4bb424a9baaf0a257ab4610f8bdfce90e28cad0e1872fd36</sum></package><package arch="i686" name="samba-client-libs" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-client-libs-4.4.4-14.el7_3.i686.rpm</filename><sum type="sha256">ec826f9b3377031d1317d9bb699d6f577a5a073634d395a9ab2338e84951138e</sum></package><package arch="x86_64" name="samba-python" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-python-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">79ccb62c32582dcdfa654c748667faf1b540e7375a1eb53b91eb04376df657f9</sum></package><package arch="x86_64" name="samba-winbind-modules" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-winbind-modules-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">f645bc2473bfb05ccd47db8cb517cc323889bd420713606d2eba2774b684704c</sum></package><package arch="x86_64" name="samba-devel" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-devel-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">0bd8d2dd9789541dbf04aecd5b832fa17f284d435d05e79f285b3c9b572f7d8d</sum></package><package arch="x86_64" name="samba-common-tools" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-common-tools-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">fc522f6f791ed51d67a074eda29a78bb6aac6a84c565095b4343c86d0b8cc9f1</sum></package><package arch="x86_64" name="libwbclient-devel" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>libwbclient-devel-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">1ff304283564f8d31ffaef3905dbf7b960fa7754e06b8f5b18bfa5876ec66bb7</sum></package><package arch="x86_64" name="samba-client-libs" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-client-libs-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">5bcffdc7598f30c69d1cf8d6f1bb1fbf6caac43e7b9d63361d59ab071473b911</sum></package><package arch="x86_64" name="libwbclient" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>libwbclient-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">70299bde971fabbcad27578178fd96a76c04d43b8452f8df51d7ecf40acfb1e1</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-winbind-krb5-locator-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">93a29f1c02c488bb36e1e431f7ea36ec87e7b708bb1a47ce4a549a67db5046e7</sum></package><package arch="i686" name="samba-libs" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-libs-4.4.4-14.el7_3.i686.rpm</filename><sum type="sha256">6dd09449b2607f2487ed17c0f8ba34745ea0d4cc97a1597072e8d5de5b08b076</sum></package><package arch="x86_64" name="ctdb-tests" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>ctdb-tests-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">544b5fc3567447e21a2c38eeb732be5f79f0a4ae43fe07fe35311f9317300070</sum></package><package arch="x86_64" name="libsmbclient" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>libsmbclient-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">9a3d318b5ead5a6fe62a9005e70950241ece285608380afa07f96b8d47907315</sum></package><package arch="x86_64" name="ctdb" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>ctdb-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">70b1bce19ea49727a23de1bcb3d432d1401193516e00756e42971493bb990c51</sum></package><package arch="i686" name="libwbclient-devel" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>libwbclient-devel-4.4.4-14.el7_3.i686.rpm</filename><sum type="sha256">0337c2076083810785687639720f46bb4d3d3ec6f5c09791cbde2f5b25574595</sum></package><package arch="i686" name="libsmbclient" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>libsmbclient-4.4.4-14.el7_3.i686.rpm</filename><sum type="sha256">141193f5c878052219d73b577f36a8c0116ea97360186c76326e42759161a416</sum></package><package arch="i686" name="libsmbclient-devel" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>libsmbclient-devel-4.4.4-14.el7_3.i686.rpm</filename><sum type="sha256">530dd74982f1bf27a5d3bd9bfc44f9f79cf7a9e0e4d578092432d45c5ed9d3c7</sum></package><package arch="x86_64" name="samba-common-libs" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-common-libs-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">621c9a83a7fdf31aa945901f5914aaa0bebed0260f198867e4379b46c3034cbc</sum></package><package arch="noarch" name="samba-pidl" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-pidl-4.4.4-14.el7_3.noarch.rpm</filename><sum type="sha256">7c41c23c98efb3a7f805337c3eefe63d709d8ffc585fd7f3f2d0efa0aedceb93</sum></package><package arch="i686" name="samba-devel" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-devel-4.4.4-14.el7_3.i686.rpm</filename><sum type="sha256">3709cdd90bbaf408024bc1b5592000f7db66ad45edba1a81d53db71c69ac3da1</sum></package><package arch="x86_64" name="samba-winbind" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-winbind-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">31cac7b74d067420ee84d338901e9562ea569d63f8f7c27e2a39c47628e474fb</sum></package><package arch="x86_64" name="samba-dc-libs" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-dc-libs-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">3eca03254d0e5c08be6b9166f130716d4f9cde6d58da984dedaeda248181e5e8</sum></package><package arch="x86_64" name="samba-libs" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-libs-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">9e353de37fb7b5e799f4c5db2af3ac9948735b3ba31454443b855ba340f4c159</sum></package><package arch="x86_64" name="samba-krb5-printing" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-krb5-printing-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">5d68a0adf80f143bf8560e98a402ad27184e56e5e78ad401d2994617bca7324b</sum></package><package arch="i686" name="samba-winbind-modules" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-winbind-modules-4.4.4-14.el7_3.i686.rpm</filename><sum type="sha256">4e8f72d22cf08b342696c5b3d2877b7423e17a993823f1258f027b05086d72c0</sum></package><package arch="x86_64" name="samba-client" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-client-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">3c0d583550d33170879eb61d9d2c5ee7515e403df19bfc1598f8c8d156b3a534</sum></package><package arch="x86_64" name="samba-test" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-test-4.4.4-14.el7_3.x86_64.rpm</filename><sum type="sha256">290ae34869804ffb4cdc84c68188dfcad089bb66a6987a0ce45914a82cfaf8f7</sum></package><package arch="i686" name="samba-test-libs" release="14.el7_3" src="samba-4.4.4-14.el7_3.src.rpm" version="4.4.4"><filename>samba-test-libs-4.4.4-14.el7_3.i686.rpm</filename><sum type="sha256">1b1e66d7f6f11fa1c6b6acfe3f0b5c56539fd203d36f40382506bc37c8d9dcf4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7494" id="CVE-2017-7494" title="Samba: Loading Shared Modules From Any Path In The System Leading To Rce" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1270" id="RHSA-2017:1270-1" title="Rhsa-2017:1270-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1450347" id="1450347" title="Samba: Loading Shared Modules From Any Path In The System Leading To Rce" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1308-1</id><title>Kernel</title><description>Security Fix(es): 
* It was found that the packet_set_ring() function of the Linux kernel's networking implementation did not properly validate certain block-size data. A local attacker with CAP_NET_RAW capability could use this flaw to trigger a buffer overflow, resulting in the crash of the system. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. (CVE-2017-7308, Important) 
* Mounting a crafted EXT4 image read-only leads to an attacker controlled memory corruption and SLAB-Out-of-Bounds reads. (CVE-2016-10208, Moderate) 
* A flaw was found in the Linux kernel's implementation of seq_file where a local attacker could manipulate memory in the put() function pointer. This could lead to memory corruption and possible privileged escalation. (CVE-2016-7910, Moderate) 
* A vulnerability was found in the Linux kernel. An unprivileged local user could trigger oops in shash_async_export() by attempting to force the in-kernel hashing algorithms into decrypting an empty data set. (CVE-2016-8646, Moderate) 
* It was reported that with Linux kernel, earlier than version v4.10-rc8, an application may trigger a BUG_ON in sctp_wait_for_sndbuf if the socket tx buffer is full, a thread is waiting on it to queue more data, and meanwhile another thread peels off the association being used by the first thread. (CVE-2017-5986, Moderate)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-05-25 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-perf" release="514.21.1.el7" src="kernel-3.10.0-514.21.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-514.21.1.el7.x86_64.rpm</filename><sum type="sha256">5941249802997eb58882777c50088ddef8b2ffd49db9c2dd101e558a29d96fdc</sum></package><package arch="noarch" name="kernel-doc" release="514.21.1.el7" src="kernel-3.10.0-514.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-514.21.1.el7.noarch.rpm</filename><sum type="sha256">312e3140f5d79bef9f5b9c5068b867559fe94814c5f17f73616f5d40dd4204a5</sum></package><package arch="x86_64" name="kernel-tools" release="514.21.1.el7" src="kernel-3.10.0-514.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-514.21.1.el7.x86_64.rpm</filename><sum type="sha256">e6176da8b71fbf401733f95752266bba429e8144fa72a87a49a15291b32d0d02</sum></package><package arch="x86_64" name="kernel-debug-devel" release="514.21.1.el7" src="kernel-3.10.0-514.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-514.21.1.el7.x86_64.rpm</filename><sum type="sha256">aa1c1cfd1e1ced2daa97b5de74dcc5515f23317b2c554098c0e4ec91eebd5774</sum></package><package arch="x86_64" name="kernel-headers" release="514.21.1.el7" src="kernel-3.10.0-514.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-514.21.1.el7.x86_64.rpm</filename><sum type="sha256">ab026194358850a5761cc9744745ca9e89d3ba46713b963fc36d4186afa6be72</sum></package><package arch="x86_64" name="perf" release="514.21.1.el7" src="kernel-3.10.0-514.21.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-514.21.1.el7.x86_64.rpm</filename><sum type="sha256">f7bb0b1d913ec99ec50adfc1c12c2041a8a91af5c744e93ade8de3a0086ce97f</sum></package><package arch="x86_64" name="kernel-devel" release="514.21.1.el7" src="kernel-3.10.0-514.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-514.21.1.el7.x86_64.rpm</filename><sum type="sha256">8dce4c3e892fb44af47bbac5a8b311ef4809b5a95d5fdbf53aa31b66bdc7946c</sum></package><package arch="x86_64" name="kernel-tools-libs" release="514.21.1.el7" src="kernel-3.10.0-514.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-514.21.1.el7.x86_64.rpm</filename><sum type="sha256">575790d52646bf06d1a02c06291a84be6fd56105a0b005b6aa4ba756874bdf7f</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="514.21.1.el7" src="kernel-3.10.0-514.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-514.21.1.el7.noarch.rpm</filename><sum type="sha256">fde25ce9bfd32f2dc9470d429b706afaa413921c94758bd3ffaedb852b92c018</sum></package><package arch="x86_64" name="kernel" release="514.21.1.el7" src="kernel-3.10.0-514.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-514.21.1.el7.x86_64.rpm</filename><sum type="sha256">444e69efa0d41c6b55456182fedb9fbeafabb90be7942beca1c14c0880589c84</sum></package><package arch="x86_64" name="kernel-debug" release="514.21.1.el7" src="kernel-3.10.0-514.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-514.21.1.el7.x86_64.rpm</filename><sum type="sha256">fde519d1e634fa1ea3184b24504c3e4adc9ec35bd5d8e3db278be3d9b4896e06</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="514.21.1.el7" src="kernel-3.10.0-514.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-514.21.1.el7.x86_64.rpm</filename><sum type="sha256">20a93b9fa4fcb28f54206ec32e84946780aaddb2a0fb5c8d0c3444c4ae3fb51e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10208" id="CVE-2016-10208" title="Kernel: Ext4 Memory Corruption / Slab Out-Of-Bounds Read" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7910" id="CVE-2016-7910" title="Kernel: Use After Free In Seq File" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8646" id="CVE-2016-8646" title="Kernel: Oops In Shash_Async_Export()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5986" id="CVE-2017-5986" title="Kernel: Reachable Bug_On From Userspace In Sctp_Wait_For_Sndbuf" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7308" id="CVE-2017-7308" title="Kernel: Net/Packet: Overflow In Check For Priv Area Size" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1308" id="RHSA-2017:1308-1" title="Rhsa-2017:1308-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1388821" id="1388821" title="Kernel: Oops In Shash_Async_Export()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395190" id="1395190" title="Kernel: Ext4 Memory Corruption / Slab Out-Of-Bounds Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1399727" id="1399727" title="Kernel: Use After Free In Seq File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1420276" id="1420276" title="Kernel: Reachable Bug_On From Userspace In Sctp_Wait_For_Sndbuf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1437404" id="1437404" title="Kernel: Net/Packet: Overflow In Check For Priv Area Size" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1365-3</id><title>Nss</title><description>Security Fix(es): 
* A null pointer dereference flaw was found in the way NSS handled empty SSLv2 messages. An attacker could use this flaw to crash a server application compiled against the NSS library. (CVE-2017-7502) 
Bug Fix(es): 
* The Network Security Services (NSS) code and Certificate Authority (CA) list have been updated to meet the recommendations as published with the latest Mozilla Firefox Extended Support Release (ESR). The updated CA list improves compatibility with the certificates that are used in the Internet Public Key Infrastructure (PKI). To avoid certificate validation refusals, consider installing the updated CA list on June 12, 2017.</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-05-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="nss" release="1.2.el7_3" src="nss-3.28.4-1.2.el7_3.src.rpm" version="3.28.4"><filename>nss-3.28.4-1.2.el7_3.i686.rpm</filename><sum type="sha256">1e097188a52e50181e035d6bdea1c978a1dd80c41ddf2c30d35b5c4260f67355</sum></package><package arch="x86_64" name="nss" release="1.2.el7_3" src="nss-3.28.4-1.2.el7_3.src.rpm" version="3.28.4"><filename>nss-3.28.4-1.2.el7_3.x86_64.rpm</filename><sum type="sha256">686060261531be7ef3384fc4231fec0a18f505a0cf591a309f6dbf28e0465edd</sum></package><package arch="i686" name="nss-pkcs11-devel" release="1.2.el7_3" src="nss-3.28.4-1.2.el7_3.src.rpm" version="3.28.4"><filename>nss-pkcs11-devel-3.28.4-1.2.el7_3.i686.rpm</filename><sum type="sha256">b304a1a8b7a7db6bf6f14a312e36940c0180212d0804551814490063dba3f53d</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="1.2.el7_3" src="nss-3.28.4-1.2.el7_3.src.rpm" version="3.28.4"><filename>nss-pkcs11-devel-3.28.4-1.2.el7_3.x86_64.rpm</filename><sum type="sha256">1d39ff94aac9550d5d5c0ba4b77f08ed74787dc57b7ddaafea9c271c23b78361</sum></package><package arch="x86_64" name="nss-devel" release="1.2.el7_3" src="nss-3.28.4-1.2.el7_3.src.rpm" version="3.28.4"><filename>nss-devel-3.28.4-1.2.el7_3.x86_64.rpm</filename><sum type="sha256">c9f0d0bb25c3252e43c79cf6841a3be2cce118a399c878cbb1ffaf86ed5cc942</sum></package><package arch="i686" name="nss-devel" release="1.2.el7_3" src="nss-3.28.4-1.2.el7_3.src.rpm" version="3.28.4"><filename>nss-devel-3.28.4-1.2.el7_3.i686.rpm</filename><sum type="sha256">1089c8192bc60237d28de5c9c12951ed1d8b79838d58da8181be6a0dee49bbbc</sum></package><package arch="x86_64" name="nss-sysinit" release="1.2.el7_3" src="nss-3.28.4-1.2.el7_3.src.rpm" version="3.28.4"><filename>nss-sysinit-3.28.4-1.2.el7_3.x86_64.rpm</filename><sum type="sha256">74fc699e3f675adb48835c1450e49681c5393c09aa9f7957917d185b668877cd</sum></package><package arch="x86_64" name="nss-tools" release="1.2.el7_3" src="nss-3.28.4-1.2.el7_3.src.rpm" version="3.28.4"><filename>nss-tools-3.28.4-1.2.el7_3.x86_64.rpm</filename><sum type="sha256">83ab67cf76aaa5edba84bd24c05f0496559ea4b47ff852b17d32d9bb2ec38d6f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7502" id="CVE-2017-7502" title="Nss: Null Pointer Dereference When Handling Empty Sslv2 Messages" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1365" id="RHSA-2017:1365-3" title="Rhsa-2017:1365-3" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1446631" id="1446631" title="Nss: Null Pointer Dereference When Handling Empty Sslv2 Messages" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1382-1</id><title>Sudo</title><description>Security Fix(es): 
* A flaw was found in the way sudo parsed tty information from the process status file in the proc filesystem. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root. (CVE-2017-1000367)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-05-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="sudo-devel" release="22.el7_3" src="sudo-1.8.6p7-22.el7_3.src.rpm" version="1.8.6p7"><filename>sudo-devel-1.8.6p7-22.el7_3.i686.rpm</filename><sum type="sha256">e882633017a9f569e95cce620b4dc98bda46e1e7ec3cad8cee4013b97e308889</sum></package><package arch="x86_64" name="sudo-devel" release="22.el7_3" src="sudo-1.8.6p7-22.el7_3.src.rpm" version="1.8.6p7"><filename>sudo-devel-1.8.6p7-22.el7_3.x86_64.rpm</filename><sum type="sha256">98f6db553e309c5fe87429edc9019319b22fc57e8dd420aec553da6d69aa5767</sum></package><package arch="x86_64" name="sudo" release="22.el7_3" src="sudo-1.8.6p7-22.el7_3.src.rpm" version="1.8.6p7"><filename>sudo-1.8.6p7-22.el7_3.x86_64.rpm</filename><sum type="sha256">f0e497cf44a9b305f747163c22ed235d672529f6b9ce749fef12529ca7b8c9ef</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000367" id="CVE-2017-1000367" title=" Sudo: Privilege Escalation In Via Improper " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1382" id="RHSA-2017:1382-1" title="Rhsa-2017:1382-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1453074" id="1453074" title=" Sudo: Privilege Escalation In Via Improper " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1430-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* An out-of-bounds r/w access issue was found in QEMU's Cirrus CLGD 54xx VGA Emulator support. The vulnerability could occur while copying VGA data via various bitblt functions. A privileged user inside a guest could use this flaw to crash the QEMU process or, potentially, execute arbitrary code on the host with privileges of the QEMU process. (CVE-2017-7980) 
* An out-of-bounds access issue was found in QEMU's Cirrus CLGD 54xx VGA Emulator support. The vulnerability could occur while copying VGA data using bitblt functions (for example, cirrus_bitblt_rop_fwd_transp_). A privileged user inside a guest could use this flaw to crash the QEMU process, resulting in denial of service. (CVE-2017-7718) 
Bug Fix(es): 
* Previously, guest virtual machines in some cases became unresponsive when the "pty" back end of a serial device performed an irregular I/O communication. This update improves the handling of serial I/O on guests, which prevents the described problem from occurring.</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-06-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm" release="126.el7_3.9" src="qemu-kvm-1.5.3-126.el7_3.9.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-126.el7_3.9.x86_64.rpm</filename><sum type="sha256">eef9fc40cb5cd29a5647f9416350e11e4126cc681f3d96e8deeb8cb265bf2ac9</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="126.el7_3.9" src="qemu-kvm-1.5.3-126.el7_3.9.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-126.el7_3.9.x86_64.rpm</filename><sum type="sha256">30563c527ea7af5f0955320bd1998b3af08d597d13f5b2d9a5516b4cacee651f</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="126.el7_3.9" src="qemu-kvm-1.5.3-126.el7_3.9.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-126.el7_3.9.x86_64.rpm</filename><sum type="sha256">206e801fbabcb6ec1509ed71789499b4210654a02d0a98ecebb26121fd2092cc</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="126.el7_3.9" src="qemu-kvm-1.5.3-126.el7_3.9.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-126.el7_3.9.x86_64.rpm</filename><sum type="sha256">611faa017c58d88e0f23a490e8679c7357be12d9c23de1b8bc1fe65978e0f8d1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7718" id="CVE-2017-7718" title="Qemu: Display: Cirrus: Oob Read Access Issue" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7980" id="CVE-2017-7980" title="Qemu: Display: Cirrus: Oob R/W Access Issues In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1430" id="RHSA-2017:1430-1" title="Rhsa-2017:1430-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443441" id="1443441" title="Qemu: Display: Cirrus: Oob Read Access Issue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1444371" id="1444371" title="Qemu: Display: Cirrus: Oob R/W Access Issues In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452332" id="1452332" title="Rhel 7.2 Based Vm (Virtual Machine) Hung For Several Hours " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1440-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.2.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-5470, CVE-2017-5472, CVE-2017-7749, CVE-2017-7751, CVE-2017-7756, CVE-2017-7771, CVE-2017-7772, CVE-2017-7773, CVE-2017-7774, CVE-2017-7775, CVE-2017-7776, CVE-2017-7777, CVE-2017-7778, CVE-2017-7750, CVE-2017-7752, CVE-2017-7754, CVE-2017-7757, CVE-2017-7758, CVE-2017-7764)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2017-06-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_3" src="firefox-52.2.0-1.el7_3.src.rpm" version="52.2.0"><filename>firefox-52.2.0-1.el7_3.x86_64.rpm</filename><sum type="sha256">6acccc10c5d3b81ef434f6c946a8ded7ed550d6d36110db882673533413c9846</sum></package><package arch="i686" name="firefox" release="1.el7_3" src="firefox-52.2.0-1.el7_3.src.rpm" version="52.2.0"><filename>firefox-52.2.0-1.el7_3.i686.rpm</filename><sum type="sha256">7eb09bf69886aed50abed4b1ded0d9aa1a5e6a2e48f78676cd37df2c337c2fb0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470" id="CVE-2017-5470" title="Mozilla: Memory Safety Bugs Fixed In Firefox 54 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472" id="CVE-2017-5472" title="Mozilla: Use-After-Free Using Destroyed Node " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749" id="CVE-2017-7749" title="Mozilla: Use-After-Free During Docshell " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750" id="CVE-2017-7750" title="Mozilla: Use-After-Free With Track Elements " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751" id="CVE-2017-7751" title="Mozilla: Use-After-Free With Content Viewer " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752" id="CVE-2017-7752" title="Mozilla: Use-After-Free With Ime Input (Mfsa " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754" id="CVE-2017-7754" title="Mozilla: Out-Of-Bounds Read In Webgl With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756" id="CVE-2017-7756" title="Mozilla: Use-After-Free And Use-After-Scope " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757" id="CVE-2017-7757" title="Mozilla: Use-After-Free In Indexeddb (Mfsa 2017-16)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758" id="CVE-2017-7758" title="Mozilla: Out-Of-Bounds Read In Opus Encoder " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764" id="CVE-2017-7764" title="Mozilla: Domain Spoofing With Combination Of " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771" id="CVE-2017-7771" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772" id="CVE-2017-7772" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773" id="CVE-2017-7773" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778" id="CVE-2017-7778" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1440" id="RHSA-2017:1440-1" title="Rhsa-2017:1440-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461252" id="1461252" title="Mozilla: Use-After-Free Using Destroyed Node " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461253" id="1461253" title="Mozilla: Use-After-Free During Docshell " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461254" id="1461254" title="Mozilla: Use-After-Free With Track Elements " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461255" id="1461255" title="Mozilla: Use-After-Free With Content Viewer " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461256" id="1461256" title="Mozilla: Use-After-Free With Ime Input (Mfsa " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461257" id="1461257" title="Mozilla: Out-Of-Bounds Read In Webgl With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461258" id="1461258" title="Mozilla: Use-After-Free And Use-After-Scope " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461259" id="1461259" title="Mozilla: Use-After-Free In Indexeddb (Mfsa 2017-16)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461260" id="1461260" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461261" id="1461261" title="Mozilla: Out-Of-Bounds Read In Opus Encoder " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461262" id="1461262" title="Mozilla: Domain Spoofing With Combination Of " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461264" id="1461264" title="Mozilla: Memory Safety Bugs Fixed In Firefox 54 " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1481-1</id><title>Glibc</title><description>Security Fix(es): 
* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is glibc-side mitigation which blocks processing of LD_LIBRARY_PATH for programs running in secure-execution mode and reduces the number of allocations performed by the processing of LD_AUDIT, LD_PRELOAD, and LD_HWCAP_MASK, making successful exploitation of this issue more difficult. (CVE-2017-1000366)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-06-19 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="glibc" release="157.el7_3.4" src="glibc-2.17-157.el7_3.4.src.rpm" version="2.17"><filename>glibc-2.17-157.el7_3.4.x86_64.rpm</filename><sum type="sha256">00efff89a7ed98fd4a8f27b50ac365a0664809ffb5e8387b02d31da2b79032d6</sum></package><package arch="x86_64" name="glibc-common" release="157.el7_3.4" src="glibc-2.17-157.el7_3.4.src.rpm" version="2.17"><filename>glibc-common-2.17-157.el7_3.4.x86_64.rpm</filename><sum type="sha256">d384e41b237232419c84dec20af0b1f4eaa2e27b9b36c679c2527857c9e9c85c</sum></package><package arch="x86_64" name="nscd" release="157.el7_3.4" src="glibc-2.17-157.el7_3.4.src.rpm" version="2.17"><filename>nscd-2.17-157.el7_3.4.x86_64.rpm</filename><sum type="sha256">ade74fb45d62c80f8d057612b808a2641485197fc213e2d5b3ee4b79a5a70038</sum></package><package arch="x86_64" name="glibc-headers" release="157.el7_3.4" src="glibc-2.17-157.el7_3.4.src.rpm" version="2.17"><filename>glibc-headers-2.17-157.el7_3.4.x86_64.rpm</filename><sum type="sha256">869e29e55ed5282c8fe36df8930b32612c3b1c6fc93c3d7d650a026d38899c12</sum></package><package arch="x86_64" name="glibc-utils" release="157.el7_3.4" src="glibc-2.17-157.el7_3.4.src.rpm" version="2.17"><filename>glibc-utils-2.17-157.el7_3.4.x86_64.rpm</filename><sum type="sha256">892eaa2d5590367f61cd85b752f0c5bebbdd704f72fded8eb4023f40a6e79dfa</sum></package><package arch="i686" name="glibc" release="157.el7_3.4" src="glibc-2.17-157.el7_3.4.src.rpm" version="2.17"><filename>glibc-2.17-157.el7_3.4.i686.rpm</filename><sum type="sha256">594fec4db48e301a006bd665c7c9ea0a1ee199dca9ef6e7514ffb44744abb200</sum></package><package arch="i686" name="glibc-devel" release="157.el7_3.4" src="glibc-2.17-157.el7_3.4.src.rpm" version="2.17"><filename>glibc-devel-2.17-157.el7_3.4.i686.rpm</filename><sum type="sha256">2eed3c04ece68e3639abec825d4fb2f4d158d3cb76c698565d4734b9fe2e5fd7</sum></package><package arch="x86_64" name="glibc-static" release="157.el7_3.4" src="glibc-2.17-157.el7_3.4.src.rpm" version="2.17"><filename>glibc-static-2.17-157.el7_3.4.x86_64.rpm</filename><sum type="sha256">8225ee116e51a35e8f1ebc08f4a108ce385c3411e3936b6d67831f11f5c3a4c4</sum></package><package arch="x86_64" name="glibc-devel" release="157.el7_3.4" src="glibc-2.17-157.el7_3.4.src.rpm" version="2.17"><filename>glibc-devel-2.17-157.el7_3.4.x86_64.rpm</filename><sum type="sha256">99e9c12bb84fdfefd887466d8112c7e8fcd2a9b2703777f98d29bf6f27dfaf9a</sum></package><package arch="i686" name="glibc-static" release="157.el7_3.4" src="glibc-2.17-157.el7_3.4.src.rpm" version="2.17"><filename>glibc-static-2.17-157.el7_3.4.i686.rpm</filename><sum type="sha256">04cc0c19f9131355bbae7e46a8b75beffa4c29c57baae8c52c072ede8ebbd721</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000366" id="CVE-2017-1000366" title="Glibc: Heap/Stack Gap Jumping Via Unbounded " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1481" id="RHSA-2017:1481-1" title="Rhsa-2017:1481-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452543" id="1452543" title="Glibc: Heap/Stack Gap Jumping Via Unbounded " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1484-1</id><title>Kernel</title><description>Security Fix(es): 
* A flaw was found in the way memory was being allocated on the stack for user space binaries. If heap (or different memory region) and stack memory regions were adjacent to each other, an attacker could use this flaw to jump over the stack guard gap, cause controlled memory corruption on process stack or the adjacent memory region, and thus increase their privileges on the system. This is a kernel-side mitigation which increases the stack guard gap size from one page to 1 MiB to make successful exploitation of this issue more difficult. (CVE-2017-1000364, Important)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-06-19 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools" release="514.21.2.el7" src="kernel-3.10.0-514.21.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-514.21.2.el7.x86_64.rpm</filename><sum type="sha256">77c6ec0b07cc4d57091f4a4600a31c8b2041baa4d51f163355a52b44550b5664</sum></package><package arch="noarch" name="kernel-doc" release="514.21.2.el7" src="kernel-3.10.0-514.21.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-514.21.2.el7.noarch.rpm</filename><sum type="sha256">4cd1beb5c93646cf1942d5d66f604587e75e3433f0170c5c695ba514ec714365</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="514.21.2.el7" src="kernel-3.10.0-514.21.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-514.21.2.el7.x86_64.rpm</filename><sum type="sha256">a8c4f8fae73a2690fcbd2cf0dffc079ec55a26be1bc5ca22abdcc2dff04eceab</sum></package><package arch="x86_64" name="kernel-debug-devel" release="514.21.2.el7" src="kernel-3.10.0-514.21.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-514.21.2.el7.x86_64.rpm</filename><sum type="sha256">28dc260370858c1b922c61ba02698a9567b496182d9ffceb6f52124afb1e8a2a</sum></package><package arch="x86_64" name="kernel-devel" release="514.21.2.el7" src="kernel-3.10.0-514.21.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-514.21.2.el7.x86_64.rpm</filename><sum type="sha256">82995c9a1bf8e8232b4ed31ffedba5fdc29d6919c4412fc2c0d4bac85ba51595</sum></package><package arch="x86_64" name="python-perf" release="514.21.2.el7" src="kernel-3.10.0-514.21.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-514.21.2.el7.x86_64.rpm</filename><sum type="sha256">6d1c604250a6a5e83bf17cace93fb41036df079b05c6f7e43c90bfba93cc0365</sum></package><package arch="x86_64" name="kernel-headers" release="514.21.2.el7" src="kernel-3.10.0-514.21.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-514.21.2.el7.x86_64.rpm</filename><sum type="sha256">ac2ad9570906750015faf53e375b600c0b8395a9a97cfed31eb7bc8ddbb0cb89</sum></package><package arch="x86_64" name="kernel-tools-libs" release="514.21.2.el7" src="kernel-3.10.0-514.21.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-514.21.2.el7.x86_64.rpm</filename><sum type="sha256">0a856445b50f84b77f270780dd4eda251c31b3e3386f9a9107979d1789da8170</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="514.21.2.el7" src="kernel-3.10.0-514.21.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-514.21.2.el7.noarch.rpm</filename><sum type="sha256">7df93ae9625fe4f601d9d7a6a51508cb1532a961a06e8e8a0b36877694fc8f1d</sum></package><package arch="x86_64" name="kernel" release="514.21.2.el7" src="kernel-3.10.0-514.21.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-514.21.2.el7.x86_64.rpm</filename><sum type="sha256">6b128e1f6646981b258f059bdc97b1af1ee14438baca81ad120c960303d95095</sum></package><package arch="x86_64" name="kernel-debug" release="514.21.2.el7" src="kernel-3.10.0-514.21.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-514.21.2.el7.x86_64.rpm</filename><sum type="sha256">05cfa49e754c4a71a5b9088d19e8a0fcbc2d6837fdb3c537b00d7ff83c762423</sum></package><package arch="x86_64" name="perf" release="514.21.2.el7" src="kernel-3.10.0-514.21.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-514.21.2.el7.x86_64.rpm</filename><sum type="sha256">ade26e281e4485f425fbd2d09b1e366b2daf00e6f346bf02988fe048f96ac87a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000364" id="CVE-2017-1000364" title="Kernel: Heap/Stack Gap Jumping Via Unbounded " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1484" id="RHSA-2017:1484-1" title="Rhsa-2017:1484-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461333" id="1461333" title="Kernel: Heap/Stack Gap Jumping Via Unbounded " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1561-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.2.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-5470, CVE-2017-5472, CVE-2017-7749, CVE-2017-7750, CVE-2017-7751, CVE-2017-7756, CVE-2017-7771, CVE-2017-7772, CVE-2017-7773, CVE-2017-7774, CVE-2017-7775, CVE-2017-7776, CVE-2017-7777, CVE-2017-7778, CVE-2017-7752, CVE-2017-7754, CVE-2017-7757, CVE-2017-7758, CVE-2017-7764)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-06-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_3" src="thunderbird-52.2.0-1.el7_3.src.rpm" version="52.2.0"><filename>thunderbird-52.2.0-1.el7_3.x86_64.rpm</filename><sum type="sha256">8bfacbbba2b303f110db2517312d59cf0dbedaf44fce480f3783139f061aa29b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5470" id="CVE-2017-5470" title="Mozilla: Memory Safety Bugs Fixed In Firefox 54 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5472" id="CVE-2017-5472" title="Mozilla: Use-After-Free Using Destroyed Node " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7749" id="CVE-2017-7749" title="Mozilla: Use-After-Free During Docshell " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7750" id="CVE-2017-7750" title="Mozilla: Use-After-Free With Track Elements " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7751" id="CVE-2017-7751" title="Mozilla: Use-After-Free With Content Viewer " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7752" id="CVE-2017-7752" title="Mozilla: Use-After-Free With Ime Input (Mfsa " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7754" id="CVE-2017-7754" title="Mozilla: Out-Of-Bounds Read In Webgl With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7756" id="CVE-2017-7756" title="Mozilla: Use-After-Free And Use-After-Scope " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7757" id="CVE-2017-7757" title="Mozilla: Use-After-Free In Indexeddb (Mfsa 2017-16)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7758" id="CVE-2017-7758" title="Mozilla: Out-Of-Bounds Read In Opus Encoder " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7764" id="CVE-2017-7764" title="Mozilla: Domain Spoofing With Combination Of " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771" id="CVE-2017-7771" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772" id="CVE-2017-7772" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773" id="CVE-2017-7773" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778" id="CVE-2017-7778" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1561" id="RHSA-2017:1561-1" title="Rhsa-2017:1561-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461252" id="1461252" title="Mozilla: Use-After-Free Using Destroyed Node " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461253" id="1461253" title="Mozilla: Use-After-Free During Docshell " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461254" id="1461254" title="Mozilla: Use-After-Free With Track Elements " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461255" id="1461255" title="Mozilla: Use-After-Free With Content Viewer " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461256" id="1461256" title="Mozilla: Use-After-Free With Ime Input (Mfsa " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461257" id="1461257" title="Mozilla: Out-Of-Bounds Read In Webgl With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461258" id="1461258" title="Mozilla: Use-After-Free And Use-After-Scope " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461259" id="1461259" title="Mozilla: Use-After-Free In Indexeddb (Mfsa 2017-16)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461260" id="1461260" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461261" id="1461261" title="Mozilla: Out-Of-Bounds Read In Opus Encoder " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461262" id="1461262" title="Mozilla: Domain Spoofing With Combination Of " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461264" id="1461264" title="Mozilla: Memory Safety Bugs Fixed In Firefox 54 " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1574-1</id><title>Sudo</title><description>Security Fix(es): 
* It was found that the original fix for CVE-2017-1000367 was incomplete. A flaw was found in the way sudo parsed tty information from the process status file in the proc filesystem. A local user with privileges to execute commands via sudo could use this flaw to escalate their privileges to root. (CVE-2017-1000368)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-06-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="sudo-devel" release="23.el7_3" src="sudo-1.8.6p7-23.el7_3.src.rpm" version="1.8.6p7"><filename>sudo-devel-1.8.6p7-23.el7_3.x86_64.rpm</filename><sum type="sha256">9c507d7df254f9c3b5e0f2f17b86db0cb5cc146d1fed8d89e98bf501f238d6f8</sum></package><package arch="x86_64" name="sudo" release="23.el7_3" src="sudo-1.8.6p7-23.el7_3.src.rpm" version="1.8.6p7"><filename>sudo-1.8.6p7-23.el7_3.x86_64.rpm</filename><sum type="sha256">28c8f6e11135127a16890744cda23348948a46f581ca30645946180d5a436923</sum></package><package arch="i686" name="sudo-devel" release="23.el7_3" src="sudo-1.8.6p7-23.el7_3.src.rpm" version="1.8.6p7"><filename>sudo-devel-1.8.6p7-23.el7_3.i686.rpm</filename><sum type="sha256">6830e874bfe3ce9e384336cd80e433522e229fa944441c981abb5665dc6f4320</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000368" id="CVE-2017-1000368" title="Sudo: Privilege Escalation Via Improper " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1574" id="RHSA-2017:1574-1" title="Rhsa-2017:1574-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1459152" id="1459152" title="Sudo: Privilege Escalation Via Improper " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1576-1</id><title>Mercurial</title><description>Security Fix(es): 
* A flaw was found in the way "hg serve --stdio" command in Mercurial handled command-line options. A remote, authenticated attacker could use this flaw to execute arbitrary code on the Mercurial server by using specially crafted command-line options. (CVE-2017-9462)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-06-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="mercurial-hgk" release="7.el7_3" src="mercurial-2.6.2-7.el7_3.src.rpm" version="2.6.2"><filename>mercurial-hgk-2.6.2-7.el7_3.x86_64.rpm</filename><sum type="sha256">3ba96ecd069fc2fa262d7dabfb20bf31bff61fd25d77cf1376f295b5ed0780c5</sum></package><package arch="x86_64" name="emacs-mercurial-el" release="7.el7_3" src="mercurial-2.6.2-7.el7_3.src.rpm" version="2.6.2"><filename>emacs-mercurial-el-2.6.2-7.el7_3.x86_64.rpm</filename><sum type="sha256">8d66927232e401cdb220466acf2ea0e7d951ae88f667d3673d425289cef006f3</sum></package><package arch="x86_64" name="mercurial" release="7.el7_3" src="mercurial-2.6.2-7.el7_3.src.rpm" version="2.6.2"><filename>mercurial-2.6.2-7.el7_3.x86_64.rpm</filename><sum type="sha256">c5d33633cf761ef8c3523b674d668355645d67803b77af9b611e00a953f5eaa5</sum></package><package arch="x86_64" name="emacs-mercurial" release="7.el7_3" src="mercurial-2.6.2-7.el7_3.src.rpm" version="2.6.2"><filename>emacs-mercurial-2.6.2-7.el7_3.x86_64.rpm</filename><sum type="sha256">d99752838fde8ea8a0b7e0712f916bd4b12896ad3a02ab3dd008a9651628992c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9462" id="CVE-2017-9462" title="Mercurial: Python Debugger Accessible To " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1576" id="RHSA-2017:1576-1" title="Rhsa-2017:1576-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1459482" id="1459482" title="Mercurial: Python Debugger Accessible To " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1581-1</id><title>Freeradius</title><description>Security Fix(es): 
* An authentication bypass flaw was found in the way the EAP module in FreeRADIUS handled TLS session resumption. A remote unauthenticated attacker could potentially use this flaw to bypass the inner authentication check in FreeRADIUS by resuming an older unauthenticated TLS session. (CVE-2017-9148)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-06-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="freeradius-devel" release="8.el7_3" src="freeradius-3.0.4-8.el7_3.src.rpm" version="3.0.4"><filename>freeradius-devel-3.0.4-8.el7_3.x86_64.rpm</filename><sum type="sha256">4c234c79b4140551acd7bc35b6ec8fc03c700d2e6b4115fe4c6c27165be3ee4e</sum></package><package arch="x86_64" name="freeradius" release="8.el7_3" src="freeradius-3.0.4-8.el7_3.src.rpm" version="3.0.4"><filename>freeradius-3.0.4-8.el7_3.x86_64.rpm</filename><sum type="sha256">85cb90b401fd832953cff3092b1e582fa8dfcfdd983715ba4359078a3ec80bd3</sum></package><package arch="x86_64" name="freeradius-sqlite" release="8.el7_3" src="freeradius-3.0.4-8.el7_3.src.rpm" version="3.0.4"><filename>freeradius-sqlite-3.0.4-8.el7_3.x86_64.rpm</filename><sum type="sha256">92842bd474bec36a3b4bb2c45e09a31e13830308ba2bdff021f1b491dde6d250</sum></package><package arch="i686" name="freeradius-devel" release="8.el7_3" src="freeradius-3.0.4-8.el7_3.src.rpm" version="3.0.4"><filename>freeradius-devel-3.0.4-8.el7_3.i686.rpm</filename><sum type="sha256">f7f35e0230518f670df00f386890ba1cf95cf0672d5e085a125140d968e5b706</sum></package><package arch="x86_64" name="freeradius-doc" release="8.el7_3" src="freeradius-3.0.4-8.el7_3.src.rpm" version="3.0.4"><filename>freeradius-doc-3.0.4-8.el7_3.x86_64.rpm</filename><sum type="sha256">102d74c7a527bfafe866e0beae9803c7e1a566140073d6b68a42b5120a236b72</sum></package><package arch="x86_64" name="freeradius-postgresql" release="8.el7_3" src="freeradius-3.0.4-8.el7_3.src.rpm" version="3.0.4"><filename>freeradius-postgresql-3.0.4-8.el7_3.x86_64.rpm</filename><sum type="sha256">17ecafaf71c03a271dfed22fbd0cd2d3eeb1315069915363841893828255ded3</sum></package><package arch="x86_64" name="freeradius-perl" release="8.el7_3" src="freeradius-3.0.4-8.el7_3.src.rpm" version="3.0.4"><filename>freeradius-perl-3.0.4-8.el7_3.x86_64.rpm</filename><sum type="sha256">ac41d43f48629d458a352bc33485882006ccc85aa5904226c5cfbbd90c01a19e</sum></package><package arch="x86_64" name="freeradius-python" release="8.el7_3" src="freeradius-3.0.4-8.el7_3.src.rpm" version="3.0.4"><filename>freeradius-python-3.0.4-8.el7_3.x86_64.rpm</filename><sum type="sha256">8e5662264d1e8bcf6bc33a8c076b32a8817f5e4706904628ac645015797fd1a4</sum></package><package arch="x86_64" name="freeradius-krb5" release="8.el7_3" src="freeradius-3.0.4-8.el7_3.src.rpm" version="3.0.4"><filename>freeradius-krb5-3.0.4-8.el7_3.x86_64.rpm</filename><sum type="sha256">31b6d3209c3dd3a3ae6d28b8d5fafffb343dd36ce5294eebd928e9f41053edea</sum></package><package arch="x86_64" name="freeradius-mysql" release="8.el7_3" src="freeradius-3.0.4-8.el7_3.src.rpm" version="3.0.4"><filename>freeradius-mysql-3.0.4-8.el7_3.x86_64.rpm</filename><sum type="sha256">f66fa3460accb18de98a665b36f35f2325f5114ca968d174f2a1f36aa4e12869</sum></package><package arch="x86_64" name="freeradius-unixODBC" release="8.el7_3" src="freeradius-3.0.4-8.el7_3.src.rpm" version="3.0.4"><filename>freeradius-unixODBC-3.0.4-8.el7_3.x86_64.rpm</filename><sum type="sha256">f6f9402f979639ab8329abfb71c2a3ae4d36132944975824e02fb68e96325fec</sum></package><package arch="x86_64" name="freeradius-ldap" release="8.el7_3" src="freeradius-3.0.4-8.el7_3.src.rpm" version="3.0.4"><filename>freeradius-ldap-3.0.4-8.el7_3.x86_64.rpm</filename><sum type="sha256">88086c9c847cf3e156294b79a5e3ed2d0b657c9f298822cf537d13f8e14e9a04</sum></package><package arch="x86_64" name="freeradius-utils" release="8.el7_3" src="freeradius-3.0.4-8.el7_3.src.rpm" version="3.0.4"><filename>freeradius-utils-3.0.4-8.el7_3.x86_64.rpm</filename><sum type="sha256">294832ab07141afd5480cd82df0dfcad9b9a54e98d88658f14823d1e0653e24e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9148" id="CVE-2017-9148" title="Freeradius: Tls Resumption Authentication Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1581" id="RHSA-2017:1581-1" title="Rhsa-2017:1581-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1456697" id="1456697" title="Freeradius: Tls Resumption Authentication Bypass" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1615-1</id><title>Kernel</title><description>Security Fix(es): 
* A flaw was found in the way Linux kernel allocates heap memory to build the scattergather list from a fragment list(skb_shinfo(skb)-&gt;frag_list) in the socket buffer(skb_buff). The heap overflow occurred if 'MAX_SKB_FRAGS + 1' parameter and 'NETIF_F_FRAGLIST' feature were used together. A remote user or process could use this flaw to potentially escalate their privilege on a system. (CVE-2017-7477, Important) 
* The NFS2/3 RPC client could send long arguments to the NFS server. These encoded arguments are stored in an array of memory pages, and accessed using pointer variables. Arbitrarily long arguments could make these pointers point outside the array and cause an out-of-bounds memory access. A remote user or program could use this flaw to crash the kernel (denial of service). (CVE-2017-7645, Important) 
* The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lacked certain checks for the end of a buffer. A remote attacker could trigger a pointer-arithmetic error or possibly cause other unspecified impacts using crafted requests related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c. (CVE-2017-7895, Important) 
* The Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support was vulnerable to an incorrect segment selector(SS) value error. The error could occur while loading values into the SS register in long mode. A user or process inside a guest could use this flaw to crash the guest, resulting in DoS or potentially escalate their privileges inside the guest. (CVE-2017-2583, Moderate) 
* A flaw was found in the Linux kernel's handling of packets with the URG flag. Applications using the splice() and tcp_splice_read() functionality could allow a remote attacker to force the kernel to enter a condition in which it could loop indefinitely. (CVE-2017-6214, Moderate) 
Bug Fix(es): 
* Previously, the reserved-pages counter (HugePages_Rsvd) was bigger than the total-pages counter (HugePages_Total) in the /proc/meminfo file, and HugePages_Rsvd underflowed. With this update, the HugeTLB feature of the Linux kernel has been fixed, and HugePages_Rsvd underflow no longer occurs. 
* If a directory on a NFS client was modified while being listed, the NFS client could restart the directory listing multiple times. Consequently, the performance of listing the directory was sub-optimal. With this update, the restarting of the directory listing happens less frequently. As a result, the performance of listing the directory while it is being modified has improved. 
* The Fibre Channel over Ethernet (FCoE) adapter in some cases failed to reboot. This update fixes the qla2xxx driver, and FCoE adapter now reboots as expected. 
* When a VM with Virtual Function I/O (VFIO) device was rebooted, the QEMU process occasionally terminated unexpectedly due to a failed VFIO Direct Memory Access (DMA) map request. This update fixes the vfio driver and QEMU no longer crashes in the described situation. 
* When the operating system was booted with the in-box lpfc driver, a kernel panic occurred on the little-endian variant of IBM Power Systems. This update fixes lpfc, and the kernel no longer panics in the described situation. 
* When creating or destroying a VM with Virtual Function I/O (VFIO) devices with "Hugepages" feature enabled, errors in Direct Memory Access (DMA) page table entry (PTE) mappings occurred, and QEMU memory usage behaved unpredictably. This update fixes range computation when making room for large pages in Input/Output Memory Management Unit (IOMMU). As a result, errors in DMA PTE mappings no longer occur, and QEMU has a predictable memory usage in the described situation.</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-06-28 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kernel-doc" release="514.26.1.el7" src="kernel-3.10.0-514.26.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-514.26.1.el7.noarch.rpm</filename><sum type="sha256">b5f38ad7dfb825076fb5ce892d95d2068b1fcc146f30bca1dff9385de313ef7a</sum></package><package arch="x86_64" name="kernel-debug" release="514.26.1.el7" src="kernel-3.10.0-514.26.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-514.26.1.el7.x86_64.rpm</filename><sum type="sha256">b4226ea5557456b522c5665cc1f0d2a0adddc4471319c82a07bc51a72d1934cc</sum></package><package arch="x86_64" name="kernel-headers" release="514.26.1.el7" src="kernel-3.10.0-514.26.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-514.26.1.el7.x86_64.rpm</filename><sum type="sha256">08fa1f3a3124945427d028a4ae099aa334197b9083a39ae0da75178d6d546561</sum></package><package arch="x86_64" name="kernel-debug-devel" release="514.26.1.el7" src="kernel-3.10.0-514.26.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-514.26.1.el7.x86_64.rpm</filename><sum type="sha256">8952d20bd854c8354b0e0e0eb0f81ef331321d9ca726be4cb69b3b414fa82d54</sum></package><package arch="x86_64" name="kernel-devel" release="514.26.1.el7" src="kernel-3.10.0-514.26.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-514.26.1.el7.x86_64.rpm</filename><sum type="sha256">31a9bff305bb04ab84e03bc4859be628c172bfea885ddd5880930182cbe697b1</sum></package><package arch="x86_64" name="perf" release="514.26.1.el7" src="kernel-3.10.0-514.26.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-514.26.1.el7.x86_64.rpm</filename><sum type="sha256">291938fdded27ddc69ddfc7d3b443bd57e26e9203169319cef2fa5dd8e0bcae3</sum></package><package arch="x86_64" name="python-perf" release="514.26.1.el7" src="kernel-3.10.0-514.26.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-514.26.1.el7.x86_64.rpm</filename><sum type="sha256">74a32d158c77f23f177e8278e54c977525f2d46377bba629559e5e6b970799ff</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="514.26.1.el7" src="kernel-3.10.0-514.26.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-514.26.1.el7.noarch.rpm</filename><sum type="sha256">c6597028918dd3228b7183f482eee3abca76f953c7847e18cda57574563aeadf</sum></package><package arch="x86_64" name="kernel" release="514.26.1.el7" src="kernel-3.10.0-514.26.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-514.26.1.el7.x86_64.rpm</filename><sum type="sha256">2de71196494c9789807d3b2fe2057f4ea29a7a60fa438434639a2b98ceaf4cd6</sum></package><package arch="x86_64" name="kernel-tools" release="514.26.1.el7" src="kernel-3.10.0-514.26.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-514.26.1.el7.x86_64.rpm</filename><sum type="sha256">951f5e1bdc4f965d6a32c32c87a9f67d472a52350248e3b4aa9ae0d2e504a569</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="514.26.1.el7" src="kernel-3.10.0-514.26.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-514.26.1.el7.x86_64.rpm</filename><sum type="sha256">21b60c41644196a81f0495b47c4f6bac3b6787ce27a085a2cd4153b7aad12e10</sum></package><package arch="x86_64" name="kernel-tools-libs" release="514.26.1.el7" src="kernel-3.10.0-514.26.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-514.26.1.el7.x86_64.rpm</filename><sum type="sha256">d7691813eb60914e5de752a957c945955db82d58ac9ef6de1d64f4dc1df89625</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2583" id="CVE-2017-2583" title="Kernel: Kvm: Vmx/Svm Potential Privilege " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6214" id="CVE-2017-6214" title="Kernel: Ipv4/Tcp: Infinite Loop In Tcp_Splice_Read()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7477" id="CVE-2017-7477" title="Kernel: Net: Heap Overflow In Skb_To_Sgvec In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7645" id="CVE-2017-7645" title="Kernel: Nfsd: Incorrect Handling Of Long Rpc Replies" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7895" id="CVE-2017-7895" title="Kernel: Nfsv3 Server Does Not Properly Handle " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1615" id="RHSA-2017:1615-1" title="Rhsa-2017:1615-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1414735" id="1414735" title="Kernel: Kvm: Vmx/Svm Potential Privilege " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1426542" id="1426542" title="Kernel: Ipv4/Tcp: Infinite Loop In Tcp_Splice_Read()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443615" id="1443615" title="Kernel: Nfsd: Incorrect Handling Of Long Rpc Replies" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1445207" id="1445207" title="Kernel: Net: Heap Overflow In Skb_To_Sgvec In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1446103" id="1446103" title="Kernel: Nfsv3 Server Does Not Properly Handle " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1680-1</id><title>Bind</title><description>Security Fix(es): 
* A flaw was found in the way BIND handled TSIG authentication for dynamic updates. A remote attacker able to communicate with an authoritative BIND server could use this flaw to manipulate the contents of a zone, by forging a valid TSIG or SIG(0) signature for a dynamic update request. (CVE-2017-3143) 
* A flaw was found in the way BIND handled TSIG authentication of AXFR requests. A remote attacker, able to communicate with an authoritative BIND server, could use this flaw to view the entire contents of a zone by sending a specially constructed request packet. (CVE-2017-3142) 
Bug Fix(es): 
* ICANN is planning to perform a Root Zone DNSSEC Key Signing Key (KSK) rollover during October 2017. Maintaining an up-to-date KSK, by adding the new root zone KSK, is essential for ensuring that validating DNS resolvers continue to function following the rollover.</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-07-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-50.el7_3.1.x86_64.rpm</filename><sum type="sha256">870db17754195ff3c95c794a12f9d5e9e6f1dc79fc5c46034c154d83df3e954e</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-utils-9.9.4-50.el7_3.1.x86_64.rpm</filename><sum type="sha256">14ffaf12e4a4fbf3e0363543dcb3c9822e6b24834c5d34a98308a33a51caf635</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-50.el7_3.1.x86_64.rpm</filename><sum type="sha256">d5649e735902514e5649d8c7fbf5f4fa98e996b519febc8fcff9cc766fe72f48</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-50.el7_3.1.x86_64.rpm</filename><sum type="sha256">8baf04baaf85a484a94a8c028e9b643519257bd3a909e0d66c6f26f90291f451</sum></package><package arch="x86_64" epoch="32" name="bind" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-9.9.4-50.el7_3.1.x86_64.rpm</filename><sum type="sha256">2a66be962107ea8a860edf1e1b1f3711eb9a5ab2a5d81d1fa851b5987be73a74</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-50.el7_3.1.i686.rpm</filename><sum type="sha256">ead2814dedf223aa838d9e2ae2d8077619e418409cf3965114d7a6ea500d8eb5</sum></package><package arch="i686" epoch="32" name="bind-devel" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-50.el7_3.1.i686.rpm</filename><sum type="sha256">15d4ac5acf41fabed13ad198d4aa6014752953a23000b0387d374e22f557579b</sum></package><package arch="i686" epoch="32" name="bind-libs" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-50.el7_3.1.i686.rpm</filename><sum type="sha256">6104bfe3d2f883ce0e24c08f714d08deaaaa4eed42167470c36e4cb10fd5e4ce</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-9.9.4-50.el7_3.1.x86_64.rpm</filename><sum type="sha256">615e1953bfa1b2272e0c7ebb97b4fdb460ccd0833c78f2e02ba939e6f7c89def</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-50.el7_3.1.i686.rpm</filename><sum type="sha256">f6ff232e89f16f172f3266dea710fb0f5ecad263c2ada3bfa122ad7ba28462e6</sum></package><package arch="noarch" epoch="32" name="bind-license" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-license-9.9.4-50.el7_3.1.noarch.rpm</filename><sum type="sha256">ef567cffe2a37996fcc2dff2692ae00772108458fcaff150291b8513d2c53359</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-sdb-chroot-9.9.4-50.el7_3.1.x86_64.rpm</filename><sum type="sha256">f68600138e9bf307e76461d2364e8cc150e326c5442772101c3dcc893cb81707</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-50.el7_3.1.i686.rpm</filename><sum type="sha256">86ed4af699a630ccc718e0d34bea7cb7082a99eca24c5c5e3e928347a1e176e5</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-50.el7_3.1.x86_64.rpm</filename><sum type="sha256">3d5251807da5856f91d6bf5e4f650ac7b7fd4a7a26fd713b95ed861b6698a466</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-50.el7_3.1.x86_64.rpm</filename><sum type="sha256">675d1e0d229b9639cc521f82392dc143235a5b6796d0d5192cf3b4ab7ce4bd89</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-50.el7_3.1.i686.rpm</filename><sum type="sha256">b304dade93b8f6d189964f6c9e602cffff153083fef64fc121b16a68404bb3fd</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-chroot-9.9.4-50.el7_3.1.x86_64.rpm</filename><sum type="sha256">745fff5546585a08925a936fcca0308924594cfab604ea208f05cfbbdf371823</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-50.el7_3.1.x86_64.rpm</filename><sum type="sha256">1ca325901d0da6c426df29afa21657719d428810fe22df37e8a7f3783a88c925</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-utils-9.9.4-50.el7_3.1.x86_64.rpm</filename><sum type="sha256">5a91502b85cc711c732459d25136e547e95093edd2abbfd0f9c0949e96cc17ea</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="50.el7_3.1" src="bind-9.9.4-50.el7_3.1.src.rpm" version="9.9.4"><filename>bind-sdb-9.9.4-50.el7_3.1.x86_64.rpm</filename><sum type="sha256">d2f401d3300abdd00156b284c42e207856b371ac04b348343513a72cbd3f08b5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3142" id="CVE-2017-3142" title="Bind: An Error In Tsig Authentication Can Permit " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3143" id="CVE-2017-3143" title="Bind: An Error In Tsig Authentication Can Permit " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1680" id="RHSA-2017:1680-1" title="Rhsa-2017:1680-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1466189" id="1466189" title="Bind: An Error In Tsig Authentication Can Permit " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1466193" id="1466193" title="Bind: An Error In Tsig Authentication Can Permit " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1681-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* Quick Emulator (QEMU) built with Network Block Device (NBD) Server support was vulnerable to a null-pointer dereference issue. The flaw could occur when releasing a client, which was not initialized due to failed negotiation. A remote user or process could exploit this flaw to crash the qemu-nbd server (denial of service). (CVE-2017-9524)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-07-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="126.el7_3.10" src="qemu-kvm-1.5.3-126.el7_3.10.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-126.el7_3.10.x86_64.rpm</filename><sum type="sha256">994a0229bdbf9a0f3c141cacee00a785ece3b03550e88a85c43af052a3c9d8e8</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="126.el7_3.10" src="qemu-kvm-1.5.3-126.el7_3.10.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-126.el7_3.10.x86_64.rpm</filename><sum type="sha256">80b05dc49ac853a2b35ec53245e7526f06d88a8fb62f49547cafe8730eaeabf4</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="126.el7_3.10" src="qemu-kvm-1.5.3-126.el7_3.10.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-126.el7_3.10.x86_64.rpm</filename><sum type="sha256">d7a6906147e5f47235625b562481592083a6a57951da6dc744fd89e25891e34f</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="126.el7_3.10" src="qemu-kvm-1.5.3-126.el7_3.10.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-126.el7_3.10.x86_64.rpm</filename><sum type="sha256">42d5643a64d5cbd3aa4e22b5e89d58bcb66325911eab7d1707ab63667d3441d6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9524" id="CVE-2017-9524" title="Qemu: Nbd: Segmentation Fault Due To Client " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1681" id="RHSA-2017:1681-1" title="Rhsa-2017:1681-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1460170" id="1460170" title="Qemu: Nbd: Segmentation Fault Due To Client " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1789-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* It was discovered that the DCG implementation in the RMI component of OpenJDK failed to correctly handle references. A remote attacker could possibly use this flaw to execute arbitrary code with the privileges of RMI registry or a Java RMI application. (CVE-2017-10102) 
* Multiple flaws were discovered in the RMI, JAXP, ImageIO, Libraries, AWT, Hotspot, and Security components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-10107, CVE-2017-10096, CVE-2017-10101, CVE-2017-10089, CVE-2017-10090, CVE-2017-10087, CVE-2017-10111, CVE-2017-10110, CVE-2017-10074, CVE-2017-10067) 
* It was discovered that the LDAPCertStore class in the Security component of OpenJDK followed LDAP referrals to arbitrary URLs. A specially crafted LDAP referral URL could cause LDAPCertStore to communicate with non-LDAP servers. (CVE-2017-10116) 
* It was discovered that the Nashorn JavaScript engine in the Scripting component of OpenJDK could allow scripts to access Java APIs even when access to Java APIs was disabled. An untrusted JavaScript executed by Nashorn could use this flaw to bypass intended restrictions. (CVE-2017-10078) 
* It was discovered that the Security component of OpenJDK could fail to properly enforce restrictions defined for processing of X.509 certificate chains. A remote attacker could possibly use this flaw to make Java accept certificate using one of the disabled algorithms. (CVE-2017-10198) 
* A covert timing channel flaw was found in the DSA implementation in the JCE component of OpenJDK. A remote attacker able to make a Java application generate DSA signatures on demand could possibly use this flaw to extract certain information about the used key via a timing side channel. (CVE-2017-10115) 
* A covert timing channel flaw was found in the PKCS#8 implementation in the JCE component of OpenJDK. A remote attacker able to make a Java application repeatedly compare PKCS#8 key against an attacker controlled value could possibly use this flaw to determine the key via a timing side channel. (CVE-2017-10135) 
* It was discovered that the BasicAttribute and CodeSource classes in OpenJDK did not limit the amount of memory allocated when creating object instances from a serialized form. A specially crafted serialized input stream could cause Java to consume an excessive amount of memory. (CVE-2017-10108, CVE-2017-10109) 
* Multiple flaws were found in the Hotspot and Security components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2017-10081, CVE-2017-10193) 
* It was discovered that the JPEGImageReader implementation in the 2D component of OpenJDK would, in certain cases, read all image data even if it was not used later. A specially crafted image could cause a Java application to temporarily use an excessive amount of CPU and memory. (CVE-2017-10053) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.</description><severity>critical</severity><release>Scientific Linux</release><issued date="2017-07-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3.i686.rpm</filename><sum type="sha256">1a87805403302f4ca9fe72f1aa28bb471d283fda7ffd777dfa49b3b03f4c237a</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3.i686.rpm</filename><sum type="sha256">65ee98ec360484e9b3a18029dfabb82c92eb9e01ef9e08cdb0d26d6721285ca2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-debug-1.8.0.141-1.b16.el7_3.x86_64.rpm</filename><sum type="sha256">4cb7bf426eb79aaa73179c3e599c0cc6483768624c91dacf442f55b4537ee6ef</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3.x86_64.rpm</filename><sum type="sha256">385a749e0a8401b59f74fb935d17ee6aacf0543f6f974d8e5077122d4dfac329</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.141-1.b16.el7_3.x86_64.rpm</filename><sum type="sha256">ff74f62b6d5438d7f1794732780a6478349cb398c220ef88a4711b7b936ae09e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3.i686.rpm</filename><sum type="sha256">d5e0e6e6f08c7d424057598fed0b85726baf5fb28efc645d78f78e1e8de707ed</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.141-1.b16.el7_3.noarch.rpm</filename><sum type="sha256">5fdb3c48543618eead81c92e5435cddea182e945a5acfdb4328986f4a3d497a9</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.x86_64.rpm</filename><sum type="sha256">df8844d6d1e549e885eaace646ded183e1042970e5f36ae517b741498751a86f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.141-1.b16.el7_3.x86_64.rpm</filename><sum type="sha256">cd94249943ac90d3347de6a38d5acc886154bd7c596767c4a8bf6acee54326a3</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3.i686.rpm</filename><sum type="sha256">8eb23223278e45af4cdd2d966e8c783ff309410165cf907203b824abc2e182fe</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.141-1.b16.el7_3.noarch.rpm</filename><sum type="sha256">67ce7550fcdaa0141e8835515adb79a28538a5ef1e705038b19001f686643825</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.141-1.b16.el7_3.x86_64.rpm</filename><sum type="sha256">58489f0e1cbddb23662e366caa07cf441709b24ef57b51bb63cbc52799eec32f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-headless-1.8.0.141-1.b16.el7_3.i686.rpm</filename><sum type="sha256">dbda39761de51abe8dcfc9bd719de60b2489d67f9e16b97359747390e743c75f</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-javadoc-1.8.0.141-1.b16.el7_3.noarch.rpm</filename><sum type="sha256">383b7b40ed70fd66fc34f86e2f4afb42e02dd0622ad631c57fa8649e0ad6e936</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.141-1.b16.el7_3.noarch.rpm</filename><sum type="sha256">4c574a1eacff945d316e9f30368adc6916df07d7a66be57a752dac82e72752a8</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-devel-1.8.0.141-1.b16.el7_3.x86_64.rpm</filename><sum type="sha256">21369ff1e1d6e331e8ce5c89b10cbaeb8333f11c53f9b0cd9f1bc7af613b2d02</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.141-1.b16.el7_3.x86_64.rpm</filename><sum type="sha256">3d9be50d9908e91fe4f86f33f28016e2f813d1ae08443a8ba05ab3cc67a1aae2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-accessibility-1.8.0.141-1.b16.el7_3.x86_64.rpm</filename><sum type="sha256">5dcf311694492a0c1107d266510ed33b56f5e55f961b0364f6d6ffb5391b9b71</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-demo-1.8.0.141-1.b16.el7_3.x86_64.rpm</filename><sum type="sha256">11ebc07fe0620182dd3f5d700d08b853028990faab3e05f40ec7f800ecdabf6a</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.i686.rpm</filename><sum type="sha256">d3e7442c8d85a0ee8e50c7b6bd175b6a9d830047c76651eb22c411542833bd5e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-src-1.8.0.141-1.b16.el7_3.x86_64.rpm</filename><sum type="sha256">5b018d37153a59a9b200cc1b134f2f4f760fcb12fa3f37c4124e598c17cd8708</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.b16.el7_3" src="java-1.8.0-openjdk-1.8.0.141-1.b16.el7_3.src.rpm" version="1.8.0.141"><filename>java-1.8.0-openjdk-src-debug-1.8.0.141-1.b16.el7_3.x86_64.rpm</filename><sum type="sha256">052d28a40660b064aa5869947de937ead7f47da989ab3bd9152bd793ec6650bb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053" id="CVE-2017-10053" title="Openjdk: Reading Of Unprocessed Image Data In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067" id="CVE-2017-10067" title="Openjdk: Jar Verifier Incorrect Handling Of " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074" id="CVE-2017-10074" title="Openjdk: Integer Overflows In Range Check Loop " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10078" id="CVE-2017-10078" title="Openjdk: Nashorn Incompletely Blocking Access " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081" id="CVE-2017-10081" title="Openjdk: Incorrect Bracket Processing In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087" id="CVE-2017-10087" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089" id="CVE-2017-10089" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090" id="CVE-2017-10090" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096" id="CVE-2017-10096" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101" id="CVE-2017-10101" title="Openjdk: Unrestricted Access To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102" id="CVE-2017-10102" title="Openjdk: Incorrect Handling Of References In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107" id="CVE-2017-10107" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108" id="CVE-2017-10108" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109" id="CVE-2017-10109" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110" id="CVE-2017-10110" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10111" id="CVE-2017-10111" title="Openjdk: Incorrect Range Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115" id="CVE-2017-10115" title="Openjdk: Dsa Implementation Timing Attack (Jce, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116" id="CVE-2017-10116" title="Openjdk: Ldapcertstore Following Referrals To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135" id="CVE-2017-10135" title="Openjdk: Pkcs#8 Implementation Timing Attack " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193" id="CVE-2017-10193" title="Openjdk: Incorrect Key Size Constraint Check " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198" id="CVE-2017-10198" title="Openjdk: Incorrect Enforcement Of Certificate " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1789" id="RHSA-2017:1789-1" title="Rhsa-2017:1789-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471266" id="1471266" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471270" id="1471270" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471517" id="1471517" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471521" id="1471521" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471523" id="1471523" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471526" id="1471526" title="Openjdk: Incorrect Range Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471527" id="1471527" title="Openjdk: Unrestricted Access To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471528" id="1471528" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471534" id="1471534" title="Openjdk: Integer Overflows In Range Check Loop " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471535" id="1471535" title="Openjdk: Jar Verifier Incorrect Handling Of " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471670" id="1471670" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471711" id="1471711" title="Openjdk: Incorrect Bracket Processing In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471715" id="1471715" title="Openjdk: Incorrect Key Size Constraint Check " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471738" id="1471738" title="Openjdk: Ldapcertstore Following Referrals To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471851" id="1471851" title="Openjdk: Dsa Implementation Timing Attack (Jce, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471871" id="1471871" title="Openjdk: Pkcs#8 Implementation Timing Attack " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471888" id="1471888" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471889" id="1471889" title="Openjdk: Reading Of Unprocessed Image Data In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471898" id="1471898" title="Openjdk: Nashorn Incompletely Blocking Access " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472320" id="1472320" title="Openjdk: Incorrect Enforcement Of Certificate " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472345" id="1472345" title="Openjdk: Incorrect Handling Of References In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1793-1</id><title>Graphite2</title><description>The following packages have been upgraded to a newer upstream version: graphite2 (1.3.10). 
Security Fix(es): 
* Various vulnerabilities have been discovered in Graphite2. An attacker able to trick an unsuspecting user into opening specially crafted font files in an application using Graphite2 could exploit these flaws to disclose potentially sensitive memory, cause an application crash, or, possibly, execute arbitrary code. (CVE-2017-7771, CVE-2017-7772, CVE-2017-7773, CVE-2017-7774, CVE-2017-7775, CVE-2017-7776, CVE-2017-7777, CVE-2017-7778)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-07-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="graphite2" release="1.el7_3" src="graphite2-1.3.10-1.el7_3.src.rpm" version="1.3.10"><filename>graphite2-1.3.10-1.el7_3.x86_64.rpm</filename><sum type="sha256">d4f4939aaa4e15757032a183091ef343efa37e138d79a3867c92786c754cc110</sum></package><package arch="x86_64" name="graphite2-devel" release="1.el7_3" src="graphite2-1.3.10-1.el7_3.src.rpm" version="1.3.10"><filename>graphite2-devel-1.3.10-1.el7_3.x86_64.rpm</filename><sum type="sha256">4026bc56312c5ed24304497bff6866e0deaff530e882cfc31b6629fc19454b1a</sum></package><package arch="i686" name="graphite2-devel" release="1.el7_3" src="graphite2-1.3.10-1.el7_3.src.rpm" version="1.3.10"><filename>graphite2-devel-1.3.10-1.el7_3.i686.rpm</filename><sum type="sha256">fb7d8854e1372a6c461127f9a17be26e0d217f7ab5fddd2aeee0a4848b4f5b40</sum></package><package arch="i686" name="graphite2" release="1.el7_3" src="graphite2-1.3.10-1.el7_3.src.rpm" version="1.3.10"><filename>graphite2-1.3.10-1.el7_3.i686.rpm</filename><sum type="sha256">775904c98e0fbc48923ca813e008829c83847722f57c2647791922dd6295bfca</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7771" id="CVE-2017-7771" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7772" id="CVE-2017-7772" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7773" id="CVE-2017-7773" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7774" id="CVE-2017-7774" title="Graphite2: Out Of Bounds Read " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7775" id="CVE-2017-7775" title="Graphite2: Assertion Error &quot;Size() &gt; N&quot;" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7776" id="CVE-2017-7776" title="Graphite2: Heap-Buffer-Overflow Read " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7777" id="CVE-2017-7777" title="Graphite2: Use Of Uninitialized Memory " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7778" id="CVE-2017-7778" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1793" id="RHSA-2017:1793-1" title="Rhsa-2017:1793-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461260" id="1461260" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472212" id="1472212" title="Graphite2: Out Of Bounds Read In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472213" id="1472213" title="Graphite2: Heap-Buffer-Overflow Write " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472215" id="1472215" title="Graphite2: Heap-Buffer-Overflow Write " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472219" id="1472219" title="Graphite2: Out Of Bounds Read " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472221" id="1472221" title="Graphite2: Assertion Error &quot;Size() &gt; N&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472223" id="1472223" title="Graphite2: Heap-Buffer-Overflow Read " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472225" id="1472225" title="Graphite2: Use Of Uninitialized Memory " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1809-1</id><title>Tomcat</title><description>Security Fix(es): 
* A vulnerability was discovered in the error page mechanism in Tomcat's DefaultServlet implementation. A crafted HTTP request could cause undesired side effects, possibly including the removal or replacement of the custom error page. (CVE-2017-5664) 
* A vulnerability was discovered in Tomcat. When running an untrusted application under a SecurityManager it was possible, under some circumstances, for that application to retain references to the request or response objects and thereby access and/or modify information associated with another web application. (CVE-2017-5648)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-07-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcat-lib" release="12.el7_3" src="tomcat-7.0.69-12.el7_3.src.rpm" version="7.0.69"><filename>tomcat-lib-7.0.69-12.el7_3.noarch.rpm</filename><sum type="sha256">550b4aa07d3609c6febed135365484f5d099325dc86b09dfa24589e804c82318</sum></package><package arch="noarch" name="tomcat-el-2.2-api" release="12.el7_3" src="tomcat-7.0.69-12.el7_3.src.rpm" version="7.0.69"><filename>tomcat-el-2.2-api-7.0.69-12.el7_3.noarch.rpm</filename><sum type="sha256">4dd64bbf1ed4b3579bcd2c63f0fcd625872d7c4c8ded0264cc207b280433206d</sum></package><package arch="noarch" name="tomcat-docs-webapp" release="12.el7_3" src="tomcat-7.0.69-12.el7_3.src.rpm" version="7.0.69"><filename>tomcat-docs-webapp-7.0.69-12.el7_3.noarch.rpm</filename><sum type="sha256">f9f4f7420f4767da0e8bb3dae3740410295a7fe223dca417093477b814b06855</sum></package><package arch="noarch" name="tomcat-javadoc" release="12.el7_3" src="tomcat-7.0.69-12.el7_3.src.rpm" version="7.0.69"><filename>tomcat-javadoc-7.0.69-12.el7_3.noarch.rpm</filename><sum type="sha256">ffe1df54ccb56a4a81137cc22a60f50fb6c0a8f91803d8b52a33ff7e3ee5b7fe</sum></package><package arch="noarch" name="tomcat" release="12.el7_3" src="tomcat-7.0.69-12.el7_3.src.rpm" version="7.0.69"><filename>tomcat-7.0.69-12.el7_3.noarch.rpm</filename><sum type="sha256">0d1d6663818b56bd0ec5d1d509fec284d824e274ad79160b709bfd2436d0a525</sum></package><package arch="noarch" name="tomcat-jsp-2.2-api" release="12.el7_3" src="tomcat-7.0.69-12.el7_3.src.rpm" version="7.0.69"><filename>tomcat-jsp-2.2-api-7.0.69-12.el7_3.noarch.rpm</filename><sum type="sha256">5978b93b6257bf03a3b8484fecde936383efac68fe97637d56be16cf5e434f0a</sum></package><package arch="noarch" name="tomcat-jsvc" release="12.el7_3" src="tomcat-7.0.69-12.el7_3.src.rpm" version="7.0.69"><filename>tomcat-jsvc-7.0.69-12.el7_3.noarch.rpm</filename><sum type="sha256">73a90b7f55d13582f7c961c84162a6c9dc1676109dbb04217d83b4753a143f93</sum></package><package arch="noarch" name="tomcat-servlet-3.0-api" release="12.el7_3" src="tomcat-7.0.69-12.el7_3.src.rpm" version="7.0.69"><filename>tomcat-servlet-3.0-api-7.0.69-12.el7_3.noarch.rpm</filename><sum type="sha256">196c16f3e435f7b390a9c02e8018a66855da84da1f03f62b1821e0e850a11d97</sum></package><package arch="noarch" name="tomcat-webapps" release="12.el7_3" src="tomcat-7.0.69-12.el7_3.src.rpm" version="7.0.69"><filename>tomcat-webapps-7.0.69-12.el7_3.noarch.rpm</filename><sum type="sha256">5ff8ed7772f2bb2856653f27d3715f16c956f344638900418d5a68a08683abc8</sum></package><package arch="noarch" name="tomcat-admin-webapps" release="12.el7_3" src="tomcat-7.0.69-12.el7_3.src.rpm" version="7.0.69"><filename>tomcat-admin-webapps-7.0.69-12.el7_3.noarch.rpm</filename><sum type="sha256">140fa1d57742c03fa64b0a483c7f3a890faffd82411fc1ba63685f94d65dab94</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5648" id="CVE-2017-5648" title="Tomcat: Calls To Application Listeners Did Not " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5664" id="CVE-2017-5664" title="Tomcat: Security Constrained Bypass In Error " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1809" id="RHSA-2017:1809-1" title="Rhsa-2017:1809-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1441223" id="1441223" title="Tomcat: Calls To Application Listeners Did Not " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1459158" id="1459158" title="Tomcat: Security Constrained Bypass In Error " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1842-1</id><title>Kernel</title><description>Security Fix(es): 
* An use-after-free flaw was found in the Linux kernel which enables a race condition in the L2TPv3 IP Encapsulation feature. A local user could use this flaw to escalate their privileges or crash the system. (CVE-2016-10200, Important) 
* A flaw was found that can be triggered in keyring_search_iterator in keyring.c if type-&gt;match is NULL. A local user could use this flaw to crash the system or, potentially, escalate their privileges. (CVE-2017-2647, Important) 
* It was found that the NFSv4 server in the Linux kernel did not properly validate layout type when processing NFSv4 pNFS LAYOUTGET and GETDEVICEINFO operands. A remote attacker could use this flaw to soft- lockup the system and thus cause denial of service. (CVE-2017-8797, Important) 
This update also fixes multiple Moderate and Low impact security issues: 
* CVE-2015-8839, CVE-2015-8970, CVE-2016-9576, CVE-2016-7042, CVE-2016-7097, CVE-2016-8645, CVE-2016-9576, CVE-2016-9588, CVE-2016-9806, CVE-2016-10088, CVE-2016-10147, CVE-2017-2596, CVE-2017-2671, CVE-2017-5970, CVE-2017-6001, CVE-2017-6951, CVE-2017-7187, CVE-2017-7616, CVE-2017-7889, CVE-2017-8890, CVE-2017-9074, CVE-2017-8890, CVE-2017-9075, CVE-2017-8890, CVE-2017-9076, CVE-2017-8890, CVE-2017-9077, CVE-2017-9242, CVE-2014-7970, CVE-2014-7975, CVE-2016-6213, CVE-2016-9604, CVE-2016-9685</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kmod-openafs-1.6-sl" release="1.SL74.el7" src="kmod-openafs-1.6-sl-1.6.21-1.SL74.el7.src.rpm" version="1.6.21"><filename>kmod-openafs-1.6-sl-1.6.21-1.SL74.el7.noarch.rpm</filename><sum type="sha256">3a24e0bec7ec7d2247373fcdf695a56c6aa984ef139769e36d983c68d65a77da</sum></package><package arch="x86_64" name="python-perf" release="693.el7" src="kernel-3.10.0-693.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-693.el7.x86_64.rpm</filename><sum type="sha256">c9d29f8f01b7085dd07d5288115e2f052c65adf214c87d07446761b49dc1fdaf</sum></package><package arch="x86_64" name="kernel-devel" release="693.el7" src="kernel-3.10.0-693.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-693.el7.x86_64.rpm</filename><sum type="sha256">a84d40305d301136c7cd48193cd72fe4596ff4c900728912feea17d67db4fad2</sum></package><package arch="x86_64" name="kernel-debug-devel" release="693.el7" src="kernel-3.10.0-693.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-693.el7.x86_64.rpm</filename><sum type="sha256">66da4e58cf6ad11fe5e4a9270e3e020037f78ae5393755fc4ba9677426af418a</sum></package><package arch="noarch" name="kernel-doc" release="693.el7" src="kernel-3.10.0-693.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-693.el7.noarch.rpm</filename><sum type="sha256">e5d8570ab48fe38245f5f2201dd58a96a03e6d188c6076b214ed843d9f1ee596</sum></package><package arch="x86_64" name="kernel-tools-libs" release="693.el7" src="kernel-3.10.0-693.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-693.el7.x86_64.rpm</filename><sum type="sha256">9737cf24dfd0cb8cd417f619ebb154273cf42436218f8dfdb62e44b695b689e9</sum></package><package arch="x86_64" name="kernel-headers" release="693.el7" src="kernel-3.10.0-693.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-693.el7.x86_64.rpm</filename><sum type="sha256">bf892199da35787b9a4c7d7e81ea41cddc31537ab328de32b7b1cabdd39780a4</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="693.el7" src="kernel-3.10.0-693.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-693.el7.noarch.rpm</filename><sum type="sha256">a0d253a53bd19cb7678b6eb894f82d8d43f663ba6f8904448837ea127328fa5a</sum></package><package arch="x86_64" name="kernel" release="693.el7" src="kernel-3.10.0-693.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-693.el7.x86_64.rpm</filename><sum type="sha256">63e4e84fdd4601c39184dcda9d042f159f17cc6e84ee0f50bbf88a4c78bf59ca</sum></package><package arch="x86_64" name="kernel-debug" release="693.el7" src="kernel-3.10.0-693.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-693.el7.x86_64.rpm</filename><sum type="sha256">9588d59b765b2b30ff75c541d1088db3d4908bdcb7d8575edcbf64c7c42bcd1d</sum></package><package arch="x86_64" name="kernel-tools" release="693.el7" src="kernel-3.10.0-693.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-693.el7.x86_64.rpm</filename><sum type="sha256">f2a77d889e5b2ae92fb541d0aa80e0945fabc700a67f1c208c318dd8a4c17d2f</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="693.el7" src="kernel-3.10.0-693.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-693.el7.x86_64.rpm</filename><sum type="sha256">065234648e337863787250367ffe241ddcffc3ecc119258f1af4cd2bc1c30e76</sum></package><package arch="x86_64" name="perf" release="693.el7" src="kernel-3.10.0-693.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-693.el7.x86_64.rpm</filename><sum type="sha256">acd53656f480929d9fcdec86aa8d9ba3cdfd5551cc2e9537624aff0efa2817f2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7970" id="CVE-2014-7970" title="Kernel: Fs: Vfs Denial Of Service" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7975" id="CVE-2014-7975" title="Kernel: Fs: Umount Denial Of Service" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8839" id="CVE-2015-8839" title="Kernel: Ext4 Filesystem Page Fault Race " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8970" id="CVE-2015-8970" title="Kernel: Crypto: Gpf In Lrw_Crypt Caused By " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10088" id="CVE-2016-10088" title="Kernel: Use After Free In Scsi Generic Device Interface (Cve-2016-9576 Regression)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10147" id="CVE-2016-10147" title="Kernel: Kernel Crash By Spawning Mcrypt(Alg) " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10200" id="CVE-2016-10200" title="Kernel: L2Tp: Race Condition In The L2Tpv3 Ip " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6213" id="CVE-2016-6213" title="Kernel: User Namespace: Unlimited Consumed Of " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7042" id="CVE-2016-7042" title="Kernel: Stack Corruption While Reading /Proc/Keys When Gcc Stack Protector Is Enabled" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7097" id="CVE-2016-7097" title="Kernel: Setting A Posix Acl Via Setxattr Doesn'T Clear The Setgid Bit" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8645" id="CVE-2016-8645" title="Kernel: A Bug() Statement Can Be Hit In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9576" id="CVE-2016-9576" title="Kernel: Use After Free In Scsi Generic Device Interface" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9588" id="CVE-2016-9588" title="Kernel: Kvm: Nvmx: Uncaught Software Exceptions " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9604" id="CVE-2016-9604" title="Kernel: Security: The Built-In Keyrings For " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9685" id="CVE-2016-9685" title="Kernel: Memory Leaks In Xfs_Attr_List.C Error Paths" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9806" id="CVE-2016-9806" title="Kernel: Netlink: Double-Free In Netlink_Dump" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2596" id="CVE-2017-2596" title="Kernel: Kvm: Page Reference Leakage In Handle_Vmon" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2647" id="CVE-2017-2647" title="Kernel: Null Pointer Dereference In Search_Keyring" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2671" id="CVE-2017-2671" title="Kernel: Ping Socket / Af_Llc Connect() " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5970" id="CVE-2017-5970" title="Kernel: Ipv4: Invalid Ip Options Could Cause " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6001" id="CVE-2017-6001" title="Kernel: Race Condition Between Multiple " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6951" id="CVE-2017-6951" title="Kernel: Null Pointer Dereference In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7187" id="CVE-2017-7187" title="Kernel: Scsi: Stack-Based Buffer Overflow In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7616" id="CVE-2017-7616" title="Kernel: Incorrect Error Handling In The " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7889" id="CVE-2017-7889" title="Kernel: Mm Subsystem Does Not Properly Enforce " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8797" id="CVE-2017-8797" title="Kernel: Nfsv4 Server Does Not Properly Validate " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8890" id="CVE-2017-8890" title="Kernel: Double Free In The Inet_Csk_Clone_Lock " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9074" id="CVE-2017-9074" title="Kernel: Net: Ipv6 Fragmentation Implementation " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9075" id="CVE-2017-9075" title="Kernel: Net: Sctp_V6_Create_Accept_Sk Function " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9076" id="CVE-2017-9076" title="Kernel: Net: Ipv6 Dccp Implementation Mishandles " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9077" id="CVE-2017-9077" title="Kernel: Net: Tcp_V6_Syn_Recv_Sock Function " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9242" id="CVE-2017-9242" title="Kernel: Incorrect Overwrite Check In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1842" id="RHSA-2017:1842-1" title="Rhsa-2017:1842-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151095" id="1151095" title="Kernel: Fs: Vfs Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151108" id="1151108" title="Kernel: Fs: Umount Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1178491" id="1178491" title="Intel_Rapl: No Valid Rapl Domains Found In Package 0&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1283257" id="1283257" title="[Rfe] Iommu Support In Vhost-Net" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1322495" id="1322495" title="Kernel: User Namespace: Unlimited Consumed Of " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1323577" id="1323577" title="Kernel: Ext4 Filesystem Page Fault Race " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330000" id="1330000" title="Kernel: Backport Getrandom System Call" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349647" id="1349647" title="Nfs Client May Keep Phantom Directory Entry In Dcache When " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1352741" id="1352741" title="Tx Array Support In Tun" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356471" id="1356471" title="Kernel: Overflowing Kernel Mount Table Using " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1368577" id="1368577" title="Kernel Crash After A Few Hours/Days With Nfs 4.1 And 4.2 Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1368938" id="1368938" title="Kernel: Setting A Posix Acl Via Setxattr Doesn'T Clear The Setgid Bit" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1371693" id="1371693" title="Processes On Nfs Client Have Very High Cpu Usage In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1371714" id="1371714" title="Btrfs Module Init Creates A Useless File In /Sys/Kernel/Debug " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1373966" id="1373966" title="Kernel: Stack Corruption While Reading /Proc/Keys When Gcc Stack Protector Is Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378656" id="1378656" title="[Llnl 7.4 Bug] Serious Performance Regression With Nated Ipoib " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1383739" id="1383739" title="Bug: Dentry Ffff880232Eeacc0{I=800Fe1,N=F290} Still In Use (1)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386286" id="1386286" title="Kernel: Crypto: Gpf In Lrw_Crypt Caused By " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1389433" id="1389433" title="Kernel: Security: The Built-In Keyrings For " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391299" id="1391299" title="[Llnl 7.4 Bug] Crash In Infiniband Rdmavt Layer When Kernel " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1393904" id="1393904" title="Kernel: A Bug() Statement Can Be Hit In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1394089" id="1394089" title="[Llnl 7.4 Bug] 7.3 Regression: The Kernel Does Not Create The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1395104" id="1395104" title="Pci 0000:Ff:1E.3: [Firmware Bug]: Reg 0X10: Invalid Bar (Can'T " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396578" id="1396578" title="Rfe: Backport Virtio-Net Multi-Queue Enablement By Default Patch" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396941" id="1396941" title="Kernel: Memory Leaks In Xfs_Attr_List.C Error Paths" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1399830" id="1399830" title="Gfs2: Fallocate Error Message During Gfs2_Grow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401433" id="1401433" title="Vhost Tx Batching" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401436" id="1401436" title="Lockless En-Queuing For Vhost" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401502" id="1401502" title="Kernel: Netlink: Double-Free In Netlink_Dump" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1403145" id="1403145" title="Kernel: Use After Free In Scsi Generic Device Interface" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404200" id="1404200" title="Kernel: Kernel Crash By Spawning Mcrypt(Alg) " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404924" id="1404924" title="Kernel: Kvm: Nvmx: Uncaught Software Exceptions " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1406885" id="1406885" title="Server Supports Labeled Nfs By Default" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1412210" id="1412210" title="Kernel: Use After Free In Scsi Generic Device Interface (Cve-2016-9576 Regression)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1412234" id="1412234" title="Extend Virtio-Net To Expose Host Mtu To Guest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1415780" id="1415780" title="File Permissions Are Not Getting Set As Expected On Nfs V4.0 Mount" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416532" id="1416532" title="Symlinks Removed And Replaced On An Nfs Mount From Another " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1417812" id="1417812" title="Kernel: Kvm: Page Reference Leakage In Handle_Vmon" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418962" id="1418962" title="Broken Net:[...] Instead Of Path For Net Namespaces In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1421638" id="1421638" title="Kernel: Ipv4: Invalid Ip Options Could Cause " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1422825" id="1422825" title="Kernel: Race Condition Between Multiple " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1424076" id="1424076" title="Vxlan: Performance Can Suffer Unless Gro Is Disabled On Vxlan " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1428353" id="1428353" title="Kernel: Null Pointer Dereference In Search_Keyring" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1428684" id="1428684" title="Rfe: Backport Of Icmp Ratelimit Fixes." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1428973" id="1428973" title="Panic: &quot;Kernel Bug At Fs/Ceph/Addr.C:91!&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1430225" id="1430225" title="Kernel: Fix Crash In Uio_Release" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1430347" id="1430347" title="Kernel: L2Tp: Race Condition In The L2Tpv3 Ip " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1433252" id="1433252" title="Kernel: Null Pointer Dereference In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1433831" id="1433831" title="Nvme Ssd Fails To Initialize On Aws I3.4Xlarge Instances" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434327" id="1434327" title="Kernel: Scsi: Stack-Based Buffer Overflow In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1436649" id="1436649" title="Kernel: Ping Socket / Af_Llc Connect() " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1441088" id="1441088" title="Kernel: Incorrect Error Handling In The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443999" id="1443999" title="Deadlock In Reshape On Single Core Machine" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1444493" id="1444493" title="Kernel: Mm Subsystem Does Not Properly Enforce " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1445054" id="1445054" title="Setting Ipv6.Disable=1 Prevents Both Ipv4 And Ipv6 Socket " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448312" id="1448312" title="Kernel Panics In Mce_Register_Decode_Chain When Booted On Qemu" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1450203" id="1450203" title="Irrelevant Upper Layer Protocol Traffic May Erroneously " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1450972" id="1450972" title="Kernel: Double Free In The Inet_Csk_Clone_Lock " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452679" id="1452679" title="Kernel: Net: Ipv6 Fragmentation Implementation " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452688" id="1452688" title="Kernel: Net: Ipv6 Dccp Implementation Mishandles " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452691" id="1452691" title="Kernel: Net: Sctp_V6_Create_Accept_Sk Function " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452744" id="1452744" title="Kernel: Net: Tcp_V6_Syn_Recv_Sock Function " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1456388" id="1456388" title="Kernel: Incorrect Overwrite Check In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1463241" id="1463241" title="Rlimit_Stack Problems After Update To 3.10.0-514.21.2.El7, And " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1466329" id="1466329" title="Kernel: Nfsv4 Server Does Not Properly Validate " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1852-1</id><title>Openldap</title><description>The following packages have been upgraded to a later upstream version: openldap (2.4.44). 
Security Fix(es): 
* A double-free flaw was found in the way OpenLDAP's slapd server using the MDB backend handled LDAP searches. A remote attacker with access to search the directory could potentially use this flaw to crash slapd by issuing a specially crafted LDAP search query. (CVE-2017-9287)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="openldap" release="5.el7" src="openldap-2.4.44-5.el7.src.rpm" version="2.4.44"><filename>openldap-2.4.44-5.el7.i686.rpm</filename><sum type="sha256">dd060a5f24fe6f93a5659098e27b1324c7f67b3f5221abc41951c19429e793f9</sum></package><package arch="x86_64" name="openldap-clients" release="5.el7" src="openldap-2.4.44-5.el7.src.rpm" version="2.4.44"><filename>openldap-clients-2.4.44-5.el7.x86_64.rpm</filename><sum type="sha256">9672be2e26f1e4a6292a38cd819a900851885168e7dfa9e205d37ef3ed55d7eb</sum></package><package arch="x86_64" name="openldap-devel" release="5.el7" src="openldap-2.4.44-5.el7.src.rpm" version="2.4.44"><filename>openldap-devel-2.4.44-5.el7.x86_64.rpm</filename><sum type="sha256">993d52dbbbeb65297845df0fa4e4c811c5b8ba526712d7fc4a62bfa3f1068d9f</sum></package><package arch="i686" name="openldap-devel" release="5.el7" src="openldap-2.4.44-5.el7.src.rpm" version="2.4.44"><filename>openldap-devel-2.4.44-5.el7.i686.rpm</filename><sum type="sha256">f273e286f55bf2ba37178cacc6fd4722e796517a86483b09cf08f6542bcf464d</sum></package><package arch="x86_64" name="openldap" release="5.el7" src="openldap-2.4.44-5.el7.src.rpm" version="2.4.44"><filename>openldap-2.4.44-5.el7.x86_64.rpm</filename><sum type="sha256">de2e0894cad46e64bc3faed1fe29e33e357d80e02a07c577abb60577da378b57</sum></package><package arch="x86_64" name="openldap-servers" release="5.el7" src="openldap-2.4.44-5.el7.src.rpm" version="2.4.44"><filename>openldap-servers-2.4.44-5.el7.x86_64.rpm</filename><sum type="sha256">8b936cfd265a8fb5990048808ef152c6775c63ef074fbfcc674519415e7f0189</sum></package><package arch="x86_64" name="openldap-servers-sql" release="5.el7" src="openldap-2.4.44-5.el7.src.rpm" version="2.4.44"><filename>openldap-servers-sql-2.4.44-5.el7.x86_64.rpm</filename><sum type="sha256">8dc4c9f8f29ecce73ee874934fea17ccd19a8e0699ffec71aef8df70d25b6fab</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9287" id="CVE-2017-9287" title="Openldap: Double Free Vulnerability In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1852" id="RHSA-2017:1852-1" title="Rhsa-2017:1852-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1405354" id="1405354" title="[Rhel7] Openldap Does Not Re-Register Nss Shutdown Callbacks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1432907" id="1432907" title="Cipher Suite Mismatch With Latest Nss" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1456712" id="1456712" title="Openldap: Double Free Vulnerability In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1854-1</id><title>Pidgin</title><description>The following packages have been upgraded to a later upstream version: pidgin (2.10.11). 
Security Fix(es): 
* A denial of service flaw was found in the way Pidgin's Mxit plug-in handled emoticons. A malicious remote server or a man-in-the-middle attacker could potentially use this flaw to crash Pidgin by sending a specially crafted emoticon. (CVE-2014-3695) 
* A denial of service flaw was found in the way Pidgin parsed Groupwise server messages. A malicious remote server or a man-in-the-middle attacker could potentially use this flaw to cause Pidgin to consume an excessive amount of memory, possibly leading to a crash, by sending a specially crafted message. (CVE-2014-3696) 
* An information disclosure flaw was discovered in the way Pidgin parsed XMPP messages. A malicious remote server or a man-in-the-middle attacker could potentially use this flaw to disclose a portion of memory belonging to the Pidgin process by sending a specially crafted XMPP message. (CVE-2014-3698) 
* An out-of-bounds write flaw was found in the way Pidgin processed XML content. A malicious remote server could potentially use this flaw to crash Pidgin or execute arbitrary code in the context of the pidgin process. (CVE-2017-2640) 
* It was found that Pidgin's SSL/TLS plug-ins had a flaw in the certificate validation functionality. An attacker could use this flaw to create a fake certificate, that Pidgin would trust, which could be used to conduct man-in-the-middle attacks against Pidgin. (CVE-2014-3694)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libpurple-devel" release="5.el7" src="pidgin-2.10.11-5.el7.src.rpm" version="2.10.11"><filename>libpurple-devel-2.10.11-5.el7.i686.rpm</filename><sum type="sha256">dfb6809ac9dfb6b753992d8b402dff9da44234090e838bc1d9eb2b4ea5c2d5c9</sum></package><package arch="x86_64" name="libpurple-perl" release="5.el7" src="pidgin-2.10.11-5.el7.src.rpm" version="2.10.11"><filename>libpurple-perl-2.10.11-5.el7.x86_64.rpm</filename><sum type="sha256">4744d8745878cda3ae64dce92b7c32400e520a97e592b9676f6296350b103fc5</sum></package><package arch="x86_64" name="libpurple-devel" release="5.el7" src="pidgin-2.10.11-5.el7.src.rpm" version="2.10.11"><filename>libpurple-devel-2.10.11-5.el7.x86_64.rpm</filename><sum type="sha256">70684e805bb32513c6c01c77882a9fb9a810ee94641cc07a1f6abe8d8fdd65e5</sum></package><package arch="x86_64" name="finch-devel" release="5.el7" src="pidgin-2.10.11-5.el7.src.rpm" version="2.10.11"><filename>finch-devel-2.10.11-5.el7.x86_64.rpm</filename><sum type="sha256">8dcbda2c6b568bae3b7c2b58208841047cb162c80d0f4a94c6bd2591e56bca62</sum></package><package arch="x86_64" name="pidgin-devel" release="5.el7" src="pidgin-2.10.11-5.el7.src.rpm" version="2.10.11"><filename>pidgin-devel-2.10.11-5.el7.x86_64.rpm</filename><sum type="sha256">f619fa951890cb5fda40d8a86546c27745279d97e72a2d5b33f5698fe4faa24a</sum></package><package arch="x86_64" name="finch" release="5.el7" src="pidgin-2.10.11-5.el7.src.rpm" version="2.10.11"><filename>finch-2.10.11-5.el7.x86_64.rpm</filename><sum type="sha256">db58af66b6e5a0bf63640c9df755944a184dd167e7ead1d7525458f4907fff77</sum></package><package arch="i686" name="libpurple" release="5.el7" src="pidgin-2.10.11-5.el7.src.rpm" version="2.10.11"><filename>libpurple-2.10.11-5.el7.i686.rpm</filename><sum type="sha256">590f2bef9db2266145986068e64e7f8953ca2b56e4e26f98381633ab78fc886b</sum></package><package arch="x86_64" name="libpurple-tcl" release="5.el7" src="pidgin-2.10.11-5.el7.src.rpm" version="2.10.11"><filename>libpurple-tcl-2.10.11-5.el7.x86_64.rpm</filename><sum type="sha256">88481b1f7082aa674f6be20f354875e20b6e275d4591bd7829076a9d0f024423</sum></package><package arch="x86_64" name="pidgin" release="5.el7" src="pidgin-2.10.11-5.el7.src.rpm" version="2.10.11"><filename>pidgin-2.10.11-5.el7.x86_64.rpm</filename><sum type="sha256">92093b7794155b5e324aa05e670564e0efe63641b67f18a1d3e6628958b893ae</sum></package><package arch="i686" name="finch-devel" release="5.el7" src="pidgin-2.10.11-5.el7.src.rpm" version="2.10.11"><filename>finch-devel-2.10.11-5.el7.i686.rpm</filename><sum type="sha256">4d8c5e7a5efa0ecf2b155a1c211880398336a0c57d9ca1dd117280453bf64153</sum></package><package arch="x86_64" name="pidgin-perl" release="5.el7" src="pidgin-2.10.11-5.el7.src.rpm" version="2.10.11"><filename>pidgin-perl-2.10.11-5.el7.x86_64.rpm</filename><sum type="sha256">e44bc731c22568ce97c1dd8fa6289a4011aa59e2fec9f01654c3a0a9d4ca11e9</sum></package><package arch="x86_64" name="libpurple" release="5.el7" src="pidgin-2.10.11-5.el7.src.rpm" version="2.10.11"><filename>libpurple-2.10.11-5.el7.x86_64.rpm</filename><sum type="sha256">cfaca54a249b6cbe831def5309f5f2485b5bde2b9cf21bd7582b50f8fb76d0d9</sum></package><package arch="i686" name="pidgin-devel" release="5.el7" src="pidgin-2.10.11-5.el7.src.rpm" version="2.10.11"><filename>pidgin-devel-2.10.11-5.el7.i686.rpm</filename><sum type="sha256">e0660ce137c59487d4db762d466b52b344c80f36ee0e03f8c835cafc16724556</sum></package><package arch="i686" name="finch" release="5.el7" src="pidgin-2.10.11-5.el7.src.rpm" version="2.10.11"><filename>finch-2.10.11-5.el7.i686.rpm</filename><sum type="sha256">e105846947e184c72bbb75563286de2497ac8e2667faec546c14ac29058ef36c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3694" id="CVE-2014-3694" title="Pidgin: Ssl/Tls Plug-Ins Failed To Check Basic " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3695" id="CVE-2014-3695" title="Pidgin: Crash In Mxit Protocol Plug-In" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3696" id="CVE-2014-3696" title="Pidgin: Denial Of Service Parsing Groupwise " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3698" id="CVE-2014-3698" title="Pidgin: Remote Information Leak Via Crafted Xmpp " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2640" id="CVE-2017-2640" title="Pidgin: Out-Of-Bounds Write In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1854" id="RHSA-2017:1854-1" title="Rhsa-2017:1854-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154908" id="1154908" title="Pidgin: Ssl/Tls Plug-Ins Failed To Check Basic " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154909" id="1154909" title="Pidgin: Crash In Mxit Protocol Plug-In" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154910" id="1154910" title="Pidgin: Denial Of Service Parsing Groupwise " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1154911" id="1154911" title="Pidgin: Remote Information Leak Via Crafted Xmpp " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369526" id="1369526" title="Rebase Pidgin To A Newer Upstream Release" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1430019" id="1430019" title="Pidgin: Out-Of-Bounds Write In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1439296" id="1439296" title="Disable Mxit" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1445921" id="1445921" title="Jingle_Rtp_Initiate_Media: 'Resource' Is Used After Being " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1446368" id="1446368" title="Silence -Wsign-Compare" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1856-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* An out-of-bounds memory access issue was found in Quick Emulator (QEMU) in the VNC display driver. This flaw could occur while refreshing the VNC display surface area in the 'vnc_refresh_server_surface'. A user inside a guest could use this flaw to crash the QEMU process. (CVE-2017-2633) 
* An integer overflow flaw was found in Quick Emulator (QEMU) in the CCID Card device support. The flaw could occur while passing messages via command/response packets to and from the host. A privileged user inside a guest could use this flaw to crash the QEMU process. (CVE-2017-5898) 
* An information exposure flaw was found in Quick Emulator (QEMU) in Task Priority Register (TPR) optimizations for 32-bit Windows guests. The flaw could occur while accessing TPR. A privileged user inside a guest could use this issue to read portions of the host memory. (CVE-2016-4020)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm" release="141.el7" src="qemu-kvm-1.5.3-141.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-141.el7.x86_64.rpm</filename><sum type="sha256">0df2bf73b1ea1a61fef6195fc44f0e7a2f5f333c181b1c498cbf313844ee27f6</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="141.el7" src="qemu-kvm-1.5.3-141.el7.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-141.el7.x86_64.rpm</filename><sum type="sha256">2b17f41c7b74cc839c126bade3b9887e3a4ed405355067f6cc6589f6438ae441</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="141.el7" src="qemu-kvm-1.5.3-141.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-141.el7.x86_64.rpm</filename><sum type="sha256">def4e4d3a0d5285856625d09d62cddfe76ccaa1f402e524f111caec8db2cfbed</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="141.el7" src="qemu-kvm-1.5.3-141.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-141.el7.x86_64.rpm</filename><sum type="sha256">6c6f2d5e5783f945054a9520cdb1312f168e6d5168d59adc201115be2f4504b5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4020" id="CVE-2016-4020" title="Qemu: I386: Leakage Of Stack Memory To Guest In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2633" id="CVE-2017-2633" title="Qemu-Kvm Coredump In Vnc_Refresh_Server_Surface " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5898" id="CVE-2017-5898" title="Qemu: Usb: Integer Overflow In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1856" id="RHSA-2017:1856-1" title="Rhsa-2017:1856-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1151859" id="1151859" title="[Rfe] Allow The Libgfapi Logging Level To Be Controlled." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1299875" id="1299875" title="System_Reset Should Clear Pending Request For Error (Ide)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1313686" id="1313686" title="Qemu: I386: Leakage Of Stack Memory To Guest In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1342489" id="1342489" title="Flickering Fedora 24 Login Screen On Rhel 7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1361488" id="1361488" title="System_Reset Should Clear Pending Request For Error (Virtio-Blk)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1375507" id="1375507" title="&quot;Threads&quot; Option Is Overwritten If Both &quot;Sockets&quot; And &quot;Cores&quot; " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377087" id="1377087" title="Shutdown Rhel 5.11 Guest Failed And Stop At &quot;System Halted&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378541" id="1378541" title="Qemu: Update Package Summary And Description" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1419699" id="1419699" title="Qemu: Usb: Integer Overflow In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1419898" id="1419898" title="Documentation Inaccurate For __Com.Redhat_Qxl_Screendump And " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1425939" id="1425939" title="Qemu: Vnc: Memory Corruption Due To Unchecked " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1427176" id="1427176" title="Test Cases Of Qemu-Iotests Failed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1430606" id="1430606" title="Can'T Build Qemu-Kvm With Newer Spice Packages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1433920" id="1433920" title="Switch From Librdmacm-Devel To Rdma-Core-Devel" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1436280" id="1436280" title="Sample Images  For Qemu-Iotests Are Missing In The Srpm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1440987" id="1440987" title="Remove Texi2Html Build Dependancy From Rpm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1441778" id="1441778" title="Stop Building Qemu-Img For 32Bit Architectures." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1451470" id="1451470" title="Rhel 7.2 Based Vm (Virtual Machine) Hung For Several Hours " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452067" id="1452067" title="Migration Can Confuse Serial Port User" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1456983" id="1456983" title="Character Device Regression Due To Missing Patch" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1859-1</id><title>Golang</title><description>The following packages have been upgraded to a later upstream version: golang (1.8.3). 
Security Fix(es): 
* A carry propagation flaw was found in the implementation of the P-256 elliptic curve in golang. An attacker could possibly use this flaw to extract private keys when static ECDH was used. (CVE-2017-8932)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="golang" release="1.el7" src="golang-1.8.3-1.el7.src.rpm" version="1.8.3"><filename>golang-1.8.3-1.el7.x86_64.rpm</filename><sum type="sha256">80216240791953f80c44aebada0ea7b86f9bad5a3dca69e09511bd81eefe074a</sum></package><package arch="noarch" name="golang-misc" release="1.el7" src="golang-1.8.3-1.el7.src.rpm" version="1.8.3"><filename>golang-misc-1.8.3-1.el7.noarch.rpm</filename><sum type="sha256">125ea33613817fb99893298f8327fa94a852c122b8d1695fdabaf962a50bfacc</sum></package><package arch="noarch" name="golang-src" release="1.el7" src="golang-1.8.3-1.el7.src.rpm" version="1.8.3"><filename>golang-src-1.8.3-1.el7.noarch.rpm</filename><sum type="sha256">62cdcde7fc9704e277505573fa651d32de143f4f9e1c42656126f44d721bce31</sum></package><package arch="noarch" name="golang-tests" release="1.el7" src="golang-1.8.3-1.el7.src.rpm" version="1.8.3"><filename>golang-tests-1.8.3-1.el7.noarch.rpm</filename><sum type="sha256">48e4d8883dcdae0f93d35f403c48be36e941508e2c7b1b194b65ccae8f5d1aa6</sum></package><package arch="noarch" name="golang-docs" release="1.el7" src="golang-1.8.3-1.el7.src.rpm" version="1.8.3"><filename>golang-docs-1.8.3-1.el7.noarch.rpm</filename><sum type="sha256">1b1b66918067db0ff700f8cad78691521a8c71388326f09efe444f9727c2a7c6</sum></package><package arch="x86_64" name="golang-bin" release="1.el7" src="golang-1.8.3-1.el7.src.rpm" version="1.8.3"><filename>golang-bin-1.8.3-1.el7.x86_64.rpm</filename><sum type="sha256">8a168e799487a3ac4e6a86d1562a2053561c3ee423842d852b11275fe4d8f96e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8932" id="CVE-2017-8932" title="Golang: Elliptic Curves Carry Propagation Issue " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1859" id="RHSA-2017:1859-1" title="Rhsa-2017:1859-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1381593" id="1381593" title="Runtime: Backport 'Fix Nanotime For Macos Sierra, Again' To Go " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1405587" id="1405587" title="Build Golang For Ppc64Le And S390X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1444122" id="1444122" title="Codegen Bug For Uint64 Type On S390X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452241" id="1452241" title="All Golang Versions Prior To 1.9 Do Not Support Oids That " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452616" id="1452616" title="Golang 1.8 Performance Regression In Net/Http Affecting " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1455189" id="1455189" title="Golang: Elliptic Curves Carry Propagation Issue " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1860-1</id><title>Libtasn1</title><description>The following packages have been upgraded to a later upstream version: libtasn1 (4.10). 
Security Fix(es): 
* A heap-based buffer overflow flaw was found in the way the libtasn1 library decoded certain DER-encoded inputs. A specially crafted DER- encoded input could cause an application using libtasn1 to perform an invalid read, causing the application to crash. (CVE-2015-3622) 
* A stack-based buffer overflow was found in the way libtasn1 decoded certain DER encoded data. An attacker could use this flaw to crash an application using the libtasn1 library. (CVE-2015-2806)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libtasn1-tools" release="1.el7" src="libtasn1-4.10-1.el7.src.rpm" version="4.10"><filename>libtasn1-tools-4.10-1.el7.x86_64.rpm</filename><sum type="sha256">4f90fc66dc36e410ee25675ea4b0632c73ad5ae880609474248666a55980fc9a</sum></package><package arch="x86_64" name="libtasn1" release="1.el7" src="libtasn1-4.10-1.el7.src.rpm" version="4.10"><filename>libtasn1-4.10-1.el7.x86_64.rpm</filename><sum type="sha256">1183d76eed940dac9c97a10187acbe4503b06a84e03d1c2b6aa6fa1783abad9d</sum></package><package arch="x86_64" name="libtasn1-devel" release="1.el7" src="libtasn1-4.10-1.el7.src.rpm" version="4.10"><filename>libtasn1-devel-4.10-1.el7.x86_64.rpm</filename><sum type="sha256">889ff835fd9cdc54726951666910004e0a5b66dd7cbaf7b17c60395439cb3153</sum></package><package arch="i686" name="libtasn1-devel" release="1.el7" src="libtasn1-4.10-1.el7.src.rpm" version="4.10"><filename>libtasn1-devel-4.10-1.el7.i686.rpm</filename><sum type="sha256">34aeed992980659f5439da4b38cb4dca1b50bebc956074e08ba3d65af68a1713</sum></package><package arch="i686" name="libtasn1" release="1.el7" src="libtasn1-4.10-1.el7.src.rpm" version="4.10"><filename>libtasn1-4.10-1.el7.i686.rpm</filename><sum type="sha256">343c7557e8eee24de879227694bfa27b9975eb47791f88736607fe502a1a5cd0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2806" id="CVE-2015-2806" title="Libtasn1: Stack Overflow In Asn1_Der_Decoding" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3622" id="CVE-2015-3622" title="Libtasn1: Heap Overflow Flaw In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1860" id="RHSA-2017:1860-1" title="Rhsa-2017:1860-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1207192" id="1207192" title="Libtasn1: Stack Overflow In Asn1_Der_Decoding" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1218141" id="1218141" title="Libtasn1: Heap Overflow Flaw In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1360639" id="1360639" title="Update To Libtasn1 4.X Branch" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1865-1</id><title>X.Org X11 Libraries</title><description>The following packages have been upgraded to a later upstream version: libX11 (1.6.5), libXaw (1.0.13), libXdmcp (1.1.2), libXfixes (5.0.3), libXfont (1.5.2), libXi (1.7.9), libXpm (3.5.12), libXrandr (1.5.1), libXrender (0.9.10), libXt (1.1.5), libXtst (1.2.3), libXv (1.0.11), libXvMC (1.0.10), libXxf86vm (1.1.4), libdrm (2.4.74), libepoxy (1.3.1), libevdev (1.5.6), libfontenc (1.1.3), libvdpau (1.1.1), libwacom (0.24), libxcb (1.12), libxkbfile (1.0.9), mesa (17.0.1), mesa-private-llvm (3.9.1), xcb-proto (1.12), xkeyboard-config (2.20), xorg-x11-proto-devel (7.7). 
Security Fix(es): 
* An integer overflow flaw leading to a heap-based buffer overflow was found in libXpm. An attacker could use this flaw to crash an application using libXpm via a specially crafted XPM file. (CVE-2016-10164) 
* It was discovered that libXdmcp used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions. (CVE-2017-2625) 
* It was discovered that libICE used a weak entropy to generate keys. A local attacker could potentially use this flaw for session hijacking using the information available from the process list. (CVE-2017-2626)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="libX11-common" release="1.el7" src="libX11-1.6.5-1.el7.src.rpm" version="1.6.5"><filename>libX11-common-1.6.5-1.el7.noarch.rpm</filename><sum type="sha256">5485845faff93db901750b57cd67da4d1a5119ffbe6315fafa044e719b528037</sum></package><package arch="noarch" name="vulkan-filesystem" release="2.el7" src="vulkan-1.0.39.1-2.el7.src.rpm" version="1.0.39.1"><filename>vulkan-filesystem-1.0.39.1-2.el7.noarch.rpm</filename><sum type="sha256">132bfe1fa43e8b2f02e338c4335aa5f2360ac37bc6c3e2e60bfe8531e16cf909</sum></package><package arch="x86_64" name="libevdev-utils" release="1.el7" src="libevdev-1.5.6-1.el7.src.rpm" version="1.5.6"><filename>libevdev-utils-1.5.6-1.el7.x86_64.rpm</filename><sum type="sha256">f545686f5a6a85b11780989ee3483cea744233d50f8ea22b9f167c1b29846231</sum></package><package arch="x86_64" name="libXt-devel" release="3.el7" src="libXt-1.1.5-3.el7.src.rpm" version="1.1.5"><filename>libXt-devel-1.1.5-3.el7.x86_64.rpm</filename><sum type="sha256">a0a857bedd0e53d9b8999b5ed3b683d647b2816b6ce8ba6033aaa65da3f0857d</sum></package><package arch="x86_64" name="libXpm-devel" release="1.el7" src="libXpm-3.5.12-1.el7.src.rpm" version="3.5.12"><filename>libXpm-devel-3.5.12-1.el7.x86_64.rpm</filename><sum type="sha256">23a21952eef977589f14af2c7be12a231794692d0e9b73fea18fa58fc1e0e159</sum></package><package arch="x86_64" name="libXtst" release="1.el7" src="libXtst-1.2.3-1.el7.src.rpm" version="1.2.3"><filename>libXtst-1.2.3-1.el7.x86_64.rpm</filename><sum type="sha256">983086e558cb6224a004adfbe427423b7d62c2eb003010ad15accd3938d6193e</sum></package><package arch="i686" name="mesa-libxatracker" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libxatracker-17.0.1-6.20170307.el7.i686.rpm</filename><sum type="sha256">a10e8acb7c0353cef04206d482ea69b5e5a10b6ea09c4fa2593cba19a68c6da3</sum></package><package arch="noarch" name="libwacom-data" release="1.el7" src="libwacom-0.24-1.el7.src.rpm" version="0.24"><filename>libwacom-data-0.24-1.el7.noarch.rpm</filename><sum type="sha256">b20341619309f2a5e1d8f4108ce085f6f1a7bfaac6801d13fc79cbd9c404d790</sum></package><package arch="x86_64" name="libXfont2-devel" release="2.el7" src="libXfont2-2.0.1-2.el7.src.rpm" version="2.0.1"><filename>libXfont2-devel-2.0.1-2.el7.x86_64.rpm</filename><sum type="sha256">fc1bebf889327e559832baeacc9569946c3ef410ddd550def3da7303f3a3772a</sum></package><package arch="x86_64" name="libX11-devel" release="1.el7" src="libX11-1.6.5-1.el7.src.rpm" version="1.6.5"><filename>libX11-devel-1.6.5-1.el7.x86_64.rpm</filename><sum type="sha256">1e98976b2c043e16c0da59a017e83bf7edfe295544a9cf9ba139bef457aa2a99</sum></package><package arch="x86_64" name="libXdmcp-devel" release="6.el7" src="libXdmcp-1.1.2-6.el7.src.rpm" version="1.1.2"><filename>libXdmcp-devel-1.1.2-6.el7.x86_64.rpm</filename><sum type="sha256">f3e01ac9dfd4c8d1d805d1373806695883676a549a33cfdd5d04e163b2dfbda0</sum></package><package arch="i686" name="mesa-libxatracker-devel" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libxatracker-devel-17.0.1-6.20170307.el7.i686.rpm</filename><sum type="sha256">3214ad690a193bc2caa50dd61690c880cfbe914a82d0c9c80d921055772cd95b</sum></package><package arch="i686" name="libxkbcommon-x11-devel" release="1.el7" src="libxkbcommon-0.7.1-1.el7.src.rpm" version="0.7.1"><filename>libxkbcommon-x11-devel-0.7.1-1.el7.i686.rpm</filename><sum type="sha256">c2b2cb2bc362f2c38e582326c966142b88b66c5dff2ae5a2b430b0995ce25fb6</sum></package><package arch="i686" name="libxkbcommon-devel" release="1.el7" src="libxkbcommon-0.7.1-1.el7.src.rpm" version="0.7.1"><filename>libxkbcommon-devel-0.7.1-1.el7.i686.rpm</filename><sum type="sha256">1a38769a32b4e5467a8f75337a024beab1b0cf577e2ac813b44196f53887eb31</sum></package><package arch="x86_64" name="libvdpau-devel" release="3.el7" src="libvdpau-1.1.1-3.el7.src.rpm" version="1.1.1"><filename>libvdpau-devel-1.1.1-3.el7.x86_64.rpm</filename><sum type="sha256">6154695823f45c608ad67555c66d0a80a730bbdc5c71ea477bea59e6185c30a4</sum></package><package arch="i686" name="libXt" release="3.el7" src="libXt-1.1.5-3.el7.src.rpm" version="1.1.5"><filename>libXt-1.1.5-3.el7.i686.rpm</filename><sum type="sha256">d9863e79b577d12bf103ddad73a3b4366dabdb0a1de8daa44ce5a7f57c722d99</sum></package><package arch="i686" name="libdrm-devel" release="1.el7" src="libdrm-2.4.74-1.el7.src.rpm" version="2.4.74"><filename>libdrm-devel-2.4.74-1.el7.i686.rpm</filename><sum type="sha256">f0f3bb4b3bbb8d881fcaad006abbdc327436b217b1825d92812935b24c9b366d</sum></package><package arch="x86_64" name="libxkbcommon-x11" release="1.el7" src="libxkbcommon-0.7.1-1.el7.src.rpm" version="0.7.1"><filename>libxkbcommon-x11-0.7.1-1.el7.x86_64.rpm</filename><sum type="sha256">43dec5780e26a7bf1b605b28ca36a327313eb2f91e7f7d672a9ae3f0d226b60c</sum></package><package arch="noarch" name="xkeyboard-config" release="1.el7" src="xkeyboard-config-2.20-1.el7.src.rpm" version="2.20"><filename>xkeyboard-config-2.20-1.el7.noarch.rpm</filename><sum type="sha256">efc5024a7e095b3f5aa194d3aad51deb6c98b9c0fe195dc167e63d2f65e62b63</sum></package><package arch="x86_64" name="libfontenc-devel" release="3.el7" src="libfontenc-1.1.3-3.el7.src.rpm" version="1.1.3"><filename>libfontenc-devel-1.1.3-3.el7.x86_64.rpm</filename><sum type="sha256">303a4e07f0e53c6cdd895cfed91708c01c0257c88498dd1c1107d9eddf52f2b2</sum></package><package arch="i686" name="libICE-devel" release="9.el7" src="libICE-1.0.9-9.el7.src.rpm" version="1.0.9"><filename>libICE-devel-1.0.9-9.el7.i686.rpm</filename><sum type="sha256">30d43c294774ebb1cb9c39f149dabaed128d1162d5dea325bdc59e9789098d49</sum></package><package arch="i686" name="libXrandr-devel" release="2.el7" src="libXrandr-1.5.1-2.el7.src.rpm" version="1.5.1"><filename>libXrandr-devel-1.5.1-2.el7.i686.rpm</filename><sum type="sha256">7ef0506eed7c5af638716ef57644955dc50f312e2bbecfad448b15a0dd926784</sum></package><package arch="noarch" name="xorg-x11-proto-devel" release="20.el7" src="xorg-x11-proto-devel-7.7-20.el7.src.rpm" version="7.7"><filename>xorg-x11-proto-devel-7.7-20.el7.noarch.rpm</filename><sum type="sha256">8122dedb7729974661b2b0d6d6383329b77680c3d796ba5f6d4666d5905a8688</sum></package><package arch="x86_64" name="libXrandr-devel" release="2.el7" src="libXrandr-1.5.1-2.el7.src.rpm" version="1.5.1"><filename>libXrandr-devel-1.5.1-2.el7.x86_64.rpm</filename><sum type="sha256">c026b1786ac4405a47895390e005118bebad750accb7b22c0e8ceaeae63d6a27</sum></package><package arch="x86_64" name="libxkbfile-devel" release="3.el7" src="libxkbfile-1.0.9-3.el7.src.rpm" version="1.0.9"><filename>libxkbfile-devel-1.0.9-3.el7.x86_64.rpm</filename><sum type="sha256">db06c16c2cc890f7664b82cd88f5e46d8a094f2b3f01a41a8bfa8b3e86cfbc42</sum></package><package arch="i686" name="mesa-filesystem" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-filesystem-17.0.1-6.20170307.el7.i686.rpm</filename><sum type="sha256">692ae36a386562fd9b5c00acfaedcd0dffec60d4f4593397938d76afad26fd43</sum></package><package arch="i686" name="mesa-libGL" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libGL-17.0.1-6.20170307.el7.i686.rpm</filename><sum type="sha256">50b279834a0572e96e9683009491d53768a780ab05f55b2ed5613e84f6b404db</sum></package><package arch="x86_64" name="mesa-libglapi" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libglapi-17.0.1-6.20170307.el7.x86_64.rpm</filename><sum type="sha256">f7ac81b38dc5832b75f6f1bca460ad7fb96f3332abce5165b49f7c3d872e6735</sum></package><package arch="i686" name="libXaw" release="4.el7" src="libXaw-1.0.13-4.el7.src.rpm" version="1.0.13"><filename>libXaw-1.0.13-4.el7.i686.rpm</filename><sum type="sha256">11ddb50847433bbdcc96a7349089c5794f4dfac2b1adbe2610686b9e4726ef45</sum></package><package arch="i686" name="libxkbcommon-x11" release="1.el7" src="libxkbcommon-0.7.1-1.el7.src.rpm" version="0.7.1"><filename>libxkbcommon-x11-0.7.1-1.el7.i686.rpm</filename><sum type="sha256">5fdb329b256c2a3a5585c617875ab9e05ab1c8aabca44f5c25f7d8024e145001</sum></package><package arch="i686" name="libxkbcommon" release="1.el7" src="libxkbcommon-0.7.1-1.el7.src.rpm" version="0.7.1"><filename>libxkbcommon-0.7.1-1.el7.i686.rpm</filename><sum type="sha256">2fb8e4aa9baf279a562fdf4431308bdc790df4ad149818551fec6ad0cee6c616</sum></package><package arch="noarch" name="xcb-proto" release="2.el7" src="xcb-proto-1.12-2.el7.src.rpm" version="1.12"><filename>xcb-proto-1.12-2.el7.noarch.rpm</filename><sum type="sha256">da1ad1d554dac12c2611a885290da0510e78d484975a2deaea86fbbda3ee57bd</sum></package><package arch="x86_64" name="libICE" release="9.el7" src="libICE-1.0.9-9.el7.src.rpm" version="1.0.9"><filename>libICE-1.0.9-9.el7.x86_64.rpm</filename><sum type="sha256">9fb0d800f07c719b7943715cd96b87f65a6c7f463e369b2538fdb58a172b236b</sum></package><package arch="i686" name="libICE" release="9.el7" src="libICE-1.0.9-9.el7.src.rpm" version="1.0.9"><filename>libICE-1.0.9-9.el7.i686.rpm</filename><sum type="sha256">d881731a14e35b217cd8973fbc3cbbf3b9509794435bf35eabd8c266ebbfc99e</sum></package><package arch="i686" name="libwacom" release="1.el7" src="libwacom-0.24-1.el7.src.rpm" version="0.24"><filename>libwacom-0.24-1.el7.i686.rpm</filename><sum type="sha256">40ff82f500464fb225e56655a67630d01ddf7e52c4010a9556c40722dd3ea01f</sum></package><package arch="x86_64" name="libXxf86vm" release="1.el7" src="libXxf86vm-1.1.4-1.el7.src.rpm" version="1.1.4"><filename>libXxf86vm-1.1.4-1.el7.x86_64.rpm</filename><sum type="sha256">6b7b19c25e79c15f3af6a0dc988a784d7bde1090c56016b8b2f7d1d05f52c664</sum></package><package arch="i686" name="mesa-libGLES" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libGLES-17.0.1-6.20170307.el7.i686.rpm</filename><sum type="sha256">8e3bba2e814a8af568591042a865cbdfd3dd84b9236ad9c51fa16eeab9bd1c1b</sum></package><package arch="x86_64" name="libXrender-devel" release="1.el7" src="libXrender-0.9.10-1.el7.src.rpm" version="0.9.10"><filename>libXrender-devel-0.9.10-1.el7.x86_64.rpm</filename><sum type="sha256">d62eb00006743997b8a059ceb6c69a300997d05ff2e1d7d6040f86a109fff6ef</sum></package><package arch="x86_64" name="libXtst-devel" release="1.el7" src="libXtst-1.2.3-1.el7.src.rpm" version="1.2.3"><filename>libXtst-devel-1.2.3-1.el7.x86_64.rpm</filename><sum type="sha256">949cdc66675621be9e6794a14b9b2561486ab1f5faa29bf93951047e0038356f</sum></package><package arch="x86_64" name="mesa-libGL" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libGL-17.0.1-6.20170307.el7.x86_64.rpm</filename><sum type="sha256">f4bab7ceab5812a00a2ae77a7221e790deb7d5e53f4f2c5535c7197429c4e079</sum></package><package arch="x86_64" name="libXfixes-devel" release="1.el7" src="libXfixes-5.0.3-1.el7.src.rpm" version="5.0.3"><filename>libXfixes-devel-5.0.3-1.el7.x86_64.rpm</filename><sum type="sha256">2613b993de88df1a816fb9dec6fea6c8564585482db46b9ed39769634cec08d9</sum></package><package arch="x86_64" name="mesa-libGLES-devel" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libGLES-devel-17.0.1-6.20170307.el7.x86_64.rpm</filename><sum type="sha256">7be2473cf684401905002d1eaaf0ea3b60aebcad0674db96cea781accb67598a</sum></package><package arch="x86_64" name="libXaw" release="4.el7" src="libXaw-1.0.13-4.el7.src.rpm" version="1.0.13"><filename>libXaw-1.0.13-4.el7.x86_64.rpm</filename><sum type="sha256">d3f48f751f4cbf85cb1a57ff7146c05d068f11599ca7e16ac39bcbf351492106</sum></package><package arch="i686" name="libXaw-devel" release="4.el7" src="libXaw-1.0.13-4.el7.src.rpm" version="1.0.13"><filename>libXaw-devel-1.0.13-4.el7.i686.rpm</filename><sum type="sha256">220d1f4d0c7eba8e24402cf233faf90512b2b1082b2351df84e80abefdcd4ebf</sum></package><package arch="x86_64" name="libevdev" release="1.el7" src="libevdev-1.5.6-1.el7.src.rpm" version="1.5.6"><filename>libevdev-1.5.6-1.el7.x86_64.rpm</filename><sum type="sha256">3a9c6640eac0e47fc7f3d79314a2c627ea803333045a9d3477d6bf42931a9c10</sum></package><package arch="x86_64" name="libinput-devel" release="2.el7" src="libinput-1.6.3-2.el7.src.rpm" version="1.6.3"><filename>libinput-devel-1.6.3-2.el7.x86_64.rpm</filename><sum type="sha256">be862753b34d33be1613caa4ea5a50ee14d9e5d9c51f54dd303a8f2fedb1639f</sum></package><package arch="i686" name="libXvMC-devel" release="1.el7" src="libXvMC-1.0.10-1.el7.src.rpm" version="1.0.10"><filename>libXvMC-devel-1.0.10-1.el7.i686.rpm</filename><sum type="sha256">bf2d1f26eea143261a355605a7230ffe911ec282cbf04e7b4ab4e975ab5eef03</sum></package><package arch="i686" name="libXt-devel" release="3.el7" src="libXt-1.1.5-3.el7.src.rpm" version="1.1.5"><filename>libXt-devel-1.1.5-3.el7.i686.rpm</filename><sum type="sha256">4c99750d2887531cb3a864c1ef8100344b4984b34e85fb7cfe22b46b49a5dba7</sum></package><package arch="x86_64" name="libXpm" release="1.el7" src="libXpm-3.5.12-1.el7.src.rpm" version="3.5.12"><filename>libXpm-3.5.12-1.el7.x86_64.rpm</filename><sum type="sha256">0f5fd03df4f1cfb408d6d2ddaf8434eb94c3a2748b9f62781436e79968368de2</sum></package><package arch="i686" name="libfontenc-devel" release="3.el7" src="libfontenc-1.1.3-3.el7.src.rpm" version="1.1.3"><filename>libfontenc-devel-1.1.3-3.el7.i686.rpm</filename><sum type="sha256">aa2165d9afbc8b6b6c9ab2b4d3f245b1dc6433dd0b04c469f765624a964f0856</sum></package><package arch="x86_64" name="libXrandr" release="2.el7" src="libXrandr-1.5.1-2.el7.src.rpm" version="1.5.1"><filename>libXrandr-1.5.1-2.el7.x86_64.rpm</filename><sum type="sha256">cc1f3d1fb5839bb26a986e013f58c62918fd373dca214ee437e69ba17f119a35</sum></package><package arch="x86_64" name="libxkbfile" release="3.el7" src="libxkbfile-1.0.9-3.el7.src.rpm" version="1.0.9"><filename>libxkbfile-1.0.9-3.el7.x86_64.rpm</filename><sum type="sha256">1280912fe45c34ee78af704ddabd56d25fc2b661c96e65f210cc8bcc4a9bedf9</sum></package><package arch="i686" name="libXfont2" release="2.el7" src="libXfont2-2.0.1-2.el7.src.rpm" version="2.0.1"><filename>libXfont2-2.0.1-2.el7.i686.rpm</filename><sum type="sha256">890f92f686f57ec00db1b405c0ccfeee7167a3d313f9fcfa4422916489f46819</sum></package><package arch="x86_64" name="libwacom-devel" release="1.el7" src="libwacom-0.24-1.el7.src.rpm" version="0.24"><filename>libwacom-devel-0.24-1.el7.x86_64.rpm</filename><sum type="sha256">aa528d6cc1f7e55e4cc34c67757a85ce85379537e803467ef9530c0eb3350f78</sum></package><package arch="x86_64" name="libepoxy" release="1.el7" src="libepoxy-1.3.1-1.el7.src.rpm" version="1.3.1"><filename>libepoxy-1.3.1-1.el7.x86_64.rpm</filename><sum type="sha256">5bcc6e7dffb1d6526b217ed180bac8765485a79d8c7af013ffa04eb50e0f67d0</sum></package><package arch="i686" name="mesa-private-llvm-devel" release="3.el7" src="mesa-private-llvm-3.9.1-3.el7.src.rpm" version="3.9.1"><filename>mesa-private-llvm-devel-3.9.1-3.el7.i686.rpm</filename><sum type="sha256">0540d88dedcce4b8abc1933d8bdba9588f7186bd36fb947377fe0480a9f805f0</sum></package><package arch="i686" name="libXcursor" release="8.el7" src="libXcursor-1.1.14-8.el7.src.rpm" version="1.1.14"><filename>libXcursor-1.1.14-8.el7.i686.rpm</filename><sum type="sha256">01c4d55db2f953956deebc74c7f69a706bdd762cccd549443b98663ca0a33f98</sum></package><package arch="i686" name="mesa-libEGL" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libEGL-17.0.1-6.20170307.el7.i686.rpm</filename><sum type="sha256">f1f60ed6a0f19de4e3f0de538821c3878142b1b3f4cb9de0518de1cbd29bf910</sum></package><package arch="x86_64" name="libxcb-devel" release="1.el7" src="libxcb-1.12-1.el7.src.rpm" version="1.12"><filename>libxcb-devel-1.12-1.el7.x86_64.rpm</filename><sum type="sha256">2d04347a93f674a32deff2794bef99b8ed0200c2fb6374ca73482b2b3c05b200</sum></package><package arch="i686" name="libXrandr" release="2.el7" src="libXrandr-1.5.1-2.el7.src.rpm" version="1.5.1"><filename>libXrandr-1.5.1-2.el7.i686.rpm</filename><sum type="sha256">ca345114b71775900fde233b38c037ddd51f6f4c24e74b3d572b78165894f644</sum></package><package arch="i686" name="libXcursor-devel" release="8.el7" src="libXcursor-1.1.14-8.el7.src.rpm" version="1.1.14"><filename>libXcursor-devel-1.1.14-8.el7.i686.rpm</filename><sum type="sha256">e1217430017de19e05f3ea66880fe3d50c624a998fee38219e9695b9637a40b8</sum></package><package arch="i686" name="libfontenc" release="3.el7" src="libfontenc-1.1.3-3.el7.src.rpm" version="1.1.3"><filename>libfontenc-1.1.3-3.el7.i686.rpm</filename><sum type="sha256">3d58ab6d93d70cabd0eb1873bd2a6dca734326063d911bd1fcc795d2c793745b</sum></package><package arch="i686" name="libinput" release="2.el7" src="libinput-1.6.3-2.el7.src.rpm" version="1.6.3"><filename>libinput-1.6.3-2.el7.i686.rpm</filename><sum type="sha256">90c1a0a31abebf027e483e5dbb8881cbfd455bc35d37c9c6baf613fe41df049f</sum></package><package arch="x86_64" name="libXt" release="3.el7" src="libXt-1.1.5-3.el7.src.rpm" version="1.1.5"><filename>libXt-1.1.5-3.el7.x86_64.rpm</filename><sum type="sha256">645f8b23cbeafa2531b217c4404602c5eb8be73d93325eccd56575b8ed83ce1c</sum></package><package arch="x86_64" name="libXrender" release="1.el7" src="libXrender-0.9.10-1.el7.src.rpm" version="0.9.10"><filename>libXrender-0.9.10-1.el7.x86_64.rpm</filename><sum type="sha256">4acf3192b61177cb424186e4d441d5d4250d8abe17c4ad45e86332fdd3245c7d</sum></package><package arch="i686" name="mesa-libGLES-devel" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libGLES-devel-17.0.1-6.20170307.el7.i686.rpm</filename><sum type="sha256">10a7bd564493328f7187d0954bff2ea91125f5cbe74d1f99517253f46a2b782a</sum></package><package arch="x86_64" name="mesa-libGLES" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libGLES-17.0.1-6.20170307.el7.x86_64.rpm</filename><sum type="sha256">de3dbfc5c38663c9a40ee3854aecbd0d60665bb2fa396386285bd1b21000b1d8</sum></package><package arch="i686" name="libvdpau-devel" release="3.el7" src="libvdpau-1.1.1-3.el7.src.rpm" version="1.1.1"><filename>libvdpau-devel-1.1.1-3.el7.i686.rpm</filename><sum type="sha256">df1f2170458eba96680163aaf8c1f736f3644793ff1a90f6150a78ad34b053eb</sum></package><package arch="i686" name="mesa-libEGL-devel" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libEGL-devel-17.0.1-6.20170307.el7.i686.rpm</filename><sum type="sha256">f96b7385e99db5d1b7ae11fddda2fb3d2b9b8faf49a12eac4598b6d3f09b4140</sum></package><package arch="i686" name="libXpm" release="1.el7" src="libXpm-3.5.12-1.el7.src.rpm" version="3.5.12"><filename>libXpm-3.5.12-1.el7.i686.rpm</filename><sum type="sha256">546ca290cb22dff1777fcb320f93188e9af24f9c3e06d80edaa6be85344d0ac2</sum></package><package arch="i686" name="mesa-libgbm" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libgbm-17.0.1-6.20170307.el7.i686.rpm</filename><sum type="sha256">e3766e25387c353a525c9f23025c81a623da39572e10a08a7d0b990a23a014d9</sum></package><package arch="x86_64" name="libXvMC" release="1.el7" src="libXvMC-1.0.10-1.el7.src.rpm" version="1.0.10"><filename>libXvMC-1.0.10-1.el7.x86_64.rpm</filename><sum type="sha256">c3f546dfca913dd0775f3278ded8e5578e82835f8aedd1c2b857040d71bf8022</sum></package><package arch="i686" name="libXdmcp" release="6.el7" src="libXdmcp-1.1.2-6.el7.src.rpm" version="1.1.2"><filename>libXdmcp-1.1.2-6.el7.i686.rpm</filename><sum type="sha256">0adcb23add1c622153911769a5f1f7611d030402f9a96d510dfb29125b42d8a2</sum></package><package arch="i686" name="libXfixes-devel" release="1.el7" src="libXfixes-5.0.3-1.el7.src.rpm" version="5.0.3"><filename>libXfixes-devel-5.0.3-1.el7.i686.rpm</filename><sum type="sha256">199366a8ab5b45006551a0ac4974d9faa3db153c0e58d4da1584c02d68a510fd</sum></package><package arch="x86_64" name="libXcursor" release="8.el7" src="libXcursor-1.1.14-8.el7.src.rpm" version="1.1.14"><filename>libXcursor-1.1.14-8.el7.x86_64.rpm</filename><sum type="sha256">3ec4c0b53cb877b5f3a387d8dbe247c893a22705242b5690e4cdc7f17cc5da3f</sum></package><package arch="x86_64" name="mesa-libOSMesa" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libOSMesa-17.0.1-6.20170307.el7.x86_64.rpm</filename><sum type="sha256">32273328025bb5db3bab386ef977c90086c17419e955ba5ec40bfe2df55a4b19</sum></package><package arch="x86_64" name="mesa-libEGL" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libEGL-17.0.1-6.20170307.el7.x86_64.rpm</filename><sum type="sha256">5be6d6cad4e90208539cf4fe5c1f6062079bbb1d13af809af5019a70cda15c88</sum></package><package arch="i686" name="libwacom-devel" release="1.el7" src="libwacom-0.24-1.el7.src.rpm" version="0.24"><filename>libwacom-devel-0.24-1.el7.i686.rpm</filename><sum type="sha256">bf5b33c164e58caf51101b90697b8e7ecbdae5656910e72074e91c6053bc6ac9</sum></package><package arch="noarch" name="xkeyboard-config-devel" release="1.el7" src="xkeyboard-config-2.20-1.el7.src.rpm" version="2.20"><filename>xkeyboard-config-devel-2.20-1.el7.noarch.rpm</filename><sum type="sha256">da7d6a7cd97d7ff7270bf1c68ce2f815b0f704a0e853d4ef047dcecdb9bc0327</sum></package><package arch="i686" name="libevdev" release="1.el7" src="libevdev-1.5.6-1.el7.src.rpm" version="1.5.6"><filename>libevdev-1.5.6-1.el7.i686.rpm</filename><sum type="sha256">01b6fc78a905ba950aec00b4ecb241df765f69d4194d024b25ceb75109bc070b</sum></package><package arch="i686" name="libXfont" release="1.el7" src="libXfont-1.5.2-1.el7.src.rpm" version="1.5.2"><filename>libXfont-1.5.2-1.el7.i686.rpm</filename><sum type="sha256">2ef1befd7a8ba3848b45ca75cd426a5dff31824613457c6086e5bb0dfef18f33</sum></package><package arch="x86_64" name="mesa-libxatracker" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libxatracker-17.0.1-6.20170307.el7.x86_64.rpm</filename><sum type="sha256">41f86567bbdf11944c7bc3bd72e855b8e22b875a775cdf7daa492fbac03d10d5</sum></package><package arch="i686" name="mesa-libGL-devel" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libGL-devel-17.0.1-6.20170307.el7.i686.rpm</filename><sum type="sha256">c7c3f78062be2ba2d8b0dc9f5655146139fe582e450cee426b1645006e0bf282</sum></package><package arch="i686" name="libXv" release="1.el7" src="libXv-1.0.11-1.el7.src.rpm" version="1.0.11"><filename>libXv-1.0.11-1.el7.i686.rpm</filename><sum type="sha256">2b1e1ecd8a4edfda4bcf66eb542044beff09b09972d60d3a83e14e96aa4d9f65</sum></package><package arch="i686" name="libXdmcp-devel" release="6.el7" src="libXdmcp-1.1.2-6.el7.src.rpm" version="1.1.2"><filename>libXdmcp-devel-1.1.2-6.el7.i686.rpm</filename><sum type="sha256">076089592f9a38a3b20c261373bc3a85aac572d7a8eada946103dec2b7d38ff5</sum></package><package arch="x86_64" name="libX11" release="1.el7" src="libX11-1.6.5-1.el7.src.rpm" version="1.6.5"><filename>libX11-1.6.5-1.el7.x86_64.rpm</filename><sum type="sha256">341195b9418da22589e7477d7903b55ef727578f92108deed411a388ede37ca2</sum></package><package arch="i686" name="libXrender-devel" release="1.el7" src="libXrender-0.9.10-1.el7.src.rpm" version="0.9.10"><filename>libXrender-devel-0.9.10-1.el7.i686.rpm</filename><sum type="sha256">69d507cd73322d9a4a9ab50950baaeca142e02eff55f7823aaee0af3446c3b70</sum></package><package arch="x86_64" name="mesa-libgbm-devel" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libgbm-devel-17.0.1-6.20170307.el7.x86_64.rpm</filename><sum type="sha256">dde2cf5c887959bac1dcc13a0712fc381b1d9d604185acfe554c3552dbf06c91</sum></package><package arch="x86_64" name="mesa-libgbm" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libgbm-17.0.1-6.20170307.el7.x86_64.rpm</filename><sum type="sha256">aaf2cd08789ddb1f47947727430c711daa96b17757c0f96ff93bba45aff6c579</sum></package><package arch="i686" name="libXtst-devel" release="1.el7" src="libXtst-1.2.3-1.el7.src.rpm" version="1.2.3"><filename>libXtst-devel-1.2.3-1.el7.i686.rpm</filename><sum type="sha256">a81b5b5be7ccae43167db80eb0ac0021428e479d2f10a79710a023c55dcfd6a2</sum></package><package arch="x86_64" name="libinput" release="2.el7" src="libinput-1.6.3-2.el7.src.rpm" version="1.6.3"><filename>libinput-1.6.3-2.el7.x86_64.rpm</filename><sum type="sha256">5c13f83d2d52ec4e9231c95199331186742fa6361ab7de6b09e9cb5d4e29a261</sum></package><package arch="x86_64" name="mesa-vdpau-drivers" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-vdpau-drivers-17.0.1-6.20170307.el7.x86_64.rpm</filename><sum type="sha256">088e89f45dafd4efc2666152b5432b46d16f777f04cb39382c0df78bb7ccfa37</sum></package><package arch="x86_64" name="mesa-libGL-devel" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libGL-devel-17.0.1-6.20170307.el7.x86_64.rpm</filename><sum type="sha256">580b955a86e46d92b77955b864e8489a2edfc1751ff6cac1505774342c73bb5c</sum></package><package arch="i686" name="libXfont2-devel" release="2.el7" src="libXfont2-2.0.1-2.el7.src.rpm" version="2.0.1"><filename>libXfont2-devel-2.0.1-2.el7.i686.rpm</filename><sum type="sha256">95fe6dfbffd4923d5a7993fbe6868daa9f30cd151935381394053e4244fa1506</sum></package><package arch="x86_64" name="mesa-private-llvm-devel" release="3.el7" src="mesa-private-llvm-3.9.1-3.el7.src.rpm" version="3.9.1"><filename>mesa-private-llvm-devel-3.9.1-3.el7.x86_64.rpm</filename><sum type="sha256">b10b4f5b9020453461cf166ea978d4551c3e41bc9b7fe4c025ffcc8102f3b0d0</sum></package><package arch="i686" name="libXpm-devel" release="1.el7" src="libXpm-3.5.12-1.el7.src.rpm" version="3.5.12"><filename>libXpm-devel-3.5.12-1.el7.i686.rpm</filename><sum type="sha256">67fafd88e3ac07ce246d2f2fa45fcf25d18fd10a7a45e909f227a4ad737dda5a</sum></package><package arch="i686" name="vulkan-devel" release="2.el7" src="vulkan-1.0.39.1-2.el7.src.rpm" version="1.0.39.1"><filename>vulkan-devel-1.0.39.1-2.el7.i686.rpm</filename><sum type="sha256">3635a4f82d6ad800fc9ddfa9bab5635761147f4a33de548d31591b963a0d014d</sum></package><package arch="x86_64" name="libXcursor-devel" release="8.el7" src="libXcursor-1.1.14-8.el7.src.rpm" version="1.1.14"><filename>libXcursor-devel-1.1.14-8.el7.x86_64.rpm</filename><sum type="sha256">daa04c9981cab77d8be4e9e7a587c415c164eab1070abb4ccb3263ec3c7748d3</sum></package><package arch="x86_64" name="libvdpau" release="3.el7" src="libvdpau-1.1.1-3.el7.src.rpm" version="1.1.1"><filename>libvdpau-1.1.1-3.el7.x86_64.rpm</filename><sum type="sha256">18f3d834f8da61eaba20ee95d4c59f80453476314d310496d2108ae175cb9b61</sum></package><package arch="i686" name="libepoxy-devel" release="1.el7" src="libepoxy-1.3.1-1.el7.src.rpm" version="1.3.1"><filename>libepoxy-devel-1.3.1-1.el7.i686.rpm</filename><sum type="sha256">0c199973bfd55aae7b7c3943966d07eeb78e2bd8fbfe43d1a7aa494c33ab6382</sum></package><package arch="i686" name="libXi" release="1.el7" src="libXi-1.7.9-1.el7.src.rpm" version="1.7.9"><filename>libXi-1.7.9-1.el7.i686.rpm</filename><sum type="sha256">bb290d3c48cb5d6ee9fba81196f13cab913bb15e06afbffc1e542cd450a4b784</sum></package><package arch="x86_64" name="libepoxy-devel" release="1.el7" src="libepoxy-1.3.1-1.el7.src.rpm" version="1.3.1"><filename>libepoxy-devel-1.3.1-1.el7.x86_64.rpm</filename><sum type="sha256">3da7f42755ecca697dfa625674b07e279ae00521d83f7f1868e982ea0c400b85</sum></package><package arch="x86_64" name="mesa-vulkan-drivers" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-vulkan-drivers-17.0.1-6.20170307.el7.x86_64.rpm</filename><sum type="sha256">63f6f138a1bf2b5ee005851595fbc29cec4d9388dc416eba848c5099c2d9c315</sum></package><package arch="x86_64" name="mesa-private-llvm" release="3.el7" src="mesa-private-llvm-3.9.1-3.el7.src.rpm" version="3.9.1"><filename>mesa-private-llvm-3.9.1-3.el7.x86_64.rpm</filename><sum type="sha256">463aa1e2b52db01ae657e2593dc447a0db527b45e52e5b487cb9187b897c332c</sum></package><package arch="i686" name="vulkan" release="2.el7" src="vulkan-1.0.39.1-2.el7.src.rpm" version="1.0.39.1"><filename>vulkan-1.0.39.1-2.el7.i686.rpm</filename><sum type="sha256">c63abc543635bf02f7670350708d6e8ce70397b8b92cc6af7ea32fb29efab62c</sum></package><package arch="x86_64" name="libXvMC-devel" release="1.el7" src="libXvMC-1.0.10-1.el7.src.rpm" version="1.0.10"><filename>libXvMC-devel-1.0.10-1.el7.x86_64.rpm</filename><sum type="sha256">1c5c43f53adf72302278515892d67afe6b5a1fe0525a1c2ba889592278bb4783</sum></package><package arch="i686" name="mesa-libOSMesa-devel" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libOSMesa-devel-17.0.1-6.20170307.el7.i686.rpm</filename><sum type="sha256">ceee3426da894725899f5477a51f0fdf2c37c67a9e59953d19bee9b2f7443af9</sum></package><package arch="i686" name="libepoxy" release="1.el7" src="libepoxy-1.3.1-1.el7.src.rpm" version="1.3.1"><filename>libepoxy-1.3.1-1.el7.i686.rpm</filename><sum type="sha256">4fc64f1ea2bc4e51a96857dd9fbad2a23659fe49be20984a171d2fad7f534712</sum></package><package arch="x86_64" name="libXv" release="1.el7" src="libXv-1.0.11-1.el7.src.rpm" version="1.0.11"><filename>libXv-1.0.11-1.el7.x86_64.rpm</filename><sum type="sha256">88ab9ad2d3748ce23b8f1aabe41d4f1f86b9cb7fbd806849be2c559783afa70b</sum></package><package arch="x86_64" name="libXfont" release="1.el7" src="libXfont-1.5.2-1.el7.src.rpm" version="1.5.2"><filename>libXfont-1.5.2-1.el7.x86_64.rpm</filename><sum type="sha256">b46c902b5c42caf93ef27a107760dce7afa6017c67c3e4fd74015a097ec699a3</sum></package><package arch="x86_64" name="libXfont-devel" release="1.el7" src="libXfont-1.5.2-1.el7.src.rpm" version="1.5.2"><filename>libXfont-devel-1.5.2-1.el7.x86_64.rpm</filename><sum type="sha256">e243c2ff8ce4f4a442d45730ed4fddf9e779d62ff34ea1d83e134a167c0dc481</sum></package><package arch="i686" name="libXxf86vm-devel" release="1.el7" src="libXxf86vm-1.1.4-1.el7.src.rpm" version="1.1.4"><filename>libXxf86vm-devel-1.1.4-1.el7.i686.rpm</filename><sum type="sha256">4d3d6ef65aaa838987ded0118df39b246225fd147fe6a1c3f5204af1320db897</sum></package><package arch="x86_64" name="libXaw-devel" release="4.el7" src="libXaw-1.0.13-4.el7.src.rpm" version="1.0.13"><filename>libXaw-devel-1.0.13-4.el7.x86_64.rpm</filename><sum type="sha256">ea0ff0e875ce0c1ed6b2d5f1bd0a912f293df0d2610bbdcefec26e55f8f8445e</sum></package><package arch="i686" name="libdrm" release="1.el7" src="libdrm-2.4.74-1.el7.src.rpm" version="2.4.74"><filename>libdrm-2.4.74-1.el7.i686.rpm</filename><sum type="sha256">f7ca78c6f51ac6401a93e619ef7f6467a4830923d5a4b9bbb20a6581b8be3fe3</sum></package><package arch="i686" name="libXv-devel" release="1.el7" src="libXv-1.0.11-1.el7.src.rpm" version="1.0.11"><filename>libXv-devel-1.0.11-1.el7.i686.rpm</filename><sum type="sha256">0c23afa24709898aa4ad2ae307c817d60114109e13d3126cf231c388fb4f4fb5</sum></package><package arch="i686" name="libX11" release="1.el7" src="libX11-1.6.5-1.el7.src.rpm" version="1.6.5"><filename>libX11-1.6.5-1.el7.i686.rpm</filename><sum type="sha256">68a0414eb208e7cde1d32975c412c3068fb4ff04b557e5904053cdbc74b5a7f7</sum></package><package arch="i686" name="libXvMC" release="1.el7" src="libXvMC-1.0.10-1.el7.src.rpm" version="1.0.10"><filename>libXvMC-1.0.10-1.el7.i686.rpm</filename><sum type="sha256">829fc35dfa5691bc51079eac5736f87840bf0b012b545f2e68c0563889e73d6a</sum></package><package arch="x86_64" name="libfontenc" release="3.el7" src="libfontenc-1.1.3-3.el7.src.rpm" version="1.1.3"><filename>libfontenc-1.1.3-3.el7.x86_64.rpm</filename><sum type="sha256">33dcad954d8f53b0e918affc3970094db1c5484b64e4edb633a61cba79945f01</sum></package><package arch="x86_64" name="vulkan" release="2.el7" src="vulkan-1.0.39.1-2.el7.src.rpm" version="1.0.39.1"><filename>vulkan-1.0.39.1-2.el7.x86_64.rpm</filename><sum type="sha256">6395d439a8cf7e2651c62be71a912897ebe2427ad05d35bcfd62c3c68d89eee7</sum></package><package arch="x86_64" name="libxkbcommon-devel" release="1.el7" src="libxkbcommon-0.7.1-1.el7.src.rpm" version="0.7.1"><filename>libxkbcommon-devel-0.7.1-1.el7.x86_64.rpm</filename><sum type="sha256">6684fc9992a6c259c0d576d07355128f2ba3d068889e991ca6845dc4c1f9b6ed</sum></package><package arch="x86_64" name="mesa-libxatracker-devel" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libxatracker-devel-17.0.1-6.20170307.el7.x86_64.rpm</filename><sum type="sha256">52e766feadf4e4979f7b7abc450ed7084af0ca0fab6a2ebd1fc7d702d1304e38</sum></package><package arch="i686" name="libXfont-devel" release="1.el7" src="libXfont-1.5.2-1.el7.src.rpm" version="1.5.2"><filename>libXfont-devel-1.5.2-1.el7.i686.rpm</filename><sum type="sha256">b5687f19fe3879c546db1461ffab22f136e6b09b689eb6fc2a19f7844ee2fd29</sum></package><package arch="i686" name="libXtst" release="1.el7" src="libXtst-1.2.3-1.el7.src.rpm" version="1.2.3"><filename>libXtst-1.2.3-1.el7.i686.rpm</filename><sum type="sha256">234b2c7639e8cb5350292570a7ac9770bb289bed47c86c58b79d6a9f421a0d47</sum></package><package arch="i686" name="libxkbfile" release="3.el7" src="libxkbfile-1.0.9-3.el7.src.rpm" version="1.0.9"><filename>libxkbfile-1.0.9-3.el7.i686.rpm</filename><sum type="sha256">3e98b891abf44951a4c6ce6ff83302f8ae548c18d48b16d0bd6f635578690a1d</sum></package><package arch="x86_64" name="libxkbcommon-x11-devel" release="1.el7" src="libxkbcommon-0.7.1-1.el7.src.rpm" version="0.7.1"><filename>libxkbcommon-x11-devel-0.7.1-1.el7.x86_64.rpm</filename><sum type="sha256">3135955bd3d578b3e26fc213a8df9d992b68e3aed7129b27fd884f6c77ffe80e</sum></package><package arch="x86_64" name="mesa-libOSMesa-devel" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libOSMesa-devel-17.0.1-6.20170307.el7.x86_64.rpm</filename><sum type="sha256">3ef3914b67ce28e5e9a6966d9f388cd885fe2e47b32c1252f340e128a76d132b</sum></package><package arch="x86_64" name="libXi-devel" release="1.el7" src="libXi-1.7.9-1.el7.src.rpm" version="1.7.9"><filename>libXi-devel-1.7.9-1.el7.x86_64.rpm</filename><sum type="sha256">c99ff5805359f4592bea1daa531480efcac755fcebcd04989b3f41d45ffa2780</sum></package><package arch="i686" name="libXrender" release="1.el7" src="libXrender-0.9.10-1.el7.src.rpm" version="0.9.10"><filename>libXrender-0.9.10-1.el7.i686.rpm</filename><sum type="sha256">e9ee5068c164532e05863ea7a733dc605902c066aacf73344bd55acfbe085dc7</sum></package><package arch="i686" name="mesa-libOSMesa" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libOSMesa-17.0.1-6.20170307.el7.i686.rpm</filename><sum type="sha256">bfa3592610141f19d06bb718ec9614105b34a88365a6f1564525bb72777a6333</sum></package><package arch="i686" name="libXi-devel" release="1.el7" src="libXi-1.7.9-1.el7.src.rpm" version="1.7.9"><filename>libXi-devel-1.7.9-1.el7.i686.rpm</filename><sum type="sha256">c066a789a4e4ff07c4eb8d50cacd26b44cdf7af46e3d6ed86b2983d480ebd60d</sum></package><package arch="x86_64" name="libXxf86vm-devel" release="1.el7" src="libXxf86vm-1.1.4-1.el7.src.rpm" version="1.1.4"><filename>libXxf86vm-devel-1.1.4-1.el7.x86_64.rpm</filename><sum type="sha256">0e0bc4ec05788343c195b1304f4d9e2aae51fa855765a8b1a313b15f02f7fb50</sum></package><package arch="x86_64" name="libXfont2" release="2.el7" src="libXfont2-2.0.1-2.el7.src.rpm" version="2.0.1"><filename>libXfont2-2.0.1-2.el7.x86_64.rpm</filename><sum type="sha256">d5d720de33e413e1e575b0e0a3b5123200ccadd2c4c6e89a218b949857795679</sum></package><package arch="x86_64" name="libwacom" release="1.el7" src="libwacom-0.24-1.el7.src.rpm" version="0.24"><filename>libwacom-0.24-1.el7.x86_64.rpm</filename><sum type="sha256">1c23ac36596cb2082923a7ac9eb84348eb4e9b3f0cc4b7310f687c33cf3092cb</sum></package><package arch="x86_64" name="libxkbcommon" release="1.el7" src="libxkbcommon-0.7.1-1.el7.src.rpm" version="0.7.1"><filename>libxkbcommon-0.7.1-1.el7.x86_64.rpm</filename><sum type="sha256">9e5f159886b47e64da99e147fd4aa2bed7ee2e467b9ba332783c3aa90fbff2e1</sum></package><package arch="x86_64" name="libXfixes" release="1.el7" src="libXfixes-5.0.3-1.el7.src.rpm" version="5.0.3"><filename>libXfixes-5.0.3-1.el7.x86_64.rpm</filename><sum type="sha256">f3afdeb226b8a5285806f4312cebf8d4eef8ffec0ef62f89660a7660e8faf3c4</sum></package><package arch="i686" name="libXfixes" release="1.el7" src="libXfixes-5.0.3-1.el7.src.rpm" version="5.0.3"><filename>libXfixes-5.0.3-1.el7.i686.rpm</filename><sum type="sha256">2ca3e0204acbb3abdcdc86f9a3c7cbee298ebab38ec6f030129aa49a1f5691c7</sum></package><package arch="x86_64" name="libXi" release="1.el7" src="libXi-1.7.9-1.el7.src.rpm" version="1.7.9"><filename>libXi-1.7.9-1.el7.x86_64.rpm</filename><sum type="sha256">1d1420c88691870bbf21285453ecb7b875d490994d7a31c070561dfeaf2243da</sum></package><package arch="noarch" name="libxcb-doc" release="1.el7" src="libxcb-1.12-1.el7.src.rpm" version="1.12"><filename>libxcb-doc-1.12-1.el7.noarch.rpm</filename><sum type="sha256">58b162bd6f23626d0bf50f7678aa957321317214e7f1d3bc60ecffbf0296a0b8</sum></package><package arch="i686" name="libinput-devel" release="2.el7" src="libinput-1.6.3-2.el7.src.rpm" version="1.6.3"><filename>libinput-devel-1.6.3-2.el7.i686.rpm</filename><sum type="sha256">189146e4a63e061876219e5c208debcbdf34c534881497cacfdafb9c798a2cf0</sum></package><package arch="i686" name="mesa-private-llvm" release="3.el7" src="mesa-private-llvm-3.9.1-3.el7.src.rpm" version="3.9.1"><filename>mesa-private-llvm-3.9.1-3.el7.i686.rpm</filename><sum type="sha256">a78f42f795ab06363711fe46f20c4c43991b02705efdb4e7d5cdf65e194803e8</sum></package><package arch="i686" name="mesa-dri-drivers" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-dri-drivers-17.0.1-6.20170307.el7.i686.rpm</filename><sum type="sha256">3531d0e23a43561d8b0ae393f5501fe9e0bc651bfc441ed24028697a9a60f360</sum></package><package arch="x86_64" name="drm-utils" release="1.el7" src="libdrm-2.4.74-1.el7.src.rpm" version="2.4.74"><filename>drm-utils-2.4.74-1.el7.x86_64.rpm</filename><sum type="sha256">2adb59c7c0c9ce17a96b697c99266651f2d993319c953855e999941750bb6a89</sum></package><package arch="i686" name="mesa-libgbm-devel" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libgbm-devel-17.0.1-6.20170307.el7.i686.rpm</filename><sum type="sha256">e1a7a7e192bce2a439daf9775064981f6382ab72ab380263ef9899a7c2b812fc</sum></package><package arch="i686" name="libX11-devel" release="1.el7" src="libX11-1.6.5-1.el7.src.rpm" version="1.6.5"><filename>libX11-devel-1.6.5-1.el7.i686.rpm</filename><sum type="sha256">b5afae88a5d1194c28bfcd65b87e7212a68a61df0844323d11c2a59da2233625</sum></package><package arch="x86_64" name="libdrm-devel" release="1.el7" src="libdrm-2.4.74-1.el7.src.rpm" version="2.4.74"><filename>libdrm-devel-2.4.74-1.el7.x86_64.rpm</filename><sum type="sha256">a9e766a7c0afec11afd5eb6147de86b1a88b5bf5e674ac5ffccaca7c71f211a0</sum></package><package arch="i686" name="libevdev-devel" release="1.el7" src="libevdev-1.5.6-1.el7.src.rpm" version="1.5.6"><filename>libevdev-devel-1.5.6-1.el7.i686.rpm</filename><sum type="sha256">69475e2a03860556c75ffaca8798daa9b80c341cd439564d7d2162309734319e</sum></package><package arch="i686" name="mesa-libglapi" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libglapi-17.0.1-6.20170307.el7.i686.rpm</filename><sum type="sha256">1f8c2cece0a30e7c458ca0e10c1a3a326f8339ca5286ac0f35b0d3a417ac9b39</sum></package><package arch="x86_64" name="libevdev-devel" release="1.el7" src="libevdev-1.5.6-1.el7.src.rpm" version="1.5.6"><filename>libevdev-devel-1.5.6-1.el7.x86_64.rpm</filename><sum type="sha256">18a6adb20b3f48928215d9ba1c6a9467a7512f6d7cffba88b48e22521cb81979</sum></package><package arch="i686" name="libxkbfile-devel" release="3.el7" src="libxkbfile-1.0.9-3.el7.src.rpm" version="1.0.9"><filename>libxkbfile-devel-1.0.9-3.el7.i686.rpm</filename><sum type="sha256">3b92f36fb68569f711c819c6352f4d00c76dc727afa841d92972a0d2283045a8</sum></package><package arch="x86_64" name="libdrm" release="1.el7" src="libdrm-2.4.74-1.el7.src.rpm" version="2.4.74"><filename>libdrm-2.4.74-1.el7.x86_64.rpm</filename><sum type="sha256">7cff35c398cd3c7e7ffa42727134713dcdd79ebda564c082de7bacc35ca8617c</sum></package><package arch="x86_64" name="libXv-devel" release="1.el7" src="libXv-1.0.11-1.el7.src.rpm" version="1.0.11"><filename>libXv-devel-1.0.11-1.el7.x86_64.rpm</filename><sum type="sha256">3359d4a6c301e6580f0a21d48e6718ed57a19511ac2e98b64cd4ecbc24839eae</sum></package><package arch="x86_64" name="libXdmcp" release="6.el7" src="libXdmcp-1.1.2-6.el7.src.rpm" version="1.1.2"><filename>libXdmcp-1.1.2-6.el7.x86_64.rpm</filename><sum type="sha256">8ffa760bf80f85a9159e054f7a618673374c1c97f7ac71556de9ef019de4c2cd</sum></package><package arch="x86_64" name="vulkan-devel" release="2.el7" src="vulkan-1.0.39.1-2.el7.src.rpm" version="1.0.39.1"><filename>vulkan-devel-1.0.39.1-2.el7.x86_64.rpm</filename><sum type="sha256">d13b11b7957796f5e20ec03f16b7e2a416da44115514ba1ec71ce4547e84030d</sum></package><package arch="x86_64" name="mesa-filesystem" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-filesystem-17.0.1-6.20170307.el7.x86_64.rpm</filename><sum type="sha256">daed09585138047e4b5143f8febc5b86f5430c4158080cb753d08d1d08b2a2a5</sum></package><package arch="i686" name="libvdpau" release="3.el7" src="libvdpau-1.1.1-3.el7.src.rpm" version="1.1.1"><filename>libvdpau-1.1.1-3.el7.i686.rpm</filename><sum type="sha256">c037e5936af85c6f0c6c6aeaf294564faae48f5db912151bf3634137c989366a</sum></package><package arch="noarch" name="libvdpau-docs" release="3.el7" src="libvdpau-1.1.1-3.el7.src.rpm" version="1.1.1"><filename>libvdpau-docs-1.1.1-3.el7.noarch.rpm</filename><sum type="sha256">eabb73e4c152bd995336dc742d258d7f9d9e0a5a339894925ae9b5318289d690</sum></package><package arch="i686" name="libXxf86vm" release="1.el7" src="libXxf86vm-1.1.4-1.el7.src.rpm" version="1.1.4"><filename>libXxf86vm-1.1.4-1.el7.i686.rpm</filename><sum type="sha256">f3b3961c8bc4a979565db8dc604cbe4d54abfc13946318b33af194bc69e647ee</sum></package><package arch="x86_64" name="libxcb" release="1.el7" src="libxcb-1.12-1.el7.src.rpm" version="1.12"><filename>libxcb-1.12-1.el7.x86_64.rpm</filename><sum type="sha256">51acac8c7f95fa2cc43edffc3704d9f3cb015b80ba5e41753fa3fdb5a259e311</sum></package><package arch="i686" name="libxcb-devel" release="1.el7" src="libxcb-1.12-1.el7.src.rpm" version="1.12"><filename>libxcb-devel-1.12-1.el7.i686.rpm</filename><sum type="sha256">c2123c2b10f11b21686fc01223b73b15536407efaa21ada45afcfbce1757da85</sum></package><package arch="i686" name="libxcb" release="1.el7" src="libxcb-1.12-1.el7.src.rpm" version="1.12"><filename>libxcb-1.12-1.el7.i686.rpm</filename><sum type="sha256">24a7f3c7ef998bc360121b2196c69eae1c257b7c3f38e62734ca0a70c46ff4a8</sum></package><package arch="x86_64" name="mesa-libEGL-devel" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-libEGL-devel-17.0.1-6.20170307.el7.x86_64.rpm</filename><sum type="sha256">1b6a11dfc7ad4cdcc2c495d76bc70534605d6237364565fa990b5f772bb8fd99</sum></package><package arch="x86_64" name="mesa-dri-drivers" release="6.20170307.el7" src="mesa-17.0.1-6.20170307.el7.src.rpm" version="17.0.1"><filename>mesa-dri-drivers-17.0.1-6.20170307.el7.x86_64.rpm</filename><sum type="sha256">605c45b3dfb8f8ff01e529444b52cf1abccea6f8d3ccfb5db0ff46a5359e1ba5</sum></package><package arch="x86_64" name="libICE-devel" release="9.el7" src="libICE-1.0.9-9.el7.src.rpm" version="1.0.9"><filename>libICE-devel-1.0.9-9.el7.x86_64.rpm</filename><sum type="sha256">5d97ac9ce161d8d33cc69baa5271370d23f7f5650dd0c73ec6111943425b5f9e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10164" id="CVE-2016-10164" title="Libxpm: Out-Of-Bounds Write In Xpm Extension " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2625" id="CVE-2017-2625" title="Libxdmcp: Weak Entropy Usage For Session Keys" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2626" id="CVE-2017-2626" title="Libice: Weak Entropy Usage In Session Keys" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1865" id="RHSA-2017:1865-1" title="Rhsa-2017:1865-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1268849" id="1268849" title="Installed (But Unpackaged) File(S) Found For Ppc64 Qnd Ppc64Le" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1272117" id="1272117" title="[Libice] Installed (But Unpackaged) File(S) Found" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1272129" id="1272129" title="[Libxaw] Error: Installed (But Unpackaged) File(S) Found" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273281" id="1273281" title="Libxi - Wrong Release String" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297276" id="1297276" title="Mesa Vdpau Drivers Are Missing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378864" id="1378864" title="Dri3/Present Ogl Application Hang" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1388458" id="1388458" title="Rhel7 Libxcursor Default Cursor Theme Is Dmz-Aa, But " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401667" id="1401667" title="Rebase Libx11 In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401668" id="1401668" title="Rebase Libxaw In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401669" id="1401669" title="Rebase Libxdmcp In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401670" id="1401670" title="Rebase Libxfixes In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401671" id="1401671" title="Rebase Libxfont In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401672" id="1401672" title="Rebase Libxi In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401673" id="1401673" title="Rebase Libxrandr In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401675" id="1401675" title="Rebase Libxrender In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401676" id="1401676" title="Rebase Libxt In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401677" id="1401677" title="Rebase Libxtst In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401678" id="1401678" title="Rebase Libxv In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401679" id="1401679" title="Rebase Libxvmc In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401680" id="1401680" title="Rebase Libxxf86Vm In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401681" id="1401681" title="Rebase Libdrm In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401682" id="1401682" title="Rebase Mesa In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401683" id="1401683" title="Rebase Mesa-Private-Llvm In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401685" id="1401685" title="Rebase Xorg-X11-Proto-Devel In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401690" id="1401690" title="Rebase Libepoxy In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401752" id="1401752" title="Rebase Libwacom In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401753" id="1401753" title="Rebase Xkeyboard-Config In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401754" id="1401754" title="Rebase Libevdev In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1402560" id="1402560" title="Rebase Libxcb In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1410477" id="1410477" title="Rebase Libxpm In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1411390" id="1411390" title="Rebase Libfontenc In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1411392" id="1411392" title="Rebase Libxkbfile In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1411393" id="1411393" title="Rebase Xcb-Proto In Rhel 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416410" id="1416410" title="Libxpm: Out-Of-Bounds Write In Xpm Extension " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1424987" id="1424987" title="Libxdmcp: Weak Entropy Usage For Session Keys" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1424992" id="1424992" title="Libice: Weak Entropy Usage In Session Keys" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429813" id="1429813" title="Backport Patch 'Allow Compatibility Shaders With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1431640" id="1431640" title="Libinput Can'T Be Build With Tests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1438891" id="1438891" title="Black Output On Ppc64 And S390X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1445423" id="1445423" title="Blue Shadows On Ppc64 And S390X" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1868-1</id><title>Python</title><description>Security Fix(es): 
* The Python standard library HTTP client modules (such as httplib or urllib) did not perform verification of TLS/SSL certificates when connecting to HTTPS servers. A man-in-the-middle attacker could use this flaw to hijack connections and eavesdrop or modify transferred data. (CVE-2014-9365)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-libs" release="58.el7" src="python-2.7.5-58.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-58.el7.x86_64.rpm</filename><sum type="sha256">09860ab9650c5c9c16eaf425e6fdae48f3c74eacecbe685c90448989d6a69acc</sum></package><package arch="i686" name="python-libs" release="58.el7" src="python-2.7.5-58.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-58.el7.i686.rpm</filename><sum type="sha256">17a099bd2ec9223ed87ed9bf566a8d8a9ff05d86f69eaabdc4ac1ab805ee1997</sum></package><package arch="x86_64" name="python-test" release="58.el7" src="python-2.7.5-58.el7.src.rpm" version="2.7.5"><filename>python-test-2.7.5-58.el7.x86_64.rpm</filename><sum type="sha256">8798d69deccad053f84eb615c28a08562bb64ede55071ba5fc2042756f15f84e</sum></package><package arch="x86_64" name="python-tools" release="58.el7" src="python-2.7.5-58.el7.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-58.el7.x86_64.rpm</filename><sum type="sha256">df278b6da1e0faf3c9f9f64687cff5e2f8ea9a76fb97070a483813241c410430</sum></package><package arch="x86_64" name="python" release="58.el7" src="python-2.7.5-58.el7.src.rpm" version="2.7.5"><filename>python-2.7.5-58.el7.x86_64.rpm</filename><sum type="sha256">cf4c937ea110d775b8660e62729f8c68281b4f7e861c2539daf3a65bee249cd1</sum></package><package arch="x86_64" name="tkinter" release="58.el7" src="python-2.7.5-58.el7.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-58.el7.x86_64.rpm</filename><sum type="sha256">1447f4b7caa7419c844a0b3cea8c76564ffd8478c562bfe78da8697c544a6ee3</sum></package><package arch="x86_64" name="python-debug" release="58.el7" src="python-2.7.5-58.el7.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-58.el7.x86_64.rpm</filename><sum type="sha256">10d239dea8031a95f1ec976b60d2e26829ee07549e7fd5b4e8d47018e5858992</sum></package><package arch="x86_64" name="python-devel" release="58.el7" src="python-2.7.5-58.el7.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-58.el7.x86_64.rpm</filename><sum type="sha256">7dca9b11f936fed3f2d61d54cae540d170c9cded642e06f0d91855b5bb7ffdbc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9365" id="CVE-2014-9365" title="Python: Failure To Validate Certificates In The Http Client With Tls (Pep 476)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1868" id="RHSA-2017:1868-1" title="Rhsa-2017:1868-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1173041" id="1173041" title="Python: Failure To Validate Certificates In The Http Client With Tls (Pep 476)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1272562" id="1272562" title="Memory Leaks Found By Unit Tests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297522" id="1297522" title="Undefined Python_Provide Causes Silently Missing Provides" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1333064" id="1333064" title="/Coreos/Python/Sanity/Gdb Test Is Failing On S390X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1364444" id="1364444" title="Python Fails To Decode X.509 Cert With Gen_Rid Subject Alt Name" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1368076" id="1368076" title="Threading Wait(Timeout) Doesn'T Return After Timeout If System " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1373363" id="1373363" title="Incorrect Parsing Of Regular Expressions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1432003" id="1432003" title="After Logrotate , Dynamic Looping Call Gets 'Valueerror: I/O " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1439734" id="1439734" title="Backport Fix For Shutil.Make_Archive Doesn'T Archive Empty " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1871-1</id><title>Tcpdump</title><description>The following packages have been upgraded to a later upstream version: tcpdump (4.9.0). 
Security Fix(es): 
* Multiple out of bounds read and integer overflow vulnerabilities were found in tcpdump affecting the decoding of various protocols. An attacker could create a crafted pcap file or send specially crafted packets to the network segment where tcpdump is running in live capture mode (without -w) which could cause it to display incorrect data, crash or enter an infinite loop. (CVE-2015-0261, CVE-2015-2153, CVE-2015-2154, CVE-2015-2155, CVE-2016-7922, CVE-2016-7923, CVE-2016-7924, CVE-2016-7925, CVE-2016-7926, CVE-2016-7927, CVE-2016-7928, CVE-2016-7929, CVE-2016-7930, CVE-2016-7931, CVE-2016-7932, CVE-2016-7933, CVE-2016-7934, CVE-2016-7935, CVE-2016-7936, CVE-2016-7937, CVE-2016-7938, CVE-2016-7939, CVE-2016-7940, CVE-2016-7973, CVE-2016-7974, CVE-2016-7975, CVE-2016-7983, CVE-2016-7984, CVE-2016-7985, CVE-2016-7986, CVE-2016-7992, CVE-2016-7993, CVE-2016-8574, CVE-2016-8575, CVE-2017-5202, CVE-2017-5203, CVE-2017-5204, CVE-2017-5205, CVE-2017-5341, CVE-2017-5342, CVE-2017-5482, CVE-2017-5483, CVE-2017-5484, CVE-2017-5485, CVE-2017-5486)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="14" name="tcpdump" release="5.el7" src="tcpdump-4.9.0-5.el7.src.rpm" version="4.9.0"><filename>tcpdump-4.9.0-5.el7.x86_64.rpm</filename><sum type="sha256">6281456c16ea0b3bf77300b9a03201852a4075afc3c93aea25b1ea95c9dfe5df</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0261" id="CVE-2015-0261" title="Tcpdump: Ipv6 Mobility Printer " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2153" id="CVE-2015-2153" title="Tcpdump: Tcp Printer Rpki_Rtr_Pdu_Print() " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2154" id="CVE-2015-2154" title="Tcpdump: Ethernet Printer Osi_Print_Cksum() " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2155" id="CVE-2015-2155" title="Tcpdump: Force Printer Vulnerability" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1871" id="RHSA-2017:1871-1" title="Rhsa-2017:1871-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1201792" id="1201792" title="Tcpdump: Ipv6 Mobility Printer " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1201795" id="1201795" title="Tcpdump: Tcp Printer Rpki_Rtr_Pdu_Print() " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1201797" id="1201797" title="Tcpdump: Ethernet Printer Osi_Print_Cksum() " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1201798" id="1201798" title="Tcpdump: Force Printer Vulnerability" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1292056" id="1292056" title="Use -Q Instead Of -P To Set Capture Direction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1296230" id="1296230" title="Run Upstream Tests During Build Process" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1297812" id="1297812" title="Tcpdump Segfaults With --Help Option On Ppc64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1419066" id="1419066" title="Tcpdump: Multiple Overflow Issues In Protocol Decoding" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1441597" id="1441597" title="Tcpdump: Tcpdump Can Not Dump All Packets." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1916-1</id><title>Glibc</title><description>Security Fix(es): 
* A stack overflow vulnerability was found in nan* functions that could cause applications, which process long strings with the nan function, to crash or, potentially, execute arbitrary code. (CVE-2014-9761) 
* It was found that out-of-range time values passed to the strftime() function could result in an out-of-bounds memory access. This could lead to application crash or, potentially, information disclosure. (CVE-2015-8776) 
* An integer overflow vulnerability was found in hcreate() and hcreate_r() functions which could result in an out-of-bounds memory access. This could lead to application crash or, potentially, arbitrary code execution. (CVE-2015-8778) 
* A stack based buffer overflow vulnerability was found in the catopen() function. An excessively long string passed to the function could cause it to crash or, potentially, execute arbitrary code. (CVE-2015-8779) 
* It was found that the dynamic loader did not sanitize the LD_POINTER_GUARD environment variable. An attacker could use this flaw to bypass the pointer guarding protection on set-user-ID or set-group-ID programs to execute arbitrary code with the permissions of the user running the application. (CVE-2015-8777)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="glibc-static" release="196.el7" src="glibc-2.17-196.el7.src.rpm" version="2.17"><filename>glibc-static-2.17-196.el7.i686.rpm</filename><sum type="sha256">29698f1aeaa37591d3eab26eb61a977a7b9de72553e4e3fdf8aed0028b17cc1f</sum></package><package arch="x86_64" name="glibc-devel" release="196.el7" src="glibc-2.17-196.el7.src.rpm" version="2.17"><filename>glibc-devel-2.17-196.el7.x86_64.rpm</filename><sum type="sha256">a84d33c12ac11b0e6e9eff8153cbedd8923818ba61873913303e36fdc36933ad</sum></package><package arch="x86_64" name="nscd" release="196.el7" src="glibc-2.17-196.el7.src.rpm" version="2.17"><filename>nscd-2.17-196.el7.x86_64.rpm</filename><sum type="sha256">b767e0b50d3a5a5524e64139a346681f5bceeefde3ab045ab0a6944b1e4c6721</sum></package><package arch="x86_64" name="glibc-utils" release="196.el7" src="glibc-2.17-196.el7.src.rpm" version="2.17"><filename>glibc-utils-2.17-196.el7.x86_64.rpm</filename><sum type="sha256">a46ce5770c69773ed8268b580e767e5153fe6a29b9c51fbb64c03f0ee4414ae7</sum></package><package arch="i686" name="glibc-devel" release="196.el7" src="glibc-2.17-196.el7.src.rpm" version="2.17"><filename>glibc-devel-2.17-196.el7.i686.rpm</filename><sum type="sha256">b10ba5ddd40b556ac5b5e9cabaa541807923d20820d5d921f91842ffef608d47</sum></package><package arch="x86_64" name="glibc-static" release="196.el7" src="glibc-2.17-196.el7.src.rpm" version="2.17"><filename>glibc-static-2.17-196.el7.x86_64.rpm</filename><sum type="sha256">24af27f4a1b661a4889f1e148cdacfbf49715ccfd668321cc9559d8efd155e71</sum></package><package arch="x86_64" name="glibc-common" release="196.el7" src="glibc-2.17-196.el7.src.rpm" version="2.17"><filename>glibc-common-2.17-196.el7.x86_64.rpm</filename><sum type="sha256">f6cf5611818bf0f0f2487729d29e94b883569e62d2be6cc957b0450a0c19655e</sum></package><package arch="x86_64" name="glibc-headers" release="196.el7" src="glibc-2.17-196.el7.src.rpm" version="2.17"><filename>glibc-headers-2.17-196.el7.x86_64.rpm</filename><sum type="sha256">6667388fa6bcb645b32708e11dfe275b5c949b32246eb9c970a46ed8121e53f7</sum></package><package arch="x86_64" name="glibc" release="196.el7" src="glibc-2.17-196.el7.src.rpm" version="2.17"><filename>glibc-2.17-196.el7.x86_64.rpm</filename><sum type="sha256">bce03de481e7fa7c05f9ad52c156a87370101300ff99c358207529142561f7fe</sum></package><package arch="i686" name="glibc" release="196.el7" src="glibc-2.17-196.el7.src.rpm" version="2.17"><filename>glibc-2.17-196.el7.i686.rpm</filename><sum type="sha256">cc331618291009172d3a7b9345a194cd54f41919df4a5421919c74e61b1c6b1b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9761" id="CVE-2014-9761" title="Glibc: Unbounded Stack Allocation In Nan* Functions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8776" id="CVE-2015-8776" title="Glibc: Segmentation Fault Caused By Passing Out-Of-Range Data To Strftime()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8777" id="CVE-2015-8777" title="Glibc: Ld_Pointer_Guard In The Environment Is " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8778" id="CVE-2015-8778" title="Glibc: Integer Overflow In Hcreate And Hcreate_R" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8779" id="CVE-2015-8779" title="Glibc: Unbounded Stack Allocation In Catopen Function" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1916" id="RHSA-2017:1916-1" title="Rhsa-2017:1916-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1213603" id="1213603" title="Glibc: Nss_Db: Get*Ent Crashes Without Preceding Set*Ent" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1260581" id="1260581" title="Glibc: Ld_Pointer_Guard In The Environment Is " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1298975" id="1298975" title="[Rfe] Backport The Groups Merging Feature" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300299" id="1300299" title="Glibc: Segmentation Fault Caused By Passing Out-Of-Range Data To Strftime()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300303" id="1300303" title="Glibc: Integer Overflow In Hcreate And Hcreate_R" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300310" id="1300310" title="Glibc: Unbounded Stack Allocation In Nan* Functions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300312" id="1300312" title="Glibc: Unbounded Stack Allocation In Catopen Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1318877" id="1318877" title="Per C11 And C++11, &lt;Stdint.H&gt; Should Not Look At " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1318890" id="1318890" title="Glibc: Nss_Db: Long Group Entries Are Skipped" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1322544" id="1322544" title="Segmentation Violation Can Occur Within Glibc If Fork() Is " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1324568" id="1324568" title="Glibc: Getent Returns Dud Entry  When Nscd Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1325138" id="1325138" title="Glibc: Corrupted Aux-Cache Causes Ldconfig To Segfault" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1330705" id="1330705" title="Open() And Openat() Ignore 'Mode' With O_Tmpfile On Newer Kernels" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1338672" id="1338672" title="Glibc: Gcc 6 Enablement For Struct Sockaddr_Storage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1366569" id="1366569" title="Glibc: Default Nsswitch.Conf Should Not Set Initgroups" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1370630" id="1370630" title="Glibc: Nss_Db: Endless Loop In Services Database Processing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1387874" id="1387874" title="Msg_Fastopen Definition Missing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1392540" id="1392540" title="Glibc: Default Nsswitch.Conf Does Not List Sss For The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404435" id="1404435" title="&quot;Yum Update&quot; On Fresh Installation Of Rhel 7.0 Or 7.1 Ppc64 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1417205" id="1417205" title="Missing Af_Vsock &lt;Sys/Socket.H&gt; Constant" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418978" id="1418978" title="Glibc: Backport Upstream Support/ Directory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1421155" id="1421155" title="Update Dynamic Loader Trampoline For Intel Sse, Avx, And " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1439165" id="1439165" title="Glibc: Sys_Getrandom Definition Missing On S390X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=906468" id="906468" title="Deadlock In Glibc Between Fork And Malloc" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1931-1</id><title>Bash</title><description>Security Fix(es): 
* An arbitrary command injection flaw was found in the way bash processed the hostname value. A malicious DHCP server could use this flaw to execute arbitrary commands on the DHCP client machines running bash under specific circumstances. (CVE-2016-0634) 
* An arbitrary command injection flaw was found in the way bash processed the SHELLOPTS and PS4 environment variables. A local, authenticated attacker could use this flaw to exploit poorly written setuid programs to elevate their privileges under certain circumstances. (CVE-2016-7543) 
* A denial of service flaw was found in the way bash handled popd commands. A poorly written shell script could cause bash to crash resulting in a local denial of service limited to a specific bash session. (CVE-2016-9401)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="bash" release="28.el7" src="bash-4.2.46-28.el7.src.rpm" version="4.2.46"><filename>bash-4.2.46-28.el7.x86_64.rpm</filename><sum type="sha256">9d050d0234ae7008bb2663f6cdb01a5f9d6ca20d4a16afdee149505072b57d2d</sum></package><package arch="x86_64" name="bash-doc" release="28.el7" src="bash-4.2.46-28.el7.src.rpm" version="4.2.46"><filename>bash-doc-4.2.46-28.el7.x86_64.rpm</filename><sum type="sha256">c8b360a604414e1c71e30f4ca1eb018abda5bec03ffecd2a49945ce7d15065dc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0634" id="CVE-2016-0634" title="Bash: Arbitrary Code Execution Via Malicious Hostname" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7543" id="CVE-2016-7543" title="Bash: Specially Crafted Shellopts+Ps4 Variables Allows Command Substitution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9401" id="CVE-2016-9401" title="Bash: Popd Controlled Free" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1931" id="RHSA-2017:1931-1" title="Rhsa-2017:1931-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1264101" id="1264101" title="Memleaks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1267478" id="1267478" title="Cd: -E: Invalid Option" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1372806" id="1372806" title="Bash Stack Smash Due To Longjmp Back To Wait_Builtin After It " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377496" id="1377496" title="Command &quot;Cat &lt; &lt;(Cat)&quot; Doesn'T End With Eof, Ctrl+C Terminates " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377613" id="1377613" title="Bash: Arbitrary Code Execution Via Malicious Hostname" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1379630" id="1379630" title="Bash: Specially Crafted Shellopts+Ps4 Variables Allows Command Substitution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396383" id="1396383" title="Bash: Popd Controlled Free" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1950-1</id><title>Samba</title><description>The following packages have been upgraded to a later upstream version: samba (4.6.2). 
Security Fix(es): 
* A flaw was found in the way Samba handled dangling symlinks. An authenticated malicious Samba client could use this flaw to cause the smbd daemon to enter an infinite loop and use an excessive amount of CPU and memory. (CVE-2017-9461)</description><severity>low</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="samba-winbind-krb5-locator" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-winbind-krb5-locator-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">20795713f0d1d9616c979a406954552722cc1cdfc55354972c00798e6d9aadec</sum></package><package arch="i686" name="samba-client-libs" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-client-libs-4.6.2-8.el7.i686.rpm</filename><sum type="sha256">6a5b8b5f5c0aa34b5e12558aafcc7346f1798f3d04583cb707560da415e66d91</sum></package><package arch="x86_64" name="samba-test-devel" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-test-devel-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">ca71a91af2386552acd5078ef3bb6b55daac775749e4b188f0e525672e0c8f61</sum></package><package arch="x86_64" name="samba-test" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-test-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">608b32e57f6e8a8331830f9b3bdb0a624d3ed568ee0ee20a41a493db2a03a787</sum></package><package arch="x86_64" name="samba-krb5-printing" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-krb5-printing-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">59efa5f750bbb8b1f2bcf156e34d61ec3b3b0ada54bd66a4a59ae4eeeb3aed39</sum></package><package arch="noarch" name="samba-common" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-common-4.6.2-8.el7.noarch.rpm</filename><sum type="sha256">eaf570f9e7e5d03c74ee30d88204d6035ed8b9205b0b5e5b30afbe55cf49dede</sum></package><package arch="i686" name="libwbclient-devel" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>libwbclient-devel-4.6.2-8.el7.i686.rpm</filename><sum type="sha256">b97342435c5db24f60b1037af56f84027d35aeb819210e302ed479ca03196145</sum></package><package arch="x86_64" name="ctdb-tests" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>ctdb-tests-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">86f9ed7a6734816420559a1f4506ce587433c89c01354e6f47192b0d0c2ebfc4</sum></package><package arch="x86_64" name="ctdb" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>ctdb-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">dad9e8614d260bfe78891bbfd95d7c6c16bd7f9189fd63253c8a003ea424412e</sum></package><package arch="x86_64" name="samba-common-libs" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-common-libs-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">5d035afb49a2cfacee0595e29cbcf110695e46b4f7ef443d47c1cbae5b1306ca</sum></package><package arch="x86_64" name="samba-dc" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-dc-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">282088df32798946fe38d2e192087d9419e917b75a48da252715750fc8088adf</sum></package><package arch="i686" name="libwbclient" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>libwbclient-4.6.2-8.el7.i686.rpm</filename><sum type="sha256">bb91483d7fc2900993751bbeb0f0c8bf21e3bd18c55b0e6b10e192804f1be7cd</sum></package><package arch="i686" name="libsmbclient" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>libsmbclient-4.6.2-8.el7.i686.rpm</filename><sum type="sha256">2229d218510ea6e7579acd73da0d3fbd84b642ee19163745ce909562cd2b37ee</sum></package><package arch="x86_64" name="ctdb-devel" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>ctdb-devel-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">546ed8bc32bc51bd6675ba28570b6352b4d0b22aaee59dac0e794c2339eceb9a</sum></package><package arch="x86_64" name="samba-dc-libs" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-dc-libs-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">7f76e614d7662b60e7b1d9cc857410f51583d724937f7358644a5eca77963f24</sum></package><package arch="x86_64" name="samba-winbind-modules" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-winbind-modules-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">b87a45c6c368373251ff2c3d5cab108f7c3932b27a7f1298a6292daabeffac65</sum></package><package arch="i686" name="samba-devel" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-devel-4.6.2-8.el7.i686.rpm</filename><sum type="sha256">32b044d8b1477b403bf25a82c734fa232a19c547c58797b93e8d420be3dd4cea</sum></package><package arch="noarch" name="samba-pidl" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-pidl-4.6.2-8.el7.noarch.rpm</filename><sum type="sha256">2af16a1ba887844dc477e9288dc541c99e51691f810659e250da2fa63ccff4f6</sum></package><package arch="x86_64" name="samba-libs" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-libs-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">c386e00b998a7abb215e5736d61b7f14458aa73d531e8fd05d205769ba7f776c</sum></package><package arch="x86_64" name="libwbclient-devel" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>libwbclient-devel-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">b85ddce46e17e3a16e510872ac129a651c133704639378dc57bede08d6332d4a</sum></package><package arch="x86_64" name="samba-winbind-clients" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-winbind-clients-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">55d9c7542920f67af0a6d1887e58c52a9f87cab13c049d5da1908dd93608b226</sum></package><package arch="i686" name="libsmbclient-devel" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>libsmbclient-devel-4.6.2-8.el7.i686.rpm</filename><sum type="sha256">1b2b34a1a251d3d2bc99b4c6c5abec37625960f5436a7c833685b269d6ca091d</sum></package><package arch="x86_64" name="samba" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">3e81c25b8b7a8c5e1fa48422610d75b58ab6c4de6c7d963f686afafb1731366e</sum></package><package arch="x86_64" name="samba-devel" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-devel-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">9d06b75445d96d8733698d5af8f9728f55e54ee8eaeea20c5ebf3cd30bbcca06</sum></package><package arch="i686" name="samba-winbind-modules" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-winbind-modules-4.6.2-8.el7.i686.rpm</filename><sum type="sha256">9a747bec1f148e8662edb5c9a71043c068c76703a6473fe434bba9d135bff196</sum></package><package arch="x86_64" name="libwbclient" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>libwbclient-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">af056d5325614a564b7c152c29242e93e91d0bc5949ac25e30fe4d7da220da70</sum></package><package arch="i686" name="samba-test-libs" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-test-libs-4.6.2-8.el7.i686.rpm</filename><sum type="sha256">79ad0a31d34dad95dde918071fb6453fa770c097e800e8c854635767c7695cc5</sum></package><package arch="x86_64" name="libsmbclient-devel" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>libsmbclient-devel-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">45906f929dab7bc819a12859df4517d7ae5a5b0460d53a30734dbf3a11612c3f</sum></package><package arch="i686" name="samba-libs" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-libs-4.6.2-8.el7.i686.rpm</filename><sum type="sha256">e2e21ba805223252b8af63d1156ed182e3668b950f98b184affc4e05f0d3f204</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-vfs-glusterfs-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">55bf604b7cd73ddd746b535c54dc8fadb6e83043fc33bc70b9819d5f52fff356</sum></package><package arch="x86_64" name="samba-client-libs" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-client-libs-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">143e87838e60c715aef91f696975148230ae84ddbca51383d8416df2d5a22afd</sum></package><package arch="x86_64" name="samba-python" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-python-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">757977ea874ef78f0f2b4b79350e01bb0117b5e9d4af553e8057cac6d872aaf4</sum></package><package arch="x86_64" name="samba-client" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-client-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">df08926e6e87f3a8eee46a0b8aa56fcb820ac1e3d14b8d4b4e3f8d49a0fac614</sum></package><package arch="x86_64" name="samba-common-tools" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-common-tools-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">e937497704ca1b74f16f8c12ed0c85c2256b99c85c66715d88b0a842ba2108bb</sum></package><package arch="i686" name="ctdb-devel" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>ctdb-devel-4.6.2-8.el7.i686.rpm</filename><sum type="sha256">f705de7c4d65ea7844a3df2d9dbde890a2716dfea625d038d3e8694d14c117ba</sum></package><package arch="x86_64" name="samba-test-libs" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-test-libs-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">a62f13940c437d21709870ccc9cd9a0aca7c617d6fe27f9bb275de9021e6eaeb</sum></package><package arch="x86_64" name="samba-winbind" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>samba-winbind-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">9ff6845ce430b9a482182f59e7e0e9eed15d6dedf6e2b1197b03ac3731674258</sum></package><package arch="x86_64" name="libsmbclient" release="8.el7" src="samba-4.6.2-8.el7.src.rpm" version="4.6.2"><filename>libsmbclient-4.6.2-8.el7.x86_64.rpm</filename><sum type="sha256">ca134c1a34065f4bf212e2f0bb616172c0069f81bb13f003b5e5bc12c6af96f9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9461" id="CVE-2017-9461" title="Samba: Fd_Open_Atomic Infinite Loop Due To Wrong " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1950" id="RHSA-2017:1950-1" title="Rhsa-2017:1950-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1218926" id="1218926" title="Samba Ignores Default_Keytab_Name In Krb5.Conf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1327810" id="1327810" title="Option &quot;Printcap Cache Time = 1&quot; Doesn'T Have Any Impact" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356932" id="1356932" title="The &quot;Ldap Ssl&quot; Description For Smb.Conf Is Incorrectly Defined" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377690" id="1377690" title="Libnss_Wins.So.2 Doesn'T Link Against Libreplace With Rpath" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377729" id="1377729" title="Nss_Wins Has Incorrect Function Definitions For Gethostbyname*" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1377751" id="1377751" title="Badlock Regression: Smbclient Fails To Connect To Azure Or " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1389786" id="1389786" title="[Rfe] Samba Add 'Net Ads Dns Unregister' Command From Samba 4.5.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397871" id="1397871" title="The Krb5.Conf Created By Net And Winbind Does Not Include The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397891" id="1397891" title="Setprinter Info Level 2 Marshalling Fails" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397895" id="1397895" title="Spoolss_Addprinterdriver Does Not Support Apd_Copy_From_Directory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401505" id="1401505" title="Idmap_Hash Failes To Map Sid To Uid" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1403242" id="1403242" title="Samba Can Not Access Trusted Domains Through Transitive Trusts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1403975" id="1403975" title="Trusted Domains Not Working With Samba-Winbind 4.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416746" id="1416746" title="Fix Division By Zero Error In 05.System Event Script - Ctdb" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1420130" id="1420130" title="Samba_Krb5_Wrapper Does Not List Devices When Called With No " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1430755" id="1430755" title="Net Ads Join Can'T Create Keytab When 'Kerberos Method' Is Set " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1430759" id="1430759" title="Use Gssapi Gss_Acquire_Cred_From Call For Gssproxy Support" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1431986" id="1431986" title="Expand_Dfs Plugin Read_Target_Host() Parameters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448544" id="1448544" title="Uploading 32-Bit Drivers To A Samba 4.6 Print Server Fail" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1459179" id="1459179" title="Smbclient Doesn'T List Domain, Os And Server Information" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1459464" id="1459464" title="Samba: Fd_Open_Atomic Infinite Loop Due To Wrong " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1460937" id="1460937" title="Winbind Name Normalization Doesn'T Work For Users" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461336" id="1461336" title="Smbclient Not Working Properly With Winbind Separator '+'" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1975-1</id><title>Libreoffice</title><description>Security Fix(es): 
* An out-of-bounds write flaw was found in the way Libreoffice rendered certain documents containing Polygon images. By tricking a user into opening a specially crafted LibreOffice file, an attacker could possibly use this flaw to execute arbitrary code with the privileges of the user opening the file. (CVE-2017-7870)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="autocorr-ko" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-ko-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">b11b822374beff321bcd3f2df66351e2e748390465df71dfb64d263aa1caa4fd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hu" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-hu-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">0d07656f6b709d8d2f55f023668c425b7b2543ec9e09b9f624b817068d98db7b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pyuno" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-pyuno-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">d9cc6bde12e8d6697fc73279b029efc3df48a757e0889a42a5491dabefb1736d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-impress" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-impress-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">8ed3e7e6ade4608d3f76a0a15f49afc897be0ac8254d0643748eec05a29b34c5</sum></package><package arch="noarch" epoch="1" name="autocorr-fr" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-fr-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">ea6bc8ab2fa67fac1560f3240bd4fedbba53dbec1d50c44dcc8d0e6b34ff7055</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-sdk-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">f46d1310c8a95845ec9167ebad2266bb26018440d1fff9fea8f62a273f36925c</sum></package><package arch="noarch" epoch="1" name="autocorr-pt" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-pt-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">cef82d1c7d81496fb4b7b34d7adeffd8d8222911a760ec0412c83f9d79413486</sum></package><package arch="noarch" epoch="1" name="autocorr-ru" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-ru-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">26d74742d1f843d822fa5a902a92a6090c07d48651302282ac649c2850db3f66</sum></package><package arch="x86_64" epoch="1" name="libreoffice-writer" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-writer-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">69d6c1eedd4cbeae82f116f0a582a3512c46b18263dde5310b277ba05f73590f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kn" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-kn-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">d92c771097893e7d2904d4abbdb56c5ceda0edd4bcd6fa0e7967b35f10c6c8e0</sum></package><package arch="noarch" epoch="1" name="autocorr-ro" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-ro-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">777671a9d7997b2a3800284b88397a1167c1ef0164981ffc07c641cf45da2235</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-te" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-te-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">813286c8e142acb49f8ac66745ec6f0a9333b110d2fed095789e1aaf9c516b9b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ss" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ss-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">7a24cec0240521a91c0c76569b7837f6e80524465528db8a793ad69ae461f0c9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hr" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-hr-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">dc5700454d37bedede1b289916d4b94f3f3d156da6b89538893768425b6ce224</sum></package><package arch="noarch" epoch="1" name="autocorr-hu" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-hu-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">c3d789a86bbf9b569e856a581dc0d6ce1acdc82857092476fcb16390c9623944</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fi" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-fi-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">11b1f9117fcdaa7ca585c456fc539c19e4cc21cdb5397eb1381480e7829ceefc</sum></package><package arch="noarch" epoch="1" name="autocorr-sr" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-sr-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">92b0d0b6756416eb1c797cdcc9df209a1b887b64a9f659fb9d0076648cfcbb4b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-BR" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-pt-BR-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">8ac5ab8f5e76d254df4dfdc80f38f1bee1113e535b51fe52554509681820fbb4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nso" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nso-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">e9687161cb02dcbce95e7d236ab435d925aaf45221d315b2cc0ec01eb55cb005</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-dz" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-dz-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">a6d5ed6cd7a2b40cbcae58c1bad7b5ca8fe0f385b3c232ae4ce187f65f1d662f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-en" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-en-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">5b27106461f8b5f69801652fd98627606a77811b5de959e99af58464c5724397</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sk" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-sk-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">56e644ed4f3bcaa6f7f4fc1340d7f53d752e0c99c2f0b112f2a4f6a3a8aee5ea</sum></package><package arch="x86_64" epoch="1" name="libreoffice-draw" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-draw-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">21a79f5c74b6acb1c3c6062b6f431302bd6c569476438e76369495b120ca3976</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-or" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-or-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">afda3ccc644595c838d050a1fb926a6e7b236f62b01fa7c13de9b9bc36c8137f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gl" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-gl-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">283ca403765967fb1a61c3c2912cf53a9aa3868bf45a20f3204fe5ced42fc2fb</sum></package><package arch="x86_64" epoch="1" name="libreofficekit" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreofficekit-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">aa7df2b32994fa1bb89bee2b07d830b9ce8e992809a0d3c7573413cb60c55dcd</sum></package><package arch="noarch" epoch="1" name="autocorr-is" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-is-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">45635817428c1b8defcd52af7a49de63600baf7c66ca33c882e2ef977e870f98</sum></package><package arch="noarch" epoch="1" name="autocorr-tr" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-tr-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">499f3523f371cd6e7f2ce1034168983ffa54c4ed3b1e95fb6081b0c93062ae8a</sum></package><package arch="noarch" epoch="1" name="autocorr-ga" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-ga-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">b07213ba7c352e37e5fa10155f5a7b0c2369f613998bf303bdb952693b1ace74</sum></package><package arch="noarch" epoch="1" name="autocorr-vi" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-vi-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">a3065dfee772a502d2fe8163dabb489e410d7cf6d48a291906a0fc685c0c59eb</sum></package><package arch="noarch" epoch="1" name="autocorr-ca" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-ca-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">7409bd26c546dcee50249cf2c932701890545eaf8dc2e1bd97a60b57a6c0b1d9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-librelogo" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-librelogo-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">03808da0ba3fac39d20b03c3d67a9fc303cf697056755b3e6afd9ddea115af26</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-eu" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-eu-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">a0f435e5620fba23b450e3dfc4c4038671b11e8d4d0c498855659f8dff1b973e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gdb-debug-support" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-gdb-debug-support-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">254062a695e5fc1be8e10df120fa7a6e7bb6a25522807f38eba5730ec46e0a62</sum></package><package arch="x86_64" epoch="1" name="libreoffice-emailmerge" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-emailmerge-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">caea3b6bca599ea1fa5a532f7b9f0e716542f631e2df5c4748701589535ab37e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-officebean" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-officebean-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">066c7b514e752eea17e4b95d0296af51f1b27474eb5f09f18bc13f5505b9090a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-core" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-core-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">6389af27e00874f1c51e1bdcf18b4b113773a852e51df567ee290c67b01a014f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cs" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-cs-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">3da5753ed58b71db3dee4a82f004973bbf2ba1474fed98c000a7e1d1cc181173</sum></package><package arch="x86_64" epoch="1" name="libreoffice-postgresql" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-postgresql-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">4252face52ec1098e277e598a45b614c2726f27535eb41368494ab779594769e</sum></package><package arch="x86_64" epoch="1" name="libreoffice" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">9f00c3573d5a9bf728445c3b83de950f8749646c75c38de93a53973f17df6cf7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-graphicfilter" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-graphicfilter-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">ebfcfa9eace9628b3a5d637b90e781fbdeaca8970fb22eff2d45c74cd4ffa467</sum></package><package arch="noarch" epoch="1" name="autocorr-en" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-en-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">58f7fd7db08f3cf3ff8988592fbb5052f4f0de6c193238bdba6712582a6cc491</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-af" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-af-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">21b178f9181c90d0c8ca73c46e159933b7575cbfb4d10679e919f9481f0ad1f8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-math" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-math-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">6c838bf142efb5c705f6adb911e0ab0118a601e1c193d49569c5ab84727a3eb6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-it" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-it-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">f0a3900d3cb74265f444994500298fdb4991a17c9f0bbb587dc6a5b0b2d166a2</sum></package><package arch="noarch" epoch="1" name="autocorr-af" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-af-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">385c35f94bd6b055be0861e43126553252d70e1fbe8c6ba718ca97243658c61c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-he" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-he-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">1265972183f44e7906631ca39accb58cfe3d8940ac0eef46f84007201d4e5b3a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-th" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-th-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">bd07e47a22af709233617b9c32ced923246b9bcf9cd90fcc43181cbf0f6cde30</sum></package><package arch="noarch" epoch="1" name="libreoffice-opensymbol-fonts" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-opensymbol-fonts-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">db96e4f4478b9350c7094b46a0f423614df4a3aa82faa037ebd3cfb71afec0e3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ko" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ko-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">1458a30968b6f0da8139b8c4c0402b1405fa53dca59786cba699977515499a4c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hi" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-hi-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">143e2e47ba71ae7d6ad6ffccd2a57b57ce3dfeb9d405d3470ffe429d28677297</sum></package><package arch="noarch" epoch="1" name="autocorr-pl" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-pl-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">53c14568072599a31476dd244b98c9e0c173e367a03329f31833b6370ff0498a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zu" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-zu-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">03dd4d0752a4316057162a688a9ba37a5b775c9ead82d84f9cddb0dc43ac5471</sum></package><package arch="noarch" epoch="1" name="autocorr-bg" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-bg-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">1f4c0ecd9b2644a9aa3402f1905094a10741b5816eb388718dc5cdda19c607dd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-PT" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-pt-PT-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">e1e1a02933aee56b9772d15f42036432253e89e373d4d7189d0017958a5dda2c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hans" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-zh-Hans-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">ba2a98e31639332da17421ef2124c2028e61770a81c4ba945e58dd4b6c3d22a9</sum></package><package arch="noarch" epoch="1" name="autocorr-fi" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-fi-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">49f18e941aa366d7adbb1fc119a5c97090959991a4eee292a3e42df5cba53d0a</sum></package><package arch="noarch" epoch="1" name="autocorr-lb" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-lb-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">cc014ff07e99ee4cd0d1e33afb33e3d796778c44692eca186f8c368563cc230b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ts" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ts-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">2c1bc65ae6fb97b2d8ff72ed9f5c88b749ec95e33c079ff78f02f7fdb4e1fcd7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ja" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ja-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">be5a38ea46407db627d6bd0aff7368d2fe11e36302939dd78094da652d8a4cdb</sum></package><package arch="noarch" epoch="1" name="autocorr-sl" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-sl-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">f392b25f566e16e54a6e7ea21e19a4cc3525bf59b2cc3ff962bf74795371cfcb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-bsh" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-bsh-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">5b508a8b520a7b764264cdf4cec28a6f2bd4ad66b391d9b2527bb3a235b037fb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-es" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-es-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">b8c5e21dfe5975da9456fcd2dcd01e46c45ef0154e2b0f49253b77cd0befade3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-xsltfilter" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-xsltfilter-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">00ac4069303ad57d42829403ab60c09a4d4655f7d569f620bfa75bf98f8a409f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ml" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ml-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">910e21864df4b3b4382e62a2a1c1fe5f585d7fe4889b173ee2f59727674cc57e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-br" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-br-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">daf5225ab273150a12c2a08b81dd90bcfd6b4732169f90d17701f07475537c5b</sum></package><package arch="noarch" epoch="1" name="autocorr-es" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-es-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">42b70e64a7034eb4280a564c7de45c97cef980411429857de6b03f35f86942a7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nn" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nn-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">7a13b5c1a3edafcfb81308faef7a45fad218ca0123066d07833f10b243551813</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ro" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ro-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">28608a1298b5c433a0d88337e6b4ff85ae7dc0481a3d597c61d78c681050f68b</sum></package><package arch="noarch" epoch="1" name="autocorr-hr" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-hr-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">547c74397d6dedd5933447d01b65a7cb3839738def8e4b27d5be9f3404c18dc8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ure" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-ure-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">57330f6bac031c21c14ed5b1fea30d7ca605cd67128f1ac3e207de0824aa97cc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-el" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-el-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">200a56715eccc2289ce4818b45b6a465b5a47ebe1f06c7c4be153746f5bb2239</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pa" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-pa-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">af79556138d8c2a6f9f6b332e4571d468320acc5089cc703ffdf579805d46851</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-da" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-da-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">ccc9f262752003089984ea7f19ca6eaa3ea94ed21a13f6973b366b63bf6026ff</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tr" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-tr-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">25a4a42e96d3887f3c9de64761b98ad65160f67d23aecbc265967cc0358dea39</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nb" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nb-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">4b0679abbeb8efb62828e830a019587d5e0f1db61d165fa259fb2efd66676c16</sum></package><package arch="x86_64" epoch="1" name="libreoffice-wiki-publisher" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-wiki-publisher-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">911218c213cd0c6db1f8b2286157bdf14942fed5f0d69b39114150d599f11a01</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-st" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-st-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">7fe9a0be443737330cf4ee87f44d535f975dad43c341454df3a17b9b227ec272</sum></package><package arch="noarch" epoch="1" name="autocorr-nl" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-nl-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">6a76772d3c7ec3937a7092492398097bf753e7b20ca32c51aa6c2a021ad6f830</sum></package><package arch="x86_64" epoch="1" name="libreoffice-base" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-base-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">dccbeab335774e6dfd0e22c9796f0a785237f33249e1e13423840e98465b0380</sum></package><package arch="i686" epoch="1" name="libreofficekit" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreofficekit-5.0.6.2-14.el7.i686.rpm</filename><sum type="sha256">906a37f38ccfdca2cf3f2dbc85fefaa7d6f62d1d093b0b02a19ff34f894dd700</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-de" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-de-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">d2644f94b373fcd29eaaefb94c751cde150b30bdb88b0a4d11c87956d0e6d3f0</sum></package><package arch="noarch" epoch="1" name="autocorr-da" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-da-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">2ac9df3fe15effac2c13d5e029382051c6c377eb55c006653d499184022e21da</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pdfimport" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-pdfimport-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">6f0960e857762c8cc8182c9af7160014a1f580ffe943d4fafc7b564f7aa9f73f</sum></package><package arch="noarch" epoch="1" name="autocorr-de" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-de-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">3b83bfb6c1600713a5620fd77d3d87b1c81f33b82441f7a80a2582463f4e1c76</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ta" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ta-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">52a6efa8ad59a13de83fe7cadcbdc39d7e5686efe2f4131440398977b71eade0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-uk" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-uk-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">42c6cee9213ced7bf6d56c85af50c1d156459edd7f829d1a8133916ef95b018f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hant" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-zh-Hant-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">856d42c5c48233cfbe216ff676937e19bb1d51a9bc14324a02b67a50418632a9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-et" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-et-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">04a1106d0fe801529e6bd45fe641a08cda50f74fd9d6faa715882740619f2d8c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mai" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-mai-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">7077b735d83b5faf5d7f93626841608c63c496861d26be250bc636a959d65971</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-as" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-as-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">2df35ea778b42593d68a88aa17dc004a8e780318aa9c78b8da216f6dd7ec0ba6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-glade" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-glade-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">b0dfc87512609724fbb8102bbf9793993ff79a1a4d070e324472c9f55203cea5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sr" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-sr-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">96eb15b3d5604e7ba62ed6e995c9b242dc289631060e1c41cdfb3a7a133d1a49</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nl" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nl-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">5aa7ab51b357fb4c0b7ecec3ea601249c44cbd7da09d05fb57bc1a34f0fb7385</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pl" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-pl-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">6e365427afce447c462b312cfee42497b6a6931b7ff95c46d272bd82b341dbd5</sum></package><package arch="noarch" epoch="1" name="autocorr-zh" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-zh-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">71ca27ca13a5a9f7ebff718f5f8fe9df3bda6b0ee765cba2f6ba8d4f1c45c3ec</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ar" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ar-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">b0219d3545af26ff527759ad8137559bd4448adab31a6d56c1874f912e0dd05e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lt" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-lt-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">7b9a7fc38a0dcf9caa45e8bc3dc77d53bb9c53aa86d585feb7370d2551a8e749</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mr" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-mr-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">bbf220833d9144bc28951ca0939671d982083ec76219b6b4132327af4a05cd99</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ca" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ca-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">30733fd2d06b65139038f52ab1e154da89518b479139048fd5cf61c9c4d62548</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bg" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-bg-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">697bac34e753f3aa77b0c1a906b49e73dbf57cfb2d1303e516791482deb8bc30</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ga" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ga-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">d7ee65a8faab9e4eb2dbe69ea9e9bc598ccd9df4412c2b1b04618857aa570b3f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kk" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-kk-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">12d305b0caf1738783b4abcedf8e540555e2c1a617e1c9361cd1cb8c955873d8</sum></package><package arch="i686" epoch="1" name="libreofficekit-devel" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreofficekit-devel-5.0.6.2-14.el7.i686.rpm</filename><sum type="sha256">b8bad7883258b5136bac74680c42ef1c296fd20c229db7459a11065fe18de86e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-xh" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-xh-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">ea8ca0badb28aa96896d4c426f6677fe9aa8d73b24192ae3600ec291f943649c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ve" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ve-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">030b47e5b7d0d23472cd0f0f1284786ad6eccc649eb80a98763468715a08a8ad</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nr" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nr-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">422dd5402d272fab8891d982c8260d3c7f42bd81af4011f3288218d5e0de8fde</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sv" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-sv-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">64202be9371980ae06b3e2afd644e32aab479e318c0e7d0773ff1508070b9c3e</sum></package><package arch="noarch" epoch="1" name="autocorr-sv" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-sv-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">9eff20f1924609b1c53185d7d510ae1a4d8c564cd0565a542cd84d065f858705</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk-doc" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-sdk-doc-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">a0e304560457559fc2500f22e42ca5593fd3ba77cef1522598d910f80c1d63db</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cy" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-cy-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">fa53396ade5f8454ed0dc1e1593c65edd1aacf804d91ee92dbf514ca0ac5483d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sl" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-sl-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">1e701aab4a2aee337b7fab1fdf04d680c5286fcd8027439236ce3c2288febb39</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ogltrans" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-ogltrans-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">88f24b3e0e61b05a4c0c17985a99fc664191780b1c0de0631a5501c9e73347f6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fa" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-fa-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">036341d354ce7a1c53e3883a9a7bcc4778b38c9bd399e04548958da90de6f1f6</sum></package><package arch="noarch" epoch="1" name="autocorr-it" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-it-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">8e4dfed265ce836fe1e6271f17a6a77683adb47bcb58de4402bd50266fedec73</sum></package><package arch="x86_64" epoch="1" name="libreoffice-calc" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-calc-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">c78ce1f20ea65900f61a171318ba7dd6bda9589dc543d336c11b7fbaa643b024</sum></package><package arch="x86_64" epoch="1" name="libreofficekit-devel" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreofficekit-devel-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">2d1c7355d140a88f0106dfe05d6f3ff49f14e6375c6a1022d4aa2c86b00f321d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fr" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-fr-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">c59919ab09820febd59116e13558731e60a1dd15cc0711d9aa0aec82fbb3757e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-filters" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-filters-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">1847d20565104ffa248cfba8c885d940bbdf02911fc2ba761121ab5e93d9ce0f</sum></package><package arch="noarch" epoch="1" name="autocorr-lt" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-lt-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">4a7965dc949216ef429f3cf903d4891d008b0ef122c5c9f1811ad148320378e1</sum></package><package arch="noarch" epoch="1" name="autocorr-cs" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-cs-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">4e93abcf1c68c33cabae5d7a0df759b849102483bc7c9b0152a04dc6204e0141</sum></package><package arch="x86_64" epoch="1" name="libreoffice-rhino" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-rhino-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">aaf1d14c1296ecf765419d8989ab9c2de9aca65fb02d2920fb76f09187cdf8e0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lv" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-lv-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">0e677424fd60285fe81963e4cedff97da02edc0c5f9dc3e65d45186be25e8a5e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gu" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-gu-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">f80cc3d14c99404cb9e16f4d0f78f683f1c69f8d73414c65bf4714078b3627d6</sum></package><package arch="noarch" epoch="1" name="autocorr-sk" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-sk-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">c6ac1f80b1ea1101cbaa90a62ac47d60cb4237e098b2cace026c6bcd1e53cf01</sum></package><package arch="noarch" epoch="1" name="autocorr-mn" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-mn-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">7c6f6c38c88e8563eb17542b1e2c95c6b8a87989af02543443c5be55cac2281b</sum></package><package arch="noarch" epoch="1" name="autocorr-fa" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-fa-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">17ee501bf058500bf85dfe8648672f4e8d17fcaee9810adb0e9894624e396f08</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ru" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ru-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">0e2346532f7fa8c4d579e2e4c13f4f6df8439d0f163d2dc612a38096bc332ebd</sum></package><package arch="noarch" epoch="1" name="autocorr-ja" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>autocorr-ja-5.0.6.2-14.el7.noarch.rpm</filename><sum type="sha256">82a3dd85a23102f506d73dd32334f70afb2deb88dfd61101f3fa4797c0ebb564</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bn" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-bn-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">dafeee32d467447b53bc61fa8541ffc7272c2e2cd2a00428316f3533ffc081b3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-nlpsolver" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-nlpsolver-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">58cdb228d2bd802b28b44bdb874891cb4083eeb77884a01985756135a00bec2c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tn" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-tn-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">f9eeb90e0f6c7b8cefa9639c57d0f86fc5b18a93a072e6883d529d954e7c5c70</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-si" release="14.el7" src="libreoffice-5.0.6.2-14.el7.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-si-5.0.6.2-14.el7.x86_64.rpm</filename><sum type="sha256">e9083fdacf1a56edff76fac7d372de4f61a8be436dcfbed1342bd02421f5e87e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7870" id="CVE-2017-7870" title="Libreoffice: Heap-Buffer-Overflow In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1975" id="RHSA-2017:1975-1" title="Rhsa-2017:1975-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397992" id="1397992" title="[Fix Available] Crash In Calc After Closing Dialog Box With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1411327" id="1411327" title="[Fix Available] Password Protected (Encrypted) Files Opening " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1421726" id="1421726" title="[Fix Available] Redraw Issues In Libreoffice Calc When 300 Or " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1431539" id="1431539" title="Gnome-Documents Requires Libreofficekit Which Is Not Provided" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1444061" id="1444061" title="Libreoffice: Heap-Buffer-Overflow In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1454598" id="1454598" title="[Fix Available] Libreoffice Writer Crashes When Selecting A " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1454693" id="1454693" title="Segmentation Fault After Clicking Gnome-Documents Back Button " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:1983-1</id><title>Postgresql</title><description>The following packages have been upgraded to a later upstream version: postgresql (9.2.21). 
Security Fix(es): 
* It was found that some selectivity estimation functions did not check user privileges before providing information from pg_statistic, possibly leaking information. A non-administrative database user could use this flaw to steal some information from tables they are otherwise not allowed to access. (CVE-2017-7484) 
* It was found that the pg_user_mappings view could disclose information about user mappings to a foreign database to non-administrative database users. A database user with USAGE privilege for this mapping could, when querying the view, obtain user mapping data, such as the username and password used to connect to the foreign database. (CVE-2017-7486)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="postgresql-libs" release="1.el7" src="postgresql-9.2.21-1.el7.src.rpm" version="9.2.21"><filename>postgresql-libs-9.2.21-1.el7.i686.rpm</filename><sum type="sha256">f779fd5488410472d8baaedc064653f4cc9c1a30fff1976b7a0bf4ac63559d5f</sum></package><package arch="x86_64" name="postgresql-libs" release="1.el7" src="postgresql-9.2.21-1.el7.src.rpm" version="9.2.21"><filename>postgresql-libs-9.2.21-1.el7.x86_64.rpm</filename><sum type="sha256">e85713609d765e61562ca5ce03025f8d98a63b159be04c9d1633f049b353c4b6</sum></package><package arch="x86_64" name="postgresql-plpython" release="1.el7" src="postgresql-9.2.21-1.el7.src.rpm" version="9.2.21"><filename>postgresql-plpython-9.2.21-1.el7.x86_64.rpm</filename><sum type="sha256">3ae7f99dbabafa374d411067f5b89b5434bfaab165447583903cd36214f515c3</sum></package><package arch="x86_64" name="postgresql-docs" release="1.el7" src="postgresql-9.2.21-1.el7.src.rpm" version="9.2.21"><filename>postgresql-docs-9.2.21-1.el7.x86_64.rpm</filename><sum type="sha256">08ea709284c6afb0dd7a31729988bad9afcbcf7076a02415cb98982e3caba2eb</sum></package><package arch="x86_64" name="postgresql-upgrade" release="1.el7" src="postgresql-9.2.21-1.el7.src.rpm" version="9.2.21"><filename>postgresql-upgrade-9.2.21-1.el7.x86_64.rpm</filename><sum type="sha256">3f9b2e78d505a2812f0dfc42ef78339d12e88e40a4d931711d911f06033b9ed7</sum></package><package arch="i686" name="postgresql-devel" release="1.el7" src="postgresql-9.2.21-1.el7.src.rpm" version="9.2.21"><filename>postgresql-devel-9.2.21-1.el7.i686.rpm</filename><sum type="sha256">91157578f5fa5537583478df8cd40bf1e4600a06fe9c0927ad26364beb870bf8</sum></package><package arch="x86_64" name="postgresql" release="1.el7" src="postgresql-9.2.21-1.el7.src.rpm" version="9.2.21"><filename>postgresql-9.2.21-1.el7.x86_64.rpm</filename><sum type="sha256">47e3f74ba1e59e237dc769412b277468b2e08f141c727e9f0ce4928f8f29d189</sum></package><package arch="x86_64" name="postgresql-devel" release="1.el7" src="postgresql-9.2.21-1.el7.src.rpm" version="9.2.21"><filename>postgresql-devel-9.2.21-1.el7.x86_64.rpm</filename><sum type="sha256">732f5b1a6f5f4ff4729ea8d05db17166a8523b3301f2079eaf42e6b98d1e685b</sum></package><package arch="i686" name="postgresql-static" release="1.el7" src="postgresql-9.2.21-1.el7.src.rpm" version="9.2.21"><filename>postgresql-static-9.2.21-1.el7.i686.rpm</filename><sum type="sha256">09600905ed73a6d325aa80734dc68c74d67d33681522751b86e43b12b27c8470</sum></package><package arch="x86_64" name="postgresql-plperl" release="1.el7" src="postgresql-9.2.21-1.el7.src.rpm" version="9.2.21"><filename>postgresql-plperl-9.2.21-1.el7.x86_64.rpm</filename><sum type="sha256">38d3028eaf5af7228f71c5e680373cbe0c4d1b2ff9b22431c3d19adf82371c27</sum></package><package arch="x86_64" name="postgresql-static" release="1.el7" src="postgresql-9.2.21-1.el7.src.rpm" version="9.2.21"><filename>postgresql-static-9.2.21-1.el7.x86_64.rpm</filename><sum type="sha256">6933fce73a284dfc6e8a9e97a57664363980138341e16502907d645a9cb76061</sum></package><package arch="x86_64" name="postgresql-pltcl" release="1.el7" src="postgresql-9.2.21-1.el7.src.rpm" version="9.2.21"><filename>postgresql-pltcl-9.2.21-1.el7.x86_64.rpm</filename><sum type="sha256">ae74a10d3ed765cabb70d55e360379e31f4c89b4792e91092c9d389d2b296c71</sum></package><package arch="i686" name="postgresql" release="1.el7" src="postgresql-9.2.21-1.el7.src.rpm" version="9.2.21"><filename>postgresql-9.2.21-1.el7.i686.rpm</filename><sum type="sha256">ed7af420856d465b1e5df5d15afab1f079a8a84377aeb663345e894621d26c08</sum></package><package arch="x86_64" name="postgresql-server" release="1.el7" src="postgresql-9.2.21-1.el7.src.rpm" version="9.2.21"><filename>postgresql-server-9.2.21-1.el7.x86_64.rpm</filename><sum type="sha256">659beaa5f23ca87280b57ea2d0c0b9a8cff40283b95c0428b247ee220078d9ee</sum></package><package arch="x86_64" name="postgresql-contrib" release="1.el7" src="postgresql-9.2.21-1.el7.src.rpm" version="9.2.21"><filename>postgresql-contrib-9.2.21-1.el7.x86_64.rpm</filename><sum type="sha256">6c064784cf0eff13715645dbf3ef41f4063d919834a73a2e091a7e316b8788ea</sum></package><package arch="x86_64" name="postgresql-test" release="1.el7" src="postgresql-9.2.21-1.el7.src.rpm" version="9.2.21"><filename>postgresql-test-9.2.21-1.el7.x86_64.rpm</filename><sum type="sha256">d59a0cb2af439a5aa475abac42d1bd86f20df677b3cf79cba9dfdf99b1dd025d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7484" id="CVE-2017-7484" title="Postgresql: Selectivity Estimators Bypass Select " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7486" id="CVE-2017-7486" title="Postgresql: Pg_User_Mappings View Discloses " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:1983" id="RHSA-2017:1983-1" title="Rhsa-2017:1983-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1305979" id="1305979" title="Feature Request: Include Libpgport.A In Postgresql-Devel (Or " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448078" id="1448078" title="Postgresql: Selectivity Estimators Bypass Select " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448089" id="1448089" title="Postgresql: Pg_User_Mappings View Discloses " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2000-1</id><title>Tigervnc And Fltk</title><description>FLTK (pronounced "fulltick") is a cross-platform C++ GUI toolkit. It provides modern GUI functionality without the bloat, and supports 3D graphics via OpenGL and its built-in GLUT emulation. 
The following packages have been upgraded to a later upstream version: tigervnc (1.8.0), fltk (1.3.4). 
Security Fix(es): 
* A denial of service flaw was found in the TigerVNC's Xvnc server. A remote unauthenticated attacker could use this flaw to make Xvnc crash by terminating the TLS handshake process early. (CVE-2016-10207) 
* A double free flaw was found in the way TigerVNC handled ClientFence messages. A remote, authenticated attacker could use this flaw to make Xvnc crash by sending specially crafted ClientFence messages, resulting in denial of service. (CVE-2017-7393) 
* A missing input sanitization flaw was found in the way TigerVNC handled credentials. A remote unauthenticated attacker could use this flaw to make Xvnc crash by sending specially crafted usernames, resulting in denial of service. (CVE-2017-7394) 
* An integer overflow flaw was found in the way TigerVNC handled ClientCutText messages. A remote, authenticated attacker could use this flaw to make Xvnc crash by sending specially crafted ClientCutText messages, resulting in denial of service. (CVE-2017-7395) 
* A buffer overflow flaw, leading to memory corruption, was found in TigerVNC viewer. A remote malicious VNC server could use this flaw to crash the client vncviewer process resulting in denial of service. (CVE-2017-5581) 
* A memory leak flaw was found in the way TigerVNC handled termination of VeNCrypt connections. A remote unauthenticated attacker could repeatedly send connection requests to the Xvnc server, causing it to consume large amounts of memory resources over time, and ultimately leading to a denial of service due to memory exhaustion. (CVE-2017-7392) 
* A memory leak flaw was found in the way TigerVNC handled client connections. A remote unauthenticated attacker could repeatedly send connection requests to the Xvnc server, causing it to consume large amounts of memory resources over time, and ultimately leading to a denial of service due to memory exhaustion. (CVE-2017-7396)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tigervnc-license" release="1.el7" src="tigervnc-1.8.0-1.el7.src.rpm" version="1.8.0"><filename>tigervnc-license-1.8.0-1.el7.noarch.rpm</filename><sum type="sha256">cf0bf59603143f381776aa92f295bab17f1ea4187f81ad336c6164d91fe3e02b</sum></package><package arch="x86_64" name="fltk" release="1.el7" src="fltk-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>fltk-1.3.4-1.el7.x86_64.rpm</filename><sum type="sha256">9c6d66c3bcdb8275947db19a6d50eb7b36c80fb2529216959d07a615eb9ee80f</sum></package><package arch="x86_64" name="tigervnc-server-module" release="1.el7" src="tigervnc-1.8.0-1.el7.src.rpm" version="1.8.0"><filename>tigervnc-server-module-1.8.0-1.el7.x86_64.rpm</filename><sum type="sha256">14c4cd3628900d459487403759a803e9c06e27a2b69cd111be2528bdd70db29e</sum></package><package arch="i686" name="fltk" release="1.el7" src="fltk-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>fltk-1.3.4-1.el7.i686.rpm</filename><sum type="sha256">34c0e01a6d8bfecfd9dc721267a4569e60c60a888d1a45cf91ed2222425e56f2</sum></package><package arch="i686" name="fltk-static" release="1.el7" src="fltk-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>fltk-static-1.3.4-1.el7.i686.rpm</filename><sum type="sha256">64d93936cedf735a82f829166b0606885995325d6df1585de359f87016c7f3a2</sum></package><package arch="x86_64" name="fltk-fluid" release="1.el7" src="fltk-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>fltk-fluid-1.3.4-1.el7.x86_64.rpm</filename><sum type="sha256">ed346d1a8dc1d256deb7e441d954575306638af236fc2f363d3b6ba4239ebb3e</sum></package><package arch="noarch" name="tigervnc-icons" release="1.el7" src="tigervnc-1.8.0-1.el7.src.rpm" version="1.8.0"><filename>tigervnc-icons-1.8.0-1.el7.noarch.rpm</filename><sum type="sha256">4e2e32ecdc13d7f094ec71c0fe58c4644eab579b9dc41bf264042b1e62a64aaa</sum></package><package arch="x86_64" name="fltk-static" release="1.el7" src="fltk-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>fltk-static-1.3.4-1.el7.x86_64.rpm</filename><sum type="sha256">6395395a63458d887ce0d9e6f2e35624c0e7e9b2ae0d3d19a77aeb4792772f43</sum></package><package arch="x86_64" name="tigervnc-server-minimal" release="1.el7" src="tigervnc-1.8.0-1.el7.src.rpm" version="1.8.0"><filename>tigervnc-server-minimal-1.8.0-1.el7.x86_64.rpm</filename><sum type="sha256">f44d88c2e8c832e0b76f12fecc6b234d221842542762ce45df9ebe82b458528c</sum></package><package arch="x86_64" name="tigervnc-server" release="1.el7" src="tigervnc-1.8.0-1.el7.src.rpm" version="1.8.0"><filename>tigervnc-server-1.8.0-1.el7.x86_64.rpm</filename><sum type="sha256">948c29e8a4c24ebf4dc11e673bae54c3d3a331c656c3b9d860636e6d099017db</sum></package><package arch="noarch" name="tigervnc-server-applet" release="1.el7" src="tigervnc-1.8.0-1.el7.src.rpm" version="1.8.0"><filename>tigervnc-server-applet-1.8.0-1.el7.noarch.rpm</filename><sum type="sha256">83506cfe84e7efc4c5fd362ce48bbde27046180726e4a2b969307b0cbf3b981f</sum></package><package arch="i686" name="fltk-devel" release="1.el7" src="fltk-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>fltk-devel-1.3.4-1.el7.i686.rpm</filename><sum type="sha256">dfd4077966e248bca8506bba773dd27707cf15f70fc2ee339c455f27d251fd6f</sum></package><package arch="x86_64" name="tigervnc" release="1.el7" src="tigervnc-1.8.0-1.el7.src.rpm" version="1.8.0"><filename>tigervnc-1.8.0-1.el7.x86_64.rpm</filename><sum type="sha256">5bb27ab4bfea384fc6e6469732ab2bbae27b52d4673964bc0e27ca7d3c94b693</sum></package><package arch="x86_64" name="fltk-devel" release="1.el7" src="fltk-1.3.4-1.el7.src.rpm" version="1.3.4"><filename>fltk-devel-1.3.4-1.el7.x86_64.rpm</filename><sum type="sha256">96076182e312b7f18bbc91ab028d4264038585256a48b26d509c82838089b831</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10207" id="CVE-2016-10207" title="Tigervnc: Vnc Server Can Crash When Tls Handshake Terminates Early" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5581" id="CVE-2017-5581" title="Tigervnc: Buffer Overflow In Modifiablepixelbuffer::Fillrect" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7392" id="CVE-2017-7392" title="Tigervnc: Ssecurityvencrypt Memory Leak" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7393" id="CVE-2017-7393" title="Tigervnc: Double Free Via Crafted Fences" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7394" id="CVE-2017-7394" title="Tigervnc: Server Crash Via Long Usernames" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7395" id="CVE-2017-7395" title="Tigervnc: Integer Overflow In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7396" id="CVE-2017-7396" title="Tigervnc: Securityserver And Clientserver Memory " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2000" id="RHSA-2017:2000-1" title="Rhsa-2017:2000-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1343899" id="1343899" title="Disabling Vncconfig Window" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358090" id="1358090" title="Shared Memory Leakage In Vncviewer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1388620" id="1388620" title="[Rebase] Tigervnc From 1.3 To 1.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1393971" id="1393971" title="[Rfe] Systemd Unit For Xvnc (Not Vncserver)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1410164" id="1410164" title="Tigervnc-Server Fails To Remove /Tmp Files If Not Gracefully " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413598" id="1413598" title="[Rebase] Update Fltk To 1.3.4 For Tigervnc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1415547" id="1415547" title="Rebuilding Tigervnc Srpm Stops At Applying Patch101" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1415712" id="1415712" title="Tigervnc: Buffer Overflow In Modifiablepixelbuffer::Fillrect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418761" id="1418761" title="Tigervnc: Vnc Server Can Crash When Tls Handshake Terminates Early" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1438694" id="1438694" title="Tigervnc: Ssecurityvencrypt Memory Leak" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1438697" id="1438697" title="Tigervnc: Double Free Via Crafted Fences" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1438700" id="1438700" title="Tigervnc: Server Crash Via Long Usernames" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1438701" id="1438701" title="Tigervnc: Integer Overflow In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1438703" id="1438703" title="Tigervnc: Securityserver And Clientserver Memory " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2004-1</id><title>Git</title><description>Security Fix(es): 
* It was found that the git-prompt.sh script shipped with git failed to correctly handle branch names containing special characters. A specially crafted git repository could use this flaw to execute arbitrary commands if a user working with the repository configured their shell to include repository information in the prompt. (CVE-2014-9938) 
* A flaw was found in the way git-shell handled command-line options for the restricted set of git-shell commands. A remote, authenticated attacker could use this flaw to bypass git-shell restrictions, to view and manipulate files, by abusing the instance of the less command launched using crafted command-line options. (CVE-2017-8386)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="git-p4" release="11.el7" src="git-1.8.3.1-11.el7.src.rpm" version="1.8.3.1"><filename>git-p4-1.8.3.1-11.el7.noarch.rpm</filename><sum type="sha256">621b90719589d4378627f73e7f10ca7f01c5d0361638816fc232561e5a8b72a8</sum></package><package arch="noarch" name="gitk" release="11.el7" src="git-1.8.3.1-11.el7.src.rpm" version="1.8.3.1"><filename>gitk-1.8.3.1-11.el7.noarch.rpm</filename><sum type="sha256">d7993a3b300e6cf8fcc2113e2030f5dc9732740b226ca8db8bde361a835a18a8</sum></package><package arch="noarch" name="perl-Git" release="11.el7" src="git-1.8.3.1-11.el7.src.rpm" version="1.8.3.1"><filename>perl-Git-1.8.3.1-11.el7.noarch.rpm</filename><sum type="sha256">149447e1781ba34489dd131dfb0000ddfbca1c6b28498a826f21251e6b3f423d</sum></package><package arch="noarch" name="git-email" release="11.el7" src="git-1.8.3.1-11.el7.src.rpm" version="1.8.3.1"><filename>git-email-1.8.3.1-11.el7.noarch.rpm</filename><sum type="sha256">7ffa844ead2ce9fc5fc60ad672ee5e5018cb4c52caf3cc6878e741c4df5ac0ee</sum></package><package arch="noarch" name="emacs-git-el" release="11.el7" src="git-1.8.3.1-11.el7.src.rpm" version="1.8.3.1"><filename>emacs-git-el-1.8.3.1-11.el7.noarch.rpm</filename><sum type="sha256">e8f215af48fa45fb0acfcc5a56d92b499029cfc60a9bf11f7a8dc3d14d56e204</sum></package><package arch="noarch" name="git-bzr" release="11.el7" src="git-1.8.3.1-11.el7.src.rpm" version="1.8.3.1"><filename>git-bzr-1.8.3.1-11.el7.noarch.rpm</filename><sum type="sha256">c58ccce256bd4d27fe5b179adbae56402db9fc5e1dc75a2a5453a82c63410e3f</sum></package><package arch="noarch" name="git-hg" release="11.el7" src="git-1.8.3.1-11.el7.src.rpm" version="1.8.3.1"><filename>git-hg-1.8.3.1-11.el7.noarch.rpm</filename><sum type="sha256">e1ad5703b2d4e9819e76413f02f2c092d08593023ebeb80ad25b94f8f1875fc2</sum></package><package arch="noarch" name="emacs-git" release="11.el7" src="git-1.8.3.1-11.el7.src.rpm" version="1.8.3.1"><filename>emacs-git-1.8.3.1-11.el7.noarch.rpm</filename><sum type="sha256">4ae9c932a6f6844d476c3c983652adf5c0f71a3615f4d5147e743b41d02c123d</sum></package><package arch="x86_64" name="git" release="11.el7" src="git-1.8.3.1-11.el7.src.rpm" version="1.8.3.1"><filename>git-1.8.3.1-11.el7.x86_64.rpm</filename><sum type="sha256">7a2303884b1bac2d8438a4a22925934814614b842b01d31a44b6de859c99ca12</sum></package><package arch="noarch" name="git-cvs" release="11.el7" src="git-1.8.3.1-11.el7.src.rpm" version="1.8.3.1"><filename>git-cvs-1.8.3.1-11.el7.noarch.rpm</filename><sum type="sha256">a65ddba0b8963cf870d3010f6f64a737896a240cda5e685ca44534b8e470d9ba</sum></package><package arch="x86_64" name="git-svn" release="11.el7" src="git-1.8.3.1-11.el7.src.rpm" version="1.8.3.1"><filename>git-svn-1.8.3.1-11.el7.x86_64.rpm</filename><sum type="sha256">4211d9e3c6da22e8632b3cc84917aff58045bc2ea3a6155de0a7c27707e22bd7</sum></package><package arch="noarch" name="git-gui" release="11.el7" src="git-1.8.3.1-11.el7.src.rpm" version="1.8.3.1"><filename>git-gui-1.8.3.1-11.el7.noarch.rpm</filename><sum type="sha256">e566464975c75d5d30cc998d0e4eeedcdc08855f0ba239e9ee164f114fa5fe8e</sum></package><package arch="noarch" name="perl-Git-SVN" release="11.el7" src="git-1.8.3.1-11.el7.src.rpm" version="1.8.3.1"><filename>perl-Git-SVN-1.8.3.1-11.el7.noarch.rpm</filename><sum type="sha256">b1aa67a949645a54fdcfec491d9fe20da9f7c12a7ebfd050e2097ba85833d13e</sum></package><package arch="noarch" name="gitweb" release="11.el7" src="git-1.8.3.1-11.el7.src.rpm" version="1.8.3.1"><filename>gitweb-1.8.3.1-11.el7.noarch.rpm</filename><sum type="sha256">ab8dfee0e90e79aaa088134b75e32e9781e1ca3482aaa78a8a537b9037f3fe61</sum></package><package arch="noarch" name="git-all" release="11.el7" src="git-1.8.3.1-11.el7.src.rpm" version="1.8.3.1"><filename>git-all-1.8.3.1-11.el7.noarch.rpm</filename><sum type="sha256">646dfa33b2dcc19ad9840c9aee9bd4f0ec6c137e7954899a4197e53ba9c46db1</sum></package><package arch="x86_64" name="git-daemon" release="11.el7" src="git-1.8.3.1-11.el7.src.rpm" version="1.8.3.1"><filename>git-daemon-1.8.3.1-11.el7.x86_64.rpm</filename><sum type="sha256">7125d4df1f1e58642909e9b6480ca956a0a9f61d721a3c1b4234a769902a4167</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9938" id="CVE-2014-9938" title="Git: Git-Prompt.Sh Does Not Sanitize Branch " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8386" id="CVE-2017-8386" title="Git: Escape Out Of Git-Shell" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2004" id="RHSA-2017:2004-1" title="Rhsa-2017:2004-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369173" id="1369173" title="Git Is Unable To Use Http(S)-Sso Because Of Fix For " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434415" id="1434415" title="Git: Git-Prompt.Sh Does Not Sanitize Branch " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1450407" id="1450407" title="Git: Escape Out Of Git-Shell" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2016-1</id><title>Curl</title><description>Security Fix(es): 
* Multiple integer overflow flaws leading to heap-based buffer overflows were found in the way curl handled escaping and unescaping of data. An attacker could potentially use these flaws to crash an application using libcurl by sending a specially crafted input to the affected libcurl functions. (CVE-2016-7167)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="curl" release="42.el7" src="curl-7.29.0-42.el7.src.rpm" version="7.29.0"><filename>curl-7.29.0-42.el7.x86_64.rpm</filename><sum type="sha256">7a541ab0e8e257f02e286186cca9d1b9abb9c5113ce28cfeab18d521e6f069b4</sum></package><package arch="x86_64" name="libcurl" release="42.el7" src="curl-7.29.0-42.el7.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-42.el7.x86_64.rpm</filename><sum type="sha256">fe735ecdef74a726fd23eb30a748dfd88fb377439c98548d1a069d2439c39e0d</sum></package><package arch="i686" name="libcurl-devel" release="42.el7" src="curl-7.29.0-42.el7.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-42.el7.i686.rpm</filename><sum type="sha256">4f214785c3b1e7e15ff54eeda05ace59f2fd33654a4dba71e1635a77176592cf</sum></package><package arch="i686" name="libcurl" release="42.el7" src="curl-7.29.0-42.el7.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-42.el7.i686.rpm</filename><sum type="sha256">fb0c850e9c16843363dc3d13251bc7367b98c2996697c833144f414b8d2e3d1c</sum></package><package arch="x86_64" name="libcurl-devel" release="42.el7" src="curl-7.29.0-42.el7.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-42.el7.x86_64.rpm</filename><sum type="sha256">be8a03212ed57697ab502d315fe9d14a2bb976d3b4dd2874d2cb4bfdc2de0dc8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7167" id="CVE-2016-7167" title="Curl: Escape And Unescape Integer Overflows" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2016" id="RHSA-2017:2016-1" title="Rhsa-2017:2016-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1341503" id="1341503" title="Curl Request For Http Get With Cookie To An Ipv6 Address Does " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1374740" id="1374740" title="Libcurl Does Not Accept Use Of Ciphers *-Sha384" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1375906" id="1375906" title="Curl: Escape And Unescape Integer Overflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1388162" id="1388162" title="Https Request Hangs When Http Proxy Responds Too Soon" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404815" id="1404815" title="Sec_Error_No_Token Error When Using Ssl And Multiple Threads" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1420327" id="1420327" title="Curl 7.29 Cannot Connect To Ftps Using Proxytunnel" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2029-1</id><title>Openssh</title><description>The following packages have been upgraded to a later upstream version: openssh (7.4p1). 
Security Fix(es): 
* A covert timing channel flaw was found in the way OpenSSH handled authentication of non-existent users. A remote unauthenticated attacker could possibly use this flaw to determine valid user names by measuring the timing of server responses. (CVE-2016-6210) 
* It was found that OpenSSH did not limit password lengths for password authentication. A remote unauthenticated attacker could use this flaw to temporarily trigger high CPU consumption in sshd by sending long passwords. (CVE-2016-6515) 
* It was found that ssh-agent could load PKCS#11 modules from arbitrary paths. An attacker having control of the forwarded agent-socket on the server, and the ability to write to the filesystem of the client host, could use this flaw to execute arbitrary code with the privileges of the user running ssh-agent. (CVE-2016-10009) 
* It was found that the host private key material could possibly leak to the privilege-separated child processes via re-allocated memory. An attacker able to compromise the privilege-separated process could therefore obtain the leaked key information. (CVE-2016-10011) 
* It was found that the boundary checks in the code implementing support for pre-authentication compression could have been optimized out by certain compilers. An attacker able to compromise the privilege-separated process could possibly use this flaw for further attacks against the privileged monitor process. (CVE-2016-10012)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openssh-clients" release="11.el7" src="openssh-7.4p1-11.el7.src.rpm" version="7.4p1"><filename>openssh-clients-7.4p1-11.el7.x86_64.rpm</filename><sum type="sha256">2c2d631a36b664c3304a04e3fe60f3718d66928564a91c9f8a7c349d61012a48</sum></package><package arch="x86_64" name="openssh-cavs" release="11.el7" src="openssh-7.4p1-11.el7.src.rpm" version="7.4p1"><filename>openssh-cavs-7.4p1-11.el7.x86_64.rpm</filename><sum type="sha256">0af711e05dee3dd96047e177aaaec4825811bcba8b8ae76cea23bb50a2e73f8c</sum></package><package arch="x86_64" name="pam_ssh_agent_auth" release="1.11.el7" src="openssh-7.4p1-11.el7.src.rpm" version="0.10.3"><filename>pam_ssh_agent_auth-0.10.3-1.11.el7.x86_64.rpm</filename><sum type="sha256">7fdab52407a3c02c9e3b6b5a08003add8373c2ddac148fd846ede62dc2b040bd</sum></package><package arch="i686" name="pam_ssh_agent_auth" release="1.11.el7" src="openssh-7.4p1-11.el7.src.rpm" version="0.10.3"><filename>pam_ssh_agent_auth-0.10.3-1.11.el7.i686.rpm</filename><sum type="sha256">673cb2dcfa0e634b78935e12c236f445b7e3fae2db9fdf57f33105e7f9816a71</sum></package><package arch="x86_64" name="openssh-askpass" release="11.el7" src="openssh-7.4p1-11.el7.src.rpm" version="7.4p1"><filename>openssh-askpass-7.4p1-11.el7.x86_64.rpm</filename><sum type="sha256">36d3e8039770dc54412bd0422bef78e00a61f037a7f463d49ce3797416e19929</sum></package><package arch="x86_64" name="openssh-server" release="11.el7" src="openssh-7.4p1-11.el7.src.rpm" version="7.4p1"><filename>openssh-server-7.4p1-11.el7.x86_64.rpm</filename><sum type="sha256">064f3077cd89a3861e1e9023b32ce278c965dc983cff0b72966cee2fc17284da</sum></package><package arch="x86_64" name="openssh-server-sysvinit" release="11.el7" src="openssh-7.4p1-11.el7.src.rpm" version="7.4p1"><filename>openssh-server-sysvinit-7.4p1-11.el7.x86_64.rpm</filename><sum type="sha256">08f907e29c7b60e76b1428e4a8b00de6f9a272250d4f23c741d557f491649902</sum></package><package arch="x86_64" name="openssh-ldap" release="11.el7" src="openssh-7.4p1-11.el7.src.rpm" version="7.4p1"><filename>openssh-ldap-7.4p1-11.el7.x86_64.rpm</filename><sum type="sha256">e16552d4cf83049d17466dde644bab595a40e1ab79499f1fddb803659ed7686f</sum></package><package arch="x86_64" name="openssh-keycat" release="11.el7" src="openssh-7.4p1-11.el7.src.rpm" version="7.4p1"><filename>openssh-keycat-7.4p1-11.el7.x86_64.rpm</filename><sum type="sha256">9fc4e45532dc8a2c58484deab12b2eee59b9d341d48d2cc85ecda9da6cc4153b</sum></package><package arch="x86_64" name="openssh" release="11.el7" src="openssh-7.4p1-11.el7.src.rpm" version="7.4p1"><filename>openssh-7.4p1-11.el7.x86_64.rpm</filename><sum type="sha256">f50b432541f66e5c4f531c981d76ffd1774575b2cbccd0dfdff1d4437dfc1af2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10009" id="CVE-2016-10009" title="Openssh: Loading Of Untrusted Pkcs#11 Modules " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10011" id="CVE-2016-10011" title="Openssh: Leak Of Host Private Key Material To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10012" id="CVE-2016-10012" title="Openssh: Bounds Check Can Be Evaded In The " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6210" id="CVE-2016-6210" title="Openssh: User Enumeration Via Covert Timing Channel" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6515" id="CVE-2016-6515" title="Openssh: Denial Of Service Via Very Long Passwords" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2029" id="RHSA-2017:2029-1" title="Rhsa-2017:2029-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1357442" id="1357442" title="Openssh: User Enumeration Via Covert Timing Channel" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1360973" id="1360973" title="Support Of Hostkeyalgorithms  For Sshd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1364935" id="1364935" title="Openssh: Denial Of Service Via Very Long Passwords" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1366400" id="1366400" title="Openssh-Server Doesn'T Support Unix Socket Forwarding" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1373835" id="1373835" title="Ciphers And Macs Enabled By Default Differ From Upstream " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1375179" id="1375179" title="[Rfe] Rc4 And Cbc Ciphers Shipped With Openssh And " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1381997" id="1381997" title="Systemctl Reload Sshd Caused Inactive Service Even If The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396400" id="1396400" title="The Ssh To Rhel7 Ignores Echo Setting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398569" id="1398569" title="Sftp/Ssh Ignores Group Permissions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1402424" id="1402424" title="Infinite Loop, At 100% Cpu In Ssh If ^Z Is Pressed At Password " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1406269" id="1406269" title="Openssh: Loading Of Untrusted Pkcs#11 Modules " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1406286" id="1406286" title="Openssh: Leak Of Host Private Key Material To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1406293" id="1406293" title="Openssh: Bounds Check Can Be Evaded In The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418062" id="1418062" title="Openssh Package Openssh-6.6.1P1-33.El7_3 Does Not Resolve " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1420910" id="1420910" title="Openssh Ciphers In Practice Do Not Meet The Stated Common " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1438414" id="1438414" title="Rhel7.4 In Fips Mode Is Unable To Ssh Into Rhel4.9" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1450361" id="1450361" title="Pam_Ssh_Agent_Auth I686 And X86_64 Can'T Be Installed Side By Side" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2060-1</id><title>Gstreamer</title><description>The following packages have been upgraded to a later upstream version: clutter-gst2 (2.0.18), gnome-video-effects (0.4.3), gstreamer1 (1.10.4), gstreamer1-plugins-bad-free (1.10.4), gstreamer1-plugins-base (1.10.4), gstreamer1-plugins-good (1.10.4), orc (0.4.26). 
Security Fix(es): 
* Multiple flaws were found in gstreamer1, gstreamer1-plugins-base, gstreamer1-plugins-good, and gstreamer1-plugins-bad-free packages. An attacker could potentially use these flaws to crash applications which use the GStreamer framework. (CVE-2016-9446, CVE-2016-9810, CVE-2016-9811, CVE-2016-10198, CVE-2016-10199, CVE-2017-5837, CVE-2017-5838, CVE-2017-5839, CVE-2017-5840, CVE-2017-5841, CVE-2017-5842, CVE-2017-5843, CVE-2017-5844, CVE-2017-5845, CVE-2017-5848)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="clutter-gst2-devel" release="1.el7" src="clutter-gst2-2.0.18-1.el7.src.rpm" version="2.0.18"><filename>clutter-gst2-devel-2.0.18-1.el7.x86_64.rpm</filename><sum type="sha256">008791a48e8c9cffc03c3b6647a2058397af5efc1fd6e5580ab05daababad36f</sum></package><package arch="x86_64" name="gstreamer1-devel" release="2.el7" src="gstreamer1-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-devel-1.10.4-2.el7.x86_64.rpm</filename><sum type="sha256">224593f80f8fc20a8ecf131ca95d1a5a13695d86c9c70245dedd0d850441c732</sum></package><package arch="noarch" name="gnome-video-effects" release="1.el7" src="gnome-video-effects-0.4.3-1.el7.src.rpm" version="0.4.3"><filename>gnome-video-effects-0.4.3-1.el7.noarch.rpm</filename><sum type="sha256">7acbf4d20802ebf80f34c4a2b032d691a19ea159dd11e90cfbd8cf5395dccb92</sum></package><package arch="i686" name="clutter-gst2" release="1.el7" src="clutter-gst2-2.0.18-1.el7.src.rpm" version="2.0.18"><filename>clutter-gst2-2.0.18-1.el7.i686.rpm</filename><sum type="sha256">9f2e90479760cf3d3cbe208797a4db858272645d2cd63004d749572daf8b761c</sum></package><package arch="x86_64" name="orc-devel" release="1.el7" src="orc-0.4.26-1.el7.src.rpm" version="0.4.26"><filename>orc-devel-0.4.26-1.el7.x86_64.rpm</filename><sum type="sha256">90e06c2734a9cb9c175c0c9416f73b4cb4eeaa6e2d046267c5ac9cbd6e1a5bf2</sum></package><package arch="noarch" name="gstreamer-plugins-good-devel-docs" release="13.el7" src="gstreamer-plugins-good-0.10.31-13.el7.src.rpm" version="0.10.31"><filename>gstreamer-plugins-good-devel-docs-0.10.31-13.el7.noarch.rpm</filename><sum type="sha256">8e2d95456e9d68a9e62083f87ae2e22f3ffd58dd97783dcfd17f6bd5f8cc33d2</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free-devel" release="23.el7" src="gstreamer-plugins-bad-free-0.10.23-23.el7.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-devel-0.10.23-23.el7.x86_64.rpm</filename><sum type="sha256">dfdc8b5de1c8fc476ce0580588b35ec1474db08d73e71307ff6b9df0f1807e9e</sum></package><package arch="i686" name="gstreamer-plugins-bad-free-devel" release="23.el7" src="gstreamer-plugins-bad-free-0.10.23-23.el7.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-devel-0.10.23-23.el7.i686.rpm</filename><sum type="sha256">a86c2f8e58ce5c056073572b5e69e29b952393d978bdf344bb5417aae7040255</sum></package><package arch="x86_64" name="gstreamer1-plugins-base-devel" release="1.el7" src="gstreamer1-plugins-base-1.10.4-1.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-base-devel-1.10.4-1.el7.x86_64.rpm</filename><sum type="sha256">84b48e766cf6d2aa221fc8c53f899b90ebbf8fdcd574a447ac7e19bb413a5290</sum></package><package arch="noarch" name="gstreamer1-devel-docs" release="2.el7" src="gstreamer1-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-devel-docs-1.10.4-2.el7.noarch.rpm</filename><sum type="sha256">8d559c7f792074ca78621bfb56ffe0537dca219a1ad02405037d5e06f58b2e80</sum></package><package arch="x86_64" name="gstreamer1-plugins-bad-free" release="2.el7" src="gstreamer1-plugins-bad-free-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-bad-free-1.10.4-2.el7.x86_64.rpm</filename><sum type="sha256">0bfeb43d6bdac239cd68232cb21962033f8e0114dbf18848365b03ac3eb99f70</sum></package><package arch="x86_64" name="gstreamer1-plugins-bad-free-gtk" release="2.el7" src="gstreamer1-plugins-bad-free-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7.x86_64.rpm</filename><sum type="sha256">99442b8bf319c0f891bf2c190c2c5ff04df88ac19c068f462ee27246c50f34cb</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free-devel-docs" release="23.el7" src="gstreamer-plugins-bad-free-0.10.23-23.el7.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-devel-docs-0.10.23-23.el7.x86_64.rpm</filename><sum type="sha256">37f88a7801fc0ceb81d1d84d3ea1fb5ed9b9d53187a3200bd73c381acd670721</sum></package><package arch="i686" name="gstreamer1-plugins-bad-free-devel" release="2.el7" src="gstreamer1-plugins-bad-free-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-bad-free-devel-1.10.4-2.el7.i686.rpm</filename><sum type="sha256">fb761bd7a6e8707c179c98653877d371c5f2348e0c571e1e7d11d0607e56132b</sum></package><package arch="noarch" name="gstreamer1-plugins-base-devel-docs" release="1.el7" src="gstreamer1-plugins-base-1.10.4-1.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-base-devel-docs-1.10.4-1.el7.noarch.rpm</filename><sum type="sha256">3dc5b1248118b7d924c32c83b6cf2db60cbbce17a930e2232e91803568c07954</sum></package><package arch="i686" name="gstreamer1-plugins-good" release="2.el7" src="gstreamer1-plugins-good-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-good-1.10.4-2.el7.i686.rpm</filename><sum type="sha256">573acc23be39fb31613787609906346fa301b05df6118b800b210d6d69c438be</sum></package><package arch="x86_64" name="gstreamer1-plugins-bad-free-devel" release="2.el7" src="gstreamer1-plugins-bad-free-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-bad-free-devel-1.10.4-2.el7.x86_64.rpm</filename><sum type="sha256">2538d8d8e9fe8d5538715e6ba263e2138ae6764199f65e21d3d457ccf5b16004</sum></package><package arch="x86_64" name="orc" release="1.el7" src="orc-0.4.26-1.el7.src.rpm" version="0.4.26"><filename>orc-0.4.26-1.el7.x86_64.rpm</filename><sum type="sha256">3f9043a3f0f7bcfe9d212671df5bfe1d51b6ddf586709043380057e2729e0d68</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free" release="23.el7" src="gstreamer-plugins-bad-free-0.10.23-23.el7.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-0.10.23-23.el7.x86_64.rpm</filename><sum type="sha256">33875688b7d49f0cf17673773e807a8d324f4760036ae9b502855e5c8d925ba0</sum></package><package arch="i686" name="gstreamer-plugins-good" release="13.el7" src="gstreamer-plugins-good-0.10.31-13.el7.src.rpm" version="0.10.31"><filename>gstreamer-plugins-good-0.10.31-13.el7.i686.rpm</filename><sum type="sha256">a68a84a280057ca7f7b3d680f2ca23889dbd96d132003f46ed82b62fe5097d2d</sum></package><package arch="i686" name="gstreamer-plugins-bad-free" release="23.el7" src="gstreamer-plugins-bad-free-0.10.23-23.el7.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-0.10.23-23.el7.i686.rpm</filename><sum type="sha256">8e5fa325d80c9d15e2a47e2dba8fc54555be9c12c1024324de8cd7487c6a7eb7</sum></package><package arch="i686" name="gstreamer1-devel" release="2.el7" src="gstreamer1-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-devel-1.10.4-2.el7.i686.rpm</filename><sum type="sha256">6d807b7cc6fc123f9cd24e293f8a2e76e659f27ac5c7f66dfb6ed828554ec9f7</sum></package><package arch="i686" name="gstreamer1-plugins-bad-free-gtk" release="2.el7" src="gstreamer1-plugins-bad-free-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-bad-free-gtk-1.10.4-2.el7.i686.rpm</filename><sum type="sha256">fd098c0f9a930edc9c556ae78ab9c224940815b94e67b13ec009b68896f437f1</sum></package><package arch="x86_64" name="orc-compiler" release="1.el7" src="orc-0.4.26-1.el7.src.rpm" version="0.4.26"><filename>orc-compiler-0.4.26-1.el7.x86_64.rpm</filename><sum type="sha256">fbc6fa11172fb88a8c8ac94ade0da1a8b7bb7efa89dba6e4d9c4bb82b5b968ac</sum></package><package arch="i686" name="clutter-gst2-devel" release="1.el7" src="clutter-gst2-2.0.18-1.el7.src.rpm" version="2.0.18"><filename>clutter-gst2-devel-2.0.18-1.el7.i686.rpm</filename><sum type="sha256">71b3e30ae7f7f0616a18dd36a97fedf92f029c9e3e10a8efc837dea164818149</sum></package><package arch="i686" name="gstreamer1-plugins-base-devel" release="1.el7" src="gstreamer1-plugins-base-1.10.4-1.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-base-devel-1.10.4-1.el7.i686.rpm</filename><sum type="sha256">4f4df58ee526d5b440328624daaec51ab55ea5db7d32f5d5dd68945c4e94a03e</sum></package><package arch="x86_64" name="gstreamer1-plugins-base-tools" release="1.el7" src="gstreamer1-plugins-base-1.10.4-1.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-base-tools-1.10.4-1.el7.x86_64.rpm</filename><sum type="sha256">e69c81cef3f97f271819e708ffb30d1bf688a3518ddf80e44a92f728607bb383</sum></package><package arch="x86_64" name="gstreamer1-plugins-good" release="2.el7" src="gstreamer1-plugins-good-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-good-1.10.4-2.el7.x86_64.rpm</filename><sum type="sha256">f70f1c423a1d024bee207ae7533583bcf0c1439dfc528c71cc33aeae0488942f</sum></package><package arch="i686" name="gstreamer1-plugins-bad-free" release="2.el7" src="gstreamer1-plugins-bad-free-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-bad-free-1.10.4-2.el7.i686.rpm</filename><sum type="sha256">2dbe9aad6cc9d70f98ec9f838096d65035c316261edb9c406c098a13ec363ac7</sum></package><package arch="x86_64" name="gstreamer1" release="2.el7" src="gstreamer1-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-1.10.4-2.el7.x86_64.rpm</filename><sum type="sha256">60f225c4f6b998f5e40926d65a829e9896d554e8e61c138fade1366fe59b0e87</sum></package><package arch="i686" name="orc" release="1.el7" src="orc-0.4.26-1.el7.src.rpm" version="0.4.26"><filename>orc-0.4.26-1.el7.i686.rpm</filename><sum type="sha256">f6f7c49d8868f3cf665ff08aaeb2ee241458f6ba0146caad9a256ed0fa8c015b</sum></package><package arch="x86_64" name="gstreamer1-plugins-base" release="1.el7" src="gstreamer1-plugins-base-1.10.4-1.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-base-1.10.4-1.el7.x86_64.rpm</filename><sum type="sha256">69a0e3812c0254b2ff0b4d5ddd117b2b7750c88e9f012b8ade284bbc03b2b014</sum></package><package arch="i686" name="gstreamer1-plugins-base" release="1.el7" src="gstreamer1-plugins-base-1.10.4-1.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-base-1.10.4-1.el7.i686.rpm</filename><sum type="sha256">0435fc43abb8745c762862a18f93cef353eee7dc054544b024131d0586563079</sum></package><package arch="x86_64" name="gstreamer-plugins-good" release="13.el7" src="gstreamer-plugins-good-0.10.31-13.el7.src.rpm" version="0.10.31"><filename>gstreamer-plugins-good-0.10.31-13.el7.x86_64.rpm</filename><sum type="sha256">4d9fb5a54f29ab3653230063dc7bfd822e51964b054f4d440b4054c5ea212efc</sum></package><package arch="i686" name="orc-devel" release="1.el7" src="orc-0.4.26-1.el7.src.rpm" version="0.4.26"><filename>orc-devel-0.4.26-1.el7.i686.rpm</filename><sum type="sha256">c1928ce81019ed632901933acaf9e22158c14204a3ea70413ece00f6d1e3828d</sum></package><package arch="x86_64" name="clutter-gst2" release="1.el7" src="clutter-gst2-2.0.18-1.el7.src.rpm" version="2.0.18"><filename>clutter-gst2-2.0.18-1.el7.x86_64.rpm</filename><sum type="sha256">c0c05e8fcf0fa2412ab7f7d6f4a48bdac834c7ee800cf767192f0de3ec8df659</sum></package><package arch="noarch" name="orc-doc" release="1.el7" src="orc-0.4.26-1.el7.src.rpm" version="0.4.26"><filename>orc-doc-0.4.26-1.el7.noarch.rpm</filename><sum type="sha256">e484007cbba80483f80d928a97caae3cc66137de2d25c87115514fdfbd683fe7</sum></package><package arch="i686" name="gstreamer1" release="2.el7" src="gstreamer1-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-1.10.4-2.el7.i686.rpm</filename><sum type="sha256">e83537b5e927a8741a27b79b5539308bc74c94f5000337e94e0a847090c8ce28</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10198" id="CVE-2016-10198" title="Gstreamer-Plugins-Good: Invalid Memory Read In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10199" id="CVE-2016-10199" title="Gstreamer-Plugins-Good: Out Of Bounds Read In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9446" id="CVE-2016-9446" title="Gstreamer-Plugins-Bad-Free: Missing " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9810" id="CVE-2016-9810" title="Gstreamer: Invalid Memory Read In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9811" id="CVE-2016-9811" title="Gstreamer: Out Of Bounds Heap Read In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5837" id="CVE-2017-5837" title="Gstreamer-Plugins-Base: Floating Point Exception " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5838" id="CVE-2017-5838" title="Gstreamer: Out-Of-Bounds Read In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5839" id="CVE-2017-5839" title="Gstreamer-Plugins-Base: Stack Overflow In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5840" id="CVE-2017-5840" title="Gstreamer-Plugins-Good: Out Of Bounds Heap Read " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5841" id="CVE-2017-5841" title="Gstreamer-Plugins-Good: Heap Out-Of-Bounds Read " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5842" id="CVE-2017-5842" title="Gstreamer-Plugins-Base: Out-Of-Bounds Heap Read " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5843" id="CVE-2017-5843" title="Gstreamer-Plugins-Bad-Free: Use After Free In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5844" id="CVE-2017-5844" title="Gstreamer-Plugins-Base: Floating Point Exception " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5845" id="CVE-2017-5845" title="Gstreamer-Plugins-Good: Invalid Memory Read In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5848" id="CVE-2017-5848" title="Gstreamer-Plugins-Bad-Free: Invalid Memory Read " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2060" id="RHSA-2017:2060-1" title="Rhsa-2017:2060-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1265905" id="1265905" title="Fail: Libs/Libsabi On Ppc64/Ppc64Le" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386833" id="1386833" title="Rebase Clutter-Gst2 To 2.0.18" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386968" id="1386968" title="Rebase Gnome-Video-Effects To 0.4.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1397063" id="1397063" title="Gstreamer-Plugins-Bad-Free: Missing " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401913" id="1401913" title="Gstreamer: Invalid Memory Read In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401918" id="1401918" title="Gstreamer: Out Of Bounds Heap Read In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1406039" id="1406039" title="Installed (But Unpackaged) File(S) Found" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1419558" id="1419558" title="Gstreamer-Plugins-Good: Invalid Memory Read In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1419580" id="1419580" title="Gstreamer-Plugins-Good: Out Of Bounds Read In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1419582" id="1419582" title="Gstreamer-Plugins-Good: Invalid Memory Read In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1419583" id="1419583" title="Gstreamer-Plugins-Bad-Free: Invalid Memory Read " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1419584" id="1419584" title="Gstreamer-Plugins-Base: Floating Point Exception " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1419586" id="1419586" title="Gstreamer-Plugins-Base: Stack Overflow In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1419587" id="1419587" title="Gstreamer: Out-Of-Bounds Read In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1419588" id="1419588" title="Gstreamer-Plugins-Good: Out Of Bounds Heap Read " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1419589" id="1419589" title="Gstreamer-Plugins-Good: Heap Out-Of-Bounds Read " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1419591" id="1419591" title="Gstreamer-Plugins-Base: Out-Of-Bounds Heap Read " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1419592" id="1419592" title="Gstreamer-Plugins-Bad-Free: Use After Free In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1419600" id="1419600" title="Gstreamer-Plugins-Base: Floating Point Exception " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1420650" id="1420650" title="Rebase Gstreamer1 To 1.10" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1428918" id="1428918" title="Update To Gst-Plugins-Base 1.10.X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429577" id="1429577" title="Rebase Gstreamer1-Plugins-Good To 1.10.X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1429587" id="1429587" title="Rebase Gstreamer1-Plugins-Bad-Free To 1.10.X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1430051" id="1430051" title="Rebase Orc To 0.4.26" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2128-1</id><title>Gdm And Gnome-Session</title><description>The following packages have been upgraded to a later upstream version: gdm (3.22.3), gnome-session (3.22.3). 
Security Fix(es): 
* It was found that gdm could crash due to a signal handler dispatched to an invalid conversation. An attacker could crash gdm by holding the escape key when the screen is locked, possibly bypassing the locked screen. (CVE-2015-7496)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gnome-session" release="4.el7" src="gnome-session-3.22.3-4.el7.src.rpm" version="3.22.3"><filename>gnome-session-3.22.3-4.el7.x86_64.rpm</filename><sum type="sha256">15dad6baf13d0f09d40c198785fa395a8e091e4790d120709d0ecce53c4dbd8b</sum></package><package arch="x86_64" name="gnome-session-custom-session" release="4.el7" src="gnome-session-3.22.3-4.el7.src.rpm" version="3.22.3"><filename>gnome-session-custom-session-3.22.3-4.el7.x86_64.rpm</filename><sum type="sha256">6a94fd1b601e3c83c4ccba95be5959e94b0ffe9764e3062d26c911fdc831bf3f</sum></package><package arch="x86_64" epoch="1" name="gdm-devel" release="11.el7" src="gdm-3.22.3-11.el7.src.rpm" version="3.22.3"><filename>gdm-devel-3.22.3-11.el7.x86_64.rpm</filename><sum type="sha256">0261c47fc97478287fa206509cfcb17e9211524b3fd9e84d093667fe6fa49e70</sum></package><package arch="x86_64" epoch="1" name="gdm" release="11.el7" src="gdm-3.22.3-11.el7.src.rpm" version="3.22.3"><filename>gdm-3.22.3-11.el7.x86_64.rpm</filename><sum type="sha256">79821664e064ab360ff8e90c8a72f8182c0a48a1a56c2d4d7127356360cac798</sum></package><package arch="x86_64" name="gnome-session-xsession" release="4.el7" src="gnome-session-3.22.3-4.el7.src.rpm" version="3.22.3"><filename>gnome-session-xsession-3.22.3-4.el7.x86_64.rpm</filename><sum type="sha256">e82aa3b3dbffb1dae225987c5fecfbff2eaa42687da24db4eda29247700af5f5</sum></package><package arch="i686" epoch="1" name="gdm-devel" release="11.el7" src="gdm-3.22.3-11.el7.src.rpm" version="3.22.3"><filename>gdm-devel-3.22.3-11.el7.i686.rpm</filename><sum type="sha256">b5109e932868998d174238bff61d3606a7c311cd11fd04d6668c39b24f95a5b2</sum></package><package arch="i686" epoch="1" name="gdm" release="11.el7" src="gdm-3.22.3-11.el7.src.rpm" version="3.22.3"><filename>gdm-3.22.3-11.el7.i686.rpm</filename><sum type="sha256">fc9f11cb6f8045e21399092536eb8706e209c15251b4eb62993fe7d746375d92</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7496" id="CVE-2015-7496" title="Gdm: Crash When Holding Escape In Log Screen" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2128" id="RHSA-2017:2128-1" title="Rhsa-2017:2128-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1273156" id="1273156" title="Gdm Does Not Work With Xdmcp Indirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1283279" id="1283279" title="Gdm: Crash When Holding Escape In Log Screen" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1373837" id="1373837" title="Gdm Not Starting Because Of Error In Config" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386862" id="1386862" title="Rebase Gdm To 3.22.X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386957" id="1386957" title="Rebase Gnome-Session To 3.22.X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1392970" id="1392970" title="Gnome-Session-Failed Segfaults On Hard Gdm Service Stop" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448209" id="1448209" title="Locked Screen Does Not Show A Message To Insert The Smartcard " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1449632" id="1449632" title="Fuzzy Translations In De, Es, Fr, It, Ja, Ko, Pt_Br, Ru, " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2180-1</id><title>Ghostscript</title><description>Security Fix(es): 
* A NULL pointer dereference flaw was found in ghostscript's mem_get_bits_rectangle function. A specially crafted postscript document could cause a crash in the context of the gs process. (CVE-2017-7207)</description><severity>low</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ghostscript-devel" release="28.el7" src="ghostscript-9.07-28.el7.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-28.el7.x86_64.rpm</filename><sum type="sha256">02806c63663b021da85316c2e32619160a6bd49c36db10ca0dd75bffbc00ede9</sum></package><package arch="i686" name="ghostscript" release="28.el7" src="ghostscript-9.07-28.el7.src.rpm" version="9.07"><filename>ghostscript-9.07-28.el7.i686.rpm</filename><sum type="sha256">09a3419d479e947ec9fbb45f292b2dcb72848d9be2774871dd68fb2273173bbb</sum></package><package arch="noarch" name="ghostscript-doc" release="28.el7" src="ghostscript-9.07-28.el7.src.rpm" version="9.07"><filename>ghostscript-doc-9.07-28.el7.noarch.rpm</filename><sum type="sha256">3d7c6e89afa8443f90dbfea4ebe50e73265dd6d96ed093aad47e3ea1680bf020</sum></package><package arch="x86_64" name="ghostscript" release="28.el7" src="ghostscript-9.07-28.el7.src.rpm" version="9.07"><filename>ghostscript-9.07-28.el7.x86_64.rpm</filename><sum type="sha256">aa2caf562121e33055fed3cabe671aae7ee93c20f4b12b0f491f38b531d6d1be</sum></package><package arch="x86_64" name="ghostscript-gtk" release="28.el7" src="ghostscript-9.07-28.el7.src.rpm" version="9.07"><filename>ghostscript-gtk-9.07-28.el7.x86_64.rpm</filename><sum type="sha256">33131ffb23fb8fe278cb01cd23474c8d2d9e3411b06345c096d79f6e291118a7</sum></package><package arch="x86_64" name="ghostscript-cups" release="28.el7" src="ghostscript-9.07-28.el7.src.rpm" version="9.07"><filename>ghostscript-cups-9.07-28.el7.x86_64.rpm</filename><sum type="sha256">cfb655c8d392c5376ffe934f5b8d4e5a344a5d03c5ca370631cb70df8ca7e27c</sum></package><package arch="i686" name="ghostscript-devel" release="28.el7" src="ghostscript-9.07-28.el7.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-28.el7.i686.rpm</filename><sum type="sha256">7eedfb5dcbec1e8c55ca1a46bcd6c16f61e4b55d14a6e29a50dd6e584caa00d0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7207" id="CVE-2017-7207" title="Ghostscript: Null Pointer Dereference In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2180" id="RHSA-2017:2180-1" title="Rhsa-2017:2180-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1411725" id="1411725" title="Ghostscript Regression, .Eps Files No Longer Work" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1424752" id="1424752" title="Ghostscript Bug Creates High Cpu Load And Hangs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434353" id="1434353" title="Ghostscript: Null Pointer Dereference In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1436273" id="1436273" title="Ghostscript Update Cause Symbol Lookup Error" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2192-1</id><title>Mariadb</title><description>The following packages have been upgraded to a later upstream version: mariadb (5.5.56). 
Security Fix(es): 
* It was discovered that the mysql and mysqldump tools did not correctly handle database and table names containing newline characters. A database user with privileges to create databases or tables could cause the mysql command to execute arbitrary shell or SQL commands while restoring database backup created using the mysqldump tool. (CVE-2016-5483, CVE-2017-3600) 
* A flaw was found in the way the mysqld_safe script handled creation of error log file. The mysql operating system user could use this flaw to escalate their privileges to root. (CVE-2016-5617, CVE-2016-6664) 
* Multiple flaws were found in the way the MySQL init script handled initialization of the database data directory and permission setting on the error log file. The mysql operating system user could use these flaws to escalate their privileges to root. (CVE-2017-3265) 
* It was discovered that the mysqld_safe script honored the ledir option value set in a MySQL configuration file. A user able to modify one of the MySQL configuration files could use this flaw to escalate their privileges to root. (CVE-2017-3291) 
* Multiple flaws were found in the way the mysqld_safe script handled creation of error log file. The mysql operating system user could use these flaws to escalate their privileges to root. (CVE-2017-3312) 
* A flaw was found in the way MySQL client library (libmysqlclient) handled prepared statements when server connection was lost. A malicious server or a man-in-the-middle attacker could possibly use this flaw to crash an application using libmysqlclient. (CVE-2017-3302) 
(CVE-2017-3238, CVE-2017-3243, CVE-2017-3244, CVE-2017-3258, CVE-2017-3308, CVE-2017-3309, CVE-2017-3313, CVE-2017-3317, CVE-2017-3318, CVE-2017-3453, CVE-2017-3456, CVE-2017-3464)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="mariadb-server" release="2.el7" src="mariadb-5.5.56-2.el7.src.rpm" version="5.5.56"><filename>mariadb-server-5.5.56-2.el7.x86_64.rpm</filename><sum type="sha256">8ff6fdfb366ef25eaf9e448d87f163c571106259074336f1334269803bedfb86</sum></package><package arch="x86_64" epoch="1" name="mariadb-bench" release="2.el7" src="mariadb-5.5.56-2.el7.src.rpm" version="5.5.56"><filename>mariadb-bench-5.5.56-2.el7.x86_64.rpm</filename><sum type="sha256">a9dbebf1dfb3e4b6a7a82fba9d0a449e214245510ad96819db273a1678ec0e93</sum></package><package arch="i686" epoch="1" name="mariadb-libs" release="2.el7" src="mariadb-5.5.56-2.el7.src.rpm" version="5.5.56"><filename>mariadb-libs-5.5.56-2.el7.i686.rpm</filename><sum type="sha256">d7724825a0ca7833ec9bf665100b1502146ab4aef1ebc41067f02e3a22beed91</sum></package><package arch="x86_64" epoch="1" name="mariadb-embedded" release="2.el7" src="mariadb-5.5.56-2.el7.src.rpm" version="5.5.56"><filename>mariadb-embedded-5.5.56-2.el7.x86_64.rpm</filename><sum type="sha256">49aff1efacde2fb0afc589f3215543ce65e2c7ae319b8b987dede6fc9861c73d</sum></package><package arch="i686" epoch="1" name="mariadb-devel" release="2.el7" src="mariadb-5.5.56-2.el7.src.rpm" version="5.5.56"><filename>mariadb-devel-5.5.56-2.el7.i686.rpm</filename><sum type="sha256">d0c68e1ce34c4b2fa7fdcda7a96446b67602e78d2aa10541ea6470dc0fed8db5</sum></package><package arch="x86_64" epoch="1" name="mariadb-libs" release="2.el7" src="mariadb-5.5.56-2.el7.src.rpm" version="5.5.56"><filename>mariadb-libs-5.5.56-2.el7.x86_64.rpm</filename><sum type="sha256">0fd64e7aaa662eb1a5dfc415058b9752b1fbeee79168c408f1f8455727578853</sum></package><package arch="x86_64" epoch="1" name="mariadb-test" release="2.el7" src="mariadb-5.5.56-2.el7.src.rpm" version="5.5.56"><filename>mariadb-test-5.5.56-2.el7.x86_64.rpm</filename><sum type="sha256">079ea6384fd1b2b81d9b3e188c30b88268d9f9ab9251468495fe2e40a90f29ae</sum></package><package arch="i686" epoch="1" name="mariadb-embedded" release="2.el7" src="mariadb-5.5.56-2.el7.src.rpm" version="5.5.56"><filename>mariadb-embedded-5.5.56-2.el7.i686.rpm</filename><sum type="sha256">e056eb51bf61c2e3eaa27f82e8c62bce34cbeecaaed655ec657d2cc780101b32</sum></package><package arch="x86_64" epoch="1" name="mariadb-embedded-devel" release="2.el7" src="mariadb-5.5.56-2.el7.src.rpm" version="5.5.56"><filename>mariadb-embedded-devel-5.5.56-2.el7.x86_64.rpm</filename><sum type="sha256">bb24ef98cb69f910a8ee3d1cab07565c58326ba5f37fca6e18da3d3dc09aac26</sum></package><package arch="x86_64" epoch="1" name="mariadb" release="2.el7" src="mariadb-5.5.56-2.el7.src.rpm" version="5.5.56"><filename>mariadb-5.5.56-2.el7.x86_64.rpm</filename><sum type="sha256">1c01449016b0677993dc2f37eaf98c30634f4876b3634e44345bbbe550076f14</sum></package><package arch="i686" epoch="1" name="mariadb-embedded-devel" release="2.el7" src="mariadb-5.5.56-2.el7.src.rpm" version="5.5.56"><filename>mariadb-embedded-devel-5.5.56-2.el7.i686.rpm</filename><sum type="sha256">df588a0d9cf23ebce33d2b360fa6358e2ba10449210ac97c6b35596ad99b9b04</sum></package><package arch="x86_64" epoch="1" name="mariadb-devel" release="2.el7" src="mariadb-5.5.56-2.el7.src.rpm" version="5.5.56"><filename>mariadb-devel-5.5.56-2.el7.x86_64.rpm</filename><sum type="sha256">dd6f5a0850b2898001fb830814f97ca14983d6a8e79b11fff08196c079885868</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5483" id="CVE-2016-5483" title="Mariadb, Mysql: Incorrect Input " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5617" id="CVE-2016-5617" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Error Handling (Cpu October 2016)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6664" id="CVE-2016-6664" title="Mysql: Insecure Error Log File Handling In Mysqld_Safe (Cpu Oct 2016)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3238" id="CVE-2017-3238" title="Mysql: Server: Optimizer  Unspecified " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3243" id="CVE-2017-3243" title="Mysql: Server: Charsets  Unspecified " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3244" id="CVE-2017-3244" title="Mysql: Server: Dml  Unspecified Vulnerability " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3258" id="CVE-2017-3258" title="Mysql: Server: Ddl  Unspecified Vulnerability " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3265" id="CVE-2017-3265" title="Mysql: Unsafe Chmod/Chown Use In Init Script " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3291" id="CVE-2017-3291" title="Mysql: Unrestricted Mysqld_Safe'S Ledir (Cpu Jan " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3302" id="CVE-2017-3302" title="Mysql: Prepared Statement Handle Use-After-Free " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3308" id="CVE-2017-3308" title="Mysql: Server: Dml Unspecified Vulnerability " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3309" id="CVE-2017-3309" title="Mysql: Server: Optimizer Unspecified " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3312" id="CVE-2017-3312" title="Mysql: Insecure Error Log File Handling In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3313" id="CVE-2017-3313" title="Mysql: Server: Myisam Unspecified Vulnerability " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3317" id="CVE-2017-3317" title="Mysql: Logging  Unspecified Vulnerability (Cpu " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3318" id="CVE-2017-3318" title="Mysql: Server: Error Handling Unspecified " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3453" id="CVE-2017-3453" title="Mysql: Server: Optimizer Unspecified " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3456" id="CVE-2017-3456" title="Mysql: Server: Dml Unspecified Vulnerability " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3464" id="CVE-2017-3464" title="Mysql: Server: Ddl Unspecified Vulnerability " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3600" id="CVE-2017-3600" title="Mariadb, Mysql: Incorrect Input " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2192" id="RHSA-2017:2192-1" title="Rhsa-2017:2192-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1027829" id="1027829" title="Testsuite Test Main.Gis-Precise Is Failing On Ppc %{Power64} " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1356897" id="1356897" title="Mariadb Removes All Databases" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386564" id="1386564" title="Mysql: Unspecified Vulnerability In Subcomponent: Server: Error Handling (Cpu October 2016)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1414133" id="1414133" title="Mysql: Insecure Error Log File Handling In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1414338" id="1414338" title="Mysql: Server: Optimizer  Unspecified " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1414340" id="1414340" title="Mysql: Server: Charsets  Unspecified " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1414342" id="1414342" title="Mysql: Server: Dml  Unspecified Vulnerability " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1414351" id="1414351" title="Mysql: Server: Ddl  Unspecified Vulnerability " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1414353" id="1414353" title="Mysql: Server: Myisam Unspecified Vulnerability " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1414355" id="1414355" title="Mysql: Logging  Unspecified Vulnerability (Cpu " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1414357" id="1414357" title="Mysql: Server: Error Handling Unspecified " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1414423" id="1414423" title="Mysql: Unsafe Chmod/Chown Use In Init Script " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1414429" id="1414429" title="Mysql: Unrestricted Mysqld_Safe'S Ledir (Cpu Jan " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1422119" id="1422119" title="Mysql: Prepared Statement Handle Use-After-Free " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1433010" id="1433010" title="Mariadb, Mysql: Incorrect Input " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443358" id="1443358" title="Mysql: Server: Dml Unspecified Vulnerability " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443359" id="1443359" title="Mysql: Server: Optimizer Unspecified " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443365" id="1443365" title="Mysql: Server: Optimizer Unspecified " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443369" id="1443369" title="Mysql: Server: Dml Unspecified Vulnerability " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443379" id="1443379" title="Mysql: Server: Ddl Unspecified Vulnerability " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2247-1</id><title>Tomcat</title><description>The following packages have been upgraded to a later upstream version: tomcat (7.0.76). 
Security Fix(es): 
* The Realm implementations did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder. (CVE-2016-0762) 
* It was discovered that a malicious web application could bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications. (CVE-2016-5018) 
* It was discovered that when a SecurityManager was configured, Tomcat's system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible. (CVE-2016-6794) 
* It was discovered that a malicious web application could bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet. (CVE-2016-6796) 
* It was discovered that it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not. (CVE-2016-6797)</description><severity>low</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcat-webapps" release="2.el7" src="tomcat-7.0.76-2.el7.src.rpm" version="7.0.76"><filename>tomcat-webapps-7.0.76-2.el7.noarch.rpm</filename><sum type="sha256">007e5a27391d9823019c98dd87f699a7b709d9cc8944c0ddbdcae54dad5a67b5</sum></package><package arch="noarch" name="tomcat-jsp-2.2-api" release="2.el7" src="tomcat-7.0.76-2.el7.src.rpm" version="7.0.76"><filename>tomcat-jsp-2.2-api-7.0.76-2.el7.noarch.rpm</filename><sum type="sha256">95c51a36a5cc9a6bab2153032334a6cb2dd1b1bacb6657c6d3f0f0a4a90dbd60</sum></package><package arch="noarch" name="tomcat-el-2.2-api" release="2.el7" src="tomcat-7.0.76-2.el7.src.rpm" version="7.0.76"><filename>tomcat-el-2.2-api-7.0.76-2.el7.noarch.rpm</filename><sum type="sha256">11106044be218288d02ee19a707d8c828f9a76c8e2d18ffa79e20a06fae44237</sum></package><package arch="noarch" name="tomcat-servlet-3.0-api" release="2.el7" src="tomcat-7.0.76-2.el7.src.rpm" version="7.0.76"><filename>tomcat-servlet-3.0-api-7.0.76-2.el7.noarch.rpm</filename><sum type="sha256">07070313f4465526b8f9bc512c47b232077a90185e5f9c0f90aea8cd8decaa06</sum></package><package arch="noarch" name="tomcat-docs-webapp" release="2.el7" src="tomcat-7.0.76-2.el7.src.rpm" version="7.0.76"><filename>tomcat-docs-webapp-7.0.76-2.el7.noarch.rpm</filename><sum type="sha256">ab1d480977a83aeaaeb752e6736cd0beb6b108fc964aee82d1e88df97c8bb0ba</sum></package><package arch="noarch" name="tomcat-jsvc" release="2.el7" src="tomcat-7.0.76-2.el7.src.rpm" version="7.0.76"><filename>tomcat-jsvc-7.0.76-2.el7.noarch.rpm</filename><sum type="sha256">61222ff8556a93703009e4aa59af03a028e891a63fb11adac75ba738b7d82043</sum></package><package arch="noarch" name="tomcat-javadoc" release="2.el7" src="tomcat-7.0.76-2.el7.src.rpm" version="7.0.76"><filename>tomcat-javadoc-7.0.76-2.el7.noarch.rpm</filename><sum type="sha256">6607500fdcf0390aed1fc794e5ac54e705130a1aafa746266b214b725973f7da</sum></package><package arch="noarch" name="tomcat-admin-webapps" release="2.el7" src="tomcat-7.0.76-2.el7.src.rpm" version="7.0.76"><filename>tomcat-admin-webapps-7.0.76-2.el7.noarch.rpm</filename><sum type="sha256">1f477f0eb1128371938475e21f5f664d9ed72443fea8b612c77e0d65f75bfc95</sum></package><package arch="noarch" name="tomcat-lib" release="2.el7" src="tomcat-7.0.76-2.el7.src.rpm" version="7.0.76"><filename>tomcat-lib-7.0.76-2.el7.noarch.rpm</filename><sum type="sha256">40fae13f759426fcae15d92dddd61fe74d17341db8128a8825d82e68f3f90c50</sum></package><package arch="noarch" name="tomcat" release="2.el7" src="tomcat-7.0.76-2.el7.src.rpm" version="7.0.76"><filename>tomcat-7.0.76-2.el7.noarch.rpm</filename><sum type="sha256">8dee270854593bef37e04ffc9634e530d0230b18a194655e3cd4c463b34b7d57</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0762" id="CVE-2016-0762" title="Tomcat: Timing Attack In Realm Implementation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5018" id="CVE-2016-5018" title="Cve-2016-5018" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6794" id="CVE-2016-6794" title="Tomcat: System Property Disclosure" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6796" id="CVE-2016-6796" title="Cve-2016-6796" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6797" id="CVE-2016-6797" title="Tomcat: Unrestricted Access To Global Resources" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2247" id="RHSA-2017:2247-1" title="Rhsa-2017:2247-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390493" id="1390493" title="Tomcat: Unrestricted Access To Global Resources" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390515" id="1390515" title="Tomcat: Security Manager Bypass Via Jsp Servlet " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390520" id="1390520" title="Tomcat: System Property Disclosure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390525" id="1390525" title="Tomcat: Security Manager Bypass Via " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1390526" id="1390526" title="Tomcat: Timing Attack In Realm Implementation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1411738" id="1411738" title="Please Update Tomcat To &gt;= 7.0.70 To Fix Asf Bugzilla &#8211; Bug 59619" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1414895" id="1414895" title="Rebase Tomcat To The Current Release" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2258-1</id><title>Gtk-Vnc</title><description>The following packages have been upgraded to a later upstream version: gtk-vnc (0.7.0). 
Security Fix(es): 
* It was found that gtk-vnc lacked proper bounds checking while processing messages using RRE, hextile, or copyrect encodings. A remote malicious VNC server could use this flaw to crash VNC viewers which are based on the gtk-vnc library. (CVE-2017-5884) 
* An integer overflow flaw was found in gtk-vnc. A remote malicious VNC server could use this flaw to crash VNC viewers which are based on the gtk-vnc library. (CVE-2017-5885)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gvncpulse-devel" release="2.el7" src="gtk-vnc-0.7.0-2.el7.src.rpm" version="0.7.0"><filename>gvncpulse-devel-0.7.0-2.el7.x86_64.rpm</filename><sum type="sha256">169e3b60eb1fe1693edcd9aa40319c82e08d816eebde5452cb49ca3d1e38a150</sum></package><package arch="x86_64" name="gvnc" release="2.el7" src="gtk-vnc-0.7.0-2.el7.src.rpm" version="0.7.0"><filename>gvnc-0.7.0-2.el7.x86_64.rpm</filename><sum type="sha256">4681c91043d422e37a667b92b0f7340fb1a8ba7dd620cf271f8f00d88f063b6a</sum></package><package arch="x86_64" name="gtk-vnc-python" release="2.el7" src="gtk-vnc-0.7.0-2.el7.src.rpm" version="0.7.0"><filename>gtk-vnc-python-0.7.0-2.el7.x86_64.rpm</filename><sum type="sha256">72d56ffa8b7f9b280b9d14105d69f979902a2742e168a395e0c78aa910e83bd0</sum></package><package arch="x86_64" name="gtk-vnc" release="2.el7" src="gtk-vnc-0.7.0-2.el7.src.rpm" version="0.7.0"><filename>gtk-vnc-0.7.0-2.el7.x86_64.rpm</filename><sum type="sha256">55b9e1f0e3a908f5c74b6b70834bc2b750a0b744a58d2593156c0d04e6221bab</sum></package><package arch="i686" name="gtk-vnc-devel" release="2.el7" src="gtk-vnc-0.7.0-2.el7.src.rpm" version="0.7.0"><filename>gtk-vnc-devel-0.7.0-2.el7.i686.rpm</filename><sum type="sha256">d875571eed70d2a1be4ff7f106736bb6479769d558331caa5914a72d075695c5</sum></package><package arch="x86_64" name="gvnc-devel" release="2.el7" src="gtk-vnc-0.7.0-2.el7.src.rpm" version="0.7.0"><filename>gvnc-devel-0.7.0-2.el7.x86_64.rpm</filename><sum type="sha256">a6443bd5c175ec75b6639c1994cd9d5383d5adafded6f2ea91921a8a1b2846aa</sum></package><package arch="x86_64" name="gtk-vnc-devel" release="2.el7" src="gtk-vnc-0.7.0-2.el7.src.rpm" version="0.7.0"><filename>gtk-vnc-devel-0.7.0-2.el7.x86_64.rpm</filename><sum type="sha256">2349f0f52627d61a0d6671b05b303506257d1933ff96835fa45912a78b135073</sum></package><package arch="i686" name="gvnc" release="2.el7" src="gtk-vnc-0.7.0-2.el7.src.rpm" version="0.7.0"><filename>gvnc-0.7.0-2.el7.i686.rpm</filename><sum type="sha256">53978f858eb98560cee686b3223840a262ffede3063581d7988b7f15380b8440</sum></package><package arch="i686" name="gvncpulse" release="2.el7" src="gtk-vnc-0.7.0-2.el7.src.rpm" version="0.7.0"><filename>gvncpulse-0.7.0-2.el7.i686.rpm</filename><sum type="sha256">031aca361239b5a9840759f8923d231480b6e3d9e2bc4535f10d870161d21406</sum></package><package arch="i686" name="gtk-vnc" release="2.el7" src="gtk-vnc-0.7.0-2.el7.src.rpm" version="0.7.0"><filename>gtk-vnc-0.7.0-2.el7.i686.rpm</filename><sum type="sha256">23eab7a800965451f0124678c5f19fc500899b00842aa4de3f054880388a5793</sum></package><package arch="i686" name="gtk-vnc2" release="2.el7" src="gtk-vnc-0.7.0-2.el7.src.rpm" version="0.7.0"><filename>gtk-vnc2-0.7.0-2.el7.i686.rpm</filename><sum type="sha256">76d7a35c5d9909c1b0c617481cfdcc94caef4faa071d561caef298db5138f6fb</sum></package><package arch="x86_64" name="gtk-vnc2-devel" release="2.el7" src="gtk-vnc-0.7.0-2.el7.src.rpm" version="0.7.0"><filename>gtk-vnc2-devel-0.7.0-2.el7.x86_64.rpm</filename><sum type="sha256">6d5202d3e80da1222d26e9059a3bf6430423c505b39b64c711e839fc44f6377e</sum></package><package arch="i686" name="gvnc-devel" release="2.el7" src="gtk-vnc-0.7.0-2.el7.src.rpm" version="0.7.0"><filename>gvnc-devel-0.7.0-2.el7.i686.rpm</filename><sum type="sha256">19643509e3c98a3a830e99d82a87eac61fa66cb52bb5a728fd785b4beef91279</sum></package><package arch="x86_64" name="gtk-vnc2" release="2.el7" src="gtk-vnc-0.7.0-2.el7.src.rpm" version="0.7.0"><filename>gtk-vnc2-0.7.0-2.el7.x86_64.rpm</filename><sum type="sha256">163cd67bf543c7fcda669494c0199287be5a494ef02e856ca89c333184d3211b</sum></package><package arch="i686" name="gtk-vnc2-devel" release="2.el7" src="gtk-vnc-0.7.0-2.el7.src.rpm" version="0.7.0"><filename>gtk-vnc2-devel-0.7.0-2.el7.i686.rpm</filename><sum type="sha256">aad7eb2f18662f48ecae3dcfab482e5ad71914fb6457fef8a564ff02e45a1c51</sum></package><package arch="x86_64" name="gvnc-tools" release="2.el7" src="gtk-vnc-0.7.0-2.el7.src.rpm" version="0.7.0"><filename>gvnc-tools-0.7.0-2.el7.x86_64.rpm</filename><sum type="sha256">cb2e6a47d77eeccb7166537b18bc6d33f125a46180eea448d33650fa7675e7f7</sum></package><package arch="i686" name="gvncpulse-devel" release="2.el7" src="gtk-vnc-0.7.0-2.el7.src.rpm" version="0.7.0"><filename>gvncpulse-devel-0.7.0-2.el7.i686.rpm</filename><sum type="sha256">0970c8bf4492cbda503d302c0025713f5b853296a2935e2e4bd090e857dd8f2f</sum></package><package arch="x86_64" name="gvncpulse" release="2.el7" src="gtk-vnc-0.7.0-2.el7.src.rpm" version="0.7.0"><filename>gvncpulse-0.7.0-2.el7.x86_64.rpm</filename><sum type="sha256">86b5ea984ebcd6a44f3254b0dac1edb88f117e3553e119481032b83fc3fb1007</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5884" id="CVE-2017-5884" title="Gtk-Vnc: Improper Check Of Framebuffer " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5885" id="CVE-2017-5885" title="Gtk-Vnc: Integer Overflow When Processing " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2258" id="RHSA-2017:2258-1" title="Rhsa-2017:2258-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1126825" id="1126825" title="Unnecessary Warning Messages Show When Shutdown Vnc Guest " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416783" id="1416783" title="Rebase To 0.7.0 Release To Fix Numerous Bugs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418944" id="1418944" title="Gtk-Vnc: Improper Check Of Framebuffer " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418952" id="1418952" title="Gtk-Vnc: Integer Overflow When Processing " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1441120" id="1441120" title="Segment Fault When Connecting A Host With No Vnc Server Listening" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=921008" id="921008" title="Guest Will Keep Typing '~' After Press F9 And F10 In Same Time." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=921330" id="921330" title="Remote-Viewer Shows No Error If Connect To A Spice Port Through " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2285-1</id><title>Authconfig</title><description>Security Fix(es): 
* A flaw was found where authconfig could configure sssd in a way that treats existing and non-existing logins differently, leaking information on existence of a user. An attacker with physical or network access to the machine could enumerate users via a timing attack. (CVE-2017-7488)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="authconfig" release="30.el7" src="authconfig-6.2.8-30.el7.src.rpm" version="6.2.8"><filename>authconfig-6.2.8-30.el7.x86_64.rpm</filename><sum type="sha256">7e568f2cf1a3eb616b1baabfeca22311b1b2b0ad6a823402cd229c9b6ae5106d</sum></package><package arch="x86_64" name="authconfig-gtk" release="30.el7" src="authconfig-6.2.8-30.el7.src.rpm" version="6.2.8"><filename>authconfig-gtk-6.2.8-30.el7.x86_64.rpm</filename><sum type="sha256">b48fc780ab584857e02a4d28c0a1cf28ebcf7c842c7bffb3b60ffec627cac7b7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7488" id="CVE-2017-7488" title="Authconfig: Information Leak When Sssd Is Used " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2285" id="RHSA-2017:2285-1" title="Rhsa-2017:2285-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1329598" id="1329598" title="Authconfig Breaks Pam System-Auth-Ac Password-Auth-Ac For Sssd " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378943" id="1378943" title="[Rfe] Allow Authconfig To Configure Smartcard Authentication " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1441374" id="1441374" title="Gdm Prompts For User Password When Smartcard Login Is " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1441604" id="1441604" title="Authconfig: Information Leak When Sssd Is Used " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443949" id="1443949" title="Authconfig Generates Sssd.Conf With --Updateall --Enablesssd " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1449625" id="1449625" title="Unlocalized Strings And Fuzzy Translations In De, Es, Fr, It, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1450425" id="1450425" title="After Ipa-Server-Install Cannot Ssh To Machine Anymore." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2292-1</id><title>Gnutls</title><description>The following packages have been upgraded to a later upstream version: gnutls (3.3.26). 
Security Fix(es): 
* A double-free flaw was found in the way GnuTLS parsed certain X.509 certificates with Proxy Certificate Information extension. An attacker could create a specially-crafted certificate which, when processed by an application compiled against GnuTLS, could cause that application to crash. (CVE-2017-5334) 
* Multiple flaws were found in the way gnutls processed OpenPGP certificates. An attacker could create specially crafted OpenPGP certificates which, when parsed by gnutls, would cause it to crash. (CVE-2017-5335, CVE-2017-5336, CVE-2017-5337, CVE-2017-7869) 
* A null pointer dereference flaw was found in the way GnuTLS processed ClientHello messages with status_request extension. A remote attacker could use this flaw to cause an application compiled with GnuTLS to crash. (CVE-2017-7507) 
* A flaw was found in the way GnuTLS validated certificates using OCSP responses. This could falsely report a certificate as valid under certain circumstances. (CVE-2016-7444)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="gnutls-c++" release="9.el7" src="gnutls-3.3.26-9.el7.src.rpm" version="3.3.26"><filename>gnutls-c++-3.3.26-9.el7.i686.rpm</filename><sum type="sha256">f25709b59b906341d21c45b05897572fa261cc65e27d6ffc04a9246f13add079</sum></package><package arch="i686" name="gnutls-devel" release="9.el7" src="gnutls-3.3.26-9.el7.src.rpm" version="3.3.26"><filename>gnutls-devel-3.3.26-9.el7.i686.rpm</filename><sum type="sha256">c37338e50f6564f0e981b77e24ca3f6b166d8deb7a09242fd3a6993592e542b2</sum></package><package arch="i686" name="gnutls" release="9.el7" src="gnutls-3.3.26-9.el7.src.rpm" version="3.3.26"><filename>gnutls-3.3.26-9.el7.i686.rpm</filename><sum type="sha256">34301879885c427765471b9cf0e014322bb8ce20be5422db11cddba70a879912</sum></package><package arch="i686" name="gnutls-dane" release="9.el7" src="gnutls-3.3.26-9.el7.src.rpm" version="3.3.26"><filename>gnutls-dane-3.3.26-9.el7.i686.rpm</filename><sum type="sha256">c42b24460ea320eefa82b54b9b33fd37391df254a7ce908f18af6907273bfc9a</sum></package><package arch="x86_64" name="gnutls-c++" release="9.el7" src="gnutls-3.3.26-9.el7.src.rpm" version="3.3.26"><filename>gnutls-c++-3.3.26-9.el7.x86_64.rpm</filename><sum type="sha256">8e288ff404102b85a8f2e0eee9ecafe7bf1000f790f4a0040a18db88cae79c60</sum></package><package arch="x86_64" name="gnutls-utils" release="9.el7" src="gnutls-3.3.26-9.el7.src.rpm" version="3.3.26"><filename>gnutls-utils-3.3.26-9.el7.x86_64.rpm</filename><sum type="sha256">28493bbc058042ac9e9cbf0c8879dbf83ff20f5257f280f120a8c3007f271bd6</sum></package><package arch="x86_64" name="gnutls-devel" release="9.el7" src="gnutls-3.3.26-9.el7.src.rpm" version="3.3.26"><filename>gnutls-devel-3.3.26-9.el7.x86_64.rpm</filename><sum type="sha256">79560074b6e5b97f0fc79fd2252d60cb89a610c23da1d28204ba65c988e91682</sum></package><package arch="x86_64" name="gnutls" release="9.el7" src="gnutls-3.3.26-9.el7.src.rpm" version="3.3.26"><filename>gnutls-3.3.26-9.el7.x86_64.rpm</filename><sum type="sha256">968d4d47b16948df07ef0df48ff3d9f17e41fda60943ace4d4df4bc1af2147c3</sum></package><package arch="x86_64" name="gnutls-dane" release="9.el7" src="gnutls-3.3.26-9.el7.src.rpm" version="3.3.26"><filename>gnutls-dane-3.3.26-9.el7.x86_64.rpm</filename><sum type="sha256">8a711b1296e0c6ba60f26810675ca98eeabbb403b89f575b74b673a37ac04aa2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7444" id="CVE-2016-7444" title="Gnutls: Incorrect Certificate Validation When " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5334" id="CVE-2017-5334" title="Gnutls: Double-Free While Decoding Crafted X.509 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5335" id="CVE-2017-5335" title="Gnutls: Out Of Memory While Parsing Crafted Openpgp Certificate" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5336" id="CVE-2017-5336" title="Gnutls: Stack Overflow In Cdk_Pk_Get_Keyid" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5337" id="CVE-2017-5337" title="Gnutls: Heap Read Overflow In Read-Packet.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7507" id="CVE-2017-7507" title="Gnutls: Crash Upon Receiving Well-Formed " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7869" id="CVE-2017-7869" title="Gnutls: Out-Of-Bounds Write Related To The " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2292" id="RHSA-2017:2292-1" title="Rhsa-2017:2292-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335931" id="1335931" title="Gnutls: Disable Tls Connections With Less Than 1024-Bit Dh " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1374266" id="1374266" title="Gnutls: Incorrect Certificate Validation When " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1375303" id="1375303" title="Gnutls Trusts A Certificate Whose Ca Is Both Explicitly " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1375463" id="1375463" title="Doc Update: Certtool'S Manpage Does Not Mention It Cannot " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378373" id="1378373" title="Rfe: Add Functions To Set Issuer And Subject Id In X509 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1379283" id="1379283" title="Gnutls: Support The Pin-Value Attribute In Rfc7512 Urls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1379739" id="1379739" title="Gnutls: Do Not Require Trousers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1380642" id="1380642" title="Cannot Read Encrypted Pkcs#8 From Openssl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1383748" id="1383748" title="Gnutls Parses Only The First 32 Extensions, Ignoring The Rest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1388932" id="1388932" title="Gnutls: Interoperability Issue 3.3.X Vs. 3.5.5" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1399232" id="1399232" title="Rfe: P11Tool Command Misses The --Id Option" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1411835" id="1411835" title="Gnutls: Double-Free While Decoding Crafted X.509 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1411836" id="1411836" title="Gnutls: Heap Read Overflow In Read-Packet.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1412235" id="1412235" title="Gnutls: Out Of Memory While Parsing Crafted Openpgp Certificate" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1412236" id="1412236" title="Gnutls: Stack Overflow In Cdk_Pk_Get_Keyid" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443033" id="1443033" title="Gnutls: Out-Of-Bounds Write Related To The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1454621" id="1454621" title="Gnutls: Crash Upon Receiving Well-Formed " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2299-1</id><title>Networkmanager And Libnl3</title><description>The libnl3 packages contain a convenience library that simplifies using the Linux kernel's Netlink sockets interface for network manipulation. 
The following packages have been upgraded to a later upstream version: NetworkManager (1.8.0), network-manager-applet (1.8.0). 
Security Fix(es) in the libnl3 component: 
* An integer overflow leading to a heap-buffer overflow was found in the libnl library. An attacker could use this flaw to cause an application compiled with libnl to crash or possibly execute arbitrary code in the context of the user running such an application. (CVE-2017-0553)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libnl3-cli" release="4.el7" src="libnl3-3.2.28-4.el7.src.rpm" version="3.2.28"><filename>libnl3-cli-3.2.28-4.el7.x86_64.rpm</filename><sum type="sha256">299f18d0f7011e96f049930848c9499580b52b00984c0a11a264cb945c6e822c</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-glib-devel" release="9.el7" src="NetworkManager-1.8.0-9.el7.src.rpm" version="1.8.0"><filename>NetworkManager-glib-devel-1.8.0-9.el7.x86_64.rpm</filename><sum type="sha256">ac9d15762fc19b9f1eb1241a7d3b5b22e806d87223d3ebfce82130b4a3197d05</sum></package><package arch="x86_64" name="libnl3-doc" release="4.el7" src="libnl3-3.2.28-4.el7.src.rpm" version="3.2.28"><filename>libnl3-doc-3.2.28-4.el7.x86_64.rpm</filename><sum type="sha256">321c59cd9d6c498ba4372a1474dda4e64600fd91c5a928e15b25b6313e25df3e</sum></package><package arch="i686" name="libnl3-cli" release="4.el7" src="libnl3-3.2.28-4.el7.src.rpm" version="3.2.28"><filename>libnl3-cli-3.2.28-4.el7.i686.rpm</filename><sum type="sha256">cdcf546fb376b2fec31a214ef77c311b3b05791ee14383f56d887b0a54699024</sum></package><package arch="noarch" epoch="1" name="NetworkManager-config-server" release="9.el7" src="NetworkManager-1.8.0-9.el7.src.rpm" version="1.8.0"><filename>NetworkManager-config-server-1.8.0-9.el7.noarch.rpm</filename><sum type="sha256">b0bb2310a8492e163b9af70b8b5a162a66fa55214c07fde108f978920ef6219f</sum></package><package arch="i686" name="libnma-devel" release="3.el7" src="network-manager-applet-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>libnma-devel-1.8.0-3.el7.i686.rpm</filename><sum type="sha256">3910ab18fdd1e61472aa783ff137db101d848a6b1e207d6a49ccc488ac237b6b</sum></package><package arch="x86_64" name="libnma" release="3.el7" src="network-manager-applet-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>libnma-1.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">bf267c40ccb03ec66e6d563e19eaa9b3f952820aa1da01771f45afb4e2fcab28</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-wifi" release="9.el7" src="NetworkManager-1.8.0-9.el7.src.rpm" version="1.8.0"><filename>NetworkManager-wifi-1.8.0-9.el7.x86_64.rpm</filename><sum type="sha256">9bede8bb8210971302ef8c733d8f8ae24d46a93836fc6f2d64c5f57015927b0b</sum></package><package arch="x86_64" name="network-manager-applet" release="3.el7" src="network-manager-applet-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>network-manager-applet-1.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">56c6d5357368155929acb941e1ca71fbe94261a0ca7f75bc35d70c9404a11e13</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-tui" release="9.el7" src="NetworkManager-1.8.0-9.el7.src.rpm" version="1.8.0"><filename>NetworkManager-tui-1.8.0-9.el7.x86_64.rpm</filename><sum type="sha256">3513a919c607fdb4e9e5035ac533bf0b27b36830ba7e19dc39741ed5a1142dec</sum></package><package arch="i686" name="libnl3-devel" release="4.el7" src="libnl3-3.2.28-4.el7.src.rpm" version="3.2.28"><filename>libnl3-devel-3.2.28-4.el7.i686.rpm</filename><sum type="sha256">d70a0b3340958c2fbfd08ba5cf2086d8d4871daf00b5f243752beccc2e59649d</sum></package><package arch="i686" name="libnma" release="3.el7" src="network-manager-applet-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>libnma-1.8.0-3.el7.i686.rpm</filename><sum type="sha256">b69d93bf1df142a0b1a789aef578af64e6c68526e5e664171373b360c4c0ffc5</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-libnm" release="9.el7" src="NetworkManager-1.8.0-9.el7.src.rpm" version="1.8.0"><filename>NetworkManager-libnm-1.8.0-9.el7.x86_64.rpm</filename><sum type="sha256">3f99449055a42f4cd5b9595b6073a8bf9c78814a6360dbc8f72b4e02df1118c4</sum></package><package arch="x86_64" name="libnma-devel" release="3.el7" src="network-manager-applet-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>libnma-devel-1.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">b9f7fcf9b1951a086d2259444a9097ea864c288425a0aed08c5e18bf2128fb57</sum></package><package arch="i686" name="libnl3" release="4.el7" src="libnl3-3.2.28-4.el7.src.rpm" version="3.2.28"><filename>libnl3-3.2.28-4.el7.i686.rpm</filename><sum type="sha256">176df9f21ffcbf8d9be33925842bcc5381db1d0f4aba72d34733577dc2229670</sum></package><package arch="noarch" epoch="1" name="NetworkManager-dispatcher-routing-rules" release="9.el7" src="NetworkManager-1.8.0-9.el7.src.rpm" version="1.8.0"><filename>NetworkManager-dispatcher-routing-rules-1.8.0-9.el7.noarch.rpm</filename><sum type="sha256">ce6d6f34ce235b0a12662b69b8f7a1ffdf7726c995f0fce4e141b0d2f7cc9894</sum></package><package arch="i686" epoch="1" name="NetworkManager-libnm" release="9.el7" src="NetworkManager-1.8.0-9.el7.src.rpm" version="1.8.0"><filename>NetworkManager-libnm-1.8.0-9.el7.i686.rpm</filename><sum type="sha256">a5836429aa77298185f99adce465a0c7aa215e7a622429371ee8a3e1ac16d2bf</sum></package><package arch="x86_64" epoch="1" name="NetworkManager" release="9.el7" src="NetworkManager-1.8.0-9.el7.src.rpm" version="1.8.0"><filename>NetworkManager-1.8.0-9.el7.x86_64.rpm</filename><sum type="sha256">843e23a499c452d5a9a3cb0b9bc90d71c53253274d3d4fc75743acc6cdc02dfb</sum></package><package arch="i686" name="libnm-gtk-devel" release="3.el7" src="network-manager-applet-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>libnm-gtk-devel-1.8.0-3.el7.i686.rpm</filename><sum type="sha256">28ab0b2c718580b27092137786d2c7ba84c14dcadfc9165d573c2cf7bc85cdf4</sum></package><package arch="x86_64" name="libnm-gtk-devel" release="3.el7" src="network-manager-applet-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>libnm-gtk-devel-1.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">67a6e45c033f7e7dbfa0457257c74fbfb4358b09a384fb348bc4109cc4c36792</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-glib" release="9.el7" src="NetworkManager-1.8.0-9.el7.src.rpm" version="1.8.0"><filename>NetworkManager-glib-1.8.0-9.el7.x86_64.rpm</filename><sum type="sha256">fccb8b9f35410207358e797052b239369d700a2c8399a898db7d83b7167ee474</sum></package><package arch="x86_64" name="nm-connection-editor" release="3.el7" src="network-manager-applet-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>nm-connection-editor-1.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">6534719f726464b4361aea791c48a9108574c8a8bfdc39176cc22a6a69c83719</sum></package><package arch="i686" epoch="1" name="NetworkManager-glib" release="9.el7" src="NetworkManager-1.8.0-9.el7.src.rpm" version="1.8.0"><filename>NetworkManager-glib-1.8.0-9.el7.i686.rpm</filename><sum type="sha256">d3d0b3b13d7338c3765202dda5ed9c8e4148001baa2debb91684f60c37d97b3d</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-ppp" release="9.el7" src="NetworkManager-1.8.0-9.el7.src.rpm" version="1.8.0"><filename>NetworkManager-ppp-1.8.0-9.el7.x86_64.rpm</filename><sum type="sha256">cb7ee2ee7c4c98793dac09f87ac413e14310c573989df0af686d541cc85f9583</sum></package><package arch="x86_64" name="NetworkManager-libreswan-gnome" release="2.el7" src="NetworkManager-libreswan-1.2.4-2.el7.src.rpm" version="1.2.4"><filename>NetworkManager-libreswan-gnome-1.2.4-2.el7.x86_64.rpm</filename><sum type="sha256">c165dc33218388c222d065fb06a0c9410577a120ec5e48ae4117593d3b47d0b4</sum></package><package arch="i686" name="libnm-gtk" release="3.el7" src="network-manager-applet-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>libnm-gtk-1.8.0-3.el7.i686.rpm</filename><sum type="sha256">c002edb97e8eb3f2428acbcefd1d858b0d4133f549af4d78962dc6f68865bc88</sum></package><package arch="x86_64" name="NetworkManager-libreswan" release="2.el7" src="NetworkManager-libreswan-1.2.4-2.el7.src.rpm" version="1.2.4"><filename>NetworkManager-libreswan-1.2.4-2.el7.x86_64.rpm</filename><sum type="sha256">0ef1b3d97c24d5c1bc42b11d7a239fa3abf6356bb8e62c82a9e2ad0e1a9f39b5</sum></package><package arch="i686" epoch="1" name="NetworkManager-glib-devel" release="9.el7" src="NetworkManager-1.8.0-9.el7.src.rpm" version="1.8.0"><filename>NetworkManager-glib-devel-1.8.0-9.el7.i686.rpm</filename><sum type="sha256">4fee7f108790688a07c977f8c6fd11ef371076600f4775f3a80240b06035d434</sum></package><package arch="i686" epoch="1" name="NetworkManager-libnm-devel" release="9.el7" src="NetworkManager-1.8.0-9.el7.src.rpm" version="1.8.0"><filename>NetworkManager-libnm-devel-1.8.0-9.el7.i686.rpm</filename><sum type="sha256">02a69cb50923e5087260a3ee4c8e496ae545b7bbfbff045eac0510220af4070e</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-wwan" release="9.el7" src="NetworkManager-1.8.0-9.el7.src.rpm" version="1.8.0"><filename>NetworkManager-wwan-1.8.0-9.el7.x86_64.rpm</filename><sum type="sha256">d8a02c030ee2958fc1e04dbd020812a7abc4071f994c1e1f997c492c178bb77f</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-libnm-devel" release="9.el7" src="NetworkManager-1.8.0-9.el7.src.rpm" version="1.8.0"><filename>NetworkManager-libnm-devel-1.8.0-9.el7.x86_64.rpm</filename><sum type="sha256">6140f68377e702fde61966d73d4451e9d070d1350e03fe0c4960c1ce714ca86a</sum></package><package arch="x86_64" name="libnl3" release="4.el7" src="libnl3-3.2.28-4.el7.src.rpm" version="3.2.28"><filename>libnl3-3.2.28-4.el7.x86_64.rpm</filename><sum type="sha256">51b4d9ca49ee488409c709f35af2a47dd9ba6369405831e3b6be44dc1d74342b</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-bluetooth" release="9.el7" src="NetworkManager-1.8.0-9.el7.src.rpm" version="1.8.0"><filename>NetworkManager-bluetooth-1.8.0-9.el7.x86_64.rpm</filename><sum type="sha256">1e3276e4e8a305064c9853549f5e19ee61119278e54780786b952a5207666d89</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-adsl" release="9.el7" src="NetworkManager-1.8.0-9.el7.src.rpm" version="1.8.0"><filename>NetworkManager-adsl-1.8.0-9.el7.x86_64.rpm</filename><sum type="sha256">1b484086e61e2deb8b2129d428596da9711acf52a5d70310897259d8b82fc9bd</sum></package><package arch="x86_64" name="libnl3-devel" release="4.el7" src="libnl3-3.2.28-4.el7.src.rpm" version="3.2.28"><filename>libnl3-devel-3.2.28-4.el7.x86_64.rpm</filename><sum type="sha256">d6882a6d33c68c62509479837d874df1ca66857d0a12d52e8d79882e029c828f</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-team" release="9.el7" src="NetworkManager-1.8.0-9.el7.src.rpm" version="1.8.0"><filename>NetworkManager-team-1.8.0-9.el7.x86_64.rpm</filename><sum type="sha256">99fcdb61319e49e8a8087c76fbd2cd0a2a4991b8553cae4e83b9bb8aa290d252</sum></package><package arch="x86_64" name="libnm-gtk" release="3.el7" src="network-manager-applet-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>libnm-gtk-1.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">7571e2cb5ccf4642d1d96566305aefddb30eaee6ce303c246c9bd9e1227d86f5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0553" id="CVE-2017-0553" title="Libnl: Integer Overflow In Nlmsg_Reserve()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2299" id="RHSA-2017:2299-1" title="Rhsa-2017:2299-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1231526" id="1231526" title="Nmcli Slow With Large Numbers Of Vlans" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1256822" id="1256822" title="[Rfe] Support Ipv6 Shared Connections" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1312359" id="1312359" title="Activating Vlan On Virtual Device Fails With: Failed To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1344303" id="1344303" title="Hostnamectl Set-Hostname Over-Writes Existing Resolv.Conf Entries" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348198" id="1348198" title="[Rfe] Cannot Easily Change Active_Slave" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349266" id="1349266" title="Networkmanager Adds Extra Options While Bonding Mode=6, Which " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1351263" id="1351263" title="[Review] Lr/Cli-Ask-Rh1351263: [Rfe] Allow Passing -A To The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1360386" id="1360386" title="Bond Slaves Of Master Which Is Slave Of A Bridge Are Sometimes " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367752" id="1367752" title="Startin Team Slave When Master Has Invalid Json Config Leads " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1368353" id="1368353" title="[Nmci] [Abrt] [Faf] Networkmanager: G_Object_Get_Property(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369008" id="1369008" title="Once Networkmanager Is Stopped, The Ifcfg Files It Created Via " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369380" id="1369380" title="Networkmanager.Service Ignores Commented 'Onboot=No # Comment' " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369716" id="1369716" title="Checkpoint/Rollback Improvements" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1371126" id="1371126" title="Layer 2-Only Device Is Taken Down When Networkmanager Stops" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1371433" id="1371433" title="[Rfe] Directly Instruct Nm To Avoid Controlling And Monitoring " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1376199" id="1376199" title="Stalled Eth1.80 Vlan After Restart And Connection Delete" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378418" id="1378418" title="Vlan Device Is Down And Lost Ip Once Stopping Networkmanager" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1380165" id="1380165" title="[Nmci] Just Last Address Specified In Novice Mode Is Written " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1384937" id="1384937" title="[Nmci] Team Activation Timeout With Incorrect Setup" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1386106" id="1386106" title="Nm Fails To Detect Red Hat Vpn After First Login" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1388286" id="1388286" title="Incorrect Mac Address Set On Em1 After Interface Renaming" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1388613" id="1388613" title="[Rfe] Allow Setting The Mtu Of Mobile Broadband Connections In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391170" id="1391170" title="Nmcli Should Show Output In Non-Pretty-Printed Form For Parsing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391477" id="1391477" title="[Bug] Ifcfg-Rh Plugin Fails To Re-Read Valid Connection 802-1X " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1393853" id="1393853" title="[Nmci] Add Team Fails After Clean Install, Nm Service Restart " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1393997" id="1393997" title="Nmcli Duplicates A Connection  After A Networkmanager Restart " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1394334" id="1394334" title="[Rfe] Improve Networkmanager Error Handling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1394344" id="1394344" title="[Rfe] Improve Multihoming" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1394345" id="1394345" title="[Rfe] Per-Device Connection Checks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1394500" id="1394500" title="Networkmanager Doesn'T Honor Ip Address Order" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1394579" id="1394579" title="Improve Handling Of Unmanaged/Assumed Devices" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398932" id="1398932" title="[Rfe] Create Dummy-Based Connection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398934" id="1398934" title="[Rfe] Recognize Sriov Pf And Set Its Num_Vfs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404148" id="1404148" title="Networkmanager Assertion Failure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404594" id="1404594" title="[Rfe] Export Dns Configuration Via D-Bus" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404598" id="1404598" title="[Rfe] Split Networkmanager Ppp Support Into A Separate Package" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1405431" id="1405431" title="Nm Changes /Etc/Resolv.Conf Even Though There Is Peerdns=No In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413312" id="1413312" title="Fix Default Behavior For Cloned-Mac-Address With Rebase In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1414103" id="1414103" title="Rebase Networkmanager Package To New Upstream Version 1.8.X In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1420244" id="1420244" title="[Abrt] [Faf] Networkmanager: __Strchr_Sse42(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1420708" id="1420708" title="Stable Bond Slaves Ordering Based On The Device Name" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1421019" id="1421019" title="Platform-Linux: Kernel Support For Ifla_Inet6_Addr_Gen_M Ode " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1421429" id="1421429" title="[Rfe] Connection Profile User Data" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1422610" id="1422610" title="Nm Changes Hostname To Localhost.Localdomain Even Though No " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1422786" id="1422786" title="Make Insufficient Permission Errors More Visible (Especially " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1423490" id="1423490" title="[Dns] Change Behavior For Rc-Manager=Symlink To Keep " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1424641" id="1424641" title="Team Mac Address Changes After Reboot Or A Down/Up Cycle" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1425409" id="1425409" title="Add Master=Dev When Creating Bond Directly With Slaves In Nmtui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1425818" id="1425818" title="[Abrt] [Faf] Networkmanager: Unknown Function(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1426748" id="1426748" title="Nm Changes /Etc/Resolv.Conf Even Though There Is Peerdns=No In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1427482" id="1427482" title="Networkmanager Doesn'T See Vlan Team-Slaves After Reboot" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1432251" id="1432251" title="[Abrt] [Faf] Networkmanager: Raise(): /Usr/Sbin/Networkmanager " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1433303" id="1433303" title="Networkmanager Leaks Nmdevice Objects For Enslaved Veth Devices" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1433883" id="1433883" title="[Nmci] Nmcli Connection Down Broken" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434317" id="1434317" title="Some Buttons Miss Mnemonic Character In Nm-Connection-Editor Tool" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434555" id="1434555" title="Better Handling Of Bonds With Type=Ethernet" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1436600" id="1436600" title="[Nmci] [Abrt] [Faf] Networkmanager: Check_Activated(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1436601" id="1436601" title="[Nmci] [Abrt] [Faf] Networkmanager: G_Logv(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1436602" id="1436602" title="[Nmci] [Abrt] [Faf] Networkmanager: G_Logv(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1436770" id="1436770" title="Networkmanager Service Restart Is Required After Firewalld " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1436978" id="1436978" title="[Abrt] [Faf] Networkmanager: Raise(): /Usr/Sbin/Networkmanager " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1436990" id="1436990" title="[Nmci] Bring Down Connection With Id Exits With Incorrect Value" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1436993" id="1436993" title="[Nmci] Nmcli Segfault When Entering Editor For New Connection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1437438" id="1437438" title="[Nmci] [Abrt] [Faf] Networkmanager: Unknown Function(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1440077" id="1440077" title="[Nmci] [Abrt] [Faf] Networkmanager: _G_Log_Abort(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1440087" id="1440087" title="[Nmci] [Abrt] [Faf] Networkmanager: Unknown Function(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1440089" id="1440089" title="[Nmci] [Abrt] [Faf] Networkmanager: Unknown Function(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1440090" id="1440090" title="[Nmci] [Abrt] [Faf] Networkmanager: Unknown Function(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1440171" id="1440171" title="[Nmci] Wireless Device Unmanaged After Clean Install" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1440623" id="1440623" title="[Nmci] [Abrt] [Faf] Networkmanager: G_Logv(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1440788" id="1440788" title="Libnl: Integer Overflow In Nlmsg_Reserve()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1440957" id="1440957" title="Nmcli Connection Edit Interactive Is Not Working For Bond-Slave" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1442064" id="1442064" title="[Nmci] [Abrt] [Faf] Networkmanager: Unknown Function(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443437" id="1443437" title="Cannot Send Fqdn As Dhcp Client Host Name (Option 12)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443878" id="1443878" title="Changes In Nm Assuming Of Devices Causing Regressions In Anaconda" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1444374" id="1444374" title="[Nmci] [Abrt] [Faf] Networkmanager: _G_Log_Abort(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1445414" id="1445414" title="Ifcfg: Try To Stay Compatible With Pykickstart" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1446367" id="1446367" title="New Ipv6 Dad Support Lets Activation Without Carrier Hang " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448165" id="1448165" title="Networkmanager Does Not Track Ip Configurations On Managed, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448907" id="1448907" title="[Abrt] [Faf] Networkmanager: G_Logv(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448987" id="1448987" title="Nm Does Not Use New Route When Adding Host Route For Dhcp Server" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1449296" id="1449296" title="Connectivity Checking Timeout=0 Does Not Disable Connectivity " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1450444" id="1450444" title="Nm Wrongly Delays Startup Complete With 'Carrier Wait'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1450459" id="1450459" title="Backport Fix For Possible Crash In Proxy Code " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452062" id="1452062" title="[Nmci] Vlan_Over_No_L3_Bond_Restart_Persistence Failed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452585" id="1452585" title="Preserve The Old Behavior Of Ordering Slaves By Ifindex By Default" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452648" id="1452648" title="(Null) In Old Route Syntaxt After Calling Nmcli Modify Ipv4.Routes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1454385" id="1454385" title="Bluetooth Nap Doesn'T Work" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1456362" id="1456362" title="Nmcli Crashes When Setting The 802-1X.Password-Raw Property" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1456826" id="1456826" title="Tui: Fix Crash During Nmtui-Connect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1456911" id="1456911" title="Fix Checking For Valid Vlan Id In Networkmanager Connection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1457242" id="1457242" title="Manually Added Ipv6 Route Is Removed When Nm Is Running" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1457909" id="1457909" title="[Nmci] Nm Doesn'T Match Bond Connection And A Device" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1458399" id="1458399" title="Periodic Connectivity Checking Broken In 1.8 (Needs Backport)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1458567" id="1458567" title="Nm-Connection-Editor Crashes When Editing An Ethernet " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1459579" id="1459579" title="[Abrt] [Faf] Networkmanager: Unknown Function(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1459580" id="1459580" title="[Abrt] [Faf] Networkmanager: Unknown Function(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1459604" id="1459604" title="Failed Assertion In Networkmanager When Removing Wwan Modem" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1459813" id="1459813" title="[Nmci] Ipv4_Keep_External_Addresses Failed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1459932" id="1459932" title="Networkmanager: Connectivity Check Fails On Wwan Interface" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1460219" id="1460219" title="Long Device Name Is Cut In Nmcli Summary" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1460527" id="1460527" title="Spurious Device Name In The Output Of Nmcli Device Wifi " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1460760" id="1460760" title="Virtio-Net Interface Mtu Overwritten To 1500 Bytes" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2335-1</id><title>Pki-Core</title><description>Security Fix(es): 
* It was found that a mock CMC authentication plugin with a hardcoded secret was accidentally enabled by default in the pki-core package. An attacker could potentially use this flaw to bypass the regular authentication process and trick the CA server into issuing certificates. (CVE-2017-7537)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pki-symkey" release="11.el7" src="pki-core-10.4.1-11.el7.src.rpm" version="10.4.1"><filename>pki-symkey-10.4.1-11.el7.x86_64.rpm</filename><sum type="sha256">7c5c9c824791fe8ffda00f6bc0a8648f862a1ed1b734e5d112f8567cf3ee64c8</sum></package><package arch="noarch" name="pki-kra" release="11.el7" src="pki-core-10.4.1-11.el7.src.rpm" version="10.4.1"><filename>pki-kra-10.4.1-11.el7.noarch.rpm</filename><sum type="sha256">e069a0cdb798044a3b28d8b38c684606bac1358a6f3b15d201280f41416fbf24</sum></package><package arch="noarch" name="pki-base" release="11.el7" src="pki-core-10.4.1-11.el7.src.rpm" version="10.4.1"><filename>pki-base-10.4.1-11.el7.noarch.rpm</filename><sum type="sha256">dbc86d32bb9f35262d08dec5254749620ede2873cd0fe2e68a5f1c6a83ddc566</sum></package><package arch="noarch" name="pki-server" release="11.el7" src="pki-core-10.4.1-11.el7.src.rpm" version="10.4.1"><filename>pki-server-10.4.1-11.el7.noarch.rpm</filename><sum type="sha256">05ff28376c1fa0ceb456ad125683ede523ec29336f0cce40fb1580f43d041cc6</sum></package><package arch="noarch" name="pki-javadoc" release="11.el7" src="pki-core-10.4.1-11.el7.src.rpm" version="10.4.1"><filename>pki-javadoc-10.4.1-11.el7.noarch.rpm</filename><sum type="sha256">aba6a011b5571dfd91ee02bcdee1ac509f98307bd056254b7e84e7813adf5dd7</sum></package><package arch="noarch" name="pki-ca" release="11.el7" src="pki-core-10.4.1-11.el7.src.rpm" version="10.4.1"><filename>pki-ca-10.4.1-11.el7.noarch.rpm</filename><sum type="sha256">5168b87c08be0b464304252d3424191d03383a348f25eefeb8f9f200fd634bde</sum></package><package arch="noarch" name="pki-base-java" release="11.el7" src="pki-core-10.4.1-11.el7.src.rpm" version="10.4.1"><filename>pki-base-java-10.4.1-11.el7.noarch.rpm</filename><sum type="sha256">b409e6c09e32da5b333d29095d604b87afddda6d7e41bb0913a3ebd242c451ef</sum></package><package arch="x86_64" name="pki-tools" release="11.el7" src="pki-core-10.4.1-11.el7.src.rpm" version="10.4.1"><filename>pki-tools-10.4.1-11.el7.x86_64.rpm</filename><sum type="sha256">701091bb935c9807394ec65752a80a1178c903fd51c3ae1168857cba508b3582</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7537" id="CVE-2017-7537" title="Pki-Core: Mock Cmc Authentication Plugin With " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2335" id="RHSA-2017:2335-1" title="Rhsa-2017:2335-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1469432" id="1469432" title="Cmc Plugin Default Change" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1470817" id="1470817" title="Pki-Core: Mock Cmc Authentication Plugin With " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2388-1</id><title>Evince</title><description>Security Fix(es): 
* It was found that evince did not properly sanitize the command line which is run to untar Comic Book Tar (CBT) files, thereby allowing command injection. A specially crafted CBT file, when opened by evince or evince- thumbnailer, could execute arbitrary commands in the context of the evince program. (CVE-2017-1000083)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="evince" release="5.2.el7_4" src="evince-3.22.1-5.2.el7_4.src.rpm" version="3.22.1"><filename>evince-3.22.1-5.2.el7_4.x86_64.rpm</filename><sum type="sha256">05d654e859a8a53fe6c89ac17b49659be38cd246113abbac37a2d44b99cc6115</sum></package><package arch="i686" name="evince-libs" release="5.2.el7_4" src="evince-3.22.1-5.2.el7_4.src.rpm" version="3.22.1"><filename>evince-libs-3.22.1-5.2.el7_4.i686.rpm</filename><sum type="sha256">a9851b40c5888488d0fca917e2bdee4bdeffd57c7fb9ffcef48bc9750eada57b</sum></package><package arch="x86_64" name="evince-devel" release="5.2.el7_4" src="evince-3.22.1-5.2.el7_4.src.rpm" version="3.22.1"><filename>evince-devel-3.22.1-5.2.el7_4.x86_64.rpm</filename><sum type="sha256">aa1cc1796338c0a2f67b14bd80f320479eda2f9b3cc091dfe14f8c588e9da4d6</sum></package><package arch="x86_64" name="evince-libs" release="5.2.el7_4" src="evince-3.22.1-5.2.el7_4.src.rpm" version="3.22.1"><filename>evince-libs-3.22.1-5.2.el7_4.x86_64.rpm</filename><sum type="sha256">8a35b920791292175707a136469eff7e88fc58cd37849ab082d0925054fd20b8</sum></package><package arch="x86_64" name="evince-dvi" release="5.2.el7_4" src="evince-3.22.1-5.2.el7_4.src.rpm" version="3.22.1"><filename>evince-dvi-3.22.1-5.2.el7_4.x86_64.rpm</filename><sum type="sha256">c9b61a4ce397fa4a47dfee44c5392dabea8105d2ef50a68c39635006044a9100</sum></package><package arch="i686" name="evince-devel" release="5.2.el7_4" src="evince-3.22.1-5.2.el7_4.src.rpm" version="3.22.1"><filename>evince-devel-3.22.1-5.2.el7_4.i686.rpm</filename><sum type="sha256">895604173e9477394cef01a4130feed0cf115daf724659cf9e0747728c77d7b2</sum></package><package arch="x86_64" name="evince-browser-plugin" release="5.2.el7_4" src="evince-3.22.1-5.2.el7_4.src.rpm" version="3.22.1"><filename>evince-browser-plugin-3.22.1-5.2.el7_4.x86_64.rpm</filename><sum type="sha256">b34bcfe0d95a00edb821cb113af04460ad853c9b9e6529b95b3aa631899c88af</sum></package><package arch="x86_64" name="evince-nautilus" release="5.2.el7_4" src="evince-3.22.1-5.2.el7_4.src.rpm" version="3.22.1"><filename>evince-nautilus-3.22.1-5.2.el7_4.x86_64.rpm</filename><sum type="sha256">d1513689f482f1f134e6d9f43342701e5a9513c4db8afb9719e03c21c9f937aa</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000083" id="CVE-2017-1000083" title="Evince: Command Injection Via Filename In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2388" id="RHSA-2017:2388-1" title="Rhsa-2017:2388-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1468488" id="1468488" title="Evince: Command Injection Via Filename In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2389-1</id><title>Freeradius</title><description>Security Fix(es): 
* An out-of-bounds write flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to crash the FreeRADIUS server or to execute arbitrary code in the context of the FreeRADIUS server process by sending a specially crafted request packet. (CVE-2017-10984) 
* An out-of-bounds read and write flaw was found in the way FreeRADIUS server handled RADIUS packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted RADIUS packet. (CVE-2017-10978) 
* An out-of-bounds read flaw was found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use this flaw to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10983) 
* A denial of service flaw was found in the way FreeRADIUS server handled certain attributes in request packets. A remote attacker could use this flaw to cause the FreeRADIUS server to enter an infinite loop, consume increasing amounts of memory resources, and ultimately crash by sending a specially crafted request packet. (CVE-2017-10985) 
* Multiple out-of-bounds read flaws were found in the way FreeRADIUS server handled decoding of DHCP packets. A remote attacker could use these flaws to crash the FreeRADIUS server by sending a specially crafted DHCP request. (CVE-2017-10986, CVE-2017-10987)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="freeradius-devel" release="8.el7_4" src="freeradius-3.0.13-8.el7_4.src.rpm" version="3.0.13"><filename>freeradius-devel-3.0.13-8.el7_4.x86_64.rpm</filename><sum type="sha256">8cf4786286c3bd7ece1c326d1142bba37a7b4de78452555db18b2c4a11be9461</sum></package><package arch="x86_64" name="freeradius" release="8.el7_4" src="freeradius-3.0.13-8.el7_4.src.rpm" version="3.0.13"><filename>freeradius-3.0.13-8.el7_4.x86_64.rpm</filename><sum type="sha256">b1a6e676383b1cfd6e7e108adf2b1a3b614d78f205cee6d385701ec9504698d1</sum></package><package arch="x86_64" name="freeradius-unixODBC" release="8.el7_4" src="freeradius-3.0.13-8.el7_4.src.rpm" version="3.0.13"><filename>freeradius-unixODBC-3.0.13-8.el7_4.x86_64.rpm</filename><sum type="sha256">99c3a9c64ac8cf54dda3a061790f3b6dccc281ddbe299454db0fd5150db6964f</sum></package><package arch="x86_64" name="freeradius-mysql" release="8.el7_4" src="freeradius-3.0.13-8.el7_4.src.rpm" version="3.0.13"><filename>freeradius-mysql-3.0.13-8.el7_4.x86_64.rpm</filename><sum type="sha256">3a2fe632faa55ec242ec8c8e6638f2631eea92c03c1324039bcb3f63217f1571</sum></package><package arch="x86_64" name="freeradius-krb5" release="8.el7_4" src="freeradius-3.0.13-8.el7_4.src.rpm" version="3.0.13"><filename>freeradius-krb5-3.0.13-8.el7_4.x86_64.rpm</filename><sum type="sha256">3f1be6f7cfe7bd202682f4364071a14dbb01c7d2517ff89d63adb3803c131366</sum></package><package arch="x86_64" name="freeradius-sqlite" release="8.el7_4" src="freeradius-3.0.13-8.el7_4.src.rpm" version="3.0.13"><filename>freeradius-sqlite-3.0.13-8.el7_4.x86_64.rpm</filename><sum type="sha256">3a40cc621ca07b80b6b28058c484ed852d1848e9ff8b59e6cccb00ef57b3607f</sum></package><package arch="x86_64" name="freeradius-python" release="8.el7_4" src="freeradius-3.0.13-8.el7_4.src.rpm" version="3.0.13"><filename>freeradius-python-3.0.13-8.el7_4.x86_64.rpm</filename><sum type="sha256">7331e1600512a67de460495e29473c462f4ceaeb815843e152d7525b2039eb8a</sum></package><package arch="x86_64" name="freeradius-doc" release="8.el7_4" src="freeradius-3.0.13-8.el7_4.src.rpm" version="3.0.13"><filename>freeradius-doc-3.0.13-8.el7_4.x86_64.rpm</filename><sum type="sha256">0491ad346fa67d6de5ececa9c908396ed559d0146434edfbe9576a8bd7296bf4</sum></package><package arch="x86_64" name="freeradius-utils" release="8.el7_4" src="freeradius-3.0.13-8.el7_4.src.rpm" version="3.0.13"><filename>freeradius-utils-3.0.13-8.el7_4.x86_64.rpm</filename><sum type="sha256">852e40d83037c82652801b261cd257c1f0886c7ac1313be8348f39759bf7c4a6</sum></package><package arch="x86_64" name="freeradius-ldap" release="8.el7_4" src="freeradius-3.0.13-8.el7_4.src.rpm" version="3.0.13"><filename>freeradius-ldap-3.0.13-8.el7_4.x86_64.rpm</filename><sum type="sha256">132443b35e975f312eec60c8b5aaeaa68d1c3424f05681d635098637f9520d14</sum></package><package arch="x86_64" name="freeradius-postgresql" release="8.el7_4" src="freeradius-3.0.13-8.el7_4.src.rpm" version="3.0.13"><filename>freeradius-postgresql-3.0.13-8.el7_4.x86_64.rpm</filename><sum type="sha256">ed8dcd549e794a106be53479ee7fc71360a4188f13b06ffa33080f6b0afdf0d5</sum></package><package arch="i686" name="freeradius-devel" release="8.el7_4" src="freeradius-3.0.13-8.el7_4.src.rpm" version="3.0.13"><filename>freeradius-devel-3.0.13-8.el7_4.i686.rpm</filename><sum type="sha256">9d5603c96d2952e4c0934b8c3611c723669d43873b533cbaae955f77ce3bea19</sum></package><package arch="x86_64" name="freeradius-perl" release="8.el7_4" src="freeradius-3.0.13-8.el7_4.src.rpm" version="3.0.13"><filename>freeradius-perl-3.0.13-8.el7_4.x86_64.rpm</filename><sum type="sha256">14a7d31ee48ed2aa5172de41d46b353b1c5170dd45632b828d36a4a823d6a580</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10978" id="CVE-2017-10978" title="Freeradius: Out-Of-Bounds Read/Write Due To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10983" id="CVE-2017-10983" title="Freeradius: Out-Of-Bounds Read In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10984" id="CVE-2017-10984" title="Freeradius: Out-Of-Bounds Write In Data2Vp_Wimax()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10985" id="CVE-2017-10985" title="Freeradius: Infinite Loop And Memory Exhaustion " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10986" id="CVE-2017-10986" title="Freeradius: Infinite Read In Dhcp_Attr2Vp()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10987" id="CVE-2017-10987" title="Freeradius: Buffer Over-Read In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2389" id="RHSA-2017:2389-1" title="Rhsa-2017:2389-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1468487" id="1468487" title="Freeradius: Out-Of-Bounds Read/Write Due To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1468503" id="1468503" title="Freeradius: Out-Of-Bounds Read In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1468549" id="1468549" title="Freeradius: Out-Of-Bounds Write In Data2Vp_Wimax()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1468550" id="1468550" title="Freeradius: Infinite Loop And Memory Exhaustion " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1468551" id="1468551" title="Freeradius: Infinite Read In Dhcp_Attr2Vp()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1468552" id="1468552" title="Freeradius: Buffer Over-Read In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2423-1</id><title>Log4J</title><description>Security Fix(es): 
* It was found that when using remote logging with log4j socket server the log4j server would deserialize any log event received via TCP or UDP. An attacker could use this flaw to send a specially crafted log event that, during deserialization, would execute arbitrary code in the context of the logger application. (CVE-2017-5645)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="log4j" release="16.el7_4" src="log4j-1.2.17-16.el7_4.src.rpm" version="1.2.17"><filename>log4j-1.2.17-16.el7_4.noarch.rpm</filename><sum type="sha256">50f48f9a3201b157760a52780117f6d74a38a79f5cbbd5d3a329a3093d4b67bc</sum></package><package arch="noarch" name="log4j-javadoc" release="16.el7_4" src="log4j-1.2.17-16.el7_4.src.rpm" version="1.2.17"><filename>log4j-javadoc-1.2.17-16.el7_4.noarch.rpm</filename><sum type="sha256">e27601e7c85addd97840caed97d311ec35227fae939f695d1e70925376c58333</sum></package><package arch="noarch" name="log4j-manual" release="16.el7_4" src="log4j-1.2.17-16.el7_4.src.rpm" version="1.2.17"><filename>log4j-manual-1.2.17-16.el7_4.noarch.rpm</filename><sum type="sha256">f39faf7cfeb2bc7823deaf3281634aace1cef6d6d504bf5fabc25b6d65b79c7d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5645" id="CVE-2017-5645" title="Cve-2017-5645" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2423" id="RHSA-2017:2423-1" title="Rhsa-2017:2423-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443635" id="1443635" title="Log4J: Socket Receiver Deserialization Vulnerability" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2424-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* It was discovered that the DCG implementation in the RMI component of OpenJDK failed to correctly handle references. A remote attacker could possibly use this flaw to execute arbitrary code with the privileges of RMI registry or a Java RMI application. (CVE-2017-10102) 
* Multiple flaws were discovered in the RMI, JAXP, ImageIO, Libraries, AWT, Hotspot, and Security components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-10107, CVE-2017-10096, CVE-2017-10101, CVE-2017-10089, CVE-2017-10090, CVE-2017-10087, CVE-2017-10110, CVE-2017-10074, CVE-2017-10067) 
* It was discovered that the LDAPCertStore class in the Security component of OpenJDK followed LDAP referrals to arbitrary URLs. A specially crafted LDAP referral URL could cause LDAPCertStore to communicate with non-LDAP servers. (CVE-2017-10116) 
* It was discovered that the wsdlimport tool in the JAX-WS component of OpenJDK did not use secure XML parser settings when parsing WSDL XML documents. A specially crafted WSDL document could cause wsdlimport to use an excessive amount of CPU and memory, open connections to other hosts, or leak information. (CVE-2017-10243) 
* A covert timing channel flaw was found in the DSA implementation in the JCE component of OpenJDK. A remote attacker able to make a Java application generate DSA signatures on demand could possibly use this flaw to extract certain information about the used key via a timing side channel. (CVE-2017-10115) 
* A covert timing channel flaw was found in the PKCS#8 implementation in the JCE component of OpenJDK. A remote attacker able to make a Java application repeatedly compare PKCS#8 key against an attacker controlled value could possibly use this flaw to determine the key via a timing side channel. (CVE-2017-10135) 
* It was discovered that the BasicAttribute and CodeSource classes in OpenJDK did not limit the amount of memory allocated when creating object instances from a serialized form. A specially crafted serialized input stream could cause Java to consume an excessive amount of memory. (CVE-2017-10108, CVE-2017-10109) 
* A flaw was found in the Hotspot component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2017-10081) 
* It was discovered that the JPEGImageReader implementation in the 2D component of OpenJDK would, in certain cases, read all image data even if it was not used later. A specially crafted image could cause a Java application to temporarily use an excessive amount of CPU and memory. (CVE-2017-10053)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.11.1.el7_4" src="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4.src.rpm" version="1.7.0.151"><filename>java-1.7.0-openjdk-demo-1.7.0.151-2.6.11.1.el7_4.x86_64.rpm</filename><sum type="sha256">9fe1e353590798cca44ffbd9f3b004dad9d3354eae05771d0588ad0f704463f4</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.11.1.el7_4" src="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4.src.rpm" version="1.7.0.151"><filename>java-1.7.0-openjdk-src-1.7.0.151-2.6.11.1.el7_4.x86_64.rpm</filename><sum type="sha256">7c3ddd546d1690a27dadaceaa9773acaa47b8e2b3ecf8d0ba48d486efd6ea67d</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.11.1.el7_4" src="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4.src.rpm" version="1.7.0.151"><filename>java-1.7.0-openjdk-accessibility-1.7.0.151-2.6.11.1.el7_4.x86_64.rpm</filename><sum type="sha256">fbfa06eeba4e74a531faec6a05edde77b7d7b263bf890e68980a176b8e2f534e</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.11.1.el7_4" src="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4.src.rpm" version="1.7.0.151"><filename>java-1.7.0-openjdk-devel-1.7.0.151-2.6.11.1.el7_4.x86_64.rpm</filename><sum type="sha256">a85fe21d976b8a02d49a238ade5760cbbc499959338279599eebfdac10002f76</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.11.1.el7_4" src="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4.src.rpm" version="1.7.0.151"><filename>java-1.7.0-openjdk-headless-1.7.0.151-2.6.11.1.el7_4.x86_64.rpm</filename><sum type="sha256">9d864fec4aef091dda45d1060ce798d3f417e65f0610e9ec8e4986c8567c3807</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.11.1.el7_4" src="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4.src.rpm" version="1.7.0.151"><filename>java-1.7.0-openjdk-javadoc-1.7.0.151-2.6.11.1.el7_4.noarch.rpm</filename><sum type="sha256">f0f1a118ee76001ce6b872a546b1534c49ced2fb86890d5eef5dde02378a8b77</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.11.1.el7_4" src="java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4.src.rpm" version="1.7.0.151"><filename>java-1.7.0-openjdk-1.7.0.151-2.6.11.1.el7_4.x86_64.rpm</filename><sum type="sha256">e24360e007c48cc83a8e1c6b46ec8d0b5c73a6cf7510a59e5511592993d661c5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10053" id="CVE-2017-10053" title="Openjdk: Reading Of Unprocessed Image Data In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10067" id="CVE-2017-10067" title="Openjdk: Jar Verifier Incorrect Handling Of " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10074" id="CVE-2017-10074" title="Openjdk: Integer Overflows In Range Check Loop " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10081" id="CVE-2017-10081" title="Openjdk: Incorrect Bracket Processing In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10087" id="CVE-2017-10087" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10089" id="CVE-2017-10089" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10090" id="CVE-2017-10090" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10096" id="CVE-2017-10096" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10101" id="CVE-2017-10101" title="Openjdk: Unrestricted Access To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10102" id="CVE-2017-10102" title="Openjdk: Incorrect Handling Of References In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10107" id="CVE-2017-10107" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10108" id="CVE-2017-10108" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10109" id="CVE-2017-10109" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10110" id="CVE-2017-10110" title="Openjdk: Insufficient Access Control Checks In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10115" id="CVE-2017-10115" title="Openjdk: Dsa Implementation Timing Attack (Jce, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10116" id="CVE-2017-10116" title="Openjdk: Ldapcertstore Following Referrals To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10135" id="CVE-2017-10135" title="Openjdk: Pkcs#8 Implementation Timing Attack " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10243" id="CVE-2017-10243" title="Openjdk: Insecure Xml Parsing In Wsdlimport " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2424" id="RHSA-2017:2424-1" title="Rhsa-2017:2424-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471266" id="1471266" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471270" id="1471270" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471517" id="1471517" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471521" id="1471521" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471523" id="1471523" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471527" id="1471527" title="Openjdk: Unrestricted Access To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471528" id="1471528" title="Openjdk: Insufficient Access Control Checks In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471534" id="1471534" title="Openjdk: Integer Overflows In Range Check Loop " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471535" id="1471535" title="Openjdk: Jar Verifier Incorrect Handling Of " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471670" id="1471670" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471711" id="1471711" title="Openjdk: Incorrect Bracket Processing In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471738" id="1471738" title="Openjdk: Ldapcertstore Following Referrals To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471851" id="1471851" title="Openjdk: Dsa Implementation Timing Attack (Jce, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471871" id="1471871" title="Openjdk: Pkcs#8 Implementation Timing Attack " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471888" id="1471888" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471889" id="1471889" title="Openjdk: Reading Of Unprocessed Image Data In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472345" id="1472345" title="Openjdk: Incorrect Handling Of References In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472666" id="1472666" title="Openjdk: Insecure Xml Parsing In Wsdlimport " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2445-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* Quick Emulator (QEMU) built with the Network Block Device (NBD) Server support is vulnerable to a crash via a SIGPIPE signal. The crash can occur if a client aborts a connection due to any failure during negotiation or read operation. A remote user/process could use this flaw to crash the qemu-nbd server resulting in a DoS. (CVE-2017-10664)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="141.el7_4.1" src="qemu-kvm-1.5.3-141.el7_4.1.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-141.el7_4.1.x86_64.rpm</filename><sum type="sha256">e9839537f7a6eeed198ea589b4413d2aea03971c06c3554a0f3b74800c148862</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="141.el7_4.1" src="qemu-kvm-1.5.3-141.el7_4.1.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-141.el7_4.1.x86_64.rpm</filename><sum type="sha256">8d4162f5aea2f546a7280271754fd09dd41f6b34c07fb2de0b76afa0022d3ae5</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="141.el7_4.1" src="qemu-kvm-1.5.3-141.el7_4.1.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-141.el7_4.1.x86_64.rpm</filename><sum type="sha256">10b4be9150585f2c0cd139261f7188cfc688be5fa9f11694de14f1f899eeafe0</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="141.el7_4.1" src="qemu-kvm-1.5.3-141.el7_4.1.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-141.el7_4.1.x86_64.rpm</filename><sum type="sha256">afabec552ed5239559b7cfa920a2ccac372cfa7c022ff8aa9e0661ba66f99b8a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10664" id="CVE-2017-10664" title="Qemu: Qemu-Nbd: Server Breaks With Sigpipe Upon " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2445" id="RHSA-2017:2445-1" title="Rhsa-2017:2445-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1466190" id="1466190" title="Qemu: Qemu-Nbd: Server Breaks With Sigpipe Upon " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2456-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.3.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-7779, CVE-2017-7798, CVE-2017-7800, CVE-2017-7801, CVE-2017-7753, CVE-2017-7784, CVE-2017-7785, CVE-2017-7786, CVE-2017-7787, CVE-2017-7792, CVE-2017-7802, CVE-2017-7807, CVE-2017-7809, CVE-2017-7791, CVE-2017-7803)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="2.el7_4" src="firefox-52.3.0-2.el7_4.src.rpm" version="52.3.0"><filename>firefox-52.3.0-2.el7_4.i686.rpm</filename><sum type="sha256">2c201ab08a598776733832985b8632af900d32bba8d2a7d5ceb2dbe72ddcf093</sum></package><package arch="x86_64" name="firefox" release="2.el7_4" src="firefox-52.3.0-2.el7_4.src.rpm" version="52.3.0"><filename>firefox-52.3.0-2.el7_4.x86_64.rpm</filename><sum type="sha256">30de33480fd30bc46d8c38773379126f167042bbf57429f345d4606b18e23f0d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753" id="CVE-2017-7753" title="Mozilla: Out-Of-Bounds Read With Cached Style " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779" id="CVE-2017-7779" title="Mozilla: Memory Safety Bugs Fixed In Firefox 55 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784" id="CVE-2017-7784" title="Mozilla: Use-After-Free With Image Observers " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785" id="CVE-2017-7785" title="Mozilla: Buffer Overflow Manipulating Aria " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786" id="CVE-2017-7786" title="Mozilla: Buffer Overflow While Painting " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787" id="CVE-2017-7787" title="Mozilla: Same-Origin Policy Bypass With Iframes " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791" id="CVE-2017-7791" title="Mozilla: Spoofing Following Page Navigation With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792" id="CVE-2017-7792" title="Mozilla: Buffer Overflow Viewing Certificates " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7798" id="CVE-2017-7798" title="Mozilla: Xul Injection In The Style Editor In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800" id="CVE-2017-7800" title="Mozilla: Use-After-Free In Websockets During " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801" id="CVE-2017-7801" title="Mozilla: Use-After-Free With Marquee During " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802" id="CVE-2017-7802" title="Mozilla: Use-After-Free Resizing Image Elements " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803" id="CVE-2017-7803" title="Mozilla: Csp Directives Improperly Applied With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807" id="CVE-2017-7807" title="Mozilla: Domain Hijacking Through Appcache " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809" id="CVE-2017-7809" title="Mozilla: Use-After-Free While Deleting Attached " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2456" id="RHSA-2017:2456-1" title="Rhsa-2017:2456-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479188" id="1479188" title="Mozilla: Out-Of-Bounds Read With Cached Style " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479191" id="1479191" title="Mozilla: Memory Safety Bugs Fixed In Firefox 55 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479201" id="1479201" title="Mozilla: Use-After-Free With Image Observers " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479203" id="1479203" title="Mozilla: Buffer Overflow Manipulating Aria " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479205" id="1479205" title="Mozilla: Buffer Overflow While Painting " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479206" id="1479206" title="Mozilla: Same-Origin Policy Bypass With Iframes " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479209" id="1479209" title="Mozilla: Spoofing Following Page Navigation With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479210" id="1479210" title="Mozilla: Buffer Overflow Viewing Certificates " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479213" id="1479213" title="Mozilla: Xul Injection In The Style Editor In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479218" id="1479218" title="Mozilla: Use-After-Free In Websockets During " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479223" id="1479223" title="Mozilla: Use-After-Free With Marquee During " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479224" id="1479224" title="Mozilla: Use-After-Free Resizing Image Elements " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479225" id="1479225" title="Mozilla: Csp Directives Improperly Applied With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479227" id="1479227" title="Mozilla: Domain Hijacking Through Appcache " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479650" id="1479650" title="Mozilla: Use-After-Free While Deleting Attached " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2459-1</id><title>Libsoup</title><description>Security Fix(es): 
* A stack-based buffer overflow flaw was discovered within the HTTP processing of libsoup. A remote attacker could exploit this flaw to cause a crash or, potentially, execute arbitrary code by sending a specially crafted HTTP request to a server using the libsoup HTTP server functionality or by tricking a user into connecting to a malicious HTTP server with an application using the libsoup HTTP client functionality. (CVE-2017-2885)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libsoup-devel" release="4.el7_4" src="libsoup-2.56.0-4.el7_4.src.rpm" version="2.56.0"><filename>libsoup-devel-2.56.0-4.el7_4.x86_64.rpm</filename><sum type="sha256">181dff2664f53b5bc9c8ec6276fd67d6c04fa2c24f487be50f836e0d14740d1c</sum></package><package arch="i686" name="libsoup" release="4.el7_4" src="libsoup-2.56.0-4.el7_4.src.rpm" version="2.56.0"><filename>libsoup-2.56.0-4.el7_4.i686.rpm</filename><sum type="sha256">1abcfdf459e731a1f76857e13152d46eca1b8ff62df799434bc3308f301f36d2</sum></package><package arch="i686" name="libsoup-devel" release="4.el7_4" src="libsoup-2.56.0-4.el7_4.src.rpm" version="2.56.0"><filename>libsoup-devel-2.56.0-4.el7_4.i686.rpm</filename><sum type="sha256">e48dc50324d6857e05c662f7e03ad7119dcf925a83cdc0468632e4ae10ee47e7</sum></package><package arch="x86_64" name="libsoup" release="4.el7_4" src="libsoup-2.56.0-4.el7_4.src.rpm" version="2.56.0"><filename>libsoup-2.56.0-4.el7_4.x86_64.rpm</filename><sum type="sha256">59f70bddb3f32f47b411ef72517bb77b0dd5439483668ec32d8bde997975ca6a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2885" id="CVE-2017-2885" title="Libsoup: Stack Based Buffer Overflow With Http " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2459" id="RHSA-2017:2459-1" title="Rhsa-2017:2459-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479281" id="1479281" title="Libsoup: Stack Based Buffer Overflow With Http " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2471-1</id><title>Spice</title><description>Security Fix(es): 
* A vulnerability was discovered in spice server's protocol handling. An authenticated attacker could send specially crafted messages to the spice server, causing out-of-bounds memory accesses, leading to parts of server memory being leaked or a crash. (CVE-2017-7506)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="spice-server" release="2.el7.1" src="spice-0.12.8-2.el7.1.src.rpm" version="0.12.8"><filename>spice-server-0.12.8-2.el7.1.x86_64.rpm</filename><sum type="sha256">c9619ed335a6248e289140493be199d531632946c06275f0c70a83a63397b1f4</sum></package><package arch="x86_64" name="spice-server-devel" release="2.el7.1" src="spice-0.12.8-2.el7.1.src.rpm" version="0.12.8"><filename>spice-server-devel-0.12.8-2.el7.1.x86_64.rpm</filename><sum type="sha256">039dfeb770db81dfb6546eae2d77db460b5967fc7e837d87c426e7de20e18b8c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7506" id="CVE-2017-7506" title="Spice: Possible Buffer Overflow Via Invalid " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2471" id="RHSA-2017:2471-1" title="Rhsa-2017:2471-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452606" id="1452606" title="Spice: Possible Buffer Overflow Via Invalid " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2473-1</id><title>Kernel</title><description>Security Fix(es): 
* A race condition was found in the Linux kernel, present since v3.14-rc1 through v4.12. The race happens between threads of inotify_handle_event() and vfs_rename() while running the rename operation against the same file. As a result of the race the next slab data or the slab's free list pointer can be corrupted with attacker-controlled data. (CVE-2017-7533, Important) 
Bug Fix(es): 
* Previously, direct I/O read operations going past EOF returned an invalid error number, instead of reading 0 bytes and returning success, if these operations were in same XFS block with EOF. Consequently, creating multiple VMs from a Scientific Linux 7.4 template caused all the VMs to become unresponsive in the 'Image Locked' state. This update fixes the direct I/O feature of the file system, and VMs created from a Scientific Linux 7.4 template now work as expected. 
* This kernel is signed with the new Secure Boot key.</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-headers" release="693.1.1.el7" src="kernel-3.10.0-693.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-693.1.1.el7.x86_64.rpm</filename><sum type="sha256">26a627408d77af496c98dc4e3b491bfa12035c8ca0db0ecf8ac45d71ff532481</sum></package><package arch="x86_64" name="kernel-debug" release="693.1.1.el7" src="kernel-3.10.0-693.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-693.1.1.el7.x86_64.rpm</filename><sum type="sha256">78a2e3540a6ef1d4a6ed528f50ca5f198ff8f108755ced044e8a17a013807cd8</sum></package><package arch="noarch" name="kernel-doc" release="693.1.1.el7" src="kernel-3.10.0-693.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-693.1.1.el7.noarch.rpm</filename><sum type="sha256">34d12d2078bf5b252e0a616b1d1bdc63260223b89dc36ae7e3fcd005069dd438</sum></package><package arch="x86_64" name="kernel-debug-devel" release="693.1.1.el7" src="kernel-3.10.0-693.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-693.1.1.el7.x86_64.rpm</filename><sum type="sha256">4442ca5b7045e9b4acbb9813fca4f00dd7f45fc56f318f5a2b97b0710f01fb52</sum></package><package arch="x86_64" name="kernel-tools-libs" release="693.1.1.el7" src="kernel-3.10.0-693.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-693.1.1.el7.x86_64.rpm</filename><sum type="sha256">9a0bbd893405232d764e2ae663f499333d099f30b8460ec6468852b0b3100a65</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="693.1.1.el7" src="kernel-3.10.0-693.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-693.1.1.el7.x86_64.rpm</filename><sum type="sha256">2bf1cbbc85982b8cf63f05fdee7b566d7aabd5ff1f5f8fc3c9f3dfd8d5ab8a4c</sum></package><package arch="x86_64" name="python-perf" release="693.1.1.el7" src="kernel-3.10.0-693.1.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-693.1.1.el7.x86_64.rpm</filename><sum type="sha256">5c1ac06cf398fec4c6a0b426ca73c8a600c50b4cd2d0a3a2c2bd842120df9050</sum></package><package arch="x86_64" name="kernel-devel" release="693.1.1.el7" src="kernel-3.10.0-693.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-693.1.1.el7.x86_64.rpm</filename><sum type="sha256">8239c3565f46f1624ba1f15d00e4c77dcb817f6d11a2bf9e3dcd4c15bc58781c</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="693.1.1.el7" src="kernel-3.10.0-693.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-693.1.1.el7.noarch.rpm</filename><sum type="sha256">6887b27999c473b230a512520f99a3925aec2abc998f54d82434ac51c824d904</sum></package><package arch="x86_64" name="kernel-tools" release="693.1.1.el7" src="kernel-3.10.0-693.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-693.1.1.el7.x86_64.rpm</filename><sum type="sha256">c914353cf12c035c0719db545f64dcbf07e16a9b5c594ade0d66ea8799d13c03</sum></package><package arch="x86_64" name="perf" release="693.1.1.el7" src="kernel-3.10.0-693.1.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-693.1.1.el7.x86_64.rpm</filename><sum type="sha256">5681feebcd021764bc80416fbef94ae9b69f5f4eb386a3cc5aa82cf7366f261c</sum></package><package arch="x86_64" name="kernel" release="693.1.1.el7" src="kernel-3.10.0-693.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-693.1.1.el7.x86_64.rpm</filename><sum type="sha256">530ba2c53c1953ee52ec0edf8f950bb97ef75a086dc9b39f1acdbd70b7dae448</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7533" id="CVE-2017-7533" title="Kernel: A Race Between Inotify_Handle_Event() " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2473" id="RHSA-2017:2473-1" title="Rhsa-2017:2473-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1468283" id="1468283" title="Kernel: A Race Between Inotify_Handle_Event() " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2479-1</id><title>Httpd</title><description>Security Fix(es): 
* It was discovered that the httpd's mod_auth_digest module did not properly initialize memory before using it when processing certain headers related to digest authentication. A remote attacker could possibly use this flaw to disclose potentially sensitive information or cause httpd child process to crash by sending specially crafted requests to a server. (CVE-2017-9788) 
* It was discovered that the use of httpd's ap_get_basic_auth_pw() API function outside of the authentication phase could lead to authentication bypass. A remote attacker could possibly use this flaw to bypass required authentication if the API was used incorrectly by one of the modules used by httpd. (CVE-2017-3167) 
* A NULL pointer dereference flaw was found in the httpd's mod_ssl module. A remote attacker could use this flaw to cause an httpd child process to crash if another module used by httpd called a certain API function during the processing of an HTTPS request. (CVE-2017-3169) 
* A buffer over-read flaw was found in the httpd's ap_find_token() function. A remote attacker could use this flaw to cause httpd child process to crash via a specially crafted HTTP request. (CVE-2017-7668) 
* A buffer over-read flaw was found in the httpd's mod_mime module. A user permitted to modify httpd's MIME configuration could use this flaw to cause httpd child process to crash. (CVE-2017-7679)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="httpd-manual" release="67.sl7.2" src="httpd-2.4.6-67.sl7.2.src.rpm" version="2.4.6"><filename>httpd-manual-2.4.6-67.sl7.2.noarch.rpm</filename><sum type="sha256">f5cb640848f35939018127cd6d7ccd7fc54392470c235fe734806950853c4cf7</sum></package><package arch="x86_64" name="mod_ldap" release="67.sl7.2" src="httpd-2.4.6-67.sl7.2.src.rpm" version="2.4.6"><filename>mod_ldap-2.4.6-67.sl7.2.x86_64.rpm</filename><sum type="sha256">6bbd2dca76e1ff5de503680bb8526ad41296d197d4543fa09fbf1b22b9c4e6ab</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="67.sl7.2" src="httpd-2.4.6-67.sl7.2.src.rpm" version="2.4.6"><filename>mod_ssl-2.4.6-67.sl7.2.x86_64.rpm</filename><sum type="sha256">b16cbc4552de23ee73c8a1c0fceeeccc933b923859366791ed8b6a9ec9b15846</sum></package><package arch="x86_64" name="httpd" release="67.sl7.2" src="httpd-2.4.6-67.sl7.2.src.rpm" version="2.4.6"><filename>httpd-2.4.6-67.sl7.2.x86_64.rpm</filename><sum type="sha256">2f9ca3c8a541695827e646f0b7c60ac59fa5d8538a6395d551ea7c1c0c5b7e88</sum></package><package arch="x86_64" name="httpd-devel" release="67.sl7.2" src="httpd-2.4.6-67.sl7.2.src.rpm" version="2.4.6"><filename>httpd-devel-2.4.6-67.sl7.2.x86_64.rpm</filename><sum type="sha256">44fa248d8cfcac3fac78f17634a3dec0a215aade3a39625f4a88c79332a92526</sum></package><package arch="x86_64" epoch="1" name="mod_proxy_html" release="67.sl7.2" src="httpd-2.4.6-67.sl7.2.src.rpm" version="2.4.6"><filename>mod_proxy_html-2.4.6-67.sl7.2.x86_64.rpm</filename><sum type="sha256">b089815d0e25bacd1532de81830dc7f4dac64413565964d6280eacb6201c4814</sum></package><package arch="x86_64" name="mod_session" release="67.sl7.2" src="httpd-2.4.6-67.sl7.2.src.rpm" version="2.4.6"><filename>mod_session-2.4.6-67.sl7.2.x86_64.rpm</filename><sum type="sha256">a6b4a199b5c52fc78a998e004c00e811205d96ddd4a382c849d8c98dc0078543</sum></package><package arch="x86_64" name="httpd-tools" release="67.sl7.2" src="httpd-2.4.6-67.sl7.2.src.rpm" version="2.4.6"><filename>httpd-tools-2.4.6-67.sl7.2.x86_64.rpm</filename><sum type="sha256">cd95752eea912c1a6c7def078c16bc5fcfcc84826b83014bc2e50d1437e9843a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3167" id="CVE-2017-3167" title="Httpd: Ap_Get_Basic_Auth_Pw() Authentication Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3169" id="CVE-2017-3169" title="Httpd: Mod_Ssl Null Pointer Dereference" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7668" id="CVE-2017-7668" title="Httpd: Ap_Find_Token() Buffer Overread" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7679" id="CVE-2017-7679" title="Httpd: Mod_Mime Buffer Overread" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9788" id="CVE-2017-9788" title="Httpd: Uninitialized Memory Reflection In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2479" id="RHSA-2017:2479-1" title="Rhsa-2017:2479-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1463194" id="1463194" title="Httpd: Ap_Get_Basic_Auth_Pw() Authentication Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1463197" id="1463197" title="Httpd: Mod_Ssl Null Pointer Dereference" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1463205" id="1463205" title="Httpd: Ap_Find_Token() Buffer Overread" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1463207" id="1463207" title="Httpd: Mod_Mime Buffer Overread" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1470748" id="1470748" title="Httpd: Uninitialized Memory Reflection In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2480-1</id><title>Subversion</title><description>Security Fix(es): 
* A shell command injection flaw related to the handling of "svn+ssh" URLs has been discovered in Subversion. An attacker could use this flaw to execute shell commands with the privileges of the user running the Subversion client, for example when performing a "checkout" or "update" action on a malicious repository, or a legitimate repository containing a malicious commit. (CVE-2017-9800)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="subversion-python" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>subversion-python-1.7.14-11.el7_4.x86_64.rpm</filename><sum type="sha256">ca21c88ddd8af388f19b3a9c34d8779394b90f33e255024359f95e2599acd006</sum></package><package arch="i686" name="subversion-libs" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>subversion-libs-1.7.14-11.el7_4.i686.rpm</filename><sum type="sha256">0af259eb29760cd371ca3087003ec4409fc6d7a5e2591590cca9482056614a83</sum></package><package arch="i686" name="subversion-javahl" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>subversion-javahl-1.7.14-11.el7_4.i686.rpm</filename><sum type="sha256">3988a7502f490195c19784d3810e75ab282631c6c3b40e9cd761a5b3acd7d6ba</sum></package><package arch="i686" name="subversion" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>subversion-1.7.14-11.el7_4.i686.rpm</filename><sum type="sha256">8cb3642eb956097d666734dd53defe197f6219748ff6b1dddd8e9af2520c1674</sum></package><package arch="x86_64" name="subversion-tools" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>subversion-tools-1.7.14-11.el7_4.x86_64.rpm</filename><sum type="sha256">4c5b088e90d4c1da44edfa063ac5613fb2054277c15982e0cd2ff8217223a46f</sum></package><package arch="x86_64" name="subversion-kde" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>subversion-kde-1.7.14-11.el7_4.x86_64.rpm</filename><sum type="sha256">c28083750735eac9268e3496c8e4840c391e25cf8bcf0f020f335c75a9a40441</sum></package><package arch="i686" name="subversion-kde" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>subversion-kde-1.7.14-11.el7_4.i686.rpm</filename><sum type="sha256">ee0a2c5ef608f83ae65fbdfac14a6f90939d78a4d293eb0cb0f3e7ece2ce55f7</sum></package><package arch="x86_64" name="subversion" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>subversion-1.7.14-11.el7_4.x86_64.rpm</filename><sum type="sha256">60be199678f63f0ea4589f676a22c53a86b51e780e552a2c5858df77d3837667</sum></package><package arch="i686" name="subversion-gnome" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>subversion-gnome-1.7.14-11.el7_4.i686.rpm</filename><sum type="sha256">decb38de3241ba5554f03289dcd169b6854d6e53607ca105e2857f70d23da8b3</sum></package><package arch="i686" name="subversion-devel" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>subversion-devel-1.7.14-11.el7_4.i686.rpm</filename><sum type="sha256">49774ce14b8d0a80d18da94b87dfafd5e8e2f8bb4c42e9418badeadff2a48e98</sum></package><package arch="i686" name="subversion-ruby" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>subversion-ruby-1.7.14-11.el7_4.i686.rpm</filename><sum type="sha256">e86f2f57947a5cd692936be44e1a046ac0332dd2009e96ae9474f72652f6d05c</sum></package><package arch="x86_64" name="subversion-perl" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>subversion-perl-1.7.14-11.el7_4.x86_64.rpm</filename><sum type="sha256">4bcdbfb4b1a64e7340784743f3be05d07d9538b1b22b98b5e14fa36fac89310e</sum></package><package arch="x86_64" name="subversion-libs" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>subversion-libs-1.7.14-11.el7_4.x86_64.rpm</filename><sum type="sha256">7a6da8d0a34138c341d199950eb469e02481f8f7c998f21c614db2659f9cd502</sum></package><package arch="x86_64" name="subversion-devel" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>subversion-devel-1.7.14-11.el7_4.x86_64.rpm</filename><sum type="sha256">fd5a36b35befc803f77766de94df731410a02a139f1860a20a902f55b29aa0ed</sum></package><package arch="x86_64" name="subversion-ruby" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>subversion-ruby-1.7.14-11.el7_4.x86_64.rpm</filename><sum type="sha256">6b9b31612a67fd9b1c883f52e85327194403bb6e02b25d86c9a7a1a1a32697ec</sum></package><package arch="i686" name="subversion-perl" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>subversion-perl-1.7.14-11.el7_4.i686.rpm</filename><sum type="sha256">206d1f35a37a1c78bc6a3b57ca81562c46365877a59455711ce7e01f28c66c55</sum></package><package arch="x86_64" name="subversion-javahl" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>subversion-javahl-1.7.14-11.el7_4.x86_64.rpm</filename><sum type="sha256">8aafcea59647a0bd69cbb38af57ffc17b8b8f0f8d80e521d14249edad3d6e826</sum></package><package arch="x86_64" name="mod_dav_svn" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>mod_dav_svn-1.7.14-11.el7_4.x86_64.rpm</filename><sum type="sha256">94152523eaebd9515a098b093dee69afd9758a5f918992abb20d0d76f6cfe100</sum></package><package arch="x86_64" name="subversion-gnome" release="11.el7_4" src="subversion-1.7.14-11.el7_4.src.rpm" version="1.7.14"><filename>subversion-gnome-1.7.14-11.el7_4.x86_64.rpm</filename><sum type="sha256">4bfb112cc93b2dbc95de93a60e638e2b75ee46b1e9ea99c5987f5fac634d55ac</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9800" id="CVE-2017-9800" title="Subversion: Command Injection Through Clients " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2480" id="RHSA-2017:2480-1" title="Rhsa-2017:2480-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479686" id="1479686" title="Subversion: Command Injection Through Clients " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2484-1</id><title>Git</title><description>Security Fix(es): 
* A shell command injection flaw related to the handling of "ssh" URLs has been discovered in Git. An attacker could use this flaw to execute shell commands with the privileges of the user running the Git client, for example, when performing a "clone" action on a malicious repository or a legitimate repository containing a malicious commit. (CVE-2017-1000117)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="emacs-git" release="12.el7_4" src="git-1.8.3.1-12.el7_4.src.rpm" version="1.8.3.1"><filename>emacs-git-1.8.3.1-12.el7_4.noarch.rpm</filename><sum type="sha256">86db31c420596eb41f959d93b0f4eaa61672dff8b2a64bbc3b8a038b4e37a3de</sum></package><package arch="noarch" name="git-p4" release="12.el7_4" src="git-1.8.3.1-12.el7_4.src.rpm" version="1.8.3.1"><filename>git-p4-1.8.3.1-12.el7_4.noarch.rpm</filename><sum type="sha256">a81c8ee90896a136dc177dbafb49296af650fb38a2cdf5bfe7d0fa912528c6c2</sum></package><package arch="x86_64" name="git" release="12.el7_4" src="git-1.8.3.1-12.el7_4.src.rpm" version="1.8.3.1"><filename>git-1.8.3.1-12.el7_4.x86_64.rpm</filename><sum type="sha256">ed18d10b6408a632ab9dd683774deaed27cd259d1dc11e64e967c4fb0aed3563</sum></package><package arch="x86_64" name="git-daemon" release="12.el7_4" src="git-1.8.3.1-12.el7_4.src.rpm" version="1.8.3.1"><filename>git-daemon-1.8.3.1-12.el7_4.x86_64.rpm</filename><sum type="sha256">d623a18fdea6dce56bc2f89aa1fdbfea8d00fa761ec6395e8313f8ef0213455e</sum></package><package arch="noarch" name="emacs-git-el" release="12.el7_4" src="git-1.8.3.1-12.el7_4.src.rpm" version="1.8.3.1"><filename>emacs-git-el-1.8.3.1-12.el7_4.noarch.rpm</filename><sum type="sha256">9671b6839281a3d7c25eb67bb30e99fd1c9a29b41428bb69740a920dd16f1936</sum></package><package arch="noarch" name="git-email" release="12.el7_4" src="git-1.8.3.1-12.el7_4.src.rpm" version="1.8.3.1"><filename>git-email-1.8.3.1-12.el7_4.noarch.rpm</filename><sum type="sha256">fbb165d35a0fb364ad024dcd89a36b369d5df509ab9913c61118f5ab18a08a49</sum></package><package arch="noarch" name="git-hg" release="12.el7_4" src="git-1.8.3.1-12.el7_4.src.rpm" version="1.8.3.1"><filename>git-hg-1.8.3.1-12.el7_4.noarch.rpm</filename><sum type="sha256">a9d7e4270523b26ed549c91a16cca704d971fe9963fc7eed68c6d364e2d38b04</sum></package><package arch="noarch" name="git-bzr" release="12.el7_4" src="git-1.8.3.1-12.el7_4.src.rpm" version="1.8.3.1"><filename>git-bzr-1.8.3.1-12.el7_4.noarch.rpm</filename><sum type="sha256">8914c5e0877b75c8ef6f104528a87389c7e9140bccec9dc9e7be62a9107d81e0</sum></package><package arch="x86_64" name="git-svn" release="12.el7_4" src="git-1.8.3.1-12.el7_4.src.rpm" version="1.8.3.1"><filename>git-svn-1.8.3.1-12.el7_4.x86_64.rpm</filename><sum type="sha256">2a4be8c7a5c4101af141cf19155ccaa8a3301798ab9d094c01eb0c532f908748</sum></package><package arch="noarch" name="gitk" release="12.el7_4" src="git-1.8.3.1-12.el7_4.src.rpm" version="1.8.3.1"><filename>gitk-1.8.3.1-12.el7_4.noarch.rpm</filename><sum type="sha256">a46ee2d321b7837a4b0bdf99583e9a880c40fb86d6e89c75546948d7136db3f3</sum></package><package arch="noarch" name="perl-Git" release="12.el7_4" src="git-1.8.3.1-12.el7_4.src.rpm" version="1.8.3.1"><filename>perl-Git-1.8.3.1-12.el7_4.noarch.rpm</filename><sum type="sha256">81fbd2186d3872dcf13c23cbd2ac71add34a751363fd97fe1b6811ae764e1196</sum></package><package arch="noarch" name="git-all" release="12.el7_4" src="git-1.8.3.1-12.el7_4.src.rpm" version="1.8.3.1"><filename>git-all-1.8.3.1-12.el7_4.noarch.rpm</filename><sum type="sha256">90a882e571ab1d743b6bcd2d3f86b53682ace07d075229b64f8f28b40a15abc3</sum></package><package arch="noarch" name="perl-Git-SVN" release="12.el7_4" src="git-1.8.3.1-12.el7_4.src.rpm" version="1.8.3.1"><filename>perl-Git-SVN-1.8.3.1-12.el7_4.noarch.rpm</filename><sum type="sha256">b882dac80ef98037b47abd3e8a7d0b745fe328a78b70d27980fefe0e41fe093f</sum></package><package arch="noarch" name="gitweb" release="12.el7_4" src="git-1.8.3.1-12.el7_4.src.rpm" version="1.8.3.1"><filename>gitweb-1.8.3.1-12.el7_4.noarch.rpm</filename><sum type="sha256">b164a6bee3310f31a2128ca5ffdd0d5bbe77aed4aa924cee7d833583a8e6c93b</sum></package><package arch="noarch" name="git-cvs" release="12.el7_4" src="git-1.8.3.1-12.el7_4.src.rpm" version="1.8.3.1"><filename>git-cvs-1.8.3.1-12.el7_4.noarch.rpm</filename><sum type="sha256">74769d2f7e7c43aa174a2680a6c84a4e5258f2244af0ad1a0545156d7a4697e4</sum></package><package arch="noarch" name="git-gui" release="12.el7_4" src="git-1.8.3.1-12.el7_4.src.rpm" version="1.8.3.1"><filename>git-gui-1.8.3.1-12.el7_4.noarch.rpm</filename><sum type="sha256">1e9b9a95bf046d5367f95d81fee17c47fe0b80eae9193d6f9cccd7b7f255cfd6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000117" id="CVE-2017-1000117" title="Git: Command Injection Via Malicious Ssh Urls" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2484" id="RHSA-2017:2484-1" title="Rhsa-2017:2484-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1480386" id="1480386" title="Git: Command Injection Via Malicious Ssh Urls" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2486-1</id><title>Groovy</title><description>Security Fix(es): 
* It was found that a flaw in Apache groovy library allows remote code execution wherever deserialization occurs in the application. It is possible for an attacker to craft a special serialized object that will execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects are subject to this vulnerability. (CVE-2016-6814)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="groovy" release="8.el7_4" src="groovy-1.8.9-8.el7_4.src.rpm" version="1.8.9"><filename>groovy-1.8.9-8.el7_4.noarch.rpm</filename><sum type="sha256">e576b17a97ce56c4c7e5a72ba1518701cb7c72bf3137d78d7619611b4b68e9a9</sum></package><package arch="noarch" name="groovy-javadoc" release="8.el7_4" src="groovy-1.8.9-8.el7_4.src.rpm" version="1.8.9"><filename>groovy-javadoc-1.8.9-8.el7_4.noarch.rpm</filename><sum type="sha256">0574314d9958311e3455609abcecf2d8cc01f256e06e96a1d5344739561ef8ed</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6814" id="CVE-2016-6814" title="Apache Groovy: Remote Code Execution Via " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2486" id="RHSA-2017:2486-1" title="Rhsa-2017:2486-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1413466" id="1413466" title="Apache Groovy: Remote Code Execution Via " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2489-1</id><title>Mercurial</title><description>Security Fix(es): 
* A vulnerability was found in the way Mercurial handles path auditing and caches the results. An attacker could abuse a repository with a series of commits mixing symlinks and regular files/directories to trick Mercurial into writing outside of a given repository. (CVE-2017-1000115) 
* A shell command injection flaw related to the handling of "ssh" URLs has been discovered in Mercurial. This can be exploited to execute shell commands with the privileges of the user running the Mercurial client, for example, when performing a "checkout" or "update" action on a sub- repository within a malicious repository or a legitimate repository containing a malicious commit. (CVE-2017-1000116)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="mercurial-hgk" release="8.el7_4" src="mercurial-2.6.2-8.el7_4.src.rpm" version="2.6.2"><filename>mercurial-hgk-2.6.2-8.el7_4.x86_64.rpm</filename><sum type="sha256">b745f2fe60dcddffefe827cf71aa85865898aed1cc5fda5e2c30a82f8f6c6935</sum></package><package arch="x86_64" name="emacs-mercurial-el" release="8.el7_4" src="mercurial-2.6.2-8.el7_4.src.rpm" version="2.6.2"><filename>emacs-mercurial-el-2.6.2-8.el7_4.x86_64.rpm</filename><sum type="sha256">748d3a0a976515d3a3a15e22cc000ae54c2277f49e77650e60b64f9128fe8b9e</sum></package><package arch="x86_64" name="emacs-mercurial" release="8.el7_4" src="mercurial-2.6.2-8.el7_4.src.rpm" version="2.6.2"><filename>emacs-mercurial-2.6.2-8.el7_4.x86_64.rpm</filename><sum type="sha256">465713af60ba88a4c9697de4109144beb91aca61e2c149abf933ef714046cedb</sum></package><package arch="x86_64" name="mercurial" release="8.el7_4" src="mercurial-2.6.2-8.el7_4.src.rpm" version="2.6.2"><filename>mercurial-2.6.2-8.el7_4.x86_64.rpm</filename><sum type="sha256">972dcb111ee2a0fd367760a712efeef8a6576d7f076c1a0a405188b473d772ee</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000115" id="CVE-2017-1000115" title="Mercurial: Pathaudit: Path Traversal Via Symlink" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000116" id="CVE-2017-1000116" title="Mercurial: Command Injection On Clients " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2489" id="RHSA-2017:2489-1" title="Rhsa-2017:2489-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479915" id="1479915" title="Mercurial: Command Injection On Clients " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1480330" id="1480330" title="Mercurial: Pathaudit: Path Traversal Via Symlink" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2492-1</id><title>Xmlsec1</title><description>Security Fix(es): 
* It was discovered xmlsec1's use of libxml2 inadvertently enabled external entity expansion (XXE) along with validation. An attacker could craft an XML file that would cause xmlsec1 to try and read local files or HTTP/FTP URLs, leading to information disclosure or denial of service. (CVE-2017-1000061)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xmlsec1-nss-devel" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-nss-devel-1.2.20-7.el7_4.x86_64.rpm</filename><sum type="sha256">2601a7adf2b91b27a1b5e98122ad03c539514b58d530039aec8059130b4ad85d</sum></package><package arch="x86_64" name="xmlsec1-gnutls-devel" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-gnutls-devel-1.2.20-7.el7_4.x86_64.rpm</filename><sum type="sha256">a16bf576afc4c80b9dec79332b802b8dca6ee41d7fa23fc41be86fb6ec26a652</sum></package><package arch="i686" name="xmlsec1-nss" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-nss-1.2.20-7.el7_4.i686.rpm</filename><sum type="sha256">22a8cfb289f0edad65689d6fb37d8099fbfd101f91f40664d182c50716a6ee53</sum></package><package arch="i686" name="xmlsec1-openssl-devel" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-openssl-devel-1.2.20-7.el7_4.i686.rpm</filename><sum type="sha256">0a821f15bef50770cdf0a2a0df965ec0eea7012d039afab44638372157512ba2</sum></package><package arch="i686" name="xmlsec1-nss-devel" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-nss-devel-1.2.20-7.el7_4.i686.rpm</filename><sum type="sha256">9d0555244e06e21761103304ae906f60b6464d375019531d72b9e021c7778ab2</sum></package><package arch="x86_64" name="xmlsec1-devel" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-devel-1.2.20-7.el7_4.x86_64.rpm</filename><sum type="sha256">183d4811952950033cb8965727ff6253221b9ce1a2712c22732e298c8e3a5dbf</sum></package><package arch="x86_64" name="xmlsec1-gcrypt-devel" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-gcrypt-devel-1.2.20-7.el7_4.x86_64.rpm</filename><sum type="sha256">501b62ea733498fb93a39535ba741fb0f152c19db910de8e3851202fed614ecb</sum></package><package arch="i686" name="xmlsec1-gcrypt-devel" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-gcrypt-devel-1.2.20-7.el7_4.i686.rpm</filename><sum type="sha256">bc3c8e855925f747c919d872128de95c62506e248d702e3efe8627c3f00b6561</sum></package><package arch="i686" name="xmlsec1-gnutls-devel" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-gnutls-devel-1.2.20-7.el7_4.i686.rpm</filename><sum type="sha256">653d070f0ef30c26c3cae974b2a9457b569af10b4607d297600b6e5f67253abb</sum></package><package arch="i686" name="xmlsec1-gnutls" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-gnutls-1.2.20-7.el7_4.i686.rpm</filename><sum type="sha256">9ae520a06a20c711ddd341598a10bda3dade2a5f5d12d33f90f55fecf3bf0e5b</sum></package><package arch="x86_64" name="xmlsec1-openssl" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-openssl-1.2.20-7.el7_4.x86_64.rpm</filename><sum type="sha256">ded8cf6d46a98c36c972f78ab9d1f19f24c601ca2313879739f6a792896bc48c</sum></package><package arch="x86_64" name="xmlsec1" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-1.2.20-7.el7_4.x86_64.rpm</filename><sum type="sha256">5367636d2ffcbee5b4ddb7af9d2fcb8df7fa8bf7598c1fe9372595aa43135c7b</sum></package><package arch="i686" name="xmlsec1-openssl" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-openssl-1.2.20-7.el7_4.i686.rpm</filename><sum type="sha256">4a921961b6a3c0051ec9711ade9599feb40c1daed29cc296338dc96a06c63f48</sum></package><package arch="i686" name="xmlsec1-devel" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-devel-1.2.20-7.el7_4.i686.rpm</filename><sum type="sha256">fef226cbba9c9313a46815bd4606c10e3d12a3f86dce31261ac659208957b4af</sum></package><package arch="x86_64" name="xmlsec1-openssl-devel" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-openssl-devel-1.2.20-7.el7_4.x86_64.rpm</filename><sum type="sha256">c7431b0be2fd414681d214769b385b3eb1a01054401c88d4c7af579e7d9de2f1</sum></package><package arch="x86_64" name="xmlsec1-gcrypt" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-gcrypt-1.2.20-7.el7_4.x86_64.rpm</filename><sum type="sha256">b2c55b3bfda307da830543d82989c3a9d51953b9a87868de565624f727fff95a</sum></package><package arch="i686" name="xmlsec1" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-1.2.20-7.el7_4.i686.rpm</filename><sum type="sha256">3dd00d8a80e4e5f95f4b06995906111b974bb74d7afb93d6ee284c48e7fb33af</sum></package><package arch="x86_64" name="xmlsec1-gnutls" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-gnutls-1.2.20-7.el7_4.x86_64.rpm</filename><sum type="sha256">bb68aaff45b4bc09a9c33e553217d6108b9da926aef328735cff8a040607808f</sum></package><package arch="x86_64" name="xmlsec1-nss" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-nss-1.2.20-7.el7_4.x86_64.rpm</filename><sum type="sha256">7a9ac4a078944c3bbd422352e731be8138c26c5c88cd2438d719617ae55468de</sum></package><package arch="i686" name="xmlsec1-gcrypt" release="7.el7_4" src="xmlsec1-1.2.20-7.el7_4.src.rpm" version="1.2.20"><filename>xmlsec1-gcrypt-1.2.20-7.el7_4.i686.rpm</filename><sum type="sha256">0ec20314119fa527f7cbebb06614df4454bc32933cc4b8f847198e45f8c4f4ce</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000061" id="CVE-2017-1000061" title="Xmlsec1: Xmlsec Vulnerable To External Entity " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2492" id="RHSA-2017:2492-1" title="Rhsa-2017:2492-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1437311" id="1437311" title="Xmlsec1: Xmlsec Vulnerable To External Entity " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2534-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.3.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-7779, CVE-2017-7800, CVE-2017-7801, CVE-2017-7753, CVE-2017-7784, CVE-2017-7785, CVE-2017-7786, CVE-2017-7787, CVE-2017-7792, CVE-2017-7802, CVE-2017-7807, CVE-2017-7809, CVE-2017-7791, CVE-2017-7803)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-08-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_4" src="thunderbird-52.3.0-1.el7_4.src.rpm" version="52.3.0"><filename>thunderbird-52.3.0-1.el7_4.x86_64.rpm</filename><sum type="sha256">8be124bb94a977aa583c51d7da7c9bacc5f2aaf96774c0fdfe9821a2591363db</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7753" id="CVE-2017-7753" title="Mozilla: Out-Of-Bounds Read With Cached Style " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7779" id="CVE-2017-7779" title="Mozilla: Memory Safety Bugs Fixed In Firefox 55 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7784" id="CVE-2017-7784" title="Mozilla: Use-After-Free With Image Observers " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7785" id="CVE-2017-7785" title="Mozilla: Buffer Overflow Manipulating Aria " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7786" id="CVE-2017-7786" title="Mozilla: Buffer Overflow While Painting " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7787" id="CVE-2017-7787" title="Mozilla: Same-Origin Policy Bypass With Iframes " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7791" id="CVE-2017-7791" title="Mozilla: Spoofing Following Page Navigation With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7792" id="CVE-2017-7792" title="Mozilla: Buffer Overflow Viewing Certificates " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7800" id="CVE-2017-7800" title="Mozilla: Use-After-Free In Websockets During " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7801" id="CVE-2017-7801" title="Mozilla: Use-After-Free With Marquee During " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7802" id="CVE-2017-7802" title="Mozilla: Use-After-Free Resizing Image Elements " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7803" id="CVE-2017-7803" title="Mozilla: Csp Directives Improperly Applied With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7807" id="CVE-2017-7807" title="Mozilla: Domain Hijacking Through Appcache " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7809" id="CVE-2017-7809" title="Mozilla: Use-After-Free While Deleting Attached " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2534" id="RHSA-2017:2534-1" title="Rhsa-2017:2534-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479188" id="1479188" title="Mozilla: Out-Of-Bounds Read With Cached Style " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479191" id="1479191" title="Mozilla: Memory Safety Bugs Fixed In Firefox 55 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479201" id="1479201" title="Mozilla: Use-After-Free With Image Observers " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479203" id="1479203" title="Mozilla: Buffer Overflow Manipulating Aria " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479205" id="1479205" title="Mozilla: Buffer Overflow While Painting " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479206" id="1479206" title="Mozilla: Same-Origin Policy Bypass With Iframes " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479209" id="1479209" title="Mozilla: Spoofing Following Page Navigation With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479210" id="1479210" title="Mozilla: Buffer Overflow Viewing Certificates " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479218" id="1479218" title="Mozilla: Use-After-Free In Websockets During " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479223" id="1479223" title="Mozilla: Use-After-Free With Marquee During " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479224" id="1479224" title="Mozilla: Use-After-Free Resizing Image Elements " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479225" id="1479225" title="Mozilla: Csp Directives Improperly Applied With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479227" id="1479227" title="Mozilla: Domain Hijacking Through Appcache " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479650" id="1479650" title="Mozilla: Use-After-Free While Deleting Attached " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2551-1</id><title>Poppler</title><description>Security Fix(es): 
* A stack-based buffer overflow was found in the poppler library. An attacker could create a malicious PDF file that would cause applications that use poppler (such as Evince) to crash, or potentially execute arbitrary code when opened. (CVE-2017-9775) 
* An integer overflow leading to heap-based buffer overflow was found in the poppler library. An attacker could create a malicious PDF file that would cause applications that use poppler (such as Evince) to crash, or potentially execute arbitrary code when opened. (CVE-2017-9776)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-08-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="poppler-demos" release="17.el7_4" src="poppler-0.26.5-17.el7_4.src.rpm" version="0.26.5"><filename>poppler-demos-0.26.5-17.el7_4.x86_64.rpm</filename><sum type="sha256">7335c612dbd64a189cf27920b120d8eb26e94395c65a0f37a6043df6dfd18a95</sum></package><package arch="x86_64" name="poppler-cpp" release="17.el7_4" src="poppler-0.26.5-17.el7_4.src.rpm" version="0.26.5"><filename>poppler-cpp-0.26.5-17.el7_4.x86_64.rpm</filename><sum type="sha256">b530aa2870df268c261298f7ba904483163d5e3de4d1119196686995838ce4d7</sum></package><package arch="x86_64" name="poppler-cpp-devel" release="17.el7_4" src="poppler-0.26.5-17.el7_4.src.rpm" version="0.26.5"><filename>poppler-cpp-devel-0.26.5-17.el7_4.x86_64.rpm</filename><sum type="sha256">a80c6d3ccba384a325b1adcb6122a0928123b22db6e3e8963d8d2f40f3746ca2</sum></package><package arch="x86_64" name="poppler-glib" release="17.el7_4" src="poppler-0.26.5-17.el7_4.src.rpm" version="0.26.5"><filename>poppler-glib-0.26.5-17.el7_4.x86_64.rpm</filename><sum type="sha256">49fe8a044fc42d5b38e936525888b50e1f06dd49b0eba22649dd465d6a0db3b2</sum></package><package arch="i686" name="poppler-qt" release="17.el7_4" src="poppler-0.26.5-17.el7_4.src.rpm" version="0.26.5"><filename>poppler-qt-0.26.5-17.el7_4.i686.rpm</filename><sum type="sha256">33c5a1cb5d33d22e0c0bff234cc0a5866bad525d4addd03b25d0ceb397c7e5cf</sum></package><package arch="x86_64" name="poppler-utils" release="17.el7_4" src="poppler-0.26.5-17.el7_4.src.rpm" version="0.26.5"><filename>poppler-utils-0.26.5-17.el7_4.x86_64.rpm</filename><sum type="sha256">18f506905f0aab3d5d8153314fe3e4a4893a0d6588b0e059db179a5032dfc7b9</sum></package><package arch="x86_64" name="poppler-qt" release="17.el7_4" src="poppler-0.26.5-17.el7_4.src.rpm" version="0.26.5"><filename>poppler-qt-0.26.5-17.el7_4.x86_64.rpm</filename><sum type="sha256">9af9c6fcb523aa61feb5beaac3465d8ec27623304a8f9bc4960e8dd3f9949765</sum></package><package arch="i686" name="poppler-cpp" release="17.el7_4" src="poppler-0.26.5-17.el7_4.src.rpm" version="0.26.5"><filename>poppler-cpp-0.26.5-17.el7_4.i686.rpm</filename><sum type="sha256">26072ce63d621308e20c01a38f384488b9f5198f05faaaf0044fd07039cf9413</sum></package><package arch="i686" name="poppler-qt-devel" release="17.el7_4" src="poppler-0.26.5-17.el7_4.src.rpm" version="0.26.5"><filename>poppler-qt-devel-0.26.5-17.el7_4.i686.rpm</filename><sum type="sha256">115b4022a5907faf37dfbc401ad49eaf650d8566c65cca4e5c24ea207c1d8070</sum></package><package arch="i686" name="poppler-glib" release="17.el7_4" src="poppler-0.26.5-17.el7_4.src.rpm" version="0.26.5"><filename>poppler-glib-0.26.5-17.el7_4.i686.rpm</filename><sum type="sha256">f294f0f9e3cba786c6e3ab5dfaa408003face0ea04a58f21d023c297cb202827</sum></package><package arch="i686" name="poppler-devel" release="17.el7_4" src="poppler-0.26.5-17.el7_4.src.rpm" version="0.26.5"><filename>poppler-devel-0.26.5-17.el7_4.i686.rpm</filename><sum type="sha256">7fc318342317403c8e74c8842260cf7d5ec859cc8694d692345f9f7d411ebe83</sum></package><package arch="i686" name="poppler" release="17.el7_4" src="poppler-0.26.5-17.el7_4.src.rpm" version="0.26.5"><filename>poppler-0.26.5-17.el7_4.i686.rpm</filename><sum type="sha256">675ae693078274b2e1b82715b523f7d760c60f068952244e0694822acfb0ce9a</sum></package><package arch="x86_64" name="poppler-qt-devel" release="17.el7_4" src="poppler-0.26.5-17.el7_4.src.rpm" version="0.26.5"><filename>poppler-qt-devel-0.26.5-17.el7_4.x86_64.rpm</filename><sum type="sha256">1d3a56c3f56f4eb4c9a4fee5b6d80169fc879e8a57660562ff4184496c7d394b</sum></package><package arch="i686" name="poppler-glib-devel" release="17.el7_4" src="poppler-0.26.5-17.el7_4.src.rpm" version="0.26.5"><filename>poppler-glib-devel-0.26.5-17.el7_4.i686.rpm</filename><sum type="sha256">8101d64e27726d376f3cef5d0873c48bb70d2be84bef3a5cea0e7058f6e353be</sum></package><package arch="x86_64" name="poppler-glib-devel" release="17.el7_4" src="poppler-0.26.5-17.el7_4.src.rpm" version="0.26.5"><filename>poppler-glib-devel-0.26.5-17.el7_4.x86_64.rpm</filename><sum type="sha256">a7ca4923b5e2f1ce3359e9098d3344654f4f6119ec1a20c70e7d4f0fe8c26100</sum></package><package arch="x86_64" name="poppler" release="17.el7_4" src="poppler-0.26.5-17.el7_4.src.rpm" version="0.26.5"><filename>poppler-0.26.5-17.el7_4.x86_64.rpm</filename><sum type="sha256">6acc4fa528439ab629826e2c892d2f0262d19363d47c5991f6638935baddb890</sum></package><package arch="x86_64" name="poppler-devel" release="17.el7_4" src="poppler-0.26.5-17.el7_4.src.rpm" version="0.26.5"><filename>poppler-devel-0.26.5-17.el7_4.x86_64.rpm</filename><sum type="sha256">099281c34be832466b8fd096c9311e7f519b982b89651446e6a143c0f09d18a7</sum></package><package arch="i686" name="poppler-cpp-devel" release="17.el7_4" src="poppler-0.26.5-17.el7_4.src.rpm" version="0.26.5"><filename>poppler-cpp-devel-0.26.5-17.el7_4.i686.rpm</filename><sum type="sha256">257a4fb70630d169de76b3c373c2d2c51a17a06f86717c4f528de22446533d42</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9775" id="CVE-2017-9775" title="Poppler: Stack-Buffer Overflow In Gfxstate.Cc" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9776" id="CVE-2017-9776" title="Poppler: Integer Overflow In Jbig2Stream.Cc" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2551" id="RHSA-2017:2551-1" title="Rhsa-2017:2551-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1466442" id="1466442" title="Poppler: Stack-Buffer Overflow In Gfxstate.Cc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1466443" id="1466443" title="Poppler: Integer Overflow In Jbig2Stream.Cc" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2569-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* A flaw was found in the way 389-ds-base handled authentication attempts against locked accounts. A remote attacker could potentially use this flaw to continue password brute-forcing attacks against LDAP accounts, thereby bypassing the protection offered by the directory server's password lockout policy. (CVE-2017-7551) 
Bug Fix(es): 
* In a multi-replication environments, if operations in one back end triggered updates in another back end, the Replica Update Vector (RUV) of the back end was incorrect and replication failed. This fix enables Directory Server to handle Change Sequence Number (CSN) pending lists across multiple back ends. As a result, replication works correctly. 
* Due to a low default entry cache size value, the Directory Server database had to resolve many deadlocks during resource-intensive tasks. In certain situations, this could result in a "DB PANIC" error and the server no longer responded to requests. After the server was restarted, Directory Server started with a delay to recover the database. However, this recovery could fail, and the database could corrupt. This patch increases the default entry cache size in the nsslapd-cachememsize parameter to 200 MB. As a result, out-of-lock situations or "DB PANIC" errors no longer occur in the mentioned scenario. 
* Previously, if replication was enabled and a changelog file existed, performing a backup on this master server failed. This update sets the internal options for correctly copying a file. As a result, creating a backup now succeeds in the mentioned scenario. 
* In certain situations, if the server was previously abruptly shut down, the /etc/dirsrv/&lt;instance_name&gt;/dse.ldif configuration file became corrupted. As a consequence, Directory Server failed to start. With this patch, the server now calls the fsync() function before shutting down to force the file system to write any changes to the disk. As a result, the configuration no longer becomes corrupted, regardless how the server gets stopped.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-09-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-devel" release="19.el7_4" src="389-ds-base-1.3.6.1-19.el7_4.src.rpm" version="1.3.6.1"><filename>389-ds-base-devel-1.3.6.1-19.el7_4.x86_64.rpm</filename><sum type="sha256">ae3f262bcd1968babcc4404bd91570d20ad042e5eca2084dc37b559ea288436b</sum></package><package arch="x86_64" name="389-ds-base-libs" release="19.el7_4" src="389-ds-base-1.3.6.1-19.el7_4.src.rpm" version="1.3.6.1"><filename>389-ds-base-libs-1.3.6.1-19.el7_4.x86_64.rpm</filename><sum type="sha256">e670fd6dc41a35431f551678b6961dad358938efdc68a56dd1e14fe7a2ce46d8</sum></package><package arch="x86_64" name="389-ds-base" release="19.el7_4" src="389-ds-base-1.3.6.1-19.el7_4.src.rpm" version="1.3.6.1"><filename>389-ds-base-1.3.6.1-19.el7_4.x86_64.rpm</filename><sum type="sha256">99b8b56103bda1e2a2a5300a7220191a95218ac4968f9e9a9345200a48772104</sum></package><package arch="x86_64" name="389-ds-base-snmp" release="19.el7_4" src="389-ds-base-1.3.6.1-19.el7_4.src.rpm" version="1.3.6.1"><filename>389-ds-base-snmp-1.3.6.1-19.el7_4.x86_64.rpm</filename><sum type="sha256">4d668568cef23e5a68b5b18251c50bab895bd351f925975f65d2341e1071bbfa</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7551" id="CVE-2017-7551" title="389-Ds-Base: Password Brute-Force Possible For " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2569" id="RHSA-2017:2569-1" title="Rhsa-2017:2569-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1476161" id="1476161" title="1.3.5.10-20 Replication Halt - Pending List First Csn Not " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1476162" id="1476162" title="Change The Retrochangelog Default Cache Size. And Also If " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1477669" id="1477669" title="389-Ds-Base: Password Brute-Force Possible For " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1483865" id="1483865" title="Crash While Binding To A Server During Replication Online Init " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2679-1</id><title>Kernel</title><description>Security Fix(es): 
* A stack buffer overflow flaw was found in the way the Bluetooth subsystem of the Linux kernel processed pending L2CAP configuration responses from a client. On systems with the stack protection feature enabled in the kernel (CONFIG_CC_STACKPROTECTOR=y, which is enabled on all architectures other than s390x and ppc64[le]), an unauthenticated attacker able to initiate a connection to a system via Bluetooth could use this flaw to crash the system. Due to the nature of the stack protection feature, code execution cannot be fully ruled out, although we believe it is unlikely. On systems without the stack protection feature (ppc64[le]; the Bluetooth modules are not built on s390x), an unauthenticated attacker able to initiate a connection to a system via Bluetooth could use this flaw to remotely execute arbitrary code on the system with ring 0 (kernel) privileges. (CVE-2017-1000251, Important)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-09-12 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="perf" release="693.2.2.el7" src="kernel-3.10.0-693.2.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-693.2.2.el7.x86_64.rpm</filename><sum type="sha256">b1fbf613ea37a908e5ce2adcf0d4f754b621041d792ce6c3290064610d037e48</sum></package><package arch="x86_64" name="kernel-tools-libs" release="693.2.2.el7" src="kernel-3.10.0-693.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-693.2.2.el7.x86_64.rpm</filename><sum type="sha256">af96232ed1a21f615617700d206ed82e1ee3fc48f07e2f888edcf3f64659a3bc</sum></package><package arch="noarch" name="kernel-doc" release="693.2.2.el7" src="kernel-3.10.0-693.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-693.2.2.el7.noarch.rpm</filename><sum type="sha256">f5eb103f46945bc3be6f76900bdbfadf125fbe86702f69963b849f10fe52ea56</sum></package><package arch="x86_64" name="kernel-headers" release="693.2.2.el7" src="kernel-3.10.0-693.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-693.2.2.el7.x86_64.rpm</filename><sum type="sha256">dbc2fbb75ae116cc433a64065709ea6435e624c710cefb48b33a968d688ec3f5</sum></package><package arch="x86_64" name="python-perf" release="693.2.2.el7" src="kernel-3.10.0-693.2.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-693.2.2.el7.x86_64.rpm</filename><sum type="sha256">efa8a34c7dee9a838429181b7b4788a96701c2b8168ff38c1a123fde2898a771</sum></package><package arch="x86_64" name="kernel-devel" release="693.2.2.el7" src="kernel-3.10.0-693.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-693.2.2.el7.x86_64.rpm</filename><sum type="sha256">e8db58d1275fb589dd0a0c548533443dde5c3518f56d14184d026ddc6ea22d01</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="693.2.2.el7" src="kernel-3.10.0-693.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-693.2.2.el7.noarch.rpm</filename><sum type="sha256">bc800f722516c4da619f3d4af34ee6ec1e8880e4f08f23a5f6811e397f9b39a9</sum></package><package arch="x86_64" name="kernel" release="693.2.2.el7" src="kernel-3.10.0-693.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-693.2.2.el7.x86_64.rpm</filename><sum type="sha256">803465a980f7591df9b35c62d897e187c268f340d4667019c1252972bbc3aa2f</sum></package><package arch="x86_64" name="kernel-tools" release="693.2.2.el7" src="kernel-3.10.0-693.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-693.2.2.el7.x86_64.rpm</filename><sum type="sha256">4e98853761ed153e7a09cd7336aade712fac5f82f5feacace0b001bc9ef4a270</sum></package><package arch="x86_64" name="kernel-debug-devel" release="693.2.2.el7" src="kernel-3.10.0-693.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-693.2.2.el7.x86_64.rpm</filename><sum type="sha256">64fe0b6011b789be474ca72edd48f4fd82b839c76f877ff08d07fb38afbebe1e</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="693.2.2.el7" src="kernel-3.10.0-693.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-693.2.2.el7.x86_64.rpm</filename><sum type="sha256">8312431c5f3c9a838f62c4acf1045ed6665068a4159bbebd55d3bebc19ced883</sum></package><package arch="x86_64" name="kernel-debug" release="693.2.2.el7" src="kernel-3.10.0-693.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-693.2.2.el7.x86_64.rpm</filename><sum type="sha256">c975e6996edb646e9b7cf6b0270dddc8e4956f0716e02fc49bfb88d4c43aa96e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000251" id="CVE-2017-1000251" title="Kernel: Stack Buffer Overflow In The Native " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2679" id="RHSA-2017:2679-1" title="Rhsa-2017:2679-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1489716" id="1489716" title="Kernel: Stack Buffer Overflow In The Native " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2685-1</id><title>Bluez</title><description>Security Fix(es): 
* An information-disclosure flaw was found in the bluetoothd implementation of the Service Discovery Protocol (SDP). A specially crafted Bluetooth device could, without prior pairing or user interaction, retrieve portions of the bluetoothd process memory, including potentially sensitive information such as Bluetooth encryption keys. (CVE-2017-1000250)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-09-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="bluez-libs-devel" release="4.el7_4" src="bluez-5.44-4.el7_4.src.rpm" version="5.44"><filename>bluez-libs-devel-5.44-4.el7_4.i686.rpm</filename><sum type="sha256">8d25da879c5043007a19e57b0bbe7c7af42717de1430df5f72444dbfdb359cd1</sum></package><package arch="x86_64" name="bluez-libs-devel" release="4.el7_4" src="bluez-5.44-4.el7_4.src.rpm" version="5.44"><filename>bluez-libs-devel-5.44-4.el7_4.x86_64.rpm</filename><sum type="sha256">fa32f8190b5eda6055a2444d0e7dff12cfc7fd5b5610cf564ff5c129bb6a0845</sum></package><package arch="x86_64" name="bluez-libs" release="4.el7_4" src="bluez-5.44-4.el7_4.src.rpm" version="5.44"><filename>bluez-libs-5.44-4.el7_4.x86_64.rpm</filename><sum type="sha256">785ff177294ac3c0d361d4357c7e1688d406075f32ce9332147d215f28531341</sum></package><package arch="x86_64" name="bluez-hid2hci" release="4.el7_4" src="bluez-5.44-4.el7_4.src.rpm" version="5.44"><filename>bluez-hid2hci-5.44-4.el7_4.x86_64.rpm</filename><sum type="sha256">6c13612f7432fb3223c212bedb575a24c74265f4aecfc9ba50149dc058dc6707</sum></package><package arch="x86_64" name="bluez-cups" release="4.el7_4" src="bluez-5.44-4.el7_4.src.rpm" version="5.44"><filename>bluez-cups-5.44-4.el7_4.x86_64.rpm</filename><sum type="sha256">e5cb60ca16d79aa8aee1279e9bbc442e6700448ccd5cb0f82dfd183abc947a24</sum></package><package arch="i686" name="bluez-libs" release="4.el7_4" src="bluez-5.44-4.el7_4.src.rpm" version="5.44"><filename>bluez-libs-5.44-4.el7_4.i686.rpm</filename><sum type="sha256">88d676e65fa41b8b56be4bbbf58fb6e5142a337b14b846f2f44ce90d9bac7125</sum></package><package arch="x86_64" name="bluez" release="4.el7_4" src="bluez-5.44-4.el7_4.src.rpm" version="5.44"><filename>bluez-5.44-4.el7_4.x86_64.rpm</filename><sum type="sha256">5da195c02ff25c8a3eec8f2fa4aa58664e89cd4b1f1d4f16802c194dbf2e2e46</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000250" id="CVE-2017-1000250" title="Cve-2017-1000250" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2685" id="RHSA-2017:2685-1" title="Rhsa-2017:2685-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1489446" id="1489446" title="Bluez: Out-Of-Bounds Heap Read In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2728-1</id><title>Postgresql</title><description>The following packages have been upgraded to a later upstream version: postgresql (9.2.23). 
Security Fix(es): 
* It was found that authenticating to a PostgreSQL database account with an empty password was possible despite libpq's refusal to send an empty password. A remote attacker could potentially use this flaw to gain access to database accounts with empty passwords. (CVE-2017-7546) 
* An authorization flaw was found in the way PostgreSQL handled access to the pg_user_mappings view on foreign servers. A remote, authenticated attacker could potentially use this flaw to retrieve passwords from the user mappings defined by the foreign server owners without actually having the privileges to do so. (CVE-2017-7547)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-09-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="postgresql-static" release="1.el7_4" src="postgresql-9.2.23-1.el7_4.src.rpm" version="9.2.23"><filename>postgresql-static-9.2.23-1.el7_4.x86_64.rpm</filename><sum type="sha256">1187bb272f803622b3fde61ed6de7b270b4cb3d39dc5c6e784b0198d4073fc98</sum></package><package arch="x86_64" name="postgresql-docs" release="1.el7_4" src="postgresql-9.2.23-1.el7_4.src.rpm" version="9.2.23"><filename>postgresql-docs-9.2.23-1.el7_4.x86_64.rpm</filename><sum type="sha256">cb45dee320b32a240029c1e71ef4109d99dbd05f0a7d23fd8553a58f7b196418</sum></package><package arch="x86_64" name="postgresql-devel" release="1.el7_4" src="postgresql-9.2.23-1.el7_4.src.rpm" version="9.2.23"><filename>postgresql-devel-9.2.23-1.el7_4.x86_64.rpm</filename><sum type="sha256">a23d5271eea7736f982fff3a34c07a6932620ac45af3b6e9d8008a2ac2180518</sum></package><package arch="x86_64" name="postgresql" release="1.el7_4" src="postgresql-9.2.23-1.el7_4.src.rpm" version="9.2.23"><filename>postgresql-9.2.23-1.el7_4.x86_64.rpm</filename><sum type="sha256">47692bbf7d22a7ac14884abf32d8eeae085fab4908e6939700853e5cc408dca7</sum></package><package arch="x86_64" name="postgresql-plperl" release="1.el7_4" src="postgresql-9.2.23-1.el7_4.src.rpm" version="9.2.23"><filename>postgresql-plperl-9.2.23-1.el7_4.x86_64.rpm</filename><sum type="sha256">092031ed252d041e921a88850dae1288c3ac46033d8fb99664fd5248b4f199c1</sum></package><package arch="x86_64" name="postgresql-libs" release="1.el7_4" src="postgresql-9.2.23-1.el7_4.src.rpm" version="9.2.23"><filename>postgresql-libs-9.2.23-1.el7_4.x86_64.rpm</filename><sum type="sha256">cb91fa6109f2711ec052ffd23c57fe88af5adfb8833eedbfce8215266cc8f6d7</sum></package><package arch="i686" name="postgresql-static" release="1.el7_4" src="postgresql-9.2.23-1.el7_4.src.rpm" version="9.2.23"><filename>postgresql-static-9.2.23-1.el7_4.i686.rpm</filename><sum type="sha256">ba24bf1bd003cd406e0727e984657cbc8555c431cda63fbe371b535db08e2a77</sum></package><package arch="x86_64" name="postgresql-plpython" release="1.el7_4" src="postgresql-9.2.23-1.el7_4.src.rpm" version="9.2.23"><filename>postgresql-plpython-9.2.23-1.el7_4.x86_64.rpm</filename><sum type="sha256">c00b95c7c4850c27fedd87a0e58cfc2621d76569fd029c3a91d4f56cac2c389c</sum></package><package arch="x86_64" name="postgresql-test" release="1.el7_4" src="postgresql-9.2.23-1.el7_4.src.rpm" version="9.2.23"><filename>postgresql-test-9.2.23-1.el7_4.x86_64.rpm</filename><sum type="sha256">b8832416fd197c478aeedbf8657ea87fb1b4404e001c508b8a42559b3c0c6307</sum></package><package arch="x86_64" name="postgresql-server" release="1.el7_4" src="postgresql-9.2.23-1.el7_4.src.rpm" version="9.2.23"><filename>postgresql-server-9.2.23-1.el7_4.x86_64.rpm</filename><sum type="sha256">071be9dccb30036f90bd85999c66d6a34d31aefecce38133da8ee43ba2007f84</sum></package><package arch="i686" name="postgresql" release="1.el7_4" src="postgresql-9.2.23-1.el7_4.src.rpm" version="9.2.23"><filename>postgresql-9.2.23-1.el7_4.i686.rpm</filename><sum type="sha256">ff9eafc9a5df367f9134ed82c309b120f94bef52f355559c10dbeaa5f01d1c24</sum></package><package arch="x86_64" name="postgresql-pltcl" release="1.el7_4" src="postgresql-9.2.23-1.el7_4.src.rpm" version="9.2.23"><filename>postgresql-pltcl-9.2.23-1.el7_4.x86_64.rpm</filename><sum type="sha256">0487cb9091a7f51231f8063828fff3b67afdd137e183df5fe0bc8c0452822524</sum></package><package arch="i686" name="postgresql-libs" release="1.el7_4" src="postgresql-9.2.23-1.el7_4.src.rpm" version="9.2.23"><filename>postgresql-libs-9.2.23-1.el7_4.i686.rpm</filename><sum type="sha256">e32468ee803afefbcddde8f22cf65c58f1a8dcffbc889bd1463da2219ba1f1a8</sum></package><package arch="x86_64" name="postgresql-upgrade" release="1.el7_4" src="postgresql-9.2.23-1.el7_4.src.rpm" version="9.2.23"><filename>postgresql-upgrade-9.2.23-1.el7_4.x86_64.rpm</filename><sum type="sha256">973b6e86f82a07d1fbd790d28c0a8b6e50e515c2d2d759e0276b45454228e7d6</sum></package><package arch="x86_64" name="postgresql-contrib" release="1.el7_4" src="postgresql-9.2.23-1.el7_4.src.rpm" version="9.2.23"><filename>postgresql-contrib-9.2.23-1.el7_4.x86_64.rpm</filename><sum type="sha256">2b76ea05dadc9c367b7daf2854a568dc1986443ac82407e83b3b2718c6f66a65</sum></package><package arch="i686" name="postgresql-devel" release="1.el7_4" src="postgresql-9.2.23-1.el7_4.src.rpm" version="9.2.23"><filename>postgresql-devel-9.2.23-1.el7_4.i686.rpm</filename><sum type="sha256">b2a68dc1182f4e3072f3680975dce52eed5abf3c80e44275768074d6f22af206</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7546" id="CVE-2017-7546" title="Postgresql: Empty Password Accepted In Some " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7547" id="CVE-2017-7547" title="Postgresql: Pg_User_Mappings View Discloses " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2728" id="RHSA-2017:2728-1" title="Rhsa-2017:2728-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1477184" id="1477184" title="Postgresql: Empty Password Accepted In Some " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1477185" id="1477185" title="Postgresql: Pg_User_Mappings View Discloses " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2771-1</id><title>Emacs</title><description>Security Fix(es): 
* A command injection flaw within the Emacs "enriched mode" handling has been discovered. By tricking an unsuspecting user into opening a specially crafted file using Emacs, a remote attacker could exploit this flaw to execute arbitrary commands with the privileges of the Emacs user. (CVE-2017-14482)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-09-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="emacs-filesystem" release="20.el7_4" src="emacs-24.3-20.el7_4.src.rpm" version="24.3"><filename>emacs-filesystem-24.3-20.el7_4.noarch.rpm</filename><sum type="sha256">5bb960aef018b74834be5d1fbe65050f4a01dd4a852ee8b3583f508ef577c037</sum></package><package arch="noarch" epoch="1" name="emacs-el" release="20.el7_4" src="emacs-24.3-20.el7_4.src.rpm" version="24.3"><filename>emacs-el-24.3-20.el7_4.noarch.rpm</filename><sum type="sha256">48f173fcabd33182261ad328f340cef09aa10a8bac60de6c5850462786a56cba</sum></package><package arch="x86_64" epoch="1" name="emacs" release="20.el7_4" src="emacs-24.3-20.el7_4.src.rpm" version="24.3"><filename>emacs-24.3-20.el7_4.x86_64.rpm</filename><sum type="sha256">1c523c2e6ae5ddf774152d4e878c3b5471c15bad9b47e87d9b55fa3ddad51a38</sum></package><package arch="x86_64" epoch="1" name="emacs-common" release="20.el7_4" src="emacs-24.3-20.el7_4.src.rpm" version="24.3"><filename>emacs-common-24.3-20.el7_4.x86_64.rpm</filename><sum type="sha256">e4c6990b55653a83a9cd90a69cb99b0dd5473a7f7ccf4e86496ec9e9918d6519</sum></package><package arch="noarch" epoch="1" name="emacs-terminal" release="20.el7_4" src="emacs-24.3-20.el7_4.src.rpm" version="24.3"><filename>emacs-terminal-24.3-20.el7_4.noarch.rpm</filename><sum type="sha256">9ccdf72f85936b6d9a18c842169be5439d3766e4cd01a436f36137d3ec7180b8</sum></package><package arch="x86_64" epoch="1" name="emacs-nox" release="20.el7_4" src="emacs-24.3-20.el7_4.src.rpm" version="24.3"><filename>emacs-nox-24.3-20.el7_4.x86_64.rpm</filename><sum type="sha256">451d5e2208a75fde2ba00a1cde33b9bcf51da79282062ec2baea754601c10651</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14482" id="CVE-2017-14482" title="Emacs: Unsafe Enriched Mode Translations" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2771" id="RHSA-2017:2771-1" title="Rhsa-2017:2771-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1490409" id="1490409" title="Emacs: Unsafe Enriched Mode Translations" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2788-1</id><title>Augeas</title><description>Security Fix(es): 
* A vulnerability was discovered in augeas affecting the handling of escaped strings. An attacker could send crafted strings that would cause the application using augeas to copy past the end of a buffer, leading to a crash or possible code execution. (CVE-2017-7555)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-09-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="augeas" release="2.el7_4.1" src="augeas-1.4.0-2.el7_4.1.src.rpm" version="1.4.0"><filename>augeas-1.4.0-2.el7_4.1.x86_64.rpm</filename><sum type="sha256">ed737575e5966b2bef90ef850f35ba4672d7ff1dda43a02b30b6483085a9c84d</sum></package><package arch="i686" name="augeas-libs" release="2.el7_4.1" src="augeas-1.4.0-2.el7_4.1.src.rpm" version="1.4.0"><filename>augeas-libs-1.4.0-2.el7_4.1.i686.rpm</filename><sum type="sha256">60af15a0db3c5f24840072a84fe12b1eb9d66d04c3b8943f97e00973c5511703</sum></package><package arch="i686" name="augeas-devel" release="2.el7_4.1" src="augeas-1.4.0-2.el7_4.1.src.rpm" version="1.4.0"><filename>augeas-devel-1.4.0-2.el7_4.1.i686.rpm</filename><sum type="sha256">188a130333146bc55225a5356beba0c288b056f4609774375eee60d5b4ce3e97</sum></package><package arch="x86_64" name="augeas-libs" release="2.el7_4.1" src="augeas-1.4.0-2.el7_4.1.src.rpm" version="1.4.0"><filename>augeas-libs-1.4.0-2.el7_4.1.x86_64.rpm</filename><sum type="sha256">fbcf455458c6ae86cfde1774056900c095adba67a87b658d35aea1581a35290d</sum></package><package arch="x86_64" name="augeas-devel" release="2.el7_4.1" src="augeas-1.4.0-2.el7_4.1.src.rpm" version="1.4.0"><filename>augeas-devel-1.4.0-2.el7_4.1.x86_64.rpm</filename><sum type="sha256">da4336b6d182850c18552e91f96361a1fabd15dfd42e0c2bafe62c0e6e2ec21c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7555" id="CVE-2017-7555" title="Augeas: Improper Handling Of Escaped Strings " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2788" id="RHSA-2017:2788-1" title="Rhsa-2017:2788-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1478373" id="1478373" title="Augeas: Improper Handling Of Escaped Strings " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2790-1</id><title>Samba</title><description>Security Fix(es): 
* It was found that samba did not enforce "SMB signing" when certain configuration options were enabled. A remote attacker could launch a man- in-the-middle attack and retrieve information in plain-text. (CVE-2017-12150) 
* A flaw was found in the way samba client used encryption with the max protocol set as SMB3. The connection could lose the requirement for signing and encrypting to any DFS redirects, allowing an attacker to read or alter the contents of the connection via a man-in-the-middle attack. (CVE-2017-12151) 
* An information leak flaw was found in the way SMB1 protocol was implemented by Samba. A malicious client could use this flaw to dump server memory contents to a file on the samba share or to a shared printer, though the exact area of server memory cannot be controlled by the attacker. (CVE-2017-12163)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-09-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="samba-winbind-modules" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-winbind-modules-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">6182b6ca67f67ec6248f53af604b7f199e101eac9dda43fac3e83c3eabc077d6</sum></package><package arch="x86_64" name="samba-dc-libs" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-dc-libs-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">eca165f7f00d6350da2fa12035b40d5f93c9ae497a915a45107d19417ed98913</sum></package><package arch="noarch" name="samba-common" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-common-4.6.2-11.el7_4.noarch.rpm</filename><sum type="sha256">907f5b69e7cd0225fd5556a8f8c5e8033c6b6f628321cf3c62c2818b7cdbeed8</sum></package><package arch="x86_64" name="ctdb" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>ctdb-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">06aee796f221fee3c03ed5be52074e31aef85c279b636cd5e4b762563c80e0d6</sum></package><package arch="i686" name="libsmbclient-devel" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>libsmbclient-devel-4.6.2-11.el7_4.i686.rpm</filename><sum type="sha256">abb7444369c15fa53c1798c91bdf4b55b63676eb78a4ead5dcb1092a22351a00</sum></package><package arch="x86_64" name="samba-common-tools" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-common-tools-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">e909a2a99084517012438171a96a8c90914d9e44148f9f04be172c7eb241fd34</sum></package><package arch="x86_64" name="samba-dc" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-dc-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">1a7f9f632455de3c51c3e7d56664a180a42750bbf64eaf3b84a82ae3474f8716</sum></package><package arch="i686" name="libwbclient" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>libwbclient-4.6.2-11.el7_4.i686.rpm</filename><sum type="sha256">a7ba885083e73efe4d22e74e7648f152a23fd911373c9ff054c3900e80abbe27</sum></package><package arch="x86_64" name="libsmbclient" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>libsmbclient-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">665109683b0258b7ac466cf0d0dd2156bebcc123e8d14d9b5fab60caf56f00fd</sum></package><package arch="x86_64" name="libwbclient-devel" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>libwbclient-devel-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">aea3317fe09b0d2373d54b5607a7e1bad0ed95d8f5d6f97853f5082f592dc5e8</sum></package><package arch="x86_64" name="samba-python" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-python-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">0006d20429d4c4cbb4db740537712aeaa4eddaa34559729960a65bfd8bb3f044</sum></package><package arch="x86_64" name="libsmbclient-devel" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>libsmbclient-devel-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">8ac9796459fe9029fb0b3afbb0de76aeef141027807047436042f17d2a2187d7</sum></package><package arch="x86_64" name="samba-client" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-client-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">7896d151cce512e0965cbfeabba8e7b92f6499adbde2fc61209f243dac90bc10</sum></package><package arch="x86_64" name="libwbclient" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>libwbclient-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">cf59808e784aca181947cd4ed7c46a925be59d4d65a641aaff46ac31ad792134</sum></package><package arch="i686" name="libwbclient-devel" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>libwbclient-devel-4.6.2-11.el7_4.i686.rpm</filename><sum type="sha256">fb67336c53f6ccab117f3509e427dfafde3dd3720d8725e6649de7dfed9bcf6f</sum></package><package arch="noarch" name="samba-pidl" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-pidl-4.6.2-11.el7_4.noarch.rpm</filename><sum type="sha256">3627a1860a01556f55605bd963de2c8efaab60ab630396aabb1a0850dda80bbf</sum></package><package arch="x86_64" name="samba-winbind" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-winbind-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">ee112583550ff72a8a15aa45a4b716e44ef64a3218c0dfcfc5304cc600c1a475</sum></package><package arch="i686" name="samba-test-libs" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-test-libs-4.6.2-11.el7_4.i686.rpm</filename><sum type="sha256">28a6d637a6ca02cc94729ad3cb63c5af50c6533b346236f6b562fa21124465c2</sum></package><package arch="i686" name="libsmbclient" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>libsmbclient-4.6.2-11.el7_4.i686.rpm</filename><sum type="sha256">e7e8b93966a66d7dda558ff3d76730049f76228153a372a10c7ea386c8ede3fa</sum></package><package arch="x86_64" name="ctdb-tests" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>ctdb-tests-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">c372c0c4732e86503f168b32e9579f9cd618ab142fe99376099ba62db0fff688</sum></package><package arch="x86_64" name="samba-libs" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-libs-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">283e24a62e53e6e00053d82197cd87560b75133d9ad57ab4232f82ac825ee056</sum></package><package arch="x86_64" name="samba-test-libs" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-test-libs-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">e3247729b156a839f3ef20d5fd566d20c403141a59d58edded5977ca60b09d9b</sum></package><package arch="i686" name="samba-winbind-modules" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-winbind-modules-4.6.2-11.el7_4.i686.rpm</filename><sum type="sha256">c161b75506fed89d604b9275eb255aedeb435a43a39fca05142168af4e1419bf</sum></package><package arch="x86_64" name="samba-client-libs" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-client-libs-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">43f9dfd75895d32dc068dffd4292877da5fb58ee63cc541dec1c0e6d3e2bc165</sum></package><package arch="i686" name="samba-client-libs" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-client-libs-4.6.2-11.el7_4.i686.rpm</filename><sum type="sha256">b5d3524fcea8587c0500c95e690f64127eccbebf6130a7ea1d1d45587276a4cd</sum></package><package arch="x86_64" name="samba-devel" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-devel-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">5e4661f476e2059ca074a2fa400684f811676d0ff0f9b44ebbe31437daf92be2</sum></package><package arch="x86_64" name="samba" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">c1f061c6404771572cfaf69dfd1575a71434c659168510f2e9ddb8569124eae2</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-vfs-glusterfs-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">8177bc25deebba13791accf52ec71039225bca77700edf6efad7b26c21d27cc6</sum></package><package arch="x86_64" name="samba-winbind-clients" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-winbind-clients-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">96e67b4a669d8a8758299346ef77490b248368a3f9af025c7ec9fbcd9de16d56</sum></package><package arch="i686" name="samba-libs" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-libs-4.6.2-11.el7_4.i686.rpm</filename><sum type="sha256">1542db53c8b1b19d5f68aabcfa9179091b9448c088e1820f3317b8786c6c2fb2</sum></package><package arch="x86_64" name="samba-krb5-printing" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-krb5-printing-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">d256e0a196d4f15403e6c2c4632fc283f89d3106f79ec32e30d266e934f2c9bd</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-winbind-krb5-locator-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">925f8a3be9715c54e8ed75c32663d0ab0af40f7c7644d88e807496ba603dc4b6</sum></package><package arch="x86_64" name="samba-common-libs" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-common-libs-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">e61017c278dea165f55512a88882a896013feebc877767c774e623dba95636ef</sum></package><package arch="i686" name="samba-devel" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-devel-4.6.2-11.el7_4.i686.rpm</filename><sum type="sha256">6be809e0a6ab2aa301ddbd2100dabb8adf77cd57643fd28b8d27f930e148a9bc</sum></package><package arch="x86_64" name="samba-test" release="11.el7_4" src="samba-4.6.2-11.el7_4.src.rpm" version="4.6.2"><filename>samba-test-4.6.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">cde89aa6b9d05549a6c1d730ded8f65146af69cb68443ba9dcd732509126bf97</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12150" id="CVE-2017-12150" title="Samba: Some Code Path Don'T Enforce Smb " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12151" id="CVE-2017-12151" title="Samba: Smb2 Connections Don'T Keep Encryption " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12163" id="CVE-2017-12163" title="Samba: Server Memory Information Leak Over Smb1" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2790" id="RHSA-2017:2790-1" title="Rhsa-2017:2790-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1488197" id="1488197" title="Samba: Smb2 Connections Don'T Keep Encryption " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1488400" id="1488400" title="Samba: Some Code Path Don'T Enforce Smb " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1491206" id="1491206" title="Samba: Server Memory Information Leak Over Smb1" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2831-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.4.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-7810, CVE-2017-7793, CVE-2017-7818, CVE-2017-7819, CVE-2017-7824, CVE-2017-7814, CVE-2017-7823)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2017-09-29 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_4" src="firefox-52.4.0-1.el7_4.src.rpm" version="52.4.0"><filename>firefox-52.4.0-1.el7_4.i686.rpm</filename><sum type="sha256">5f04fafbc871674178d2363553950f466dcf49f8d8ab85b3e5b650ea9df85ccb</sum></package><package arch="x86_64" name="firefox" release="1.el7_4" src="firefox-52.4.0-1.el7_4.src.rpm" version="52.4.0"><filename>firefox-52.4.0-1.el7_4.x86_64.rpm</filename><sum type="sha256">4e71cb240ec5278c7118b16826fb5fa8b099c8fe8423862506195debe1d918e1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793" id="CVE-2017-7793" title="Mozilla: Use-After-Free With Fetch Api (Mfsa " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810" id="CVE-2017-7810" title="Mozilla: Memory Safety Bugs Fixed In Firefox 56 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814" id="CVE-2017-7814" title="Mozilla: Blob And Data Urls Bypass Phishing And " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818" id="CVE-2017-7818" title="Mozilla: Use-After-Free During Aria Array " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819" id="CVE-2017-7819" title="Mozilla: Use-After-Free While Resizing Images In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823" id="CVE-2017-7823" title="Mozilla: Csp Sandbox Directive Did Not Create A " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824" id="CVE-2017-7824" title="Mozilla: Buffer Overflow When Drawing And " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2831" id="RHSA-2017:2831-1" title="Rhsa-2017:2831-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496649" id="1496649" title="Mozilla: Use-After-Free With Fetch Api (Mfsa " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496651" id="1496651" title="Mozilla: Memory Safety Bugs Fixed In Firefox 56 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496652" id="1496652" title="Mozilla: Blob And Data Urls Bypass Phishing And " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496653" id="1496653" title="Mozilla: Use-After-Free During Aria Array " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496654" id="1496654" title="Mozilla: Use-After-Free While Resizing Images In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496655" id="1496655" title="Mozilla: Csp Sandbox Directive Did Not Create A " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496656" id="1496656" title="Mozilla: Buffer Overflow When Drawing And " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2832-1</id><title>Nss</title><description>Security Fix(es): 
* A use-after-free flaw was found in the TLS 1.2 implementation in the NSS library when client authentication was used. A malicious client could use this flaw to cause an application compiled against NSS to crash or, potentially, execute arbitrary code with the permission of the user running the application. (CVE-2017-7805)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-09-29 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-sysinit" release="12.el7_4" src="nss-3.28.4-12.el7_4.src.rpm" version="3.28.4"><filename>nss-sysinit-3.28.4-12.el7_4.x86_64.rpm</filename><sum type="sha256">0a3c9fb8eb2f84936b325647a20e674ce71520f74709702b8c73c891309a7522</sum></package><package arch="x86_64" name="nss-tools" release="12.el7_4" src="nss-3.28.4-12.el7_4.src.rpm" version="3.28.4"><filename>nss-tools-3.28.4-12.el7_4.x86_64.rpm</filename><sum type="sha256">f21d403175d56dc21faa121439c39205e7c949d429e8f3b70f502c6dd0abdf11</sum></package><package arch="x86_64" name="nss" release="12.el7_4" src="nss-3.28.4-12.el7_4.src.rpm" version="3.28.4"><filename>nss-3.28.4-12.el7_4.x86_64.rpm</filename><sum type="sha256">92b5a261a241627fb480fed92488a980afe791778c1e673740bbe048a99d961c</sum></package><package arch="i686" name="nss-devel" release="12.el7_4" src="nss-3.28.4-12.el7_4.src.rpm" version="3.28.4"><filename>nss-devel-3.28.4-12.el7_4.i686.rpm</filename><sum type="sha256">bcdfc1a5ef2b2225a84c9ab2b05eb036637f3ee13ba03525fd2e39ec7d1ef994</sum></package><package arch="x86_64" name="nss-devel" release="12.el7_4" src="nss-3.28.4-12.el7_4.src.rpm" version="3.28.4"><filename>nss-devel-3.28.4-12.el7_4.x86_64.rpm</filename><sum type="sha256">7abf7603e42098f9eed425b65e8b7173304313bec073a1e11bfa84c9741db6a7</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="12.el7_4" src="nss-3.28.4-12.el7_4.src.rpm" version="3.28.4"><filename>nss-pkcs11-devel-3.28.4-12.el7_4.x86_64.rpm</filename><sum type="sha256">ce6e1e8cc3d537e14c753e2e01161baec0926fc61ea95a597bedeae78d276d57</sum></package><package arch="i686" name="nss-pkcs11-devel" release="12.el7_4" src="nss-3.28.4-12.el7_4.src.rpm" version="3.28.4"><filename>nss-pkcs11-devel-3.28.4-12.el7_4.i686.rpm</filename><sum type="sha256">d85ca17614a0cad0e80f18a58698a6e03cc23b26ad6e40ee7b999720625daade</sum></package><package arch="i686" name="nss" release="12.el7_4" src="nss-3.28.4-12.el7_4.src.rpm" version="3.28.4"><filename>nss-3.28.4-12.el7_4.i686.rpm</filename><sum type="sha256">7cf042d2d9e6045e799c59984163bbc4fad032ff0551dba43cca995dd3bccad1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7805" id="CVE-2017-7805" title="Nss: Potential Use-After-Free In Tls 1.2 Server " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2832" id="RHSA-2017:2832-1" title="Rhsa-2017:2832-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471171" id="1471171" title="Nss: Potential Use-After-Free In Tls 1.2 Server " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2836-1</id><title>Dnsmasq</title><description>Security Fix(es): 
* A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. (CVE-2017-14491) 
* A heap buffer overflow was discovered in dnsmasq in the IPv6 router advertisement (RA) handling code. An attacker on the local network segment could send crafted RAs to dnsmasq which would cause it to crash or, potentially, execute arbitrary code. This issue only affected configurations using one of these options: enable-ra, ra-only, slaac, ra- names, ra-advrouter, or ra-stateless. (CVE-2017-14492) 
* A stack buffer overflow was found in dnsmasq in the DHCPv6 code. An attacker on the local network could send a crafted DHCPv6 request to dnsmasq which would cause it to a crash or, potentially, execute arbitrary code. (CVE-2017-14493) 
* An information leak was found in dnsmasq in the DHCPv6 relay code. An attacker on the local network could send crafted DHCPv6 packets to dnsmasq causing it to forward the contents of process memory, potentially leaking sensitive data. (CVE-2017-14494) 
* A memory exhaustion flaw was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets which would trigger memory allocations which would never be freed, leading to unbounded memory consumption and eventually a crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add- subnet. (CVE-2017-14495) 
* An integer underflow flaw leading to a buffer over-read was found in dnsmasq in the EDNS0 code. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash. This issue only affected configurations using one of the options: add-mac, add-cpe-id, or add- subnet. (CVE-2017-14496)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2017-10-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="dnsmasq" release="2.el7_4.2" src="dnsmasq-2.76-2.el7_4.2.src.rpm" version="2.76"><filename>dnsmasq-2.76-2.el7_4.2.x86_64.rpm</filename><sum type="sha256">b29837333e205419f16b24d42fccd994805ee505245a26c90b24170ad9657617</sum></package><package arch="x86_64" name="dnsmasq-utils" release="2.el7_4.2" src="dnsmasq-2.76-2.el7_4.2.src.rpm" version="2.76"><filename>dnsmasq-utils-2.76-2.el7_4.2.x86_64.rpm</filename><sum type="sha256">dd586affaba471bec6aa5fe89464bd699bbb533939c1c77d1d44c26b1fab8f39</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14491" id="CVE-2017-14491" title="Dnsmasq: Heap Overflow In The Code Responsible " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14492" id="CVE-2017-14492" title="Dnsmasq: Heap Overflow In The Ipv6 Router " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14493" id="CVE-2017-14493" title="Dnsmasq: Stack Buffer Overflow In The Dhcpv6 Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14494" id="CVE-2017-14494" title="Dnsmasq: Information Leak In The Dhcpv6 Relay Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14495" id="CVE-2017-14495" title="Dnsmasq: Memory Exhaustion Vulnerability In The " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14496" id="CVE-2017-14496" title="Dnsmasq: Integer Underflow Leading To Buffer " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2836" id="RHSA-2017:2836-1" title="Rhsa-2017:2836-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1495409" id="1495409" title="Dnsmasq: Heap Overflow In The Code Responsible " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1495410" id="1495410" title="Dnsmasq: Heap Overflow In The Ipv6 Router " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1495411" id="1495411" title="Dnsmasq: Stack Buffer Overflow In The Dhcpv6 Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1495412" id="1495412" title="Dnsmasq: Information Leak In The Dhcpv6 Relay Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1495415" id="1495415" title="Dnsmasq: Memory Exhaustion Vulnerability In The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1495416" id="1495416" title="Dnsmasq: Integer Underflow Leading To Buffer " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2882-1</id><title>Httpd</title><description>Security Fix(es): 
* A use-after-free flaw was found in the way httpd handled invalid and previously unregistered HTTP methods specified in the Limit directive used in an .htaccess file. A remote attacker could possibly use this flaw to disclose portions of the server memory, or cause httpd child process to crash. (CVE-2017-9798)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-10-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="mod_ssl" release="67.sl7.5" src="httpd-2.4.6-67.sl7.5.src.rpm" version="2.4.6"><filename>mod_ssl-2.4.6-67.sl7.5.x86_64.rpm</filename><sum type="sha256">54373531d4426fcf38fa5d1186091735fedba084b43075f249357e50c29d6809</sum></package><package arch="x86_64" name="httpd" release="67.sl7.5" src="httpd-2.4.6-67.sl7.5.src.rpm" version="2.4.6"><filename>httpd-2.4.6-67.sl7.5.x86_64.rpm</filename><sum type="sha256">b46d7cd8708849ae6dbc53a21945251568720b234f2baf5e6931ec13d722ad38</sum></package><package arch="x86_64" name="httpd-devel" release="67.sl7.5" src="httpd-2.4.6-67.sl7.5.src.rpm" version="2.4.6"><filename>httpd-devel-2.4.6-67.sl7.5.x86_64.rpm</filename><sum type="sha256">38575fc82c639ad6339e4a3e49e85e2b69439941932e05b96be241076e40e8e0</sum></package><package arch="noarch" name="httpd-manual" release="67.sl7.5" src="httpd-2.4.6-67.sl7.5.src.rpm" version="2.4.6"><filename>httpd-manual-2.4.6-67.sl7.5.noarch.rpm</filename><sum type="sha256">8446d79fd1116b473abfbd44fda33329bae587dcf9a80a8abceb0e1410baa1b3</sum></package><package arch="x86_64" name="mod_ldap" release="67.sl7.5" src="httpd-2.4.6-67.sl7.5.src.rpm" version="2.4.6"><filename>mod_ldap-2.4.6-67.sl7.5.x86_64.rpm</filename><sum type="sha256">9cd4f5c471c3d2c4e3c873e0e28e42af276725fe2f1c69e025aacc8a12205973</sum></package><package arch="x86_64" name="httpd-tools" release="67.sl7.5" src="httpd-2.4.6-67.sl7.5.src.rpm" version="2.4.6"><filename>httpd-tools-2.4.6-67.sl7.5.x86_64.rpm</filename><sum type="sha256">6f079c5adbaf2e2787055a1250b69dcfb46f26d5407af86b6a19ec9047650281</sum></package><package arch="x86_64" name="mod_session" release="67.sl7.5" src="httpd-2.4.6-67.sl7.5.src.rpm" version="2.4.6"><filename>mod_session-2.4.6-67.sl7.5.x86_64.rpm</filename><sum type="sha256">21044d2137bc586cd1f9cab489a21e3d72e66d982327799d4a90867105666c64</sum></package><package arch="x86_64" epoch="1" name="mod_proxy_html" release="67.sl7.5" src="httpd-2.4.6-67.sl7.5.src.rpm" version="2.4.6"><filename>mod_proxy_html-2.4.6-67.sl7.5.x86_64.rpm</filename><sum type="sha256">d958a7b860c88121d6bea10b6d9e4c648491090891390242b612475c5377d056</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9798" id="CVE-2017-9798" title="Httpd: Use-After-Free By Limiting Unregistered " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2882" id="RHSA-2017:2882-1" title="Rhsa-2017:2882-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1490344" id="1490344" title="Httpd: Use-After-Free By Limiting Unregistered " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2885-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.4.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-7810, CVE-2017-7793, CVE-2017-7818, CVE-2017-7819, CVE-2017-7824, CVE-2017-7814, CVE-2017-7823)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-10-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_4" src="thunderbird-52.4.0-2.el7_4.src.rpm" version="52.4.0"><filename>thunderbird-52.4.0-2.el7_4.x86_64.rpm</filename><sum type="sha256">c39b72cb14b6434051f92a9e95677608880a307715f54fac07149a166b9e1a51</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7793" id="CVE-2017-7793" title="Mozilla: Use-After-Free With Fetch Api (Mfsa " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7810" id="CVE-2017-7810" title="Mozilla: Memory Safety Bugs Fixed In Firefox 56 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7814" id="CVE-2017-7814" title="Mozilla: Blob And Data Urls Bypass Phishing And " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7818" id="CVE-2017-7818" title="Mozilla: Use-After-Free During Aria Array " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7819" id="CVE-2017-7819" title="Mozilla: Use-After-Free While Resizing Images In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7823" id="CVE-2017-7823" title="Mozilla: Csp Sandbox Directive Did Not Create A " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7824" id="CVE-2017-7824" title="Mozilla: Buffer Overflow When Drawing And " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2885" id="RHSA-2017:2885-1" title="Rhsa-2017:2885-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496649" id="1496649" title="Mozilla: Use-After-Free With Fetch Api (Mfsa " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496651" id="1496651" title="Mozilla: Memory Safety Bugs Fixed In Firefox 56 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496652" id="1496652" title="Mozilla: Blob And Data Urls Bypass Phishing And " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496653" id="1496653" title="Mozilla: Use-After-Free During Aria Array " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496654" id="1496654" title="Mozilla: Use-After-Free While Resizing Images In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496655" id="1496655" title="Mozilla: Csp Sandbox Directive Did Not Create A " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496656" id="1496656" title="Mozilla: Buffer Overflow When Drawing And " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2907-1</id><title>Wpa_Supplicant</title><description>Security Fix(es): 
* A new exploitation technique called key reinstallation attacks (KRACK) affecting WPA2 has been discovered. A remote attacker within Wi-Fi range could exploit these attacks to decrypt Wi-Fi traffic or possibly inject forged Wi-Fi packets by manipulating cryptographic handshakes used by the WPA2 protocol. (CVE-2017-13077, CVE-2017-13078, CVE-2017-13080, CVE-2017-13082, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-10-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="wpa_supplicant" release="5.el7_4.1" src="wpa_supplicant-2.6-5.el7_4.1.src.rpm" version="2.6"><filename>wpa_supplicant-2.6-5.el7_4.1.x86_64.rpm</filename><sum type="sha256">bc11a4c77c97549c727b9a35faa88ebe516df694f9acc095e95e610469a17356</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13077" id="CVE-2017-13077" title="Wpa_Supplicant: Reinstallation Of The Pairwise " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13078" id="CVE-2017-13078" title="Wpa_Supplicant: Reinstallation Of The Group Key " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13080" id="CVE-2017-13080" title="Wpa_Supplicant: Reinstallation Of The Group Key " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13082" id="CVE-2017-13082" title="Wpa_Supplicant: Accepting A Retransmitted Ft " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13086" id="CVE-2017-13086" title="Wpa_Supplicant: Reinstallation Of The Tunneled " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13087" id="CVE-2017-13087" title="Wpa_Supplicant: Reinstallation Of The Group Key " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13088" id="CVE-2017-13088" title="Wpa_Supplicant: Reinstallation Of The Integrity " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2907" id="RHSA-2017:2907-1" title="Rhsa-2017:2907-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1491692" id="1491692" title="Wpa_Supplicant: Reinstallation Of The Pairwise " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1491693" id="1491693" title="Wpa_Supplicant: Reinstallation Of The Group Key " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1491696" id="1491696" title="Wpa_Supplicant: Reinstallation Of The Group Key " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1491698" id="1491698" title="Wpa_Supplicant: Accepting A Retransmitted Ft " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1500302" id="1500302" title="Wpa_Supplicant: Reinstallation Of The Tunneled " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1500303" id="1500303" title="Wpa_Supplicant: Reinstallation Of The Group Key " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1500304" id="1500304" title="Wpa_Supplicant: Reinstallation Of The Integrity " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2930-1</id><title>Kernel</title><description>Security Fix(es): 
* Out-of-bounds kernel heap access vulnerability was found in xfrm, kernel's IP framework for transforming packets. An error dealing with netlink messages from an unprivileged user leads to arbitrary read/write and privilege escalation. (CVE-2017-7184, Important) 
* A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets are implemented in the Linux kernel networking subsystem handling synchronization. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system. (CVE-2017-1000111, Important) 
* An exploitable memory corruption flaw was found in the Linux kernel. The append path can be erroneously switched from UFO to non-UFO in ip_ufo_append_data() when building an UFO packet with MSG_MORE option. If unprivileged user namespaces are available, this flaw can be exploited to gain root privileges. (CVE-2017-1000112, Important) 
* A flaw was found in the Linux networking subsystem where a local attacker with CAP_NET_ADMIN capabilities could cause an out-of-bounds memory access by creating a smaller-than-expected ICMP header and sending to its destination via sendto(). (CVE-2016-8399, Moderate) 
* Kernel memory corruption due to a buffer overflow was found in brcmf_cfg80211_mgmt_tx() function in Linux kernels from v3.9-rc1 to v4.13-rc1. The vulnerability can be triggered by sending a crafted NL80211_CMD_FRAME packet via netlink. This flaw is unlikely to be triggered remotely as certain userspace code is needed for this. An unprivileged local user could use this flaw to induce kernel memory corruption on the system, leading to a crash. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although it is unlikely. (CVE-2017-7541, Moderate) 
* An integer overflow vulnerability in ip6_find_1stfragopt() function was found. A local attacker that has privileges (of CAP_NET_RAW) to open raw socket can cause an infinite loop inside the ip6_find_1stfragopt() function. (CVE-2017-7542, Moderate) 
* A kernel data leak due to an out-of-bound read was found in the Linux kernel in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() functions present since version 4.7-rc1 through version 4.13. A data leak happens when these functions fill in sockaddr data structures used to export socket's diagnostic information. As a result, up to 100 bytes of the slab data could be leaked to a userspace. (CVE-2017-7558, Moderate) 
* The mq_notify function in the Linux kernel through 4.11.9 does not set the sock pointer to NULL upon entry into the retry logic. During a user- space close of a Netlink socket, it allows attackers to possibly cause a situation where a value may be used after being freed (use-after-free) which may lead to memory corruption or other unspecified other impact. (CVE-2017-11176, Moderate) 
* A divide-by-zero vulnerability was found in the __tcp_select_window function in the Linux kernel. This can result in a kernel panic causing a local denial of service. (CVE-2017-14106, Moderate)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-10-19 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel" release="693.5.2.el7" src="kernel-3.10.0-693.5.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-693.5.2.el7.x86_64.rpm</filename><sum type="sha256">fbd1ab724b87172b1e9e0cf430800f1852d276584db81f1917e67cffbe242573</sum></package><package arch="x86_64" name="kernel-tools" release="693.5.2.el7" src="kernel-3.10.0-693.5.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-693.5.2.el7.x86_64.rpm</filename><sum type="sha256">8bfa6abf9d5059599f3ce925718423100d2817a002615914d0ae6e2e61deb129</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="693.5.2.el7" src="kernel-3.10.0-693.5.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-693.5.2.el7.noarch.rpm</filename><sum type="sha256">4b63cc11a123afd179df546ec3f3a4b10059e33474bde80155d54365cac9c1e1</sum></package><package arch="x86_64" name="kernel-tools-libs" release="693.5.2.el7" src="kernel-3.10.0-693.5.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-693.5.2.el7.x86_64.rpm</filename><sum type="sha256">1971b41c32745ba1d34f33c4397cadf705b950e4eff17b4b1307270d00853aa8</sum></package><package arch="noarch" name="kernel-doc" release="693.5.2.el7" src="kernel-3.10.0-693.5.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-693.5.2.el7.noarch.rpm</filename><sum type="sha256">bcc07bf18b58469a4245c63ff45cc399bcba3188e821dbc4089a998bb67921cb</sum></package><package arch="x86_64" name="kernel-headers" release="693.5.2.el7" src="kernel-3.10.0-693.5.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-693.5.2.el7.x86_64.rpm</filename><sum type="sha256">29fd886341301086156262b1b214c24a52416f7da65e7a06db883bc2a9cfed93</sum></package><package arch="x86_64" name="kernel-debug" release="693.5.2.el7" src="kernel-3.10.0-693.5.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-693.5.2.el7.x86_64.rpm</filename><sum type="sha256">1756b3758bffa22f398cadaabf1ee82a5f6e34b96b9a5afa1acfe26cdd20d86b</sum></package><package arch="x86_64" name="kernel-debug-devel" release="693.5.2.el7" src="kernel-3.10.0-693.5.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-693.5.2.el7.x86_64.rpm</filename><sum type="sha256">cac10fded59ebf1e13e5db09e17ef36d2574a32d61e9e32bfa8da1623b65f212</sum></package><package arch="x86_64" name="python-perf" release="693.5.2.el7" src="kernel-3.10.0-693.5.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-693.5.2.el7.x86_64.rpm</filename><sum type="sha256">5daf7d6b9ef67e89b5ecf130d0a487a9d5e998e1d887df80e66c3ddce5b79f98</sum></package><package arch="x86_64" name="kernel-devel" release="693.5.2.el7" src="kernel-3.10.0-693.5.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-693.5.2.el7.x86_64.rpm</filename><sum type="sha256">5bd445e702c0c5c5bfabf68c5329a541086a504f2075072d8bbd45556b4986a0</sum></package><package arch="x86_64" name="perf" release="693.5.2.el7" src="kernel-3.10.0-693.5.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-693.5.2.el7.x86_64.rpm</filename><sum type="sha256">a18f31cf8c8b6260b7dec86304575548d90e01bdc3f3ea4bc699b53445888667</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="693.5.2.el7" src="kernel-3.10.0-693.5.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-693.5.2.el7.x86_64.rpm</filename><sum type="sha256">0cd1c3f97058f3b40a0f4709a32c71a087af1aa31fca2712f086c396b77a0b0c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8399" id="CVE-2016-8399" title="Kernel: Net: Out Of Bounds Stack Read In Memcpy_Fromiovec" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000111" id="CVE-2017-1000111" title="Kernel: Heap Out-Of-Bounds In Af_Packet Sockets" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000112" id="CVE-2017-1000112" title="Kernel: Exploitable Memory Corruption Due To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11176" id="CVE-2017-11176" title="Kernel: Use-After-Free In Sys_Mq_Notify()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14106" id="CVE-2017-14106" title="Kernel: Divide-By-Zero In __Tcp_Select_Window" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7184" id="CVE-2017-7184" title="Kernel: Out-Of-Bounds Heap Access In Xfrm" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7541" id="CVE-2017-7541" title="Kernel: Possible Heap Buffer Overflow In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7542" id="CVE-2017-7542" title="Kernel: Integer Overflow In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7558" id="CVE-2017-7558" title="Kernel: Out Of Bounds Read In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2930" id="RHSA-2017:2930-1" title="Rhsa-2017:2930-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1403833" id="1403833" title="Kernel: Net: Out Of Bounds Stack Read In Memcpy_Fromiovec" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1435153" id="1435153" title="Kernel: Out-Of-Bounds Heap Access In Xfrm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1470659" id="1470659" title="Kernel: Use-After-Free In Sys_Mq_Notify()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1473198" id="1473198" title="Kernel: Possible Heap Buffer Overflow In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1473649" id="1473649" title="Kernel: Integer Overflow In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479304" id="1479304" title="Kernel: Heap Out-Of-Bounds In Af_Packet Sockets" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479307" id="1479307" title="Kernel: Exploitable Memory Corruption Due To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1480266" id="1480266" title="Kernel: Out Of Bounds Read In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1487295" id="1487295" title="Kernel: Divide-By-Zero In __Tcp_Select_Window" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:2998-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were discovered in the RMI and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-10285, CVE-2017-10346) 
* It was discovered that the Kerberos client implementation in the Libraries component of OpenJDK used the sname field from the plain text part rather than encrypted part of the KDC reply message. A man-in-the- middle attacker could possibly use this flaw to impersonate Kerberos services to Java applications acting as Kerberos clients. (CVE-2017-10388) 
* It was discovered that the Security component of OpenJDK generated weak password-based encryption keys used to protect private keys stored in key stores. This made it easier to perform password guessing attacks to decrypt stored keys if an attacker could gain access to a key store. (CVE-2017-10356) 
* A flaw was found in the Smart Card IO component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2017-10274) 
* It was found that the FtpClient implementation in the Networking component of OpenJDK did not set connect and read timeouts by default. A malicious FTP server or a man-in-the-middle attacker could use this flaw to block execution of a Java application connecting to an FTP server. (CVE-2017-10355) 
* It was found that the HttpURLConnection and HttpsURLConnection classes in the Networking component of OpenJDK failed to check for newline characters embedded in URLs. An attacker able to make a Java application perform an HTTP request using an attacker provided URL could possibly inject additional headers into the request. (CVE-2017-10295) 
* It was discovered that multiple classes in the JAXP, Serialization, Libraries, and JAX-WS components of OpenJDK did not limit the amount of memory allocated when creating object instances from the serialized form. A specially-crafted input could cause a Java application to use an excessive amount of memory when deserialized. (CVE-2017-10349, CVE-2017-10357, CVE-2017-10347, CVE-2017-10281, CVE-2017-10345, CVE-2017-10348, CVE-2017-10350) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.</description><severity>critical</severity><release>Scientific Linux</release><issued date="2017-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4.i686.rpm</filename><sum type="sha256">b07009ef4c2068b60d4a50a47ab14928863deda6b8c8137a45900e7069f72720</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4.i686.rpm</filename><sum type="sha256">2e9694674253aaadb7ab1d8704cd75710cee4f7a4d52ea8bf1b35958fb108a80</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4.x86_64.rpm</filename><sum type="sha256">8559026009e1b7dc8408162351e607f696e7f15654ed8db926d7aa5bff29c832</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4.x86_64.rpm</filename><sum type="sha256">f609ce11586e082c842bf31158d35ece5eba7ec71a89898c456a84f8313ab1eb</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4.i686.rpm</filename><sum type="sha256">6595936c6d16999563cc1866577172075b5ea7a1432fed5b8cb6be315f13a0fa</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4.x86_64.rpm</filename><sum type="sha256">f818479e19b06d1582df01a7bc12ebbbe7595ebfa3a15c807429beff0ecb2323</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-accessibility-1.8.0.151-1.b12.el7_4.x86_64.rpm</filename><sum type="sha256">40bb1d657c614cebf7b4fb552c2bd5fe1552cab8117de66a19c2f3c364289dd5</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4.x86_64.rpm</filename><sum type="sha256">74b4f9d237f01d4298b4c065fe3233f784cf0bbbffbda5144658ce9cbc434f54</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-src-1.8.0.151-1.b12.el7_4.x86_64.rpm</filename><sum type="sha256">b6585ca1e4cae4245defbc221ba1fcaf4e4c0335fe99ea4f5c1869764b82b8f2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4.x86_64.rpm</filename><sum type="sha256">baa7aff6c144d92f4a3554c88cbe00c4e3420aadb3c62498b0a165c8400ffe78</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-src-debug-1.8.0.151-1.b12.el7_4.x86_64.rpm</filename><sum type="sha256">5e801811378b4da7eb42a12f726451caf4aa44c299da3e4ef411b75e701eba0f</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-javadoc-1.8.0.151-1.b12.el7_4.noarch.rpm</filename><sum type="sha256">6a14a03cb10e34ff379375e16f574fe4cb2a1db279e7a3c5c85febe9d3b4575f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4.i686.rpm</filename><sum type="sha256">212c7f554833bd12a72fe2e05b01f70758b058e62128fa0344d423da0c2f9e6c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4.x86_64.rpm</filename><sum type="sha256">29e503f716c61a3df8d4f8567f4f8f777a3a107f2a3bc10679d0a3e6c1dded9b</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.151-1.b12.el7_4.i686.rpm</filename><sum type="sha256">f234c9b881bcb7fea3f109a6b5c7af40271ac851346f8c99096fa6dad5e58dbc</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.151-1.b12.el7_4.noarch.rpm</filename><sum type="sha256">239eb14c2127e4b6ba8955d83e4e0d0d4662dff815396917c8b88ade5915c543</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.151-1.b12.el7_4.noarch.rpm</filename><sum type="sha256">f199a618765a08410b8f2868d8d6a4ec76ee346f5eb98e01fe4a1be4e8b8b76e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4.x86_64.rpm</filename><sum type="sha256">9e1cfb5972cbd43f6d99c323d3c24b09e1021ece98b34d0d6be9e4734c7952fc</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.151-1.b12.el7_4.i686.rpm</filename><sum type="sha256">04ca13e29191ee6e40d92de71577d2b5a7e7697e49183eefe82d44106d2c48c4</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-debug-1.8.0.151-1.b12.el7_4.i686.rpm</filename><sum type="sha256">f2ca1c0372c93e900fcd11e97ab04fd1476523d73852259c7e89ca843e1a14fc</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-headless-1.8.0.151-1.b12.el7_4.x86_64.rpm</filename><sum type="sha256">bae1f426a0b17f7138d8b59e58b6322df528554d437e35f36da21eaaec4765ef</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.151-1.b12.el7_4.i686.rpm</filename><sum type="sha256">e141afb230df384415d608aa4d180fa06028e4c3a9e5e759971c1e6adc8fd53a</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.i686.rpm</filename><sum type="sha256">3065b4fbb8876e8a502b818c626085978a90dce1e853c64630fa3cdadb356d80</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.151-1.b12.el7_4.noarch.rpm</filename><sum type="sha256">fd637f1381703ff68e72892ee85d1603a73ee27d67c39e0655c0987a626e0992</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.151-1.b12.el7_4.i686.rpm</filename><sum type="sha256">27df1f006356e9f2137e853bf808990c4e2ff4af6dce9d6736b0eec76b1c6b35</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-devel-1.8.0.151-1.b12.el7_4.i686.rpm</filename><sum type="sha256">b713717b5865df5e3fad60191af8ba82abbe5fdf64ac4236c437057807525dad</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.x86_64.rpm</filename><sum type="sha256">1324261935cb6c28c60a79a941cc7da0b3d9b048268ab615b64e3b288c2a6376</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.b12.el7_4" src="java-1.8.0-openjdk-1.8.0.151-1.b12.el7_4.src.rpm" version="1.8.0.151"><filename>java-1.8.0-openjdk-demo-1.8.0.151-1.b12.el7_4.i686.rpm</filename><sum type="sha256">cc10e2af45ec83c7e193e86e040171108ae568cb7b4f2846bb69197831bbacc0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274" id="CVE-2017-10274" title="Openjdk: Cardimpl Incorrect State Handling " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281" id="CVE-2017-10281" title="Openjdk: Multiple Unbounded Memory Allocations " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285" id="CVE-2017-10285" title="Openjdk: Incorrect Privilege Use When Handling " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295" id="CVE-2017-10295" title="Openjdk: Http Client Insufficient Check For " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345" id="CVE-2017-10345" title="Openjdk: Unbounded Resource Use In Jcekeystore " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346" id="CVE-2017-10346" title="Openjdk: Insufficient Loader Constraints Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347" id="CVE-2017-10347" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348" id="CVE-2017-10348" title="Openjdk: Multiple Unbounded Memory Allocations " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349" id="CVE-2017-10349" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350" id="CVE-2017-10350" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355" id="CVE-2017-10355" title="Openjdk: No Default Network Operations Timeouts " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356" id="CVE-2017-10356" title="Openjdk: Weak Protection Of Key Stores Against " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357" id="CVE-2017-10357" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388" id="CVE-2017-10388" title="Openjdk: Use Of Unprotected Sname In Kerberos " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:2998" id="RHSA-2017:2998-1" title="Rhsa-2017:2998-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1501868" id="1501868" title="Openjdk: Incorrect Privilege Use When Handling " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1501873" id="1501873" title="Openjdk: Insufficient Loader Constraints Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502038" id="1502038" title="Openjdk: Use Of Unprotected Sname In Kerberos " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502053" id="1502053" title="Openjdk: Cardimpl Incorrect State Handling " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502611" id="1502611" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502614" id="1502614" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502629" id="1502629" title="Openjdk: Multiple Unbounded Memory Allocations " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502632" id="1502632" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502640" id="1502640" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502649" id="1502649" title="Openjdk: Multiple Unbounded Memory Allocations " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502687" id="1502687" title="Openjdk: Http Client Insufficient Check For " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502858" id="1502858" title="Openjdk: Unbounded Resource Use In Jcekeystore " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502869" id="1502869" title="Openjdk: No Default Network Operations Timeouts " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1503169" id="1503169" title="Openjdk: Weak Protection Of Key Stores Against " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3075-1</id><title>Wget</title><description>Security Fix(es): 
* A stack-based and a heap-based buffer overflow flaws were found in wget when processing chunked encoded HTTP responses. By tricking an unsuspecting user into connecting to a malicious HTTP server, an attacker could exploit these flaws to potentially execute arbitrary code. (CVE-2017-13089, CVE-2017-13090)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-10-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="wget" release="15.el7_4.1" src="wget-1.14-15.el7_4.1.src.rpm" version="1.14"><filename>wget-1.14-15.el7_4.1.x86_64.rpm</filename><sum type="sha256">459a23b2c6b450b32d7265dd570793c5f110ce10184f261e553ff7dba39255a5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13089" id="CVE-2017-13089" title="Wget: Stack-Based Buffer Overflow In Http " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13090" id="CVE-2017-13090" title="Wget: Heap-Based Buffer Overflow In Http " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3075" id="RHSA-2017:3075-1" title="Rhsa-2017:3075-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1505444" id="1505444" title="Wget: Stack-Based Buffer Overflow In Http " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1505445" id="1505445" title="Wget: Heap-Based Buffer Overflow In Http " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3081-1</id><title>Tomcat</title><description>Security Fix(es): 
* A vulnerability was discovered in Tomcat's handling of pipelined requests when "Sendfile" was used. If sendfile processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could lead to invalid responses or information disclosure. (CVE-2017-5647) 
* Two vulnerabilities were discovered in Tomcat where if a servlet context was configured with readonly=false and HTTP PUT requests were allowed, an attacker could upload a JSP file to that context and achieve code execution. (CVE-2017-12615, CVE-2017-12617) 
* A vulnerability was discovered in Tomcat where the CORS Filter did not send a "Vary: Origin" HTTP header. This potentially allowed sensitive data to be leaked to other visitors through both client-side and server-side caches. (CVE-2017-7674)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-10-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcat-webapps" release="3.el7_4" src="tomcat-7.0.76-3.el7_4.src.rpm" version="7.0.76"><filename>tomcat-webapps-7.0.76-3.el7_4.noarch.rpm</filename><sum type="sha256">5a8a8d174997c7f25bc21924e1660282e9a5aa95c9821cda3dc24e77981e2b2e</sum></package><package arch="noarch" name="tomcat-jsvc" release="3.el7_4" src="tomcat-7.0.76-3.el7_4.src.rpm" version="7.0.76"><filename>tomcat-jsvc-7.0.76-3.el7_4.noarch.rpm</filename><sum type="sha256">2c790eaaaee77e668c112bc160af76e11b83a326437111750f1839ea8a67ec8c</sum></package><package arch="noarch" name="tomcat" release="3.el7_4" src="tomcat-7.0.76-3.el7_4.src.rpm" version="7.0.76"><filename>tomcat-7.0.76-3.el7_4.noarch.rpm</filename><sum type="sha256">8c56ae11d50b694815ee3d5842423015ac9634d7f2844dd4e5b46510342606ff</sum></package><package arch="noarch" name="tomcat-javadoc" release="3.el7_4" src="tomcat-7.0.76-3.el7_4.src.rpm" version="7.0.76"><filename>tomcat-javadoc-7.0.76-3.el7_4.noarch.rpm</filename><sum type="sha256">bfca1fbe124d70dcf0ce2f59a64e215229db7d593595a8bcd6a71dc7a0095e5e</sum></package><package arch="noarch" name="tomcat-docs-webapp" release="3.el7_4" src="tomcat-7.0.76-3.el7_4.src.rpm" version="7.0.76"><filename>tomcat-docs-webapp-7.0.76-3.el7_4.noarch.rpm</filename><sum type="sha256">d208c427778d3e51f9e75265324652b4efba69dc0d95d11baeb7a02df6121b2c</sum></package><package arch="noarch" name="tomcat-servlet-3.0-api" release="3.el7_4" src="tomcat-7.0.76-3.el7_4.src.rpm" version="7.0.76"><filename>tomcat-servlet-3.0-api-7.0.76-3.el7_4.noarch.rpm</filename><sum type="sha256">371de77d92232270f01510bd8539c24ed4356c903b98ff7688778c6358c6bad1</sum></package><package arch="noarch" name="tomcat-lib" release="3.el7_4" src="tomcat-7.0.76-3.el7_4.src.rpm" version="7.0.76"><filename>tomcat-lib-7.0.76-3.el7_4.noarch.rpm</filename><sum type="sha256">2a5710e00afbad5f2bf909da7aff2ee684d9fbc9dc49a6210c1cfbc1ae6af5e7</sum></package><package arch="noarch" name="tomcat-admin-webapps" release="3.el7_4" src="tomcat-7.0.76-3.el7_4.src.rpm" version="7.0.76"><filename>tomcat-admin-webapps-7.0.76-3.el7_4.noarch.rpm</filename><sum type="sha256">364a4076d279f562f030a005c9aec3b8a35f4815a9fe932445b0f75a671ff956</sum></package><package arch="noarch" name="tomcat-jsp-2.2-api" release="3.el7_4" src="tomcat-7.0.76-3.el7_4.src.rpm" version="7.0.76"><filename>tomcat-jsp-2.2-api-7.0.76-3.el7_4.noarch.rpm</filename><sum type="sha256">548f737cd59671fa6f3f63d0a2e05b178c7748b16cdc020a3ea1d93074dcab3f</sum></package><package arch="noarch" name="tomcat-el-2.2-api" release="3.el7_4" src="tomcat-7.0.76-3.el7_4.src.rpm" version="7.0.76"><filename>tomcat-el-2.2-api-7.0.76-3.el7_4.noarch.rpm</filename><sum type="sha256">9cf5cebb93ee2bf2adb1d8d471f0158cc1e0dbd540cb19736740732dbbd6cbed</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12615" id="CVE-2017-12615" title="Tomcat: Remote Code Execution Via Jsp Upload" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12617" id="CVE-2017-12617" title="Tomcat: Remote Code Execution Bypass For " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5647" id="CVE-2017-5647" title="Tomcat: Incorrect Handling Of Pipelined Requests " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7674" id="CVE-2017-7674" title="Tomcat: Vary Header Not Added By Cors Filter " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3081" id="RHSA-2017:3081-1" title="Rhsa-2017:3081-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1441205" id="1441205" title="Tomcat: Incorrect Handling Of Pipelined Requests " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1480618" id="1480618" title="Tomcat: Vary Header Not Added By Cors Filter " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1493220" id="1493220" title="Tomcat: Remote Code Execution Via Jsp Upload" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1494283" id="1494283" title="Tomcat: Remote Code Execution Bypass For " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3111-1</id><title>Liblouis</title><description>Security Fix(es): 
* Multiple flaws were found in the processing of translation tables in liblouis. An attacker could crash or potentially execute arbitrary code using malicious translation tables. (CVE-2014-8184, CVE-2017-13738, CVE-2017-13740, CVE-2017-13741, CVE-2017-13742, CVE-2017-13743, CVE-2017-13744)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-11-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="liblouis-devel" release="11.el7_4" src="liblouis-2.5.2-11.el7_4.src.rpm" version="2.5.2"><filename>liblouis-devel-2.5.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">b0382fbde8ca9005d6e0c877d3b4d7fb6b9cb81ef544cbbc1adfc5fdec56870e</sum></package><package arch="x86_64" name="liblouis-utils" release="11.el7_4" src="liblouis-2.5.2-11.el7_4.src.rpm" version="2.5.2"><filename>liblouis-utils-2.5.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">39b87fc05f2ac79866dd0e9c1b8b93781646274e55f27c63bd7f4c260775f438</sum></package><package arch="i686" name="liblouis" release="11.el7_4" src="liblouis-2.5.2-11.el7_4.src.rpm" version="2.5.2"><filename>liblouis-2.5.2-11.el7_4.i686.rpm</filename><sum type="sha256">8389e0a65167394d10a3d9316d2ca12fc0980506bfe6b684ea6dd4a54bc6010d</sum></package><package arch="x86_64" name="liblouis" release="11.el7_4" src="liblouis-2.5.2-11.el7_4.src.rpm" version="2.5.2"><filename>liblouis-2.5.2-11.el7_4.x86_64.rpm</filename><sum type="sha256">e9d617750ab879d75b0aac183406b7bb891ef6daacbb704421bbd3f9463b9f3a</sum></package><package arch="i686" name="liblouis-devel" release="11.el7_4" src="liblouis-2.5.2-11.el7_4.src.rpm" version="2.5.2"><filename>liblouis-devel-2.5.2-11.el7_4.i686.rpm</filename><sum type="sha256">db414f03c1ed8734fb2e3ef916aec9d6b13520edf1f3f98b28f906a39542eb7b</sum></package><package arch="noarch" name="liblouis-python" release="11.el7_4" src="liblouis-2.5.2-11.el7_4.src.rpm" version="2.5.2"><filename>liblouis-python-2.5.2-11.el7_4.noarch.rpm</filename><sum type="sha256">c4c265fbeed99295d61404ab7383eff0a3ab57f03ea74e7a3bb116b27c07c25d</sum></package><package arch="noarch" name="liblouis-doc" release="11.el7_4" src="liblouis-2.5.2-11.el7_4.src.rpm" version="2.5.2"><filename>liblouis-doc-2.5.2-11.el7_4.noarch.rpm</filename><sum type="sha256">b216df8a1fa638492e979c1a0b27fe4067453280d29ac9b40e910f557cc2dc24</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8184" id="CVE-2014-8184" title="Liblouis: Stack-Based Buffer Overflow In Findtable()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13738" id="CVE-2017-13738" title="Liblouis: Illegal Address Access In The " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13740" id="CVE-2017-13740" title="Liblouis: Stack-Buffer Overflow In The " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13741" id="CVE-2017-13741" title="Liblouis: Use-After-Free In The Function " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13742" id="CVE-2017-13742" title="Liblouis: Stack-Buffer Overflow In The Function " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13743" id="CVE-2017-13743" title="Liblouis: Buffer Overflow In The Function " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13744" id="CVE-2017-13744" title="Liblouis: Illegal Address Access In The " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3111" id="RHSA-2017:3111-1" title="Rhsa-2017:3111-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1488933" id="1488933" title="Liblouis: Illegal Address Access In The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1488935" id="1488935" title="Liblouis: Illegal Address Access In The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1488937" id="1488937" title="Liblouis: Stack-Buffer Overflow In The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1488938" id="1488938" title="Liblouis: Use-After-Free In The Function " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1488939" id="1488939" title="Liblouis: Stack-Buffer Overflow In The Function " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1488942" id="1488942" title="Liblouis: Buffer Overflow In The Function " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1492701" id="1492701" title="Liblouis: Stack-Based Buffer Overflow In Findtable()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3221-1</id><title>Php</title><description>Security Fix(es): 
* A null pointer dereference flaw was found in libgd. An attacker could use a specially-crafted .gd2 file to cause an application linked with libgd to crash, leading to denial of service. (CVE-2016-10167) 
* An integer overflow flaw, leading to a heap-based buffer overflow was found in the way libgd read some specially-crafted gd2 files. A remote attacker could use this flaw to crash an application compiled with libgd or in certain cases execute arbitrary code with the privileges of the user running that application. (CVE-2016-10168)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-11-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="php-common" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-common-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">4d682e43436b0adaf5393280ef5b42318c6ddfe51f6757e15cf96a0cd026e8f6</sum></package><package arch="x86_64" name="php-pdo" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-pdo-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">147c0da630c2dc72a4db81e9fa48238b7d0016ce3a261ea5049066cee950dd7e</sum></package><package arch="x86_64" name="php-mysql" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-mysql-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">5aa475e93452584ff1123fd5b1b72578c8e1d07d9973a2054268ca72af70ade3</sum></package><package arch="x86_64" name="php-intl" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-intl-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">2008f3b9532412ebab9508cac73bf73c11e10250b69afcbe6cd38fcead20b689</sum></package><package arch="x86_64" name="php-snmp" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-snmp-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">a53e692a03b6ed96ba4c3ea3caef73f9cf7978432b8bc23671cca3f903733265</sum></package><package arch="x86_64" name="php-process" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-process-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">897f6fe7497a36690e921dfeff995604fc3a9c4e50ea695e112928dd0cf5215d</sum></package><package arch="x86_64" name="php-soap" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-soap-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">2cb95004c9879c0cfb7e516212965228d8b7bf8d3caf37e7598467bb800b4565</sum></package><package arch="x86_64" name="php-xml" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-xml-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">9102361ffd714129adf93c6f4921a77b93d27a84351f8ae407372eab07c4d363</sum></package><package arch="x86_64" name="php-devel" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-devel-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">464f1d7b13c9ba4cbfa38786f47cb053c8c6589513f6d6e604f331e78413c2ae</sum></package><package arch="x86_64" name="php-ldap" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-ldap-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">8248064d3e96191defd158958527c03e3d9ee195602266c9469efbffdd25b559</sum></package><package arch="x86_64" name="php-odbc" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-odbc-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">74996b2aa8ae59a7ebd86cc709e8284fa69b7a1df052c875a924bdb67821b8fd</sum></package><package arch="x86_64" name="php-pgsql" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-pgsql-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">8f0640f1e6f70867160e53467b6ee3946ea1ccafa4362db1e9f27a8fa801e459</sum></package><package arch="x86_64" name="php-xmlrpc" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-xmlrpc-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">1a57cc74b9002b98e3e938dd8769f5699688dc26c3a7de330aa39bc145705363</sum></package><package arch="x86_64" name="php-enchant" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-enchant-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">f6f2692a4642d4e1f1ca249931e7b1d714971af1cba6b616f425fedf9f552cdd</sum></package><package arch="x86_64" name="php-mbstring" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-mbstring-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">deb2b1ad0e9ac61e1fe38595f61845bb4d988c755e7525327868703feb4787e1</sum></package><package arch="x86_64" name="php-pspell" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-pspell-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">f6fa3bd16f7b4cd7b3150b58178fcfdca18360f23427ad09f64f6f595798ba8c</sum></package><package arch="x86_64" name="php-bcmath" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-bcmath-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">1b54becd660871977d37d2a903033c91cc997fd2f334c878bddf52013889c553</sum></package><package arch="x86_64" name="php-cli" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-cli-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">40acbefaf77d93045acfdaf9197de4f7a530b64d1c35c7b0fd533144076118b3</sum></package><package arch="x86_64" name="php-recode" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-recode-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">f6cf0aab2e1fcb4b66245da2c4340d2bd7fc260e50197479559e5254d851b7fa</sum></package><package arch="x86_64" name="php-fpm" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-fpm-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">d5995d9159c64ea3b05aeaa8a5b245e5c0584c46263d73949eea5a3c7390ef96</sum></package><package arch="x86_64" name="php-embedded" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-embedded-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">1972dfbefdb1008b9cb912e57d31eb0f6ce08b2b2388824547c87e6c69d06939</sum></package><package arch="x86_64" name="php-mysqlnd" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-mysqlnd-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">efacb7a81c807b1412764cd5cad78aba92540acef92957491f29f4c1aa2e22d1</sum></package><package arch="x86_64" name="php-gd" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-gd-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">24bcd3cb5be99a9a9ed6c169535ecb24af0ab679e0e024aa6bb4e3a6663b5751</sum></package><package arch="x86_64" name="php-dba" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-dba-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">9fb4ea30a585d3ef27d12d608e60b524806cd2c225d789e391a8132914c3e011</sum></package><package arch="x86_64" name="php" release="43.el7_4" src="php-5.4.16-43.el7_4.src.rpm" version="5.4.16"><filename>php-5.4.16-43.el7_4.x86_64.rpm</filename><sum type="sha256">35b981c13746b1a9f325a50b3d4a9f9ee3879a00402dabf7a48549a047b3f52d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10167" id="CVE-2016-10167" title="Gd: Dos Vulnerability In Gdimagecreatefromgd2Ctx()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10168" id="CVE-2016-10168" title="Gd: Integer Overflow In Gd_Io.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3221" id="RHSA-2017:3221-1" title="Rhsa-2017:3221-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418984" id="1418984" title="Gd: Dos Vulnerability In Gdimagecreatefromgd2Ctx()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1418986" id="1418986" title="Gd: Integer Overflow In Gd_Io.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3247-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.5.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2017-7826, CVE-2017-7828, CVE-2017-7830)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2017-11-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_4" src="firefox-52.5.0-1.el7_4.src.rpm" version="52.5.0"><filename>firefox-52.5.0-1.el7_4.x86_64.rpm</filename><sum type="sha256">cb8c1273f8851a62110c3ba336c117ad675506357afdfdbcd254c13781a352dd</sum></package><package arch="i686" name="firefox" release="1.el7_4" src="firefox-52.5.0-1.el7_4.src.rpm" version="52.5.0"><filename>firefox-52.5.0-1.el7_4.i686.rpm</filename><sum type="sha256">2902355b97fc280b749b48f92f8726a20a783ae73160ee389e0201fc21b8ba73</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7826" id="CVE-2017-7826" title="Mozilla: Memory Safety Bugs Fixed In Firefox 57 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7828" id="CVE-2017-7828" title="Mozilla: Use-After-Free Of Pressshell While " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7830" id="CVE-2017-7830" title="Mozilla: Cross-Origin Url Information Leak " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3247" id="RHSA-2017:3247-1" title="Rhsa-2017:3247-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1513308" id="1513308" title="Mozilla: Memory Safety Bugs Fixed In Firefox 57 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1513310" id="1513310" title="Mozilla: Use-After-Free Of Pressshell While " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1513311" id="1513311" title="Mozilla: Cross-Origin Url Information Leak " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3260-1</id><title>Samba</title><description>Security Fix(es): 
* A use-after-free flaw was found in the way samba servers handled certain SMB1 requests. An unauthenticated attacker could send specially-crafted SMB1 requests to cause the server to crash or execute arbitrary code. (CVE-2017-14746) 
* A memory disclosure flaw was found in samba. An attacker could retrieve parts of server memory, which could contain potentially sensitive data, by sending specially-crafted requests to the samba server. (CVE-2017-15275)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-11-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="samba-winbind-clients" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-winbind-clients-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">e866d4eff16115a45b2aad13fbc95b748e897d030ec5fd52f2ec2c12ae963934</sum></package><package arch="x86_64" name="samba-python" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-python-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">35879032afe765d9614f5950a6d57b6b3020e4d8d3e5cbff05ab60435f2957cb</sum></package><package arch="x86_64" name="samba-test-libs" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-test-libs-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">a388ecfc7f578fac93922fc3e59072a9431e8d041c6535bb71a63b9f3c74e5f8</sum></package><package arch="x86_64" name="samba-krb5-printing" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-krb5-printing-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">bab9ec219da4e1d2e6fc2b7ccaa5a00e42f822cb3bf4c2e165c23d7a0ae37ff6</sum></package><package arch="i686" name="libsmbclient" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>libsmbclient-4.6.2-12.el7_4.i686.rpm</filename><sum type="sha256">ed0aca385fb80998169c1b216adc7430adf96f61125d82d223ba77ae8403976d</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-vfs-glusterfs-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">ecca274ce9d6ad67b59d9bb9d4600f61ff19bb3b4bb99719e0cdf47bfa90a8c9</sum></package><package arch="x86_64" name="samba-libs" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-libs-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">294ec2328496ca9cb24b556a85ad01f96dc6dfec00c2baa6a934afcbcc699d97</sum></package><package arch="x86_64" name="samba-winbind" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-winbind-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">cd445f777fb5d99bfded09a054878ae663771ce1d598053e55cb6a761d4760df</sum></package><package arch="i686" name="samba-client-libs" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-client-libs-4.6.2-12.el7_4.i686.rpm</filename><sum type="sha256">9f60a2df36b66b75c9464298e01d65c47c42be3d4f89a5a61e536ae2f165743f</sum></package><package arch="x86_64" name="samba" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">0d8470da0a7ed076da445ff3e4369b2816623240fd9e96a5cc7ddea42947b276</sum></package><package arch="x86_64" name="ctdb" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>ctdb-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">0aa6c86a16fbbba978ec02e48493ba42d4ce11ec15965d2382893123e1c6ea3a</sum></package><package arch="i686" name="samba-test-libs" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-test-libs-4.6.2-12.el7_4.i686.rpm</filename><sum type="sha256">24c68b0a9bd9eb4d1bd28d424879df15f1d3e92da8584772ff84cb8206daeaf6</sum></package><package arch="x86_64" name="libwbclient-devel" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>libwbclient-devel-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">1e34f30a937df77472d5268b8d9eb46ed436dc67998a3988318037ff2c0b3828</sum></package><package arch="x86_64" name="samba-common-libs" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-common-libs-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">963755c3b27859b9e3b0b72e69100ad9be6a63350ef5cf77fe626b4e3fb5c3af</sum></package><package arch="x86_64" name="samba-common-tools" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-common-tools-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">469d5a9464cb1af81b0100f01e637b879f21b982d61ebc4ad2fcb2a2ea25d715</sum></package><package arch="x86_64" name="ctdb-tests" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>ctdb-tests-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">19b8d70ca3543849df6353dded71ad268fa480c10527bfd6f6fcef8e6533f3d8</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-winbind-krb5-locator-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">274544110af7bae7988a62b95b797c534353c3e2bd16e3ef810e6f6d5d47a879</sum></package><package arch="x86_64" name="libwbclient" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>libwbclient-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">25584ac34c8f59ef55b4d0e54779ac337f92e090fbdced4b50d5650fac9ae831</sum></package><package arch="i686" name="libwbclient" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>libwbclient-4.6.2-12.el7_4.i686.rpm</filename><sum type="sha256">befbed7c30cca99da395df2c8bb1e75579b67a9c445019c6961a1fcd62c3bd53</sum></package><package arch="noarch" name="samba-common" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-common-4.6.2-12.el7_4.noarch.rpm</filename><sum type="sha256">9b3d285ac5fe21dfe3d138d69b5c754080a33348c29fe22a589bfe8cbb8cf1bb</sum></package><package arch="noarch" name="samba-pidl" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-pidl-4.6.2-12.el7_4.noarch.rpm</filename><sum type="sha256">29b1d082a211b64a35c07f5cda68f58f5f254989f71e4e82fdade8b84ad893a8</sum></package><package arch="x86_64" name="samba-dc-libs" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-dc-libs-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">e7753ddf6fddcaca4bd740af098fb29701133222978caf6af3a1d547808607e4</sum></package><package arch="i686" name="samba-devel" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-devel-4.6.2-12.el7_4.i686.rpm</filename><sum type="sha256">fea907e4f37f4f5f9ca807a605a0d155a024f04f8b0e2585e0f2c84453caff0d</sum></package><package arch="x86_64" name="samba-client-libs" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-client-libs-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">dbc464129d269441e1b74aa46bcc0d426b8d29b4206905b6520b788374eaa1c3</sum></package><package arch="x86_64" name="samba-dc" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-dc-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">7b6327456088f008ae6baf355843ab7869a220161608e3063957978acd793078</sum></package><package arch="i686" name="libsmbclient-devel" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>libsmbclient-devel-4.6.2-12.el7_4.i686.rpm</filename><sum type="sha256">09638f053fa89e0be46083f2fafa09bb29955d5e6972c1f42b97f48b56a9b520</sum></package><package arch="i686" name="samba-winbind-modules" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-winbind-modules-4.6.2-12.el7_4.i686.rpm</filename><sum type="sha256">28c4f0c54a67fb01d42fd8ead315abcbf822f387f5e1fc3ff22863c934bcb7a0</sum></package><package arch="i686" name="samba-libs" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-libs-4.6.2-12.el7_4.i686.rpm</filename><sum type="sha256">73550663b0f2581cf09f7c931d5ae6d3af0d6f075b8a42dd9333745936a29af6</sum></package><package arch="i686" name="libwbclient-devel" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>libwbclient-devel-4.6.2-12.el7_4.i686.rpm</filename><sum type="sha256">b6dd4913d7bd6e4b60ec510c40710494e66316db1592666667de92a121580392</sum></package><package arch="x86_64" name="samba-test" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-test-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">8e3d41eb17262e24da93083a4f45a7df4664b60141a8d2b971f8ec921318f1d3</sum></package><package arch="x86_64" name="libsmbclient-devel" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>libsmbclient-devel-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">60b39f91b38222c729754cfd27b140b86a39ef78841d4704f80b658d3ddb704e</sum></package><package arch="x86_64" name="samba-client" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-client-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">146d9348fcfa0ac750aa4becbcde79b631b12bd7c3a68e3bcaa6be4d8d650871</sum></package><package arch="x86_64" name="samba-devel" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-devel-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">859cfd80157e3f348b09bb5356facc7e0551193fa0746b159d7500703b6b239b</sum></package><package arch="x86_64" name="samba-winbind-modules" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>samba-winbind-modules-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">89ab8938b84767f518501a3cf09091865e42d1433f927370dc17e60e207bb1f5</sum></package><package arch="x86_64" name="libsmbclient" release="12.el7_4" src="samba-4.6.2-12.el7_4.src.rpm" version="4.6.2"><filename>libsmbclient-4.6.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">2725ae30def9dd7267186d175280a24aaed840678bcb1ce294d28fa86fb75a28</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14746" id="CVE-2017-14746" title="Samba: Use-After-Free In Processing Smb1 Requests" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15275" id="CVE-2017-15275" title="Samba: Server Heap-Memory Disclosure" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3260" id="RHSA-2017:3260-1" title="Rhsa-2017:3260-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1511899" id="1511899" title="Samba: Use-After-Free In Processing Smb1 Requests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1512465" id="1512465" title="Samba: Server Heap-Memory Disclosure" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3263-1</id><title>Curl</title><description>Security Fix(es): 
* A buffer overrun flaw was found in the IMAP handler of libcurl. By tricking an unsuspecting user into connecting to a malicious IMAP server, an attacker could exploit this flaw to potentially cause information disclosure or crash the application. (CVE-2017-1000257)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-11-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libcurl-devel" release="42.el7_4.1" src="curl-7.29.0-42.el7_4.1.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-42.el7_4.1.x86_64.rpm</filename><sum type="sha256">917c40d16e6e9b97c49448857ec72d3edee5e4a457dbf918675e5f134bb1cece</sum></package><package arch="i686" name="libcurl" release="42.el7_4.1" src="curl-7.29.0-42.el7_4.1.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-42.el7_4.1.i686.rpm</filename><sum type="sha256">f740b3a1f90226eaab2d70f4bbba5e1aa9703ecf9ad6f1b18468a727b197eb0c</sum></package><package arch="x86_64" name="libcurl" release="42.el7_4.1" src="curl-7.29.0-42.el7_4.1.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-42.el7_4.1.x86_64.rpm</filename><sum type="sha256">7f055a8eea33d44629e4f697b1022522d1141f764d853df5cada9e86fb57ebb5</sum></package><package arch="i686" name="libcurl-devel" release="42.el7_4.1" src="curl-7.29.0-42.el7_4.1.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-42.el7_4.1.i686.rpm</filename><sum type="sha256">f5463cd8890bbf5de47d4ed205fbfbe5e50fdb86d757ab6d23b4f3681e52608a</sum></package><package arch="x86_64" name="curl" release="42.el7_4.1" src="curl-7.29.0-42.el7_4.1.src.rpm" version="7.29.0"><filename>curl-7.29.0-42.el7_4.1.x86_64.rpm</filename><sum type="sha256">24250f70a5cca2515e49d12cdc9b4b21e31bcd4b3e45cf0d7e42a7cf8232f906</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000257" id="CVE-2017-1000257" title="Curl: Imap Fetch Response Out Of Bounds Read" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3263" id="RHSA-2017:3263-1" title="Rhsa-2017:3263-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1503705" id="1503705" title="Curl: Imap Fetch Response Out Of Bounds Read" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3269-1</id><title>Procmail</title><description>Security Fix(es): 
* A heap-based buffer overflow flaw was found in procmail's formail utility. A remote attacker could send a specially crafted email that, when processed by formail, could cause formail to crash or, possibly, execute arbitrary code as the user running formail. (CVE-2017-16844)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-11-29 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="procmail" release="36.el7_4.1" src="procmail-3.22-36.el7_4.1.src.rpm" version="3.22"><filename>procmail-3.22-36.el7_4.1.x86_64.rpm</filename><sum type="sha256">92622daeb4e79ebb95f3c9b5eaa69551de5b4726ec18575779dad2460a9436f4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16844" id="CVE-2017-16844" title="Procmail: Heap-Based Buffer Overflow In Loadbuf " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3269" id="RHSA-2017:3269-1" title="Rhsa-2017:3269-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1500070" id="1500070" title="Procmail: Heap-Based Buffer Overflow In Loadbuf " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3270-1</id><title>Apr</title><description>Security Fix(es): 
* An out-of-bounds array dereference was found in apr_time_exp_get(). An attacker could abuse an unvalidated usage of this function to cause a denial of service or potentially lead to data leak. (CVE-2017-12613)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-11-29 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="apr" release="3.el7_4.1" src="apr-1.4.8-3.el7_4.1.src.rpm" version="1.4.8"><filename>apr-1.4.8-3.el7_4.1.x86_64.rpm</filename><sum type="sha256">2cd86e6d72fb9fa725990bdc2181160560896885409e3f411215db48c1c0b03a</sum></package><package arch="i686" name="apr-devel" release="3.el7_4.1" src="apr-1.4.8-3.el7_4.1.src.rpm" version="1.4.8"><filename>apr-devel-1.4.8-3.el7_4.1.i686.rpm</filename><sum type="sha256">c9733277c4d652eb8358c0931948f6dd0fed31e39fd28cdd5d3cf0e5c49fa9da</sum></package><package arch="i686" name="apr" release="3.el7_4.1" src="apr-1.4.8-3.el7_4.1.src.rpm" version="1.4.8"><filename>apr-1.4.8-3.el7_4.1.i686.rpm</filename><sum type="sha256">161bccf556d84040f6893b2709c8f6ad7a10379463710e83146cd6351b3a4ea0</sum></package><package arch="x86_64" name="apr-devel" release="3.el7_4.1" src="apr-1.4.8-3.el7_4.1.src.rpm" version="1.4.8"><filename>apr-devel-1.4.8-3.el7_4.1.x86_64.rpm</filename><sum type="sha256">c5599307555f2353406616e108497d31cc63c2356c004438b9d10d56ec970ed5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12613" id="CVE-2017-12613" title="Apr: Out-Of-Bounds Array Deref In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3270" id="RHSA-2017:3270-1" title="Rhsa-2017:3270-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1506523" id="1506523" title="Apr: Out-Of-Bounds Array Deref In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3315-1</id><title>Kernel</title><description>Security Fix(es): 
* It was found that the timer functionality in the Linux kernel ALSA subsystem is prone to a race condition between read and ioctl system call handlers, resulting in an uninitialized memory disclosure to user space. A local user could use this flaw to read information belonging to other users. (CVE-2017-1000380, Moderate)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-12-01 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools-libs-devel" release="693.11.1.el7" src="kernel-3.10.0-693.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-693.11.1.el7.x86_64.rpm</filename><sum type="sha256">242c4833d2ba270c85a7ba55495fd96130b5505487978e946a9ad2cfc0e09809</sum></package><package arch="x86_64" name="kernel-devel" release="693.11.1.el7" src="kernel-3.10.0-693.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-693.11.1.el7.x86_64.rpm</filename><sum type="sha256">398e71c3844c73724fc21bf65db89887b591e3e6dee2cbd22ea3109e9cd3c73c</sum></package><package arch="x86_64" name="kernel-tools" release="693.11.1.el7" src="kernel-3.10.0-693.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-693.11.1.el7.x86_64.rpm</filename><sum type="sha256">687ed33a51c3c0028acda833db5e3f3c278bafb2852c2dcd343abd412e0f9509</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="693.11.1.el7" src="kernel-3.10.0-693.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-693.11.1.el7.noarch.rpm</filename><sum type="sha256">693ce3caebcc528d833a219722e80eb5e7b28536b71c0121362c4a289a8bbada</sum></package><package arch="x86_64" name="python-perf" release="693.11.1.el7" src="kernel-3.10.0-693.11.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-693.11.1.el7.x86_64.rpm</filename><sum type="sha256">8fa74cd84096559e03365998402fb67bde15d2d55a761e3b1506953ada545f6e</sum></package><package arch="x86_64" name="kernel-headers" release="693.11.1.el7" src="kernel-3.10.0-693.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-693.11.1.el7.x86_64.rpm</filename><sum type="sha256">ff9c3976fe585160375b5b1ff04b6f7b7a0f6d53ca0b7da3f2ab8fbed2b4d2a2</sum></package><package arch="x86_64" name="kernel" release="693.11.1.el7" src="kernel-3.10.0-693.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-693.11.1.el7.x86_64.rpm</filename><sum type="sha256">a781c69cf2b69d1cc0d5799173723a1dc5bee3d4d388e9ff49ea69a80b383e89</sum></package><package arch="x86_64" name="kernel-debug-devel" release="693.11.1.el7" src="kernel-3.10.0-693.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-693.11.1.el7.x86_64.rpm</filename><sum type="sha256">8661af80a1cd8c56f3c41c03c10b5533517f9bbc48227fa0884c74c2f093c0fc</sum></package><package arch="x86_64" name="kernel-debug" release="693.11.1.el7" src="kernel-3.10.0-693.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-693.11.1.el7.x86_64.rpm</filename><sum type="sha256">1f24694bb1040c398d970b78facaef157e8bf84acea031dc0cb9551a64a425f0</sum></package><package arch="x86_64" name="kernel-tools-libs" release="693.11.1.el7" src="kernel-3.10.0-693.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-693.11.1.el7.x86_64.rpm</filename><sum type="sha256">61ec67d34b26bb63a022a5a9d686c45aeed7b6d9fc4b0ffd2f08451632b7e156</sum></package><package arch="noarch" name="kernel-doc" release="693.11.1.el7" src="kernel-3.10.0-693.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-693.11.1.el7.noarch.rpm</filename><sum type="sha256">8759e5ab364cc5363407f946730c0154917b689f8526005105f8ce9f76a0ece5</sum></package><package arch="x86_64" name="perf" release="693.11.1.el7" src="kernel-3.10.0-693.11.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-693.11.1.el7.x86_64.rpm</filename><sum type="sha256">5e44c135807894b572a9741cb49f0c2ec3aa17c7bf961f87dc38f3c8a5c502fd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000380" id="CVE-2017-1000380" title="Kernel: Information Leak Due To A Data Race " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3315" id="RHSA-2017:3315-1" title="Rhsa-2017:3315-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1463311" id="1463311" title="Kernel: Information Leak Due To A Data Race " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3368-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* Quick Emulator (QEMU), compiled with the PC System Emulator with multiboot feature support, is vulnerable to an OOB r/w memory access issue. The issue could occur due to an integer overflow while loading a kernel image during a guest boot. A user or process could use this flaw to potentially achieve arbitrary code execution on a host. (CVE-2017-14167) 
* Quick emulator (QEMU), compiled with the Cirrus CLGD 54xx VGA Emulator support, is vulnerable to an OOB write access issue. The issue could occur while writing to VGA memory via mode4and5 write functions. A privileged user inside guest could use this flaw to crash the QEMU process resulting in Denial of Serivce (DoS). (CVE-2017-15289)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-12-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm" release="141.el7_4.4" src="qemu-kvm-1.5.3-141.el7_4.4.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-141.el7_4.4.x86_64.rpm</filename><sum type="sha256">2f332e0d92253c22fc667d1b19f6f29cfdce78ab68ae29fbaef2ebcd621e0137</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="141.el7_4.4" src="qemu-kvm-1.5.3-141.el7_4.4.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-141.el7_4.4.x86_64.rpm</filename><sum type="sha256">5f2f23ff34cfec150a84fe44ca604bafa7abb8876f29cda0632601ad95d08852</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="141.el7_4.4" src="qemu-kvm-1.5.3-141.el7_4.4.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-141.el7_4.4.x86_64.rpm</filename><sum type="sha256">74c4b8e24172ff39a5124fbb667b7be7a2094b496c710a1169fc23b5991843ab</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="141.el7_4.4" src="qemu-kvm-1.5.3-141.el7_4.4.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-141.el7_4.4.x86_64.rpm</filename><sum type="sha256">b95cc1eb83661563ab01905840c2718dc118355de996a47ec636ebf78e243dca</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14167" id="CVE-2017-14167" title="Qemu: I386: Multiboot Oob Access While Loading " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15289" id="CVE-2017-15289" title="Qemu: Cirrus: Oob Access Issue In Mode4And5 " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3368" id="RHSA-2017:3368-1" title="Rhsa-2017:3368-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1489375" id="1489375" title="Qemu: I386: Multiboot Oob Access While Loading " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1501290" id="1501290" title="Qemu: Cirrus: Oob Access Issue In Mode4And5 " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3372-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.5.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-7826, CVE-2017-7828, CVE-2017-7830)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-12-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_4" src="thunderbird-52.5.0-1.el7_4.src.rpm" version="52.5.0"><filename>thunderbird-52.5.0-1.el7_4.x86_64.rpm</filename><sum type="sha256">a68faf075c6dd0e14109a089eafe37b55191bd41d324ada61c6dcd2b022fa627</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7826" id="CVE-2017-7826" title="Mozilla: Memory Safety Bugs Fixed In Firefox 57 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7828" id="CVE-2017-7828" title="Mozilla: Use-After-Free Of Pressshell While " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7830" id="CVE-2017-7830" title="Mozilla: Cross-Origin Url Information Leak " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3372" id="RHSA-2017:3372-1" title="Rhsa-2017:3372-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1513308" id="1513308" title="Mozilla: Memory Safety Bugs Fixed In Firefox 57 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1513310" id="1513310" title="Mozilla: Use-After-Free Of Pressshell While " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1513311" id="1513311" title="Mozilla: Cross-Origin Url Information Leak " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3379-1</id><title>Sssd</title><description>Security Fix(es): 
* It was found that sssd's sysdb_search_user_by_upn_res() function did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it. (CVE-2017-12173) 
Bug Fix(es): 
* Previously, SSSD's krb5 provider did not respect changed UIDs in ID views overriding the default view. Consequently, Kerberos credential caches were created with the incorrect, original UID, and processes of the user were not able to find the changed UID. With this update, SSSD's krb5 provider is made aware of the proper ID view name and respects the ID override data. As a result, the Kerberos credential cache is now created with the expected UID, and the processes can find it. 
* Previously, the list of cache request domains was sometimes freed in the middle of a cache request operation due to the refresh domains request, as they both were using the same list. As a consequence, a segmentation fault sometimes occurred in SSSD. With this update, SSSD uses a copy of the cache request domains' list for each cache request. As a result, SSSD no longer crashes in this case. 
* Previously, the calls provided by SSSD to send data to the Privilege Attribute Certificate (PAC) responder did not use a mutex or any other means to serialize access to the PAC responder from a single process. When multithreaded applications overran the PAC responder with multiple parallel requests, some threads did not receive a proper reply. Consequently, such threads only resumed work after waiting 5 minutes for a response. This update configures mutex to serialize access to the PAC responder socket for multithreaded applications. As a result, all threads now get a proper and timely reply.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-12-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libsss_simpleifp" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libsss_simpleifp-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">66895df6c08498094900a1f685bfa05bb9a1474b0f93db29a947be38afbb2fa9</sum></package><package arch="x86_64" name="sssd-kcm" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-kcm-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">532f4a3947c85565b7e42b283342c0600c52ee63b41e4cefdef10e25dc1ea7ed</sum></package><package arch="x86_64" name="sssd-libwbclient-devel" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-libwbclient-devel-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">3eecc9d9b790c124e40cc7c4c0bb8d92fb6e797386a7d99c53cd32112e892561</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libsss_nss_idmap-devel-1.15.2-50.el7_4.8.i686.rpm</filename><sum type="sha256">0c4685838fbc6468cff1a4041f6d6ff7542cf9570671e1e5677f087f22ecc30e</sum></package><package arch="x86_64" name="python-libsss_nss_idmap" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>python-libsss_nss_idmap-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">367cada7ea1458a8f67168cd47a88cf200ebb746499c10bdf9411ba5512e0299</sum></package><package arch="x86_64" name="sssd-common" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-common-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">1ba4e366fc24964449de294c2bf4b6d423d801c5b5a1f11e252514c6947efcb3</sum></package><package arch="i686" name="libsss_idmap" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libsss_idmap-1.15.2-50.el7_4.8.i686.rpm</filename><sum type="sha256">dedecd62f7e72e970fad2d96aaa9ad588ef0c74576601a3944954ab33e787f70</sum></package><package arch="noarch" name="python-sssdconfig" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>python-sssdconfig-1.15.2-50.el7_4.8.noarch.rpm</filename><sum type="sha256">37d6823409d62a96a530bbf7e7b1ef3186158ee2ff22cc75bde330a8bed18360</sum></package><package arch="i686" name="libipa_hbac" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libipa_hbac-1.15.2-50.el7_4.8.i686.rpm</filename><sum type="sha256">f08ea91c43ca440d4c7ee137373a982a125589e3fab6f6af6fa076bf14301dfc</sum></package><package arch="i686" name="sssd-libwbclient-devel" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-libwbclient-devel-1.15.2-50.el7_4.8.i686.rpm</filename><sum type="sha256">33d9e4b40807d102a18bfe4b0fc01bbc785b10a55a9e0613f74c3c6a613ccf24</sum></package><package arch="i686" name="libsss_certmap-devel" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libsss_certmap-devel-1.15.2-50.el7_4.8.i686.rpm</filename><sum type="sha256">1b6355669f28e4ed3f4816be42316f07564186543551b651e7a055ed4da6410b</sum></package><package arch="x86_64" name="sssd-ldap" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-ldap-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">aef1f75e062fbe630f705035e4d787e33007fe4df166ceed26859cbbdff4a79f</sum></package><package arch="i686" name="sssd-client" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-client-1.15.2-50.el7_4.8.i686.rpm</filename><sum type="sha256">ca9c561901658be57b013a8876727643dcb5ef730b2da3097efd643ee7036ba5</sum></package><package arch="x86_64" name="sssd-client" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-client-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">f51b61bd41b753a3707c8efeb81f5748bf7ef17e7fc56c3bcd3390c0d15c777b</sum></package><package arch="x86_64" name="libsss_nss_idmap" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libsss_nss_idmap-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">a8509259969eef780d7f73f2122e225ddec25be56bd8a32f164332fec3a24617</sum></package><package arch="x86_64" name="libsss_autofs" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libsss_autofs-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">c815e1a3a26832f636f07a47ae442aedb5412a44be2c31c6f0e7d03bc7789512</sum></package><package arch="x86_64" name="sssd-ad" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-ad-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">83cac65bd821b833dd55fe4585ee16ff1fdfec74e347d4ca4a9355ea01bccdda</sum></package><package arch="x86_64" name="sssd-libwbclient" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-libwbclient-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">347df35d7fb7f5915f7956e75e61e6a4ad246eb15dba5a8c1de7419990113cf9</sum></package><package arch="x86_64" name="libsss_simpleifp-devel" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libsss_simpleifp-devel-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">26f5fb530aac46b2a38adcd3e9de4faeaa3c7af0fc59ad5837bac288028a7149</sum></package><package arch="i686" name="libsss_certmap" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libsss_certmap-1.15.2-50.el7_4.8.i686.rpm</filename><sum type="sha256">b141eeebc763896db673e2afe6bca195e091f66ad55f1818e164f4bc8326c1d4</sum></package><package arch="x86_64" name="sssd-proxy" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-proxy-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">c96403d133eb959ae327d7a43c48ecbe249374ca0061fa30ea80439c18b02201</sum></package><package arch="x86_64" name="sssd-winbind-idmap" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-winbind-idmap-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">670c3943db2196a0215ca1f6e01a935950902742ed40da07b782d49f497bb033</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libsss_idmap-devel-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">134fb75c8f4fc31d32f40717d7ca5065e6d670e0f6ff17f7866e039bbded8cd5</sum></package><package arch="x86_64" name="libsss_certmap" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libsss_certmap-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">6c2345a37f8acdd35d741ac6c1216f7c13788634efa2582bf87be44700f6b8a9</sum></package><package arch="x86_64" name="python-libipa_hbac" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>python-libipa_hbac-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">e4d0c5017f14cb4af647a72c929faf643ee49aa9caee9edef6ed52863cb24e0b</sum></package><package arch="x86_64" name="sssd-krb5-common" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-krb5-common-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">5bc4fc72b2737bf3a9ffd6d6d1230779d72367ba64318307b7d2b3de1817c79f</sum></package><package arch="x86_64" name="sssd-dbus" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-dbus-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">befb489cc3a5009ab8c7fafe8a789460bbf91a4dd76b0610030a14dcaabd363a</sum></package><package arch="x86_64" name="libsss_idmap" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libsss_idmap-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">f29a823c6b02c2425813c282f404f27841f8efe0ef4d1d6418cda142865ec0d8</sum></package><package arch="x86_64" name="sssd-common-pac" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-common-pac-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">674e7ed9fa88f83cc0b8edb085eb88c0053d7fd9a2f3605eb916f459d68dd417</sum></package><package arch="i686" name="libsss_simpleifp" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libsss_simpleifp-1.15.2-50.el7_4.8.i686.rpm</filename><sum type="sha256">857681ae1d6f59c55668c285eb82e4c13a0d0f0cb641ff6bd11de96d4c30b1ec</sum></package><package arch="x86_64" name="libipa_hbac" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libipa_hbac-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">2f4654a832180e472770399902ad19f24f77e9a43989701645c2ef01632dd91c</sum></package><package arch="i686" name="libipa_hbac-devel" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libipa_hbac-devel-1.15.2-50.el7_4.8.i686.rpm</filename><sum type="sha256">620c81021c7c05ae9f293b6c150869446f97ed2449af126d4f4694c0e2a0646d</sum></package><package arch="x86_64" name="sssd-ipa" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-ipa-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">3e0d8e814c52970416b33af18a466acd7bd814115506b28872146ebac8cb6a9b</sum></package><package arch="i686" name="libsss_nss_idmap" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libsss_nss_idmap-1.15.2-50.el7_4.8.i686.rpm</filename><sum type="sha256">a65749e99fe4423a499c0eb00584d37290cb1055de0e60c10f2ee5b034179717</sum></package><package arch="x86_64" name="libsss_certmap-devel" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libsss_certmap-devel-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">fcf144cdd0c6d56344ea00cc1de18ca39c420f4c6da5703f5a3c57d9d449d917</sum></package><package arch="i686" name="libsss_idmap-devel" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libsss_idmap-devel-1.15.2-50.el7_4.8.i686.rpm</filename><sum type="sha256">f181b2afc12396ecec92f98626c1c8a4ad48fd7294d995f5ccf789e67f10a995</sum></package><package arch="x86_64" name="sssd-polkit-rules" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-polkit-rules-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">dc28e857f5c54a905fb0748f6bdc895c8bcfa064fe8429008e8def4cf96cb151</sum></package><package arch="x86_64" name="sssd" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">5296a1c45a29bf13bb6d1917b3b16d4b39f0d287140ec15c8c9fbe808de10fde</sum></package><package arch="x86_64" name="libsss_nss_idmap-devel" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libsss_nss_idmap-devel-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">2aa2312c6818cde4a454754db382b1ee23bd09ee7c37555f472388b69946e759</sum></package><package arch="x86_64" name="libsss_sudo" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libsss_sudo-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">ec06b205c602482cbb1de726e20de5b170b22d674837c161f560192f51cbc9e3</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libipa_hbac-devel-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">497ed68d4a5ad0e84c4223e0f84b1714f934b631784f770f25c8ceb494b96a5d</sum></package><package arch="i686" name="libsss_simpleifp-devel" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>libsss_simpleifp-devel-1.15.2-50.el7_4.8.i686.rpm</filename><sum type="sha256">1ff95bf97d36252fb15d323c27f957fe6f5d3c26d71fd64e7e4490936a0b7a2c</sum></package><package arch="x86_64" name="python-sss-murmur" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>python-sss-murmur-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">fa1e0995068edb0019b1b3731db843fccff972b56a49770b7724d21a41be67cb</sum></package><package arch="x86_64" name="sssd-tools" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-tools-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">6f8f71647dc693369e38aca500313941426460f9102da7bb75d5be584366dc6e</sum></package><package arch="x86_64" name="python-sss" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>python-sss-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">961d01dfdaa1941dc2a1930c62ef38ccad3a431effff1ee4628636d142b8dfdd</sum></package><package arch="x86_64" name="sssd-krb5" release="50.el7_4.8" src="sssd-1.15.2-50.el7_4.8.src.rpm" version="1.15.2"><filename>sssd-krb5-1.15.2-50.el7_4.8.x86_64.rpm</filename><sum type="sha256">7f8ef1d25f4f3922fd3bdef37950937f2d90789e491d38a451158094955afeb0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12173" id="CVE-2017-12173" title="Sssd: Unsanitized Input When Searching In Local " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3379" id="RHSA-2017:3379-1" title="Rhsa-2017:3379-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1498173" id="1498173" title="Sssd: Unsanitized Input When Searching In Local " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1506142" id="1506142" title="Sssd Can Crash Due To Abi Changes In Libldb &gt;= 1.2.0 (1.1.30) " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1506682" id="1506682" title="Sssd_Client: Add Mutex Protected Call To The Pac Responder " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1509177" id="1509177" title="Race Condition Between Refreshing The Cr_Domain List And A " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3382-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.5.1 ESR. 
Security Fix(es): 
* A privacy flaw was discovered in Firefox. In Private Browsing mode, a web worker could write persistent data to IndexedDB, which was not cleared when exiting and would persist across multiple sessions. A malicious website could exploit the flaw to bypass private-browsing protections and uniquely fingerprint visitors. (CVE-2017-7843)</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-12-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_4" src="firefox-52.5.1-1.el7_4.src.rpm" version="52.5.1"><filename>firefox-52.5.1-1.el7_4.i686.rpm</filename><sum type="sha256">949cab49fb2e8dfc0caf408cbda833cf469c7c2a76b5c15e31d82176192fd5d9</sum></package><package arch="x86_64" name="firefox" release="1.el7_4" src="firefox-52.5.1-1.el7_4.src.rpm" version="52.5.1"><filename>firefox-52.5.1-1.el7_4.x86_64.rpm</filename><sum type="sha256">bd4a3a7f063fafacae83f43a85d89d782ae4884045f78e9ca8e264f071a2f849</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7843" id="CVE-2017-7843" title="Mozilla: Web Worker In Private Browsing Mode Can " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3382" id="RHSA-2017:3382-1" title="Rhsa-2017:3382-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1518566" id="1518566" title="Mozilla: Web Worker In Private Browsing Mode Can " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3384-1</id><title>Liblouis</title><description>Security Fix(es): 
* A missing fix for one stack-based buffer overflow in findTable() for CVE-2014-8184 was discovered. An attacker could cause denial of service or potentially allow arbitrary code execution. (CVE-2017-15101)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-12-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="liblouis-python" release="12.el7_4" src="liblouis-2.5.2-12.el7_4.src.rpm" version="2.5.2"><filename>liblouis-python-2.5.2-12.el7_4.noarch.rpm</filename><sum type="sha256">3ab09963a77b3d6a1cf441341806c08046309a0b349cee2cc7fc15c627bd9171</sum></package><package arch="x86_64" name="liblouis-utils" release="12.el7_4" src="liblouis-2.5.2-12.el7_4.src.rpm" version="2.5.2"><filename>liblouis-utils-2.5.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">1c19ccf982124046bb6e851e064f3fb6fb3057f03e435cd45b33bb4c0eae65e1</sum></package><package arch="x86_64" name="liblouis" release="12.el7_4" src="liblouis-2.5.2-12.el7_4.src.rpm" version="2.5.2"><filename>liblouis-2.5.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">8f0b4623d06636e433a885b2f3c7fc626b5d58370edf6b2a53254e8e6867695d</sum></package><package arch="noarch" name="liblouis-doc" release="12.el7_4" src="liblouis-2.5.2-12.el7_4.src.rpm" version="2.5.2"><filename>liblouis-doc-2.5.2-12.el7_4.noarch.rpm</filename><sum type="sha256">9963ee3f596ecee42dc015ff25e71dc80d2e9af2b4df00a4a332b30fe98abea7</sum></package><package arch="i686" name="liblouis" release="12.el7_4" src="liblouis-2.5.2-12.el7_4.src.rpm" version="2.5.2"><filename>liblouis-2.5.2-12.el7_4.i686.rpm</filename><sum type="sha256">86d992e858de1741f20a550ba6538a0277836f00720ae3d61d20822450c6009e</sum></package><package arch="x86_64" name="liblouis-devel" release="12.el7_4" src="liblouis-2.5.2-12.el7_4.src.rpm" version="2.5.2"><filename>liblouis-devel-2.5.2-12.el7_4.x86_64.rpm</filename><sum type="sha256">fac1d4903034c0e5d345695c903e30c01f12f9aff2ddac804810383fba213d49</sum></package><package arch="i686" name="liblouis-devel" release="12.el7_4" src="liblouis-2.5.2-12.el7_4.src.rpm" version="2.5.2"><filename>liblouis-devel-2.5.2-12.el7_4.i686.rpm</filename><sum type="sha256">a5c24ed6c4f83d61b99649e2fdee4557de805a8fcdb88ae3035165c6cc25913c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15101" id="CVE-2017-15101" title="Liblouis: Incomplete Fix For Cve-2014-8184" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3384" id="RHSA-2017:3384-1" title="Rhsa-2017:3384-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1511023" id="1511023" title="Liblouis: Incomplete Fix For Cve-2014-8184" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3392-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were discovered in the RMI and Hotspot components in OpenJDK. An untrusted Java application or applet could use these flaws to completely bypass Java sandbox restrictions. (CVE-2017-10285, CVE-2017-10346) 
* It was discovered that the Kerberos client implementation in the Libraries component of OpenJDK used the sname field from the plain text part rather than encrypted part of the KDC reply message. A man-in-the- middle attacker could possibly use this flaw to impersonate Kerberos services to Java applications acting as Kerberos clients. (CVE-2017-10388) 
* It was discovered that the Security component of OpenJDK generated weak password-based encryption keys used to protect private keys stored in key stores. This made it easier to perform password guessing attacks to decrypt stored keys if an attacker could gain access to a key store. (CVE-2017-10356) 
* Multiple flaws were found in the Smart Card IO and Security components in OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2017-10274, CVE-2017-10193) 
* It was found that the FtpClient implementation in the Networking component of OpenJDK did not set connect and read timeouts by default. A malicious FTP server or a man-in-the-middle attacker could use this flaw to block execution of a Java application connecting to an FTP server. (CVE-2017-10355) 
* It was found that the HttpURLConnection and HttpsURLConnection classes in the Networking component of OpenJDK failed to check for newline characters embedded in URLs. An attacker able to make a Java application perform an HTTP request using an attacker provided URL could possibly inject additional headers into the request. (CVE-2017-10295) 
* It was discovered that the Security component of OpenJDK could fail to properly enforce restrictions defined for processing of X.509 certificate chains. A remote attacker could possibly use this flaw to make Java accept certificate using one of the disabled algorithms. (CVE-2017-10198) 
* It was discovered that multiple classes in the JAXP, Serialization, Libraries, and JAX-WS components of OpenJDK did not limit the amount of memory allocated when creating object instances from the serialized form. A specially-crafted input could cause a Java application to use an excessive amount of memory when deserialized. (CVE-2017-10349, CVE-2017-10357, CVE-2017-10347, CVE-2017-10281, CVE-2017-10345, CVE-2017-10348, CVE-2017-10350) 
Bug Fix(es): 
* Previously, OpenJDK could not handle situations when the kernel blocked on a read even when polling the socket indicated that a read is possible. As a consequence, OpenJDK could hang indefinitely. With this update, OpenJDK polls with a timeout and performs a non-blocking read on success, and it no longer hangs in these situations.</description><severity>important</severity><release>Scientific Linux</release><issued date="2017-12-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.12.0.el7_4" src="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4.src.rpm" version="1.7.0.161"><filename>java-1.7.0-openjdk-devel-1.7.0.161-2.6.12.0.el7_4.x86_64.rpm</filename><sum type="sha256">dd6e40dab306bf63205a0700337722734a18959c349964c4e246ecf60052c20f</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.12.0.el7_4" src="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4.src.rpm" version="1.7.0.161"><filename>java-1.7.0-openjdk-src-1.7.0.161-2.6.12.0.el7_4.x86_64.rpm</filename><sum type="sha256">08f8bef6a656a9e25e16153663fc6ce38ca819cae19fa59a4d1df7b5829c441d</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.12.0.el7_4" src="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4.src.rpm" version="1.7.0.161"><filename>java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4.x86_64.rpm</filename><sum type="sha256">0e0fc60360b35ccd79e07ef8df89f0c5ab1f554a2449b10ce5e1b9713e34584c</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.12.0.el7_4" src="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4.src.rpm" version="1.7.0.161"><filename>java-1.7.0-openjdk-demo-1.7.0.161-2.6.12.0.el7_4.x86_64.rpm</filename><sum type="sha256">91e39241561d53511117fda5e35329cbe07854db4a72e0be5b92e3431bde7ac1</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.12.0.el7_4" src="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4.src.rpm" version="1.7.0.161"><filename>java-1.7.0-openjdk-accessibility-1.7.0.161-2.6.12.0.el7_4.x86_64.rpm</filename><sum type="sha256">c45c1bded503372446c4acd0dd59e5a39c6868d0808fdfd5f039f8b468ed4602</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.12.0.el7_4" src="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4.src.rpm" version="1.7.0.161"><filename>java-1.7.0-openjdk-headless-1.7.0.161-2.6.12.0.el7_4.x86_64.rpm</filename><sum type="sha256">4c4d31037ead8efa3f82cde3db1dc4c494009aa64b3a9b11f93bcfefcbe838d3</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.12.0.el7_4" src="java-1.7.0-openjdk-1.7.0.161-2.6.12.0.el7_4.src.rpm" version="1.7.0.161"><filename>java-1.7.0-openjdk-javadoc-1.7.0.161-2.6.12.0.el7_4.noarch.rpm</filename><sum type="sha256">1d5daa35c0bf2d3d93dd0dd46116dcd72df39a7cf0c613853b2fb6ef93269967</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10193" id="CVE-2017-10193" title="Openjdk: Incorrect Key Size Constraint Check " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10198" id="CVE-2017-10198" title="Openjdk: Incorrect Enforcement Of Certificate " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10274" id="CVE-2017-10274" title="Openjdk: Cardimpl Incorrect State Handling " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10281" id="CVE-2017-10281" title="Openjdk: Multiple Unbounded Memory Allocations " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10285" id="CVE-2017-10285" title="Openjdk: Incorrect Privilege Use When Handling " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10295" id="CVE-2017-10295" title="Openjdk: Http Client Insufficient Check For " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10345" id="CVE-2017-10345" title="Openjdk: Unbounded Resource Use In Jcekeystore " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10346" id="CVE-2017-10346" title="Openjdk: Insufficient Loader Constraints Checks " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10347" id="CVE-2017-10347" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10348" id="CVE-2017-10348" title="Openjdk: Multiple Unbounded Memory Allocations " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10349" id="CVE-2017-10349" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10350" id="CVE-2017-10350" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10355" id="CVE-2017-10355" title="Openjdk: No Default Network Operations Timeouts " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10356" id="CVE-2017-10356" title="Openjdk: Weak Protection Of Key Stores Against " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10357" id="CVE-2017-10357" title="Openjdk: Unbounded Memory Allocation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10388" id="CVE-2017-10388" title="Openjdk: Use Of Unprotected Sname In Kerberos " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3392" id="RHSA-2017:3392-1" title="Rhsa-2017:3392-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471715" id="1471715" title="Openjdk: Incorrect Key Size Constraint Check " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472320" id="1472320" title="Openjdk: Incorrect Enforcement Of Certificate " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1501868" id="1501868" title="Openjdk: Incorrect Privilege Use When Handling " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1501873" id="1501873" title="Openjdk: Insufficient Loader Constraints Checks " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502038" id="1502038" title="Openjdk: Use Of Unprotected Sname In Kerberos " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502053" id="1502053" title="Openjdk: Cardimpl Incorrect State Handling " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502611" id="1502611" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502614" id="1502614" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502629" id="1502629" title="Openjdk: Multiple Unbounded Memory Allocations " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502632" id="1502632" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502640" id="1502640" title="Openjdk: Unbounded Memory Allocation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502649" id="1502649" title="Openjdk: Multiple Unbounded Memory Allocations " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502687" id="1502687" title="Openjdk: Http Client Insufficient Check For " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502858" id="1502858" title="Openjdk: Unbounded Resource Use In Jcekeystore " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502869" id="1502869" title="Openjdk: No Default Network Operations Timeouts " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1503169" id="1503169" title="Openjdk: Weak Protection Of Key Stores Against " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2017:3402-1</id><title>Postgresql</title><description>Security Fix(es): 
* Privilege escalation flaws were found in the initialization scripts of PostgreSQL. An attacker with access to the postgres user account could use these flaws to obtain root access on the server machine. (CVE-2017-12172, CVE-2017-15097) 
Note: This patch drops the script privileges from root to the postgres user. Therefore, this update works properly only if the postgres user has write access to the postgres' home directory, such as the one in the default configuration (/var/lib/pgsql).</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2017-12-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="postgresql-plpython" release="3.el7_4" src="postgresql-9.2.23-3.el7_4.src.rpm" version="9.2.23"><filename>postgresql-plpython-9.2.23-3.el7_4.x86_64.rpm</filename><sum type="sha256">218745f2c40032aad2f4a2938156c64eb06404734e73b2b77412a734cef9f0c2</sum></package><package arch="x86_64" name="postgresql-devel" release="3.el7_4" src="postgresql-9.2.23-3.el7_4.src.rpm" version="9.2.23"><filename>postgresql-devel-9.2.23-3.el7_4.x86_64.rpm</filename><sum type="sha256">ca640939d299beac0efd4523efa8d9e48ff01af507cab8c0124fac342fc56e52</sum></package><package arch="x86_64" name="postgresql-contrib" release="3.el7_4" src="postgresql-9.2.23-3.el7_4.src.rpm" version="9.2.23"><filename>postgresql-contrib-9.2.23-3.el7_4.x86_64.rpm</filename><sum type="sha256">cd469dff7c8899fa546707d3c3643afdcc978acc31a6587a12b6247374710717</sum></package><package arch="x86_64" name="postgresql-docs" release="3.el7_4" src="postgresql-9.2.23-3.el7_4.src.rpm" version="9.2.23"><filename>postgresql-docs-9.2.23-3.el7_4.x86_64.rpm</filename><sum type="sha256">c939f5a3c0c6d95070c9858252041d6af59d77f32e859dafabde003d773c3d00</sum></package><package arch="i686" name="postgresql" release="3.el7_4" src="postgresql-9.2.23-3.el7_4.src.rpm" version="9.2.23"><filename>postgresql-9.2.23-3.el7_4.i686.rpm</filename><sum type="sha256">d6aea4ff057cdad3cf44c2bece08114195267c75afa73758171d9ca5fed496a7</sum></package><package arch="x86_64" name="postgresql-libs" release="3.el7_4" src="postgresql-9.2.23-3.el7_4.src.rpm" version="9.2.23"><filename>postgresql-libs-9.2.23-3.el7_4.x86_64.rpm</filename><sum type="sha256">3d92a85a92d15ca31c6301c42b50ad5f10c5971179f6db69d1531b4e1539c9a2</sum></package><package arch="x86_64" name="postgresql-plperl" release="3.el7_4" src="postgresql-9.2.23-3.el7_4.src.rpm" version="9.2.23"><filename>postgresql-plperl-9.2.23-3.el7_4.x86_64.rpm</filename><sum type="sha256">4a72a459b5c5953292e317b3c642a421eb52a8bbf3786da9f3763d1017349777</sum></package><package arch="i686" name="postgresql-static" release="3.el7_4" src="postgresql-9.2.23-3.el7_4.src.rpm" version="9.2.23"><filename>postgresql-static-9.2.23-3.el7_4.i686.rpm</filename><sum type="sha256">d25b5cec6410ff9465636009d60f77a54000cd883cbeb3b83a002a453bd29da9</sum></package><package arch="x86_64" name="postgresql-pltcl" release="3.el7_4" src="postgresql-9.2.23-3.el7_4.src.rpm" version="9.2.23"><filename>postgresql-pltcl-9.2.23-3.el7_4.x86_64.rpm</filename><sum type="sha256">b3247e5199574c4ed69e2637bb45836f85f44930e0306e1f4f9a1473a936910b</sum></package><package arch="x86_64" name="postgresql" release="3.el7_4" src="postgresql-9.2.23-3.el7_4.src.rpm" version="9.2.23"><filename>postgresql-9.2.23-3.el7_4.x86_64.rpm</filename><sum type="sha256">c8b88beede7515b66d0c2f1f5cceeb20f87120093bd6e8f8ddcc92c3095d5c0a</sum></package><package arch="x86_64" name="postgresql-test" release="3.el7_4" src="postgresql-9.2.23-3.el7_4.src.rpm" version="9.2.23"><filename>postgresql-test-9.2.23-3.el7_4.x86_64.rpm</filename><sum type="sha256">6523160e1ade8838645a7ef0e9ec9e16ba86c1fa32bfb830a659828494fa5817</sum></package><package arch="i686" name="postgresql-libs" release="3.el7_4" src="postgresql-9.2.23-3.el7_4.src.rpm" version="9.2.23"><filename>postgresql-libs-9.2.23-3.el7_4.i686.rpm</filename><sum type="sha256">fa853eefadd20a4626cab314b39821be95beec86b7db9838294eba80b4446aa4</sum></package><package arch="x86_64" name="postgresql-server" release="3.el7_4" src="postgresql-9.2.23-3.el7_4.src.rpm" version="9.2.23"><filename>postgresql-server-9.2.23-3.el7_4.x86_64.rpm</filename><sum type="sha256">06c20eb3bfba6286fab99ad1696d7f4d89baeaafb151eca0d112384e647c5058</sum></package><package arch="x86_64" name="postgresql-upgrade" release="3.el7_4" src="postgresql-9.2.23-3.el7_4.src.rpm" version="9.2.23"><filename>postgresql-upgrade-9.2.23-3.el7_4.x86_64.rpm</filename><sum type="sha256">3c4d1eed204622773f3c82e7ffec143557fcae7bb84059f4fec36c176dae85ca</sum></package><package arch="x86_64" name="postgresql-static" release="3.el7_4" src="postgresql-9.2.23-3.el7_4.src.rpm" version="9.2.23"><filename>postgresql-static-9.2.23-3.el7_4.x86_64.rpm</filename><sum type="sha256">e54c3574c37bd558afde8f3923ad0ca9c3c24acc56a78503ae9f40c87456ecbb</sum></package><package arch="i686" name="postgresql-devel" release="3.el7_4" src="postgresql-9.2.23-3.el7_4.src.rpm" version="9.2.23"><filename>postgresql-devel-9.2.23-3.el7_4.i686.rpm</filename><sum type="sha256">15f628e7fbe42a20cc5314177f8434a227aca7435eb8caeac36cf010a250b698</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12172" id="CVE-2017-12172" title="Postgresql: Start Scripts Permit Database " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15097" id="CVE-2017-15097" title="Postgresql: Start Scripts Permit Database " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2017:3402" id="RHSA-2017:3402-1" title="Rhsa-2017:3402-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1498394" id="1498394" title="Postgresql: Start Scripts Permit Database " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1508985" id="1508985" title="Postgresql: Start Scripts Permit Database " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0007-1</id><title>Kernel</title><description>Security Fix(es): 
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. 
Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. The performance impact of these patches may vary considerably based on workload and hardware configuration. 
In this update mitigations for x86-64 architecture are provided. 
Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5753, Important) 
Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715, Important) 
Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. (CVE-2017-5754, Important) 
Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-01-03 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-headers" release="693.11.6.el7" src="kernel-3.10.0-693.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-693.11.6.el7.x86_64.rpm</filename><sum type="sha256">45822802e5ca43e6497f6e4408c364f485f77591b1b6efd0be2355f0246c213c</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="693.11.6.el7" src="kernel-3.10.0-693.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-693.11.6.el7.noarch.rpm</filename><sum type="sha256">7dc499dcc2e027c314d5407aa501b5ca089b9eaade6da9ccee21646dec006d0a</sum></package><package arch="x86_64" name="kernel-tools" release="693.11.6.el7" src="kernel-3.10.0-693.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-693.11.6.el7.x86_64.rpm</filename><sum type="sha256">3d75d2a4db6faa99e67d1a7ca2f9e1a04aec41e0492ae15799cc6f8214d354d6</sum></package><package arch="x86_64" name="kernel" release="693.11.6.el7" src="kernel-3.10.0-693.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-693.11.6.el7.x86_64.rpm</filename><sum type="sha256">cc25be5a1d8e55a6a36a78e0eaace1a1401625d9e258f256c37534f41bbac734</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="693.11.6.el7" src="kernel-3.10.0-693.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-693.11.6.el7.x86_64.rpm</filename><sum type="sha256">136242974c07ce550d10029240e30398903a152be1fe685cc64bad6405319bb4</sum></package><package arch="x86_64" name="perf" release="693.11.6.el7" src="kernel-3.10.0-693.11.6.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-693.11.6.el7.x86_64.rpm</filename><sum type="sha256">e8ec8a6ed4b7eec049f339ef916414b8bbb851970938dcabd82e49015858d553</sum></package><package arch="noarch" name="kernel-doc" release="693.11.6.el7" src="kernel-3.10.0-693.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-693.11.6.el7.noarch.rpm</filename><sum type="sha256">2b59ddd02be5a7d3926d4b03be8809116c61cb0e65818fd4ea23462911fdc336</sum></package><package arch="x86_64" name="kernel-tools-libs" release="693.11.6.el7" src="kernel-3.10.0-693.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-693.11.6.el7.x86_64.rpm</filename><sum type="sha256">9de643c0185dcb5221b1866e78b8df7776c0d4491ad9e6aecfd52a3af86412c7</sum></package><package arch="x86_64" name="python-perf" release="693.11.6.el7" src="kernel-3.10.0-693.11.6.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-693.11.6.el7.x86_64.rpm</filename><sum type="sha256">7092fa73854838a1f3674a1a89e385bf8966461d94f7a42ba8050ee63a21a16a</sum></package><package arch="x86_64" name="kernel-devel" release="693.11.6.el7" src="kernel-3.10.0-693.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-693.11.6.el7.x86_64.rpm</filename><sum type="sha256">30f46c8cc4f56e37d69bcfba90b9551704c446d5a9263def3765fa9914fda2de</sum></package><package arch="x86_64" name="kernel-debug" release="693.11.6.el7" src="kernel-3.10.0-693.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-693.11.6.el7.x86_64.rpm</filename><sum type="sha256">1abba93d04e4c7c8fecd97d351b7c31947423ccf1e4451f2be99bf8d50c74e9c</sum></package><package arch="x86_64" name="kernel-debug-devel" release="693.11.6.el7" src="kernel-3.10.0-693.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-693.11.6.el7.x86_64.rpm</filename><sum type="sha256">d3cfe8e65a9528346e375969b865f0483cb89b68dcf7310a1c93e1d66b49e2ed</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" id="CVE-2017-5715" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" id="CVE-2017-5753" title="Hw: Cpu: Speculative Execution Bounds-Check Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754" id="CVE-2017-5754" title="Hw: Cpu: Speculative Execution Permission Faults Handling" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0007" id="RHSA-2018:0007-1" title="Rhsa-2018:0007-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519778" id="1519778" title="Hw: Cpu: Speculative Execution Bounds-Check Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519780" id="1519780" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519781" id="1519781" title="Hw: Cpu: Speculative Execution Permission Faults Handling" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0012-1</id><title>Microcode_Ctl</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715) 
Note: This is the microcode counterpart of the CVE-2017-5715 kernel mitigation.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="22.2.el7" src="microcode_ctl-2.1-22.2.el7.src.rpm" version="2.1"><filename>microcode_ctl-2.1-22.2.el7.x86_64.rpm</filename><sum type="sha256">82376a765cb8cad5b4ae31b69168497ccd10b8a48dd216a4693c96ca9005a18c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" id="CVE-2017-5715" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0012" id="RHSA-2018:0012-1" title="Rhsa-2018:0012-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519780" id="1519780" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0014-1</id><title>Linux-Firmware</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715) 
Note: This is the microcode counterpart of the CVE-2017-5715 kernel mitigation.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-01-04 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="iwl7265-firmware" release="57.el7_4" src="linux-firmware-20170606-57.gitc990aae.el7_4.src.rpm" version="22.0.7.0"><filename>iwl7265-firmware-22.0.7.0-57.el7_4.noarch.rpm</filename><sum type="sha256">84d272e87c59a2ed34161ca451c45361d7cdf8a66c53cbec029bdde750b63227</sum></package><package arch="noarch" name="linux-firmware" release="57.gitc990aae.el7_4" src="linux-firmware-20170606-57.gitc990aae.el7_4.src.rpm" version="20170606"><filename>linux-firmware-20170606-57.gitc990aae.el7_4.noarch.rpm</filename><sum type="sha256">9856bcd3b6708eb0e6416b6beaaa2a86e51acfa713b862dcdc40fbb5a17059f0</sum></package><package arch="noarch" name="iwl3945-firmware" release="57.el7_4" src="linux-firmware-20170606-57.gitc990aae.el7_4.src.rpm" version="15.32.2.9"><filename>iwl3945-firmware-15.32.2.9-57.el7_4.noarch.rpm</filename><sum type="sha256">24638594d3ee7e8acc574ddf0c5f59ac067a6324f882696970de13716e0cdce9</sum></package><package arch="noarch" name="iwl105-firmware" release="57.el7_4" src="linux-firmware-20170606-57.gitc990aae.el7_4.src.rpm" version="18.168.6.1"><filename>iwl105-firmware-18.168.6.1-57.el7_4.noarch.rpm</filename><sum type="sha256">976a082fcbd7aae094379db135c28f82528af13ddbfada8074553342eb22f597</sum></package><package arch="noarch" name="iwl6050-firmware" release="57.el7_4" src="linux-firmware-20170606-57.gitc990aae.el7_4.src.rpm" version="41.28.5.1"><filename>iwl6050-firmware-41.28.5.1-57.el7_4.noarch.rpm</filename><sum type="sha256">b0043b0fb75f0c03159a948c880b705e926399ec44efd0432bd6b4b9c908d5b1</sum></package><package arch="noarch" name="iwl5000-firmware" release="57.el7_4" src="linux-firmware-20170606-57.gitc990aae.el7_4.src.rpm" version="8.83.5.1_1"><filename>iwl5000-firmware-8.83.5.1_1-57.el7_4.noarch.rpm</filename><sum type="sha256">f3d9495c7165ed0ca5ee2175c1e3748e77ffcf80cb200a974a1355045130fdfe</sum></package><package arch="noarch" name="iwl6000g2b-firmware" release="57.el7_4" src="linux-firmware-20170606-57.gitc990aae.el7_4.src.rpm" version="17.168.5.2"><filename>iwl6000g2b-firmware-17.168.5.2-57.el7_4.noarch.rpm</filename><sum type="sha256">6e862a26553e1ba74dbed302cbc97d2e84d55df03435b41d652c21548deaf3ae</sum></package><package arch="noarch" name="iwl100-firmware" release="57.el7_4" src="linux-firmware-20170606-57.gitc990aae.el7_4.src.rpm" version="39.31.5.1"><filename>iwl100-firmware-39.31.5.1-57.el7_4.noarch.rpm</filename><sum type="sha256">194b742daff31d143ae1f186076b836acd539240360498f0a1d0e08a1d8337fa</sum></package><package arch="noarch" name="iwl2030-firmware" release="57.el7_4" src="linux-firmware-20170606-57.gitc990aae.el7_4.src.rpm" version="18.168.6.1"><filename>iwl2030-firmware-18.168.6.1-57.el7_4.noarch.rpm</filename><sum type="sha256">d22a1d25fea77e4ad87d80a598d53d60d7e524852d266ccec47db2ee48516cbe</sum></package><package arch="noarch" name="iwl5150-firmware" release="57.el7_4" src="linux-firmware-20170606-57.gitc990aae.el7_4.src.rpm" version="8.24.2.2"><filename>iwl5150-firmware-8.24.2.2-57.el7_4.noarch.rpm</filename><sum type="sha256">0bdbbbcad962089d7cb8306e3b1fad75cfa653a63297645ed0abe4b7af32abd5</sum></package><package arch="noarch" name="iwl4965-firmware" release="57.el7_4" src="linux-firmware-20170606-57.gitc990aae.el7_4.src.rpm" version="228.61.2.24"><filename>iwl4965-firmware-228.61.2.24-57.el7_4.noarch.rpm</filename><sum type="sha256">56505a350be447257304ace0d0184112847e18a3ed0499f0ac39c7ed36c12c8f</sum></package><package arch="noarch" name="iwl3160-firmware" release="57.el7_4" src="linux-firmware-20170606-57.gitc990aae.el7_4.src.rpm" version="22.0.7.0"><filename>iwl3160-firmware-22.0.7.0-57.el7_4.noarch.rpm</filename><sum type="sha256">d05222caf2e7dd0f77eb5b62197149f811739b5b28549529fc1a5d535e00fb29</sum></package><package arch="noarch" name="iwl135-firmware" release="57.el7_4" src="linux-firmware-20170606-57.gitc990aae.el7_4.src.rpm" version="18.168.6.1"><filename>iwl135-firmware-18.168.6.1-57.el7_4.noarch.rpm</filename><sum type="sha256">795ac63b2c2eb42acaafada57b26a683430edfa6b1f1bb59a1f1ab68cc766423</sum></package><package arch="noarch" name="iwl7260-firmware" release="57.el7_4" src="linux-firmware-20170606-57.gitc990aae.el7_4.src.rpm" version="22.0.7.0"><filename>iwl7260-firmware-22.0.7.0-57.el7_4.noarch.rpm</filename><sum type="sha256">e0493add5b4fa15c58295da3a1fab6bad6d8dba09e73618ccd8f76154885bc32</sum></package><package arch="noarch" epoch="1" name="iwl1000-firmware" release="57.el7_4" src="linux-firmware-20170606-57.gitc990aae.el7_4.src.rpm" version="39.31.5.1"><filename>iwl1000-firmware-39.31.5.1-57.el7_4.noarch.rpm</filename><sum type="sha256">bb52fc85b3fb8d25f79dde1575b6a7097890b80d23b138d725e2abff2b41a1c4</sum></package><package arch="noarch" name="iwl6000-firmware" release="57.el7_4" src="linux-firmware-20170606-57.gitc990aae.el7_4.src.rpm" version="9.221.4.1"><filename>iwl6000-firmware-9.221.4.1-57.el7_4.noarch.rpm</filename><sum type="sha256">24eb533990dafce8f75240e102238138c9f48180bff6bbb542c9bb731a641d6a</sum></package><package arch="noarch" name="iwl2000-firmware" release="57.el7_4" src="linux-firmware-20170606-57.gitc990aae.el7_4.src.rpm" version="18.168.6.1"><filename>iwl2000-firmware-18.168.6.1-57.el7_4.noarch.rpm</filename><sum type="sha256">6f86b722e3c761be3a134bea3ddb0042ab00e13ce9400d37ce14b9084e43b086</sum></package><package arch="noarch" name="iwl6000g2a-firmware" release="57.el7_4" src="linux-firmware-20170606-57.gitc990aae.el7_4.src.rpm" version="17.168.5.3"><filename>iwl6000g2a-firmware-17.168.5.3-57.el7_4.noarch.rpm</filename><sum type="sha256">5f345dafe3a148c84d3a8ea0107695ab030098b8fb2556238352523a549f4b23</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" id="CVE-2017-5715" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0014" id="RHSA-2018:0014-1" title="Rhsa-2018:0014-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519780" id="1519780" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0023-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715) 
Note: This is the qemu-kvm side of the CVE-2017-5715 mitigation.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-01-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm" release="141.el7_4.6" src="qemu-kvm-1.5.3-141.el7_4.6.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-141.el7_4.6.x86_64.rpm</filename><sum type="sha256">a7ce555a522e25e318c5cbc9977a1cffb28b82bbe417e3bccfa7701272c4e452</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="141.el7_4.6" src="qemu-kvm-1.5.3-141.el7_4.6.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-141.el7_4.6.x86_64.rpm</filename><sum type="sha256">c4ffdfa1da781f1617d2fbfb6f1ea1b075473f296633427889c6863f2d6d31df</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="141.el7_4.6" src="qemu-kvm-1.5.3-141.el7_4.6.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-141.el7_4.6.x86_64.rpm</filename><sum type="sha256">ebb01c4913b484d7bf9631547648c8c35fd1443ee7c8b0679ed611c0667d87f4</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="141.el7_4.6" src="qemu-kvm-1.5.3-141.el7_4.6.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-141.el7_4.6.x86_64.rpm</filename><sum type="sha256">a6e12fe936f640f381f297a116d03c3cff9da2c233e0a2b130a6d05341fdc856</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" id="CVE-2017-5715" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0023" id="RHSA-2018:0023-1" title="Rhsa-2018:0023-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519780" id="1519780" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0029-1</id><title>Libvirt</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. (CVE-2017-5715) 
Note: This is the libvirt side of the CVE-2017-5715 mitigation.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-01-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libvirt-daemon-driver-nodedev" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-driver-nodedev-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">eaf46c8ba57db2532056803f8c5666310d7f817b99455ec07b0b2d950b529c3b</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-logical" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-driver-storage-logical-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">6f89a72f8eb493b95ed963583c78897e19b84eb1fa80741c37750cb76fa47ec9</sum></package><package arch="x86_64" name="libvirt-libs" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-libs-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">bc24f51bce5fc4ecfcdf8ce0be4822a27172bdc396130e8aba87e9b09025f91f</sum></package><package arch="x86_64" name="libvirt-docs" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-docs-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">77c27710d4ac080ec6216e0bd3523911132f43c54cc5532994a3ed308fa4443e</sum></package><package arch="x86_64" name="libvirt-daemon-driver-network" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-driver-network-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">1bf5deff90287d8ad95031c94fa83a72c69d48c175435757627ece99f236eeb1</sum></package><package arch="i686" name="libvirt-libs" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-libs-3.2.0-14.el7_4.7.i686.rpm</filename><sum type="sha256">75868754cfc0e189990b60d2312cf454a85569c36d3510bd14b9d8b871511d68</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-mpath" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-driver-storage-mpath-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">373bcb670736a32034b812969c7e79d9acff1b4b8aa4a3f1768d77ba277b9e61</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-core" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-driver-storage-core-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">3d4e5f6779e7933b6b9add129814dbefe3a48ea689d533c769c427f9ce0beda5</sum></package><package arch="x86_64" name="libvirt-nss" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-nss-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">42d528f17e11b7650d02ef08b80c71081bcac1477abbadb5bc2799756ebfa441</sum></package><package arch="x86_64" name="libvirt-daemon-driver-qemu" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-driver-qemu-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">85460ae76251c2f12274a064ce0c745c42125c0e06243374c030f40f537da7d5</sum></package><package arch="i686" name="libvirt-client" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-client-3.2.0-14.el7_4.7.i686.rpm</filename><sum type="sha256">393e7667e0eb7ddf16160514e178ee76fa335f87070c3f6cc6a842d297b6628a</sum></package><package arch="x86_64" name="libvirt-devel" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-devel-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">326188438811113513f12f63a371af14bf8a1f1c5e79ddb3489799faa4caab8b</sum></package><package arch="x86_64" name="libvirt-admin" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-admin-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">26e2c6cee7f28098389a489eacf99afa267e28be0f51846f453c8f6bb1c60049</sum></package><package arch="i686" name="libvirt-nss" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-nss-3.2.0-14.el7_4.7.i686.rpm</filename><sum type="sha256">764b8fc9db43192d90541fc1ed5848e85e0b261f96c0a4eb4173af5fc2c2b43e</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-iscsi" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-driver-storage-iscsi-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">7f8b0757c26f9ea37a774e5564f065d7651013df3eb32b814e8fdf92762d8194</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-disk" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-driver-storage-disk-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">99519526f8a89e916eaf795f995a38c18f537798518fcdfcf392d30688a46b07</sum></package><package arch="x86_64" name="libvirt-daemon-driver-lxc" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-driver-lxc-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">2169b4d4ab12bb846d0903dd011d44905001ba0f24bbe020f4912d0378b2bc39</sum></package><package arch="x86_64" name="libvirt-daemon-driver-interface" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-driver-interface-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">8e8cf002142e4a71624cc5d607d45cbe16fba64075fbb36aacec272748558467</sum></package><package arch="i686" name="libvirt-devel" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-devel-3.2.0-14.el7_4.7.i686.rpm</filename><sum type="sha256">d32c0ac807f8e68ff6b9fe80a2ab0dc1fba16c144723eb767978f0975922dc94</sum></package><package arch="x86_64" name="libvirt-daemon" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">1b08dd074208fca92593bc02d5fee4857e2e3153d4fa0a46ce4771a98580ee11</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-gluster" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-driver-storage-gluster-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">849c8e8f3064f10e3475cd037216f0a59f140e164947b6d4a89a1966f3b95828</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-driver-storage-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">e70c7a187bdd473dbfb929abe4178177fdc0069fb875adba31732eefdeb01bc1</sum></package><package arch="x86_64" name="libvirt" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">7b3be6f3bac615759372ffefdd331613c0c59d6638b2714c04fddbd427a6a5b2</sum></package><package arch="x86_64" name="libvirt-daemon-config-network" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-config-network-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">602d00d967ecba81694d6f33d9e60ff0b191f0ec1c228f0cd1911a7df23a7641</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-rbd" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-driver-storage-rbd-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">57828c369930a4402d9af90c770f993e23b76e1b80670aa59c78503a0241f3f6</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nwfilter" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-driver-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">3b7ab8ec8d42668cf7a24c710294bf27000963935ffa849e710d1db072c2cf46</sum></package><package arch="x86_64" name="libvirt-daemon-kvm" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-kvm-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">d5fdc49fc70202c6469cf85127d282c0f6b75526534072eb7af7408dbc9c7fd4</sum></package><package arch="x86_64" name="libvirt-client" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-client-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">b6a96c18a2529d828de87a178a3e9db5c9ccdec485e36ceae329070698b53878</sum></package><package arch="x86_64" name="libvirt-login-shell" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-login-shell-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">0547cf26fa8532a1280d39f320b55cf3e9f550435f69bed93799972e140da6db</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-lock-sanlock-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">7c5d38af6519776b730b3d4c9fcc0b7ffc3cf05bd81c1d716a6a47bbc03a69f7</sum></package><package arch="x86_64" name="libvirt-daemon-driver-secret" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-driver-secret-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">7208c74973d52281690c5c993181a17d18b9a964b99b30fa217d025642ab29a0</sum></package><package arch="x86_64" name="libvirt-daemon-lxc" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-lxc-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">0071283271d43cecac9b456d1cd18d9d96372839595a94271037884d2f0af0cc</sum></package><package arch="x86_64" name="libvirt-daemon-config-nwfilter" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-config-nwfilter-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">70a438700b9cae4c25b2e39050d2d77d00b3523542924a41befe13765948a649</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-scsi" release="14.el7_4.7" src="libvirt-3.2.0-14.el7_4.7.src.rpm" version="3.2.0"><filename>libvirt-daemon-driver-storage-scsi-3.2.0-14.el7_4.7.x86_64.rpm</filename><sum type="sha256">09f2a21b61a1b1755461751e6b5678ada27c062c313332e57da440e1de1d56a4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" id="CVE-2017-5715" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0029" id="RHSA-2018:0029-1" title="Rhsa-2018:0029-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519780" id="1519780" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0061-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.5.2. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2017-7846, CVE-2017-7847, CVE-2017-7848, CVE-2017-7829)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-01-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_4" src="thunderbird-52.5.2-1.el7_4.src.rpm" version="52.5.2"><filename>thunderbird-52.5.2-1.el7_4.x86_64.rpm</filename><sum type="sha256">6300f35b5b5192cbb792c9e768ea67a8bb2bf331c24b48fbed3a65113b5ac78b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7829" id="CVE-2017-7829" title="Mozilla: From Address With Encoded Null Character Is Cut Off In Message Header Display" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7846" id="CVE-2017-7846" title="Mozilla: Javascript Execution Via Rss In Mailbox:// Origin" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7847" id="CVE-2017-7847" title="Mozilla: Local Path String Can Be Leaked From Rss Feed" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7848" id="CVE-2017-7848" title="Mozilla: Rss Feed Vulnerable To New Line Injection" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0061" id="RHSA-2018:0061-1" title="Rhsa-2018:0061-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1530187" id="1530187" title="Mozilla: Javascript Execution Via Rss In Mailbox:// Origin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1530190" id="1530190" title="Mozilla: Local Path String Can Be Leaked From Rss Feed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1530192" id="1530192" title="Mozilla: Rss Feed Vulnerable To New Line Injection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1530195" id="1530195" title="Mozilla: From Address With Encoded Null Character Is Cut Off In Message Header Display" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0093-1</id><title>Microcode_Ctl</title><description>This update supersedes the previous microcode update provided with the CVE-2017-5715 (Spectre) CPU branch injection vulnerability mitigation. Further testing has uncovered problems with the microcode provided along with the Spectre mitigation that could lead to system instabilities. 
As a result, this microcode update reverts to the last known good microcode version dated before 03 January 2018. 
You should contact your hardware provider for the latest microcode updates. 
IMPORTANT: If you are using Intel Skylake-, Broadwell-, and Haswell-based platforms, obtain and install updated microcode from your hardware vendor immediately. The "Spectre" mitigation requires both an updated kernel and updated microcode from your hardware vendor.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-01-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="22.5.el7_4" src="microcode_ctl-2.1-22.5.el7_4.src.rpm" version="2.1"><filename>microcode_ctl-2.1-22.5.el7_4.x86_64.rpm</filename><sum type="sha256">e5c578a6b4450d3af9f6a14458bffb583571247a599be27fe9a65f5ef282e8c4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" id="CVE-2017-5715" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0093" id="RHSA-2018:0093-1" title="Rhsa-2018:0093-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519780" id="1519780" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0094-1</id><title>Linux-Firmware</title><description>This update supersedes the previous microcode update provided with the CVE-2017-5715 (Spectre) CPU branch injection vulnerability mitigation. Further testing has uncovered problems with the microcode provided along with the Spectre mitigation that could lead to system instabilities. 
As a result, this microcode update reverts to the last known good microcode version dated before 03 January 2018. 
You should contact your hardware provider for the latest microcode updates. 
IMPORTANT: If you are using Intel Skylake-, Broadwell-, and Haswell-based platforms, obtain and install updated microcode from your hardware vendor immediately. The "Spectre" mitigation requires both an updated kernel and updated microcode from your hardware vendor.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-01-17 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="iwl6050-firmware" release="58.el7_4" src="linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm" version="41.28.5.1"><filename>iwl6050-firmware-41.28.5.1-58.el7_4.noarch.rpm</filename><sum type="sha256">90299d2d885d27c62cc57cece94d6fd8ab1b293a074524e832fd73c2dee77b0f</sum></package><package arch="noarch" name="iwl3160-firmware" release="58.el7_4" src="linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm" version="22.0.7.0"><filename>iwl3160-firmware-22.0.7.0-58.el7_4.noarch.rpm</filename><sum type="sha256">2acb642c0dcc6d16485a783f3d4df730666b2b9742d424cc8bdf5729457515c7</sum></package><package arch="noarch" name="iwl105-firmware" release="58.el7_4" src="linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm" version="18.168.6.1"><filename>iwl105-firmware-18.168.6.1-58.el7_4.noarch.rpm</filename><sum type="sha256">6c90d4102031eb0c17b91debd5d5ce64fca202352d79ad0a64f9ea732dc6bd9d</sum></package><package arch="noarch" name="iwl2000-firmware" release="58.el7_4" src="linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm" version="18.168.6.1"><filename>iwl2000-firmware-18.168.6.1-58.el7_4.noarch.rpm</filename><sum type="sha256">570ac6cc11216843620f99c12564c39597bed47bcd0a41db841cbada00bbc235</sum></package><package arch="noarch" name="iwl6000-firmware" release="58.el7_4" src="linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm" version="9.221.4.1"><filename>iwl6000-firmware-9.221.4.1-58.el7_4.noarch.rpm</filename><sum type="sha256">8f53fd5f05a1c1734e7ad39f6fc52f7c7992bbdaffea0b556850e677d3a92773</sum></package><package arch="noarch" name="iwl7260-firmware" release="58.el7_4" src="linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm" version="22.0.7.0"><filename>iwl7260-firmware-22.0.7.0-58.el7_4.noarch.rpm</filename><sum type="sha256">0f3d0b450b9924361bbc7c9201dcfb38b5ba8d457e5398066faf239d60f1d975</sum></package><package arch="noarch" name="linux-firmware" release="58.gitc990aae.el7_4" src="linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm" version="20170606"><filename>linux-firmware-20170606-58.gitc990aae.el7_4.noarch.rpm</filename><sum type="sha256">30f097257de02b6a3897ac3a7de895d6d966a1beebf7abc83cb455890e918369</sum></package><package arch="noarch" name="iwl4965-firmware" release="58.el7_4" src="linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm" version="228.61.2.24"><filename>iwl4965-firmware-228.61.2.24-58.el7_4.noarch.rpm</filename><sum type="sha256">8e288123f93843106c7e1c3fc58ba107d9affc364177d3d32583feb00d643805</sum></package><package arch="noarch" name="iwl7265-firmware" release="58.el7_4" src="linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm" version="22.0.7.0"><filename>iwl7265-firmware-22.0.7.0-58.el7_4.noarch.rpm</filename><sum type="sha256">adaac92fb7383155a7f6215b10403da82daef9fda4fe386d88c25fcad59b2169</sum></package><package arch="noarch" name="iwl5150-firmware" release="58.el7_4" src="linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm" version="8.24.2.2"><filename>iwl5150-firmware-8.24.2.2-58.el7_4.noarch.rpm</filename><sum type="sha256">40e120254a0c9b354cbeef397edda22f942a31e070f35ef044d91f723ce1e6ac</sum></package><package arch="noarch" name="iwl6000g2a-firmware" release="58.el7_4" src="linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm" version="17.168.5.3"><filename>iwl6000g2a-firmware-17.168.5.3-58.el7_4.noarch.rpm</filename><sum type="sha256">51d83c59d0f1eb7b35e0eef0be96f7f20bb30a7d50353810ab5831b4fefeb0ae</sum></package><package arch="noarch" name="iwl2030-firmware" release="58.el7_4" src="linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm" version="18.168.6.1"><filename>iwl2030-firmware-18.168.6.1-58.el7_4.noarch.rpm</filename><sum type="sha256">fbd04f791606ec000d53fe9edb834377fc3389cd53c5f65cd15c14204337f6a7</sum></package><package arch="noarch" name="iwl135-firmware" release="58.el7_4" src="linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm" version="18.168.6.1"><filename>iwl135-firmware-18.168.6.1-58.el7_4.noarch.rpm</filename><sum type="sha256">283f64489f31ef201b89c097b5cbf97dac44fdce44cc819e90b108a307870610</sum></package><package arch="noarch" epoch="1" name="iwl1000-firmware" release="58.el7_4" src="linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm" version="39.31.5.1"><filename>iwl1000-firmware-39.31.5.1-58.el7_4.noarch.rpm</filename><sum type="sha256">f20c4e6d314c3b4e3bd1019b27e8d87a6ee7de22714309fcdb9119da84bd12cc</sum></package><package arch="noarch" name="iwl5000-firmware" release="58.el7_4" src="linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm" version="8.83.5.1_1"><filename>iwl5000-firmware-8.83.5.1_1-58.el7_4.noarch.rpm</filename><sum type="sha256">7aea2a9281244b36b24631d0e9b2767692d6a5b633ec72094a36d834ec02318c</sum></package><package arch="noarch" name="iwl100-firmware" release="58.el7_4" src="linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm" version="39.31.5.1"><filename>iwl100-firmware-39.31.5.1-58.el7_4.noarch.rpm</filename><sum type="sha256">43fffb23e460e1deebb582ebd7b038adada7bcca5d4926d4012bc20eb870841d</sum></package><package arch="noarch" name="iwl3945-firmware" release="58.el7_4" src="linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm" version="15.32.2.9"><filename>iwl3945-firmware-15.32.2.9-58.el7_4.noarch.rpm</filename><sum type="sha256">f88d5c3c82044eb225468f34a84e5ea994f8dded5be878f2420111db73de1a10</sum></package><package arch="noarch" name="iwl6000g2b-firmware" release="58.el7_4" src="linux-firmware-20170606-58.gitc990aae.el7_4.src.rpm" version="17.168.5.2"><filename>iwl6000g2b-firmware-17.168.5.2-58.el7_4.noarch.rpm</filename><sum type="sha256">cf0dab4dcf9d40a5cb518853edd8c73b2c271dc7ffa5c3a13b418db983b46f8b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" id="CVE-2017-5715" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0094" id="RHSA-2018:0094-1" title="Rhsa-2018:0094-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519780" id="1519780" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0095-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* Multiple flaws were found in the Hotspot and AWT components of OpenJDK. An untrusted Java application or applet could use these flaws to bypass certain Java sandbox restrictions. (CVE-2018-2582, CVE-2018-2641) 
* It was discovered that the LDAPCertStore class in the JNDI component of OpenJDK failed to securely handle LDAP referrals. An attacker could possibly use this flaw to make it fetch attacker controlled certificate data. (CVE-2018-2633) 
* The JGSS component of OpenJDK ignores the value of the javax.security.auth.useSubjectCredsOnly property when using HTTP/SPNEGO authentication and always uses global credentials. It was discovered that this could cause global credentials to be unexpectedly used by an untrusted Java application. (CVE-2018-2634) 
* It was discovered that the JMX component of OpenJDK failed to properly set the deserialization filter for the SingleEntryRegistry in certain cases. A remote attacker could possibly use this flaw to bypass intended deserialization restrictions. (CVE-2018-2637) 
* It was discovered that the LDAP component of OpenJDK failed to properly encode special characters in user names when adding them to an LDAP search query. A remote attacker could possibly use this flaw to manipulate LDAP queries performed by the LdapLoginModule class. (CVE-2018-2588) 
* It was discovered that the DNS client implementation in the JNDI component of OpenJDK did not use random source ports when sending out DNS queries. This could make it easier for a remote attacker to spoof responses to those queries. (CVE-2018-2599) 
* It was discovered that the I18n component of OpenJDK could use an untrusted search path when loading resource bundle classes. A local attacker could possibly use this flaw to execute arbitrary code as another local user by making their Java application load an attacker controlled class file. (CVE-2018-2602) 
* It was discovered that the Libraries component of OpenJDK failed to sufficiently limit the amount of memory allocated when reading DER encoded input. A remote attacker could possibly use this flaw to make a Java application use an excessive amount of memory if it parsed attacker supplied DER encoded input. (CVE-2018-2603) 
* It was discovered that the key agreement implementations in the JCE component of OpenJDK did not guarantee sufficient strength of used keys to adequately protect generated shared secret. This could make it easier to break data encryption by attacking key agreement rather than the encryption using the negotiated secret. (CVE-2018-2618) 
* It was discovered that the JGSS component of OpenJDK failed to properly handle GSS context in the native GSS library wrapper in certain cases. A remote attacker could possibly make a Java application using JGSS to use a previously freed context. (CVE-2018-2629) 
* It was discovered that multiple classes in the Libraries, AWT, and JNDI components of OpenJDK did not sufficiently validate input when creating object instances from the serialized form. A specially-crafted input could cause a Java application to create objects with an inconsistent state or use an excessive amount of memory when deserialized. (CVE-2018-2663, CVE-2018-2677, CVE-2018-2678) 
* It was discovered that multiple encryption key classes in the Libraries component of OpenJDK did not properly synchronize access to their internal data. This could possibly cause a multi-threaded Java application to apply weak encryption to data because of the use of a key that was zeroed out. (CVE-2018-2579) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-01-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.161-0.b14.el7_4.noarch.rpm</filename><sum type="sha256">64be4feaeafc2226838396e77b8ea62bc1fa9706902880bc9f6502a42c4b9748</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4.x86_64.rpm</filename><sum type="sha256">4e82b1be958895103ec088c667b2131b364a7dec51c70beaf978019b12d461db</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.x86_64.rpm</filename><sum type="sha256">1b753d4e62e85d6c1475d4dfa34e8c228e2cd722abde06d2112e9b34ac90c598</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4.i686.rpm</filename><sum type="sha256">ee492478549448267f86935ef4aa48c9a1856fe0f36d7f119492c7b7e19cd828</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4.x86_64.rpm</filename><sum type="sha256">96fea08f34eb53800fe31fd09f125b1bbc346efcc91ac552faa7634d9d957298</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-demo-1.8.0.161-0.b14.el7_4.i686.rpm</filename><sum type="sha256">d4bda327a31917ae301b648810f970dbe59441fba46c3b12c43212fc903d2d71</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4.x86_64.rpm</filename><sum type="sha256">60fa545b2a5ec2266f598278bb2b2deb991fc70bba2ed9359f3de0c7962572da</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4.i686.rpm</filename><sum type="sha256">f12733eedf59a0bf8295d3fbb1d43905dde5a4432128dead56db68c4be633220</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4.x86_64.rpm</filename><sum type="sha256">8c68a518c4f86e7f53c0fdbafc172e87b52b3780a18e5c870b4538df8f0c3cf2</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-javadoc-1.8.0.161-0.b14.el7_4.noarch.rpm</filename><sum type="sha256">c8840fa5b3a859c0808b2033b8269d1665bed7c2b94b9129a267b1910f8a1df9</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4.x86_64.rpm</filename><sum type="sha256">6394470124a3dd4c85dfdf69353b7d28d61e6573e04f6aafc852f8b6931e0b35</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4.i686.rpm</filename><sum type="sha256">a50ff8bfff3ae89872215de97a332cadcf232f09b058309a1d3dc2c2776404e8</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-headless-1.8.0.161-0.b14.el7_4.x86_64.rpm</filename><sum type="sha256">a50b993d32ead28322e6da24048bc545daf54248e3de533f1429508bc6980b69</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4.i686.rpm</filename><sum type="sha256">4ae9406baca1bfec709d456e0763ec80d5a0f69aaef603060b745175096d7c74</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.161-0.b14.el7_4.x86_64.rpm</filename><sum type="sha256">eed7c477100ab2062500065abe1bb5396cef00776f5034c64b69fb0bac0e9428</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-devel-1.8.0.161-0.b14.el7_4.i686.rpm</filename><sum type="sha256">14355b426c09eaae8a8a8549bc511f50a3cbd139f82cef52b910028e17fd070d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4.x86_64.rpm</filename><sum type="sha256">80d30aa2a0825dbb944deb85a70404816582578912e9a7201b5fa5e8e4a9b21e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4.i686.rpm</filename><sum type="sha256">5000c69b51674bd55001e636c16670b78825f506fb5fa5a12ffe6d945e6a8d9f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-debug-1.8.0.161-0.b14.el7_4.i686.rpm</filename><sum type="sha256">2638c149ed3dd0914c1ad9899e584b2d45c986c5e17d0fce77f5f13d208781d4</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-accessibility-1.8.0.161-0.b14.el7_4.i686.rpm</filename><sum type="sha256">14213d335c35b52c7a73766600f3628951bb971edd7ceb09c95535bfce816901</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.i686.rpm</filename><sum type="sha256">a58fc287cbde807fd7df35b37ab4021866c9646e071ab332793603bc1acf73d7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.161-0.b14.el7_4.x86_64.rpm</filename><sum type="sha256">a72ef0c0f42a7431a7c20dc2d6cfc71f2b1ac84c66c9149b090cf0ea1a2037fe</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-src-1.8.0.161-0.b14.el7_4.i686.rpm</filename><sum type="sha256">d949a6361ae04dcad51715502bf89abb37794eb71d2683d25683464466eda5d5</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.161-0.b14.el7_4.x86_64.rpm</filename><sum type="sha256">22a8d870113e631fe7d249673605a0001f1ad8020da9c4d9d4aa5f269fe8477e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.161-0.b14.el7_4.i686.rpm</filename><sum type="sha256">0aa4bbd99a4df48c4722a41d02da38c727e4252b03f275965cb622929ce467ae</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.161-0.b14.el7_4.noarch.rpm</filename><sum type="sha256">b0e815ae6fbf5f6c23a124995037c0189858d592d664e05019aa5c6f284e9e06</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.161-0.b14.el7_4.noarch.rpm</filename><sum type="sha256">d38844f58c0d9b65bbe474958261a7d1f8efba6f7b8217329bfed9a4226b0edd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.b14.el7_4" src="java-1.8.0-openjdk-1.8.0.161-0.b14.el7_4.src.rpm" version="1.8.0.161"><filename>java-1.8.0-openjdk-src-debug-1.8.0.161-0.b14.el7_4.x86_64.rpm</filename><sum type="sha256">a294afa8246609b1790492a6bfac69d97e60ca4c5169b284819bec6cb2a365ed</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579" id="CVE-2018-2579" title="Openjdk: Unsynchronized Access To Encryption Key Data (Libraries, 8172525)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2582" id="CVE-2018-2582" title="Openjdk: Insufficient Validation Of The Invokeinterface Instruction (Hotspot, 8174962)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588" id="CVE-2018-2588" title="Openjdk: Ldaploginmodule Insufficient Username Encoding In Ldap Query (Ldap, 8178449)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599" id="CVE-2018-2599" title="Openjdk: Dnsclient Missing Source Port Randomization (Jndi, 8182125)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602" id="CVE-2018-2602" title="Openjdk: Loading Of Classes From Untrusted Locations (I18N, 8182601)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603" id="CVE-2018-2603" title="Openjdk: Dervalue Unbounded Memory Allocation (Libraries, 8182387)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618" id="CVE-2018-2618" title="Openjdk: Insufficient Strength Of Key Agreement (Jce, 8185292)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629" id="CVE-2018-2629" title="Openjdk: Gss Context Use-After-Free (Jgss, 8186212)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633" id="CVE-2018-2633" title="Openjdk: Ldapcertstore Insecure Handling Of Ldap Referrals (Jndi, 8186606)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634" id="CVE-2018-2634" title="Openjdk: Use Of Global Credentials For Http/Spnego (Jgss, 8186600)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637" id="CVE-2018-2637" title="Openjdk: Singleentryregistry Incorrect Setup Of Deserialization Filter (Jmx, 8186998)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641" id="CVE-2018-2641" title="Openjdk: Gtk Library Loading Use-After-Free (Awt, 8185325)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663" id="CVE-2018-2663" title="Openjdk: Arrayblockingqueue Deserialization To An Inconsistent State (Libraries, 8189284)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677" id="CVE-2018-2677" title="Openjdk: Unbounded Memory Allocation During Deserialization (Awt, 8190289)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678" id="CVE-2018-2678" title="Openjdk: Unbounded Memory Allocation In Basicattributes Deserialization (Jndi, 8191142)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0095" id="RHSA-2018:0095-1" title="Rhsa-2018:0095-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534263" id="1534263" title="Openjdk: Unbounded Memory Allocation In Basicattributes Deserialization (Jndi, 8191142)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534288" id="1534288" title="Openjdk: Unbounded Memory Allocation During Deserialization (Awt, 8190289)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534296" id="1534296" title="Openjdk: Arrayblockingqueue Deserialization To An Inconsistent State (Libraries, 8189284)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534298" id="1534298" title="Openjdk: Unsynchronized Access To Encryption Key Data (Libraries, 8172525)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534299" id="1534299" title="Openjdk: Ldaploginmodule Insufficient Username Encoding In Ldap Query (Ldap, 8178449)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534525" id="1534525" title="Openjdk: Loading Of Classes From Untrusted Locations (I18N, 8182601)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534543" id="1534543" title="Openjdk: Dnsclient Missing Source Port Randomization (Jndi, 8182125)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534553" id="1534553" title="Openjdk: Dervalue Unbounded Memory Allocation (Libraries, 8182387)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534625" id="1534625" title="Openjdk: Gss Context Use-After-Free (Jgss, 8186212)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534762" id="1534762" title="Openjdk: Insufficient Strength Of Key Agreement (Jce, 8185292)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534766" id="1534766" title="Openjdk: Gtk Library Loading Use-After-Free (Awt, 8185325)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534768" id="1534768" title="Openjdk: Insufficient Validation Of The Invokeinterface Instruction (Hotspot, 8174962)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534943" id="1534943" title="Openjdk: Use Of Global Credentials For Http/Spnego (Jgss, 8186600)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534970" id="1534970" title="Openjdk: Singleentryregistry Incorrect Setup Of Deserialization Filter (Jmx, 8186998)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1535036" id="1535036" title="Openjdk: Ldapcertstore Insecure Handling Of Ldap Referrals (Jndi, 8186606)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0102-1</id><title>Bind</title><description>Security Fix(es): 
* A use-after-free flaw leading to denial of service was found in the way BIND internally handled cleanup operations on upstream recursion fetch contexts. A remote attacker could potentially use this flaw to make named, acting as a DNSSEC validating resolver, exit unexpectedly with an assertion failure via a specially crafted DNS request. (CVE-2017-3145)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-01-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-51.el7_4.2.x86_64.rpm</filename><sum type="sha256">87abe820205f71d0e9842a2b6aa16e0d717c7c7d8fc46723362d5c4d13d06c70</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-51.el7_4.2.i686.rpm</filename><sum type="sha256">c3f0aef1dbc756b7b60ca87c48922b3d253d12bf523e2a855f61a7ae50cb1085</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-utils-9.9.4-51.el7_4.2.x86_64.rpm</filename><sum type="sha256">918c833bd9e2b257ac065ec743e11872aa35d06f7c15c8c8ce31463656b7c483</sum></package><package arch="noarch" epoch="32" name="bind-license" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-license-9.9.4-51.el7_4.2.noarch.rpm</filename><sum type="sha256">4c4a120cadf7f575c86341883419348a4af3b7c59a99d7939ccace5a218bbb46</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-chroot-9.9.4-51.el7_4.2.x86_64.rpm</filename><sum type="sha256">43f31a978950ca2d3bd4c675e7e2d629e0dd328f86705e7e472d344b5869b10b</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-51.el7_4.2.x86_64.rpm</filename><sum type="sha256">42ba4e7c855ca03f393076afd220f2d69be8f7132caebe2d24cacc8e26480150</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-pkcs11-utils-9.9.4-51.el7_4.2.x86_64.rpm</filename><sum type="sha256">f32c2a5802c572b13672403b9916834cb5a2ba0ae52ed50b53af0cb17f69bbe9</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-sdb-9.9.4-51.el7_4.2.x86_64.rpm</filename><sum type="sha256">f5f3a152e2dd22da5bcfbdc9d49601110cf55b8b9e8789c8c9fe8000ac9dbd10</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-51.el7_4.2.x86_64.rpm</filename><sum type="sha256">69d1244b41ff28fdbe8b4ab3f77bdfe5c0360566bd1427fd6d38fb7e52bd7c39</sum></package><package arch="x86_64" epoch="32" name="bind" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-9.9.4-51.el7_4.2.x86_64.rpm</filename><sum type="sha256">6e99b787ba301ad9d9a6ae104aa44be69d613235442daa06265de67881482b9f</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-51.el7_4.2.i686.rpm</filename><sum type="sha256">d82a7283e67bb6ffd37032a2c89a67910b3e9b5def373c9023713ec90066790a</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-51.el7_4.2.i686.rpm</filename><sum type="sha256">82c635b39f3d18bfeacb44ef4401247edd0d6003c2419a6c08aef48a69fd95e8</sum></package><package arch="i686" epoch="32" name="bind-libs" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-51.el7_4.2.i686.rpm</filename><sum type="sha256">44349256b9bdbe9d3dfa3e9822382bd313f3a8cd5b28392fa5290d5463254c24</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-51.el7_4.2.x86_64.rpm</filename><sum type="sha256">548ea07354ab24b942fed1acda8c5edecf6e63afefef14f7a82ab840b47d1929</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-51.el7_4.2.x86_64.rpm</filename><sum type="sha256">7d03f83a8bc6c0a7041dd21c99d77185e84c36a2ccae2169cd146f37016b1393</sum></package><package arch="i686" epoch="32" name="bind-devel" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-51.el7_4.2.i686.rpm</filename><sum type="sha256">c98f0fa9bb5317476423ff26f14a65c09a8445853624bc7afc0fa081567bb63e</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-pkcs11-9.9.4-51.el7_4.2.x86_64.rpm</filename><sum type="sha256">f9b1c355be280f68032b09d854c5b0aabb0b136647d94076a16cb14614dd2039</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-sdb-chroot-9.9.4-51.el7_4.2.x86_64.rpm</filename><sum type="sha256">e01d444c3962e0a3e93d4cf9dbd3d63e1a343d901d8e7a2e2b62fa0914290f33</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-51.el7_4.2.x86_64.rpm</filename><sum type="sha256">721d22e493f43a157d4f5848cced0169b38fb07f09fd2242dd92ed7c59b8ed14</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="51.el7_4.2" src="bind-9.9.4-51.el7_4.2.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-51.el7_4.2.i686.rpm</filename><sum type="sha256">4aac2907ad5298dbcee8ea898f05a7903b9810d45e3ce63a858ce84173f40d27</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3145" id="CVE-2017-3145" title="Bind: Improper Fetch Cleanup Sequencing In The Resolver Can Cause Named To Crash" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0102" id="RHSA-2018:0102-1" title="Rhsa-2018:0102-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534812" id="1534812" title="Bind: Improper Fetch Cleanup Sequencing In The Resolver Can Cause Named To Crash" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0122-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.6.0 ESR. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. (CVE-2018-5089, CVE-2018-5091, CVE-2018-5095, CVE-2018-5096, CVE-2018-5097, CVE-2018-5098, CVE-2018-5099, CVE-2018-5102, CVE-2018-5103, CVE-2018-5104, CVE-2018-5117) 
* To mitigate timing-based side-channel attacks similar to "Spectre" and "Meltdown", the resolution of performance.now() has been reduced from 5s to 20s.</description><severity>critical</severity><release>Scientific Linux</release><issued date="2018-01-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_4" src="firefox-52.6.0-1.el7_4.src.rpm" version="52.6.0"><filename>firefox-52.6.0-1.el7_4.x86_64.rpm</filename><sum type="sha256">0d1005004eaa36c46278e904b9f535fe9ad51c6112d52617e95aa3c07e9d9126</sum></package><package arch="i686" name="firefox" release="1.el7_4" src="firefox-52.6.0-1.el7_4.src.rpm" version="52.6.0"><filename>firefox-52.6.0-1.el7_4.i686.rpm</filename><sum type="sha256">56012b5278575b2efd74ac2a09e0b306eb4d059e0d0fc340e6b6ad2758ce0852</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5089" id="CVE-2018-5089" title="Mozilla: Memory Safety Bugs Fixed In Firefox 58 And Firefox Esr 52.6 (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5091" id="CVE-2018-5091" title="Mozilla: Use-After-Free With Dtmf Timers (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5095" id="CVE-2018-5095" title="Mozilla: Integer Overflow In Skia Library During Edge Builder Allocation (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5096" id="CVE-2018-5096" title="Mozilla: Use-After-Free While Editing Form Elements (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5097" id="CVE-2018-5097" title="Mozilla: Use-After-Free When Source Document Is Manipulated During Xslt (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5098" id="CVE-2018-5098" title="Mozilla: Use-After-Free While Manipulating Form Input Elements (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5099" id="CVE-2018-5099" title="Mozilla: Use-After-Free With Widget Listener (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5102" id="CVE-2018-5102" title="Mozilla: Use-After-Free In Html Media Elements (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5103" id="CVE-2018-5103" title="Mozilla: Use-After-Free During Mouse Event Handling (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5104" id="CVE-2018-5104" title="Mozilla: Use-After-Free During Font Face Manipulation (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5117" id="CVE-2018-5117" title="Mozilla: Url Spoofing With Right-To-Left Text Aligned Left-To-Right (Mfsa 2018-03)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0122" id="RHSA-2018:0122-1" title="Rhsa-2018:0122-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537417" id="1537417" title="Mozilla: Memory Safety Bugs Fixed In Firefox 58 And Firefox Esr 52.6 (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537814" id="1537814" title="Mozilla: Use-After-Free With Dtmf Timers (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537817" id="1537817" title="Mozilla: Integer Overflow In Skia Library During Edge Builder Allocation (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537818" id="1537818" title="Mozilla: Use-After-Free While Editing Form Elements (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537819" id="1537819" title="Mozilla: Use-After-Free When Source Document Is Manipulated During Xslt (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537820" id="1537820" title="Mozilla: Use-After-Free While Manipulating Form Input Elements (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537821" id="1537821" title="Mozilla: Use-After-Free With Widget Listener (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537822" id="1537822" title="Mozilla: Use-After-Free In Html Media Elements (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537823" id="1537823" title="Mozilla: Use-After-Free During Mouse Event Handling (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537824" id="1537824" title="Mozilla: Use-After-Free During Font Face Manipulation (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537825" id="1537825" title="Mozilla: Url Spoofing With Right-To-Left Text Aligned Left-To-Right (Mfsa 2018-03)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0151-1</id><title>Kernel</title><description>Security Fix(es): 
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. 
Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software mitigation for this hardware issue at a cost of potential performance penalty. 
* Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks. This fix specifically addresses S390 processors. (CVE-2017-5715, Important) 
* Variant CVE-2017-5753 triggers the speculative execution by performing a bounds-check bypass. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall boundary and read privileged memory by conducting targeted cache side-channel attacks. This fix specifically addresses S390 and PowerPC processors. (CVE-2017-5753, Important) 
* Variant CVE-2017-5754 relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. In a combination with the fact that memory accesses may populate the cache even when the block is being dropped and never committed (executed), an unprivileged local attacker could use this flaw to read privileged (kernel space) memory by conducting targeted cache side-channel attacks. Note: CVE-2017-5754 affects Intel x86-64 microprocessors. AMD x86-64 microprocessors are not affected by this issue. This fix specifically addresses PowerPC processors. (CVE-2017-5754, Important)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-01-25 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools-libs" release="693.17.1.el7" src="kernel-3.10.0-693.17.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-693.17.1.el7.x86_64.rpm</filename><sum type="sha256">6ecb9a3348682a8c0cab33e5a05770e5ce2e03ce446c8f22fe226b4680045410</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="693.17.1.el7" src="kernel-3.10.0-693.17.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-693.17.1.el7.noarch.rpm</filename><sum type="sha256">1f82b453908e9c134103d2c5c89ef5d70a8003c2551f9583dd453018254245a5</sum></package><package arch="x86_64" name="kernel-headers" release="693.17.1.el7" src="kernel-3.10.0-693.17.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-693.17.1.el7.x86_64.rpm</filename><sum type="sha256">8aeb076e8d3d458dc9caa831922516450e549c36a7f1f952d7f363449b85f898</sum></package><package arch="x86_64" name="kernel" release="693.17.1.el7" src="kernel-3.10.0-693.17.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-693.17.1.el7.x86_64.rpm</filename><sum type="sha256">b6bcf6841807bde737b54b76b0edfcdbeff6ea3177b00f2b316a6b46c3be9131</sum></package><package arch="x86_64" name="perf" release="693.17.1.el7" src="kernel-3.10.0-693.17.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-693.17.1.el7.x86_64.rpm</filename><sum type="sha256">12d3af77211f76f22b36d2db0fbea956e9524bad24610d9ea508e27f6fdf469c</sum></package><package arch="x86_64" name="kernel-devel" release="693.17.1.el7" src="kernel-3.10.0-693.17.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-693.17.1.el7.x86_64.rpm</filename><sum type="sha256">b6c0adca527fb83c386782744fb92d9e881b3180aa4f5afd3250286773c1533d</sum></package><package arch="x86_64" name="python-perf" release="693.17.1.el7" src="kernel-3.10.0-693.17.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-693.17.1.el7.x86_64.rpm</filename><sum type="sha256">85f02187e82c482f8bd94f47e5cdc3ef54111951c5128150a7c7da5d9022b164</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="693.17.1.el7" src="kernel-3.10.0-693.17.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-693.17.1.el7.x86_64.rpm</filename><sum type="sha256">dd1c36ad1e81599410aa0b96af33f3667267cbb94d30d93d8b172fae9e3ac292</sum></package><package arch="noarch" name="kernel-doc" release="693.17.1.el7" src="kernel-3.10.0-693.17.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-693.17.1.el7.noarch.rpm</filename><sum type="sha256">49b78200b9178349b566fd7bc6d9a0211407f477a6bd936728aac21627c29115</sum></package><package arch="x86_64" name="kernel-tools" release="693.17.1.el7" src="kernel-3.10.0-693.17.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-693.17.1.el7.x86_64.rpm</filename><sum type="sha256">83a395b49ccec6836ed7fa9ee7a15146d63ed8e1140e90039106c927dd12d5b2</sum></package><package arch="x86_64" name="kernel-debug" release="693.17.1.el7" src="kernel-3.10.0-693.17.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-693.17.1.el7.x86_64.rpm</filename><sum type="sha256">caab75a3e548fb2e440d83d4d21c4cf61641e3eb99f0cdcde4634eea12176bdc</sum></package><package arch="x86_64" name="kernel-debug-devel" release="693.17.1.el7" src="kernel-3.10.0-693.17.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-693.17.1.el7.x86_64.rpm</filename><sum type="sha256">e5be80cce8178887d81fa679abaf156db8307462caf9f9899c3b354f3c61b770</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8539" id="CVE-2015-8539" title="Kernel: Local Privesc In Key Management" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12192" id="CVE-2017-12192" title="Kernel: Null Pointer Dereference Due To Keyctl_Read On Negative Key" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12193" id="CVE-2017-12193" title="Kernel: Null Pointer Dereference Due To Incorrect Node-Splitting In Assoc_Array Implementation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15649" id="CVE-2017-15649" title="Kernel: Use-After-Free In The Af_Packet.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715" id="CVE-2017-5715" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753" id="CVE-2017-5753" title="Hw: Cpu: Speculative Execution Bounds-Check Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754" id="CVE-2017-5754" title="Hw: Cpu: Speculative Execution Permission Faults Handling" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7472" id="CVE-2017-7472" title="Kernel: Keyctl_Set_Reqkey_Keyring() Leaks Thread Keyrings" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0151" id="RHSA-2018:0151-1" title="Rhsa-2018:0151-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1284450" id="1284450" title="Kernel: Local Privesc In Key Management" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1442086" id="1442086" title="Kernel: Keyctl_Set_Reqkey_Keyring() Leaks Thread Keyrings" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1493435" id="1493435" title="Kernel: Null Pointer Dereference Due To Keyctl_Read On Negative Key" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1501215" id="1501215" title="Kernel: Null Pointer Dereference Due To Incorrect Node-Splitting In Assoc_Array Implementation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1504574" id="1504574" title="Kernel: Use-After-Free In The Af_Packet.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519778" id="1519778" title="Hw: Cpu: Speculative Execution Bounds-Check Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519780" id="1519780" title="Hw: Cpu: Speculative Execution Branch Target Injection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519781" id="1519781" title="Hw: Cpu: Speculative Execution Permission Faults Handling" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0158-1</id><title>Dhcp</title><description>Security Fix(es): 
* It was found that the DHCP daemon did not properly clean up closed OMAPI connections in certain cases. A remote attacker able to connect to the OMAPI port could use this flaw to exhaust file descriptors in the DHCP daemon, leading to a denial of service in the OMAPI functionality. (CVE-2017-3144)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-01-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="12" name="dhcp-devel" release="58.sl7_4.1" src="dhcp-4.2.5-58.sl7_4.1.src.rpm" version="4.2.5"><filename>dhcp-devel-4.2.5-58.sl7_4.1.i686.rpm</filename><sum type="sha256">f0b61bb5aee75843273f66864c34e5783c5c899c01d3546a18ddf26cdfd52993</sum></package><package arch="x86_64" epoch="12" name="dhcp" release="58.sl7_4.1" src="dhcp-4.2.5-58.sl7_4.1.src.rpm" version="4.2.5"><filename>dhcp-4.2.5-58.sl7_4.1.x86_64.rpm</filename><sum type="sha256">dc730100b6357ce559dfdf837c4782e250c9088279530213478154db9c8ce365</sum></package><package arch="x86_64" epoch="12" name="dhcp-devel" release="58.sl7_4.1" src="dhcp-4.2.5-58.sl7_4.1.src.rpm" version="4.2.5"><filename>dhcp-devel-4.2.5-58.sl7_4.1.x86_64.rpm</filename><sum type="sha256">db68fbc5f06c047a7ca2c3c6da7c5543fda233dcd0620f543b04f8579239a9c3</sum></package><package arch="i686" epoch="12" name="dhcp-libs" release="58.sl7_4.1" src="dhcp-4.2.5-58.sl7_4.1.src.rpm" version="4.2.5"><filename>dhcp-libs-4.2.5-58.sl7_4.1.i686.rpm</filename><sum type="sha256">e25ef2e7bcfeb7f1885d8d93ed8b6a5403dadc82e3f447c54ab974558f6e51cd</sum></package><package arch="x86_64" epoch="12" name="dhclient" release="58.sl7_4.1" src="dhcp-4.2.5-58.sl7_4.1.src.rpm" version="4.2.5"><filename>dhclient-4.2.5-58.sl7_4.1.x86_64.rpm</filename><sum type="sha256">159974151e98ebd17c49c30830e079751039989c660b4e8a86638af96e80a817</sum></package><package arch="x86_64" epoch="12" name="dhcp-common" release="58.sl7_4.1" src="dhcp-4.2.5-58.sl7_4.1.src.rpm" version="4.2.5"><filename>dhcp-common-4.2.5-58.sl7_4.1.x86_64.rpm</filename><sum type="sha256">dd3784cd2beb4caab1df463d374af4c79b5eb5052f96d54d4567b7477a8aa801</sum></package><package arch="x86_64" epoch="12" name="dhcp-libs" release="58.sl7_4.1" src="dhcp-4.2.5-58.sl7_4.1.src.rpm" version="4.2.5"><filename>dhcp-libs-4.2.5-58.sl7_4.1.x86_64.rpm</filename><sum type="sha256">b42ab1371ce5d3b4125bdfd0e0b4a3233405712ba4c13adce372713b3657c9c5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3144" id="CVE-2017-3144" title="Dhcp: Omapi Code Doesn'T Free Socket Descriptors When Empty Message Is Received Allowing Denial-Of-Service" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0158" id="RHSA-2018:0158-1" title="Rhsa-2018:0158-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1522918" id="1522918" title="Dhcp: Omapi Code Doesn'T Free Socket Descriptors When Empty Message Is Received Allowing Denial-Of-Service" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0163-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* A stack buffer overflow flaw was found in the way 389-ds-base handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service. (CVE-2017-15134) 
Bug Fix(es): 
* Previously, when a connection received a high operation rate, Directory Server stopped to poll the connection in certain situations. As a consequence, new requests on the connection were not detected and processed. With this update, Directory Server correctly decides whether a connection has to be polled. As a result, connections with a high request rate no longer remain unprocessed. 
* Previously, if Directory Server was stopped during an operation which created additional changes in the memory changelog, the Replication Update Vector (RUV) in the changelog was higher than the RUV in the database. As a consequence, Directory Server recreated the changelog when the server started. With this update, the server now writes the highest RUV to the changelog only if there is the highest Change Sequence Number (CSN) present in it. As a result, the database and the changelog RUV are consistent and the server does not need recreating the changelog at start up. 
* Due to a bug, using a large number of Class of Service (CoS) templates in Directory Server increased the virtual attribute processing time. This update improves the structure of the CoS storage. As a result, using a large number of CoS templates no longer increases the virtual attribute processing time.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-01-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-snmp" release="26.el7_4" src="389-ds-base-1.3.6.1-26.el7_4.src.rpm" version="1.3.6.1"><filename>389-ds-base-snmp-1.3.6.1-26.el7_4.x86_64.rpm</filename><sum type="sha256">c5773894b11c19f7517ccbafb08416bab538c723f0fec563208705511eedf9b3</sum></package><package arch="x86_64" name="389-ds-base" release="26.el7_4" src="389-ds-base-1.3.6.1-26.el7_4.src.rpm" version="1.3.6.1"><filename>389-ds-base-1.3.6.1-26.el7_4.x86_64.rpm</filename><sum type="sha256">1d544dd392330e67135a2caa667ebe8587fc2fbae4068eeafb2d878823211163</sum></package><package arch="x86_64" name="389-ds-base-devel" release="26.el7_4" src="389-ds-base-1.3.6.1-26.el7_4.src.rpm" version="1.3.6.1"><filename>389-ds-base-devel-1.3.6.1-26.el7_4.x86_64.rpm</filename><sum type="sha256">1f2b09c6e6904e9799af030ceb4b24a6c4bb9a7137d85aca0703b47eb987c1a3</sum></package><package arch="x86_64" name="389-ds-base-libs" release="26.el7_4" src="389-ds-base-1.3.6.1-26.el7_4.src.rpm" version="1.3.6.1"><filename>389-ds-base-libs-1.3.6.1-26.el7_4.x86_64.rpm</filename><sum type="sha256">921170c5e173550fb7857eb6b0c566f03270ad4d4a85d1b47bfe15dafe9c4562</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15134" id="CVE-2017-15134" title="389-Ds-Base: Remote Dos Via Search Filters In Slapi_Filter_Sprintf In Slapd/Util.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0163" id="RHSA-2018:0163-1" title="Rhsa-2018:0163-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1531573" id="1531573" title="389-Ds-Base: Remote Dos Via Search Filters In Slapi_Filter_Sprintf In Slapd/Util.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0223-1</id><title>Nautilus</title><description>Security Fix(es): 
* An untrusted .desktop file with executable permission set could choose its displayed name and icon, and execute commands without warning when opened by the user. An attacker could use this flaw to trick a user into opening a .desktop file disguised as a document, such as a PDF, and execute arbitrary commands. (CVE-2017-14604) 
Note: This update will change the behavior of Nautilus. Nautilus will now prompt the user for confirmation when executing an untrusted .desktop file for the first time, and then add it to the trusted file list. Desktop files stored in the system directory, as specified by the XDG_DATA_DIRS environment variable, are always considered trusted and executed without prompt.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-01-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="nautilus" release="4.el7_4" src="nautilus-3.22.3-4.el7_4.src.rpm" version="3.22.3"><filename>nautilus-3.22.3-4.el7_4.i686.rpm</filename><sum type="sha256">7c3e197e6cb506fd416883107bc877e3d3bccfa81a3157b7f0451ac39bf09d8c</sum></package><package arch="x86_64" name="nautilus-extensions" release="4.el7_4" src="nautilus-3.22.3-4.el7_4.src.rpm" version="3.22.3"><filename>nautilus-extensions-3.22.3-4.el7_4.x86_64.rpm</filename><sum type="sha256">f74841d3ac3727f875d423a985db4584533d64eceb5c70ba2c60b412dfe91f61</sum></package><package arch="x86_64" name="nautilus-devel" release="4.el7_4" src="nautilus-3.22.3-4.el7_4.src.rpm" version="3.22.3"><filename>nautilus-devel-3.22.3-4.el7_4.x86_64.rpm</filename><sum type="sha256">2fe937fc33587bf5ca4d8e49d62d72b14a1aabd8e6a59b3b3bd25c76391297ec</sum></package><package arch="x86_64" name="nautilus" release="4.el7_4" src="nautilus-3.22.3-4.el7_4.src.rpm" version="3.22.3"><filename>nautilus-3.22.3-4.el7_4.x86_64.rpm</filename><sum type="sha256">75e3c09ecd60eaaa31b087d0b3e14ed1eab5d37ccea75ed8a90c2ce67b0d0f20</sum></package><package arch="i686" name="nautilus-devel" release="4.el7_4" src="nautilus-3.22.3-4.el7_4.src.rpm" version="3.22.3"><filename>nautilus-devel-3.22.3-4.el7_4.i686.rpm</filename><sum type="sha256">bad6138d2de53e2332a08aa36d072aa71bd88f38792c93b928e0a4354eb74169</sum></package><package arch="i686" name="nautilus-extensions" release="4.el7_4" src="nautilus-3.22.3-4.el7_4.src.rpm" version="3.22.3"><filename>nautilus-extensions-3.22.3-4.el7_4.i686.rpm</filename><sum type="sha256">45bfbf3dd06a0c3d27dde58cadb09c6922b1459cb6b960606081aaf59fd370f2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14604" id="CVE-2017-14604" title="Nautilus: Insufficient Validation Of Trust Of .Desktop Files With Execute Permission" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0223" id="RHSA-2018:0223-1" title="Rhsa-2018:0223-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1490872" id="1490872" title="Nautilus: Insufficient Validation Of Trust Of .Desktop Files With Execute Permission" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0260-1</id><title>Systemd</title><description>Security Fix(es): 
* A race condition was found in systemd. This could result in automount requests not being serviced and processes using them could hang, causing denial of service. (CVE-2018-1049)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-01-31 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="systemd-devel" release="42.el7_4.7" src="systemd-219-42.el7_4.7.src.rpm" version="219"><filename>systemd-devel-219-42.el7_4.7.i686.rpm</filename><sum type="sha256">26e9e2ad418efe3359eed39be61dee7faa8e98706db1627f37894b5f6c228998</sum></package><package arch="i686" name="libgudev1" release="42.el7_4.7" src="systemd-219-42.el7_4.7.src.rpm" version="219"><filename>libgudev1-219-42.el7_4.7.i686.rpm</filename><sum type="sha256">ceaaded28a84eab943072b050babcffeb4b6eff63c2aa73e20be2dc6e9fc707e</sum></package><package arch="x86_64" name="systemd-sysv" release="42.el7_4.7" src="systemd-219-42.el7_4.7.src.rpm" version="219"><filename>systemd-sysv-219-42.el7_4.7.x86_64.rpm</filename><sum type="sha256">51fdddeaf170880883dfd38b56403e91350a880eabbd72af0b0702d2971291f4</sum></package><package arch="i686" name="libgudev1-devel" release="42.el7_4.7" src="systemd-219-42.el7_4.7.src.rpm" version="219"><filename>libgudev1-devel-219-42.el7_4.7.i686.rpm</filename><sum type="sha256">aa13bed02e3356ad177b3d1d25a2fa7b9f45dbbd9b16a750e38031d870e1cbd8</sum></package><package arch="x86_64" name="systemd-networkd" release="42.el7_4.7" src="systemd-219-42.el7_4.7.src.rpm" version="219"><filename>systemd-networkd-219-42.el7_4.7.x86_64.rpm</filename><sum type="sha256">7260ad13b86cf2cf38c3d31620995e10846a164aabefe5f1fb21379c516e05c3</sum></package><package arch="x86_64" name="libgudev1-devel" release="42.el7_4.7" src="systemd-219-42.el7_4.7.src.rpm" version="219"><filename>libgudev1-devel-219-42.el7_4.7.x86_64.rpm</filename><sum type="sha256">231203639ea87d73c95222759bd6cfaa87e0f765de3459963c43e48c4dff1516</sum></package><package arch="x86_64" name="systemd-libs" release="42.el7_4.7" src="systemd-219-42.el7_4.7.src.rpm" version="219"><filename>systemd-libs-219-42.el7_4.7.x86_64.rpm</filename><sum type="sha256">3fccf16134ec458a6f2fe224bde754fef2374037f02a1b8bbb251c22630a5c99</sum></package><package arch="x86_64" name="systemd-journal-gateway" release="42.el7_4.7" src="systemd-219-42.el7_4.7.src.rpm" version="219"><filename>systemd-journal-gateway-219-42.el7_4.7.x86_64.rpm</filename><sum type="sha256">6ba889294d430cdf07fc1f140c1a36576585dd9ca8e2fb4aaa79c1e87212d672</sum></package><package arch="x86_64" name="systemd" release="42.el7_4.7" src="systemd-219-42.el7_4.7.src.rpm" version="219"><filename>systemd-219-42.el7_4.7.x86_64.rpm</filename><sum type="sha256">a519c60d08edd62034c9f92ebefdad1b3cc77c542fdfbe919214ca6ae751c795</sum></package><package arch="i686" name="systemd-resolved" release="42.el7_4.7" src="systemd-219-42.el7_4.7.src.rpm" version="219"><filename>systemd-resolved-219-42.el7_4.7.i686.rpm</filename><sum type="sha256">78b6f19974a3a7a5dd85d2686ccc252002da56baec5b06693dfbf3d93529b757</sum></package><package arch="x86_64" name="systemd-python" release="42.el7_4.7" src="systemd-219-42.el7_4.7.src.rpm" version="219"><filename>systemd-python-219-42.el7_4.7.x86_64.rpm</filename><sum type="sha256">71123f380e64ea3ca2907c2bb3f776b1558a7a4a01bd921fba9d58246ba89f09</sum></package><package arch="i686" name="systemd-libs" release="42.el7_4.7" src="systemd-219-42.el7_4.7.src.rpm" version="219"><filename>systemd-libs-219-42.el7_4.7.i686.rpm</filename><sum type="sha256">165b24c2d202376894ba36d8248cd5d5d7d5c0f36f8d19bd48ac25f9b8294ed7</sum></package><package arch="x86_64" name="libgudev1" release="42.el7_4.7" src="systemd-219-42.el7_4.7.src.rpm" version="219"><filename>libgudev1-219-42.el7_4.7.x86_64.rpm</filename><sum type="sha256">a8287c30a30954b0bdd77bef2d4a5d88250eede36d4a26ee146519004dba7ad2</sum></package><package arch="x86_64" name="systemd-devel" release="42.el7_4.7" src="systemd-219-42.el7_4.7.src.rpm" version="219"><filename>systemd-devel-219-42.el7_4.7.x86_64.rpm</filename><sum type="sha256">c2df323aec57b38161d1ccfe718ff76b03e0741dd69c6770459d786ecb63474b</sum></package><package arch="x86_64" name="systemd-resolved" release="42.el7_4.7" src="systemd-219-42.el7_4.7.src.rpm" version="219"><filename>systemd-resolved-219-42.el7_4.7.x86_64.rpm</filename><sum type="sha256">98588e89a68dac7e1591d4fb6c66d7fee64d7a6eb82d2902d02c90cf9b5f5ad1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1049" id="CVE-2018-1049" title="Systemd: Automount: Access To Automounted Volumes Can Lock Up" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0260" id="RHSA-2018:0260-1" title="Rhsa-2018:0260-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534701" id="1534701" title="Systemd: Automount: Access To Automounted Volumes Can Lock Up" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0262-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.6.0. 
Security Fix(es): 
* Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Thunderbird to crash or, potentially, execute arbitrary code with the privileges of the user running Thunderbird. (CVE-2018-5089, CVE-2018-5095, CVE-2018-5096, CVE-2018-5097, CVE-2018-5098, CVE-2018-5099, CVE-2018-5102, CVE-2018-5103, CVE-2018-5104, CVE-2018-5117)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-02-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_4" src="thunderbird-52.6.0-1.el7_4.src.rpm" version="52.6.0"><filename>thunderbird-52.6.0-1.el7_4.x86_64.rpm</filename><sum type="sha256">158de5454e3cf093f7ad1081898b67cf513c8f4d91a92301a01503f42476d596</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5089" id="CVE-2018-5089" title="Mozilla: Memory Safety Bugs Fixed In Firefox 58 And Firefox Esr 52.6 (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5095" id="CVE-2018-5095" title="Mozilla: Integer Overflow In Skia Library During Edge Builder Allocation (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5096" id="CVE-2018-5096" title="Mozilla: Use-After-Free While Editing Form Elements (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5097" id="CVE-2018-5097" title="Mozilla: Use-After-Free When Source Document Is Manipulated During Xslt (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5098" id="CVE-2018-5098" title="Mozilla: Use-After-Free While Manipulating Form Input Elements (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5099" id="CVE-2018-5099" title="Mozilla: Use-After-Free With Widget Listener (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5102" id="CVE-2018-5102" title="Mozilla: Use-After-Free In Html Media Elements (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5103" id="CVE-2018-5103" title="Mozilla: Use-After-Free During Mouse Event Handling (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5104" id="CVE-2018-5104" title="Mozilla: Use-After-Free During Font Face Manipulation (Mfsa 2018-03)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5117" id="CVE-2018-5117" title="Mozilla: Url Spoofing With Right-To-Left Text Aligned Left-To-Right (Mfsa 2018-03)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0262" id="RHSA-2018:0262-1" title="Rhsa-2018:0262-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537417" id="1537417" title="Mozilla: Memory Safety Bugs Fixed In Firefox 58 And Firefox Esr 52.6 (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537817" id="1537817" title="Mozilla: Integer Overflow In Skia Library During Edge Builder Allocation (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537818" id="1537818" title="Mozilla: Use-After-Free While Editing Form Elements (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537819" id="1537819" title="Mozilla: Use-After-Free When Source Document Is Manipulated During Xslt (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537820" id="1537820" title="Mozilla: Use-After-Free While Manipulating Form Input Elements (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537821" id="1537821" title="Mozilla: Use-After-Free With Widget Listener (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537822" id="1537822" title="Mozilla: Use-After-Free In Html Media Elements (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537823" id="1537823" title="Mozilla: Use-After-Free During Mouse Event Handling (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537824" id="1537824" title="Mozilla: Use-After-Free During Font Face Manipulation (Mfsa 2018-03)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537825" id="1537825" title="Mozilla: Url Spoofing With Right-To-Left Text Aligned Left-To-Right (Mfsa 2018-03)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0349-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* A flaw was found in the AWT component of OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. (CVE-2018-2641) 
* It was discovered that the LDAPCertStore class in the JNDI component of OpenJDK failed to securely handle LDAP referrals. An attacker could possibly use this flaw to make it fetch attacker controlled certificate data. (CVE-2018-2633) 
* The JGSS component of OpenJDK ignores the value of the javax.security.auth.useSubjectCredsOnly property when using HTTP/SPNEGO authentication and always uses global credentials. It was discovered that this could cause global credentials to be unexpectedly used by an untrusted Java application. (CVE-2018-2634) 
* It was discovered that the JMX component of OpenJDK failed to properly set the deserialization filter for the SingleEntryRegistry in certain cases. A remote attacker could possibly use this flaw to bypass intended deserialization restrictions. (CVE-2018-2637) 
* It was discovered that the LDAP component of OpenJDK failed to properly encode special characters in user names when adding them to an LDAP search query. A remote attacker could possibly use this flaw to manipulate LDAP queries performed by the LdapLoginModule class. (CVE-2018-2588) 
* It was discovered that the DNS client implementation in the JNDI component of OpenJDK did not use random source ports when sending out DNS queries. This could make it easier for a remote attacker to spoof responses to those queries. (CVE-2018-2599) 
* It was discovered that the I18n component of OpenJDK could use an untrusted search path when loading resource bundle classes. A local attacker could possibly use this flaw to execute arbitrary code as another local user by making their Java application load an attacker controlled class file. (CVE-2018-2602) 
* It was discovered that the Libraries component of OpenJDK failed to sufficiently limit the amount of memory allocated when reading DER encoded input. A remote attacker could possibly use this flaw to make a Java application use an excessive amount of memory if it parsed attacker supplied DER encoded input. (CVE-2018-2603) 
* It was discovered that the key agreement implementations in the JCE component of OpenJDK did not guarantee sufficient strength of used keys to adequately protect generated shared secret. This could make it easier to break data encryption by attacking key agreement rather than the encryption using the negotiated secret. (CVE-2018-2618) 
* It was discovered that the JGSS component of OpenJDK failed to properly handle GSS context in the native GSS library wrapper in certain cases. A remote attacker could possibly make a Java application using JGSS to use a previously freed context. (CVE-2018-2629) 
* It was discovered that multiple classes in the Libraries, AWT, and JNDI components of OpenJDK did not sufficiently validate input when creating object instances from the serialized form. A specially-crafted input could cause a Java application to create objects with an inconsistent state or use an excessive amount of memory when deserialized. (CVE-2018-2663, CVE-2018-2677, CVE-2018-2678) 
* It was discovered that multiple encryption key classes in the Libraries component of OpenJDK did not properly synchronize access to their internal data. This could possibly cause a multi-threaded Java application to apply weak encryption to data because of the use of a key that was zeroed out. (CVE-2018-2579)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-02-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.13.0.el7_4" src="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4.src.rpm" version="1.7.0.171"><filename>java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4.x86_64.rpm</filename><sum type="sha256">2d1e41e62013fb3068ebc7f77fb53a664a46c73ca4d6f8ab17342667bbc1accb</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.13.0.el7_4" src="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4.src.rpm" version="1.7.0.171"><filename>java-1.7.0-openjdk-devel-1.7.0.171-2.6.13.0.el7_4.x86_64.rpm</filename><sum type="sha256">c4112d220cd01d053b063c4b733663cc713dda9af992e64128bd430120369471</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.13.0.el7_4" src="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4.src.rpm" version="1.7.0.171"><filename>java-1.7.0-openjdk-src-1.7.0.171-2.6.13.0.el7_4.x86_64.rpm</filename><sum type="sha256">bfb04ab68552024f5ecbe1c123f01891ef75daab5b9d4cd272f7e7d95de1aaa2</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.13.0.el7_4" src="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4.src.rpm" version="1.7.0.171"><filename>java-1.7.0-openjdk-accessibility-1.7.0.171-2.6.13.0.el7_4.x86_64.rpm</filename><sum type="sha256">9de39452d68c55fab54717f62cd3e197583ef8dcfdb32ffba78ce787cf0a2422</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.13.0.el7_4" src="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4.src.rpm" version="1.7.0.171"><filename>java-1.7.0-openjdk-headless-1.7.0.171-2.6.13.0.el7_4.x86_64.rpm</filename><sum type="sha256">b9eb22e48fa616cc28cdd738c9c1028fa5d8651d5b0501d02e690a2a870a7da3</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.13.0.el7_4" src="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4.src.rpm" version="1.7.0.171"><filename>java-1.7.0-openjdk-demo-1.7.0.171-2.6.13.0.el7_4.x86_64.rpm</filename><sum type="sha256">a21a1409aa4a29a835aa0783f46779eba498fdfa9a33b74e1d2421f3db8bccd8</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.13.0.el7_4" src="java-1.7.0-openjdk-1.7.0.171-2.6.13.0.el7_4.src.rpm" version="1.7.0.171"><filename>java-1.7.0-openjdk-javadoc-1.7.0.171-2.6.13.0.el7_4.noarch.rpm</filename><sum type="sha256">81e275659b7840ed999dca92f698ce9596e3bdb7a9d7da52f7da1a7e2ba86820</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2579" id="CVE-2018-2579" title="Openjdk: Unsynchronized Access To Encryption Key Data (Libraries, 8172525)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2588" id="CVE-2018-2588" title="Openjdk: Ldaploginmodule Insufficient Username Encoding In Ldap Query (Ldap, 8178449)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2599" id="CVE-2018-2599" title="Openjdk: Dnsclient Missing Source Port Randomization (Jndi, 8182125)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2602" id="CVE-2018-2602" title="Openjdk: Loading Of Classes From Untrusted Locations (I18N, 8182601)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2603" id="CVE-2018-2603" title="Openjdk: Dervalue Unbounded Memory Allocation (Libraries, 8182387)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2618" id="CVE-2018-2618" title="Openjdk: Insufficient Strength Of Key Agreement (Jce, 8185292)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2629" id="CVE-2018-2629" title="Openjdk: Gss Context Use-After-Free (Jgss, 8186212)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2633" id="CVE-2018-2633" title="Openjdk: Ldapcertstore Insecure Handling Of Ldap Referrals (Jndi, 8186606)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2634" id="CVE-2018-2634" title="Openjdk: Use Of Global Credentials For Http/Spnego (Jgss, 8186600)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2637" id="CVE-2018-2637" title="Openjdk: Singleentryregistry Incorrect Setup Of Deserialization Filter (Jmx, 8186998)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2641" id="CVE-2018-2641" title="Openjdk: Gtk Library Loading Use-After-Free (Awt, 8185325)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2663" id="CVE-2018-2663" title="Openjdk: Arrayblockingqueue Deserialization To An Inconsistent State (Libraries, 8189284)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2677" id="CVE-2018-2677" title="Openjdk: Unbounded Memory Allocation During Deserialization (Awt, 8190289)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2678" id="CVE-2018-2678" title="Openjdk: Unbounded Memory Allocation In Basicattributes Deserialization (Jndi, 8191142)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0349" id="RHSA-2018:0349-1" title="Rhsa-2018:0349-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534263" id="1534263" title="Openjdk: Unbounded Memory Allocation In Basicattributes Deserialization (Jndi, 8191142)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534288" id="1534288" title="Openjdk: Unbounded Memory Allocation During Deserialization (Awt, 8190289)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534296" id="1534296" title="Openjdk: Arrayblockingqueue Deserialization To An Inconsistent State (Libraries, 8189284)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534298" id="1534298" title="Openjdk: Unsynchronized Access To Encryption Key Data (Libraries, 8172525)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534299" id="1534299" title="Openjdk: Ldaploginmodule Insufficient Username Encoding In Ldap Query (Ldap, 8178449)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534525" id="1534525" title="Openjdk: Loading Of Classes From Untrusted Locations (I18N, 8182601)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534543" id="1534543" title="Openjdk: Dnsclient Missing Source Port Randomization (Jndi, 8182125)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534553" id="1534553" title="Openjdk: Dervalue Unbounded Memory Allocation (Libraries, 8182387)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534625" id="1534625" title="Openjdk: Gss Context Use-After-Free (Jgss, 8186212)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534762" id="1534762" title="Openjdk: Insufficient Strength Of Key Agreement (Jce, 8185292)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534766" id="1534766" title="Openjdk: Gtk Library Loading Use-After-Free (Awt, 8185325)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534943" id="1534943" title="Openjdk: Use Of Global Credentials For Http/Spnego (Jgss, 8186600)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534970" id="1534970" title="Openjdk: Singleentryregistry Incorrect Setup Of Deserialization Filter (Jmx, 8186998)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1535036" id="1535036" title="Openjdk: Ldapcertstore Insecure Handling Of Ldap Referrals (Jndi, 8186606)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0350-1</id><title>Gcab</title><description>Security Fix(es): 
* gcab: Extracting malformed .cab files causes stack smashing potentially leading to arbitrary code execution (CVE-2018-5345)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-02-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gcab" release="4.el7_4" src="gcab-0.7-4.el7_4.src.rpm" version="0.7"><filename>gcab-0.7-4.el7_4.x86_64.rpm</filename><sum type="sha256">66aeb03b8de845bbfd965e317eeaa179abc85347aa0abb51912d840f5ed6c9d3</sum></package><package arch="x86_64" name="libgcab1-devel" release="4.el7_4" src="gcab-0.7-4.el7_4.src.rpm" version="0.7"><filename>libgcab1-devel-0.7-4.el7_4.x86_64.rpm</filename><sum type="sha256">52e5d620a56e605a11b4b21eb6fd53a25374689b4d1f7270a0ee03b7cc292374</sum></package><package arch="i686" name="libgcab1" release="4.el7_4" src="gcab-0.7-4.el7_4.src.rpm" version="0.7"><filename>libgcab1-0.7-4.el7_4.i686.rpm</filename><sum type="sha256">5b8dc9d30c91a7c39fddb9ebac8a71b812001bff1eff9c833764fc9ea3d50fd3</sum></package><package arch="x86_64" name="libgcab1" release="4.el7_4" src="gcab-0.7-4.el7_4.src.rpm" version="0.7"><filename>libgcab1-0.7-4.el7_4.x86_64.rpm</filename><sum type="sha256">e829580ce63efdc2bda6d45c0bf4427f2fd236be1326b9aedf797cf8ff977d4a</sum></package><package arch="i686" name="libgcab1-devel" release="4.el7_4" src="gcab-0.7-4.el7_4.src.rpm" version="0.7"><filename>libgcab1-devel-0.7-4.el7_4.i686.rpm</filename><sum type="sha256">62b51af38c2f462a63b39a4cd748e7e611c9d14cd355f423f448ddfb88853757</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5345" id="CVE-2018-5345" title="Gcab: Extracting Malformed .Cab Files Causes Stack Smashing Potentially Leading To Arbitrary Code Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0350" id="RHSA-2018:0350-1" title="Rhsa-2018:0350-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1527296" id="1527296" title="Gcab: Extracting Malformed .Cab Files Causes Stack Smashing Potentially Leading To Arbitrary Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0377-1</id><title>Quagga</title><description>Security Fix(es): 
* quagga: Double free vulnerability in bgpd when processing certain forms of UPDATE message allowing to crash or potentially execute arbitrary code (CVE-2018-5379)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-02-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="quagga-devel" release="5.el7_4" src="quagga-0.99.22.4-5.el7_4.src.rpm" version="0.99.22.4"><filename>quagga-devel-0.99.22.4-5.el7_4.x86_64.rpm</filename><sum type="sha256">e2996381ca9e162f719bbf8bedbeaa85db97c93db1b80c53636770b9013d78b0</sum></package><package arch="i686" name="quagga-devel" release="5.el7_4" src="quagga-0.99.22.4-5.el7_4.src.rpm" version="0.99.22.4"><filename>quagga-devel-0.99.22.4-5.el7_4.i686.rpm</filename><sum type="sha256">f9f74fea89a4ce56a85dde01077332393e7c380b6826e0d308ebb5b8b1f2f9d1</sum></package><package arch="i686" name="quagga" release="5.el7_4" src="quagga-0.99.22.4-5.el7_4.src.rpm" version="0.99.22.4"><filename>quagga-0.99.22.4-5.el7_4.i686.rpm</filename><sum type="sha256">2f63821e48f01ecbceacbf9168ca72ac3b705243a14f7f022e2675032d6404d1</sum></package><package arch="x86_64" name="quagga" release="5.el7_4" src="quagga-0.99.22.4-5.el7_4.src.rpm" version="0.99.22.4"><filename>quagga-0.99.22.4-5.el7_4.x86_64.rpm</filename><sum type="sha256">2a766d7e3c7478047e22d3c876dd4dd125019316853dad3ff626f897f8c29fbc</sum></package><package arch="x86_64" name="quagga-contrib" release="5.el7_4" src="quagga-0.99.22.4-5.el7_4.src.rpm" version="0.99.22.4"><filename>quagga-contrib-0.99.22.4-5.el7_4.x86_64.rpm</filename><sum type="sha256">a6ffc93cdc63de8004b7e67b80c3f4d0350fe7a18895925591701e72e5b0af82</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5379" id="CVE-2018-5379" title="Quagga: Double Free Vulnerability In Bgpd When " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0377" id="RHSA-2018:0377-1" title="Rhsa-2018:0377-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1542985" id="1542985" title="Quagga: Double Free Vulnerability In Bgpd When " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0378-1</id><title>Ruby</title><description>Security Fix(es): 
* It was discovered that the Net::FTP module did not properly process filenames in combination with certain operations. A remote attacker could exploit this flaw to execute arbitrary commands by setting up a malicious FTP server and tricking a user or Ruby application into downloading files with specially crafted names using the Net::FTP module. (CVE-2017-17405) 
* A buffer underflow was found in ruby's sprintf function. An attacker, with ability to control its format string parameter, could send a specially crafted string that would disclose heap memory or crash the interpreter. (CVE-2017-0898) 
* It was found that rubygems did not sanitize gem names during installation of a given gem. A specially crafted gem could use this flaw to install files outside of the regular directory. (CVE-2017-0901) 
* A vulnerability was found where rubygems did not sanitize DNS responses when requesting the hostname of the rubygems server for a domain, via a _rubygems._tcp DNS SRV query. An attacker with the ability to manipulate DNS responses could direct the gem command towards a different domain. (CVE-2017-0902) 
* A vulnerability was found where the rubygems module was vulnerable to an unsafe YAML deserialization when inspecting a gem. Applications inspecting gem files without installing them can be tricked to execute arbitrary code in the context of the ruby interpreter. (CVE-2017-0903) 
* It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences. (CVE-2017-10784) 
* It was found that the decode method of the OpenSSL::ASN1 module was vulnerable to buffer underrun. An attacker could pass a specially crafted string to the application in order to crash the ruby interpreter, causing a denial of service. (CVE-2017-14033) 
* A vulnerability was found where rubygems did not properly sanitize gems' specification text. A specially crafted gem could interact with the terminal via the use of escape sequences. (CVE-2017-0899) 
* It was found that rubygems could use an excessive amount of CPU while parsing a sufficiently long gem summary. A specially crafted gem from a gem repository could freeze gem commands attempting to parse its summary. (CVE-2017-0900) 
* A buffer overflow vulnerability was found in the JSON extension of ruby. An attacker with the ability to pass a specially crafted JSON input to the extension could use this flaw to expose the interpreter's heap memory. (CVE-2017-14064) 
* The "lazy_initialize" function in lib/resolv.rb did not properly process certain filenames. A remote attacker could possibly exploit this flaw to inject and execute arbitrary commands. (CVE-2017-17790)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-02-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="rubygem-rake" release="33.el7_4" src="ruby-2.0.0.648-33.el7_4.src.rpm" version="0.9.6"><filename>rubygem-rake-0.9.6-33.el7_4.noarch.rpm</filename><sum type="sha256">b556e94365191f3a66fccb6c8ce78017d245189875a9d3cb80a3d3bec9a863e5</sum></package><package arch="noarch" name="rubygems" release="33.el7_4" src="ruby-2.0.0.648-33.el7_4.src.rpm" version="2.0.14.1"><filename>rubygems-2.0.14.1-33.el7_4.noarch.rpm</filename><sum type="sha256">4b4ef315123837b5f62615a9ed3513dd3192f0298460f30797b6faa85472e5a5</sum></package><package arch="x86_64" name="ruby-tcltk" release="33.el7_4" src="ruby-2.0.0.648-33.el7_4.src.rpm" version="2.0.0.648"><filename>ruby-tcltk-2.0.0.648-33.el7_4.x86_64.rpm</filename><sum type="sha256">0052b413b41586cd1fd6123bd87760a1307e2a684a1cd04d6cad40a51869859d</sum></package><package arch="x86_64" name="rubygem-psych" release="33.el7_4" src="ruby-2.0.0.648-33.el7_4.src.rpm" version="2.0.0"><filename>rubygem-psych-2.0.0-33.el7_4.x86_64.rpm</filename><sum type="sha256">572dbe12072dd0abaf62aedaf46c7b8c22ffa9773027998d969a434fc81e6e8c</sum></package><package arch="x86_64" name="ruby" release="33.el7_4" src="ruby-2.0.0.648-33.el7_4.src.rpm" version="2.0.0.648"><filename>ruby-2.0.0.648-33.el7_4.x86_64.rpm</filename><sum type="sha256">21d15b10a8a89ccce774e33e4dec75bc2244a2590d23540b4b30d481ac688103</sum></package><package arch="x86_64" name="ruby-devel" release="33.el7_4" src="ruby-2.0.0.648-33.el7_4.src.rpm" version="2.0.0.648"><filename>ruby-devel-2.0.0.648-33.el7_4.x86_64.rpm</filename><sum type="sha256">72b9381f6d6813aebce4739514f28b932f6ba39272350535ccc70a6b0894234a</sum></package><package arch="noarch" name="rubygems-devel" release="33.el7_4" src="ruby-2.0.0.648-33.el7_4.src.rpm" version="2.0.14.1"><filename>rubygems-devel-2.0.14.1-33.el7_4.noarch.rpm</filename><sum type="sha256">3b9881b46155776ed25eb569c2211a124e2f8a50a2a0bc30d397cff14addb72a</sum></package><package arch="x86_64" name="ruby-libs" release="33.el7_4" src="ruby-2.0.0.648-33.el7_4.src.rpm" version="2.0.0.648"><filename>ruby-libs-2.0.0.648-33.el7_4.x86_64.rpm</filename><sum type="sha256">2751cd731fde81090f85bb8c0c9b38b0957c3c2e9b3e0bc427050a7f5f0562b6</sum></package><package arch="noarch" name="rubygem-minitest" release="33.el7_4" src="ruby-2.0.0.648-33.el7_4.src.rpm" version="4.3.2"><filename>rubygem-minitest-4.3.2-33.el7_4.noarch.rpm</filename><sum type="sha256">8a8550ba82e73fdb125924adf381b5eb7e28e8e6a712e48c2cd0d9b51f1a553e</sum></package><package arch="noarch" name="rubygem-rdoc" release="33.el7_4" src="ruby-2.0.0.648-33.el7_4.src.rpm" version="4.0.0"><filename>rubygem-rdoc-4.0.0-33.el7_4.noarch.rpm</filename><sum type="sha256">433369a59f9bdb87a5c23a34083808c02b66c597b7b12b4d637e8a00b580f834</sum></package><package arch="x86_64" name="rubygem-io-console" release="33.el7_4" src="ruby-2.0.0.648-33.el7_4.src.rpm" version="0.4.2"><filename>rubygem-io-console-0.4.2-33.el7_4.x86_64.rpm</filename><sum type="sha256">ee78ab6cd2c4d4c74d43a905aeb56f5a6f49cf2cbd68c8d55426019995098865</sum></package><package arch="x86_64" name="rubygem-json" release="33.el7_4" src="ruby-2.0.0.648-33.el7_4.src.rpm" version="1.7.7"><filename>rubygem-json-1.7.7-33.el7_4.x86_64.rpm</filename><sum type="sha256">e0ffcee1bcca518859240b4c10025f30cdc9ca74b3b7d3fb8951515532dee7b3</sum></package><package arch="x86_64" name="rubygem-bigdecimal" release="33.el7_4" src="ruby-2.0.0.648-33.el7_4.src.rpm" version="1.2.0"><filename>rubygem-bigdecimal-1.2.0-33.el7_4.x86_64.rpm</filename><sum type="sha256">ac2eff3f0c92f7f1f7bb012d3097bb7774a37498b8ceebac7bf0c5388aae60b5</sum></package><package arch="i686" name="ruby-libs" release="33.el7_4" src="ruby-2.0.0.648-33.el7_4.src.rpm" version="2.0.0.648"><filename>ruby-libs-2.0.0.648-33.el7_4.i686.rpm</filename><sum type="sha256">05a70486176c287088ff96d135bc9b73875c36ccce6742c70a4b55edf6d2ffa9</sum></package><package arch="noarch" name="ruby-doc" release="33.el7_4" src="ruby-2.0.0.648-33.el7_4.src.rpm" version="2.0.0.648"><filename>ruby-doc-2.0.0.648-33.el7_4.noarch.rpm</filename><sum type="sha256">3e2137e6cfbd617f61ca1176d3e8986a4bde76c2dc1e1f185d454e29ae73bbfa</sum></package><package arch="noarch" name="ruby-irb" release="33.el7_4" src="ruby-2.0.0.648-33.el7_4.src.rpm" version="2.0.0.648"><filename>ruby-irb-2.0.0.648-33.el7_4.noarch.rpm</filename><sum type="sha256">e546453d6e85d71d1337de011a3f5fbd28c7874f6397809d9fd33ed99f9adb52</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0898" id="CVE-2017-0898" title="Ruby: Buffer Underrun Vulnerability In Kernel.Sprintf" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0899" id="CVE-2017-0899" title="Rubygems: Escape Sequence In The &quot;Summary&quot; Field Of Gemspec" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0900" id="CVE-2017-0900" title="Rubygems: No Size Limit In Summary Length Of Gem Spec" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0901" id="CVE-2017-0901" title="Rubygems: Arbitrary File Overwrite Due To Incorrect Validation Of Specification Name" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0902" id="CVE-2017-0902" title="Rubygems: Dns Hijacking Vulnerability" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0903" id="CVE-2017-0903" title="Rubygems: Unsafe Object Deserialization Through Yaml Formatted Gem Specifications" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10784" id="CVE-2017-10784" title="Ruby: Escape Sequence Injection Vulnerability In The Basic Authentication Of Webrick" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14033" id="CVE-2017-14033" title="Ruby: Buffer Underrun In Openssl Asn1 Decode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14064" id="CVE-2017-14064" title="Ruby: Arbitrary Heap Exposure During A Json.Generate Call" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17405" id="CVE-2017-17405" title="Ruby: Command Injection Vulnerability In Net::Ftp" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17790" id="CVE-2017-17790" title="Ruby: Command Injection In Lib/Resolv.Rb:Lazy_Initialize() Allows Arbitrary Code Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0378" id="RHSA-2018:0378-1" title="Rhsa-2018:0378-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1487552" id="1487552" title="Ruby: Arbitrary Heap Exposure During A Json.Generate Call" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1487587" id="1487587" title="Rubygems: Arbitrary File Overwrite Due To Incorrect Validation Of Specification Name" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1487588" id="1487588" title="Rubygems: No Size Limit In Summary Length Of Gem Spec" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1487589" id="1487589" title="Rubygems: Dns Hijacking Vulnerability" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1487590" id="1487590" title="Rubygems: Escape Sequence In The &quot;Summary&quot; Field Of Gemspec" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1491866" id="1491866" title="Ruby: Buffer Underrun In Openssl Asn1 Decode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1492012" id="1492012" title="Ruby: Escape Sequence Injection Vulnerability In The Basic Authentication Of Webrick" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1492015" id="1492015" title="Ruby: Buffer Underrun Vulnerability In Kernel.Sprintf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1500488" id="1500488" title="Rubygems: Unsafe Object Deserialization Through Yaml Formatted Gem Specifications" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1526189" id="1526189" title="Ruby: Command Injection Vulnerability In Net::Ftp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1528218" id="1528218" title="Ruby: Command Injection In Lib/Resolv.Rb:Lazy_Initialize() Allows Arbitrary Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0395-1</id><title>Kernel</title><description>Security Fix(es): 
* Kernel: KVM: MMU potential stack buffer overrun during page walks (CVE-2017-12188, Important) 
* Kernel: KVM: debug exception via syscall emulation (CVE-2017-7518, Moderate)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-03-07 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools-libs-devel" release="693.21.1.el7" src="kernel-3.10.0-693.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-693.21.1.el7.x86_64.rpm</filename><sum type="sha256">60b4799aad11eabfd109e3dea3b23390a9d55bfeea738dafddc9d17fdd5d0d65</sum></package><package arch="x86_64" name="perf" release="693.21.1.el7" src="kernel-3.10.0-693.21.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-693.21.1.el7.x86_64.rpm</filename><sum type="sha256">13ad3b80b5e39afa1b3f29b68fbb4b0a248d0c2e6f72f769e3b9205900d10a3a</sum></package><package arch="x86_64" name="kernel-debug-devel" release="693.21.1.el7" src="kernel-3.10.0-693.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-693.21.1.el7.x86_64.rpm</filename><sum type="sha256">77a438b4f506ccf5cc3ba132176225348f497a8e4386cb4ecac71b0a2432eb03</sum></package><package arch="x86_64" name="kernel-debug" release="693.21.1.el7" src="kernel-3.10.0-693.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-693.21.1.el7.x86_64.rpm</filename><sum type="sha256">85c17797efa9fcfdb7e25ea8becea5a49f5456c7cb9317f353029bf0ba1721db</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="693.21.1.el7" src="kernel-3.10.0-693.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-693.21.1.el7.noarch.rpm</filename><sum type="sha256">63fbe7ade932e4b71d32e37fed27a996811a22f153e1202e99e61c8618bf8e1c</sum></package><package arch="x86_64" name="kernel" release="693.21.1.el7" src="kernel-3.10.0-693.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-693.21.1.el7.x86_64.rpm</filename><sum type="sha256">ea256d994097c422d0089e7f2ea61489150be4f8d1ffb1572ea023866cb97328</sum></package><package arch="x86_64" name="kernel-tools-libs" release="693.21.1.el7" src="kernel-3.10.0-693.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-693.21.1.el7.x86_64.rpm</filename><sum type="sha256">35ef5409d06028e7d72a64fcdfe04c4242d9dc0434df68bae0f652d9e54ea75b</sum></package><package arch="noarch" name="kernel-doc" release="693.21.1.el7" src="kernel-3.10.0-693.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-693.21.1.el7.noarch.rpm</filename><sum type="sha256">7feada8ff95a08b012fab5b1627fa0ee81fbddec7864a861a67ee55ee24791fb</sum></package><package arch="x86_64" name="kernel-tools" release="693.21.1.el7" src="kernel-3.10.0-693.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-693.21.1.el7.x86_64.rpm</filename><sum type="sha256">c6a2b4c27c0a09d42e3e7f0b3b85c5d817e17a32a2ae6399542f74510fad2581</sum></package><package arch="x86_64" name="python-perf" release="693.21.1.el7" src="kernel-3.10.0-693.21.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-693.21.1.el7.x86_64.rpm</filename><sum type="sha256">034e53663cce97e1f0c43d9bb7c614547fe21dd993d165cd0d2b692d8396bbab</sum></package><package arch="x86_64" name="kernel-devel" release="693.21.1.el7" src="kernel-3.10.0-693.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-693.21.1.el7.x86_64.rpm</filename><sum type="sha256">cbe1e57ce4cc8b32356a7af8ccf3a763732af3070fbbc55a4400a2afda7c4a4a</sum></package><package arch="x86_64" name="kernel-headers" release="693.21.1.el7" src="kernel-3.10.0-693.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-693.21.1.el7.x86_64.rpm</filename><sum type="sha256">fc0cdddac698a397281b9a4559d04d9e02540eacd07331b1440d4b1e05efb26f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12188" id="CVE-2017-12188" title="Kernel: Kvm: Mmu Potential Stack Buffer Overrun During Page Walks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7518" id="CVE-2017-7518" title="Kernel: Kvm: Debug Exception Via Syscall Emulation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0395" id="RHSA-2018:0395-1" title="Rhsa-2018:0395-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1464473" id="1464473" title="Kernel: Kvm: Debug Exception Via Syscall Emulation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1500380" id="1500380" title="Kernel: Kvm: Mmu Potential Stack Buffer Overrun During Page Walks" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0406-1</id><title>Php</title><description>Security Fix(es): 
* php: Buffer over-read from unitialized data in gdImageCreateFromGifCtx function (CVE-2017-7890)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-03-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="php-mbstring" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-mbstring-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">38971b6424e202a8b9b19dcab2bd2af29b0d1f7bd523816c9f51bd30aa71f9df</sum></package><package arch="x86_64" name="php-recode" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-recode-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">544710fa651d000299272b9ce2a690259838b238178c88909b55243643a2be24</sum></package><package arch="x86_64" name="php-dba" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-dba-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">51688cde9e003ef9a2a37df425f6987407ce39918f6591b71f250a43a5bc1d4c</sum></package><package arch="x86_64" name="php-pspell" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-pspell-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">67848ac4991848db97be6f6870f456ef9729ae84f169d4e08ea859f1fe73dc1b</sum></package><package arch="x86_64" name="php-mysqlnd" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-mysqlnd-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">9bcc5d1656a8c5b5d133a191d430b3ec8652c17429f6f7715a184a17aa27bec7</sum></package><package arch="x86_64" name="php" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">ede52aae61026d8e5cc490a88926239df5bd93420a75c19303b0257b98d3838d</sum></package><package arch="x86_64" name="php-cli" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-cli-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">8943dc8f9a4fb9c822e61226fef7b8aa00dfccd60ec55126989d3e71719ee182</sum></package><package arch="x86_64" name="php-intl" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-intl-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">01392753f21aa68d0b149e56c82d4417fc690c06aea2857c2a0f1d01f21e25bc</sum></package><package arch="x86_64" name="php-pdo" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-pdo-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">df78d8b360d5e3f8ea0b4ad671ca7da9122020d280ddae85baedf8db5de35d4d</sum></package><package arch="x86_64" name="php-common" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-common-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">52e597ad759dbb86c61bad9e5b1004595c54a09c174ea0ab73870430bd96d4f0</sum></package><package arch="x86_64" name="php-snmp" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-snmp-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">3e45ae4919f184086ddd4c44d5882e2f66b17585c75a6f87d28c9a78222e120c</sum></package><package arch="x86_64" name="php-pgsql" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-pgsql-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">04884223d555a12f67e14ef3882878b4f673e6acdb8df536409c1ebdc12a5ed0</sum></package><package arch="x86_64" name="php-devel" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-devel-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">5cafc326306ce746afddc89d912f2ee0578aa5c7b9b02bdf6440e125a6752394</sum></package><package arch="x86_64" name="php-enchant" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-enchant-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">dcba8b260c3f360b6453b5cf0e8a4a957292bc88326b6b350bf73c532c28f43a</sum></package><package arch="x86_64" name="php-mysql" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-mysql-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">2b732091c8629bf951d93ec71941ddd4720c5e7351e88887131109b4920861b8</sum></package><package arch="x86_64" name="php-gd" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-gd-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">f2f79c2862810ccdab945394bdf99e1c078df18b02ea2d55a53bee433887f2f1</sum></package><package arch="x86_64" name="php-soap" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-soap-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">ad5a28ec668f918764161f64564904a8cbbd7dec7877bafb580467cb7929b244</sum></package><package arch="x86_64" name="php-process" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-process-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">274e8fa4101954034838852fa684bd230940fe24534289ea1c83288970557de9</sum></package><package arch="x86_64" name="php-bcmath" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-bcmath-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">2343d016872e24b37080d228313b77b19920e8a5f2d765fd8b41864c76ce4254</sum></package><package arch="x86_64" name="php-xml" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-xml-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">b56f8680f18eb4194e64d2defca12e1344606fddf53715b8b7e3fa302cc55481</sum></package><package arch="x86_64" name="php-ldap" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-ldap-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">e885248b792bf705c4ebd32be34a42514de2af8c8e1a426035b33e3563104349</sum></package><package arch="x86_64" name="php-xmlrpc" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-xmlrpc-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">47b1a92dbbcafc07471bad63752a85afb457fdb6cc0c3bddb35ff0913a3d5bbd</sum></package><package arch="x86_64" name="php-fpm" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-fpm-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">7e8f44b3586196230f9cafbce57df40105fa675eac617bd07f6e9a7e200d1c49</sum></package><package arch="x86_64" name="php-odbc" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-odbc-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">6705d250fbada743474a98a5073c617e479ffb04693e96f62b16b8840e6db100</sum></package><package arch="x86_64" name="php-embedded" release="43.el7_4.1" src="php-5.4.16-43.el7_4.1.src.rpm" version="5.4.16"><filename>php-embedded-5.4.16-43.el7_4.1.x86_64.rpm</filename><sum type="sha256">5e3e3f4ec1471ea38e690a15ff67578012b18325a110ceb2bef4d7ab95be1237</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7890" id="CVE-2017-7890" title="Php: Buffer Over-Read From Unitialized Data In Gdimagecreatefromgifctx Function" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0406" id="RHSA-2018:0406-1" title="Rhsa-2018:0406-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1473822" id="1473822" title="Php: Buffer Over-Read From Unitialized Data In Gdimagecreatefromgifctx Function" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0414-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* 389-ds-base: remote Denial of Service (DoS) via search filters in SetUnicodeStringFromUTF_8 in collate.c (CVE-2018-1054) 
* 389-ds-base: Authentication bypass due to lack of size check in slapi_ct_memcmp function in ch_malloc.c (CVE-2017-15135) 
Bug Fix(es): 
* Previously, if an administrator configured an index for an attribute with a specific matching rule in the "nsMatchingRule" parameter, Directory Server did not use the retrieved indexer. As a consequence, Directory Server did not index the values of this attribute with the specified matching rules, and searches with extended filters were unindexed. With this update, Directory Server uses the retrieved indexer that processes the specified matching rule. As a result, searches using extended filters with a specified matching rule are now indexed.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-03-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-snmp" release="28.el7_4" src="389-ds-base-1.3.6.1-28.el7_4.src.rpm" version="1.3.6.1"><filename>389-ds-base-snmp-1.3.6.1-28.el7_4.x86_64.rpm</filename><sum type="sha256">a5c9e28aaf0d735b3f53675c60a97649d4010d0eda22a072a63ef1087c9267fc</sum></package><package arch="x86_64" name="389-ds-base" release="28.el7_4" src="389-ds-base-1.3.6.1-28.el7_4.src.rpm" version="1.3.6.1"><filename>389-ds-base-1.3.6.1-28.el7_4.x86_64.rpm</filename><sum type="sha256">e0e47ca1813e4be2042cccb9a4bea96109e8001dcd444887c66992d6ee321a1d</sum></package><package arch="x86_64" name="389-ds-base-devel" release="28.el7_4" src="389-ds-base-1.3.6.1-28.el7_4.src.rpm" version="1.3.6.1"><filename>389-ds-base-devel-1.3.6.1-28.el7_4.x86_64.rpm</filename><sum type="sha256">4a5bcad22d87ec8e943b460a324e4b57b2aa9c76f842fd7777100f86f8dd7f9f</sum></package><package arch="x86_64" name="389-ds-base-libs" release="28.el7_4" src="389-ds-base-1.3.6.1-28.el7_4.src.rpm" version="1.3.6.1"><filename>389-ds-base-libs-1.3.6.1-28.el7_4.x86_64.rpm</filename><sum type="sha256">802aa441365ceb75268936bd397d1b53fd6d648dc87f6b48a251712e2b8701de</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15135" id="CVE-2017-15135" title="389-Ds-Base: Authentication Bypass Due To Lack Of Size Check In Slapi_Ct_Memcmp Function In Ch_Malloc.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1054" id="CVE-2018-1054" title="389-Ds-Base: Remote Denial Of Service (Dos) Via Search Filters In Setunicodestringfromutf_8 In Collate.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0414" id="RHSA-2018:0414-1" title="Rhsa-2018:0414-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1525628" id="1525628" title="389-Ds-Base: Authentication Bypass Due To Lack Of Size Check In Slapi_Ct_Memcmp Function In Ch_Malloc.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537314" id="1537314" title="389-Ds-Base: Remote Denial Of Service (Dos) Via Search Filters In Setunicodestringfromutf_8 In Collate.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0418-1</id><title>Libreoffice</title><description>Security Fix(es): 
* libreoffice: Remote arbitrary file disclosure vulnerability via WEBSERVICE formula (CVE-2018-6871)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-03-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="autocorr-fa" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-fa-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">169399ab69c537bfa9c4e865e07aa3a02b482c20d220a99da156d6566c88142b</sum></package><package arch="x86_64" epoch="1" name="libreoffice" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">4a3dc0f4c6b9a37ec84e66e743d1252b9ddd391ba309d5675683dfed53879485</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nr" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nr-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">66b87d80ea062b50613c9b8c514b40004d8d6c1f9a42744cfb7fdd061b687317</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-da" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-da-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">f5298b2b461e8fd2c849cdb7a144ad6929739539905a7d8d1da5051cc8acbc74</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kk" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-kk-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">c72a072c462f75044265aaa3c34b3cd8711bba03bc40b9d51c76c607a55947ba</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ve" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ve-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">14764cebe5a1dcd35d975896b4fe5ea3b7cf17bb2cff374d9899b010b3754bba</sum></package><package arch="i686" epoch="1" name="libreofficekit" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreofficekit-5.0.6.2-15.el7_4.i686.rpm</filename><sum type="sha256">1038f463d1d259024a694a228a1887f7e2799f0c99dd5831bad9aca61b53cf5c</sum></package><package arch="x86_64" epoch="1" name="libreofficekit-devel" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreofficekit-devel-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">cdfa49e01591807c6c2726d8db99a2976dd8e3b97bfade54c1f54131cef07308</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cy" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-cy-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">e423c767ae8f7e60a6511afe74b7ca8b7f060c3a3a0b68ea427097c0a7452082</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hr" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-hr-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">0921dfafdf084e0751d30706997bdeb1d14863aa43cd23e5275b26d3804d6988</sum></package><package arch="noarch" epoch="1" name="autocorr-fi" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-fi-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">c4cfef52962d844afbbfe47f02aa8130366cc7ba4114565f040e4e5132deca52</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pyuno" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-pyuno-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">75aee962633beb764c511538377c0f4cba6c75c3af18225787dd54a9773dfbbc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-bsh" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-bsh-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">4dda45f0375b01df54a477f292e3c16256279f6b0d71f8234d3f0951e69a6fb2</sum></package><package arch="noarch" epoch="1" name="autocorr-es" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-es-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">be25eb991565656af7174270fdd5543ea3bfeadecb61216f055c11958f6f13e6</sum></package><package arch="noarch" epoch="1" name="autocorr-zh" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-zh-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">f396eb521ef2ab9a01622cf03488d2366c8154d369ecb82c5844760bf2b1b460</sum></package><package arch="noarch" epoch="1" name="autocorr-is" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-is-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">34a3a1620a7157db30cfccc1fe95d929faca9e2637651acb140a97e61c430b9d</sum></package><package arch="noarch" epoch="1" name="libreoffice-opensymbol-fonts" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-opensymbol-fonts-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">3a171ebb753d5f15f0efbb9a7695ff95823eda24971c91836c765d84f61f5675</sum></package><package arch="noarch" epoch="1" name="autocorr-ro" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-ro-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">58b8c8ba5c5d0188d286f678434f2c89c44d72061d72976c66a896d255cc30f7</sum></package><package arch="noarch" epoch="1" name="autocorr-tr" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-tr-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">62440472529b94276a6ca0ea218b46e66a246225c218c98202d17112d87bb4e5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sk" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-sk-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">027e6989a8b9c1554316498e57482913a6aaeeb155100d9b7e947057aae98acf</sum></package><package arch="noarch" epoch="1" name="autocorr-ca" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-ca-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">192da6ad21a7403f51ebc9c56e59033fa83d4e9336b9e5ca9d553270ba131c2f</sum></package><package arch="noarch" epoch="1" name="autocorr-ga" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-ga-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">7eb708e74f9227e7cb6d6d355fadd7abefd5e9c6fc626e5c7f43a5f7be1d7a7f</sum></package><package arch="noarch" epoch="1" name="autocorr-ja" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-ja-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">e01c1ec4fd85bb155ce44756d2042cdd235b0a96df4bd6d3ad775f7539abc92d</sum></package><package arch="noarch" epoch="1" name="autocorr-vi" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-vi-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">4931f23e98270bd5ca9c18f168888e0757e8335d00f92b32c8a8eb0ef7a9d9b0</sum></package><package arch="noarch" epoch="1" name="autocorr-bg" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-bg-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">bb46e8eb22beb760b1e621cd804da615b26aac2ee5ebf947ad7af33c237e182e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lt" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-lt-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">4a8cf45124feec8abae088f66d0cf40b798eb769a73d2759bad9deb04d7fa2f9</sum></package><package arch="noarch" epoch="1" name="autocorr-sk" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-sk-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">1730caffc6e5c11464eebc31d887753fdc0d13e1fbcdb17e0c0c89261d17ec34</sum></package><package arch="noarch" epoch="1" name="autocorr-pt" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-pt-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">585e8b579233976cf05da59941d2ab81313b03deca1afbc13a311c4ec83f583f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-es" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-es-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">2bbc5ad3995b59d6fd7bb67cffb7e3abe57db3c26d0d3fe981a08dca444bccac</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zu" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-zu-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">da82876b42dcb399cfe69e73d7867ae490225ca2329a9d87e441a8bc6e0615d9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-st" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-st-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">735da5ab50f38b82dcc1e5a69d7363a02341a4a712ffffcd0c5fa73895093f3f</sum></package><package arch="noarch" epoch="1" name="autocorr-hu" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-hu-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">2518d8a425ab9ae06f90eade8fee76d93b08d1f29e4c5b6bb0ad8f5fc7721454</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-it" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-it-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">518362e48b92363bf6b7a2c9287210eadb537af8da2868cff22a76b74cf24a29</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fr" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-fr-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">f0e016b5fc7c73b1457790f67b7974dc4498306cfc73b021f1c7b8f70ddbd41e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-filters" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-filters-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">a91809d2c57fef5faeb59f17f970c7af3040257d61b2b51dead397fbe6067db9</sum></package><package arch="noarch" epoch="1" name="autocorr-de" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-de-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">a6833cd9bd1157d24ff6e4cf6ec3cbbceaa369a3ced82f4cdc6ae9f74040e96c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-xh" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-xh-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">a24562e1fc7b377299e33b3aabed0d8dfcf4035f60b03f0b72802b971b83b852</sum></package><package arch="x86_64" epoch="1" name="libreoffice-core" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-core-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">f33158cfb6cf7c0b5928ad1f1979efacb02f209562977a966a351ba361f3dbf0</sum></package><package arch="noarch" epoch="1" name="autocorr-lb" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-lb-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">b483202220b776b232b8a7dc09e020999a9a54cb314fff5a8747e779ce65ed7a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-postgresql" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-postgresql-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">dbd3c77b56b9d239ce3e5f8119ba6747cb0c8791b9b2f13f2b1de8f2d7adf768</sum></package><package arch="noarch" epoch="1" name="autocorr-sv" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-sv-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">f4a5d4d55427f94423925fcd53bc73aac4087085819ee126e7a333bdb5ccefb1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ro" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ro-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">5b8e2295d199ddf60b06b0f685c85c0328a1492951f8c52ea9e936cea0cee05b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-glade" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-glade-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">3cd37cb531f85d329ee8c7daa54698981cefd79b529a69bd2e8d2c8b398b4490</sum></package><package arch="x86_64" epoch="1" name="libreoffice-librelogo" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-librelogo-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">e86d51828235093e4cd398ecf1c0ae474d2f8be71738dfdf6d168f1010db94b5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hans" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-zh-Hans-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">28815538e1b1172666fb5ebb7edec4515b7002ed2f0f460efb88e3abea85f870</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ru" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ru-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">3d242850eb3267fb248b74f9826959f0c60c76e4634547db1d17474574cb04d6</sum></package><package arch="noarch" epoch="1" name="autocorr-ru" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-ru-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">f2b223cf6876fc4c54821f87f4d0de606b1e55c3d01f39b5a4548639f52fd34e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ta" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ta-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">1f2ff98b57e72a346f269d468a8e31f701a3245f3726ea093d0e8a254b9d7b2d</sum></package><package arch="noarch" epoch="1" name="autocorr-en" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-en-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">8cd7d4693db07224108b086676b6f33fb5a0b92200e10b3a5a5fc1c1e60931ee</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk-doc" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-sdk-doc-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">19867cc88f7c5ea5d6e6e2f1366ba212c852e97b4057124daa2f1f8dcd237053</sum></package><package arch="x86_64" epoch="1" name="libreoffice-officebean" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-officebean-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">95c3da48af3a8609121f1dbe55f79910f397858b96460027705eb83df1bbb57c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-impress" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-impress-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">343b90c210c4e099954b983d092de6a7efef4ba2103c235a97ace4ddbc98a7f0</sum></package><package arch="noarch" epoch="1" name="autocorr-pl" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-pl-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">89ea0bdb6fa7bafe66255f2bcde8307fcd516ff4c514037453059353eb5571f9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-PT" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-pt-PT-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">65fe6b82d830a12be11d1d39d285dd05ab42867bbceb7b2593927f3f8bf7dbd1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ca" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ca-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">26b91a0f13df7063079555fbbe93c5f8f4aeb26c21b10d2d2339cb6080f2d589</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-et" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-et-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">6e0cf5abe09c014744800aea9e1d26ecf10544e6582c6969c23a958d3bd8f61c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-si" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-si-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">578fd5b20dadabdc4531663cfe092c5e2e70a777dc6d3edc991846b8b92220a5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mai" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-mai-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">9dc9cb3a8913507ba699809679fe4662f739cb45f7cd704c9ddcaebf694a368b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cs" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-cs-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">eb6ceacd3cded675e5ae3451ac8e8f0eedc2d824a3513596f7b70f82cafbdede</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ts" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ts-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">610b26a1d1cd2a24caa00bafd8c6b2b3266317a63a718f05d968016a9349a940</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-uk" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-uk-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">aa5568873169fd35918e28295a0984ec9f461746672eac36327b5d4655a3b960</sum></package><package arch="x86_64" epoch="1" name="libreoffice-writer" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-writer-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">4d8df70092f52d1dc8b69a3862e3a21798d0e7d058c1cf75664fd834c758f8d9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-af" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-af-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">ce83e08e45bce533e9e6fb91094d0306c2caa793ccc0de41296f9b1a2e378c64</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-de" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-de-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">32ccbfecdc9d474cdd6b3fddb1cb59abbbd8cf00a9a2deb1ee87c80a7bd2d237</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sv" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-sv-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">9806d2ef93e9a6cd9dc54f709627ad373c04c51c624c584f2ac0ff51eae18fc9</sum></package><package arch="noarch" epoch="1" name="autocorr-it" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-it-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">5914d95f36af2fb3dfbcdc529589cf9d25611536da7200c303d7d4a1904031cd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-draw" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-draw-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">c8212fa2beaeeb51965c6efa247b3615db8f49eb791470729158a43da67a2f2c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-as" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-as-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">885fd76f059e1c65fec3d53039fe05c4c80072397cd4e040aee2c48f0e684324</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hu" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-hu-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">c06c5653530b6cc56ca806d03ee9c2dfd1be7b54499701aea005098c03279324</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fa" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-fa-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">bca937cddaac2ec33fbac84989829ddfc784b1e0359fabf8e169da5491f0901e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-calc" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-calc-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">506d4f42e7a5ccbf7de2c149df3158a338f11623920a5e28ac78f54892340145</sum></package><package arch="noarch" epoch="1" name="autocorr-lt" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-lt-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">dd5911f1928b87e31895802259975fef4714c1b960ad59787ceafb8bb58054ca</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sr" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-sr-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">d5f6de55a2f1f32ec5b14eb7a5a10b74ae514158886b841a5ae2001387dab2cf</sum></package><package arch="x86_64" epoch="1" name="libreoffice-nlpsolver" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-nlpsolver-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">554c72d9c673ecf5da7234c9f8b499a2a5c24c079030a4dd53066043c98848e2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-th" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-th-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">c66814349c1d1d1a8f623cc996734d6c5809e1d764afc75a8ad66eedb2312d86</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-or" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-or-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">30aad3cf5381b829f35ffc28de30d00900fa3d1558bce928e6d3954a8b5afe40</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ko" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ko-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">214ca3ed6819a70760dad139d0489c831c696ee28bc4797227582f192cc75be9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-el" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-el-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">9354e2b21bb414ce3b9128ac4b21a64fa79f8600609c6cf1b104bd9c547ceb9c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nb" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nb-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">1fbbf03574d53cf121821c36f255c750a2c0e895db0c282922c06e576454fb56</sum></package><package arch="x86_64" epoch="1" name="libreoffice-emailmerge" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-emailmerge-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">55fb979227442d838b3fca4a5f30405df23c15642d6d07adbf425c21e134a1ff</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-en" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-en-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">e84380be983866f75bc82943cbb2dd1bfb6ae7a61f28ece919286a701c1d5a5c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nl" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nl-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">2e7e3543b2d3ab5b9c3bf6a05e2a1f749bbd5db74b1b61fd3e6a2e38f68083b8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gu" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-gu-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">649bc05df870b2ebeb7f966cb2b38aee9af9f4b3d27c15c771083a0607d8ae79</sum></package><package arch="noarch" epoch="1" name="autocorr-hr" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-hr-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">33493a8134b6b4b05591ac7b02074ec4410d38334648ca991049cf9b2bc1bf75</sum></package><package arch="noarch" epoch="1" name="autocorr-af" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-af-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">8c80bf5d7df5a9e5f4a1e058003d51957dcaed443463a48d38de60f398396302</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tn" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-tn-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">d8b1dd90b600a9ea5f49b6bac6b6a59e982df6e6d603d1e81ea22bdee3f4410a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pa" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-pa-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">4b96467c16ef9d3f73842ea634c1793429b21f31503a3f6ebb3d297846a9d5ab</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hi" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-hi-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">3c5569d2824476d83fe985e0dd370f20066c3d3ed3b34f9223391aeecfefea7e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ogltrans" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-ogltrans-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">fc1e62996ac47e5b7335cd353586b1554c3a16ae87783ea9bed1f604db1f452d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ure" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-ure-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">49f51db5f0ec6381e094673883fca41dd34482c663ae81fc77ee9329bbc53717</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-he" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-he-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">57bc2b0d7b38bcf6ef6266fd376d9f50db0fe124fb4bb1e45eb7a5f24ad8ee9b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-sdk-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">13ad3a379ed8dab6098ee656bf5ac7e22b488f6f738299544b48fbb7267416b7</sum></package><package arch="noarch" epoch="1" name="autocorr-nl" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-nl-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">6877279f44cff9d2e43c0b49dfe419c112a32112d338bfb39b758d2045a7d7d9</sum></package><package arch="noarch" epoch="1" name="autocorr-sr" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-sr-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">3d2634bdaf8539ce6ba549f287c3c37788da1012b9be474702b195a00ee94999</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nso" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nso-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">75a9c84680365be9f4aadc7bbb43ab4d24a17b45031e2e8d6e731b29e4562660</sum></package><package arch="x86_64" epoch="1" name="libreoffice-base" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-base-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">d5c831ddb2557d8aeca7c775a5495168c30cf0152cd71fe93323677f5801ab17</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kn" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-kn-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">b5de34d08324b0a6b1beff5c6800fef91b16bfcdfdc52685e40763e1e567c7bb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-br" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-br-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">e01b65c896397cb6d28257dedc8270a5ea158133bf3681d95168ecf836706d69</sum></package><package arch="noarch" epoch="1" name="autocorr-da" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-da-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">f5f2ceca48e1253ac0c6a4add1e2a5f7bd0b0d79ac4edf510e2e9702ac46b617</sum></package><package arch="x86_64" epoch="1" name="libreoffice-rhino" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-rhino-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">27e6724bee1134c6fccbff3b2afa119a0b84c2d54a6ad9eaa6bcb3d79bddbb44</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tr" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-tr-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">acd03d9b6e272b0718489e7fe9b670fc35ef2d6e02a9eacf8b6ed0048aead22d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hant" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-zh-Hant-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">a8355147cf1bd036ddbf63d2c2d82b3c90e6b1ab7603a6fcc5657c1b2a83e167</sum></package><package arch="x86_64" epoch="1" name="libreoffice-graphicfilter" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-graphicfilter-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">9173a809ac4c91b442b5f603da077331a2d2c36ae4d337ba0ea329324e0d5865</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gdb-debug-support" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-gdb-debug-support-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">edc0f0327ffd4e437f91ff11feb56c17c837475fab64ee9d08f1cba1504bfbb1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ss" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ss-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">3cb1d16cdf6fb00003480074151c70762240487e48c50da7c4cc470a9e23a327</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-te" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-te-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">c59fc1a609204ebfa7fb8b68972d916815a21ec7c7fe8805e3b03dcce1499be6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ja" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ja-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">cd874331584c2d11ba35b7813192f8099b850143f6c0ae4c4067bc46ac65a826</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-eu" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-eu-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">abe94b1232a5f402c74e101063f0e779293367817c6c8679cedeee10bc4d64cb</sum></package><package arch="noarch" epoch="1" name="autocorr-fr" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-fr-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">de409f3a5458fbc0cc84d1ee1de0ff194ad8b72b6173b2180a649f6af9b867f2</sum></package><package arch="x86_64" epoch="1" name="libreofficekit" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreofficekit-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">288760584a259f7deff77323adc0295b458231eff0873afadc1a4f142bd3334f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pdfimport" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-pdfimport-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">67f8194fe62a13ec57c9b88b5f928a745d9495b84b87196df0427345f973f6dc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-wiki-publisher" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-wiki-publisher-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">4507975e42f043b197bc36dba77a70047d2cd4bc86b71c298183417dfe2394b0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ar" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ar-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">bd0994b0e49fd2e0efdfb6b2bdf491012dc93efa208f1b0f530f87359c1ca751</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gl" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-gl-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">79bca1490d7f9faeed5ad93cb49005f4688335bcefc1d0dc01e7a45fae99d296</sum></package><package arch="x86_64" epoch="1" name="libreoffice-xsltfilter" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-xsltfilter-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">a2c1f88bea0b00a97e18bd1e526cf14a699c3a44890b22b6e54a870cf679f730</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ml" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ml-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">f888a00fc56015da383092205acc8ddd0a046fd6defba6fde2883f3f08eb535d</sum></package><package arch="noarch" epoch="1" name="autocorr-mn" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-mn-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">43c76b08ffe296335ef5aba146cf26e6a6c1a4b99ebe24f886d82a2b1ae00454</sum></package><package arch="noarch" epoch="1" name="autocorr-sl" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-sl-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">1f236c9c9812368130cd663860f6a1383c4d4dc3495e2391c7a607073eed5424</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fi" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-fi-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">3a9710e19c037a1dc802c9a2f11c49513219efc7cebeb29b6765babcdb36071d</sum></package><package arch="noarch" epoch="1" name="autocorr-ko" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-ko-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">326cbe7fa4d70c9c4d160b45c80b8e79d09199ecbc65574ad0175cbd2bd11fa6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lv" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-lv-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">0ea2fac911f9c28e4590b4d0a6830c1bb59eb793d9c3aa769460ddac0f0b02ac</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mr" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-mr-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">c5b1e61a74f44edfaa4d9a0687d9e8709b0c6ce7c2692155b96d664a5318c0b3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-math" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-math-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">c6c75db91c281ef77352accc3a71d5535589f10a15bbb646b39cb9401fabf607</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-BR" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-pt-BR-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">96eddbb6189016d55913e63fc0212452c96166cc123b28c3392c1f70088fbd81</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nn" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-nn-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">af01273d1b1ec000a4a8cfcc5509177142298bbd6287445b0a21831a8fdbca48</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-dz" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-dz-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">bd63770b06795e52a7d7ad95da45816646ae0a9ef5f1a0e5ab17365b29a90895</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bn" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-bn-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">bb3a02d74616f97971dde638afe63d40168e4e933b5cc5625182590c086a7dd7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sl" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-sl-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">30a93cc3c82b89d9bb9c852a4527b3c70030a19374c8322a945b05d9de544159</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bg" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-bg-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">17215b57e6b2a684964d355f087f50b38d19039ad83d72d4dde3ae739cc6e010</sum></package><package arch="noarch" epoch="1" name="autocorr-cs" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>autocorr-cs-5.0.6.2-15.el7_4.noarch.rpm</filename><sum type="sha256">e6298500efced3195a4c6e84f7a1856aa577c55dfea3cabc5b1982187c870899</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pl" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-pl-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">75e3292f80ff552cd1e506c010b4a426f806cbf221ae560d1612f813fdc410cb</sum></package><package arch="i686" epoch="1" name="libreofficekit-devel" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreofficekit-devel-5.0.6.2-15.el7_4.i686.rpm</filename><sum type="sha256">773307138171c28b72d0fc06fa36c82a75864a57e603598cfd5bd2b4dd6511a5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ga" release="15.el7_4" src="libreoffice-5.0.6.2-15.el7_4.src.rpm" version="5.0.6.2"><filename>libreoffice-langpack-ga-5.0.6.2-15.el7_4.x86_64.rpm</filename><sum type="sha256">3080509f6d4fdd7df59b197b78ea81ccde659982c7174f7216f9087e899ec49c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6871" id="CVE-2018-6871" title="Libreoffice: Remote Arbitrary File Disclosure Vulnerability Via Webservice Formula" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0418" id="RHSA-2018:0418-1" title="Rhsa-2018:0418-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1543120" id="1543120" title="Libreoffice: Remote Arbitrary File Disclosure Vulnerability Via Webservice Formula" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0483-1</id><title>Dhcp</title><description>Security Fix(es): 
* dhcp: Buffer overflow in dhclient possibly allowing code execution triggered by malicious server (CVE-2018-5732) 
* dhcp: Reference count overflow in dhcpd allows denial of service (CVE-2018-5733)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-03-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="12" name="dhcp-common" release="58.sl7_4.3" src="dhcp-4.2.5-58.sl7_4.3.src.rpm" version="4.2.5"><filename>dhcp-common-4.2.5-58.sl7_4.3.x86_64.rpm</filename><sum type="sha256">c12c0879580c4d29cc8192995dfec1cdac2ea3a2a64970cf79a1c50ed03d7448</sum></package><package arch="x86_64" epoch="12" name="dhcp-libs" release="58.sl7_4.3" src="dhcp-4.2.5-58.sl7_4.3.src.rpm" version="4.2.5"><filename>dhcp-libs-4.2.5-58.sl7_4.3.x86_64.rpm</filename><sum type="sha256">47a369fd10fd61ce3266b3b14024d7a1d095ec53e939beeec1b259d810ca2577</sum></package><package arch="x86_64" epoch="12" name="dhcp-devel" release="58.sl7_4.3" src="dhcp-4.2.5-58.sl7_4.3.src.rpm" version="4.2.5"><filename>dhcp-devel-4.2.5-58.sl7_4.3.x86_64.rpm</filename><sum type="sha256">92b1b604487977897145059e30e14af0e21a7c8d6acce1921b2bac7135346586</sum></package><package arch="i686" epoch="12" name="dhcp-libs" release="58.sl7_4.3" src="dhcp-4.2.5-58.sl7_4.3.src.rpm" version="4.2.5"><filename>dhcp-libs-4.2.5-58.sl7_4.3.i686.rpm</filename><sum type="sha256">c0472d6cb613a4d56babcb067ea50cd3ac8aea01e612d7f424d187f162f4c304</sum></package><package arch="i686" epoch="12" name="dhcp-devel" release="58.sl7_4.3" src="dhcp-4.2.5-58.sl7_4.3.src.rpm" version="4.2.5"><filename>dhcp-devel-4.2.5-58.sl7_4.3.i686.rpm</filename><sum type="sha256">a240d83a76237b4fc846bb12f834d86ef864ff08e5de463786eef7e0bb9fcded</sum></package><package arch="x86_64" epoch="12" name="dhcp" release="58.sl7_4.3" src="dhcp-4.2.5-58.sl7_4.3.src.rpm" version="4.2.5"><filename>dhcp-4.2.5-58.sl7_4.3.x86_64.rpm</filename><sum type="sha256">c12a23b67a9959a7ab398793ea5a2f4e02836d942f2b4c78821068aef2608042</sum></package><package arch="x86_64" epoch="12" name="dhclient" release="58.sl7_4.3" src="dhcp-4.2.5-58.sl7_4.3.src.rpm" version="4.2.5"><filename>dhclient-4.2.5-58.sl7_4.3.x86_64.rpm</filename><sum type="sha256">bba4e5a012535a0d9f67aa8859baa4413928b0bfc05088380122da3b0110ceef</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5732" id="CVE-2018-5732" title="Dhcp: Buffer Overflow In Dhclient Possibly" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5733" id="CVE-2018-5733" title="Dhcp: Reference Count Overflow In Dhcpd Allows" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0483" id="RHSA-2018:0483-1" title="Rhsa-2018:0483-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549960" id="1549960" title="Dhcp: Buffer Overflow In Dhclient Possibly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549961" id="1549961" title="Dhcp: Reference Count Overflow In Dhcpd Allows" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0505-1</id><title>Mailman</title><description>Security Fix(es): 
* mailman: Cross-site scripting (XSS) vulnerability in web UI (CVE-2018-5950)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-03-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="3" name="mailman" release="26.el7_4.1" src="mailman-2.1.15-26.el7_4.1.src.rpm" version="2.1.15"><filename>mailman-2.1.15-26.el7_4.1.x86_64.rpm</filename><sum type="sha256">1c6893db61c2d4ab5b621fcaa6dbbc5944f2ffd559927e11a2e2d720bf4e22e7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5950" id="CVE-2018-5950" title="Mailman: Cross-Site Scripting (Xss) Vulnerability In Web Ui" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0505" id="RHSA-2018:0505-1" title="Rhsa-2018:0505-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537941" id="1537941" title="Mailman: Cross-Site Scripting (Xss) Vulnerability In Web Ui" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0527-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.7.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) 
* Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) 
* Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) 
* Mozilla: Mismatched RTP payload type can trigger memory corruption (MFSA 2018-07) (CVE-2018-5130) 
* Mozilla: Fetch API improperly returns cached copies of no-store/no-cache resources (MFSA 2018-07) (CVE-2018-5131) 
* Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2018-03-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_4" src="firefox-52.7.0-1.el7_4.src.rpm" version="52.7.0"><filename>firefox-52.7.0-1.el7_4.x86_64.rpm</filename><sum type="sha256">f34427978284894fa3a4bdfc79a949323fd2f8bb82c4a595043fb06b8cf4fd35</sum></package><package arch="i686" name="firefox" release="1.el7_4" src="firefox-52.7.0-1.el7_4.src.rpm" version="52.7.0"><filename>firefox-52.7.0-1.el7_4.i686.rpm</filename><sum type="sha256">b75b3ad78178f682b403e33de9588e0d344e0e42141fa6b0d66d2a7f16a9a1f4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5125" id="CVE-2018-5125" title="Mozilla: Memory Safety Bugs Fixed In Firefox 59 And Firefox Esr 52.7 (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5127" id="CVE-2018-5127" title="Mozilla: Buffer Overflow Manipulating Svg Animatedpathseglist (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5129" id="CVE-2018-5129" title="Mozilla: Out-Of-Bounds Write With Malformed Ipc Messages (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5130" id="CVE-2018-5130" title="Mozilla: Mismatched Rtp Payload Type Can Trigger Memory Corruption (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5131" id="CVE-2018-5131" title="Mozilla: Fetch Api Improperly Returns Cached Copies Of No-Store/No-Cache Resources (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5144" id="CVE-2018-5144" title="Mozilla: Integer Overflow During Unicode Conversion (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5145" id="CVE-2018-5145" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 52.7 (Mfsa 2018-07)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0527" id="RHSA-2018:0527-1" title="Rhsa-2018:0527-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555127" id="1555127" title="Mozilla: Memory Safety Bugs Fixed In Firefox 59 And Firefox Esr 52.7 (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555128" id="1555128" title="Mozilla: Buffer Overflow Manipulating Svg Animatedpathseglist (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555129" id="1555129" title="Mozilla: Out-Of-Bounds Write With Malformed Ipc Messages (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555130" id="1555130" title="Mozilla: Mismatched Rtp Payload Type Can Trigger Memory Corruption (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555131" id="1555131" title="Mozilla: Fetch Api Improperly Returns Cached Copies Of No-Store/No-Cache Resources (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555132" id="1555132" title="Mozilla: Integer Overflow During Unicode Conversion (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555133" id="1555133" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 52.7 (Mfsa 2018-07)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0549-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.7.2 ESR. 
Security Fix(es): 
* Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) (CVE-2018-5146)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2018-03-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_4" src="firefox-52.7.2-1.el7_4.src.rpm" version="52.7.2"><filename>firefox-52.7.2-1.el7_4.x86_64.rpm</filename><sum type="sha256">6e0faaccb874c7d4f3a109aa8d4df0a9c3d3c880896ed5b0eaa8a2fef9a6eaab</sum></package><package arch="i686" name="firefox" release="1.el7_4" src="firefox-52.7.2-1.el7_4.src.rpm" version="52.7.2"><filename>firefox-52.7.2-1.el7_4.i686.rpm</filename><sum type="sha256">24669866c86596886269b43bf45102ba2460a02ffbcfe38857798fa184c350d9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146" id="CVE-2018-5146" title="Mozilla: Vorbis Audio Processing Out Of Bounds Write (Mfsa 2018-08)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0549" id="RHSA-2018:0549-1" title="Rhsa-2018:0549-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1557221" id="1557221" title="Mozilla: Vorbis Audio Processing Out Of Bounds Write (Mfsa 2018-08)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0592-1</id><title>Slf4J</title><description>Security Fix(es): 
* slf4j: Deserialisation vulnerability in EventData constructor can allow for arbitrary code execution (CVE-2018-8088)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-03-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="slf4j" release="4.el7_4" src="slf4j-1.7.4-4.el7_4.src.rpm" version="1.7.4"><filename>slf4j-1.7.4-4.el7_4.noarch.rpm</filename><sum type="sha256">3889c90e46fa3e54b852f76b9a06d871fc8e848b53b550d8643177f3c17cbd2c</sum></package><package arch="noarch" name="slf4j-manual" release="4.el7_4" src="slf4j-1.7.4-4.el7_4.src.rpm" version="1.7.4"><filename>slf4j-manual-1.7.4-4.el7_4.noarch.rpm</filename><sum type="sha256">7f64a6136aaa69bd3d9df200481f52767e27aa5480b897155435912dcda9c019</sum></package><package arch="noarch" name="slf4j-javadoc" release="4.el7_4" src="slf4j-1.7.4-4.el7_4.src.rpm" version="1.7.4"><filename>slf4j-javadoc-1.7.4-4.el7_4.noarch.rpm</filename><sum type="sha256">df6b1de1b624aecad09cf0aab68a8eaeb486ed61d53abcef7cda7eddcc5bf765</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8088" id="CVE-2018-8088" title="Slf4J: Deserialisation Vulnerability In Eventdata Constructor Can Allow For Arbitrary Code Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0592" id="RHSA-2018:0592-1" title="Rhsa-2018:0592-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1548909" id="1548909" title="Slf4J: Deserialisation Vulnerability In Eventdata Constructor Can Allow For Arbitrary Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0648-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.7.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5125) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 52.7 (MFSA 2018-07) (CVE-2018-5145) 
* Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) (CVE-2018-5146) 
* Mozilla: Buffer overflow manipulating SVG animatedPathSegList (MFSA 2018-07) (CVE-2018-5127) 
* Mozilla: Out-of-bounds write with malformed IPC messages (MFSA 2018-07) (CVE-2018-5129) 
* Mozilla: Integer overflow during Unicode conversion (MFSA 2018-07) (CVE-2018-5144)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-04-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_4" src="thunderbird-52.7.0-1.el7_4.src.rpm" version="52.7.0"><filename>thunderbird-52.7.0-1.el7_4.x86_64.rpm</filename><sum type="sha256">ba61dcaca1da8bc84f8da31ab8388a7c7d492af976aa7e9ab7aee0a522eec6ab</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5125" id="CVE-2018-5125" title="Mozilla: Memory Safety Bugs Fixed In Firefox 59 And Firefox Esr 52.7 (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5127" id="CVE-2018-5127" title="Mozilla: Buffer Overflow Manipulating Svg Animatedpathseglist (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5129" id="CVE-2018-5129" title="Mozilla: Out-Of-Bounds Write With Malformed Ipc Messages (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5144" id="CVE-2018-5144" title="Mozilla: Integer Overflow During Unicode Conversion (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5145" id="CVE-2018-5145" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 52.7 (Mfsa 2018-07)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146" id="CVE-2018-5146" title="Mozilla: Vorbis Audio Processing Out Of Bounds Write (Mfsa 2018-08)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0648" id="RHSA-2018:0648-1" title="Rhsa-2018:0648-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555127" id="1555127" title="Mozilla: Memory Safety Bugs Fixed In Firefox 59 And Firefox Esr 52.7 (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555128" id="1555128" title="Mozilla: Buffer Overflow Manipulating Svg Animatedpathseglist (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555129" id="1555129" title="Mozilla: Out-Of-Bounds Write With Malformed Ipc Messages (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555132" id="1555132" title="Mozilla: Integer Overflow During Unicode Conversion (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555133" id="1555133" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 52.7 (Mfsa 2018-07)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1557221" id="1557221" title="Mozilla: Vorbis Audio Processing Out Of Bounds Write (Mfsa 2018-08)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0666-1</id><title>Krb5</title><description>Security Fix(es): 
* krb5: Authentication bypass by improper validation of certificate EKU and SAN (CVE-2017-7562) 
* krb5: Invalid S4U2Self or S4U2Proxy request causes assertion failure (CVE-2017-11368) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="krb5-devel" release="18.el7" src="krb5-1.15.1-18.el7.src.rpm" version="1.15.1"><filename>krb5-devel-1.15.1-18.el7.i686.rpm</filename><sum type="sha256">8124f4733c80418f658cc02fc109735a5bc660ce0796dc633367d2d0e3c04509</sum></package><package arch="x86_64" name="krb5-devel" release="18.el7" src="krb5-1.15.1-18.el7.src.rpm" version="1.15.1"><filename>krb5-devel-1.15.1-18.el7.x86_64.rpm</filename><sum type="sha256">2fc99859ace86b117bf717ed2116ff042000646bb549edd3e4a72d5fbcf6c5dd</sum></package><package arch="x86_64" name="krb5-server-ldap" release="18.el7" src="krb5-1.15.1-18.el7.src.rpm" version="1.15.1"><filename>krb5-server-ldap-1.15.1-18.el7.x86_64.rpm</filename><sum type="sha256">ad76ad713a9414c69dc70db4513bff079de9408c241e64c18c61da2881d2a5c8</sum></package><package arch="x86_64" name="krb5-workstation" release="18.el7" src="krb5-1.15.1-18.el7.src.rpm" version="1.15.1"><filename>krb5-workstation-1.15.1-18.el7.x86_64.rpm</filename><sum type="sha256">85cd8103a1992734e5e5f1e924004d2dd11af5bf3a6c2f9a41dd8da73d3da483</sum></package><package arch="x86_64" name="krb5-server" release="18.el7" src="krb5-1.15.1-18.el7.src.rpm" version="1.15.1"><filename>krb5-server-1.15.1-18.el7.x86_64.rpm</filename><sum type="sha256">7fa9c09e1363301c6b03666a3ac50419adbd6f00ac338289adb991e5c3102e39</sum></package><package arch="i686" name="libkadm5" release="18.el7" src="krb5-1.15.1-18.el7.src.rpm" version="1.15.1"><filename>libkadm5-1.15.1-18.el7.i686.rpm</filename><sum type="sha256">86b5679c51f47b0c39fe28e651587d00027d7afbf3187381ebcb948ce06ba6bc</sum></package><package arch="i686" name="krb5-libs" release="18.el7" src="krb5-1.15.1-18.el7.src.rpm" version="1.15.1"><filename>krb5-libs-1.15.1-18.el7.i686.rpm</filename><sum type="sha256">66bd8503b137e38279797ec628fb8d0a22888d3e0a06fc31e2035d43c0d3e09b</sum></package><package arch="x86_64" name="libkadm5" release="18.el7" src="krb5-1.15.1-18.el7.src.rpm" version="1.15.1"><filename>libkadm5-1.15.1-18.el7.x86_64.rpm</filename><sum type="sha256">30b984d7f65b62c6c5008527e20b5187306ff932dcc869231b67a9b08890b414</sum></package><package arch="x86_64" name="krb5-libs" release="18.el7" src="krb5-1.15.1-18.el7.src.rpm" version="1.15.1"><filename>krb5-libs-1.15.1-18.el7.x86_64.rpm</filename><sum type="sha256">529d743e45c712bcb97926cf07cd68af6c2e9843b47beddfdf853d76d3c2e292</sum></package><package arch="x86_64" name="krb5-pkinit" release="18.el7" src="krb5-1.15.1-18.el7.src.rpm" version="1.15.1"><filename>krb5-pkinit-1.15.1-18.el7.x86_64.rpm</filename><sum type="sha256">d1ad72f194079f686d87fc402b121f3dfc0aa8d8c7751f21e4cef61026047d36</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11368" id="CVE-2017-11368" title="Krb5: Invalid S4U2Self Or S4U2Proxy Request Causes Assertion Failure" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7562" id="CVE-2017-7562" title="Krb5: Authentication Bypass By Improper Validation Of Certificate Eku And San" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0666" id="RHSA-2018:0666-1" title="Rhsa-2018:0666-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1431198" id="1431198" title="Automatically Add 'Includedir /Etc/Krb5.Conf.D/' To  Krb5.Conf On Update" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443388" id="1443388" title="Please Add The Changes Needed For The T_Certauth.Py Test" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472956" id="1472956" title="Add Support To Query The Ssf Of A Context" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1473560" id="1473560" title="Krb5: Invalid S4U2Self Or S4U2Proxy Request Causes Assertion Failure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1485510" id="1485510" title="Krb5: Authentication Bypass By Improper Validation Of Certificate Eku And San" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0805-1</id><title>Glibc</title><description>Security Fix(es): 
* glibc: realpath() buffer underflow when getcwd() returns relative path allows privilege escalation (CVE-2018-1000001) 
* glibc: Buffer overflow in glob with GLOB_TILDE (CVE-2017-15670) 
* glibc: Buffer overflow during unescaping of user names with the ~ operator (CVE-2017-15804) 
* glibc: denial of service in getnetbyname function (CVE-2014-9402) 
* glibc: DNS resolver NULL pointer dereference with crafted record type (CVE-2015-5180) 
* glibc: Fragmentation attacks possible when EDNS0 is enabled (CVE-2017-12132) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="glibc-utils" release="222.el7" src="glibc-2.17-222.el7.src.rpm" version="2.17"><filename>glibc-utils-2.17-222.el7.x86_64.rpm</filename><sum type="sha256">459039551abe037ad4522ac3940e2bdb3136045c3b1553c801e7a68fd547e70e</sum></package><package arch="i686" name="glibc" release="222.el7" src="glibc-2.17-222.el7.src.rpm" version="2.17"><filename>glibc-2.17-222.el7.i686.rpm</filename><sum type="sha256">1dfd24a7756d1b39bd3af65c9834c0267dea8e4532cb659a983a9ac287b97f59</sum></package><package arch="i686" name="glibc-devel" release="222.el7" src="glibc-2.17-222.el7.src.rpm" version="2.17"><filename>glibc-devel-2.17-222.el7.i686.rpm</filename><sum type="sha256">f99686b875ff4a4ccef595e469c7cfe4b29ed177bac5a42b700b0198431dd6f5</sum></package><package arch="x86_64" name="glibc" release="222.el7" src="glibc-2.17-222.el7.src.rpm" version="2.17"><filename>glibc-2.17-222.el7.x86_64.rpm</filename><sum type="sha256">1cfac3a2ab9069ef85e758bc37d8b99ffa00d6a74302305f89e88de6940829b0</sum></package><package arch="i686" name="glibc-static" release="222.el7" src="glibc-2.17-222.el7.src.rpm" version="2.17"><filename>glibc-static-2.17-222.el7.i686.rpm</filename><sum type="sha256">c326a0f18721fa9fc4487b287edad28e291a19dc60a5e9525af343b21cf7f28e</sum></package><package arch="x86_64" name="glibc-static" release="222.el7" src="glibc-2.17-222.el7.src.rpm" version="2.17"><filename>glibc-static-2.17-222.el7.x86_64.rpm</filename><sum type="sha256">9afb97b10a91d376b97ecfdd89a3d2c69352505d0a3eb91279e03ba3ab7a2bef</sum></package><package arch="x86_64" name="nscd" release="222.el7" src="glibc-2.17-222.el7.src.rpm" version="2.17"><filename>nscd-2.17-222.el7.x86_64.rpm</filename><sum type="sha256">c3127b2dbb85ce4e69d6e483b4ad135787856652c9ac34119ec61ce6981765ee</sum></package><package arch="x86_64" name="glibc-devel" release="222.el7" src="glibc-2.17-222.el7.src.rpm" version="2.17"><filename>glibc-devel-2.17-222.el7.x86_64.rpm</filename><sum type="sha256">89d9d5b0b6a938f19936c1049decdfc11a0e2187dcbba08fd340b836494ae03b</sum></package><package arch="x86_64" name="glibc-headers" release="222.el7" src="glibc-2.17-222.el7.src.rpm" version="2.17"><filename>glibc-headers-2.17-222.el7.x86_64.rpm</filename><sum type="sha256">60995444bd55872ea31705832919f1f9ccb0a0a404d68f2242d0a08c1d8a6217</sum></package><package arch="x86_64" name="glibc-common" release="222.el7" src="glibc-2.17-222.el7.src.rpm" version="2.17"><filename>glibc-common-2.17-222.el7.x86_64.rpm</filename><sum type="sha256">4ca526c8aa20ff9762b36593c8ecb5467c387a43b1ee396fde742858d0f7a2d7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9402" id="CVE-2014-9402" title="Glibc: Denial Of Service In Getnetbyname Function" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5180" id="CVE-2015-5180" title="Glibc: Dns Resolver Null Pointer Dereference With Crafted Record Type" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12132" id="CVE-2017-12132" title="Glibc: Fragmentation Attacks Possible When Edns0 Is Enabled" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15670" id="CVE-2017-15670" title="Glibc: Buffer Overflow In Glob With Glob_Tilde" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15804" id="CVE-2017-15804" title="Glibc: Buffer Overflow During Unescaping Of User Names With The ~ Operator" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000001" id="CVE-2018-1000001" title="Glibc: Realpath() Buffer Underflow When Getcwd() Returns Relative Path Allows Privilege Escalation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0805" id="RHSA-2018:0805-1" title="Rhsa-2018:0805-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1175369" id="1175369" title="Glibc: Denial Of Service In Getnetbyname Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1249603" id="1249603" title="Glibc: Dns Resolver Null Pointer Dereference With Crafted Record Type" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348000" id="1348000" title="Glibc: Tst-Malloc-Usable Spurious Test Failure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349962" id="1349962" title="Hide Reference To Mktemp In Libpthread." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349964" id="1349964" title="Fix Build Warning In Locarchive.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1372305" id="1372305" title="Glibc: Fopencookie Hardening" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1398413" id="1398413" title="Glibc: Backport Libio Vtable Hardening" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1432085" id="1432085" title="Glibc: Detect And Apply /Etc/Resolv.Conf Changes In Libresolv" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1435615" id="1435615" title="Nscd Is Not Caching Ldap Netgroup Data Properly, Hangs On Nscd -I Netgroup" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1440250" id="1440250" title="Elf/Check-Localplt Test Fails With Binutils 2.27" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443236" id="1443236" title="Applications Encounter Sigsegv When Ld_Library_Path Ld_Library_Path Contains Only Non-Existings Paths" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1445644" id="1445644" title="Ifuncmod1.So Ifuncmod3.So Ifuncmod5.So Tests Fail During &quot;Make Check&quot; With Binutils 2.27" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1445781" id="1445781" title="Elf/Tst-Audit Set Of Tests Fails With Error &quot;No Pltrel Found In Object Ld-Linux-X86-64.So.2&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1447556" id="1447556" title="Glibc: Malloc: Check For Chunk_Size == Next-&gt;Prev-&gt;Chunk_Size In Unlink" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448822" id="1448822" title="Glibc: Add Definition Of Clock_Tai" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1452034" id="1452034" title="When The /Etc/Hosts File Has A Line Longer Than 1028 Characters Getent Ahostsv4 And Ahostsv6 Will Stop Working." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1463692" id="1463692" title="Glibc: Incorrect Pointer Alignment In Nss Group Merge Result Construction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1468807" id="1468807" title="Glibc: Support Broken Applications Which Call __Tls_Get_Addr With An Unaligned Stack (Gcc Bug Workaround)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471111" id="1471111" title="Stackguard (Cve-2017-1000366) Number Not Found In Glibc Changelog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1477529" id="1477529" title="Glibc: Fragmentation Attacks Possible When Edns0 Is Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1482988" id="1482988" title="Glibc: Remove Noip6Dotint Support From The Stub Resolver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1484034" id="1484034" title="Glibc: Stricter Ipv6 Address Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1504804" id="1504804" title="Glibc: Buffer Overflow In Glob With Glob_Tilde" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1505298" id="1505298" title="Glibc: Buffer Overflow During Unescaping Of User Names With The ~ Operator" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1508895" id="1508895" title="Glibc: Update Built-In System Call Name List" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1527904" id="1527904" title="Glibc: Pthread_Stack_Min Is Too Small On X86-64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1528418" id="1528418" title="Glibc: Merge Error In Xsave Dynamic Linker Trampoline Patch" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1529982" id="1529982" title="Glibc: Recompile Glibc To Fix Incorrect Cfi Information On I386" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1533836" id="1533836" title="Glibc: Realpath() Buffer Underflow When Getcwd() Returns Relative Path Allows Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=677316" id="677316" title="Glibc: Increase Number Of Search Domains Supported By /Etc/Resolv.Conf" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0816-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* Qemu: vga: OOB read access during display update (CVE-2017-13672) 
* Qemu: Slirp: use-after-free when sending response (CVE-2017-13711) 
* Qemu: memory exhaustion through framebuffer update request message in VNC server (CVE-2017-15124) 
* Qemu: I/O: potential memory exhaustion via websock connection to VNC (CVE-2017-15268) 
* Qemu: Out-of-bounds read in vga_draw_text routine (CVE-2018-5683) 
Additional Changes:</description><severity>low</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm" release="156.el7" src="qemu-kvm-1.5.3-156.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-156.el7.x86_64.rpm</filename><sum type="sha256">61c736bf1eb0f33b6fb160a9b1670793cf78c677b29bb5ab989433cd074be716</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="156.el7" src="qemu-kvm-1.5.3-156.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-156.el7.x86_64.rpm</filename><sum type="sha256">b4cf5b49ff7f8523d9d9f141471b8ba60878a35f8fe304779d0ab22be79ae4a2</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="156.el7" src="qemu-kvm-1.5.3-156.el7.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-156.el7.x86_64.rpm</filename><sum type="sha256">a068f27f810f6430cf56fae9126d9ee548b37ee3fec87ef0a556ae422c5e5c1c</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="156.el7" src="qemu-kvm-1.5.3-156.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-156.el7.x86_64.rpm</filename><sum type="sha256">bc02f3020d7523d7742e11e6dfb52ac8cff99cc1eea3782b5e4dfe51a0b3ca24</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13672" id="CVE-2017-13672" title="Qemu: Vga: Oob Read Access During Display Update" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13711" id="CVE-2017-13711" title="Qemu: Slirp: Use-After-Free When Sending Response" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15124" id="CVE-2017-15124" title="Qemu: Memory Exhaustion Through Framebuffer Update Request Message In Vnc Server" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15268" id="CVE-2017-15268" title="Qemu: I/O: Potential Memory Exhaustion Via Websock Connection To Vnc" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5683" id="CVE-2018-5683" title="Qemu: Out-Of-Bounds Read In Vga_Draw_Text Routine" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0816" id="RHSA-2018:0816-1" title="Rhsa-2018:0816-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1411490" id="1411490" title="[Rfe] Kernel Address Space Layout Randomization [Kaslr] Support (Qemu-Kvm)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1417864" id="1417864" title="Qemu-Kvm Starts With Unspecified Port" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1435352" id="1435352" title="Qemu Started With &quot;-Vnc None,...&quot; Doesn'T Support Any Vnc Authentication" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1450396" id="1450396" title="Add Support For Amd Epyc Processors" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1455451" id="1455451" title="Vm With Pty Based Serial Console Hangs If Pts Buffer Is Full" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1459725" id="1459725" title="Prevent Qemu-Img Resize From Causing &quot;Active L1 Table Too Large&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1460872" id="1460872" title="Aborted(Core Dumped) When Booting Guest With &quot;-Netdev Tap....Vhost=On,Queues=32&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461672" id="1461672" title="Qemu-Img Core Dumped When Create External Snapshot Through Ssh Protocol Without Specifying Image Size" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1470244" id="1470244" title="Reboot Leads To Shutoff Of Qemu-Kvm-Vm If I6300Esb-Watchdog Set To Poweroff" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1473536" id="1473536" title="Hangs In Serial Console Under Qemu" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1476641" id="1476641" title="Ui/Vnc_Keysym.H Is Very Out Of Date And Does Not Correctly Support Many Eastern European Keyboards" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1486400" id="1486400" title="Qemu: Slirp: Use-After-Free When Sending Response" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1486560" id="1486560" title="Qemu: Vga: Oob Read Access During Display Update" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1491434" id="1491434" title="Kvm Leaks File Descriptors When Attaching And Detaching Virtio-Scsi Block Devices" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1492559" id="1492559" title="Virtio-Blk Mutiwrite Merge Causes Too Big Io" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1494181" id="1494181" title="Backport Vgpu Support To Qemu-Kvm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496879" id="1496879" title="Qemu: I/O: Potential Memory Exhaustion Via Websock Connection To Vnc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1511802" id="1511802" title="Regression In Qemu Handling For Sub-Page Mmio Bars For Vfio-Pci Devices" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1520793" id="1520793" title="Do Not Build Non-X86_64 Subpackages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1525195" id="1525195" title="Qemu: Memory Exhaustion Through Framebuffer Update Request Message In Vnc Server" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1530356" id="1530356" title="Qemu: Out-Of-Bounds Read In Vga_Draw_Text Routine" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1536883" id="1536883" title="[Abrt] [Faf] Qemu-Kvm: Unknown Function(): /Usr/Libexec/Qemu-Kvm Killed By 6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1538866" id="1538866" title="Qemu Will Coredump After Executing Info Qtree" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0842-1</id><title>Xdg-User-Dirs</title><description>Security Fix(es): 
* xdg-user-dirs, gnome-session: Xsession creation of XDG user directories does not honor system umask policy (CVE-2017-15131) 
Additional Changes:</description><severity>low</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xdg-user-dirs" release="5.el7" src="xdg-user-dirs-0.15-5.el7.src.rpm" version="0.15"><filename>xdg-user-dirs-0.15-5.el7.x86_64.rpm</filename><sum type="sha256">2157641bd8917f04e2202f079fc5f7fbc0b3c96750754eaf44f9d7d7e8e2bbba</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15131" id="CVE-2017-15131" title="Xdg-User-Dirs, Gnome-Session: Xsession Creation Of Xdg User Directories Does Not Honor System Umask Policy" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0842" id="RHSA-2018:0842-1" title="Rhsa-2018:0842-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1412762" id="1412762" title="Xsession Creation Of Xdg User Directories Does Not Honor System Umask Policy" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1455094" id="1455094" title="Xdg-User-Dirs, Gnome-Session: Xsession Creation Of Xdg User Directories Does Not Honor System Umask Policy" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0849-1</id><title>Gcc</title><description>Security Fix(es): 
* gcc: GCC generates incorrect code for RDRAND/RDSEED intrinsics (CVE-2017-11671) 
Additional Changes:</description><severity>low</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libstdc++" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libstdc++-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">cddfb60738eb2dc62083a423c31feb52d962ffd150e4a6a631b75d6725fe1682</sum></package><package arch="x86_64" name="gcc-gfortran" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>gcc-gfortran-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">3864dc478adad2e0edfee84f1a23d9a580f5f11232fc0d94551334acb4f3d519</sum></package><package arch="i686" name="libgnat-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgnat-static-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">99dfa189aecb1fafc9652a2ad0921bfc7997718617ae306e1d90f2101e4c3078</sum></package><package arch="i686" name="libquadmath" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libquadmath-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">bf51c3310e7c30cec0da1e2aea00e0fdf10d45dda47d7eaa2fe2351f5d0f9399</sum></package><package arch="x86_64" name="gcc-go" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>gcc-go-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">0688963d1f275ea6233a2689700921f427078001c83a5a7ecd4430f34d1e8587</sum></package><package arch="i686" name="libquadmath-devel" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libquadmath-devel-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">bf94c133fb90c786082c38b46070ebb82c39688d124fa12f5da227f662253a93</sum></package><package arch="x86_64" name="libstdc++-docs" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libstdc++-docs-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">30689ede85012b656ec0e7a086c5db0054ef6674fe6fd52991e203278c4d3c50</sum></package><package arch="x86_64" name="cpp" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>cpp-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">f5f8e33ecdcf4b4a2487a57d32b206ab365c9c4f42904a0a5804403a48e20a43</sum></package><package arch="x86_64" name="libatomic-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libatomic-static-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">5a17cc9ce6bcfe76d8d154394142527ff9bb863c7546ba5829cc2904a961aa15</sum></package><package arch="i686" name="libgfortran" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgfortran-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">de139c6a7a398946d18b66a602ca80988541cd167021481cf9bdf36a0cfcbc27</sum></package><package arch="x86_64" name="libgfortran" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgfortran-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">7be57f1d6b831af8f876adfafb28be91519552650590fcd4c24311ff3f8aa20b</sum></package><package arch="x86_64" name="libgnat-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgnat-static-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">b662db6c10b43e8e6764cb78bcaf7ce6cf776f1f60a6a89db107ff687c5a00d3</sum></package><package arch="x86_64" name="libquadmath-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libquadmath-static-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">48877648118537bb279362b3f56bf9ce569d63a606cf6ad5e08984a6e0cb5032</sum></package><package arch="x86_64" name="libasan-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libasan-static-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">0770af16151a9061b9c4e1760d42604ac9b10c6d362427bae485e20f23db3e27</sum></package><package arch="x86_64" name="libstdc++-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libstdc++-static-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">9f309f971f405ca2280d51d75e361d3544a479ce42656ebfe7ddc88579cf6c06</sum></package><package arch="x86_64" name="libstdc++-devel" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libstdc++-devel-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">a1d545930e0e911c7f6245a02105a1633faa99ed34f324d0e46c7de0fad63597</sum></package><package arch="i686" name="libatomic" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libatomic-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">038821b9551758191b1ee5139980bdf86e21091b5e4f6b3b7c577f3989ccf976</sum></package><package arch="i686" name="libobjc" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libobjc-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">e41672c388bac56f947d3013d348e8f4f5215844de649831ab989bdf6d99222d</sum></package><package arch="x86_64" name="libtsan-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libtsan-static-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">bfcde7922102cf6b4beeb304df921bd9cdaef7be603029ab3ea36c2228bee6fa</sum></package><package arch="x86_64" name="libitm-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libitm-static-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">83e31db28de4778388400a137b449fa6e1b484cbdc7667289c5bf87798cd9ebd</sum></package><package arch="i686" name="libitm-devel" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libitm-devel-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">af6a254d43a3068bdf38c53519040fa1a5902f27c6b3a1f8f951db4a1b862880</sum></package><package arch="i686" name="libmudflap-devel" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libmudflap-devel-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">a321747b6dec8345b17e31a401be8650b05f3db2e69cb7d86a9633c9e031021a</sum></package><package arch="x86_64" name="libstdc++" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libstdc++-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">1aceb8e3eb2bbb430ec2673d43399392385b508b3378d763b676b4d25160fe7b</sum></package><package arch="x86_64" name="libmudflap-devel" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libmudflap-devel-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">c79dbdb81f4fe836793f0290cca4ea0a16ea4bfa10f9e5b059d3727bab5095ac</sum></package><package arch="x86_64" name="libgcc" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgcc-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">fed6856458dbba77dd34a9fa3c86e73a155d18663f74cb6ba7ed7e51521e96ac</sum></package><package arch="i686" name="libasan-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libasan-static-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">00f978c681279559472992e94d8d1d5baf97b74dc9de22c8d04e4dfb756461e4</sum></package><package arch="i686" name="libgcc" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgcc-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">3d7379a013cf57c07c5268372a9dadb393bb160543669ca4f1e99117b065dcb9</sum></package><package arch="x86_64" name="libitm" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libitm-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">01ea61b6cafe36911fa1819bad3945c8dfe40e3ae267a5fa6d2c1113a96cebef</sum></package><package arch="i686" name="libstdc++-devel" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libstdc++-devel-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">27e7105edd541cf829486d9aa379723d7b5933d86698166e220777a63c33a7b4</sum></package><package arch="i686" name="libgnat" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgnat-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">4944530da54ba5b8cec1adc0504b6639089c1ba9a618f8ada5fb1058969f7f2e</sum></package><package arch="i686" name="libitm" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libitm-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">b39feb71004331f2a03bf8f75fee545fe3afaf3ef6e9ca8fcc84f92a7549ef31</sum></package><package arch="x86_64" name="gcc-gnat" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>gcc-gnat-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">cc6ed98caba396ad74eb757287dd8c5688a4d2607f28374b8c2279543e733bc0</sum></package><package arch="i686" name="libstdc++-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libstdc++-static-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">6659440b5b308da73d9f4132c691f58e2dbcf09107b2a0ee93ccc1a96528cb2f</sum></package><package arch="x86_64" name="gcc-objc" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>gcc-objc-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">f4c0d1880627a87b49af81849221378096520d53559c9044e7f82b2ed95d5a23</sum></package><package arch="x86_64" name="libmudflap-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libmudflap-static-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">5e1bf477803f6c5d0dae118661e806ff57ea90bb4dfd067ba9cff7bb73cb513b</sum></package><package arch="x86_64" name="libatomic" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libatomic-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">079c69d95bbe7f730e95b2e1d414ce1bc8c8e8b3460373d0fc1d60e090b0e1b1</sum></package><package arch="i686" name="libgfortran-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgfortran-static-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">5f1e1a998cf15c5fc61410c6785fe68811fc996f638a6a6acd544b7ddf50bf0f</sum></package><package arch="i686" name="libmudflap-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libmudflap-static-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">d6e3421efd8a8b20b60c39c9e369ea059774d1ee639894318d130f3fbd208668</sum></package><package arch="x86_64" name="gcc" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>gcc-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">606c03a2336a33011ab5600dab32b7086bee79d5feb3acc769f006457db2882f</sum></package><package arch="i686" name="libquadmath-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libquadmath-static-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">16c4b473fc6b36203fa27d09128defb277cff28750cc2af5e69b9dc7577a7f36</sum></package><package arch="i686" name="libgo-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgo-static-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">7ce8be0590c74ede925c9633d238f4350fb0ee00d433e441eee8fb4f85108769</sum></package><package arch="i686" name="libgo-devel" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgo-devel-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">74cd428c873ad81af4af765a72ee385de20a2945d3e2b31e1277872fd49ccec7</sum></package><package arch="x86_64" name="libgo-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgo-static-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">60b95a2be27e05cdd3c0116b21abf3f2d99d2f4c9bdf58dc275717ccc48130bd</sum></package><package arch="i686" name="libgomp" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgomp-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">f73ea4722304e3e1eafd27c5edba95d63ccb664662b6217f2c5dae5b769f9a10</sum></package><package arch="x86_64" name="gcc-c++" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>gcc-c++-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">d8e3e0943cfe844323b1d6f373b092da8a11ec93755cb1892e53a197e94af3ca</sum></package><package arch="x86_64" name="libgo-devel" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgo-devel-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">8f9991663642f4af28091b68f13a8e7fcefe6ae47b3cab7f089473947c2f2d35</sum></package><package arch="x86_64" name="libquadmath-devel" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libquadmath-devel-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">31e3310d60af606926f7cb1f85f2afaa9c07f004a209ab26e7b471da49a56c30</sum></package><package arch="i686" name="libgo" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgo-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">5ffe221a62d993275ef082c34a6f80742480a7eb94b0d789c1a7a06b08966793</sum></package><package arch="i686" name="libatomic-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libatomic-static-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">8205272cb6861bd4de55ebc63cb5da7334c037569bfaacc221f21098c8090745</sum></package><package arch="x86_64" name="libtsan" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libtsan-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">4e0a16b222297070ee1aad031010f5a519844c77d579d55e50e68de323b28a62</sum></package><package arch="x86_64" name="libmudflap" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libmudflap-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">3e557394e8d9e283f2176f74e4a2a250be22cf675c2182491f8ced1ab8affca4</sum></package><package arch="x86_64" name="libgfortran-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgfortran-static-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">e34862b1c38fa948a0cc671553aa25ee0403c1db91d83e8f2d653dbaedba1e4e</sum></package><package arch="x86_64" name="libitm-devel" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libitm-devel-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">ff6d612cea79247efab019265c43f0e674fcb856737fbda1ec04e8ef21941cda</sum></package><package arch="x86_64" name="libgomp" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgomp-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">bc408d4cbf06610d9dcefc62c1ad2f626abe405e738421825e92f9fa247cebb7</sum></package><package arch="x86_64" name="gcc-objc++" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>gcc-objc++-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">a1abfc3005702ab9bd30ea9351c08b8b5945303183d9d329e28730097d7a6192</sum></package><package arch="x86_64" name="gcc-plugin-devel" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>gcc-plugin-devel-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">31d04df0593f719133013c85d5f44476373a887a9374cb45385e35d7b4de48e1</sum></package><package arch="x86_64" name="libgnat-devel" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgnat-devel-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">e6c28a6f34dcc914618b5bd3a7cd9319135955b862f820ee55b727a3802a83cd</sum></package><package arch="i686" name="libmudflap" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libmudflap-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">965a9e730d727f070fa5fdc38f562da29e78a3ca72669b44379592e259ad63a2</sum></package><package arch="x86_64" name="libobjc" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libobjc-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">1bead08d5766ad4bfcfeb85968c5e3ef4f1fd90137f4bd006d6caa7e0c62e718</sum></package><package arch="i686" name="libgnat-devel" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgnat-devel-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">7cbcde4eb5303795695d24a36e312082e5992f2b900880827ee0ab8298fc9063</sum></package><package arch="i686" name="libasan" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libasan-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">4b1eeb6f8d2a965573d7de4a65aaad395b019f4a25c89e72a790d885e2683c51</sum></package><package arch="x86_64" name="libgnat" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgnat-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">bb77869523a541b37cbf35c137f9a0dc00f08d34ce5ba5367bd8ca4046dd9b0e</sum></package><package arch="x86_64" name="libgo" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libgo-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">a481f6b8d1d6500d00f30a7266048a4b1100168b8e154011d7dc179d7edc2857</sum></package><package arch="x86_64" name="libquadmath" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libquadmath-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">9c7351918ac33e3f93484b05a1c2bd262e4c718ddd5b91c37e8babc6a3dd87bb</sum></package><package arch="x86_64" name="libasan" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libasan-4.8.5-28.el7.x86_64.rpm</filename><sum type="sha256">3d8bedfd7662b02cec6eb989d47a01539b22379614384068d99736c40c7b86f4</sum></package><package arch="i686" name="libitm-static" release="28.el7" src="gcc-4.8.5-28.el7.src.rpm" version="4.8.5"><filename>libitm-static-4.8.5-28.el7.i686.rpm</filename><sum type="sha256">a2aad785d99a5b79668ccd00df8d9df9d6299ee576a5e29a86a603e60eeb38da</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11671" id="CVE-2017-11671" title="Gcc: Gcc Generates Incorrect Code For Rdrand/Rdseed Intrinsics" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0849" id="RHSA-2018:0849-1" title="Rhsa-2018:0849-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1465510" id="1465510" title="Gcc And Gcc-Libraries Debuginfo Clash On Aarch64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1475733" id="1475733" title="Gcc: Gcc Generates Incorrect Code For Rdrand/Rdseed Intrinsics" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502794" id="1502794" title="Backport A Few Wrong-Code Fixes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1508968" id="1508968" title="Need To Rebuild Rpm In Order To Remove Static Relocations Not Known To Older Linkers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1529981" id="1529981" title="Gcc: Incorrect Cfi Information On I386 With -Fstack-Clash-Protection" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0855-1</id><title>Ntp</title><description>Security Fix(es): 
* ntp: Authenticated DoS via Malicious Config Option (CVE-2017-6463) 
* ntp: Denial of Service via Malformed Config (CVE-2017-6464) 
* ntp: Buffer Overflow in DPTS Clock (CVE-2017-6462) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ntp" release="28.el7" src="ntp-4.2.6p5-28.el7.src.rpm" version="4.2.6p5"><filename>ntp-4.2.6p5-28.el7.x86_64.rpm</filename><sum type="sha256">87cecb2be2dbdd95763c4aed2052168119893728c40b30c57c0b0c0c18e3c08f</sum></package><package arch="x86_64" name="ntpdate" release="28.el7" src="ntp-4.2.6p5-28.el7.src.rpm" version="4.2.6p5"><filename>ntpdate-4.2.6p5-28.el7.x86_64.rpm</filename><sum type="sha256">b71d69c792699e2fcb8da579bbf8e0ab7f0bb1c7239193f253d032dd6bab20a4</sum></package><package arch="x86_64" name="sntp" release="28.el7" src="ntp-4.2.6p5-28.el7.src.rpm" version="4.2.6p5"><filename>sntp-4.2.6p5-28.el7.x86_64.rpm</filename><sum type="sha256">ad2b0e0484275544fc18f618ab36c1d1583cceac7986e3e808af738c84cf9241</sum></package><package arch="noarch" name="ntp-doc" release="28.el7" src="ntp-4.2.6p5-28.el7.src.rpm" version="4.2.6p5"><filename>ntp-doc-4.2.6p5-28.el7.noarch.rpm</filename><sum type="sha256">3b88a5d1d0f071594736421bea2e4aa6a5add931a9815021efffc8a5c56bb5b2</sum></package><package arch="noarch" name="ntp-perl" release="28.el7" src="ntp-4.2.6p5-28.el7.src.rpm" version="4.2.6p5"><filename>ntp-perl-4.2.6p5-28.el7.noarch.rpm</filename><sum type="sha256">8948be23a03e6dd364acdd6aeb9e39651ab2b02145800825dcc0d6cd7ce8eff4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6462" id="CVE-2017-6462" title="Ntp: Buffer Overflow In Dpts Clock" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6463" id="CVE-2017-6463" title="Ntp: Authenticated Dos Via Malicious Config Option" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6464" id="CVE-2017-6464" title="Ntp: Denial Of Service Via Malformed Config" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0855" id="RHSA-2018:0855-1" title="Rhsa-2018:0855-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1420453" id="1420453" title="Typos In Ntpd Man Page" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1433987" id="1433987" title="Ntp: Denial Of Service Via Malformed Config" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1433995" id="1433995" title="Ntp: Buffer Overflow In Dpts Clock" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434002" id="1434002" title="Ntp: Authenticated Dos Via Malicious Config Option" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1442083" id="1442083" title="Delayed Name Resolving Fails When Fips Is Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1466947" id="1466947" title="Ntpdate.Service Should Start After Network-Online.Target" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1491797" id="1491797" title="Rfe:  Backport Spectracom Tsync Driver To Ntp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1493452" id="1493452" title="Ntpd Clears Sta_Unsync On Start" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0878-1</id><title>Golang</title><description>The following packages have been upgraded to a later upstream version: golang (1.9.4). 
Security Fix(es): 
* golang: arbitrary code execution during "go get" or "go get -d" (CVE-2017-15041) 
* golang: smtp.PlainAuth susceptible to man-in-the-middle password harvesting (CVE-2017-15042) 
* golang: arbitrary code execution during "go get" via C compiler options (CVE-2018-6574) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="golang-tests" release="1.el7" src="golang-1.9.4-1.el7.src.rpm" version="1.9.4"><filename>golang-tests-1.9.4-1.el7.noarch.rpm</filename><sum type="sha256">f51406b8e808c7cb2107f480196dab22ef97701888b754979cbf807402c9c423</sum></package><package arch="noarch" name="golang-docs" release="1.el7" src="golang-1.9.4-1.el7.src.rpm" version="1.9.4"><filename>golang-docs-1.9.4-1.el7.noarch.rpm</filename><sum type="sha256">78f07799cbd18d34cc5dd3039b291aec1631215f4ce7c67e9e42573942c3e35a</sum></package><package arch="noarch" name="golang-misc" release="1.el7" src="golang-1.9.4-1.el7.src.rpm" version="1.9.4"><filename>golang-misc-1.9.4-1.el7.noarch.rpm</filename><sum type="sha256">9cb9906087d0378d40c87c892d6e4af1c293fa2f138a4b351f41f0972e12b180</sum></package><package arch="x86_64" name="golang" release="1.el7" src="golang-1.9.4-1.el7.src.rpm" version="1.9.4"><filename>golang-1.9.4-1.el7.x86_64.rpm</filename><sum type="sha256">6c844a18c0c111eb7ee83ce04e214ca7a30feeeb3a580fe824876fd17593c702</sum></package><package arch="x86_64" name="golang-bin" release="1.el7" src="golang-1.9.4-1.el7.src.rpm" version="1.9.4"><filename>golang-bin-1.9.4-1.el7.x86_64.rpm</filename><sum type="sha256">c628086783fdc64bf350800e0c8a020c6c1b5b46041f075fb2d267d9925e174c</sum></package><package arch="noarch" name="golang-src" release="1.el7" src="golang-1.9.4-1.el7.src.rpm" version="1.9.4"><filename>golang-src-1.9.4-1.el7.noarch.rpm</filename><sum type="sha256">415e49212a13d596921cc60b21008de8019e3dceec1ddb5432ea6d1a5fd729df</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15041" id="CVE-2017-15041" title="Golang: Arbitrary Code Execution During &quot;Go Get&quot; Or &quot;Go Get -D&quot;" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15042" id="CVE-2017-15042" title="Golang: Smtp.Plainauth Susceptible To Man-In-The-Middle Password Harvesting" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6574" id="CVE-2018-6574" title="Golang: Arbitrary Code Execution During &quot;Go Get&quot; Via C Compiler Options" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0878" id="RHSA-2018:0878-1" title="Rhsa-2018:0878-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1498867" id="1498867" title="Golang: Smtp.Plainauth Susceptible To Man-In-The-Middle Password Harvesting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1498870" id="1498870" title="Golang: Arbitrary Code Execution During &quot;Go Get&quot; Or &quot;Go Get -D&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1543561" id="1543561" title="Golang: Arbitrary Code Execution During &quot;Go Get&quot; Via C Compiler Options" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0913-1</id><title>Policycoreutils</title><description>Security Fix(es): 
* policycoreutils: Relabelling of symbolic links in /tmp and /var/tmp change the context of their target instead (CVE-2018-1063) 
This issue was discovered by Renaud Mtrich (Red Hat). 
Additional Changes:</description><severity>low</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="policycoreutils-python" release="22.el7" src="policycoreutils-2.5-22.el7.src.rpm" version="2.5"><filename>policycoreutils-python-2.5-22.el7.x86_64.rpm</filename><sum type="sha256">288091191761dbbafab8661077937f0492e4d91190a4e3dad2e42e44279595a6</sum></package><package arch="x86_64" name="policycoreutils" release="22.el7" src="policycoreutils-2.5-22.el7.src.rpm" version="2.5"><filename>policycoreutils-2.5-22.el7.x86_64.rpm</filename><sum type="sha256">38ed352ff0b4a8293cfe65f8704dbe3050ee94653acd04ee8bac20a2f03f6f98</sum></package><package arch="x86_64" name="policycoreutils-newrole" release="22.el7" src="policycoreutils-2.5-22.el7.src.rpm" version="2.5"><filename>policycoreutils-newrole-2.5-22.el7.x86_64.rpm</filename><sum type="sha256">24a31d9e8b1de676e5b10159af617fb728925d646510a103649f92da384e53ff</sum></package><package arch="x86_64" name="policycoreutils-gui" release="22.el7" src="policycoreutils-2.5-22.el7.src.rpm" version="2.5"><filename>policycoreutils-gui-2.5-22.el7.x86_64.rpm</filename><sum type="sha256">7cca051a4adb22f472c9041a4058815770b0032593183f18bd85d77b0e10a9b0</sum></package><package arch="i686" name="policycoreutils-devel" release="22.el7" src="policycoreutils-2.5-22.el7.src.rpm" version="2.5"><filename>policycoreutils-devel-2.5-22.el7.i686.rpm</filename><sum type="sha256">1bfab176d8f46194f65fbe7c82ff0f731a156a376687600b1b799610f749b267</sum></package><package arch="x86_64" name="policycoreutils-sandbox" release="22.el7" src="policycoreutils-2.5-22.el7.src.rpm" version="2.5"><filename>policycoreutils-sandbox-2.5-22.el7.x86_64.rpm</filename><sum type="sha256">4ebf970c899a916dd11e9f96dacc52e582c9d6c00c72ae9879aa978091259527</sum></package><package arch="x86_64" name="policycoreutils-devel" release="22.el7" src="policycoreutils-2.5-22.el7.src.rpm" version="2.5"><filename>policycoreutils-devel-2.5-22.el7.x86_64.rpm</filename><sum type="sha256">c95c80b5b59d69c3a9544de8ffd4a82de02322f357d975b7b129d632cd42ac46</sum></package><package arch="x86_64" name="policycoreutils-restorecond" release="22.el7" src="policycoreutils-2.5-22.el7.src.rpm" version="2.5"><filename>policycoreutils-restorecond-2.5-22.el7.x86_64.rpm</filename><sum type="sha256">b7d328cc220348c61d09b81c3ae27c08894cc42b7bd3e911077b29c1774007a3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1063" id="CVE-2018-1063" title="Policycoreutils: Relabelling Of Symbolic Links In /Tmp And /Var/Tmp Change The Context Of Their Target Instead" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0913" id="RHSA-2018:0913-1" title="Rhsa-2018:0913-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1260238" id="1260238" title="Rfe: Restorecon Should Say In Verbose Mode When It Doesn'T Change A Context Due To Customizable_Type" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1337192" id="1337192" title="Semodule: Provide Better Documentation For Behavior Across Operations With Modules" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1376770" id="1376770" title="Sealert Tracebacks When Lithuanian Locales Are Used" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1409813" id="1409813" title="File Context Policy Does Not Honor Globs For /Home Based Entries" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1458831" id="1458831" title="'/Sbin/Fixfiles Restore' Doesn'T Relabel All Files When Run From /.Autorelabel Or From System When Some Special Files Are Present In /Tmp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471809" id="1471809" title="Rfe: Backport Selinux/Infiniband Userspace Support" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1481191" id="1481191" title="[Policycoreutils] Tier 0 Localization" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1499259" id="1499259" title="Semanage Fcontext &quot;-F/--Ftype&quot; Description Is Broken" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1550122" id="1550122" title="Policycoreutils: Relabelling Of Symbolic Links In /Tmp And /Var/Tmp Change The Context Of Their Target Instead" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=974163" id="974163" title="Semanage Port -L  Shows A Port With Multiple Types" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0980-1</id><title>Openssh</title><description>Security Fix(es): 
* openssh: Improper write operations in readonly mode allow for zero- length file creation (CVE-2017-15906) 
Additional Changes:</description><severity>low</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openssh" release="16.el7" src="openssh-7.4p1-16.el7.src.rpm" version="7.4p1"><filename>openssh-7.4p1-16.el7.x86_64.rpm</filename><sum type="sha256">8f4ec3a655fb26c3afbc53f51c0f996fd377ab542bc8dda092b1265a351c6f62</sum></package><package arch="x86_64" name="openssh-ldap" release="16.el7" src="openssh-7.4p1-16.el7.src.rpm" version="7.4p1"><filename>openssh-ldap-7.4p1-16.el7.x86_64.rpm</filename><sum type="sha256">c49e9f90f6ca708a9abc25ac8d278ce08360692129bc4db12d28b44d036c478b</sum></package><package arch="x86_64" name="openssh-askpass" release="16.el7" src="openssh-7.4p1-16.el7.src.rpm" version="7.4p1"><filename>openssh-askpass-7.4p1-16.el7.x86_64.rpm</filename><sum type="sha256">244a610a4858518f8fc46d57e3e4cba99b9a6fc55fb9c00d5f7a694ff355cdb3</sum></package><package arch="x86_64" name="pam_ssh_agent_auth" release="2.16.el7" src="openssh-7.4p1-16.el7.src.rpm" version="0.10.3"><filename>pam_ssh_agent_auth-0.10.3-2.16.el7.x86_64.rpm</filename><sum type="sha256">c82a800078a9c8251a295dc087d5f6cb643b5aeac48bde191fac766adcfee38e</sum></package><package arch="x86_64" name="openssh-keycat" release="16.el7" src="openssh-7.4p1-16.el7.src.rpm" version="7.4p1"><filename>openssh-keycat-7.4p1-16.el7.x86_64.rpm</filename><sum type="sha256">d06ebaec15901b2dccd1723ffe493d27f8db54d9e4ee6c44f79de9d284f5a689</sum></package><package arch="x86_64" name="openssh-clients" release="16.el7" src="openssh-7.4p1-16.el7.src.rpm" version="7.4p1"><filename>openssh-clients-7.4p1-16.el7.x86_64.rpm</filename><sum type="sha256">abe4e5cd3f0bb705a0a1bba7c6593387bd7c268cd7abdf2523ed52d2637b3230</sum></package><package arch="x86_64" name="openssh-server-sysvinit" release="16.el7" src="openssh-7.4p1-16.el7.src.rpm" version="7.4p1"><filename>openssh-server-sysvinit-7.4p1-16.el7.x86_64.rpm</filename><sum type="sha256">25a2ec751157fffcbbe277fb2b07a0b39cbf9852a6c440f5b66beffaa6246ff6</sum></package><package arch="x86_64" name="openssh-server" release="16.el7" src="openssh-7.4p1-16.el7.src.rpm" version="7.4p1"><filename>openssh-server-7.4p1-16.el7.x86_64.rpm</filename><sum type="sha256">10f568cfeb081570b29d66d94f570e230b6774a3c7571877d74ce4dbd0553966</sum></package><package arch="i686" name="pam_ssh_agent_auth" release="2.16.el7" src="openssh-7.4p1-16.el7.src.rpm" version="0.10.3"><filename>pam_ssh_agent_auth-0.10.3-2.16.el7.i686.rpm</filename><sum type="sha256">97343be9248dcfe4cddc1ba4e6def1cea6f24d4705075f97d44aed804791e0d6</sum></package><package arch="x86_64" name="openssh-cavs" release="16.el7" src="openssh-7.4p1-16.el7.src.rpm" version="7.4p1"><filename>openssh-cavs-7.4p1-16.el7.x86_64.rpm</filename><sum type="sha256">feafdf3560b3c3eb08e65e0f26211bd5d0b79f89a6b97ef9fe95b7323dfd08d1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15906" id="CVE-2017-15906" title="Openssh: Improper Write Operations In Readonly Mode Allow For Zero-Length File Creation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0980" id="RHSA-2018:0980-1" title="Rhsa-2018:0980-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1456853" id="1456853" title="Ssh -Q And -G List Host Key Types That Are Not Allowed In Fips Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1478175" id="1478175" title="The Usedns Configuration Option Changed Default Behaviour Between 7.3 And 7.4, This Breaks Existing Configurations Until Manually Corrected" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1480510" id="1480510" title="Ssh Connections Get Closed When Time-Based Rekeyring Is Used And Clientalivemaxcount=0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1488083" id="1488083" title="Segfaults When Cleaning Up Session Due To Some Error" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1488982" id="1488982" title="Gssapistrictacceptorcheck Default Change With 7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1494268" id="1494268" title="Pam_Ssh_Agent_Auth Segv'S If Keyfile Is Missing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496467" id="1496467" title="Regression: Ssh Authorizedkeyscommand Hangs When Output Is Too Large" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496808" id="1496808" title="Openssh 7.4 Doesn'T Work With Winscp &gt;= 5.10 Clients" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1506630" id="1506630" title="Openssh: Improper Write Operations In Readonly Mode Allow For Zero-Length File Creation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:0998-1</id><title>Openssl</title><description>Security Fix(es): 
* openssl: bn_sqrx8x_internal carry bug on x86_64 (CVE-2017-3736) 
* openssl: Read/write after SSL object in error state (CVE-2017-3737) 
* openssl: rsaz_1024_mul_avx2 overflow bug on x86_64 (CVE-2017-3738) 
Additional Changes:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl-devel" release="12.el7" src="openssl-1.0.2k-12.el7.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-12.el7.x86_64.rpm</filename><sum type="sha256">f50101162865e55c8358186ea38e38fcc470e71b363ec43a0e4aa3bd9f664d89</sum></package><package arch="i686" epoch="1" name="openssl-static" release="12.el7" src="openssl-1.0.2k-12.el7.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-12.el7.i686.rpm</filename><sum type="sha256">792410ed61751090a56bb05b3899b08f59533be6180948ba1ec2f728b95ed4f6</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="12.el7" src="openssl-1.0.2k-12.el7.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-12.el7.i686.rpm</filename><sum type="sha256">15e685ab7cc94d7ceacab3d116ea4c44d3d23e1f93d5283f3b081e18adce3c01</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="12.el7" src="openssl-1.0.2k-12.el7.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-12.el7.x86_64.rpm</filename><sum type="sha256">c16f320ed46519f2a3ce191ba0febc5877378c470f71318af1f31a9065a19c46</sum></package><package arch="x86_64" epoch="1" name="openssl-libs" release="12.el7" src="openssl-1.0.2k-12.el7.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-12.el7.x86_64.rpm</filename><sum type="sha256">7e704520ec354c10be906c56149a98757057cb5e96605ac1439647777532b4b8</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="12.el7" src="openssl-1.0.2k-12.el7.src.rpm" version="1.0.2k"><filename>openssl-perl-1.0.2k-12.el7.x86_64.rpm</filename><sum type="sha256">52338f1518a5e91573b9764fef3491b3eca6e0c0fd9348517c100e2b12579430</sum></package><package arch="x86_64" epoch="1" name="openssl" release="12.el7" src="openssl-1.0.2k-12.el7.src.rpm" version="1.0.2k"><filename>openssl-1.0.2k-12.el7.x86_64.rpm</filename><sum type="sha256">b4fbdb7ae590e4f733acd0493f7e9f5105eaec77e6d6fc16747dd307d0cebb92</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="12.el7" src="openssl-1.0.2k-12.el7.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-12.el7.i686.rpm</filename><sum type="sha256">4cd742c58081b6543eced10bad23e1bf4698312f6e962cacda792f4a58d405ba</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3736" id="CVE-2017-3736" title="Openssl: Bn_Sqrx8X_Internal Carry Bug On X86_64" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3737" id="CVE-2017-3737" title="Openssl: Read/Write After Ssl Object In Error State" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3738" id="CVE-2017-3738" title="Openssl: Rsaz_1024_Mul_Avx2 Overflow Bug On X86_64" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:0998" id="RHSA-2018:0998-1" title="Rhsa-2018:0998-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1509169" id="1509169" title="Openssl: Bn_Sqrx8X_Internal Carry Bug On X86_64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1523504" id="1523504" title="Openssl: Read/Write After Ssl Object In Error State" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1523510" id="1523510" title="Openssl: Rsaz_1024_Mul_Avx2 Overflow Bug On X86_64" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1055-1</id><title>Libvncserver</title><description>Security Fix(es): 
* libvncserver: Improper input sanitization in rfbProcessClientNormalMessage in rfbserver.c (CVE-2018-7225)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libvncserver" release="12.el7_5" src="libvncserver-0.9.9-12.el7_5.src.rpm" version="0.9.9"><filename>libvncserver-0.9.9-12.el7_5.x86_64.rpm</filename><sum type="sha256">b95f5623842b5467972deadf729abd055f8afb8cd4f397dcca7d66e99592ae29</sum></package><package arch="x86_64" name="libvncserver-devel" release="12.el7_5" src="libvncserver-0.9.9-12.el7_5.src.rpm" version="0.9.9"><filename>libvncserver-devel-0.9.9-12.el7_5.x86_64.rpm</filename><sum type="sha256">d6c1b929c08220019342f628e8c49f04c1900a905bf7127d24923606ab87666f</sum></package><package arch="i686" name="libvncserver-devel" release="12.el7_5" src="libvncserver-0.9.9-12.el7_5.src.rpm" version="0.9.9"><filename>libvncserver-devel-0.9.9-12.el7_5.i686.rpm</filename><sum type="sha256">fc99335fce3d945ceb4923974523a10ac68e10922fa33d015a421955336b32db</sum></package><package arch="i686" name="libvncserver" release="12.el7_5" src="libvncserver-0.9.9-12.el7_5.src.rpm" version="0.9.9"><filename>libvncserver-0.9.9-12.el7_5.i686.rpm</filename><sum type="sha256">737d9be599f73f2ad7595d213aba176d031043602699afa5612f2d302f3cc231</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7225" id="CVE-2018-7225" title="Libvncserver: Improper Input Sanitization In Rfbprocessclientnormalmessage In Rfbserver.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1055" id="RHSA-2018:1055-1" title="Rhsa-2018:1055-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1546858" id="1546858" title="Libvncserver: Improper Input Sanitization In Rfbprocessclientnormalmessage In Rfbserver.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1058-1</id><title>Libvorbis</title><description>Security Fix(es): 
* Mozilla: Vorbis audio processing out of bounds write (MFSA 2018-08) (CVE-2018-5146)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="libvorbis-devel-docs" release="8.el7.1" src="libvorbis-1.3.3-8.el7.1.src.rpm" version="1.3.3"><filename>libvorbis-devel-docs-1.3.3-8.el7.1.noarch.rpm</filename><sum type="sha256">0fb6fcf0df54af8f7106fe4d38e859552155f645253a2e1baffe44f22f981713</sum></package><package arch="x86_64" epoch="1" name="libvorbis" release="8.el7.1" src="libvorbis-1.3.3-8.el7.1.src.rpm" version="1.3.3"><filename>libvorbis-1.3.3-8.el7.1.x86_64.rpm</filename><sum type="sha256">6b3a21065471c38e37b0b4829c0615e390c5833f6b7909e69323005d4eb295b3</sum></package><package arch="x86_64" epoch="1" name="libvorbis-devel" release="8.el7.1" src="libvorbis-1.3.3-8.el7.1.src.rpm" version="1.3.3"><filename>libvorbis-devel-1.3.3-8.el7.1.x86_64.rpm</filename><sum type="sha256">33ec298df2d7f08b12a762fcb5364daef8120f9a9fd5786bdd378aff453f5b49</sum></package><package arch="i686" epoch="1" name="libvorbis" release="8.el7.1" src="libvorbis-1.3.3-8.el7.1.src.rpm" version="1.3.3"><filename>libvorbis-1.3.3-8.el7.1.i686.rpm</filename><sum type="sha256">dd45fd156a4e3b6f12d028b234345e8de30387a9b78e7c94c1d9b96d1b7bfe3c</sum></package><package arch="i686" epoch="1" name="libvorbis-devel" release="8.el7.1" src="libvorbis-1.3.3-8.el7.1.src.rpm" version="1.3.3"><filename>libvorbis-devel-1.3.3-8.el7.1.i686.rpm</filename><sum type="sha256">32f03a9d18286982a4069787c58c356d9ef9850a0362c9bbacd2c128cdfb46fe</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5146" id="CVE-2018-5146" title="Mozilla: Vorbis Audio Processing Out Of Bounds Write (Mfsa 2018-08)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1058" id="RHSA-2018:1058-1" title="Rhsa-2018:1058-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1557221" id="1557221" title="Mozilla: Vorbis Audio Processing Out Of Bounds Write (Mfsa 2018-08)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1060-1</id><title>Pcs</title><description>Security Fix(es): 
* pcs: Privilege escalation via authorized user malicious REST call (CVE-2018-1079) 
* pcs: Debug parameter removal bypass, allowing information disclosure (CVE-2018-1086) 
* rack-protection: Timing attack in authenticity_token.rb (CVE-2018-1000119)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pcs" release="5.sl7_5.1" src="pcs-0.9.162-5.sl7_5.1.src.rpm" version="0.9.162"><filename>pcs-0.9.162-5.sl7_5.1.x86_64.rpm</filename><sum type="sha256">6979cdba92ece64ef19654a54ceb3c5d1bba7b278915fd7c1040837441d93ed8</sum></package><package arch="x86_64" name="pcs-snmp" release="5.sl7_5.1" src="pcs-0.9.162-5.sl7_5.1.src.rpm" version="0.9.162"><filename>pcs-snmp-0.9.162-5.sl7_5.1.x86_64.rpm</filename><sum type="sha256">e65088acd2df1f73b55b4894de9cc29fe4c3bd66158e49e5652c8b37ca128e51</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000119" id="CVE-2018-1000119" title="Rack-Protection: Timing Attack In Authenticity_Token.Rb" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1079" id="CVE-2018-1079" title="Pcs: Privilege Escalation Via Authorized User Malicious Rest Call" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1086" id="CVE-2018-1086" title="Pcs: Debug Parameter Removal Bypass, Allowing Information Disclosure" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1060" id="RHSA-2018:1060-1" title="Rhsa-2018:1060-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534027" id="1534027" title="Rack-Protection: Timing Attack In Authenticity_Token.Rb" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1550243" id="1550243" title="Pcs: Privilege Escalation Via Authorized User Malicious Rest Call" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1557366" id="1557366" title="Pcs: Debug Parameter Removal Bypass, Allowing Information Disclosure" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1062-1</id><title>Kernel</title><description>Security Fix(es): 
* hw: cpu: speculative execution permission faults handling (CVE-2017-5754, Important, KVM for Power) 
* kernel: Buffer overflow in firewire driver via crafted incoming packets (CVE-2016-8633, Important) 
* kernel: Use-after-free vulnerability in DCCP socket (CVE-2017-8824, Important) 
* Kernel: kvm: nVMX: L2 guest could access hardware(L0) CR8 register (CVE-2017-12154, Important) 
* kernel: v4l2: disabled memory access protection mechanism allowing privilege escalation (CVE-2017-13166, Important) 
* kernel: media: use-after-free in [tuner-xc2028] media driver (CVE-2016-7913, Moderate) 
* kernel: drm/vmwgfx: fix integer overflow in vmw_surface_define_ioctl() (CVE-2017-7294, Moderate) 
* kernel: Incorrect type conversion for size during dma allocation (CVE-2017-9725, Moderate) 
* kernel: memory leak when merging buffers in SCSI IO vectors (CVE-2017-12190, Moderate) 
* kernel: vfs: BUG in truncate_inode_pages_range() and fuse client (CVE-2017-15121, Moderate) 
* kernel: Use-after-free in userfaultfd_event_wait_completion function in userfaultfd.c (CVE-2017-15126, Moderate) 
* kernel: net: double-free and memory corruption in get_net_ns_by_id() (CVE-2017-15129, Moderate) 
* kernel: Use-after-free in snd_seq_ioctl_create_port() (CVE-2017-15265, Moderate) 
* kernel: Missing capabilities check in net/netfilter/nfnetlink_cthelper.c allows for unprivileged access to systemwide nfnl_cthelper_list structure (CVE-2017-17448, Moderate) 
* kernel: Missing namespace check in net/netlink/af_netlink.c allows for network monitors to observe systemwide activity (CVE-2017-17449, Moderate) 
* kernel: Unallocated memory access by malicious USB device via bNumInterfaces overflow (CVE-2017-17558, Moderate) 
* kernel: netfilter: use-after-free in tcpmss_mangle_packet function in net/netfilter/xt_TCPMSS.c (CVE-2017-18017, Moderate) 
* kernel: Race condition in drivers/md/dm.c:dm_get_from_kobject() allows local users to cause a denial of service (CVE-2017-18203, Moderate) 
* kernel: kvm: Reachable BUG() on out-of-bounds guest IRQ (CVE-2017-1000252, Moderate) 
* Kernel: KVM: DoS via write flood to I/O port 0x80 (CVE-2017-1000407, Moderate) 
* kernel: Stack information leak in the EFS element (CVE-2017-1000410, Moderate) 
* kernel: Kernel address information leak in drivers/acpi/sbshc.c:acpi_smbus_hc_add() function potentially allowing KASLR bypass (CVE-2018-5750, Moderate) 
* kernel: Race condition in sound system can lead to denial of service (CVE-2018-1000004, Moderate) 
* kernel: multiple Low security impact security issues (CVE-2016-3672, CVE-2017-14140, CVE-2017-15116, CVE-2017-15127, CVE-2018-6927, Low) 
Additional Changes:</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-headers" release="862.el7" src="kernel-3.10.0-862.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-862.el7.x86_64.rpm</filename><sum type="sha256">6df08b0e6ce4814e5f307598137258b31dcf9ebb1d4a169343c6432762855624</sum></package><package arch="x86_64" name="perf" release="862.el7" src="kernel-3.10.0-862.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-862.el7.x86_64.rpm</filename><sum type="sha256">ebba2615b243289f2d55437a1cb64991730b19154fe778d06eacb02522a0e7e0</sum></package><package arch="noarch" name="kernel-doc" release="862.el7" src="kernel-3.10.0-862.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-862.el7.noarch.rpm</filename><sum type="sha256">6e82d704660b1e3ca0099e3b9be4191ec1e604e8635f2910e1b3ddce6375017a</sum></package><package arch="x86_64" name="kernel-tools-libs" release="862.el7" src="kernel-3.10.0-862.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-862.el7.x86_64.rpm</filename><sum type="sha256">85448b41477a97f2dd8191b3f0496db31502bb93363e69955e7130f2179d908f</sum></package><package arch="x86_64" name="kmod-openafs-1.6-sl-862" release="286.sl7.862" src="openafs.SLx-1.6.22.3-286.src.rpm" version="1.6.22.3"><filename>kmod-openafs-1.6-sl-862-1.6.22.3-286.sl7.862.x86_64.rpm</filename><sum type="sha256">5170bfe1b485eba55f1f8b094d5c9e1bfafb4b29e4b184a0f07359362c730c11</sum></package><package arch="x86_64" name="kernel" release="862.el7" src="kernel-3.10.0-862.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-862.el7.x86_64.rpm</filename><sum type="sha256">1c446019b936f73b0fa96211b9ddff09f73235e8d0c3732b6f84399a912a307d</sum></package><package arch="x86_64" name="kernel-debug-devel" release="862.el7" src="kernel-3.10.0-862.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-862.el7.x86_64.rpm</filename><sum type="sha256">c2f29e093b32db2effe0453bdbed33afc896a1f114ec0f93761565422fd109fb</sum></package><package arch="x86_64" name="kernel-tools" release="862.el7" src="kernel-3.10.0-862.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-862.el7.x86_64.rpm</filename><sum type="sha256">7955fe6f269851b09e7d1a45e8787a151bb7b2721ea6622dc672c1fac83fc015</sum></package><package arch="noarch" name="kmod-openafs-1.6-sl" release="1.SL75.el7" src="kmod-openafs-1.6-sl-1.6.22.3-1.SL75.el7.src.rpm" version="1.6.22.3"><filename>kmod-openafs-1.6-sl-1.6.22.3-1.SL75.el7.noarch.rpm</filename><sum type="sha256">e8fec099d3302005e95c4b3767d627fda94f7ba2f063857778b38c95f7a627f9</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="862.el7" src="kernel-3.10.0-862.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-862.el7.noarch.rpm</filename><sum type="sha256">1083366302f6a9a5ffce8b185d402f7efa71d608c11e4ade66f6daff2ab2e662</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="862.el7" src="kernel-3.10.0-862.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-862.el7.x86_64.rpm</filename><sum type="sha256">31ae97bf856e9c9a8ec4016d8434ddd45bb8894403e0771210f046aba3650941</sum></package><package arch="x86_64" name="python-perf" release="862.el7" src="kernel-3.10.0-862.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-862.el7.x86_64.rpm</filename><sum type="sha256">60d3fd4402cc43d3975d0363c56589b5af3b0fb70afc8c2b98348971e4bdb1c1</sum></package><package arch="x86_64" name="kernel-devel" release="862.el7" src="kernel-3.10.0-862.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-862.el7.x86_64.rpm</filename><sum type="sha256">e74edf02663f1d1f53f1161e49919201e4ea6926d8e299f0a7713ef298a5991d</sum></package><package arch="x86_64" name="kernel-debug" release="862.el7" src="kernel-3.10.0-862.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-862.el7.x86_64.rpm</filename><sum type="sha256">77c8a50ed95bd596778275d0e411fb0764659ab9cee0ff53e8b0d8d20381280f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3672" id="CVE-2016-3672" title="Kernel: Unlimiting The Stack Disables Aslr" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7913" id="CVE-2016-7913" title="Kernel: Media: Use-After-Free In [Tuner-Xc2028] Media Driver" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-8633" id="CVE-2016-8633" title="Kernel: Buffer Overflow In Firewire Driver Via Crafted Incoming Packets" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000252" id="CVE-2017-1000252" title="Kernel: Kvm: Reachable Bug() On Out-Of-Bounds Guest Irq" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000407" id="CVE-2017-1000407" title="Kernel: Kvm: Dos Via Write Flood To I/O Port 0X80" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000410" id="CVE-2017-1000410" title="Kernel: Stack Information Leak In The Efs Element" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12154" id="CVE-2017-12154" title="Kernel: Kvm: Nvmx: L2 Guest Could Access Hardware(L0) Cr8 Register" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12190" id="CVE-2017-12190" title="Kernel: Memory Leak When Merging Buffers In Scsi Io Vectors" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13166" id="CVE-2017-13166" title="Kernel: V4L2: Disabled Memory Access Protection Mechanism Allowing Privilege Escalation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14140" id="CVE-2017-14140" title="Kernel: Missing Permission Check In Move_Pages System Call" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15116" id="CVE-2017-15116" title="Kernel: Null Pointer Dereference In Rngapi_Reset Function" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15121" id="CVE-2017-15121" title="Kernel: Vfs: Bug In Truncate_Inode_Pages_Range() And Fuse Client" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15126" id="CVE-2017-15126" title="Kernel: Use-After-Free In Userfaultfd_Event_Wait_Completion Function In Userfaultfd.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15127" id="CVE-2017-15127" title="Kernel: Improper Error Handling Of Vm_Shared Hugetlbfs Mapping In Mm/Hugetlb.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15129" id="CVE-2017-15129" title="Kernel: Net: Double-Free And Memory Corruption In Get_Net_Ns_By_Id()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15265" id="CVE-2017-15265" title="Kernel: Use-After-Free In Snd_Seq_Ioctl_Create_Port()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17448" id="CVE-2017-17448" title="Kernel: Missing Capabilities Check In Net/Netfilter/Nfnetlink_Cthelper.C Allows For Unprivileged Access To Systemwide Nfnl_Cthelper_List Structure" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17449" id="CVE-2017-17449" title="Kernel: Missing Namespace Check In Net/Netlink/Af_Netlink.C Allows For Network Monitors To Observe Systemwide Activity" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17558" id="CVE-2017-17558" title="Kernel: Unallocated Memory Access By Malicious Usb Device Via Bnuminterfaces Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18017" id="CVE-2017-18017" title="Kernel: Netfilter: Use-After-Free In Tcpmss_Mangle_Packet Function In Net/Netfilter/Xt_Tcpmss.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18203" id="CVE-2017-18203" title="Kernel: Race Condition In Drivers/Md/Dm.C:Dm_Get_From_Kobject() Allows Local Users To Cause A Denial Of Service" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754" id="CVE-2017-5754" title="Hw: Cpu: Speculative Execution Permission Faults Handling" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7294" id="CVE-2017-7294" title="Kernel: Drm/Vmwgfx: Fix Integer Overflow In Vmw_Surface_Define_Ioctl()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8824" id="CVE-2017-8824" title="Kernel: Use-After-Free Vulnerability In Dccp Socket" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9725" id="CVE-2017-9725" title="Kernel: Incorrect Type Conversion For Size During Dma Allocation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000004" id="CVE-2018-1000004" title="Kernel: Race Condition In Sound System Can Lead To Denial Of Service" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5750" id="CVE-2018-5750" title="Kernel: Kernel Address Information Leak In Drivers/Acpi/Sbshc.C:Acpi_Smbus_Hc_Add() Function Potentially Allowing Kaslr Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6927" id="CVE-2018-6927" title="Kernel: Integer Overflow In Futex.C:Futux_Requeue Can Lead To Denial Of Service Or Unspecified Impact" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1062" id="RHSA-2018:1062-1" title="Rhsa-2018:1062-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1132610" id="1132610" title="Nfsd Does Not Release Free Space Of A File Created With Dd Oflag=Direct Where There Was No Space Left On Device Even After Manual Deletion" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1324749" id="1324749" title="Kernel: Unlimiting The Stack Disables Aslr" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1334439" id="1334439" title="Unable To Disable Ipv6 Dad Or Optimistic Dad For All Interfaces" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1372079" id="1372079" title="Ixgbe Nic Is Falsely Advertising Mii Support" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1391490" id="1391490" title="Kernel: Buffer Overflow In Firewire Driver Via Crafted Incoming Packets" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1402885" id="1402885" title="Kernel: Media: Use-After-Free In [Tuner-Xc2028] Media Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1436798" id="1436798" title="Kernel: Drm/Vmwgfx: Fix Integer Overflow In Vmw_Surface_Define_Ioctl()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1450205" id="1450205" title="Gratuitous Arp Updates Received In Span Of 2-3 Seconds Time Frame Are All Ignored" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1458032" id="1458032" title="[Intel 7.5 Bug] Kvmgt: Bogus Pci Bar Emulation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1460213" id="1460213" title="Cls_Matchall: Kernel Panic When Used With Classful Qdiscs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461282" id="1461282" title="Kernel: Icmp Rate Limiting Is Too Aggressive On Loopback" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471875" id="1471875" title="Soft Lockups During Unmount When Dentry Cache Is Very Large" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1488329" id="1488329" title="Kernel: Missing Permission Check In Move_Pages System Call" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1489088" id="1489088" title="Kernel: Incorrect Type Conversion For Size During Dma Allocation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1489542" id="1489542" title="Behavior Change In Autofs Expiry Timer When A Path Walk Is Done Following Commit From Bz 1413523" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1490673" id="1490673" title="Kernel Panic Always Happen Immediately Whenever Make &quot;Debug.Panic_On_Rcu_Stall=1&quot; Set On Rhel7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1490781" id="1490781" title="Kernel: Kvm: Reachable Bug() On Out-Of-Bounds Guest Irq" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1491224" id="1491224" title="Kernel: Kvm: Nvmx: L2 Guest Could Access Hardware(L0) Cr8 Register" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1493125" id="1493125" title="[Rfe] Kernel Address Space Layout Randomization [Kaslr] Qemu Support (Kernel)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1495089" id="1495089" title="Kernel: Memory Leak When Merging Buffers In Scsi Io Vectors" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496836" id="1496836" title="[Rh 7.5 Bug] Request For Upstream Commit 3664847D95E6 To Be Merged Into Rhel 7.5/7.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1501878" id="1501878" title="Kernel: Use-After-Free In Snd_Seq_Ioctl_Create_Port()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502601" id="1502601" title="[Hyper-V][Rhel7.4] Hang When Thaw On Microsoft Hyper-V" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1506382" id="1506382" title="Deadlock In Nfs V4 Client Init" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1507025" id="1507025" title="[Esxi][Rhel7.5]X86/Vmware: Skip Timer_Irq_Works() Check On Vmware" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1507026" id="1507026" title="[Esxi][Rhel7.5]X86/Vmware: Skip Lapic Calibration On Vmware." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1514609" id="1514609" title="Kernel: Null Pointer Dereference In Rngapi_Reset Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519160" id="1519160" title="Kernel: Stack Information Leak In The Efs Element" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519591" id="1519591" title="Kernel: Use-After-Free Vulnerability In Dccp Socket" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519781" id="1519781" title="Hw: Cpu: Speculative Execution Permission Faults Handling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1520328" id="1520328" title="Kernel: Kvm: Dos Via Write Flood To I/O Port 0X80" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1520893" id="1520893" title="Kernel: Vfs: Bug In Truncate_Inode_Pages_Range() And Fuse Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1523481" id="1523481" title="Kernel: Use-After-Free In Userfaultfd_Event_Wait_Completion Function In Userfaultfd.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1525218" id="1525218" title="Kernel: Improper Error Handling Of Vm_Shared Hugetlbfs Mapping In Mm/Hugetlb.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1525474" id="1525474" title="Kernel: Unallocated Memory Access By Malicious Usb Device Via Bnuminterfaces Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1525762" id="1525762" title="Kernel: Missing Namespace Check In Net/Netlink/Af_Netlink.C Allows For Network Monitors To Observe Systemwide Activity" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1525768" id="1525768" title="Kernel: Missing Capabilities Check In Net/Netfilter/Nfnetlink_Cthelper.C Allows For Unprivileged Access To Systemwide Nfnl_Cthelper_List Structure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1531135" id="1531135" title="Kernel: Netfilter: Use-After-Free In Tcpmss_Mangle_Packet Function In Net/Netfilter/Xt_Tcpmss.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1531174" id="1531174" title="Kernel: Net: Double-Free And Memory Corruption In Get_Net_Ns_By_Id()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534272" id="1534272" title="Md: Raid0 Device Creation Prints Blank Line To Journalctl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1535315" id="1535315" title="Kernel: Race Condition In Sound System Can Lead To Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1539706" id="1539706" title="Kernel: Kernel Address Information Leak In Drivers/Acpi/Sbshc.C:Acpi_Smbus_Hc_Add() Function Potentially Allowing Kaslr Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1542013" id="1542013" title="Rhel-7.5: Cannot Set Port Mirroring Onto Two Interface" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1544612" id="1544612" title="Kernel: Integer Overflow In Futex.C:Futux_Requeue Can Lead To Denial Of Service Or Unspecified Impact" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1548412" id="1548412" title="Kernel: V4L2: Disabled Memory Access Protection Mechanism Allowing Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1550811" id="1550811" title="Kernel: Race Condition In Drivers/Md/Dm.C:Dm_Get_From_Kobject() Allows Local Users To Cause A Denial Of Service" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1099-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.7.3 ESR. 
Security Fix(es): 
* firefox: Use-after-free in compositor potentially allows code execution (CVE-2018-5148)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_5" src="firefox-52.7.3-1.el7_5.src.rpm" version="52.7.3"><filename>firefox-52.7.3-1.el7_5.x86_64.rpm</filename><sum type="sha256">2cc407d08ccb4711df7a3d9564aaa969de2f42ce167cf3cfcdc36e7b11b92975</sum></package><package arch="i686" name="firefox" release="1.el7_5" src="firefox-52.7.3-1.el7_5.src.rpm" version="52.7.3"><filename>firefox-52.7.3-1.el7_5.i686.rpm</filename><sum type="sha256">071ff38d63c8866ce6177a77b809208f2c03dd8cad69902afcbd201fb266e694</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5148" id="CVE-2018-5148" title="Firefox: Use-After-Free In Compositor Potentially Allows Code Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1099" id="RHSA-2018:1099-1" title="Rhsa-2018:1099-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560928" id="1560928" title="Firefox: Use-After-Free In Compositor Potentially Allows Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1169-1</id><title>Corosync</title><description>Security Fix(es): 
* corosync: Integer overflow in exec/totemcrypto.c:authenticate_nss_2_3() function (CVE-2018-1084)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="corosynclib-devel" release="2.el7_5.1" src="corosync-2.4.3-2.el7_5.1.src.rpm" version="2.4.3"><filename>corosynclib-devel-2.4.3-2.el7_5.1.x86_64.rpm</filename><sum type="sha256">56669ca0e7bd499937c09bd701abc65b49da3a579249137ea18c187c5fd60eef</sum></package><package arch="x86_64" name="corosynclib" release="2.el7_5.1" src="corosync-2.4.3-2.el7_5.1.src.rpm" version="2.4.3"><filename>corosynclib-2.4.3-2.el7_5.1.x86_64.rpm</filename><sum type="sha256">b0604ae15d7e45296079a2c29176f99b8f804f33103bfe52b6cc8803bf2304f6</sum></package><package arch="i686" name="corosynclib-devel" release="2.el7_5.1" src="corosync-2.4.3-2.el7_5.1.src.rpm" version="2.4.3"><filename>corosynclib-devel-2.4.3-2.el7_5.1.i686.rpm</filename><sum type="sha256">edc2660d6cc89435d074a97040a62a5aa292240f01047c971633665d31079182</sum></package><package arch="x86_64" name="corosync-qdevice" release="2.el7_5.1" src="corosync-2.4.3-2.el7_5.1.src.rpm" version="2.4.3"><filename>corosync-qdevice-2.4.3-2.el7_5.1.x86_64.rpm</filename><sum type="sha256">cd1979538ab68c1ae1a1648dc09d5354c36475cdf0ccfa9256b5534935e0a067</sum></package><package arch="x86_64" name="corosync-qnetd" release="2.el7_5.1" src="corosync-2.4.3-2.el7_5.1.src.rpm" version="2.4.3"><filename>corosync-qnetd-2.4.3-2.el7_5.1.x86_64.rpm</filename><sum type="sha256">a1a381e8d94a3196d07a4ee45076d65d010c6754d63f49ea348d3626db99abc0</sum></package><package arch="i686" name="corosynclib" release="2.el7_5.1" src="corosync-2.4.3-2.el7_5.1.src.rpm" version="2.4.3"><filename>corosynclib-2.4.3-2.el7_5.1.i686.rpm</filename><sum type="sha256">e6469af5a326000f6184abe8523d1446e8991f053571b053c0ae120797d85883</sum></package><package arch="x86_64" name="corosync" release="2.el7_5.1" src="corosync-2.4.3-2.el7_5.1.src.rpm" version="2.4.3"><filename>corosync-2.4.3-2.el7_5.1.x86_64.rpm</filename><sum type="sha256">b8bf78232312631929cc84da8fa9b98d6ef8366fe600360ebc76b00fdeb910d6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1084" id="CVE-2018-1084" title="Corosync: Integer Overflow In Exec/Totemcrypto.C:Authenticate_Nss_2_3() Function" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1169" id="RHSA-2018:1169-1" title="Rhsa-2018:1169-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1552830" id="1552830" title="Corosync: Integer Overflow In Exec/Totemcrypto.C:Authenticate_Nss_2_3() Function" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1191-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) (CVE-2018-2814) 
* OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) (CVE-2018-2794) 
* OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) (CVE-2018-2795) 
* OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) (CVE-2018-2796) 
* OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) (CVE-2018-2797) 
* OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) (CVE-2018-2798) 
* OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) (CVE-2018-2799) 
* OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) (CVE-2018-2800) 
* OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757) (CVE-2018-2815) 
* OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) (CVE-2018-2790) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website.</description><severity>critical</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7.i686.rpm</filename><sum type="sha256">dd1162183e2263a79b6ee489827c7b8d8420026d36cc022e16e710c1a1631c96</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7.i686.rpm</filename><sum type="sha256">bfc3a546a42314ab9f23f6459983e3c0f9754c0014970803270c2c354843a31b</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.171-7.b10.el7.noarch.rpm</filename><sum type="sha256">d70b5197f7e19c50d12922568dd459c8f34b2f6d3063ac81742b0b25aa042d23</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7.i686.rpm</filename><sum type="sha256">0febe62191b73dfae5ac9f697aa23118428595f9b4bfa804d67ad61728936545</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7.i686.rpm</filename><sum type="sha256">d4eee179095edfea0b7548a0ee9066ebf476d9107f42615d8788fc6be3da9d28</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.171-7.b10.el7.x86_64.rpm</filename><sum type="sha256">bf876f7980e9cf1231eb5363c47faef771c6f880bc00df2fcb0905414b9208df</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7.x86_64.rpm</filename><sum type="sha256">80a2ff5b50740b246fbb3fedca09724f00921814ce2f57af9cc77160084d393e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7.i686.rpm</filename><sum type="sha256">0414a83f155d515f203f45b7f7108ad3ed57e1717e4d42bedcf67be215f2ae9e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7.x86_64.rpm</filename><sum type="sha256">0f4d55e20e1661ffdddc81cd8f69ad58c6b4bb36fa7e2f8f46bdee5629a1a292</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7.x86_64.rpm</filename><sum type="sha256">6188daeac7e0ef27a14f5569f8c0055ed0bef42d3b60e224c78988e440d85990</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-1.8.0.171-7.b10.el7.i686.rpm</filename><sum type="sha256">7309b8009d6fb87fe2e3ae2d6f7414a72c1b15b1af16a64f89942a61d212dc5a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-debug-1.8.0.171-7.b10.el7.x86_64.rpm</filename><sum type="sha256">fc76914914bfefde5b678a28769734cae4b636b6edfee6d3b14159fd5336009d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7.x86_64.rpm</filename><sum type="sha256">f132e7896361bcf6cf33fcfa55bef55addc2bbb2fd29dc865de7749f6457f0df</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.171-7.b10.el7.i686.rpm</filename><sum type="sha256">5eefcb76a1b397482321d524f0fdaa5d84905b75777d285686767aef798c2bc2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-1.8.0.171-7.b10.el7.x86_64.rpm</filename><sum type="sha256">c790944ba36ef80e73989e7f4e2f9577b69c40b906c284d408b98a893803dc5b</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-7.b10.el7.noarch.rpm</filename><sum type="sha256">44004391fccab5cc3bf84c4b55f8b9d90db67d6997a249a9a14635224e3fc296</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7.i686.rpm</filename><sum type="sha256">fe344b011768922e793aa9b8a7bba8cae4d9d3317a7ade9b318c351be589e174</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-javadoc-1.8.0.171-7.b10.el7.noarch.rpm</filename><sum type="sha256">35eb6f88fa190e751d796de3426b3d64b1da83d89e361fd6602cdcfa6e740512</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-demo-1.8.0.171-7.b10.el7.x86_64.rpm</filename><sum type="sha256">3e72bcef0d3341eb61813833fff1149656d0c47299deeb79670a4cc27e9b3834</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-src-debug-1.8.0.171-7.b10.el7.x86_64.rpm</filename><sum type="sha256">88d8b2d136b7b38ddfba5ca4c259d89da0d378e9a20a38e6d758cb67805379e2</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-accessibility-1.8.0.171-7.b10.el7.i686.rpm</filename><sum type="sha256">2ecefe6ebeb5ba52962ac095cb004559f498a6fd0795aa6461b841009123bf64</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-src-1.8.0.171-7.b10.el7.i686.rpm</filename><sum type="sha256">468d1e5841308dbb45b1931dda51f3c1afd76d8fc239d198ae08d717ddc72bba</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.171-7.b10.el7.x86_64.rpm</filename><sum type="sha256">51b71c800a873eacb061ed964397c47498f82eaf2d9b18a2811188949b88701d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7.x86_64.rpm</filename><sum type="sha256">59c6e44a2fc3ec3d457b2166e1f5883241de596304a36416806e037883f0b50e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-devel-1.8.0.171-7.b10.el7.i686.rpm</filename><sum type="sha256">104899796257032ecaad8a3105dab00290d5302afd2053935f1464292af1901d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.171-7.b10.el7.x86_64.rpm</filename><sum type="sha256">4cbec44fd6369c731d3123f2f5cee08f84ccffbd658cf5f9fd0568655898a60e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-headless-1.8.0.171-7.b10.el7.i686.rpm</filename><sum type="sha256">d98723798e217b04f5ca31519ad92059dc73d037a7da623cf34d1e70e060dc21</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="7.b10.el7" src="java-1.8.0-openjdk-1.8.0.171-7.b10.el7.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.171-7.b10.el7.noarch.rpm</filename><sum type="sha256">04f083a1042ef9fe8ebf52a744109d856e12db788680d2398ea4f9cb955f4826</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790" id="CVE-2018-2790" title="Openjdk: Incorrect Merging Of Sections In The Jar Manifest (Security, 8189969)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794" id="CVE-2018-2794" title="Openjdk: Unrestricted Deserialization Of Data From Jceks Key Stores (Security, 8189997)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795" id="CVE-2018-2795" title="Openjdk: Insufficient Consistency Checks In Deserialization Of Multiple Classes (Security, 8189977)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796" id="CVE-2018-2796" title="Openjdk: Unbounded Memory Allocation During Deserialization In Priorityblockingqueue (Concurrency, 8189981)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797" id="CVE-2018-2797" title="Openjdk: Unbounded Memory Allocation During Deserialization In Tabulardatasupport (Jmx, 8189985)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798" id="CVE-2018-2798" title="Openjdk: Unbounded Memory Allocation During Deserialization In Container (Awt, 8189989)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799" id="CVE-2018-2799" title="Openjdk: Unbounded Memory Allocation During Deserialization In Namednodemapimpl (Jaxp, 8189993)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800" id="CVE-2018-2800" title="Openjdk: Rmi Http Transport Enabled By Default (Rmi, 8193833)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814" id="CVE-2018-2814" title="Openjdk: Incorrect Handling Of Reference Clones Can Lead To Sandbox Bypass (Hotspot, 8192025)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815" id="CVE-2018-2815" title="Openjdk: Unbounded Memory Allocation During Deserialization In Stubiorimpl (Serialization, 8192757)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1191" id="RHSA-2018:1191-1" title="Rhsa-2018:1191-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567121" id="1567121" title="Openjdk: Incorrect Handling Of Reference Clones Can Lead To Sandbox Bypass (Hotspot, 8192025)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567126" id="1567126" title="Openjdk: Unrestricted Deserialization Of Data From Jceks Key Stores (Security, 8189997)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567351" id="1567351" title="Openjdk: Insufficient Consistency Checks In Deserialization Of Multiple Classes (Security, 8189977)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567537" id="1567537" title="Openjdk: Unbounded Memory Allocation During Deserialization In Stubiorimpl (Serialization, 8192757)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567542" id="1567542" title="Openjdk: Unbounded Memory Allocation During Deserialization In Namednodemapimpl (Jaxp, 8189993)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567543" id="1567543" title="Openjdk: Unbounded Memory Allocation During Deserialization In Container (Awt, 8189989)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567545" id="1567545" title="Openjdk: Unbounded Memory Allocation During Deserialization In Tabulardatasupport (Jmx, 8189985)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567546" id="1567546" title="Openjdk: Unbounded Memory Allocation During Deserialization In Priorityblockingqueue (Concurrency, 8189981)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568163" id="1568163" title="Openjdk: Rmi Http Transport Enabled By Default (Rmi, 8193833)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568515" id="1568515" title="Openjdk: Incorrect Merging Of Sections In The Jar Manifest (Security, 8189969)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1200-1</id><title>Patch</title><description>Patch should be installed because it is a common way of upgrading applications. 
Security Fix(es): 
* patch: Malicious patch files cause ed to execute arbitrary commands (CVE-2018-1000156)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="patch" release="10.el7_5" src="patch-2.7.1-10.el7_5.src.rpm" version="2.7.1"><filename>patch-2.7.1-10.el7_5.x86_64.rpm</filename><sum type="sha256">1bf9c0f1a233c1f8e9256e7df8d5c5683b9093b2c779d48f86f9e5c98f95d7ef</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000156" id="CVE-2018-1000156" title="Patch: Malicious Patch Files Cause Ed To Execute Arbitrary Commands" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1200" id="RHSA-2018:1200-1" title="Rhsa-2018:1200-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564326" id="1564326" title="Patch: Malicious Patch Files Cause Ed To Execute Arbitrary Commands" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1223-1</id><title>Librelp</title><description>Security Fix(es): 
* librelp: Stack-based buffer overflow in relpTcpChkPeerName function in src/tcp.c (CVE-2018-1000140)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="librelp-devel" release="1.el7_5.1" src="librelp-1.2.12-1.el7_5.1.src.rpm" version="1.2.12"><filename>librelp-devel-1.2.12-1.el7_5.1.i686.rpm</filename><sum type="sha256">c736f758a0978b7604a8c8971fce5e4d041f11a7203487532b5d229bf59a79dc</sum></package><package arch="x86_64" name="librelp" release="1.el7_5.1" src="librelp-1.2.12-1.el7_5.1.src.rpm" version="1.2.12"><filename>librelp-1.2.12-1.el7_5.1.x86_64.rpm</filename><sum type="sha256">5f5bc431e27e21f7e06f6c16022b4335cef8a14dc737e35202ed211c0e09c06c</sum></package><package arch="x86_64" name="librelp-devel" release="1.el7_5.1" src="librelp-1.2.12-1.el7_5.1.src.rpm" version="1.2.12"><filename>librelp-devel-1.2.12-1.el7_5.1.x86_64.rpm</filename><sum type="sha256">a2a03251afcffeff0f70601ad152f5cfc11dbcdab22149299aecea8eb44c7bd7</sum></package><package arch="i686" name="librelp" release="1.el7_5.1" src="librelp-1.2.12-1.el7_5.1.src.rpm" version="1.2.12"><filename>librelp-1.2.12-1.el7_5.1.i686.rpm</filename><sum type="sha256">ed70fcd8412755bfb4f98e2e35976d8a1f3dd2fee607b96daf10696c77dad08b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000140" id="CVE-2018-1000140" title="Librelp: Stack-Based Buffer Overflow In Relptcpchkpeername Function In Src/Tcp.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1223" id="RHSA-2018:1223-1" title="Rhsa-2018:1223-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560084" id="1560084" title="Librelp: Stack-Based Buffer Overflow In Relptcpchkpeername Function In Src/Tcp.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1224-1</id><title>Packagekit</title><description>Security Fix(es): 
* PackageKit: authentication bypass allows to install signed packages without administrator privileges (CVE-2018-1106)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="PackageKit-glib-devel" release="2.sl7_5" src="PackageKit-1.1.5-2.sl7_5.src.rpm" version="1.1.5"><filename>PackageKit-glib-devel-1.1.5-2.sl7_5.x86_64.rpm</filename><sum type="sha256">fb674f5ce0dc9bbb66a8385e3cfebcffe961ab29c86bd4744710ae7fed7b35a9</sum></package><package arch="x86_64" name="PackageKit-yum" release="2.sl7_5" src="PackageKit-1.1.5-2.sl7_5.src.rpm" version="1.1.5"><filename>PackageKit-yum-1.1.5-2.sl7_5.x86_64.rpm</filename><sum type="sha256">cce574cb7142fe1e8e47eaae6b80aca1b6871d6ed7d9567c69f0e718eee085b8</sum></package><package arch="i686" name="PackageKit-gtk3-module" release="2.sl7_5" src="PackageKit-1.1.5-2.sl7_5.src.rpm" version="1.1.5"><filename>PackageKit-gtk3-module-1.1.5-2.sl7_5.i686.rpm</filename><sum type="sha256">2b0468e703a71f4982fab37af5b916a577d79b3eb8a1e762bc788e1d0f7f76d6</sum></package><package arch="x86_64" name="PackageKit-gtk3-module" release="2.sl7_5" src="PackageKit-1.1.5-2.sl7_5.src.rpm" version="1.1.5"><filename>PackageKit-gtk3-module-1.1.5-2.sl7_5.x86_64.rpm</filename><sum type="sha256">d5526c4663f3b7df96f7a29d8b185ade334098c77f4bb785d517051757ee02b3</sum></package><package arch="i686" name="PackageKit-glib" release="2.sl7_5" src="PackageKit-1.1.5-2.sl7_5.src.rpm" version="1.1.5"><filename>PackageKit-glib-1.1.5-2.sl7_5.i686.rpm</filename><sum type="sha256">3f6151b10678ff05c5426f003cee59290a944fb637a87cd49fd9cb590be4c530</sum></package><package arch="x86_64" name="PackageKit-glib" release="2.sl7_5" src="PackageKit-1.1.5-2.sl7_5.src.rpm" version="1.1.5"><filename>PackageKit-glib-1.1.5-2.sl7_5.x86_64.rpm</filename><sum type="sha256">3f26eff29eed00ef0ef387fe591dd9b0196656cd0e2c602f1755ee3bbc1c636e</sum></package><package arch="x86_64" name="PackageKit-cron" release="2.sl7_5" src="PackageKit-1.1.5-2.sl7_5.src.rpm" version="1.1.5"><filename>PackageKit-cron-1.1.5-2.sl7_5.x86_64.rpm</filename><sum type="sha256">960139a32812444091a1612164a7c00df8048b2f83065daa116814f205a8a8fd</sum></package><package arch="i686" name="PackageKit" release="2.sl7_5" src="PackageKit-1.1.5-2.sl7_5.src.rpm" version="1.1.5"><filename>PackageKit-1.1.5-2.sl7_5.i686.rpm</filename><sum type="sha256">31bfaa8f712df09b5b09c4ede228a7769366be1c28e481473eba52911b4dc74b</sum></package><package arch="x86_64" name="PackageKit-command-not-found" release="2.sl7_5" src="PackageKit-1.1.5-2.sl7_5.src.rpm" version="1.1.5"><filename>PackageKit-command-not-found-1.1.5-2.sl7_5.x86_64.rpm</filename><sum type="sha256">d6a5ad4b9334942413266cfe4c39e8d785b6585d7f88c625586a6e116be93a2e</sum></package><package arch="x86_64" name="PackageKit-gstreamer-plugin" release="2.sl7_5" src="PackageKit-1.1.5-2.sl7_5.src.rpm" version="1.1.5"><filename>PackageKit-gstreamer-plugin-1.1.5-2.sl7_5.x86_64.rpm</filename><sum type="sha256">adb9268c968165a428505355fb85d549be0839d0e66e8b9bb69802f9f50df2fe</sum></package><package arch="x86_64" name="PackageKit" release="2.sl7_5" src="PackageKit-1.1.5-2.sl7_5.src.rpm" version="1.1.5"><filename>PackageKit-1.1.5-2.sl7_5.x86_64.rpm</filename><sum type="sha256">bbeaee79ac05642289b90d38ea061cdcb4ca70ed80df6cceaac73a46bca29aa3</sum></package><package arch="x86_64" name="PackageKit-yum-plugin" release="2.sl7_5" src="PackageKit-1.1.5-2.sl7_5.src.rpm" version="1.1.5"><filename>PackageKit-yum-plugin-1.1.5-2.sl7_5.x86_64.rpm</filename><sum type="sha256">2069b74f338f7377101b8a23efdc5b6d7a7f2a2e3cc594ccf7a21e68e8dbb129</sum></package><package arch="i686" name="PackageKit-glib-devel" release="2.sl7_5" src="PackageKit-1.1.5-2.sl7_5.src.rpm" version="1.1.5"><filename>PackageKit-glib-devel-1.1.5-2.sl7_5.i686.rpm</filename><sum type="sha256">40c08ff781378cfcb872dd616a8bce7e5cc7946efcc045f48b93e72611c1bad8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1106" id="CVE-2018-1106" title="Packagekit: Authentication Bypass Allows To Install Signed Packages Without Administrator Privileges" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1224" id="RHSA-2018:1224-1" title="Rhsa-2018:1224-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1565992" id="1565992" title="Packagekit: Authentication Bypass Allows To Install Signed Packages Without Administrator Privileges" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1278-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: incorrect handling of Reference clones can lead to sandbox bypass (Hotspot, 8192025) (CVE-2018-2814) 
* OpenJDK: unrestricted deserialization of data from JCEKS key stores (Security, 8189997) (CVE-2018-2794) 
* OpenJDK: insufficient consistency checks in deserialization of multiple classes (Security, 8189977) (CVE-2018-2795) 
* OpenJDK: unbounded memory allocation during deserialization in PriorityBlockingQueue (Concurrency, 8189981) (CVE-2018-2796) 
* OpenJDK: unbounded memory allocation during deserialization in TabularDataSupport (JMX, 8189985) (CVE-2018-2797) 
* OpenJDK: unbounded memory allocation during deserialization in Container (AWT, 8189989) (CVE-2018-2798) 
* OpenJDK: unbounded memory allocation during deserialization in NamedNodeMapImpl (JAXP, 8189993) (CVE-2018-2799) 
* OpenJDK: RMI HTTP transport enabled by default (RMI, 8193833) (CVE-2018-2800) 
* OpenJDK: unbounded memory allocation during deserialization in StubIORImpl (Serialization, 8192757) (CVE-2018-2815) 
* OpenJDK: incorrect merging of sections in the JAR manifest (Security, 8189969) (CVE-2018-2790)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-05-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.14.5.el7" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-headless-1.7.0.181-2.6.14.5.el7.x86_64.rpm</filename><sum type="sha256">9cdce41b9d7eefc9c549638c277211e07dd24610a45b70a0631361c2ea0eb417</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.14.5.el7" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-accessibility-1.7.0.181-2.6.14.5.el7.x86_64.rpm</filename><sum type="sha256">0f31a913d037ecc136f32c496919dd3b5d638cc33ce65e66722eccbb365a30c9</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.14.5.el7" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.5.el7.x86_64.rpm</filename><sum type="sha256">af9e493197ff05c868118a94a2e9414b21ec272a5fe7582006a79cc758346e6d</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.14.5.el7" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-src-1.7.0.181-2.6.14.5.el7.x86_64.rpm</filename><sum type="sha256">f16c439c67cf1048ce06e2d70d79f2c281aae61e0ed3ccf6779fcc31082fbdaa</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.14.5.el7" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.5.el7.x86_64.rpm</filename><sum type="sha256">264f285712dcc3d6f5e8ab7d7f4f21d34964fff1cccc8535317385a345b077e9</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.14.5.el7" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7.x86_64.rpm</filename><sum type="sha256">8ebe99d58d0cea789f97b3fa790385d97db605c44c1f9dcb32607f5c2bc9faf3</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.14.5.el7" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.5.el7.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.5.el7.noarch.rpm</filename><sum type="sha256">d343897866a34c0d5d49237efb8b3ef212efebd77afff3a87146e9b7c6b50b13</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2790" id="CVE-2018-2790" title="Openjdk: Incorrect Merging Of Sections In The Jar Manifest (Security, 8189969)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2794" id="CVE-2018-2794" title="Openjdk: Unrestricted Deserialization Of Data From Jceks Key Stores (Security, 8189997)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2795" id="CVE-2018-2795" title="Openjdk: Insufficient Consistency Checks In Deserialization Of Multiple Classes (Security, 8189977)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2796" id="CVE-2018-2796" title="Openjdk: Unbounded Memory Allocation During Deserialization In Priorityblockingqueue (Concurrency, 8189981)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2797" id="CVE-2018-2797" title="Openjdk: Unbounded Memory Allocation During Deserialization In Tabulardatasupport (Jmx, 8189985)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2798" id="CVE-2018-2798" title="Openjdk: Unbounded Memory Allocation During Deserialization In Container (Awt, 8189989)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2799" id="CVE-2018-2799" title="Openjdk: Unbounded Memory Allocation During Deserialization In Namednodemapimpl (Jaxp, 8189993)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2800" id="CVE-2018-2800" title="Openjdk: Rmi Http Transport Enabled By Default (Rmi, 8193833)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2814" id="CVE-2018-2814" title="Openjdk: Incorrect Handling Of Reference Clones Can Lead To Sandbox Bypass (Hotspot, 8192025)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2815" id="CVE-2018-2815" title="Openjdk: Unbounded Memory Allocation During Deserialization In Stubiorimpl (Serialization, 8192757)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1278" id="RHSA-2018:1278-1" title="Rhsa-2018:1278-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567121" id="1567121" title="Openjdk: Incorrect Handling Of Reference Clones Can Lead To Sandbox Bypass (Hotspot, 8192025)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567126" id="1567126" title="Openjdk: Unrestricted Deserialization Of Data From Jceks Key Stores (Security, 8189997)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567351" id="1567351" title="Openjdk: Insufficient Consistency Checks In Deserialization Of Multiple Classes (Security, 8189977)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567537" id="1567537" title="Openjdk: Unbounded Memory Allocation During Deserialization In Stubiorimpl (Serialization, 8192757)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567542" id="1567542" title="Openjdk: Unbounded Memory Allocation During Deserialization In Namednodemapimpl (Jaxp, 8189993)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567543" id="1567543" title="Openjdk: Unbounded Memory Allocation During Deserialization In Container (Awt, 8189989)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567545" id="1567545" title="Openjdk: Unbounded Memory Allocation During Deserialization In Tabulardatasupport (Jmx, 8189985)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567546" id="1567546" title="Openjdk: Unbounded Memory Allocation During Deserialization In Priorityblockingqueue (Concurrency, 8189981)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568163" id="1568163" title="Openjdk: Rmi Http Transport Enabled By Default (Rmi, 8193833)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568515" id="1568515" title="Openjdk: Incorrect Merging Of Sections In The Jar Manifest (Security, 8189969)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1318-1</id><title>Kernel</title><description>Security Fix(es): 
* Kernel: KVM: error in exception handling leads to wrong debug stack value (CVE-2018-1087) 
* Kernel: error in exception handling leads to DoS (CVE-2018-8897) 
* Kernel: ipsec: xfrm: use-after-free leading to potential privilege escalation (CVE-2017-16939) 
* kernel: Out-of-bounds write via userland offsets in ebt_entry struct in netfilter/ebtables.c (CVE-2018-1068) 
* kernel: ptrace() incorrect error handling leads to corruption and DoS (CVE-2018-1000199) 
* kernel: guest kernel crash during core dump on POWER9 host (CVE-2018-1091)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-05-08 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kernel-abi-whitelists" release="862.2.3.el7" src="kernel-3.10.0-862.2.3.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-862.2.3.el7.noarch.rpm</filename><sum type="sha256">189f87cf2bd9b23d4e8eec76884cd5a3579e69a0812898440a3b2f43df5edce2</sum></package><package arch="x86_64" name="kernel-tools" release="862.2.3.el7" src="kernel-3.10.0-862.2.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-862.2.3.el7.x86_64.rpm</filename><sum type="sha256">9a45f4a3e11383af0047a794f78cc9496c42f3454d489859fe886cf7e4ac97b8</sum></package><package arch="x86_64" name="kernel" release="862.2.3.el7" src="kernel-3.10.0-862.2.3.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-862.2.3.el7.x86_64.rpm</filename><sum type="sha256">0426b49b0d597c2a0ae75e6b58b5ca83d3545bf95fd9796891ba69b65fd5ee58</sum></package><package arch="x86_64" name="kernel-debug" release="862.2.3.el7" src="kernel-3.10.0-862.2.3.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-862.2.3.el7.x86_64.rpm</filename><sum type="sha256">b1e589f751be619c57e73b00cfa63c8781dcb8a7f2b45bb94bbaf13a0b70554f</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="862.2.3.el7" src="kernel-3.10.0-862.2.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-862.2.3.el7.x86_64.rpm</filename><sum type="sha256">b7d26ecd072e95dd50fed2a4af282476120baa47b77e14b14099d3194f9524a8</sum></package><package arch="noarch" name="kernel-doc" release="862.2.3.el7" src="kernel-3.10.0-862.2.3.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-862.2.3.el7.noarch.rpm</filename><sum type="sha256">2cd8d59105d4d77e2457cfbf4e2e4a5eea2fceb1d67d85542560790f723957fa</sum></package><package arch="x86_64" name="perf" release="862.2.3.el7" src="kernel-3.10.0-862.2.3.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-862.2.3.el7.x86_64.rpm</filename><sum type="sha256">1d83dab292017c9202e67ca1e46a909f41100545e9ef9e70e9f60386eb25ae40</sum></package><package arch="x86_64" name="kernel-headers" release="862.2.3.el7" src="kernel-3.10.0-862.2.3.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-862.2.3.el7.x86_64.rpm</filename><sum type="sha256">75a47b31ea487e5a759e05bc543e29773053ea174b77ec3409f7e8fe9571861f</sum></package><package arch="x86_64" name="kernel-tools-libs" release="862.2.3.el7" src="kernel-3.10.0-862.2.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-862.2.3.el7.x86_64.rpm</filename><sum type="sha256">90c21e11f71e088cc24ad55ca5cc9b3071ca9f6824660389f1e38f759b8de35e</sum></package><package arch="x86_64" name="kernel-debug-devel" release="862.2.3.el7" src="kernel-3.10.0-862.2.3.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-862.2.3.el7.x86_64.rpm</filename><sum type="sha256">41ee1efa783bb6b42c6b24603442d80886feabb847d202d3c98739a3b57bd008</sum></package><package arch="x86_64" name="python-perf" release="862.2.3.el7" src="kernel-3.10.0-862.2.3.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-862.2.3.el7.x86_64.rpm</filename><sum type="sha256">04932ce8b294ec2d96d37671c89e067eaeb6082b4b119bb8388d2dea54b4a92e</sum></package><package arch="x86_64" name="kernel-devel" release="862.2.3.el7" src="kernel-3.10.0-862.2.3.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-862.2.3.el7.x86_64.rpm</filename><sum type="sha256">279316b9d2625dc7e6cb29a7d965e87f2e9503922f346fe04c52f160bc6cd681</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16939" id="CVE-2017-16939" title="Kernel: Ipsec: Xfrm: Use-After-Free Leading To Potential Privilege Escalation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000199" id="CVE-2018-1000199" title="Kernel: Ptrace() Incorrect Error Handling Leads To Corruption And Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1068" id="CVE-2018-1068" title="Kernel: Out-Of-Bounds Write Via Userland Offsets In Ebt_Entry Struct In Netfilter/Ebtables.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1087" id="CVE-2018-1087" title="Kernel: Kvm: Error In Exception Handling Leads To Wrong Debug Stack Value" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1091" id="CVE-2018-1091" title="Kernel: Guest Kernel Crash During Core Dump On Power9 Host" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8897" id="CVE-2018-8897" title="Kernel: Error In Exception Handling Leads To Dos" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1318" id="RHSA-2018:1318-1" title="Rhsa-2018:1318-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1517220" id="1517220" title="Kernel: Ipsec: Xfrm: Use-After-Free Leading To Potential Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1552048" id="1552048" title="Kernel: Out-Of-Bounds Write Via Userland Offsets In Ebt_Entry Struct In Netfilter/Ebtables.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1558149" id="1558149" title="Kernel: Guest Kernel Crash During Core Dump On Power9 Host" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566837" id="1566837" title="Kernel: Kvm: Error In Exception Handling Leads To Wrong Debug Stack Value" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567074" id="1567074" title="Kernel: Error In Exception Handling Leads To Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568477" id="1568477" title="Kernel: Ptrace() Incorrect Error Handling Leads To Corruption And Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1380-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* 389-ds-base: ns-slapd crash via large filter value in ldapsearch (CVE-2018-1089) 
Bug Fix(es): 
* Indexing tasks in Directory Server contain the nsTaskStatus attribute to monitor whether the task is completed and the database is ready to receive updates. Before this update, the server set the value that indexing had completed before the database was ready to receive updates. Applications which monitor nsTaskStatus could start sending updates as soon as indexing completed, but before the database was ready. As a consequence, the server rejected updates with an UNWILLING_TO_PERFORM error. The problem has been fixed. As a result, the nsTaskStatus attribute now shows that indexing is completed after the database is ready to receive updates. 
* Previously, Directory Server did not remember when the first operation, bind, or a connection was started. As a consequence, the server applied in certain situations anonymous resource limits to an authenticated client. With this update, Directory Server properly marks authenticated client connections. As a result, it applies the correct resource limits, and authenticated clients no longer get randomly restricted by anonymous resource limits. 
* When debug replication logging is enabled, Directory Server incorrectly logged an error that updating the replica update vector (RUV) failed when in fact the update succeeded. The problem has been fixed, and the server no longer logs an error if updating the RUV succeeds. 
* This update adds the -W option to the ds-replcheck utility. With this option, ds-replcheck asks for the password, similar to OpenLDAP utilities. As a result, the password is not stored in the shell's history file when the -W option is used. 
* If an administrator moves a group in Directory Server from one subtree to another, the memberOf plug-in deletes the memberOf attribute with the old value and adds a new memberOf attribute with the new group's distinguished name (DN) in affected user entries. Previously, if the old subtree was not within the scope of the memberOf plug-in, deleting the old memberOf attribute failed because the values did not exist. As a consequence, the plug-in did not add the new memberOf value, and the user entry contained an incorrect memberOf value. With this update, the plug-in now checks the return code when deleting the old value. If the return code is "no such value", the plug-in only adds the new memberOf value. As a result, the memberOf attribute information is correct. 
* In a Directory Server replication topology, updates are managed by using Change Sequence Numbers (CSN) based on time stamps. New CSNs must be higher than the highest CSN present in the relative update vector (RUV). In case the server generates a new CSN in the same second as the most recent CSN, the sequence number is increased to ensure that it is higher. However, if the most recent CSN and the new CSN were identical, the sequence number was not increased. In this situation, the new CSN was, except the replica ID, identical to the most recent one. As a consequence, a new update in the directory appeared in certain situations older than the most recent update. With this update, Directory Server increases the CSN if the sequence number is lower or equal to the most recent one. As a result, new updates are no longer considered older than the most recent data.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-05-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-snmp" release="21.el7_5" src="389-ds-base-1.3.7.5-21.el7_5.src.rpm" version="1.3.7.5"><filename>389-ds-base-snmp-1.3.7.5-21.el7_5.x86_64.rpm</filename><sum type="sha256">e951ce842cd3d6f67ef139d300d8483b6a8bf3b76635d30915fe5c7db3006cec</sum></package><package arch="x86_64" name="389-ds-base" release="21.el7_5" src="389-ds-base-1.3.7.5-21.el7_5.src.rpm" version="1.3.7.5"><filename>389-ds-base-1.3.7.5-21.el7_5.x86_64.rpm</filename><sum type="sha256">162bec82fc86f8d76b09d515bf15d4f1f112f9125d17f619ec76bb0ac5b2931d</sum></package><package arch="x86_64" name="389-ds-base-libs" release="21.el7_5" src="389-ds-base-1.3.7.5-21.el7_5.src.rpm" version="1.3.7.5"><filename>389-ds-base-libs-1.3.7.5-21.el7_5.x86_64.rpm</filename><sum type="sha256">21c8ac942366ded74d91d93ccad9e6673313c7c53a627790e6c4aa0f16b5b9cf</sum></package><package arch="x86_64" name="389-ds-base-devel" release="21.el7_5" src="389-ds-base-1.3.7.5-21.el7_5.src.rpm" version="1.3.7.5"><filename>389-ds-base-devel-1.3.7.5-21.el7_5.x86_64.rpm</filename><sum type="sha256">8a1feca4ac85046b37c63e42ab1ea984c2687c64c6c300d7519f3e6fac842252</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1089" id="CVE-2018-1089" title="389-Ds-Base: Ns-Slapd Crash Via Large Filter Value In Ldapsearch" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1380" id="RHSA-2018:1380-1" title="Rhsa-2018:1380-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1559802" id="1559802" title="389-Ds-Base: Ns-Slapd Crash Via Large Filter Value In Ldapsearch" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1396-1</id><title>Libvirt</title><description>Security Fix(es): 
* libvirt: Resource exhaustion via qemuMonitorIORead() method (CVE-2018-5748) 
* libvirt: Incomplete fix for CVE-2018-5748 triggered by QEMU guest agent (CVE-2018-1064) 
The CVE-2018-1064 issue was discovered by Daniel P. Berrang (Red Hat) and the CVE-2018-5748 issue was discovered by Daniel P. Berrange (Red Hat) and Peter Krempa (Red Hat). 
Bug Fix(es): 
* Previously, the check for a non-unique device boot order did not properly handle updates of existing devices when a new device was attached to a guest. Consequently, updating any device with a specified boot order failed. With this update, the duplicity check detects correctly handles updates and ignores the original device, which avoids reporting false conflicts. As a result, updating a device with a boot order succeeds. 
* In Scientific Linux 7.5, guests with SCSI passthrough enabled failed to boot because of changes in kernel CGroup detection. With this update, libvirt fetches dependencies and adds them to the device CGroup. As a result, and the affected guests now start as expected. 
* The VMX parser in libvirt did not parse more than four network interfaces. As a consequence, the esx driver did not expose more than four network interface cards (NICs) for guests running ESXi. With this update, the VMX parser parses all the available NICs in .vmx files. As a result, libvirt reports all the NICs of guests running ESXi. 
* Previously, user aliases for PTY devices that were longer than 32 characters were not supported. Consequently, if a domain included a PTY device with a user alias longer than 32 characters, the domain would not start. With this update, a static buffer was replaced with a dynamic buffer. As a result, the domain starts even if the length of the user alias for a PTY device is longer than 32 characters.</description><severity>low</severity><release>Scientific Linux</release><issued date="2018-05-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libvirt-daemon-driver-storage-logical" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-logical-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">8be1847ec910ddc6238b8abe2cbbe4801d9cff1828627c2129108ce62bce01c7</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-rbd" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-rbd-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">91269e39af37c30680f9673cc879e1f046f509ebdfcb63261b9701c3ddf65ea7</sum></package><package arch="x86_64" name="libvirt-daemon-kvm" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-kvm-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">7fac744a962d01966e59b50e82172cb8508cca10b1ff548c65218bfe78928903</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-core" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-core-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">8a424edd2b1ac51218992910b9bad6aab03cbf0af470030d0f0ab5fc7181af77</sum></package><package arch="x86_64" name="libvirt-daemon-driver-interface" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-interface-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">edac5cfb44a0c4ea937e6d980b1c231c3b145ede7a26d65e6eb3c701569caaf2</sum></package><package arch="x86_64" name="libvirt-daemon-lxc" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-lxc-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">174627d6e0a08c716d659e64f4fa0c0bba041ee4189b30e5149f050cfaebbca3</sum></package><package arch="x86_64" name="libvirt-daemon-driver-network" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-network-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">d6a36c86d853ce618a019248a505f9f6bff3baaef3446da5608af20aa8e8b89c</sum></package><package arch="i686" name="libvirt-nss" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-nss-3.9.0-14.el7_5.4.i686.rpm</filename><sum type="sha256">f597efc774c3aff7e954a3b9335f67508b350cd6f9115a7042efcfb1a7782e94</sum></package><package arch="x86_64" name="libvirt-libs" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-libs-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">f13638aa120f84002585624e0cab5f25a2e9dffb88a1f2a53a4407dcbe3df2f5</sum></package><package arch="x86_64" name="libvirt-daemon" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">39d315d99174ea1728d4ce342ff4c40572327462a25a6abff51c4d2f276a8a28</sum></package><package arch="x86_64" name="libvirt-docs" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-docs-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">063b4488fd06bce0eaccc5bb3f2709e506a2180a507863a6f24d614396068462</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nwfilter" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-nwfilter-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">daf97898d532686363cf92bea1c733e4ca0fa84efe0b9243689fa241a31ac078</sum></package><package arch="x86_64" name="libvirt-client" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-client-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">d9c9b8747760dfffa42e62999e168faf284dfc2fa445e26ff090ba51be8c91e9</sum></package><package arch="x86_64" name="libvirt-daemon-config-nwfilter" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-config-nwfilter-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">849e3fbf3a3061495371fe31b2c78ce1437cead122c9a7ead773b4316afe0930</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-disk" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-disk-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">e3da40d559333cfbfa96d4eb41b988b53600a7b0afa8b48b0a04a3e0a51ca573</sum></package><package arch="i686" name="libvirt-libs" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-libs-3.9.0-14.el7_5.4.i686.rpm</filename><sum type="sha256">7093ba44ae8bdb52d48724f090957267015b194e6ce7ea3467e36c82862c5abd</sum></package><package arch="x86_64" name="libvirt-nss" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-nss-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">3a4d02daccf51b6b0f0ffeb5d8fe067150a7ddb4664257da08908e2950a56a29</sum></package><package arch="x86_64" name="libvirt-daemon-config-network" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-config-network-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">1b325edd67c477c1d7039a49616f98abe5904006d7cd8a04262f4285c1a0cb59</sum></package><package arch="i686" name="libvirt-client" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-client-3.9.0-14.el7_5.4.i686.rpm</filename><sum type="sha256">6b3fbe2d8adf3f0397e776c13c90f69f11fd6956a8f7c9b3b4d150957da0b860</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nodedev" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-nodedev-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">518ba9e25c3c9685e22f3197a470e8a3ce547dbbb1d3c0a45f2ba3ecd7675785</sum></package><package arch="i686" name="libvirt-devel" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-devel-3.9.0-14.el7_5.4.i686.rpm</filename><sum type="sha256">25df98d4c8bcdd45eedbbf212601c488b77cf83f4b4763e06a5d4d9b9e7382fe</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-iscsi" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-iscsi-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">49b8da4919b3636727bf915d08c9630b7c700455884242aef456e3e775ce57e4</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-scsi" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-scsi-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">9347919a46f386b962cb174c6b098edbb605ad2152a21856d7a710b4ded4fabc</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-gluster" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-gluster-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">a64ea16b65634ebb76ab70e4e560629de06814d81a62e4c8041047188268325b</sum></package><package arch="x86_64" name="libvirt-daemon-driver-lxc" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-lxc-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">012e812e9c4c0840eb55146245a091bb7296564f41c9e2cfde3ae46a123d6e95</sum></package><package arch="x86_64" name="libvirt-daemon-driver-secret" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-secret-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">880dcbb7e5ec4f1151beae0000a7e9f2dd533590e8476c24259f217a2225cd79</sum></package><package arch="x86_64" name="libvirt-devel" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-devel-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">2a95d2f684b7e9d6b9a27b9bd9d228a4d4ff74a4afb2d842153c01375be430b3</sum></package><package arch="x86_64" name="libvirt" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">7188afc124a0a0d874e2836cd6d42231449074d7f03f804b8d2bac07507fa560</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-mpath" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-mpath-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">be87d66b98bb2ad5529523664c2873b2e82ec67430cf056cb18b304f94899dd8</sum></package><package arch="x86_64" name="libvirt-daemon-driver-qemu" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-qemu-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">b0a9b7afa13cbd748d05043e8239145cfb4c76abe24c89fc539993780ab7f0be</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">8862e69fef8cd56555358388bc317723ff6fdfd96b83c0877fecffb5b0ffdb38</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-lock-sanlock-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">e0c9cb3806594d6e7684b3658c3c0aaf8d05e28cc140c91141fe6d2b367963dc</sum></package><package arch="x86_64" name="libvirt-admin" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-admin-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">9a82fb8aa17bfb014a0b5bf161c7995d11bb8da441043bfdb74ca4247beebc26</sum></package><package arch="x86_64" name="libvirt-login-shell" release="14.el7_5.4" src="libvirt-3.9.0-14.el7_5.4.src.rpm" version="3.9.0"><filename>libvirt-login-shell-3.9.0-14.el7_5.4.x86_64.rpm</filename><sum type="sha256">54d6a5bc803dd18d92bbaac2377fc29c4b47732692f05713c2c23e5ea91e5ac8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1064" id="CVE-2018-1064" title="Libvirt: Incomplete Fix For Cve-2018-5748 Triggered By Qemu Guest Agent" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5748" id="CVE-2018-5748" title="Libvirt: Resource Exhaustion Via Qemumonitorioread() Method" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1396" id="RHSA-2018:1396-1" title="Rhsa-2018:1396-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1528396" id="1528396" title="Libvirt: Resource Exhaustion Via Qemumonitorioread() Method" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1550672" id="1550672" title="Libvirt: Incomplete Fix For Cve-2018-5748 Triggered By Qemu Guest Agent" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1415-1</id><title>Firefox</title><description>This update upgrades Firefox to version 52.8.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8 (CVE-2018-5150) 
* Mozilla: Backport critical security fixes in Skia (CVE-2018-5183) 
* Mozilla: Use-after-free with SVG animations and clip paths (CVE-2018-5154) 
* Mozilla: Use-after-free with SVG animations and text paths (CVE-2018-5155) 
* Mozilla: Same-origin bypass of PDF Viewer to view protected PDF files (CVE-2018-5157) 
* Mozilla: Malicious PDF can inject JavaScript into PDF Viewer (CVE-2018-5158) 
* Mozilla: Integer overflow and out-of-bounds write in Skia (CVE-2018-5159) 
* Mozilla: Lightweight themes can be installed without user interaction (CVE-2018-5168) 
* Mozilla: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension (CVE-2018-5178)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2018-05-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_5" src="firefox-52.8.0-1.el7_5.src.rpm" version="52.8.0"><filename>firefox-52.8.0-1.el7_5.x86_64.rpm</filename><sum type="sha256">69bd61ea3fd15e54faf78b346ae8ec868184f3955bd94b2ac450ed58ae188d31</sum></package><package arch="i686" name="firefox" release="1.el7_5" src="firefox-52.8.0-1.el7_5.src.rpm" version="52.8.0"><filename>firefox-52.8.0-1.el7_5.i686.rpm</filename><sum type="sha256">31ed8d356b84291ccc75a8e5ca691ba045d987fa7df8fca1259e20a84c10503d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5150" id="CVE-2018-5150" title="Mozilla: Memory Safety Bugs Fixed In Firefox 60 And Firefox Esr 52.8" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5154" id="CVE-2018-5154" title="Mozilla: Use-After-Free With Svg Animations And Clip Paths" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5155" id="CVE-2018-5155" title="Mozilla: Use-After-Free With Svg Animations And Text Paths" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5157" id="CVE-2018-5157" title="Mozilla: Same-Origin Bypass Of Pdf Viewer To View Protected Pdf Files" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5158" id="CVE-2018-5158" title="Mozilla: Malicious Pdf Can Inject Javascript Into Pdf Viewer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5159" id="CVE-2018-5159" title="Mozilla: Integer Overflow And Out-Of-Bounds Write In Skia" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5168" id="CVE-2018-5168" title="Mozilla: Lightweight Themes Can Be Installed Without User Interaction" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5178" id="CVE-2018-5178" title="Mozilla: Buffer Overflow During Utf-8 To Unicode String Conversion Through Legacy Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5183" id="CVE-2018-5183" title="Mozilla: Backport Critical Security Fixes In Skia" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1415" id="RHSA-2018:1415-1" title="Rhsa-2018:1415-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576250" id="1576250" title="Mozilla: Memory Safety Bugs Fixed In Firefox 60 And Firefox Esr 52.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576255" id="1576255" title="Mozilla: Use-After-Free With Svg Animations And Clip Paths" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576257" id="1576257" title="Mozilla: Use-After-Free With Svg Animations And Text Paths" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576258" id="1576258" title="Mozilla: Same-Origin Bypass Of Pdf Viewer To View Protected Pdf Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576259" id="1576259" title="Mozilla: Malicious Pdf Can Inject Javascript Into Pdf Viewer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576260" id="1576260" title="Mozilla: Integer Overflow And Out-Of-Bounds Write In Skia" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576269" id="1576269" title="Mozilla: Lightweight Themes Can Be Installed Without User Interaction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576278" id="1576278" title="Mozilla: Buffer Overflow During Utf-8 To Unicode String Conversion Through Legacy Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576283" id="1576283" title="Mozilla: Backport Critical Security Fixes In Skia" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1416-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* QEMU: cirrus: OOB access when updating VGA display (CVE-2018-7858)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-05-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="156.el7_5.1" src="qemu-kvm-1.5.3-156.el7_5.1.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-156.el7_5.1.x86_64.rpm</filename><sum type="sha256">da99389da4d4633be047462da30cbffa0478c55486503808c7e4fe2f7232445d</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="156.el7_5.1" src="qemu-kvm-1.5.3-156.el7_5.1.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-156.el7_5.1.x86_64.rpm</filename><sum type="sha256">32d8eb23751fbb7080d273c9051b829fb8dd6d61f289f73c930fce5c9ff930e0</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="156.el7_5.1" src="qemu-kvm-1.5.3-156.el7_5.1.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-156.el7_5.1.x86_64.rpm</filename><sum type="sha256">1594bcecedaa6bba5d62ae0436d84eed0683597e69bd027d64ac333dc0f1a82f</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="156.el7_5.1" src="qemu-kvm-1.5.3-156.el7_5.1.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-156.el7_5.1.x86_64.rpm</filename><sum type="sha256">fee7b10b7399f039b2421b284107514db5de0edf563fc228f24cc36e5f2e6b3d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7858" id="CVE-2018-7858" title="Qemu: Cirrus: Oob Access When Updating Vga Display" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1416" id="RHSA-2018:1416-1" title="Rhsa-2018:1416-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1553402" id="1553402" title="Qemu: Cirrus: Oob Access When Updating Vga Display" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1453-1</id><title>Dhcp</title><description>Security Fix(es): 
* A command injection flaw was found in the NetworkManager integration script included in the DHCP client packages in Scientific Linux. A malicious DHCP server, or an attacker on the local network able to spoof DHCP responses, could use this flaw to execute arbitrary commands with root privileges on systems using NetworkManager and configured to obtain network configuration using the DHCP protocol. (CVE-2018-1111)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2018-05-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="12" name="dhcp-libs" release="68.sl7_5.1" src="dhcp-4.2.5-68.sl7_5.1.src.rpm" version="4.2.5"><filename>dhcp-libs-4.2.5-68.sl7_5.1.x86_64.rpm</filename><sum type="sha256">8ff4b69e890a8f0109e9fb01b7b3e74cf965f86b9ed1254f8c77c67571f006f4</sum></package><package arch="i686" epoch="12" name="dhcp-libs" release="68.sl7_5.1" src="dhcp-4.2.5-68.sl7_5.1.src.rpm" version="4.2.5"><filename>dhcp-libs-4.2.5-68.sl7_5.1.i686.rpm</filename><sum type="sha256">5a528d86e3ceb7e451fbfc46a09d3bd23aa093a77fbcd524e5ea89c4f5feb060</sum></package><package arch="x86_64" epoch="12" name="dhcp-devel" release="68.sl7_5.1" src="dhcp-4.2.5-68.sl7_5.1.src.rpm" version="4.2.5"><filename>dhcp-devel-4.2.5-68.sl7_5.1.x86_64.rpm</filename><sum type="sha256">f15f0097941f3c8561af7ed28d5cd3e4ca8b04899d290ee83099eee0df76b8e0</sum></package><package arch="x86_64" epoch="12" name="dhclient" release="68.sl7_5.1" src="dhcp-4.2.5-68.sl7_5.1.src.rpm" version="4.2.5"><filename>dhclient-4.2.5-68.sl7_5.1.x86_64.rpm</filename><sum type="sha256">20516e8aab3f77ae33f30010b480c6e0026170860b9e9f7ccbfda56f2b23eddf</sum></package><package arch="x86_64" epoch="12" name="dhcp-common" release="68.sl7_5.1" src="dhcp-4.2.5-68.sl7_5.1.src.rpm" version="4.2.5"><filename>dhcp-common-4.2.5-68.sl7_5.1.x86_64.rpm</filename><sum type="sha256">57c15e95e2501176dba70240bc85155d65a797a06a9fcdca1d7963b14a3dab50</sum></package><package arch="x86_64" epoch="12" name="dhcp" release="68.sl7_5.1" src="dhcp-4.2.5-68.sl7_5.1.src.rpm" version="4.2.5"><filename>dhcp-4.2.5-68.sl7_5.1.x86_64.rpm</filename><sum type="sha256">5508364eba3eaab2b4abcec98c12b6213d810bdd62617a9d44d4a61794f5fea1</sum></package><package arch="i686" epoch="12" name="dhcp-devel" release="68.sl7_5.1" src="dhcp-4.2.5-68.sl7_5.1.src.rpm" version="4.2.5"><filename>dhcp-devel-4.2.5-68.sl7_5.1.i686.rpm</filename><sum type="sha256">23a9f657fd9e4f00d05fa32fde9189aec6858a60795398f813eaccbacc500026</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1111" id="CVE-2018-1111" title="Dhcp: Command Injection Vulnerability In The Dhcp Client Networkmanager Integration Script" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1453" id="RHSA-2018:1453-1" title="Rhsa-2018:1453-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567974" id="1567974" title="Dhcp: Command Injection Vulnerability In The Dhcp Client Networkmanager Integration Script" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1629-1</id><title>Kernel</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load &amp; Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) 
Note: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system is required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact. 
In this update mitigations for x86-64 architecture are provided.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-05-22 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-debug" release="862.3.2.el7" src="kernel-3.10.0-862.3.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-862.3.2.el7.x86_64.rpm</filename><sum type="sha256">25371ac66689e6413aee295d511b2eda789ff6d4e6797d2d2ba1eada9e6645d6</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="862.3.2.el7" src="kernel-3.10.0-862.3.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-862.3.2.el7.noarch.rpm</filename><sum type="sha256">7f7c696167a149493c81b7d189d678be3a613ea37af88a53937d99b707747aa6</sum></package><package arch="x86_64" name="kernel-debug-devel" release="862.3.2.el7" src="kernel-3.10.0-862.3.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-862.3.2.el7.x86_64.rpm</filename><sum type="sha256">a8fb532b0177ae04269962531a37f403b59ba525325b54eb897ac81baffc0824</sum></package><package arch="x86_64" name="perf" release="862.3.2.el7" src="kernel-3.10.0-862.3.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-862.3.2.el7.x86_64.rpm</filename><sum type="sha256">99c1f640691273de40c6088fad258162167263084f0863db4eb545d7abe5aac0</sum></package><package arch="x86_64" name="kernel-tools-libs" release="862.3.2.el7" src="kernel-3.10.0-862.3.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-862.3.2.el7.x86_64.rpm</filename><sum type="sha256">372812c202de872faff70a19e9310b67a2b34c479c30495d83e33d4544364e22</sum></package><package arch="noarch" name="kernel-doc" release="862.3.2.el7" src="kernel-3.10.0-862.3.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-862.3.2.el7.noarch.rpm</filename><sum type="sha256">22c1153a7c085e8df4e172adbdaad7968b023a1db06934d7b0827d594a380b94</sum></package><package arch="x86_64" name="python-perf" release="862.3.2.el7" src="kernel-3.10.0-862.3.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-862.3.2.el7.x86_64.rpm</filename><sum type="sha256">5186bff828f7d682029129a711dec2cce3ea2e5a04dcab306ad40ff7d66f46b1</sum></package><package arch="x86_64" name="kernel-headers" release="862.3.2.el7" src="kernel-3.10.0-862.3.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-862.3.2.el7.x86_64.rpm</filename><sum type="sha256">a735351a9dfdae49a97856ec6baf4151b841a1856c087d60f7617b3c2b9eef8f</sum></package><package arch="x86_64" name="kernel-devel" release="862.3.2.el7" src="kernel-3.10.0-862.3.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-862.3.2.el7.x86_64.rpm</filename><sum type="sha256">c31bb2bd90c8972bad25815559fb9a76e11da1a0b7475ea11df692262f4f9b7d</sum></package><package arch="x86_64" name="kernel" release="862.3.2.el7" src="kernel-3.10.0-862.3.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-862.3.2.el7.x86_64.rpm</filename><sum type="sha256">a99da56ca70bae10041a3560a9895c30832a818c642b8142b759389b3ef8c4ae</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="862.3.2.el7" src="kernel-3.10.0-862.3.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-862.3.2.el7.x86_64.rpm</filename><sum type="sha256">9bb13eb0883686bd2c3d0c87d98e09afb9539c2c303b8350981c149f02c10ba7</sum></package><package arch="x86_64" name="kernel-tools" release="862.3.2.el7" src="kernel-3.10.0-862.3.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-862.3.2.el7.x86_64.rpm</filename><sum type="sha256">335c4cd24cceed916947d6807e309dd08d79c7e5ef4801ef3a2fd435158c70e0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" id="CVE-2018-3639" title="Hw: Cpu: Speculative Store Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1629" id="RHSA-2018:1629-1" title="Rhsa-2018:1629-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566890" id="1566890" title="Hw: Cpu: Speculative Store Bypass" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1632-1</id><title>Libvirt</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load &amp; Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) 
Note: This is the libvirt side of the CVE-2018-3639 mitigation.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-05-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libvirt-daemon-driver-nwfilter" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-nwfilter-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">880591e772f5051811df83ceff0123daec50c9703e252898c6310d5162e5ccb8</sum></package><package arch="x86_64" name="libvirt-daemon" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">b3c994a5c0091b64b08e4a69b228dd999b3a7e32f009ea4b10bedebd394b3768</sum></package><package arch="i686" name="libvirt-devel" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-devel-3.9.0-14.el7_5.5.i686.rpm</filename><sum type="sha256">6e60454d128fc119b75d00657927e1a6fa6bd8cbad3d8324e5c1045d5b055660</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-scsi" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-scsi-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">68d3a74485476cf43da87c1d9dae6141110b911e6dab1f11950513bd6e4a60a9</sum></package><package arch="i686" name="libvirt-libs" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-libs-3.9.0-14.el7_5.5.i686.rpm</filename><sum type="sha256">55775f86341d3b288d44a7f89bb7a1b057000c873fa44abeefff38592aeb4b7a</sum></package><package arch="x86_64" name="libvirt-daemon-kvm" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-kvm-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">8a8a7deef491532bdd56cc5e170a764b3db8896fa45bc3baf3e4933748db9718</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-logical" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-logical-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">29f7d434154999d0c35388c60e09ac7c5161a2c7a29d233ff5036a5b8b77375e</sum></package><package arch="x86_64" name="libvirt-daemon-config-network" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-config-network-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">8ac5e152f50fe2a1d37417845b8483134c36bf6b2862927fb42792454c38a2e2</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">9fae6e4d80f56fa47870807eebc38635f3bcc0eb4e490531c5376e569146fac8</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-core" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-core-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">607db5dbe0fb795643a576d37549fa126170d548cbcb44fc941ef0e0259bdf1e</sum></package><package arch="x86_64" name="libvirt-devel" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-devel-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">a99c75c97916a0d1f68d1d37450661c023706cfb457130827900a7010dacf375</sum></package><package arch="x86_64" name="libvirt-login-shell" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-login-shell-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">881daea0c72926512883cb0c82e4ab437c47f29cda7253a342f27a86641d5033</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nodedev" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-nodedev-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">0f52f8093aa513085f85cf21dd189c81f6241d716a1dbdf8cc2d240b39346732</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-lock-sanlock-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">da1de8b7ed0fcdf5b9f63fdbf1710e67b04c55872acf4567cb86f50db9c61672</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-rbd" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-rbd-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">577e6bbd1a6dc6b26c652eae73152092d357de638626f7f622d0edda566507cf</sum></package><package arch="x86_64" name="libvirt" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">67b8f269e2cad83fc9cdfa34eb5a7f51c744264b7fe6eafc841a87543e10a046</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-disk" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-disk-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">7b2461fbe41097beb5f47dea26c51ba405995fadbee03b621c705a1f9563bbab</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-mpath" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-mpath-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">7fb4cc383a6202b81c80b0d68bc2976ea99ff3de2e25b766485d22660e62f809</sum></package><package arch="x86_64" name="libvirt-daemon-lxc" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-lxc-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">d02d11f93164e661621593cac5ec693c338c3b13e445fbec5f5232c60e240f8e</sum></package><package arch="x86_64" name="libvirt-client" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-client-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">f026e052d382bdbab344866afda714244cee0e2725232158f8fe7d035f8ae45b</sum></package><package arch="x86_64" name="libvirt-nss" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-nss-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">ae92c8c94603cc9a75e449cd36c3f8ba4d1d42a0da8a012c2bd576ecb427282c</sum></package><package arch="i686" name="libvirt-nss" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-nss-3.9.0-14.el7_5.5.i686.rpm</filename><sum type="sha256">9fb72c0f06a78155c6f011ace1a7412c1d746f2f3f3e0736ab1928b501755392</sum></package><package arch="x86_64" name="libvirt-libs" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-libs-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">cec0014f62995cb54b88946c3be8fb9bc1e2708f38854faf396f917ac99d6e97</sum></package><package arch="x86_64" name="libvirt-daemon-driver-qemu" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-qemu-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">c28f9dc7c8267e5a19cc5a355606584fa22795fe5f0fb6d46decc2399b63956a</sum></package><package arch="x86_64" name="libvirt-admin" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-admin-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">ed3159228590f365ba7847e3137cd03cabd3c7d3a78b9fcbb15dcb0d502b8f4a</sum></package><package arch="x86_64" name="libvirt-docs" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-docs-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">7cb7ccfd02b47e7f56a06491da96994f026ab7cb218ff104c03a95229ba4c911</sum></package><package arch="i686" name="libvirt-client" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-client-3.9.0-14.el7_5.5.i686.rpm</filename><sum type="sha256">d43dd6ba7d04033df8aeefd0217dab4c78e670dfb9014518681e458c98a6cfb2</sum></package><package arch="x86_64" name="libvirt-daemon-driver-secret" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-secret-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">19113e3891ff688500f6637d66deea5ba1eab4ec671463add8e56b0bd82f3e1f</sum></package><package arch="x86_64" name="libvirt-daemon-driver-interface" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-interface-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">e63da7aeb9c56a464c71476599eda1a6a3611cadee58be3f6dbbd03f74eec079</sum></package><package arch="x86_64" name="libvirt-daemon-driver-lxc" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-lxc-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">5c0a7741e6efd82878abf597a6273c41f5c82b34a1f7958cb00f734a41394865</sum></package><package arch="x86_64" name="libvirt-daemon-config-nwfilter" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-config-nwfilter-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">986db0c0af33ec45a763be87b7c643cfa8b9f301af96d51ec162e512410e05c5</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-iscsi" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-iscsi-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">a212a5983c6ea3582d939898987f6a19225b3c97e0f21e981a8f1c3d2c76ca43</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-gluster" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-gluster-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">aace95d9840377e62368ab61b5a20af3017886530ea118b5178f407e2faafb89</sum></package><package arch="x86_64" name="libvirt-daemon-driver-network" release="14.el7_5.5" src="libvirt-3.9.0-14.el7_5.5.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-network-3.9.0-14.el7_5.5.x86_64.rpm</filename><sum type="sha256">22f7c6de729e685452ecc315c358e8bbc224602f5777e33a8cf9941d9181ed47</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" id="CVE-2018-3639" title="Hw: Cpu: Speculative Store Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1632" id="RHSA-2018:1632-1" title="Rhsa-2018:1632-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566890" id="1566890" title="Hw: Cpu: Speculative Store Bypass" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1633-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load &amp; Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) 
Note: This is the qemu-kvm side of the CVE-2018-3639 mitigation.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-05-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="156.el7_5.2" src="qemu-kvm-1.5.3-156.el7_5.2.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-156.el7_5.2.x86_64.rpm</filename><sum type="sha256">c6f9c71b979848b0974b11a03d3b74e098f25066262e52eb69bf939ecc097460</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="156.el7_5.2" src="qemu-kvm-1.5.3-156.el7_5.2.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-156.el7_5.2.x86_64.rpm</filename><sum type="sha256">032daf4c92452b5b5c42203cef99ce9e22e63a74a53ef00cdf08d2841aa95a5f</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="156.el7_5.2" src="qemu-kvm-1.5.3-156.el7_5.2.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-156.el7_5.2.x86_64.rpm</filename><sum type="sha256">82fe86bf2269d1964ff2b9769b404cdec82d3e292cb4fda0269fd1df87440458</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="156.el7_5.2" src="qemu-kvm-1.5.3-156.el7_5.2.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-156.el7_5.2.x86_64.rpm</filename><sum type="sha256">434d430ab7e852d0926b5472ba67d60af4e9f896fed5caa484a796d8a6f533b4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" id="CVE-2018-3639" title="Hw: Cpu: Speculative Store Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1633" id="RHSA-2018:1633-1" title="Rhsa-2018:1633-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566890" id="1566890" title="Hw: Cpu: Speculative Store Bypass" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1648-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load &amp; Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) 
Note: This is the OpenJDK side of the CVE-2018-3639 mitigation.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-05-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.14.8.el7_5" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.8.el7_5.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.8.el7_5.x86_64.rpm</filename><sum type="sha256">98c33b111862bff43ed2390031c1dc00c8acd97bbf2ba9f9d6ac8d00ffa2683e</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.14.8.el7_5" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.8.el7_5.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.8.el7_5.noarch.rpm</filename><sum type="sha256">f866f9a7785cf046db7ab8322bab40fd2b622a578f161c7cd86b224334825c0a</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.14.8.el7_5" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.8.el7_5.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-accessibility-1.7.0.181-2.6.14.8.el7_5.x86_64.rpm</filename><sum type="sha256">dc783901ef3a8c037207f408a0225ca8ab8095a9b23133e06a6879b2f85121dd</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.14.8.el7_5" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.8.el7_5.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.8.el7_5.x86_64.rpm</filename><sum type="sha256">5fca539272c7d451566cc5e3173cc545fd8f2686e9d1fd4694ec585d795e8f6a</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.14.8.el7_5" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.8.el7_5.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-headless-1.7.0.181-2.6.14.8.el7_5.x86_64.rpm</filename><sum type="sha256">5a67c447648317e475585db6006b0066294fa7e563836d98fe18a989348b7b5a</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.14.8.el7_5" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.8.el7_5.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-1.7.0.181-2.6.14.8.el7_5.x86_64.rpm</filename><sum type="sha256">43490f9905a993748e8c9afeed2f314893ccccf433db6ea77c442393a7ff507d</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.14.8.el7_5" src="java-1.7.0-openjdk-1.7.0.181-2.6.14.8.el7_5.src.rpm" version="1.7.0.181"><filename>java-1.7.0-openjdk-src-1.7.0.181-2.6.14.8.el7_5.x86_64.rpm</filename><sum type="sha256">67efdfe20d8a7baa75701c1d71bf6d446af60bf425e96577a359e8b295e110ef</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" id="CVE-2018-3639" title="Hw: Cpu: Speculative Store Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1648" id="RHSA-2018:1648-1" title="Rhsa-2018:1648-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566890" id="1566890" title="Hw: Cpu: Speculative Store Bypass" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1649-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load &amp; Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) 
Note: This is the OpenJDK side of the CVE-2018-3639 mitigation.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-05-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-devel-1.8.0.171-8.b10.el7_5.x86_64.rpm</filename><sum type="sha256">7b9559d5d37bc1bf9f2950168a51164f974cd0547dff18a2523d4a24a178d745</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-headless-1.8.0.171-8.b10.el7_5.x86_64.rpm</filename><sum type="sha256">1e8609e4fa7da5905d0523cf688e1f29092f8700374d8ae0e7b36b11f36eed50</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-src-1.8.0.171-8.b10.el7_5.i686.rpm</filename><sum type="sha256">ba4084a6bedfc7d5332adf44310359aa21e26ff676652067c040f9555347241b</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.171-8.b10.el7_5.i686.rpm</filename><sum type="sha256">a548a47a5c1b8458fe4c41684602016336fa9739389964b7e0387b1e24453fe7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.x86_64.rpm</filename><sum type="sha256">fc4ccf47c35a4e902b8d5b28a552cd7921efdefbbf9b08acf8519bf6b4dd4296</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-headless-1.8.0.171-8.b10.el7_5.i686.rpm</filename><sum type="sha256">06fb36213b2d5c6fe218dea8e9b7d539693be94a50e93cf1931f9f362bc08065</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-accessibility-1.8.0.171-8.b10.el7_5.i686.rpm</filename><sum type="sha256">35f698593274f78d0b9997de93bafb5274a07a50064ae15f3d75a0503d027a8b</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-devel-1.8.0.171-8.b10.el7_5.i686.rpm</filename><sum type="sha256">a171f47e69a88545f9010ede8d86aca67f709699a7f4dab84b128611df899df8</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm</filename><sum type="sha256">0d2806735af6b0bf053424e601a8e4cb382e5cec9a696bfee9a167e6cb207484</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-src-1.8.0.171-8.b10.el7_5.x86_64.rpm</filename><sum type="sha256">374af7d20e7f59b871110ba79cc56f5fea1cc190fa72b745455a5353be4db051</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm</filename><sum type="sha256">cee730ad5eb50183b8ccf014ddb453f9d45f4c8ecd442f9677573381beb0b55d</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-demo-1.8.0.171-8.b10.el7_5.i686.rpm</filename><sum type="sha256">0277801694ca565278981399e3239be7328582a2fe2d1255f8194f582c553145</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-javadoc-1.8.0.171-8.b10.el7_5.noarch.rpm</filename><sum type="sha256">b3e35b015c3460804146f0d0ebb32d365c213d16b9acf4a18545bb9d21abf9a2</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-8.b10.el7_5.noarch.rpm</filename><sum type="sha256">f609d73d4f68c3ea108bdbde2a8f69ccfd8c3b675d8a9417938cd5bacee0c8a3</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.171-8.b10.el7_5.noarch.rpm</filename><sum type="sha256">3730ad8a11a52f0f0a43ead4040dc3af03fe1868750ac3ef0427c895056c6e94</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.171-8.b10.el7_5.i686.rpm</filename><sum type="sha256">490f374d0a1bdad12556e93c5d9b5daf150c37b00c7972deb38ffa738e8f4fb2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-demo-1.8.0.171-8.b10.el7_5.x86_64.rpm</filename><sum type="sha256">0c6c801d2d803bb86dda350e7bcf0d30a0436a5c0360fafdc24b093539dcb32f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm</filename><sum type="sha256">e0463ce538032cf511af06f955651a583d20ecb5a20ff5c6cb2e408c00c893af</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-src-debug-1.8.0.171-8.b10.el7_5.i686.rpm</filename><sum type="sha256">2a7ba1e9fa22a75025eaef8bb899e9526efaed9c2c3ee2981174f148453c5966</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.171-8.b10.el7_5.i686.rpm</filename><sum type="sha256">dfaa09b983836aa2b9f2f7f0e539aee8a93aa142a701ece1936da0fdcdc2b93e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.i686.rpm</filename><sum type="sha256">63c8e2e0a22fe5b44381149c0ab866e98b784ae946c7f161b8b68312e1c54bc3</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.171-8.b10.el7_5.noarch.rpm</filename><sum type="sha256">b62204619eac07b68efc923edb56433e7b8731c60950e4c5ee0025e463c7166c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-src-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm</filename><sum type="sha256">95d7eb9b1fd42ff070a2955ac7e5c9816974b6f657af2f2593a54097e1247ace</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm</filename><sum type="sha256">3711355fe43309c73e245219538f9c1ab1056ea2ececb4c9597fb03d04ba60df</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-debug-1.8.0.171-8.b10.el7_5.i686.rpm</filename><sum type="sha256">8a468360c6c5f4f54f79e0e12ebb20ed053a4d38511ba7ff3c99a4b60358846c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-accessibility-1.8.0.171-8.b10.el7_5.x86_64.rpm</filename><sum type="sha256">08dba4d127268595ed465c99f280de1620ec5baa8155b97cbfa45e77afffaae3</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.171-8.b10.el7_5.x86_64.rpm</filename><sum type="sha256">48e4791a18b0543749c99e1b6b66fdc937481be1455a68961e11ec4ab6aaea4e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="8.b10.el7_5" src="java-1.8.0-openjdk-1.8.0.171-8.b10.el7_5.src.rpm" version="1.8.0.171"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.171-8.b10.el7_5.i686.rpm</filename><sum type="sha256">5005b12a0b1bc8ccfe430310a0a949616c603df81ce10d69d68a4ca174046ee5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" id="CVE-2018-3639" title="Hw: Cpu: Speculative Store Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1649" id="RHSA-2018:1649-1" title="Rhsa-2018:1649-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566890" id="1566890" title="Hw: Cpu: Speculative Store Bypass" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1700-1</id><title>Procps-Ng</title><description>Security Fix(es): 
* procps-ng, procps: Integer overflows leading to heap overflow in file2strvec (CVE-2018-1124) 
* procps-ng, procps: incorrect integer size in proc/alloc.* leading to truncation / integer overflow issues (CVE-2018-1126)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-05-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="procps-ng" release="17.el7_5.2" src="procps-ng-3.3.10-17.el7_5.2.src.rpm" version="3.3.10"><filename>procps-ng-3.3.10-17.el7_5.2.x86_64.rpm</filename><sum type="sha256">517fbebfb1d08f9608924d9707c4582e65603818078eb1bd4a9438b805d786ce</sum></package><package arch="x86_64" name="procps-ng-devel" release="17.el7_5.2" src="procps-ng-3.3.10-17.el7_5.2.src.rpm" version="3.3.10"><filename>procps-ng-devel-3.3.10-17.el7_5.2.x86_64.rpm</filename><sum type="sha256">c724a7d66b812a45a9e079d745cb1e825325ef1dd1697d70ec605083aed6c598</sum></package><package arch="i686" name="procps-ng-devel" release="17.el7_5.2" src="procps-ng-3.3.10-17.el7_5.2.src.rpm" version="3.3.10"><filename>procps-ng-devel-3.3.10-17.el7_5.2.i686.rpm</filename><sum type="sha256">1e2e59398021d89d355e5e338c8be81e781f7a0bc6e97cf874a225479b16a9fa</sum></package><package arch="x86_64" name="procps-ng-i18n" release="17.el7_5.2" src="procps-ng-3.3.10-17.el7_5.2.src.rpm" version="3.3.10"><filename>procps-ng-i18n-3.3.10-17.el7_5.2.x86_64.rpm</filename><sum type="sha256">60104b20d7326ef3ad17ef99597cc0239ed960e29b9702312cd45ecd2be3ccc8</sum></package><package arch="i686" name="procps-ng" release="17.el7_5.2" src="procps-ng-3.3.10-17.el7_5.2.src.rpm" version="3.3.10"><filename>procps-ng-3.3.10-17.el7_5.2.i686.rpm</filename><sum type="sha256">049bcfc751c6d69b3aae3e6ec6335a6c4e80c8a18141f4639f78a5e64e561303</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1124" id="CVE-2018-1124" title="Procps-Ng, Procps: Integer Overflows Leading To Heap Overflow In File2Strvec" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1126" id="CVE-2018-1126" title="Procps-Ng, Procps: Incorrect Integer Size In Proc/Alloc.* Leading To Truncation / Integer Overflow Issues" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1700" id="RHSA-2018:1700-1" title="Rhsa-2018:1700-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1575465" id="1575465" title="Procps-Ng, Procps: Integer Overflows Leading To Heap Overflow In File2Strvec" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1575853" id="1575853" title="Procps-Ng, Procps: Incorrect Integer Size In Proc/Alloc.* Leading To Truncation / Integer Overflow Issues" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1725-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.8.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8 (CVE-2018-5150) 
* Mozilla: Backport critical security fixes in Skia (CVE-2018-5183) 
* Mozilla: Use-after-free with SVG animations and clip paths (CVE-2018-5154) 
* Mozilla: Use-after-free with SVG animations and text paths (CVE-2018-5155) 
* Mozilla: Integer overflow and out-of-bounds write in Skia (CVE-2018-5159) 
* Mozilla: Full plaintext recovery in S/MIME via chosen-ciphertext attack (CVE-2018-5184) 
* Mozilla: Hang via malformed headers (CVE-2018-5161) 
* Mozilla: Encrypted mail leaks plaintext through src attribute (CVE-2018-5162) 
* Mozilla: Lightweight themes can be installed without user interaction (CVE-2018-5168) 
* Mozilla: Filename spoofing for external attachments (CVE-2018-5170) 
* Mozilla: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension (CVE-2018-5178) 
* Mozilla: Leaking plaintext through HTML forms (CVE-2018-5185)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-05-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_5" src="thunderbird-52.8.0-1.el7_5.src.rpm" version="52.8.0"><filename>thunderbird-52.8.0-1.el7_5.x86_64.rpm</filename><sum type="sha256">56b27c03046e0f2cb8a9a95b5d32c3600078e929648129a5ca8f67f4aa3cb1eb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5150" id="CVE-2018-5150" title="Mozilla: Memory Safety Bugs Fixed In Firefox 60 And Firefox Esr 52.8" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5154" id="CVE-2018-5154" title="Mozilla: Use-After-Free With Svg Animations And Clip Paths" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5155" id="CVE-2018-5155" title="Mozilla: Use-After-Free With Svg Animations And Text Paths" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5159" id="CVE-2018-5159" title="Mozilla: Integer Overflow And Out-Of-Bounds Write In Skia" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5161" id="CVE-2018-5161" title="Mozilla: Hang Via Malformed Headers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5162" id="CVE-2018-5162" title="Mozilla: Encrypted Mail Leaks Plaintext Through Src Attribute" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5168" id="CVE-2018-5168" title="Mozilla: Lightweight Themes Can Be Installed Without User Interaction" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5170" id="CVE-2018-5170" title="Mozilla: Filename Spoofing For External Attachments" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5178" id="CVE-2018-5178" title="Mozilla: Buffer Overflow During Utf-8 To Unicode String Conversion Through Legacy Extension" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5183" id="CVE-2018-5183" title="Mozilla: Backport Critical Security Fixes In Skia" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5184" id="CVE-2018-5184" title="Mozilla: Full Plaintext Recovery In S/Mime Via Chosen-Ciphertext Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5185" id="CVE-2018-5185" title="Mozilla: Leaking Plaintext Through Html Forms" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1725" id="RHSA-2018:1725-1" title="Rhsa-2018:1725-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576250" id="1576250" title="Mozilla: Memory Safety Bugs Fixed In Firefox 60 And Firefox Esr 52.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576255" id="1576255" title="Mozilla: Use-After-Free With Svg Animations And Clip Paths" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576257" id="1576257" title="Mozilla: Use-After-Free With Svg Animations And Text Paths" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576260" id="1576260" title="Mozilla: Integer Overflow And Out-Of-Bounds Write In Skia" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576269" id="1576269" title="Mozilla: Lightweight Themes Can Be Installed Without User Interaction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576278" id="1576278" title="Mozilla: Buffer Overflow During Utf-8 To Unicode String Conversion Through Legacy Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576283" id="1576283" title="Mozilla: Backport Critical Security Fixes In Skia" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1580236" id="1580236" title="Mozilla: Full Plaintext Recovery In S/Mime Via Chosen-Ciphertext Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1580237" id="1580237" title="Mozilla: Hang Via Malformed Headers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1580239" id="1580239" title="Mozilla: Encrypted Mail Leaks Plaintext Through Src Attribute" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1580240" id="1580240" title="Mozilla: Filename Spoofing For External Attachments" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1580241" id="1580241" title="Mozilla: Leaking Plaintext Through Html Forms" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1780-1</id><title>Xmlrpc</title><description>Security Fix(es): 
* xmlrpc: Deserialization of untrusted Java object through &lt;ex:serializable&gt; tag (CVE-2016-5003)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-06-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="xmlrpc-server" release="9.el7_5" src="xmlrpc-3.1.3-9.el7_5.src.rpm" version="3.1.3"><filename>xmlrpc-server-3.1.3-9.el7_5.noarch.rpm</filename><sum type="sha256">8713eeb55cfe3951bb3936e65cc6de0385703c36a1c35059c2391f7d112819b9</sum></package><package arch="noarch" epoch="1" name="xmlrpc-client" release="9.el7_5" src="xmlrpc-3.1.3-9.el7_5.src.rpm" version="3.1.3"><filename>xmlrpc-client-3.1.3-9.el7_5.noarch.rpm</filename><sum type="sha256">0d98ef4f4042328c3a528b64f1fa3d6f6dc9bfca79513463cf2ac46bb71193ca</sum></package><package arch="noarch" epoch="1" name="xmlrpc-javadoc" release="9.el7_5" src="xmlrpc-3.1.3-9.el7_5.src.rpm" version="3.1.3"><filename>xmlrpc-javadoc-3.1.3-9.el7_5.noarch.rpm</filename><sum type="sha256">5a99bad47d0d265621402dfac43b0958c15bd390444f1a3102ad805e8dade15a</sum></package><package arch="noarch" epoch="1" name="xmlrpc-common" release="9.el7_5" src="xmlrpc-3.1.3-9.el7_5.src.rpm" version="3.1.3"><filename>xmlrpc-common-3.1.3-9.el7_5.noarch.rpm</filename><sum type="sha256">f01614a98b8f52a408a949cf2469dcd0664d98837f14bfdbdf4109dee533549b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5003" id="CVE-2016-5003" title="Xmlrpc: Deserialization Of Untrusted Java Object Through &lt;Ex:Serializable&gt; Tag" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1780" id="RHSA-2018:1780-1" title="Rhsa-2018:1780-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1508123" id="1508123" title="Xmlrpc: Deserialization Of Untrusted Java Object Through &lt;Ex:Serializable&gt; Tag" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1836-1</id><title>Plexus-Archiver</title><description>Security Fix(es): 
* plexus-archiver: arbitrary file write vulnerability / arbitrary code execution using a specially crafted zip file (CVE-2018-1002200)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-06-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="plexus-archiver" release="5.el7_5" src="plexus-archiver-2.4.2-5.el7_5.src.rpm" version="2.4.2"><filename>plexus-archiver-2.4.2-5.el7_5.noarch.rpm</filename><sum type="sha256">b9ff0d5e282c0e8ac3b94cb83dcc1d767bb7fe8ca700cfd46b746624ac8cd35e</sum></package><package arch="noarch" name="plexus-archiver-javadoc" release="5.el7_5" src="plexus-archiver-2.4.2-5.el7_5.src.rpm" version="2.4.2"><filename>plexus-archiver-javadoc-2.4.2-5.el7_5.noarch.rpm</filename><sum type="sha256">64f255787bc562d507e4aa30d846bb6b4637aee4f8d7027620777b760b7b3c94</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1002200" id="CVE-2018-1002200" title="Plexus-Archiver: Arbitrary File Write Vulnerability / Arbitrary Code Execution Using A Specially Crafted Zip File" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1836" id="RHSA-2018:1836-1" title="Rhsa-2018:1836-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1584392" id="1584392" title="Plexus-Archiver: Arbitrary File Write Vulnerability / Arbitrary Code Execution Using A Specially Crafted Zip File" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1852-1</id><title>Kernel</title><description>Security Fix(es): 
* Kernel: FPU state information leakage via lazy FPU restore (CVE-2018-3665)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-06-14 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-devel" release="862.3.3.el7" src="kernel-3.10.0-862.3.3.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-862.3.3.el7.x86_64.rpm</filename><sum type="sha256">9b32fc782a485e4f7b953f2dab897d067b7e24965b3ed8f5eefdc22c315e0591</sum></package><package arch="x86_64" name="kernel-tools" release="862.3.3.el7" src="kernel-3.10.0-862.3.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-862.3.3.el7.x86_64.rpm</filename><sum type="sha256">bd5385fb0be3b368f930a1a047d6b2257aee78c9dfda3b2c90d6b838f8dcedce</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="862.3.3.el7" src="kernel-3.10.0-862.3.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-862.3.3.el7.x86_64.rpm</filename><sum type="sha256">e85649104f5abf52387e279f0771fb049031de098349434480be6c3544a1e771</sum></package><package arch="x86_64" name="kernel" release="862.3.3.el7" src="kernel-3.10.0-862.3.3.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-862.3.3.el7.x86_64.rpm</filename><sum type="sha256">a586afaaa05acada487fa3f4896285d16261e775f420c5612adf2cad935006e8</sum></package><package arch="x86_64" name="kernel-tools-libs" release="862.3.3.el7" src="kernel-3.10.0-862.3.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-862.3.3.el7.x86_64.rpm</filename><sum type="sha256">3c524e8ee8559f9d6d04541fe55c5f16a4d773a620b44638052340a476440d4e</sum></package><package arch="x86_64" name="kernel-debug-devel" release="862.3.3.el7" src="kernel-3.10.0-862.3.3.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-862.3.3.el7.x86_64.rpm</filename><sum type="sha256">d9d0116298a25dc2840bfdc144cc5957584f3a989d9b1289e066c93d4886f8c3</sum></package><package arch="x86_64" name="python-perf" release="862.3.3.el7" src="kernel-3.10.0-862.3.3.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-862.3.3.el7.x86_64.rpm</filename><sum type="sha256">e90be9b26d66c1865b41403a04563284f1a7312c8c13e8bbdcda864836033c8a</sum></package><package arch="noarch" name="kernel-doc" release="862.3.3.el7" src="kernel-3.10.0-862.3.3.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-862.3.3.el7.noarch.rpm</filename><sum type="sha256">ba5a4a45a26dc3dc0c1902c450a65174554ced7a13711c923b440298267c4a24</sum></package><package arch="x86_64" name="kernel-debug" release="862.3.3.el7" src="kernel-3.10.0-862.3.3.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-862.3.3.el7.x86_64.rpm</filename><sum type="sha256">8d5fe5e64cf4bb64419be5c57c248523be1a65ebeebee827ff89ba4e8e042d03</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="862.3.3.el7" src="kernel-3.10.0-862.3.3.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-862.3.3.el7.noarch.rpm</filename><sum type="sha256">5e219d10faa5c33d37fa2e9e520b57440812533628aebfaff6f886c4dd2a4ae2</sum></package><package arch="x86_64" name="perf" release="862.3.3.el7" src="kernel-3.10.0-862.3.3.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-862.3.3.el7.x86_64.rpm</filename><sum type="sha256">b47c1052f5abfc8842347a860b79a98bd334b8b6e91dd60ca2d6d0b3d62963e9</sum></package><package arch="x86_64" name="kernel-headers" release="862.3.3.el7" src="kernel-3.10.0-862.3.3.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-862.3.3.el7.x86_64.rpm</filename><sum type="sha256">4dece7f9bc150b7e9964c4b822f7ea25ca3e617f3dc61f4ba1f191cc59379ddd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3665" id="CVE-2018-3665" title="Kernel: Fpu State Information Leakage Via Lazy Fpu Restore" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1852" id="RHSA-2018:1852-1" title="Rhsa-2018:1852-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1585011" id="1585011" title="Kernel: Fpu State Information Leakage Via Lazy Fpu Restore" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1957-1</id><title>Git</title><description>Security Fix(es): 
* git: arbitrary code execution when recursively cloning a malicious repository (CVE-2018-11235)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-06-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="git-email" release="14.el7_5" src="git-1.8.3.1-14.el7_5.src.rpm" version="1.8.3.1"><filename>git-email-1.8.3.1-14.el7_5.noarch.rpm</filename><sum type="sha256">4e1eb28880ab7e8d68d7ea0399369f2d6d7c11abf0f57ce320b179523da92336</sum></package><package arch="noarch" name="perl-Git" release="14.el7_5" src="git-1.8.3.1-14.el7_5.src.rpm" version="1.8.3.1"><filename>perl-Git-1.8.3.1-14.el7_5.noarch.rpm</filename><sum type="sha256">db76da7c88efb9d33c4096e7c16f661846239074e79f736953f0c0cee81ce67b</sum></package><package arch="noarch" name="git-hg" release="14.el7_5" src="git-1.8.3.1-14.el7_5.src.rpm" version="1.8.3.1"><filename>git-hg-1.8.3.1-14.el7_5.noarch.rpm</filename><sum type="sha256">3671de306b0ebe40e8897bdeedf68a030f35d88325e9418e1cc262913d365851</sum></package><package arch="noarch" name="git-p4" release="14.el7_5" src="git-1.8.3.1-14.el7_5.src.rpm" version="1.8.3.1"><filename>git-p4-1.8.3.1-14.el7_5.noarch.rpm</filename><sum type="sha256">3dfb02d8c7f7ca5b784687b014b5d9d52c48d057d83d75a951d96039ffea27b4</sum></package><package arch="x86_64" name="git" release="14.el7_5" src="git-1.8.3.1-14.el7_5.src.rpm" version="1.8.3.1"><filename>git-1.8.3.1-14.el7_5.x86_64.rpm</filename><sum type="sha256">48fea71ea920f4e4cedbec5731f97c14405927de9565ee8749d3e315fd00f722</sum></package><package arch="noarch" name="git-cvs" release="14.el7_5" src="git-1.8.3.1-14.el7_5.src.rpm" version="1.8.3.1"><filename>git-cvs-1.8.3.1-14.el7_5.noarch.rpm</filename><sum type="sha256">c4b5dc95fc376fc345a69755ef972517a33c20f5877b7c5ac1f82b1823a71e39</sum></package><package arch="noarch" name="emacs-git" release="14.el7_5" src="git-1.8.3.1-14.el7_5.src.rpm" version="1.8.3.1"><filename>emacs-git-1.8.3.1-14.el7_5.noarch.rpm</filename><sum type="sha256">ddc2dfb4b919aab9add7cd9e5a4ef86ea5d1ea41fde98531a78e7a5050c4b4e4</sum></package><package arch="noarch" name="gitweb" release="14.el7_5" src="git-1.8.3.1-14.el7_5.src.rpm" version="1.8.3.1"><filename>gitweb-1.8.3.1-14.el7_5.noarch.rpm</filename><sum type="sha256">178cfe185259d928b701961c76def2dcaa3f3d7dbfaf8c9591ead42a78827a34</sum></package><package arch="x86_64" name="git-svn" release="14.el7_5" src="git-1.8.3.1-14.el7_5.src.rpm" version="1.8.3.1"><filename>git-svn-1.8.3.1-14.el7_5.x86_64.rpm</filename><sum type="sha256">168aba5f0a14349a2ae30e28bb944d309ab6e757d8bf361f134896026a1c31ed</sum></package><package arch="noarch" name="emacs-git-el" release="14.el7_5" src="git-1.8.3.1-14.el7_5.src.rpm" version="1.8.3.1"><filename>emacs-git-el-1.8.3.1-14.el7_5.noarch.rpm</filename><sum type="sha256">30a795f50ee03e69ab1573599804700d4a136e3958f02c91666b6b23b58c1008</sum></package><package arch="noarch" name="gitk" release="14.el7_5" src="git-1.8.3.1-14.el7_5.src.rpm" version="1.8.3.1"><filename>gitk-1.8.3.1-14.el7_5.noarch.rpm</filename><sum type="sha256">1f64ac713d605efbc0e9d17ccdcb150ff5227fb41d5aa247db94c2da5863fedf</sum></package><package arch="noarch" name="perl-Git-SVN" release="14.el7_5" src="git-1.8.3.1-14.el7_5.src.rpm" version="1.8.3.1"><filename>perl-Git-SVN-1.8.3.1-14.el7_5.noarch.rpm</filename><sum type="sha256">ebf6a9d86925631d193a2680ca78502e0a5ad4cbc0746005b5939f801906a8d5</sum></package><package arch="x86_64" name="git-daemon" release="14.el7_5" src="git-1.8.3.1-14.el7_5.src.rpm" version="1.8.3.1"><filename>git-daemon-1.8.3.1-14.el7_5.x86_64.rpm</filename><sum type="sha256">b017f182e06b68c1cca028a96217110e85b5acb15bc9944b3afc1d23aa812b4d</sum></package><package arch="noarch" name="git-all" release="14.el7_5" src="git-1.8.3.1-14.el7_5.src.rpm" version="1.8.3.1"><filename>git-all-1.8.3.1-14.el7_5.noarch.rpm</filename><sum type="sha256">91ab43e48135962114c738da479dffc0ac1369e4bfc1fbc6c7bd83604a310b69</sum></package><package arch="noarch" name="git-bzr" release="14.el7_5" src="git-1.8.3.1-14.el7_5.src.rpm" version="1.8.3.1"><filename>git-bzr-1.8.3.1-14.el7_5.noarch.rpm</filename><sum type="sha256">eeafc3ac4d2208038707d3b1d1d91129c31eafaef722fb74e2b47f8120b4b457</sum></package><package arch="noarch" name="git-gui" release="14.el7_5" src="git-1.8.3.1-14.el7_5.src.rpm" version="1.8.3.1"><filename>git-gui-1.8.3.1-14.el7_5.noarch.rpm</filename><sum type="sha256">1e93e59228bc71cf6e92d1dd21f27cba148ef54ed922cb869e9e2e1205d2e8c8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11235" id="CVE-2018-11235" title="Git: Arbitrary Code Execution When Recursively Cloning A Malicious Repository" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1957" id="RHSA-2018:1957-1" title="Rhsa-2018:1957-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1583862" id="1583862" title="Git: Arbitrary Code Execution When Recursively Cloning A Malicious Repository" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1965-1</id><title>Kernel</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load &amp; Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639, PowerPC, x86 AMD) 
* kernel: Out-of-bounds access via an XFRM_MSG_MIGRATE xfrm Netlink message (CVE-2017-11600) 
Bug Fix(es): 
See the descriptions in the related Knowledge Article:</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-06-26 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools-libs-devel" release="862.6.3.el7" src="kernel-3.10.0-862.6.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-862.6.3.el7.x86_64.rpm</filename><sum type="sha256">c1263565ee70e5e35cc456e1ad091dd41472625b162fcbe55c67e73dc72d1130</sum></package><package arch="x86_64" name="kernel-debug-devel" release="862.6.3.el7" src="kernel-3.10.0-862.6.3.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-862.6.3.el7.x86_64.rpm</filename><sum type="sha256">2c159fb363dc88cf096419e14410317f70596e61a59c6938a5ba2c9fce84cb9f</sum></package><package arch="x86_64" name="kernel" release="862.6.3.el7" src="kernel-3.10.0-862.6.3.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-862.6.3.el7.x86_64.rpm</filename><sum type="sha256">453d3a410240342190ef4367ee0dc19c7f84fc96f426f7d24a133ab96d7a8402</sum></package><package arch="x86_64" name="kernel-tools" release="862.6.3.el7" src="kernel-3.10.0-862.6.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-862.6.3.el7.x86_64.rpm</filename><sum type="sha256">776a532620ad1213682b6b6a3a6322a78b604465f0fccdb54ed83cde2f9faf03</sum></package><package arch="x86_64" name="kernel-tools-libs" release="862.6.3.el7" src="kernel-3.10.0-862.6.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-862.6.3.el7.x86_64.rpm</filename><sum type="sha256">13fc7e18e61a364aaa5f288947d676aa4b84f5cbedc15f511738bc9936806c5d</sum></package><package arch="noarch" name="kernel-doc" release="862.6.3.el7" src="kernel-3.10.0-862.6.3.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-862.6.3.el7.noarch.rpm</filename><sum type="sha256">06eeaf1f1713fd956b323e1f15701f036811e3d2662b5b3ee239e0c0488056dd</sum></package><package arch="x86_64" name="kernel-headers" release="862.6.3.el7" src="kernel-3.10.0-862.6.3.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-862.6.3.el7.x86_64.rpm</filename><sum type="sha256">3d9489c1830726b24ee7f6d7de03ce4192f5b6455f7abecd7487250aa1601f56</sum></package><package arch="x86_64" name="kernel-debug" release="862.6.3.el7" src="kernel-3.10.0-862.6.3.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-862.6.3.el7.x86_64.rpm</filename><sum type="sha256">cd8aa3a5d401ae5a20c7d1c1342a27279c95018053926f776b80814d4c7f1ec3</sum></package><package arch="x86_64" name="perf" release="862.6.3.el7" src="kernel-3.10.0-862.6.3.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-862.6.3.el7.x86_64.rpm</filename><sum type="sha256">9a9204a2b80a8bfb723aca294fb395a150e86d7748ff5745ea7d244ca18e0aad</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="862.6.3.el7" src="kernel-3.10.0-862.6.3.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-862.6.3.el7.noarch.rpm</filename><sum type="sha256">ad7a486184d1c2f1972eb3029c8045c5a92f0c108acaf8a30b2befe9f8b4c373</sum></package><package arch="x86_64" name="python-perf" release="862.6.3.el7" src="kernel-3.10.0-862.6.3.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-862.6.3.el7.x86_64.rpm</filename><sum type="sha256">2c5de5da7ec2901998591baf26a7d5dfb70e0fac602a75576aaac09801153e26</sum></package><package arch="x86_64" name="kernel-devel" release="862.6.3.el7" src="kernel-3.10.0-862.6.3.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-862.6.3.el7.x86_64.rpm</filename><sum type="sha256">26419618715c8b6b6d1d727fc847fed1b4f74a5932a58fdc24c54b6e8c937e5f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11600" id="CVE-2017-11600" title="Kernel: Out-Of-Bounds Access Via An Xfrm_Msg_Migrate Xfrm Netlink Message" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" id="CVE-2018-3639" title="Hw: Cpu: Speculative Store Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1965" id="RHSA-2018:1965-1" title="Rhsa-2018:1965-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1474928" id="1474928" title="Kernel: Out-Of-Bounds Access Via An Xfrm_Msg_Migrate Xfrm Netlink Message" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566890" id="1566890" title="Hw: Cpu: Speculative Store Bypass" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1979-1</id><title>Pki-Core</title><description>Security Fix(es): 
* pki-core: Mishandled ACL configuration in AAclAuthz.java reverses rules that allow and deny access (CVE-2018-1080) 
Bug Fix(es): 
* Previously, when ECC keys were enrolled, Certificate Management over CMS (CMC) authentication failed with a "TokenException: Unable to insert certificate into temporary database" error. As a consequence, the enrollment failed. This update fixes the problem. As a result, the mentioned bug no longer occurs. 
* Previously, Certificate System used the same enrollment profiles for issuing RSA and ECC certificates. As a consequence, the key usage extension in issued certificates did not meet the Common Criteria standard. This update adds ECC-specific enrollment profiles where the key usage extension for TLS server and client certificates are different as described in RFC 6960. Additionally, the update changes existing profiles to issue only RSA certificates. As a result, the key usage extension in ECC certificates now meets the Common Criteria standard. 
* The Certificate System server rejects saving invalid access control lists (ACL). As a consequence, when saving an ACL with an empty expression, the server rejected the update and the pkiconsole utility displayed an StringIndexOutOfBoundsException error. With this update, the utility rejects empty ACL expressions. As a result, invalid ACLs cannot be saved and the error is no longer displayed. 
* Previously, due to a bug in the Certificate System installation procedure, installing a Key Recovery Authority (KRA) with ECC keys failed. To fix the problem, the installation process has been updated to handle both RSA and ECC subsystems automatically. As a result, installing subsystems with ECC keys no longer fail. 
* Previously, during verification, Certificate System encoded the ECC public key incorrectly in CMC Certificate Request Message Format (CRMF) requests. As a consequence, requesting an ECC certificate with Certificate Management over CMS (CMC) in CRMF failed. The problem has been fixed, and as a result, CMC CRMF requests using ECC keys work as expected. 
Enhancement(s): 
* The pkispawn man page has been updated and now describes the - --skip- configuration and --skip-installation parameters. 
* With this update, Certificate System adds the Subject Alternative Name (SAN) extension by default to server certificates and sets it to the Common Name (CN) of the certificate. 
* With this enhancement, users can create Certificate Request Message Format (CRMF) requests without the key archival option when using the CRMFPopClient utility. This feature increases flexibility because a Key Recovery Authority (KRA) certificate is no longer required. Previously, if the user did not pass the "-b transport_certificate_file" option to CRMFPopClient, the utility automatically used the KRA transport certificate stored in the transport.txt file. With this update, if "-b transport_certificate_file" is not specified, Certificate System creates a request without using key archival.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-06-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="pki-base-java" release="13.1.el7_5" src="pki-core-10.5.1-13.1.el7_5.src.rpm" version="10.5.1"><filename>pki-base-java-10.5.1-13.1.el7_5.noarch.rpm</filename><sum type="sha256">041655e7cf63f7c0b3dc984087d04bba653d52223c85dfafd7a4c4ffdb3977d3</sum></package><package arch="noarch" name="pki-kra" release="13.1.el7_5" src="pki-core-10.5.1-13.1.el7_5.src.rpm" version="10.5.1"><filename>pki-kra-10.5.1-13.1.el7_5.noarch.rpm</filename><sum type="sha256">6daab18699eed43ec273147d20d44a37e452eaafa5f34670fe94a88df76e6bc4</sum></package><package arch="x86_64" name="pki-tools" release="13.1.el7_5" src="pki-core-10.5.1-13.1.el7_5.src.rpm" version="10.5.1"><filename>pki-tools-10.5.1-13.1.el7_5.x86_64.rpm</filename><sum type="sha256">cdc12bcca6cbc151e0817a1837d9f3adefc9fa9ad3752d6751ba127d70b27a53</sum></package><package arch="noarch" name="pki-base" release="13.1.el7_5" src="pki-core-10.5.1-13.1.el7_5.src.rpm" version="10.5.1"><filename>pki-base-10.5.1-13.1.el7_5.noarch.rpm</filename><sum type="sha256">58262a26678e6d8bc9b650b748d3fe86ee1af169ec24c8a3abb5f004ebae00e9</sum></package><package arch="noarch" name="pki-ca" release="13.1.el7_5" src="pki-core-10.5.1-13.1.el7_5.src.rpm" version="10.5.1"><filename>pki-ca-10.5.1-13.1.el7_5.noarch.rpm</filename><sum type="sha256">e03e212712328bec7dffb05ae4cb48d62194cee78deaf4d3719a624043c47f23</sum></package><package arch="noarch" name="pki-server" release="13.1.el7_5" src="pki-core-10.5.1-13.1.el7_5.src.rpm" version="10.5.1"><filename>pki-server-10.5.1-13.1.el7_5.noarch.rpm</filename><sum type="sha256">087a2b37f7f58bd6ca7e666e70d71d946932c809a67d3f8aa15f0869861c65e5</sum></package><package arch="noarch" name="pki-javadoc" release="13.1.el7_5" src="pki-core-10.5.1-13.1.el7_5.src.rpm" version="10.5.1"><filename>pki-javadoc-10.5.1-13.1.el7_5.noarch.rpm</filename><sum type="sha256">95a4779e118bb0bda58d119e494a9661da71cdb8943d902b636645d63255832f</sum></package><package arch="x86_64" name="pki-symkey" release="13.1.el7_5" src="pki-core-10.5.1-13.1.el7_5.src.rpm" version="10.5.1"><filename>pki-symkey-10.5.1-13.1.el7_5.x86_64.rpm</filename><sum type="sha256">8a7307d75153a57c1547f6c8b861c132a0e176cf3ab71db888991b5bfc654d35</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1080" id="CVE-2018-1080" title="Pki-Core: Mishandled Acl Configuration In Aaclauthz.Java Reverses Rules That Allow And Deny Access" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1979" id="RHSA-2018:1979-1" title="Rhsa-2018:1979-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1556657" id="1556657" title="Pki-Core: Mishandled Acl Configuration In Aaclauthz.Java Reverses Rules That Allow And Deny Access" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:1997-1</id><title>Libvirt</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load &amp; Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) 
Note: This is the libvirt side of the CVE-2018-3639 mitigation that includes support for guests running on hosts with AMD processors. 
Bug Fix(es): 
* Previously, the virtlogd service logged redundant AVC denial errors when a guest virtual machine was started. With this update, the virtlogd service no longer attempts to send shutdown inhibition calls to systemd, which prevents the described errors from occurring. 
* Prior to this update, guest virtual machine actions that use a python library in some cases failed and "Hash operation not allowed during iteration" error messages were logged. Several redundant thread access checks have been removed, and the problem no longer occurs. 
* The "virsh capabilities" command previously displayed an inaccurate number of 4 KiB memory pages on systems with very large amounts of memory. This update optimizes the memory diagnostic mechanism to ensure memory page numbers are displayed correctly on such systems.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-06-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libvirt-daemon-driver-storage-rbd" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-rbd-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">4fc0f30b6c5c22f354a8e873ab4c01750555f5efdc7fd1c29e9cb05e0fc19d1f</sum></package><package arch="x86_64" name="libvirt-daemon-driver-network" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-network-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">766971967707513c7e8180f017be8c852c35aad5fbc3910ac10437058fbceab3</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-mpath" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-mpath-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">2e2ef92f95d299aa80364dbd450be3ffdb38e9bb310d4f4f81ee73b90711adef</sum></package><package arch="x86_64" name="libvirt-admin" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-admin-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">e2bd1255c0d874489b0e62599a48e5e69a4cbe5cb776e555fa4e109b25871dad</sum></package><package arch="x86_64" name="libvirt-daemon-driver-secret" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-secret-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">9684ef9a910fb5727ae3e32c838fe45e3f277fb3cef6f20f2b23f3678930308b</sum></package><package arch="x86_64" name="libvirt-libs" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-libs-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">13c1cfc61269ccf06659aad37a8b948473b8582d5d2fdc371855e43d09c24ec2</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-lock-sanlock-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">99d03ce1e4cb86f63657609713f78a569635183e2e311c5f2bbb617a28a5cdf7</sum></package><package arch="i686" name="libvirt-client" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-client-3.9.0-14.el7_5.6.i686.rpm</filename><sum type="sha256">25766584762fd6be45e385941b6e8fdc23f64212b7f31fb1f4527d55b1d938d1</sum></package><package arch="x86_64" name="libvirt-daemon-driver-interface" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-interface-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">59e296ea34522cf4cf0e4d694eadfedf5dd103855569a439a5929983b74234b0</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nwfilter" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-nwfilter-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">0f0071f330d5050a2cd1969ea21546d74a6cd2a032ad27bb90d187766aff30fd</sum></package><package arch="x86_64" name="libvirt-daemon-driver-lxc" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-lxc-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">be4cbbfe1569a5e957a987db447df88b4f3efdedcab6a3570476e113729e1f27</sum></package><package arch="i686" name="libvirt-nss" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-nss-3.9.0-14.el7_5.6.i686.rpm</filename><sum type="sha256">f0a6110e2db5f0b1f6fab0a2cfbc16a0508e03a491ad9a6affa027f642cbe0df</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-iscsi" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-iscsi-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">6ac6732091a19d621e0cfd3be3e8d3696fb83443ded706a0333be4a229546394</sum></package><package arch="x86_64" name="libvirt-daemon-config-network" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-config-network-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">e95b2a1c3a2ba0689fb9232131def788b9aa15dd6ddb708223e49c1ca1f1df14</sum></package><package arch="i686" name="libvirt-devel" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-devel-3.9.0-14.el7_5.6.i686.rpm</filename><sum type="sha256">17cea5dbfb9c52eaf796fc6343b24463a5ef2be60bb530a29b0984146c4a1f2e</sum></package><package arch="x86_64" name="libvirt-daemon-kvm" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-kvm-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">e236fbc892c906f886eeca53147342ac8d803f9331c8621bf6e2aada2cad9669</sum></package><package arch="x86_64" name="libvirt-daemon-driver-qemu" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-qemu-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">92c4d431ef98fc7430dcd7908e0363f28218faff2abc63ebd1cac83bc3f736f7</sum></package><package arch="x86_64" name="libvirt-docs" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-docs-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">7c2a9daba202bc39674f7d0d666b6dfdf38a787dc42c54228cb996d2c3ee8c7f</sum></package><package arch="x86_64" name="libvirt-daemon" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">ac0e30bafea0cd48b49dab3e6fe2331de96631f66657c78ef77a3612cca69cd0</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-logical" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-logical-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">895836123cbb904323d7814e640d60b9e5ec29bb29a63951c1ae934f272b269f</sum></package><package arch="x86_64" name="libvirt-daemon-lxc" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-lxc-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">0cf044ba37fb3bfacbc0ddc49b5542955db7a5b57815122154b8030ade89065e</sum></package><package arch="x86_64" name="libvirt-daemon-config-nwfilter" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-config-nwfilter-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">05e8eb3250c140b6ae8fed1bed9c26c9cbef99112690a11a53b01ac367f7cdab</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nodedev" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-nodedev-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">87db48bb8f64da1d19e3560beee150437e4be52a5babf0ddcb2f6b638e247ca1</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">37fdfcd716ee1d9025607ffa170bc4cd04c901e8f5dd2ff8977810f8c1804599</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-disk" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-disk-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">c4bb5739d3dff641056a22b537b473323ae0be7c52d284f50ad7193e95d0eba5</sum></package><package arch="x86_64" name="libvirt-client" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-client-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">6dd53aae863372ddfbfe8e34091b4ab00aa22f44e2b7bec08cc68bf364bb5256</sum></package><package arch="x86_64" name="libvirt-devel" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-devel-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">6206797e6dcee249ae2fe0427f276f1c1156a04f5b0bf5e451bedb4f4ea691a8</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-core" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-core-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">ed0560d738ae9ff9837b16303964ed26ff6a9cfeffddc5cf70a3c6e17cb7f722</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-scsi" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-scsi-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">bd0c71e0ce66b3cf47e2bd50dce9b6edc7c6ad2491658aefaceffbd0e48c6693</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-gluster" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-daemon-driver-storage-gluster-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">d7699a2228de5bbef65e326eaca4999ea13713cd402150835ae95e9ed1792681</sum></package><package arch="x86_64" name="libvirt-login-shell" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-login-shell-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">ad50aa7680f5e3e35162d4eec5c611ff51ccbcee9f08415eb20d71c8b909fc71</sum></package><package arch="x86_64" name="libvirt-nss" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-nss-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">bd409d9b58722d24d14ba5804cbce02144d144de35453f5b15ecccf702347faf</sum></package><package arch="i686" name="libvirt-libs" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-libs-3.9.0-14.el7_5.6.i686.rpm</filename><sum type="sha256">bcdd464ca23f24150efa60fc7dcd0afca87e747ad93b4de2046cc6f6997ef12f</sum></package><package arch="x86_64" name="libvirt" release="14.el7_5.6" src="libvirt-3.9.0-14.el7_5.6.src.rpm" version="3.9.0"><filename>libvirt-3.9.0-14.el7_5.6.x86_64.rpm</filename><sum type="sha256">ae95023bf7b6937ebf5589632a256eaf8a868efe3399b2e6e3c4388a6f71a14c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" id="CVE-2018-3639" title="Hw: Cpu: Speculative Store Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:1997" id="RHSA-2018:1997-1" title="Rhsa-2018:1997-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566890" id="1566890" title="Hw: Cpu: Speculative Store Bypass" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2001-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load &amp; Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639) 
Note: This is the qemu-kvm side of the CVE-2018-3639 mitigation that includes support for guests running on hosts with AMD processors.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-06-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-img" release="156.el7_5.3" src="qemu-kvm-1.5.3-156.el7_5.3.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-156.el7_5.3.x86_64.rpm</filename><sum type="sha256">1a37af576743f52c434fe90e4d1f94ade9461390b10a750cf80a91d0b5033a8f</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="156.el7_5.3" src="qemu-kvm-1.5.3-156.el7_5.3.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-156.el7_5.3.x86_64.rpm</filename><sum type="sha256">0f1439fe7da1344332360600239adaa0298afde26a3575592ec1fb3e68a86c49</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="156.el7_5.3" src="qemu-kvm-1.5.3-156.el7_5.3.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-156.el7_5.3.x86_64.rpm</filename><sum type="sha256">f41503c109bf082d3ba2a526d6c2977547e85db0ab450ad0a7c5b5be2774ce0f</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="156.el7_5.3" src="qemu-kvm-1.5.3-156.el7_5.3.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-156.el7_5.3.x86_64.rpm</filename><sum type="sha256">30e74d3957b47409fd77b968bb85dd87c1df328f0436e865de500ea9420cb14d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639" id="CVE-2018-3639" title="Hw: Cpu: Speculative Store Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2001" id="RHSA-2018:2001-1" title="Rhsa-2018:2001-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566890" id="1566890" title="Hw: Cpu: Speculative Store Bypass" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2113-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.1.0 ESR. 
Many older firefox extensions must be updated to work with this new release. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and Firefox ESR 52.9 (CVE-2018-5188) 
* Mozilla: Buffer overflow using computed size of canvas element (CVE-2018-12359) 
* Mozilla: Use-after-free using focus() (CVE-2018-12360) 
* Mozilla: Media recorder segmentation fault when track type is changed during capture (CVE-2018-5156) 
* Skia: Heap buffer overflow rasterizing paths in SVG (CVE-2018-6126) 
* Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362) 
* Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363) 
* Mozilla: CSRF attacks through 307 redirects and NPAPI plugins (CVE-2018-12364) 
* Mozilla: address bar username and password spoofing in reader mode (CVE-2017-7762) 
* Mozilla: Compromised IPC child process can list local filenames (CVE-2018-12365) 
* Mozilla: Invalid data handling during QCMS transformations (CVE-2018-12366)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2018-07-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="4.el7_5" src="firefox-60.1.0-4.el7_5.src.rpm" version="60.1.0"><filename>firefox-60.1.0-4.el7_5.i686.rpm</filename><sum type="sha256">d84a7fc264d1026a99af25400b66d06d95cb0c8a163562694dd62952a9d6ba46</sum></package><package arch="x86_64" name="firefox" release="4.el7_5" src="firefox-60.1.0-4.el7_5.src.rpm" version="60.1.0"><filename>firefox-60.1.0-4.el7_5.x86_64.rpm</filename><sum type="sha256">aa59a857b5d6e2590187ea8f5157a0262159442f78e527ef95d5eb6e491785c6</sum></package><package arch="noarch" name="sl-indexhtml" release="5.sl7" src="sl-indexhtml-7-5.sl7.src.rpm" version="7"><filename>sl-indexhtml-7-5.sl7.noarch.rpm</filename><sum type="sha256">9d5d957e19d67a9538769de75ce89ad27ed5805f0b33ee0df4c591567a3cad2a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7762" id="CVE-2017-7762" title="Mozilla: Address Bar Username And Password Spoofing In Reader Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359" id="CVE-2018-12359" title="Mozilla: Buffer Overflow Using Computed Size Of Canvas Element" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360" id="CVE-2018-12360" title="Mozilla: Use-After-Free Using Focus()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362" id="CVE-2018-12362" title="Mozilla: Integer Overflow In Ssse3 Scaler" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363" id="CVE-2018-12363" title="Mozilla: Use-After-Free When Appending Dom Nodes" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364" id="CVE-2018-12364" title="Mozilla: Csrf Attacks Through 307 Redirects And Npapi Plugins" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365" id="CVE-2018-12365" title="Mozilla: Compromised Ipc Child Process Can List Local Filenames" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366" id="CVE-2018-12366" title="Mozilla: Invalid Data Handling During Qcms Transformations" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5156" id="CVE-2018-5156" title="Mozilla: Media Recorder Segmentation Fault When Track Type Is Changed During Capture" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188" id="CVE-2018-5188" title="Mozilla: Memory Safety Bugs Fixed In Firefox 61, Firefox Esr 60.1, And Firefox Esr 52.9" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6126" id="CVE-2018-6126" title="Chromium-Browser: Heap Buffer Overflow In Skia" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2113" id="RHSA-2018:2113-1" title="Rhsa-2018:2113-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1584035" id="1584035" title="Chromium-Browser: Heap Buffer Overflow In Skia" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1590493" id="1590493" title="Mozilla: Address Bar Username And Password Spoofing In Reader Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595024" id="1595024" title="Mozilla: Buffer Overflow Using Computed Size Of Canvas Element" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595025" id="1595025" title="Mozilla: Use-After-Free Using Focus()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595027" id="1595027" title="Mozilla: Integer Overflow In Ssse3 Scaler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595028" id="1595028" title="Mozilla: Use-After-Free When Appending Dom Nodes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595029" id="1595029" title="Mozilla: Csrf Attacks Through 307 Redirects And Npapi Plugins" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595030" id="1595030" title="Mozilla: Compromised Ipc Child Process Can List Local Filenames" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595031" id="1595031" title="Mozilla: Invalid Data Handling During Qcms Transformations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595037" id="1595037" title="Mozilla: Media Recorder Segmentation Fault When Track Type Is Changed During Capture" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595040" id="1595040" title="Mozilla: Memory Safety Bugs Fixed In Firefox 61, Firefox Esr 60.1, And Firefox Esr 52.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2123-1</id><title>Python</title><description>Security Fix(es): 
* A flaw was found in the way the DES/3DES cipher was used as part of the TLS/SSL protocol. A man-in-the-middle attacker could use this flaw to recover some plaintext data by capturing large amounts of encrypted traffic between TLS/SSL server and client if the communication used a DES/3DES based ciphersuite. (CVE-2016-2183) 
Note: This update modifies the Python ssl module to disable 3DES cipher suites by default.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-07-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python" release="69.el7_5" src="python-2.7.5-69.el7_5.src.rpm" version="2.7.5"><filename>python-2.7.5-69.el7_5.x86_64.rpm</filename><sum type="sha256">0e35287bf16923976d9a587f96913342f1a61ca13e205c677463fc28469cae98</sum></package><package arch="x86_64" name="python-devel" release="69.el7_5" src="python-2.7.5-69.el7_5.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-69.el7_5.x86_64.rpm</filename><sum type="sha256">1c8c9fe0b7458eed5e1a95d95885d4442ccb8f27a3587596865a53abe39887f3</sum></package><package arch="x86_64" name="python-test" release="69.el7_5" src="python-2.7.5-69.el7_5.src.rpm" version="2.7.5"><filename>python-test-2.7.5-69.el7_5.x86_64.rpm</filename><sum type="sha256">2e6a006462d254e14da0b99b1d588ad23c0eec97175d1f5ec6529c959abe160a</sum></package><package arch="i686" name="python-libs" release="69.el7_5" src="python-2.7.5-69.el7_5.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-69.el7_5.i686.rpm</filename><sum type="sha256">9bca472a834687da1772c349647aee4ec4fc18ef9c77963ee0083fdd0a6ba52f</sum></package><package arch="x86_64" name="python-debug" release="69.el7_5" src="python-2.7.5-69.el7_5.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-69.el7_5.x86_64.rpm</filename><sum type="sha256">f042ab94c3e17d52f2b8d71674802e09fac5e185618612d172debecea2919618</sum></package><package arch="x86_64" name="python-tools" release="69.el7_5" src="python-2.7.5-69.el7_5.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-69.el7_5.x86_64.rpm</filename><sum type="sha256">2cf9f4a6c1d0c6f241e61b1f263fd1f7224e07150fa1ff11bda246605eb8617c</sum></package><package arch="x86_64" name="python-libs" release="69.el7_5" src="python-2.7.5-69.el7_5.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-69.el7_5.x86_64.rpm</filename><sum type="sha256">91354124e23003d6d2dc73d637275ef5f1c4b62f188bd21aa03dce62e128a698</sum></package><package arch="x86_64" name="tkinter" release="69.el7_5" src="python-2.7.5-69.el7_5.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-69.el7_5.x86_64.rpm</filename><sum type="sha256">e49ce6b730b1b6a2e27a9ea1919afa77b6fbb948fd1cda971dd80b2d143cdbbc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2183" id="CVE-2016-2183" title="Ssl/Tls: Birthday Attack Against 64-Bit Block Ciphers (Sweet32)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2123" id="RHSA-2018:2123-1" title="Rhsa-2018:2123-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1369383" id="1369383" title="Ssl/Tls: Birthday Attack Against 64-Bit Block Ciphers (Sweet32)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2181-1</id><title>Gnupg2</title><description>Security Fix(es): 
* gnupg2: Improper sanitization of filenames allows for the display of fake status messages and the bypass of signature verification (CVE-2018-12020)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-07-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gnupg2" release="5.el7_5" src="gnupg2-2.0.22-5.el7_5.src.rpm" version="2.0.22"><filename>gnupg2-2.0.22-5.el7_5.x86_64.rpm</filename><sum type="sha256">2184b2cf83f8a633ca0069bc4faf294de5d87604908a872633c4dc915ac160ed</sum></package><package arch="x86_64" name="gnupg2-smime" release="5.el7_5" src="gnupg2-2.0.22-5.el7_5.src.rpm" version="2.0.22"><filename>gnupg2-smime-2.0.22-5.el7_5.x86_64.rpm</filename><sum type="sha256">dec84bff116b50e850dadfa222a4765c3c8b6ecbb6b24dd31e173cd421bde93e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12020" id="CVE-2018-12020" title="Gnupg2: Improper Sanitization Of Filenames " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2181" id="RHSA-2018:2181-1" title="Rhsa-2018:2181-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1589620" id="1589620" title="Gnupg2: Improper Sanitization Of Filenames " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2240-1</id><title>Openslp</title><description>Security Fix(es): 
* openslp: Heap memory corruption in slpd/slpd_process.c allows denial of service or potentially code execution (CVE-2017-17833)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-07-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="openslp" release="7.el7_5" src="openslp-2.0.0-7.el7_5.src.rpm" version="2.0.0"><filename>openslp-2.0.0-7.el7_5.i686.rpm</filename><sum type="sha256">4a00a98f8c9f30c65bc6d7e05e949cf8a3f519ba1c0a60ebcbb91cdcd5130985</sum></package><package arch="i686" epoch="1" name="openslp-devel" release="7.el7_5" src="openslp-2.0.0-7.el7_5.src.rpm" version="2.0.0"><filename>openslp-devel-2.0.0-7.el7_5.i686.rpm</filename><sum type="sha256">38d100fc0d0a403b832dbceeb3d72007e347fb264c6dbc7825740b879d140296</sum></package><package arch="x86_64" epoch="1" name="openslp" release="7.el7_5" src="openslp-2.0.0-7.el7_5.src.rpm" version="2.0.0"><filename>openslp-2.0.0-7.el7_5.x86_64.rpm</filename><sum type="sha256">3e9beb9e1ca1431f78c63ae0fe60c5c68df8662b85a2ef6f9ccc64d3bc1f3231</sum></package><package arch="x86_64" epoch="1" name="openslp-server" release="7.el7_5" src="openslp-2.0.0-7.el7_5.src.rpm" version="2.0.0"><filename>openslp-server-2.0.0-7.el7_5.x86_64.rpm</filename><sum type="sha256">9bbccc4253b1edc0abd561ba03d761e37645c5d7f6f6d0318ca31d9a365a3bb9</sum></package><package arch="x86_64" epoch="1" name="openslp-devel" release="7.el7_5" src="openslp-2.0.0-7.el7_5.src.rpm" version="2.0.0"><filename>openslp-devel-2.0.0-7.el7_5.x86_64.rpm</filename><sum type="sha256">a555822ea1a94734a5b481d04c9e3f8343cf78453b0cc68e9e2da83f1cc7e8b6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17833" id="CVE-2017-17833" title="Openslp: Heap Memory Corruption In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2240" id="RHSA-2018:2240-1" title="Rhsa-2018:2240-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1572166" id="1572166" title="Openslp: Heap Memory Corruption In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2242-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952) 
Note: If the web browser plug-in provided by the icedtea-web package was installed, the issues exposed via Java applets could have been exploited without user interaction if a user visited a malicious website. 
Bug Fix(es): 
* This update applies changes from OpenJDK upstream version 8u172, which provides a number of bug fixes over the previous version, 8u171. 
* OpenJDK was recently updated to support reading the system certificate authority database (cacerts) directly. As an unintended consequence, this removed the ability to read certificates from the user-provided jssecacerts file. With this update, that ability is restored by reading from that file first, if available.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-07-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-src-1.8.0.181-3.b13.el7_5.i686.rpm</filename><sum type="sha256">ee95ae9cec75a405e3c3463c47845210073d9cf918cf36048bdacf8e61267b1c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.x86_64.rpm</filename><sum type="sha256">06d7c981525bff8f68cf20d6fa174ad1617af8c1ced018579c1de8108afb135f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-accessibility-1.8.0.181-3.b13.el7_5.x86_64.rpm</filename><sum type="sha256">acce1d5ee8402275560b24898489cf729faf2e8221431a43f657d88471fe1717</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.181-3.b13.el7_5.i686.rpm</filename><sum type="sha256">04e18d75b5826a594fd73dbb551cc433d245666391fcef3b1f603d75a881c54d</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.181-3.b13.el7_5.i686.rpm</filename><sum type="sha256">f66ac65562247c6bc86a390e803c41cac220dcb3200b37601d3f04db1ce5fffa</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-src-debug-1.8.0.181-3.b13.el7_5.i686.rpm</filename><sum type="sha256">77d18024cc4a210819cfaee820a9835f3fdf1a1e7857bb4e38e5b3e99155d434</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.i686.rpm</filename><sum type="sha256">bcb60027142e729f4e95aaba9ea1fee92c15c796ed8770f7acfd5f766d73364a</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.181-3.b13.el7_5.noarch.rpm</filename><sum type="sha256">68b29b01d9863733f8e1816908fed57d8b032b08e49e5321079f96bf8f1646ab</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-accessibility-1.8.0.181-3.b13.el7_5.i686.rpm</filename><sum type="sha256">6b1e9c556e9d96a5971fe249a989d6597d1fc5fec84b0bb51531aac1c5e3afff</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.181-3.b13.el7_5.x86_64.rpm</filename><sum type="sha256">becaa38a0a64267e5fd73a2ce851d02673a4e1af8b9d7398e7cf73c82cebad8c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-debug-1.8.0.181-3.b13.el7_5.i686.rpm</filename><sum type="sha256">7de52eba037ab547126613a86d29645ba092e5064139248a5892dcc3730a7796</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-debug-1.8.0.181-3.b13.el7_5.x86_64.rpm</filename><sum type="sha256">a295e63778f9b33cb0104c9f92ea03ddef7bc3fbb8079aa40e9a23098f857e6f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-headless-1.8.0.181-3.b13.el7_5.i686.rpm</filename><sum type="sha256">e0e5b114203ff896ab81e55c4cbd80b4317775d201127fd0e4d12264bab5448d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.181-3.b13.el7_5.x86_64.rpm</filename><sum type="sha256">d40aab5703d33ee01359edff9a3c72bfec2984a7a742f2444c88f12082892f1a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.181-3.b13.el7_5.x86_64.rpm</filename><sum type="sha256">c859113c709e475207679ef3835e570cd65729bf9c95fbd26094db3e6feed25d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-src-debug-1.8.0.181-3.b13.el7_5.x86_64.rpm</filename><sum type="sha256">17f7b02ce2bb66783d6fe5bd275301bc4f92112303eb495e4ed220d7e050e48f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-devel-1.8.0.181-3.b13.el7_5.i686.rpm</filename><sum type="sha256">efaa4decbe8c3ed2c09dedc1ef63e7fa8b6077245d44b0be098ddc311e2b01bc</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-demo-1.8.0.181-3.b13.el7_5.i686.rpm</filename><sum type="sha256">d99ae18d513c244872d7bc3f7251e26b600ebacf192dac4c5ad011b7a61f16f6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-demo-1.8.0.181-3.b13.el7_5.x86_64.rpm</filename><sum type="sha256">48359dcd2e2c50f158d08491e26f6dbc01c2122a70579d879c80e64b3bf72835</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.181-3.b13.el7_5.noarch.rpm</filename><sum type="sha256">d95f52b747cc9a2998ac6ce089572ba370b99437d54798a7a33384f914cc9c3b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-src-1.8.0.181-3.b13.el7_5.x86_64.rpm</filename><sum type="sha256">5ca6f23404127566150bfba3d4af002c1dd44ea7ad0d86907c15a30fe0a81dbf</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-javadoc-1.8.0.181-3.b13.el7_5.noarch.rpm</filename><sum type="sha256">e52ca9401764aa07b73b9743accf922d75d1a7e382c52150dc2b321296d9dda8</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-devel-1.8.0.181-3.b13.el7_5.x86_64.rpm</filename><sum type="sha256">3e13f1c2a1df60af529b276ba27120604f9f69eba7c1445ff4f3b1e2ab793829</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.181-3.b13.el7_5.i686.rpm</filename><sum type="sha256">5e54aec927d85bf521524d6d392693d99056f6c0085437abae3c647d3709d496</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.181-3.b13.el7_5.i686.rpm</filename><sum type="sha256">07805aa70a16c533198998585475d004b4894fd3cd2536a2fc980da46a09e7af</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-headless-1.8.0.181-3.b13.el7_5.x86_64.rpm</filename><sum type="sha256">6ad9648fde449dbfb21b842b795bfffc5bb46b35b1d2806e9f0a2fa7aef8bbe2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.181-3.b13.el7_5.x86_64.rpm</filename><sum type="sha256">45a37ffc4068a55f74ea20efa70f6c73a62b76c455d4c258d4bbd8e932c7f46f</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="3.b13.el7_5" src="java-1.8.0-openjdk-1.8.0.181-3.b13.el7_5.src.rpm" version="1.8.0.181"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.181-3.b13.el7_5.noarch.rpm</filename><sum type="sha256">cd2a1222758c07b4a8ce991b179fd5ead97e012619dfa7f2dda927ed4d494312</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2952" id="CVE-2018-2952" title="Openjdk: Insufficient Index Validation In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2242" id="RHSA-2018:2242-1" title="Rhsa-2018:2242-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1588364" id="1588364" title="Update Openjdk To 8U172 Ahead Of The July 2018 Security Update " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600925" id="1600925" title="Openjdk: Insufficient Index Validation In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2252-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 52.9.1. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 61, Firefox ESR 60.1, and Firefox ESR 52.9 (CVE-2018-5188) 
* Mozilla: Buffer overflow using computed size of canvas element (CVE-2018-12359) 
* Mozilla: Use-after-free using focus() (CVE-2018-12360) 
* Mozilla: Integer overflow in SSSE3 scaler (CVE-2018-12362) 
* Mozilla: Use-after-free when appending DOM nodes (CVE-2018-12363) 
* Mozilla: CSRF attacks through 307 redirects and NPAPI plugins (CVE-2018-12364) 
* thunderbird: S/MIME and PGP decryption oracles can be built with HTML emails (CVE-2018-12372) 
* thunderbird: S/MIME plaintext can be leaked through HTML reply/forward (CVE-2018-12373) 
* Mozilla: Compromised IPC child process can list local filenames (CVE-2018-12365) 
* Mozilla: Invalid data handling during QCMS transformations (CVE-2018-12366) 
* thunderbird: Using form to exfiltrate encrypted mail part by pressing enter in form field (CVE-2018-12374)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-07-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_5" src="thunderbird-52.9.1-1.el7_5.src.rpm" version="52.9.1"><filename>thunderbird-52.9.1-1.el7_5.x86_64.rpm</filename><sum type="sha256">6584ae59bd0107c74d3cedac466a8ef5bd173b4f76f051a883986cc23df17439</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12359" id="CVE-2018-12359" title="Mozilla: Buffer Overflow Using Computed Size Of Canvas Element" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12360" id="CVE-2018-12360" title="Mozilla: Use-After-Free Using Focus()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12362" id="CVE-2018-12362" title="Mozilla: Integer Overflow In Ssse3 Scaler" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12363" id="CVE-2018-12363" title="Mozilla: Use-After-Free When Appending Dom Nodes" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12364" id="CVE-2018-12364" title="Mozilla: Csrf Attacks Through 307 Redirects And Npapi Plugins" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12365" id="CVE-2018-12365" title="Mozilla: Compromised Ipc Child Process Can List Local Filenames" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12366" id="CVE-2018-12366" title="Mozilla: Invalid Data Handling During Qcms Transformations" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12372" id="CVE-2018-12372" title="Thunderbird: S/Mime And Pgp Decryption Oracles " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12373" id="CVE-2018-12373" title="Thunderbird: S/Mime Plaintext Can Be Leaked " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12374" id="CVE-2018-12374" title="Thunderbird: Using Form To Exfiltrate Encrypted " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5188" id="CVE-2018-5188" title="Mozilla: Memory Safety Bugs Fixed In Firefox 61, Firefox Esr 60.1, And Firefox Esr 52.9" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2252" id="RHSA-2018:2252-1" title="Rhsa-2018:2252-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595024" id="1595024" title="Mozilla: Buffer Overflow Using Computed Size Of Canvas Element" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595025" id="1595025" title="Mozilla: Use-After-Free Using Focus()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595027" id="1595027" title="Mozilla: Integer Overflow In Ssse3 Scaler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595028" id="1595028" title="Mozilla: Use-After-Free When Appending Dom Nodes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595029" id="1595029" title="Mozilla: Csrf Attacks Through 307 Redirects And Npapi Plugins" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595030" id="1595030" title="Mozilla: Compromised Ipc Child Process Can List Local Filenames" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595031" id="1595031" title="Mozilla: Invalid Data Handling During Qcms Transformations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595040" id="1595040" title="Mozilla: Memory Safety Bugs Fixed In Firefox 61, Firefox Esr 60.1, And Firefox Esr 52.9" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598529" id="1598529" title="Thunderbird: S/Mime Plaintext Can Be Leaked " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598538" id="1598538" title="Thunderbird: S/Mime And Pgp Decryption Oracles " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598543" id="1598543" title="Thunderbird: Using Form To Exfiltrate Encrypted " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2285-1</id><title>Yum-Utils</title><description>Security Fix(es): 
* yum-utils: reposync: improper path validation may lead to directory traversal (CVE-2018-10897)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-07-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="yum-plugin-auto-update-debug-info" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-auto-update-debug-info-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">a89a70ac94d132032ab0e6a149efad0d4395a06842fd57a1cb802bdd0584f3ff</sum></package><package arch="noarch" name="yum-plugin-copr" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-copr-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">8f78e3c42e67199d46657c82f78f2e034a426ef572c38e27950a5052cb70f5b5</sum></package><package arch="noarch" name="yum-plugin-upgrade-helper" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-upgrade-helper-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">7490b89fdbcbe6ce3f04d99a0d4d6a079a63a537924d2a626d9b7b9beecabd77</sum></package><package arch="noarch" name="yum-plugin-filter-data" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-filter-data-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">74696089993ef7eeeced56ed39bea8b9474f92eaf63f3150e74bcfbdd6861223</sum></package><package arch="noarch" name="yum-plugin-remove-with-leaves" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-remove-with-leaves-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">bd6f203888527991ff4decdcc7662d7a4bca7da8271c3e7858dd9a91ebf28136</sum></package><package arch="noarch" name="yum-utils" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-utils-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">820bd1a06770241885a1f3e167826f5892c3fe1e34c69cf7089b556cc9f279f4</sum></package><package arch="noarch" name="yum-plugin-tsflags" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-tsflags-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">8317036b11568edc1132b70d48a35d3224e85c17783e7b65069c936d5cc6a4be</sum></package><package arch="noarch" name="yum-plugin-merge-conf" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-merge-conf-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">2b0bbdefa2b22d01ba04124475cbeeeefb392ab440bd681f8f04a9e8bd804115</sum></package><package arch="noarch" name="yum-plugin-rpm-warm-cache" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-rpm-warm-cache-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">7de92a3992cdde9a1454624cd3e39449d519b1b8d4628c67576e1404a6631a25</sum></package><package arch="noarch" name="yum-plugin-post-transaction-actions" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-post-transaction-actions-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">c3598137818e3690fce495f75fd47e294e7f1354c170c35fc4e09aaacec7a602</sum></package><package arch="noarch" name="yum-plugin-changelog" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-changelog-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">f74bdd379a01781d0c3b1be7f790b65f37b0c02b28a3947e5f4cf47d22bf854c</sum></package><package arch="noarch" name="yum-plugin-ps" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-ps-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">838ad4ee2b979f1fd22c41ca259c4a2ebaca38bb021fd43d4f5245972e1a6cf4</sum></package><package arch="noarch" name="yum-plugin-protectbase" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-protectbase-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">d91db99e848718db091e6b148d0e6ff2e1163cbaa8cc17d9b768ba333f841a79</sum></package><package arch="noarch" name="yum-plugin-priorities" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-priorities-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">d9fb1eb2a46bf8c764fa6749455ebb9316e98e7364da79b107485e2a7302b54f</sum></package><package arch="noarch" name="yum-plugin-fastestmirror" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-fastestmirror-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">f7c39ae422958b1d646d2916934e12f2956188ccf9ae7ae54c53f522a5498cd9</sum></package><package arch="noarch" name="yum-plugin-verify" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-verify-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">0d8bede273ff921021f8104d8f07580df8041f17cfa74523a10df18974bfbc99</sum></package><package arch="noarch" name="yum-plugin-fs-snapshot" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-fs-snapshot-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">f193721f18c1d94a295d5ca8742316892a90d4d9d53516d8d303c20372e2f86d</sum></package><package arch="noarch" name="yum-plugin-local" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-local-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">6e9ebab5d7c617d0419329bb68393ba09725de72eb8a18c5298d2d9e43aeb881</sum></package><package arch="noarch" name="yum-plugin-aliases" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-aliases-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">41b62c1c2aa5bc918fc224dc15f91dfcd234f4e950bc73b24ad49e431deb7c39</sum></package><package arch="noarch" name="yum-NetworkManager-dispatcher" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-NetworkManager-dispatcher-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">41f59fbeafcd703ea78dc1d218bf086a5eafd1c3e0bd0aae7d920c7bd971a7f0</sum></package><package arch="noarch" name="yum-plugin-keys" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-keys-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">ea8ef39482ca448c95a1313453160d808e9cf2b23b3d8cb641eda123026f8189</sum></package><package arch="noarch" name="yum-plugin-list-data" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-list-data-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">6aeb1e1244fce5ba0540f86bf8c9ada7bc957c350b305bee0e8290bbceed8083</sum></package><package arch="noarch" name="yum-plugin-show-leaves" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-show-leaves-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">ec989d6f04a9d311d6ff0fd54eb918365c7e00c5964c8658d62458317eb34556</sum></package><package arch="noarch" name="yum-plugin-tmprepo" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-tmprepo-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">55ad5fd1b5f614384873f7188b3ccf49338b3d3bee09a09b11a55afb675cf781</sum></package><package arch="noarch" name="yum-plugin-pre-transaction-actions" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-pre-transaction-actions-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">5f100308ade7e873ae87274f28ef96be8842722c789ab2c589f75f3aa153237d</sum></package><package arch="noarch" name="yum-updateonboot" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-updateonboot-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">85f4ecd82c43ed1cdb1afd8fbd69021070947fa8bca8539d75d54cd330abf0f3</sum></package><package arch="noarch" name="yum-plugin-versionlock" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-versionlock-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">eea648f66c83b7d8d083cc59c559579309441e1a337887e757bb99642375b722</sum></package><package arch="noarch" name="yum-plugin-ovl" release="46.el7_5" src="yum-utils-1.1.31-46.el7_5.src.rpm" version="1.1.31"><filename>yum-plugin-ovl-1.1.31-46.el7_5.noarch.rpm</filename><sum type="sha256">8c0c8c0bc65900d4a2759acfe0d7843f9ec90080eaef0475ddf163a651c3f031</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10897" id="CVE-2018-10897" title="Yum-Utils: Reposync: Improper Path Validation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2285" id="RHSA-2018:2285-1" title="Rhsa-2018:2285-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600221" id="1600221" title="Yum-Utils: Reposync: Improper Path Validation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2286-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: insufficient index validation in PatternSyntaxException getMessage() (Concurrency, 8199547) (CVE-2018-2952)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-07-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.15.4.el7_5" src="java-1.7.0-openjdk-1.7.0.191-2.6.15.4.el7_5.src.rpm" version="1.7.0.191"><filename>java-1.7.0-openjdk-accessibility-1.7.0.191-2.6.15.4.el7_5.x86_64.rpm</filename><sum type="sha256">e6757dc36ca62a3057d1e5608189b2ca134d3a49beec2a76e703b56311aafa23</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.15.4.el7_5" src="java-1.7.0-openjdk-1.7.0.191-2.6.15.4.el7_5.src.rpm" version="1.7.0.191"><filename>java-1.7.0-openjdk-headless-1.7.0.191-2.6.15.4.el7_5.x86_64.rpm</filename><sum type="sha256">c0a054609d9f1a00be4430b8bf8b6ef322cffc5cc7fc66c67a6e4d0ddfcc4cfe</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.15.4.el7_5" src="java-1.7.0-openjdk-1.7.0.191-2.6.15.4.el7_5.src.rpm" version="1.7.0.191"><filename>java-1.7.0-openjdk-src-1.7.0.191-2.6.15.4.el7_5.x86_64.rpm</filename><sum type="sha256">980d08f6117c261f63172207191e8cc488d850b5ff6f57ba5d266cf49d44466e</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.15.4.el7_5" src="java-1.7.0-openjdk-1.7.0.191-2.6.15.4.el7_5.src.rpm" version="1.7.0.191"><filename>java-1.7.0-openjdk-devel-1.7.0.191-2.6.15.4.el7_5.x86_64.rpm</filename><sum type="sha256">c629432a39964ea37f470add42bbc5125595716f2a3182f383135741ef6b50e6</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.15.4.el7_5" src="java-1.7.0-openjdk-1.7.0.191-2.6.15.4.el7_5.src.rpm" version="1.7.0.191"><filename>java-1.7.0-openjdk-demo-1.7.0.191-2.6.15.4.el7_5.x86_64.rpm</filename><sum type="sha256">a13ab824b72320eccaf4300973f65382bf62ef9fb2112da39877eeb34cfbb68f</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.15.4.el7_5" src="java-1.7.0-openjdk-1.7.0.191-2.6.15.4.el7_5.src.rpm" version="1.7.0.191"><filename>java-1.7.0-openjdk-javadoc-1.7.0.191-2.6.15.4.el7_5.noarch.rpm</filename><sum type="sha256">2e5c8c2744e97683d660b7f8e527eaf9650a362a34f45871e087efdb67557a12</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.15.4.el7_5" src="java-1.7.0-openjdk-1.7.0.191-2.6.15.4.el7_5.src.rpm" version="1.7.0.191"><filename>java-1.7.0-openjdk-1.7.0.191-2.6.15.4.el7_5.x86_64.rpm</filename><sum type="sha256">fc1b226533324bcc7ea20389a0447410b41281bacea70cafc6f2532864685090</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2952" id="CVE-2018-2952" title="Openjdk: Insufficient Index Validation In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2286" id="RHSA-2018:2286-1" title="Rhsa-2018:2286-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600925" id="1600925" title="Openjdk: Insufficient Index Validation In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2384-1</id><title>Kernel</title><description>Security Fix(es): 
* Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimisation) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks. (CVE-2018-3620, CVE-2018-3646) 
* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side- channel attacks. (CVE-2018-3693) 
* A flaw named SegmentSmack was found in the way the Linux kernel handled specially crafted TCP packets. A remote attacker could use this flaw to trigger time and calculation expensive calls to tcp_collapse_ofo_queue() and tcp_prune_ofo_queue() functions by sending specially modified packets within ongoing TCP sessions which could lead to a CPU saturation and hence a denial of service on the system. Maintaining the denial of service condition requires continuous two-way TCP sessions to a reachable open port, thus the attacks cannot be performed using spoofed IP addresses. (CVE-2018-5390) 
* kernel: crypto: privilege escalation in skcipher_recvmsg function (CVE-2017-13215) 
* kernel: mm: use-after-free in do_get_mempolicy function allows local DoS or other unspecified impact (CVE-2018-10675) 
* kernel: race condition in snd_seq_write() may lead to UAF or OOB access (CVE-2018-7566)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-08-15 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="perf" release="862.11.6.el7" src="kernel-3.10.0-862.11.6.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-862.11.6.el7.x86_64.rpm</filename><sum type="sha256">1d50ab8b547993213c0984f6afcaffc6fff5bcb10959f0aa47c3b38430becc81</sum></package><package arch="x86_64" name="kernel-tools" release="862.11.6.el7" src="kernel-3.10.0-862.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-862.11.6.el7.x86_64.rpm</filename><sum type="sha256">bb8114155a5aa76a386b7f5935fdff1d24087435e2a1dae1a7125910906afa0c</sum></package><package arch="x86_64" name="kernel-headers" release="862.11.6.el7" src="kernel-3.10.0-862.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-862.11.6.el7.x86_64.rpm</filename><sum type="sha256">876f698752e6596f7ffe9df68d0875b7db0858d1bc1e806c8d74bed83aee6ae3</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="862.11.6.el7" src="kernel-3.10.0-862.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-862.11.6.el7.noarch.rpm</filename><sum type="sha256">a59ea9e4f83fceda302fbb8f4a54ad0a9347c24f173298d3571aba9476136f36</sum></package><package arch="x86_64" name="kernel-debug-devel" release="862.11.6.el7" src="kernel-3.10.0-862.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-862.11.6.el7.x86_64.rpm</filename><sum type="sha256">83cc0c0a9d41e922914c3a4aa5f4d29fc1811665d1427875a291bea326a4e857</sum></package><package arch="noarch" name="kernel-doc" release="862.11.6.el7" src="kernel-3.10.0-862.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-862.11.6.el7.noarch.rpm</filename><sum type="sha256">91dfa6ece8b083233b19d3f2649429b7c7f8f04e04900b1cd3ce2a27fec624da</sum></package><package arch="x86_64" name="python-perf" release="862.11.6.el7" src="kernel-3.10.0-862.11.6.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-862.11.6.el7.x86_64.rpm</filename><sum type="sha256">232652ec432f17aa3f76db1738d5e5483fe81f2d7296ccd7c6a09931def1c84d</sum></package><package arch="x86_64" name="kernel" release="862.11.6.el7" src="kernel-3.10.0-862.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-862.11.6.el7.x86_64.rpm</filename><sum type="sha256">e37d8fb2752cf6b60b60fa3756b7aec75062d7e56a1bed06adfe3e0d60661a12</sum></package><package arch="x86_64" name="kernel-devel" release="862.11.6.el7" src="kernel-3.10.0-862.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-862.11.6.el7.x86_64.rpm</filename><sum type="sha256">d95f60d1e39c73614aee3f5f5ea45310f06f2f3a22d47a5c65df84bf64215873</sum></package><package arch="x86_64" name="kernel-tools-libs" release="862.11.6.el7" src="kernel-3.10.0-862.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-862.11.6.el7.x86_64.rpm</filename><sum type="sha256">0067d936364b401d7a151811e3ec130d0a096c1fb6e441cc41ba3da260d56459</sum></package><package arch="x86_64" name="kernel-debug" release="862.11.6.el7" src="kernel-3.10.0-862.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-862.11.6.el7.x86_64.rpm</filename><sum type="sha256">a9e25378daeaf1b00bd304e355f1fcaef78e8be074e7c250e2ad7d47703196e7</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="862.11.6.el7" src="kernel-3.10.0-862.11.6.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-862.11.6.el7.x86_64.rpm</filename><sum type="sha256">e2acd50a4fd5931910b94df76fafecdb3af298f2d9213aea49dd6abe1722fd07</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-13215" id="CVE-2017-13215" title="Kernel: Crypto: Privilege Escalation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10675" id="CVE-2018-10675" title="Kernel: Use-After-Free Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3646" id="CVE-2018-3646" title="Kernel: Hw: Cpu: L1 Terminal Fault (L1Tf)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3693" id="CVE-2018-3693" title="Kernel: Speculative Bounds Check Bypass Store" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5390" id="CVE-2018-5390" title="Kernel: Tcp Segments With Random Offsets Allow A " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7566" id="CVE-2018-7566" title="Kernel: Race Condition In Snd_Seq_Write() May " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2384" id="RHSA-2018:2384-1" title="Rhsa-2018:2384-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1535173" id="1535173" title="Kernel: Crypto: Privilege Escalation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1550142" id="1550142" title="Kernel: Race Condition In Snd_Seq_Write() May " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1575065" id="1575065" title="Kernel: Use-After-Free Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1581650" id="1581650" title="Kernel: Speculative Bounds Check Bypass Store" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1585005" id="1585005" title="Kernel: Hw: Cpu: L1 Terminal Fault (L1Tf)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1601704" id="1601704" title="Kernel: Tcp Segments With Random Offsets Allow A " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2439-1</id><title>Mariadb</title><description>The following packages have been upgraded to a later upstream version: mariadb (5.5.60). 
Security Fix(es): 
* mysql: Client programs unspecified vulnerability (CPU Jul 2017) (CVE-2017-3636) 
* mysql: Server: DML unspecified vulnerability (CPU Jul 2017) (CVE-2017-3641) 
* mysql: Client mysqldump unspecified vulnerability (CPU Jul 2017) (CVE-2017-3651) 
* mysql: Server: Replication unspecified vulnerability (CPU Oct 2017) (CVE-2017-10268) 
* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2017) (CVE-2017-10378) 
* mysql: Client programs unspecified vulnerability (CPU Oct 2017) (CVE-2017-10379) 
* mysql: Server: DDL unspecified vulnerability (CPU Oct 2017) (CVE-2017-10384) 
* mysql: Server: Partition unspecified vulnerability (CPU Jan 2018) (CVE-2018-2562) 
* mysql: Server: DDL unspecified vulnerability (CPU Jan 2018) (CVE-2018-2622) 
* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) (CVE-2018-2640) 
* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) (CVE-2018-2665) 
* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2018) (CVE-2018-2668) 
* mysql: Server: Replication unspecified vulnerability (CPU Apr 2018) (CVE-2018-2755) 
* mysql: Client programs unspecified vulnerability (CPU Apr 2018) (CVE-2018-2761) 
* mysql: Server: Locking unspecified vulnerability (CPU Apr 2018) (CVE-2018-2771) 
* mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2018) (CVE-2018-2781) 
* mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) (CVE-2018-2813) 
* mysql: Server: DDL unspecified vulnerability (CPU Apr 2018) (CVE-2018-2817) 
* mysql: InnoDB unspecified vulnerability (CPU Apr 2018) (CVE-2018-2819) 
* mysql: Server: DDL unspecified vulnerability (CPU Jul 2017) (CVE-2017-3653) 
* mysql: use of SSL/TLS not enforced in libmysqld (Return of BACKRONYM) (CVE-2018-2767) 
Bug Fix(es): 
* Previously, the mysqladmin tool waited for an inadequate length of time if the socket it listened on did not respond in a specific way. Consequently, when the socket was used while the MariaDB server was starting, the mariadb service became unresponsive for a long time. With this update, the mysqladmin timeout has been shortened to 2 seconds. As a result, the mariadb service either starts or fails but no longer hangs in the described situation.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-08-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="mariadb-test" release="1.el7_5" src="mariadb-5.5.60-1.el7_5.src.rpm" version="5.5.60"><filename>mariadb-test-5.5.60-1.el7_5.x86_64.rpm</filename><sum type="sha256">38bcf2fe9ac262c3332b175e5e2b6a4ed3a1698d1048397e30e440c0bae390f1</sum></package><package arch="x86_64" epoch="1" name="mariadb" release="1.el7_5" src="mariadb-5.5.60-1.el7_5.src.rpm" version="5.5.60"><filename>mariadb-5.5.60-1.el7_5.x86_64.rpm</filename><sum type="sha256">f508c29b492453157f2531e040137de9d9cd79d2be85437e0ded135173ac33bf</sum></package><package arch="i686" epoch="1" name="mariadb-devel" release="1.el7_5" src="mariadb-5.5.60-1.el7_5.src.rpm" version="5.5.60"><filename>mariadb-devel-5.5.60-1.el7_5.i686.rpm</filename><sum type="sha256">727cd5f83a8fd452c0f734795fd6e4cd3b2bbdb7fb3e07f06137269e582cd46b</sum></package><package arch="x86_64" epoch="1" name="mariadb-libs" release="1.el7_5" src="mariadb-5.5.60-1.el7_5.src.rpm" version="5.5.60"><filename>mariadb-libs-5.5.60-1.el7_5.x86_64.rpm</filename><sum type="sha256">7ff819fcf7e5d533e026e233e012c5fd4d695fffa568bb898b2e45d3b5579285</sum></package><package arch="i686" epoch="1" name="mariadb-embedded-devel" release="1.el7_5" src="mariadb-5.5.60-1.el7_5.src.rpm" version="5.5.60"><filename>mariadb-embedded-devel-5.5.60-1.el7_5.i686.rpm</filename><sum type="sha256">cf895464d76189eb8129ee09f22f5c2b6e47ddb1f8eb0ce395ef66a12b03aa78</sum></package><package arch="x86_64" epoch="1" name="mariadb-embedded-devel" release="1.el7_5" src="mariadb-5.5.60-1.el7_5.src.rpm" version="5.5.60"><filename>mariadb-embedded-devel-5.5.60-1.el7_5.x86_64.rpm</filename><sum type="sha256">a67e40ee7758a3704ff9601bfdde988c9dc560529e564adeee131b11fda886f5</sum></package><package arch="x86_64" epoch="1" name="mariadb-embedded" release="1.el7_5" src="mariadb-5.5.60-1.el7_5.src.rpm" version="5.5.60"><filename>mariadb-embedded-5.5.60-1.el7_5.x86_64.rpm</filename><sum type="sha256">2359addb39309cb80a0ffee7c63961aef7386511673e7ec65092c59bc34cb1d8</sum></package><package arch="x86_64" epoch="1" name="mariadb-bench" release="1.el7_5" src="mariadb-5.5.60-1.el7_5.src.rpm" version="5.5.60"><filename>mariadb-bench-5.5.60-1.el7_5.x86_64.rpm</filename><sum type="sha256">b13e9ac9f4d5d9537597c754118e7e0eb73c3f30c5ea7e56e589b8216678dc99</sum></package><package arch="i686" epoch="1" name="mariadb-libs" release="1.el7_5" src="mariadb-5.5.60-1.el7_5.src.rpm" version="5.5.60"><filename>mariadb-libs-5.5.60-1.el7_5.i686.rpm</filename><sum type="sha256">00aca1e927efca6bbfad7fe393cb34c30ae92563c05f1fa15d762634e9930996</sum></package><package arch="x86_64" epoch="1" name="mariadb-server" release="1.el7_5" src="mariadb-5.5.60-1.el7_5.src.rpm" version="5.5.60"><filename>mariadb-server-5.5.60-1.el7_5.x86_64.rpm</filename><sum type="sha256">500a9e2da6a9297d5826d74593930df88e53146a13839cb22cd985dc34a19f4f</sum></package><package arch="i686" epoch="1" name="mariadb-embedded" release="1.el7_5" src="mariadb-5.5.60-1.el7_5.src.rpm" version="5.5.60"><filename>mariadb-embedded-5.5.60-1.el7_5.i686.rpm</filename><sum type="sha256">2a1c1be030c4914deafea0f850e5d8d21bc50101e8680786a4dea806d0c55c34</sum></package><package arch="x86_64" epoch="1" name="mariadb-devel" release="1.el7_5" src="mariadb-5.5.60-1.el7_5.src.rpm" version="5.5.60"><filename>mariadb-devel-5.5.60-1.el7_5.x86_64.rpm</filename><sum type="sha256">f45f3497f9236508d49e668e682bb95a2ffdeb0facd88a885549933574b0a9c9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10268" id="CVE-2017-10268" title="Mysql: Server: Replication Unspecified Vulnerability (Cpu Oct 2017)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10378" id="CVE-2017-10378" title="Mysql: Server: Optimizer Unspecified Vulnerability (Cpu Oct 2017)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10379" id="CVE-2017-10379" title="Mysql: Client Programs Unspecified Vulnerability (Cpu Oct 2017)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10384" id="CVE-2017-10384" title="Mysql: Server: Ddl Unspecified Vulnerability (Cpu Oct 2017)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3636" id="CVE-2017-3636" title="Mysql: Client Programs Unspecified Vulnerability (Cpu Jul 2017)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3641" id="CVE-2017-3641" title="Mysql: Server: Dml Unspecified Vulnerability (Cpu Jul 2017)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3651" id="CVE-2017-3651" title="Mysql: Client Mysqldump Unspecified " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3653" id="CVE-2017-3653" title="Mysql: Server: Ddl Unspecified Vulnerability (Cpu Jul 2017)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2562" id="CVE-2018-2562" title="Mysql: Server : Partition Unspecified Vulnerability (Cpu Jan 2018)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2622" id="CVE-2018-2622" title="Mysql: Server: Ddl Unspecified Vulnerability (Cpu Jan 2018)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2640" id="CVE-2018-2640" title="Mysql: Server: Optimizer Unspecified Vulnerability (Cpu Jan 2018)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2665" id="CVE-2018-2665" title="Mysql: Server: Optimizer Unspecified Vulnerability (Cpu Jan 2018)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2668" id="CVE-2018-2668" title="Mysql: Server: Optimizer Unspecified Vulnerability (Cpu Jan 2018)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2755" id="CVE-2018-2755" title="Mysql: Server: Replication Unspecified Vulnerability (Cpu Apr 2018)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2761" id="CVE-2018-2761" title="Mysql: Client Programs Unspecified Vulnerability (Cpu Apr 2018)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2767" id="CVE-2018-2767" title="Mysql: Use Of Ssl/Tls Not Enforced In Libmysqld " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2771" id="CVE-2018-2771" title="Mysql: Server: Locking Unspecified Vulnerability (Cpu Apr 2018)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2781" id="CVE-2018-2781" title="Mysql: Server: Optimizer Unspecified Vulnerability (Cpu Apr 2018)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2813" id="CVE-2018-2813" title="Mysql: Server: Ddl Unspecified Vulnerability (Cpu Apr 2018)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2817" id="CVE-2018-2817" title="Mysql: Server: Ddl Unspecified Vulnerability (Cpu Apr 2018)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2819" id="CVE-2018-2819" title="Mysql: Innodb Unspecified Vulnerability (Cpu Apr 2018)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2439" id="RHSA-2018:2439-1" title="Rhsa-2018:2439-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472686" id="1472686" title="Mysql: Client Programs Unspecified Vulnerability (Cpu Jul 2017)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472693" id="1472693" title="Mysql: Server: Dml Unspecified Vulnerability (Cpu Jul 2017)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472708" id="1472708" title="Mysql: Client Mysqldump Unspecified " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472711" id="1472711" title="Mysql: Server: Ddl Unspecified Vulnerability (Cpu Jul 2017)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1503656" id="1503656" title="Mysql: Server: Replication Unspecified Vulnerability (Cpu Oct 2017)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1503684" id="1503684" title="Mysql: Server: Optimizer Unspecified Vulnerability (Cpu Oct 2017)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1503685" id="1503685" title="Mysql: Client Programs Unspecified Vulnerability (Cpu Oct 2017)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1503686" id="1503686" title="Mysql: Server: Ddl Unspecified Vulnerability (Cpu Oct 2017)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1535484" id="1535484" title="Mysql: Server : Partition Unspecified Vulnerability (Cpu Jan 2018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1535499" id="1535499" title="Mysql: Server: Ddl Unspecified Vulnerability (Cpu Jan 2018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1535500" id="1535500" title="Mysql: Server: Optimizer Unspecified Vulnerability (Cpu Jan 2018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1535504" id="1535504" title="Mysql: Server: Optimizer Unspecified Vulnerability (Cpu Jan 2018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1535506" id="1535506" title="Mysql: Server: Optimizer Unspecified Vulnerability (Cpu Jan 2018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564965" id="1564965" title="Mysql: Use Of Ssl/Tls Not Enforced In Libmysqld " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568921" id="1568921" title="Mysql: Server: Replication Unspecified Vulnerability (Cpu Apr 2018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568924" id="1568924" title="Mysql: Client Programs Unspecified Vulnerability (Cpu Apr 2018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568931" id="1568931" title="Mysql: Server: Locking Unspecified Vulnerability (Cpu Apr 2018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568942" id="1568942" title="Mysql: Server: Optimizer Unspecified Vulnerability (Cpu Apr 2018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568951" id="1568951" title="Mysql: Server: Ddl Unspecified Vulnerability (Cpu Apr 2018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568954" id="1568954" title="Mysql: Server: Ddl Unspecified Vulnerability (Cpu Apr 2018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568956" id="1568956" title="Mysql: Innodb Unspecified Vulnerability (Cpu Apr 2018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1584023" id="1584023" title="Systemctl Start Mariadb - Hangs If Sock File Is Used By " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2462-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams (CVE-2018-11806) 
* QEMU: i386: multiboot OOB access while loading kernel image (CVE-2018-7550) 
Bug Fix(es): 
* Previously, live migrating a Windows guest in some cases caused the guest to become unresponsive. This update ensures that Real-time Clock (RTC) interrupts are not missed, which prevents the problem from occurring.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-08-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm" release="156.el7_5.5" src="qemu-kvm-1.5.3-156.el7_5.5.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-156.el7_5.5.x86_64.rpm</filename><sum type="sha256">ce06ba9e207c2d6c7f52fbfa05de9a127aa7703ca77fae805aaa2cc016365c23</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="156.el7_5.5" src="qemu-kvm-1.5.3-156.el7_5.5.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-156.el7_5.5.x86_64.rpm</filename><sum type="sha256">d2a6b1deaa81a78d675ebb6fb26fd4cc5cb8de37f23eff1ed8f4ae509823db06</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="156.el7_5.5" src="qemu-kvm-1.5.3-156.el7_5.5.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-156.el7_5.5.x86_64.rpm</filename><sum type="sha256">4112db92af431a14ef7dbc6e1c2fef601418086954c0503aee5fd7d9d0cdb9b8</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="156.el7_5.5" src="qemu-kvm-1.5.3-156.el7_5.5.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-156.el7_5.5.x86_64.rpm</filename><sum type="sha256">5ad2c8831e1417cc6137e301f5ad5b9f964a49f0d98c1d34f2a91387ea02fc29</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11806" id="CVE-2018-11806" title="Qemu: Slirp: Heap Buffer Overflow While " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7550" id="CVE-2018-7550" title="Qemu: I386: Multiboot Oob Access While Loading Kernel Image" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2462" id="RHSA-2018:2462-1" title="Rhsa-2018:2462-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549798" id="1549798" title="Qemu: I386: Multiboot Oob Access While Loading Kernel Image" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1586245" id="1586245" title="Qemu: Slirp: Heap Buffer Overflow While " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2526-1</id><title>Mutt</title><description>Security Fix(es): 
* mutt: Remote code injection vulnerability to an IMAP mailbox (CVE-2018-14354) 
* mutt: Remote Code Execution via backquote characters (CVE-2018-14357) 
* mutt: POP body caching path traversal vulnerability (CVE-2018-14362)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-08-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="5" name="mutt" release="28.el7_5" src="mutt-1.5.21-28.el7_5.src.rpm" version="1.5.21"><filename>mutt-1.5.21-28.el7_5.x86_64.rpm</filename><sum type="sha256">e5e55dcceab196575a04a2d46b833e825e0807feaaddee6c2e30f9ca542d0c8a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14354" id="CVE-2018-14354" title="Mutt: Remote Code Injection Vulnerability To An " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14357" id="CVE-2018-14357" title="Mutt: Remote Code Execution Via Backquote " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14362" id="CVE-2018-14362" title="Mutt: Pop Body Caching Path Traversal Vulnerability" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2526" id="RHSA-2018:2526-1" title="Rhsa-2018:2526-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1602069" id="1602069" title="Mutt: Remote Code Injection Vulnerability To An " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1602079" id="1602079" title="Mutt: Pop Body Caching Path Traversal Vulnerability" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1602915" id="1602915" title="Mutt: Remote Code Execution Via Backquote " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2557-1</id><title>Postgresql</title><description>The following packages have been upgraded to a later upstream version: postgresql (9.2.24). 
Security Fix(es): 
* postgresql: Certain host connection parameters defeat client-side security defenses (CVE-2018-10915)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-08-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="postgresql-static" release="1.el7_5" src="postgresql-9.2.24-1.el7_5.src.rpm" version="9.2.24"><filename>postgresql-static-9.2.24-1.el7_5.i686.rpm</filename><sum type="sha256">2ce91a39e3da43018572fa9746d1089f1a40eb01099d13bc1c2e18b685fc0141</sum></package><package arch="x86_64" name="postgresql-server" release="1.el7_5" src="postgresql-9.2.24-1.el7_5.src.rpm" version="9.2.24"><filename>postgresql-server-9.2.24-1.el7_5.x86_64.rpm</filename><sum type="sha256">9bcc33e5e4235f6d908db74d7b0dd3576a2fd049101852f9e07ce0f3ba52a09c</sum></package><package arch="x86_64" name="postgresql-devel" release="1.el7_5" src="postgresql-9.2.24-1.el7_5.src.rpm" version="9.2.24"><filename>postgresql-devel-9.2.24-1.el7_5.x86_64.rpm</filename><sum type="sha256">1c27362d280bc88569b987782ebaacda2da116d914303256ca3c447e738fc612</sum></package><package arch="x86_64" name="postgresql-upgrade" release="1.el7_5" src="postgresql-9.2.24-1.el7_5.src.rpm" version="9.2.24"><filename>postgresql-upgrade-9.2.24-1.el7_5.x86_64.rpm</filename><sum type="sha256">3a5bedee456ab20d2505ad427abfd45470ce0b17ffaea4733f926eafb16d630e</sum></package><package arch="x86_64" name="postgresql-libs" release="1.el7_5" src="postgresql-9.2.24-1.el7_5.src.rpm" version="9.2.24"><filename>postgresql-libs-9.2.24-1.el7_5.x86_64.rpm</filename><sum type="sha256">eca17b97bcdb5b6d6757e8eba5cd9037844449e8d3df1950132df9ede59ad50e</sum></package><package arch="x86_64" name="postgresql-plperl" release="1.el7_5" src="postgresql-9.2.24-1.el7_5.src.rpm" version="9.2.24"><filename>postgresql-plperl-9.2.24-1.el7_5.x86_64.rpm</filename><sum type="sha256">981beb22ff82a8ecf62e63566a6eade0bc72234635c6709383374a3ddfb588c3</sum></package><package arch="i686" name="postgresql-libs" release="1.el7_5" src="postgresql-9.2.24-1.el7_5.src.rpm" version="9.2.24"><filename>postgresql-libs-9.2.24-1.el7_5.i686.rpm</filename><sum type="sha256">f09717108f448086adf200722c02204a844b3dff7743e5a5e1a8c89a8800fd15</sum></package><package arch="x86_64" name="postgresql-docs" release="1.el7_5" src="postgresql-9.2.24-1.el7_5.src.rpm" version="9.2.24"><filename>postgresql-docs-9.2.24-1.el7_5.x86_64.rpm</filename><sum type="sha256">e7ac3609ed5eb5856f60b4153c293d6d8264ec228678fb9084ec758535facb33</sum></package><package arch="i686" name="postgresql" release="1.el7_5" src="postgresql-9.2.24-1.el7_5.src.rpm" version="9.2.24"><filename>postgresql-9.2.24-1.el7_5.i686.rpm</filename><sum type="sha256">0972ef973f1d2f5d8dfc1fb7b605346a9f4674940dfa6cbf789235326b4cae2d</sum></package><package arch="x86_64" name="postgresql-contrib" release="1.el7_5" src="postgresql-9.2.24-1.el7_5.src.rpm" version="9.2.24"><filename>postgresql-contrib-9.2.24-1.el7_5.x86_64.rpm</filename><sum type="sha256">638456929914cffdf4006b6ca751554b774e6a37ac61ee97a00d7044fe802bf2</sum></package><package arch="x86_64" name="postgresql-test" release="1.el7_5" src="postgresql-9.2.24-1.el7_5.src.rpm" version="9.2.24"><filename>postgresql-test-9.2.24-1.el7_5.x86_64.rpm</filename><sum type="sha256">f60ce91403680931b9a68dfd678edc3d0af56a855b9db8f9abb246dc7f91274d</sum></package><package arch="x86_64" name="postgresql-plpython" release="1.el7_5" src="postgresql-9.2.24-1.el7_5.src.rpm" version="9.2.24"><filename>postgresql-plpython-9.2.24-1.el7_5.x86_64.rpm</filename><sum type="sha256">f3020f80369b40d16a3dfc4d485db3faa926bf78487e04584814bf3129b1a9a5</sum></package><package arch="x86_64" name="postgresql-static" release="1.el7_5" src="postgresql-9.2.24-1.el7_5.src.rpm" version="9.2.24"><filename>postgresql-static-9.2.24-1.el7_5.x86_64.rpm</filename><sum type="sha256">eaa4385646fd0d2c1a8159bd116479ae8354c66a4b83159e351d4b4bc6440d47</sum></package><package arch="x86_64" name="postgresql-pltcl" release="1.el7_5" src="postgresql-9.2.24-1.el7_5.src.rpm" version="9.2.24"><filename>postgresql-pltcl-9.2.24-1.el7_5.x86_64.rpm</filename><sum type="sha256">f0cebcae0d0739b2a25c0d3875897f6347df0e64fc55e25963bd3da6c0966153</sum></package><package arch="x86_64" name="postgresql" release="1.el7_5" src="postgresql-9.2.24-1.el7_5.src.rpm" version="9.2.24"><filename>postgresql-9.2.24-1.el7_5.x86_64.rpm</filename><sum type="sha256">65a2ed539702ddee95c2c1b82a84294e9a3201825b8c58558faee549626a1c8f</sum></package><package arch="i686" name="postgresql-devel" release="1.el7_5" src="postgresql-9.2.24-1.el7_5.src.rpm" version="9.2.24"><filename>postgresql-devel-9.2.24-1.el7_5.i686.rpm</filename><sum type="sha256">21d0f390b804196016bc95a9ab829f59be8b0d4c4ec1b5fa5a68425305942cd6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10915" id="CVE-2018-10915" title="Postgresql: Certain Host Connection Parameters " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2557" id="RHSA-2018:2557-1" title="Rhsa-2018:2557-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1609891" id="1609891" title="Postgresql: Certain Host Connection Parameters " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2570-1</id><title>Bind</title><description>Security Fix(es): 
* bind: processing of certain records when "deny-answer-aliases" is in use may trigger an assert leading to a denial of service (CVE-2018-5740)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-08-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-chroot" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-chroot-9.9.4-61.el7_5.1.x86_64.rpm</filename><sum type="sha256">d5d9c2927f55928ba55ae64ddcee781e389fc53e52fe51ffbbb2429fc1acb62e</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-61.el7_5.1.x86_64.rpm</filename><sum type="sha256">8a7b1ec53b125758b3a836d6f66b91ed7dee20d6bc39e0ddf4d872a8c48001ce</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-61.el7_5.1.x86_64.rpm</filename><sum type="sha256">2a82d4e4ca76c264e21aa27ef2ed1c8cd00975a0f9e840559b3e989983662124</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-61.el7_5.1.i686.rpm</filename><sum type="sha256">e79310658f598b13900702bba6a0568dc7d0b3d1c8f0a954b37b13cf6be31f4e</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-61.el7_5.1.x86_64.rpm</filename><sum type="sha256">d269f8132152ecb98f3badab69e1f9402dd432d1a9d89b4be3231f8ffc851bde</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-sdb-9.9.4-61.el7_5.1.x86_64.rpm</filename><sum type="sha256">0838819d4c3cb2747546111d505fcea519a18d306d62ad4f529abf6e6c4ed33c</sum></package><package arch="i686" epoch="32" name="bind-devel" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-61.el7_5.1.i686.rpm</filename><sum type="sha256">0142f0bf6d9c9c3c3dce8a3f371f2064b5015de8b9d9e3ddef05168fe9e59907</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-9.9.4-61.el7_5.1.x86_64.rpm</filename><sum type="sha256">e196fdff3a975d42d7007268b4974da024c14b90a1d33d2b0757562c71a90b38</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-61.el7_5.1.i686.rpm</filename><sum type="sha256">966387d214f0cf5f0f0fa0876da6745d825def47ca8b038ae2b464c4f42521cd</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-61.el7_5.1.x86_64.rpm</filename><sum type="sha256">8150978cdfaa82d551bfda2bb796f14adb52f152d12ecc174742db7d62a9fc5d</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-61.el7_5.1.x86_64.rpm</filename><sum type="sha256">c36f644908ceff19ad5d8f95db24b290c7d5ffd0e0dd97b25fcf144709686d69</sum></package><package arch="noarch" epoch="32" name="bind-license" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-license-9.9.4-61.el7_5.1.noarch.rpm</filename><sum type="sha256">2ce8d8c9884afc9f476a5dbb1052258ab19faf6e17db44823ef180cd3ea3f9ab</sum></package><package arch="x86_64" epoch="32" name="bind" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-9.9.4-61.el7_5.1.x86_64.rpm</filename><sum type="sha256">1b290ec5e31ab558a141a0aec353929504665642cb0fbebe9efc01eba031a62e</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-61.el7_5.1.x86_64.rpm</filename><sum type="sha256">449a71b1eff617a64db8809362dfa28b6ca627a26b8e0336f407898054dcc6c6</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-utils-9.9.4-61.el7_5.1.x86_64.rpm</filename><sum type="sha256">8dfa83be41e1577b1808219c79106753e1eec92639ef26428264cada600e2874</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-sdb-chroot-9.9.4-61.el7_5.1.x86_64.rpm</filename><sum type="sha256">3034cfcc06766a575b430713ebd2662fecdc4ae4736c0db9707628525c6d7e90</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-61.el7_5.1.i686.rpm</filename><sum type="sha256">49eae997a99519d211c6daec0224a0c3d71367924b8340619f1df3a83c9dc6d0</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-utils-9.9.4-61.el7_5.1.x86_64.rpm</filename><sum type="sha256">8062dbd29c39b6d22a0dea93ea68fb381e1ae2d2118d0d16565cf960eba1efb0</sum></package><package arch="i686" epoch="32" name="bind-libs" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-61.el7_5.1.i686.rpm</filename><sum type="sha256">482b59edb3f828cc4ae8cbca899d0f6c6a4465fb0da7d748c8a2c70541a66d91</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="61.el7_5.1" src="bind-9.9.4-61.el7_5.1.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-61.el7_5.1.i686.rpm</filename><sum type="sha256">7c7844cb5897428e2266037a30b68c38aa8daa5176f169641d70ac5c9318765b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5740" id="CVE-2018-5740" title="Bind: Processing Of Certain Records When " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2570" id="RHSA-2018:2570-1" title="Rhsa-2018:2570-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1613595" id="1613595" title="Bind: Processing Of Certain Records When " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2692-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.2.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 (CVE-2018-12376) 
* Mozilla: Use-after-free in driver timers (CVE-2018-12377) 
* Mozilla: Use-after-free in IndexedDB (CVE-2018-12378) 
* Mozilla: Proxy bypass using automount and autofs (CVE-2017-16541) 
* Mozilla: Out-of-bounds write with malicious MAR file (CVE-2018-12379)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2018-09-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_5" src="firefox-60.2.0-1.el7_5.src.rpm" version="60.2.0"><filename>firefox-60.2.0-1.el7_5.i686.rpm</filename><sum type="sha256">91fb1976cfacee22d33fa1c142a57cfc55ebeb28fbe101dde229b39e7407ef5d</sum></package><package arch="x86_64" name="firefox" release="1.el7_5" src="firefox-60.2.0-1.el7_5.src.rpm" version="60.2.0"><filename>firefox-60.2.0-1.el7_5.x86_64.rpm</filename><sum type="sha256">abb9accf1ee035cc0350b9bed8908908d660a7d1aaec6cb9e930193426b9b0e6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16541" id="CVE-2017-16541" title="Mozilla: Proxy Bypass Using Automount And Autofs" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12376" id="CVE-2018-12376" title="Mozilla: Memory Safety Bugs Fixed In Firefox 62 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12377" id="CVE-2018-12377" title="Mozilla: Use-After-Free In Driver Timers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12378" id="CVE-2018-12378" title="Mozilla: Use-After-Free In Indexeddb" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12379" id="CVE-2018-12379" title="Mozilla: Out-Of-Bounds Write With Malicious Mar " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2692" id="RHSA-2018:2692-1" title="Rhsa-2018:2692-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1510816" id="1510816" title="Mozilla: Proxy Bypass Using Automount And Autofs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625525" id="1625525" title="Mozilla: Memory Safety Bugs Fixed In Firefox 62 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625526" id="1625526" title="Mozilla: Use-After-Free In Driver Timers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625527" id="1625527" title="Mozilla: Use-After-Free In Indexeddb" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625528" id="1625528" title="Mozilla: Out-Of-Bounds Write With Malicious Mar " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2731-1</id><title>Spice And Spice-Gtk</title><description>The spice-gtk packages provide a GIMP Toolkit (GTK+) widget for Simple Protocol for Independent Computing Environments (SPICE) clients. Both Virtual Machine Manager and Virtual Machine Viewer can make use of this widget to access virtual machines using the SPICE protocol. 
Security Fix(es): 
* spice: Missing check in demarshal.py:write_validate_array_item() allows for buffer overflow and denial of service (CVE-2018-10873) 
This issue was discovered by Frediano Ziglio (Red Hat).</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-09-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="spice-gtk3-vala" release="3.el7_5.2" src="spice-gtk-0.34-3.el7_5.2.src.rpm" version="0.34"><filename>spice-gtk3-vala-0.34-3.el7_5.2.x86_64.rpm</filename><sum type="sha256">5ce89ca8f747fdfab53f13bd459296328fc9ee9b3145a840196bc6cae160c55c</sum></package><package arch="i686" name="spice-gtk3-devel" release="3.el7_5.2" src="spice-gtk-0.34-3.el7_5.2.src.rpm" version="0.34"><filename>spice-gtk3-devel-0.34-3.el7_5.2.i686.rpm</filename><sum type="sha256">aeec46af8a66bc1571b6f8abb12256556b0e9c2f9e91bbc0df68aa840fdb35d6</sum></package><package arch="x86_64" name="spice-gtk-tools" release="3.el7_5.2" src="spice-gtk-0.34-3.el7_5.2.src.rpm" version="0.34"><filename>spice-gtk-tools-0.34-3.el7_5.2.x86_64.rpm</filename><sum type="sha256">1c9bd38161a098c54b71968d43698a3ead49eb7f872fff1347a3cf414e6aaaff</sum></package><package arch="x86_64" name="spice-server-devel" release="2.el7_5.5" src="spice-0.14.0-2.el7_5.5.src.rpm" version="0.14.0"><filename>spice-server-devel-0.14.0-2.el7_5.5.x86_64.rpm</filename><sum type="sha256">4dd2f6168c274b5ac957d78531933dcb843e94638a4acb226fc96657e8e52c8f</sum></package><package arch="x86_64" name="spice-gtk3-devel" release="3.el7_5.2" src="spice-gtk-0.34-3.el7_5.2.src.rpm" version="0.34"><filename>spice-gtk3-devel-0.34-3.el7_5.2.x86_64.rpm</filename><sum type="sha256">0a9b1aadb03140ef059b2500f87c94af6ae2dd65a70fecd96cd3a1974db9f3c0</sum></package><package arch="x86_64" name="spice-glib" release="3.el7_5.2" src="spice-gtk-0.34-3.el7_5.2.src.rpm" version="0.34"><filename>spice-glib-0.34-3.el7_5.2.x86_64.rpm</filename><sum type="sha256">4abdb676bcc7ca9aa26cb0e90c9920fdbc0727b67044a0e70e6ea0c69ead7505</sum></package><package arch="x86_64" name="spice-gtk3" release="3.el7_5.2" src="spice-gtk-0.34-3.el7_5.2.src.rpm" version="0.34"><filename>spice-gtk3-0.34-3.el7_5.2.x86_64.rpm</filename><sum type="sha256">0332139317f8b722d224025468911797d0190a347df7bf165ad2bb47e960132a</sum></package><package arch="x86_64" name="spice-glib-devel" release="3.el7_5.2" src="spice-gtk-0.34-3.el7_5.2.src.rpm" version="0.34"><filename>spice-glib-devel-0.34-3.el7_5.2.x86_64.rpm</filename><sum type="sha256">05a07b828b51068ad13cff187fe81301758cd7e2d60baa106b88263300af50db</sum></package><package arch="i686" name="spice-glib" release="3.el7_5.2" src="spice-gtk-0.34-3.el7_5.2.src.rpm" version="0.34"><filename>spice-glib-0.34-3.el7_5.2.i686.rpm</filename><sum type="sha256">4802ce64cd1ce27b1d43e5cb667945201faa87112868e421628bb61dbc1e0fd0</sum></package><package arch="i686" name="spice-gtk3" release="3.el7_5.2" src="spice-gtk-0.34-3.el7_5.2.src.rpm" version="0.34"><filename>spice-gtk3-0.34-3.el7_5.2.i686.rpm</filename><sum type="sha256">9e758c9ad893012e9efc57083326654785b2f88a77d187765a30b976e1ea56d2</sum></package><package arch="x86_64" name="spice-server" release="2.el7_5.5" src="spice-0.14.0-2.el7_5.5.src.rpm" version="0.14.0"><filename>spice-server-0.14.0-2.el7_5.5.x86_64.rpm</filename><sum type="sha256">1daab9622b8ccf7bc80263339911605046b72225ce97bd7ec7a37c16cbe0de4c</sum></package><package arch="i686" name="spice-glib-devel" release="3.el7_5.2" src="spice-gtk-0.34-3.el7_5.2.src.rpm" version="0.34"><filename>spice-glib-devel-0.34-3.el7_5.2.i686.rpm</filename><sum type="sha256">2172c6bfc0756f3d756a49fdcab4e8c0df9a20ad198e158e71637a3b5af5cb07</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10873" id="CVE-2018-10873" title="Spice: Missing Check In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2731" id="RHSA-2018:2731-1" title="Rhsa-2018:2731-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1596008" id="1596008" title="Spice: Missing Check In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2748-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: Integer overflow in Linux's create_elf_tables function (CVE-2018-14634)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-09-26 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-headers" release="862.14.4.el7" src="kernel-3.10.0-862.14.4.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-862.14.4.el7.x86_64.rpm</filename><sum type="sha256">e1b11851990dc6be3bc94c39b98ba9e750a8726200ca333b1b35570c1d3cd4ce</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="862.14.4.el7" src="kernel-3.10.0-862.14.4.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-862.14.4.el7.x86_64.rpm</filename><sum type="sha256">ecc8cc88f352be8576f8a9d04767feaef3c6e526370cf43726bae8c0ab1e0594</sum></package><package arch="x86_64" name="kernel-debug-devel" release="862.14.4.el7" src="kernel-3.10.0-862.14.4.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-862.14.4.el7.x86_64.rpm</filename><sum type="sha256">f2eaf8a776c5745b22ae26bcfed73f70ebcb09d7d0b8575f0c83f5ca1ac19cb1</sum></package><package arch="x86_64" name="kernel-tools" release="862.14.4.el7" src="kernel-3.10.0-862.14.4.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-862.14.4.el7.x86_64.rpm</filename><sum type="sha256">e7a81284629734bb8101add02393c8df12e06e9406f2967055f3b63883649f4b</sum></package><package arch="noarch" name="kernel-doc" release="862.14.4.el7" src="kernel-3.10.0-862.14.4.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-862.14.4.el7.noarch.rpm</filename><sum type="sha256">2f93b37bf9976e3c6db89ab92a0aed5ead7a58ec03ec7afbbde54ab0ae2449a6</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="862.14.4.el7" src="kernel-3.10.0-862.14.4.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-862.14.4.el7.noarch.rpm</filename><sum type="sha256">efcd4777e8cd2f426fd3a41556206f86102cb702765736b5fd9a80da000697f2</sum></package><package arch="x86_64" name="kernel" release="862.14.4.el7" src="kernel-3.10.0-862.14.4.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-862.14.4.el7.x86_64.rpm</filename><sum type="sha256">e09a46084508992d82a1491542d3a3b33641b981515d9b2504630fb6f21aa4a1</sum></package><package arch="x86_64" name="kernel-debug" release="862.14.4.el7" src="kernel-3.10.0-862.14.4.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-862.14.4.el7.x86_64.rpm</filename><sum type="sha256">b137fb7dd073fd2c15603eef12f751ddf2853a440dac04cf9452d281ccda2046</sum></package><package arch="x86_64" name="perf" release="862.14.4.el7" src="kernel-3.10.0-862.14.4.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-862.14.4.el7.x86_64.rpm</filename><sum type="sha256">691459b7708183d1b87db5e1334630e4b8b1423ac7d419b4fe0500a04f7a8907</sum></package><package arch="x86_64" name="kernel-devel" release="862.14.4.el7" src="kernel-3.10.0-862.14.4.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-862.14.4.el7.x86_64.rpm</filename><sum type="sha256">cc51838a3d313a5258089223eab5d2ba76f326da015f7a3b33bbe4d372d24f68</sum></package><package arch="x86_64" name="python-perf" release="862.14.4.el7" src="kernel-3.10.0-862.14.4.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-862.14.4.el7.x86_64.rpm</filename><sum type="sha256">7bfc8615232ecaba60750cc939f91b6a6dc972578eaa47de42094c98710af3f7</sum></package><package arch="x86_64" name="kernel-tools-libs" release="862.14.4.el7" src="kernel-3.10.0-862.14.4.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-862.14.4.el7.x86_64.rpm</filename><sum type="sha256">6559d307ed6fafcc93fcbeb24fb1fe4c3fced2ed001966e05ffa7946064f56b8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14634" id="CVE-2018-14634" title="Kernel: Integer Overflow In Linux'S " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2748" id="RHSA-2018:2748-1" title="Rhsa-2018:2748-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1624498" id="1624498" title="Kernel: Integer Overflow In Linux'S " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2757-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* 389-ds-base: race condition on reference counter leads to DoS using persistent search (CVE-2018-10850) 
* 389-ds-base: ldapsearch with server side sort allows users to cause a crash (CVE-2018-10935) 
* 389-ds-base: Server crash through modify command with large DN (CVE-2018-14624) 
* 389-ds-base: Crash in delete_passwdPolicy when persistent search connections are terminated unexpectedly (CVE-2018-14638) 
Bug Fix(es): 
* Previously, the nucn-stans framework was enabled by default in Directory Server, but the framework is not stable. As a consequence, deadlocks and file descriptor leaks could occur. This update changes the default value of the nsslapd-enable-nunc-stans parameter to "off". As a result, Directory Server is now stable. 
* When a search evaluates the "shadowAccount" entry, Directory Server adds the shadow attributes to the entry. If the fine-grained password policy is enabled, the "shadowAccount" entry can contain its own "pwdpolicysubentry" policy attribute. Previously, to retrieve this attribute, the server started an internal search for each "shadowAccount" entry, which was unnecessary because the entry was already known to the server. With this update, Directory Server only starts internal searches if the entry is not known. As a result, the performance of searches, such as response time and throughput, is improved.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-09-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-snmp" release="28.el7_5" src="389-ds-base-1.3.7.5-28.el7_5.src.rpm" version="1.3.7.5"><filename>389-ds-base-snmp-1.3.7.5-28.el7_5.x86_64.rpm</filename><sum type="sha256">25ecfed08aabd6d0e65ad7cf0d2a6221814071ebf4aec8e46a84e2d230e237d8</sum></package><package arch="x86_64" name="389-ds-base" release="28.el7_5" src="389-ds-base-1.3.7.5-28.el7_5.src.rpm" version="1.3.7.5"><filename>389-ds-base-1.3.7.5-28.el7_5.x86_64.rpm</filename><sum type="sha256">f0f48cbb5b83644416ac5db4e14c0ff35c285a82b05fac3e22b96c9d903ac5e7</sum></package><package arch="x86_64" name="389-ds-base-devel" release="28.el7_5" src="389-ds-base-1.3.7.5-28.el7_5.src.rpm" version="1.3.7.5"><filename>389-ds-base-devel-1.3.7.5-28.el7_5.x86_64.rpm</filename><sum type="sha256">b9ffb568259d111b7ffed0924eaa2303c7fdba25ac23aed7fd0e033fb3af8186</sum></package><package arch="x86_64" name="389-ds-base-libs" release="28.el7_5" src="389-ds-base-1.3.7.5-28.el7_5.src.rpm" version="1.3.7.5"><filename>389-ds-base-libs-1.3.7.5-28.el7_5.x86_64.rpm</filename><sum type="sha256">2549be43b5f60270e15c37bf5347992c1b2e36fe550de5d1a7acf52a57145bc8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10850" id="CVE-2018-10850" title="389-Ds-Base: Race Condition On Reference " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10935" id="CVE-2018-10935" title="389-Ds-Base: Ldapsearch With Server Side Sort " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14624" id="CVE-2018-14624" title="389-Ds-Base: Server Crash Through Modify " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14638" id="CVE-2018-14638" title="389-Ds-Base: Crash In Delete_Passwdpolicy When " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2757" id="RHSA-2018:2757-1" title="Rhsa-2018:2757-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1588056" id="1588056" title="389-Ds-Base: Race Condition On Reference " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1613606" id="1613606" title="389-Ds-Base: Ldapsearch With Server Side Sort " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1614861" id="1614861" title="389-Ds-Base: Ldapsearch With Server Side Sort " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1615924" id="1615924" title="Fine Grained Password Policy Can Impact Search Performance " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1619450" id="1619450" title="389-Ds-Base: Server Crash Through Modify " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623247" id="1623247" title="389-Ds-Base: Server Crash Through Modify " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1626079" id="1626079" title="389-Ds-Base: Crash In Delete_Passwdpolicy When " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2766-1</id><title>Flatpak</title><description>Security Fix(es): 
* flatpak: sandbox escape in D-Bus filtering by a crafted authentication handshake (CVE-2018-6560)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-09-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="flatpak" release="4.el7_5" src="flatpak-0.8.8-4.el7_5.src.rpm" version="0.8.8"><filename>flatpak-0.8.8-4.el7_5.x86_64.rpm</filename><sum type="sha256">744bc349925e1c81f43d90b147f64a6fd159887fdf3fb033a33f4ac69a61b9d6</sum></package><package arch="x86_64" name="flatpak-libs" release="4.el7_5" src="flatpak-0.8.8-4.el7_5.src.rpm" version="0.8.8"><filename>flatpak-libs-0.8.8-4.el7_5.x86_64.rpm</filename><sum type="sha256">eb040c57ed2504dd7d91714ef264295ea42030fc612d37c46c3c0c45513ab1cc</sum></package><package arch="x86_64" name="flatpak-devel" release="4.el7_5" src="flatpak-0.8.8-4.el7_5.src.rpm" version="0.8.8"><filename>flatpak-devel-0.8.8-4.el7_5.x86_64.rpm</filename><sum type="sha256">63fce8a0785e4466a5a8e7575439807d8fbbcff4ae1d369b3b80d3e64d612f79</sum></package><package arch="x86_64" name="flatpak-builder" release="4.el7_5" src="flatpak-0.8.8-4.el7_5.src.rpm" version="0.8.8"><filename>flatpak-builder-0.8.8-4.el7_5.x86_64.rpm</filename><sum type="sha256">b4bf0e054efc8d2a5ea820e5d678024b7ea347a966e113c914b2caaf59ae90e8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6560" id="CVE-2018-6560" title="Flatpak: Sandbox Escape In D-Bus Filtering By A " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2766" id="RHSA-2018:2766-1" title="Rhsa-2018:2766-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1542207" id="1542207" title="Flatpak: Sandbox Escape In D-Bus Filtering By A " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2768-1</id><title>Nss</title><description>Security Fix(es): 
* nss: ServerHello.random is all zeros when handling a v2-compatible ClientHello (CVE-2018-12384)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-09-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-pkcs11-devel" release="7.el7_5" src="nss-3.36.0-7.el7_5.src.rpm" version="3.36.0"><filename>nss-pkcs11-devel-3.36.0-7.el7_5.x86_64.rpm</filename><sum type="sha256">653906a7d6caff90ac992c46d17d59ce0b212973cc01e45a4fe2c7a64efda165</sum></package><package arch="x86_64" name="nss" release="7.el7_5" src="nss-3.36.0-7.el7_5.src.rpm" version="3.36.0"><filename>nss-3.36.0-7.el7_5.x86_64.rpm</filename><sum type="sha256">8d232525d7f8ff56dbc27639bd36beb17820625142c9f804fe2d475951643bab</sum></package><package arch="x86_64" name="nss-tools" release="7.el7_5" src="nss-3.36.0-7.el7_5.src.rpm" version="3.36.0"><filename>nss-tools-3.36.0-7.el7_5.x86_64.rpm</filename><sum type="sha256">ebee26a0cc1ffdb84590bb9e4dc712c0770bf9bf12b8e7056edffa37be3bf10f</sum></package><package arch="i686" name="nss" release="7.el7_5" src="nss-3.36.0-7.el7_5.src.rpm" version="3.36.0"><filename>nss-3.36.0-7.el7_5.i686.rpm</filename><sum type="sha256">e4092820a41d48a020971dbd2449e448aecc181991bb225affeecd5c4b00edaf</sum></package><package arch="i686" name="nss-devel" release="7.el7_5" src="nss-3.36.0-7.el7_5.src.rpm" version="3.36.0"><filename>nss-devel-3.36.0-7.el7_5.i686.rpm</filename><sum type="sha256">7eb0722fc327568ba740366581a9d67f4db34b589b1ec766d8d3e4df563a6398</sum></package><package arch="i686" name="nss-pkcs11-devel" release="7.el7_5" src="nss-3.36.0-7.el7_5.src.rpm" version="3.36.0"><filename>nss-pkcs11-devel-3.36.0-7.el7_5.i686.rpm</filename><sum type="sha256">fafc33d24cfd89ba7f44c197353bcda18ff358b1ecba5de151bd0b616a8b5784</sum></package><package arch="x86_64" name="nss-devel" release="7.el7_5" src="nss-3.36.0-7.el7_5.src.rpm" version="3.36.0"><filename>nss-devel-3.36.0-7.el7_5.x86_64.rpm</filename><sum type="sha256">78d34478821c2d53581865686228a40d2daa0a47b7132118bf9c1d537d74dd76</sum></package><package arch="x86_64" name="nss-sysinit" release="7.el7_5" src="nss-3.36.0-7.el7_5.src.rpm" version="3.36.0"><filename>nss-sysinit-3.36.0-7.el7_5.x86_64.rpm</filename><sum type="sha256">a0c0808c1eb9ca36b674a96f8a9b1e43a81296b3d6a84921d79e1e67319a93cd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12384" id="CVE-2018-12384" title="Nss: Serverhello.Random Is All Zeros When " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2768" id="RHSA-2018:2768-1" title="Rhsa-2018:2768-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1622089" id="1622089" title="Nss: Serverhello.Random Is All Zeros When " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2835-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.2.1 ESR. 
Security Fix(es): 
* Mozilla: Crash in TransportSecurityInfo due to cached data (CVE-2018-12385) 
* Mozilla: Setting a master password post-Firefox 58 does not delete unencrypted previously stored passwords (CVE-2018-12383)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-09-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_5" src="firefox-60.2.1-1.el7_5.src.rpm" version="60.2.1"><filename>firefox-60.2.1-1.el7_5.x86_64.rpm</filename><sum type="sha256">a9407245fee727b04bc105e9b57308bec3b02aee7e2d09f0e083f58fe6490c95</sum></package><package arch="i686" name="firefox" release="1.el7_5" src="firefox-60.2.1-1.el7_5.src.rpm" version="60.2.1"><filename>firefox-60.2.1-1.el7_5.i686.rpm</filename><sum type="sha256">eb7fb51a8905edf8a760bfb5a183c46d26ecad9fb1458072b0b3dd9d8e520c24</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12383" id="CVE-2018-12383" title="Mozilla: Setting A Master Password Post-Firefox " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12385" id="CVE-2018-12385" title="Mozilla: Crash In Transportsecurityinfo Due To " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2835" id="RHSA-2018:2835-1" title="Rhsa-2018:2835-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625531" id="1625531" title="Mozilla: Setting A Master Password Post-Firefox " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1632062" id="1632062" title="Mozilla: Crash In Transportsecurityinfo Due To " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2884-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.2.2 ESR. 
Security Fix(es): 
* Mozilla: type confusion in JavaScript (CVE-2018-12386) 
* Mozilla: stack out-of-bounds read in Array.prototype.push (CVE-2018-12387)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2018-10-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_5" src="firefox-60.2.2-1.el7_5.src.rpm" version="60.2.2"><filename>firefox-60.2.2-1.el7_5.x86_64.rpm</filename><sum type="sha256">5d94454e96d4f18f6a0e10d306ba21c60b6c5ac11d37914ea28995d04445e993</sum></package><package arch="i686" name="firefox" release="1.el7_5" src="firefox-60.2.2-1.el7_5.src.rpm" version="60.2.2"><filename>firefox-60.2.2-1.el7_5.i686.rpm</filename><sum type="sha256">2230852a50ed3b5496714169b7f7956cf6e557fda3ef8f47c0cc4c3184cbf70f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12386" id="CVE-2018-12386" title="Mozilla: Type Confusion In Javascript" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12387" id="CVE-2018-12387" title="Mozilla: Stack Out-Of-Bounds Read In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2884" id="RHSA-2018:2884-1" title="Rhsa-2018:2884-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1635451" id="1635451" title="Mozilla: Type Confusion In Javascript" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1635452" id="1635452" title="Mozilla: Stack Out-Of-Bounds Read In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2916-1</id><title>Spamassassin</title><description>Security Fix(es): 
* spamassassin: Certain unclosed tags in crafted emails allow for scan timeouts and result in denial of service (CVE-2017-15705) 
* spamassassin: Local user code injection in the meta rule syntax (CVE-2018-11781)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-10-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="spamassassin" release="4.el7_5" src="spamassassin-3.4.0-4.el7_5.src.rpm" version="3.4.0"><filename>spamassassin-3.4.0-4.el7_5.x86_64.rpm</filename><sum type="sha256">1331d1ddff9d3c66e913843c5177a340fef38baef443a96c1a09be886ea166cf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15705" id="CVE-2017-15705" title="Spamassassin: Certain Unclosed Tags In Crafted Emails Allow For Scan Timeouts And Result In Denial Of Service" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11781" id="CVE-2018-11781" title="Spamassassin: Local User Code Injection In The Meta Rule Syntax" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2916" id="RHSA-2018:2916-1" title="Rhsa-2018:2916-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1629521" id="1629521" title="Spamassassin: Certain Unclosed Tags In Crafted Emails Allow For Scan Timeouts And Result In Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1629536" id="1629536" title="Spamassassin: Local User Code Injection In The Meta Rule Syntax" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2918-1</id><title>Ghostscript</title><description>Security Fix(es): 
* It was discovered that the ghostscript /invalidaccess checks fail under certain conditions. An attacker could possibly exploit this to bypass the - -dSAFER protection and, for example, execute arbitrary shell commands via a specially crafted PostScript document. (CVE-2018-16509) 
* ghostscript: LockDistillerParams type confusion (699656) (CVE-2018-15910) 
* ghostscript: .definemodifiedfont memory corruption if /typecheck is handled (699668) (CVE-2018-16542) 
* ghostscript: Stack-based out-of-bounds write in pdf_set_text_matrix function in gdevpdts.c (CVE-2018-10194)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-10-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ghostscript-cups" release="29.el7_5.2" src="ghostscript-9.07-29.el7_5.2.src.rpm" version="9.07"><filename>ghostscript-cups-9.07-29.el7_5.2.x86_64.rpm</filename><sum type="sha256">775a5383feb5cc728242c575253c4e3a60cca7753f817f1d231b19a2bb881827</sum></package><package arch="i686" name="ghostscript" release="29.el7_5.2" src="ghostscript-9.07-29.el7_5.2.src.rpm" version="9.07"><filename>ghostscript-9.07-29.el7_5.2.i686.rpm</filename><sum type="sha256">5db0cc84ba9aaa01ed6ae59664875f2d5a9c8c848fe6600bce000d6a2fd3fa79</sum></package><package arch="x86_64" name="ghostscript-gtk" release="29.el7_5.2" src="ghostscript-9.07-29.el7_5.2.src.rpm" version="9.07"><filename>ghostscript-gtk-9.07-29.el7_5.2.x86_64.rpm</filename><sum type="sha256">f505fdca611a211eff6bd331a187fec17515852350610b0b1407deec54e764e2</sum></package><package arch="x86_64" name="ghostscript-devel" release="29.el7_5.2" src="ghostscript-9.07-29.el7_5.2.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-29.el7_5.2.x86_64.rpm</filename><sum type="sha256">a40198713491b69d5b31fc303197b08fe33fe56ea55bfcd07b46ffc2654dca5e</sum></package><package arch="noarch" name="ghostscript-doc" release="29.el7_5.2" src="ghostscript-9.07-29.el7_5.2.src.rpm" version="9.07"><filename>ghostscript-doc-9.07-29.el7_5.2.noarch.rpm</filename><sum type="sha256">30b1535efed4dbc55a5bcdf6303402afc08a9f38028ce1eb152a667f81130fa7</sum></package><package arch="i686" name="ghostscript-devel" release="29.el7_5.2" src="ghostscript-9.07-29.el7_5.2.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-29.el7_5.2.i686.rpm</filename><sum type="sha256">fc5a76b2d9bdcc5bff73b4c38c4d523ad47606c565de37b22c793e0095cde6b4</sum></package><package arch="x86_64" name="ghostscript" release="29.el7_5.2" src="ghostscript-9.07-29.el7_5.2.src.rpm" version="9.07"><filename>ghostscript-9.07-29.el7_5.2.x86_64.rpm</filename><sum type="sha256">3cfa299052b14718a6bf28a7cb11c0c6ad89280a163d3f814a9e1025573478da</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10194" id="CVE-2018-10194" title="Ghostscript: Stack-Based Out-Of-Bounds Write In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15910" id="CVE-2018-15910" title="Ghostscript: Lockdistillerparams Type Confusion " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16509" id="CVE-2018-16509" title="Ghostscript: /Invalidaccess Bypass After Failed " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16542" id="CVE-2018-16542" title="Ghostscript: .Definemodifiedfont Memory " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2918" id="RHSA-2018:2918-1" title="Rhsa-2018:2918-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569108" id="1569108" title="Ghostscript: Stack-Based Out-Of-Bounds Write In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1619748" id="1619748" title="Ghostscript: /Invalidaccess Bypass After Failed " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1619751" id="1619751" title="Ghostscript: Lockdistillerparams Type Confusion " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1621363" id="1621363" title="Ghostscript: .Definemodifiedfont Memory " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2921-1</id><title>Tomcat</title><description>Security Fix(es): 
* tomcat: A bug in the UTF-8 decoder can lead to DoS (CVE-2018-1336)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-10-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcat-lib" release="8.el7_5" src="tomcat-7.0.76-8.el7_5.src.rpm" version="7.0.76"><filename>tomcat-lib-7.0.76-8.el7_5.noarch.rpm</filename><sum type="sha256">3728c2d578b02ab5fc1b8479934cd0d8796ffa31774682afd30c2cfe0c7998ea</sum></package><package arch="noarch" name="tomcat-jsp-2.2-api" release="8.el7_5" src="tomcat-7.0.76-8.el7_5.src.rpm" version="7.0.76"><filename>tomcat-jsp-2.2-api-7.0.76-8.el7_5.noarch.rpm</filename><sum type="sha256">055ecd91e369438cb269c6c2a4449312cb8487c5c623b3220226ccf2b9b66e40</sum></package><package arch="noarch" name="tomcat-javadoc" release="8.el7_5" src="tomcat-7.0.76-8.el7_5.src.rpm" version="7.0.76"><filename>tomcat-javadoc-7.0.76-8.el7_5.noarch.rpm</filename><sum type="sha256">326688afc0f82cd5810fc0099b6857c8eb13f7c85ea344b774c3eeae6412b3d7</sum></package><package arch="noarch" name="tomcat-docs-webapp" release="8.el7_5" src="tomcat-7.0.76-8.el7_5.src.rpm" version="7.0.76"><filename>tomcat-docs-webapp-7.0.76-8.el7_5.noarch.rpm</filename><sum type="sha256">8505569c632acce90c1d8e3dbb96d575f2db3368ac4c41ee78ea9d73cb9c8f4f</sum></package><package arch="noarch" name="tomcat-admin-webapps" release="8.el7_5" src="tomcat-7.0.76-8.el7_5.src.rpm" version="7.0.76"><filename>tomcat-admin-webapps-7.0.76-8.el7_5.noarch.rpm</filename><sum type="sha256">dec9907ed446eeea04bddfd954feb8cce24d4f8b440fcc0dd9c2afb3cc332e78</sum></package><package arch="noarch" name="tomcat-el-2.2-api" release="8.el7_5" src="tomcat-7.0.76-8.el7_5.src.rpm" version="7.0.76"><filename>tomcat-el-2.2-api-7.0.76-8.el7_5.noarch.rpm</filename><sum type="sha256">3f76deb85faacf13fae26d35d988bd1b8a6311dafd60cf24b83bdb814b1b8d24</sum></package><package arch="noarch" name="tomcat-jsvc" release="8.el7_5" src="tomcat-7.0.76-8.el7_5.src.rpm" version="7.0.76"><filename>tomcat-jsvc-7.0.76-8.el7_5.noarch.rpm</filename><sum type="sha256">01ee561cb573992f604594d7574db6d9c318e27d6183840036a0ff03ec67fc31</sum></package><package arch="noarch" name="tomcat-webapps" release="8.el7_5" src="tomcat-7.0.76-8.el7_5.src.rpm" version="7.0.76"><filename>tomcat-webapps-7.0.76-8.el7_5.noarch.rpm</filename><sum type="sha256">1bf33841373d8bf3550667b54703e73979a02ee9d2a39ebc1488af6e13fec322</sum></package><package arch="noarch" name="tomcat" release="8.el7_5" src="tomcat-7.0.76-8.el7_5.src.rpm" version="7.0.76"><filename>tomcat-7.0.76-8.el7_5.noarch.rpm</filename><sum type="sha256">d4b31e89e8000b8ec2e65c0fc53abbe3785a80ba6bed807ffdfcf26b497449d1</sum></package><package arch="noarch" name="tomcat-servlet-3.0-api" release="8.el7_5" src="tomcat-7.0.76-8.el7_5.src.rpm" version="7.0.76"><filename>tomcat-servlet-3.0-api-7.0.76-8.el7_5.noarch.rpm</filename><sum type="sha256">edd8482b2257fcc1aaa7e436d4817f98a88cafe3321e9c6b370a0e8dd57b62cf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1336" id="CVE-2018-1336" title="Tomcat: A Bug In The Utf-8 Decoder Can Lead To Dos" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2921" id="RHSA-2018:2921-1" title="Rhsa-2018:2921-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1607591" id="1607591" title="Tomcat: A Bug In The Utf-8 Decoder Can Lead To Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:2942-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Improper field access checks (Hotspot, 8199226) (CVE-2018-3169) 
* OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) (CVE-2018-3183) 
* OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) (CVE-2018-3149) 
* OpenJDK: Incorrect handling of unsigned attributes in singed Jar manifests (Security, 8194534) (CVE-2018-3136) 
* OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) (CVE-2018-3139) 
* OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) (CVE-2018-3180) 
* OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) (CVE-2018-3214)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2018-10-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.191.b12-0.el7_5.x86_64.rpm</filename><sum type="sha256">8b1e1f9090aae290e5a7291ce01eb0a347e30d7427850d572ebe7ea3f3d36b19</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-javadoc-1.8.0.191.b12-0.el7_5.noarch.rpm</filename><sum type="sha256">eaaf960f99d0cf43445d8f01491455487c63ce7c2d3ffbb2da29077e85780d07</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.191.b12-0.el7_5.noarch.rpm</filename><sum type="sha256">5be34f1f1bef49a93af98db2af6468ad411a506eadc76e97828dc566aaef0038</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.191.b12-0.el7_5.i686.rpm</filename><sum type="sha256">c2e557aabed3f104b9606f08468c130bc6682ef52dc6d259207fbfab04bc4e9c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-headless-1.8.0.191.b12-0.el7_5.x86_64.rpm</filename><sum type="sha256">7739f800fcacec1188e81218971aeb2e301fb490e9e2005410502c61f6c508f2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-src-debug-1.8.0.191.b12-0.el7_5.x86_64.rpm</filename><sum type="sha256">da751d61e73f7760c5e8c84636193febe0b1294c61d465d5ae6f6900353e0846</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-src-debug-1.8.0.191.b12-0.el7_5.i686.rpm</filename><sum type="sha256">e684990149004588286727c30c18f586d5173e97f5c192c36939a689e395bb82</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-debug-1.8.0.191.b12-0.el7_5.i686.rpm</filename><sum type="sha256">631b5a0092679d38a673c4b03e46149257168fd402c26b9a20deb7dbc1b19e9a</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.191.b12-0.el7_5.i686.rpm</filename><sum type="sha256">fb380d437c698fa486faef9b6d58a2073a62851fca5734ba1378f3152eb7dc31</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.191.b12-0.el7_5.i686.rpm</filename><sum type="sha256">d00b7622248254523e2314f6eab12d5b7200ad7b2a364273ee31094c40175a93</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.x86_64.rpm</filename><sum type="sha256">f7226a6bca7ad10958bd55437a8a9bb52ccab8f070e60faa574c0798bb8cdf8c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-demo-1.8.0.191.b12-0.el7_5.x86_64.rpm</filename><sum type="sha256">0ddf0e78795081434597c33cdbbd8d7ef2b60ef22af4cd337ce772e24a71ea7c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.191.b12-0.el7_5.x86_64.rpm</filename><sum type="sha256">5ebb32ffd0ce073a591cb6a87ce5e50a060f61f04078613d151d77f89c92d57e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-accessibility-1.8.0.191.b12-0.el7_5.i686.rpm</filename><sum type="sha256">9f1639d86c7f34aaeeca2bff0b3a530d6de299cb953090dbb44d47e1e3e9d6e0</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-devel-1.8.0.191.b12-0.el7_5.i686.rpm</filename><sum type="sha256">86baf4386f5e5bf6f08b0efa7a65d735692f4a2ade20d7d60d5444c418d0f996</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.191.b12-0.el7_5.noarch.rpm</filename><sum type="sha256">a4b1c6ca1569d7bb6b85e95ee55e473922947923b742cde19add4b5cf784fa75</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-headless-1.8.0.191.b12-0.el7_5.i686.rpm</filename><sum type="sha256">65f307925c47f0c395b0d5e3b86cb02169ab6bc0243e3fabc66f45c74e060bc5</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.191.b12-0.el7_5.noarch.rpm</filename><sum type="sha256">953d39f9788185c9861d257b9172ce7b4e9b080345f6c85198a0ed84257378ef</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-debug-1.8.0.191.b12-0.el7_5.x86_64.rpm</filename><sum type="sha256">93fe6e8e432daa14a75f95b0f7926d27ad147fee8d3767420f5571eef5b49227</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-accessibility-1.8.0.191.b12-0.el7_5.x86_64.rpm</filename><sum type="sha256">984bb4347b30b8f70866ac93383358e426c671d89c7648203c5d547a5d42025c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-src-1.8.0.191.b12-0.el7_5.i686.rpm</filename><sum type="sha256">edc48a8b1e9a198718b125b5eb85c3d47f53f3b30aae02c9e554b74cefb72942</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.191.b12-0.el7_5.x86_64.rpm</filename><sum type="sha256">af56b0338768ab8cd1c31d49fba8edf4ebd6eb251bfdcd49b8c946796f8f0a30</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-devel-1.8.0.191.b12-0.el7_5.x86_64.rpm</filename><sum type="sha256">a78224354ce28088fc4b23194b334bb038a1d189f3a679654c123054204fef40</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-src-1.8.0.191.b12-0.el7_5.x86_64.rpm</filename><sum type="sha256">344430e7139735d1a9b27a49ec9bb8508c83eec7fdf835d5fcaa2adbc056d2cb</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.i686.rpm</filename><sum type="sha256">723077e382cd53e3408364da607153b7476c4946383708c9610d9a2d29f964fe</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.191.b12-0.el7_5.i686.rpm</filename><sum type="sha256">59a71cbd33c91cf0aa6cbfed75e357a1531b0a6e955bddf753d55849d86b6b6b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.191.b12-0.el7_5.x86_64.rpm</filename><sum type="sha256">a85053f11298fc6e834275bb13be0fcc07831a8fbf2f55d20179d4494c019740</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el7_5" src="java-1.8.0-openjdk-1.8.0.191.b12-0.el7_5.src.rpm" version="1.8.0.191.b12"><filename>java-1.8.0-openjdk-demo-1.8.0.191.b12-0.el7_5.i686.rpm</filename><sum type="sha256">baa48e823b333a3f7f4d73334d624b92f42a17bcd34bf17961a96c87be166837</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136" id="CVE-2018-3136" title="Openjdk: Incorrect Handling Of Unsigned " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139" id="CVE-2018-3139" title="Openjdk: Leak Of Sensitive Header Data Via Http " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149" id="CVE-2018-3149" title="Openjdk: Incomplete Enforcement Of The " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169" id="CVE-2018-3169" title="Openjdk: Improper Field Access Checks (Hotspot, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180" id="CVE-2018-3180" title="Openjdk: Missing Endpoint Identification " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183" id="CVE-2018-3183" title="Openjdk: Unrestricted Access To Scripting Engine " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214" id="CVE-2018-3214" title="Openjdk: Infinite Loop In Riff Format Reader " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:2942" id="RHSA-2018:2942-1" title="Rhsa-2018:2942-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639268" id="1639268" title="Openjdk: Unrestricted Access To Scripting Engine " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639293" id="1639293" title="Openjdk: Improper Field Access Checks (Hotspot, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639301" id="1639301" title="Openjdk: Infinite Loop In Riff Format Reader " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639442" id="1639442" title="Openjdk: Leak Of Sensitive Header Data Via Http " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639484" id="1639484" title="Openjdk: Missing Endpoint Identification " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639755" id="1639755" title="Openjdk: Incorrect Handling Of Unsigned " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639834" id="1639834" title="Openjdk: Incomplete Enforcement Of The " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3005-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.3.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3 (CVE-2018-12390) 
* Mozilla: Crash with nested event loops (CVE-2018-12392) 
* Mozilla: Integer overflow during Unicode conversion while loading JavaScript (CVE-2018-12393) 
* Mozilla: WebExtension bypass of domain restrictions through header rewriting (CVE-2018-12395) 
* Mozilla: WebExtension content scripts can execute in disallowed contexts (CVE-2018-12396) 
* Mozilla: WebExtension local file permission check bypass (CVE-2018-12397) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 60.3 (CVE-2018-12389) 
Bug Fix(es): 
* Previously, passwords saved in the Firefox browser and encrypted by a master password were erased when Firefox was exited. This update ensures that NSS files used to decrypt stored login data are handled correctly. As a result, the affected passwords are no longer lost after restarting Firefox.</description><severity>critical</severity><release>Scientific Linux</release><issued date="2018-10-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_5" src="firefox-60.3.0-1.el7_5.src.rpm" version="60.3.0"><filename>firefox-60.3.0-1.el7_5.x86_64.rpm</filename><sum type="sha256">4f1b411ff5756bd2c2920cb81349f5de40bb810e291934cbc731f0ee31dd26d4</sum></package><package arch="i686" name="firefox" release="1.el7_5" src="firefox-60.3.0-1.el7_5.src.rpm" version="60.3.0"><filename>firefox-60.3.0-1.el7_5.i686.rpm</filename><sum type="sha256">dd47cb033dc04bfbf80a3aec5f7df3fd42e743d66cd89261d840db79ba366550</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389" id="CVE-2018-12389" title="Mozilla: Memory Safety Bugs Fixed In Firefox " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390" id="CVE-2018-12390" title="Mozilla: Memory Safety Bugs Fixed In Firefox 63 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392" id="CVE-2018-12392" title="Mozilla: Crash With Nested Event Loops" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393" id="CVE-2018-12393" title="Mozilla: Integer Overflow During Unicode " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12395" id="CVE-2018-12395" title="Mozilla: Webextension Bypass Of Domain " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12396" id="CVE-2018-12396" title="Mozilla: Webextension Content Scripts Can " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12397" id="CVE-2018-12397" title="Mozilla: Webextension Local File Permission " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3005" id="RHSA-2018:3005-1" title="Rhsa-2018:3005-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1638082" id="1638082" title="After Firefox Update Saved Passwords Cleared On Startup [7.7] " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642179" id="1642179" title="Mozilla: Memory Safety Bugs Fixed In Firefox " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642180" id="1642180" title="Mozilla: Memory Safety Bugs Fixed In Firefox 63 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642182" id="1642182" title="Mozilla: Crash With Nested Event Loops" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642183" id="1642183" title="Mozilla: Integer Overflow During Unicode " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642185" id="1642185" title="Mozilla: Webextension Bypass Of Domain " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642186" id="1642186" title="Mozilla: Webextension Content Scripts Can " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642187" id="1642187" title="Mozilla: Webextension Local File Permission " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3032-1</id><title>Binutils</title><description>Security Fix(es): 
* binutils: Improper bounds check in coffgen.c:coff_pointerize_aux() allows for denial of service when parsing a crafted COFF file (CVE-2018-7208) 
* binutils: integer overflow via an ELF file with corrupt dwarf1 debug information in libbfd library (CVE-2018-7568) 
* binutils: integer underflow or overflow via an ELF file with a corrupt DWARF FORM block in libbfd library (CVE-2018-7569) 
* binutils: NULL pointer dereference in swap_std_reloc_in function in aoutx.h resulting in crash (CVE-2018-7642) 
* binutils: Integer overflow in the display_debug_ranges function resulting in crash (CVE-2018-7643) 
* binutils: Crash in elf.c:bfd_section_from_shdr() with crafted executable (CVE-2018-8945) 
* binutils: Heap-base buffer over-read in dwarf.c:process_cu_tu_index() allows for denial of service via crafted file (CVE-2018-10372) 
* binutils: NULL pointer dereference in dwarf2.c:concat_filename() allows for denial of service via crafted file (CVE-2018-10373) 
* binutils: out of bounds memory write in peXXigen.c files (CVE-2018-10534) 
* binutils: NULL pointer dereference in elf.c (CVE-2018-10535) 
* binutils: Uncontrolled Resource Consumption in execution of nm (CVE-2018-13033)</description><severity>low</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="binutils-devel" release="34.base.el7" src="binutils-2.27-34.base.el7.src.rpm" version="2.27"><filename>binutils-devel-2.27-34.base.el7.i686.rpm</filename><sum type="sha256">395a8af8f111ecaef0831194b9f7c6956ebfc6ac45f2a6a01d66635a0a415817</sum></package><package arch="x86_64" name="binutils" release="34.base.el7" src="binutils-2.27-34.base.el7.src.rpm" version="2.27"><filename>binutils-2.27-34.base.el7.x86_64.rpm</filename><sum type="sha256">9b565ecbf2aca36c3c550a402f485e01442681d12a7fe192bc5303f414cb7c96</sum></package><package arch="x86_64" name="binutils-devel" release="34.base.el7" src="binutils-2.27-34.base.el7.src.rpm" version="2.27"><filename>binutils-devel-2.27-34.base.el7.x86_64.rpm</filename><sum type="sha256">dc0e88bd35dc9962c6f4ec8a40028481e85de781f2188e4bf369b17b2663827a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10372" id="CVE-2018-10372" title="Binutils: Heap-Base Buffer Over-Read In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10373" id="CVE-2018-10373" title="Binutils: Null Pointer Dereference In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10534" id="CVE-2018-10534" title="Binutils: Out Of Bounds Memory Write In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10535" id="CVE-2018-10535" title="Binutils: Null Pointer Dereference In Elf.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13033" id="CVE-2018-13033" title="Binutils: Uncontrolled Resource Consumption In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7208" id="CVE-2018-7208" title="Binutils: Improper Bounds Check In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7568" id="CVE-2018-7568" title="Binutils: Integer Overflow Via An Elf File With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7569" id="CVE-2018-7569" title="Binutils: Integer Underflow Or Overflow Via An " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7642" id="CVE-2018-7642" title="Binutils: Null Pointer Dereference In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7643" id="CVE-2018-7643" title="Binutils: Integer Overflow In The " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8945" id="CVE-2018-8945" title="Binutils: Crash In Elf.C:Bfd_Section_From_Shdr() " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3032" id="RHSA-2018:3032-1" title="Rhsa-2018:3032-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1439351" id="1439351" title="[Llnl 7.5 Feat] Rfe Create An Option To Permanently Link In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1546622" id="1546622" title="Binutils: Improper Bounds Check In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1551771" id="1551771" title="Binutils: Integer Overflow Via An Elf File With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1551778" id="1551778" title="Binutils: Integer Underflow Or Overflow Via An " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1553115" id="1553115" title="Binutils: Null Pointer Dereference In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1553119" id="1553119" title="Binutils: Integer Overflow In The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1553842" id="1553842" title="Unresolvable `R_X86_64_None` Relocation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1557346" id="1557346" title="Collect2: Error: Ld Terminated With Signal 11 [Segmentation " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560827" id="1560827" title="Binutils: Crash In Elf.C:Bfd_Section_From_Shdr() " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1573356" id="1573356" title="Binutils: Heap-Base Buffer Over-Read In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1573365" id="1573365" title="Binutils: Null Pointer Dereference In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1573872" id="1573872" title="Ld Should Allow &quot;Lea Foo@Got, %Ecx&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1574696" id="1574696" title="Binutils: Out Of Bounds Memory Write In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1574697" id="1574697" title="Binutils: Null Pointer Dereference In Elf.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1597436" id="1597436" title="Binutils: Uncontrolled Resource Consumption In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3041-1</id><title>Python</title><description>Security Fix(es): 
* python: DOS via regular expression backtracking in difflib.IS_LINE_JUNK method in difflib (CVE-2018-1061) 
* python: DOS via regular expression catastrophic backtracking in apop() method in pop3lib (CVE-2018-1060)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="tkinter" release="76.el7" src="python-2.7.5-76.el7.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-76.el7.x86_64.rpm</filename><sum type="sha256">280048235e7b465417cf33b6724d08014b2fc9aeeeac9e8b958db263c4bd60a5</sum></package><package arch="x86_64" name="python-tools" release="76.el7" src="python-2.7.5-76.el7.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-76.el7.x86_64.rpm</filename><sum type="sha256">dedb385775768079c928c9a3a9fdd4d91424b76cbf8f839e77f33ae85e4bbee0</sum></package><package arch="i686" name="python-libs" release="76.el7" src="python-2.7.5-76.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-76.el7.i686.rpm</filename><sum type="sha256">1fd3fd54df8a580c8000bf3aabe8320ea9ada085549a550dfefdb84f9a28a800</sum></package><package arch="x86_64" name="python-devel" release="76.el7" src="python-2.7.5-76.el7.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-76.el7.x86_64.rpm</filename><sum type="sha256">4471abd45f462b4ee2056294b22d1fbb8f7a67214c89313db843e8c0488e0420</sum></package><package arch="x86_64" name="python-debug" release="76.el7" src="python-2.7.5-76.el7.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-76.el7.x86_64.rpm</filename><sum type="sha256">38e2d784ef6763b6ea987917a452a2eb9379728b67f027636e838cac03b4378b</sum></package><package arch="x86_64" name="python-test" release="76.el7" src="python-2.7.5-76.el7.src.rpm" version="2.7.5"><filename>python-test-2.7.5-76.el7.x86_64.rpm</filename><sum type="sha256">d4f90813fc07df8d42ccf2e2d15516e7fa11e5d2f6180428c8b72984a82f5feb</sum></package><package arch="x86_64" name="python" release="76.el7" src="python-2.7.5-76.el7.src.rpm" version="2.7.5"><filename>python-2.7.5-76.el7.x86_64.rpm</filename><sum type="sha256">0fb2da16586c5ae532373f69a7d2f23b1d46d99ae9cc70e577862de546ef2996</sum></package><package arch="x86_64" name="python-libs" release="76.el7" src="python-2.7.5-76.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-76.el7.x86_64.rpm</filename><sum type="sha256">3c56c98e5057327cb6c4eee0fd044c739955ecd0018d79a96ade35e5533405ad</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1060" id="CVE-2018-1060" title="Python: Dos Via Regular Expression Catastrophic " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1061" id="CVE-2018-1061" title="Python: Dos Via Regular Expression Backtracking " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3041" id="RHSA-2018:3041-1" title="Rhsa-2018:3041-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549191" id="1549191" title="Python: Dos Via Regular Expression Catastrophic " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549192" id="1549192" title="Python: Dos Via Regular Expression Backtracking " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555314" id="1555314" title="Don'T Send Ip Address As Sni Tls Extension" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1557460" id="1557460" title="Python-Libs Package Dosn'T Provide Python2-Libs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1579432" id="1579432" title="Oserror 17 Due To _Multiprocessing/Semaphore.C Assuming A " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3050-1</id><title>Gnutls</title><description>Security Fix(es): 
* gnutls: HMAC-SHA-256 vulnerable to Lucky thirteen attack due to not enough dummy function calls (CVE-2018-10844) 
* gnutls: HMAC-SHA-384 vulnerable to Lucky thirteen attack due to use of wrong constant (CVE-2018-10845) 
* gnutls: "Just in Time" PRIME + PROBE cache-based side channel attack can lead to plaintext recovery (CVE-2018-10846)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gnutls-devel" release="8.el7" src="gnutls-3.3.29-8.el7.src.rpm" version="3.3.29"><filename>gnutls-devel-3.3.29-8.el7.x86_64.rpm</filename><sum type="sha256">f103190f15c9ec6b5225cfbc5da08e15fcf05cec324f3692dfd7bf0192d1f88d</sum></package><package arch="x86_64" name="gnutls-dane" release="8.el7" src="gnutls-3.3.29-8.el7.src.rpm" version="3.3.29"><filename>gnutls-dane-3.3.29-8.el7.x86_64.rpm</filename><sum type="sha256">b729e00a3552d486607a8f5b034f834ff6c5b436fa7bd6a178bc1debdb8fa9d3</sum></package><package arch="i686" name="gnutls-devel" release="8.el7" src="gnutls-3.3.29-8.el7.src.rpm" version="3.3.29"><filename>gnutls-devel-3.3.29-8.el7.i686.rpm</filename><sum type="sha256">56d461b6b1768ec5a96414123d3bc90d9c4be98346cb58b4286946b9a58ce606</sum></package><package arch="x86_64" name="gnutls-utils" release="8.el7" src="gnutls-3.3.29-8.el7.src.rpm" version="3.3.29"><filename>gnutls-utils-3.3.29-8.el7.x86_64.rpm</filename><sum type="sha256">6e186aed03ee0394771f1d16e8104dff75507e921efd185efcf5e6a072ef3833</sum></package><package arch="i686" name="gnutls-c++" release="8.el7" src="gnutls-3.3.29-8.el7.src.rpm" version="3.3.29"><filename>gnutls-c++-3.3.29-8.el7.i686.rpm</filename><sum type="sha256">1c893ec131eac21171b894394252ed655972ed27c3da384d47696997927a2452</sum></package><package arch="i686" name="gnutls" release="8.el7" src="gnutls-3.3.29-8.el7.src.rpm" version="3.3.29"><filename>gnutls-3.3.29-8.el7.i686.rpm</filename><sum type="sha256">f87a909dcaaca347b9e1019fcd800a633b4c71bccbd714529bae50280975af46</sum></package><package arch="x86_64" name="gnutls-c++" release="8.el7" src="gnutls-3.3.29-8.el7.src.rpm" version="3.3.29"><filename>gnutls-c++-3.3.29-8.el7.x86_64.rpm</filename><sum type="sha256">e70f08a2fb3ccbbb9b05146bfa5afb4ae10277504a61c549f2f4abc34c9661d4</sum></package><package arch="i686" name="gnutls-dane" release="8.el7" src="gnutls-3.3.29-8.el7.src.rpm" version="3.3.29"><filename>gnutls-dane-3.3.29-8.el7.i686.rpm</filename><sum type="sha256">a171ccb3b890377a7daac3ddd6194f4c3116df110a40d98dd6f64ef188779dbb</sum></package><package arch="x86_64" name="gnutls" release="8.el7" src="gnutls-3.3.29-8.el7.src.rpm" version="3.3.29"><filename>gnutls-3.3.29-8.el7.x86_64.rpm</filename><sum type="sha256">12a197828171a31d0b962c9ec39aaeb0b89a05cf933b5502e8a5658657e548c0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10844" id="CVE-2018-10844" title="Gnutls: Hmac-Sha-256 Vulnerable To Lucky " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10845" id="CVE-2018-10845" title="Gnutls: Hmac-Sha-384 Vulnerable To Lucky " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10846" id="CVE-2018-10846" title="Gnutls: &quot;Just In Time&quot; Prime + Probe " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3050" id="RHSA-2018:3050-1" title="Rhsa-2018:3050-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1375307" id="1375307" title="Deleting Softhsm Pkcs#11 Objects Does Not Work With P11Tool " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434091" id="1434091" title="Session Renegotiation Fails With Client Certificates" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1444792" id="1444792" title="Provide Ability To Set The Expected Server Name In Gnutls-Serv " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1460125" id="1460125" title="P11Tool: Cannot Import Private Keys Into Atos Hsm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1464896" id="1464896" title="P11Tool Cannot Generate Dsa Keys" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1561481" id="1561481" title="Rebase Gnutls To Upstream Version 3.3.29" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1582571" id="1582571" title="Gnutls: Hmac-Sha-256 Vulnerable To Lucky " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1582572" id="1582572" title="Gnutls: Hmac-Sha-384 Vulnerable To Lucky " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1582574" id="1582574" title="Gnutls: &quot;Just In Time&quot; Prime + Probe " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3052-1</id><title>Wget</title><description>Security Fix(es): 
* wget: Cookie injection allows malicious website to write arbitrary cookie entries into cookie jar (CVE-2018-0494)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="wget" release="18.el7" src="wget-1.14-18.el7.src.rpm" version="1.14"><filename>wget-1.14-18.el7.x86_64.rpm</filename><sum type="sha256">4772ad780b20e329f0d9a0e176ee10cae5c972a13cf977bdfcbfccfa79eaaec9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0494" id="CVE-2018-0494" title="Wget: Cookie Injection Allows Malicious Website " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3052" id="RHSA-2018:3052-1" title="Rhsa-2018:3052-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1575634" id="1575634" title="Wget: Cookie Injection Allows Malicious Website " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3054-1</id><title>Libreoffice</title><description>Security Fix(es): 
* libreoffice: Use-after-free in sdstor/stgstrms.cxx:StgSmallStrm class allows for denial of service with crafted document (CVE-2018-10119) 
* libreoffice: Out of bounds write in filter/ww8/ww8toolbar.cxx:SwCTBWrapper class allows for denial of service with crafted document (CVE-2018-10120) 
* libreoffice: Information disclosure via SMB connection embedded in malicious file (CVE-2018-10583)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="autocorr-fi" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-fi-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">d543dbf240c72f21d51489280f424b0e66c61a9b8c4677276c5b5a8ea2164f30</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-nb" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-nb-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">8382a09b13cb4e935ab5c4ed4ef5f03e418e316902527e3738b3f3ed9afe385a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sv" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sv-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">5c318e6fc22eab85cd506388800d586c68079d35640487271543fdb79da34c71</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-sv" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-sv-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">a5ac89a7cc8c469765b93e102600815e6d1f29c6a1cd9ed477c649f97420bde9</sum></package><package arch="noarch" epoch="1" name="autocorr-en" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-en-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">ea99c68a093f7b5a0a5da1ab32104d61ab94d1f51f299041a2f62b269ff939b1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mai" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-mai-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">616ca447dd72d9f687c49240373f3992f672cc820b2c6507def88c709e6e7fb8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ogltrans" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-ogltrans-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">04600566c58a2424bc1007e0350fc13c47ea6cefef457d90dc60b5d7b41cf6e8</sum></package><package arch="x86_64" epoch="1" name="libreofficekit" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreofficekit-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">8b3c52c7c5819d67fdba7e3836d3938e7257a8e8199cd8134101e7f83bc5c142</sum></package><package arch="x86_64" epoch="1" name="libreoffice-rhino" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-rhino-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">82b1ee22f4afd412261348bcbba4cbb54bcce373e7bbf0bb4ac005aefce24787</sum></package><package arch="noarch" epoch="1" name="autocorr-zh" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-zh-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">c9e11d6ba9d643ca6047066c749aea5b32e1ecfa1b26d22dead9c8f3b713eb3f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nr" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nr-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">a69cd77f17717137db7147d2ac73cbb559c5cb6e9894790503df9edcee97e7eb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-draw" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-draw-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">64531567c5a7ddaaca7968bed64dab204397a472ee1e3d2a0d65c426ee340f5b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-BR" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pt-BR-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">518da3afcebb85b2a0b58a2768b1192dbb54e1b90516a271f1ecee3006713cf3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-sk" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-sk-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">a51cf17ec37da14f484ccccc748a7a531340cb4274ee6dda8947032d31ebd8af</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-si" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-si-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">8e1840b77e405720f97027f83d1d82158e9342286b3a151a895ab2dea4f9067a</sum></package><package arch="noarch" epoch="1" name="autocorr-sl" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-sl-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">126f6c3ef1aa8c180d2d71c1cc97de0edd0be0faaa4e7229c23b461ea46c8c16</sum></package><package arch="noarch" epoch="1" name="autocorr-ko" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ko-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">03ab93057f8a38f8239547bbdfc2816da07ede36cb1a806894e51005a4ae3161</sum></package><package arch="noarch" epoch="1" name="autocorr-sv" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-sv-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">2801285567f3c58baf06051123f906b9c6d629a11c7ca767b1016b992ffc0014</sum></package><package arch="x86_64" epoch="1" name="libreoffice-core" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-core-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">5db9bd213049db56327bcd1ce5c9822a90791dad87c69eed38900e6a3cc4781b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-emailmerge" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-emailmerge-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">b426c59522d3b197bac10c9abdc652dd7534b243f4ab1aefb7acd6fc06d8cc54</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ml" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ml-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">ef331a980c20dedc2666deec0bb6dcfc1ce65cada3715b891b8ac2b5e0b9c03a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-xsltfilter" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-xsltfilter-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">2b76157821fe9de3f22089af2237b918f05dea9f8372b2af06ebdc6102b68a6b</sum></package><package arch="noarch" epoch="1" name="autocorr-mn" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-mn-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">b4ab047e13e92b1e52d48d9771852194c904cbe2a21ee65dd42b44e1d5fee890</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gl" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-gl-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">8af7ed1c47f99ddd2f5739bdee3becca8b452f479dd07aa121327f5f42d5bf36</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fa" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-fa-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">7ffd67ddac5c75ada08e9ea8117d87cdbbc665a9907f0afa2869d44b72f013d7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk-doc" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-sdk-doc-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">0a7432566967edf12d5921adf628eb00995bd80fb76652b5ce664e61253b4b81</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ss" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ss-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">914ba3185870b3706f5197c8007c6b2832a55c44fa675b1f5af80882558828ec</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-lv" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-lv-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">37e56ca0e0956f9fab2bffd9c5dc4fb9d438f049345a7cbbcb1dab53fe474195</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ro" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ro-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">3290ed24fb3c776c60b342b32cb6da35fdd41d272659d62c5c8fa06aa56d4417</sum></package><package arch="noarch" epoch="1" name="libreoffice-ure-common" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-ure-common-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">e9ba6f2b801c671aa08567a56df0fa4f8d6359e2219c6112ee1e6fea9d00b358</sum></package><package arch="x86_64" epoch="1" name="libreoffice-x11" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-x11-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">c4fc3405a2288dd75e3a66917bbf7b063133de2fa8b8f649ec38114eb0ab2c61</sum></package><package arch="x86_64" epoch="1" name="libreoffice" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">ca17467aa2cca02257b3fb829395c355c42c2284fb30dda9c9af14253dde685c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ca" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ca-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">3110ccd0a7b1ae7c66e9ad18e51ba2efea630331b653a0bbcc652c7684d271e9</sum></package><package arch="noarch" epoch="1" name="autocorr-vi" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-vi-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">6fd47d84a5222d791a6746a1612f40cc78a9ccefaa190c63e7ed301f1ac9d522</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-st" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-st-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">aeb975a2fcd41202a854d9b858ef5c9b4a303c9a75089d0c693a8f799c4e9b00</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ro" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ro-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">020d97a8e109c4e6845b0ca0bc47a600e30539fd07445f7d16086c9e2a9feb4c</sum></package><package arch="noarch" epoch="1" name="libreoffice-officebean-common" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-officebean-common-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">c9920cde9883c95d5f2cdc8f2aea95f86bb0a5dde9c36d4bce7e739f47ff7eee</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-it" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-it-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">b3f628b1aa97fc14c19b30786f1ce24c6ff8a938c6d1dea843bf23637c5143e5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lv" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-lv-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">505eca12f522ceb8a27747887e419658049b2978c1b7efad60a99c4952d149a4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-tr" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-tr-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">779a6f57d7223812f8cca2c6cc6c339f97b164199c346ab1ad92bc4194365011</sum></package><package arch="noarch" epoch="1" name="autocorr-pl" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-pl-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">2b86a3274c2b76f252c85fc2bc5e095a662c75128f2b620fde040e78fcca5163</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-dz" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-dz-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">9e0b507854c887e260a4beb8408ef37aefa1bd9b93d5ecfe5065d2661f62543b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ar" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ar-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">498f317a0aa37be7fe8d9098f1c9e068aa282aa530d4cf49a8a6fe8110d24924</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-zh-Hans" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-zh-Hans-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">0e7da8e55d0a724fa465c9f4360b6e44b527865fd92945f189ea3e2055071314</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sr" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sr-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">e034f3ab9b4f45b277343d5c2c16ea46c2c94cc88d7ae639ef8ff38c92af90dd</sum></package><package arch="noarch" epoch="1" name="autocorr-ga" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ga-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">bbbe6217fe43b28f9efcfe5c3e99a3477869b83bccd6566703d9a3896a8e63b9</sum></package><package arch="noarch" epoch="1" name="autocorr-af" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-af-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">f6b7ac50b7ab89b5fde7fdbec6ed36cb824e98bdc8a8d203156efdcc6b3397d8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-glade" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-glade-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">acbf9769e6ecfbfa34ba5a06cd48cef90be2a04f98dc92a932f1326616ec589a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tn" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-tn-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">3481d541a99dea3e5150b4847649173c6ac6e182dfbd536c636dbef309cd62d6</sum></package><package arch="noarch" epoch="1" name="libreoffice-data" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-data-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">50c7098e91b06ce152016d4d396ad6a8e95d4a078b4114a139d98b3572650283</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-lt" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-lt-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">bb72d4880e4978275d401565332c611e146bc4b74a01039d8f5c28b214dedcd2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-filters" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-filters-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">ae09878b11996b6548a5dc6baf2ad07bc5c06dc2935bbf880a7e998b7d898192</sum></package><package arch="noarch" epoch="1" name="autocorr-cs" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-cs-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">832dabc39e5be85b52f3608a8a6d16c3592a5230f27425262b74cc91b38ef014</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-he" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-he-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">1a4902ab9ade3d027dfba9d0d05d23fd3a522d34aa82fb73111f06ced05ab075</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fi" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-fi-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">85c133e6c743546aa0fd8ba490f8c35ec2c500138c7a428b9604f4dbf7f21879</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gu" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-gu-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">9ed84c5982faec9ddf82ba263979996cddf2ff4b4322fd482f263a13bbcc8462</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gdb-debug-support" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-gdb-debug-support-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">67bfd3ba0609883682e2f6655fec7467d7fcc26cd00085af3078b3da6b6334b2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-sdk-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">75332b07f772796fc78de4f90bd4310a6a275c084b40e4a9092532d0a490ce75</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cy" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-cy-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">73ea1d6f70a8ef2fcd57d7046269490903b73bd3c8e98d36685c38f222b26935</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cs" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-cs-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">e11a666b59599a4d2ba3f42ca1e859445d0533b2826bf4ecfa966f853eeb6d29</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-fr" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-fr-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">1a92a81eadf863bf3bf9b44738325ec824e3a5e1206f3ec34b675f4a689b7b0c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nn" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nn-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">b2b40013281360b9f98780c0da2c561572fc59191dadb3f35f7f6dfe6f2173a5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hant" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-zh-Hant-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">1c730d121f436b2a290c6c5be002ba6087f9dc8e958f12aa918247449c7f2bca</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-pt-PT" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-pt-PT-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">8cd18c7ed093e0f556b9fbf819fa424b3a086333e429c405ff0b7e6a5284505a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-base" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-base-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">b8045b8c8fba48e50512bf7570729c0bff0401169bbf153f6615c883860ebd9c</sum></package><package arch="noarch" epoch="1" name="autocorr-tr" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-tr-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">ab51db33055c5e0aed5c0714780f1de0e1f1eb0e6b3a42171236409293526436</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ko" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ko-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">846e3acd2eba13cb6c9066720b1e1d357fcf4a1137cff6352667bda2ef8a80cf</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-uk" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-uk-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">66d29e47e3fe9bd5b21aebc13a09afc330a25842e07739608ef42f60187f9954</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-te" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-te-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">8325c7809869f5cd03a6f2787494b536f02ecc145a2740a2e3206faa8b196397</sum></package><package arch="x86_64" epoch="1" name="libreoffice-impress" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-impress-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">f7520a6fab6843350ff6326332b02159c9c77611e0fc70e52d66b011df07ea9a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pyuno" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-pyuno-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">ee5fc42a8c44207314766dc22f46fc9043baf81a2e43e8e9a5152baca1cc171e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bn" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-bn-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">96a5a9a0b2d8ddf2697ad706eb98473ddc651e8cc965ebb85a8316219c5411a0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kk" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-kk-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">cc80df0d97bfea7ad4c83b54ae51fd2e19b00dd68a3c3f021c5d953b56d40fe7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-eu" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-eu-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">8e91f3c988f191de95a499e3319250336137d95bad74fe1845177c7b0523adb0</sum></package><package arch="noarch" epoch="1" name="autocorr-it" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-it-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">f09d2d29bed29f6201801648da6059611438e76f5bcaebe97c63922b04b105ff</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ta" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ta-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">de5d6b4c890973cc3b494b5d5c033c8ecc901e8bed426a8590293101b7f93071</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hr" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-hr-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">8425cd7dd6e0622a76ead045d87ef18888dc6b6b28b03b6e8556f3e7d11de163</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-en" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-en-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">b352214931aeb9f5d124eed82fb6bb9ccc41fd883d4f4209eef6cdac897e0950</sum></package><package arch="noarch" epoch="1" name="autocorr-de" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-de-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">0073205eaaf2410577fd34767bea3381e1b0682c05f8d4fcbc24725e74cdb770</sum></package><package arch="noarch" epoch="1" name="autocorr-da" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-da-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">837c932dc2b0c282e68820956345751abe5d4bc1fb85bd9e46409403abb84ea6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-officebean" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-officebean-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">0a5ceca8b070b264deb477fb2c8e38b83c13098f68e53d1c980c846e225f8fdd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-fi" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-fi-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">076342ac2710f68fad8c4faf9e29aef67fc3a88b0d7930dad3bede5d266b5911</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-es" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-es-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">7b3f02aa69f5fa8476e04a23998ab89526626d1f42d2342f87a3532e57d6d395</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gtk3" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-gtk3-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">968be9fafb0081a5d0cfe03906ec8bab7113f232d3ee7606cdec42450313d850</sum></package><package arch="noarch" epoch="1" name="autocorr-nl" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-nl-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">6df8f1749733ba27e95c572c21b20316b31199c72f2d2f515df4e25a3ae46cb7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pl" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pl-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">20657cfb7d0cae5478808a69df3e269db857c80cdbf2e28679d2a10db455ef1d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ja" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ja-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">2f71face0ec54922148363525403f53fc5f771d201271ecb062b9163e0d20410</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hans" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-zh-Hans-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">bb353a6a2bc1a1b56648a2329f1dfd1214c0ca42d2547df3b2ec6cee9ab5a08c</sum></package><package arch="noarch" epoch="1" name="autocorr-es" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-es-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">8ed40ff321dcd787299e8a0881e49e7c49e7ba8e80768d68606e0e6ec3838c9b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-eu" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-eu-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">0f2cde752f5f7b7146eb909eb2ca65a018c74c77024b64855972cdb4cc92a1d4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-pl" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-pl-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">db53acebe0b8bce458c6812275b45ad0268381a84ce41f6908606a903eabe142</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-it" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-it-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">10e8ebe33821b1cc572a281c69749b98829cb01dd74444739e6d3261091c54e3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-cs" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-cs-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">9c003dab3d6a9c4e168d59837089dd2d511938f80b6fc3b69aa029368966891e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ts" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ts-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">bcb23c483834e9a5c6d6dc3174a62109dea1ad42a9c08bed4827a2f64bc865b6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sk" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sk-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">c15d4a364bd8353c1d489abcb69127eb008bc72c4881fba41e9155f048942630</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-uk" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-uk-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">536b750535c272be3ed6ea6a4cb9074447bf3571e25d09ff6361c31ace64b3a1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-bg" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-bg-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">467d2ce290398bdb3b14459be6d051d8a5dca485d1346f8784c05a9215dd79b4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-es" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-es-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">c4e3f398019eb6832c3d70170c50f770f9721b0714a8007bb16b6690ee7c9a76</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-de" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-de-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">96decefa0cb0e597a6b4053236213da29c97f26cbdbdc6c7b561638b9773ace3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bg" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-bg-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">9bf2a76754c5d48bff0a6cc4f733cf68e02fcb54d2b6b1ea121d0201f7ee9723</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-id" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-id-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">db49294f9d2d955ce14e4bd6b1e5159a320f4d3434f4767a6fd49a2617f75c81</sum></package><package arch="x86_64" epoch="1" name="libreoffice-bsh" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-bsh-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">64b0f927e1bff1d58fdf463e01f81d6157954613e82658f0a84316432da11d8f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-as" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-as-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">cf695f996e6c36d2c3bb7c16ee910e983d59523ad52fdf1168056f6e82de4f78</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-nn" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-nn-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">a9cedd8ece2582784019ee85b5cadf219e1334e1229058a2858459239ffb7279</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-da" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-da-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">a1135d44410917a5e48457b8a222bca7de395d95982e1ebd9d5dcdb54f39ef18</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-hu" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-hu-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">e9e648736c520d37791701c577ddacf5a7d0235b22af3d3d2590aacf3ab2d445</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-id" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-id-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">3800724c8416d7f5540ee6a55819c76b9419d20a9d41cfc5e6daebb908eae04d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-et" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-et-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">5f74d1ee581fee07d45a444fb4d20e495fc033a48abf1d5b801d36169f3dd8da</sum></package><package arch="x86_64" epoch="1" name="libreofficekit-devel" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreofficekit-devel-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">f5394b1de3daba66f1cc59f015a92e8a78198c65519a73a3321ccba740679fb3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-zh-Hant" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-zh-Hant-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">f482166af625c4ebeba4e68641c2e1aa953a778fe15b890a09ba7d0ce1098271</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lt" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-lt-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">4934e2cc72d06be9403523e2fa0587332284f856df299ac89fdebc19122a1a69</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-el" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-el-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">e25ea1100485a661f4d66a2c808077cd5e45ce9d02852c54ea3a9ee6845b9ee0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sl" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sl-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">92239aaec19f1adf140bfadd2156ceec734af1b475c9b2d4cbd7a09e76980240</sum></package><package arch="x86_64" epoch="1" name="libreoffice-librelogo" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-librelogo-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">a38f4da25919dd8b48b9cf42684f025fd25d4f17131a1715fd2ce7efe651a50e</sum></package><package arch="noarch" epoch="1" name="autocorr-sr" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-sr-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">132c15ff6217ccf0c8527f5b795a188bd5f68359447abdb5185b6dfc042ccaf8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ar" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ar-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">4be84777c971489442b95e7d40304fed1b426074abd1f519f600803adfbb0c74</sum></package><package arch="noarch" epoch="1" name="autocorr-lb" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-lb-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">b20ffc775b8eef4fd97e239711ede2c1e9600752d41d78c63d887d43aab3b9a3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-graphicfilter" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-graphicfilter-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">275998006e34c7029f70b9d9289927df85a0d4d14186175d695aef1e0e71264f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mr" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-mr-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">8d440c05ed67200b9d0205591700a156ab92680e744c26142bf4b88741b5f3c3</sum></package><package arch="noarch" epoch="1" name="autocorr-fa" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-fa-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">aa40543947b0c04f3132bdbb1fa75b3b1f095752cc949e86592fd5eb6ba71311</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ru" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ru-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">2220b66e1147d8e52f2e710c66df4d83ce38828a1d8d229faab97379dc54badf</sum></package><package arch="x86_64" epoch="1" name="libreoffice-writer" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-writer-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">270c2ac60059faea7a252f68d290ed77bd992b5b7c3b0b3f93c50f65e0c6f1b3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zu" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-zu-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">6de023bade936dc4963f14e1d2cc9d7df69f8d8e06dde2f96f7d1eee90b63f57</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ure" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-ure-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">ea0463076a7e74c8395aba3b5ce8e6d891015f039418fde122377e572508bc08</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ja" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ja-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">2cac78c814e8a34d78e3f72fae48a35876be427bbe63ebae40089b4683382c85</sum></package><package arch="x86_64" epoch="1" name="libreoffice-postgresql" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-postgresql-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">e8ca052b108fce4d551e64bb0cfbbdaea65b93a0fb76c02539a5d0373fd4b738</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-xh" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-xh-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">0394ac462323ea6896c23d7ec93c86ca82039d2f822341cd100fce84971e5f7c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fr" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-fr-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">501408dd4737764c86180ccf516a1986ceb0450fa53833d65e823015a812e9d6</sum></package><package arch="noarch" epoch="1" name="autocorr-pt" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-pt-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">eecfe18a3b77319e47c97da762d4f1cdcc85397592a717c4614b6ba350fdf23f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-el" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-el-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">59d61db99858bf465edaaf09f3f4e43d11c42a63ae0cab6b66d6f0275429f50d</sum></package><package arch="noarch" epoch="1" name="autocorr-is" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-is-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">1935ce4ef738512343cca57a440e458e009453d0ec99af42d401e829013819bb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-gu" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-gu-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">8fe0f4eae7e0c7b0483547fb2bfe07d3051d3e99fff1995c1ba2edc9170e0428</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nso" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nso-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">467b186443d7c8067224a4e1516b3d10b7793f6eb1c099fcc98c5c1d87c86ad3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-he" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-he-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">5480f7c6801e2d2c3d62b8cccd2a615b8624960748850ee6e6e2a968c74e1575</sum></package><package arch="noarch" epoch="1" name="autocorr-ru" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ru-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">c96342e3cc6eaf52b2effcfdbf6c2ea231a60c1cb78119bdfd9f8b407a7fa2b4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ve" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ve-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">544721d63f697b2cca622d83c9852de1354c85ac1818cdb38abf4ac7c19ef0b5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-af" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-af-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">f8a7d76a5305a334c276c1b4622ae4e5018cdd1b9ae440682edd6a69e2e0b76d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-hi" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-hi-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">bf0122919969e9b0c3a3478877d8a2cb0d560047f9ae935a794809858f94d502</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-th" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-th-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">8857e6808a264fe0849e126fb92452387c0f7205f0227a9e8e09236404c422f9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-da" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-da-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">ee0452f80755663044914dbd80fa17b2dbcff39780790e0fdb5136954df5e2d6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hi" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-hi-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">dba3ef6962ea3a2d09a46553d9cd5c2aedfbce43b6ac46e840713c91d3850bac</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ca" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ca-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">d9ef57965770f294b665d02df63734198544abebc2ab69316695511dbc11a5bb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-nl" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-nl-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">0e5453808e529ab51d130d7ba1f935e71a132bc4ba28d141830292f477393769</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pa" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pa-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">e2e073a1a833fba4c3d2ce61625a51bee053ce4580852ad75f2a2a2987ee14f7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hu" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-hu-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">a360a999c235652798a46c40f04395dcdb48dcb16853ecee9f7a1393cc0bbb2e</sum></package><package arch="noarch" epoch="1" name="autocorr-ro" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ro-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">42ba7582498967e43b4a206696245b24ad497a7df1dff2244aad6e255f7ebb0c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ru" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ru-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">a04f69db77f0d177764e09d7d88fe033554c77f34fa87a5f538bea1b46e7029e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-sl" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-sl-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">b35f5a6f019608d93daa63010125ce1b7773b8e0526ee51f16281ccea29c7ed6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tr" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-tr-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">0d7e8d5c3f28d2c447aa661cb509833c2db854bc03b1c90952f9313c063acca8</sum></package><package arch="noarch" epoch="1" name="libreoffice-opensymbol-fonts" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-opensymbol-fonts-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">361e4662a7f9e93f3aa2f4cf7c2721d8ae5441a107df44824b242861f1678f93</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ko" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ko-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">f010d62fad3f2d95982c145506bf36e265783a5092a58657222324cb5c4c1e19</sum></package><package arch="x86_64" epoch="1" name="libreoffice-nlpsolver" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-nlpsolver-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">8be0a94afce884de4170f677827233aa9ef5e7fd286df4811f31b4abbfcf357a</sum></package><package arch="noarch" epoch="1" name="autocorr-ja" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ja-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">605d916a633ea62907b7e2d144d0994488079fd70596ae4aa703f401cfa05c84</sum></package><package arch="x86_64" epoch="1" name="libreoffice-math" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-math-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">8e4942b98e3406f5d72dcd58e0b58333c5d0823602ef49f69b7cdcc731f2babf</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-bn" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-bn-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">d3e469d1a05ef45c5864bbdb088397e3c2eda3a8f28177dbb537388e4f7fea96</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-si" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-si-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">cdf0769a78f128049c7437d8989ea0cc80bca910e846186d5f2ebc0388479d97</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-gl" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-gl-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">1583fa06d0bb3c43bbdc68ab809b2bfe49063267aebdff033eacdf8df3832fe8</sum></package><package arch="noarch" epoch="1" name="autocorr-hr" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-hr-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">cc68e6784ca6cad8ec3d19d0bb478d9cc321b05bb7783ccc39f53f09d3af7296</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-dz" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-dz-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">a812ee9f953d01c01938140164c65c57b98b20410c3ed557892533734e8ec853</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-et" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-et-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">248ade0789085a05983087ca177c9ba1fcfdb36aff35224d39d1803136cd3713</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-de" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-de-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">b336d36f26f28c46c7c2f1a6bab6cf8b870fb81662e17bbe9937d71885bd59b5</sum></package><package arch="noarch" epoch="1" name="autocorr-ca" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ca-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">4a463997e732e319d333cb783aa7971b15caa8553702425f6c2355e0ab3600d7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-hr" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-hr-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">53e4a0beb217e842b1235018680ec1df196c7b4559b3b210180997899756e717</sum></package><package arch="noarch" epoch="1" name="autocorr-lt" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-lt-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">b4f287832de58ccf1cdd943d0b519c3cdd42f3dfef4fecb27c973457900ad730</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-or" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-or-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">cdec8aff2fa97c3f40c0389b6936ad8805ea7943a5b438dc7bcfedc8603ac932</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gtk2" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-gtk2-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">10384dbaff4a68de8dd94a579ad0a84e73b284bdc35e0d74bced0d87d0c71c24</sum></package><package arch="noarch" epoch="1" name="autocorr-sk" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-sk-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">aeabbf846762387ffa961f8846bea3f69cb193ed0f354b4be199e183f1cff121</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ta" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ta-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">55fc85d877f66c1cba037dbeef10c769e7efc57865997d3d879cc87bebc64190</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ga" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ga-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">bdddf0c1e8d5e0a876699bb64471bbbabeba175c08556d1f8eaf66a94b593bc6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-br" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-br-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">aba9e46b83ed7457b1b65ff30d2851f10479471db37cc24b1912d8f25b229a5d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nb" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nb-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">104833f1daab90152715f2c29cb364d1d9df6227eee03418c433887d2c4a0d75</sum></package><package arch="noarch" epoch="1" name="autocorr-fr" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-fr-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">b972344435d9456c4a828ef1731cb354f8a4ef55ebb924dc9529aed1b12a0bb9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-pt-BR" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-pt-BR-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">e2a0e7b350d02b44495091f7393702b770a6fcd1b89ec03c9c44bef15e241bef</sum></package><package arch="noarch" epoch="1" name="autocorr-hu" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-hu-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">49ed7e12e1cb91f60cfcb1a2c13fa531eacef394799417d44430a99736030c16</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-PT" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pt-PT-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">c1a125c091da1649444a5ebe4a7f285b5d0a30b6f803a77eb2e10d97ba125bde</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kn" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-kn-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">b4b5c3786714940ef2756dd47ab18a337f922565a88e095d184289acb22c63e7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-wiki-publisher" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-wiki-publisher-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">c1bc41e9789ea8320ce265a44c1ea4c4b18e55885973880c036b61fd876eabd4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pdfimport" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-pdfimport-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">4de0aaf9b97b2df10f6fe34a2053bc1644d18c84f4341bf5bea2462dde5c03ca</sum></package><package arch="noarch" epoch="1" name="autocorr-bg" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>autocorr-bg-5.3.6.1-19.el7.noarch.rpm</filename><sum type="sha256">a9840c0b926f91eed9122c197f2d034f9cef3aec512cece3538d79f3b0a6c788</sum></package><package arch="x86_64" epoch="1" name="libreoffice-calc" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-calc-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">26fd9661e5faad0ad075816871803f59ba22146efae4f930e271bb322caee3f4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nl" release="19.el7" src="libreoffice-5.3.6.1-19.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nl-5.3.6.1-19.el7.x86_64.rpm</filename><sum type="sha256">5c79e80e4d6922126deb3026bfafe2cdccebf299fa1f911d568c1711557291ea</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10119" id="CVE-2018-10119" title="Libreoffice: Use-After-Free In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10120" id="CVE-2018-10120" title="Libreoffice: Out Of Bounds Write In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10583" id="CVE-2018-10583" title="Libreoffice: Information Disclosure Via Smb " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3054" id="RHSA-2018:3054-1" title="Rhsa-2018:3054-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1388764" id="1388764" title="[Fix Available] When Editting Text In Libreoffice Calc The New " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1545262" id="1545262" title="[Fix Available] Ppc64Le Fatal Exception: Signal 6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1546997" id="1546997" title="[Fix Available][All_Lang Except Zh,Ko] Text Overlap Observed " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568579" id="1568579" title="[Fix Available] Libreoffice Leaves A Zombie When Run In Daemon " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569836" id="1569836" title="Libreoffice: Use-After-Free In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569840" id="1569840" title="Libreoffice: Out Of Bounds Write In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1574998" id="1574998" title="Libreoffice: Information Disclosure Via Smb " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1589029" id="1589029" title="Impress Not Showing Text Background In Presentation Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1610692" id="1610692" title="[Fix Available] (Soffice:13740): Gtk-Critical **: " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1610904" id="1610904" title="[Fix Available] Rendering Line Cursor When Moving Selected Text" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1614419" id="1614419" title="Libreoffice-Calc Crashes In Fips Mode When Handling Password " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3056-1</id><title>Samba</title><description>Security Fix(es): 
* samba: Weak authentication protocol regression (CVE-2018-1139) 
* samba: Insufficient input validation in libsmbclient (CVE-2018-10858) 
* samba: NULL pointer dereference in printer server process (CVE-2018-1050)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="samba-devel" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-devel-4.8.3-4.el7.i686.rpm</filename><sum type="sha256">01406f83e45daac8ff123890f68b42c0a5637ff95331e0a45121e1f55fdcb285</sum></package><package arch="x86_64" name="samba-winbind-clients" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-winbind-clients-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">a8ebddb5d63b36e584fb87c9f7ae781d44a224b958d4f03edc36c6a68c146e64</sum></package><package arch="x86_64" name="libsmbclient-devel" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>libsmbclient-devel-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">3471bb45cf5a904e7b1170dc7599d8d2d2c30db0537fe93039b1c2c0a261c480</sum></package><package arch="x86_64" name="samba-python-test" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-python-test-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">d5317b51d2202b99e37ed930dcbf705170f9e51db4faa0076be41415c6adb6d4</sum></package><package arch="x86_64" name="samba-devel" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-devel-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">5a7b962f091b3a820256f7fcc70337dcc613f9c5f2bfe476e0e6592e9d24d748</sum></package><package arch="x86_64" name="samba-test-libs" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-test-libs-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">e9d3538c017c0ee3af72818216362bca3f197277eca91633d2f48e22159987b0</sum></package><package arch="i686" name="samba-libs" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-libs-4.8.3-4.el7.i686.rpm</filename><sum type="sha256">041a65db90322d6a2915fce0307be96b5103cbf50bcd53c10d3c6b39aef6ca5c</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-vfs-glusterfs-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">98b1088585da6f015e48ee0bb5fca77df6f0b434b3d5b471aa3f09b98d82da68</sum></package><package arch="x86_64" name="libwbclient" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>libwbclient-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">b917b2f8a8a130c8c6697528bf0f7451860dcdf6d7c9e058501e2ee804ad6269</sum></package><package arch="x86_64" name="samba-dc" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-dc-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">98dc23a89da634f8b8633c98c25b1eb86ae768c2cd8be22f57ac5caf72a99508</sum></package><package arch="i686" name="samba-winbind-modules" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-winbind-modules-4.8.3-4.el7.i686.rpm</filename><sum type="sha256">dfe9c766635e94dc1cd1bb1e18f3e73dabb2fcb5eeccd62820578df65753ae40</sum></package><package arch="x86_64" name="samba-test" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-test-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">c9fa7809764dc296b9499725d03afe911b0a48da9610a39f9c8d8dfdc41a8abc</sum></package><package arch="x86_64" name="samba-winbind" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-winbind-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">057a1c20c616a1f8b04d6e5829e7a47adaa0f264f35343c33dc2c95d6b0640b3</sum></package><package arch="x86_64" name="ctdb-tests" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>ctdb-tests-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">0ce965f8e81eea19e154da9b49d4f3188656678710b1a429afbec7731206400e</sum></package><package arch="x86_64" name="ctdb" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>ctdb-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">174dd337c790faec315a3791ee95b7f78501d36fb708453c2f3ae52800b590a1</sum></package><package arch="i686" name="libwbclient" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>libwbclient-4.8.3-4.el7.i686.rpm</filename><sum type="sha256">6b25b0a682860ba34bd7533b94c956eda7ff1fdc9ee90f5a316012dce8c0f4b7</sum></package><package arch="noarch" name="samba-common" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-common-4.8.3-4.el7.noarch.rpm</filename><sum type="sha256">a2159a8a5b0b6a284a536a89e5c494b3417add2585c88f31a7f44265be9af98f</sum></package><package arch="noarch" name="samba-pidl" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-pidl-4.8.3-4.el7.noarch.rpm</filename><sum type="sha256">fe3c8b33b6c1224be474467f2be959fe726752181f887780a9be7fe58f666300</sum></package><package arch="i686" name="libwbclient-devel" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>libwbclient-devel-4.8.3-4.el7.i686.rpm</filename><sum type="sha256">fa1ff72fc8cc3c6b476409b6e520be343bacfd2b0489820c7766b6911b9d6d15</sum></package><package arch="x86_64" name="samba-common-libs" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-common-libs-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">fa61c25528f79e33f0e178fbb5bd12e5769b6bf96d98cd9af6460127580b08ed</sum></package><package arch="x86_64" name="samba" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">f64859183b8c26f14ea459b81ff6cf8c0817b00549adfbfff9d20638686e8593</sum></package><package arch="i686" name="libsmbclient" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>libsmbclient-4.8.3-4.el7.i686.rpm</filename><sum type="sha256">090dfae684a60ca94b3935a74f01d4165d075d023e8fabbad382c1a31b5d49f6</sum></package><package arch="x86_64" name="samba-krb5-printing" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-krb5-printing-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">02affc3dc1b04e172a713ef59361ca4e211bca2829bf82bb4fe4a5067b0b8b1f</sum></package><package arch="x86_64" name="samba-python" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-python-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">0d1bd727bbe0742ac9ee1868a111fe979f98ed54704e63dec23f2630c7922c34</sum></package><package arch="x86_64" name="libwbclient-devel" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>libwbclient-devel-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">1cb703222aa0775f4cfbcbf473aee020d0d97fe480a9d84bfb3ce63de24bdcfb</sum></package><package arch="i686" name="libsmbclient-devel" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>libsmbclient-devel-4.8.3-4.el7.i686.rpm</filename><sum type="sha256">c09924c3145acdc76fa9249967a5d3d1c899597de85944145158cd594006e8c7</sum></package><package arch="i686" name="samba-client-libs" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-client-libs-4.8.3-4.el7.i686.rpm</filename><sum type="sha256">b77c4cadcc7e9959b8d314f36b9bb45150e1c581fec75eaf99373ca88c7897d7</sum></package><package arch="x86_64" name="samba-client-libs" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-client-libs-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">ac73010ec92d8634c1388d8cdab51a15267d70927648ec85b83367129da80b21</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-winbind-krb5-locator-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">23ea91877e774adc7b3437eec8b3eeefd8f3b6b697ebcf186c74989c1b7301c7</sum></package><package arch="x86_64" name="samba-libs" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-libs-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">e3c25c07327aa1696d8664d67cc61cf8f1d0793a3d6e1f572b747f0f60506268</sum></package><package arch="x86_64" name="samba-dc-libs" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-dc-libs-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">1239cb04e1c007c3d82c6c2bd6db679b0f4747db50e6ad54780db046fbdd5cde</sum></package><package arch="x86_64" name="samba-client" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-client-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">11a5a5c1cc47b39b276a3af60a72dbe2d39033637af929a871b21949221d7f84</sum></package><package arch="x86_64" name="libsmbclient" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>libsmbclient-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">5f39e0820bd83a4b62ad0b31b59f1439bf580a6a6c36d3ee986af4335db6d250</sum></package><package arch="x86_64" name="samba-winbind-modules" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-winbind-modules-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">5591df8b009edbd2490969a8b67fb7714695ec472ac76549882687b6e524f2f5</sum></package><package arch="i686" name="samba-test-libs" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-test-libs-4.8.3-4.el7.i686.rpm</filename><sum type="sha256">412d7b12ddf36804957469e53805d4e8b58b70ae7276f7c4190704d284eb65c6</sum></package><package arch="x86_64" name="samba-common-tools" release="4.el7" src="samba-4.8.3-4.el7.src.rpm" version="4.8.3"><filename>samba-common-tools-4.8.3-4.el7.x86_64.rpm</filename><sum type="sha256">4772fec55c0d3ed48add5060397bdc0b4dda0e0cd77a48a85258f23e4ad824c0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1050" id="CVE-2018-1050" title="Samba: Null Pointer Indirection In Printer Server Process" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10858" id="CVE-2018-10858" title="Samba: Insufficient Input Validation In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1139" id="CVE-2018-1139" title="Samba: Weak Authentication Protocol Regression" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3056" id="RHSA-2018:3056-1" title="Rhsa-2018:3056-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1525511" id="1525511" title="Fix Idmap_Rid Dependency On Trusted Domain List" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1532618" id="1532618" title="Kept Getting  &quot;Smbd[Process-Id]:  Panic (Pid &lt;Process-Id&gt;): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1538771" id="1538771" title="Samba: Null Pointer Indirection In Printer Server Process" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1540457" id="1540457" title="User Login Issue From One-Way Trusted Domains Has Not Been Fixed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1558560" id="1558560" title="Rebase Samba In Rhel-7.6 To Samba 4.8.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1558943" id="1558943" title="Winbind Use 100%Cpu And Disfunctional" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570020" id="1570020" title="Coredump With Dfsgetinfo" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1575205" id="1575205" title="Net Ads Join Crashing During Dodnsupdate" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1581016" id="1581016" title="Smbclient Echos 'Try &quot;Help&quot; To Get A List Of Possible " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1582541" id="1582541" title="Windows 10 Can Only Authenticate Against Smbd'S Local Sam With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1589651" id="1589651" title="Samba: Weak Authentication Protocol Regression" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1612805" id="1612805" title="Samba: Insufficient Input Validation In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1614132" id="1614132" title="Smbd Crashes With &quot;Assert Failed: Dirp-&gt;Fsp-&gt;Dptr-&gt;Dir_Hnd == " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3059-1</id><title>X.Org X11</title><description>Security Fix(es): 
* libxcursor: 1-byte heap-based overflow in _XcursorThemeInherits function in library.c (CVE-2015-9262) 
The SL Team added a fix for upstream bug 1650634</description><severity>low</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="xorg-x11-server-source" release="3.el7" src="xorg-x11-server-1.20.1-3.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-source-1.20.1-3.el7.noarch.rpm</filename><sum type="sha256">4ffe1d92a4a43a925924f4b194f85ce6a6717ea23f038c801eb2c77d7c64cefb</sum></package><package arch="i686" name="libwacom" release="1.el7" src="libwacom-0.30-1.el7.src.rpm" version="0.30"><filename>libwacom-0.30-1.el7.i686.rpm</filename><sum type="sha256">2b2ceb816bb611f5c9aaaa01c22c9eeb426fb255ae1a9e23261f9e22e055b994</sum></package><package arch="i686" name="vulkan" release="1.el7" src="vulkan-1.1.73.0-1.el7.src.rpm" version="1.1.73.0"><filename>vulkan-1.1.73.0-1.el7.i686.rpm</filename><sum type="sha256">262ab6cd5add6d04637b9c3d7d996ab30ae3b8c11da54306da98f445ca27e096</sum></package><package arch="x86_64" name="vulkan-devel" release="1.el7" src="vulkan-1.1.73.0-1.el7.src.rpm" version="1.1.73.0"><filename>vulkan-devel-1.1.73.0-1.el7.x86_64.rpm</filename><sum type="sha256">a3ad72f93763b759a7cf2d88470ebbf031970aa35d6c4515215c0f080b54e2da</sum></package><package arch="i686" name="mesa-filesystem" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-filesystem-18.0.5-3.el7.i686.rpm</filename><sum type="sha256">f04b179f78010a613f26406ead9431137c32de310ca0e3e3a2459e732200c1d0</sum></package><package arch="x86_64" name="xorg-x11-drv-synaptics" release="2.el7" src="xorg-x11-drv-synaptics-1.9.0-2.el7.src.rpm" version="1.9.0"><filename>xorg-x11-drv-synaptics-1.9.0-2.el7.x86_64.rpm</filename><sum type="sha256">3f9e35e53a27537aafb0f1088d9ef21b339bd1d759dd2490c03c77d504224a8f</sum></package><package arch="i686" name="mesa-libEGL-devel" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libEGL-devel-18.0.5-3.el7.i686.rpm</filename><sum type="sha256">08a13f11ed304d661a2d2c4412bc3636df48c8f2171cf939157a094f2c308815</sum></package><package arch="x86_64" name="xorg-x11-drv-void" release="2.el7.1" src="xorg-x11-drv-void-1.4.1-2.el7.1.src.rpm" version="1.4.1"><filename>xorg-x11-drv-void-1.4.1-2.el7.1.x86_64.rpm</filename><sum type="sha256">6124c6f25d3bbdf04bbef36ffd34506bd2bcc830d80f2d6980c66171f3219f68</sum></package><package arch="x86_64" name="mesa-libGL" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libGL-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">1fdee1e4478ef363b65eb6ed545d1be5f3eea29985da42e19f507e99661fa46b</sum></package><package arch="x86_64" name="tigervnc-server" release="13.el7" src="tigervnc-1.8.0-13.el7.src.rpm" version="1.8.0"><filename>tigervnc-server-1.8.0-13.el7.x86_64.rpm</filename><sum type="sha256">30e36ec9a8ad6ddcb4c3f865e80d68ba2979577aa40b0c93471877598a7d4636</sum></package><package arch="x86_64" name="libXfont2-devel" release="1.el7" src="libXfont2-2.0.3-1.el7.src.rpm" version="2.0.3"><filename>libXfont2-devel-2.0.3-1.el7.x86_64.rpm</filename><sum type="sha256">a7e2fdd0608f02cee5f3577c3b01509197c05eabb0bddd203e5d8ddfa0357e6c</sum></package><package arch="i686" name="mesa-libOSMesa" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libOSMesa-18.0.5-3.el7.i686.rpm</filename><sum type="sha256">2855a1dee29bb218940a98e253511109471769f9d8c6467c0e22b88d5e9f62f4</sum></package><package arch="i686" name="xorg-x11-drv-mouse-devel" release="2.el7" src="xorg-x11-drv-mouse-1.9.2-2.el7.src.rpm" version="1.9.2"><filename>xorg-x11-drv-mouse-devel-1.9.2-2.el7.i686.rpm</filename><sum type="sha256">6f86629119659914b6b8a846f3a7203d4a9452c376f4d0e747540326c093afc9</sum></package><package arch="i686" name="freeglut-devel" release="8.el7" src="freeglut-3.0.0-8.el7.src.rpm" version="3.0.0"><filename>freeglut-devel-3.0.0-8.el7.i686.rpm</filename><sum type="sha256">370eb65ef91c7c480fc50504555ccd5b7c9c3b695cd3db574f56d3367ce16726</sum></package><package arch="i686" name="libXcursor" release="1.el7" src="libXcursor-1.1.15-1.el7.src.rpm" version="1.1.15"><filename>libXcursor-1.1.15-1.el7.i686.rpm</filename><sum type="sha256">ac6b859fa72612f58f24e2a84d6520f955b16473b33b7593c22acbc4634123b8</sum></package><package arch="i686" name="libdrm-devel" release="3.el7" src="libdrm-2.4.91-3.el7.src.rpm" version="2.4.91"><filename>libdrm-devel-2.4.91-3.el7.i686.rpm</filename><sum type="sha256">58e2c01f8c9a50255d18d0490bfff130548a5e5f724cc9886ba0b51834d2cca1</sum></package><package arch="x86_64" epoch="1" name="xorg-x11-font-utils" release="21.el7" src="xorg-x11-font-utils-7.5-21.el7.src.rpm" version="7.5"><filename>xorg-x11-font-utils-7.5-21.el7.x86_64.rpm</filename><sum type="sha256">ea4e6a36a7df33c9ee270c4453903443b1888a61d2197b6b06b62fdf814add54</sum></package><package arch="i686" name="xorg-x11-server-devel" release="3.el7" src="xorg-x11-server-1.20.1-3.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-devel-1.20.1-3.el7.i686.rpm</filename><sum type="sha256">a6973ee2c4a6acf3ae5b2f39961f29b82e92997a769596e517f3b801f11dba27</sum></package><package arch="x86_64" name="mesa-demos" release="10.el7" src="mesa-demos-8.3.0-10.el7.src.rpm" version="8.3.0"><filename>mesa-demos-8.3.0-10.el7.x86_64.rpm</filename><sum type="sha256">0eee127b9eb60fd1931c92f998f8224296e59493172a3e4d8c49a24c2d9e61e0</sum></package><package arch="i686" name="mesa-libxatracker" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libxatracker-18.0.5-3.el7.i686.rpm</filename><sum type="sha256">870b2755645699ea792c1c2c07e89cc156505141930e040b9f2301cfa987a5d9</sum></package><package arch="x86_64" name="libXfont2" release="1.el7" src="libXfont2-2.0.3-1.el7.src.rpm" version="2.0.3"><filename>libXfont2-2.0.3-1.el7.x86_64.rpm</filename><sum type="sha256">ec03ca524d062e59f59282b50ab1448c3261d72b15cf08385c1233f2fe2002d5</sum></package><package arch="i686" name="mesa-libwayland-egl" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libwayland-egl-18.0.5-3.el7.i686.rpm</filename><sum type="sha256">f31f8b868725e8e75784e895a0435901fd4cbc0c9507c44110216872aacbc115</sum></package><package arch="i686" name="mesa-dri-drivers" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-dri-drivers-18.0.5-3.el7.i686.rpm</filename><sum type="sha256">3c12915c7b49df7d0a6cd3e72def6c4366694a4f6aa6d3972c70b3eba73c88af</sum></package><package arch="i686" name="mesa-libGLES-devel" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libGLES-devel-18.0.5-3.el7.i686.rpm</filename><sum type="sha256">6578a1f12004fcc18c852a3effc28cb856a4952ac1f75c805c205b82ca9ca8aa</sum></package><package arch="x86_64" name="xorg-x11-drv-wacom-devel" release="1.el7" src="xorg-x11-drv-wacom-0.36.1-1.el7.src.rpm" version="0.36.1"><filename>xorg-x11-drv-wacom-devel-0.36.1-1.el7.x86_64.rpm</filename><sum type="sha256">9bbbe007103a70ea4ce1ae086dfcf2659b929cd2b411149c08157cf25bc4d9ba</sum></package><package arch="x86_64" name="xorg-x11-drv-openchrome-devel" release="3.el7.1" src="xorg-x11-drv-openchrome-0.5.0-3.el7.1.src.rpm" version="0.5.0"><filename>xorg-x11-drv-openchrome-devel-0.5.0-3.el7.1.x86_64.rpm</filename><sum type="sha256">3ace0423b5f3b6733d178704b418280f04e23e8b7adc7840c726aa91ac4ffc0e</sum></package><package arch="x86_64" name="mesa-libwayland-egl-devel" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libwayland-egl-devel-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">112d7695b6402acc56c892700e502503205da9bcca4f51b312af99fb9ad7fb67</sum></package><package arch="x86_64" name="libepoxy" release="1.el7" src="libepoxy-1.5.2-1.el7.src.rpm" version="1.5.2"><filename>libepoxy-1.5.2-1.el7.x86_64.rpm</filename><sum type="sha256">8a2f375aaeae2457d93b098f6f075da45c48b5fa29e28af4408419f9151800f5</sum></package><package arch="x86_64" name="mesa-filesystem" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-filesystem-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">ada730564c22b71a1e80b45850047f3051b8e1b4b54e8b8259d6f07780b1fa87</sum></package><package arch="x86_64" name="libXres" release="1.el7" src="libXres-1.2.0-1.el7.src.rpm" version="1.2.0"><filename>libXres-1.2.0-1.el7.x86_64.rpm</filename><sum type="sha256">39e2430fc25c5ba377c695b41a20a0491f5778bb3e2248901470849f5724eac2</sum></package><package arch="x86_64" name="tigervnc-server-minimal" release="13.el7" src="tigervnc-1.8.0-13.el7.src.rpm" version="1.8.0"><filename>tigervnc-server-minimal-1.8.0-13.el7.x86_64.rpm</filename><sum type="sha256">48459d8da787fe079352927cb9fc5a3065de7f2033afbf1d0eb4536f4f9a749e</sum></package><package arch="noarch" name="tigervnc-license" release="13.el7" src="tigervnc-1.8.0-13.el7.src.rpm" version="1.8.0"><filename>tigervnc-license-1.8.0-13.el7.noarch.rpm</filename><sum type="sha256">e75244322d445c18e17cc6039e8a8f8c51a0b8fdffb7de4e4b798018f139133f</sum></package><package arch="i686" epoch="1" name="libglvnd" release="0.8.git5baa1e5.el7" src="libglvnd-1.0.1-0.8.git5baa1e5.el7.src.rpm" version="1.0.1"><filename>libglvnd-1.0.1-0.8.git5baa1e5.el7.i686.rpm</filename><sum type="sha256">4634b1a77fdb6eadab09c2ed46cbfb20b8f5e2b3b5590ee035c9a6460c314e94</sum></package><package arch="i686" name="xorg-x11-drv-synaptics-devel" release="2.el7" src="xorg-x11-drv-synaptics-1.9.0-2.el7.src.rpm" version="1.9.0"><filename>xorg-x11-drv-synaptics-devel-1.9.0-2.el7.i686.rpm</filename><sum type="sha256">0e41f1ffcf3c0fa577ac55069b1e1ee2da4b470c005e34ad1cc0ba528946e174</sum></package><package arch="i686" name="libepoxy" release="1.el7" src="libepoxy-1.5.2-1.el7.src.rpm" version="1.5.2"><filename>libepoxy-1.5.2-1.el7.i686.rpm</filename><sum type="sha256">f26868e89f3b41966d63b0b6c71accea8ea7f493ccfddf41043210557fd19492</sum></package><package arch="i686" name="libinput" release="2.el7" src="libinput-1.10.7-2.el7.src.rpm" version="1.10.7"><filename>libinput-1.10.7-2.el7.i686.rpm</filename><sum type="sha256">30d866811f009d0ec367c278c8dad1d05099da69237cc841e552c1e4f69d9ce1</sum></package><package arch="i686" name="xorg-x11-drv-evdev-devel" release="1.el7" src="xorg-x11-drv-evdev-2.10.6-1.el7.src.rpm" version="2.10.6"><filename>xorg-x11-drv-evdev-devel-2.10.6-1.el7.i686.rpm</filename><sum type="sha256">bf69735cad6515984a141f467ec9a79fe4b0e189d1a7c99366f3db08cf5263bf</sum></package><package arch="x86_64" name="xorg-x11-drv-wacom" release="1.el7" src="xorg-x11-drv-wacom-0.36.1-1.el7.src.rpm" version="0.36.1"><filename>xorg-x11-drv-wacom-0.36.1-1.el7.x86_64.rpm</filename><sum type="sha256">7955a49b70ce9b6f447f035d22da218133a47e0d3ff98104045c838b2fdfee3c</sum></package><package arch="x86_64" name="mesa-libEGL" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libEGL-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">8b0a54b64434d205a50090490a5dc6f33481b1b1de4e17bbb7a93a86767d082f</sum></package><package arch="x86_64" name="mesa-libOSMesa" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libOSMesa-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">38e2bccd1e85a82e2788c01bfd44885097c417a15678284968d0d822ad621b66</sum></package><package arch="x86_64" name="libXcursor" release="1.el7" src="libXcursor-1.1.15-1.el7.src.rpm" version="1.1.15"><filename>libXcursor-1.1.15-1.el7.x86_64.rpm</filename><sum type="sha256">447f6be4cf225d9d7c95e9b7550bfc8ba3ae64b73cb562afa32049fe493e0ac7</sum></package><package arch="i686" name="libXfont2-devel" release="1.el7" src="libXfont2-2.0.3-1.el7.src.rpm" version="2.0.3"><filename>libXfont2-devel-2.0.3-1.el7.i686.rpm</filename><sum type="sha256">41b00c2c5b2d41845c3e69e4f59fe325a6eefbaf15c1d03f2eaac8d4f3bf6d87</sum></package><package arch="x86_64" name="libX11" release="2.el7" src="libX11-1.6.5-2.el7.src.rpm" version="1.6.5"><filename>libX11-1.6.5-2.el7.x86_64.rpm</filename><sum type="sha256">be6ae3a477dc35303b6b0a5007bfb9610ec541ea607e5fb28fec313687240fc3</sum></package><package arch="i686" name="xorg-x11-drv-libinput-devel" release="2.el7" src="xorg-x11-drv-libinput-0.27.1-2.el7.src.rpm" version="0.27.1"><filename>xorg-x11-drv-libinput-devel-0.27.1-2.el7.i686.rpm</filename><sum type="sha256">b7c9fa4bcc0a43d8ff8560464197f3c4fadb4ebf7fd402312b9a2de1925305ec</sum></package><package arch="x86_64" name="freeglut-devel" release="8.el7" src="freeglut-3.0.0-8.el7.src.rpm" version="3.0.0"><filename>freeglut-devel-3.0.0-8.el7.x86_64.rpm</filename><sum type="sha256">cbc270fbdbf5f6c9776e1169977077d1a739744453901470bc41e40f5ce96628</sum></package><package arch="x86_64" name="mesa-libOSMesa-devel" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libOSMesa-devel-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">31348ba6401fb99a6da9910948a14774afe2cc6d8402210a6cbd6ddf6626ac06</sum></package><package arch="x86_64" name="xorg-x11-server-Xspice" release="4.el7.1" src="xorg-x11-drv-qxl-0.1.5-4.el7.1.src.rpm" version="0.1.5"><filename>xorg-x11-server-Xspice-0.1.5-4.el7.1.x86_64.rpm</filename><sum type="sha256">197f459af9384a822bbcdb3a011df8ba5ec7a510c5293bcee344a22a3ed0d8a8</sum></package><package arch="x86_64" name="libXfont" release="1.el7" src="libXfont-1.5.4-1.el7.src.rpm" version="1.5.4"><filename>libXfont-1.5.4-1.el7.x86_64.rpm</filename><sum type="sha256">23962e23689e259504e7d4c33d1e8a30fbb35d086f75cd19199912f56e4d3227</sum></package><package arch="x86_64" name="mesa-vulkan-drivers" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-vulkan-drivers-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">aa3345846af68ad659ccb4ed28d371c8fdf1693a02b7be49482a785e612d215c</sum></package><package arch="i686" epoch="1" name="libglvnd-devel" release="0.8.git5baa1e5.el7" src="libglvnd-1.0.1-0.8.git5baa1e5.el7.src.rpm" version="1.0.1"><filename>libglvnd-devel-1.0.1-0.8.git5baa1e5.el7.i686.rpm</filename><sum type="sha256">44dcd4d3c953431b678cadda08b5dd09123839ff9458ca7685cac6b174ab3b96</sum></package><package arch="noarch" name="xkeyboard-config-devel" release="1.el7" src="xkeyboard-config-2.24-1.el7.src.rpm" version="2.24"><filename>xkeyboard-config-devel-2.24-1.el7.noarch.rpm</filename><sum type="sha256">edcf1db52dd2a2cdeb65acc1712d3c3bb22bc34766b404b54d2a8f63ae660779</sum></package><package arch="x86_64" name="mesa-libwayland-egl" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libwayland-egl-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">807b374eaf3d562f477cfdba8c4b873f8786a48ca7e18cc68dbedf2e06b8ddd7</sum></package><package arch="x86_64" epoch="1" name="libglvnd-devel" release="0.8.git5baa1e5.el7" src="libglvnd-1.0.1-0.8.git5baa1e5.el7.src.rpm" version="1.0.1"><filename>libglvnd-devel-1.0.1-0.8.git5baa1e5.el7.x86_64.rpm</filename><sum type="sha256">16b9db962f9dbe43fcce71d5939ed8099e869be73f47352a402b0e5f67879f38</sum></package><package arch="x86_64" epoch="1" name="libglvnd-opengl" release="0.8.git5baa1e5.el7" src="libglvnd-1.0.1-0.8.git5baa1e5.el7.src.rpm" version="1.0.1"><filename>libglvnd-opengl-1.0.1-0.8.git5baa1e5.el7.x86_64.rpm</filename><sum type="sha256">25a847bb3fa6db70f33106cebfbe00dc8942faf77c18051534d35e86de95d182</sum></package><package arch="x86_64" name="xorg-x11-drv-vesa" release="1.el7" src="xorg-x11-drv-vesa-2.4.0-1.el7.src.rpm" version="2.4.0"><filename>xorg-x11-drv-vesa-2.4.0-1.el7.x86_64.rpm</filename><sum type="sha256">fc928b51bf9ce40c6b0fed24e456890836c2c8bb934201893c8ad014f5bc5791</sum></package><package arch="x86_64" name="xorg-x11-drv-dummy" release="1.el7.1" src="xorg-x11-drv-dummy-0.3.7-1.el7.1.src.rpm" version="0.3.7"><filename>xorg-x11-drv-dummy-0.3.7-1.el7.1.x86_64.rpm</filename><sum type="sha256">5ab6b3481fc708964292a8f6360bd3ffaf1afaa3187ab43d3e09ea335738dfb8</sum></package><package arch="x86_64" name="freeglut" release="8.el7" src="freeglut-3.0.0-8.el7.src.rpm" version="3.0.0"><filename>freeglut-3.0.0-8.el7.x86_64.rpm</filename><sum type="sha256">0f81d43fe0aba054872c795b2488c91c10d61e6f93f947a888eda484d7e6c22c</sum></package><package arch="x86_64" name="libwacom-devel" release="1.el7" src="libwacom-0.30-1.el7.src.rpm" version="0.30"><filename>libwacom-devel-0.30-1.el7.x86_64.rpm</filename><sum type="sha256">5d0e1c71eeda785b530b87dc4d44e2467d2a50fc7d7a81ddef2f47f0153c7b44</sum></package><package arch="i686" epoch="1" name="libglvnd-core-devel" release="0.8.git5baa1e5.el7" src="libglvnd-1.0.1-0.8.git5baa1e5.el7.src.rpm" version="1.0.1"><filename>libglvnd-core-devel-1.0.1-0.8.git5baa1e5.el7.i686.rpm</filename><sum type="sha256">165eb96d7b4e62d9632f0d7b0c485746bebf594d2f148ba16d0d872544770de6</sum></package><package arch="i686" name="mesa-libEGL" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libEGL-18.0.5-3.el7.i686.rpm</filename><sum type="sha256">638c728308ce346986dabe95f3d0e86a388fa91772c18dc4e1be3b5d6a741983</sum></package><package arch="i686" name="libXcursor-devel" release="1.el7" src="libXcursor-1.1.15-1.el7.src.rpm" version="1.1.15"><filename>libXcursor-devel-1.1.15-1.el7.i686.rpm</filename><sum type="sha256">afe1aa564c4b1c315e86a2ed527437e058b89570224290e9d550529ab8add83a</sum></package><package arch="x86_64" name="mesa-libgbm-devel" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libgbm-devel-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">30e02238eed5d06c65c7b918d307956695d1067026ed7b6a1442b0a7a29f5182</sum></package><package arch="x86_64" name="tigervnc" release="13.el7" src="tigervnc-1.8.0-13.el7.src.rpm" version="1.8.0"><filename>tigervnc-1.8.0-13.el7.x86_64.rpm</filename><sum type="sha256">746814a15f48f1ec838b34f00c25f36784ba2a2b1f6b334626d1ace5cf40aa7a</sum></package><package arch="i686" name="libxcb-devel" release="1.el7" src="libxcb-1.13-1.el7.src.rpm" version="1.13"><filename>libxcb-devel-1.13-1.el7.i686.rpm</filename><sum type="sha256">28bff94989ae901929c6174f3dd5f547de3850f933fc75db784d7752c8cfec5e</sum></package><package arch="x86_64" name="xorg-x11-drv-synaptics-devel" release="2.el7" src="xorg-x11-drv-synaptics-1.9.0-2.el7.src.rpm" version="1.9.0"><filename>xorg-x11-drv-synaptics-devel-1.9.0-2.el7.x86_64.rpm</filename><sum type="sha256">1a101b9ed93db568e042a996ec1bd193c6f67868f7718b57990a3f4d0419aee6</sum></package><package arch="x86_64" name="mesa-dri-drivers" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-dri-drivers-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">3436937886e2c5957508c63af79de6b86b1d839d02d09c338eef77f9443f3d79</sum></package><package arch="noarch" name="libxcb-doc" release="1.el7" src="libxcb-1.13-1.el7.src.rpm" version="1.13"><filename>libxcb-doc-1.13-1.el7.noarch.rpm</filename><sum type="sha256">fb5d234f63fd0d9bf029cfaa5543aa6bde06e81f1b7ef62df52752299fb32c97</sum></package><package arch="i686" name="mesa-libwayland-egl-devel" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libwayland-egl-devel-18.0.5-3.el7.i686.rpm</filename><sum type="sha256">f4e97b32c8f5675b9aa3387314ee9c17baf6a9c86192acc6fb095e2c05c06653</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="3.el7" src="xorg-x11-server-1.20.1-3.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-Xvfb-1.20.1-3.el7.x86_64.rpm</filename><sum type="sha256">bceffbb476c729ee9d6b04d3b55e23300aa84e2518c913753a761c58d03d9561</sum></package><package arch="i686" name="xorg-x11-drv-intel" release="28.20180530.el7" src="xorg-x11-drv-intel-2.99.917-28.20180530.el7.src.rpm" version="2.99.917"><filename>xorg-x11-drv-intel-2.99.917-28.20180530.el7.i686.rpm</filename><sum type="sha256">159213b709a2b28ec7b50a878eaebb3a5a0742519135e99473789c1ba05ee2a7</sum></package><package arch="i686" name="xorg-x11-drv-intel-devel" release="28.20180530.el7" src="xorg-x11-drv-intel-2.99.917-28.20180530.el7.src.rpm" version="2.99.917"><filename>xorg-x11-drv-intel-devel-2.99.917-28.20180530.el7.i686.rpm</filename><sum type="sha256">043f6476c74b02d39293e181a7796396fcd21eb29729575489cc260ec37aa5e7</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="3.el7" src="xorg-x11-server-1.20.1-3.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-Xnest-1.20.1-3.el7.x86_64.rpm</filename><sum type="sha256">b4c393366c31bb048ab29bfdf9359b54f9f25679e84e7770a7a5d7bb304722d2</sum></package><package arch="x86_64" epoch="1" name="libglvnd-core-devel" release="0.8.git5baa1e5.el7" src="libglvnd-1.0.1-0.8.git5baa1e5.el7.src.rpm" version="1.0.1"><filename>libglvnd-core-devel-1.0.1-0.8.git5baa1e5.el7.x86_64.rpm</filename><sum type="sha256">7f47574bb6e8c59e6a546647514ee998fccbc70304cd88380572405a55e74e84</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="3.el7" src="xorg-x11-server-1.20.1-3.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-devel-1.20.1-3.el7.x86_64.rpm</filename><sum type="sha256">f4ac26e2926daf3d3451e96e1c931c87da9c21a1438b5d5eba96f36acbdcdf06</sum></package><package arch="x86_64" name="xorg-x11-drv-fbdev" release="1.el7" src="xorg-x11-drv-fbdev-0.5.0-1.el7.src.rpm" version="0.5.0"><filename>xorg-x11-drv-fbdev-0.5.0-1.el7.x86_64.rpm</filename><sum type="sha256">0c5b8120a1ca36d816659cdc31ea3c3c33bb978ae150e671146f3c2a96abd55c</sum></package><package arch="x86_64" name="libxcb-devel" release="1.el7" src="libxcb-1.13-1.el7.src.rpm" version="1.13"><filename>libxcb-devel-1.13-1.el7.x86_64.rpm</filename><sum type="sha256">a6744b52df73dce31a7fe2c676c18fbe561b2a308f78fde6ac4836b412b56da9</sum></package><package arch="x86_64" name="libepoxy-devel" release="1.el7" src="libepoxy-1.5.2-1.el7.src.rpm" version="1.5.2"><filename>libepoxy-devel-1.5.2-1.el7.x86_64.rpm</filename><sum type="sha256">273c24f4ec2ca66e13bc7d0bc67b664300efcf3e0c9309966c89ca830752eba8</sum></package><package arch="x86_64" epoch="1" name="libglvnd-egl" release="0.8.git5baa1e5.el7" src="libglvnd-1.0.1-0.8.git5baa1e5.el7.src.rpm" version="1.0.1"><filename>libglvnd-egl-1.0.1-0.8.git5baa1e5.el7.x86_64.rpm</filename><sum type="sha256">85dfabca2fad6af0c56f75452af804a3ee938eedd3c5759fe7b7f415cf168f75</sum></package><package arch="i686" name="libXres-devel" release="1.el7" src="libXres-1.2.0-1.el7.src.rpm" version="1.2.0"><filename>libXres-devel-1.2.0-1.el7.i686.rpm</filename><sum type="sha256">123d5f4b844842ed95f7f166b3c92ca9a246ad9abd42db63405c50afc0ee49f7</sum></package><package arch="i686" name="libXfont-devel" release="1.el7" src="libXfont-1.5.4-1.el7.src.rpm" version="1.5.4"><filename>libXfont-devel-1.5.4-1.el7.i686.rpm</filename><sum type="sha256">bda75fc4f360bafee253b36f281e5e1229a8a7ab4499a56d1fdeb0a00b88a09c</sum></package><package arch="i686" name="xorg-x11-drv-openchrome-devel" release="3.el7.1" src="xorg-x11-drv-openchrome-0.5.0-3.el7.1.src.rpm" version="0.5.0"><filename>xorg-x11-drv-openchrome-devel-0.5.0-3.el7.1.i686.rpm</filename><sum type="sha256">8f250598085207ca0314b1e51e8d2391621021ad242781ec09d55fdec8802e80</sum></package><package arch="noarch" name="xorg-x11-proto-devel" release="1.el7" src="xorg-x11-proto-devel-2018.4-1.el7.src.rpm" version="2018.4"><filename>xorg-x11-proto-devel-2018.4-1.el7.noarch.rpm</filename><sum type="sha256">5720e86824d5df5ce87ecaf0e1a65850533d7ce16cab1b73495f4243183e4b83</sum></package><package arch="x86_64" name="xorg-x11-drv-v4l" release="49.el7" src="xorg-x11-drv-v4l-0.2.0-49.el7.src.rpm" version="0.2.0"><filename>xorg-x11-drv-v4l-0.2.0-49.el7.x86_64.rpm</filename><sum type="sha256">6699ef563f10925780d57c7e18274702f89a34d7cec0cde677630c75385d64a1</sum></package><package arch="x86_64" name="tigervnc-server-module" release="13.el7" src="tigervnc-1.8.0-13.el7.src.rpm" version="1.8.0"><filename>tigervnc-server-module-1.8.0-13.el7.x86_64.rpm</filename><sum type="sha256">f1b1a577162ab053cd6a95ad908ef5f93ecb5b4fb8dd3e5b5d8e042095f4da1b</sum></package><package arch="i686" name="mesa-libxatracker-devel" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libxatracker-devel-18.0.5-3.el7.i686.rpm</filename><sum type="sha256">5762c9b24676b5fd7b6fdfad762b22d954c5b7482a05c58947bc63e9d29ea49f</sum></package><package arch="i686" name="mesa-vdpau-drivers" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-vdpau-drivers-18.0.5-3.el7.i686.rpm</filename><sum type="sha256">2fa6d69147743571cd3ad4ecea27ebbb373c3b6f6a42a7b0a464dea36b75cd62</sum></package><package arch="i686" epoch="1" name="libglvnd-opengl" release="0.8.git5baa1e5.el7" src="libglvnd-1.0.1-0.8.git5baa1e5.el7.src.rpm" version="1.0.1"><filename>libglvnd-opengl-1.0.1-0.8.git5baa1e5.el7.i686.rpm</filename><sum type="sha256">1c1a5b785c03c63b4db9c9cdca47bc59c4b06123f2e030a8c9aa44ebaa235f7a</sum></package><package arch="i686" name="libXfont2" release="1.el7" src="libXfont2-2.0.3-1.el7.src.rpm" version="2.0.3"><filename>libXfont2-2.0.3-1.el7.i686.rpm</filename><sum type="sha256">37c9d98a124176948c02d6304a96e0aa1fefb4ae326756b7d31dfbb410c1fdb1</sum></package><package arch="i686" name="libX11" release="2.el7" src="libX11-1.6.5-2.el7.src.rpm" version="1.6.5"><filename>libX11-1.6.5-2.el7.i686.rpm</filename><sum type="sha256">9d468f614e1f62e5b6fc73c68fa926393007304a8cf5fb3a6f53639d2aaf8ca1</sum></package><package arch="i686" epoch="1" name="libglvnd-glx" release="0.8.git5baa1e5.el7" src="libglvnd-1.0.1-0.8.git5baa1e5.el7.src.rpm" version="1.0.1"><filename>libglvnd-glx-1.0.1-0.8.git5baa1e5.el7.i686.rpm</filename><sum type="sha256">da17c38a167870b842315b3e1ef9c1a1348436e5fc77431561053abca207fd66</sum></package><package arch="x86_64" name="mesa-libgbm" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libgbm-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">b9a35558e4be19699fcf709c1098dd2cbafcc966b634f49cc3a09d1c3db2e009</sum></package><package arch="i686" name="libinput-devel" release="2.el7" src="libinput-1.10.7-2.el7.src.rpm" version="1.10.7"><filename>libinput-devel-1.10.7-2.el7.i686.rpm</filename><sum type="sha256">e8a325cec430a793086899110f0bec727a33fe63ab4ed6eb8dd7bec3eedaad04</sum></package><package arch="x86_64" name="xorg-x11-drv-libinput-devel" release="2.el7" src="xorg-x11-drv-libinput-0.27.1-2.el7.src.rpm" version="0.27.1"><filename>xorg-x11-drv-libinput-devel-0.27.1-2.el7.x86_64.rpm</filename><sum type="sha256">f16a9a410d8e974e7d78178b9ab31f8cbcf192cef34750b53529e64de9aa6b15</sum></package><package arch="i686" name="libX11-devel" release="2.el7" src="libX11-1.6.5-2.el7.src.rpm" version="1.6.5"><filename>libX11-devel-1.6.5-2.el7.i686.rpm</filename><sum type="sha256">70a5bb8742a52e69af50768e2d967fd316cf3148431aa9054d54839002292ae5</sum></package><package arch="x86_64" epoch="1" name="libglvnd-glx" release="0.8.git5baa1e5.el7" src="libglvnd-1.0.1-0.8.git5baa1e5.el7.src.rpm" version="1.0.1"><filename>libglvnd-glx-1.0.1-0.8.git5baa1e5.el7.x86_64.rpm</filename><sum type="sha256">363ac6fecc9c18d066b3e4688edb6083a4e9329fa1f1739a5e47d85aaeebac26</sum></package><package arch="i686" name="mesa-libgbm" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libgbm-18.0.5-3.el7.i686.rpm</filename><sum type="sha256">ffb59aa423b21ce92bedd3ac69ce589890b229ee29a6e84c989f58e9588413fc</sum></package><package arch="i686" name="xorg-x11-drv-openchrome" release="3.el7.1" src="xorg-x11-drv-openchrome-0.5.0-3.el7.1.src.rpm" version="0.5.0"><filename>xorg-x11-drv-openchrome-0.5.0-3.el7.1.i686.rpm</filename><sum type="sha256">fa319f2beff438562eb8ff0af4d8099557e7c2bf16c571f3564d2f10ff2a5e83</sum></package><package arch="i686" epoch="1" name="libglvnd-gles" release="0.8.git5baa1e5.el7" src="libglvnd-1.0.1-0.8.git5baa1e5.el7.src.rpm" version="1.0.1"><filename>libglvnd-gles-1.0.1-0.8.git5baa1e5.el7.i686.rpm</filename><sum type="sha256">acb98c97b8e5f2e2acc5269be33617ecda3d6a57ffeee235b11f69780f7ccb48</sum></package><package arch="i686" name="libXres" release="1.el7" src="libXres-1.2.0-1.el7.src.rpm" version="1.2.0"><filename>libXres-1.2.0-1.el7.i686.rpm</filename><sum type="sha256">c89fe8acff3759d3d54c9350a69627cfb014b15574ebb3199e8197d839c5b1cf</sum></package><package arch="x86_64" name="libxcb" release="1.el7" src="libxcb-1.13-1.el7.src.rpm" version="1.13"><filename>libxcb-1.13-1.el7.x86_64.rpm</filename><sum type="sha256">7f3c1dd17a2f0965a89819979e98be2b62085d560a7a6c8723906943eaa45860</sum></package><package arch="x86_64" name="vulkan" release="1.el7" src="vulkan-1.1.73.0-1.el7.src.rpm" version="1.1.73.0"><filename>vulkan-1.1.73.0-1.el7.x86_64.rpm</filename><sum type="sha256">7bec269c3d7ccc08ac1e83d632a5f920f44c760de5d891de4e7ab59a5f0edaad</sum></package><package arch="x86_64" name="mesa-libxatracker" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libxatracker-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">69a2be9dff54b036e26bbf1801e425c8dd4620360938d3c05bb4ccc3054e10a7</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="3.el7" src="xorg-x11-server-1.20.1-3.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-common-1.20.1-3.el7.x86_64.rpm</filename><sum type="sha256">bb992a6503eb0343103221740dc4f8c547189f310a73c4da26f73359caaecd17</sum></package><package arch="i686" name="libwacom-devel" release="1.el7" src="libwacom-0.30-1.el7.src.rpm" version="0.30"><filename>libwacom-devel-0.30-1.el7.i686.rpm</filename><sum type="sha256">55741c8721e21f6c322582263c98a94e340b1cf3ec0c0c5125f788c0dc0184ad</sum></package><package arch="x86_64" name="libinput" release="2.el7" src="libinput-1.10.7-2.el7.src.rpm" version="1.10.7"><filename>libinput-1.10.7-2.el7.x86_64.rpm</filename><sum type="sha256">d42188a6f4e15dc9b4aa496620ae12f0054007ce1b499187934cc1c9e7ea0762</sum></package><package arch="x86_64" name="libwacom" release="1.el7" src="libwacom-0.30-1.el7.src.rpm" version="0.30"><filename>libwacom-0.30-1.el7.x86_64.rpm</filename><sum type="sha256">3c74e44074db30bcb068ee47a5d0a711ecfea31babb7e2b98e56f823923560ba</sum></package><package arch="x86_64" name="glx-utils" release="10.el7" src="mesa-demos-8.3.0-10.el7.src.rpm" version="8.3.0"><filename>glx-utils-8.3.0-10.el7.x86_64.rpm</filename><sum type="sha256">694599d129d451abcf3a606400f049461b2ea03b8a322312b3d599fbdac51f6e</sum></package><package arch="i686" name="mesa-libgbm-devel" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libgbm-devel-18.0.5-3.el7.i686.rpm</filename><sum type="sha256">5940ddde381376b4183239d589a2469d76660e25f503e4f9e1070aa2b119d133</sum></package><package arch="x86_64" name="xorg-x11-xkb-utils" release="14.el7" src="xorg-x11-xkb-utils-7.7-14.el7.src.rpm" version="7.7"><filename>xorg-x11-xkb-utils-7.7-14.el7.x86_64.rpm</filename><sum type="sha256">94782f338893182bf25e971f11733fdb45dbf0c83e5fc25f6df8d79dbef6a090</sum></package><package arch="x86_64" name="mesa-libxatracker-devel" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libxatracker-devel-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">1bc075e492e231e25adb70983ce4a6919aee0b8a5ee16101795bc0d621601e4d</sum></package><package arch="x86_64" name="xorg-x11-drv-qxl" release="4.el7.1" src="xorg-x11-drv-qxl-0.1.5-4.el7.1.src.rpm" version="0.1.5"><filename>xorg-x11-drv-qxl-0.1.5-4.el7.1.x86_64.rpm</filename><sum type="sha256">f59a088704dcf2e0a461b793bd4f3e8bbbf7e9643ba45947aa1b76e2b80fe04a</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="3.el7" src="xorg-x11-server-1.20.1-3.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-Xorg-1.20.1-3.el7.x86_64.rpm</filename><sum type="sha256">6425667745b1a9b880c230c6fb678f357465eeb121e1240557eefec30afae924</sum></package><package arch="x86_64" name="xorg-x11-drv-ati" release="1.el7" src="xorg-x11-drv-ati-18.0.1-1.el7.src.rpm" version="18.0.1"><filename>xorg-x11-drv-ati-18.0.1-1.el7.x86_64.rpm</filename><sum type="sha256">e5850634b32baa4c9b694533e4f177943cc1b0f711e7dbbe0e3b13b013f74d72</sum></package><package arch="x86_64" name="mesa-libGLES" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libGLES-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">41ab4a348dee69bf5766e5c19f29c8c40caecb0ffa38ac3eba3f2691cde26927</sum></package><package arch="x86_64" name="mesa-libGL-devel" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libGL-devel-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">b576bd52ebcea1bf57a8a3b7098da90654fb3b24200433fd728cc8afe285b812</sum></package><package arch="noarch" name="tigervnc-icons" release="13.el7" src="tigervnc-1.8.0-13.el7.src.rpm" version="1.8.0"><filename>tigervnc-icons-1.8.0-13.el7.noarch.rpm</filename><sum type="sha256">faeacc84d4b1d90fc23dbd6316a19299486f5592f18453208b6c5fe981de5338</sum></package><package arch="i686" epoch="1" name="libglvnd-egl" release="0.8.git5baa1e5.el7" src="libglvnd-1.0.1-0.8.git5baa1e5.el7.src.rpm" version="1.0.1"><filename>libglvnd-egl-1.0.1-0.8.git5baa1e5.el7.i686.rpm</filename><sum type="sha256">1c5ba2f86dd648819c9fb05f7e048321cc310e0e162d4fb631134b41cab71d0f</sum></package><package arch="x86_64" name="drm-utils" release="3.el7" src="libdrm-2.4.91-3.el7.src.rpm" version="2.4.91"><filename>drm-utils-2.4.91-3.el7.x86_64.rpm</filename><sum type="sha256">53867be210975bcbbbad4e30a3bb51c3f23a567a9656fdac39c13e9542a5d266</sum></package><package arch="i686" name="freeglut" release="8.el7" src="freeglut-3.0.0-8.el7.src.rpm" version="3.0.0"><filename>freeglut-3.0.0-8.el7.i686.rpm</filename><sum type="sha256">165f7ab0399cf7c4b7f921e6e4d15a42e8c1b42f2d8453395697f044b4e0d712</sum></package><package arch="x86_64" name="xorg-x11-drv-intel" release="28.20180530.el7" src="xorg-x11-drv-intel-2.99.917-28.20180530.el7.src.rpm" version="2.99.917"><filename>xorg-x11-drv-intel-2.99.917-28.20180530.el7.x86_64.rpm</filename><sum type="sha256">bdc52cefdfb76a489dfbe26d51288582e842706b51d6f8f59821a78b4ee95b9b</sum></package><package arch="i686" name="libdrm" release="3.el7" src="libdrm-2.4.91-3.el7.src.rpm" version="2.4.91"><filename>libdrm-2.4.91-3.el7.i686.rpm</filename><sum type="sha256">bbd879b2319ee724a65ea8e1688b6642009e9665332d316b67a52c947705c576</sum></package><package arch="i686" name="xorg-x11-xkb-utils-devel" release="14.el7" src="xorg-x11-xkb-utils-7.7-14.el7.src.rpm" version="7.7"><filename>xorg-x11-xkb-utils-devel-7.7-14.el7.i686.rpm</filename><sum type="sha256">28dc23034e38e34de437f7559c8e9b3068349bb694274a38375b7c36befabad2</sum></package><package arch="x86_64" name="mesa-libglapi" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libglapi-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">faaf6a2c282335b84a459cc2596877403817990eeb3f114b727082f108299547</sum></package><package arch="x86_64" name="xorg-x11-drv-openchrome" release="3.el7.1" src="xorg-x11-drv-openchrome-0.5.0-3.el7.1.src.rpm" version="0.5.0"><filename>xorg-x11-drv-openchrome-0.5.0-3.el7.1.x86_64.rpm</filename><sum type="sha256">2d14e1a5fabaad160b5a83c8592a1a3535efa7a650ef10165b3759198eae05aa</sum></package><package arch="x86_64" name="xorg-x11-drv-mouse" release="2.el7" src="xorg-x11-drv-mouse-1.9.2-2.el7.src.rpm" version="1.9.2"><filename>xorg-x11-drv-mouse-1.9.2-2.el7.x86_64.rpm</filename><sum type="sha256">c3207d8e3ca6a1bbb87b41c168289ad1c962bf212421084eb7d70184ecfec9e8</sum></package><package arch="x86_64" name="libX11-devel" release="2.el7" src="libX11-1.6.5-2.el7.src.rpm" version="1.6.5"><filename>libX11-devel-1.6.5-2.el7.x86_64.rpm</filename><sum type="sha256">7dbeddbbb9868210b958bb7b1888581141733ea8b1d0715986c9f32d956c0d2a</sum></package><package arch="i686" name="libxcb" release="1.el7" src="libxcb-1.13-1.el7.src.rpm" version="1.13"><filename>libxcb-1.13-1.el7.i686.rpm</filename><sum type="sha256">547848567a86990776d0b0e8506951c75c7ac4f42c90e22c739ccbff9a2ee588</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="3.el7" src="xorg-x11-server-1.20.1-3.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-Xephyr-1.20.1-3.el7.x86_64.rpm</filename><sum type="sha256">1a32170c4ee1ebf4c1bfa3c5bae80e03b087920545c213f8473d6423318b7872</sum></package><package arch="noarch" name="tigervnc-server-applet" release="13.el7" src="tigervnc-1.8.0-13.el7.src.rpm" version="1.8.0"><filename>tigervnc-server-applet-1.8.0-13.el7.noarch.rpm</filename><sum type="sha256">005788ee83eccf35b52cdc850cf412797a45e2014690ed0510e115b82fadacfc</sum></package><package arch="x86_64" name="xorg-x11-drv-evdev-devel" release="1.el7" src="xorg-x11-drv-evdev-2.10.6-1.el7.src.rpm" version="2.10.6"><filename>xorg-x11-drv-evdev-devel-2.10.6-1.el7.x86_64.rpm</filename><sum type="sha256">03f5ba031f60548d70c2481e1b84c440982ef2f0ac994c1526210ed763300f70</sum></package><package arch="x86_64" name="xorg-x11-drv-vmmouse" release="1.el7.1" src="xorg-x11-drv-vmmouse-13.1.0-1.el7.1.src.rpm" version="13.1.0"><filename>xorg-x11-drv-vmmouse-13.1.0-1.el7.1.x86_64.rpm</filename><sum type="sha256">b38d490a493de815dbd267295849fdc8d05bab6c537de072c5c1cb5901f4dcea</sum></package><package arch="x86_64" name="libXres-devel" release="1.el7" src="libXres-1.2.0-1.el7.src.rpm" version="1.2.0"><filename>libXres-devel-1.2.0-1.el7.x86_64.rpm</filename><sum type="sha256">cf439df27590448e77c0fdff0a044d951db47142b2fafc9796421bf25b2d7cc6</sum></package><package arch="noarch" name="xkeyboard-config" release="1.el7" src="xkeyboard-config-2.24-1.el7.src.rpm" version="2.24"><filename>xkeyboard-config-2.24-1.el7.noarch.rpm</filename><sum type="sha256">04ebe53957d132bc4e625f775cb015ea7064c4f4726ae791d9e94e9b77530443</sum></package><package arch="i686" name="libepoxy-devel" release="1.el7" src="libepoxy-1.5.2-1.el7.src.rpm" version="1.5.2"><filename>libepoxy-devel-1.5.2-1.el7.i686.rpm</filename><sum type="sha256">18357034b8bf83317ef8acc1af81cc1245cfc7ec53a3ec800dc6970d289b1335</sum></package><package arch="i686" name="mesa-libglapi" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libglapi-18.0.5-3.el7.i686.rpm</filename><sum type="sha256">0758d52f5ddffe54b71daa1c157a57e66979898484deac86f0e6a00657f21157</sum></package><package arch="x86_64" name="libXcursor-devel" release="1.el7" src="libXcursor-1.1.15-1.el7.src.rpm" version="1.1.15"><filename>libXcursor-devel-1.1.15-1.el7.x86_64.rpm</filename><sum type="sha256">cafd5bec125e4c7af4e975f58a7dab9d6b208f9ce54ad6348f01edd8aa091985</sum></package><package arch="x86_64" name="xorg-x11-drv-vmware" release="1.el7.1" src="xorg-x11-drv-vmware-13.2.1-1.el7.1.src.rpm" version="13.2.1"><filename>xorg-x11-drv-vmware-13.2.1-1.el7.1.x86_64.rpm</filename><sum type="sha256">537f64ef752193fe78a0d15c3d8a61c387605be5dccacdcbabca970949de1354</sum></package><package arch="x86_64" name="libdrm-devel" release="3.el7" src="libdrm-2.4.91-3.el7.src.rpm" version="2.4.91"><filename>libdrm-devel-2.4.91-3.el7.x86_64.rpm</filename><sum type="sha256">d96efbdf072747fd4e46299840c4ca5b8af9c56453344f0e5d1c38dd716df56a</sum></package><package arch="i686" name="vulkan-devel" release="1.el7" src="vulkan-1.1.73.0-1.el7.src.rpm" version="1.1.73.0"><filename>vulkan-devel-1.1.73.0-1.el7.i686.rpm</filename><sum type="sha256">83841aba869f1273b7d320b7fb39f96b0183ad0cb9f215652bd17d60d6dd1887</sum></package><package arch="i686" name="libXfont" release="1.el7" src="libXfont-1.5.4-1.el7.src.rpm" version="1.5.4"><filename>libXfont-1.5.4-1.el7.i686.rpm</filename><sum type="sha256">27f4609384e7189c21f0033697f3382342006b4dbee025e38049502ba5cbdd57</sum></package><package arch="x86_64" name="xorg-x11-xkb-utils-devel" release="14.el7" src="xorg-x11-xkb-utils-7.7-14.el7.src.rpm" version="7.7"><filename>xorg-x11-xkb-utils-devel-7.7-14.el7.x86_64.rpm</filename><sum type="sha256">0a246b6bd9aa0418cca0bd5572f8291353c1902aeddd54f0d675ba36aad63548</sum></package><package arch="x86_64" name="mesa-libEGL-devel" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libEGL-devel-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">01aecef1b1b7bb2ecd09078b2c51c6f031f6ed3a6d91de62ed9008118486e389</sum></package><package arch="x86_64" name="xorg-x11-drv-mouse-devel" release="2.el7" src="xorg-x11-drv-mouse-1.9.2-2.el7.src.rpm" version="1.9.2"><filename>xorg-x11-drv-mouse-devel-1.9.2-2.el7.x86_64.rpm</filename><sum type="sha256">8bdc90752fa6953caa6604f6acbd8c4de8eb5e6d9df2c24326a9446c756492e6</sum></package><package arch="x86_64" name="xorg-x11-xkb-extras" release="14.el7" src="xorg-x11-xkb-utils-7.7-14.el7.src.rpm" version="7.7"><filename>xorg-x11-xkb-extras-7.7-14.el7.x86_64.rpm</filename><sum type="sha256">2635574e736cf801f786738930426f229def57f1c349be76fd67c1590c4ce739</sum></package><package arch="x86_64" epoch="1" name="libglvnd" release="0.8.git5baa1e5.el7" src="libglvnd-1.0.1-0.8.git5baa1e5.el7.src.rpm" version="1.0.1"><filename>libglvnd-1.0.1-0.8.git5baa1e5.el7.x86_64.rpm</filename><sum type="sha256">369471af4c83de168979c98ef3e77b16543a98f658834691f2d5977c1974bfd4</sum></package><package arch="x86_64" name="egl-utils" release="10.el7" src="mesa-demos-8.3.0-10.el7.src.rpm" version="8.3.0"><filename>egl-utils-8.3.0-10.el7.x86_64.rpm</filename><sum type="sha256">e3c322d1522d59f8e4294d5ce9c2580deeefb2ac32b44be5ec7575fe2674ffc1</sum></package><package arch="x86_64" name="xorg-x11-utils" release="23.el7" src="xorg-x11-utils-7.5-23.el7.src.rpm" version="7.5"><filename>xorg-x11-utils-7.5-23.el7.x86_64.rpm</filename><sum type="sha256">062f9eb1fe70298e8adf96472d9a75d2ecb3fe4af66b5f1c1ffbdf7ca064c14a</sum></package><package arch="x86_64" name="mesa-libGLES-devel" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libGLES-devel-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">0a5c00778dc9552f771055b8437580b09eb86a95e5f8d9da45e03e90fbab9b57</sum></package><package arch="x86_64" name="libdrm" release="3.el7" src="libdrm-2.4.91-3.el7.src.rpm" version="2.4.91"><filename>libdrm-2.4.91-3.el7.x86_64.rpm</filename><sum type="sha256">9821252830967e1cbcf963d602cbaaa7240a92a257dde66c2621baf43a3e99c2</sum></package><package arch="i686" name="mesa-libOSMesa-devel" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libOSMesa-devel-18.0.5-3.el7.i686.rpm</filename><sum type="sha256">05a0e20453a0bb7adf19a004ad204f9157b58871c4888df3ab5966945a5e59a9</sum></package><package arch="noarch" name="xcb-proto" release="1.el7" src="xcb-proto-1.13-1.el7.src.rpm" version="1.13"><filename>xcb-proto-1.13-1.el7.noarch.rpm</filename><sum type="sha256">2d2e50ccc657dc563ff4688652bb9674583c0fed1c443dfc87d133c178a9982f</sum></package><package arch="x86_64" name="intel-gpu-tools" release="28.20180530.el7" src="xorg-x11-drv-intel-2.99.917-28.20180530.el7.src.rpm" version="2.99.917"><filename>intel-gpu-tools-2.99.917-28.20180530.el7.x86_64.rpm</filename><sum type="sha256">3fea0938bb9c76d9a6f60cba2078b21b826a50281ab870eb23e46a443f40e5a6</sum></package><package arch="noarch" name="vulkan-filesystem" release="1.el7" src="vulkan-1.1.73.0-1.el7.src.rpm" version="1.1.73.0"><filename>vulkan-filesystem-1.1.73.0-1.el7.noarch.rpm</filename><sum type="sha256">dee255d425130f9a5bc3252d1edf5e5cd29c4f3e193de54929652a9c839f44b6</sum></package><package arch="x86_64" name="libinput-devel" release="2.el7" src="libinput-1.10.7-2.el7.src.rpm" version="1.10.7"><filename>libinput-devel-1.10.7-2.el7.x86_64.rpm</filename><sum type="sha256">84ad9eec0adf2bff7bbf3b8a06b00152efab57e5d95b748564b47e130b59e597</sum></package><package arch="x86_64" epoch="1" name="xorg-x11-drv-nouveau" release="1.el7" src="xorg-x11-drv-nouveau-1.0.15-1.el7.src.rpm" version="1.0.15"><filename>xorg-x11-drv-nouveau-1.0.15-1.el7.x86_64.rpm</filename><sum type="sha256">905651609f2dc91e3bfdcf285af1e032822822e636bcd3fa18c2efed99a20103</sum></package><package arch="noarch" name="libX11-common" release="2.el7" src="libX11-1.6.5-2.el7.src.rpm" version="1.6.5"><filename>libX11-common-1.6.5-2.el7.noarch.rpm</filename><sum type="sha256">6d8b3e0ecdb93c6d20a0f0406981bfd36f050c4c390021d44a921c21bc29da7d</sum></package><package arch="x86_64" epoch="1" name="libglvnd-gles" release="0.8.git5baa1e5.el7" src="libglvnd-1.0.1-0.8.git5baa1e5.el7.src.rpm" version="1.0.1"><filename>libglvnd-gles-1.0.1-0.8.git5baa1e5.el7.x86_64.rpm</filename><sum type="sha256">8ea8d43165c3c82bf31cc6153c88b94a27079ad93fff636166010dfe784e245c</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="3.el7" src="xorg-x11-server-1.20.1-3.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-Xwayland-1.20.1-3.el7.x86_64.rpm</filename><sum type="sha256">ddfbc601cc3256a8f34e4b6d93da0ca46bef014cce3de715d5d150aea28cd874</sum></package><package arch="noarch" name="libwacom-data" release="1.el7" src="libwacom-0.30-1.el7.src.rpm" version="0.30"><filename>libwacom-data-0.30-1.el7.noarch.rpm</filename><sum type="sha256">f5b6f2be3be338c7979e1a74e7b5ac1df1ba9b7cf6a71f197691e6252c386268</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="3.el7" src="xorg-x11-server-1.20.1-3.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-Xdmx-1.20.1-3.el7.x86_64.rpm</filename><sum type="sha256">73a2c8d07d615b931a5bdf43a0b0b820f4dee341fd3f216ee670684c9235dd75</sum></package><package arch="x86_64" name="xorg-x11-drv-evdev" release="1.el7" src="xorg-x11-drv-evdev-2.10.6-1.el7.src.rpm" version="2.10.6"><filename>xorg-x11-drv-evdev-2.10.6-1.el7.x86_64.rpm</filename><sum type="sha256">aaba7850c3651677a7b8669dd765e1c61976f7571e92da8e0486328018f5dc61</sum></package><package arch="x86_64" name="xorg-x11-drv-intel-devel" release="28.20180530.el7" src="xorg-x11-drv-intel-2.99.917-28.20180530.el7.src.rpm" version="2.99.917"><filename>xorg-x11-drv-intel-devel-2.99.917-28.20180530.el7.x86_64.rpm</filename><sum type="sha256">a746404190a24376c1c8a6c93bed30366d9a722f03627e314733a8e0559773d9</sum></package><package arch="i686" name="mesa-libGL-devel" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libGL-devel-18.0.5-3.el7.i686.rpm</filename><sum type="sha256">b7d211798d7c31f00f79aeaaf4c993ffc9fe8b067e76297771048953139875aa</sum></package><package arch="x86_64" name="mesa-vdpau-drivers" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-vdpau-drivers-18.0.5-3.el7.x86_64.rpm</filename><sum type="sha256">9cf2391c6e0d1bc7f2e6b25298f740d27213b3d068ac27ad9a33de8a66edc383</sum></package><package arch="i686" name="mesa-libGL" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libGL-18.0.5-3.el7.i686.rpm</filename><sum type="sha256">1f456a0fa3b9c2b0fa535162082383f35ec3c532e103558a5106d9ecb60392d5</sum></package><package arch="x86_64" name="libXfont-devel" release="1.el7" src="libXfont-1.5.4-1.el7.src.rpm" version="1.5.4"><filename>libXfont-devel-1.5.4-1.el7.x86_64.rpm</filename><sum type="sha256">77bf8f75da7793e7f1c7fc98c38fc827f29b14ca01771bd241fb5e98087b0f8d</sum></package><package arch="x86_64" name="xorg-x11-drv-libinput" release="2.el7" src="xorg-x11-drv-libinput-0.27.1-2.el7.src.rpm" version="0.27.1"><filename>xorg-x11-drv-libinput-0.27.1-2.el7.x86_64.rpm</filename><sum type="sha256">9c7112b0fecfd2e01c42e27576425b6806aebe8c218973a0648de6e257f8b9a0</sum></package><package arch="i686" name="mesa-libGLES" release="3.el7" src="mesa-18.0.5-3.el7.src.rpm" version="18.0.5"><filename>mesa-libGLES-18.0.5-3.el7.i686.rpm</filename><sum type="sha256">e34929e7d7e560bb9baaaae6ff93f31e3324903ade954e25ae16b24592902eaf</sum></package><package arch="i686" name="xorg-x11-drv-wacom-devel" release="1.el7" src="xorg-x11-drv-wacom-0.36.1-1.el7.src.rpm" version="0.36.1"><filename>xorg-x11-drv-wacom-devel-0.36.1-1.el7.i686.rpm</filename><sum type="sha256">8e8e5ac84bc3c204a1c6e3bf23ccb9ad3763b77d7eb1939cee86a4155c21fbc8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9262" id="CVE-2015-9262" title="Libxcursor: 1-Byte Heap-Based Overflow In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3059" id="RHSA-2018:3059-1" title="Rhsa-2018:3059-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1259757" id="1259757" title="Unable To Log Out From Vnc Session" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1428340" id="1428340" title="Xorg Killed By Sigabrt After Resize Of Vm Display When " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1496253" id="1496253" title="Spice/Qxl Cannot Support Gnome3 With Multi-Monitors As It " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1538756" id="1538756" title="[Abrt] Xorg-X11-Server-Xwayland: Xwayland Killed By Sigabrt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564061" id="1564061" title="Rebuild Tigervnc Against Xorg 1.20" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566101" id="1566101" title="Epoxy_Glx_Version &amp; Friends Crash Without Glx And Hinder Gtk3 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570839" id="1570839" title="Segmentation Fault In Animcurcanceltimer With Latest Xorg" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1584740" id="1584740" title="Libglvnd-1.0.1-0.6.Git5Baa1E5.El7 Build Is Conflicting With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1592607" id="1592607" title="Unresolved Symbol In The Xorg-X11-Drv-Mouse Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1601742" id="1601742" title="[Xit] Double-Free Corruption In Panoramixcreateconnectionblock" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1601880" id="1601880" title="Missing Parameters In Man Page Of Xvnc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1601960" id="1601960" title="Undefined Symbol: Loadergetos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1602855" id="1602855" title="Gray Screen And High Cpu Usage With Vncviewer In Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1605325" id="1605325" title="Vncviewer Holds Focus Of Whole Screen After Exiting Fullscreen " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1611599" id="1611599" title="Libxcursor: 1-Byte Heap-Based Overflow In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1613264" id="1613264" title="Wrong Colours Of Vnc Desktop Via Vncviewer On Ppc64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1631880" id="1631880" title="Xorg Defaults To Clone Mode If The Monitor Cable/Connector " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3065-1</id><title>Libkdcraw</title><description>* LibRaw: Stack-based buffer overflow in quicktake_100_load_raw() function in internal/dcraw_common.cpp (CVE-2018-5805) 
* LibRaw: Heap-based buffer overflow in LibRaw::kodak_ycbcr_load_raw function in internal/dcraw_common.cpp (CVE-2018-5800) 
* LibRaw: NULL pointer dereference in LibRaw::unpack function src/libraw_cxx.cpp (CVE-2018-5801) 
* LibRaw: Out-of-bounds read in kodak_radc_load_raw function internal/dcraw_common.cpp (CVE-2018-5802) 
* LibRaw: NULL pointer dereference in leaf_hdr_load_raw() function in internal/dcraw_common.cpp (CVE-2018-5806)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libkdcraw-devel" release="5.el7" src="libkdcraw-4.10.5-5.el7.src.rpm" version="4.10.5"><filename>libkdcraw-devel-4.10.5-5.el7.i686.rpm</filename><sum type="sha256">0f2f92b0ec59d394ea6c1e7182855532c28830de1f2b474baf7a6474449f1df3</sum></package><package arch="i686" name="libkdcraw" release="5.el7" src="libkdcraw-4.10.5-5.el7.src.rpm" version="4.10.5"><filename>libkdcraw-4.10.5-5.el7.i686.rpm</filename><sum type="sha256">95268388bb36b927929b25f07f72297baac5fc1e992e747a8896d2c6ead0e9d1</sum></package><package arch="x86_64" name="libkdcraw" release="5.el7" src="libkdcraw-4.10.5-5.el7.src.rpm" version="4.10.5"><filename>libkdcraw-4.10.5-5.el7.x86_64.rpm</filename><sum type="sha256">9f3132a4f8a083b3331d764b6582f907a982b0fec5b9c69fb9df1641373f219e</sum></package><package arch="x86_64" name="libkdcraw-devel" release="5.el7" src="libkdcraw-4.10.5-5.el7.src.rpm" version="4.10.5"><filename>libkdcraw-devel-4.10.5-5.el7.x86_64.rpm</filename><sum type="sha256">fe2eee21a7b8facc27cfe692f44373308502a9889b4c8b720138e1fb6ba4e370</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5800" id="CVE-2018-5800" title="Libraw: Heap-Based Buffer Overflow In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5801" id="CVE-2018-5801" title="Libraw: Null Pointer Dereference In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5802" id="CVE-2018-5802" title="Libraw: Out-Of-Bounds Read In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5805" id="CVE-2018-5805" title="Libraw: Stack-Based Buffer Overflow In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5806" id="CVE-2018-5806" title="Libraw: Null Pointer Dereference In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3065" id="RHSA-2018:3065-1" title="Rhsa-2018:3065-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1553332" id="1553332" title="Libraw: Heap-Based Buffer Overflow In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1553334" id="1553334" title="Libraw: Null Pointer Dereference In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1553335" id="1553335" title="Libraw: Out-Of-Bounds Read In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1591887" id="1591887" title="Libraw: Stack-Based Buffer Overflow In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1591897" id="1591897" title="Libraw: Null Pointer Dereference In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3071-1</id><title>Krb5</title><description>Security Fix(es): 
* krb5: null dereference in kadmind or DN container check bypass by supplying special crafted data (CVE-2018-5729) 
* krb5: DN container check bypass by supplying special crafted data (CVE-2018-5730)</description><severity>low</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="krb5-pkinit" release="34.el7" src="krb5-1.15.1-34.el7.src.rpm" version="1.15.1"><filename>krb5-pkinit-1.15.1-34.el7.x86_64.rpm</filename><sum type="sha256">6e0b6b457834be28fbf9a5000db8e46b841f9be1b51bfed9529efebadc2b164c</sum></package><package arch="x86_64" name="krb5-libs" release="34.el7" src="krb5-1.15.1-34.el7.src.rpm" version="1.15.1"><filename>krb5-libs-1.15.1-34.el7.x86_64.rpm</filename><sum type="sha256">059350eb17e79f2aef246190097c2336f253321386b97e0576547ee605f6afc0</sum></package><package arch="x86_64" name="krb5-server" release="34.el7" src="krb5-1.15.1-34.el7.src.rpm" version="1.15.1"><filename>krb5-server-1.15.1-34.el7.x86_64.rpm</filename><sum type="sha256">cedb91efa59f11c91707fa5d5d73971e8df6cfbe0e9fa25e2a8e2f450fd76b5c</sum></package><package arch="x86_64" name="libkadm5" release="34.el7" src="krb5-1.15.1-34.el7.src.rpm" version="1.15.1"><filename>libkadm5-1.15.1-34.el7.x86_64.rpm</filename><sum type="sha256">7c7ce37f91c4ffdb92cbb4b77f4e4874f13521c02864ae8d66814e09b2580c6b</sum></package><package arch="i686" name="krb5-libs" release="34.el7" src="krb5-1.15.1-34.el7.src.rpm" version="1.15.1"><filename>krb5-libs-1.15.1-34.el7.i686.rpm</filename><sum type="sha256">b67d561656b794aef21e380b7a900de2b5af0ca30c162edc14fece5eee0283d8</sum></package><package arch="x86_64" name="krb5-devel" release="34.el7" src="krb5-1.15.1-34.el7.src.rpm" version="1.15.1"><filename>krb5-devel-1.15.1-34.el7.x86_64.rpm</filename><sum type="sha256">bb671d63e57a8cec291a1d9b1847c3bd187628f3ba932152f73af92add0f8427</sum></package><package arch="x86_64" name="krb5-workstation" release="34.el7" src="krb5-1.15.1-34.el7.src.rpm" version="1.15.1"><filename>krb5-workstation-1.15.1-34.el7.x86_64.rpm</filename><sum type="sha256">a6b9974147e55cfb3e2de38499d70a9f4a26c8aca92227bf1420249309633d46</sum></package><package arch="i686" name="krb5-devel" release="34.el7" src="krb5-1.15.1-34.el7.src.rpm" version="1.15.1"><filename>krb5-devel-1.15.1-34.el7.i686.rpm</filename><sum type="sha256">4ace895acee50fdde4e72b56f64eefa471d5cc7d01d0382e1411fe184465242e</sum></package><package arch="x86_64" name="krb5-server-ldap" release="34.el7" src="krb5-1.15.1-34.el7.src.rpm" version="1.15.1"><filename>krb5-server-ldap-1.15.1-34.el7.x86_64.rpm</filename><sum type="sha256">3b5352f0ff08c9305fa88fd74914be24f3151d89d3e458b18da6ae571c305b1c</sum></package><package arch="i686" name="libkadm5" release="34.el7" src="krb5-1.15.1-34.el7.src.rpm" version="1.15.1"><filename>libkadm5-1.15.1-34.el7.i686.rpm</filename><sum type="sha256">7f1f09e283a628d528f32d4cedc37b32d938188073db7ac42d0dca3a58145683</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5729" id="CVE-2018-5729" title="Krb5: Null Dereference In Kadmind Or Dn " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5730" id="CVE-2018-5730" title="Krb5: Dn Container Check Bypass By Supplying " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3071" id="RHSA-2018:3071-1" title="Rhsa-2018:3071-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1373909" id="1373909" title="Running Systemctl Stop Kadmin.Service Causes The Status To Be " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1497301" id="1497301" title="[Rfe] Add German Translation (De_De.Utf-8)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1525232" id="1525232" title="Fix Network Service Dependencies" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1538491" id="1538491" title="Certid Option Of Pkinit Plugin Does Not Handle Leading Zeros" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1539824" id="1539824" title="Order Of Processing For Files In Included Directories Is Undefined" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1540130" id="1540130" title="[Rfe] Make Preauth Types More Descriptive In Krb5 Trace" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1551082" id="1551082" title="Krb5: Dn Container Check Bypass By Supplying " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1551083" id="1551083" title="Krb5: Null Dereference In Kadmind Or Dn " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1563166" id="1563166" title="Kdestroy -A Does Not Work With Multiple Principals When Using Kcm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570600" id="1570600" title="Krb5-Libs Uses Slow Crypto Implementation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1599721" id="1599721" title="Ipa-Server-Install Fails When Fips Mode Is Enabled" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3073-1</id><title>Zsh</title><description>Security Fix(es): 
* zsh: Stack-based buffer overflow in gen_matches_files() at compctl.c (CVE-2018-1083) 
* zsh: buffer overflow for very long fds in &gt;&amp; fd syntax (CVE-2014-10071) 
* zsh: buffer overflow when scanning very long directory paths for symbolic links (CVE-2014-10072) 
* zsh: NULL dereference in cd in sh compatibility mode under given circumstances (CVE-2017-18205) 
* zsh: buffer overrun in symlinks (CVE-2017-18206) 
* zsh: Stack-based buffer overflow in exec.c:hashcmd() (CVE-2018-1071) 
* zsh: buffer overflow in utils.c:checkmailpath() can lead to local arbitrary code execution (CVE-2018-1100) 
* zsh: crash on copying empty hash table (CVE-2018-7549)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="zsh-html" release="31.el7" src="zsh-5.0.2-31.el7.src.rpm" version="5.0.2"><filename>zsh-html-5.0.2-31.el7.x86_64.rpm</filename><sum type="sha256">5fc4e41b581e92c61eb926101630790b661b7649519c80f6cc166f804d34beb3</sum></package><package arch="x86_64" name="zsh" release="31.el7" src="zsh-5.0.2-31.el7.src.rpm" version="5.0.2"><filename>zsh-5.0.2-31.el7.x86_64.rpm</filename><sum type="sha256">9b059e912bccbda0307cf9a2753beeae59991c327acd4aadc6cc8af855593ac7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10071" id="CVE-2014-10071" title="Zsh: Buffer Overflow For Very Long Fds In &gt;&amp; Fd " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-10072" id="CVE-2014-10072" title="Zsh: Buffer Overflow When Scanning Very Long Directory Paths For Symbolic Links" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18205" id="CVE-2017-18205" title="Zsh: Null Dereference In Cd In Sh Compatibility " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18206" id="CVE-2017-18206" title="Zsh: Buffer Overrun In Symlinks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1071" id="CVE-2018-1071" title="Zsh: Stack-Based Buffer Overflow In Exec.C:Hashcmd()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1083" id="CVE-2018-1083" title="Zsh: Stack-Based Buffer Overflow In Gen_Matches_Files() At Compctl.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1100" id="CVE-2018-1100" title="Zsh: Buffer Overflow In Utils.C:Checkmailpath() Can Lead To Local Arbitrary Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7549" id="CVE-2018-7549" title="Zsh: Crash On Copying Empty Hash Table" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3073" id="RHSA-2018:3073-1" title="Rhsa-2018:3073-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549836" id="1549836" title="Zsh: Buffer Overflow When Scanning Very Long Directory Paths For Symbolic Links" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549855" id="1549855" title="Zsh: Buffer Overflow For Very Long Fds In &gt;&amp; Fd " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549858" id="1549858" title="Zsh: Crash On Copying Empty Hash Table" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549861" id="1549861" title="Zsh: Buffer Overrun In Symlinks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549862" id="1549862" title="Zsh: Null Dereference In Cd In Sh Compatibility " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1553531" id="1553531" title="Zsh: Stack-Based Buffer Overflow In Exec.C:Hashcmd()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1557382" id="1557382" title="Zsh: Stack-Based Buffer Overflow In Gen_Matches_Files() At Compctl.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1563395" id="1563395" title="Zsh: Buffer Overflow In Utils.C:Checkmailpath() Can Lead To Local Arbitrary Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3083-1</id><title>Kernel</title><description>Security Fix(es): 
* A flaw named FragmentSmack was found in the way the Linux kernel handled reassembly of fragmented IPv4 and IPv6 packets. A remote attacker could use this flaw to trigger time and calculation expensive fragment reassembly algorithm by sending specially crafted packets which could lead to a CPU saturation and hence a denial of service on the system. (CVE-2018-5391) 
* kernel: out-of-bounds access in the show_timer function in kernel/time /posix-timers.c (CVE-2017-18344) 
* kernel: Integer overflow in udl_fb_mmap() can allow attackers to execute code in kernel space (CVE-2018-8781) 
* kernel: MIDI driver race condition leads to a double-free (CVE-2018-10902) 
* kernel: Missing check in inode_init_owner() does not clear SGID bit on non-directories for non-members (CVE-2018-13405) 
* kernel: AIO write triggers integer overflow in some protocols (CVE-2015-8830) 
* kernel: Use-after-free in snd_pcm_info function in ALSA subsystem potentially leads to privilege escalation (CVE-2017-0861) 
* kernel: Handling of might_cancel queueing is not properly pretected against race (CVE-2017-10661) 
* kernel: Salsa20 encryption algorithm does not correctly handle zero- length inputs allowing local attackers to cause denial of service (CVE-2017-17805) 
* kernel: Inifinite loop vulnerability in madvise_willneed() function allows local denial of service (CVE-2017-18208) 
* kernel: fuse-backed file mmap-ed onto process cmdline arguments causes denial of service (CVE-2018-1120) 
* kernel: a null pointer dereference in dccp_write_xmit() leads to a system crash (CVE-2018-1130) 
* kernel: drivers/block/loop.c mishandles lo_release serialization allowing denial of service (CVE-2018-5344) 
* kernel: Missing length check of payload in _sctp_make_chunk() function allows denial of service (CVE-2018-5803) 
* kernel: buffer overflow in drivers/net/wireless/ath/wil6210/wmi.c:wmi_set_ie() may lead to memory corruption (CVE-2018-5848) 
* kernel: out-of-bound write in ext4_init_block_bitmap function with a crafted ext4 image (CVE-2018-10878) 
* kernel: Improper validation in bnx2x network card driver can allow for denial of service attacks via crafted packet (CVE-2018-1000026) 
* kernel: Information leak when handling NM entries containing NUL (CVE-2016-4913) 
* kernel: Mishandling mutex within libsas allowing local Denial of Service (CVE-2017-18232) 
* kernel: NULL pointer dereference in ext4_process_freed_data() when mounting crafted ext4 image (CVE-2018-1092) 
* kernel: NULL pointer dereference in ext4_xattr_inode_hash() causes crash with crafted ext4 image (CVE-2018-1094) 
* kernel: vhost: Information disclosure in vhost/vhost.c:vhost_new_msg() (CVE-2018-1118) 
* kernel: Denial of service in resv_map_release function in mm/hugetlb.c (CVE-2018-7740) 
* kernel: Memory leak in the sas_smp_get_phy_events function in drivers/scsi/libsas/sas_expander.c (CVE-2018-7757) 
* kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service (CVE-2018-10322) 
* kernel: use-after-free detected in ext4_xattr_set_entry with a crafted file (CVE-2018-10879) 
* kernel: out-of-bound access in ext4_get_group_info() when mounting and operating a crafted ext4 image (CVE-2018-10881) 
* kernel: stack-out-of-bounds write in jbd2_journal_dirty_metadata function (CVE-2018-10883) 
* kernel: incorrect memory bounds check in drivers/cdrom/cdrom.c (CVE-2018-10940)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-debug" release="957.el7" src="kernel-3.10.0-957.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-957.el7.x86_64.rpm</filename><sum type="sha256">12adda2e4a50f7793d6f908d0c0cd8b5e8b1f1e77be79c7076c024aadc67ff60</sum></package><package arch="noarch" name="kmod-openafs-1.6-sl" release="1.SL76.el7" src="kmod-openafs-1.6-sl-1.6.23-1.SL76.el7.src.rpm" version="1.6.23"><filename>kmod-openafs-1.6-sl-1.6.23-1.SL76.el7.noarch.rpm</filename><sum type="sha256">1b3a2056f4d0413a86d13cfdd535f5e994e4e7d14ccad91f872f23cc71766b90</sum></package><package arch="x86_64" name="kernel-devel" release="957.el7" src="kernel-3.10.0-957.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-957.el7.x86_64.rpm</filename><sum type="sha256">a665d1882d64b3bab3dba0b5471156cdaef9953e35399d08c6fad5b440143f87</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="957.el7" src="kernel-3.10.0-957.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-957.el7.x86_64.rpm</filename><sum type="sha256">46af9a55559b2067542d798073ed37eb5b6489c8c76a8c38f195ae2e62082928</sum></package><package arch="x86_64" name="kernel-debug-devel" release="957.el7" src="kernel-3.10.0-957.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-957.el7.x86_64.rpm</filename><sum type="sha256">e1758b55347a72ed1da3c09485904d1ef7f8d4ae61651e5dd7fa9a293d9398bc</sum></package><package arch="x86_64" name="python-perf" release="957.el7" src="kernel-3.10.0-957.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-957.el7.x86_64.rpm</filename><sum type="sha256">1cc93be33ac69a3cd738fe73170419b4d83ac1c66b67b6bb82cb3ff8cf27012c</sum></package><package arch="x86_64" name="kernel-tools-libs" release="957.el7" src="kernel-3.10.0-957.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-957.el7.x86_64.rpm</filename><sum type="sha256">a278de5b473a89a01d926b8b449e1c7da89a5f4d8a6b6067b5913fd1f3c30e9d</sum></package><package arch="noarch" name="kernel-doc" release="957.el7" src="kernel-3.10.0-957.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-957.el7.noarch.rpm</filename><sum type="sha256">5a84a2d8d9647f3be4480afed1eac581f240277cbd471b5dcd04719c970c8684</sum></package><package arch="x86_64" name="perf" release="957.el7" src="kernel-3.10.0-957.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-957.el7.x86_64.rpm</filename><sum type="sha256">1f3aff2a3dfa3daf8cecd08aaf6476293eda32794a97c2c8f709ac319ad69665</sum></package><package arch="x86_64" name="kernel-headers" release="957.el7" src="kernel-3.10.0-957.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-957.el7.x86_64.rpm</filename><sum type="sha256">84f1d4e682e6498091e3b4667ee81adf3dc0918807d48dd616d3cedae6329d35</sum></package><package arch="x86_64" name="bpftool" release="957.el7" src="kernel-3.10.0-957.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-957.el7.x86_64.rpm</filename><sum type="sha256">1f866e5351d12c5e351ef877d5da356e5012b159cc09d14b2e539d61e0dbbdcc</sum></package><package arch="x86_64" name="kmod-openafs-1.6-sl-957" release="289.sl7.957" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>kmod-openafs-1.6-sl-957-1.6.23-289.sl7.957.x86_64.rpm</filename><sum type="sha256">4718b8eb44cc2e7a9250bb85e5c89e29505108bc812509f1d869af54ad28c98c</sum></package><package arch="x86_64" name="kernel-tools" release="957.el7" src="kernel-3.10.0-957.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-957.el7.x86_64.rpm</filename><sum type="sha256">785bac81189006c337da76ceb3d01a6a5c9bcf42d391f9a85c850bfb95acf210</sum></package><package arch="x86_64" name="kernel" release="957.el7" src="kernel-3.10.0-957.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-957.el7.x86_64.rpm</filename><sum type="sha256">77e1498e67f6b801a2664ca1d589ef455eed3bb06700477151f539774ca35b87</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="957.el7" src="kernel-3.10.0-957.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-957.el7.noarch.rpm</filename><sum type="sha256">75076d34209f66e3bcc3206565ac145dcd628d8798f89e14464129c9346f4424</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8830" id="CVE-2015-8830" title="Kernel: Aio Write Triggers Integer Overflow In Some Protocols" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4913" id="CVE-2016-4913" title="Kernel: Information Leak When Handling Nm " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0861" id="CVE-2017-0861" title="Kernel: Use-After-Free In Snd_Pcm_Info Function " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10661" id="CVE-2017-10661" title="Kernel: Handling Of Might_Cancel Queueing Is " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17805" id="CVE-2017-17805" title="Kernel: Salsa20 Encryption Algorithm Does Not " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18208" id="CVE-2017-18208" title="Kernel: Inifinite Loop Vulnerability In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18232" id="CVE-2017-18232" title="Kernel: Mishandling Mutex Within Libsas " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18344" id="CVE-2017-18344" title="Kernel: Out-Of-Bounds Access In The Show_Timer " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000026" id="CVE-2018-1000026" title="Kernel: Improper Validation In Bnx2X Network " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10322" id="CVE-2018-10322" title="Kernel: Invalid Pointer Dereference In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10878" id="CVE-2018-10878" title="Kernel: Out-Of-Bound Write In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10879" id="CVE-2018-10879" title="Kernel: Use-After-Free Detected In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10881" id="CVE-2018-10881" title="Kernel: Out-Of-Bound Access In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10883" id="CVE-2018-10883" title="Kernel: Stack-Out-Of-Bounds Write In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10902" id="CVE-2018-10902" title="Kernel: Midi Driver Race Condition Leads To A " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1092" id="CVE-2018-1092" title="Kernel: Null Pointer Dereference In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1094" id="CVE-2018-1094" title="Kernel: Null Pointer Dereference In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10940" id="CVE-2018-10940" title="Kernel: Incorrect Memory Bounds Check In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1118" id="CVE-2018-1118" title="Kernel: Vhost: Information Disclosure In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1120" id="CVE-2018-1120" title="Kernel: Fuse-Backed File Mmap-Ed Onto Process " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1130" id="CVE-2018-1130" title="Kernel: A Null Pointer Dereference In Net/Dccp/Output.C:Dccp_Write_Xmit() Leads To A System Crash" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13405" id="CVE-2018-13405" title="Kernel: Missing Check In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5344" id="CVE-2018-5344" title="Kernel: Drivers/Block/Loop.C Mishandles " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5391" id="CVE-2018-5391" title="Kernel: Ip Fragments With Random Offsets Allow A " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5803" id="CVE-2018-5803" title="Kernel: Missing Length Check Of Payload In Net/Sctp/Sm_Make_Chunk.C:_Sctp_Make_Chunk() Function Allows Denial Of Service" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5848" id="CVE-2018-5848" title="Kernel: Buffer Overflow In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7740" id="CVE-2018-7740" title="Kernel: Denial Of Service In Resv_Map_Release " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7757" id="CVE-2018-7757" title="Kernel: Memory Leak In The " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8781" id="CVE-2018-8781" title="Kernel: Integer Overflow In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3083" id="RHSA-2018:3083-1" title="Rhsa-2018:3083-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1314275" id="1314275" title="Kernel: Aio Write Triggers Integer Overflow In Some Protocols" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1322930" id="1322930" title="[Rfe] Allow Xfs To Modify Labels On Mounted Filesystem" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1337528" id="1337528" title="Kernel: Information Leak When Handling Nm " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1481136" id="1481136" title="Kernel: Handling Of Might_Cancel Queueing Is " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1488484" id="1488484" title="Gre: Ifla_Mtu Ignored On Newlink" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1504058" id="1504058" title="Kernel Panic With Nfsd While Removing Locks On File Close" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1507027" id="1507027" title="[Esxi][Rhel7.6]X86/Vmware: Add Paravirt Sched Clock" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1528312" id="1528312" title="Kernel: Salsa20 Encryption Algorithm Does Not " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1533909" id="1533909" title="Kernel: Drivers/Block/Loop.C Mishandles " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1541846" id="1541846" title="Kernel: Improper Validation In Bnx2X Network " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1542494" id="1542494" title="Vms With  Nvme Devices Passed Through Sometimes Fail To Be " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1551051" id="1551051" title="Kernel: Missing Length Check Of Payload In Net/Sctp/Sm_Make_Chunk.C:_Sctp_Make_Chunk() Function Allows Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1551565" id="1551565" title="Kernel: Inifinite Loop Vulnerability In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1552867" id="1552867" title="Kernel: Denial Of Service In Resv_Map_Release " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1553361" id="1553361" title="Kernel: Memory Leak In The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1557434" id="1557434" title="Bio Too Big Device Md0 (1024 &gt; 256)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1557599" id="1557599" title="[Rfe] Rebase Ipset (Kernel) To Latest Upstream" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1558066" id="1558066" title="Kernel: Mishandling Mutex Within Libsas " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1558328" id="1558328" title="Kernel Data Path Test With Ovs 2.9 + Dpdk 17.11 Fails With Low " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560777" id="1560777" title="Kernel: Null Pointer Dereference In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560788" id="1560788" title="Kernel: Null Pointer Dereference In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1561162" id="1561162" title="[Rhel7.5] Extreme Performance Impact Caused By Raid Resync" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1563697" id="1563697" title="Triming On Full Pool Can Trigger 'Dm_Pool_Alloc_Data_Block' " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1563994" id="1563994" title="Kernel: Use-After-Free In Snd_Pcm_Info Function " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564186" id="1564186" title="Xfs May Block Endlessly In  Xlog_Wait() On Io Error" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568167" id="1568167" title="Crypto Aesni-Intel Aes(Gcm) Is Broken For Ipsec" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1571062" id="1571062" title="Kernel: Integer Overflow In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1571623" id="1571623" title="Kernel: Invalid Pointer Dereference In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1572983" id="1572983" title="Conntrack Doesn'T Track Packets In Specific Network Namespace " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1573699" id="1573699" title="Kernel: Vhost: Information Disclosure In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1575472" id="1575472" title="Kernel: Fuse-Backed File Mmap-Ed Onto Process " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576419" id="1576419" title="Kernel: A Null Pointer Dereference In Net/Dccp/Output.C:Dccp_Write_Xmit() Leads To A System Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1577408" id="1577408" title="Kernel: Incorrect Memory Bounds Check In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1584775" id="1584775" title="Vms Hung After Migration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1590720" id="1590720" title="Kernel: Midi Driver Race Condition Leads To A " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1590799" id="1590799" title="Kernel: Buffer Overflow In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1592654" id="1592654" title="[Nvme Device Assignment] Guest Reboot Failed From The Nvme " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1596802" id="1596802" title="Kernel: Out-Of-Bound Write In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1596806" id="1596806" title="Kernel: Use-After-Free Detected In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1596828" id="1596828" title="Kernel: Out-Of-Bound Access In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1596846" id="1596846" title="Kernel: Stack-Out-Of-Bounds Write In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1599161" id="1599161" title="Kernel: Missing Check In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1609664" id="1609664" title="Kernel: Ip Fragments With Random Offsets Allow A " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1609717" id="1609717" title="[Unwinder] Cpu Spins Indefinitely In __Save_Stack_Trace() Call " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1610958" id="1610958" title="Kernel: Out-Of-Bounds Access In The Show_Timer " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3090-1</id><title>Ovmf</title><description>Security Fix(es): 
* openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service (CVE-2018-0739)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="OVMF" release="3.gitee3198e672e2.el7" src="ovmf-20180508-3.gitee3198e672e2.el7.src.rpm" version="20180508"><filename>OVMF-20180508-3.gitee3198e672e2.el7.noarch.rpm</filename><sum type="sha256">bf62a31163b3030735af0456c2ad87aa20c25300439eb8e105d348c7426ced12</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0739" id="CVE-2018-0739" title="Openssl: Handling Of Crafted Recursive Asn.1 " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3090" id="RHSA-2018:3090-1" title="Rhsa-2018:3090-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1561128" id="1561128" title="Ovmf Secure Boot Enablement (Enrollment Of Default Keys)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1561266" id="1561266" title="Openssl: Handling Of Crafted Recursive Asn.1 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1577546" id="1577546" title="No Input Consoles Connected Under Certain Circumstances" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1579518" id="1579518" title="Efi_Rng_Protocol No Longer Produced For Virtio-Rng" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1607792" id="1607792" title="Add 'Provides: Bundled(Openssl) = 1.1.0H' To The Spec File" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3092-1</id><title>Glibc</title><description>Security Fix(es): 
* glibc: Incorrect handling of RPATH in elf/dl-load.c can be used to execute code loaded from arbitrary libraries (CVE-2017-16997) 
* glibc: Integer overflow in posix_memalign in memalign functions (CVE-2018-6485) 
* glibc: Integer overflow in stdlib/canonicalize.c on 32-bit architectures leading to stack-based buffer overflow (CVE-2018-11236) 
* glibc: Buffer overflow in __mempcpy_avx512_no_vzeroupper (CVE-2018-11237)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="glibc-devel" release="260.el7" src="glibc-2.17-260.el7.src.rpm" version="2.17"><filename>glibc-devel-2.17-260.el7.i686.rpm</filename><sum type="sha256">1c2fedb11baf397456e6f9070579d0b2fd35315bc43a38b7a487380c928a4d4e</sum></package><package arch="x86_64" name="glibc-static" release="260.el7" src="glibc-2.17-260.el7.src.rpm" version="2.17"><filename>glibc-static-2.17-260.el7.x86_64.rpm</filename><sum type="sha256">827f5c3f559668b841528a3dfa1c7b55a19e5aaaaccbdc9f3515308e75969196</sum></package><package arch="x86_64" name="glibc-headers" release="260.el7" src="glibc-2.17-260.el7.src.rpm" version="2.17"><filename>glibc-headers-2.17-260.el7.x86_64.rpm</filename><sum type="sha256">23b384719fb153a684f5e6b898be45cb2f404247f3e7103cbd23ef64299cc560</sum></package><package arch="x86_64" name="glibc-common" release="260.el7" src="glibc-2.17-260.el7.src.rpm" version="2.17"><filename>glibc-common-2.17-260.el7.x86_64.rpm</filename><sum type="sha256">369510034cbb4ba6f2c8df109064dcee9fa92b483dd8d335f4a38baad7daedec</sum></package><package arch="x86_64" name="nscd" release="260.el7" src="glibc-2.17-260.el7.src.rpm" version="2.17"><filename>nscd-2.17-260.el7.x86_64.rpm</filename><sum type="sha256">b42d51a291379c7524691ce16d5629f81f0e4acc82501943cb13ba3d4a08cc3e</sum></package><package arch="x86_64" name="glibc-devel" release="260.el7" src="glibc-2.17-260.el7.src.rpm" version="2.17"><filename>glibc-devel-2.17-260.el7.x86_64.rpm</filename><sum type="sha256">681bd9d11aceac0dadcdf1489782b8867d1cd22f3208cce8fb38b4ae563fdb7b</sum></package><package arch="x86_64" name="glibc-utils" release="260.el7" src="glibc-2.17-260.el7.src.rpm" version="2.17"><filename>glibc-utils-2.17-260.el7.x86_64.rpm</filename><sum type="sha256">1f58351625b8eeb6017a4f5f218bfcca4e65618f64bf47e7d7144527c8419afb</sum></package><package arch="i686" name="glibc" release="260.el7" src="glibc-2.17-260.el7.src.rpm" version="2.17"><filename>glibc-2.17-260.el7.i686.rpm</filename><sum type="sha256">60f6c1e7c8474beebace147a392d322ca20613871937c058650b856f96550517</sum></package><package arch="x86_64" name="glibc" release="260.el7" src="glibc-2.17-260.el7.src.rpm" version="2.17"><filename>glibc-2.17-260.el7.x86_64.rpm</filename><sum type="sha256">7dcc8aa24f99ad119d51c5e2c46cc42b3865cf49d9df5f7d40893b0f90ccd62f</sum></package><package arch="i686" name="glibc-static" release="260.el7" src="glibc-2.17-260.el7.src.rpm" version="2.17"><filename>glibc-static-2.17-260.el7.i686.rpm</filename><sum type="sha256">d323d00cb3de82d4fb569b9b2f295e73da28c2df9affa5b78b0cb1ea09dba6ae</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16997" id="CVE-2017-16997" title="Glibc: Incorrect Handling Of Rpath In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11236" id="CVE-2018-11236" title="Glibc: Integer Overflow In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11237" id="CVE-2018-11237" title="Glibc: Buffer Overflow In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6485" id="CVE-2018-6485" title="Glibc: Integer Overflow In Posix_Memalign In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3092" id="RHSA-2018:3092-1" title="Rhsa-2018:3092-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1349982" id="1349982" title="Fix Static Analysis Warnings In Build-Locale-Archive.C." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1372304" id="1372304" title="Glibc: Backport Build/Testing Time Improvements" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1401665" id="1401665" title="Fix Process Shared Robust Mutex Defects." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1408964" id="1408964" title="Rfe: Add Provides: Nss_Db To The Glibc Rpm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448107" id="1448107" title="Glibc: Add El_Gr@Euro, Ur_In, And Wal_Et Locales" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1461231" id="1461231" title="[Rfe] Support Ofd Locking Constants, But Disable Them For " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471405" id="1471405" title="Glibc: Define O_Tmpfile Macro" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1476120" id="1476120" title="Glibc Headers Don'T Include Linux/Falloc.H, And Therefore " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1505451" id="1505451" title="Pthread_Barrier_Init Typo Has In-Theory-Undefined Behavior" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1505477" id="1505477" title="Strftime_L: Fix Multiline Macro Do_Number (Gcc 8 Warnings, And " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1505492" id="1505492" title="Glibc: Build With -Werror And -Wundef" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1505500" id="1505500" title="Locale: Transliteration Function May Return Address Of Local " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1505647" id="1505647" title="Nscd Not Properly Caching Netgroup" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1526865" id="1526865" title="Glibc: Incorrect Handling Of Rpath In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1531168" id="1531168" title="Glibc: Setcontext/Makecontext Alignment Issues On X86" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1542102" id="1542102" title="Glibc: Integer Overflow In Posix_Memalign In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560641" id="1560641" title="Sem_Open - Valgrind Complains About Uninitialised Bytes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1563046" id="1563046" title="Getlogin_R: Return Early When Linux Sentinel Value Is Set" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1563747" id="1563747" title="Glibc: Adjust System Call Name List To Linux 4.16+" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564638" id="1564638" title="Glibc: Fix Compile-Time Type Error In String/Test-Strncmp.C " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566623" id="1566623" title="Glibc: Old-Style Function Definitions Without Prototype In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1579727" id="1579727" title="Glibc: Crash In __Res_Context_Send After Memory Allocation Failure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1581269" id="1581269" title="Glibc: Integer Overflow In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1581274" id="1581274" title="Glibc: Buffer Overflow In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3107-1</id><title>Wpa_Supplicant</title><description>Security Fix(es): 
* wpa_supplicant: Unauthenticated EAPOL-Key decryption in wpa_supplicant (CVE-2018-14526)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="wpa_supplicant" release="12.el7" src="wpa_supplicant-2.6-12.el7.src.rpm" version="2.6"><filename>wpa_supplicant-2.6-12.el7.x86_64.rpm</filename><sum type="sha256">1143818d5fe67389f47b29b75ce6fca18a96aee278831f9affd89171314c70e5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14526" id="CVE-2018-14526" title="Wpa_Supplicant: Unauthenticated Eapol-Key " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3107" id="RHSA-2018:3107-1" title="Rhsa-2018:3107-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1434434" id="1434434" title="Wpa_Supplicant Is Responding To Packets Which Are Not Destined " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1490885" id="1490885" title="Networkmanager'S Mac Randomization Can Lead Into Msk Mismatch " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1614520" id="1614520" title="Wpa_Supplicant: Unauthenticated Eapol-Key " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3113-1</id><title>Libvirt</title><description>Security Fix(es): 
* libvirt: guest could inject executable code via libnss_dns.so loaded by libvirt_lxc before init (CVE-2018-6764)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libvirt-daemon-kvm" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-kvm-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">b09cfe8771f7f7ad694ff696bdd1cea425fe85dc79d0007097a6eaf35463bc35</sum></package><package arch="x86_64" name="libvirt-docs" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-docs-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">bcb169dfd0d952012f2574303e7db436ab1a9ba759126ed8cea3a4764e7a0191</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-rbd" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-rbd-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">90659892738ac699196bd1a4cbd46f046655d3456504c004d814f984dbcedf9e</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-mpath" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-mpath-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">bfec3dcf10c6f15ccdba185b38281270a0718062e1994272183e623801aca5b1</sum></package><package arch="x86_64" name="libvirt-daemon-driver-interface" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-interface-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">0962f232f1c9d1533b649fb66d031f94b6ce0ffc3959149e7dfe78ae7fb1ac75</sum></package><package arch="x86_64" name="libvirt" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">2060e6f2b3b806acf79a49ea91709f93c4dd3a60db9e2fbc4b1c9d98bcf69f42</sum></package><package arch="x86_64" name="libvirt-daemon-config-nwfilter" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-nwfilter-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">24f217dbb6471b146c692b9f3966f56f628edd2e0a45c8a1d8db7c0c5f628c68</sum></package><package arch="i686" name="libvirt-libs" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-10.el7.i686.rpm</filename><sum type="sha256">cbf5ee0b92e3348d038e6dbfd5677abefd45ce9d2ae8b85cb3e285c97f816bc1</sum></package><package arch="i686" name="libvirt-client" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-10.el7.i686.rpm</filename><sum type="sha256">8ea620b2e421277bb4ac8c806ff0e808400a8c7c7f7968e91db605e66f241fb8</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-scsi" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-scsi-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">a74b37e45bb5216c4f10c8df71a6f870f1d288ed1c262f97a902cebb5adbc785</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-disk" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-disk-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">d4b039ab63dd977765001da464a827a113c5e4a4d29695cf3dd796bcc0b6a454</sum></package><package arch="x86_64" name="libvirt-devel" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">7622448eb69de3e205bf35e72238dc17e2d69a5c005bd07938ce0aa4f1269607</sum></package><package arch="x86_64" name="libvirt-libs" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">b0763014f57fe5a0830561d111bab70480b47e84a3966af3dc5a5b06d5f692c8</sum></package><package arch="x86_64" name="libvirt-admin" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-admin-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">0dc3ff840d568519e0182bd4bde7845b3b01834bb553833743c1d229c506726c</sum></package><package arch="x86_64" name="libvirt-daemon-driver-lxc" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-lxc-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">1e71a3fe6127bc018d0a51b20d682dd34de4dede6c835d1271160a55b219d84a</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">5cbe2a7a688d7260f453085dda47036f78c6d0f7634b613419575c4cb79d18f1</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-core" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-core-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">442a716a26b48d7a64c7f50d0f43829b9cb4db5dfad9f00fb9456d5afbc58c36</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nodedev" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nodedev-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">8a5358d830645a0c4005b05234ea1e10b56a41b0c27e7ee78754b43d44d3a605</sum></package><package arch="x86_64" name="libvirt-daemon-driver-network" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-network-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">020140c6ce6f98337144294110efaf42db49169df97afc51ec794a8a8968880b</sum></package><package arch="i686" name="libvirt-nss" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-10.el7.i686.rpm</filename><sum type="sha256">8bfaf019fda8bcc0cd3d8b6510cb36c23c94ac2d6da940af176892ed297812f6</sum></package><package arch="x86_64" name="libvirt-daemon-lxc" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-lxc-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">f63f90d7d9e6c98e16c05b16058de6287020e68b57bc94580eb7f2ced2fdc04b</sum></package><package arch="x86_64" name="libvirt-nss" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">adba3c20ce8d4d187d9e3b613223716326412488d0d2872680671077d64c8c6b</sum></package><package arch="i686" name="libvirt-devel" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-10.el7.i686.rpm</filename><sum type="sha256">64f7562642c48e718e508e536c7e026f5615b1fe271920bffc141d559dc7d34f</sum></package><package arch="x86_64" name="libvirt-daemon-config-network" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-network-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">3ebde7b3d6139ef160b9aef92bed1bf4b5e0be2eef2b5bab051d2f1987eac804</sum></package><package arch="x86_64" name="libvirt-login-shell" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-login-shell-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">826b2b5faf1a5f151d70a6daa29f9f0d0f1e69adeb30fbc0866ae8b8cedeaf65</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-gluster" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-gluster-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">4b6a8055656974c80ee6122bba79b04f7f1b6f92273ca2c3a0e8a9b8d83ae4ef</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-lock-sanlock-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">7b9f8aee68bb0ea6afc54c5961327261de06bc60b039b71c98cb083f457492ac</sum></package><package arch="x86_64" name="libvirt-bash-completion" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-bash-completion-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">aa13d4f2bc355a2d589fd4d640721b232b35a3121600fce4dec84235ec683115</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nwfilter" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nwfilter-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">ae0874b345ec80ededd06a6d69085b5ff87d05d57d14f5d5a48277e332d40793</sum></package><package arch="x86_64" name="libvirt-client" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">4eac3c1fdea252908c9956fb5a018f39965dd698b5ffafb3cc716a5a2710ad21</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-iscsi" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">ef20768c8f0f9eff9ba958af25848731a645fe878fb74ad867188ca910592da3</sum></package><package arch="x86_64" name="libvirt-daemon-driver-secret" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-secret-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">9e2e29c21f57511b3b72f4043e0c12c4568ed202f5b8af296b5cc9fdadcbd82c</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-logical" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-logical-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">372de5b2d1cc0258fc25bcc0eb99ebea53b23ab86eaf0c0876a7c0fb7ebb9efc</sum></package><package arch="x86_64" name="libvirt-daemon-driver-qemu" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-qemu-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">0919db78886de7140fc5fe7fe7766637213a2b15c2e7830dc9a3f13428e1194f</sum></package><package arch="x86_64" name="libvirt-daemon" release="10.el7" src="libvirt-4.5.0-10.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-4.5.0-10.el7.x86_64.rpm</filename><sum type="sha256">e023448b8d0704a0326fbac8cc5ffbe84bfbdec9f15afbd945b6adfa019b9481</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6764" id="CVE-2018-6764" title="Libvirt: Guest Could Inject Executable Code Via " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3113" id="RHSA-2018:3113-1" title="Rhsa-2018:3113-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1149445" id="1149445" title="[Rfe] Detection Of Cloned Environment Using A Unique, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291851" id="1291851" title="Support For Virtio-Vsock - Libvirt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1300772" id="1300772" title="Rfe: Add Support For Native Tls Encryption On Nbd For Disk " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1367238" id="1367238" title="Libvirt Allow Set Busnr And Numa Node For A Pci-Bridge But " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1425058" id="1425058" title="[Rfe] Libvirt: Provide A Way To Disable Rom Loading Completely " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1425757" id="1425757" title="Rfe: Add Support For Securely Passing Passwords To Iscsi Block " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1447169" id="1447169" title="[Rfe] Support Hotplugging/Unplugging Of I6300Esb  Watchdog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448149" id="1448149" title="&lt;Memorybacking&gt; &lt;Access Mode='Shared'/&gt; Is Ignored If No Numa " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1454709" id="1454709" title="Delete The Qos Settings For The Interface On The Fly Makes No " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1456165" id="1456165" title="The Sub-Element For Panic Device Should Be &quot;Interleave&quot; In Rng " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1468422" id="1468422" title="Libvirt Crashed With Sigsegv When Creating A Luks Encrypted " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1469338" id="1469338" title="Rfe: Expose Q35 Extended Tseg Size In Domain Xml Element Or " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1470007" id="1470007" title="[Rfe] [Libvirt Part] Add S3 Pr Support To Qemu (Similar To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1480668" id="1480668" title="Rfe: Enhance Qemu To Support Freeing Memory Before Exit When " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1483816" id="1483816" title="Schema For The 'Target' Field In &lt;Controller " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1490158" id="1490158" title="Libvirt Could Not Reconnect Qemu" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1492597" id="1492597" title="Enable Seccomp By Out Of The Box With Qemu &gt;= 2.11" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1494454" id="1494454" title="Rfe: Add Sanity Checks For Shared Storage When Migrating " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1507737" id="1507737" title="Virsh Prompt Doesn'T Change After Changing The Connection To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1509870" id="1509870" title="Command &quot;Virsh Set-Lifecycle-Action --Help&quot; Raises Abnormal " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1515533" id="1515533" title="Libvirt Should Report Correct Error Info When Prefix Is Set " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1519146" id="1519146" title="Libvirt Uses Deprecated Compat=Xxx Option" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1520821" id="1520821" title="Rfe: Add Generic Pcie-Pci Bridge For Libvirt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1522706" id="1522706" title="Inexact Error Info When Undefine A Running Uefi Guest Without " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1523564" id="1523564" title="Start Vm With Hostdev &lt;Source Protocol='Vhost' ...&gt; Will Cause " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1524399" id="1524399" title="Client-Info Return Incorrect Readonly Info When Connected By " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1525496" id="1525496" title="Libvirtd Fails To Reconnect To A Qemu Process After Creating " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1525599" id="1525599" title="Support Pseries Cap-Htm Qemu Option In Libvirt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1526382" id="1526382" title="Cannot Vol-Create Qcow2 Encrypted Volume Due To Qemu-Img " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1527740" id="1527740" title="Nvram/Pflash On A Backing Device Is Not Created In The Mount " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1529059" id="1529059" title="The Error Message Is Not Clear When Upload A Bigger File By " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1529256" id="1529256" title="Error Message Is Not Correct When &quot;Vol-Upload&quot; A Non-Existing " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1530451" id="1530451" title="Failed To Start Guest When Duplicate Mount Point Existing In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1532542" id="1532542" title="Blockcopy Failed When Using --Bandwidth Option With The Values " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534418" id="1534418" title="Guest Can Start With Huge Pages Set To Non-Exist Guest Numa Node" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1538570" id="1538570" title="Segmentation Fault When Run Some Virt-Admin Help Srv* Cmd." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1541444" id="1541444" title="Libvirt: Guest Could Inject Executable Code Via " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1541921" id="1541921" title="Cachetune Cannot Work With Tcg Guest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1543775" id="1543775" title="'Update-Device' With Alias In Disk Did Not Work Actually And " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1544325" id="1544325" title="Libvirt Cannot Parse Json Backing File With Nbd Socket Keys" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1544659" id="1544659" title="Can'T Detach Disk With Ceph Auth Backing File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1544869" id="1544869" title="Rfe: Add Support For Native Tls Encryption For Nbd Disk Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1546971" id="1546971" title="Cannot Modify Vnic Profile Of Running Vm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1547250" id="1547250" title="Got Lots Ovs Daemon Errs While Starting A Ovs-Dpdk Guest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549531" id="1549531" title="Use Of Md5 / Sha256 From Gnulib Prevents Fips Compliance" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1552092" id="1552092" title="Request To Qemu-Guest-Agent Prevent Other Calls To Qemu Monitor" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1552127" id="1552127" title="Qemu-Kvm Cannot Find Usb Bus" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1553075" id="1553075" title="User-Aliases Not Cleared On Detach-Device" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1554876" id="1554876" title="Device Alias For Input Device Do Not Take Effect When Hot-Plugging" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1556828" id="1556828" title="[Sr-Iov] - Can'T Start Vm With Sr-Iov Vnic" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1557769" id="1557769" title="Start Vm With Direct Lun Attached With Scsi Pass-Through " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1558317" id="1558317" title="Vm Can Not Start  When Configuring Alias For Ccid Controller" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1559284" id="1559284" title="Rpm Verify Show Mode Differs For Package " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1559835" id="1559835" title="[Rfc] Fine-Grained Api To Validate If A Given Cpu Model And " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560917" id="1560917" title="Vmx Parser Cannot Import More Than 4 Nics" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560946" id="1560946" title="[Rfe] Support Luks Encrypted Volume In Disk Pool" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560976" id="1560976" title="Hosted Engine Vm (Deployed In The Past) Fails To Reboot With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1563169" id="1563169" title="Rebase Libvirt To Current Upstream Release" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566416" id="1566416" title="Storage Device Fails To Validate For Extra Content &quot; " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568148" id="1568148" title="Libvirt: Vpx:// Driver Does Not Get Cpu Vendor, Model Or " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568407" id="1568407" title="Guest Is Left Paused On Source Host Sometimes If Kill Source " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569678" id="1569678" title="Virsh Capabilities Reports Invalid Values For 4K Pages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569861" id="1569861" title="Timed Out During Operation: Cannot Acquire State Change Lock " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1571759" id="1571759" title="Create Volume On Esx Local Storage Via Virsh Failed While Use " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1572491" id="1572491" title="Virt-Xml-Validate Validate Fails For Capabilities And Storagevol" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576464" id="1576464" title="Hash Operation Not Allowed During Iteration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576916" id="1576916" title="Detach Device With Partial Xml That Includes An Alias" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1583484" id="1583484" title="&quot;Property '.Write-Cache' Not Found&quot; When Set Cache Mode For " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1583623" id="1583623" title="Attach Scsi Controller With 'Driver' Configured To Vm Will " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1583927" id="1583927" title="&quot;Unexpected Hostdev Type While Encoding Audit Message: 4&quot; When " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1584071" id="1584071" title="Unknown Error Occurred On Target Host When Try To Get " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1584073" id="1584073" title="Introduce Support For Mediated Devices Hotplug" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1584091" id="1584091" title="Libvirt: Vpx:// Driver Does Not Accept A Number Of Vcpus When " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1584571" id="1584571" title="Rfe: Qemu: Support Redirdev Hotunplug" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1586027" id="1586027" title="Virsh Detach-Device-Alias --Config Does Not Work" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1588295" id="1588295" title="The Help Info Of 'Virsh Detach-Disk --Print-Xml' Is Not Accurate" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1588336" id="1588336" title="&quot;Domifaddr --Source Arp&quot; Can Not Show Correct Netmask" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1589115" id="1589115" title="Libvirt Fails To Chown Memory Snapshot On Shared (Nfs) Storage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1589730" id="1589730" title="Libvirtd Crashed Sometimes If The Guest Crash On The Source " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1590214" id="1590214" title="&quot;Failed To Reserve Port 65535&quot; For Guest Graphic" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1591017" id="1591017" title="Nwfilter Blocks All Network Traffic When &quot;Clean-Traffic&quot; " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1591235" id="1591235" title="Virt-Install/Virsh Reports 'Node 0/1 Not Found' Error When " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1591561" id="1591561" title="Libvirtd Crash When Detach Serial  Device Using 'Virsh " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1591628" id="1591628" title="Error Occurred When Revert A Running Domain To A Running " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1593137" id="1593137" title="Libvirtd Crashed If Destroy The Guest On The Source Host In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1593549" id="1593549" title="Parts Of The Network Filter Can Not Pass Virt-Xml-Validate" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595184" id="1595184" title="Libvirtd Crashed When Domifstat For Interface Type: User, Udp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1597550" id="1597550" title="Libvirtd Crashed When Hot Plug A Scsi Hostdev" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1597940" id="1597940" title="Vhost-User Socket Path Is Not Recognized By Libvirt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598015" id="1598015" title="Libvirtd Crashed On Target Host When Do Migration With '--Tls'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598084" id="1598084" title="Cannot Acquire State Change Lock When Create Snapshot With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598087" id="1598087" title="Improve Documentation Description For 'Virsh " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598281" id="1598281" title="Can Not Convert An Existing Guest To The Native Qemu-Argv " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598311" id="1598311" title="Error Message Is Weird When There Is No Enough Pci Slot For " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598440" id="1598440" title="Virt-V2V Will Hang At Opening The Overlay During Conversion " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1599545" id="1599545" title="Libvirtd Crashed Randomly During Start" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1599973" id="1599973" title="Libvirtd Crashed During Stop If There Is A Guest Set Filterref " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600122" id="1600122" title="Explicitly Require Matching Libvirt-Libs In Driver Subpackages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600329" id="1600329" title="Nwfilter-Binding-Undefine List In Virsh Man Page But Not " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600330" id="1600330" title="The Dumped Filterbinding Can Not Pass The Xml Validate" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600345" id="1600345" title="Can Not Edit Alias Name For Vsock Device" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600427" id="1600427" title="Guest Can Not Get Correct Value Of Global_Period When Set " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600468" id="1600468" title="Domifaddr Should Not Query Non-Existing File For Interface " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1601318" id="1601318" title="Failed To Define/Create Guest With Vf As Hostdev Interface " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1601377" id="1601377" title="Pool-Create-As Pool-Define-As Failed When Provide " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1603025" id="1603025" title="Start/Destroy/Virsh Edit Guest With 'Iscsi Block Disk'/ " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1603115" id="1603115" title="Backport Clean-Traffic-Gateway Into Rhel 7.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1607825" id="1607825" title="Improve The Error Msg When Define Guest With 'None' Type Video " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1607831" id="1607831" title="Error Message About Nwfilter Promoted When Fail To Start Vm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1609087" id="1609087" title="Failed To Define Q35 Guest With 'None' Video Type When Pci " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1611320" id="1611320" title="Org.Libvirt.Api.Nwfilter-Binding.Create Is Not Registered" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1612009" id="1612009" title="Libvirtd Crash When Using Perl-Sys-Virt Api: Get_Node_Sev_Info()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1613746" id="1613746" title="Vol-Resize With --Shrink Can'T Shrink Encrypted Volume" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1618622" id="1618622" title="Detaching ('Virsh Detach-Device-Alias') Shmem Returns Failure " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1621910" id="1621910" title="Virdomainupdatedeviceflags Fails When Alias Is Not Specified" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623157" id="1623157" title="Domain Abi Stability Check Must Forbid Host Mtu Changes On Nics" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1624735" id="1624735" title="Libvirt Refuses To Start A Guest With Vfio-Ccw On S390 Because " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=916061" id="916061" title="Dump Progress Only Show Up When Memory-Only Dump Finish" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3127-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* 389-ds-base: Mishandled search requests in servers/slapd/search.c:do_search() allows for denial of service (CVE-2018-14648)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base" release="15.el7" src="389-ds-base-1.3.8.4-15.el7.src.rpm" version="1.3.8.4"><filename>389-ds-base-1.3.8.4-15.el7.x86_64.rpm</filename><sum type="sha256">dc0e53b0cd69567ff80638fbddcac379e441771ab5f48e95f0fd39b762786263</sum></package><package arch="x86_64" name="389-ds-base-snmp" release="15.el7" src="389-ds-base-1.3.8.4-15.el7.src.rpm" version="1.3.8.4"><filename>389-ds-base-snmp-1.3.8.4-15.el7.x86_64.rpm</filename><sum type="sha256">b830f9dd2fae410fcadf836f86a8a935fbfa8b9579ab783fc117ea20e5391b4a</sum></package><package arch="x86_64" name="389-ds-base-devel" release="15.el7" src="389-ds-base-1.3.8.4-15.el7.src.rpm" version="1.3.8.4"><filename>389-ds-base-devel-1.3.8.4-15.el7.x86_64.rpm</filename><sum type="sha256">de015796dadb2eded1282f4ecdaaf8a7767edfd78fcac3231c51ff4fe3cc268b</sum></package><package arch="x86_64" name="389-ds-base-libs" release="15.el7" src="389-ds-base-1.3.8.4-15.el7.src.rpm" version="1.3.8.4"><filename>389-ds-base-libs-1.3.8.4-15.el7.x86_64.rpm</filename><sum type="sha256">eaea48c6227339f40e334f78c74139cf412c3d34b16b82dc72553aeb85b0f9e3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10935" id="CVE-2018-10935" title="389-Ds-Base: Ldapsearch With Server Side Sort " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14648" id="CVE-2018-14648" title="389-Ds-Base: Mishandled Search Requests In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3127" id="RHSA-2018:3127-1" title="Rhsa-2018:3127-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1515190" id="1515190" title="&quot;Truncated Search Results&quot; Pop-Up Appears In User Details In Webui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1525256" id="1525256" title="Invalid Snmp Mib For 389 Ds" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1541098" id="1541098" title="Ds-Replcheck: Add -W Option To Ask For The Password From Stdin " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1544477" id="1544477" title="Ipa Server Is Not Responding, All Authentication And Admin " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1551063" id="1551063" title="Replica_Write_Ruv Log A Failure Even When It Succeeds" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1551065" id="1551065" title="Ds-Replcheck Ldif Comparision Fails When Checking For Conflicts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1551071" id="1551071" title="Memberof Fails If Group Is Moved Into Scope" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1552698" id="1552698" title="Replicated Operations Should Be Serialized." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1556803" id="1556803" title="Ds-Replcheck Command Returns Traceback Errors Against Empty " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1556863" id="1556863" title="Ds-Replcheck Command For &quot;Ldap With Starttls&quot; Using -Z Option " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1559945" id="1559945" title="Adjustment Of Csn_Generator Can Fail So Next Generated Csn Can " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560653" id="1560653" title="Rebase 389-Ds-Base In Rhel 7.6 To 1.3.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566444" id="1566444" title="Crash In Connection Table / Nunc-Stans ?" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567042" id="1567042" title="Ns-Slapd Segfaults With Err - Connection_Release_Nolock_Ext - " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568462" id="1568462" title="Disk Monitoring Setting The Wrong Default Error Log Level" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570033" id="1570033" title="Errors Log Full Of &quot; Warn - Keys2Idl - Recieved Null Idl From " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570649" id="1570649" title="Pwdhash Segfaults When Crypt Storage Scheme Is Used" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1574602" id="1574602" title="Replication Stops Working When Memberof Plugin Is Enabled On " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576485" id="1576485" title="Upgrade Script Doesn'T Enable Pbkdf Password Storage Plug-In" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1581737" id="1581737" title="Passthrough Plugin Configured To Do Starttls Does Not Work." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1582092" id="1582092" title="Passwordmustchange Attribute Is Not Honored By A Ro Consumer " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1582747" id="1582747" title="Ds Only Accepts Rsa And Fortezza Cipher Families" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1593807" id="1593807" title="Fine Grained Password Policy Can Impact Search Performance" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1596467" id="1596467" title="Ipa Upgrade Fails For Latest Ipa Package" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1597384" id="1597384" title="Async Operations Can Hang When The Server Is Running Nunc-Stans" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1597518" id="1597518" title="Ds-Replcheck Command Returns Traceback Errors Against Ldif " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598186" id="1598186" title="A Search With The Scope &quot;One&quot; Returns A Non-Matching Entry." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598478" id="1598478" title="If A Replica Is Created With A Binddngroup, This Group Is " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598718" id="1598718" title="Import Fails If Backend Name Is &quot;Default&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1602425" id="1602425" title="Ipa User Commands When Used With '--Random' Or '--Password' " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1607078" id="1607078" title="389-Ds-Base: Ldapsearch With Server Side Sort " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1614501" id="1614501" title="Disable Nunc-Stans By Default" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1616412" id="1616412" title="Ipa Certmap-Match Fails To Find Ipa User When " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1630668" id="1630668" title="389-Ds-Base: Mishandled Search Requests In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3140-1</id><title>Gnome</title><description>Security Fix(es): 
* libsoup: Crash in soup_cookie_jar.c:get_cookies() on empty hostnames (CVE-2018-12910) 
* poppler: Infinite recursion in fofi/FoFiType1C.cc:FoFiType1C::cvtGlyph() function allows denial of service (CVE-2017-18267) 
* libgxps: heap based buffer over read in ft_font_face_hash function of gxps-fonts.c (CVE-2018-10733) 
* libgxps: Stack-based buffer overflow in calling glib in gxps_images_guess_content_type of gcontenttype.c (CVE-2018-10767) 
* poppler: NULL pointer dereference in Annot.h:AnnotPath::getCoordsLength() allows for denial of service via crafted PDF (CVE-2018-10768) 
* poppler: out of bounds read in pdfunite (CVE-2018-13988) 
Additional Changes: 
* PackageKit is now aware of our SL7 minor release upgrade tool.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libgxps" release="4.el7" src="libgxps-0.3.0-4.el7.src.rpm" version="0.3.0"><filename>libgxps-0.3.0-4.el7.i686.rpm</filename><sum type="sha256">465f7b69e8cdc6de62033e5b413c6d1653d648c0c00a6712e567d0d8a357dd19</sum></package><package arch="i686" name="libgovirt-devel" release="1.el7" src="libgovirt-0.3.4-1.el7.src.rpm" version="0.3.4"><filename>libgovirt-devel-0.3.4-1.el7.i686.rpm</filename><sum type="sha256">7a3f9db3b5b11fa9223991d74564e5fa48436b063d73b0d45419e0d13c906f99</sum></package><package arch="x86_64" name="gssdp" release="1.el7" src="gssdp-1.0.2-1.el7.src.rpm" version="1.0.2"><filename>gssdp-1.0.2-1.el7.x86_64.rpm</filename><sum type="sha256">89913dd5ff7b6886b8d2f0af6d92af32aefed17eafcb82cc64d2274f0bd76619</sum></package><package arch="x86_64" name="gnome-contacts" release="1.el7" src="gnome-contacts-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-contacts-3.28.2-1.el7.x86_64.rpm</filename><sum type="sha256">71ba536cf5859ff1dc76b59b75d79e3f19ebd39469e20dba146a4b5d42c647d8</sum></package><package arch="x86_64" name="atk" release="1.el7" src="atk-2.28.1-1.el7.src.rpm" version="2.28.1"><filename>atk-2.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">b63f5a5ab23ba6cb04b868db7513a664f5dcbc3817bacb65ca0052125e1950b0</sum></package><package arch="x86_64" epoch="2" name="cheese-libs" release="1.el7" src="cheese-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>cheese-libs-3.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">9d87e43b9f8f92cb142a9a0d52861ab97746c06fbf2361373b5db000c4adcd34</sum></package><package arch="x86_64" name="cairo-gobject-devel" release="3.el7" src="cairo-1.15.12-3.el7.src.rpm" version="1.15.12"><filename>cairo-gobject-devel-1.15.12-3.el7.x86_64.rpm</filename><sum type="sha256">ded261e48f8f4082c4302c5f91803d026880431ba9fe893089c2960a3e84661a</sum></package><package arch="i686" epoch="1" name="devhelp" release="1.el7" src="devhelp-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>devhelp-3.28.1-1.el7.i686.rpm</filename><sum type="sha256">dcf5bfa49e864537079608a6fc892413c6526d154506673e2cec5893f8299974</sum></package><package arch="noarch" name="gnome-backgrounds" release="1.el7" src="gnome-backgrounds-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gnome-backgrounds-3.28.0-1.el7.noarch.rpm</filename><sum type="sha256">567a5bee306bf01cc24682abc81157898155f9dc103774a6452c8e274a8533a1</sum></package><package arch="x86_64" name="fwupdate-efi" release="5.el7" src="fwupdate-12-5.el7.src.rpm" version="12"><filename>fwupdate-efi-12-5.el7.x86_64.rpm</filename><sum type="sha256">b08c6e388b5f4e8fb26c745d2e064224698348a0b1924f8d3a994c1d06051233</sum></package><package arch="x86_64" name="totem-pl-parser" release="1.el7" src="totem-pl-parser-3.26.1-1.el7.src.rpm" version="3.26.1"><filename>totem-pl-parser-3.26.1-1.el7.x86_64.rpm</filename><sum type="sha256">60cefaa0124607595aee586c3c4515a887a9308791f5545531a86da79b514496</sum></package><package arch="i686" name="webkitgtk4-jsc-devel" release="1.el7" src="webkitgtk4-2.20.5-1.el7.src.rpm" version="2.20.5"><filename>webkitgtk4-jsc-devel-2.20.5-1.el7.i686.rpm</filename><sum type="sha256">d689c6602d7c3da4e0e1162f4cff20d95c4208182b6088c5d9185ef84bf0fb15</sum></package><package arch="x86_64" name="gtksourceview3-devel" release="1.el7" src="gtksourceview3-3.24.8-1.el7.src.rpm" version="3.24.8"><filename>gtksourceview3-devel-3.24.8-1.el7.x86_64.rpm</filename><sum type="sha256">20b3283ac61d1921aad06019a719c2f8eb84cfc22e49ba8a6a19f5c57f1077a6</sum></package><package arch="noarch" name="gnome-devel-docs" release="1.el7" src="gnome-devel-docs-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gnome-devel-docs-3.28.0-1.el7.noarch.rpm</filename><sum type="sha256">0d892dbe7f4f2623a548cec776130114d3ee755ace82e9b44a49d001585bb5e3</sum></package><package arch="x86_64" name="poppler-cpp-devel" release="20.el7" src="poppler-0.26.5-20.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-devel-0.26.5-20.el7.x86_64.rpm</filename><sum type="sha256">60d28f1f570048ade71a8924279d6d52d76f4f7c6cc6a4b1b4729e41e7a37189</sum></package><package arch="noarch" name="osinfo-db" release="1.el7" src="osinfo-db-20180531-1.el7.src.rpm" version="20180531"><filename>osinfo-db-20180531-1.el7.noarch.rpm</filename><sum type="sha256">f636b3fe4db4a6aaee0102520a445fd09188838a0fb4baad3122c2efd59f9ba1</sum></package><package arch="i686" name="freetype-devel" release="12.el7" src="freetype-2.8-12.el7.src.rpm" version="2.8"><filename>freetype-devel-2.8-12.el7.i686.rpm</filename><sum type="sha256">1d7a54a748dd3d7b5b563a9844cebb31221b35fd8136889fb4dc5d35875d7b18</sum></package><package arch="x86_64" name="evolution-data-server-perl" release="1.el7" src="evolution-data-server-3.28.5-1.el7.src.rpm" version="3.28.5"><filename>evolution-data-server-perl-3.28.5-1.el7.x86_64.rpm</filename><sum type="sha256">2301c68d2e7c0873b76560436764da3ff378f27c38dbd0ab5e4e179e0a3a8ee5</sum></package><package arch="x86_64" epoch="1" name="totem-nautilus" release="1.el7" src="totem-3.26.2-1.el7.src.rpm" version="3.26.2"><filename>totem-nautilus-3.26.2-1.el7.x86_64.rpm</filename><sum type="sha256">3e07c19c8118883ec1fe5fd910713142d6e0c1c69a8e6fdf647ebcb489badb1f</sum></package><package arch="x86_64" name="libappstream-glib-builder-devel" release="2.el7" src="libappstream-glib-0.7.8-2.el7.src.rpm" version="0.7.8"><filename>libappstream-glib-builder-devel-0.7.8-2.el7.x86_64.rpm</filename><sum type="sha256">2b39f8cf8737b740530772fd8f1323fde683702dfa5510e98d2b2aac6e63e78d</sum></package><package arch="x86_64" name="valadoc" release="1.el7" src="vala-0.40.8-1.el7.src.rpm" version="0.40.8"><filename>valadoc-0.40.8-1.el7.x86_64.rpm</filename><sum type="sha256">68fc01541f83c8730a6e8215ce5e68a54212eb0060dce19451b38f5b17805192</sum></package><package arch="i686" name="glade-devel" release="1.el7" src="glade-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>glade-devel-3.22.1-1.el7.i686.rpm</filename><sum type="sha256">053905ef46ac89ae73e1712e6eb0fc4198fe434f71a60947aea55caf1d45a67a</sum></package><package arch="noarch" name="evolution-help" release="2.el7" src="evolution-3.28.5-2.el7.src.rpm" version="3.28.5"><filename>evolution-help-3.28.5-2.el7.noarch.rpm</filename><sum type="sha256">f734bad0b28166984fe4bb9208d1134c9306ec1065ebb34fb020a896c8297866</sum></package><package arch="i686" name="at-spi2-atk" release="1.el7" src="at-spi2-atk-2.26.2-1.el7.src.rpm" version="2.26.2"><filename>at-spi2-atk-2.26.2-1.el7.i686.rpm</filename><sum type="sha256">415594fa448bab2a09d09c7772cb3f05be3c13c76bb5431b98a0f79e8e1f2c91</sum></package><package arch="x86_64" name="gedit-plugin-bracketcompletion" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugin-bracketcompletion-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">5111a8e3951e1b5374304ba92ad131066d6d6be12bff7536d39629a8c9cbe93a</sum></package><package arch="x86_64" name="evolution-devel" release="2.el7" src="evolution-3.28.5-2.el7.src.rpm" version="3.28.5"><filename>evolution-devel-3.28.5-2.el7.x86_64.rpm</filename><sum type="sha256">dea5c1a1cbcffb0f5ffa504896c89c7faddf619f01ea7213d94dbb95eb4572be</sum></package><package arch="i686" name="libgxps-devel" release="4.el7" src="libgxps-0.3.0-4.el7.src.rpm" version="0.3.0"><filename>libgxps-devel-0.3.0-4.el7.i686.rpm</filename><sum type="sha256">e10713d10dab335fc414b165acce4eb663bfd31910b1c4a2aa71d374c9e64a32</sum></package><package arch="i686" name="libchamplain-gtk" release="2.el7" src="libchamplain-0.12.16-2.el7.src.rpm" version="0.12.16"><filename>libchamplain-gtk-0.12.16-2.el7.i686.rpm</filename><sum type="sha256">58b0383a29fe9e59aa8c55924bb4d4672046f14f1b524e653f4ab0cd26a50dc1</sum></package><package arch="x86_64" name="gedit-plugin-colorpicker" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugin-colorpicker-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">96be5fd51a862bd309f83e8dc2aed7d265a1608d15134261d0182e7ab16c5f4f</sum></package><package arch="i686" name="gspell-devel" release="1.el7" src="gspell-1.6.1-1.el7.src.rpm" version="1.6.1"><filename>gspell-devel-1.6.1-1.el7.i686.rpm</filename><sum type="sha256">60b32c8ee105b8d82d02ad20dc0fd04d151b96542fcdf71d319c07c0e39340db</sum></package><package arch="x86_64" name="PackageKit-gtk3-module" release="1.sl7" src="PackageKit-1.1.10-1.sl7.src.rpm" version="1.1.10"><filename>PackageKit-gtk3-module-1.1.10-1.sl7.x86_64.rpm</filename><sum type="sha256">afa2f4487b3775c2b642745ecb94ac6a9379a871867e0f2ce769553ee6778723</sum></package><package arch="i686" name="geocode-glib" release="2.el7" src="geocode-glib-3.26.0-2.el7.src.rpm" version="3.26.0"><filename>geocode-glib-3.26.0-2.el7.i686.rpm</filename><sum type="sha256">dccbf51dac48bb2d1980e3e0cbce489d5d882db8dffdf242f74b33916c108d93</sum></package><package arch="x86_64" name="at-spi2-core" release="1.el7" src="at-spi2-core-2.28.0-1.el7.src.rpm" version="2.28.0"><filename>at-spi2-core-2.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">bcc25a966be32c30bd1d7530d89456810fa324c5acacc6a3803ea3506a9e0df4</sum></package><package arch="x86_64" name="evolution-ews" release="1.el7" src="evolution-ews-3.28.5-1.el7.src.rpm" version="3.28.5"><filename>evolution-ews-3.28.5-1.el7.x86_64.rpm</filename><sum type="sha256">9163e1d638c1b836a77a900479ad2727a242f37e9bed8b826cdd2571340d5b20</sum></package><package arch="noarch" name="adwaita-cursor-theme" release="1.el7" src="adwaita-icon-theme-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>adwaita-cursor-theme-3.28.0-1.el7.noarch.rpm</filename><sum type="sha256">0525f0c54f5dfe05c7c3ed384209cff707d7fbf43988025fef746e1a037e761f</sum></package><package arch="x86_64" name="gjs" release="1.el7" src="gjs-1.52.3-1.el7.src.rpm" version="1.52.3"><filename>gjs-1.52.3-1.el7.x86_64.rpm</filename><sum type="sha256">f4b18c339c6856a2867c7179af2147941c46f1e55ac584d3d5ed856a921598e4</sum></package><package arch="x86_64" name="grilo-devel" release="1.el7" src="grilo-0.3.6-1.el7.src.rpm" version="0.3.6"><filename>grilo-devel-0.3.6-1.el7.x86_64.rpm</filename><sum type="sha256">85388afe3c1482cbdc8a0f6e7e35d6dfea824e4dc004eaf8d247ff0970a6da25</sum></package><package arch="x86_64" name="mutter" release="4.el7" src="mutter-3.28.3-4.el7.src.rpm" version="3.28.3"><filename>mutter-3.28.3-4.el7.x86_64.rpm</filename><sum type="sha256">f00ec0732ac36018b9041bcd332205b1ed94b2002d093577e15b986961f0e8e2</sum></package><package arch="x86_64" name="libical" release="2.el7" src="libical-3.0.3-2.el7.src.rpm" version="3.0.3"><filename>libical-3.0.3-2.el7.x86_64.rpm</filename><sum type="sha256">765b9cf8a6c7c4b2ba606504109e997b0587144b156bbd1b8219ace43f442230</sum></package><package arch="i686" name="vala-devel" release="1.el7" src="vala-0.40.8-1.el7.src.rpm" version="0.40.8"><filename>vala-devel-0.40.8-1.el7.i686.rpm</filename><sum type="sha256">39934b36e6782106f56e36036d70cfe43451b243825ed2c939a82045f2d5b3ed</sum></package><package arch="x86_64" name="gnome-color-manager" release="1.el7" src="gnome-color-manager-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gnome-color-manager-3.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">ac3419003a1a16db7b39fd811001e09fc4a09bfa3b633c1e705c646fe52c7823</sum></package><package arch="x86_64" name="libappstream-glib-builder" release="2.el7" src="libappstream-glib-0.7.8-2.el7.src.rpm" version="0.7.8"><filename>libappstream-glib-builder-0.7.8-2.el7.x86_64.rpm</filename><sum type="sha256">1600b8b03c81341246ae8b000a006585821c58e6c04d3ef1c641d7b76dd678a4</sum></package><package arch="noarch" name="adwaita-icon-theme" release="1.el7" src="adwaita-icon-theme-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>adwaita-icon-theme-3.28.0-1.el7.noarch.rpm</filename><sum type="sha256">e18745917fad1e0b69e577b5dba8a3db388de1134fc6299d81cfed3a33b237fb</sum></package><package arch="i686" name="libical-glib-devel" release="2.el7" src="libical-3.0.3-2.el7.src.rpm" version="3.0.3"><filename>libical-glib-devel-3.0.3-2.el7.i686.rpm</filename><sum type="sha256">1422350a0ba2ef17a2dec28724490ba0a9fa9ca688677ffacebc63f96ab1f5f7</sum></package><package arch="x86_64" name="libgovirt-devel" release="1.el7" src="libgovirt-0.3.4-1.el7.src.rpm" version="0.3.4"><filename>libgovirt-devel-0.3.4-1.el7.x86_64.rpm</filename><sum type="sha256">72dc081b8f6290ad4f41b3fa833551b6905317e232d4e6aaf6ddf435c3c2cca3</sum></package><package arch="i686" name="poppler" release="20.el7" src="poppler-0.26.5-20.el7.src.rpm" version="0.26.5"><filename>poppler-0.26.5-20.el7.i686.rpm</filename><sum type="sha256">13d32db6f678fb30e9dd5b2a747d949f6a659ab4ff2129e641b9c2901d46f093</sum></package><package arch="x86_64" epoch="1" name="gdm-pam-extensions-devel" release="9.el7" src="gdm-3.28.2-9.el7.src.rpm" version="3.28.2"><filename>gdm-pam-extensions-devel-3.28.2-9.el7.x86_64.rpm</filename><sum type="sha256">f0e1dc1332ac896fa09f99777e6d1c32c50e5638bfee3c8acd23ba2d9cb09670</sum></package><package arch="x86_64" name="libcroco-devel" release="4.el7" src="libcroco-0.6.12-4.el7.src.rpm" version="0.6.12"><filename>libcroco-devel-0.6.12-4.el7.x86_64.rpm</filename><sum type="sha256">661b87847c0201f5e7dd529d1f53a5b8992e110d9166161e71730a9a3282e88d</sum></package><package arch="x86_64" name="mutter-devel" release="4.el7" src="mutter-3.28.3-4.el7.src.rpm" version="3.28.3"><filename>mutter-devel-3.28.3-4.el7.x86_64.rpm</filename><sum type="sha256">d5f005d6d16796c391dcc0f0cab01af1cb1f7e18487d3326ed473567f15bd291</sum></package><package arch="noarch" name="google-noto-emoji-fonts" release="4.el7" src="google-noto-emoji-fonts-20180508-4.el7.src.rpm" version="20180508"><filename>google-noto-emoji-fonts-20180508-4.el7.noarch.rpm</filename><sum type="sha256">27d4e2ac3def73eb7850861a2d7ac13713c79fb92167e71289a7b77975e8be5f</sum></package><package arch="x86_64" name="gnome-keyring-pam" release="1.el7" src="gnome-keyring-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-keyring-pam-3.28.2-1.el7.x86_64.rpm</filename><sum type="sha256">baa0f046268de3d076317c6a3005f6e1d17771e6098d3b128386275f70008720</sum></package><package arch="x86_64" name="glib2-tests" release="2.el7" src="glib2-2.56.1-2.el7.src.rpm" version="2.56.1"><filename>glib2-tests-2.56.1-2.el7.x86_64.rpm</filename><sum type="sha256">619630268dc6229703a1db3708327381763d809765fb35e189f448fc90d77112</sum></package><package arch="x86_64" name="geocode-glib-devel" release="2.el7" src="geocode-glib-3.26.0-2.el7.src.rpm" version="3.26.0"><filename>geocode-glib-devel-3.26.0-2.el7.x86_64.rpm</filename><sum type="sha256">efe7df901372042698bdc7dcc67f70538d934d96b491dd3a1020fe0ba27f1f21</sum></package><package arch="noarch" name="evolution-data-server-doc" release="1.el7" src="evolution-data-server-3.28.5-1.el7.src.rpm" version="3.28.5"><filename>evolution-data-server-doc-3.28.5-1.el7.noarch.rpm</filename><sum type="sha256">731cd375b75402cf6cd4e40349f5de770024b0b1b41eb899309f77859f96cbdc</sum></package><package arch="i686" name="gnome-desktop3-devel" release="2.el7" src="gnome-desktop3-3.28.2-2.el7.src.rpm" version="3.28.2"><filename>gnome-desktop3-devel-3.28.2-2.el7.i686.rpm</filename><sum type="sha256">e81434d66f6df2cb4433c421a681886ae37fdf1beae62d76d39fc1b7ee62a6d9</sum></package><package arch="i686" name="libsecret" release="1.el7" src="libsecret-0.18.6-1.el7.src.rpm" version="0.18.6"><filename>libsecret-0.18.6-1.el7.i686.rpm</filename><sum type="sha256">767cd911bdf306a932bf33893c07e5fe8f36fd6f1f676f4a1d63ab651c15012a</sum></package><package arch="x86_64" epoch="2" name="yelp-devel" release="1.el7" src="yelp-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>yelp-devel-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">e1ece2063994be63f5a823cb8b93843332cad84db38c6c5e8a27c86232bf177a</sum></package><package arch="i686" name="gtksourceview3-devel" release="1.el7" src="gtksourceview3-3.24.8-1.el7.src.rpm" version="3.24.8"><filename>gtksourceview3-devel-3.24.8-1.el7.i686.rpm</filename><sum type="sha256">064bb2365f0c526f1dc12ce4210253c43ef72c74365a1f2004c260dd929ab493</sum></package><package arch="i686" name="valadoc" release="1.el7" src="vala-0.40.8-1.el7.src.rpm" version="0.40.8"><filename>valadoc-0.40.8-1.el7.i686.rpm</filename><sum type="sha256">d0f8165e1550eb85ec4e3838bad9812ba32e28a18f829144c261af6c84b8295c</sum></package><package arch="x86_64" name="PackageKit-gstreamer-plugin" release="1.sl7" src="PackageKit-1.1.10-1.sl7.src.rpm" version="1.1.10"><filename>PackageKit-gstreamer-plugin-1.1.10-1.sl7.x86_64.rpm</filename><sum type="sha256">032587a1e8e7d12f31360a04594211c2a31b47e618345743ccd23b58e2d1aef8</sum></package><package arch="x86_64" name="PackageKit" release="1.sl7" src="PackageKit-1.1.10-1.sl7.src.rpm" version="1.1.10"><filename>PackageKit-1.1.10-1.sl7.x86_64.rpm</filename><sum type="sha256">385e30cf59b1edaded00d2775d9c6647b578d250c300475eb3cbceb74aa3631a</sum></package><package arch="x86_64" name="gnome-dictionary" release="2.el7" src="gnome-dictionary-3.26.1-2.el7.src.rpm" version="3.26.1"><filename>gnome-dictionary-3.26.1-2.el7.x86_64.rpm</filename><sum type="sha256">b56c7b953a4beaf0ac7553d2987b6b264ddb1cd9902fe46575da53a03f2fbdb2</sum></package><package arch="x86_64" name="totem-pl-parser-devel" release="1.el7" src="totem-pl-parser-3.26.1-1.el7.src.rpm" version="3.26.1"><filename>totem-pl-parser-devel-3.26.1-1.el7.x86_64.rpm</filename><sum type="sha256">5fc39d5443f3a05fb0b87af1f4c6f3d1d0bb82186670ddac2aee84a9b3f8679e</sum></package><package arch="x86_64" name="glade-libs" release="1.el7" src="glade-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>glade-libs-3.22.1-1.el7.x86_64.rpm</filename><sum type="sha256">b106b4b4813abde60d25706e8c12a11492defb61976e7cc8007918b5b085e56e</sum></package><package arch="i686" name="glib2-devel" release="2.el7" src="glib2-2.56.1-2.el7.src.rpm" version="2.56.1"><filename>glib2-devel-2.56.1-2.el7.i686.rpm</filename><sum type="sha256">7961336cfa452b59f39179a6a53b1cf05af00eb83a619abed7b649f560db3cbb</sum></package><package arch="x86_64" name="file-roller-nautilus" release="2.el7" src="file-roller-3.28.1-2.el7.src.rpm" version="3.28.1"><filename>file-roller-nautilus-3.28.1-2.el7.x86_64.rpm</filename><sum type="sha256">5df4bafa4f5720a38d017ab9dfb65c1d48c7a675e4fd67162e04fc684aa3fa66</sum></package><package arch="x86_64" name="gucharmap-libs" release="1.el7" src="gucharmap-10.0.4-1.el7.src.rpm" version="10.0.4"><filename>gucharmap-libs-10.0.4-1.el7.x86_64.rpm</filename><sum type="sha256">52faaa92b2d48a67830b2d2d8c6159eab6b627eb1a83a7e9f1b24ddbe9019c79</sum></package><package arch="i686" name="vala" release="1.el7" src="vala-0.40.8-1.el7.src.rpm" version="0.40.8"><filename>vala-0.40.8-1.el7.i686.rpm</filename><sum type="sha256">3a88decad47708e89f93af514b436a6c7d844edae2db1f0c345f8731fc89069b</sum></package><package arch="i686" name="cairo-devel" release="3.el7" src="cairo-1.15.12-3.el7.src.rpm" version="1.15.12"><filename>cairo-devel-1.15.12-3.el7.i686.rpm</filename><sum type="sha256">7b2c2ab89559e5573c6a77a13a8cabdca977e2af570037d5e5d2757a6cff9ef5</sum></package><package arch="x86_64" name="evolution" release="2.el7" src="evolution-3.28.5-2.el7.src.rpm" version="3.28.5"><filename>evolution-3.28.5-2.el7.x86_64.rpm</filename><sum type="sha256">34133c5beef4894f02c0095ea63f9215b862edbe805e5d31f6547f267f5cbbd0</sum></package><package arch="x86_64" name="gom-devel" release="1.el7" src="gom-0.3.3-1.el7.src.rpm" version="0.3.3"><filename>gom-devel-0.3.3-1.el7.x86_64.rpm</filename><sum type="sha256">b26f3dbaded1023eb88f722ec39c27b0e6109264c8da8517b892613af8a5a146</sum></package><package arch="i686" name="libgdata-devel" release="1.el7" src="libgdata-0.17.9-1.el7.src.rpm" version="0.17.9"><filename>libgdata-devel-0.17.9-1.el7.i686.rpm</filename><sum type="sha256">af62c27806a78ea139492b322fa2190f2aa0162968ef8334284e8a0e9b796f2f</sum></package><package arch="x86_64" name="gnome-clocks" release="1.el7" src="gnome-clocks-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gnome-clocks-3.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">a6658be4aeaa7e6349fd421ea7c2f8da5ca1b514b4d464409f847b09975a5d08</sum></package><package arch="x86_64" name="gnome-shell" release="6.el7" src="gnome-shell-3.28.3-6.el7.src.rpm" version="3.28.3"><filename>gnome-shell-3.28.3-6.el7.x86_64.rpm</filename><sum type="sha256">272aee51d118dc541cda457c34c480f170b2b55b21025ca7b782e1f768990030</sum></package><package arch="x86_64" epoch="1" name="devhelp" release="1.el7" src="devhelp-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>devhelp-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">bc88bd410c0ab6e0d85532ec3d72744237372d62ec70ac19e290aae83fbb7fe4</sum></package><package arch="i686" name="geoclue2-libs" release="1.el7" src="geoclue2-2.4.8-1.el7.src.rpm" version="2.4.8"><filename>geoclue2-libs-2.4.8-1.el7.i686.rpm</filename><sum type="sha256">d22723a52444e57bdc18385ed1dbb0a61d268d39dbe4a186e9f36d6e582f2037</sum></package><package arch="x86_64" name="gtk-update-icon-cache" release="3.el7" src="gtk3-3.22.30-3.el7.src.rpm" version="3.22.30"><filename>gtk-update-icon-cache-3.22.30-3.el7.x86_64.rpm</filename><sum type="sha256">ca751de5e5ae1aa274a7616f789ea90f788a6fd51e9dd45ccc55249e53bd7ae2</sum></package><package arch="i686" name="poppler-qt-devel" release="20.el7" src="poppler-0.26.5-20.el7.src.rpm" version="0.26.5"><filename>poppler-qt-devel-0.26.5-20.el7.i686.rpm</filename><sum type="sha256">03b2f939b11d1082751e7dc3e344f02e40246a9c165977cc4399afa8decb173f</sum></package><package arch="i686" name="harfbuzz" release="2.el7" src="harfbuzz-1.7.5-2.el7.src.rpm" version="1.7.5"><filename>harfbuzz-1.7.5-2.el7.i686.rpm</filename><sum type="sha256">528278296095b6ebd689f0fcf253af4ba524d0cfceb3d41609329398a7baced3</sum></package><package arch="x86_64" name="vala" release="1.el7" src="vala-0.40.8-1.el7.src.rpm" version="0.40.8"><filename>vala-0.40.8-1.el7.x86_64.rpm</filename><sum type="sha256">67ef8f29f16778f7c9641e4496c5eaa15f8ce27eeab2ddf8a3a127fc247e0806</sum></package><package arch="x86_64" name="libgepub-devel" release="1.el7" src="libgepub-0.6.0-1.el7.src.rpm" version="0.6.0"><filename>libgepub-devel-0.6.0-1.el7.x86_64.rpm</filename><sum type="sha256">570912c51702877aa258b1c2bd6592430c0ea0596568daf2b9b6d33c4ff8408d</sum></package><package arch="noarch" name="gnome-shell-extension-no-hot-corner" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-no-hot-corner-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">347487f753821f242338f1ac1e96c70dc12ead43db8422d45c62646bc6caa23e</sum></package><package arch="x86_64" name="fwupdate-libs" release="5.el7" src="fwupdate-12-5.el7.src.rpm" version="12"><filename>fwupdate-libs-12-5.el7.x86_64.rpm</filename><sum type="sha256">91fe3e65cf1495c6716c4fe268beac310c4deff56ece0e63fa7b5e6b3fa4bc77</sum></package><package arch="i686" name="harfbuzz-devel" release="2.el7" src="harfbuzz-1.7.5-2.el7.src.rpm" version="1.7.5"><filename>harfbuzz-devel-1.7.5-2.el7.i686.rpm</filename><sum type="sha256">1f418a090e649ffe1b1e1ac7e1aed190c8d3d869a25013c0a825dcdf7a2fe953</sum></package><package arch="i686" name="libwayland-cursor" release="1.el7" src="wayland-1.15.0-1.el7.src.rpm" version="1.15.0"><filename>libwayland-cursor-1.15.0-1.el7.i686.rpm</filename><sum type="sha256">58f0ba13b6265b971680dee17861b13ab3d1e7eb3f8db06a9acc98e11ba5d9da</sum></package><package arch="noarch" name="gnome-shell-extension-auto-move-windows" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-auto-move-windows-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">415a90497d961ff05086dea89591db7a33980d493dcb7a14a8a26d11664b6930</sum></package><package arch="i686" name="xdg-desktop-portal" release="1.el7" src="xdg-desktop-portal-1.0.2-1.el7.src.rpm" version="1.0.2"><filename>xdg-desktop-portal-1.0.2-1.el7.i686.rpm</filename><sum type="sha256">7155ef8f92e1f86e1266e1e9e03d266bd8f6d2383f6d71870703cab05a1d2dd8</sum></package><package arch="x86_64" epoch="2" name="yelp-libs" release="1.el7" src="yelp-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>yelp-libs-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">49a333eff46c27a2d104e028438010434c7691fd61762df0ecccae0155da7b20</sum></package><package arch="x86_64" name="libmediaart-devel" release="1.el7" src="libmediaart-1.9.4-1.el7.src.rpm" version="1.9.4"><filename>libmediaart-devel-1.9.4-1.el7.x86_64.rpm</filename><sum type="sha256">f684fc145dc14adc67a0900b6b6a1636bcc2b82d93bcfbd43b3bd308a0fd189f</sum></package><package arch="x86_64" name="evince-devel" release="5.el7" src="evince-3.28.2-5.el7.src.rpm" version="3.28.2"><filename>evince-devel-3.28.2-5.el7.x86_64.rpm</filename><sum type="sha256">61b96752f8e5a003c62b6a4209ef2b76397ccf105b6bef6ee5f0bbb6c06b7aec</sum></package><package arch="i686" name="atk-devel" release="1.el7" src="atk-2.28.1-1.el7.src.rpm" version="2.28.1"><filename>atk-devel-2.28.1-1.el7.i686.rpm</filename><sum type="sha256">4b8a27af28186f57cedb0e6bafd98f1f74b027f9fd58ce4fbe41b703b8be8917</sum></package><package arch="i686" name="libappstream-glib-devel" release="2.el7" src="libappstream-glib-0.7.8-2.el7.src.rpm" version="0.7.8"><filename>libappstream-glib-devel-0.7.8-2.el7.i686.rpm</filename><sum type="sha256">f5b9a2b08d8c6c98ed1d5d25fa82f9cd74df66af472e2675878dfd454488d465</sum></package><package arch="x86_64" name="libwayland-client" release="1.el7" src="wayland-1.15.0-1.el7.src.rpm" version="1.15.0"><filename>libwayland-client-1.15.0-1.el7.x86_64.rpm</filename><sum type="sha256">2d6f257847f10823b5fc3e3c87cd016890a49699e3ce46ca114d2ffc97ab04d5</sum></package><package arch="noarch" name="evolution-data-server-langpacks" release="1.el7" src="evolution-data-server-3.28.5-1.el7.src.rpm" version="3.28.5"><filename>evolution-data-server-langpacks-3.28.5-1.el7.noarch.rpm</filename><sum type="sha256">3532dae01278d4ce49e56da3ee8fab91bdaeebd2fcdda30925fa7bd4892950d2</sum></package><package arch="x86_64" name="python2-gexiv2" release="1.el7" src="libgexiv2-0.10.8-1.el7.src.rpm" version="0.10.8"><filename>python2-gexiv2-0.10.8-1.el7.x86_64.rpm</filename><sum type="sha256">e9eeb4c6a7012ff78171b4e406bb7d46aa7f081b2941ee8b45caf17ae5a55b3d</sum></package><package arch="noarch" name="gssdp-docs" release="1.el7" src="gssdp-1.0.2-1.el7.src.rpm" version="1.0.2"><filename>gssdp-docs-1.0.2-1.el7.noarch.rpm</filename><sum type="sha256">133fecd999e136a799ddb26847c4541ac384f4aa85ba63ddccedcd0c715fe46a</sum></package><package arch="i686" name="upower" release="1.el7" src="upower-0.99.7-1.el7.src.rpm" version="0.99.7"><filename>upower-0.99.7-1.el7.i686.rpm</filename><sum type="sha256">8f682fede095502301e3354d4c07132ba78beed6fd2d423bd73ed734d702ac18</sum></package><package arch="x86_64" name="geocode-glib" release="2.el7" src="geocode-glib-3.26.0-2.el7.src.rpm" version="3.26.0"><filename>geocode-glib-3.26.0-2.el7.x86_64.rpm</filename><sum type="sha256">aa8dae35a085694f97d96f591c044ff0419058eb8509f6444feb224bf4f83beb</sum></package><package arch="i686" name="cairo-tools" release="3.el7" src="cairo-1.15.12-3.el7.src.rpm" version="1.15.12"><filename>cairo-tools-1.15.12-3.el7.i686.rpm</filename><sum type="sha256">083626b26ae24012db0e0ebb1684d5cd66dce673eeca179ec6ac4b44e487f7ec</sum></package><package arch="x86_64" name="libgnomekbd-devel" release="1.el7" src="libgnomekbd-3.26.0-1.el7.src.rpm" version="3.26.0"><filename>libgnomekbd-devel-3.26.0-1.el7.x86_64.rpm</filename><sum type="sha256">908007638907bc621b7ec0039bb50165750224cb5bc291ea23603c99ee60c8a0</sum></package><package arch="x86_64" name="seahorse-nautilus" release="11.el7" src="seahorse-nautilus-3.11.92-11.el7.src.rpm" version="3.11.92"><filename>seahorse-nautilus-3.11.92-11.el7.x86_64.rpm</filename><sum type="sha256">42e627c9d7a64864bae510a1f86ef7fcf0882d1878b8042ffaad7464f83c1dbd</sum></package><package arch="x86_64" name="gnome-boxes" release="2.el7" src="gnome-boxes-3.28.5-2.el7.src.rpm" version="3.28.5"><filename>gnome-boxes-3.28.5-2.el7.x86_64.rpm</filename><sum type="sha256">8f8d87958e312b3a64f6c8864da18aff6b4c260d376ccc8091345cdb5ee5ef18</sum></package><package arch="i686" name="libsoup" release="2.el7" src="libsoup-2.62.2-2.el7.src.rpm" version="2.62.2"><filename>libsoup-2.62.2-2.el7.i686.rpm</filename><sum type="sha256">7da6207677a7caf328f3e659777bfca3662f27f2b8ec8183c9ff4948dffac8c3</sum></package><package arch="i686" name="libical-glib" release="2.el7" src="libical-3.0.3-2.el7.src.rpm" version="3.0.3"><filename>libical-glib-3.0.3-2.el7.i686.rpm</filename><sum type="sha256">5574e3efdb613836582d3c77353c1b6508351970e71c2b7269237b44660520c9</sum></package><package arch="x86_64" name="evolution-tests" release="2.el7" src="evolution-3.28.5-2.el7.src.rpm" version="3.28.5"><filename>evolution-tests-3.28.5-2.el7.x86_64.rpm</filename><sum type="sha256">97990a3443c572cc7b7903e884efb8e6393dcb4321952f8e1bd398a57c61c9b8</sum></package><package arch="x86_64" name="libmediaart-tests" release="1.el7" src="libmediaart-1.9.4-1.el7.src.rpm" version="1.9.4"><filename>libmediaart-tests-1.9.4-1.el7.x86_64.rpm</filename><sum type="sha256">714a5c134c7dad63a32067d5d852657456f1843e390e6966d6dd814eb8a979e0</sum></package><package arch="x86_64" name="libgtop2" release="3.el7" src="libgtop2-2.38.0-3.el7.src.rpm" version="2.38.0"><filename>libgtop2-2.38.0-3.el7.x86_64.rpm</filename><sum type="sha256">e5eb9c8eaa766e9b09b532db8def9d5744e51609177395d3fd1679eb6d3f1bcc</sum></package><package arch="i686" name="totem-pl-parser" release="1.el7" src="totem-pl-parser-3.26.1-1.el7.src.rpm" version="3.26.1"><filename>totem-pl-parser-3.26.1-1.el7.i686.rpm</filename><sum type="sha256">cbfd9a669aa0d88086b8e427ee29c996aa941d1b7f9783df84ba4a31bc2193c3</sum></package><package arch="i686" name="mozjs52" release="1.el7" src="mozjs52-52.9.0-1.el7.src.rpm" version="52.9.0"><filename>mozjs52-52.9.0-1.el7.i686.rpm</filename><sum type="sha256">6c73881440148b504a00087e76db7cc674dfa9e8897619d21ed7de518bc97b4e</sum></package><package arch="x86_64" name="flatpak-devel" release="2.el7" src="flatpak-1.0.2-2.el7.src.rpm" version="1.0.2"><filename>flatpak-devel-1.0.2-2.el7.x86_64.rpm</filename><sum type="sha256">df6ddf74452c666fc9d221d914c9cc99ca500972c5b81bb5b9dba33cfc535629</sum></package><package arch="x86_64" name="clutter-gst3" release="1.el7" src="clutter-gst3-3.0.26-1.el7.src.rpm" version="3.0.26"><filename>clutter-gst3-3.0.26-1.el7.x86_64.rpm</filename><sum type="sha256">b25edd7b10a6a01fbbc438cd62d02559318982101b84bb817cf80b5ea671cf89</sum></package><package arch="i686" name="accountsservice-devel" release="2.el7" src="accountsservice-0.6.50-2.el7.src.rpm" version="0.6.50"><filename>accountsservice-devel-0.6.50-2.el7.i686.rpm</filename><sum type="sha256">b29161052afb08eba6dfa12fe7a159b423908de55ad5995bc8936caaef626786</sum></package><package arch="i686" name="evolution-data-server-devel" release="1.el7" src="evolution-data-server-3.28.5-1.el7.src.rpm" version="3.28.5"><filename>evolution-data-server-devel-3.28.5-1.el7.i686.rpm</filename><sum type="sha256">4b1f235e7d9bbc733a27bbbd6db2c296086070401eee401928ee7eae87b9afb1</sum></package><package arch="x86_64" name="libcroco" release="4.el7" src="libcroco-0.6.12-4.el7.src.rpm" version="0.6.12"><filename>libcroco-0.6.12-4.el7.x86_64.rpm</filename><sum type="sha256">0035c88d9410880ca7fcc0fe2a23c554066e1551b42c9a9b70ae41b4aa84f551</sum></package><package arch="x86_64" name="gnome-software-editor" release="3.el7" src="gnome-software-3.28.2-3.el7.src.rpm" version="3.28.2"><filename>gnome-software-editor-3.28.2-3.el7.x86_64.rpm</filename><sum type="sha256">2abbddcc24daea8e106068cad4fc190f22a46efbd07c217840eb2a1b42e2142d</sum></package><package arch="x86_64" name="harfbuzz-devel" release="2.el7" src="harfbuzz-1.7.5-2.el7.src.rpm" version="1.7.5"><filename>harfbuzz-devel-1.7.5-2.el7.x86_64.rpm</filename><sum type="sha256">a1948995c0ef285ee1005db1882408e1873a4854b1b036a1fe5c5d3f9fc3cf11</sum></package><package arch="x86_64" name="cairo-tools" release="3.el7" src="cairo-1.15.12-3.el7.src.rpm" version="1.15.12"><filename>cairo-tools-1.15.12-3.el7.x86_64.rpm</filename><sum type="sha256">0f33e895d050acf4f9eb4078007ed03ebbe08c9c93d6591c96f124dfc5b334bc</sum></package><package arch="x86_64" name="webkitgtk4" release="1.el7" src="webkitgtk4-2.20.5-1.el7.src.rpm" version="2.20.5"><filename>webkitgtk4-2.20.5-1.el7.x86_64.rpm</filename><sum type="sha256">099d47c5c558a4a27607f56ff1231ef53fdec562d95a55baa1058db2d90c1d6f</sum></package><package arch="x86_64" name="gnome-session-xsession" release="5.el7" src="gnome-session-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-session-xsession-3.28.1-5.el7.x86_64.rpm</filename><sum type="sha256">47cb2fcfec1fd5232d547052e6fefba2043e15571325414f557a54f273e3722a</sum></package><package arch="i686" name="evolution" release="2.el7" src="evolution-3.28.5-2.el7.src.rpm" version="3.28.5"><filename>evolution-3.28.5-2.el7.i686.rpm</filename><sum type="sha256">7adce3ae4e626aaf8b422b0f9043e37eb4bd3758b182ef21fde2479afff50a3a</sum></package><package arch="i686" name="gom-devel" release="1.el7" src="gom-0.3.3-1.el7.src.rpm" version="0.3.3"><filename>gom-devel-0.3.3-1.el7.i686.rpm</filename><sum type="sha256">cfd3a27181083dc75cf59f2bdf8037f88136adf86739bfdb1f250330071f7f2e</sum></package><package arch="noarch" name="google-noto-emoji-color-fonts" release="4.el7" src="google-noto-emoji-fonts-20180508-4.el7.src.rpm" version="20180508"><filename>google-noto-emoji-color-fonts-20180508-4.el7.noarch.rpm</filename><sum type="sha256">016c4bd2bd4c0ab18d2f75861a6c9fccc3c9a99c743d93941babb8c0b5b598ef</sum></package><package arch="x86_64" name="PackageKit-command-not-found" release="1.sl7" src="PackageKit-1.1.10-1.sl7.src.rpm" version="1.1.10"><filename>PackageKit-command-not-found-1.1.10-1.sl7.x86_64.rpm</filename><sum type="sha256">d7064e5254044747ca457c306ae74afb1ba7f483f96812a645c483bfc6782062</sum></package><package arch="i686" name="mozjs52-devel" release="1.el7" src="mozjs52-52.9.0-1.el7.src.rpm" version="52.9.0"><filename>mozjs52-devel-52.9.0-1.el7.i686.rpm</filename><sum type="sha256">682b78ef4c2b5aaaaadfe957b15430297ddc31448346599f16d745e27341fd36</sum></package><package arch="x86_64" name="geoclue2-demos" release="1.el7" src="geoclue2-2.4.8-1.el7.src.rpm" version="2.4.8"><filename>geoclue2-demos-2.4.8-1.el7.x86_64.rpm</filename><sum type="sha256">c1546a8e53f393c6c65ca8b9ab5a02462edcac9da4a3a367d0a9c0c2ea793fbd</sum></package><package arch="noarch" name="gnome-shell-extension-apps-menu" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-apps-menu-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">009e7520dcfc6332abaafdc4eecb281b5381e510afe2399835d04cca4b5b2a44</sum></package><package arch="x86_64" name="fwupdate-devel" release="5.el7" src="fwupdate-12-5.el7.src.rpm" version="12"><filename>fwupdate-devel-12-5.el7.x86_64.rpm</filename><sum type="sha256">721183a05bc5738087a6c1ee957221b7cee61ec3d26ded80176d94a6d66678c6</sum></package><package arch="noarch" name="evolution-mapi-langpacks" release="2.el7" src="evolution-mapi-3.28.3-2.el7.src.rpm" version="3.28.3"><filename>evolution-mapi-langpacks-3.28.3-2.el7.noarch.rpm</filename><sum type="sha256">28b8d8987f1d586904e5c97fbce5f2caf50e85fdfac7e4c763e5ef9f7d4340a7</sum></package><package arch="i686" name="gsettings-desktop-schemas" release="2.el7" src="gsettings-desktop-schemas-3.28.0-2.el7.src.rpm" version="3.28.0"><filename>gsettings-desktop-schemas-3.28.0-2.el7.i686.rpm</filename><sum type="sha256">6d0e710462c97481724374da04884513725c9fd7a692205341d032850e99f1c3</sum></package><package arch="x86_64" name="xdg-desktop-portal" release="1.el7" src="xdg-desktop-portal-1.0.2-1.el7.src.rpm" version="1.0.2"><filename>xdg-desktop-portal-1.0.2-1.el7.x86_64.rpm</filename><sum type="sha256">01e82025c00f788e8afe0b0f58b73d705327ec50fba16998e2273f639b17cfa7</sum></package><package arch="x86_64" name="poppler-glib" release="20.el7" src="poppler-0.26.5-20.el7.src.rpm" version="0.26.5"><filename>poppler-glib-0.26.5-20.el7.x86_64.rpm</filename><sum type="sha256">734c66834a318eafeb514b70cff887dcd84272fe1fc7b3b0e257ef68398a96fe</sum></package><package arch="noarch" name="vala-doc" release="1.el7" src="vala-0.40.8-1.el7.src.rpm" version="0.40.8"><filename>vala-doc-0.40.8-1.el7.noarch.rpm</filename><sum type="sha256">40b0b9a5ce6c0e09fedc17de2f14a8b1c86e73e0573808d5f7f7a64d1bcca37e</sum></package><package arch="x86_64" name="cairo" release="3.el7" src="cairo-1.15.12-3.el7.src.rpm" version="1.15.12"><filename>cairo-1.15.12-3.el7.x86_64.rpm</filename><sum type="sha256">954d8aded8bd9929887e4e146330581248b8f165d4a5f21cadf2d612d8a5d8e5</sum></package><package arch="i686" name="libjpeg-turbo-devel" release="6.el7" src="libjpeg-turbo-1.2.90-6.el7.src.rpm" version="1.2.90"><filename>libjpeg-turbo-devel-1.2.90-6.el7.i686.rpm</filename><sum type="sha256">edfe63cd2b3a34503167629547dbdfa8c63c6e69aa1060fca9eeeb4a914978d5</sum></package><package arch="x86_64" name="sl-release" release="4.1.sl7" src="sl-release-7.2-4.1.sl7.src.rpm" version="7.2"><filename>sl-release-7.2-4.1.sl7.x86_64.rpm</filename><sum type="sha256">09b3ed4e549c3570ac825654dc09b40205da7a4094464640e0693669b17738ff</sum></package><package arch="x86_64" name="gedit-plugin-smartspaces" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugin-smartspaces-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">6d02fdb972d3bf422655b1852c899f4f9483be5d962ed2824d8c4d6ac5759b53</sum></package><package arch="x86_64" name="gvfs-archive" release="1.el7" src="gvfs-1.36.2-1.el7.src.rpm" version="1.36.2"><filename>gvfs-archive-1.36.2-1.el7.x86_64.rpm</filename><sum type="sha256">1b7d151f7b37f9f0b07a6030c5cda6cce2552cb5cf403ec6c425d9b5166868a4</sum></package><package arch="x86_64" name="gnome-packagekit-updater" release="1.el7" src="gnome-packagekit-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gnome-packagekit-updater-3.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">0621331199654e1fae028d1cb0443aca3e4f18fe59654a00c8b506fa94df012d</sum></package><package arch="x86_64" name="libpeas" release="1.el7" src="libpeas-1.22.0-1.el7.src.rpm" version="1.22.0"><filename>libpeas-1.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">548938167218a138075c52b85dbfe0fc296bdbe864c2af8c630b8758fd5537b5</sum></package><package arch="x86_64" name="evolution-data-server-devel" release="1.el7" src="evolution-data-server-3.28.5-1.el7.src.rpm" version="3.28.5"><filename>evolution-data-server-devel-3.28.5-1.el7.x86_64.rpm</filename><sum type="sha256">929dbaf0fec31320b9ab86966b978f7054a8ceee14c4358604f3f45c1fa32a3e</sum></package><package arch="x86_64" name="gedit-plugin-joinlines" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugin-joinlines-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">843e87e9ad1f8ca909abf9cb8e3379163f5ed71b0208532a61913816178946ff</sum></package><package arch="x86_64" name="libjpeg-turbo-utils" release="6.el7" src="libjpeg-turbo-1.2.90-6.el7.src.rpm" version="1.2.90"><filename>libjpeg-turbo-utils-1.2.90-6.el7.x86_64.rpm</filename><sum type="sha256">e5b04b76ae9cbe1e95453f30a8b477299d56015445fd339b05f562067da50f2a</sum></package><package arch="x86_64" name="gdk-pixbuf2-devel" release="3.el7" src="gdk-pixbuf2-2.36.12-3.el7.src.rpm" version="2.36.12"><filename>gdk-pixbuf2-devel-2.36.12-3.el7.x86_64.rpm</filename><sum type="sha256">0c56e05d184fef044b0f7a86415fd7337fc8938c2d686c9414b12d331efd2519</sum></package><package arch="x86_64" name="gnome-online-miners" release="1.el7" src="gnome-online-miners-3.26.0-1.el7.src.rpm" version="3.26.0"><filename>gnome-online-miners-3.26.0-1.el7.x86_64.rpm</filename><sum type="sha256">5e7ea00d1ae5545abeaf5c00f3ec7c8a6594c5d4523c5cbe6a17a990eab97163</sum></package><package arch="x86_64" name="libsoup" release="2.el7" src="libsoup-2.62.2-2.el7.src.rpm" version="2.62.2"><filename>libsoup-2.62.2-2.el7.x86_64.rpm</filename><sum type="sha256">9ca9e0dc58ffe2f0b54a86eba692e2e63b2060c1354e71639a70ebca26bcad5d</sum></package><package arch="i686" name="libpeas" release="1.el7" src="libpeas-1.22.0-1.el7.src.rpm" version="1.22.0"><filename>libpeas-1.22.0-1.el7.i686.rpm</filename><sum type="sha256">1503c571b6365e8d3b40160f7537b9d0b8f528b80baf389e6f44ddfde9efad8a</sum></package><package arch="i686" name="librsvg2-devel" release="1.el7" src="librsvg2-2.40.20-1.el7.src.rpm" version="2.40.20"><filename>librsvg2-devel-2.40.20-1.el7.i686.rpm</filename><sum type="sha256">bcb47aeb783e5821f00312be117936aef5fc5e02ad2fef2388c4a9307f8cbbf0</sum></package><package arch="x86_64" name="gedit-plugins" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugins-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">5ed9f463ff82480fb2e93bdeb5c60ba88cd3a7c581888bc101bd8321fa027430</sum></package><package arch="i686" name="libgovirt" release="1.el7" src="libgovirt-0.3.4-1.el7.src.rpm" version="0.3.4"><filename>libgovirt-0.3.4-1.el7.i686.rpm</filename><sum type="sha256">625add7efcf8b3894a1f3fcd1e7d5b04bb4d30b8afed3160c83afde38d664611</sum></package><package arch="i686" epoch="1" name="control-center" release="4.el7" src="control-center-3.28.1-4.el7.src.rpm" version="3.28.1"><filename>control-center-3.28.1-4.el7.i686.rpm</filename><sum type="sha256">8d2744b0120efcf1dbefa7e5bff434134c477d157e9db27d2ea1af47e2258f12</sum></package><package arch="x86_64" name="rhythmbox-devel" release="2.el7" src="rhythmbox-3.4.2-2.el7.src.rpm" version="3.4.2"><filename>rhythmbox-devel-3.4.2-2.el7.x86_64.rpm</filename><sum type="sha256">870c6d51a2e8ac8f67907efada51bc7db2c6a2c7066e50b7ff55a1163778d406</sum></package><package arch="x86_64" name="glade" release="1.el7" src="glade-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>glade-3.22.1-1.el7.x86_64.rpm</filename><sum type="sha256">14098a13ddab6eeb51d1987b69d19c9532fbc0a7f8f3133cf1a21660563f0e07</sum></package><package arch="i686" name="eog-devel" release="1.el7" src="eog-3.28.3-1.el7.src.rpm" version="3.28.3"><filename>eog-devel-3.28.3-1.el7.i686.rpm</filename><sum type="sha256">0aa7ee89fa54a84b94c16e04021ab069b76aebbbbcac44314709363b1f91fe25</sum></package><package arch="noarch" name="yelp-tools" release="1.el7" src="yelp-tools-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>yelp-tools-3.28.0-1.el7.noarch.rpm</filename><sum type="sha256">15c91ef9809af42e2adc785819327fa0eb88a6ec8b7942f17d4775a5edd4b802</sum></package><package arch="i686" name="gsettings-desktop-schemas-devel" release="2.el7" src="gsettings-desktop-schemas-3.28.0-2.el7.src.rpm" version="3.28.0"><filename>gsettings-desktop-schemas-devel-3.28.0-2.el7.i686.rpm</filename><sum type="sha256">c5d9f0e3f6ddaea175fafb405d44ae43478dc1313e5b2bce0b01878c1e17e1bb</sum></package><package arch="i686" name="gdk-pixbuf2" release="3.el7" src="gdk-pixbuf2-2.36.12-3.el7.src.rpm" version="2.36.12"><filename>gdk-pixbuf2-2.36.12-3.el7.i686.rpm</filename><sum type="sha256">e2d52135ab4b93e6eb3d590586516f9a98ee3b14b8915d04d956fde8571430b0</sum></package><package arch="i686" name="grilo" release="1.el7" src="grilo-0.3.6-1.el7.src.rpm" version="0.3.6"><filename>grilo-0.3.6-1.el7.i686.rpm</filename><sum type="sha256">cb915e7d09d0cc6b01d05435dd66d13b0dec4a5e031a8c341c849032681a7dfc</sum></package><package arch="x86_64" name="evince" release="5.el7" src="evince-3.28.2-5.el7.src.rpm" version="3.28.2"><filename>evince-3.28.2-5.el7.x86_64.rpm</filename><sum type="sha256">dcd8c32fe29030d7833dfd6a2e65b86913e019c6b6077621a08bdf17e1b3209c</sum></package><package arch="i686" name="fribidi" release="1.el7" src="fribidi-1.0.2-1.el7.src.rpm" version="1.0.2"><filename>fribidi-1.0.2-1.el7.i686.rpm</filename><sum type="sha256">41215f51915c847320cc45881c503144903aac481017956c2aada8eb7b917e2a</sum></package><package arch="i686" name="turbojpeg" release="6.el7" src="libjpeg-turbo-1.2.90-6.el7.src.rpm" version="1.2.90"><filename>turbojpeg-1.2.90-6.el7.i686.rpm</filename><sum type="sha256">13ac925453662c21229e744fcd8b21b1f17e0f2190d74b6387b9862b330f988e</sum></package><package arch="x86_64" name="gjs-devel" release="1.el7" src="gjs-1.52.3-1.el7.src.rpm" version="1.52.3"><filename>gjs-devel-1.52.3-1.el7.x86_64.rpm</filename><sum type="sha256">c448a902d7c0fab53b92a5e4d63e379257b29778433e81bed22eb32dd105c338</sum></package><package arch="i686" epoch="1" name="gnome-bluetooth" release="1.el7" src="gnome-bluetooth-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-bluetooth-3.28.2-1.el7.i686.rpm</filename><sum type="sha256">351a968f7c2f007d7b8471e0f04cfa11246cb9bd3d720677ca8782fe4794d2d5</sum></package><package arch="x86_64" name="fontconfig" release="4.3.el7" src="fontconfig-2.13.0-4.3.el7.src.rpm" version="2.13.0"><filename>fontconfig-2.13.0-4.3.el7.x86_64.rpm</filename><sum type="sha256">83851cfb2f67cfcd2976d3b1e6d81a8fd49520e5510750fe15f428363c383137</sum></package><package arch="x86_64" name="libgxps-devel" release="4.el7" src="libgxps-0.3.0-4.el7.src.rpm" version="0.3.0"><filename>libgxps-devel-0.3.0-4.el7.x86_64.rpm</filename><sum type="sha256">79881f677338b116d2110b62c3a07004e79dff1d49fa225f451526e14e95b121</sum></package><package arch="x86_64" name="gedit-plugin-multiedit" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugin-multiedit-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">3228295f32f6ae4dce6ae1cc20f3085d0632647f19b718077c5370aa9f68e399</sum></package><package arch="x86_64" name="gstreamer1-plugins-base-tools" release="2.el7" src="gstreamer1-plugins-base-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-base-tools-1.10.4-2.el7.x86_64.rpm</filename><sum type="sha256">db9417214e926175a6f0c08ff420ed4e2e7f0218602b44eb56baebf6f0dbf571</sum></package><package arch="x86_64" name="libchamplain-gtk" release="2.el7" src="libchamplain-0.12.16-2.el7.src.rpm" version="0.12.16"><filename>libchamplain-gtk-0.12.16-2.el7.x86_64.rpm</filename><sum type="sha256">307afae947a1bde7cb2e19db3955973f6f0b0342cd8a6e7a0dbca33b0d9c11b0</sum></package><package arch="x86_64" name="gobject-introspection" release="1.el7" src="gobject-introspection-1.56.1-1.el7.src.rpm" version="1.56.1"><filename>gobject-introspection-1.56.1-1.el7.x86_64.rpm</filename><sum type="sha256">d02b25312d6a62da4b711063285b39c34150be8754f02272138fc1311b6be4bb</sum></package><package arch="x86_64" name="openchange-devel" release="3.el7" src="openchange-2.3-3.el7.src.rpm" version="2.3"><filename>openchange-devel-2.3-3.el7.x86_64.rpm</filename><sum type="sha256">c284cd04bc74522d3ad4497febfd34e511f48c5285a9a91690d217fa495ee944</sum></package><package arch="x86_64" name="gnome-calculator" release="1.el7" src="gnome-calculator-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-calculator-3.28.2-1.el7.x86_64.rpm</filename><sum type="sha256">0da48eecb5fbcccb6c70870c9d97b4c65ae9947495269d92952fa718322334c8</sum></package><package arch="i686" name="fontconfig-devel" release="4.3.el7" src="fontconfig-2.13.0-4.3.el7.src.rpm" version="2.13.0"><filename>fontconfig-devel-2.13.0-4.3.el7.i686.rpm</filename><sum type="sha256">40b3da018c24dcc8af306865971f04838c1de8e6afaf879b737a775297f7d8dc</sum></package><package arch="noarch" name="wayland-doc" release="1.el7" src="wayland-1.15.0-1.el7.src.rpm" version="1.15.0"><filename>wayland-doc-1.15.0-1.el7.noarch.rpm</filename><sum type="sha256">6ac34917fa5ae9bc827cfe47ad5d203594226712f7358f615de18d305ea0058a</sum></package><package arch="x86_64" name="evolution-mapi" release="2.el7" src="evolution-mapi-3.28.3-2.el7.src.rpm" version="3.28.3"><filename>evolution-mapi-3.28.3-2.el7.x86_64.rpm</filename><sum type="sha256">0ecb2013acec70592bbe55abeb5a814599b31e7c08ac4ff80af4c1bcdf54b963</sum></package><package arch="i686" name="libgnomekbd" release="1.el7" src="libgnomekbd-3.26.0-1.el7.src.rpm" version="3.26.0"><filename>libgnomekbd-3.26.0-1.el7.i686.rpm</filename><sum type="sha256">6e02c0abbfd2a9aab75726b51b06203e4ce837cf64aef39aac74149dd1b8a4ca</sum></package><package arch="i686" epoch="1" name="gdm" release="9.el7" src="gdm-3.28.2-9.el7.src.rpm" version="3.28.2"><filename>gdm-3.28.2-9.el7.i686.rpm</filename><sum type="sha256">a8001b9fc8803086de02a3b212ca4f2b45be6a57099adbebea0ef808922a7924</sum></package><package arch="noarch" name="gnome-getting-started-docs-de" release="1.el7" src="gnome-getting-started-docs-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-getting-started-docs-de-3.28.2-1.el7.noarch.rpm</filename><sum type="sha256">d669edfb0041da4056096c332d18d876dfa50d20f7cd460d782aeca792ced779</sum></package><package arch="i686" name="brasero-libs" release="5.el7" src="brasero-3.12.2-5.el7.src.rpm" version="3.12.2"><filename>brasero-libs-3.12.2-5.el7.i686.rpm</filename><sum type="sha256">21a9500de0d522e853033067dc14fecde8952aa1bc677a397f3f15071605b038</sum></package><package arch="x86_64" name="gedit-plugin-colorschemer" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugin-colorschemer-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">5dc06ed5589d7ccbb9870691be26d347948b6666b5882be0a49f47f570963f12</sum></package><package arch="i686" name="poppler-cpp" release="20.el7" src="poppler-0.26.5-20.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-0.26.5-20.el7.i686.rpm</filename><sum type="sha256">a3a389360487f286ee63994cbea67f5eec1c040a55076f7020601b8c5a764cef</sum></package><package arch="x86_64" name="libical-glib" release="2.el7" src="libical-3.0.3-2.el7.src.rpm" version="3.0.3"><filename>libical-glib-3.0.3-2.el7.x86_64.rpm</filename><sum type="sha256">45f8a20ddcb9f34a3bb79fa7f88ca7febc255e1a7f4eb6bdf0ac0171eb06dd4e</sum></package><package arch="x86_64" name="nautilus" release="2.el7" src="nautilus-3.26.3.1-2.el7.src.rpm" version="3.26.3.1"><filename>nautilus-3.26.3.1-2.el7.x86_64.rpm</filename><sum type="sha256">6eccafde77b9c1212b60aa3e22330ae2c1e049b9dda96aca15f7e1cb10e9e4cf</sum></package><package arch="noarch" name="gnome-shell-extension-screenshot-window-sizer" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-screenshot-window-sizer-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">ff9ed85a7dc0b88f49298cff30e1e6074bc18ae8888ec9e18906f72fe294adb0</sum></package><package arch="noarch" name="glib2-doc" release="2.el7" src="glib2-2.56.1-2.el7.src.rpm" version="2.56.1"><filename>glib2-doc-2.56.1-2.el7.noarch.rpm</filename><sum type="sha256">203419e47abb77ebb4d699e0b7479f115ecd4314ae1f07a83c93fea8413fed7e</sum></package><package arch="x86_64" name="gvfs-afc" release="1.el7" src="gvfs-1.36.2-1.el7.src.rpm" version="1.36.2"><filename>gvfs-afc-1.36.2-1.el7.x86_64.rpm</filename><sum type="sha256">9bd992f93f576e06e9c56d8bbbc17eccc32b71b3cb64c7d6f6e67d0a55fdee9d</sum></package><package arch="x86_64" name="xdg-desktop-portal-devel" release="1.el7" src="xdg-desktop-portal-1.0.2-1.el7.src.rpm" version="1.0.2"><filename>xdg-desktop-portal-devel-1.0.2-1.el7.x86_64.rpm</filename><sum type="sha256">b9801bbd6d00e41fe72d872b24786a317b28a9c190b73ae43c45bb5a3c0eb459</sum></package><package arch="i686" name="libwnck3-devel" release="2.el7" src="libwnck3-3.24.1-2.el7.src.rpm" version="3.24.1"><filename>libwnck3-devel-3.24.1-2.el7.i686.rpm</filename><sum type="sha256">b01b925c59eb90d42a6cccb855a1da18c88c72286af22ea7fc9f94d83da34dd6</sum></package><package arch="noarch" name="evolution-ews-langpacks" release="1.el7" src="evolution-ews-3.28.5-1.el7.src.rpm" version="3.28.5"><filename>evolution-ews-langpacks-3.28.5-1.el7.noarch.rpm</filename><sum type="sha256">01d68e27a72f5ae7c0c4304093b55b09a90fa59969f061155c2a4eb890bf5c90</sum></package><package arch="noarch" name="gnome-shell-extension-windowsNavigator" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-windowsNavigator-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">0ef77295a366b29de46b5e979b7fa895d4729ba78c4626b0e95e55fd536c4fe7</sum></package><package arch="i686" name="libosinfo" release="2.el7" src="libosinfo-1.1.0-2.el7.src.rpm" version="1.1.0"><filename>libosinfo-1.1.0-2.el7.i686.rpm</filename><sum type="sha256">1673935311f223c09bdfc24e50b32069d22a177f8ca3b71eb182544f2e564184</sum></package><package arch="x86_64" name="libappstream-glib" release="2.el7" src="libappstream-glib-0.7.8-2.el7.src.rpm" version="0.7.8"><filename>libappstream-glib-0.7.8-2.el7.x86_64.rpm</filename><sum type="sha256">fe170983d8e05766c64bdb763bc8d83a8b39690a7ca770118a78b237d7d31073</sum></package><package arch="noarch" name="gnome-shell-extension-updates-dialog" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-updates-dialog-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">7ec35ff14b1ae041ea66449f9f038949329240f54d603c6fa66e4d673669313c</sum></package><package arch="x86_64" name="gnome-system-monitor" release="1.el7" src="gnome-system-monitor-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-system-monitor-3.28.2-1.el7.x86_64.rpm</filename><sum type="sha256">afdcd06c54a97ba355feeaa4ad82aaf3c7ceff8c772afed8d71edf14aeb8a883</sum></package><package arch="i686" name="gobject-introspection" release="1.el7" src="gobject-introspection-1.56.1-1.el7.src.rpm" version="1.56.1"><filename>gobject-introspection-1.56.1-1.el7.i686.rpm</filename><sum type="sha256">6f2a61e3e0c16548576a3fe8718f47b303017511d4d14c5efac6782d433d3310</sum></package><package arch="i686" name="cairo-gobject" release="3.el7" src="cairo-1.15.12-3.el7.src.rpm" version="1.15.12"><filename>cairo-gobject-1.15.12-3.el7.i686.rpm</filename><sum type="sha256">a50fec5ea2b0b072ddb9b1632392f24f71cbcd50ea578dbc2372e7bb0f0f5850</sum></package><package arch="x86_64" name="gssdp-devel" release="1.el7" src="gssdp-1.0.2-1.el7.src.rpm" version="1.0.2"><filename>gssdp-devel-1.0.2-1.el7.x86_64.rpm</filename><sum type="sha256">1dc9108c1a4126cc0469ded8246fd3ed24887969c485fb60185fe59fe89c09e1</sum></package><package arch="noarch" name="gnome-shell-extension-alternate-tab" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-alternate-tab-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">761804105d53bc3243bae9e3358f3fe4ffc0f876585e7d667fa67a20c2dd3977</sum></package><package arch="x86_64" name="gupnp-igd-devel" release="2.el7" src="gupnp-igd-0.2.5-2.el7.src.rpm" version="0.2.5"><filename>gupnp-igd-devel-0.2.5-2.el7.x86_64.rpm</filename><sum type="sha256">33f49960b9fbf5961e5f8dcbf25d91d15b6700b7d485e4f31e1e57b2d2c308f4</sum></package><package arch="x86_64" name="PackageKit-glib-devel" release="1.sl7" src="PackageKit-1.1.10-1.sl7.src.rpm" version="1.1.10"><filename>PackageKit-glib-devel-1.1.10-1.sl7.x86_64.rpm</filename><sum type="sha256">cb0575888389f5a701cc848f3b4bcaa2246048daf91eac0b6871fca810d20b45</sum></package><package arch="x86_64" name="libgee" release="1.el7" src="libgee-0.20.1-1.el7.src.rpm" version="0.20.1"><filename>libgee-0.20.1-1.el7.x86_64.rpm</filename><sum type="sha256">a0fe5e55b33341206f5b446feae39e9dc56034cec711a6e52f849c55dae41a35</sum></package><package arch="i686" name="libgtop2-devel" release="3.el7" src="libgtop2-2.38.0-3.el7.src.rpm" version="2.38.0"><filename>libgtop2-devel-2.38.0-3.el7.i686.rpm</filename><sum type="sha256">7ee5a634f376d62aa8bec85908dc41153df8adb371102be0d7cd4368b983bc7d</sum></package><package arch="x86_64" name="gssdp-utils" release="1.el7" src="gssdp-1.0.2-1.el7.src.rpm" version="1.0.2"><filename>gssdp-utils-1.0.2-1.el7.x86_64.rpm</filename><sum type="sha256">2619a49ff10224b03662ca2ffc610ced5bdecdc64cac494318209d76d2e3c6f0</sum></package><package arch="x86_64" epoch="1" name="gnome-bluetooth" release="1.el7" src="gnome-bluetooth-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-bluetooth-3.28.2-1.el7.x86_64.rpm</filename><sum type="sha256">e1bf852069e05b36fad9453450994ca441ccc7869daa820d002e60fc9e949135</sum></package><package arch="x86_64" name="flatpak-libs" release="2.el7" src="flatpak-1.0.2-2.el7.src.rpm" version="1.0.2"><filename>flatpak-libs-1.0.2-2.el7.x86_64.rpm</filename><sum type="sha256">e4b33efabb5cb3652c51246ac207d5d96028b76945ff2fd9d577d9102091da72</sum></package><package arch="i686" name="compat-exiv2-023" release="2.el7" src="compat-exiv2-023-0.23-2.el7.src.rpm" version="0.23"><filename>compat-exiv2-023-0.23-2.el7.i686.rpm</filename><sum type="sha256">2f80e511b919c5193017e4b8a4e986274acdc9242c4c6cd3474d65437d87dade</sum></package><package arch="i686" name="evolution-data-server" release="1.el7" src="evolution-data-server-3.28.5-1.el7.src.rpm" version="3.28.5"><filename>evolution-data-server-3.28.5-1.el7.i686.rpm</filename><sum type="sha256">e21f2e65205d4c6edee45bec39b5f6a3b7aa38b6f7523cdc9e73e33811115751</sum></package><package arch="i686" name="valadoc-devel" release="1.el7" src="vala-0.40.8-1.el7.src.rpm" version="0.40.8"><filename>valadoc-devel-0.40.8-1.el7.i686.rpm</filename><sum type="sha256">f87dcaa0491f2975b965131569d1121fa9792f5792482a37f6817db96a4dd434</sum></package><package arch="x86_64" name="gnome-documents" release="1.el7" src="gnome-documents-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-documents-3.28.2-1.el7.x86_64.rpm</filename><sum type="sha256">ca66e5bf3260d6ee9bd538156ebea25e8e6d4549027e9b66e6fa1292ce89d6e8</sum></package><package arch="x86_64" name="cairo-devel" release="3.el7" src="cairo-1.15.12-3.el7.src.rpm" version="1.15.12"><filename>cairo-devel-1.15.12-3.el7.x86_64.rpm</filename><sum type="sha256">45beb66595b8264a9308455c0f35a971357d3ad429068a0b97ffbe66a7b8a5d0</sum></package><package arch="i686" name="json-glib" release="2.el7" src="json-glib-1.4.2-2.el7.src.rpm" version="1.4.2"><filename>json-glib-1.4.2-2.el7.i686.rpm</filename><sum type="sha256">7615faca13559cb75af4330a5ba53f37f0330d93bcb2334c7445582c64c98d24</sum></package><package arch="x86_64" name="glib2-fam" release="2.el7" src="glib2-2.56.1-2.el7.src.rpm" version="2.56.1"><filename>glib2-fam-2.56.1-2.el7.x86_64.rpm</filename><sum type="sha256">c1c5695ed879b69ac0ab16745298b307c9764cbb39f7b31a5f4789c64478fda8</sum></package><package arch="x86_64" name="gnome-documents-libs" release="1.el7" src="gnome-documents-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-documents-libs-3.28.2-1.el7.x86_64.rpm</filename><sum type="sha256">b29ddcc847ccb11adf485dfd9d9ff54a1c5eb2974b5de099798a8de12e51e63e</sum></package><package arch="i686" name="adwaita-gtk2-theme" release="2.el7" src="gnome-themes-standard-3.28-2.el7.src.rpm" version="3.28"><filename>adwaita-gtk2-theme-3.28-2.el7.i686.rpm</filename><sum type="sha256">ff3a92ef210c764a5be7f58dd414d54e8472cfa38a65e7b69cc2d3de526463e6</sum></package><package arch="i686" epoch="1" name="gdm-pam-extensions-devel" release="9.el7" src="gdm-3.28.2-9.el7.src.rpm" version="3.28.2"><filename>gdm-pam-extensions-devel-3.28.2-9.el7.i686.rpm</filename><sum type="sha256">62dcc28e854dcc0a0c5593253812241e7f24853e37e912b6ec3b887616c563c0</sum></package><package arch="x86_64" name="libosinfo" release="2.el7" src="libosinfo-1.1.0-2.el7.src.rpm" version="1.1.0"><filename>libosinfo-1.1.0-2.el7.x86_64.rpm</filename><sum type="sha256">28adf592d72760fe5a2a6eb5602a24c5a7631cf8d0a5df27b53342a1f4ed976c</sum></package><package arch="noarch" name="libical-glib-doc" release="2.el7" src="libical-3.0.3-2.el7.src.rpm" version="3.0.3"><filename>libical-glib-doc-3.0.3-2.el7.noarch.rpm</filename><sum type="sha256">c4dd15f7d31ca91f6deabbde42348c841c080c6afb2bd010decf36d8d73cc3ce</sum></package><package arch="i686" name="gnome-online-accounts" release="1.el7" src="gnome-online-accounts-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gnome-online-accounts-3.28.0-1.el7.i686.rpm</filename><sum type="sha256">05cbe30a141b38c0c939f87bf375433b56ebe2ed699424e49bfe2bde5ec12dac</sum></package><package arch="i686" name="accountsservice-libs" release="2.el7" src="accountsservice-0.6.50-2.el7.src.rpm" version="0.6.50"><filename>accountsservice-libs-0.6.50-2.el7.i686.rpm</filename><sum type="sha256">c9ff3858b40ffbb90a7307a026660a5d103291905bbc9e49504282abc6a61064</sum></package><package arch="x86_64" name="gedit-plugin-terminal" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugin-terminal-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">47c487968312bd123faa379707a7631b84058b63cf2e76db3ad10c733a9163e4</sum></package><package arch="i686" epoch="2" name="gedit-devel" release="1.el7" src="gedit-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-devel-3.28.1-1.el7.i686.rpm</filename><sum type="sha256">11f55c3b52e21bf21ed1bec5bd25ce02f0b0379f101b825d6927c6a9be359bc7</sum></package><package arch="i686" name="geoclue2" release="1.el7" src="geoclue2-2.4.8-1.el7.src.rpm" version="2.4.8"><filename>geoclue2-2.4.8-1.el7.i686.rpm</filename><sum type="sha256">1334f197e3bffb2e8023f9caa216665cc6187811070573a689fff71726c80df1</sum></package><package arch="i686" name="libjpeg-turbo" release="6.el7" src="libjpeg-turbo-1.2.90-6.el7.src.rpm" version="1.2.90"><filename>libjpeg-turbo-1.2.90-6.el7.i686.rpm</filename><sum type="sha256">fd4ad797197c34c22c7f85733ea7f83831ee6c79c7a2a4386f430cfb9ade03ef</sum></package><package arch="i686" name="webkitgtk4" release="1.el7" src="webkitgtk4-2.20.5-1.el7.src.rpm" version="2.20.5"><filename>webkitgtk4-2.20.5-1.el7.i686.rpm</filename><sum type="sha256">eca57bfc3a6a0230754671fb84142bc325b65d47471b2974abd644900440f89b</sum></package><package arch="x86_64" name="gupnp-igd-python" release="2.el7" src="gupnp-igd-0.2.5-2.el7.src.rpm" version="0.2.5"><filename>gupnp-igd-python-0.2.5-2.el7.x86_64.rpm</filename><sum type="sha256">1a0f544046e342a5657f4cb1cc6ae6bbb6baaa6a571c5f88d5485fb29a32a47b</sum></package><package arch="x86_64" name="gtk3-devel-docs" release="3.el7" src="gtk3-3.22.30-3.el7.src.rpm" version="3.22.30"><filename>gtk3-devel-docs-3.22.30-3.el7.x86_64.rpm</filename><sum type="sha256">fdf9add2f4432041a2ae7e192e850eb7d014cbbe9f104a8bd718ece5dae795d8</sum></package><package arch="i686" name="PackageKit-glib" release="1.sl7" src="PackageKit-1.1.10-1.sl7.src.rpm" version="1.1.10"><filename>PackageKit-glib-1.1.10-1.sl7.i686.rpm</filename><sum type="sha256">4f1ea52106f111921770cc16217081033ce34a04e106ee95ab56a4d6e3a7ab68</sum></package><package arch="x86_64" name="xdg-desktop-portal-gtk" release="1.el7" src="xdg-desktop-portal-gtk-1.0.2-1.el7.src.rpm" version="1.0.2"><filename>xdg-desktop-portal-gtk-1.0.2-1.el7.x86_64.rpm</filename><sum type="sha256">a8be177665857ab7ffe06c676f7d472ca5e56c283fe8465f9eed829a9eb978f0</sum></package><package arch="x86_64" name="clutter-gst3-devel" release="1.el7" src="clutter-gst3-3.0.26-1.el7.src.rpm" version="3.0.26"><filename>clutter-gst3-devel-3.0.26-1.el7.x86_64.rpm</filename><sum type="sha256">2e178d7468a06e20113ae0044fa80dc5cfc172b55e5e5538c332bd882274de9b</sum></package><package arch="x86_64" name="glade-devel" release="1.el7" src="glade-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>glade-devel-3.22.1-1.el7.x86_64.rpm</filename><sum type="sha256">00a0eb1694bca1dfb27d9981cf52332530864e4360f40a80b48d5c4f40c14cd3</sum></package><package arch="x86_64" name="gnome-session-custom-session" release="5.el7" src="gnome-session-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-session-custom-session-3.28.1-5.el7.x86_64.rpm</filename><sum type="sha256">50472f1eebb0d047559aafde525e75bd2878da34dd94cd3d3b080e4776eb4b0d</sum></package><package arch="x86_64" name="file-roller" release="2.el7" src="file-roller-3.28.1-2.el7.src.rpm" version="3.28.1"><filename>file-roller-3.28.1-2.el7.x86_64.rpm</filename><sum type="sha256">ca0658f7f323640d7e362b6e119d1454dc60b736d9b7f9b7678a4ae22779b7f1</sum></package><package arch="i686" name="atk" release="1.el7" src="atk-2.28.1-1.el7.src.rpm" version="2.28.1"><filename>atk-2.28.1-1.el7.i686.rpm</filename><sum type="sha256">93ef87ae76cf36f27160473d77b5a98e6adf71fc8b6f056991facee7d40c4414</sum></package><package arch="x86_64" name="sushi" release="1.el7" src="sushi-3.28.3-1.el7.src.rpm" version="3.28.3"><filename>sushi-3.28.3-1.el7.x86_64.rpm</filename><sum type="sha256">3fa0abe693a157222158688db6d90e812f187903ad5371dc42815682e7cb08f1</sum></package><package arch="x86_64" name="libgee-devel" release="1.el7" src="libgee-0.20.1-1.el7.src.rpm" version="0.20.1"><filename>libgee-devel-0.20.1-1.el7.x86_64.rpm</filename><sum type="sha256">dd55bcb7964955e022d237910bbea01043a862e863f266e75f69caf93d3ad5d7</sum></package><package arch="i686" name="libsecret-devel" release="1.el7" src="libsecret-0.18.6-1.el7.src.rpm" version="0.18.6"><filename>libsecret-devel-0.18.6-1.el7.i686.rpm</filename><sum type="sha256">6a53807a9cb20f2c4d56e877db3d8e77597e122dc11c411bb9684e3443465907</sum></package><package arch="noarch" name="gnome-shell-extension-workspace-indicator" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-workspace-indicator-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">11a60f50f1627e22188fcdbab8abe0a997e0f552420b5cdcabf1bd5c3da2235f</sum></package><package arch="i686" name="totem-pl-parser-devel" release="1.el7" src="totem-pl-parser-3.26.1-1.el7.src.rpm" version="3.26.1"><filename>totem-pl-parser-devel-3.26.1-1.el7.i686.rpm</filename><sum type="sha256">850f8a59bdc430c9802b0147d50b37c07f2f1d1b6661a27c7ab30e25d74d46d7</sum></package><package arch="x86_64" name="librsvg2-devel" release="1.el7" src="librsvg2-2.40.20-1.el7.src.rpm" version="2.40.20"><filename>librsvg2-devel-2.40.20-1.el7.x86_64.rpm</filename><sum type="sha256">5b3875c6b8051cde23d5e741462eb41e5d6cb4f845c711906ab97746ec295a29</sum></package><package arch="i686" name="libcroco-devel" release="4.el7" src="libcroco-0.6.12-4.el7.src.rpm" version="0.6.12"><filename>libcroco-devel-0.6.12-4.el7.i686.rpm</filename><sum type="sha256">9a24a9a396c0dc0542c865d83c3d46cb5b042be1485e9774b2f1aef5591ffad0</sum></package><package arch="noarch" name="gnome-getting-started-docs-pl" release="1.el7" src="gnome-getting-started-docs-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-getting-started-docs-pl-3.28.2-1.el7.noarch.rpm</filename><sum type="sha256">3365648f86c81bb98848db8d671a3a0e1655703ca89c6cddeb1817c9124771e7</sum></package><package arch="noarch" name="gspell-doc" release="1.el7" src="gspell-1.6.1-1.el7.src.rpm" version="1.6.1"><filename>gspell-doc-1.6.1-1.el7.noarch.rpm</filename><sum type="sha256">3cb2927053e505331a50fc91a72b9c43373badf6edc3ac399f23454320e17db8</sum></package><package arch="x86_64" name="pango" release="1.el7" src="pango-1.42.4-1.el7.src.rpm" version="1.42.4"><filename>pango-1.42.4-1.el7.x86_64.rpm</filename><sum type="sha256">b9abc4347c04673070f9541eab015ca608a09d5fdf36ef4bf5ecae77e4cc00d2</sum></package><package arch="i686" name="libgnomekbd-devel" release="1.el7" src="libgnomekbd-3.26.0-1.el7.src.rpm" version="3.26.0"><filename>libgnomekbd-devel-3.26.0-1.el7.i686.rpm</filename><sum type="sha256">469084927cfbeede22d7a6ec380d0e0ced6ab7d6dcba237ae8282a2f37b6a27c</sum></package><package arch="x86_64" epoch="1" name="nautilus-sendto" release="1.el7" src="nautilus-sendto-3.8.6-1.el7.src.rpm" version="3.8.6"><filename>nautilus-sendto-3.8.6-1.el7.x86_64.rpm</filename><sum type="sha256">7e263954aa4ae9177d8ae848cd44f02c682bb1c7ec46aac73a2897f5d055cd6b</sum></package><package arch="i686" name="libgtop2" release="3.el7" src="libgtop2-2.38.0-3.el7.src.rpm" version="2.38.0"><filename>libgtop2-2.38.0-3.el7.i686.rpm</filename><sum type="sha256">976fa9702ce5cd619bb05a63ad8f3ee7dad6bb4490bd77a9b6f535b345f532cc</sum></package><package arch="i686" epoch="1" name="folks-devel" release="1.el7" src="folks-0.11.4-1.el7.src.rpm" version="0.11.4"><filename>folks-devel-0.11.4-1.el7.i686.rpm</filename><sum type="sha256">212539b549c60a73cded5dadb490d51851dc0b28ffca3e7623a4f1e5c724936d</sum></package><package arch="i686" name="gvfs" release="1.el7" src="gvfs-1.36.2-1.el7.src.rpm" version="1.36.2"><filename>gvfs-1.36.2-1.el7.i686.rpm</filename><sum type="sha256">f12a2948e901c4d2380ddda0daca655ca4eed6b72d6729351ea10d04894988b0</sum></package><package arch="x86_64" name="fribidi-devel" release="1.el7" src="fribidi-1.0.2-1.el7.src.rpm" version="1.0.2"><filename>fribidi-devel-1.0.2-1.el7.x86_64.rpm</filename><sum type="sha256">6e2ecfc32adeb7f9b8c9f0f8db8ea6aa9d7427a646ecddb84bf106311c14cdff</sum></package><package arch="i686" name="libappstream-glib-builder-devel" release="2.el7" src="libappstream-glib-0.7.8-2.el7.src.rpm" version="0.7.8"><filename>libappstream-glib-builder-devel-0.7.8-2.el7.i686.rpm</filename><sum type="sha256">2911a9101761c7d3b7cceafed2d85d2ceb1c14ba2129d3ee78349a5f96ddc97d</sum></package><package arch="i686" name="poppler-glib-devel" release="20.el7" src="poppler-0.26.5-20.el7.src.rpm" version="0.26.5"><filename>poppler-glib-devel-0.26.5-20.el7.i686.rpm</filename><sum type="sha256">7fe0bf1eba4a60091300b858b141f25ea6e57e21239c1b826ab395d008b5b7a5</sum></package><package arch="x86_64" name="fwupd" release="4.el7" src="fwupd-1.0.8-4.el7.src.rpm" version="1.0.8"><filename>fwupd-1.0.8-4.el7.x86_64.rpm</filename><sum type="sha256">9deb4e7d8c9d794a661c7f7c18ebc03c8fad713740270be7c2b3e268573351b4</sum></package><package arch="x86_64" name="accountsservice-devel" release="2.el7" src="accountsservice-0.6.50-2.el7.src.rpm" version="0.6.50"><filename>accountsservice-devel-0.6.50-2.el7.x86_64.rpm</filename><sum type="sha256">cd66ea0c52959b77580f0d8004f5d4ad19685b0f740dc97a36b48ba09cfca4e1</sum></package><package arch="x86_64" name="libappstream-glib-devel" release="2.el7" src="libappstream-glib-0.7.8-2.el7.src.rpm" version="0.7.8"><filename>libappstream-glib-devel-0.7.8-2.el7.x86_64.rpm</filename><sum type="sha256">ade3eeef0ec0b7b893b0e43add8a6569ddcc8e06add50dfe043918ffec343293</sum></package><package arch="x86_64" name="evolution-spamassassin" release="2.el7" src="evolution-3.28.5-2.el7.src.rpm" version="3.28.5"><filename>evolution-spamassassin-3.28.5-2.el7.x86_64.rpm</filename><sum type="sha256">d51e567ea1423cf6018183b29a4bd14c28d998d91398fbcd1f1c5269766498fb</sum></package><package arch="x86_64" name="glib-networking" release="1.el7" src="glib-networking-2.56.1-1.el7.src.rpm" version="2.56.1"><filename>glib-networking-2.56.1-1.el7.x86_64.rpm</filename><sum type="sha256">2506ea1a5cff4779d20061a08c2eb6f0ea66829b562066cf531b44d8c8c5646c</sum></package><package arch="x86_64" name="gnome-terminal" release="2.el7" src="gnome-terminal-3.28.2-2.el7.src.rpm" version="3.28.2"><filename>gnome-terminal-3.28.2-2.el7.x86_64.rpm</filename><sum type="sha256">f525fc85da521d5409561e3814e05fc7fb03cc2033fc101e38a01bea160169e7</sum></package><package arch="x86_64" epoch="1" name="gdm" release="9.el7" src="gdm-3.28.2-9.el7.src.rpm" version="3.28.2"><filename>gdm-3.28.2-9.el7.x86_64.rpm</filename><sum type="sha256">94801a53d4d1d9a8b83a3b718125683c0b4c35a5ea18c37710f6f38bcba28408</sum></package><package arch="x86_64" name="gnome-packagekit-installer" release="1.el7" src="gnome-packagekit-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gnome-packagekit-installer-3.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">ffad06d946b30582a91cf1d6a1891bf5a8c661a9c2e3799808d89293abd32811</sum></package><package arch="x86_64" name="nautilus-extensions" release="2.el7" src="nautilus-3.26.3.1-2.el7.src.rpm" version="3.26.3.1"><filename>nautilus-extensions-3.26.3.1-2.el7.x86_64.rpm</filename><sum type="sha256">ce236d2abfdb8c33615f40b5ca98fb807e9c2a8a9dce0288857097df2a3e1447</sum></package><package arch="x86_64" name="gnome-packagekit-common" release="1.el7" src="gnome-packagekit-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gnome-packagekit-common-3.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">4cfb8556155d692ca7da6451eff59e93deeea4256c6d137b4bc29245660800a4</sum></package><package arch="x86_64" name="rest" release="2.el7" src="rest-0.8.1-2.el7.src.rpm" version="0.8.1"><filename>rest-0.8.1-2.el7.x86_64.rpm</filename><sum type="sha256">04a8fd03295c557b504d57f9f6602b5fa5c531a7da666bfce000819dadcf7707</sum></package><package arch="i686" name="poppler-qt" release="20.el7" src="poppler-0.26.5-20.el7.src.rpm" version="0.26.5"><filename>poppler-qt-0.26.5-20.el7.i686.rpm</filename><sum type="sha256">180b89c21fa816670ea2cadf048513a57661754964789a2d55f21d38128971e8</sum></package><package arch="x86_64" name="gtk3-immodule-xim" release="3.el7" src="gtk3-3.22.30-3.el7.src.rpm" version="3.22.30"><filename>gtk3-immodule-xim-3.22.30-3.el7.x86_64.rpm</filename><sum type="sha256">6b821b6484490a5b105cc68c22d4454fb88a283a03df737725feb4a192d953b8</sum></package><package arch="i686" name="libgepub" release="1.el7" src="libgepub-0.6.0-1.el7.src.rpm" version="0.6.0"><filename>libgepub-0.6.0-1.el7.i686.rpm</filename><sum type="sha256">a1b64a8264bdacef976cbff52b1f906362c8f2e9482227a68d13761a314dcd7d</sum></package><package arch="i686" name="pango-devel" release="1.el7" src="pango-1.42.4-1.el7.src.rpm" version="1.42.4"><filename>pango-devel-1.42.4-1.el7.i686.rpm</filename><sum type="sha256">614ea7552e0bb83922e77e7e1be57a4a764143da0acddf7521331c3a83e9049d</sum></package><package arch="noarch" name="sl-logos" release="1.el7" src="sl-logos-70.0.3-1.el7.src.rpm" version="70.0.3"><filename>sl-logos-70.0.3-1.el7.noarch.rpm</filename><sum type="sha256">6d07cf95cf68403316e1969c3f52e24877cda10f3043b973f91fc8e22eb66cd7</sum></package><package arch="x86_64" name="libgtop2-devel" release="3.el7" src="libgtop2-2.38.0-3.el7.src.rpm" version="2.38.0"><filename>libgtop2-devel-2.38.0-3.el7.x86_64.rpm</filename><sum type="sha256">9a1a2884faf636e21613998dc3366854933a261585545822adfc2ca20739bdae</sum></package><package arch="i686" name="libmediaart" release="1.el7" src="libmediaart-1.9.4-1.el7.src.rpm" version="1.9.4"><filename>libmediaart-1.9.4-1.el7.i686.rpm</filename><sum type="sha256">54114bd5bc56ca9f2ac4b654f304e1007dad70590b14ce58f1f557c3a2133e01</sum></package><package arch="x86_64" name="gedit-plugin-commander" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugin-commander-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">f9a520f9fecb813ada096afb199f262564cada64b010c5b10f640893752ce15b</sum></package><package arch="i686" name="libjpeg-turbo-static" release="6.el7" src="libjpeg-turbo-1.2.90-6.el7.src.rpm" version="1.2.90"><filename>libjpeg-turbo-static-1.2.90-6.el7.i686.rpm</filename><sum type="sha256">5e2262f6c8e9ed768f6bc36289ba403d05917d9088f5324833d2d70fb64c6367</sum></package><package arch="noarch" name="fontconfig-devel-doc" release="4.3.el7" src="fontconfig-2.13.0-4.3.el7.src.rpm" version="2.13.0"><filename>fontconfig-devel-doc-2.13.0-4.3.el7.noarch.rpm</filename><sum type="sha256">2cee5c5df7c96dfbbd1578895313445d4ee7ce23bb9180591a5aa0099b6c34e2</sum></package><package arch="x86_64" name="gedit-plugin-synctex" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugin-synctex-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">7b9bf15c3e6c5f72c817b431c67da6c8b4f2abb91e8bef78e7d89695b612e367</sum></package><package arch="noarch" name="gnome-getting-started-docs" release="1.el7" src="gnome-getting-started-docs-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-getting-started-docs-3.28.2-1.el7.noarch.rpm</filename><sum type="sha256">1461328a768f686ce62cb9047fd9768b74e44a940670d61fe635b4245501a6ec</sum></package><package arch="i686" name="json-glib-devel" release="2.el7" src="json-glib-1.4.2-2.el7.src.rpm" version="1.4.2"><filename>json-glib-devel-1.4.2-2.el7.i686.rpm</filename><sum type="sha256">3b6d9c0f1aecc6de2e9464368627e155525679fdff8fa39d0c36fdb608ad89a7</sum></package><package arch="i686" name="libgweather-devel" release="2.el7" src="libgweather-3.28.2-2.el7.src.rpm" version="3.28.2"><filename>libgweather-devel-3.28.2-2.el7.i686.rpm</filename><sum type="sha256">414bf0eac1a302225ad020f055f674f5da55bdbfff0755e799bdfe62ec41c661</sum></package><package arch="x86_64" name="json-glib" release="2.el7" src="json-glib-1.4.2-2.el7.src.rpm" version="1.4.2"><filename>json-glib-1.4.2-2.el7.x86_64.rpm</filename><sum type="sha256">7453c692735d3bb4e4c01d5560324cce91987d0be957cb2ed16e1d3c021ed213</sum></package><package arch="i686" name="libosinfo-devel" release="2.el7" src="libosinfo-1.1.0-2.el7.src.rpm" version="1.1.0"><filename>libosinfo-devel-1.1.0-2.el7.i686.rpm</filename><sum type="sha256">db264f8d123ad195375c4c0cca363b23c91c443e6a3b6dfc5a6e8b7ee04f9de7</sum></package><package arch="i686" name="wayland-devel" release="1.el7" src="wayland-1.15.0-1.el7.src.rpm" version="1.15.0"><filename>wayland-devel-1.15.0-1.el7.i686.rpm</filename><sum type="sha256">37c4d1a34f46d99d962cf80c8ab8b8270453f538ba071aa3a144da754063e097</sum></package><package arch="x86_64" name="librsvg2" release="1.el7" src="librsvg2-2.40.20-1.el7.src.rpm" version="2.40.20"><filename>librsvg2-2.40.20-1.el7.x86_64.rpm</filename><sum type="sha256">082af70506c834aecc263c9ef1bd78446e355c627d06615367e528878bc39dae</sum></package><package arch="i686" name="PackageKit" release="1.sl7" src="PackageKit-1.1.10-1.sl7.src.rpm" version="1.1.10"><filename>PackageKit-1.1.10-1.sl7.i686.rpm</filename><sum type="sha256">5137bf72efe055f6f51b1beb35a8f31b3ff0feb9abf619e30290293a690fd6b4</sum></package><package arch="x86_64" epoch="2" name="yelp" release="1.el7" src="yelp-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>yelp-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">1a3c3f791e132d16f81cdb1ca41c5bc676109ae075bf493b727f9e52a698a68f</sum></package><package arch="i686" name="fribidi-devel" release="1.el7" src="fribidi-1.0.2-1.el7.src.rpm" version="1.0.2"><filename>fribidi-devel-1.0.2-1.el7.i686.rpm</filename><sum type="sha256">47425cc5a40460237447862207883cf60fcf85950360b4bf02067f5404448f26</sum></package><package arch="x86_64" name="gnome-initial-setup" release="1.el7" src="gnome-initial-setup-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gnome-initial-setup-3.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">302231e04c317d337ea8599ff287d39d489e9b84413ed9275907d5ba1964fcda</sum></package><package arch="noarch" name="gnome-getting-started-docs-it" release="1.el7" src="gnome-getting-started-docs-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-getting-started-docs-it-3.28.2-1.el7.noarch.rpm</filename><sum type="sha256">2d1d35b9147fd50fa3c94a04f40dde22460752af12ab76604b7a9675783a5376</sum></package><package arch="x86_64" name="glib2" release="2.el7" src="glib2-2.56.1-2.el7.src.rpm" version="2.56.1"><filename>glib2-2.56.1-2.el7.x86_64.rpm</filename><sum type="sha256">f50515d64fb0f082e5ad09350f7ed4c478c1b64429cbaf26e2776701c34d5000</sum></package><package arch="x86_64" name="accountsservice" release="2.el7" src="accountsservice-0.6.50-2.el7.src.rpm" version="0.6.50"><filename>accountsservice-0.6.50-2.el7.x86_64.rpm</filename><sum type="sha256">380306e892149816537f103a4bf14c9f0b6ffb8a2bc555ae76b5ba981abab6e6</sum></package><package arch="i686" epoch="1" name="gnome-bluetooth-libs" release="1.el7" src="gnome-bluetooth-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-bluetooth-libs-3.28.2-1.el7.i686.rpm</filename><sum type="sha256">a983c927d6ea72ae24961418a3ec8082bfc867b4296bff561ba2e22359e248ae</sum></package><package arch="x86_64" name="dconf-devel" release="4.el7" src="dconf-0.28.0-4.el7.src.rpm" version="0.28.0"><filename>dconf-devel-0.28.0-4.el7.x86_64.rpm</filename><sum type="sha256">37f939214a62563311c74070deca64188b84f149c2bf25ed7dd46c74af9e79d3</sum></package><package arch="i686" name="pango" release="1.el7" src="pango-1.42.4-1.el7.src.rpm" version="1.42.4"><filename>pango-1.42.4-1.el7.i686.rpm</filename><sum type="sha256">bc966ee7a7c6df7ce657a831e6f227454afa31dda88f342ce40da18ecf25b399</sum></package><package arch="x86_64" epoch="1" name="folks-devel" release="1.el7" src="folks-0.11.4-1.el7.src.rpm" version="0.11.4"><filename>folks-devel-0.11.4-1.el7.x86_64.rpm</filename><sum type="sha256">43ad2df4578cb54023fc7a0e7af232abb5aed2f15709c13308fffb272620a8fa</sum></package><package arch="i686" name="glib2-static" release="2.el7" src="glib2-2.56.1-2.el7.src.rpm" version="2.56.1"><filename>glib2-static-2.56.1-2.el7.i686.rpm</filename><sum type="sha256">8d7972bb6b648cc05ce84fdc243a5eaa2fffbb101ab3f9696c1d05012302ecff</sum></package><package arch="i686" name="gtksourceview3" release="1.el7" src="gtksourceview3-3.24.8-1.el7.src.rpm" version="3.24.8"><filename>gtksourceview3-3.24.8-1.el7.i686.rpm</filename><sum type="sha256">831e0d71f936015d8101cb3f36d49c46df01ccb4fb2a13d53fec7ca4ec42b0b9</sum></package><package arch="x86_64" name="libgweather" release="2.el7" src="libgweather-3.28.2-2.el7.src.rpm" version="3.28.2"><filename>libgweather-3.28.2-2.el7.x86_64.rpm</filename><sum type="sha256">d4170cd8582f751405d1adf464002e6b5ac818f60e6382bf8da36de16aea112e</sum></package><package arch="noarch" name="yelp-xsl" release="1.el7" src="yelp-xsl-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>yelp-xsl-3.28.0-1.el7.noarch.rpm</filename><sum type="sha256">2672e277221bd4094493e8b5f55238608acb861b9c9c87499f0a2908cb610576</sum></package><package arch="i686" name="libmediaart-devel" release="1.el7" src="libmediaart-1.9.4-1.el7.src.rpm" version="1.9.4"><filename>libmediaart-devel-1.9.4-1.el7.i686.rpm</filename><sum type="sha256">2ec83af17864ecbb3fb73deca028f786bebbcca58bee088a48ac6d5c694b1ba4</sum></package><package arch="i686" name="libappstream-glib" release="2.el7" src="libappstream-glib-0.7.8-2.el7.src.rpm" version="0.7.8"><filename>libappstream-glib-0.7.8-2.el7.i686.rpm</filename><sum type="sha256">3fccd74b357106598b9b278c3c710fc5aeba5412453690ba02b48481ea837f43</sum></package><package arch="noarch" name="gnome-shell-extension-top-icons" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-top-icons-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">d85298bd3b9e93c1173aaad1fc252be5eb6a97cc67c8e4ae0ba334df1f8d8bbe</sum></package><package arch="i686" name="harfbuzz-icu" release="2.el7" src="harfbuzz-1.7.5-2.el7.src.rpm" version="1.7.5"><filename>harfbuzz-icu-1.7.5-2.el7.i686.rpm</filename><sum type="sha256">1ddae11187b659c8671700b6b34b4ba73b9cd2c78d7bb3b903fc4a713c0b21ad</sum></package><package arch="i686" name="cairo-gobject-devel" release="3.el7" src="cairo-1.15.12-3.el7.src.rpm" version="1.15.12"><filename>cairo-gobject-devel-1.15.12-3.el7.i686.rpm</filename><sum type="sha256">af4297700c43a24043f414fe4ee291611161e830dff9598ada6c1382aaf30c75</sum></package><package arch="x86_64" name="evolution-data-server" release="1.el7" src="evolution-data-server-3.28.5-1.el7.src.rpm" version="3.28.5"><filename>evolution-data-server-3.28.5-1.el7.x86_64.rpm</filename><sum type="sha256">fde460e485b833c63b2d36971ae95ebdabd4b91ab62f06345e59d681a7f17d6f</sum></package><package arch="i686" epoch="2" name="gedit" release="1.el7" src="gedit-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-3.28.1-1.el7.i686.rpm</filename><sum type="sha256">659da8e2c109e962b678def21d1a842b9406961fdfae7c485e60d85e1883606b</sum></package><package arch="x86_64" name="wayland-devel" release="1.el7" src="wayland-1.15.0-1.el7.src.rpm" version="1.15.0"><filename>wayland-devel-1.15.0-1.el7.x86_64.rpm</filename><sum type="sha256">4822373193f81300c8d8ddf7ba8659376c9a9bf89e13de188a5072c84bb19b9c</sum></package><package arch="x86_64" name="libwayland-egl" release="1.el7" src="wayland-1.15.0-1.el7.src.rpm" version="1.15.0"><filename>libwayland-egl-1.15.0-1.el7.x86_64.rpm</filename><sum type="sha256">293538a3255e2965c381427da4bdcda500f23065e0e3836e172153fa47d9d61a</sum></package><package arch="i686" name="libwayland-client" release="1.el7" src="wayland-1.15.0-1.el7.src.rpm" version="1.15.0"><filename>libwayland-client-1.15.0-1.el7.i686.rpm</filename><sum type="sha256">a956595670295db84808311c5a22dfb10970ac03c847623abfa24b042630cf21</sum></package><package arch="x86_64" name="dconf" release="4.el7" src="dconf-0.28.0-4.el7.src.rpm" version="0.28.0"><filename>dconf-0.28.0-4.el7.x86_64.rpm</filename><sum type="sha256">409f029b22d9ea36fff80974e7e3daebc04d077ab8414a63d846bd861152a028</sum></package><package arch="noarch" name="sl7-upgrade" release="2.el7" src="sl7-upgrade-0.1.1-2.el7.src.rpm" version="0.1.1"><filename>sl7-upgrade-0.1.1-2.el7.noarch.rpm</filename><sum type="sha256">e5d103ef7070727d5979545e10c36c45dd6fc0df1491a8e2f30b441f1a67732c</sum></package><package arch="i686" name="evolution-ews" release="1.el7" src="evolution-ews-3.28.5-1.el7.src.rpm" version="3.28.5"><filename>evolution-ews-3.28.5-1.el7.i686.rpm</filename><sum type="sha256">22013f8fc060ea52e90ca54a0826e4a9317d7a7cb75d6051f13407c126dfa079</sum></package><package arch="x86_64" name="gnome-session-wayland-session" release="5.el7" src="gnome-session-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-session-wayland-session-3.28.1-5.el7.x86_64.rpm</filename><sum type="sha256">ff089025dc87c92b41de4fe1208f3fe989ff147b8e331dc8a5fc25fdd046f1b8</sum></package><package arch="i686" name="gnome-keyring-pam" release="1.el7" src="gnome-keyring-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-keyring-pam-3.28.2-1.el7.i686.rpm</filename><sum type="sha256">62dcb045bf457f8c67d6c85fc4a849a4e9e466a59e41bbcd251c4ac8e032da6b</sum></package><package arch="i686" name="freetype" release="12.el7" src="freetype-2.8-12.el7.src.rpm" version="2.8"><filename>freetype-2.8-12.el7.i686.rpm</filename><sum type="sha256">d8d445ac2b9f94d11ba3582cf711c4a9d13bf2c3ffcb469149a2c7b8a1fb295b</sum></package><package arch="x86_64" epoch="1" name="totem-devel" release="1.el7" src="totem-3.26.2-1.el7.src.rpm" version="3.26.2"><filename>totem-devel-3.26.2-1.el7.x86_64.rpm</filename><sum type="sha256">ea1f64a0bc7491a6792baf407b2bdd97c5509bc1cae6f4823dcb9aea44bf9328</sum></package><package arch="x86_64" name="eog-devel" release="1.el7" src="eog-3.28.3-1.el7.src.rpm" version="3.28.3"><filename>eog-devel-3.28.3-1.el7.x86_64.rpm</filename><sum type="sha256">c422b5e62c7e2090690ea4f4a89b2147f516570da247951b420aa977cb2e8952</sum></package><package arch="i686" name="at-spi2-core" release="1.el7" src="at-spi2-core-2.28.0-1.el7.src.rpm" version="2.28.0"><filename>at-spi2-core-2.28.0-1.el7.i686.rpm</filename><sum type="sha256">5b74fe76a554824523733acd376efac9d6c9ea981d4ae720d650e7570d621658</sum></package><package arch="noarch" name="libchamplain-demos" release="2.el7" src="libchamplain-0.12.16-2.el7.src.rpm" version="0.12.16"><filename>libchamplain-demos-0.12.16-2.el7.noarch.rpm</filename><sum type="sha256">dd5611939b3c6488463d284fdf8efe407bb90aeca3b7ebb0a902587f53a43ac7</sum></package><package arch="noarch" name="gnome-getting-started-docs-fr" release="1.el7" src="gnome-getting-started-docs-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-getting-started-docs-fr-3.28.2-1.el7.noarch.rpm</filename><sum type="sha256">f0d37b76449d3a6ec3e8b82b608c435652cf888685e3ec4f625cd1c9195c0dcd</sum></package><package arch="x86_64" name="PackageKit-cron" release="1.sl7" src="PackageKit-1.1.10-1.sl7.src.rpm" version="1.1.10"><filename>PackageKit-cron-1.1.10-1.sl7.x86_64.rpm</filename><sum type="sha256">2619699c08e8352448e8067a8902fbe7f44bbc3fb146a06b73244362417d1d42</sum></package><package arch="x86_64" name="webkitgtk4-jsc" release="1.el7" src="webkitgtk4-2.20.5-1.el7.src.rpm" version="2.20.5"><filename>webkitgtk4-jsc-2.20.5-1.el7.x86_64.rpm</filename><sum type="sha256">552b67294bf1e7d70e08b385956b7ca963426910654315c6d166176ac91861b5</sum></package><package arch="x86_64" name="vino" release="7.el7" src="vino-3.22.0-7.el7.src.rpm" version="3.22.0"><filename>vino-3.22.0-7.el7.x86_64.rpm</filename><sum type="sha256">faa82d0f6810adb1f2d19d1a8d75c96c16cd137f4382063ad3e1a6f174deabf5</sum></package><package arch="x86_64" name="zenity" release="1.el7" src="zenity-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>zenity-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">39b498c6413fdecf477a040e9990511ed1f408dbdba61f93b7865834afff4bd2</sum></package><package arch="x86_64" name="gedit-plugin-charmap" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugin-charmap-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">b69b30ef6a545cd822706b618f5e7173536b01f739f1e433e66d9d32e2d19019</sum></package><package arch="x86_64" name="libwayland-server" release="1.el7" src="wayland-1.15.0-1.el7.src.rpm" version="1.15.0"><filename>libwayland-server-1.15.0-1.el7.x86_64.rpm</filename><sum type="sha256">0ccd5f46c47f1ebc527915f2bc7c4466c554a2378e5308c261b9c199555f6a0c</sum></package><package arch="x86_64" name="gnome-themes-standard" release="2.el7" src="gnome-themes-standard-3.28-2.el7.src.rpm" version="3.28"><filename>gnome-themes-standard-3.28-2.el7.x86_64.rpm</filename><sum type="sha256">5de58d555c9fa7710ea24122199e61cbd8d99a9a41faa94a67ebcff0562080d6</sum></package><package arch="i686" name="gnome-settings-daemon-devel" release="2.el7" src="gnome-settings-daemon-3.28.1-2.el7.src.rpm" version="3.28.1"><filename>gnome-settings-daemon-devel-3.28.1-2.el7.i686.rpm</filename><sum type="sha256">f7b15263dd64dd3ff7be3b2603e6c9df4ba8e8667770536c5a5632410f78058f</sum></package><package arch="i686" name="fwupd" release="4.el7" src="fwupd-1.0.8-4.el7.src.rpm" version="1.0.8"><filename>fwupd-1.0.8-4.el7.i686.rpm</filename><sum type="sha256">949dc194c2a43e9e9b37a14a20f907da675a2da080b1d73dbfd954d6c06878e2</sum></package><package arch="x86_64" name="gnome-settings-daemon" release="2.el7" src="gnome-settings-daemon-3.28.1-2.el7.src.rpm" version="3.28.1"><filename>gnome-settings-daemon-3.28.1-2.el7.x86_64.rpm</filename><sum type="sha256">437ac4d304a721b5c888bf4703706f047cc29b2ed9869ed622d034b1c271afc6</sum></package><package arch="i686" name="rest" release="2.el7" src="rest-0.8.1-2.el7.src.rpm" version="0.8.1"><filename>rest-0.8.1-2.el7.i686.rpm</filename><sum type="sha256">ee5e810f48dfb9bf77cdd75bb4f853fa9866fb25b41b940cef4aeabfc0e6db23</sum></package><package arch="x86_64" name="pango-devel" release="1.el7" src="pango-1.42.4-1.el7.src.rpm" version="1.42.4"><filename>pango-devel-1.42.4-1.el7.x86_64.rpm</filename><sum type="sha256">992ea1797690ef4d0f80baa77241ea6fa7b7730efed104021ab9127aa86c259a</sum></package><package arch="i686" name="gtk3-devel" release="3.el7" src="gtk3-3.22.30-3.el7.src.rpm" version="3.22.30"><filename>gtk3-devel-3.22.30-3.el7.i686.rpm</filename><sum type="sha256">a253a2bbf5f540fb05eec31a8a217b0ab0502cb9ab767705e5cd96f1bd687a49</sum></package><package arch="i686" name="clutter-gst3-devel" release="1.el7" src="clutter-gst3-3.0.26-1.el7.src.rpm" version="3.0.26"><filename>clutter-gst3-devel-3.0.26-1.el7.i686.rpm</filename><sum type="sha256">a7bfcb15d1b114c8486338db5cbb7f0b4537b2483213aa48bd9fea5673693806</sum></package><package arch="i686" name="PackageKit-glib-devel" release="1.sl7" src="PackageKit-1.1.10-1.sl7.src.rpm" version="1.1.10"><filename>PackageKit-glib-devel-1.1.10-1.sl7.i686.rpm</filename><sum type="sha256">fb5e1ef0c71fdb8c4874b98c9ff76fde42024d51e0c4bb53820db3eaf819076a</sum></package><package arch="x86_64" name="atk-devel" release="1.el7" src="atk-2.28.1-1.el7.src.rpm" version="2.28.1"><filename>atk-devel-2.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">d90926d5eb9d68b07d544bf80091bf61befbb30068dcc9e55658e564625f7104</sum></package><package arch="x86_64" name="gjs-tests" release="1.el7" src="gjs-1.52.3-1.el7.src.rpm" version="1.52.3"><filename>gjs-tests-1.52.3-1.el7.x86_64.rpm</filename><sum type="sha256">ac375d7a523b7c3ddb79ebc68db3263a5e3136454fde102764f23c453be8727c</sum></package><package arch="i686" name="glibmm24" release="1.el7" src="glibmm24-2.56.0-1.el7.src.rpm" version="2.56.0"><filename>glibmm24-2.56.0-1.el7.i686.rpm</filename><sum type="sha256">7cde91f6933375d8d130e996c250ae125ceefb0f971b7f54a97cce9787c3593f</sum></package><package arch="i686" name="libsoup-devel" release="2.el7" src="libsoup-2.62.2-2.el7.src.rpm" version="2.62.2"><filename>libsoup-devel-2.62.2-2.el7.i686.rpm</filename><sum type="sha256">8d81b1c5575b8dcadc6970404b6968541edffcf8b42f5fb209853776118b8a45</sum></package><package arch="x86_64" name="geoclue2" release="1.el7" src="geoclue2-2.4.8-1.el7.src.rpm" version="2.4.8"><filename>geoclue2-2.4.8-1.el7.x86_64.rpm</filename><sum type="sha256">f2517db8db36222ecd22f429932fff8b3e9ce84855dbd746d4c56014d2ff1a5d</sum></package><package arch="x86_64" name="vte291-devel" release="2.el7" src="vte291-0.52.2-2.el7.src.rpm" version="0.52.2"><filename>vte291-devel-0.52.2-2.el7.x86_64.rpm</filename><sum type="sha256">f09bcd899fa369b937c006001f4e151e551d4b936b3744bf2b885b89de60579e</sum></package><package arch="x86_64" name="libjpeg-turbo-static" release="6.el7" src="libjpeg-turbo-1.2.90-6.el7.src.rpm" version="1.2.90"><filename>libjpeg-turbo-static-1.2.90-6.el7.x86_64.rpm</filename><sum type="sha256">32ae62d959a171ba4d4b34b016ce454740ecc5d426ef12eb8b3769067711036f</sum></package><package arch="noarch" name="gnome-getting-started-docs-cs" release="1.el7" src="gnome-getting-started-docs-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-getting-started-docs-cs-3.28.2-1.el7.noarch.rpm</filename><sum type="sha256">1431ec0eabbf1d67263e0c3bc13d019926ab09392167501d3ccd1d770ea08958</sum></package><package arch="i686" name="gucharmap-devel" release="1.el7" src="gucharmap-10.0.4-1.el7.src.rpm" version="10.0.4"><filename>gucharmap-devel-10.0.4-1.el7.i686.rpm</filename><sum type="sha256">4434958608be949fd012ef59a3011914936c06c01d25d2b93b335e2f3c6051d4</sum></package><package arch="x86_64" name="brasero-nautilus" release="5.el7" src="brasero-3.12.2-5.el7.src.rpm" version="3.12.2"><filename>brasero-nautilus-3.12.2-5.el7.x86_64.rpm</filename><sum type="sha256">00b6925e1b300d640eae20b2f7ff9dfafc4f61e73436c6139316d390f370e539</sum></package><package arch="x86_64" name="libgdata" release="1.el7" src="libgdata-0.17.9-1.el7.src.rpm" version="0.17.9"><filename>libgdata-0.17.9-1.el7.x86_64.rpm</filename><sum type="sha256">b21675e0178f0821c632282d8c320f862b0e7b324395b59c357c0478fc45f8fb</sum></package><package arch="i686" name="libpeas-gtk" release="1.el7" src="libpeas-1.22.0-1.el7.src.rpm" version="1.22.0"><filename>libpeas-gtk-1.22.0-1.el7.i686.rpm</filename><sum type="sha256">15575166e96d75bc6a2e0b6aed1a5e3878f2d73a9594e8ca4a6e0193dd273e08</sum></package><package arch="noarch" name="gnome-shell-extension-user-theme" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-user-theme-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">e7827d6dca4eb92e36d90b6406f19daa765ad4614d9edfb135dfd1098c1a19d3</sum></package><package arch="i686" name="libpeas-devel" release="1.el7" src="libpeas-1.22.0-1.el7.src.rpm" version="1.22.0"><filename>libpeas-devel-1.22.0-1.el7.i686.rpm</filename><sum type="sha256">afba4b403621319b97c527948362d19e800839b634d01f2d96e77787c8b4013c</sum></package><package arch="noarch" name="gnome-shell-extension-systemMonitor" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-systemMonitor-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">875138739b19ccd57303beced368f45bc1bc659dc2220e01970fe12cc246ab37</sum></package><package arch="i686" name="clutter-gst3" release="1.el7" src="clutter-gst3-3.0.26-1.el7.src.rpm" version="3.0.26"><filename>clutter-gst3-3.0.26-1.el7.i686.rpm</filename><sum type="sha256">e99e89b282053230cf2c3d1bc9c42e086aa5835f24b28d6a3a4d87ba9ae6ff56</sum></package><package arch="x86_64" name="PackageKit-yum" release="1.sl7" src="PackageKit-1.1.10-1.sl7.src.rpm" version="1.1.10"><filename>PackageKit-yum-1.1.10-1.sl7.x86_64.rpm</filename><sum type="sha256">e413bcd8e01c4ce37b7db2ac006083d7a2c96c8d260ebd785caa4a88c15e6dc6</sum></package><package arch="i686" name="glibmm24-devel" release="1.el7" src="glibmm24-2.56.0-1.el7.src.rpm" version="2.56.0"><filename>glibmm24-devel-2.56.0-1.el7.i686.rpm</filename><sum type="sha256">e7d98a1c2a64a0a67d260e78260a0160f71e4b8869dc427b57b9254e20c9f6a8</sum></package><package arch="i686" name="fwupd-devel" release="4.el7" src="fwupd-1.0.8-4.el7.src.rpm" version="1.0.8"><filename>fwupd-devel-1.0.8-4.el7.i686.rpm</filename><sum type="sha256">8285e823ff8c086b8f19e05fd82fa223adfbcc8c57865a861abde87802aa420a</sum></package><package arch="x86_64" name="gedit-plugin-wordcompletion" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugin-wordcompletion-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">2c048ebf171930dab1d23520310372729ed3051d8555a8a5e5224ef176836097</sum></package><package arch="x86_64" name="fwupd-devel" release="4.el7" src="fwupd-1.0.8-4.el7.src.rpm" version="1.0.8"><filename>fwupd-devel-1.0.8-4.el7.x86_64.rpm</filename><sum type="sha256">e3f13f4b432db9c32153c71bdbf056dccb1313fabb7d12c30098264c426cd5d5</sum></package><package arch="noarch" name="python2-pyatspi" release="3.el7" src="pyatspi-2.26.0-3.el7.src.rpm" version="2.26.0"><filename>python2-pyatspi-2.26.0-3.el7.noarch.rpm</filename><sum type="sha256">faee1320402b61e963f710660c120e8ca985b44fbb79c827b063fad4ddf4c59e</sum></package><package arch="i686" name="libwayland-egl" release="1.el7" src="wayland-1.15.0-1.el7.src.rpm" version="1.15.0"><filename>libwayland-egl-1.15.0-1.el7.i686.rpm</filename><sum type="sha256">3bf9dc9e69e39a824bf5c691dbf52b41bafd48541a57d28d4d35cc422f3f15c1</sum></package><package arch="x86_64" name="gtk3-devel" release="3.el7" src="gtk3-3.22.30-3.el7.src.rpm" version="3.22.30"><filename>gtk3-devel-3.22.30-3.el7.x86_64.rpm</filename><sum type="sha256">c62deb6cd007c30783acd308c08181cbfec4226cc16bb8d1d52fe61fa1372c39</sum></package><package arch="x86_64" name="flatpak-builder" release="2.el7" src="flatpak-1.0.2-2.el7.src.rpm" version="1.0.0"><filename>flatpak-builder-1.0.0-2.el7.x86_64.rpm</filename><sum type="sha256">7f92ba6d9a53ea8c6448e222abbb3080c4f26d593ea42b17c84e5c130238526a</sum></package><package arch="x86_64" name="libpeas-gtk" release="1.el7" src="libpeas-1.22.0-1.el7.src.rpm" version="1.22.0"><filename>libpeas-gtk-1.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">e8ced35233eedbbfb297f5544b85fd7d9b9bf08fb97717568526b97df049ed0c</sum></package><package arch="x86_64" name="libsecret-devel" release="1.el7" src="libsecret-0.18.6-1.el7.src.rpm" version="0.18.6"><filename>libsecret-devel-0.18.6-1.el7.x86_64.rpm</filename><sum type="sha256">6e970c1f43cbdf67ae1cf4235732c7844d6e37c3b27a8fb414340b0ae66fcf47</sum></package><package arch="x86_64" name="gobject-introspection-devel" release="1.el7" src="gobject-introspection-1.56.1-1.el7.src.rpm" version="1.56.1"><filename>gobject-introspection-devel-1.56.1-1.el7.x86_64.rpm</filename><sum type="sha256">23043b564398406562974fded7e9c0eb065f4dfab84960a79237470b6ea2dfb6</sum></package><package arch="x86_64" epoch="1" name="gnome-bluetooth-libs" release="1.el7" src="gnome-bluetooth-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-bluetooth-libs-3.28.2-1.el7.x86_64.rpm</filename><sum type="sha256">7acb52051bbbae775663b2c2bbe5af674c92b454f1d71434fb623ec1e09d6acf</sum></package><package arch="i686" name="webkitgtk4-devel" release="1.el7" src="webkitgtk4-2.20.5-1.el7.src.rpm" version="2.20.5"><filename>webkitgtk4-devel-2.20.5-1.el7.i686.rpm</filename><sum type="sha256">aaffc2e9a8c8883f0fec1c01b16d9bdec8c9262bfae56a80f42319ab495914db</sum></package><package arch="x86_64" name="gtk-doc" release="2.el7" src="gtk-doc-1.28-2.el7.src.rpm" version="1.28"><filename>gtk-doc-1.28-2.el7.x86_64.rpm</filename><sum type="sha256">9d84486e2fe1254cf125ab1f2bffc27e611fb6a00b18f15e3f6178b00459f8f1</sum></package><package arch="i686" name="glib2" release="2.el7" src="glib2-2.56.1-2.el7.src.rpm" version="2.56.1"><filename>glib2-2.56.1-2.el7.i686.rpm</filename><sum type="sha256">88cd34421628e3eb265ba89f20f4f56e0e7c5237f54dbce54315982bc37bac36</sum></package><package arch="x86_64" name="gedit-plugin-drawspaces" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugin-drawspaces-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">014a2f72696a946132fd5a7a656c3ed530fb25a4f88ea42573be82f06d9adbbd</sum></package><package arch="x86_64" name="webkitgtk4-devel" release="1.el7" src="webkitgtk4-2.20.5-1.el7.src.rpm" version="2.20.5"><filename>webkitgtk4-devel-2.20.5-1.el7.x86_64.rpm</filename><sum type="sha256">70c878ee533885f1a846efd76ee79a1be76238ae4bc2102ee961d6954301c86c</sum></package><package arch="x86_64" name="glibmm24-devel" release="1.el7" src="glibmm24-2.56.0-1.el7.src.rpm" version="2.56.0"><filename>glibmm24-devel-2.56.0-1.el7.x86_64.rpm</filename><sum type="sha256">7c96927f66877a5468ecee54517961bdc379187f2c28a8e8044e753585161abc</sum></package><package arch="x86_64" name="gnome-desktop3-devel" release="2.el7" src="gnome-desktop3-3.28.2-2.el7.src.rpm" version="3.28.2"><filename>gnome-desktop3-devel-3.28.2-2.el7.x86_64.rpm</filename><sum type="sha256">8bc2593da315f2c482efd3ed0ad0bc58d7ae8f87982b01e74dc19a8180037d70</sum></package><package arch="x86_64" name="glibmm24" release="1.el7" src="glibmm24-2.56.0-1.el7.src.rpm" version="2.56.0"><filename>glibmm24-2.56.0-1.el7.x86_64.rpm</filename><sum type="sha256">180398fede5741c4b5befa1e38a11ffecb10c21d0f338cf7c4cb2f5728c27476</sum></package><package arch="x86_64" name="librsvg2-tools" release="1.el7" src="librsvg2-2.40.20-1.el7.src.rpm" version="2.40.20"><filename>librsvg2-tools-2.40.20-1.el7.x86_64.rpm</filename><sum type="sha256">4395ca3fb879feebddcfbf72b47d4ea5f5324624a2b2fd6862be37503469dc72</sum></package><package arch="x86_64" name="bolt" release="3.el7" src="bolt-0.4-3.el7.src.rpm" version="0.4"><filename>bolt-0.4-3.el7.x86_64.rpm</filename><sum type="sha256">02561c28515d8d58872b361379664e8b4af977e5054df65a2c55aedf3dbd825a</sum></package><package arch="noarch" name="gnome-getting-started-docs-gl" release="1.el7" src="gnome-getting-started-docs-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-getting-started-docs-gl-3.28.2-1.el7.noarch.rpm</filename><sum type="sha256">acc0c168e2504dd9f9f25bcdde2158b8513203ab4b6985764b5b3c59e1b6fbce</sum></package><package arch="x86_64" name="evince-nautilus" release="5.el7" src="evince-3.28.2-5.el7.src.rpm" version="3.28.2"><filename>evince-nautilus-3.28.2-5.el7.x86_64.rpm</filename><sum type="sha256">44964ac9f06b57b0e4a685691a4fe60b8d348438679c27a7f7d4c454961e0c18</sum></package><package arch="i686" name="libgexiv2-devel" release="1.el7" src="libgexiv2-0.10.8-1.el7.src.rpm" version="0.10.8"><filename>libgexiv2-devel-0.10.8-1.el7.i686.rpm</filename><sum type="sha256">b476437650d8c4d68e0547525d6a69b9c1e5004a7b020999386f23dc68354b11</sum></package><package arch="x86_64" name="gupnp-devel" release="5.el7" src="gupnp-1.0.2-5.el7.src.rpm" version="1.0.2"><filename>gupnp-devel-1.0.2-5.el7.x86_64.rpm</filename><sum type="sha256">b64220f85607128625b5b6360bba1d3e7e2eec89bbe5cfa152e16233e14fbb7e</sum></package><package arch="x86_64" name="libosinfo-vala" release="2.el7" src="libosinfo-1.1.0-2.el7.src.rpm" version="1.1.0"><filename>libosinfo-vala-1.1.0-2.el7.x86_64.rpm</filename><sum type="sha256">c050a01513c651298ddb9e693cb9e332f3f3e3f049e865758d83270ad378826c</sum></package><package arch="noarch" name="gnome-getting-started-docs-es" release="1.el7" src="gnome-getting-started-docs-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-getting-started-docs-es-3.28.2-1.el7.noarch.rpm</filename><sum type="sha256">7128b98daffbd699e93de6a65e3a904ba61773d6f542889ba57334727a0595dd</sum></package><package arch="x86_64" name="harfbuzz-icu" release="2.el7" src="harfbuzz-1.7.5-2.el7.src.rpm" version="1.7.5"><filename>harfbuzz-icu-1.7.5-2.el7.x86_64.rpm</filename><sum type="sha256">58cce2d920e06e05777a524d39a68eeb11136e15a4a5e301121f323426a3fb6f</sum></package><package arch="x86_64" name="compat-exiv2-023" release="2.el7" src="compat-exiv2-023-0.23-2.el7.src.rpm" version="0.23"><filename>compat-exiv2-023-0.23-2.el7.x86_64.rpm</filename><sum type="sha256">2db54f38f1049b160f0edca7dcee7ba79d18ef33e29a798ad69433979e4a0af0</sum></package><package arch="i686" name="gnome-settings-daemon" release="2.el7" src="gnome-settings-daemon-3.28.1-2.el7.src.rpm" version="3.28.1"><filename>gnome-settings-daemon-3.28.1-2.el7.i686.rpm</filename><sum type="sha256">afb6b7337c4c3de9ae3fad763aef555b1228adf84c46b65cb143e15fd59240cc</sum></package><package arch="x86_64" name="brasero-libs" release="5.el7" src="brasero-3.12.2-5.el7.src.rpm" version="3.12.2"><filename>brasero-libs-3.12.2-5.el7.x86_64.rpm</filename><sum type="sha256">d8cae388b5587c15898ed1f5f8f8cc90562d1a2d99203c060eb54fd478965f06</sum></package><package arch="i686" name="gnome-desktop3" release="2.el7" src="gnome-desktop3-3.28.2-2.el7.src.rpm" version="3.28.2"><filename>gnome-desktop3-3.28.2-2.el7.i686.rpm</filename><sum type="sha256">c1b5df20f8ffb8c20530d5ca4dcb0746c163cac3c5f82375cb8dbf41b2f2a68d</sum></package><package arch="x86_64" name="glib2-devel" release="2.el7" src="glib2-2.56.1-2.el7.src.rpm" version="2.56.1"><filename>glib2-devel-2.56.1-2.el7.x86_64.rpm</filename><sum type="sha256">4654fc755c2f47016a7afc1a18be07edcff75814713d8028ea31c386a8077301</sum></package><package arch="i686" name="xdg-desktop-portal-devel" release="1.el7" src="xdg-desktop-portal-1.0.2-1.el7.src.rpm" version="1.0.2"><filename>xdg-desktop-portal-devel-1.0.2-1.el7.i686.rpm</filename><sum type="sha256">2f1b9b75e240eb761298d25a9b7a13bf0d39ea99cf3bb934c2696cc0d4664e93</sum></package><package arch="x86_64" name="gnome-desktop3-tests" release="2.el7" src="gnome-desktop3-3.28.2-2.el7.src.rpm" version="3.28.2"><filename>gnome-desktop3-tests-3.28.2-2.el7.x86_64.rpm</filename><sum type="sha256">7ab2663a419107679c88a3754daeb1025914bd5b97c945b023902540ab844dc1</sum></package><package arch="x86_64" name="gnome-software-devel" release="3.el7" src="gnome-software-3.28.2-3.el7.src.rpm" version="3.28.2"><filename>gnome-software-devel-3.28.2-3.el7.x86_64.rpm</filename><sum type="sha256">d9b5d0482b14740eee8ace3c9ba72c5aff445606e1c988f8b6abb90d35beb080</sum></package><package arch="x86_64" name="at-spi2-core-devel" release="1.el7" src="at-spi2-core-2.28.0-1.el7.src.rpm" version="2.28.0"><filename>at-spi2-core-devel-2.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">c4dd27ccded6a9fbb49ed5f24e707e9208de2371f736f1c94bc9162ddf01638b</sum></package><package arch="i686" name="gupnp-igd" release="2.el7" src="gupnp-igd-0.2.5-2.el7.src.rpm" version="0.2.5"><filename>gupnp-igd-0.2.5-2.el7.i686.rpm</filename><sum type="sha256">6440ec9692b4d98feb8cc2ae86a8c123704f37806756fa7f69b47a40845a2bca</sum></package><package arch="i686" epoch="2" name="yelp-libs" release="1.el7" src="yelp-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>yelp-libs-3.28.1-1.el7.i686.rpm</filename><sum type="sha256">a4bd1dfb2e191b67d45a8bffec970fe0dcabfd61c76a889346b0c3fde22ad277</sum></package><package arch="x86_64" name="gdk-pixbuf2" release="3.el7" src="gdk-pixbuf2-2.36.12-3.el7.src.rpm" version="2.36.12"><filename>gdk-pixbuf2-2.36.12-3.el7.x86_64.rpm</filename><sum type="sha256">c7b6e48dd17ce9099e9884b4193a52f9e587daa5bf7c2d04aa5f8ef71ddcd5e4</sum></package><package arch="i686" name="gucharmap-libs" release="1.el7" src="gucharmap-10.0.4-1.el7.src.rpm" version="10.0.4"><filename>gucharmap-libs-10.0.4-1.el7.i686.rpm</filename><sum type="sha256">abb328e0aab376d0928b4a0f2c0c6a7c795e93fbade22a0113c73224d44f5bad</sum></package><package arch="noarch" name="gstreamer1-plugins-base-devel-docs" release="2.el7" src="gstreamer1-plugins-base-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-base-devel-docs-1.10.4-2.el7.noarch.rpm</filename><sum type="sha256">09bdad53b68c53daea1a5a8ab155192ade849fcb1f903b7cd72cf6c57c14ad18</sum></package><package arch="x86_64" name="libmediaart" release="1.el7" src="libmediaart-1.9.4-1.el7.src.rpm" version="1.9.4"><filename>libmediaart-1.9.4-1.el7.x86_64.rpm</filename><sum type="sha256">7cd7dee7d1b81a28d33fd72639e2d19e5c2ca5b64b85e382a01ca35ab565a947</sum></package><package arch="i686" name="glib-networking" release="1.el7" src="glib-networking-2.56.1-1.el7.src.rpm" version="2.56.1"><filename>glib-networking-2.56.1-1.el7.i686.rpm</filename><sum type="sha256">9e087be365f2046437f992491ced445a0f12e0fa4f35d99928584d58a8ecaf65</sum></package><package arch="x86_64" name="gedit-plugin-codecomment" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugin-codecomment-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">5d134a1091819701129fbda1385f639381aa04906626fd6b9e53798195e2fe07</sum></package><package arch="x86_64" name="libical-devel" release="2.el7" src="libical-3.0.3-2.el7.src.rpm" version="3.0.3"><filename>libical-devel-3.0.3-2.el7.x86_64.rpm</filename><sum type="sha256">8283a9ea6da098a51147528f3600dc712e65273e62849c7cc9a2f1ed66ee4c8f</sum></package><package arch="i686" name="libgweather" release="2.el7" src="libgweather-3.28.2-2.el7.src.rpm" version="3.28.2"><filename>libgweather-3.28.2-2.el7.i686.rpm</filename><sum type="sha256">0232a2bdf7b980b9764b1e1d5fcf58e5e3905285e49eb0f8ba14bcae879b0093</sum></package><package arch="noarch" name="gnome-shell-extension-dash-to-dock" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-dash-to-dock-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">d5ad965bf59b47728b97433daebb340c5d1bad945e22a68131da5fd0881f1da4</sum></package><package arch="x86_64" epoch="1" name="gdm-devel" release="9.el7" src="gdm-3.28.2-9.el7.src.rpm" version="3.28.2"><filename>gdm-devel-3.28.2-9.el7.x86_64.rpm</filename><sum type="sha256">e411a7c474ad5b20daff9f1318d9c6be576f5a0147cb0c82d72ed3c92aec2bcb</sum></package><package arch="i686" name="gucharmap" release="1.el7" src="gucharmap-10.0.4-1.el7.src.rpm" version="10.0.4"><filename>gucharmap-10.0.4-1.el7.i686.rpm</filename><sum type="sha256">999d727c7b8fb980e8c571e568bef7cadf43fe76df584bd95ecfad67e31c8747</sum></package><package arch="x86_64" name="rest-devel" release="2.el7" src="rest-0.8.1-2.el7.src.rpm" version="0.8.1"><filename>rest-devel-0.8.1-2.el7.x86_64.rpm</filename><sum type="sha256">2d35f4d9dd3949e78b6fb5bf77e32969829d158a3ca8c78e0283bd1943d04749</sum></package><package arch="i686" name="nautilus" release="2.el7" src="nautilus-3.26.3.1-2.el7.src.rpm" version="3.26.3.1"><filename>nautilus-3.26.3.1-2.el7.i686.rpm</filename><sum type="sha256">745b747dcb0b138856efa9bf448b4d7ced2f4f9d96105bc834145d3fead78a32</sum></package><package arch="x86_64" name="nautilus-devel" release="2.el7" src="nautilus-3.26.3.1-2.el7.src.rpm" version="3.26.3.1"><filename>nautilus-devel-3.26.3.1-2.el7.x86_64.rpm</filename><sum type="sha256">d27ff7d71f1e26fab46721ae30dba12219882f12c980f06c886d918e1cbcffc0</sum></package><package arch="x86_64" name="at-spi2-atk" release="1.el7" src="at-spi2-atk-2.26.2-1.el7.src.rpm" version="2.26.2"><filename>at-spi2-atk-2.26.2-1.el7.x86_64.rpm</filename><sum type="sha256">ffcfbfce9c2b239d95acef79c3f2a42026dc7aea94fd20d4c505015e430771c6</sum></package><package arch="i686" name="evolution-data-server-tests" release="1.el7" src="evolution-data-server-3.28.5-1.el7.src.rpm" version="3.28.5"><filename>evolution-data-server-tests-3.28.5-1.el7.i686.rpm</filename><sum type="sha256">0d101882bc274e7d6626fbc785fa55e8fbc0093535527eebfd48dbc2750cd762</sum></package><package arch="x86_64" epoch="1" name="gnome-bluetooth-libs-devel" release="1.el7" src="gnome-bluetooth-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-bluetooth-libs-devel-3.28.2-1.el7.x86_64.rpm</filename><sum type="sha256">5340db7da00c7798cd432aeb7bccb756ba25448bd7bcda3a45e5c529b5756298</sum></package><package arch="i686" name="evolution-devel" release="2.el7" src="evolution-3.28.5-2.el7.src.rpm" version="3.28.5"><filename>evolution-devel-3.28.5-2.el7.i686.rpm</filename><sum type="sha256">a0892c0fd5813c6c70bda223474b459dd52ddaf16037e949f1163a283199c44d</sum></package><package arch="x86_64" name="poppler" release="20.el7" src="poppler-0.26.5-20.el7.src.rpm" version="0.26.5"><filename>poppler-0.26.5-20.el7.x86_64.rpm</filename><sum type="sha256">0a633ddaaea1d5758a08669896f33b2201ddfd0108dc1222ba1b9a53ec259077</sum></package><package arch="x86_64" name="poppler-glib-devel" release="20.el7" src="poppler-0.26.5-20.el7.src.rpm" version="0.26.5"><filename>poppler-glib-devel-0.26.5-20.el7.x86_64.rpm</filename><sum type="sha256">1edd71be82b44aeb9bbe03f2b8fc431ae2cc3ba1a699eabf5a98e5296ef0e802</sum></package><package arch="x86_64" name="gtk3" release="3.el7" src="gtk3-3.22.30-3.el7.src.rpm" version="3.22.30"><filename>gtk3-3.22.30-3.el7.x86_64.rpm</filename><sum type="sha256">d5b2dd3846b9e7910817883b9fe447e1b374e77e0a694cb0fb8f3bef5588e3bb</sum></package><package arch="noarch" name="evolution-langpacks" release="2.el7" src="evolution-3.28.5-2.el7.src.rpm" version="3.28.5"><filename>evolution-langpacks-3.28.5-2.el7.noarch.rpm</filename><sum type="sha256">26c843cefa98843b662683466cba7d982e39c7fef1ef52d0ab43be4e798ac27c</sum></package><package arch="x86_64" name="gstreamer1-plugins-base" release="2.el7" src="gstreamer1-plugins-base-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-base-1.10.4-2.el7.x86_64.rpm</filename><sum type="sha256">173d627d16bc7c30c6f815e072a58e7b806a804386dd2c205626258d1c9d7772</sum></package><package arch="x86_64" name="vte-profile" release="2.el7" src="vte291-0.52.2-2.el7.src.rpm" version="0.52.2"><filename>vte-profile-0.52.2-2.el7.x86_64.rpm</filename><sum type="sha256">c41bd2cca5f6ebef99b22ca32945358b78a4d68d9562ca0ad542fe92b17b0f10</sum></package><package arch="x86_64" name="gnote" release="1.el7" src="gnote-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gnote-3.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">6e3ee3ec8862cc1ceb1f2729dafae4cdfc74dd8f6841e523d8f64c898f35ec53</sum></package><package arch="x86_64" name="freetype-devel" release="12.el7" src="freetype-2.8-12.el7.src.rpm" version="2.8"><filename>freetype-devel-2.8-12.el7.x86_64.rpm</filename><sum type="sha256">420dea37804ad2e90956cbd9bd19e549177091667c3b003b25a00a5ba8f36ebc</sum></package><package arch="x86_64" name="vala-devel" release="1.el7" src="vala-0.40.8-1.el7.src.rpm" version="0.40.8"><filename>vala-devel-0.40.8-1.el7.x86_64.rpm</filename><sum type="sha256">0a12993dbcfed2952e38c7f6389943c01e852a77a64dd184779ea919a9da11ac</sum></package><package arch="i686" name="poppler-devel" release="20.el7" src="poppler-0.26.5-20.el7.src.rpm" version="0.26.5"><filename>poppler-devel-0.26.5-20.el7.i686.rpm</filename><sum type="sha256">5a6818b2696586b006d1b8b519922da373d450928c70946121b6b7d38e402b4b</sum></package><package arch="x86_64" name="fontconfig-devel" release="4.3.el7" src="fontconfig-2.13.0-4.3.el7.src.rpm" version="2.13.0"><filename>fontconfig-devel-2.13.0-4.3.el7.x86_64.rpm</filename><sum type="sha256">5460276144fb972f8dbb1e3c390ef2adb8de414461e226c49faee23bbb234662</sum></package><package arch="x86_64" name="fwupdate" release="5.el7" src="fwupdate-12-5.el7.src.rpm" version="12"><filename>fwupdate-12-5.el7.x86_64.rpm</filename><sum type="sha256">94c9771305119ad2d79b8db630b3af26b021d328c987821ed5414eafba3ca28f</sum></package><package arch="x86_64" name="openchange" release="3.el7" src="openchange-2.3-3.el7.src.rpm" version="2.3"><filename>openchange-2.3-3.el7.x86_64.rpm</filename><sum type="sha256">3c97f6e56d1e4acd80d54065bf7e4c0d0e750bd9df5d7535ad5333aea3f0586f</sum></package><package arch="x86_64" name="poppler-utils" release="20.el7" src="poppler-0.26.5-20.el7.src.rpm" version="0.26.5"><filename>poppler-utils-0.26.5-20.el7.x86_64.rpm</filename><sum type="sha256">14f1d2556b180ed0e3df2e957577067a5f394e7acc45adb944090ad650370048</sum></package><package arch="x86_64" name="gvfs-smb" release="1.el7" src="gvfs-1.36.2-1.el7.src.rpm" version="1.36.2"><filename>gvfs-smb-1.36.2-1.el7.x86_64.rpm</filename><sum type="sha256">eb0e2558b06548e17792247b166ab3aa8b6e4f60e4cae8a8ab11bc39cff94915</sum></package><package arch="noarch" name="yelp-xsl-devel" release="1.el7" src="yelp-xsl-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>yelp-xsl-devel-3.28.0-1.el7.noarch.rpm</filename><sum type="sha256">fb79c3ef466de49ddded09d3fc4de5732461eacb01e5219df0dfac63ccfa3d9d</sum></package><package arch="i686" name="gnome-online-accounts-devel" release="1.el7" src="gnome-online-accounts-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gnome-online-accounts-devel-3.28.0-1.el7.i686.rpm</filename><sum type="sha256">0f2c2b74f28b8a3e1c8df21a7f7a09066796204d5b459b00a24608551d20fa3c</sum></package><package arch="x86_64" name="turbojpeg-devel" release="6.el7" src="libjpeg-turbo-1.2.90-6.el7.src.rpm" version="1.2.90"><filename>turbojpeg-devel-1.2.90-6.el7.x86_64.rpm</filename><sum type="sha256">fd686be1b2743be39b98d3f5527932c0fff5ea610a0e5e1ac2fa9838e835f4ba</sum></package><package arch="noarch" name="gnome-user-docs" release="1.el7" src="gnome-user-docs-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-user-docs-3.28.2-1.el7.noarch.rpm</filename><sum type="sha256">7a3c978d927df7aae11ebe5b54485995f4b808dbb9cf9b92e0e4ae6dc7611a56</sum></package><package arch="x86_64" name="evolution-data-server-tests" release="1.el7" src="evolution-data-server-3.28.5-1.el7.src.rpm" version="3.28.5"><filename>evolution-data-server-tests-3.28.5-1.el7.x86_64.rpm</filename><sum type="sha256">e407a251ea4d3a2063d0a5ead415ec5dd760f4423541cfafbca5ffd063c69c0e</sum></package><package arch="x86_64" name="libgxps" release="4.el7" src="libgxps-0.3.0-4.el7.src.rpm" version="0.3.0"><filename>libgxps-0.3.0-4.el7.x86_64.rpm</filename><sum type="sha256">0977851b1907c6600423b84c56faad7f83be85614ef763082c372585d510a77c</sum></package><package arch="noarch" name="gnome-getting-started-docs-ru" release="1.el7" src="gnome-getting-started-docs-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-getting-started-docs-ru-3.28.2-1.el7.noarch.rpm</filename><sum type="sha256">0a0b0df3e3b52adac1e1919d130c839d9d32b695246c0ca5d616ab4f92897221</sum></package><package arch="i686" name="libcroco" release="4.el7" src="libcroco-0.6.12-4.el7.src.rpm" version="0.6.12"><filename>libcroco-0.6.12-4.el7.i686.rpm</filename><sum type="sha256">353a188f3e0f12de09104be36e8f01ab6c8710c8cd33bc3953edb19278b57c1b</sum></package><package arch="x86_64" name="empathy" release="1.el7" src="empathy-3.12.13-1.el7.src.rpm" version="3.12.13"><filename>empathy-3.12.13-1.el7.x86_64.rpm</filename><sum type="sha256">380b6007d9b387d98f552d1c5139589e843665256aa19dacaa95e6b732722b63</sum></package><package arch="x86_64" name="gom" release="1.el7" src="gom-0.3.3-1.el7.src.rpm" version="0.3.3"><filename>gom-0.3.3-1.el7.x86_64.rpm</filename><sum type="sha256">08eeec2e4d063fd39af6d4cc3d5f851f2e7970b759e6d89214febc702b2c4602</sum></package><package arch="x86_64" name="libgxps-tools" release="4.el7" src="libgxps-0.3.0-4.el7.src.rpm" version="0.3.0"><filename>libgxps-tools-0.3.0-4.el7.x86_64.rpm</filename><sum type="sha256">90298bf458f31979250b15abe5572a8873c227924be5e0def58b0238b994fee1</sum></package><package arch="noarch" name="wayland-protocols-devel" release="1.el7" src="wayland-protocols-1.14-1.el7.src.rpm" version="1.14"><filename>wayland-protocols-devel-1.14-1.el7.noarch.rpm</filename><sum type="sha256">696f4095d46bacfc3df7255ce89dbfc39d153439a3535eb4ef4d77e8fb250a34</sum></package><package arch="i686" name="at-spi2-core-devel" release="1.el7" src="at-spi2-core-2.28.0-1.el7.src.rpm" version="2.28.0"><filename>at-spi2-core-devel-2.28.0-1.el7.i686.rpm</filename><sum type="sha256">e593fb65443528f45e3273635ad5a5f9221cb11d6adf2aa516a97ec493687eb5</sum></package><package arch="x86_64" name="poppler-devel" release="20.el7" src="poppler-0.26.5-20.el7.src.rpm" version="0.26.5"><filename>poppler-devel-0.26.5-20.el7.x86_64.rpm</filename><sum type="sha256">f19d95024df6e9ca2d42f1d919b2f7b7e62456f8525c5022d2338fc0114881be</sum></package><package arch="i686" name="gdk-pixbuf2-devel" release="3.el7" src="gdk-pixbuf2-2.36.12-3.el7.src.rpm" version="2.36.12"><filename>gdk-pixbuf2-devel-2.36.12-3.el7.i686.rpm</filename><sum type="sha256">714b8d264e7ae6f91cc1511c62b1e4c2c2bdb12f8ab64ea43769af73167a462e</sum></package><package arch="x86_64" name="gspell-devel" release="1.el7" src="gspell-1.6.1-1.el7.src.rpm" version="1.6.1"><filename>gspell-devel-1.6.1-1.el7.x86_64.rpm</filename><sum type="sha256">c2e057ada5aed3885f1d5cd04ac45e530df3f02e4f0cca5db833d54bd1949a06</sum></package><package arch="i686" name="gssdp-devel" release="1.el7" src="gssdp-1.0.2-1.el7.src.rpm" version="1.0.2"><filename>gssdp-devel-1.0.2-1.el7.i686.rpm</filename><sum type="sha256">6cb43ca58e51591abca9f14359557ce3448c1826af0c1118a386ae5d51408055</sum></package><package arch="i686" name="gstreamer1-plugins-base" release="2.el7" src="gstreamer1-plugins-base-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-base-1.10.4-2.el7.i686.rpm</filename><sum type="sha256">1402a7142d77de69cb79a294d1d1e7e5e729acbbd241316c085a298f40617f1e</sum></package><package arch="x86_64" name="gedit-plugin-findinfiles" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugin-findinfiles-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">c2bcb977339af6ca1b2a7ef3c8779cbe11a00b16f646689dfd7581e1121733a9</sum></package><package arch="i686" epoch="1" name="gdm-devel" release="9.el7" src="gdm-3.28.2-9.el7.src.rpm" version="3.28.2"><filename>gdm-devel-3.28.2-9.el7.i686.rpm</filename><sum type="sha256">3b9d1c9da01e0a77665d715e35908b196cc246161381dd797d85e177dfe036c0</sum></package><package arch="x86_64" name="gvfs-gphoto2" release="1.el7" src="gvfs-1.36.2-1.el7.src.rpm" version="1.36.2"><filename>gvfs-gphoto2-1.36.2-1.el7.x86_64.rpm</filename><sum type="sha256">a8c0f7caee9f70eded5662386e299333a050e861a5a5418273bb83e1c15b00ac</sum></package><package arch="x86_64" name="harfbuzz" release="2.el7" src="harfbuzz-1.7.5-2.el7.src.rpm" version="1.7.5"><filename>harfbuzz-1.7.5-2.el7.x86_64.rpm</filename><sum type="sha256">9bb2f3df58cea31edabbe3812f8e36b80f494ce86ee5f3bb288395fac1c6c245</sum></package><package arch="x86_64" name="turbojpeg" release="6.el7" src="libjpeg-turbo-1.2.90-6.el7.src.rpm" version="1.2.90"><filename>turbojpeg-1.2.90-6.el7.x86_64.rpm</filename><sum type="sha256">9dac0c05649686c2db5278050fbc72a7dd91fd6a85edbd8b1ea4d47ea97e2a1a</sum></package><package arch="x86_64" name="cairo-gobject" release="3.el7" src="cairo-1.15.12-3.el7.src.rpm" version="1.15.12"><filename>cairo-gobject-1.15.12-3.el7.x86_64.rpm</filename><sum type="sha256">960b37421f6e496c5fb4a6610ce59996a8758d9fb37f9a03ae6ad3b87c38fa0e</sum></package><package arch="i686" name="upower-devel" release="1.el7" src="upower-0.99.7-1.el7.src.rpm" version="0.99.7"><filename>upower-devel-0.99.7-1.el7.i686.rpm</filename><sum type="sha256">75fd8e8ae6d6bae36597575ea067be57d05a1aa13154deb72c3fde311bd8c3c2</sum></package><package arch="x86_64" name="freetype-demos" release="12.el7" src="freetype-2.8-12.el7.src.rpm" version="2.8"><filename>freetype-demos-2.8-12.el7.x86_64.rpm</filename><sum type="sha256">4940f6ebda9c24eb8bcb9b44450f3e1a757377a5e0aceecda78c45c609e4258a</sum></package><package arch="i686" name="gvfs-client" release="1.el7" src="gvfs-1.36.2-1.el7.src.rpm" version="1.36.2"><filename>gvfs-client-1.36.2-1.el7.i686.rpm</filename><sum type="sha256">e7521ebe2687d2576de558d8320eac534c1c315a1b7f04a52f2da49a5057b13a</sum></package><package arch="x86_64" epoch="1" name="control-center" release="4.el7" src="control-center-3.28.1-4.el7.src.rpm" version="3.28.1"><filename>control-center-3.28.1-4.el7.x86_64.rpm</filename><sum type="sha256">394da5d9e23108fd1855f2fad917b9cbc5cb526c83c3e1da873ac687a796aa5a</sum></package><package arch="x86_64" name="poppler-demos" release="20.el7" src="poppler-0.26.5-20.el7.src.rpm" version="0.26.5"><filename>poppler-demos-0.26.5-20.el7.x86_64.rpm</filename><sum type="sha256">242950f8e8dc7f9490e9f8724f23b3c072c3d20064345a3170224e2ec28bec90</sum></package><package arch="x86_64" name="openchange-client" release="3.el7" src="openchange-2.3-3.el7.src.rpm" version="2.3"><filename>openchange-client-2.3-3.el7.x86_64.rpm</filename><sum type="sha256">10db932a5dbdb0e9e99788334f98b602f23d570cfc3e6866b3e3743f9afb0486</sum></package><package arch="i686" epoch="2" name="yelp-devel" release="1.el7" src="yelp-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>yelp-devel-3.28.1-1.el7.i686.rpm</filename><sum type="sha256">4454a3bbfa797a7098dfb54a7f504c16a3e9c0fdd5a2105496cc6d0c612a83fc</sum></package><package arch="x86_64" name="libsecret" release="1.el7" src="libsecret-0.18.6-1.el7.src.rpm" version="0.18.6"><filename>libsecret-0.18.6-1.el7.x86_64.rpm</filename><sum type="sha256">ebf14b87d9cb241faae94d117e2e82d485de81fad216fcc759f4a783261b6ae6</sum></package><package arch="x86_64" name="gnome-online-accounts" release="1.el7" src="gnome-online-accounts-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gnome-online-accounts-3.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">d35a00274953a02496ee20ac3ef471a3224ec49eb3b6f4dbfbff1c8ade2ae624</sum></package><package arch="x86_64" name="accountsservice-libs" release="2.el7" src="accountsservice-0.6.50-2.el7.src.rpm" version="0.6.50"><filename>accountsservice-libs-0.6.50-2.el7.x86_64.rpm</filename><sum type="sha256">22d69e9271ab08ebd074b4ba3d4d53bbcf3b0c67baaad7c18549fbff99685d83</sum></package><package arch="x86_64" name="gcr" release="1.el7" src="gcr-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gcr-3.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">cb3815449cee3ab62f674135cc979c5ef5167436b0849afd880b323275874a05</sum></package><package arch="i686" name="turbojpeg-devel" release="6.el7" src="libjpeg-turbo-1.2.90-6.el7.src.rpm" version="1.2.90"><filename>turbojpeg-devel-1.2.90-6.el7.i686.rpm</filename><sum type="sha256">0719b9d3b5d2c8ac09357e643246f76f36dfc3df3538adad1d046439731a7bbb</sum></package><package arch="i686" name="libchamplain" release="2.el7" src="libchamplain-0.12.16-2.el7.src.rpm" version="0.12.16"><filename>libchamplain-0.12.16-2.el7.i686.rpm</filename><sum type="sha256">6c8cf74772d68fd3f7fcb9a5d890c089edd57b3bda013c0aacf9163d95822524</sum></package><package arch="noarch" name="evolution-devel-docs" release="2.el7" src="evolution-3.28.5-2.el7.src.rpm" version="3.28.5"><filename>evolution-devel-docs-3.28.5-2.el7.noarch.rpm</filename><sum type="sha256">f20aa8bb0cb7aa42b516b0a3c895d84a61036684d55b916fc9c55ece46b88d42</sum></package><package arch="x86_64" name="evince-dvi" release="5.el7" src="evince-3.28.2-5.el7.src.rpm" version="3.28.2"><filename>evince-dvi-3.28.2-5.el7.x86_64.rpm</filename><sum type="sha256">9c41d6be60311a84d713540a9b3d8d21ad088616ca3a84e8a0216572866b0676</sum></package><package arch="i686" name="dconf" release="4.el7" src="dconf-0.28.0-4.el7.src.rpm" version="0.28.0"><filename>dconf-0.28.0-4.el7.i686.rpm</filename><sum type="sha256">9367bca476cf9f515dcf6555c24f4f3aa070027417c1f6ac81609d42d1323a78</sum></package><package arch="x86_64" name="baobab" release="2.el7" src="baobab-3.28.0-2.el7.src.rpm" version="3.28.0"><filename>baobab-3.28.0-2.el7.x86_64.rpm</filename><sum type="sha256">6248329b2ea0489493f20f77f4f38fd31bbc87cb728bd104d0aff596ab278d38</sum></package><package arch="x86_64" name="freetype" release="12.el7" src="freetype-2.8-12.el7.src.rpm" version="2.8"><filename>freetype-2.8-12.el7.x86_64.rpm</filename><sum type="sha256">91d63f03ae151288da99806513421b90fe60ed73f031ff0d9f5350110357c45f</sum></package><package arch="i686" name="at-spi2-atk-devel" release="1.el7" src="at-spi2-atk-2.26.2-1.el7.src.rpm" version="2.26.2"><filename>at-spi2-atk-devel-2.26.2-1.el7.i686.rpm</filename><sum type="sha256">1b9a50074b242d15d70b55ebfa0440b3f7370a8a8db4a823ea2bc264da656872</sum></package><package arch="x86_64" name="gdk-pixbuf2-tests" release="3.el7" src="gdk-pixbuf2-2.36.12-3.el7.src.rpm" version="2.36.12"><filename>gdk-pixbuf2-tests-2.36.12-3.el7.x86_64.rpm</filename><sum type="sha256">33d74d4d3d909d91e5a5186e9901deac25d649b8af8822ecf6bc874b9ce69c77</sum></package><package arch="i686" epoch="1" name="folks-tools" release="1.el7" src="folks-0.11.4-1.el7.src.rpm" version="0.11.4"><filename>folks-tools-0.11.4-1.el7.i686.rpm</filename><sum type="sha256">a4ae802c84fb6ca4a6631d9c32b6a228b2270cfdc49e29eb0d38fdf5bf8b1c33</sum></package><package arch="x86_64" name="gnome-terminal-nautilus" release="2.el7" src="gnome-terminal-3.28.2-2.el7.src.rpm" version="3.28.2"><filename>gnome-terminal-nautilus-3.28.2-2.el7.x86_64.rpm</filename><sum type="sha256">897971afc749fedc10b9743cf1ae11c8bbc69117dfeefd06ac9904f626a78097</sum></package><package arch="i686" name="geoclue2-devel" release="1.el7" src="geoclue2-2.4.8-1.el7.src.rpm" version="2.4.8"><filename>geoclue2-devel-2.4.8-1.el7.i686.rpm</filename><sum type="sha256">8ae27978ded958351a02e2199df7884f4e16b28b0da741ad09c618a847ce8642</sum></package><package arch="x86_64" name="evolution-pst" release="2.el7" src="evolution-3.28.5-2.el7.src.rpm" version="3.28.5"><filename>evolution-pst-3.28.5-2.el7.x86_64.rpm</filename><sum type="sha256">da1fb37edd002ebce904220ea318f829eff742031966d19b850d736cabef427f</sum></package><package arch="i686" name="gupnp-devel" release="5.el7" src="gupnp-1.0.2-5.el7.src.rpm" version="1.0.2"><filename>gupnp-devel-1.0.2-5.el7.i686.rpm</filename><sum type="sha256">ab7a9f5b05c81b12efa7cc2ddab26cb7bda8ccfe587493249dcf97f7fd4936e1</sum></package><package arch="x86_64" name="gstreamer1-plugins-base-devel" release="2.el7" src="gstreamer1-plugins-base-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-base-devel-1.10.4-2.el7.x86_64.rpm</filename><sum type="sha256">f206cc573f9615f8a6b774237e84774274b59c2b6c880b41bbd2a4c9c64f8bf5</sum></package><package arch="x86_64" name="upower-devel" release="1.el7" src="upower-0.99.7-1.el7.src.rpm" version="0.99.7"><filename>upower-devel-0.99.7-1.el7.x86_64.rpm</filename><sum type="sha256">c6198f813b324fa1d31719912ad671f0e9ecc5e20472d95536d4ecb27a0eaae2</sum></package><package arch="x86_64" name="libchamplain-devel" release="2.el7" src="libchamplain-0.12.16-2.el7.src.rpm" version="0.12.16"><filename>libchamplain-devel-0.12.16-2.el7.x86_64.rpm</filename><sum type="sha256">c3e907321eca6da7b8ff311e99ec509dfed7535de1f1ad63845c2d62ddb2a816</sum></package><package arch="x86_64" name="upower" release="1.el7" src="upower-0.99.7-1.el7.src.rpm" version="0.99.7"><filename>upower-0.99.7-1.el7.x86_64.rpm</filename><sum type="sha256">8c18b6f47364c4ecc265f2f51b441994ebf8d2106e2e17dba23a9ef530dd7e6b</sum></package><package arch="x86_64" name="gnome-session" release="5.el7" src="gnome-session-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-session-3.28.1-5.el7.x86_64.rpm</filename><sum type="sha256">4e696ea85e883c8105e022cb41f89438ccfe8203b5e93b3a9d05cc0b492e3e82</sum></package><package arch="i686" name="vte291-devel" release="2.el7" src="vte291-0.52.2-2.el7.src.rpm" version="0.52.2"><filename>vte291-devel-0.52.2-2.el7.i686.rpm</filename><sum type="sha256">084103593c0877b2a87f554a30f41d1fc99baf5535f9c5669dc91221fd499ccd</sum></package><package arch="x86_64" name="mozjs52" release="1.el7" src="mozjs52-52.9.0-1.el7.src.rpm" version="52.9.0"><filename>mozjs52-52.9.0-1.el7.x86_64.rpm</filename><sum type="sha256">8e1bf90e9904b261a62034762a3e54c85cf79e7b480595062839d6ba60e85da1</sum></package><package arch="noarch" name="gnome-shell-extension-places-menu" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-places-menu-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">43137e3442536efe07b43514f6f3f55607df54aa3e12539fbbaed842b86615ab</sum></package><package arch="x86_64" name="eog" release="1.el7" src="eog-3.28.3-1.el7.src.rpm" version="3.28.3"><filename>eog-3.28.3-1.el7.x86_64.rpm</filename><sum type="sha256">2fee98b097a1b7357ca731b99140a0d4dffe4dcb9c63b65f0f2e04572ae198ea</sum></package><package arch="x86_64" name="gupnp-igd" release="2.el7" src="gupnp-igd-0.2.5-2.el7.src.rpm" version="0.2.5"><filename>gupnp-igd-0.2.5-2.el7.x86_64.rpm</filename><sum type="sha256">66ff5d74b52295edc7cb9adf9498de4b97154fde202707e7a2cd606973db7789</sum></package><package arch="x86_64" name="gtk3-tests" release="3.el7" src="gtk3-3.22.30-3.el7.src.rpm" version="3.22.30"><filename>gtk3-tests-3.22.30-3.el7.x86_64.rpm</filename><sum type="sha256">50bc55314ecea7c41eae5ef0aa9f6fa8b50c471489ce5ebac790bf1f0d9cec2f</sum></package><package arch="x86_64" epoch="1" name="folks" release="1.el7" src="folks-0.11.4-1.el7.src.rpm" version="0.11.4"><filename>folks-0.11.4-1.el7.x86_64.rpm</filename><sum type="sha256">fa58458d30727c46d4c8cf9fff214e0c078f8600bdcdd04b13411fecaa5014fc</sum></package><package arch="x86_64" name="libsoup-devel" release="2.el7" src="libsoup-2.62.2-2.el7.src.rpm" version="2.62.2"><filename>libsoup-devel-2.62.2-2.el7.x86_64.rpm</filename><sum type="sha256">ee755d0463b3ab0db758a246031c18c8506c189bd787634887010b2e3713e9bb</sum></package><package arch="x86_64" name="rhythmbox" release="2.el7" src="rhythmbox-3.4.2-2.el7.src.rpm" version="3.4.2"><filename>rhythmbox-3.4.2-2.el7.x86_64.rpm</filename><sum type="sha256">d162c72bc2aae37b6a71f323f6e0af846d8123b17a7988eb333322a0a3edbf7b</sum></package><package arch="i686" name="gtk3" release="3.el7" src="gtk3-3.22.30-3.el7.src.rpm" version="3.22.30"><filename>gtk3-3.22.30-3.el7.i686.rpm</filename><sum type="sha256">1e55d7e921dc9c47fafcf44c6fc2b0f1dbd95a1d8af803a0da9d0209dbae29d0</sum></package><package arch="noarch" name="upower-devel-docs" release="1.el7" src="upower-0.99.7-1.el7.src.rpm" version="0.99.7"><filename>upower-devel-docs-0.99.7-1.el7.noarch.rpm</filename><sum type="sha256">845d2c49fe6fc8e1ad0bdd27cfa7124119554a76d7d398d53cffd389606a0b88</sum></package><package arch="i686" name="vte291" release="2.el7" src="vte291-0.52.2-2.el7.src.rpm" version="0.52.2"><filename>vte291-0.52.2-2.el7.i686.rpm</filename><sum type="sha256">b7daa0405efff5f1d60c625e8265799e7a193217871ae10e385c126cbc77e839</sum></package><package arch="x86_64" epoch="1" name="control-center-filesystem" release="4.el7" src="control-center-3.28.1-4.el7.src.rpm" version="3.28.1"><filename>control-center-filesystem-3.28.1-4.el7.x86_64.rpm</filename><sum type="sha256">ad5880b56a3d2502a04364bd88782daa4eae49168294e625101c6d1e7ba878e6</sum></package><package arch="x86_64" name="poppler-qt-devel" release="20.el7" src="poppler-0.26.5-20.el7.src.rpm" version="0.26.5"><filename>poppler-qt-devel-0.26.5-20.el7.x86_64.rpm</filename><sum type="sha256">55fd8c9349e04e5d197efa35cf788d4521bb59b0e77d3c56a9d736217252d9a8</sum></package><package arch="noarch" name="gnome-shell-extension-drive-menu" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-drive-menu-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">ce1da379ff6c8c22a4fba48b9a447678be66fc27fb861fd78ff950aefef88763</sum></package><package arch="x86_64" epoch="2" name="cheese" release="1.el7" src="cheese-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>cheese-3.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">299afbc6da607d45ff99ec5396cdff8dba99f9134ffd37f6fe1d65ec28281112</sum></package><package arch="i686" epoch="2" name="cheese-libs-devel" release="1.el7" src="cheese-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>cheese-libs-devel-3.28.0-1.el7.i686.rpm</filename><sum type="sha256">95b0370895de349cd5eb6962d2579f89b11d22b762e16c66404513addea652fa</sum></package><package arch="x86_64" epoch="2" name="gedit" release="1.el7" src="gedit-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">a1eaede1d48bd5801683ce86c168c89763de66178fcf671c31f577194336e755</sum></package><package arch="x86_64" name="libical-glib-devel" release="2.el7" src="libical-3.0.3-2.el7.src.rpm" version="3.0.3"><filename>libical-glib-devel-3.0.3-2.el7.x86_64.rpm</filename><sum type="sha256">bfc8f24558290d50c50f12de8136d011ad50b5ff48375cb3b0d458786337fc51</sum></package><package arch="i686" name="PackageKit-gtk3-module" release="1.sl7" src="PackageKit-1.1.10-1.sl7.src.rpm" version="1.1.10"><filename>PackageKit-gtk3-module-1.1.10-1.sl7.i686.rpm</filename><sum type="sha256">6377febd8b9a326c66ff8ef4b0bf42b5a3bbe2afe29dce929509a57ac86ef980</sum></package><package arch="noarch" name="openchange-devel-docs" release="3.el7" src="openchange-2.3-3.el7.src.rpm" version="2.3"><filename>openchange-devel-docs-2.3-3.el7.noarch.rpm</filename><sum type="sha256">7aef72354108b26630b51e4994150b755465685712bf79ea011b654eb4c80fe4</sum></package><package arch="noarch" name="gnome-shell-extension-native-window-placement" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-native-window-placement-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">a86371016fbdb874a50861d640bb4554e392a5bc3a5db3fde19a6febe3377925</sum></package><package arch="i686" name="gom" release="1.el7" src="gom-0.3.3-1.el7.src.rpm" version="0.3.3"><filename>gom-0.3.3-1.el7.i686.rpm</filename><sum type="sha256">bae7774651a9d15dcfe88e8c965bd7da5fb2f0d14259d0c3b251369b0ad4adec</sum></package><package arch="x86_64" name="gtksourceview3-tests" release="1.el7" src="gtksourceview3-3.24.8-1.el7.src.rpm" version="3.24.8"><filename>gtksourceview3-tests-3.24.8-1.el7.x86_64.rpm</filename><sum type="sha256">3d56553baf1d71c4d78180d4b5ea26821cfe987a2c3b8846514792bc9d24b49a</sum></package><package arch="i686" epoch="1" name="devhelp-devel" release="1.el7" src="devhelp-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>devhelp-devel-3.28.1-1.el7.i686.rpm</filename><sum type="sha256">b95c3b9974ebfb02fb9591cac43b62bb060a3dcc01db6981d983c9fab1012af0</sum></package><package arch="i686" name="evolution-mapi" release="2.el7" src="evolution-mapi-3.28.3-2.el7.src.rpm" version="3.28.3"><filename>evolution-mapi-3.28.3-2.el7.i686.rpm</filename><sum type="sha256">cb3d792ee8fa5970003afb7415e4a93d5c39e1b231429ba6a98c8252e2f48e8d</sum></package><package arch="x86_64" name="gspell" release="1.el7" src="gspell-1.6.1-1.el7.src.rpm" version="1.6.1"><filename>gspell-1.6.1-1.el7.x86_64.rpm</filename><sum type="sha256">b32f88483bdea05a4fab875c3e18c04cb9101095f794831d45a04e92d183edd4</sum></package><package arch="x86_64" name="gucharmap-devel" release="1.el7" src="gucharmap-10.0.4-1.el7.src.rpm" version="10.0.4"><filename>gucharmap-devel-10.0.4-1.el7.x86_64.rpm</filename><sum type="sha256">6c157532b1cf5b7bd4e2440cf488ac541b3942de7968a3f2c1d7bc076a411066</sum></package><package arch="x86_64" name="gnome-settings-daemon-devel" release="2.el7" src="gnome-settings-daemon-3.28.1-2.el7.src.rpm" version="3.28.1"><filename>gnome-settings-daemon-devel-3.28.1-2.el7.x86_64.rpm</filename><sum type="sha256">eb88817e4637622fe1229faebd16382a56522f7092ad14c8ffe0d865a7fde77f</sum></package><package arch="i686" name="rest-devel" release="2.el7" src="rest-0.8.1-2.el7.src.rpm" version="0.8.1"><filename>rest-devel-0.8.1-2.el7.i686.rpm</filename><sum type="sha256">2f1c5ea4b56e41b861ce0f404321eedee0a1673e050571fc52a766345c9cc01a</sum></package><package arch="x86_64" name="flatpak" release="2.el7" src="flatpak-1.0.2-2.el7.src.rpm" version="1.0.2"><filename>flatpak-1.0.2-2.el7.x86_64.rpm</filename><sum type="sha256">359206c92ca164833a7459601c78d89e6d081e1d980903bb0565d38260d8c62e</sum></package><package arch="i686" name="gcr" release="1.el7" src="gcr-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gcr-3.28.0-1.el7.i686.rpm</filename><sum type="sha256">3c779f2d4de5931979c74afe2baf280066d8c3007c6277b075f561ecd379132c</sum></package><package arch="x86_64" name="brasero-devel" release="5.el7" src="brasero-3.12.2-5.el7.src.rpm" version="3.12.2"><filename>brasero-devel-3.12.2-5.el7.x86_64.rpm</filename><sum type="sha256">1f3103685cb23755e419b2f8e4bd705fbb15c4baf5d3482a0ba2b1c3c42778ed</sum></package><package arch="x86_64" name="geoclue2-devel" release="1.el7" src="geoclue2-2.4.8-1.el7.src.rpm" version="2.4.8"><filename>geoclue2-devel-2.4.8-1.el7.x86_64.rpm</filename><sum type="sha256">2e48e8011577d3d1aecde4dd7a968fd0e4894b4dad0ae199f8d116cc7e06fe59</sum></package><package arch="i686" name="dconf-devel" release="4.el7" src="dconf-0.28.0-4.el7.src.rpm" version="0.28.0"><filename>dconf-devel-0.28.0-4.el7.i686.rpm</filename><sum type="sha256">0aff3d18c95e765946c9800ab7b10d48bcfc949ccc94d6dd052e9a70877d7693</sum></package><package arch="i686" name="geocode-glib-devel" release="2.el7" src="geocode-glib-3.26.0-2.el7.src.rpm" version="3.26.0"><filename>geocode-glib-devel-3.26.0-2.el7.i686.rpm</filename><sum type="sha256">0d8d69348b8d46214927fb6056731d2c1f19f393bc38bc307d6ff54a31f510d3</sum></package><package arch="noarch" name="gnome-getting-started-docs-hu" release="1.el7" src="gnome-getting-started-docs-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-getting-started-docs-hu-3.28.2-1.el7.noarch.rpm</filename><sum type="sha256">d9fa5e7081e283113c53e9837a9ef11b3a35367f53a2237894cd24c690ee01c7</sum></package><package arch="noarch" name="glibmm24-doc" release="1.el7" src="glibmm24-2.56.0-1.el7.src.rpm" version="2.56.0"><filename>glibmm24-doc-2.56.0-1.el7.noarch.rpm</filename><sum type="sha256">311a94d5393e5375d94b628954999ca9d3186b866e4a07ba392befc85635c686</sum></package><package arch="x86_64" name="at-spi2-atk-devel" release="1.el7" src="at-spi2-atk-2.26.2-1.el7.src.rpm" version="2.26.2"><filename>at-spi2-atk-devel-2.26.2-1.el7.x86_64.rpm</filename><sum type="sha256">34131f6cf264146718d1995eb0808091283384725082a8b24cf6634bf2d05d44</sum></package><package arch="noarch" name="adwaita-icon-theme-devel" release="1.el7" src="adwaita-icon-theme-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>adwaita-icon-theme-devel-3.28.0-1.el7.noarch.rpm</filename><sum type="sha256">33acb60fdebc8368c8fc97806b3802e896a460f1558583f1b9ba8d9efb30afd8</sum></package><package arch="x86_64" epoch="1" name="totem" release="1.el7" src="totem-3.26.2-1.el7.src.rpm" version="3.26.2"><filename>totem-3.26.2-1.el7.x86_64.rpm</filename><sum type="sha256">b5fab7d382574dc95548b90619abd997db521c3e1e764ce0960dcb326a71a967</sum></package><package arch="i686" name="gupnp-igd-devel" release="2.el7" src="gupnp-igd-0.2.5-2.el7.src.rpm" version="0.2.5"><filename>gupnp-igd-devel-0.2.5-2.el7.i686.rpm</filename><sum type="sha256">c11ce96a2aeb0481f558c335861cfe11c3147aefd3ddab28c767ef71a40584ec</sum></package><package arch="x86_64" name="shotwell" release="1.el7" src="shotwell-0.28.4-1.el7.src.rpm" version="0.28.4"><filename>shotwell-0.28.4-1.el7.x86_64.rpm</filename><sum type="sha256">55a9d8016292940c79375c90a6b4719c51747d2ffe318289974cb422fc31bafa</sum></package><package arch="x86_64" name="gedit-plugin-textsize" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugin-textsize-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">887ae112174250458082aa5a883e82ab4c9e309def9f3e01d87ccc63339ef21e</sum></package><package arch="noarch" name="gnome-classic-session" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-classic-session-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">eef9d9b82f415c8426d32201eab0f159b1cc3ce60ecbfb786b22103189d2741f</sum></package><package arch="i686" epoch="2" name="cheese-libs" release="1.el7" src="cheese-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>cheese-libs-3.28.0-1.el7.i686.rpm</filename><sum type="sha256">6db43f17eaaf6d2656f03b71a55f6500b4539b8e89e9cd7ccbd40452f043d2de</sum></package><package arch="i686" name="mutter" release="4.el7" src="mutter-3.28.3-4.el7.src.rpm" version="3.28.3"><filename>mutter-3.28.3-4.el7.i686.rpm</filename><sum type="sha256">d79c0c8b8124e432adb0f3930adbe46f3b46dd82cb7024d4147bd37fd26dc7a9</sum></package><package arch="x86_64" epoch="1" name="devhelp-devel" release="1.el7" src="devhelp-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>devhelp-devel-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">65dc4a1c7f6d807834acc7ae041ebf2c96a8b2dbdab51b28dc0d1aa1fbcb015a</sum></package><package arch="i686" name="openchange" release="3.el7" src="openchange-2.3-3.el7.src.rpm" version="2.3"><filename>openchange-2.3-3.el7.i686.rpm</filename><sum type="sha256">9a310e49b7e61d571bd4010b6cc2a91355e88ecc93cb7f42f95dc8b88443b918</sum></package><package arch="i686" name="mutter-devel" release="4.el7" src="mutter-3.28.3-4.el7.src.rpm" version="3.28.3"><filename>mutter-devel-3.28.3-4.el7.i686.rpm</filename><sum type="sha256">e58ff6f44034eb0475a391c2e3592c071bb2bfaba2b78d8ff85336efb5f2abd4</sum></package><package arch="i686" name="libgexiv2" release="1.el7" src="libgexiv2-0.10.8-1.el7.src.rpm" version="0.10.8"><filename>libgexiv2-0.10.8-1.el7.i686.rpm</filename><sum type="sha256">871c09fcb9c7a440016c1dea4d21e663613efeee60d88e6c0d9d9f6267af16a6</sum></package><package arch="i686" name="libical-devel" release="2.el7" src="libical-3.0.3-2.el7.src.rpm" version="3.0.3"><filename>libical-devel-3.0.3-2.el7.i686.rpm</filename><sum type="sha256">88365ab9515e4f29228b73cb73f0a3be700ad139c7f33db46a9c4fcfe3c21fb3</sum></package><package arch="x86_64" name="gtk3-immodules" release="3.el7" src="gtk3-3.22.30-3.el7.src.rpm" version="3.22.30"><filename>gtk3-immodules-3.22.30-3.el7.x86_64.rpm</filename><sum type="sha256">3051d81dc2d4160c76e59dcc76d6fdf7a0dff409a112e734467817f87c671dba</sum></package><package arch="i686" name="grilo-devel" release="1.el7" src="grilo-0.3.6-1.el7.src.rpm" version="0.3.6"><filename>grilo-devel-0.3.6-1.el7.i686.rpm</filename><sum type="sha256">f9f725a40c7bd042a24196b539c7c043dadabeab93f08920e0bb1e735949fac0</sum></package><package arch="x86_64" name="mozjs52-devel" release="1.el7" src="mozjs52-52.9.0-1.el7.src.rpm" version="52.9.0"><filename>mozjs52-devel-52.9.0-1.el7.x86_64.rpm</filename><sum type="sha256">2681340387d1c2271bf81060a4516045abcf6b74b7ad7945aa5a12c4cafe81de</sum></package><package arch="i686" name="gnome-color-manager" release="1.el7" src="gnome-color-manager-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gnome-color-manager-3.28.0-1.el7.i686.rpm</filename><sum type="sha256">c1829c1bdeb4b6fdcf145caf619a2f0a32e138b9f8ec5c498694f7802a54bb4a</sum></package><package arch="i686" name="poppler-cpp-devel" release="20.el7" src="poppler-0.26.5-20.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-devel-0.26.5-20.el7.i686.rpm</filename><sum type="sha256">2783e3e901a4d95e4a7ef5fd3b9fb4a658ea8ddbbc29f560f48c4e414a31f742</sum></package><package arch="x86_64" name="gvfs-mtp" release="1.el7" src="gvfs-1.36.2-1.el7.src.rpm" version="1.36.2"><filename>gvfs-mtp-1.36.2-1.el7.x86_64.rpm</filename><sum type="sha256">6408e789daa6c74faf56d4ff93943c043a3ee4cad3bcbc17dce519b1bdcbbe06</sum></package><package arch="x86_64" name="libgexiv2-devel" release="1.el7" src="libgexiv2-0.10.8-1.el7.src.rpm" version="0.10.8"><filename>libgexiv2-devel-0.10.8-1.el7.x86_64.rpm</filename><sum type="sha256">64cfc431228ecf140537b7dae39c9b5382cfb3300fc6d49229d8f961982e7050</sum></package><package arch="x86_64" name="grilo" release="1.el7" src="grilo-0.3.6-1.el7.src.rpm" version="0.3.6"><filename>grilo-0.3.6-1.el7.x86_64.rpm</filename><sum type="sha256">999960c62e67d2dea47954dde97a31f994d11f2e6f9bc25725c9cde079461e3b</sum></package><package arch="x86_64" name="gvfs-fuse" release="1.el7" src="gvfs-1.36.2-1.el7.src.rpm" version="1.36.2"><filename>gvfs-fuse-1.36.2-1.el7.x86_64.rpm</filename><sum type="sha256">6bedcb62d8eb0ec086f6f33fbcd0160fe2ed7e4905f238df93261e658b3a9664</sum></package><package arch="x86_64" name="adwaita-gtk2-theme" release="2.el7" src="gnome-themes-standard-3.28-2.el7.src.rpm" version="3.28"><filename>adwaita-gtk2-theme-3.28-2.el7.x86_64.rpm</filename><sum type="sha256">0eb67e8e51cc0be46f178406aeb6ec84017a2fceb794decf13d6899bac5a0960</sum></package><package arch="i686" name="poppler-glib" release="20.el7" src="poppler-0.26.5-20.el7.src.rpm" version="0.26.5"><filename>poppler-glib-0.26.5-20.el7.i686.rpm</filename><sum type="sha256">29de6b1008ade61b04212d6380c80f5af7f3a1a6298ce4ae81eaacadb5dfff1c</sum></package><package arch="i686" name="gnome-keyring" release="1.el7" src="gnome-keyring-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-keyring-3.28.2-1.el7.i686.rpm</filename><sum type="sha256">b8ad0bfebcf114eac9f88388ac482441b06c221a46fb641f3348fa32ec449c65</sum></package><package arch="i686" name="webkitgtk4-plugin-process-gtk2" release="1.el7" src="webkitgtk4-2.20.5-1.el7.src.rpm" version="2.20.5"><filename>webkitgtk4-plugin-process-gtk2-2.20.5-1.el7.i686.rpm</filename><sum type="sha256">b5922ed81285f0f48e4b58b952f4afa6c07870192c8c3120db8a9d822e033ca7</sum></package><package arch="i686" name="nautilus-devel" release="2.el7" src="nautilus-3.26.3.1-2.el7.src.rpm" version="3.26.3.1"><filename>nautilus-devel-3.26.3.1-2.el7.i686.rpm</filename><sum type="sha256">7fb106a316e4d065bec114eea245c57393b614226d618197af047b78dd000125</sum></package><package arch="x86_64" name="libgovirt" release="1.el7" src="libgovirt-0.3.4-1.el7.src.rpm" version="0.3.4"><filename>libgovirt-0.3.4-1.el7.x86_64.rpm</filename><sum type="sha256">8654f607a9f13bc7fa1a44fdc01bfa62e87d9e99d17fd27218688a8ceacc867b</sum></package><package arch="x86_64" name="gnome-keyring" release="1.el7" src="gnome-keyring-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-keyring-3.28.2-1.el7.x86_64.rpm</filename><sum type="sha256">7f84a7b2c529a5d5998e0109a8797d80d11b0f7d1d6cbde01b5875c97a514460</sum></package><package arch="x86_64" name="glib-networking-tests" release="1.el7" src="glib-networking-2.56.1-1.el7.src.rpm" version="2.56.1"><filename>glib-networking-tests-2.56.1-1.el7.x86_64.rpm</filename><sum type="sha256">850924193ac19021b245b9be1914cab31943d192b239269768ced21422fe3dd0</sum></package><package arch="x86_64" name="vte291" release="2.el7" src="vte291-0.52.2-2.el7.src.rpm" version="0.52.2"><filename>vte291-0.52.2-2.el7.x86_64.rpm</filename><sum type="sha256">dee8639c7e3a4a76383d1953de497ec26c2a41670fa4e4a34e19c65f6070d8a3</sum></package><package arch="x86_64" name="PackageKit-yum-plugin" release="1.sl7" src="PackageKit-1.1.10-1.sl7.src.rpm" version="1.1.10"><filename>PackageKit-yum-plugin-1.1.10-1.sl7.x86_64.rpm</filename><sum type="sha256">5f91c58d3c17f8187c7c1fa404041b87fe175b75be419723ebe1ced9d6c54755</sum></package><package arch="x86_64" name="gnome-packagekit" release="1.el7" src="gnome-packagekit-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gnome-packagekit-3.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">5ccd1d3ae1d1c4f59093fae557f8b65b20628ee71a1682efcc561e59f85d9cf2</sum></package><package arch="x86_64" epoch="1" name="devhelp-libs" release="1.el7" src="devhelp-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>devhelp-libs-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">97d4cfbd77c7a5d990105252c2b8b16c11d33c19c47437e1f3d99b0a87b68996</sum></package><package arch="i686" epoch="1" name="folks" release="1.el7" src="folks-0.11.4-1.el7.src.rpm" version="0.11.4"><filename>folks-0.11.4-1.el7.i686.rpm</filename><sum type="sha256">c9246bd79633784274094242d511fd78b0f1a56ded4ec5f1ae728e076607ab52</sum></package><package arch="x86_64" name="grilo-plugins" release="1.el7" src="grilo-plugins-0.3.7-1.el7.src.rpm" version="0.3.7"><filename>grilo-plugins-0.3.7-1.el7.x86_64.rpm</filename><sum type="sha256">a1089136b9fa78359e91c8618b7a22df4efcf14a6ad6a905422e53b8989b61b6</sum></package><package arch="x86_64" name="libjpeg-turbo" release="6.el7" src="libjpeg-turbo-1.2.90-6.el7.src.rpm" version="1.2.90"><filename>libjpeg-turbo-1.2.90-6.el7.x86_64.rpm</filename><sum type="sha256">d57ad3d1ae49c4c38c6ecd6c1e02f8bddc91f19fa296ce6135173c210e5e9eea</sum></package><package arch="i686" name="libgepub-devel" release="1.el7" src="libgepub-0.6.0-1.el7.src.rpm" version="0.6.0"><filename>libgepub-devel-0.6.0-1.el7.i686.rpm</filename><sum type="sha256">e05819b5245211fe4829725d5946484c737e556b4f3b0547f21eddeefd5fa0c1</sum></package><package arch="x86_64" name="libpeas-devel" release="1.el7" src="libpeas-1.22.0-1.el7.src.rpm" version="1.22.0"><filename>libpeas-devel-1.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">ca39db932d1352b65892387674eb063f0c9ce5dc4747584fd74dfd6eee731a51</sum></package><package arch="x86_64" name="gvfs" release="1.el7" src="gvfs-1.36.2-1.el7.src.rpm" version="1.36.2"><filename>gvfs-1.36.2-1.el7.x86_64.rpm</filename><sum type="sha256">5d8a4d2c4735ff905dafc852798cf86ecf2e15661e27083486e72c373448887f</sum></package><package arch="x86_64" epoch="1" name="folks-tools" release="1.el7" src="folks-0.11.4-1.el7.src.rpm" version="0.11.4"><filename>folks-tools-0.11.4-1.el7.x86_64.rpm</filename><sum type="sha256">c4e153a0270abf919fb535a3fd061092252d897d7eda6698983295de9354c62e</sum></package><package arch="i686" epoch="1" name="gnome-bluetooth-libs-devel" release="1.el7" src="gnome-bluetooth-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-bluetooth-libs-devel-3.28.2-1.el7.i686.rpm</filename><sum type="sha256">f43ef24274ba685f414e42d5b9955c57e8fdac3aa19f9f82eab116d3ac4db54a</sum></package><package arch="x86_64" name="poppler-cpp" release="20.el7" src="poppler-0.26.5-20.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-0.26.5-20.el7.x86_64.rpm</filename><sum type="sha256">2bb7c4217d05b4be6a147ac422bd78bdf264dea05f5b58f2ebfd3029c73b294c</sum></package><package arch="x86_64" name="gvfs-devel" release="1.el7" src="gvfs-1.36.2-1.el7.src.rpm" version="1.36.2"><filename>gvfs-devel-1.36.2-1.el7.x86_64.rpm</filename><sum type="sha256">28941ed9218a6899260355def4b8372945f7d148f6e5e1c7996b5a7e23bc35e6</sum></package><package arch="x86_64" name="gnome-screenshot" release="1.el7" src="gnome-screenshot-3.26.0-1.el7.src.rpm" version="3.26.0"><filename>gnome-screenshot-3.26.0-1.el7.x86_64.rpm</filename><sum type="sha256">e2a2ec1ad3a777520d8b2892e6af69b242c590ff7c922856e59ad95cfef8129d</sum></package><package arch="i686" name="libpeas-loader-python" release="1.el7" src="libpeas-1.22.0-1.el7.src.rpm" version="1.22.0"><filename>libpeas-loader-python-1.22.0-1.el7.i686.rpm</filename><sum type="sha256">9f31282023e889c0ae89f1b82f86be4853b833a373efeb294db1b94f6e297a69</sum></package><package arch="i686" name="gcr-devel" release="1.el7" src="gcr-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gcr-devel-3.28.0-1.el7.i686.rpm</filename><sum type="sha256">5301a994838e2e15023c7669443a1823b486ee07b26810d58b6f2d5b82686058</sum></package><package arch="x86_64" name="json-glib-tests" release="2.el7" src="json-glib-1.4.2-2.el7.src.rpm" version="1.4.2"><filename>json-glib-tests-1.4.2-2.el7.x86_64.rpm</filename><sum type="sha256">04a176f3a9f3bcea3e356d495e855d7ed84a3a3af4ebed78e371a3bfcdfb124f</sum></package><package arch="x86_64" name="valadoc-devel" release="1.el7" src="vala-0.40.8-1.el7.src.rpm" version="0.40.8"><filename>valadoc-devel-0.40.8-1.el7.x86_64.rpm</filename><sum type="sha256">9631291664353fe8ef8fab67c9849617ab3d75175cf685216453358b44a7b0d0</sum></package><package arch="i686" name="webkitgtk4-jsc" release="1.el7" src="webkitgtk4-2.20.5-1.el7.src.rpm" version="2.20.5"><filename>webkitgtk4-jsc-2.20.5-1.el7.i686.rpm</filename><sum type="sha256">1b883550de3bb8f6396665b548648a8e3e67d8cb82f507fb127af5d3183548e9</sum></package><package arch="x86_64" name="gsettings-desktop-schemas-devel" release="2.el7" src="gsettings-desktop-schemas-3.28.0-2.el7.src.rpm" version="3.28.0"><filename>gsettings-desktop-schemas-devel-3.28.0-2.el7.x86_64.rpm</filename><sum type="sha256">bab250e83952608007a2d899ea1e1ea35dc0da1ab43cf76128c63f17123c8993</sum></package><package arch="i686" name="brasero-devel" release="5.el7" src="brasero-3.12.2-5.el7.src.rpm" version="3.12.2"><filename>brasero-devel-3.12.2-5.el7.i686.rpm</filename><sum type="sha256">8701c4f4b1a32558d01d5c0efa1096c43c8a2b197fd782e70a51b240616738dd</sum></package><package arch="x86_64" name="gsettings-desktop-schemas" release="2.el7" src="gsettings-desktop-schemas-3.28.0-2.el7.src.rpm" version="3.28.0"><filename>gsettings-desktop-schemas-3.28.0-2.el7.x86_64.rpm</filename><sum type="sha256">16a78be4d3b83af7c8dbfc6d6d806bffcf26c15c0926cae1efef09efc9f36583</sum></package><package arch="i686" name="gjs-devel" release="1.el7" src="gjs-1.52.3-1.el7.src.rpm" version="1.52.3"><filename>gjs-devel-1.52.3-1.el7.i686.rpm</filename><sum type="sha256">eadbad07591b121b0cf395b257db95310c693477cec279ad8ff4528ee622ded6</sum></package><package arch="i686" name="eog" release="1.el7" src="eog-3.28.3-1.el7.src.rpm" version="3.28.3"><filename>eog-3.28.3-1.el7.i686.rpm</filename><sum type="sha256">6891292db98bddff16263043ab6224c52591ccbb7288ffeccecdd825d4c38fb6</sum></package><package arch="x86_64" name="evince-libs" release="5.el7" src="evince-3.28.2-5.el7.src.rpm" version="3.28.2"><filename>evince-libs-3.28.2-5.el7.x86_64.rpm</filename><sum type="sha256">a1b3cbd1d292eeb49eb7ebd3cb30265336d72e351917947d8666172a792444af</sum></package><package arch="x86_64" name="libwnck3-devel" release="2.el7" src="libwnck3-3.24.1-2.el7.src.rpm" version="3.24.1"><filename>libwnck3-devel-3.24.1-2.el7.x86_64.rpm</filename><sum type="sha256">5937241501ac234e6e4689717e488d41b9739f301d114fb74317b3d42a1a07b7</sum></package><package arch="i686" name="gvfs-devel" release="1.el7" src="gvfs-1.36.2-1.el7.src.rpm" version="1.36.2"><filename>gvfs-devel-1.36.2-1.el7.i686.rpm</filename><sum type="sha256">4dc9b3438e2b1753b7df247235b455e6f30b43665d464d90af1f839a3584f819</sum></package><package arch="x86_64" name="compat-libical1" release="2.el7" src="libical-3.0.3-2.el7.src.rpm" version="1.0.1"><filename>compat-libical1-1.0.1-2.el7.x86_64.rpm</filename><sum type="sha256">27e38dd191b39a42238d8cebb06e6a2adef9f0c85f845caaec1f85a79041a85f</sum></package><package arch="x86_64" name="gvfs-goa" release="1.el7" src="gvfs-1.36.2-1.el7.src.rpm" version="1.36.2"><filename>gvfs-goa-1.36.2-1.el7.x86_64.rpm</filename><sum type="sha256">90d1899dde79a4a866888afcf0b5a3735cc3d05049d045ef4788dba19cd667fe</sum></package><package arch="x86_64" name="evolution-bogofilter" release="2.el7" src="evolution-3.28.5-2.el7.src.rpm" version="3.28.5"><filename>evolution-bogofilter-3.28.5-2.el7.x86_64.rpm</filename><sum type="sha256">bc353007fae975c2d3097b3ca6c9fd964ffc1f7e1b2ecae99cb3d5ff61c2c051</sum></package><package arch="x86_64" name="libchamplain" release="2.el7" src="libchamplain-0.12.16-2.el7.src.rpm" version="0.12.16"><filename>libchamplain-0.12.16-2.el7.x86_64.rpm</filename><sum type="sha256">2479caba7c795f4e360ed141887dfc5b001dba91f08a8ce79596cb0b3f1aab42</sum></package><package arch="noarch" name="yum-conf-sl7x" release="4.1.sl7" src="sl-release-7.2-4.1.sl7.src.rpm" version="7.2"><filename>yum-conf-sl7x-7.2-4.1.sl7.noarch.rpm</filename><sum type="sha256">0c78bdcefc6b19eea2c544243a51c5a9ceca2b8bbc72d761039a8544910bc3a1</sum></package><package arch="noarch" name="gupnp-docs" release="5.el7" src="gupnp-1.0.2-5.el7.src.rpm" version="1.0.2"><filename>gupnp-docs-1.0.2-5.el7.noarch.rpm</filename><sum type="sha256">84bc6704642bc8f9ffd1e20bd335801b5435a76488c9dc39891864963d9bd2c1</sum></package><package arch="x86_64" name="gedit-plugins-data" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugins-data-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">c60f9ca15133bcf13a9eae7e3a72e1bd3b4faba86063e7988d2862b40eb2fb2d</sum></package><package arch="x86_64" name="poppler-qt" release="20.el7" src="poppler-0.26.5-20.el7.src.rpm" version="0.26.5"><filename>poppler-qt-0.26.5-20.el7.x86_64.rpm</filename><sum type="sha256">13bf5e2802f34374ca514e75252a90a77bfeadbad384e2bada3d6ed004a139d5</sum></package><package arch="i686" name="gupnp" release="5.el7" src="gupnp-1.0.2-5.el7.src.rpm" version="1.0.2"><filename>gupnp-1.0.2-5.el7.i686.rpm</filename><sum type="sha256">b11b6d429ff58e52495060599ccb01153c8fd8a033965db3ddf626552efacb5b</sum></package><package arch="x86_64" name="libwayland-cursor" release="1.el7" src="wayland-1.15.0-1.el7.src.rpm" version="1.15.0"><filename>libwayland-cursor-1.15.0-1.el7.x86_64.rpm</filename><sum type="sha256">e0f6f603a0db4f1f415803ebfc0ef84a64c0c6b1a8034cf52a478672bafc078f</sum></package><package arch="x86_64" name="webkitgtk4-jsc-devel" release="1.el7" src="webkitgtk4-2.20.5-1.el7.src.rpm" version="2.20.5"><filename>webkitgtk4-jsc-devel-2.20.5-1.el7.x86_64.rpm</filename><sum type="sha256">c23c6c645957fc20bace95dbb81daf3f5cdd3a9ddffe6a46543931ac0b0bb392</sum></package><package arch="x86_64" name="gedit-plugin-bookmarks" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugin-bookmarks-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">7bf137eb23bdccc5ae51fd03677387201c384cca24936047ab4ae066f5b19a41</sum></package><package arch="i686" name="evince-devel" release="5.el7" src="evince-3.28.2-5.el7.src.rpm" version="3.28.2"><filename>evince-devel-3.28.2-5.el7.i686.rpm</filename><sum type="sha256">b7345f704cd4b55c6fb33943ef751c1e13b5624931750b748ee2e607e802cde0</sum></package><package arch="x86_64" name="webkitgtk4-plugin-process-gtk2" release="1.el7" src="webkitgtk4-2.20.5-1.el7.src.rpm" version="2.20.5"><filename>webkitgtk4-plugin-process-gtk2-2.20.5-1.el7.x86_64.rpm</filename><sum type="sha256">60ee38c886ec23385c7535c57d9a260c04dbf8e43321bc0953d0be41fc6ad486</sum></package><package arch="noarch" name="webkitgtk4-doc" release="1.el7" src="webkitgtk4-2.20.5-1.el7.src.rpm" version="2.20.5"><filename>webkitgtk4-doc-2.20.5-1.el7.noarch.rpm</filename><sum type="sha256">9442de763c670c8858b6203a42c1f707f93793d3091712cac0c151c3c3c55cdb</sum></package><package arch="i686" name="compat-libical1" release="2.el7" src="libical-3.0.3-2.el7.src.rpm" version="1.0.1"><filename>compat-libical1-1.0.1-2.el7.i686.rpm</filename><sum type="sha256">98858f99e2df57250f711e505db9c30679b907920b6a3ce4a908fa08d37faec9</sum></package><package arch="x86_64" name="fribidi" release="1.el7" src="fribidi-1.0.2-1.el7.src.rpm" version="1.0.2"><filename>fribidi-1.0.2-1.el7.x86_64.rpm</filename><sum type="sha256">13d6c6ac08cbaef901f2ff9b2e89e04bcc621f13301416dd82aa158ec1a2937a</sum></package><package arch="i686" name="gspell" release="1.el7" src="gspell-1.6.1-1.el7.src.rpm" version="1.6.1"><filename>gspell-1.6.1-1.el7.i686.rpm</filename><sum type="sha256">d506825ec0e77c77e0d1e52bef2deb26b8e940c1b1822fd384e552058cebdbaf</sum></package><package arch="i686" name="openchange-devel" release="3.el7" src="openchange-2.3-3.el7.src.rpm" version="2.3"><filename>openchange-devel-2.3-3.el7.i686.rpm</filename><sum type="sha256">5f3e62ef151af1b5aca811fd678010499d257e9c23272f5f6bedf951577d1cd6</sum></package><package arch="noarch" name="gnome-tweak-tool" release="2.el7" src="gnome-tweak-tool-3.28.1-2.el7.src.rpm" version="3.28.1"><filename>gnome-tweak-tool-3.28.1-2.el7.noarch.rpm</filename><sum type="sha256">5105a7c8ce7fc1fb7facc72928a663f52f579c2485870d7b326e3d7e7bd7cbdd</sum></package><package arch="i686" name="fontconfig" release="4.3.el7" src="fontconfig-2.13.0-4.3.el7.src.rpm" version="2.13.0"><filename>fontconfig-2.13.0-4.3.el7.i686.rpm</filename><sum type="sha256">0ab6d846bc28d5951c7020476b6f2b35eae7ec71f1d7832d597fe9aeb36f932f</sum></package><package arch="i686" name="libgee" release="1.el7" src="libgee-0.20.1-1.el7.src.rpm" version="0.20.1"><filename>libgee-0.20.1-1.el7.i686.rpm</filename><sum type="sha256">9b71339fa00c339f0d82f3dedd8a24518a200069b42fd3bd59f9129d14d709d3</sum></package><package arch="i686" name="cairo" release="3.el7" src="cairo-1.15.12-3.el7.src.rpm" version="1.15.12"><filename>cairo-1.15.12-3.el7.i686.rpm</filename><sum type="sha256">6bac471e5c377dc70a019ac76c3dc93b039ebbd8700f99ba6c1886d44089bc30</sum></package><package arch="x86_64" name="gtksourceview3" release="1.el7" src="gtksourceview3-3.24.8-1.el7.src.rpm" version="3.24.8"><filename>gtksourceview3-3.24.8-1.el7.x86_64.rpm</filename><sum type="sha256">ea43a6e51edfe231cfe2ac12842f4870b9c67c4bcf462eed81dd236e0e906461</sum></package><package arch="x86_64" name="gvfs-client" release="1.el7" src="gvfs-1.36.2-1.el7.src.rpm" version="1.36.2"><filename>gvfs-client-1.36.2-1.el7.x86_64.rpm</filename><sum type="sha256">ea649cd1ddaa3a84a48d80819d405aa86350218b20887189a6361eb3e0d5e9d3</sum></package><package arch="x86_64" name="libgweather-devel" release="2.el7" src="libgweather-3.28.2-2.el7.src.rpm" version="3.28.2"><filename>libgweather-devel-3.28.2-2.el7.x86_64.rpm</filename><sum type="sha256">7ddcfcca6085b673ac7cfb165d81afe2c149baacdce3b8de614e9db7c1c8a7ec</sum></package><package arch="noarch" name="appstream-data" release="20180614.el7" src="appstream-data-7-20180614.el7.src.rpm" version="7"><filename>appstream-data-7-20180614.el7.noarch.rpm</filename><sum type="sha256">2e3dada3c60a742f654c231a3a4d4021c474da7b9c41534ec87ed8c231f1858c</sum></package><package arch="x86_64" name="json-glib-devel" release="2.el7" src="json-glib-1.4.2-2.el7.src.rpm" version="1.4.2"><filename>json-glib-devel-1.4.2-2.el7.x86_64.rpm</filename><sum type="sha256">137e3b6d041919c4f8d15469543761fb98c4aa9ab43e3c5ad5ba6b2449a56b21</sum></package><package arch="x86_64" name="brasero" release="5.el7" src="brasero-3.12.2-5.el7.src.rpm" version="3.12.2"><filename>brasero-3.12.2-5.el7.x86_64.rpm</filename><sum type="sha256">492ce6d453ab3b59afb7adf1b4b840fbae9da482c6df7e1c9bf74fe598d86665</sum></package><package arch="x86_64" name="libwnck3" release="2.el7" src="libwnck3-3.24.1-2.el7.src.rpm" version="3.24.1"><filename>libwnck3-3.24.1-2.el7.x86_64.rpm</filename><sum type="sha256">cac7adb27774134cfb8014993e48e4deedcd80429a4460a8b84c002524e0fa6c</sum></package><package arch="x86_64" name="ekiga" release="8.el7" src="ekiga-4.0.1-8.el7.src.rpm" version="4.0.1"><filename>ekiga-4.0.1-8.el7.x86_64.rpm</filename><sum type="sha256">4317ca7ef1a3aacaded69287315207cfad44a02450a3e61e77fc2cd21b40c716</sum></package><package arch="i686" name="nautilus-extensions" release="2.el7" src="nautilus-3.26.3.1-2.el7.src.rpm" version="3.26.3.1"><filename>nautilus-extensions-3.26.3.1-2.el7.i686.rpm</filename><sum type="sha256">aaa8f6d9c5bf8111528299e38299fc654151c1ba4ef4f0de95a0d071cd7656db</sum></package><package arch="x86_64" name="gvfs-tests" release="1.el7" src="gvfs-1.36.2-1.el7.src.rpm" version="1.36.2"><filename>gvfs-tests-1.36.2-1.el7.x86_64.rpm</filename><sum type="sha256">7bf6b14a46a66689b3acbd9841b7710a1a8ace9128fc8ed5e2a947b791f0d994</sum></package><package arch="x86_64" name="libgdata-devel" release="1.el7" src="libgdata-0.17.9-1.el7.src.rpm" version="0.17.9"><filename>libgdata-devel-0.17.9-1.el7.x86_64.rpm</filename><sum type="sha256">20fbf66239fdf22de94df0e94981a73d758ad63c9d0bba09cb4916a17f077bf0</sum></package><package arch="x86_64" name="libgepub" release="1.el7" src="libgepub-0.6.0-1.el7.src.rpm" version="0.6.0"><filename>libgepub-0.6.0-1.el7.x86_64.rpm</filename><sum type="sha256">6e0816d5aa39e9562a76700277fcadd3efd23b4f3b7c1fa37513bae3ff4b3f27</sum></package><package arch="i686" name="gstreamer1-plugins-base-devel" release="2.el7" src="gstreamer1-plugins-base-1.10.4-2.el7.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-base-devel-1.10.4-2.el7.i686.rpm</filename><sum type="sha256">f9411d8bdfaeb6c01a76fcb5b90714b9e7352945186e07b86f1096b10713c9bd</sum></package><package arch="x86_64" name="libpeas-loader-python" release="1.el7" src="libpeas-1.22.0-1.el7.src.rpm" version="1.22.0"><filename>libpeas-loader-python-1.22.0-1.el7.x86_64.rpm</filename><sum type="sha256">9f438cb0c0043b926cda6ff3f53e2607a43727b095f989e80b61f6cbfe5867b2</sum></package><package arch="i686" epoch="1" name="devhelp-libs" release="1.el7" src="devhelp-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>devhelp-libs-3.28.1-1.el7.i686.rpm</filename><sum type="sha256">8d14f2192c7a097ecf36dbd32cfa20be4b1cc9e37dee3c4d7b666cb563c8c9e9</sum></package><package arch="x86_64" name="gnome-desktop3" release="2.el7" src="gnome-desktop3-3.28.2-2.el7.src.rpm" version="3.28.2"><filename>gnome-desktop3-3.28.2-2.el7.x86_64.rpm</filename><sum type="sha256">b73599533a727c7a8b730d611a939c80706219352f0b69a3464c0b74c7d2838d</sum></package><package arch="x86_64" name="gedit-plugin-translate" release="1.el7" src="gedit-plugins-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-plugin-translate-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">28191ad7f43675f26a4868316b7d4e39948104a90a4cdd816bcd9a8e08ac1d18</sum></package><package arch="i686" name="libwnck3" release="2.el7" src="libwnck3-3.24.1-2.el7.src.rpm" version="3.24.1"><filename>libwnck3-3.24.1-2.el7.i686.rpm</filename><sum type="sha256">bdb3c59ae8b9d5f546904c55534272aac7d6dedb3733aff0d88ac5f58f0b2797</sum></package><package arch="i686" name="gnote" release="1.el7" src="gnote-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gnote-3.28.0-1.el7.i686.rpm</filename><sum type="sha256">ab79c668a1dbb641d4eda24ba3775bf96e08819d4627c3b64d3ca1098a8615c6</sum></package><package arch="x86_64" name="libgexiv2" release="1.el7" src="libgexiv2-0.10.8-1.el7.src.rpm" version="0.10.8"><filename>libgexiv2-0.10.8-1.el7.x86_64.rpm</filename><sum type="sha256">b9f4d34c81f7f22e4388b9a3f03f6d029e4490faeb25679d95f6f0f213956147</sum></package><package arch="i686" name="libical" release="2.el7" src="libical-3.0.3-2.el7.src.rpm" version="3.0.3"><filename>libical-3.0.3-2.el7.i686.rpm</filename><sum type="sha256">86b918889db9c39db4a373ac545b409a2ec031d2db975d6856efadc86f116236</sum></package><package arch="x86_64" name="gnome-disk-utility" release="1.el7" src="gnome-disk-utility-3.28.3-1.el7.src.rpm" version="3.28.3"><filename>gnome-disk-utility-3.28.3-1.el7.x86_64.rpm</filename><sum type="sha256">d472e9969120cf849ed00e5268dc67a5e4fbef45ff3e554562740ca640dd370b</sum></package><package arch="i686" name="evince-libs" release="5.el7" src="evince-3.28.2-5.el7.src.rpm" version="3.28.2"><filename>evince-libs-3.28.2-5.el7.i686.rpm</filename><sum type="sha256">d1f36e281a118939df9c4a4c39aaf371c480897cb7736617d8d38671b6366141</sum></package><package arch="noarch" name="gnome-shell-extension-window-list" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-window-list-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">dc1eb98017771d6f35dd8795a13ce9d08679eeedcb5392352e2098f5c92a0777</sum></package><package arch="x86_64" name="PackageKit-glib" release="1.sl7" src="PackageKit-1.1.10-1.sl7.src.rpm" version="1.1.10"><filename>PackageKit-glib-1.1.10-1.sl7.x86_64.rpm</filename><sum type="sha256">522a30b687e407571244729d62c6c2786dbe82dfe2f01d4ad8cfc53a50c08245</sum></package><package arch="noarch" name="gnome-shell-extension-launch-new-instance" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-launch-new-instance-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">deaff88e3260ae7bf7ceddd561f5a8ca34708e2d446d0367d0f5e9c4fa185178</sum></package><package arch="x86_64" epoch="2" name="cheese-libs-devel" release="1.el7" src="cheese-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>cheese-libs-devel-3.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">a9df97b76bf19692c8ac0b765ac0afc871c8b14700ca8118de9bc5abfdedc2fd</sum></package><package arch="x86_64" name="evince-browser-plugin" release="5.el7" src="evince-3.28.2-5.el7.src.rpm" version="3.28.2"><filename>evince-browser-plugin-3.28.2-5.el7.x86_64.rpm</filename><sum type="sha256">37e584a743106e0d2b25d09ddc0c6ccd544d82a783862ff1a5f8972fa244c13a</sum></package><package arch="i686" name="glade-libs" release="1.el7" src="glade-3.22.1-1.el7.src.rpm" version="3.22.1"><filename>glade-libs-3.22.1-1.el7.i686.rpm</filename><sum type="sha256">b3502e08cd4d0696dcb6182f3efd1e5ef4545ca64c53bb2121d3df7d17aa2ec4</sum></package><package arch="x86_64" name="gupnp" release="5.el7" src="gupnp-1.0.2-5.el7.src.rpm" version="1.0.2"><filename>gupnp-1.0.2-5.el7.x86_64.rpm</filename><sum type="sha256">6ffa45cb44633df457b40c60b3b6ff87df703861a77f8265556132dab7b7a2f0</sum></package><package arch="i686" name="libgee-devel" release="1.el7" src="libgee-0.20.1-1.el7.src.rpm" version="0.20.1"><filename>libgee-devel-0.20.1-1.el7.i686.rpm</filename><sum type="sha256">28167ed744286ce57f7288923a260efab2e7085c191853eee2dbaaaebace9374</sum></package><package arch="i686" name="libappstream-glib-builder" release="2.el7" src="libappstream-glib-0.7.8-2.el7.src.rpm" version="0.7.8"><filename>libappstream-glib-builder-0.7.8-2.el7.i686.rpm</filename><sum type="sha256">a5eee84abe50477a226dd2d108d1976b52edb5f11a614b6067ca73a98c3f980c</sum></package><package arch="x86_64" name="gvfs-afp" release="1.el7" src="gvfs-1.36.2-1.el7.src.rpm" version="1.36.2"><filename>gvfs-afp-1.36.2-1.el7.x86_64.rpm</filename><sum type="sha256">623330e4c458f89a59dc3ace106a6655116385a5660ea53f39f665c1bc297252</sum></package><package arch="x86_64" name="libjpeg-turbo-devel" release="6.el7" src="libjpeg-turbo-1.2.90-6.el7.src.rpm" version="1.2.90"><filename>libjpeg-turbo-devel-1.2.90-6.el7.x86_64.rpm</filename><sum type="sha256">5d5c799f094ad36c110a60bec4037d26e359e1793fa02077544b2eebdc1e2d21</sum></package><package arch="x86_64" epoch="2" name="gedit-devel" release="1.el7" src="gedit-3.28.1-1.el7.src.rpm" version="3.28.1"><filename>gedit-devel-3.28.1-1.el7.x86_64.rpm</filename><sum type="sha256">d0e848bc808087fba8b893b0c17cba4895c0c637d152d49ce453b3113dcdc8f8</sum></package><package arch="i686" name="librsvg2" release="1.el7" src="librsvg2-2.40.20-1.el7.src.rpm" version="2.40.20"><filename>librsvg2-2.40.20-1.el7.i686.rpm</filename><sum type="sha256">2dc9fa81a5470649f353119742fd33409d3c4b394489a538ed080430f8b8f5e2</sum></package><package arch="i686" name="libwayland-server" release="1.el7" src="wayland-1.15.0-1.el7.src.rpm" version="1.15.0"><filename>libwayland-server-1.15.0-1.el7.i686.rpm</filename><sum type="sha256">0a029a39644916a3ba662a02aa62fbb06f9eeae68a936b1fc91d4b577191b897</sum></package><package arch="x86_64" name="gnome-font-viewer" release="1.el7" src="gnome-font-viewer-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gnome-font-viewer-3.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">9041ef4e1cfafdf6db8ba798ab19998568cf5b2927f378b35346c8f1b1e4d481</sum></package><package arch="x86_64" name="pango-tests" release="1.el7" src="pango-1.42.4-1.el7.src.rpm" version="1.42.4"><filename>pango-tests-1.42.4-1.el7.x86_64.rpm</filename><sum type="sha256">149f3c0f07d876a98a0fe7789cb87c1d7947679fb60e51ea4d4a06ef04b5ebf2</sum></package><package arch="i686" name="gjs" release="1.el7" src="gjs-1.52.3-1.el7.src.rpm" version="1.52.3"><filename>gjs-1.52.3-1.el7.i686.rpm</filename><sum type="sha256">38ec27be034859add6737c056e7abf7cba9a087a54ca05cdfe2e7a2ba7865a33</sum></package><package arch="noarch" name="gnome-shell-extension-common" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-common-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">32d5f7ca9e1f36fb4fdf92384592feb6ef8c5a8a981df83eff650910565bc6ec</sum></package><package arch="x86_64" name="gcr-devel" release="1.el7" src="gcr-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gcr-devel-3.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">efe5dcee2eb85ee63706dd17bf95cb90e8208bdd3cbb0bcb8493f812d6be2b16</sum></package><package arch="x86_64" name="geoclue2-libs" release="1.el7" src="geoclue2-2.4.8-1.el7.src.rpm" version="2.4.8"><filename>geoclue2-libs-2.4.8-1.el7.x86_64.rpm</filename><sum type="sha256">b3bd5c2f8bd0fa22a5bab272b66eec328443a54db67753d340591094edb8f556</sum></package><package arch="x86_64" name="libosinfo-devel" release="2.el7" src="libosinfo-1.1.0-2.el7.src.rpm" version="1.1.0"><filename>libosinfo-devel-1.1.0-2.el7.x86_64.rpm</filename><sum type="sha256">ab0c57946fc4b790190f4dfb1d341c5d13145afd9fd4e88539f707b114d5cad8</sum></package><package arch="x86_64" name="gucharmap" release="1.el7" src="gucharmap-10.0.4-1.el7.src.rpm" version="10.0.4"><filename>gucharmap-10.0.4-1.el7.x86_64.rpm</filename><sum type="sha256">0f45a631676a142474f1ced97803a7092574d53d674af1c3bb1af4f39c956abc</sum></package><package arch="x86_64" name="gnome-software" release="3.el7" src="gnome-software-3.28.2-3.el7.src.rpm" version="3.28.2"><filename>gnome-software-3.28.2-3.el7.x86_64.rpm</filename><sum type="sha256">d31ddaad0314d9ebc4882824babb5b80f23e082e8dbadd4e140a1312698686ce</sum></package><package arch="noarch" name="gnome-shell-extension-panel-favorites" release="5.el7" src="gnome-shell-extensions-3.28.1-5.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-panel-favorites-3.28.1-5.el7.noarch.rpm</filename><sum type="sha256">a940ccf4a44846ef56c703d783e5ce8fa0dc65cfd7f238921763fcab1f047478</sum></package><package arch="x86_64" name="glib2-static" release="2.el7" src="glib2-2.56.1-2.el7.src.rpm" version="2.56.1"><filename>glib2-static-2.56.1-2.el7.x86_64.rpm</filename><sum type="sha256">d736fea0105c48a5ac1207616def3a3407d9e09d707630d8ed12a31e007c5126</sum></package><package arch="x86_64" name="dconf-editor" release="1.el7" src="dconf-editor-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>dconf-editor-3.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">0704d0b55730ab5291838be2bf6398756d54c84d8ce5bb5bac795b9934556a18</sum></package><package arch="i686" name="shotwell" release="1.el7" src="shotwell-0.28.4-1.el7.src.rpm" version="0.28.4"><filename>shotwell-0.28.4-1.el7.i686.rpm</filename><sum type="sha256">048acea7793a1ea2c9d17226a52cc5dac46e591b827e6f7550509736d623ad52</sum></package><package arch="i686" name="libchamplain-devel" release="2.el7" src="libchamplain-0.12.16-2.el7.src.rpm" version="0.12.16"><filename>libchamplain-devel-0.12.16-2.el7.i686.rpm</filename><sum type="sha256">9ee250be245be8c507777d7729e26fcdb42cfb4fca063610e4eb54ee391cfd64</sum></package><package arch="x86_64" name="gnome-online-accounts-devel" release="1.el7" src="gnome-online-accounts-3.28.0-1.el7.src.rpm" version="3.28.0"><filename>gnome-online-accounts-devel-3.28.0-1.el7.x86_64.rpm</filename><sum type="sha256">d0ad59a25502047a460ee8954d8c92c947521dc87ebcaed363a23655dcf54b6b</sum></package><package arch="x86_64" name="libgnomekbd" release="1.el7" src="libgnomekbd-3.26.0-1.el7.src.rpm" version="3.26.0"><filename>libgnomekbd-3.26.0-1.el7.x86_64.rpm</filename><sum type="sha256">0a63f76bf3013280c93bf22029cee6fab6aeb3f115eeb5bd139f288007ea6128</sum></package><package arch="i686" name="libgdata" release="1.el7" src="libgdata-0.17.9-1.el7.src.rpm" version="0.17.9"><filename>libgdata-0.17.9-1.el7.i686.rpm</filename><sum type="sha256">f310f60be43267b22c87a8fbab86b9afad3cdcaa7e0f4fae0e538e7f26aa926f</sum></package><package arch="noarch" name="gnome-getting-started-docs-pt_BR" release="1.el7" src="gnome-getting-started-docs-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-getting-started-docs-pt_BR-3.28.2-1.el7.noarch.rpm</filename><sum type="sha256">d26edb377427eaf91ed639414bab983f3145312335fa52b3b2b83fdac55ac4dc</sum></package><package arch="i686" name="gssdp" release="1.el7" src="gssdp-1.0.2-1.el7.src.rpm" version="1.0.2"><filename>gssdp-1.0.2-1.el7.i686.rpm</filename><sum type="sha256">063656535fd5e9125f901c8b9cefcec394bfe38c2b057037fbcd7d9481f801a8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18267" id="CVE-2017-18267" title="Poppler: Infinite Recursion In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10733" id="CVE-2018-10733" title="Libgxps: Heap Based Buffer Over Read In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10767" id="CVE-2018-10767" title="Libgxps: Stack-Based Buffer Overflow In Calling " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10768" id="CVE-2018-10768" title="Poppler: Null Pointer Dereference In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12910" id="CVE-2018-12910" title="Libsoup: Crash In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13988" id="CVE-2018-13988" title="Poppler: Out Of Bounds Read In Pdfunite" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3140" id="RHSA-2018:3140-1" title="Rhsa-2018:3140-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1309776" id="1309776" title="[Abrt] Gvfs-Mtp: Sync_Transfer_Wait_For_Completion(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347188" id="1347188" title="[Abrt] [Faf] Gnome-Shell: Gray_Record_Cell(): " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396775" id="1396775" title="Cover Art Placeholder Visible When Viewing Disabled." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1415697" id="1415697" title="No Authentication Dialog For Samba Printers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1423374" id="1423374" title="Gnome-Shell Crashes With Signal 11 Due To Null Value Passed To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1451211" id="1451211" title="File Conflicts When Updating Totem" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1473167" id="1473167" title="There Is A Null Pointer Dereference  In Gxps-Archive.C In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1484094" id="1484094" title="Fontconfig-2.10.95-11.El7 Pulls Random Fonts As A Dependency" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1486064" id="1486064" title="Gsd Selects Incorrect Backlight On Some Drm Prime Configurations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1491720" id="1491720" title="Reproducer: Failed Assertion By Input Through A Pipe And Then " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1497303" id="1497303" title="X No Longer Activates Hotplugged Monitors If Started Without One" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1501989" id="1501989" title="Need To Be Able To Have Different Language Keyboard Layout As " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1502788" id="1502788" title="Gdkscreen-X11: Don'T Try To Calculate A Refresh Rate When The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1503624" id="1503624" title="Webkitgtk4: Crash On Google Login Page When A11Y Is Active" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1504129" id="1504129" title="Request For Evolution 3.28 Series (Latest Stable)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1507892" id="1507892" title="Bad Post Install Scripts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1511454" id="1511454" title="Inconsistent Shell Version Shown On Multiple Places" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1514182" id="1514182" title="The System Menu Shows A Blank Space In The Vpn Item" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1520936" id="1520936" title="Unable To Authenticate Using Kerberos Without Krb5-Auth-Dialog " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1521077" id="1521077" title="Input Of '?', '&#196;', '&#214;', '&#220;', Etc With Gnome Osk" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1524375" id="1524375" title="Bashism In /Etc/Profile.D/Flatpak.Sh" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1541180" id="1541180" title="[Rfe] Applications With Similar Icons And Names Are " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1542702" id="1542702" title="Unexpanded Rpm Macro In Gdm Scripts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1559001" id="1559001" title="Rebase To Latest Stable Version" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567040" id="1567040" title="Gnome Tweak Tool Still Enables User To Select Scaling Factor" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567131" id="1567131" title="Rebase Adwaita-Icon-Theme To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567135" id="1567135" title="Rebase At-Spi2-Atk To 2.26.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567145" id="1567145" title="Rebase At-Spi2-Core To 2.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567158" id="1567158" title="Rebase Atk To 2.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567161" id="1567161" title="Rebase Baobab To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567170" id="1567170" title="Rebase Cheese To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567179" id="1567179" title="Rebase Control-Center To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567184" id="1567184" title="Rebase Dconf To 0.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567185" id="1567185" title="Rebase Eog To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567186" id="1567186" title="Rebase Evince To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567187" id="1567187" title="Rebase File-Roller To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567199" id="1567199" title="Rebase Gcr To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567200" id="1567200" title="Rebase Gdm To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567311" id="1567311" title="Rebase Gedit To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567313" id="1567313" title="Rebase Geocode-Glib To 3.26.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567325" id="1567325" title="Rebase Gjs To 1.52.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567374" id="1567374" title="Rebase Glib-Networking To 2.56.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567375" id="1567375" title="Rebase Glib2 To 2.56.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567380" id="1567380" title="Rebase Glibmm24 To 2.54.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567381" id="1567381" title="Rebase Gnome-Bluetooth To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567399" id="1567399" title="Rebase Gnome-Boxes To 3.28.5" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567475" id="1567475" title="Rebase Gnome-Calculator To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567476" id="1567476" title="Rebase Gnome-Clocks To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567477" id="1567477" title="Rebase Gnome-Color-Manager To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567478" id="1567478" title="Rebase Gnome-Contacts To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1567479" id="1567479" title="Rebase Gnome-Desktop To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568169" id="1568169" title="Rebase Gnome-Dicitionary To 3.26.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568170" id="1568170" title="Rebase Gnome-Disk-Utility To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568171" id="1568171" title="Rebase Gnome-Documents To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568172" id="1568172" title="Rebase Gnome-Font-Viewer To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568174" id="1568174" title="Rebase Gnome-Getting-Started-Docs To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568175" id="1568175" title="Rebase Gnome-Initial-Setup To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568176" id="1568176" title="Rebase Gnome-Keyring To 3.28.0.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568177" id="1568177" title="Rebase Gnome-Online-Accounts To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568229" id="1568229" title="Rebase Gnome-Online-Miners To 3.26.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568232" id="1568232" title="Rebase Gnome-Packagekit To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568233" id="1568233" title="Rebase Gnome-Screenshot To 3.26.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568618" id="1568618" title="Exiv2-Libs In Rhel 7.5 Not Backwards Compatible With Earlier " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568620" id="1568620" title="Rebase Gnome-Session To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568621" id="1568621" title="Rebase Gnome-Settings-Daemon To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568624" id="1568624" title="Rebase Gnome-Shell To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568625" id="1568625" title="Rebase Gnome-Software To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568626" id="1568626" title="Rebase Gnome-System-Monitor To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568632" id="1568632" title="Rebase Gnome-Terminal To 3.28.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568633" id="1568633" title="Rebase Gnome-Themes-Standard To 3.27.90" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568638" id="1568638" title="Rebase Gnome-Tweak-Tool To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568968" id="1568968" title="Fc-Cache In Multilib Does Not Create 32Bit Cache Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569268" id="1569268" title="Rebase Gnome-User-Docs To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569272" id="1569272" title="Rebase Gobject-Introspection To 1.56.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569273" id="1569273" title="Rebase Gsettings-Desktop-Schemas To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569277" id="1569277" title="Rebase Gspell To 1.6,1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569278" id="1569278" title="Rebase Gtksourceview3 To 3.24.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569279" id="1569279" title="Rebase Gucharmap To 10.0.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569281" id="1569281" title="Rebase Gvfs To 1.36.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569284" id="1569284" title="Rebase Json-Glib To 1.4.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569285" id="1569285" title="Rebase Libgee To 0.20.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569288" id="1569288" title="Rebase Libgepup To 0.5.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569289" id="1569289" title="Rebase Libgnomekbd To 3.26.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569294" id="1569294" title="Rebase Libgtop2 To 2.38.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569295" id="1569295" title="Rebase Libgweather To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569717" id="1569717" title="Rebase Gnome-Shell-Extensions To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569718" id="1569718" title="Rebase Dconf-Editor To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569719" id="1569719" title="Rebase Devhelp To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569721" id="1569721" title="Rebase Gedit-Plugins To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569723" id="1569723" title="Rebase Glade To 3.22.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569727" id="1569727" title="Rebase Gnome-Backgrounds To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569728" id="1569728" title="Rebase Gnome-Devel-Docs To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569730" id="1569730" title="Rebase Gnote To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569731" id="1569731" title="Rebase Libgxps To 0.3.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569732" id="1569732" title="Rebase Libpeas To 1.22.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569733" id="1569733" title="Rebase Librsvg2 To 2.40.20" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569734" id="1569734" title="Rebase Libsoup To 2.62.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569735" id="1569735" title="Rebase Libwnck3 To 3.24.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569736" id="1569736" title="Rebase Mutter To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569738" id="1569738" title="Rebase Nautilus To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569748" id="1569748" title="Rebase Pango To 1.42.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569757" id="1569757" title="Rebase Pyatspi To 2.26.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569784" id="1569784" title="Rebase Seahorse-Nautilus To 3.11.92" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569785" id="1569785" title="Rebase Shotwell To 0.28.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569786" id="1569786" title="Rebase Sushi To 3.24.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569787" id="1569787" title="Rebase Totem To 3.26.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569789" id="1569789" title="Rebase Totem-Pl-Parser To 3.26.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569794" id="1569794" title="Rebase Vala To 0.40.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569801" id="1569801" title="Rebase Vte291 To 0.52.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569802" id="1569802" title="Rebase Yelp To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569805" id="1569805" title="Rebase Yelp-Tools To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569806" id="1569806" title="Rebase Yelp-Xsl To 3.28.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569809" id="1569809" title="Rebase Zenity To 3.28.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569810" id="1569810" title="Rebase Brasero To 3.12.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569811" id="1569811" title="Rebase Clutter-Gst3 To 3.0.26" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569812" id="1569812" title="Rebase Empathy To 3.12.13" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569814" id="1569814" title="Rebase Folks To 0.11.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569815" id="1569815" title="Rebase Gdk-Pixbuf2 To 2.36.12" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569961" id="1569961" title="Rebase Gom To 0.3.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569962" id="1569962" title="Rebase Grilo To 0.3.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569963" id="1569963" title="Rebase Grilo-Plugins To 0.3.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569965" id="1569965" title="Rebase Gssdp To 1.0.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569971" id="1569971" title="Rebase Gtk-Doc To 1.28" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569975" id="1569975" title="Rebase Gtk3 To 3.22.30" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569980" id="1569980" title="Rebase Gupnp To 1.0.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569988" id="1569988" title="Rebase Gupnp-Igd To 0.2.5" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569989" id="1569989" title="Rebase Libchamplain To 0.12.16" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569991" id="1569991" title="Rebase Libcroco To 0.6.12" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570004" id="1570004" title="Rebase Libgdata To 0.17.9" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570008" id="1570008" title="Rebase Libgexiv2 To 0.10.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570009" id="1570009" title="Rebase Libmediaart To 1.9.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570013" id="1570013" title="Rebase Libsecret To 0.18.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570015" id="1570015" title="Rebase Nautilus-Sendto To 3.8.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570023" id="1570023" title="Rebase Rest To 0.8.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570024" id="1570024" title="Rebase Rhythmbox To 3.4.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570025" id="1570025" title="Rebase Libappstream-Glib To 0.7.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570028" id="1570028" title="Rebase Fwupd To 1.0.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570030" id="1570030" title="Rebase Flatpak To 1.0.X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570031" id="1570031" title="Rebase Appstream-Data" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570032" id="1570032" title="Rebase Fwupdate To 12" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570569" id="1570569" title="Dconf Database Corrupted With No Error Messages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1571422" id="1571422" title="Kvm Is No Longer Responding To Mouse &amp; Keyboard After Lock/Unlock" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1573622" id="1573622" title="Dash To Dock Broken In 7.5" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1574844" id="1574844" title="Heap Buffer Overflow In Ft_Font_Face_Hash Of Gxps-Fonts.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1575188" id="1575188" title="Stack Buffer Overflow In Calling Glib In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1575495" id="1575495" title="Rebase Evolution-Data-Server To 3.28.X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1575499" id="1575499" title="Rebase Evolution-Ews To 3.28.X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1575500" id="1575500" title="Rebase Evolution-Mapi To 3.28.X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576111" id="1576111" title="Libgxps: Heap Based Buffer Over Read In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576169" id="1576169" title="Poppler: Null Pointer Dereference In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576175" id="1576175" title="Libgxps: Stack-Based Buffer Overflow In Calling " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576494" id="1576494" title="Rebase Packagekit To 1.1.10" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576501" id="1576501" title="Rebase Fontconfig To 2.13.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576504" id="1576504" title="Rebase Freetype To 2.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576535" id="1576535" title="Rebase Cairo To 1.15.12" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576536" id="1576536" title="Rebase Harfbuzz To 1.7.5" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576537" id="1576537" title="Rebase Fribidi To 1.0.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576538" id="1576538" title="Rebase Accountsservice To 0.6.48" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576541" id="1576541" title="Rebase Geoclue2 To 2.4.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1576544" id="1576544" title="Rebase Webkitgtk4 To 2.20.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1578777" id="1578777" title="Poppler: Infinite Recursion In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1580577" id="1580577" title="Vino Binds To All Interfaces When Network Interface " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1581308" id="1581308" title="Port Fix For 1510089 To 7.4.Z" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1581454" id="1581454" title="Mutter Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1584245" id="1584245" title="Rebase Upower To 0.99.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1584263" id="1584263" title="Rebase Libosinfo To 1.1.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1584266" id="1584266" title="Rebase Libgovirt To 0.3.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1584655" id="1584655" title="Rebase Libical To 3.X Version" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1585230" id="1585230" title="Mutter Overrides Xorg.Conf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1590537" id="1590537" title="Race Between Gnome-Pty-Helper And Vteterminal Leads To A " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1590848" id="1590848" title="Tweak Tool Fails To Start" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1591614" id="1591614" title="Missing &quot;Gnome On Wayland' Option" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1591638" id="1591638" title="Webkitwebprocess Crashes When A11Y Is Active" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1591792" id="1591792" title="Can'T &quot;Compress...&quot; With Nautilus-3.26.3.1-2.El7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1592809" id="1592809" title="Missing Source Entries In Search Results" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1593215" id="1593215" title="'Org.Gnome.Settingsdaemon.Diskutilitynotify.Desktop' Failed To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1593244" id="1593244" title="Evince Prints &quot;Glib-Critical **: G_Variant_New_String: " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1593356" id="1593356" title="Systemd-Udevd Complains About Invalid Key/Value Pair In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1593782" id="1593782" title="Gnome-Shell Crash After Mutter Update" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1594725" id="1594725" title="Fails To Modify Meeting Component" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1594814" id="1594814" title="Gdm Killed By Sigabrt After Login" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1594880" id="1594880" title="Missing Icon For Thunderbolt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1596735" id="1596735" title="Accountsservice System Account Misclassification" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1597339" id="1597339" title="User Session Is Terminated After User Switch" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1597350" id="1597350" title="Switch User Is Missing In System Menu" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1597353" id="1597353" title="Settings Schema 'Org.Gnome.Settings-Daemon.Plugins.Account' Is " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1597764" id="1597764" title="Adwaita-Lock.Jpg Is Missing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1597860" id="1597860" title="Evince Is Sometimes Rendered Incorrectly And Cannot Be Controlled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1597980" id="1597980" title="Libsoup: Crash In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1599841" id="1599841" title="Corrupt Application Icon In Gnome Classic Theme" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600079" id="1600079" title="Wrong Entry In Secure Log When User Login Description" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600560" id="1600560" title="Gnome-Session-Xsession Ships Gnome-Session-Custom-Session " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1601598" id="1601598" title="Gdm Upgrade Problem" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1602838" id="1602838" title="Poppler: Out Of Bounds Read In Pdfunite" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1608936" id="1608936" title="Garbage Collector Complains During Shutdown" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1610324" id="1610324" title="Rebuild Openchange Against Updated Samba" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1611565" id="1611565" title="Crash On Right-Click On Local Collection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1612983" id="1612983" title="Keyboard Disfunction On Gnome Screen" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1613813" id="1613813" title="[Abrt] [Faf] Crash Under Config_Lookup_Thread() At " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1624842" id="1624842" title="Multilib Regression In Json-Glib" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625700" id="1625700" title="On Screen Keyboard Not Visible To Access With Gtk Apps" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625906" id="1625906" title="[Rhel7.6] Google-Noto-Emoji Fonts Doesn'T Input Color Emoji" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1626104" id="1626104" title="Obsolete Gnome-Shell-Browser-Plugin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1628587" id="1628587" title="Include Default Lock Screen Background To Redhat-Logos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1633828" id="1633828" title="Add Missing Obsoletes For Evolution-Mapi-Devel Subpackage" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3157-1</id><title>Curl And Nss-Pem</title><description>Security Fix(es): 
* curl: HTTP authentication leak in redirects (CVE-2018-1000007) 
* curl: FTP path trickery leads to NIL byte out of bounds write (CVE-2018-1000120) 
* curl: RTSP RTP buffer over-read (CVE-2018-1000122) 
* curl: Out-of-bounds heap read when missing RTSP headers allows information leak of denial of service (CVE-2018-1000301) 
* curl: LDAP NULL pointer dereference (CVE-2018-1000121)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libcurl-devel" release="51.el7" src="curl-7.29.0-51.el7.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-51.el7.i686.rpm</filename><sum type="sha256">9788e8e038bcbe21da7be035a83315d4eab9a839aa3e3cf17a2ab4fd233cc690</sum></package><package arch="x86_64" name="libcurl-devel" release="51.el7" src="curl-7.29.0-51.el7.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-51.el7.x86_64.rpm</filename><sum type="sha256">fa0a3f981fda93606f13bd6184954a18bb6caa33da08ccee7c2090d08a64a99f</sum></package><package arch="x86_64" name="libcurl" release="51.el7" src="curl-7.29.0-51.el7.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-51.el7.x86_64.rpm</filename><sum type="sha256">8b0635ebde69a51e48e6f28db440456d20ef959229bee4b8d2f201e4fd3e03f0</sum></package><package arch="x86_64" name="curl" release="51.el7" src="curl-7.29.0-51.el7.src.rpm" version="7.29.0"><filename>curl-7.29.0-51.el7.x86_64.rpm</filename><sum type="sha256">646c8380b06b442c6fe1be35e29bfc55af68b03045136278a8b9b74f19c17eb0</sum></package><package arch="i686" name="nss-pem" release="5.el7" src="nss-pem-1.0.3-5.el7.src.rpm" version="1.0.3"><filename>nss-pem-1.0.3-5.el7.i686.rpm</filename><sum type="sha256">8a3fb1e71607fb77cc315e01797fcd7953f310071588b19ef80cc36dad1e4703</sum></package><package arch="x86_64" name="nss-pem" release="5.el7" src="nss-pem-1.0.3-5.el7.src.rpm" version="1.0.3"><filename>nss-pem-1.0.3-5.el7.x86_64.rpm</filename><sum type="sha256">1389d8fee372d7f192a0fb8158bda3b38bba28903304c7e48bde2b24027b27a9</sum></package><package arch="i686" name="libcurl" release="51.el7" src="curl-7.29.0-51.el7.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-51.el7.i686.rpm</filename><sum type="sha256">5c04503a742e69870b2125f8c1f893849278c9d3f5683df9670a87f3d975a774</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000007" id="CVE-2018-1000007" title="Curl: Http Authentication Leak In Redirects" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000120" id="CVE-2018-1000120" title="Curl: Ftp Path Trickery Leads To Nil Byte Out " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000121" id="CVE-2018-1000121" title="Curl: Ldap Null Pointer Dereference" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000122" id="CVE-2018-1000122" title="Curl: Rtsp Rtp Buffer Over-Read" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000301" id="CVE-2018-1000301" title="Curl: Out-Of-Bounds Heap Read When Missing " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3157" id="RHSA-2018:3157-1" title="Rhsa-2018:3157-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1510247" id="1510247" title="Make Libcurl Use The New Pk11_Createmanagedgenericobject() " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537125" id="1537125" title="Curl: Http Authentication Leak In Redirects" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1542256" id="1542256" title="--Tlsauthtype Does Not Work (Documentation Only Change)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1552628" id="1552628" title="Curl: Ftp Path Trickery Leads To Nil Byte Out " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1552631" id="1552631" title="Curl: Ldap Null Pointer Dereference" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1553398" id="1553398" title="Curl: Rtsp Rtp Buffer Over-Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1575536" id="1575536" title="Curl: Out-Of-Bounds Heap Read When Missing " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1610998" id="1610998" title="Libcurl/Curl &gt;= 7.29.0-47 Breaks Yum Update Functionality On " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3158-1</id><title>Sssd</title><description>Security Fix(es): 
* sssd: information leak from the sssd-sudo responder (CVE-2018-10852)</description><severity>low</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libsss_idmap" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libsss_idmap-1.16.2-13.el7.i686.rpm</filename><sum type="sha256">642650999acdf96fa882d3077bc077313f7b2b46591faa0d0df04db35fb52e47</sum></package><package arch="x86_64" name="libsss_idmap" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libsss_idmap-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">ed583c422922e03d6cef4cdde21e127c1b87e3c01b8856e3837345245b0b2745</sum></package><package arch="x86_64" name="sssd" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">ea1bf8acc93be8197a31e6c9289daf453d79630e0bb5aa530135452261448fe8</sum></package><package arch="x86_64" name="libsss_autofs" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libsss_autofs-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">277380b38837c6c9cb8517233aa5d6ab693c3720bf4a327bcc89d371327a6ebd</sum></package><package arch="i686" name="sssd-libwbclient-devel" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-libwbclient-devel-1.16.2-13.el7.i686.rpm</filename><sum type="sha256">96e2cfa4be526e48c6608ada5a2728ce878e07ef8e6468020b0ae32b8727cb90</sum></package><package arch="x86_64" name="libsss_simpleifp" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libsss_simpleifp-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">74bb63dc02c8c6d4b96fe3d15d408049ed6f182d187ec87c717ebf287aa77bda</sum></package><package arch="x86_64" name="sssd-polkit-rules" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-polkit-rules-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">2b71762a59c6d0ee0f00423d8a3bee0884c7072ebaff51d8174aa47074421b97</sum></package><package arch="x86_64" name="sssd-libwbclient-devel" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-libwbclient-devel-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">957914ef6a03f9a976023700bd81fce59fbb17d4e5c2a794a4c0c1b76ae37b34</sum></package><package arch="x86_64" name="libsss_simpleifp-devel" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libsss_simpleifp-devel-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">710bdba104de7f7ae4389637888a71890422eb06d53a40ae24d1acf684e29ff6</sum></package><package arch="x86_64" name="sssd-common-pac" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-common-pac-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">8fe44b31b67ec7909991c98a45ad34793ed9902f61b9dc0c5f4f95c7fd07ce66</sum></package><package arch="x86_64" name="sssd-krb5" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-krb5-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">5a9479bff6f1728286dab04f12775ee07df283e9428923f9bf13c1fab1e55c4e</sum></package><package arch="x86_64" name="python-sss" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>python-sss-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">038265777217586db5a3805b97ab898d713e35b66fe6038792a270a194119706</sum></package><package arch="i686" name="libsss_certmap-devel" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libsss_certmap-devel-1.16.2-13.el7.i686.rpm</filename><sum type="sha256">c7b281f36f03ef8e456306daefb753b6f5b771cdf300552b30ebbf13306e2430</sum></package><package arch="i686" name="libsss_idmap-devel" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libsss_idmap-devel-1.16.2-13.el7.i686.rpm</filename><sum type="sha256">fcae5b8b119a85fc88c4bface974580fdc990c45b5098da7f1c411ace770a4e4</sum></package><package arch="x86_64" name="sssd-client" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-client-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">e4156d799d13d169ca3d4c732689afb7f6ded885606032de26a8f8951186b83c</sum></package><package arch="i686" name="libsss_simpleifp" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libsss_simpleifp-1.16.2-13.el7.i686.rpm</filename><sum type="sha256">b401289d0848a4e5fb0444f4c17c59c2bd0f54af6650e662685c4e88beafdaf7</sum></package><package arch="i686" name="libsss_simpleifp-devel" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libsss_simpleifp-devel-1.16.2-13.el7.i686.rpm</filename><sum type="sha256">6eb2836b451f2a7cb792dc03dccaf0233c7fedd736620e24285c975bc338a605</sum></package><package arch="x86_64" name="sssd-proxy" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-proxy-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">141b9e522f42e570a4f48c45f6f633d10689da0ded9b26978e39db1cbbafba6f</sum></package><package arch="x86_64" name="libipa_hbac" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libipa_hbac-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">76c21c88ec8ab07912f3dfbee8f9b3bb359aeae3aa6bab71502694ada8bc5680</sum></package><package arch="x86_64" name="libsss_sudo" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libsss_sudo-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">23d098becbe292c9c9af43ef1ff6f75641ed1e3197540c4c4655022abb9af65e</sum></package><package arch="i686" name="libipa_hbac-devel" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libipa_hbac-devel-1.16.2-13.el7.i686.rpm</filename><sum type="sha256">fb2f6e3a491ff0be5d1e5393f4f7b8388abd8dae1fec6349acc4ea879e5966e3</sum></package><package arch="x86_64" name="sssd-common" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-common-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">5e28b963bc4ac9c6dd56c7d8517ffad00183cef42f48d750782a77a1af8e136b</sum></package><package arch="x86_64" name="libsss_certmap" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libsss_certmap-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">09e78d565c8cabef26757c70cb8ffa0887a5429bff33a3b74f0f755c084e270f</sum></package><package arch="x86_64" name="libsss_nss_idmap-devel" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libsss_nss_idmap-devel-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">e380e009166372669179814c7375ce0229d5f2ab583bd4f11d1902c362dad40a</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libipa_hbac-devel-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">a1b9e29ef48a826ed67896918e8e017dcef22903e2c91b745da2c50b81857751</sum></package><package arch="x86_64" name="sssd-libwbclient" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-libwbclient-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">fdbefc3cedb0a5cde0d05729a13200fa90a6c3c624d376478ea1a4d05d2c0245</sum></package><package arch="x86_64" name="sssd-dbus" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-dbus-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">11b32f2efbb39e4797f00657510d5239e0038d304dc0c304605a4f54afb6b171</sum></package><package arch="i686" name="sssd-client" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-client-1.16.2-13.el7.i686.rpm</filename><sum type="sha256">880d48ba140742dff54269496af26b63224b5048bbbe3116ac4e0104b731c645</sum></package><package arch="i686" name="libipa_hbac" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libipa_hbac-1.16.2-13.el7.i686.rpm</filename><sum type="sha256">5b28669c257307c6d7ea2cd3ca7b96bbb3e58e37414026da82b5f514ccf3ac6e</sum></package><package arch="x86_64" name="sssd-krb5-common" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-krb5-common-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">6ca67d5ad4f52f7a61470da8d030a56e0b6958f44b866d515d719c856e81f4fb</sum></package><package arch="x86_64" name="sssd-kcm" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-kcm-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">70a489bc49fa77eed89dffaf9950c4b371b21d3190134b2a9326e3650c329606</sum></package><package arch="x86_64" name="python-libsss_nss_idmap" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>python-libsss_nss_idmap-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">61e22bf478153f99c8f0ec139b0e3b9d320785e9793ebe4df51df4d0c928c3e6</sum></package><package arch="i686" name="libsss_nss_idmap" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libsss_nss_idmap-1.16.2-13.el7.i686.rpm</filename><sum type="sha256">deaa62e5cea4842ec841558bd43deb07db43ee9b9da868094058db29ea6f86c0</sum></package><package arch="noarch" name="python-sssdconfig" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>python-sssdconfig-1.16.2-13.el7.noarch.rpm</filename><sum type="sha256">ae261c8af3eeb7aa1307998b25e54bec98e4c0b6a58ee64e97d8d9df143e2020</sum></package><package arch="x86_64" name="libsss_certmap-devel" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libsss_certmap-devel-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">f11d3c236afcc92f60febd17456e13946d16471c81d6027a7528c4a475e0aaae</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libsss_idmap-devel-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">d4140cd34f5db72cfc411ea7cc48de9fc5bb137d98853a2a24a792abf77368d7</sum></package><package arch="x86_64" name="sssd-ldap" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-ldap-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">acf9e3e7ad2fd0e2230542971ef8a495e32c967e82132a7f44db287b77149851</sum></package><package arch="x86_64" name="python-libipa_hbac" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>python-libipa_hbac-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">ea6eb29bdec54cf1e0d6709aef0d560c4a62c3fb89f71e5b46f44dcf4ec046f3</sum></package><package arch="x86_64" name="sssd-tools" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-tools-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">a95aa96380b9d58861cb731ab81eece4af5b9f7cc00ec2632002ed1abf00a7cc</sum></package><package arch="x86_64" name="python-sss-murmur" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>python-sss-murmur-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">860203b4cc68829a35e8dbe3ef8d2804301636e317f7466d873f368e4a7bd822</sum></package><package arch="x86_64" name="libsss_nss_idmap" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libsss_nss_idmap-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">3b86588d3a3dcbbcbab625a337ed25383c027c7902269541f3d7f0aadbd85c2c</sum></package><package arch="x86_64" name="sssd-ipa" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-ipa-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">33ffdf28ceead8564053e1d67f1213ef20415fa751edf30da28c290978a721b2</sum></package><package arch="x86_64" name="sssd-ad" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-ad-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">ea5385fc9bf82580d3a38becbc0307e985323527c816d82ad1500478d207706c</sum></package><package arch="x86_64" name="sssd-winbind-idmap" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>sssd-winbind-idmap-1.16.2-13.el7.x86_64.rpm</filename><sum type="sha256">d3d80a2ae4629b9a2c39ae7e187f5d904c4ca074a8770ac2707b2ae04ffcefc8</sum></package><package arch="i686" name="libsss_certmap" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libsss_certmap-1.16.2-13.el7.i686.rpm</filename><sum type="sha256">19e3f35eddac3f83f8ce89639185e2f525e45c0655a3ba28c1625f8194dcf8cb</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="13.el7" src="sssd-1.16.2-13.el7.src.rpm" version="1.16.2"><filename>libsss_nss_idmap-devel-1.16.2-13.el7.i686.rpm</filename><sum type="sha256">3f5627dfbf6c6e4572e5433b9fbd39de5a93f9793141edd8f25ef62f75fa29e8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10852" id="CVE-2018-10852" title="Sssd: Information Leak From The Sssd-Sudo Responder" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3158" id="RHSA-2018:3158-1" title="Rhsa-2018:3158-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1385665" id="1385665" title="Incorrect Error Code Returned From Krb5_Child (Updated)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1416528" id="1416528" title="Sssd In Cross Realm Trust Configuration Should Be Able To Use " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1459348" id="1459348" title="Extend Sss-Certmap Man Page Regarding Priority Processing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1509691" id="1509691" title="Document How To Change The Regular Expression For Sssd So That " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1514061" id="1514061" title="Id Override Gid From Default Trust View Is Not Properly " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1516266" id="1516266" title="Give A More Detailed Debug And System-Log Message If " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1522928" id="1522928" title="Sssd Doesn'T Allow User With Expired Password To Login When " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1534749" id="1534749" title="Requesting An Ad User'S Private Group And Then The User Itself " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537272" id="1537272" title="Ssh Public Key Authentication Keeps Working After Keys Are " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537279" id="1537279" title="Certificate Is Not Removed From Cache When It'S Removed From " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1538555" id="1538555" title="Crash In Nss_Protocol_Fill_Netgrent. Sssd_Nss[19234]: Segfault " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1546754" id="1546754" title="The Man Page Of Sss_Ssh_Authorizedkeys Can Be Enhanced To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1558498" id="1558498" title="Rebase Sssd To The Latests Upstream Release Of The 1.16 Branch" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1562025" id="1562025" title="Externaluser Sudo Attribute Must Be Fully-Qualified" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1565774" id="1565774" title="After Updating To Rhel 7.5 Failing To Clear The Sssd Cache" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566782" id="1566782" title="Memory Management Issue In The Sssd_Nss_Ex Interface Can Cause " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1571526" id="1571526" title="Sssd With Id Provider 'Ad' Should Give A Warning In Case The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1577335" id="1577335" title="/Usr/Libexec/Sssd/Sssd_Autofs Sigabrt Crash Daily" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1578291" id="1578291" title="Samba Can Not Register Sss Idmap Module Because It'S Using An " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1583251" id="1583251" title="Home Dir Disappear In Sssd Cache On The Ipa Master For Ad Users" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1583725" id="1583725" title="Sssd Ad Uses Ldap Filter To Detect Posix Attributes Stored In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1588810" id="1588810" title="Sssd: Information Leak From The Sssd-Sudo Responder" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600822" id="1600822" title="Sssd Bails Out Saving Desktop Profiles In Case An Invalid " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1602781" id="1602781" title="Offline Logins And/Or Id_Provider=Local Logins Fail After " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1607313" id="1607313" title="When Sssd Is Running As Non-Root User, The Sudo Pipe Is " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1610667" id="1610667" title="Sssd_Ssh Leaks File Descriptors When More Than One Certificate " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3221-1</id><title>Openssl</title><description>Security Fix(es): 
* openssl: ROHNP - Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495) 
* openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang (CVE-2018-0732) 
* openssl: Handling of crafted recursive ASN.1 structures can cause a stack overflow and resulting denial of service (CVE-2018-0739) 
* openssl: Malformed X.509 IPAdressFamily could cause OOB read (CVE-2017-3735) 
* openssl: RSA key generation cache timing vulnerability in crypto/rsa/rsa_gen.c allows attackers to recover private keys (CVE-2018-0737)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl-static" release="16.el7" src="openssl-1.0.2k-16.el7.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-16.el7.x86_64.rpm</filename><sum type="sha256">51b5ffb41824e3c7e4f030061a04585863813a8842e700312a108b2d0d7a0d3d</sum></package><package arch="x86_64" epoch="1" name="openssl" release="16.el7" src="openssl-1.0.2k-16.el7.src.rpm" version="1.0.2k"><filename>openssl-1.0.2k-16.el7.x86_64.rpm</filename><sum type="sha256">06175431615dbc609197f852f9e47259bca992cdf0fae02acb22cfbe5f1fb086</sum></package><package arch="x86_64" epoch="1" name="openssl-libs" release="16.el7" src="openssl-1.0.2k-16.el7.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-16.el7.x86_64.rpm</filename><sum type="sha256">3fe2c3ae34210dd6f545304c017a6423b41617d5507789d7a881257642f6e761</sum></package><package arch="i686" epoch="1" name="openssl-static" release="16.el7" src="openssl-1.0.2k-16.el7.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-16.el7.i686.rpm</filename><sum type="sha256">05102fc90a064ce0cb4096a6fbcde16eb162307e2896f5e9a14e4f5499df002a</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="16.el7" src="openssl-1.0.2k-16.el7.src.rpm" version="1.0.2k"><filename>openssl-perl-1.0.2k-16.el7.x86_64.rpm</filename><sum type="sha256">a2c1535177269fe66dfd5319414587eb78a71dac8b82158973d84d0de2828984</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="16.el7" src="openssl-1.0.2k-16.el7.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-16.el7.i686.rpm</filename><sum type="sha256">7073df011fd7c9f65084440364b5841434dd3a3864e25f635cc49e04ff121435</sum></package><package arch="x86_64" epoch="1" name="openssl-devel" release="16.el7" src="openssl-1.0.2k-16.el7.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-16.el7.x86_64.rpm</filename><sum type="sha256">85869d5fa2128aacfface4d56be22615bca75e7e182f8c9a2a118dd682982f23</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="16.el7" src="openssl-1.0.2k-16.el7.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-16.el7.i686.rpm</filename><sum type="sha256">973f1bf9f4e27471400a763821402ab0db3f7de363610471bad81b81dced66bd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-3735" id="CVE-2017-3735" title="Openssl: Malformed X.509 Ipadressfamily Could " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0495" id="CVE-2018-0495" title="Openssl: Rohnp - Key Extraction Side Channel In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0732" id="CVE-2018-0732" title="Openssl: Malicious Server Can Send Large Prime " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0737" id="CVE-2018-0737" title="Openssl: Rsa Key Generation Cache Timing " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0739" id="CVE-2018-0739" title="Openssl: Handling Of Crafted Recursive Asn.1 " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3221" id="RHSA-2018:3221-1" title="Rhsa-2018:3221-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1486144" id="1486144" title="Openssl: Malformed X.509 Ipadressfamily Could " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1548401" id="1548401" title="Modify X509_Name Comparison Function To Be Case Sensitive For " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1561266" id="1561266" title="Openssl: Handling Of Crafted Recursive Asn.1 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568253" id="1568253" title="Openssl: Rsa Key Generation Cache Timing " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1585004" id="1585004" title="Ppc64Le Opensslconf.H Is Incompatible With Swig" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1591100" id="1591100" title="Openssl: Malicious Server Can Send Large Prime " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1591163" id="1591163" title="Openssl: Rohnp - Key Extraction Side Channel In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1603597" id="1603597" title="Confusing Error Message When Asking For Invalid Dsa Parameter " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3229-1</id><title>Zziplib</title><description>Security Fix(es): 
* zziplib: out of bound read in mmapped.c:zzip_disk_fread() causes crash (CVE-2018-7725) 
* zziplib: Bus error in zip.c:__zzip_parse_root_directory() cause crash via crafted zip file (CVE-2018-7726) 
* zziplib: Memory leak in memdisk.c:zzip_mem_disk_new() can lead to denial of service via crafted zip (CVE-2018-7727)</description><severity>low</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="zziplib" release="9.el7" src="zziplib-0.13.62-9.el7.src.rpm" version="0.13.62"><filename>zziplib-0.13.62-9.el7.i686.rpm</filename><sum type="sha256">f57d832ec1b26ec0f1c2ad02dbc0370ffe4764c3fc1815edefc8ad39a307201c</sum></package><package arch="x86_64" name="zziplib-utils" release="9.el7" src="zziplib-0.13.62-9.el7.src.rpm" version="0.13.62"><filename>zziplib-utils-0.13.62-9.el7.x86_64.rpm</filename><sum type="sha256">c3627684e53f2aea8d4bc49d7b59bd9159d6cd5e709e6e1a027562c99f44fad7</sum></package><package arch="i686" name="zziplib-devel" release="9.el7" src="zziplib-0.13.62-9.el7.src.rpm" version="0.13.62"><filename>zziplib-devel-0.13.62-9.el7.i686.rpm</filename><sum type="sha256">917199bc97a942c53665ddfc62e1b3e95d8a0871620f34691ff81533a3b0b7d6</sum></package><package arch="x86_64" name="zziplib-devel" release="9.el7" src="zziplib-0.13.62-9.el7.src.rpm" version="0.13.62"><filename>zziplib-devel-0.13.62-9.el7.x86_64.rpm</filename><sum type="sha256">352a43f4e824f0c3b0cdae4eb2fc3118297d1c8e8b1f148ca611ab4e30792ac9</sum></package><package arch="x86_64" name="zziplib" release="9.el7" src="zziplib-0.13.62-9.el7.src.rpm" version="0.13.62"><filename>zziplib-0.13.62-9.el7.x86_64.rpm</filename><sum type="sha256">23d4391502eae08abcde5eeffded885a523076f38c28a8da4386ad3b5bdb726e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7725" id="CVE-2018-7725" title="Zziplib: Out Of Bound Read In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7726" id="CVE-2018-7726" title="Zziplib: Bus Error In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7727" id="CVE-2018-7727" title="Zziplib: Memory Leak In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3229" id="RHSA-2018:3229-1" title="Rhsa-2018:3229-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1554662" id="1554662" title="Zziplib: Out Of Bound Read In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1554672" id="1554672" title="Zziplib: Bus Error In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1554676" id="1554676" title="Zziplib: Memory Leak In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3242-1</id><title>Glusterfs</title><description>Security Fix(es): 
* glusterfs: Improper deserialization in dict.c:dict_unserialize() can allow attackers to read arbitrary memory (CVE-2018-10911)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python2-gluster" release="18.sl7" src="glusterfs-3.12.2-18.sl7.src.rpm" version="3.12.2"><filename>python2-gluster-3.12.2-18.sl7.x86_64.rpm</filename><sum type="sha256">6c91537373c3d4e6d69ad5c294a13347cf8f599e9990189c231caac491eb4268</sum></package><package arch="x86_64" name="glusterfs-client-xlators" release="18.sl7" src="glusterfs-3.12.2-18.sl7.src.rpm" version="3.12.2"><filename>glusterfs-client-xlators-3.12.2-18.sl7.x86_64.rpm</filename><sum type="sha256">1a0e182826b0e60af26f7bc876052946c927a74263d905c3512442fd397db631</sum></package><package arch="x86_64" name="glusterfs-cli" release="18.sl7" src="glusterfs-3.12.2-18.sl7.src.rpm" version="3.12.2"><filename>glusterfs-cli-3.12.2-18.sl7.x86_64.rpm</filename><sum type="sha256">2c9de88036085dbb82209a63a9c011048f5c4cdf922d0d1f8fb5d40fdb85074f</sum></package><package arch="x86_64" name="glusterfs-server" release="18.sl7" src="glusterfs-3.12.2-18.sl7.src.rpm" version="3.12.2"><filename>glusterfs-server-3.12.2-18.sl7.x86_64.rpm</filename><sum type="sha256">ee34109e5ea1bbc9961950b019e0360d4469e8de86f6a31b7df66dc5596da3cf</sum></package><package arch="x86_64" name="glusterfs-libs" release="18.sl7" src="glusterfs-3.12.2-18.sl7.src.rpm" version="3.12.2"><filename>glusterfs-libs-3.12.2-18.sl7.x86_64.rpm</filename><sum type="sha256">a9861ed941e11bcba00946e959d3fbd59db0357f894e8883fa43b1cfa4ac44b9</sum></package><package arch="x86_64" name="glusterfs-devel" release="18.sl7" src="glusterfs-3.12.2-18.sl7.src.rpm" version="3.12.2"><filename>glusterfs-devel-3.12.2-18.sl7.x86_64.rpm</filename><sum type="sha256">f2f8084bc858cfe5f932ad71123f2821ba1a27e096fb5a4696dedd2a231dc20a</sum></package><package arch="x86_64" name="glusterfs" release="18.sl7" src="glusterfs-3.12.2-18.sl7.src.rpm" version="3.12.2"><filename>glusterfs-3.12.2-18.sl7.x86_64.rpm</filename><sum type="sha256">c6643d4e8e0214a27a70b09e94f165daf30ca998ab7f6e90327ffdb4866822c7</sum></package><package arch="x86_64" name="glusterfs-api" release="18.sl7" src="glusterfs-3.12.2-18.sl7.src.rpm" version="3.12.2"><filename>glusterfs-api-3.12.2-18.sl7.x86_64.rpm</filename><sum type="sha256">bef25f11700f014077c8ca522eb605af00ceff1c51c5d690436eb522193467a6</sum></package><package arch="x86_64" name="glusterfs-api-devel" release="18.sl7" src="glusterfs-3.12.2-18.sl7.src.rpm" version="3.12.2"><filename>glusterfs-api-devel-3.12.2-18.sl7.x86_64.rpm</filename><sum type="sha256">6b516cd8d54d3a7791e7c6896b632e14a375c090bee518813ecade681675d49f</sum></package><package arch="x86_64" name="glusterfs-events" release="18.sl7" src="glusterfs-3.12.2-18.sl7.src.rpm" version="3.12.2"><filename>glusterfs-events-3.12.2-18.sl7.x86_64.rpm</filename><sum type="sha256">a9314d78ad8b5cb723d3e5adb0b70c067c64c5c2a339ef598fe3bf164575c37a</sum></package><package arch="x86_64" name="glusterfs-rdma" release="18.sl7" src="glusterfs-3.12.2-18.sl7.src.rpm" version="3.12.2"><filename>glusterfs-rdma-3.12.2-18.sl7.x86_64.rpm</filename><sum type="sha256">26ca1d34fc51ba67709704e22c9cc0f7ba170943fa04ed1676635c98be46c346</sum></package><package arch="noarch" name="glusterfs-resource-agents" release="18.sl7" src="glusterfs-3.12.2-18.sl7.src.rpm" version="3.12.2"><filename>glusterfs-resource-agents-3.12.2-18.sl7.noarch.rpm</filename><sum type="sha256">53a73f79abf3241b37f788ac26494a8b3a03811d5c6f1776284613dc9ec664f3</sum></package><package arch="x86_64" name="glusterfs-fuse" release="18.sl7" src="glusterfs-3.12.2-18.sl7.src.rpm" version="3.12.2"><filename>glusterfs-fuse-3.12.2-18.sl7.x86_64.rpm</filename><sum type="sha256">ea67a8d9a36b9b6f1817a859efd213b67e47c06dbee0ed35c6c4a8b354655d6b</sum></package><package arch="x86_64" name="glusterfs-geo-replication" release="18.sl7" src="glusterfs-3.12.2-18.sl7.src.rpm" version="3.12.2"><filename>glusterfs-geo-replication-3.12.2-18.sl7.x86_64.rpm</filename><sum type="sha256">884a7a545f7f2d56339f21b3141ade9acf65505d2914ee712f295ff64a3c3ac8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10911" id="CVE-2018-10911" title="Glusterfs: Improper Deserialization In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3242" id="RHSA-2018:3242-1" title="Rhsa-2018:3242-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1579734" id="1579734" title="Update Glusterfs Client Rpms To The Latest At Rhel 7.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1601657" id="1601657" title="Glusterfs: Improper Deserialization In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3246-1</id><title>Libcdio</title><description>Security Fix(es): 
* libcdio: Heap-based buffer over-read in print_iso9660_recurse function in iso-info.c (CVE-2017-18198) 
* libcdio: NULL pointer dereference in realloc_symlink in rock.c (CVE-2017-18199) 
* libcdio: Double free in get_cdtext_generic() in lib/driver/_cdio_generic.c (CVE-2017-18201)</description><severity>low</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libcdio" release="3.el7" src="libcdio-0.92-3.el7.src.rpm" version="0.92"><filename>libcdio-0.92-3.el7.i686.rpm</filename><sum type="sha256">e1efd2621d65f350dcba88f42411579ec45eae77f603dd87a5a0c17dfbc307c3</sum></package><package arch="x86_64" name="libcdio" release="3.el7" src="libcdio-0.92-3.el7.src.rpm" version="0.92"><filename>libcdio-0.92-3.el7.x86_64.rpm</filename><sum type="sha256">05e7ec0563ead2c42e792d0196fadd409b843314b8156bb43e8263004ba976bc</sum></package><package arch="x86_64" name="libcdio-devel" release="3.el7" src="libcdio-0.92-3.el7.src.rpm" version="0.92"><filename>libcdio-devel-0.92-3.el7.x86_64.rpm</filename><sum type="sha256">b14357d9b81cefdc16d0b2e88b95bf061fee6876a804c649c1c3e934e10bfcd1</sum></package><package arch="i686" name="libcdio-devel" release="3.el7" src="libcdio-0.92-3.el7.src.rpm" version="0.92"><filename>libcdio-devel-0.92-3.el7.i686.rpm</filename><sum type="sha256">8652cdebb8f7b0445552253cc2993a5c9b3c737c34e220031e81c360a641bfa4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18198" id="CVE-2017-18198" title="Libcdio: Heap-Based Buffer Over-Read In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18199" id="CVE-2017-18199" title="Libcdio: Null Pointer Dereference In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18201" id="CVE-2017-18201" title="Libcdio: Double Free In Get_Cdtext_Generic() In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3246" id="RHSA-2018:3246-1" title="Rhsa-2018:3246-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549644" id="1549644" title="Libcdio: Heap-Based Buffer Over-Read In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549701" id="1549701" title="Libcdio: Null Pointer Dereference In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549707" id="1549707" title="Libcdio: Double Free In Get_Cdtext_Generic() In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3249-1</id><title>Setup</title><description>Security Fix(es): 
* setup: nologin listed in /etc/shells violates security expectations (CVE-2018-1113)</description><severity>low</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="setup" release="10.el7" src="setup-2.8.71-10.el7.src.rpm" version="2.8.71"><filename>setup-2.8.71-10.el7.noarch.rpm</filename><sum type="sha256">713b6c0198cf1a4d1f0b532b29500c753f03a1be2bf448b0e34418f975dd3afe</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1113" id="CVE-2018-1113" title="Setup: Nologin Listed In /Etc/Shells Violates " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3249" id="RHSA-2018:3249-1" title="Rhsa-2018:3249-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566469" id="1566469" title="Typing Mistake In /Etc/Protocols" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1571094" id="1571094" title="Setup: Nologin Listed In /Etc/Shells Violates " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3253-1</id><title>Jasper</title><description>Security Fix(es): 
* jasper: reachable assertion in JPC_NOMINALGAIN() (CVE-2016-9396) 
* jasper: NULL pointer exception in jp2_encode() (CVE-2017-1000050)</description><severity>low</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="jasper-utils" release="33.el7" src="jasper-1.900.1-33.el7.src.rpm" version="1.900.1"><filename>jasper-utils-1.900.1-33.el7.x86_64.rpm</filename><sum type="sha256">ff8cf60dd0ac307048f1de041fe94e507e30402a6a63fb0ed23a5c826bf94ab1</sum></package><package arch="x86_64" name="jasper" release="33.el7" src="jasper-1.900.1-33.el7.src.rpm" version="1.900.1"><filename>jasper-1.900.1-33.el7.x86_64.rpm</filename><sum type="sha256">bbfdf4f2d88986d21707cd6dc660b8e978b1aa1636e1e1379d7a673ca73f2867</sum></package><package arch="i686" name="jasper-devel" release="33.el7" src="jasper-1.900.1-33.el7.src.rpm" version="1.900.1"><filename>jasper-devel-1.900.1-33.el7.i686.rpm</filename><sum type="sha256">4d942971cff2883e1dff88216843752a2af898e62a3699c66fa5945cc96134e4</sum></package><package arch="x86_64" name="jasper-libs" release="33.el7" src="jasper-1.900.1-33.el7.src.rpm" version="1.900.1"><filename>jasper-libs-1.900.1-33.el7.x86_64.rpm</filename><sum type="sha256">a3fcc56be289a6fb88f6cee675862e59326d5c2b5d5867ad4081eaa490b1bd85</sum></package><package arch="x86_64" name="jasper-devel" release="33.el7" src="jasper-1.900.1-33.el7.src.rpm" version="1.900.1"><filename>jasper-devel-1.900.1-33.el7.x86_64.rpm</filename><sum type="sha256">709c44175b0a2066034f02c80cb051ca121b896788c654b617badb1e4f4e90ee</sum></package><package arch="i686" name="jasper-libs" release="33.el7" src="jasper-1.900.1-33.el7.src.rpm" version="1.900.1"><filename>jasper-libs-1.900.1-33.el7.i686.rpm</filename><sum type="sha256">c6b73e52ceaf9990ae96d7aef8be55bd55187ecce5e798eaa0b95f23bbb68cfc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9396" id="CVE-2016-9396" title="Jasper: Reachable Assertion In Jpc_Nominalgain()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000050" id="CVE-2017-1000050" title="Jasper: Null Pointer Exception In Jp2_Encode()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3253" id="RHSA-2018:3253-1" title="Rhsa-2018:3253-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1396978" id="1396978" title="Jasper: Reachable Assertion In Jpc_Nominalgain()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472888" id="1472888" title="Jasper: Null Pointer Exception In Jp2_Encode()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3324-1</id><title>Fuse</title><description>Security Fix(es): 
* fuse: bypass of the "user_allow_other" restriction when SELinux is active (CVE-2018-10906)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="fuse-libs" release="11.el7" src="fuse-2.9.2-11.el7.src.rpm" version="2.9.2"><filename>fuse-libs-2.9.2-11.el7.i686.rpm</filename><sum type="sha256">b40a1305d74e9374a54e1b94ef1fb7d818822cec88969a5820f85463a31d4733</sum></package><package arch="x86_64" name="fuse-libs" release="11.el7" src="fuse-2.9.2-11.el7.src.rpm" version="2.9.2"><filename>fuse-libs-2.9.2-11.el7.x86_64.rpm</filename><sum type="sha256">41e75530f037f00d21a1eaff7027c4bcea161688f54380742edaa358689af227</sum></package><package arch="x86_64" name="fuse-devel" release="11.el7" src="fuse-2.9.2-11.el7.src.rpm" version="2.9.2"><filename>fuse-devel-2.9.2-11.el7.x86_64.rpm</filename><sum type="sha256">786119db041b423d32a3f3874fbf3cc7c32bdca13ca5d635e522f7b1290b5b4c</sum></package><package arch="x86_64" name="fuse" release="11.el7" src="fuse-2.9.2-11.el7.src.rpm" version="2.9.2"><filename>fuse-2.9.2-11.el7.x86_64.rpm</filename><sum type="sha256">f90f43bfeccd7b94558bc56ef7073095d544640d2feb1788d5353c4e42d7687d</sum></package><package arch="i686" name="fuse-devel" release="11.el7" src="fuse-2.9.2-11.el7.src.rpm" version="2.9.2"><filename>fuse-devel-2.9.2-11.el7.i686.rpm</filename><sum type="sha256">d01bb4f2e65eab864c12fa5d9f0631cb4e25cb3785c3fdbe95f46d64d02dbf81</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10906" id="CVE-2018-10906" title="Fuse: Bypass Of The &quot;User_Allow_Other&quot; " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3324" id="RHSA-2018:3324-1" title="Rhsa-2018:3324-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1602996" id="1602996" title="Fuse: Bypass Of The &quot;User_Allow_Other&quot; " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3327-1</id><title>Libmspack</title><description>Security Fix(es): 
* libmspack: off-by-one error in the CHM PMGI/PMGL chunk number validity checks (CVE-2018-14679) 
* libmspack: off-by-one error in the CHM chunk number validity checks (CVE-2018-14680) 
* libmspack: out-of-bounds write in kwajd_read_headers in mspack/kwajd.c (CVE-2018-14681) 
* libmspack: off-by-one error in the TOLOWER() macro for CHM decompression (CVE-2018-14682)</description><severity>low</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libmspack" release="0.6.alpha.el7" src="libmspack-0.5-0.6.alpha.el7.src.rpm" version="0.5"><filename>libmspack-0.5-0.6.alpha.el7.i686.rpm</filename><sum type="sha256">327da5e9849a46522d1a6c25894f7bcbd20d9216456efbcc06c1b7cd7502c2c9</sum></package><package arch="i686" name="libmspack-devel" release="0.6.alpha.el7" src="libmspack-0.5-0.6.alpha.el7.src.rpm" version="0.5"><filename>libmspack-devel-0.5-0.6.alpha.el7.i686.rpm</filename><sum type="sha256">78f23e32ec899e19f409ea83ab45843e447d365e41844772722815d20471338d</sum></package><package arch="x86_64" name="libmspack-devel" release="0.6.alpha.el7" src="libmspack-0.5-0.6.alpha.el7.src.rpm" version="0.5"><filename>libmspack-devel-0.5-0.6.alpha.el7.x86_64.rpm</filename><sum type="sha256">1cda0567c49e36e152e0168e88763b3c7342382d4af1baeb33a6e2fefdb27833</sum></package><package arch="x86_64" name="libmspack" release="0.6.alpha.el7" src="libmspack-0.5-0.6.alpha.el7.src.rpm" version="0.5"><filename>libmspack-0.5-0.6.alpha.el7.x86_64.rpm</filename><sum type="sha256">3218905bbc77418f0b43437279958d63995d379394685b92db58d11ff90be760</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14679" id="CVE-2018-14679" title="Libmspack: Off-By-One Error In The Chm " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14680" id="CVE-2018-14680" title="Libmspack: Off-By-One Error In The Chm Chunk " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14681" id="CVE-2018-14681" title="Libmspack: Out-Of-Bounds Write In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14682" id="CVE-2018-14682" title="Libmspack: Off-By-One Error In The Tolower() " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3327" id="RHSA-2018:3327-1" title="Rhsa-2018:3327-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1610890" id="1610890" title="Libmspack: Off-By-One Error In The Chm " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1610896" id="1610896" title="Libmspack: Out-Of-Bounds Write In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1610934" id="1610934" title="Libmspack: Off-By-One Error In The Chm Chunk " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1610941" id="1610941" title="Libmspack: Off-By-One Error In The Tolower() " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3335-1</id><title>Xerces-C</title><description>Security Fix(es): 
* xerces-c: Stack overflow when parsing deeply nested DTD (CVE-2016-4463)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="xerces-c-doc" release="9.el7" src="xerces-c-3.1.1-9.el7.src.rpm" version="3.1.1"><filename>xerces-c-doc-3.1.1-9.el7.noarch.rpm</filename><sum type="sha256">8494ae9d5abd6adc1bd56c5c466ca3d1369706c332ece6f6689a1a77cb6f5f06</sum></package><package arch="i686" name="xerces-c" release="9.el7" src="xerces-c-3.1.1-9.el7.src.rpm" version="3.1.1"><filename>xerces-c-3.1.1-9.el7.i686.rpm</filename><sum type="sha256">75feddcda1048d0bab9dd7e954207b0891b320853b2fcffaffedc98c8164a34f</sum></package><package arch="x86_64" name="xerces-c-devel" release="9.el7" src="xerces-c-3.1.1-9.el7.src.rpm" version="3.1.1"><filename>xerces-c-devel-3.1.1-9.el7.x86_64.rpm</filename><sum type="sha256">b56637bb5c006852e14aebab44b519cf46616e7511f0662c99440b951743c5aa</sum></package><package arch="x86_64" name="xerces-c" release="9.el7" src="xerces-c-3.1.1-9.el7.src.rpm" version="3.1.1"><filename>xerces-c-3.1.1-9.el7.x86_64.rpm</filename><sum type="sha256">d2914a2d0053cc411a681716e27f16f3dfd1a7dd35b781fe1a8378ae22ee53b2</sum></package><package arch="i686" name="xerces-c-devel" release="9.el7" src="xerces-c-3.1.1-9.el7.src.rpm" version="3.1.1"><filename>xerces-c-devel-3.1.1-9.el7.i686.rpm</filename><sum type="sha256">22783db3bc1448611a81ac1df79404f115b09b5cdc85f23ee527c039923a65e2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4463" id="CVE-2016-4463" title="Xerces-C: Stack Overflow When Parsing Deeply " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3335" id="RHSA-2018:3335-1" title="Rhsa-2018:3335-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1348845" id="1348845" title="Xerces-C: Stack Overflow When Parsing Deeply " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3347-1</id><title>Python-Paramiko</title><description>Security Fix(es): 
* python-paramiko: Authentication bypass in auth_handler.py (CVE-2018-1000805)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-paramiko" release="9.el7" src="python-paramiko-2.1.1-9.el7.src.rpm" version="2.1.1"><filename>python-paramiko-2.1.1-9.el7.noarch.rpm</filename><sum type="sha256">163333de11151d34d19dd0bc92ee065fd468cb3357b88875936137d21bd904f0</sum></package><package arch="noarch" name="python-paramiko-doc" release="9.el7" src="python-paramiko-2.1.1-9.el7.src.rpm" version="2.1.1"><filename>python-paramiko-doc-2.1.1-9.el7.noarch.rpm</filename><sum type="sha256">c1a319b808524d3760d2290e9877c30194a6680aedf5a92edc9b6a8da9cc5022</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000805" id="CVE-2018-1000805" title="Python-Paramiko: Authentication Bypass In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3347" id="RHSA-2018:3347-1" title="Rhsa-2018:3347-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1637263" id="1637263" title="Python-Paramiko: Authentication Bypass In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3350-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Improper field access checks (Hotspot, 8199226) (CVE-2018-3169) 
* OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) (CVE-2018-3149) 
* OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) (CVE-2018-3136) 
* OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) (CVE-2018-3139) 
* OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) (CVE-2018-3180) 
* OpenJDK: Infinite loop in RIFF format reader (Sound, 8205361) (CVE-2018-3214)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.16.1.el7_6" src="java-1.7.0-openjdk-1.7.0.201-2.6.16.1.el7_6.src.rpm" version="1.7.0.201"><filename>java-1.7.0-openjdk-accessibility-1.7.0.201-2.6.16.1.el7_6.x86_64.rpm</filename><sum type="sha256">2cda12ecc6c85550947c3e028b184365edb6d55336f4b8fcc5fd63e17116e799</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.16.1.el7_6" src="java-1.7.0-openjdk-1.7.0.201-2.6.16.1.el7_6.src.rpm" version="1.7.0.201"><filename>java-1.7.0-openjdk-1.7.0.201-2.6.16.1.el7_6.x86_64.rpm</filename><sum type="sha256">05f0933e124ce5234e4f6a1bf68e9a1fdb86e28664d0fbb78cffa8e4a02d9934</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.16.1.el7_6" src="java-1.7.0-openjdk-1.7.0.201-2.6.16.1.el7_6.src.rpm" version="1.7.0.201"><filename>java-1.7.0-openjdk-headless-1.7.0.201-2.6.16.1.el7_6.x86_64.rpm</filename><sum type="sha256">49f8afc058695bc5b35a601d7aab5f63fdd122e39de2c34f7127198450a3a419</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.16.1.el7_6" src="java-1.7.0-openjdk-1.7.0.201-2.6.16.1.el7_6.src.rpm" version="1.7.0.201"><filename>java-1.7.0-openjdk-javadoc-1.7.0.201-2.6.16.1.el7_6.noarch.rpm</filename><sum type="sha256">7fcd7b28d65ed30742676171a4af091980aa1459cd36f7a009a06ffbfd8571b3</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.16.1.el7_6" src="java-1.7.0-openjdk-1.7.0.201-2.6.16.1.el7_6.src.rpm" version="1.7.0.201"><filename>java-1.7.0-openjdk-devel-1.7.0.201-2.6.16.1.el7_6.x86_64.rpm</filename><sum type="sha256">cc950008190bf00804f8e57529d60989887bf351afa32635d59c06dbf08d207a</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.16.1.el7_6" src="java-1.7.0-openjdk-1.7.0.201-2.6.16.1.el7_6.src.rpm" version="1.7.0.201"><filename>java-1.7.0-openjdk-src-1.7.0.201-2.6.16.1.el7_6.x86_64.rpm</filename><sum type="sha256">7f961baf89755117c3af3b1c6f64b6d91d805b6b46ccf3829a3890a9e9b54a99</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.16.1.el7_6" src="java-1.7.0-openjdk-1.7.0.201-2.6.16.1.el7_6.src.rpm" version="1.7.0.201"><filename>java-1.7.0-openjdk-demo-1.7.0.201-2.6.16.1.el7_6.x86_64.rpm</filename><sum type="sha256">14f905dd0ad753837e5dbbc085d2b0ea3d1699f025a8ac6242cca04a0856bc67</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136" id="CVE-2018-3136" title="Openjdk: Incorrect Handling Of Unsigned " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139" id="CVE-2018-3139" title="Openjdk: Leak Of Sensitive Header Data Via Http " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149" id="CVE-2018-3149" title="Openjdk: Incomplete Enforcement Of The " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169" id="CVE-2018-3169" title="Openjdk: Improper Field Access Checks (Hotspot, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180" id="CVE-2018-3180" title="Openjdk: Missing Endpoint Identification " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3214" id="CVE-2018-3214" title="Openjdk: Infinite Loop In Riff Format Reader " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3350" id="RHSA-2018:3350-1" title="Rhsa-2018:3350-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639293" id="1639293" title="Openjdk: Improper Field Access Checks (Hotspot, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639301" id="1639301" title="Openjdk: Infinite Loop In Riff Format Reader " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639442" id="1639442" title="Openjdk: Leak Of Sensitive Header Data Via Http " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639484" id="1639484" title="Openjdk: Missing Endpoint Identification " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639755" id="1639755" title="Openjdk: Incorrect Handling Of Unsigned " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639834" id="1639834" title="Openjdk: Incomplete Enforcement Of The " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3408-1</id><title>Git</title><description>Security Fix(es): 
* git: arbitrary code execution via .gitmodules (CVE-2018-17456)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="git-cvs" release="20.el7" src="git-1.8.3.1-20.el7.src.rpm" version="1.8.3.1"><filename>git-cvs-1.8.3.1-20.el7.noarch.rpm</filename><sum type="sha256">ed9ad545f85b9af42abd5facf1dec041152a185b65ce97b55c33588cbf88e83b</sum></package><package arch="noarch" name="emacs-git-el" release="20.el7" src="git-1.8.3.1-20.el7.src.rpm" version="1.8.3.1"><filename>emacs-git-el-1.8.3.1-20.el7.noarch.rpm</filename><sum type="sha256">6dcbe5f701092a5ad0ba639cb87721d50a25937922105274e4e22f8298a9ff30</sum></package><package arch="noarch" name="git-all" release="20.el7" src="git-1.8.3.1-20.el7.src.rpm" version="1.8.3.1"><filename>git-all-1.8.3.1-20.el7.noarch.rpm</filename><sum type="sha256">5d93e8676559fab8147f78afcc1910dd9f97024eb2fd69e1f1a4db0ef9be2288</sum></package><package arch="noarch" name="git-gui" release="20.el7" src="git-1.8.3.1-20.el7.src.rpm" version="1.8.3.1"><filename>git-gui-1.8.3.1-20.el7.noarch.rpm</filename><sum type="sha256">54423a2bb1c372e9453751a17344732c692641af25799c161b2adfe13163cc96</sum></package><package arch="x86_64" name="git-gnome-keyring" release="20.el7" src="git-1.8.3.1-20.el7.src.rpm" version="1.8.3.1"><filename>git-gnome-keyring-1.8.3.1-20.el7.x86_64.rpm</filename><sum type="sha256">6383dada61789d6a7e0bb66351b88f2fe5b07bc44d4beeae54f47f9594aa52e8</sum></package><package arch="noarch" name="gitk" release="20.el7" src="git-1.8.3.1-20.el7.src.rpm" version="1.8.3.1"><filename>gitk-1.8.3.1-20.el7.noarch.rpm</filename><sum type="sha256">88a0c506df25e5098b6a6d844cd1434cc78ec075ec382b2e3702d15a7d8f3b6e</sum></package><package arch="x86_64" name="git-daemon" release="20.el7" src="git-1.8.3.1-20.el7.src.rpm" version="1.8.3.1"><filename>git-daemon-1.8.3.1-20.el7.x86_64.rpm</filename><sum type="sha256">dc0b6c43349c6e2d30edca273ea38587280354e9e903ef330473685ff3a87668</sum></package><package arch="noarch" name="git-hg" release="20.el7" src="git-1.8.3.1-20.el7.src.rpm" version="1.8.3.1"><filename>git-hg-1.8.3.1-20.el7.noarch.rpm</filename><sum type="sha256">2b6e72215f871e4789a7fa40b2194f615dfe37065e9181a075b91b49d91630b8</sum></package><package arch="noarch" name="git-bzr" release="20.el7" src="git-1.8.3.1-20.el7.src.rpm" version="1.8.3.1"><filename>git-bzr-1.8.3.1-20.el7.noarch.rpm</filename><sum type="sha256">0652c9749c101484f00072daefc5632117b3d4aade9de7e180f935db79dcb466</sum></package><package arch="noarch" name="git-email" release="20.el7" src="git-1.8.3.1-20.el7.src.rpm" version="1.8.3.1"><filename>git-email-1.8.3.1-20.el7.noarch.rpm</filename><sum type="sha256">b1dadd9ec2cd94d8da3294e5c7c501f4a0123fdf952e18e20149e4138505f366</sum></package><package arch="noarch" name="gitweb" release="20.el7" src="git-1.8.3.1-20.el7.src.rpm" version="1.8.3.1"><filename>gitweb-1.8.3.1-20.el7.noarch.rpm</filename><sum type="sha256">d819e8a0fcd5c975e7875ff0f8fb981c964cced4319408c51e7c805727fcd002</sum></package><package arch="noarch" name="git-p4" release="20.el7" src="git-1.8.3.1-20.el7.src.rpm" version="1.8.3.1"><filename>git-p4-1.8.3.1-20.el7.noarch.rpm</filename><sum type="sha256">0f3895e1a4f35a3179fc8d7cebee5edea722f1768437e16b9d1434b685c59494</sum></package><package arch="x86_64" name="git-svn" release="20.el7" src="git-1.8.3.1-20.el7.src.rpm" version="1.8.3.1"><filename>git-svn-1.8.3.1-20.el7.x86_64.rpm</filename><sum type="sha256">e8ed3fc06411d16c905b90fa1e3023d494e2cd3e2b2515896c4efdb2da0efe4c</sum></package><package arch="noarch" name="git-instaweb" release="20.el7" src="git-1.8.3.1-20.el7.src.rpm" version="1.8.3.1"><filename>git-instaweb-1.8.3.1-20.el7.noarch.rpm</filename><sum type="sha256">ac2936c4a3614752db1ec7ed6e94b3200c5f4ee3e645a7eb571e1b6f46e558d6</sum></package><package arch="x86_64" name="git" release="20.el7" src="git-1.8.3.1-20.el7.src.rpm" version="1.8.3.1"><filename>git-1.8.3.1-20.el7.x86_64.rpm</filename><sum type="sha256">f232866b27d752251df914743ec4c542af7e7923487880b2149cda4bb38a37c3</sum></package><package arch="noarch" name="perl-Git-SVN" release="20.el7" src="git-1.8.3.1-20.el7.src.rpm" version="1.8.3.1"><filename>perl-Git-SVN-1.8.3.1-20.el7.noarch.rpm</filename><sum type="sha256">8d4f850b0d1d9ef7b994dae5b68114836a52e255bc468cf827ec12fea9bb70af</sum></package><package arch="noarch" name="emacs-git" release="20.el7" src="git-1.8.3.1-20.el7.src.rpm" version="1.8.3.1"><filename>emacs-git-1.8.3.1-20.el7.noarch.rpm</filename><sum type="sha256">dbfcbde4d3a41427c3042e154c13a6d16ef976acd379ee8325a05977e95343b1</sum></package><package arch="noarch" name="perl-Git" release="20.el7" src="git-1.8.3.1-20.el7.src.rpm" version="1.8.3.1"><filename>perl-Git-1.8.3.1-20.el7.noarch.rpm</filename><sum type="sha256">927a1a86f854100acc9d34e757607b87c97ef4436b6e7c9236522c21fbc54586</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17456" id="CVE-2018-17456" title="Git: Arbitrary Code Execution Via .Gitmodules" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3408" id="RHSA-2018:3408-1" title="Rhsa-2018:3408-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1636619" id="1636619" title="Git: Arbitrary Code Execution Via .Gitmodules" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3410-1</id><title>Xorg-X11-Server</title><description>Security Fix(es): 
* xorg-x11-server: Incorrect permission check in Xorg X server allows for privilege escalation (CVE-2018-14665) 
The SL Team added a fix for upstream bug 1650634</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-Xwayland" release="5.1.sl7" src="xorg-x11-server-1.20.1-5.1.sl7.src.rpm" version="1.20.1"><filename>xorg-x11-server-Xwayland-1.20.1-5.1.sl7.x86_64.rpm</filename><sum type="sha256">dfb2688d91a032762fc983a12967443e173945251c9c89de925c503f4b67639e</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="5.1.sl7" src="xorg-x11-server-1.20.1-5.1.sl7.src.rpm" version="1.20.1"><filename>xorg-x11-server-Xdmx-1.20.1-5.1.sl7.x86_64.rpm</filename><sum type="sha256">6f225a1f76d3de77f26a837a35866f7fade1065797f30b12149133d9737b1765</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="5.1.el7" src="xorg-x11-server-1.20.1-5.1.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-Xvfb-1.20.1-5.1.el7.x86_64.rpm</filename><sum type="sha256">e1f38699fdb847a5282ccbbf49d1aee2ab7307a8ad6590cef80a66b6f571516c</sum></package><package arch="noarch" name="xorg-x11-server-source" release="5.1.el7" src="xorg-x11-server-1.20.1-5.1.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-source-1.20.1-5.1.el7.noarch.rpm</filename><sum type="sha256">42e8ddca54dea120887e8ea550f237d76ca111a454b65fb8489e48bc6c2646dd</sum></package><package arch="i686" name="xorg-x11-server-devel" release="5.1.sl7" src="xorg-x11-server-1.20.1-5.1.sl7.src.rpm" version="1.20.1"><filename>xorg-x11-server-devel-1.20.1-5.1.sl7.i686.rpm</filename><sum type="sha256">5579da64d74c5025330d744dc337a259f5d6863e654bd4bc5474650e458fb6d9</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="5.1.sl7" src="xorg-x11-server-1.20.1-5.1.sl7.src.rpm" version="1.20.1"><filename>xorg-x11-server-devel-1.20.1-5.1.sl7.x86_64.rpm</filename><sum type="sha256">b8dc71307f1cce161fe8a3e9cc8cedde63a6fe3950728bb786b806a70ac330c9</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="5.1.sl7" src="xorg-x11-server-1.20.1-5.1.sl7.src.rpm" version="1.20.1"><filename>xorg-x11-server-Xephyr-1.20.1-5.1.sl7.x86_64.rpm</filename><sum type="sha256">5d3a23734f021af5ac87a2b496bccc2b18558f7a0a058a94e42bbf6940e842d5</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="5.1.el7" src="xorg-x11-server-1.20.1-5.1.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-Xwayland-1.20.1-5.1.el7.x86_64.rpm</filename><sum type="sha256">e6f34ffd59a536979d7c2d15235dc53aee7bd7370abf1f98fb1b7efdf0b3d897</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="5.1.sl7" src="xorg-x11-server-1.20.1-5.1.sl7.src.rpm" version="1.20.1"><filename>xorg-x11-server-Xnest-1.20.1-5.1.sl7.x86_64.rpm</filename><sum type="sha256">a63717983f32cd0250cfabca472616fb809952f4e83c4d1b127b32274e5f59db</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="5.1.el7" src="xorg-x11-server-1.20.1-5.1.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-devel-1.20.1-5.1.el7.x86_64.rpm</filename><sum type="sha256">33f85b0d6444e53caab5819554210ab616d0f4bbfd97cd300db1bf82a6b0a66d</sum></package><package arch="noarch" name="xorg-x11-server-source" release="5.1.sl7" src="xorg-x11-server-1.20.1-5.1.sl7.src.rpm" version="1.20.1"><filename>xorg-x11-server-source-1.20.1-5.1.sl7.noarch.rpm</filename><sum type="sha256">3d66bff48dab8650e90aa0aac5d014066423f890144573f17b91260adca96624</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="5.1.el7" src="xorg-x11-server-1.20.1-5.1.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-Xephyr-1.20.1-5.1.el7.x86_64.rpm</filename><sum type="sha256">668bc0c194df9439d05cf5bd598ae590dfc8ae9298952f928191cce0b96385b6</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="5.1.sl7" src="xorg-x11-server-1.20.1-5.1.sl7.src.rpm" version="1.20.1"><filename>xorg-x11-server-common-1.20.1-5.1.sl7.x86_64.rpm</filename><sum type="sha256">3a11363058a8a57a1d3cb9161b97311e9a87d84e5b58f31969e50a10fbe0bd5d</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="5.1.sl7" src="xorg-x11-server-1.20.1-5.1.sl7.src.rpm" version="1.20.1"><filename>xorg-x11-server-Xvfb-1.20.1-5.1.sl7.x86_64.rpm</filename><sum type="sha256">01be74b1baac677b56fc8adc084f54d3535af7b706c5664130ad69719c313505</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="5.1.el7" src="xorg-x11-server-1.20.1-5.1.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-common-1.20.1-5.1.el7.x86_64.rpm</filename><sum type="sha256">c18d7ad11bf7add9deb67b969b4346878b528c66aecfd8787cff7233620404f7</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="5.1.el7" src="xorg-x11-server-1.20.1-5.1.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-Xnest-1.20.1-5.1.el7.x86_64.rpm</filename><sum type="sha256">0c09cdb9b0cfaac8dd4fe2f961474bbc6966659ad154f6a91c4f5c2686620535</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="5.1.sl7" src="xorg-x11-server-1.20.1-5.1.sl7.src.rpm" version="1.20.1"><filename>xorg-x11-server-Xorg-1.20.1-5.1.sl7.x86_64.rpm</filename><sum type="sha256">cd23ead7edc16c8bd336940228c847202ab8bf645a3c83140dee6dcbb8adfbd5</sum></package><package arch="i686" name="xorg-x11-server-devel" release="5.1.el7" src="xorg-x11-server-1.20.1-5.1.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-devel-1.20.1-5.1.el7.i686.rpm</filename><sum type="sha256">303060d3e29d3127e604c88f5fa1c7d77b7439dec9fb6bb1a4ea500e17319354</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="5.1.el7" src="xorg-x11-server-1.20.1-5.1.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-Xorg-1.20.1-5.1.el7.x86_64.rpm</filename><sum type="sha256">7771ec60c6ce6fc49814ccf5b3762309cb1de386721d5891970f86d0198d9d64</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="5.1.el7" src="xorg-x11-server-1.20.1-5.1.el7.src.rpm" version="1.20.1"><filename>xorg-x11-server-Xdmx-1.20.1-5.1.el7.x86_64.rpm</filename><sum type="sha256">cc1a634c018f347e81cb1404c90cd22000ca49ce11214759e76691b54e57d749</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14665" id="CVE-2018-14665" title="Xorg-X11-Server: Incorrect Permission Check In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3410" id="RHSA-2018:3410-1" title="Rhsa-2018:3410-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1637761" id="1637761" title="Xorg-X11-Server: Incorrect Permission Check In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3458-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 60.2.1. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 (CVE-2018-12376) 
* Mozilla: Use-after-free in driver timers (CVE-2018-12377) 
* Mozilla: Use-after-free in IndexedDB (CVE-2018-12378) 
* Mozilla: Proxy bypass using automount and autofs (CVE-2017-16541) 
* Mozilla: Out-of-bounds write with malicious MAR file (CVE-2018-12379) 
* Mozilla: Crash in TransportSecurityInfo due to cached data (CVE-2018-12385) 
* Mozilla: Setting a master password post-Firefox 58 does not delete unencrypted previously stored passwords (CVE-2018-12383) 
Note: All of the above issues cannot be exploited in Thunderbird by a specially crafted HTML mail, as JavaScript is disabled for mail messages and cannot be enabled. They could be exploited another way in Thunderbird, for example, when viewing the remote content of an RSS feed.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="4.el7_5" src="thunderbird-60.2.1-4.el7_5.src.rpm" version="60.2.1"><filename>thunderbird-60.2.1-4.el7_5.x86_64.rpm</filename><sum type="sha256">7911d3e8de175415f270e1083fdc6cfa81bb1b516bc30eff8f410e28b6861d29</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16541" id="CVE-2017-16541" title="Mozilla: Proxy Bypass Using Automount And Autofs" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12376" id="CVE-2018-12376" title="Mozilla: Memory Safety Bugs Fixed In Firefox 62 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12377" id="CVE-2018-12377" title="Mozilla: Use-After-Free In Driver Timers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12378" id="CVE-2018-12378" title="Mozilla: Use-After-Free In Indexeddb" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12379" id="CVE-2018-12379" title="Mozilla: Out-Of-Bounds Write With Malicious Mar " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12383" id="CVE-2018-12383" title="Mozilla: Setting A Master Password Post-Firefox " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12385" id="CVE-2018-12385" title="Mozilla: Crash In Transportsecurityinfo Due To " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3458" id="RHSA-2018:3458-1" title="Rhsa-2018:3458-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1510816" id="1510816" title="Mozilla: Proxy Bypass Using Automount And Autofs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625525" id="1625525" title="Mozilla: Memory Safety Bugs Fixed In Firefox 62 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625526" id="1625526" title="Mozilla: Use-After-Free In Driver Timers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625527" id="1625527" title="Mozilla: Use-After-Free In Indexeddb" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625528" id="1625528" title="Mozilla: Out-Of-Bounds Write With Malicious Mar " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625531" id="1625531" title="Mozilla: Setting A Master Password Post-Firefox " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1632062" id="1632062" title="Mozilla: Crash In Transportsecurityinfo Due To " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3521-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Improper field access checks (Hotspot, 8199226) (CVE-2018-3169) 
* OpenJDK: Unrestricted access to scripting engine (Scripting, 8202936) (CVE-2018-3183) 
* OpenJDK: Incomplete enforcement of the trustURLCodebase restriction (JNDI, 8199177) (CVE-2018-3149) 
* OpenJDK: Incorrect handling of unsigned attributes in signed Jar manifests (Security, 8194534) (CVE-2018-3136) 
* OpenJDK: Leak of sensitive header data via HTTP redirect (Networking, 8196902) (CVE-2018-3139) 
* OpenJDK: Multi-Release attribute read from outside of the main manifest attributes (Utility, 8199171) (CVE-2018-3150) 
* OpenJDK: Missing endpoint identification algorithm check during TLS session resumption (JSSE, 8202613) (CVE-2018-3180)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-javadoc-debug-11.0.1.13-3.el7_6.i686.rpm</filename><sum type="sha256">aae2e77b682233a2592f3c3e3c723ba762bf6740cce4ecd81cd6c3c650f324da</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-src-11.0.1.13-3.el7_6.i686.rpm</filename><sum type="sha256">db842b0abb5bdf6df5b6c20f1cf3194de34d9e04d0f679a6d498e9b2e68fe55f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-headless-11.0.1.13-3.el7_6.i686.rpm</filename><sum type="sha256">0494cd4adebe3531e7c45790b0bc4c517b4e01eb7a8162364bb0815418568b55</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-javadoc-zip-debug-11.0.1.13-3.el7_6.x86_64.rpm</filename><sum type="sha256">90bea36f5ca51899ea677dfdeb41c289eaca5ed995ce40d4981958ec46b8b40c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-javadoc-zip-11.0.1.13-3.el7_6.i686.rpm</filename><sum type="sha256">a6b73297524bd362a95e52a46980cb755cca3ddfc6ad09569a7635fedc186e52</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-headless-debug-11.0.1.13-3.el7_6.i686.rpm</filename><sum type="sha256">f5ea633f64e770dfa5a3eddb9b79cd78f448c99a56d4c50d07a70d1a188b2c77</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-javadoc-debug-11.0.1.13-3.el7_6.x86_64.rpm</filename><sum type="sha256">ed2392901295b29ad2ec5df3279c73e86cc378f1479398bfedbef59ca11dc5ce</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-demo-11.0.1.13-3.el7_6.i686.rpm</filename><sum type="sha256">312c342d9d926ef56134cb8c3fdf8564ba74d2a903dd6f707ee5a5e750d549f6</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-jmods-11.0.1.13-3.el7_6.i686.rpm</filename><sum type="sha256">c7e80b516f06365b3f2b180ac7c0f7744a940c0ccfe5481099a7f5d80e91348f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-javadoc-11.0.1.13-3.el7_6.x86_64.rpm</filename><sum type="sha256">267c6ce7d5ad0efd882cdad0a7c4ed5ebeb67614a78e31d420eb85363efb36a8</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-devel-debug-11.0.1.13-3.el7_6.x86_64.rpm</filename><sum type="sha256">8b961983ad4699cff32e05cf6ea9248b606447bacd5d24205911886ba3bc097f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-devel-11.0.1.13-3.el7_6.x86_64.rpm</filename><sum type="sha256">9c276f0c8c133f58744191be03661ea5cd785448d3bc9f690a26db8c1c87f8c1</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-jmods-debug-11.0.1.13-3.el7_6.i686.rpm</filename><sum type="sha256">62a9b3ed3bbd467121ce2e0c253ea19e4195d6259b3b34f1119168c3967b66b5</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-headless-debug-11.0.1.13-3.el7_6.x86_64.rpm</filename><sum type="sha256">7f7496db12dcd72f262378a58a56c401e2cc749252e44814a443fee952ec4f18</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-src-debug-11.0.1.13-3.el7_6.x86_64.rpm</filename><sum type="sha256">bc670e40ddc319cac90272eb44c4b2de3a5f20b05bd8b6c576823c84e59ff24b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-src-11.0.1.13-3.el7_6.x86_64.rpm</filename><sum type="sha256">98b4e7ab0b4d53f103fc90e7dd601adeb9f0b6872708b1cd944bd431b470f94c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-debug-11.0.1.13-3.el7_6.x86_64.rpm</filename><sum type="sha256">3715d208d9ae78ac24baf3609ae4510b51c9179664ca8f669e670fdf67bdf8a5</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-devel-11.0.1.13-3.el7_6.i686.rpm</filename><sum type="sha256">a9e078ffc42bd5421cc7e04048851f06fdf7ec71831e5ea557772bf6f40ee74a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-src-debug-11.0.1.13-3.el7_6.i686.rpm</filename><sum type="sha256">3d05c7faa365effaf29999fb761c3e159c317c7accb7c63e227205f294cf1c5a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-javadoc-zip-debug-11.0.1.13-3.el7_6.i686.rpm</filename><sum type="sha256">cbb26cb2eff855380476b7361603592d2b29579396434c58bcad3f32e5890cc6</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-javadoc-11.0.1.13-3.el7_6.i686.rpm</filename><sum type="sha256">fb3aab8662bf3e6bdee13a4311305a385cdc63bf16678642295e4b30d67e5781</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-headless-11.0.1.13-3.el7_6.x86_64.rpm</filename><sum type="sha256">cb01913ce4fe42d219922f8329c4736cf39ac6f8fb88e91bbd1275b64f359708</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-11.0.1.13-3.el7_6.i686.rpm</filename><sum type="sha256">d2fc0a4684284114ea8e85ed50b85d4738471b723cc8847503f5bab5d86d99aa</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-debug-11.0.1.13-3.el7_6.i686.rpm</filename><sum type="sha256">0542f1802017aad996920972b0867cae67eb54af09b24833183451cb4ebeb18c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-jmods-11.0.1.13-3.el7_6.x86_64.rpm</filename><sum type="sha256">e124fff57e94dcb0294d9ff5d95ddf4e27fbfbcd390419bc656cff8c2cf97f1f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-11.0.1.13-3.el7_6.x86_64.rpm</filename><sum type="sha256">46564bcfbbfa90c0cdb0d29a42195a7810d049c9f734057ff58041f0fcd509f3</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-demo-debug-11.0.1.13-3.el7_6.x86_64.rpm</filename><sum type="sha256">3ebfb677c214fc7ee7930514b6facf770cf6338890aa04a36023fb8231921494</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-demo-11.0.1.13-3.el7_6.x86_64.rpm</filename><sum type="sha256">a727b5226f02d199bc9548d97bde6cc841c698336a1bf6781ecea19d34f71a11</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-javadoc-zip-11.0.1.13-3.el7_6.x86_64.rpm</filename><sum type="sha256">595a39015564fbe89e7ea47c53b1c341d2562325a14ccf860780ad99cef47e5f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-devel-debug-11.0.1.13-3.el7_6.i686.rpm</filename><sum type="sha256">feee703445a7b896efac763a7209abfce649c91fb8594c22c4f692cf9ae002e2</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-demo-debug-11.0.1.13-3.el7_6.i686.rpm</filename><sum type="sha256">087087ff7da271c09833f42084cc2efcb023cbb947c10d498a2fc866d1cb2a40</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="3.el7_6" src="java-11-openjdk-11.0.1.13-3.el7_6.src.rpm" version="11.0.1.13"><filename>java-11-openjdk-jmods-debug-11.0.1.13-3.el7_6.x86_64.rpm</filename><sum type="sha256">c67ca01cb120b6d4a32ff6bf52fd151f0a26d698c1411460614c205d7302a3ce</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3136" id="CVE-2018-3136" title="Openjdk: Incorrect Handling Of Unsigned " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3139" id="CVE-2018-3139" title="Openjdk: Leak Of Sensitive Header Data Via Http " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3149" id="CVE-2018-3149" title="Openjdk: Incomplete Enforcement Of The " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3150" id="CVE-2018-3150" title="Openjdk: Multi-Release Attribute Read From " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3169" id="CVE-2018-3169" title="Openjdk: Improper Field Access Checks (Hotspot, " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3180" id="CVE-2018-3180" title="Openjdk: Missing Endpoint Identification " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3183" id="CVE-2018-3183" title="Openjdk: Unrestricted Access To Scripting Engine " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3521" id="RHSA-2018:3521-1" title="Rhsa-2018:3521-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639268" id="1639268" title="Openjdk: Unrestricted Access To Scripting Engine " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639293" id="1639293" title="Openjdk: Improper Field Access Checks (Hotspot, " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639442" id="1639442" title="Openjdk: Leak Of Sensitive Header Data Via Http " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639484" id="1639484" title="Openjdk: Missing Endpoint Identification " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639755" id="1639755" title="Openjdk: Incorrect Handling Of Unsigned " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639834" id="1639834" title="Openjdk: Incomplete Enforcement Of The " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642321" id="1642321" title="Openjdk: Multi-Release Attribute Read From " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3532-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 60.3.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3 (CVE-2018-12390) 
* Mozilla: Crash with nested event loops (CVE-2018-12392) 
* Mozilla: Integer overflow during Unicode conversion while loading JavaScript (CVE-2018-12393) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 60.3 (CVE-2018-12389)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-11-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_5" src="thunderbird-60.3.0-1.el7_5.src.rpm" version="60.3.0"><filename>thunderbird-60.3.0-1.el7_5.x86_64.rpm</filename><sum type="sha256">dc4869db80e22d4a09c4aeeb8cbfd47281069f03fc154647fc3827f68cd7ce9b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12389" id="CVE-2018-12389" title="Mozilla: Memory Safety Bugs Fixed In Firefox " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12390" id="CVE-2018-12390" title="Mozilla: Memory Safety Bugs Fixed In Firefox 63 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12392" id="CVE-2018-12392" title="Mozilla: Crash With Nested Event Loops" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12393" id="CVE-2018-12393" title="Mozilla: Integer Overflow During Unicode " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3532" id="RHSA-2018:3532-1" title="Rhsa-2018:3532-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642179" id="1642179" title="Mozilla: Memory Safety Bugs Fixed In Firefox " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642180" id="1642180" title="Mozilla: Memory Safety Bugs Fixed In Firefox 63 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642182" id="1642182" title="Mozilla: Crash With Nested Event Loops" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642183" id="1642183" title="Mozilla: Integer Overflow During Unicode " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3650-1</id><title>Ghostscript</title><description>Security Fix(es): 
* ghostscript: .tempfile file permission issues (699657) (CVE-2018-15908) 
* ghostscript: shading_param incomplete type checking (699660) (CVE-2018-15909) 
* ghostscript: missing type check in type checker (699659) (CVE-2018-16511) 
* ghostscript: incorrect access checking in temp file handling to disclose contents of files (699658) (CVE-2018-16539)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-11-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ghostscript-gtk" release="31.el7_6.1" src="ghostscript-9.07-31.el7_6.1.src.rpm" version="9.07"><filename>ghostscript-gtk-9.07-31.el7_6.1.x86_64.rpm</filename><sum type="sha256">928ffc2cedfc74b24941c6b6f2e4f493cb0bb987069a08ef6acf884339919222</sum></package><package arch="i686" name="ghostscript-devel" release="31.el7_6.1" src="ghostscript-9.07-31.el7_6.1.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-31.el7_6.1.i686.rpm</filename><sum type="sha256">c90fc3e31e652af4a42d91dde2ed7c49de9ed91f39977e6441f41de7f2484d64</sum></package><package arch="noarch" name="ghostscript-doc" release="31.el7_6.1" src="ghostscript-9.07-31.el7_6.1.src.rpm" version="9.07"><filename>ghostscript-doc-9.07-31.el7_6.1.noarch.rpm</filename><sum type="sha256">34992ea2f3fe48ec7032bf2ad141f6cc73d87faf34f406000d8a2d8b3dfd34e5</sum></package><package arch="x86_64" name="ghostscript" release="31.el7_6.1" src="ghostscript-9.07-31.el7_6.1.src.rpm" version="9.07"><filename>ghostscript-9.07-31.el7_6.1.x86_64.rpm</filename><sum type="sha256">7b665b6fbb6f96940ced10e74e065a9b4a484a651c5cdf91a06310e89dbd79dc</sum></package><package arch="x86_64" name="ghostscript-devel" release="31.el7_6.1" src="ghostscript-9.07-31.el7_6.1.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-31.el7_6.1.x86_64.rpm</filename><sum type="sha256">f31b5ce3f3e6fee4d218b60271a10ef8c8c8ba6798621d42cc6ce10fdbf9bddd</sum></package><package arch="i686" name="ghostscript" release="31.el7_6.1" src="ghostscript-9.07-31.el7_6.1.src.rpm" version="9.07"><filename>ghostscript-9.07-31.el7_6.1.i686.rpm</filename><sum type="sha256">00a99b8b0a1b52888ec123237258e0f7d90c23488f5874d0b166ae4a4604089f</sum></package><package arch="x86_64" name="ghostscript-cups" release="31.el7_6.1" src="ghostscript-9.07-31.el7_6.1.src.rpm" version="9.07"><filename>ghostscript-cups-9.07-31.el7_6.1.x86_64.rpm</filename><sum type="sha256">d7537f4995456f80b56b9fec02d369b4c0a189c30fb0d2a8675cfeefb448b537</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15908" id="CVE-2018-15908" title="Ghostscript: .Tempfile File Permission Issues " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15909" id="CVE-2018-15909" title="Ghostscript: Shading_Param Incomplete Type " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16511" id="CVE-2018-16511" title="Ghostscript: Missing Type Check In Type Checker " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16539" id="CVE-2018-16539" title="Ghostscript: Incorrect Access Checking In Temp " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3650" id="RHSA-2018:3650-1" title="Rhsa-2018:3650-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1619756" id="1619756" title="Ghostscript: .Tempfile File Permission Issues " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1621359" id="1621359" title="Ghostscript: Missing Type Check In Type Checker " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1621361" id="1621361" title="Ghostscript: Shading_Param Incomplete Type " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625839" id="1625839" title="Ghostscript: Incorrect Access Checking In Temp " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3651-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: stack-based buffer overflow in chap_server_compute_md5() in iscsi target (CVE-2018-14633) 
* kernel: NULL pointer dereference in af_netlink.c:__netlink_ns_capable() allows for denial of service (CVE-2018-14646) 
Bug Fix(es): 
See the descriptions in the related Knowledge Article:</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-27 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-debug" release="957.1.3.el7" src="kernel-3.10.0-957.1.3.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-957.1.3.el7.x86_64.rpm</filename><sum type="sha256">dae10016b577b02bb693c080a11f4647711a7c9cbec103fa4747a351e9e3d27e</sum></package><package arch="x86_64" name="kernel-tools" release="957.1.3.el7" src="kernel-3.10.0-957.1.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-957.1.3.el7.x86_64.rpm</filename><sum type="sha256">f072ed86a9102143c4a0aa579a2c47943bd6603769f5b248a2de8cd917df0dc0</sum></package><package arch="x86_64" name="kernel-tools-libs" release="957.1.3.el7" src="kernel-3.10.0-957.1.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-957.1.3.el7.x86_64.rpm</filename><sum type="sha256">f7e3682fbb0faba8b81a7118798495bf63429cee14a76816a80c284e6cd15d6f</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="957.1.3.el7" src="kernel-3.10.0-957.1.3.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-957.1.3.el7.noarch.rpm</filename><sum type="sha256">5c41090d02ee0e582c84e29843a6a3c40cfa6f23bf5a697d2728c3ba5b2ec919</sum></package><package arch="x86_64" name="kernel-debug-devel" release="957.1.3.el7" src="kernel-3.10.0-957.1.3.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-957.1.3.el7.x86_64.rpm</filename><sum type="sha256">adfd95a42637421b8bf8651575c936cd93f088d353b05d11466cee973efad895</sum></package><package arch="x86_64" name="kernel-headers" release="957.1.3.el7" src="kernel-3.10.0-957.1.3.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-957.1.3.el7.x86_64.rpm</filename><sum type="sha256">068033ebdf2a264105012de02832051a2b51f8246374b699e59150a0af004d13</sum></package><package arch="x86_64" name="kernel-devel" release="957.1.3.el7" src="kernel-3.10.0-957.1.3.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-957.1.3.el7.x86_64.rpm</filename><sum type="sha256">5b7d103154d005372aa611f72680065e714930c9f9ed0c745e7bcce258d68673</sum></package><package arch="x86_64" name="python-perf" release="957.1.3.el7" src="kernel-3.10.0-957.1.3.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-957.1.3.el7.x86_64.rpm</filename><sum type="sha256">4c82bc35d4ec344d5d10a0082abc2141b43d691655d3308844e229e931786d8f</sum></package><package arch="noarch" name="kernel-doc" release="957.1.3.el7" src="kernel-3.10.0-957.1.3.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-957.1.3.el7.noarch.rpm</filename><sum type="sha256">d1db2a307d557e69f7342d5af1ef223c459bd41e49458161ce2031fa9498e1ca</sum></package><package arch="x86_64" name="perf" release="957.1.3.el7" src="kernel-3.10.0-957.1.3.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-957.1.3.el7.x86_64.rpm</filename><sum type="sha256">1ec39a44903aa41f352c82169a6942472034e95cb097cd1381884072618ea748</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="957.1.3.el7" src="kernel-3.10.0-957.1.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-957.1.3.el7.x86_64.rpm</filename><sum type="sha256">1779b6a9e4f33475766f09924bbda67d77f598343fafe70e737b8ec5b110edba</sum></package><package arch="x86_64" name="bpftool" release="957.1.3.el7" src="kernel-3.10.0-957.1.3.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-957.1.3.el7.x86_64.rpm</filename><sum type="sha256">d45b917fadf2d9517abc3178a05e7156d36593b3162075097bc2a142942d21bf</sum></package><package arch="x86_64" name="kernel" release="957.1.3.el7" src="kernel-3.10.0-957.1.3.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-957.1.3.el7.x86_64.rpm</filename><sum type="sha256">b78a415148da4a95885a7efa8521adde4cbce548220bc1ad255890ed5f4ec9b0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14633" id="CVE-2018-14633" title="Kernel: Stack-Based Buffer Overflow In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14646" id="CVE-2018-14646" title="Kernel: Null Pointer Dereference In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3651" id="RHSA-2018:3651-1" title="Rhsa-2018:3651-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1626035" id="1626035" title="Kernel: Stack-Based Buffer Overflow In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1630124" id="1630124" title="Kernel: Null Pointer Dereference In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3663-1</id><title>Sos-Collector</title><description>The following packages have been upgraded to a later upstream version: sos-collector (1.5). 
Security Fix(es): 
* sos-collector: incorrect permissions set on newly created files (CVE-2018-14650) 
This issue was discovered by Riccardo Schirone (Red Hat Product Security).</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2018-11-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="sos-collector" release="3.el7_6" src="sos-collector-1.5-3.el7_6.src.rpm" version="1.5"><filename>sos-collector-1.5-3.el7_6.noarch.rpm</filename><sum type="sha256">3bb29005767545a674824c0fdef96a53e5e202dc9549c4982965c879c6cab48c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14650" id="CVE-2018-14650" title="Sos-Collector: Incorrect Permissions Set On " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3663" id="RHSA-2018:3663-1" title="Rhsa-2018:3663-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1633243" id="1633243" title="Sos-Collector: Incorrect Permissions Set On " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3665-1</id><title>Networkmanager</title><description>Security Fix(es): 
* systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling (CVE-2018-15688)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-11-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="NetworkManager-glib-devel" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-glib-devel-1.12.0-8.el7_6.x86_64.rpm</filename><sum type="sha256">71a65001e23353156cc80d68b62246ba4f1537434f35c8a61067f60f451ce19e</sum></package><package arch="i686" epoch="1" name="NetworkManager-libnm" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-libnm-1.12.0-8.el7_6.i686.rpm</filename><sum type="sha256">02c80598bb10afce9d886aa042de2b94ddfec1d200c541c28c68ea6f788c0fc8</sum></package><package arch="i686" epoch="1" name="NetworkManager-glib" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-glib-1.12.0-8.el7_6.i686.rpm</filename><sum type="sha256">24f4b7741f5db37c47070e70cc3f5ba04a2574fb823be26fd24a59eb10140a0a</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-team" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-team-1.12.0-8.el7_6.x86_64.rpm</filename><sum type="sha256">fab545bbbb859f10ed41bd5361622990c8b29f80622f8e6c95fe3a66bd6e4a9a</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-ppp" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-ppp-1.12.0-8.el7_6.x86_64.rpm</filename><sum type="sha256">02137bd22c95de1e78210b25e717d8841ebbbbf025063c5d2cec8c6daa2860c6</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-adsl" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-adsl-1.12.0-8.el7_6.x86_64.rpm</filename><sum type="sha256">d3ae72cd0f7ed2aaf0bee9af504756a3b963a8dc24587e4af3f08c27ae373253</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-glib" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-glib-1.12.0-8.el7_6.x86_64.rpm</filename><sum type="sha256">3362cd5ee27a690adfeba59bf556f68ada7c29052b93df5da000a115b5f2b2a8</sum></package><package arch="noarch" epoch="1" name="NetworkManager-dispatcher-routing-rules" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-dispatcher-routing-rules-1.12.0-8.el7_6.noarch.rpm</filename><sum type="sha256">c4eb225da61338c054b54a6439cb83f70b4dca80c106083e1ee0e68e3459d202</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-wwan" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-wwan-1.12.0-8.el7_6.x86_64.rpm</filename><sum type="sha256">476aa0e351bb97efcf742596cf080c26bf5c1c4c9ded6cb983a3f234ba0a93cd</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-libnm-devel" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-libnm-devel-1.12.0-8.el7_6.x86_64.rpm</filename><sum type="sha256">91df2817a7cb6eda0494700502396bca44bbdbbb3df9518c60a31dbe96efe8e1</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-wifi" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-wifi-1.12.0-8.el7_6.x86_64.rpm</filename><sum type="sha256">dd8b2b17cfc90e1106f6b92ab1b8a37324accf414a89b54043aa96e5659edfff</sum></package><package arch="i686" epoch="1" name="NetworkManager-glib-devel" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-glib-devel-1.12.0-8.el7_6.i686.rpm</filename><sum type="sha256">f0c473945818a2a6d019cd2241a0bb17ff40834a4892fd21662b0553a6a2041d</sum></package><package arch="x86_64" epoch="1" name="NetworkManager" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-1.12.0-8.el7_6.x86_64.rpm</filename><sum type="sha256">9616db8513bc1793576a3a92a0af18839ba522e54ba73e88a14920db7765419c</sum></package><package arch="i686" epoch="1" name="NetworkManager-libnm-devel" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-libnm-devel-1.12.0-8.el7_6.i686.rpm</filename><sum type="sha256">e7561c497d0a076b2c2c20e9e2bd3826125901c3a20c7355d07d3515a7ce5a1d</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-libnm" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-libnm-1.12.0-8.el7_6.x86_64.rpm</filename><sum type="sha256">a62b170a0bfab3ffed2a8870f1a39fa819b19e7c2ea05a38e66a612a27b1adaa</sum></package><package arch="noarch" epoch="1" name="NetworkManager-config-server" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-config-server-1.12.0-8.el7_6.noarch.rpm</filename><sum type="sha256">162fe886ccb3a82da23d6e4af79c98a8a31c36d79a869d655d311df9af7b28ce</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-tui" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-tui-1.12.0-8.el7_6.x86_64.rpm</filename><sum type="sha256">9019a638357b8a846b7418a66008496690a48392b17184679f5e174fbc220db7</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-bluetooth" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-bluetooth-1.12.0-8.el7_6.x86_64.rpm</filename><sum type="sha256">6c088e0fed8bcf08ed6b41f213738d36425de88d72515584a0f602d124c9dd93</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-ovs" release="8.el7_6" src="NetworkManager-1.12.0-8.el7_6.src.rpm" version="1.12.0"><filename>NetworkManager-ovs-1.12.0-8.el7_6.x86_64.rpm</filename><sum type="sha256">d3ba5331ff1663af9ae3f7ce5bc3af6fb8711467022c5e03679ee48d4b24a60b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688" id="CVE-2018-15688" title="Systemd: Out-Of-Bounds Heap Write In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3665" id="RHSA-2018:3665-1" title="Rhsa-2018:3665-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639067" id="1639067" title="Systemd: Out-Of-Bounds Heap Write In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3738-1</id><title>Ruby</title><description>Security Fix(es): 
* ruby: OpenSSL::X509::Name equality check does not work correctly (CVE-2018-16395)</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-12-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="rubygem-rdoc" release="34.el7_6" src="ruby-2.0.0.648-34.el7_6.src.rpm" version="4.0.0"><filename>rubygem-rdoc-4.0.0-34.el7_6.noarch.rpm</filename><sum type="sha256">29c666387d7cfe9086c09ff244b5c20434c0e32d1c76a9bdf4191dcb6eb8db29</sum></package><package arch="x86_64" name="rubygem-bigdecimal" release="34.el7_6" src="ruby-2.0.0.648-34.el7_6.src.rpm" version="1.2.0"><filename>rubygem-bigdecimal-1.2.0-34.el7_6.x86_64.rpm</filename><sum type="sha256">e584dd299fae6dd23f6e4fc8d16edfb235e342166a31f149aa560f62a48a52f4</sum></package><package arch="x86_64" name="ruby-libs" release="34.el7_6" src="ruby-2.0.0.648-34.el7_6.src.rpm" version="2.0.0.648"><filename>ruby-libs-2.0.0.648-34.el7_6.x86_64.rpm</filename><sum type="sha256">c1a4edbb5f8f2209ef882c60cadc2904f5d4c1a936111d83351e634e780db074</sum></package><package arch="noarch" name="rubygem-rake" release="34.el7_6" src="ruby-2.0.0.648-34.el7_6.src.rpm" version="0.9.6"><filename>rubygem-rake-0.9.6-34.el7_6.noarch.rpm</filename><sum type="sha256">bfbb8086592edfdaeb0170fd0ccd43610d8e037b1759c2ddf363ce063146b751</sum></package><package arch="x86_64" name="ruby-devel" release="34.el7_6" src="ruby-2.0.0.648-34.el7_6.src.rpm" version="2.0.0.648"><filename>ruby-devel-2.0.0.648-34.el7_6.x86_64.rpm</filename><sum type="sha256">26e639ce3df021bfc0316bb14549c326d3d8964365dc7813b565ffbf12c11247</sum></package><package arch="noarch" name="ruby-doc" release="34.el7_6" src="ruby-2.0.0.648-34.el7_6.src.rpm" version="2.0.0.648"><filename>ruby-doc-2.0.0.648-34.el7_6.noarch.rpm</filename><sum type="sha256">972ccc5b81d71898fafe3f75fb5fd7b5f6cb60f3334375e2c9e251d702d96432</sum></package><package arch="x86_64" name="rubygem-json" release="34.el7_6" src="ruby-2.0.0.648-34.el7_6.src.rpm" version="1.7.7"><filename>rubygem-json-1.7.7-34.el7_6.x86_64.rpm</filename><sum type="sha256">b27ec8c22c2f1aa281b1e30886a8d9f5613f98270a3ade2bae5b542151253307</sum></package><package arch="noarch" name="ruby-irb" release="34.el7_6" src="ruby-2.0.0.648-34.el7_6.src.rpm" version="2.0.0.648"><filename>ruby-irb-2.0.0.648-34.el7_6.noarch.rpm</filename><sum type="sha256">2e7c26b03c574095a475aaa68594b255d908bf5a9e0c325025178f5c48615b74</sum></package><package arch="x86_64" name="ruby" release="34.el7_6" src="ruby-2.0.0.648-34.el7_6.src.rpm" version="2.0.0.648"><filename>ruby-2.0.0.648-34.el7_6.x86_64.rpm</filename><sum type="sha256">3dd0692e353d20ad99e2734a6dcf4b7644289a1da3191df958131624539312ff</sum></package><package arch="noarch" name="rubygem-minitest" release="34.el7_6" src="ruby-2.0.0.648-34.el7_6.src.rpm" version="4.3.2"><filename>rubygem-minitest-4.3.2-34.el7_6.noarch.rpm</filename><sum type="sha256">cecd8891eecab06a7d3ab4ca7a3fc2349b2a749cc7cd011cc8d9d3e064adcd2d</sum></package><package arch="noarch" name="rubygems" release="34.el7_6" src="ruby-2.0.0.648-34.el7_6.src.rpm" version="2.0.14.1"><filename>rubygems-2.0.14.1-34.el7_6.noarch.rpm</filename><sum type="sha256">3a72e31cf0b11a6176c2e7aac0cdefbda78f0b74ca272a8cacf7f0bbd89134a9</sum></package><package arch="x86_64" name="rubygem-io-console" release="34.el7_6" src="ruby-2.0.0.648-34.el7_6.src.rpm" version="0.4.2"><filename>rubygem-io-console-0.4.2-34.el7_6.x86_64.rpm</filename><sum type="sha256">c52f0078ecd28580ee48fa21bf55090413d05a4bf8eb9a602fe2df15a59c7974</sum></package><package arch="x86_64" name="rubygem-psych" release="34.el7_6" src="ruby-2.0.0.648-34.el7_6.src.rpm" version="2.0.0"><filename>rubygem-psych-2.0.0-34.el7_6.x86_64.rpm</filename><sum type="sha256">20a5080298421b2d0ebf5046f79d3ae70e4b2aa9f3caeff652a5617d64d49187</sum></package><package arch="i686" name="ruby-libs" release="34.el7_6" src="ruby-2.0.0.648-34.el7_6.src.rpm" version="2.0.0.648"><filename>ruby-libs-2.0.0.648-34.el7_6.i686.rpm</filename><sum type="sha256">b850a343c83e25e9e3518b41fdcbc7d475f7d36286d516682b7ab5cac0ad93d4</sum></package><package arch="noarch" name="rubygems-devel" release="34.el7_6" src="ruby-2.0.0.648-34.el7_6.src.rpm" version="2.0.14.1"><filename>rubygems-devel-2.0.14.1-34.el7_6.noarch.rpm</filename><sum type="sha256">742177ea1f7ce738a0e3cb82645547655dd4655f68495f51b6c02d29478e816a</sum></package><package arch="x86_64" name="ruby-tcltk" release="34.el7_6" src="ruby-2.0.0.648-34.el7_6.src.rpm" version="2.0.0.648"><filename>ruby-tcltk-2.0.0.648-34.el7_6.x86_64.rpm</filename><sum type="sha256">47ab6a3e1708c664474dbf4c7eb6d34dc7a783ce2eb37fb30fc92853623483c0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16395" id="CVE-2018-16395" title="Ruby: Openssl::X509::Name Equality Check Does " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3738" id="RHSA-2018:3738-1" title="Rhsa-2018:3738-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1643086" id="1643086" title="Ruby: Openssl::X509::Name Equality Check Does " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3761-1</id><title>Ghostscript</title><description>Security Fix(es): 
* ghostscript: incomplete fix for CVE-2018-16509 (CVE-2018-16863) 
Bug Fix(es): 
* Previously, the flushpage operator has been removed as part of a major clean-up of a non-standard operator. However, flushpage has been found to be used in a few specific use cases. With this update, it has been re- added to support those use cases.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-12-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ghostscript-doc" release="31.el7_6.3" src="ghostscript-9.07-31.el7_6.3.src.rpm" version="9.07"><filename>ghostscript-doc-9.07-31.el7_6.3.noarch.rpm</filename><sum type="sha256">dc8bde86c77f68aaed7c4b8db632451c2aeffd58ef201cd14f3f6dbd646287ae</sum></package><package arch="x86_64" name="ghostscript-devel" release="31.el7_6.3" src="ghostscript-9.07-31.el7_6.3.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-31.el7_6.3.x86_64.rpm</filename><sum type="sha256">1b2255a9120c2e1b73690073beedab024c623fc366b65cc190538a3b86afcc64</sum></package><package arch="i686" name="ghostscript-devel" release="31.el7_6.3" src="ghostscript-9.07-31.el7_6.3.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-31.el7_6.3.i686.rpm</filename><sum type="sha256">dd17f3411e714c137c18ad94c20d6352b1234c13baa0844ab2a9c95105e6b661</sum></package><package arch="x86_64" name="ghostscript-gtk" release="31.el7_6.3" src="ghostscript-9.07-31.el7_6.3.src.rpm" version="9.07"><filename>ghostscript-gtk-9.07-31.el7_6.3.x86_64.rpm</filename><sum type="sha256">ba399aa168c484cbbaf2624d5d97f6af07ee7158147b6e97894787ec398c2c60</sum></package><package arch="i686" name="ghostscript" release="31.el7_6.3" src="ghostscript-9.07-31.el7_6.3.src.rpm" version="9.07"><filename>ghostscript-9.07-31.el7_6.3.i686.rpm</filename><sum type="sha256">f1b46bf7d7f6342f996c36fe02bdb37f51a6a048b8cca7001c7e862e76129608</sum></package><package arch="x86_64" name="ghostscript" release="31.el7_6.3" src="ghostscript-9.07-31.el7_6.3.src.rpm" version="9.07"><filename>ghostscript-9.07-31.el7_6.3.x86_64.rpm</filename><sum type="sha256">a7f571bdb4fe1cc653a586dee11ec80fe6d7b81fdd327a6a1883f1031846e751</sum></package><package arch="x86_64" name="ghostscript-cups" release="31.el7_6.3" src="ghostscript-9.07-31.el7_6.3.src.rpm" version="9.07"><filename>ghostscript-cups-9.07-31.el7_6.3.x86_64.rpm</filename><sum type="sha256">3b467817c1ce92283417ea6229b46a225bf181fbcbd72c53efca5c4cb61fb8fa</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16863" id="CVE-2018-16863" title="Ghostscript: Incomplete Fix For Cve-2018-16509" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3761" id="RHSA-2018:3761-1" title="Rhsa-2018:3761-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1652893" id="1652893" title="Ghostscript: Incomplete Fix For Cve-2018-16509" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1654290" id="1654290" title="Ghostscript Update Breaks Xdvi (Gs: Error: /Undefined In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3833-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.4.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4 (CVE-2018-12405) 
* Mozilla: Memory corruption in Angle (CVE-2018-17466) 
* Mozilla: Use-after-free with select element (CVE-2018-18492) 
* Mozilla: Buffer overflow in accelerated 2D canvas with Skia (CVE-2018-18493) 
* Mozilla: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs (CVE-2018-18494) 
* Mozilla: Integer overflow when calculating buffer sizes for images (CVE-2018-18498)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2018-12-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7" src="firefox-60.4.0-1.el7.src.rpm" version="60.4.0"><filename>firefox-60.4.0-1.el7.i686.rpm</filename><sum type="sha256">d112f50633333a750e33ee4ae53901045672d1e9ea52c66a4ac0e1e3a5ccc522</sum></package><package arch="x86_64" name="firefox" release="1.el7" src="firefox-60.4.0-1.el7.src.rpm" version="60.4.0"><filename>firefox-60.4.0-1.el7.x86_64.rpm</filename><sum type="sha256">7aa3478c46c5825dbe9d9c40f52760dd050615774e2742c2758dc4e51aea2134</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12405" id="CVE-2018-12405" title="Mozilla: Memory Safety Bugs Fixed In Firefox 64" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17466" id="CVE-2018-17466" title="Cve-2018-17466" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18492" id="CVE-2018-18492" title="Mozilla: Use-After-Free With Select Element" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18493" id="CVE-2018-18493" title="Mozilla: Buffer Overflow In Accelerated 2D" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18494" id="CVE-2018-18494" title="Mozilla: Same-Origin Policy Violation Using" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18498" id="CVE-2018-18498" title="Mozilla: Integer Overflow When Calculating" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3833" id="RHSA-2018:3833-1" title="Rhsa-2018:3833-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1640102" id="1640102" title="Chromium-Browser, Firefox: Memory Corruption In" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658397" id="1658397" title="Mozilla: Memory Safety Bugs Fixed In Firefox 64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658399" id="1658399" title="Mozilla: Use-After-Free With Select Element" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658400" id="1658400" title="Mozilla: Buffer Overflow In Accelerated 2D" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658401" id="1658401" title="Mozilla: Same-Origin Policy Violation Using" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658402" id="1658402" title="Mozilla: Integer Overflow When Calculating" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2018:3834-1</id><title>Ghostscript</title><description>Security Fix(es): 
* ghostscript: Incorrect free logic in pagedevice replacement (699664) (CVE-2018-16541) 
* ghostscript: Incorrect "restoration of privilege" checking when running out of stack during exception handling (CVE-2018-16802) 
* ghostscript: User-writable error exception table (CVE-2018-17183) 
* ghostscript: Saved execution stacks can leak operator arrays (incomplete fix for CVE-2018-17183) (CVE-2018-17961) 
* ghostscript: Saved execution stacks can leak operator arrays (CVE-2018-18073) 
* ghostscript: 1Policy operator allows a sandbox protection bypass (CVE-2018-18284) 
* ghostscript: Type confusion in setpattern (700141) (CVE-2018-19134) 
* ghostscript: Improperly implemented security check in zsetdevice function in psi/zdevice.c (CVE-2018-19409) 
* ghostscript: Uninitialized memory access in the aesdecode operator (699665) (CVE-2018-15911) 
Bug Fix(es): 
* It has been found that ghostscript-9.07-31.el7_6.1 introduced regression during the handling of shading objects, causing a "Dropping incorrect smooth shading object" warning. With this update, the regression has been fixed and the described problem no longer occurs.</description><severity>important</severity><release>Scientific Linux</release><issued date="2018-12-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ghostscript" release="31.el7_6.6" src="ghostscript-9.07-31.el7_6.6.src.rpm" version="9.07"><filename>ghostscript-9.07-31.el7_6.6.x86_64.rpm</filename><sum type="sha256">71a2b5b66410e23b951c33f0c0a8273cb3749c992b6415ed1ef19488256a96f2</sum></package><package arch="i686" name="ghostscript" release="31.el7_6.6" src="ghostscript-9.07-31.el7_6.6.src.rpm" version="9.07"><filename>ghostscript-9.07-31.el7_6.6.i686.rpm</filename><sum type="sha256">90ce694187d10a88bb142771ca9c6f0909d42b1a0bcf61125acf080ec1bdc509</sum></package><package arch="x86_64" name="ghostscript-cups" release="31.el7_6.6" src="ghostscript-9.07-31.el7_6.6.src.rpm" version="9.07"><filename>ghostscript-cups-9.07-31.el7_6.6.x86_64.rpm</filename><sum type="sha256">55dba389eaaacb6f70ab14e0fa7e02ef91cb915b62a3f9422aaf52b1a45a7362</sum></package><package arch="x86_64" name="ghostscript-gtk" release="31.el7_6.6" src="ghostscript-9.07-31.el7_6.6.src.rpm" version="9.07"><filename>ghostscript-gtk-9.07-31.el7_6.6.x86_64.rpm</filename><sum type="sha256">a8a0797d405c078c2f1ed98e918814b5d1749ad6b5650ed41cca0e9ea835ca42</sum></package><package arch="noarch" name="ghostscript-doc" release="31.el7_6.6" src="ghostscript-9.07-31.el7_6.6.src.rpm" version="9.07"><filename>ghostscript-doc-9.07-31.el7_6.6.noarch.rpm</filename><sum type="sha256">6a7e555ab2210b1b948912c7c0c92e8237a9793c9c0ac5c9e2a4cb9550ea09b1</sum></package><package arch="i686" name="ghostscript-devel" release="31.el7_6.6" src="ghostscript-9.07-31.el7_6.6.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-31.el7_6.6.i686.rpm</filename><sum type="sha256">5861277b6e5e33fcc38de3debf3ede9cae23c27a60b29c98968e586a9404af4b</sum></package><package arch="x86_64" name="ghostscript-devel" release="31.el7_6.6" src="ghostscript-9.07-31.el7_6.6.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-31.el7_6.6.x86_64.rpm</filename><sum type="sha256">76add74c2facaa92f53d27021c56a85569f761765ca184bfbdb7bda54dba36ec</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15911" id="CVE-2018-15911" title="Ghostscript: Uninitialized Memory Access In The" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16541" id="CVE-2018-16541" title="Ghostscript: Incorrect Free Logic In Pagedevice" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16802" id="CVE-2018-16802" title="Ghostscript: Incorrect &quot;Restoration Of" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17183" id="CVE-2018-17183" title="Ghostscript: User-Writable Error Exception Table" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17961" id="CVE-2018-17961" title="Ghostscript: Saved Execution Stacks Can Leak" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18073" id="CVE-2018-18073" title="Ghostscript: Saved Execution Stacks Can Leak" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18284" id="CVE-2018-18284" title="Ghostscript: 1Policy Operator Allows A Sandbox" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19134" id="CVE-2018-19134" title="Ghostscript: Type Confusion In Setpattern (700141)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19409" id="CVE-2018-19409" title="Ghostscript: Improperly Implemented Security" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2018:3834" id="RHSA-2018:3834-1" title="Rhsa-2018:3834-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625832" id="1625832" title="Ghostscript: Uninitialized Memory Access In The" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625846" id="1625846" title="Ghostscript: Incorrect Free Logic In Pagedevice" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1627959" id="1627959" title="Ghostscript: Incorrect &quot;Restoration Of" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1632471" id="1632471" title="Ghostscript: User-Writable Error Exception Table" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642578" id="1642578" title="Ghostscript: Saved Execution Stacks Can Leak" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642584" id="1642584" title="Ghostscript: Saved Execution Stacks Can Leak" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642940" id="1642940" title="Ghostscript: 1Policy Operator Allows A Sandbox" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1652583" id="1652583" title="Ghostscript: Improperly Implemented Security" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1655599" id="1655599" title="Ghostscript: Type Confusion In Setpattern (700141)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1657822" id="1657822" title="Ghostscript: Regression: Warning: Dropping Incorrect Smooth" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0022-1</id><title>Keepalived</title><description>Security Fix(es): 
* keepalived: Heap-based buffer overflow when parsing HTTP status codes allows for denial of service or possibly arbitrary code execution (CVE-2018-19115)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-01-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="keepalived" release="8.el7_6" src="keepalived-1.3.5-8.el7_6.src.rpm" version="1.3.5"><filename>keepalived-1.3.5-8.el7_6.x86_64.rpm</filename><sum type="sha256">b942ab03efa6dcf9a580aa10b128328b86e273c961a0f56ce3102dd055c409b5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19115" id="CVE-2018-19115" title="Keepalived: Heap-Based Buffer Overflow When " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0022" id="RHSA-2019:0022-1" title="Rhsa-2019:0022-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1651871" id="1651871" title="Keepalived: Heap-Based Buffer Overflow When " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0049-1</id><title>Systemd</title><description>Security Fix(es): 
* systemd: Out-of-bounds heap write in systemd-networkd dhcpv6 option handling (CVE-2018-15688) 
* systemd: stack overflow when calling syslog from a command with long cmdline (CVE-2018-16864) 
* systemd: stack overflow when receiving many journald entries (CVE-2018-16865)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-01-14 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libgudev1-devel" release="62.el7_6.2" src="systemd-219-62.el7_6.2.src.rpm" version="219"><filename>libgudev1-devel-219-62.el7_6.2.x86_64.rpm</filename><sum type="sha256">22607bc4a1fa8202d0b226d56d738aadd6f752b766965aadf64e6c77adfcadf9</sum></package><package arch="i686" name="systemd-libs" release="62.el7_6.2" src="systemd-219-62.el7_6.2.src.rpm" version="219"><filename>systemd-libs-219-62.el7_6.2.i686.rpm</filename><sum type="sha256">65dbbcbf02b651a11e568989f5efb2ad152ea20a63e23f5d15ba109f20de950b</sum></package><package arch="x86_64" name="systemd-sysv" release="62.el7_6.2" src="systemd-219-62.el7_6.2.src.rpm" version="219"><filename>systemd-sysv-219-62.el7_6.2.x86_64.rpm</filename><sum type="sha256">ec86080f6a609344b77cad72f32fdf54342378a0ff8300d90776a7c65097c57f</sum></package><package arch="x86_64" name="systemd-libs" release="62.el7_6.2" src="systemd-219-62.el7_6.2.src.rpm" version="219"><filename>systemd-libs-219-62.el7_6.2.x86_64.rpm</filename><sum type="sha256">fa41c657cd5cda8d950b73949cbfc80b4efec6dfa64e5047431c1dab4a848080</sum></package><package arch="i686" name="systemd-resolved" release="62.el7_6.2" src="systemd-219-62.el7_6.2.src.rpm" version="219"><filename>systemd-resolved-219-62.el7_6.2.i686.rpm</filename><sum type="sha256">9ea3631370d0d0b263070377f242a25ceb214a215b2b5002ce1cea0b680a6df4</sum></package><package arch="i686" name="libgudev1-devel" release="62.el7_6.2" src="systemd-219-62.el7_6.2.src.rpm" version="219"><filename>libgudev1-devel-219-62.el7_6.2.i686.rpm</filename><sum type="sha256">9d8dfac998956e1e91270b6af0657194441a3eefeeb0ef3c1fda99c47c5265b4</sum></package><package arch="x86_64" name="libgudev1" release="62.el7_6.2" src="systemd-219-62.el7_6.2.src.rpm" version="219"><filename>libgudev1-219-62.el7_6.2.x86_64.rpm</filename><sum type="sha256">eafe889b8092a3420f5cf6bd787daa2a402fb285c5024e8b43383c8ecbe72930</sum></package><package arch="x86_64" name="systemd-journal-gateway" release="62.el7_6.2" src="systemd-219-62.el7_6.2.src.rpm" version="219"><filename>systemd-journal-gateway-219-62.el7_6.2.x86_64.rpm</filename><sum type="sha256">6250ad9f8dd5a33851da21eace739a3190ce4c03952ad8f620f8cec5ec548b9c</sum></package><package arch="x86_64" name="systemd-devel" release="62.el7_6.2" src="systemd-219-62.el7_6.2.src.rpm" version="219"><filename>systemd-devel-219-62.el7_6.2.x86_64.rpm</filename><sum type="sha256">e930f1f3e086b549f0bf310cccee04b8f2c6ad9bd4c78ff9d6a1f55cf45141c8</sum></package><package arch="x86_64" name="systemd-resolved" release="62.el7_6.2" src="systemd-219-62.el7_6.2.src.rpm" version="219"><filename>systemd-resolved-219-62.el7_6.2.x86_64.rpm</filename><sum type="sha256">7dd30c557ed0d3dffb41314b737b8d5dd5d7a32397ae089d58050de3f8692971</sum></package><package arch="i686" name="libgudev1" release="62.el7_6.2" src="systemd-219-62.el7_6.2.src.rpm" version="219"><filename>libgudev1-219-62.el7_6.2.i686.rpm</filename><sum type="sha256">a8670ff0727c24dbfe4617a89a2e255a7170b6a402e1d91985eab5f7911b032e</sum></package><package arch="x86_64" name="systemd-python" release="62.el7_6.2" src="systemd-219-62.el7_6.2.src.rpm" version="219"><filename>systemd-python-219-62.el7_6.2.x86_64.rpm</filename><sum type="sha256">0625de7759c3863ee71af805e7259961014e1f3a95d14a7f9e66133e12926890</sum></package><package arch="x86_64" name="systemd-networkd" release="62.el7_6.2" src="systemd-219-62.el7_6.2.src.rpm" version="219"><filename>systemd-networkd-219-62.el7_6.2.x86_64.rpm</filename><sum type="sha256">c994f96329501be7cc1cce348bb643cb686129a63af4fc52d23b777ce76c2af9</sum></package><package arch="i686" name="systemd-devel" release="62.el7_6.2" src="systemd-219-62.el7_6.2.src.rpm" version="219"><filename>systemd-devel-219-62.el7_6.2.i686.rpm</filename><sum type="sha256">048a5988f8370c6b5d16be82ae7420f075c27460fe6f0fa8f90977551d640a89</sum></package><package arch="x86_64" name="systemd" release="62.el7_6.2" src="systemd-219-62.el7_6.2.src.rpm" version="219"><filename>systemd-219-62.el7_6.2.x86_64.rpm</filename><sum type="sha256">b53511456522c9ccbb8780a9df82eeea19f585da266782add8dde11d1985f8dd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15688" id="CVE-2018-15688" title="Systemd: Out-Of-Bounds Heap Write In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16864" id="CVE-2018-16864" title="Systemd: Stack Overflow When Calling Syslog " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16865" id="CVE-2018-16865" title="Systemd: Stack Overflow When Receiving Many " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0049" id="RHSA-2019:0049-1" title="Rhsa-2019:0049-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639067" id="1639067" title="Systemd: Out-Of-Bounds Heap Write In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1653855" id="1653855" title="Systemd: Stack Overflow When Calling Syslog " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1653861" id="1653861" title="Systemd: Stack Overflow When Receiving Many " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0059-1</id><title>Libvncserver</title><description>Security Fix(es): 
* libvncserver: Heap out-of-bounds write in rfbserver.c in rfbProcessFileTransferReadBuffer() allows for potential code execution (CVE-2018-15127)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-01-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libvncserver" release="13.el7_6" src="libvncserver-0.9.9-13.el7_6.src.rpm" version="0.9.9"><filename>libvncserver-0.9.9-13.el7_6.i686.rpm</filename><sum type="sha256">5d8595e3c342f850867d601329e6994331a19f46d5abb00fa4ba27e35b1962ed</sum></package><package arch="x86_64" name="libvncserver" release="13.el7_6" src="libvncserver-0.9.9-13.el7_6.src.rpm" version="0.9.9"><filename>libvncserver-0.9.9-13.el7_6.x86_64.rpm</filename><sum type="sha256">f1eba77a642d5c5e7aa2d082713cb03dbd1f57d47f9dac983d3b4c8a11d2b53a</sum></package><package arch="x86_64" name="libvncserver-devel" release="13.el7_6" src="libvncserver-0.9.9-13.el7_6.src.rpm" version="0.9.9"><filename>libvncserver-devel-0.9.9-13.el7_6.x86_64.rpm</filename><sum type="sha256">34ed18dc8410927f0d8b9bc75d9c6b63cf17b80717a6ff273e9682979a47258d</sum></package><package arch="i686" name="libvncserver-devel" release="13.el7_6" src="libvncserver-0.9.9-13.el7_6.src.rpm" version="0.9.9"><filename>libvncserver-devel-0.9.9-13.el7_6.i686.rpm</filename><sum type="sha256">f0fcd95a91d8979c86977c522eff61360ef5899dd00d417158d03afb115e2726</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15127" id="CVE-2018-15127" title="Libvncserver: Heap Out-Of-Bounds Write In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0059" id="RHSA-2019:0059-1" title="Rhsa-2019:0059-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1661102" id="1661102" title="Libvncserver: Heap Out-Of-Bounds Write In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0109-1</id><title>Perl</title><description>Security Fix(es): 
* perl: Integer overflow leading to buffer overflow in Perl_my_setenv() (CVE-2018-18311)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-01-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="perl-IO-Zlib" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="1.10"><filename>perl-IO-Zlib-1.10-294.el7_6.noarch.rpm</filename><sum type="sha256">edf4f9693c82e4b6bd2b0a9893d649c24267d6be14309b97e62678914da88791</sum></package><package arch="noarch" epoch="1" name="perl-Package-Constants" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="0.02"><filename>perl-Package-Constants-0.02-294.el7_6.noarch.rpm</filename><sum type="sha256">6e4b4b3761593923c8da62e5c4c848f0d6d04345b19e25bb41b8b58540ae2d17</sum></package><package arch="noarch" name="perl-ExtUtils-Install" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="1.58"><filename>perl-ExtUtils-Install-1.58-294.el7_6.noarch.rpm</filename><sum type="sha256">2b72fc269df845e6d70129ff60ae5682799b26dbd0eff416726cd27388884630</sum></package><package arch="noarch" epoch="1" name="perl-ExtUtils-CBuilder" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="0.28.2.6"><filename>perl-ExtUtils-CBuilder-0.28.2.6-294.el7_6.noarch.rpm</filename><sum type="sha256">91b8aaf71189e97e5e65817363089d8c61a443831065d6e1cbc6afbcbf499d48</sum></package><package arch="noarch" epoch="1" name="perl-Pod-Escapes" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="1.04"><filename>perl-Pod-Escapes-1.04-294.el7_6.noarch.rpm</filename><sum type="sha256">30969fba71886faba27f8f3e0ff0b62f71423a7f1b6604331d0ee6655f7436fa</sum></package><package arch="x86_64" epoch="4" name="perl-devel" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="5.16.3"><filename>perl-devel-5.16.3-294.el7_6.x86_64.rpm</filename><sum type="sha256">5cdc80ba74a730a2701cb4d43a889cee11a31874d762123eb84cca8183c68f95</sum></package><package arch="noarch" epoch="1" name="perl-Module-Loaded" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="0.08"><filename>perl-Module-Loaded-0.08-294.el7_6.noarch.rpm</filename><sum type="sha256">a708fbe29bea7f70b6f50df5fc903b51de95070dcdeea6e47197ff1abbae564c</sum></package><package arch="noarch" name="perl-ExtUtils-Embed" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="1.30"><filename>perl-ExtUtils-Embed-1.30-294.el7_6.noarch.rpm</filename><sum type="sha256">c5bff862e7ff2d44b1955eb8e6d54aa2d5c588e1afbd8633c30aabea1a493a03</sum></package><package arch="i686" epoch="4" name="perl-libs" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="5.16.3"><filename>perl-libs-5.16.3-294.el7_6.i686.rpm</filename><sum type="sha256">89ac0b813a69a4e34605fea3d6d481d47287603326eb92192902d5c7a40b3845</sum></package><package arch="noarch" name="perl-CPAN" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="1.9800"><filename>perl-CPAN-1.9800-294.el7_6.noarch.rpm</filename><sum type="sha256">b07be44b857f347df2c06828b1ba4d051b8699e303ffbb0c38816108be20f193</sum></package><package arch="x86_64" epoch="4" name="perl-tests" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="5.16.3"><filename>perl-tests-5.16.3-294.el7_6.x86_64.rpm</filename><sum type="sha256">9903361400d7705bc9c76ca668d271e010f05b5507c08afd2b718f460e2f3e03</sum></package><package arch="x86_64" epoch="4" name="perl-macros" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="5.16.3"><filename>perl-macros-5.16.3-294.el7_6.x86_64.rpm</filename><sum type="sha256">49343b448f3fc5ca059b97f684f77bb0ecb38a82396e7c111aeb45fd15c4b668</sum></package><package arch="noarch" epoch="1" name="perl-Object-Accessor" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="0.42"><filename>perl-Object-Accessor-0.42-294.el7_6.noarch.rpm</filename><sum type="sha256">3365e80482b492d739cdc7273c28a540d03b3d4fcb6ea649a7425d97b8a68166</sum></package><package arch="x86_64" name="perl-Time-Piece" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="1.20.1"><filename>perl-Time-Piece-1.20.1-294.el7_6.x86_64.rpm</filename><sum type="sha256">752e6dbd357ed4c126431c5473a93467cfdabb14aa9cec89d93f07e44e88ba0f</sum></package><package arch="noarch" epoch="1" name="perl-Module-CoreList" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="2.76.02"><filename>perl-Module-CoreList-2.76.02-294.el7_6.noarch.rpm</filename><sum type="sha256">c273663c4cbc2e355af58fc91f8da82a92b3af7c4d25bf913f341482b225b1c3</sum></package><package arch="x86_64" name="perl-core" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="5.16.3"><filename>perl-core-5.16.3-294.el7_6.x86_64.rpm</filename><sum type="sha256">91cd3a6358392659b355f0a334e7935cf45ad1f8e953b1bf4ba1f39121c44856</sum></package><package arch="x86_64" epoch="4" name="perl" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="5.16.3"><filename>perl-5.16.3-294.el7_6.x86_64.rpm</filename><sum type="sha256">9a5cd5bc7c3c47e167361587d143ae971756a8a38064e8ba72a1adbff0d66ae3</sum></package><package arch="i686" epoch="4" name="perl-devel" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="5.16.3"><filename>perl-devel-5.16.3-294.el7_6.i686.rpm</filename><sum type="sha256">57cec55b2efe28598509fb6a97c590e0060f1d93e6ead02f59575d5225c4e0df</sum></package><package arch="x86_64" epoch="4" name="perl-libs" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="5.16.3"><filename>perl-libs-5.16.3-294.el7_6.x86_64.rpm</filename><sum type="sha256">c449b53461bd02dd4cff8b7c24a6a73ad675fe6b3657c8d85528d8890d146b4b</sum></package><package arch="noarch" epoch="1" name="perl-Locale-Maketext-Simple" release="294.el7_6" src="perl-5.16.3-294.el7_6.src.rpm" version="0.21"><filename>perl-Locale-Maketext-Simple-0.21-294.el7_6.noarch.rpm</filename><sum type="sha256">506d9886d3246b412f6825b9b3a23af17246618e1c84f7e4d87ac71d1b648f92</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18311" id="CVE-2018-18311" title="Perl: Integer Overflow Leading To Buffer " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0109" id="RHSA-2019:0109-1" title="Rhsa-2019:0109-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646730" id="1646730" title="Perl: Integer Overflow Leading To Buffer " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0160-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 60.4.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4 (CVE-2018-12405) 
* chromium-browser, firefox: Memory corruption in Angle (CVE-2018-17466) 
* Mozilla: Use-after-free with select element (CVE-2018-18492) 
* Mozilla: Buffer overflow in accelerated 2D canvas with Skia (CVE-2018-18493) 
* Mozilla: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs (CVE-2018-18494) 
* Mozilla: Integer overflow when calculating buffer sizes for images (CVE-2018-18498)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-01-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_6" src="thunderbird-60.4.0-1.el7_6.src.rpm" version="60.4.0"><filename>thunderbird-60.4.0-1.el7_6.x86_64.rpm</filename><sum type="sha256">06a305bd4d99477d05f1b0f98cd40e92b8a90bfde854c1803c2c1dd57d5ed768</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12405" id="CVE-2018-12405" title="Mozilla: Memory Safety Bugs Fixed In Firefox 64" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17466" id="CVE-2018-17466" title="Cve-2018-17466" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18492" id="CVE-2018-18492" title="Mozilla: Use-After-Free With Select Element" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18493" id="CVE-2018-18493" title="Mozilla: Buffer Overflow In Accelerated 2D" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18494" id="CVE-2018-18494" title="Mozilla: Same-Origin Policy Violation Using" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18498" id="CVE-2018-18498" title="Mozilla: Integer Overflow When Calculating" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0160" id="RHSA-2019:0160-1" title="Rhsa-2019:0160-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1640102" id="1640102" title="Chromium-Browser, Firefox: Memory Corruption In" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658397" id="1658397" title="Mozilla: Memory Safety Bugs Fixed In Firefox 64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658399" id="1658399" title="Mozilla: Use-After-Free With Select Element" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658400" id="1658400" title="Mozilla: Buffer Overflow In Accelerated 2D" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658401" id="1658401" title="Mozilla: Same-Origin Policy Violation Using" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658402" id="1658402" title="Mozilla: Integer Overflow When Calculating" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0163-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: Use-after-free due to race condition in AF_PACKET implementation (CVE-2018-18559) 
* kernel: userfaultfd bypasses tmpfs file permissions (CVE-2018-18397) 
Bug Fix(es): 
See the descriptions in the related Knowledge Article:</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-01-29 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-perf" release="957.5.1.el7" src="kernel-3.10.0-957.5.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-957.5.1.el7.x86_64.rpm</filename><sum type="sha256">548dfb513c253164978d82eca968ac2ad036a4d5dd0189b9dcf897358e8c5964</sum></package><package arch="x86_64" name="perf" release="957.5.1.el7" src="kernel-3.10.0-957.5.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-957.5.1.el7.x86_64.rpm</filename><sum type="sha256">b2b2dfe5bb937a4eab8c3b73ab4a1a4ed5eeac352c3af512baf5f45a656235a5</sum></package><package arch="x86_64" name="kernel-devel" release="957.5.1.el7" src="kernel-3.10.0-957.5.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-957.5.1.el7.x86_64.rpm</filename><sum type="sha256">9e7283070955b09f75f825b9ecc946c78145dd70ef16db762c6bec201c70ba2e</sum></package><package arch="x86_64" name="kernel-headers" release="957.5.1.el7" src="kernel-3.10.0-957.5.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-957.5.1.el7.x86_64.rpm</filename><sum type="sha256">840a21209e828818b4d136a39571e8b8555d1195280766aae033e0e00a544994</sum></package><package arch="x86_64" name="kernel-debug-devel" release="957.5.1.el7" src="kernel-3.10.0-957.5.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-957.5.1.el7.x86_64.rpm</filename><sum type="sha256">6ae15aaedf396c08ec1f036d049a1236c743b2ab8c6445de20cf7f8da60e0c94</sum></package><package arch="x86_64" name="bpftool" release="957.5.1.el7" src="kernel-3.10.0-957.5.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-957.5.1.el7.x86_64.rpm</filename><sum type="sha256">83c5d209e53326b595137fcf77c6eb99ae7d9ad0d44d92665dc4757effd8eb5d</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="957.5.1.el7" src="kernel-3.10.0-957.5.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-957.5.1.el7.noarch.rpm</filename><sum type="sha256">a4c61af0157259f0b9dde3f00da697a67fbeafa3c552ca96a4812b0594662f46</sum></package><package arch="x86_64" name="kernel" release="957.5.1.el7" src="kernel-3.10.0-957.5.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-957.5.1.el7.x86_64.rpm</filename><sum type="sha256">dfd2208d0b34e63350b196b510f1ed3da7722572a9cc5a15686cbc18508591a8</sum></package><package arch="noarch" name="kernel-doc" release="957.5.1.el7" src="kernel-3.10.0-957.5.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-957.5.1.el7.noarch.rpm</filename><sum type="sha256">012a4ac238ffe9dcf9a6000e7437ca9352a87202dc9d0d32fc6d2c9ec48873f7</sum></package><package arch="x86_64" name="kernel-tools" release="957.5.1.el7" src="kernel-3.10.0-957.5.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-957.5.1.el7.x86_64.rpm</filename><sum type="sha256">507f3c0f796bfa153cc9c01f956457c3d35a3b81d18174e0d06147a8567b0b38</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="957.5.1.el7" src="kernel-3.10.0-957.5.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-957.5.1.el7.x86_64.rpm</filename><sum type="sha256">15e2231d7d0a55f0b839fe5f0cd48befc6dd02876cffa4d840969dcab2fb4a2c</sum></package><package arch="x86_64" name="kernel-debug" release="957.5.1.el7" src="kernel-3.10.0-957.5.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-957.5.1.el7.x86_64.rpm</filename><sum type="sha256">ef58b84aeadbd614eb766961143ac00c17d634a9d4df0d818597a35f2d7af84c</sum></package><package arch="x86_64" name="kernel-tools-libs" release="957.5.1.el7" src="kernel-3.10.0-957.5.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-957.5.1.el7.x86_64.rpm</filename><sum type="sha256">95f8ef248b61f15b6a199d915d52456e2d61521eae7f9e7be81939afb9af74c5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18397" id="CVE-2018-18397" title="Kernel: Userfaultfd Bypasses Tmpfs File Permissions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18559" id="CVE-2018-18559" title="Kernel: Use-After-Free Due To Race Condition In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0163" id="RHSA-2019:0163-1" title="Rhsa-2019:0163-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1641548" id="1641548" title="Kernel: Userfaultfd Bypasses Tmpfs File Permissions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1641878" id="1641878" title="Kernel: Use-After-Free Due To Race Condition In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0194-1</id><title>Bind</title><description>Security Fix(es): 
* bind: Crash from assertion error when debug log level is 10 and log entries meet buffer boundary (CVE-2018-5742)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-01-29 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="32" name="bind-license" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-license-9.9.4-73.el7_6.noarch.rpm</filename><sum type="sha256">2cbbf9763155101ca4b0699c36eb2efef7cadc8cfc23d4d462cc9cd9ea339daa</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-chroot-9.9.4-73.el7_6.x86_64.rpm</filename><sum type="sha256">f37a10f7b2f4812cd5da7d7b5a490394cea0479ecf76c24ad8826284142f76b0</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-73.el7_6.i686.rpm</filename><sum type="sha256">1c3c07dc71c42d46e8293ba8c6e6c1659d0a74eacf70d8928f4a0ead56f4882b</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-pkcs11-9.9.4-73.el7_6.x86_64.rpm</filename><sum type="sha256">f535de09ae4a95bc1449d82a6122cff6064daf43d6618bc59eb4928acbc64a2b</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-73.el7_6.x86_64.rpm</filename><sum type="sha256">51efa7ba9062d266303f0b784cfc2d7d6ff3ef8ef6dc3202a5b75368209c19f3</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-73.el7_6.x86_64.rpm</filename><sum type="sha256">e16a55490c423c7b35ae6599954443825df8c3d1782863c2aa9237b85ad689d3</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-sdb-9.9.4-73.el7_6.x86_64.rpm</filename><sum type="sha256">1a9da3d0d4a4a6b6cea4c33fc9516a30a7e291ad8bee531eebf1e9c4c27445ce</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-73.el7_6.x86_64.rpm</filename><sum type="sha256">913a83e5492dfaf7a9f7352cf8443d0ebd26e790171ca4a3fd678bb2da7cdc5e</sum></package><package arch="i686" epoch="32" name="bind-libs" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-73.el7_6.i686.rpm</filename><sum type="sha256">b23628bf0c701e73b761210100ea613cbb9a002b878335e3ed15416f0cd6004a</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-utils-9.9.4-73.el7_6.x86_64.rpm</filename><sum type="sha256">2a110da2d6c841a72aba898e09b38a8861296ca982d82e3baf872d7eda41b47b</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-73.el7_6.i686.rpm</filename><sum type="sha256">1c2dee46025a60931d0fa57fe43c3fbbdac4ce74f26a6692de637c4d7a2b0654</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-73.el7_6.i686.rpm</filename><sum type="sha256">f0b8e5b4477bafba2d6ef0c0a51eda0b9ebe2e46d8e296a76fa824a12fb1bfb0</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-73.el7_6.x86_64.rpm</filename><sum type="sha256">d3721fb8ca503fea5a6d93d8fb44d7cb4f15ae930e5aa20977da7916e35a57f0</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-73.el7_6.i686.rpm</filename><sum type="sha256">3fa394e241ecfe90c68fc2dbf107a76aae501beb4c00329a0b5d1e08fd3c501b</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-73.el7_6.x86_64.rpm</filename><sum type="sha256">38676046a766151eea148552368c8c0216cf043486df2f507a6d697bc1d7d23b</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-pkcs11-utils-9.9.4-73.el7_6.x86_64.rpm</filename><sum type="sha256">807947dfd1ea3dea4a0073e87dc3f6cdb338a5e676ead4c0337220b2ac9b08aa</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-73.el7_6.x86_64.rpm</filename><sum type="sha256">9823437c25ebfa56d9a1882c376a01609213f428cbc64b2df31373fa210e048a</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-sdb-chroot-9.9.4-73.el7_6.x86_64.rpm</filename><sum type="sha256">95ac7fb80835ff0352b341771b5c2c7871c645d8366557eb48929d1eb1b003df</sum></package><package arch="x86_64" epoch="32" name="bind" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-9.9.4-73.el7_6.x86_64.rpm</filename><sum type="sha256">cb9e450e99af6d99da1dd02c83e9b590cecd033bec732c96738cb58d6c003fbf</sum></package><package arch="i686" epoch="32" name="bind-devel" release="73.el7_6" src="bind-9.9.4-73.el7_6.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-73.el7_6.i686.rpm</filename><sum type="sha256">0a5e76dc91d115ba1ad743c4c8d46aa22fa4513d97d92a74085ffcd128362fa6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5742" id="CVE-2018-5742" title="Bind: Crash From Assertion Error When Debug Log " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0194" id="RHSA-2019:0194-1" title="Rhsa-2019:0194-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1655844" id="1655844" title="Bind: Crash From Assertion Error When Debug Log " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0201-1</id><title>Systemd</title><description>Security Fix(es): 
* systemd: memory leak in journald-server.c introduced by fix for CVE-2018-16864 (CVE-2019-3815)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-01-29 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="systemd-networkd" release="62.el7_6.3" src="systemd-219-62.el7_6.3.src.rpm" version="219"><filename>systemd-networkd-219-62.el7_6.3.x86_64.rpm</filename><sum type="sha256">1aa58f3dc5d0ee43f6e194fe4b78186fed43d594eb4bff4067d29576144e48d0</sum></package><package arch="i686" name="systemd-resolved" release="62.el7_6.3" src="systemd-219-62.el7_6.3.src.rpm" version="219"><filename>systemd-resolved-219-62.el7_6.3.i686.rpm</filename><sum type="sha256">72d45808e5a3f9cfc61be4c01f38c95c0637a5af2c9896da9cb90daaa3a01377</sum></package><package arch="x86_64" name="systemd-python" release="62.el7_6.3" src="systemd-219-62.el7_6.3.src.rpm" version="219"><filename>systemd-python-219-62.el7_6.3.x86_64.rpm</filename><sum type="sha256">11ca08f4b489f4a281ed57700399bf327224264ff7cbb0925c56084a04e41787</sum></package><package arch="i686" name="libgudev1" release="62.el7_6.3" src="systemd-219-62.el7_6.3.src.rpm" version="219"><filename>libgudev1-219-62.el7_6.3.i686.rpm</filename><sum type="sha256">1d00b6696fd06472873d1ddefe0a255c99026cff55cda70ebb7a08bb1a9308eb</sum></package><package arch="x86_64" name="systemd-journal-gateway" release="62.el7_6.3" src="systemd-219-62.el7_6.3.src.rpm" version="219"><filename>systemd-journal-gateway-219-62.el7_6.3.x86_64.rpm</filename><sum type="sha256">36916fdc6130e4372d01176be674323ff4cd0335f7cd83c663405f9c9a68660a</sum></package><package arch="x86_64" name="libgudev1" release="62.el7_6.3" src="systemd-219-62.el7_6.3.src.rpm" version="219"><filename>libgudev1-219-62.el7_6.3.x86_64.rpm</filename><sum type="sha256">a71d10739b2e66fee55a55acaf3a6aa1e81aae9b53d9115bb707934a1a5249c6</sum></package><package arch="x86_64" name="systemd-resolved" release="62.el7_6.3" src="systemd-219-62.el7_6.3.src.rpm" version="219"><filename>systemd-resolved-219-62.el7_6.3.x86_64.rpm</filename><sum type="sha256">afdc719e149703d994f80eb8540e3b29d66aa9862263a6f4969ba8a69462d858</sum></package><package arch="i686" name="systemd-libs" release="62.el7_6.3" src="systemd-219-62.el7_6.3.src.rpm" version="219"><filename>systemd-libs-219-62.el7_6.3.i686.rpm</filename><sum type="sha256">7ba9527407079df8cc48b95987cd7d17b1373377dce4acd76f8bfb7755fde33e</sum></package><package arch="x86_64" name="systemd-devel" release="62.el7_6.3" src="systemd-219-62.el7_6.3.src.rpm" version="219"><filename>systemd-devel-219-62.el7_6.3.x86_64.rpm</filename><sum type="sha256">4d0d69c7c6d588ee85b090ad63cfa970cd8f9e3c09a9d7910492e322580b0761</sum></package><package arch="x86_64" name="systemd" release="62.el7_6.3" src="systemd-219-62.el7_6.3.src.rpm" version="219"><filename>systemd-219-62.el7_6.3.x86_64.rpm</filename><sum type="sha256">d90b348c3e41c029a595b32d0794eabc559c86301e11972ca598b139ec9c9071</sum></package><package arch="x86_64" name="libgudev1-devel" release="62.el7_6.3" src="systemd-219-62.el7_6.3.src.rpm" version="219"><filename>libgudev1-devel-219-62.el7_6.3.x86_64.rpm</filename><sum type="sha256">028697d040b359f1bb0b5ad649a1232458dda401d113178372c70cf74ced8af3</sum></package><package arch="x86_64" name="systemd-libs" release="62.el7_6.3" src="systemd-219-62.el7_6.3.src.rpm" version="219"><filename>systemd-libs-219-62.el7_6.3.x86_64.rpm</filename><sum type="sha256">3ca659f933505799dabfa9ef668f16b7eedd663fb6b4fefa3c06d70a1803015f</sum></package><package arch="i686" name="libgudev1-devel" release="62.el7_6.3" src="systemd-219-62.el7_6.3.src.rpm" version="219"><filename>libgudev1-devel-219-62.el7_6.3.i686.rpm</filename><sum type="sha256">c452c85d8bc6ab488511d29b70167a74e8b9a7fa64506b03024234518a340557</sum></package><package arch="x86_64" name="systemd-sysv" release="62.el7_6.3" src="systemd-219-62.el7_6.3.src.rpm" version="219"><filename>systemd-sysv-219-62.el7_6.3.x86_64.rpm</filename><sum type="sha256">dfac0ce057468029c5fe008bd909ee696f8d7f431cf0880815dce8e8c92bc0b7</sum></package><package arch="i686" name="systemd-devel" release="62.el7_6.3" src="systemd-219-62.el7_6.3.src.rpm" version="219"><filename>systemd-devel-219-62.el7_6.3.i686.rpm</filename><sum type="sha256">384534799736607e48176f74c6ff03464e59343652757a7d8553290e17c27eac</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3815" id="CVE-2019-3815" title="Systemd: Memory Leak In Journald-Server.C " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0201" id="RHSA-2019:0201-1" title="Rhsa-2019:0201-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1666690" id="1666690" title="Systemd: Memory Leak In Journald-Server.C " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0219-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.5.0 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) 
* Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) 
* Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2019-01-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="2.el7" src="firefox-60.5.0-2.el7.src.rpm" version="60.5.0"><filename>firefox-60.5.0-2.el7.i686.rpm</filename><sum type="sha256">aec7d2072cc8bd01786e91a974c7865a0b69d0b7936ae8db1e616e9b137e51e2</sum></package><package arch="x86_64" name="firefox" release="2.el7" src="firefox-60.5.0-2.el7.src.rpm" version="60.5.0"><filename>firefox-60.5.0-2.el7.x86_64.rpm</filename><sum type="sha256">132bdea7250ad963598418fe366ec62e54c9a241a8ef8b5acbb1f31c7350372b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18500" id="CVE-2018-18500" title="Mozilla: Use-After-Free Parsing Html5 Stream" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18501" id="CVE-2018-18501" title="Mozilla: Memory Safety Bugs Fixed In Firefox 65 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18505" id="CVE-2018-18505" title="Mozilla: Privilege Escalation Through Ipc " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0219" id="RHSA-2019:0219-1" title="Rhsa-2019:0219-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1670631" id="1670631" title="Mozilla: Use-After-Free Parsing Html5 Stream" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1670632" id="1670632" title="Mozilla: Memory Safety Bugs Fixed In Firefox 65 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1670633" id="1670633" title="Mozilla: Privilege Escalation Through Ipc " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0229-1</id><title>Ghostscript</title><description>Security Fix(es): 
* ghostscript: use-after-free in copydevice handling (699661) (CVE-2018-16540) 
* ghostscript: access bypass in psi/zdevice2.c (700153) (CVE-2018-19475) 
* ghostscript: access bypass in psi/zicc.c (700169) (CVE-2018-19476) 
* ghostscript: access bypass in psi/zfjbig2.c (700168) (CVE-2018-19477) 
* ghostscript: subroutines within pseudo-operators must themselves be pseudo-operators (700317) (CVE-2019-6116) 
Bug Fix(es): 
* Previously, ghostscript-9.07-31.el7_6.1 introduced a regression during the standard input reading, causing a "/invalidfileaccess in --run--" error. With this update, the regression has been fixed and the described error no longer occurs.</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-01-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="ghostscript" release="31.el7_6.9" src="ghostscript-9.07-31.el7_6.9.src.rpm" version="9.07"><filename>ghostscript-9.07-31.el7_6.9.i686.rpm</filename><sum type="sha256">57c9536f144184b674d066ceca43f613c9afd0a5838e16478d221be5c54a2109</sum></package><package arch="x86_64" name="ghostscript-cups" release="31.el7_6.9" src="ghostscript-9.07-31.el7_6.9.src.rpm" version="9.07"><filename>ghostscript-cups-9.07-31.el7_6.9.x86_64.rpm</filename><sum type="sha256">f0947a84149a0a8191b31c42fa55019c07766295a45df68c89c34dc6b5a49ade</sum></package><package arch="i686" name="ghostscript-devel" release="31.el7_6.9" src="ghostscript-9.07-31.el7_6.9.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-31.el7_6.9.i686.rpm</filename><sum type="sha256">34aad672b1d7aceec306a59e329be7985f14075be6c4c46ad8c3f6a725b282d6</sum></package><package arch="x86_64" name="ghostscript" release="31.el7_6.9" src="ghostscript-9.07-31.el7_6.9.src.rpm" version="9.07"><filename>ghostscript-9.07-31.el7_6.9.x86_64.rpm</filename><sum type="sha256">6d0483d59f86cc3bced027543fe6e511c126dad5110596c63b28c585cd2511e1</sum></package><package arch="noarch" name="ghostscript-doc" release="31.el7_6.9" src="ghostscript-9.07-31.el7_6.9.src.rpm" version="9.07"><filename>ghostscript-doc-9.07-31.el7_6.9.noarch.rpm</filename><sum type="sha256">dba5befc5adb895e5b1ab4788197d6e588c431501bf432cf1d333145ff5a930b</sum></package><package arch="x86_64" name="ghostscript-devel" release="31.el7_6.9" src="ghostscript-9.07-31.el7_6.9.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-31.el7_6.9.x86_64.rpm</filename><sum type="sha256">efb676257f0d34683d7077250b59e1e8f774285435f0de11c56d24ea0365391e</sum></package><package arch="x86_64" name="ghostscript-gtk" release="31.el7_6.9" src="ghostscript-9.07-31.el7_6.9.src.rpm" version="9.07"><filename>ghostscript-gtk-9.07-31.el7_6.9.x86_64.rpm</filename><sum type="sha256">f04116841e31feb5cafa8db65f0b2586e8a1064aa1cd800a098fc411eccc7172</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16540" id="CVE-2018-16540" title="Ghostscript: Use-After-Free In Copydevice " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19475" id="CVE-2018-19475" title="Ghostscript: Access Bypass In Psi/Zdevice2.C " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19476" id="CVE-2018-19476" title="Ghostscript: Access Bypass In Psi/Zicc.C (700169)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19477" id="CVE-2018-19477" title="Ghostscript: Access Bypass In Psi/Zfjbig2.C " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6116" id="CVE-2019-6116" title="Ghostscript: Subroutines Within Pseudo-Operators " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0229" id="RHSA-2019:0229-1" title="Rhsa-2019:0229-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625843" id="1625843" title="Ghostscript: Use-After-Free In Copydevice " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1654459" id="1654459" title="Ghostscript: Access Bypass In Psi/Zdevice2.C " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1654464" id="1654464" title="Ghostscript: Access Bypass In Psi/Zicc.C (700169)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1654468" id="1654468" title="Ghostscript: Access Bypass In Psi/Zfjbig2.C " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665919" id="1665919" title="Ghostscript: Regression: Pdf2Ps Reports An Error When Reading " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1666636" id="1666636" title="Ghostscript: Subroutines Within Pseudo-Operators " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0230-1</id><title>Polkit</title><description>Security Fix(es): 
* polkit: Temporary auth hijacking via PID reuse and non-atomic fork (CVE-2019-6133)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-01-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="polkit" release="18.el7_6.1" src="polkit-0.112-18.el7_6.1.src.rpm" version="0.112"><filename>polkit-0.112-18.el7_6.1.i686.rpm</filename><sum type="sha256">f0f294939b799b7e5b866bb33e7bc90cd7a37ad1ad19ac3cac908b06e0cc4e24</sum></package><package arch="x86_64" name="polkit" release="18.el7_6.1" src="polkit-0.112-18.el7_6.1.src.rpm" version="0.112"><filename>polkit-0.112-18.el7_6.1.x86_64.rpm</filename><sum type="sha256">1186403496b22e7be1deabb2cea2587c77d9ae7214e79dda9b73128af89a7b1b</sum></package><package arch="noarch" name="polkit-docs" release="18.el7_6.1" src="polkit-0.112-18.el7_6.1.src.rpm" version="0.112"><filename>polkit-docs-0.112-18.el7_6.1.noarch.rpm</filename><sum type="sha256">1ba9c5e5c382c31d5e0993b1b1111a13e8a4793daf4fe1bea32f9a4c9551feee</sum></package><package arch="x86_64" name="polkit-devel" release="18.el7_6.1" src="polkit-0.112-18.el7_6.1.src.rpm" version="0.112"><filename>polkit-devel-0.112-18.el7_6.1.x86_64.rpm</filename><sum type="sha256">7f27e195fc9f392168e36af97e5768861b82b3a72a5e756d8b180b52fb472a85</sum></package><package arch="i686" name="polkit-devel" release="18.el7_6.1" src="polkit-0.112-18.el7_6.1.src.rpm" version="0.112"><filename>polkit-devel-0.112-18.el7_6.1.i686.rpm</filename><sum type="sha256">127495e03bc0126eee9c29dfb284dc8cf661e659b7eecd72b94faea7ce87a0b7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6133" id="CVE-2019-6133" title="Polkit: Temporary Auth Hijacking Via Pid Reuse " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0230" id="RHSA-2019:0230-1" title="Rhsa-2019:0230-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1664212" id="1664212" title="Polkit: Temporary Auth Hijacking Via Pid Reuse " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0231-1</id><title>Spice</title><description>Security Fix(es): 
* spice: Off-by-one error in array access in spice/server/memslot.c (CVE-2019-3813)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-01-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="spice-server-devel" release="6.el7_6.1" src="spice-0.14.0-6.el7_6.1.src.rpm" version="0.14.0"><filename>spice-server-devel-0.14.0-6.el7_6.1.x86_64.rpm</filename><sum type="sha256">b40a43290816336fb8e755225d5712cd2c18732e540a1369a9e9cf16102a65ea</sum></package><package arch="x86_64" name="spice-server" release="6.el7_6.1" src="spice-0.14.0-6.el7_6.1.src.rpm" version="0.14.0"><filename>spice-server-0.14.0-6.el7_6.1.x86_64.rpm</filename><sum type="sha256">520734166c2a080ff024951a16029b3f3a1326a65003eb6791a0bdd951d2d2e0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3813" id="CVE-2019-3813" title="Spice: Off-By-One Error In Array Access In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0231" id="RHSA-2019:0231-1" title="Rhsa-2019:0231-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665371" id="1665371" title="Spice: Off-By-One Error In Array Access In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0270-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 60.5.0. 
Security Fix(es): 
* Mozilla: Use-after-free parsing HTML5 stream (CVE-2018-18500) 
* Mozilla: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5 (CVE-2018-18501) 
* Mozilla: Privilege escalation through IPC channel messages (CVE-2018-18505) 
* libical: Multiple use-after-free vulnerabilities (CVE-2016-5824)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-02-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_6" src="thunderbird-60.5.0-1.el7_6.src.rpm" version="60.5.0"><filename>thunderbird-60.5.0-1.el7_6.x86_64.rpm</filename><sum type="sha256">2f873ebe7e2ec619b89a814650c62512a350900732811175764c24fb3d0af840</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5824" id="CVE-2016-5824" title="Libical: Multiple Use-After-Free Vulnerabilities" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18500" id="CVE-2018-18500" title="Mozilla: Use-After-Free Parsing Html5 Stream" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18501" id="CVE-2018-18501" title="Mozilla: Memory Safety Bugs Fixed In Firefox 65 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18505" id="CVE-2018-18505" title="Mozilla: Privilege Escalation Through Ipc " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0270" id="RHSA-2019:0270-1" title="Rhsa-2019:0270-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1375120" id="1375120" title="Libical: Multiple Use-After-Free Vulnerabilities" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1670631" id="1670631" title="Mozilla: Use-After-Free Parsing Html5 Stream" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1670632" id="1670632" title="Mozilla: Memory Safety Bugs Fixed In Firefox 65 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1670633" id="1670633" title="Mozilla: Privilege Escalation Through Ipc " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0368-1</id><title>Systemd</title><description>Security Fix(es): 
* systemd: Insufficient input validation in bus_process_object() resulting in PID 1 crash (CVE-2019-6454)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-02-21 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libgudev1-devel" release="62.el7_6.5" src="systemd-219-62.el7_6.5.src.rpm" version="219"><filename>libgudev1-devel-219-62.el7_6.5.i686.rpm</filename><sum type="sha256">3d1c03bf86f8c31cfcc812bdbf6c533d0a3bad905a1bd2b6dfdfa67554cda738</sum></package><package arch="x86_64" name="systemd-sysv" release="62.el7_6.5" src="systemd-219-62.el7_6.5.src.rpm" version="219"><filename>systemd-sysv-219-62.el7_6.5.x86_64.rpm</filename><sum type="sha256">65721f80987c26e90799a4aaa44255c000f38c1bfa2aceae6d1595634c0f4733</sum></package><package arch="i686" name="libgudev1" release="62.el7_6.5" src="systemd-219-62.el7_6.5.src.rpm" version="219"><filename>libgudev1-219-62.el7_6.5.i686.rpm</filename><sum type="sha256">eec2fa91ee5e26224a06997d850af9cb272d29c37402c3dc9e395389054ae935</sum></package><package arch="x86_64" name="libgudev1-devel" release="62.el7_6.5" src="systemd-219-62.el7_6.5.src.rpm" version="219"><filename>libgudev1-devel-219-62.el7_6.5.x86_64.rpm</filename><sum type="sha256">3583afc88cd9d2cac8727f724f12c868507e3aac1ce34014b183d0cbb6cc8360</sum></package><package arch="x86_64" name="systemd" release="62.el7_6.5" src="systemd-219-62.el7_6.5.src.rpm" version="219"><filename>systemd-219-62.el7_6.5.x86_64.rpm</filename><sum type="sha256">4115483c8ec35d6f5342359c6887ff05b03150021cea6e76c15c74a50129a060</sum></package><package arch="x86_64" name="systemd-libs" release="62.el7_6.5" src="systemd-219-62.el7_6.5.src.rpm" version="219"><filename>systemd-libs-219-62.el7_6.5.x86_64.rpm</filename><sum type="sha256">f8c623b1283d1d8012496690208f5dc6048546169982896155750336d3026900</sum></package><package arch="i686" name="systemd-devel" release="62.el7_6.5" src="systemd-219-62.el7_6.5.src.rpm" version="219"><filename>systemd-devel-219-62.el7_6.5.i686.rpm</filename><sum type="sha256">bfec30cd13fa07f488909525ceb837c2a670f3254e796a6fd8bd3cae045ee2a4</sum></package><package arch="x86_64" name="systemd-networkd" release="62.el7_6.5" src="systemd-219-62.el7_6.5.src.rpm" version="219"><filename>systemd-networkd-219-62.el7_6.5.x86_64.rpm</filename><sum type="sha256">0523fb3e5541505fc86fb2ed1891dd18cdc5a1557c1e7e15a07603ac83f0ab11</sum></package><package arch="i686" name="systemd-resolved" release="62.el7_6.5" src="systemd-219-62.el7_6.5.src.rpm" version="219"><filename>systemd-resolved-219-62.el7_6.5.i686.rpm</filename><sum type="sha256">d53f19dffa30a7a9eeedfee06d668b60dda33001f4904d75bfde2196cbe35a45</sum></package><package arch="x86_64" name="systemd-resolved" release="62.el7_6.5" src="systemd-219-62.el7_6.5.src.rpm" version="219"><filename>systemd-resolved-219-62.el7_6.5.x86_64.rpm</filename><sum type="sha256">5f3cd94ecf66db375dc0e924ccb2a391ae681a1ad5b930afc7c716c08746183e</sum></package><package arch="x86_64" name="systemd-devel" release="62.el7_6.5" src="systemd-219-62.el7_6.5.src.rpm" version="219"><filename>systemd-devel-219-62.el7_6.5.x86_64.rpm</filename><sum type="sha256">455687ef620ee03c6db755046593450b8ae09f51e9aef84435ea0f798c6ab8c1</sum></package><package arch="x86_64" name="libgudev1" release="62.el7_6.5" src="systemd-219-62.el7_6.5.src.rpm" version="219"><filename>libgudev1-219-62.el7_6.5.x86_64.rpm</filename><sum type="sha256">38ed300d14673fbd51920183aae79e48376816764273e6b6333d34673d79ce0e</sum></package><package arch="x86_64" name="systemd-python" release="62.el7_6.5" src="systemd-219-62.el7_6.5.src.rpm" version="219"><filename>systemd-python-219-62.el7_6.5.x86_64.rpm</filename><sum type="sha256">0198f0c5c3f3673d92cd51bf40aad50ec938678238cbe6b9807f7cc5deaa77e0</sum></package><package arch="i686" name="systemd-libs" release="62.el7_6.5" src="systemd-219-62.el7_6.5.src.rpm" version="219"><filename>systemd-libs-219-62.el7_6.5.i686.rpm</filename><sum type="sha256">ca90f41423d04222a1b538fd587038fef54fe2d2c591087688637577f1e2740f</sum></package><package arch="x86_64" name="systemd-journal-gateway" release="62.el7_6.5" src="systemd-219-62.el7_6.5.src.rpm" version="219"><filename>systemd-journal-gateway-219-62.el7_6.5.x86_64.rpm</filename><sum type="sha256">a7a1125c9f89f20155e415b4d22062033eaa5c7749007c95a32f14a84e1bd40b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6454" id="CVE-2019-6454" title="Systemd: Insufficient Input Validation In" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0368" id="RHSA-2019:0368-1" title="Rhsa-2019:0368-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1667032" id="1667032" title="Systemd: Insufficient Input Validation In" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0375-1</id><title>Flatpak</title><description>Security Fix(es): 
* flatpak: potential /proc based sandbox escape (CVE-2019-8308)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-02-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_6" src="firefox-60.5.1-1.el7_6.src.rpm" version="60.5.1"><filename>firefox-60.5.1-1.el7_6.x86_64.rpm</filename><sum type="sha256">0d6d881c5ee9dd40267f169009ba68086b3aefc16fea5ce4a9bb86125c6e3ce5</sum></package><package arch="x86_64" name="flatpak-libs" release="4.el7_6" src="flatpak-1.0.2-4.el7_6.src.rpm" version="1.0.2"><filename>flatpak-libs-1.0.2-4.el7_6.x86_64.rpm</filename><sum type="sha256">c7c0233233e2feed16b6e28bc2fae7cce6a185d8bb91e4ed3aa3722ca4fe60a6</sum></package><package arch="x86_64" name="flatpak-devel" release="4.el7_6" src="flatpak-1.0.2-4.el7_6.src.rpm" version="1.0.2"><filename>flatpak-devel-1.0.2-4.el7_6.x86_64.rpm</filename><sum type="sha256">747df7171f6fea8dbdf37add1291aab3b9382b279f5e45929005a4ee00b10d15</sum></package><package arch="x86_64" name="flatpak" release="4.el7_6" src="flatpak-1.0.2-4.el7_6.src.rpm" version="1.0.2"><filename>flatpak-1.0.2-4.el7_6.x86_64.rpm</filename><sum type="sha256">b72f402752a545037886b8da47ec7d5978b6491d1b5fad6a087053d93d8f16a8</sum></package><package arch="x86_64" name="flatpak-builder" release="4.el7_6" src="flatpak-1.0.2-4.el7_6.src.rpm" version="1.0.0"><filename>flatpak-builder-1.0.0-4.el7_6.x86_64.rpm</filename><sum type="sha256">5500731153aae9f0ab075cf17b0d09f3753f55d9130ea191cbfc6a1d4d96e487</sum></package><package arch="i686" name="firefox" release="1.el7_6" src="firefox-60.5.1-1.el7_6.src.rpm" version="60.5.1"><filename>firefox-60.5.1-1.el7_6.i686.rpm</filename><sum type="sha256">fd15ca749282f0b222c69a3ecddf0dffe62cefab320d33c5feec1ac16f024e95</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8308" id="CVE-2019-8308" title="Libical: Flatpak: Potential /Proc Based Sandbox" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0375" id="RHSA-2019:0375-1" title="Rhsa-2019:0375-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1675070" id="1675070" title="Libical: Flatpak: Potential /Proc Based Sandbox" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0435-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-02-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-devel-1.8.0.201.b09-0.el7_6.i686.rpm</filename><sum type="sha256">ae3e135fc63155f038bcbd7cb17c29979a7fa4475368e8dfb15024ac61a1534d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-accessibility-1.8.0.201.b09-0.el7_6.x86_64.rpm</filename><sum type="sha256">64df5984bb65e41da88fe2a558b3105c8847d03a0fb15f46602014e70f7760a3</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-src-debug-1.8.0.201.b09-0.el7_6.i686.rpm</filename><sum type="sha256">fbea38a8b1593c627a801e1e2d1a7f9209c637e64709fc6509455b0e99a2cbc2</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.i686.rpm</filename><sum type="sha256">2a43d3a9d4adc08b49afc366cc0eb5b15c21fe3848639cfe9581ee999bbf6223</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-javadoc-1.8.0.201.b09-0.el7_6.noarch.rpm</filename><sum type="sha256">203897aeca04c37ae3fe24fa25c35b09f20a80fca2dd8d217f0b72c2c1ef2fcd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.201.b09-0.el7_6.x86_64.rpm</filename><sum type="sha256">f2288036bc63664a34226623366a884243ca3e7910894dbfe73e7b9087b3b08c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-headless-1.8.0.201.b09-0.el7_6.i686.rpm</filename><sum type="sha256">824f5e7fe0b6a5454713b20c87dd0626bb496a4713f640e98361d6b6a0a68942</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.201.b09-0.el7_6.noarch.rpm</filename><sum type="sha256">ecd4802fcc7897c7b00b7cd648c2cb0e2c54654d3582ce5f1134e2cf36380683</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.201.b09-0.el7_6.x86_64.rpm</filename><sum type="sha256">c6ccf80c8d953429de9336bebd0ccd7052ab770331a4ba98457fdb073455ea34</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-devel-1.8.0.201.b09-0.el7_6.x86_64.rpm</filename><sum type="sha256">612272297085bdbf9917518199586d8ba40db2d9b9308a2af30de181b5ca6acc</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-src-1.8.0.201.b09-0.el7_6.i686.rpm</filename><sum type="sha256">331428ec521a2ef3b6cb64b2bc956058f51ab82a9f4bd073c0d916d462317fb7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-demo-1.8.0.201.b09-0.el7_6.x86_64.rpm</filename><sum type="sha256">53fe35b0fbe519e63457850b76876340300f753fd80ce3c70db423976cd74edb</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.201.b09-0.el7_6.noarch.rpm</filename><sum type="sha256">3ffe74b81c73e37ed8bce998d3827cc72e2a01756d1ad81d915ffc7b39482a2f</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.201.b09-0.el7_6.noarch.rpm</filename><sum type="sha256">d5f2761915d49f8ef78a242aec082f6b19e97d66f2e97f31336e382f4c6a88b6</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-demo-1.8.0.201.b09-0.el7_6.i686.rpm</filename><sum type="sha256">75bb036c896de5c0ba70b530196f48abcf81a852f45dc3d9d132700f47c84a3a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-headless-1.8.0.201.b09-0.el7_6.x86_64.rpm</filename><sum type="sha256">81254faec19c63949ef07bbcbf8f283c0f9948a141d4320b20256b4289a2c188</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.201.b09-0.el7_6.i686.rpm</filename><sum type="sha256">0c39bd0f3f5b57e9e19b40f7f924a8df985f732ebfe25344c756e46058cd31a9</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-debug-1.8.0.201.b09-0.el7_6.x86_64.rpm</filename><sum type="sha256">5055493a1c6e8aeb74bec7e205f274e2053ee8f6a297dbefd2f8d3723a87dd3e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-src-debug-1.8.0.201.b09-0.el7_6.x86_64.rpm</filename><sum type="sha256">3434d2c0b3fb3193a86a6044cd8396c2bdd341dc1892016c68b90ead280f8948</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.201.b09-0.el7_6.i686.rpm</filename><sum type="sha256">7b07fcc2429d6d4255256b3b376e8f9fc6a18c58ae1b65eef1138af022752555</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-debug-1.8.0.201.b09-0.el7_6.i686.rpm</filename><sum type="sha256">730c5955ad2fa7a19189601668f7ac273a8db0b97064c13803c8ce79c8e695c5</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.x86_64.rpm</filename><sum type="sha256">ddef671401d149766abbc1001ca27d9939238bd2dfdc39a33f29b3d7d50d0215</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.201.b09-0.el7_6.x86_64.rpm</filename><sum type="sha256">2bbd0bc30eb879f40dca7c06dcce8c0f90c5a531a7a70faad62b3e11ea1c561e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-src-1.8.0.201.b09-0.el7_6.x86_64.rpm</filename><sum type="sha256">66424dc25b4308e76e38e2d36026b2f1280202ce1a2049bc146ee64929a672db</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.201.b09-0.el7_6.i686.rpm</filename><sum type="sha256">176ec27a417ab43c9d3268009faa20aa7c02c8099a8ac7b3ff42211778d5b318</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.201.b09-0.el7_6.i686.rpm</filename><sum type="sha256">c052ce72ed7b273fe38034d549b310fdb44c3e6dbf3df11de6f7a626ce646ad7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.201.b09-0.el7_6.x86_64.rpm</filename><sum type="sha256">d77f12786f96d438c9c4d7622220d45845edc82c2b6f4aabafa694aea112789b</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.201.b09-0.el7_6.src.rpm" version="1.8.0.201.b09"><filename>java-1.8.0-openjdk-accessibility-1.8.0.201.b09-0.el7_6.i686.rpm</filename><sum type="sha256">f9637ae53d74bb326eac9274b766f35b84804895600ed4adfe9cff40d13c263a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2422" id="CVE-2019-2422" title="Openjdk: Memory Disclosure In Filechannelimpl " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0435" id="RHSA-2019:0435-1" title="Rhsa-2019:0435-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665945" id="1665945" title="Openjdk: Memory Disclosure In Filechannelimpl " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0436-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-02-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-debug-11.0.2.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">9e6d226ba7de34e66841596377d22da8071f388dee49a3c848359984e24ef7e4</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-devel-debug-11.0.2.7-0.el7_6.i686.rpm</filename><sum type="sha256">ebddbf4a7903c282a14adae0ccab35d87e24a259e52bdc35075602ae39c2ea55</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-jmods-debug-11.0.2.7-0.el7_6.i686.rpm</filename><sum type="sha256">fa260754069e01c3e8e60232562c52850d68c255d841e66e20becace158fd3af</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-devel-11.0.2.7-0.el7_6.i686.rpm</filename><sum type="sha256">0880e44ef033479d3abb3fac34b5f89e56c91c3904bd05344286126278d4d5e4</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-src-11.0.2.7-0.el7_6.i686.rpm</filename><sum type="sha256">f7a114ef59b3249d3270a8e28be23b8869543562ff0e4b9dc9268afe0fda44d0</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-javadoc-11.0.2.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">a0646831347fa8e18e0cc73cc6cd057d0d41513a5a11172cb8ce4bda4254e03c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-devel-11.0.2.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">ccc4b51dbeb1ef7371ffba8f2b132ae88f0fa593ae9d0ded7b95f2deb0989b53</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-11.0.2.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">a3fc47154227450cb16413908dafbfa38469c09e0e907e7f290d8ab7141e168f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-demo-11.0.2.7-0.el7_6.i686.rpm</filename><sum type="sha256">e7eec0123b8bf9d0175869d98043ff8c51f9ec754b09c0ab5f0bddb326bf7ba3</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-headless-debug-11.0.2.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">8d35f24a89907a347938a1499c75336e609edde927299651aea8aabe90712d53</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-demo-debug-11.0.2.7-0.el7_6.i686.rpm</filename><sum type="sha256">e49ba4c71a9818dede2f40751d37ad4acac3daee0ee0b05045d516b6872676a9</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-headless-debug-11.0.2.7-0.el7_6.i686.rpm</filename><sum type="sha256">5497a1a99c508ad5f15befaa1dff4adfae40f2538a923792d5be7f3cc3535c31</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-javadoc-zip-11.0.2.7-0.el7_6.i686.rpm</filename><sum type="sha256">efbf307521d2881991b0b5168daadc0e4b1cd832e5c26e60e229ea7d2e0af3bf</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-debug-11.0.2.7-0.el7_6.i686.rpm</filename><sum type="sha256">52a5fe74db459503c3b489fbd6c403e184cec2e521a0df2dcfe6147a48c7b563</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-src-11.0.2.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">1c20dec163f6aebf49bd7d6d519bcf80381083aaf499498ef1011190a87216cf</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-src-debug-11.0.2.7-0.el7_6.i686.rpm</filename><sum type="sha256">408195bab79684f69cec2e5e598b0db98dd090dc10fe4ca11b9e4c49ac1ae7b9</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-javadoc-zip-11.0.2.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">d0571efe9e428574404ce2fd06523a93e13699b61b4e1513dddc271d1f663528</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-javadoc-zip-debug-11.0.2.7-0.el7_6.i686.rpm</filename><sum type="sha256">580fca4bbe811cd70ce931cf5bd7998138102a2e48bfc9b7663c8f10c0575732</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-jmods-11.0.2.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">3fe1fc680a3f6cdefcbda4f17b10121067a288ba8dab149195b8445b4f41d66d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-demo-debug-11.0.2.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">9c241704df9182e427cf52a7d30b13b41718076e675b96b301d6e9e2e91d3b22</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-headless-11.0.2.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">55d9ba8bb266d29e9a953012b8eca09c0f0726bdf9b8a29c93e06f0461706754</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-headless-11.0.2.7-0.el7_6.i686.rpm</filename><sum type="sha256">392b798a8089920ccee373cd74e88e04dc0f4cc8a7ce77a48f0e68f9fe10b1cb</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-devel-debug-11.0.2.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">8f4e0a1327056f8a1d1cfb96925ab8da8ecd05f5ef3a2c37a2ccc4ac4e0f889c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-11.0.2.7-0.el7_6.i686.rpm</filename><sum type="sha256">1fc48553b5b68b7943cfb010d59a2402829a2bda3f29b2d54583d36f9291fb0c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-javadoc-debug-11.0.2.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">6676bc5a2be0239f73435df30f8eba5b71dfeac7b188eb93150e423c8bad1eb3</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-javadoc-zip-debug-11.0.2.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">7357cce01ecae6d595e0841c665635e50451c2b911a47bc67247249d131aa25f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-jmods-debug-11.0.2.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">e9329b7d0f43bf857886269debad503ba7bcd2d3d69f12b8ab0cf27ebcc0e108</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-demo-11.0.2.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">a89abcf7afad5e354e932328e95bf3e9bd5fe0d10352824efb6a8884d30f8664</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-src-debug-11.0.2.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">c7f6359672b6c5bfd2392c7808033c6ef2a1ab6a694970e4eb34bb598b14fc11</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-javadoc-debug-11.0.2.7-0.el7_6.i686.rpm</filename><sum type="sha256">b8143e95505dbb93fe6cfdcf877d7ffbaa25c7a7736468779a4667e9c5a0d014</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-jmods-11.0.2.7-0.el7_6.i686.rpm</filename><sum type="sha256">9940e3917e4c7389e6bb7216cf2231f130ac33b31d68dcf0d7bd06541fd7c24b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_6" src="java-11-openjdk-11.0.2.7-0.el7_6.src.rpm" version="11.0.2.7"><filename>java-11-openjdk-javadoc-11.0.2.7-0.el7_6.i686.rpm</filename><sum type="sha256">f5659ae86f022dd0d417e566b9f3112aa6829b34b345a2dbd29b2a90cc1ef5f4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2422" id="CVE-2019-2422" title="Openjdk: Memory Disclosure In Filechannelimpl " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0436" id="RHSA-2019:0436-1" title="Rhsa-2019:0436-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665945" id="1665945" title="Openjdk: Memory Disclosure In Filechannelimpl " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0464-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: memory disclosure in FileChannelImpl (Libraries, 8206290) (CVE-2019-2422)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-03-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.17.1.el7_6" src="java-1.7.0-openjdk-1.7.0.211-2.6.17.1.el7_6.src.rpm" version="1.7.0.211"><filename>java-1.7.0-openjdk-devel-1.7.0.211-2.6.17.1.el7_6.x86_64.rpm</filename><sum type="sha256">4429e009259290af76470d0ce741a0ecc9c93e1e5c1d35156898f63a1676ae4c</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.17.1.el7_6" src="java-1.7.0-openjdk-1.7.0.211-2.6.17.1.el7_6.src.rpm" version="1.7.0.211"><filename>java-1.7.0-openjdk-src-1.7.0.211-2.6.17.1.el7_6.x86_64.rpm</filename><sum type="sha256">dff4b851e82eb967bedb8afbac5486ffa414aa05886094dacf0e73ccac855853</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.17.1.el7_6" src="java-1.7.0-openjdk-1.7.0.211-2.6.17.1.el7_6.src.rpm" version="1.7.0.211"><filename>java-1.7.0-openjdk-headless-1.7.0.211-2.6.17.1.el7_6.x86_64.rpm</filename><sum type="sha256">4a12a36ed0243fcc293b12a59bbdfff803e8af55da344919641af80550947c19</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.17.1.el7_6" src="java-1.7.0-openjdk-1.7.0.211-2.6.17.1.el7_6.src.rpm" version="1.7.0.211"><filename>java-1.7.0-openjdk-1.7.0.211-2.6.17.1.el7_6.x86_64.rpm</filename><sum type="sha256">253f200360f946add2654512a27249cb881d8046f28c85877ff05b4483b34486</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.17.1.el7_6" src="java-1.7.0-openjdk-1.7.0.211-2.6.17.1.el7_6.src.rpm" version="1.7.0.211"><filename>java-1.7.0-openjdk-demo-1.7.0.211-2.6.17.1.el7_6.x86_64.rpm</filename><sum type="sha256">bf697711b9eed49a03a9c26e2069f08cfd76950057da2e7d6d26af357a38e974</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.17.1.el7_6" src="java-1.7.0-openjdk-1.7.0.211-2.6.17.1.el7_6.src.rpm" version="1.7.0.211"><filename>java-1.7.0-openjdk-accessibility-1.7.0.211-2.6.17.1.el7_6.x86_64.rpm</filename><sum type="sha256">e24d876407ac634fd60b6acfda0e572e5d0d442681c3a63b527e744051b8aeb9</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.17.1.el7_6" src="java-1.7.0-openjdk-1.7.0.211-2.6.17.1.el7_6.src.rpm" version="1.7.0.211"><filename>java-1.7.0-openjdk-javadoc-1.7.0.211-2.6.17.1.el7_6.noarch.rpm</filename><sum type="sha256">6b6d4e38c7033f7ecde729902ff5efbd072a273b465a5d21dd1de41e13afc55f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2422" id="CVE-2019-2422" title="Openjdk: Memory Disclosure In Filechannelimpl " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0464" id="RHSA-2019:0464-1" title="Rhsa-2019:0464-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665945" id="1665945" title="Openjdk: Memory Disclosure In Filechannelimpl " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0482-1</id><title>Cockpit</title><description>Security Fix(es): 
* cockpit: Crash when parsing invalid base64 headers (CVE-2019-3804)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-03-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="cockpit-doc" release="1.sl7" src="cockpit-173.2-1.sl7.src.rpm" version="173.2"><filename>cockpit-doc-173.2-1.sl7.x86_64.rpm</filename><sum type="sha256">4ac82cab19bb35a20cc50ee49107a2c916a342fb0614e676e032a437e567ec3a</sum></package><package arch="noarch" name="cockpit-system" release="1.sl7" src="cockpit-173.2-1.sl7.src.rpm" version="173.2"><filename>cockpit-system-173.2-1.sl7.noarch.rpm</filename><sum type="sha256">a1565c03d1789c1f4f7fdac03438bd19b3f0985f037de4dae6521b0406704979</sum></package><package arch="noarch" name="cockpit-networkmanager" release="1.sl7" src="cockpit-173.2-1.sl7.src.rpm" version="173.2"><filename>cockpit-networkmanager-173.2-1.sl7.noarch.rpm</filename><sum type="sha256">3c2e1b20953a6f640f3eabfda2fa91225decbdaa756e0f7dc67f875d2c72ff3d</sum></package><package arch="x86_64" name="cockpit-ws" release="1.sl7" src="cockpit-173.2-1.sl7.src.rpm" version="173.2"><filename>cockpit-ws-173.2-1.sl7.x86_64.rpm</filename><sum type="sha256">d4ea4688d7a2df121c837d72d0cbd57b2d1924e129af9167d8463a9da09aa419</sum></package><package arch="noarch" name="cockpit-sosreport" release="1.sl7" src="cockpit-173.2-1.sl7.src.rpm" version="173.2"><filename>cockpit-sosreport-173.2-1.sl7.noarch.rpm</filename><sum type="sha256">075d7342d406cb8c07b96a1119fbe492bbc8a52ce76ac117ea177333aa568dc6</sum></package><package arch="noarch" name="cockpit-machines" release="1.sl7" src="cockpit-173.2-1.sl7.src.rpm" version="173.2"><filename>cockpit-machines-173.2-1.sl7.noarch.rpm</filename><sum type="sha256">a542e06135dac9ce3834b90bded5246e4c748271a0cb81f736e286424984abdf</sum></package><package arch="x86_64" name="cockpit-bridge" release="1.sl7" src="cockpit-173.2-1.sl7.src.rpm" version="173.2"><filename>cockpit-bridge-173.2-1.sl7.x86_64.rpm</filename><sum type="sha256">2d713ca025acedbb219aeb98f20f1f903b34941e35fa897b4984b80a5d41089b</sum></package><package arch="x86_64" name="cockpit" release="1.sl7" src="cockpit-173.2-1.sl7.src.rpm" version="173.2"><filename>cockpit-173.2-1.sl7.x86_64.rpm</filename><sum type="sha256">0eee8501f565da58c3f1d11d51d4ef03440abedb3b16fa7dfcfa4b0d48eb8995</sum></package><package arch="i686" name="cockpit-ws" release="1.sl7" src="cockpit-173.2-1.sl7.src.rpm" version="173.2"><filename>cockpit-ws-173.2-1.sl7.i686.rpm</filename><sum type="sha256">364138329723e9b38178bbe49a0a80091aca0401843d873cbd847dbf541c184e</sum></package><package arch="noarch" name="cockpit-kdump" release="1.sl7" src="cockpit-173.2-1.sl7.src.rpm" version="173.2"><filename>cockpit-kdump-173.2-1.sl7.noarch.rpm</filename><sum type="sha256">bf484e47cd94cae941ddd0f17cca229d29208c75fc802db8b48ad6f661730df9</sum></package><package arch="noarch" name="cockpit-machines-ovirt" release="1.sl7" src="cockpit-173.2-1.sl7.src.rpm" version="173.2"><filename>cockpit-machines-ovirt-173.2-1.sl7.noarch.rpm</filename><sum type="sha256">f047892fa5f3949bc2bdb5efea717b99fb448ae7f90c649990ec7178356b3146</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3804" id="CVE-2019-3804" title="Cockpit: Crash When Parsing Invalid Base64 Headers" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0482" id="RHSA-2019:0482-1" title="Rhsa-2019:0482-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1663567" id="1663567" title="Cockpit: Crash When Parsing Invalid Base64 Headers" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0483-1</id><title>Openssl</title><description>Security Fix(es): 
* openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash) (CVE-2018-5407) 
Bug Fix(es): 
* Perform the RSA signature self-tests with SHA-256</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-03-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="openssl-libs" release="16.el7_6.1" src="openssl-1.0.2k-16.el7_6.1.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-16.el7_6.1.i686.rpm</filename><sum type="sha256">fb62f00e11cb18f98c62295b720f8f381566cefa6abe827023a1e9500449e363</sum></package><package arch="x86_64" epoch="1" name="openssl-libs" release="16.el7_6.1" src="openssl-1.0.2k-16.el7_6.1.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-16.el7_6.1.x86_64.rpm</filename><sum type="sha256">7f512e48117ef051328210c438b1cf6d9f610a8c2f5412b9a2b288cfd9cacdaa</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="16.el7_6.1" src="openssl-1.0.2k-16.el7_6.1.src.rpm" version="1.0.2k"><filename>openssl-perl-1.0.2k-16.el7_6.1.x86_64.rpm</filename><sum type="sha256">6e06287b60ff22c1464d586b3c974b9048d1a03bccdf660d0cf1effdd1cd82b8</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="16.el7_6.1" src="openssl-1.0.2k-16.el7_6.1.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-16.el7_6.1.x86_64.rpm</filename><sum type="sha256">59edee442d24df6c63caa9024d3912ff53666a893afaf6e01944acb1a6a8dd00</sum></package><package arch="x86_64" epoch="1" name="openssl-devel" release="16.el7_6.1" src="openssl-1.0.2k-16.el7_6.1.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-16.el7_6.1.x86_64.rpm</filename><sum type="sha256">9e090eaee93a39e4fd202c2a07cd0dbebd985ce36599e34242d4a6a099f6e85a</sum></package><package arch="i686" epoch="1" name="openssl-static" release="16.el7_6.1" src="openssl-1.0.2k-16.el7_6.1.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-16.el7_6.1.i686.rpm</filename><sum type="sha256">b0b93902b639423f2f54b94338149c88157ae3d1051c5ec0a3ba1958827049f2</sum></package><package arch="x86_64" epoch="1" name="openssl" release="16.el7_6.1" src="openssl-1.0.2k-16.el7_6.1.src.rpm" version="1.0.2k"><filename>openssl-1.0.2k-16.el7_6.1.x86_64.rpm</filename><sum type="sha256">93a925f453b1fc746bed138c58f2c1e4ca4582758a92e51c9972d9a5630811da</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="16.el7_6.1" src="openssl-1.0.2k-16.el7_6.1.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-16.el7_6.1.i686.rpm</filename><sum type="sha256">09c691b507f8ab62c1de0c1ec01f7869b1825162ddc904d84bd9c44149597abb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407" id="CVE-2018-5407" title="Openssl: Side-Channel Vulnerability On " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0483" id="RHSA-2019:0483-1" title="Rhsa-2019:0483-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1645695" id="1645695" title="Openssl: Side-Channel Vulnerability On " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0485-1</id><title>Tomcat</title><description>Security Fix(es): 
* tomcat: Open redirect in default servlet (CVE-2018-11784)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-03-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcat-admin-webapps" release="9.el7_6" src="tomcat-7.0.76-9.el7_6.src.rpm" version="7.0.76"><filename>tomcat-admin-webapps-7.0.76-9.el7_6.noarch.rpm</filename><sum type="sha256">dbc504cdcf2be911ddd3939bca17aeee0ce432f9542467d915546264a0ed1a4a</sum></package><package arch="noarch" name="tomcat-jsp-2.2-api" release="9.el7_6" src="tomcat-7.0.76-9.el7_6.src.rpm" version="7.0.76"><filename>tomcat-jsp-2.2-api-7.0.76-9.el7_6.noarch.rpm</filename><sum type="sha256">6b185f28a02bfdb739f1423559fe6f76011c4d9c994d82691a431902523bbd59</sum></package><package arch="noarch" name="tomcat-el-2.2-api" release="9.el7_6" src="tomcat-7.0.76-9.el7_6.src.rpm" version="7.0.76"><filename>tomcat-el-2.2-api-7.0.76-9.el7_6.noarch.rpm</filename><sum type="sha256">b0c84c0462cc46802d19dc1b3b0c8bb007d9026a9965eb200ba699671d9649c7</sum></package><package arch="noarch" name="tomcat" release="9.el7_6" src="tomcat-7.0.76-9.el7_6.src.rpm" version="7.0.76"><filename>tomcat-7.0.76-9.el7_6.noarch.rpm</filename><sum type="sha256">fe320d6229b720c4ff81e1784df07de317d33688dfdf32ad79767798f3556248</sum></package><package arch="noarch" name="tomcat-webapps" release="9.el7_6" src="tomcat-7.0.76-9.el7_6.src.rpm" version="7.0.76"><filename>tomcat-webapps-7.0.76-9.el7_6.noarch.rpm</filename><sum type="sha256">ce679422b631255c06badbfec18d096a297a327a362e7310dc807f673c1efcf5</sum></package><package arch="noarch" name="tomcat-docs-webapp" release="9.el7_6" src="tomcat-7.0.76-9.el7_6.src.rpm" version="7.0.76"><filename>tomcat-docs-webapp-7.0.76-9.el7_6.noarch.rpm</filename><sum type="sha256">a37fdc9fa5a0293da1c87ae43ff6504d78bee99ab6cea306ff1d6a43916cdbcc</sum></package><package arch="noarch" name="tomcat-servlet-3.0-api" release="9.el7_6" src="tomcat-7.0.76-9.el7_6.src.rpm" version="7.0.76"><filename>tomcat-servlet-3.0-api-7.0.76-9.el7_6.noarch.rpm</filename><sum type="sha256">81949bd783568c08ac12c046871e23f41d9378e349bdf6c57f62e814efa78906</sum></package><package arch="noarch" name="tomcat-lib" release="9.el7_6" src="tomcat-7.0.76-9.el7_6.src.rpm" version="7.0.76"><filename>tomcat-lib-7.0.76-9.el7_6.noarch.rpm</filename><sum type="sha256">e0292d5a66431e1f3f61c899a3e456c29f8eb05316f0b7df1720567af30977ee</sum></package><package arch="noarch" name="tomcat-jsvc" release="9.el7_6" src="tomcat-7.0.76-9.el7_6.src.rpm" version="7.0.76"><filename>tomcat-jsvc-7.0.76-9.el7_6.noarch.rpm</filename><sum type="sha256">9d5e0214b279408bc8fd76f805bec025bed3968c51df6023eda4ace341dd8ad6</sum></package><package arch="noarch" name="tomcat-javadoc" release="9.el7_6" src="tomcat-7.0.76-9.el7_6.src.rpm" version="7.0.76"><filename>tomcat-javadoc-7.0.76-9.el7_6.noarch.rpm</filename><sum type="sha256">40f42562007589bf0b920d46ca64550cd2aee6b981bb45dc2f3cd03f5d9be69e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11784" id="CVE-2018-11784" title="Tomcat: Open Redirect In Default Servlet" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0485" id="RHSA-2019:0485-1" title="Rhsa-2019:0485-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1636512" id="1636512" title="Tomcat: Open Redirect In Default Servlet" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0512-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: Memory corruption due to incorrect socket cloning (CVE-2018-9568) 
* kernel: Unprivileged users able to inspect kernel stacks of arbitrary tasks (CVE-2018-17972) 
* kernel: Faulty computation of numberic bounds in the BPF verifier (CVE-2018-18445) 
Bug Fix(es) and Enhancement(s): 
* kernel fuse invalidates cached attributes during reads 
* [NetApp-FC-NVMe] SL7.6: nvme reset gets hung indefinitely 
* Memory reclaim deadlock calling __sock_create() after memalloc_noio_save() 
* hardened usercopy is causing crash 
* Backport: xfrm: policy: init locks early 
* AWS m5 instance type loses NVMe mounted volumes [was: Unable to Mount StatefulSet PV in AWS EBS] 
* SL 7.6 running on a VirtualBox guest with a GUI has a mouse problem 
* Kernel bug report in cgroups on heavily contested 3.10 node 
* [PCIe] SHPC probe crash on Non-ACPI/Non-SHPC ports 
* [Cavium 7.7 Feat] qla2xxx: Update to latest upstream. 
* Regression in lpfc and the CNE1000 (BE2 FCoE) adapters that no longer initialize 
* [csiostor] call trace after command: modprobe csiostor 
* libceph: fall back to sendmsg for slab pages 
* Deadlock between stop_one_cpu_nowait() and stop_two_cpus() 
* Soft lockups occur when the sd driver passes a device size of 1 sector to string_get_size() 
* [SL7.7] BUG: unable to handle kernel paging request at ffffffffffffffff 
* SL7.6 - powerpc/pseries: Disable CPU hotplug across migrations / powerpc/rtas: Fix a potential race between CPU-Offline &amp; Migration (LPM) 
* blk-mq: fix corruption with direct issue 
* [SL7][patch] iscsi driver can block reboot/shutdown 
* [DELL EMC 7.6 BUG] Unable to create-namespace over Dell NVDIMM-N 
* efi_bgrt_init fails to ioremap error during boot 
* Unable to mount a share on kernel- 3.10.0-957.el7. The share can be mounted on kernel-3.10.0-862.14.4.el7 
* System crash with RIP nfs_readpage_async+0x43 -- BUG: unable to handle kernel NULL pointer dereference</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-03-15 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools" release="957.10.1.el7" src="kernel-3.10.0-957.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-957.10.1.el7.x86_64.rpm</filename><sum type="sha256">b3189219a31a13535c73af90eb74d42563d76438e19e26debc91130668cb4b51</sum></package><package arch="x86_64" name="kernel-headers" release="957.10.1.el7" src="kernel-3.10.0-957.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-957.10.1.el7.x86_64.rpm</filename><sum type="sha256">0c0c9f94faec904d71bacbbe0c4881c6704a9bba2396ce358fa73f287876d5ad</sum></package><package arch="x86_64" name="kernel-tools-libs" release="957.10.1.el7" src="kernel-3.10.0-957.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-957.10.1.el7.x86_64.rpm</filename><sum type="sha256">fb3c44824368f96d19a86f985f3b24772823c977546e638250f811a36eb7f844</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="957.10.1.el7" src="kernel-3.10.0-957.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-957.10.1.el7.noarch.rpm</filename><sum type="sha256">d11ff48bb8d35a721cf6ddcf4bd4c6286e667c63bd55f77e270091dc9bd906fc</sum></package><package arch="noarch" name="kernel-doc" release="957.10.1.el7" src="kernel-3.10.0-957.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-957.10.1.el7.noarch.rpm</filename><sum type="sha256">ca06a39d9bf6b4830d0246a93f287018cae3819e63884340bb9002459d44e5b2</sum></package><package arch="x86_64" name="python-perf" release="957.10.1.el7" src="kernel-3.10.0-957.10.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-957.10.1.el7.x86_64.rpm</filename><sum type="sha256">d7f25b2df17bbaded6717359faf0a6ca8d5ae08373ca9133d19a3f6e4a71344d</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="957.10.1.el7" src="kernel-3.10.0-957.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-957.10.1.el7.x86_64.rpm</filename><sum type="sha256">cfdbdfc2936e79f9fcb2a6db69088dc46eaaf1a2ae2c19eef5c76ee31436f08c</sum></package><package arch="x86_64" name="kernel-devel" release="957.10.1.el7" src="kernel-3.10.0-957.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-957.10.1.el7.x86_64.rpm</filename><sum type="sha256">a6f8318ac294af003ba5763c5deda7009f6e4cb7a4d8038171a05f6559e10f4d</sum></package><package arch="x86_64" name="kernel-debug" release="957.10.1.el7" src="kernel-3.10.0-957.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-957.10.1.el7.x86_64.rpm</filename><sum type="sha256">edb31ac2e58969c93c8a9b64731e0d399bdf5bff603800ac304bd81db2494651</sum></package><package arch="x86_64" name="kernel-debug-devel" release="957.10.1.el7" src="kernel-3.10.0-957.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-957.10.1.el7.x86_64.rpm</filename><sum type="sha256">8da47207bb3594034475773d0746e520f7c57d3f96f0182802e6a292eb53ca2e</sum></package><package arch="x86_64" name="perf" release="957.10.1.el7" src="kernel-3.10.0-957.10.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-957.10.1.el7.x86_64.rpm</filename><sum type="sha256">a028d79edf1d8e73e1dd4d76aa7234476f0a12c871c0248a3e1081a93a675ed5</sum></package><package arch="x86_64" name="bpftool" release="957.10.1.el7" src="kernel-3.10.0-957.10.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-957.10.1.el7.x86_64.rpm</filename><sum type="sha256">918022d1c9c415597941fc66f0b7659b64ef24ad3fb0e39f912dab855b4a63d9</sum></package><package arch="x86_64" name="kernel" release="957.10.1.el7" src="kernel-3.10.0-957.10.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-957.10.1.el7.x86_64.rpm</filename><sum type="sha256">eced336da7b8646bd436a66a1925b62f4d64fae85505bdbbd79dc32c97488271</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17972" id="CVE-2018-17972" title="Kernel: Unprivileged Users Able To Inspect " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18445" id="CVE-2018-18445" title="Kernel: Faulty Computation Of Numberic Bounds " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9568" id="CVE-2018-9568" title="Kernel: Memory Corruption Due To Incorrect " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0512" id="RHSA-2019:0512-1" title="Rhsa-2019:0512-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1636349" id="1636349" title="Kernel: Unprivileged Users Able To Inspect " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1640596" id="1640596" title="Kernel: Faulty Computation Of Numberic Bounds " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1655904" id="1655904" title="Kernel: Memory Corruption Due To Incorrect " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0597-1</id><title>Cloud-Init</title><description>Security Fix(es): 
* cloud-init: extra ssh keys added to authorized_keys on the Azure platform (CVE-2019-0816)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-03-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="cloud-init" release="1.el7_6.2" src="cloud-init-18.2-1.el7_6.2.src.rpm" version="18.2"><filename>cloud-init-18.2-1.el7_6.2.x86_64.rpm</filename><sum type="sha256">99f088a9d17057b54ef385661c383d6749a55aa0152ff4bb4a166c1fe3938cb7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0816" id="CVE-2019-0816" title="Cloud-Init: Extra Ssh Keys Added To " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0597" id="RHSA-2019:0597-1" title="Rhsa-2019:0597-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1680165" id="1680165" title="Cloud-Init: Extra Ssh Keys Added To " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0622-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.6.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6 (CVE-2019-9788) 
* Mozilla: Use-after-free when removing in-use DOM elements (CVE-2019-9790) 
* Mozilla: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey (CVE-2019-9791) 
* Mozilla: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script (CVE-2019-9792) 
* Mozilla: Improper bounds checks when Spectre mitigations are disabled (CVE-2019-9793) 
* Mozilla: Type-confusion in IonMonkey JIT compiler (CVE-2019-9795) 
* Mozilla: Use-after-free with SMIL animation controller (CVE-2019-9796) 
* Mozilla: Proxy Auto-Configuration file can define localhost access to be proxied (CVE-2018-18506)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2019-03-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="3.el7_6" src="firefox-60.6.0-3.el7_6.src.rpm" version="60.6.0"><filename>firefox-60.6.0-3.el7_6.x86_64.rpm</filename><sum type="sha256">b7c3a0b58dc0611eba85a761e10bb94a632c1848c065feec3d4f843e4542df9e</sum></package><package arch="i686" name="firefox" release="3.el7_6" src="firefox-60.6.0-3.el7_6.src.rpm" version="60.6.0"><filename>firefox-60.6.0-3.el7_6.i686.rpm</filename><sum type="sha256">09129c74ae205620b102e17a760b049070300952bb84f32bf1249b1144f57a2d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506" id="CVE-2018-18506" title="Mozilla: Proxy Auto-Configuration File Can " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788" id="CVE-2019-9788" title="Mozilla: Memory Safety Bugs Fixed In Firefox 66 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790" id="CVE-2019-9790" title="Mozilla: Use-After-Free When Removing In-Use Dom " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791" id="CVE-2019-9791" title="Mozilla: Type Inference Is Incorrect For " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792" id="CVE-2019-9792" title="Mozilla: Ionmonkey Leaks Js_Optimized_Out Magic " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793" id="CVE-2019-9793" title="Mozilla: Improper Bounds Checks When Spectre " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795" id="CVE-2019-9795" title="Mozilla: Type-Confusion In Ionmonkey Jit Compiler" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796" id="CVE-2019-9796" title="Mozilla: Use-After-Free With Smil Animation " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0622" id="RHSA-2019:0622-1" title="Rhsa-2019:0622-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690673" id="1690673" title="Mozilla: Proxy Auto-Configuration File Can " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690674" id="1690674" title="Mozilla: Memory Safety Bugs Fixed In Firefox 66 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690675" id="1690675" title="Mozilla: Use-After-Free When Removing In-Use Dom " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690676" id="1690676" title="Mozilla: Type Inference Is Incorrect For " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690677" id="1690677" title="Mozilla: Ionmonkey Leaks Js_Optimized_Out Magic " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690678" id="1690678" title="Mozilla: Improper Bounds Checks When Spectre " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690680" id="1690680" title="Mozilla: Type-Confusion In Ionmonkey Jit Compiler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690681" id="1690681" title="Mozilla: Use-After-Free With Smil Animation " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0633-1</id><title>Ghostscript</title><description>Security Fix(es): 
* ghostscript: superexec operator is available (700585) (CVE-2019-3835) 
* ghostscript: forceput in DefineResource is still accessible (700576) (CVE-2019-3838) 
Bug Fix(es): 
* ghostscript: Regression: double comment chars '%%' in gs_init.ps leading to missing metadata</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-03-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ghostscript-cups" release="31.el7_6.10" src="ghostscript-9.07-31.el7_6.10.src.rpm" version="9.07"><filename>ghostscript-cups-9.07-31.el7_6.10.x86_64.rpm</filename><sum type="sha256">1b39698f40c0645fc72aa59830fbc1675a9680c8ad3c2a1858801a507ee4844a</sum></package><package arch="i686" name="ghostscript" release="31.el7_6.10" src="ghostscript-9.07-31.el7_6.10.src.rpm" version="9.07"><filename>ghostscript-9.07-31.el7_6.10.i686.rpm</filename><sum type="sha256">0f7805708fea743249811805bfc803e79ab013aba67fe30c24419d68f80ba3fa</sum></package><package arch="x86_64" name="ghostscript-gtk" release="31.el7_6.10" src="ghostscript-9.07-31.el7_6.10.src.rpm" version="9.07"><filename>ghostscript-gtk-9.07-31.el7_6.10.x86_64.rpm</filename><sum type="sha256">c9a2d2be99fd545df814e25f14c817475ccefe037fd8cea707404f5acfa6fbed</sum></package><package arch="x86_64" name="ghostscript-devel" release="31.el7_6.10" src="ghostscript-9.07-31.el7_6.10.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-31.el7_6.10.x86_64.rpm</filename><sum type="sha256">01fb43e60c66e40b1c261856c29f27dac1aa6681b3f8ee1fcfa854935863df3f</sum></package><package arch="i686" name="ghostscript-devel" release="31.el7_6.10" src="ghostscript-9.07-31.el7_6.10.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-31.el7_6.10.i686.rpm</filename><sum type="sha256">0ce9aec8dd093f1214857fc99268889723d4127c3c930f72d83c1af2f26a4a3b</sum></package><package arch="x86_64" name="ghostscript" release="31.el7_6.10" src="ghostscript-9.07-31.el7_6.10.src.rpm" version="9.07"><filename>ghostscript-9.07-31.el7_6.10.x86_64.rpm</filename><sum type="sha256">60a83340c0c6f5720b7ad211ed616da442ec94e68040e315999b4c281fd5829b</sum></package><package arch="noarch" name="ghostscript-doc" release="31.el7_6.10" src="ghostscript-9.07-31.el7_6.10.src.rpm" version="9.07"><filename>ghostscript-doc-9.07-31.el7_6.10.noarch.rpm</filename><sum type="sha256">ceb24d96b786c2c32f72398746dc3f08aef27b82ab7b9f19eb02a7a783027544</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3835" id="CVE-2019-3835" title="Ghostscript: Superexec Operator Is Available " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3838" id="CVE-2019-3838" title="Ghostscript: Forceput In Defineresource Is Still " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0633" id="RHSA-2019:0633-1" title="Rhsa-2019:0633-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677581" id="1677581" title="Ghostscript: Forceput In Defineresource Is Still " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677588" id="1677588" title="Ghostscript: Superexec Operator Is Available " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0638-1</id><title>Openwsman</title><description>Security Fix(es): 
* openwsman: Disclosure of arbitrary files outside of the registered URIs (CVE-2019-3816)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-03-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libwsman-devel" release="6.git4391e5c.el7_6" src="openwsman-2.6.3-6.git4391e5c.el7_6.src.rpm" version="2.6.3"><filename>libwsman-devel-2.6.3-6.git4391e5c.el7_6.i686.rpm</filename><sum type="sha256">9de6e0bdb43295e0d84881f337147d133147f1296a99cfdedae974664248a3b5</sum></package><package arch="i686" name="openwsman-server" release="6.git4391e5c.el7_6" src="openwsman-2.6.3-6.git4391e5c.el7_6.src.rpm" version="2.6.3"><filename>openwsman-server-2.6.3-6.git4391e5c.el7_6.i686.rpm</filename><sum type="sha256">49bda66322eb8411f3ab740dee8fb85bcd13fb4bc63330a56cea6179d75bc823</sum></package><package arch="x86_64" name="openwsman-server" release="6.git4391e5c.el7_6" src="openwsman-2.6.3-6.git4391e5c.el7_6.src.rpm" version="2.6.3"><filename>openwsman-server-2.6.3-6.git4391e5c.el7_6.x86_64.rpm</filename><sum type="sha256">47cd6398ee55c24c6e00fdd1a4cc1646105d36eb888ba10bc87b59c5ad1fe551</sum></package><package arch="x86_64" name="libwsman-devel" release="6.git4391e5c.el7_6" src="openwsman-2.6.3-6.git4391e5c.el7_6.src.rpm" version="2.6.3"><filename>libwsman-devel-2.6.3-6.git4391e5c.el7_6.x86_64.rpm</filename><sum type="sha256">b6ed9e1b2239e7be5e6bb3b3fdb7e9a31ec12b0563798ed7eb23c2267831bbe8</sum></package><package arch="x86_64" name="openwsman-perl" release="6.git4391e5c.el7_6" src="openwsman-2.6.3-6.git4391e5c.el7_6.src.rpm" version="2.6.3"><filename>openwsman-perl-2.6.3-6.git4391e5c.el7_6.x86_64.rpm</filename><sum type="sha256">2cb799a098edca75e278de2920bb8da55953198bfd31c767bbe373de9856c20e</sum></package><package arch="i686" name="libwsman1" release="6.git4391e5c.el7_6" src="openwsman-2.6.3-6.git4391e5c.el7_6.src.rpm" version="2.6.3"><filename>libwsman1-2.6.3-6.git4391e5c.el7_6.i686.rpm</filename><sum type="sha256">1ecf0be1dd93351c7984fe3b6369b146ac696520c37713b5b36e856ffa008263</sum></package><package arch="x86_64" name="openwsman-python" release="6.git4391e5c.el7_6" src="openwsman-2.6.3-6.git4391e5c.el7_6.src.rpm" version="2.6.3"><filename>openwsman-python-2.6.3-6.git4391e5c.el7_6.x86_64.rpm</filename><sum type="sha256">83f3988ca4591e0d643ea7b4773192cc9985df9f47923ec322d988b1188a5e02</sum></package><package arch="x86_64" name="openwsman-client" release="6.git4391e5c.el7_6" src="openwsman-2.6.3-6.git4391e5c.el7_6.src.rpm" version="2.6.3"><filename>openwsman-client-2.6.3-6.git4391e5c.el7_6.x86_64.rpm</filename><sum type="sha256">7e6a7c87dacc0ac3b543425961526dd10392819ea235f67ee2f713634ea9ec22</sum></package><package arch="i686" name="openwsman-client" release="6.git4391e5c.el7_6" src="openwsman-2.6.3-6.git4391e5c.el7_6.src.rpm" version="2.6.3"><filename>openwsman-client-2.6.3-6.git4391e5c.el7_6.i686.rpm</filename><sum type="sha256">c992c9345c75ab8319a5e055845e4dca704a67ee9c64c85e57ca19fa942815db</sum></package><package arch="x86_64" name="openwsman-ruby" release="6.git4391e5c.el7_6" src="openwsman-2.6.3-6.git4391e5c.el7_6.src.rpm" version="2.6.3"><filename>openwsman-ruby-2.6.3-6.git4391e5c.el7_6.x86_64.rpm</filename><sum type="sha256">7e7c0382ce8b9d55438255aae94796cd21faf0794250c8c1c7f13873d24f54b8</sum></package><package arch="x86_64" name="libwsman1" release="6.git4391e5c.el7_6" src="openwsman-2.6.3-6.git4391e5c.el7_6.src.rpm" version="2.6.3"><filename>libwsman1-2.6.3-6.git4391e5c.el7_6.x86_64.rpm</filename><sum type="sha256">42fee976fa11762a49e92a6a81a5ef05210e325c4693fe7ba3c428805391d3f8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3816" id="CVE-2019-3816" title="Openwsman: Disclosure Of Arbitrary Files Outside " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0638" id="RHSA-2019:0638-1" title="Rhsa-2019:0638-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1667070" id="1667070" title="Openwsman: Disclosure Of Arbitrary Files Outside " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0671-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.6.1 ESR. 
Security Fix(es): 
* Mozilla: IonMonkey MArraySlice has incorrect alias information (CVE-2019-9810) 
* Mozilla: Ionmonkey type confusion with __proto__ mutations (CVE-2019-9813)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2019-03-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_6" src="firefox-60.6.1-1.el7_6.src.rpm" version="60.6.1"><filename>firefox-60.6.1-1.el7_6.i686.rpm</filename><sum type="sha256">040abb0f461433a35b0924b2162302b68f5009fb2d68830241aef8993b2c5487</sum></package><package arch="x86_64" name="firefox" release="1.el7_6" src="firefox-60.6.1-1.el7_6.src.rpm" version="60.6.1"><filename>firefox-60.6.1-1.el7_6.x86_64.rpm</filename><sum type="sha256">06d0c6b0245f0fb7a91a168ce54c770dab4526291311afd1c0fff67c401effcc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9810" id="CVE-2019-9810" title="Mozilla: Ionmonkey Marrayslice Has Incorrect " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9813" id="CVE-2019-9813" title="Mozilla: Ionmonkey Type Confusion With __Proto__ " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0671" id="RHSA-2019:0671-1" title="Rhsa-2019:0671-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1692181" id="1692181" title="Mozilla: Ionmonkey Marrayslice Has Incorrect " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1692182" id="1692182" title="Mozilla: Ionmonkey Type Confusion With __Proto__ " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0679-1</id><title>Libssh2</title><description>Security Fix(es): 
* libssh2: Integer overflow in transport read resulting in out of bounds write (CVE-2019-3855) 
* libssh2: Integer overflow in keyboard interactive handling resulting in out of bounds write (CVE-2019-3856) 
* libssh2: Integer overflow in SSH packet processing channel resulting in out of bounds write (CVE-2019-3857) 
* libssh2: Integer overflow in user authenticate keyboard interactive allows out-of-bounds writes (CVE-2019-3863)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-03-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libssh2" release="12.el7_6.2" src="libssh2-1.4.3-12.el7_6.2.src.rpm" version="1.4.3"><filename>libssh2-1.4.3-12.el7_6.2.i686.rpm</filename><sum type="sha256">f9b48ebf4e8582d74b7ed10dee5773f555d23fa4b750e3c63b5b64b0f1b6d332</sum></package><package arch="x86_64" name="libssh2-devel" release="12.el7_6.2" src="libssh2-1.4.3-12.el7_6.2.src.rpm" version="1.4.3"><filename>libssh2-devel-1.4.3-12.el7_6.2.x86_64.rpm</filename><sum type="sha256">9fe8e1baa72f8a733f15748cb07e99587e5418c90af32769ad178c9eb20050ec</sum></package><package arch="noarch" name="libssh2-docs" release="12.el7_6.2" src="libssh2-1.4.3-12.el7_6.2.src.rpm" version="1.4.3"><filename>libssh2-docs-1.4.3-12.el7_6.2.noarch.rpm</filename><sum type="sha256">0382f14ffa5ce3c2ea8f200652173f3557dfccc4b3f911003ee5e362e490f242</sum></package><package arch="x86_64" name="libssh2" release="12.el7_6.2" src="libssh2-1.4.3-12.el7_6.2.src.rpm" version="1.4.3"><filename>libssh2-1.4.3-12.el7_6.2.x86_64.rpm</filename><sum type="sha256">20e45215aada48dd80bbfffcc7d36ea8c0120b66a559aa51c410b74a80f2ee08</sum></package><package arch="i686" name="libssh2-devel" release="12.el7_6.2" src="libssh2-1.4.3-12.el7_6.2.src.rpm" version="1.4.3"><filename>libssh2-devel-1.4.3-12.el7_6.2.i686.rpm</filename><sum type="sha256">c18c8b615afb7083aeb3e3a74aa69b8d67338aac0c2b2b2f2a6fff3af9b2d062</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3855" id="CVE-2019-3855" title="Libssh2: Integer Overflow In Transport Read " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3856" id="CVE-2019-3856" title="Libssh2: Integer Overflow In Keyboard " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3857" id="CVE-2019-3857" title="Libssh2: Integer Overflow In Ssh Packet " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3863" id="CVE-2019-3863" title="Libssh2: Integer Overflow In User Authenticate " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0679" id="RHSA-2019:0679-1" title="Rhsa-2019:0679-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1687303" id="1687303" title="Libssh2: Integer Overflow In Transport Read " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1687304" id="1687304" title="Libssh2: Integer Overflow In Keyboard " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1687305" id="1687305" title="Libssh2: Integer Overflow In Ssh Packet " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1687313" id="1687313" title="Libssh2: Integer Overflow In User Authenticate " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0681-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6 (CVE-2019-9788) 
* Mozilla: Use-after-free when removing in-use DOM elements (CVE-2019-9790) 
* Mozilla: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey (CVE-2019-9791) 
* Mozilla: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script (CVE-2019-9792) 
* Mozilla: IonMonkey MArraySlice has incorrect alias information (CVE-2019-9810) 
* Mozilla: Ionmonkey type confusion with __proto__ mutations (CVE-2019-9813) 
* Mozilla: Improper bounds checks when Spectre mitigations are disabled (CVE-2019-9793) 
* Mozilla: Type-confusion in IonMonkey JIT compiler (CVE-2019-9795) 
* Mozilla: Use-after-free with SMIL animation controller (CVE-2019-9796) 
* Mozilla: Proxy Auto-Configuration file can define localhost access to be proxied (CVE-2018-18506)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-03-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_6" src="thunderbird-60.6.1-1.el7_6.src.rpm" version="60.6.1"><filename>thunderbird-60.6.1-1.el7_6.x86_64.rpm</filename><sum type="sha256">55bfbe1468e50d3bc7b597e7c8db3b072c9195046e246ff4c2e8d3215cacd5c6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18506" id="CVE-2018-18506" title="Mozilla: Proxy Auto-Configuration File Can " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9788" id="CVE-2019-9788" title="Mozilla: Memory Safety Bugs Fixed In Firefox 66 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9790" id="CVE-2019-9790" title="Mozilla: Use-After-Free When Removing In-Use Dom " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9791" id="CVE-2019-9791" title="Mozilla: Type Inference Is Incorrect For " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9792" id="CVE-2019-9792" title="Mozilla: Ionmonkey Leaks Js_Optimized_Out Magic " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9793" id="CVE-2019-9793" title="Mozilla: Improper Bounds Checks When Spectre " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9795" id="CVE-2019-9795" title="Mozilla: Type-Confusion In Ionmonkey Jit Compiler" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9796" id="CVE-2019-9796" title="Mozilla: Use-After-Free With Smil Animation " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9810" id="CVE-2019-9810" title="Mozilla: Ionmonkey Marrayslice Has Incorrect " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9813" id="CVE-2019-9813" title="Mozilla: Ionmonkey Type Confusion With __Proto__ " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0681" id="RHSA-2019:0681-1" title="Rhsa-2019:0681-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690673" id="1690673" title="Mozilla: Proxy Auto-Configuration File Can " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690674" id="1690674" title="Mozilla: Memory Safety Bugs Fixed In Firefox 66 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690675" id="1690675" title="Mozilla: Use-After-Free When Removing In-Use Dom " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690676" id="1690676" title="Mozilla: Type Inference Is Incorrect For " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690677" id="1690677" title="Mozilla: Ionmonkey Leaks Js_Optimized_Out Magic " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690678" id="1690678" title="Mozilla: Improper Bounds Checks When Spectre " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690680" id="1690680" title="Mozilla: Type-Confusion In Ionmonkey Jit Compiler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690681" id="1690681" title="Mozilla: Use-After-Free With Smil Animation " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1692181" id="1692181" title="Mozilla: Ionmonkey Marrayslice Has Incorrect " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1692182" id="1692182" title="Mozilla: Ionmonkey Type Confusion With __Proto__ " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0697-1</id><title>Freerdp</title><description>Security Fix(es): 
* freerdp: Integer truncation leading to heap-based buffer overflow in update_read_bitmap_update() function (CVE-2018-8786) 
* freerdp: Integer overflow leading to heap-based buffer overflow in gdi_Bitmap_Decompress() function (CVE-2018-8787) 
* freerdp: Out-of-bounds write in nsc_rle_decode() function (CVE-2018-8788)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-04-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="freerdp-libs" release="15.el7_6.1" src="freerdp-1.0.2-15.el7_6.1.src.rpm" version="1.0.2"><filename>freerdp-libs-1.0.2-15.el7_6.1.x86_64.rpm</filename><sum type="sha256">ebbb8eeee1a1bb76c92edb75a197cb6ae93b73c3f8718b3ba5603c8eee50d67f</sum></package><package arch="x86_64" name="freerdp-plugins" release="15.el7_6.1" src="freerdp-1.0.2-15.el7_6.1.src.rpm" version="1.0.2"><filename>freerdp-plugins-1.0.2-15.el7_6.1.x86_64.rpm</filename><sum type="sha256">abc3e4c6bb656f9796093503e67d8a1eb8c26455e6286c15e986dce44cd53afd</sum></package><package arch="i686" name="freerdp-libs" release="15.el7_6.1" src="freerdp-1.0.2-15.el7_6.1.src.rpm" version="1.0.2"><filename>freerdp-libs-1.0.2-15.el7_6.1.i686.rpm</filename><sum type="sha256">ddc4690e74c126527914ca3221901e4de4018846ce526b0ae75c1174be447f9c</sum></package><package arch="x86_64" name="freerdp-devel" release="15.el7_6.1" src="freerdp-1.0.2-15.el7_6.1.src.rpm" version="1.0.2"><filename>freerdp-devel-1.0.2-15.el7_6.1.x86_64.rpm</filename><sum type="sha256">56ef20463588f4a740ff98d1cc0d140a3143ea1184f619995fcd736773ebae1e</sum></package><package arch="i686" name="freerdp-devel" release="15.el7_6.1" src="freerdp-1.0.2-15.el7_6.1.src.rpm" version="1.0.2"><filename>freerdp-devel-1.0.2-15.el7_6.1.i686.rpm</filename><sum type="sha256">88c38764349d320b95f20881529ded2b552f1dc48fa732f5042f24c28e813b14</sum></package><package arch="x86_64" name="freerdp" release="15.el7_6.1" src="freerdp-1.0.2-15.el7_6.1.src.rpm" version="1.0.2"><filename>freerdp-1.0.2-15.el7_6.1.x86_64.rpm</filename><sum type="sha256">fafd3bb9a585c2f151b6907f1571b9e58ad2ef8b905a8a50c538aaf9de0fa9e1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8786" id="CVE-2018-8786" title="Freerdp: Integer Truncation Leading To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8787" id="CVE-2018-8787" title="Freerdp: Integer Overflow Leading To Heap-Based " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8788" id="CVE-2018-8788" title="Freerdp: Out-Of-Bounds Write In Nsc_Rle_Decode() " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0697" id="RHSA-2019:0697-1" title="Rhsa-2019:0697-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1671359" id="1671359" title="Freerdp: Integer Truncation Leading To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1671361" id="1671361" title="Freerdp: Integer Overflow Leading To Heap-Based " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1671363" id="1671363" title="Freerdp: Out-Of-Bounds Write In Nsc_Rle_Decode() " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0710-1</id><title>Python</title><description>Security Fix(es): 
* python: Information Disclosure due to urlsplit improper NFKC normalization (CVE-2019-9636)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-04-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="tkinter" release="77.el7_6" src="python-2.7.5-77.el7_6.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-77.el7_6.x86_64.rpm</filename><sum type="sha256">ce38b53c066b340b29536e6f63b0c9fb33e75a7ea8d1f5b593be6ce834bb004c</sum></package><package arch="x86_64" name="python-libs" release="77.el7_6" src="python-2.7.5-77.el7_6.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-77.el7_6.x86_64.rpm</filename><sum type="sha256">e02e345bf0334c8d15125e44ad79fa159203aeb276e7f79a3fe49fc0d6f73063</sum></package><package arch="x86_64" name="python-tools" release="77.el7_6" src="python-2.7.5-77.el7_6.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-77.el7_6.x86_64.rpm</filename><sum type="sha256">53f0522796f666d6beadea1b447d4a4233bc73439f9a564ccea0678444d93f99</sum></package><package arch="x86_64" name="python-devel" release="77.el7_6" src="python-2.7.5-77.el7_6.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-77.el7_6.x86_64.rpm</filename><sum type="sha256">7cfd3a6e9e5a6cffe60cc000580a846ffef8ec6adbf1ee4b8303c4aa808919c4</sum></package><package arch="x86_64" name="python" release="77.el7_6" src="python-2.7.5-77.el7_6.src.rpm" version="2.7.5"><filename>python-2.7.5-77.el7_6.x86_64.rpm</filename><sum type="sha256">85ef11e2b65b6f0596084173b68569c3e483bd66d521df1c51050cd67839107e</sum></package><package arch="x86_64" name="python-test" release="77.el7_6" src="python-2.7.5-77.el7_6.src.rpm" version="2.7.5"><filename>python-test-2.7.5-77.el7_6.x86_64.rpm</filename><sum type="sha256">405ec0c6dc07c1599f7252d353735e51d7ccd4635b6f755470653706672d4f65</sum></package><package arch="x86_64" name="python-debug" release="77.el7_6" src="python-2.7.5-77.el7_6.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-77.el7_6.x86_64.rpm</filename><sum type="sha256">15adca5eeedc0f2d352e01a13b5174462a120a8360c5866cfe9412d0f2675fcc</sum></package><package arch="i686" name="python-libs" release="77.el7_6" src="python-2.7.5-77.el7_6.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-77.el7_6.i686.rpm</filename><sum type="sha256">fdcbd66649b171da99e57d9b77794c03059098658e0514b7121a3a6f492d21ab</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9636" id="CVE-2019-9636" title="Python: Information Disclosure Due To Urlsplit " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0710" id="RHSA-2019:0710-1" title="Rhsa-2019:0710-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1688543" id="1688543" title="Python: Information Disclosure Due To Urlsplit " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0766-1</id><title>Mod_Auth_Mellon</title><description>Security Fix(es): 
* mod_auth_mellon: authentication bypass in ECP flow (CVE-2019-3878) 
* mod_auth_mellon: open redirect in logout url when using URLs with backslashes (CVE-2019-3877) 
Bug Fix(es): 
* mod_auth_mellon Cert files name wrong when hostname contains a number (fixed in upstream package)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-04-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="mod_auth_mellon" release="2.el7_6.4" src="mod_auth_mellon-0.14.0-2.el7_6.4.src.rpm" version="0.14.0"><filename>mod_auth_mellon-0.14.0-2.el7_6.4.x86_64.rpm</filename><sum type="sha256">bdf769a3b872c261041eaab8921365e9adf92161276ee0c6306a792d9ab5487a</sum></package><package arch="x86_64" name="mod_auth_mellon-diagnostics" release="2.el7_6.4" src="mod_auth_mellon-0.14.0-2.el7_6.4.src.rpm" version="0.14.0"><filename>mod_auth_mellon-diagnostics-0.14.0-2.el7_6.4.x86_64.rpm</filename><sum type="sha256">0a14432a03fd1fb34b2361188315f105ce55e09f29791e1f46f6863881646d61</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3877" id="CVE-2019-3877" title="Mod_Auth_Mellon: Open Redirect In Logout Url " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3878" id="CVE-2019-3878" title="Mod_Auth_Mellon: Authentication Bypass In Ecp Flow" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0766" id="RHSA-2019:0766-1" title="Rhsa-2019:0766-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1691125" id="1691125" title="Mod_Auth_Mellon: Open Redirect In Logout Url " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1691126" id="1691126" title="Mod_Auth_Mellon: Authentication Bypass In Ecp Flow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1697487" id="1697487" title="Mod_Auth_Mellon Cert Files Name Wrong When Hostname Contains A " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0775-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022) (CVE-2019-2698) 
* OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) (CVE-2019-2602) 
* OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) (CVE-2019-2684)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-04-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.212.b04-0.el7_6.i686.rpm</filename><sum type="sha256">665072b093c93f268f633d94e2c9a3025d1a9c903945fdb079190c897e9f0c24</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-debug-1.8.0.212.b04-0.el7_6.i686.rpm</filename><sum type="sha256">2114354508847058c90a71b26393a9bfe3c8bbc1393320d238029cfc8b5bb7d8</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.212.b04-0.el7_6.x86_64.rpm</filename><sum type="sha256">33cd5095d99b143d439351651a931aabb06af3893f6a7faaa19e364677f8f7b3</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.212.b04-0.el7_6.noarch.rpm</filename><sum type="sha256">269af0eaae6cdf8a741ada9c6ff0853b26d2696d4010aecb856dd626b5c0f85b</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-javadoc-1.8.0.212.b04-0.el7_6.noarch.rpm</filename><sum type="sha256">a75aee7e2b483d9aea4dd3f76172a38cc9141b698405e15cea3acdedfcd72bcf</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.212.b04-0.el7_6.x86_64.rpm</filename><sum type="sha256">e48ff823a7f9214067a3fd967e85345b521b6bd5469642be8806e5b4ec428dcf</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.x86_64.rpm</filename><sum type="sha256">1d3076c9b33215bd3f852d80ad0f676671ee1f4151f26ee2bf28ea57dad39f3f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-debug-1.8.0.212.b04-0.el7_6.x86_64.rpm</filename><sum type="sha256">b5185d6cc04e39eaae67ee4303e4ca03e3d8eaaa48c30f0baf10dd0da33ce009</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.212.b04-0.el7_6.x86_64.rpm</filename><sum type="sha256">01e91369f052d5728ce9f37786c1798433984ae3f3ec5d34b4d9f270512646df</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-demo-1.8.0.212.b04-0.el7_6.x86_64.rpm</filename><sum type="sha256">d2454ddd0caf0b3ffd07ad79a7fc5811a6fb542b2accf95987a3f155ff94fddd</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.212.b04-0.el7_6.i686.rpm</filename><sum type="sha256">32f959b5be2120fa008cede538784324a57f41db3a8de6991bf837b833e636a5</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-accessibility-1.8.0.212.b04-0.el7_6.x86_64.rpm</filename><sum type="sha256">d9967e4e4492cb59555fa5669a6d74e090a0a30f66c0386b00018ae2764cbe93</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-headless-1.8.0.212.b04-0.el7_6.i686.rpm</filename><sum type="sha256">9a14c7b1f9fd137029a8aae12ad7dd992a6c2461c709f5807a45b33220561807</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-src-1.8.0.212.b04-0.el7_6.i686.rpm</filename><sum type="sha256">283f70b1cd787bbbfd1071554a7c1efa53590d7eaa1f41a7f4be34567a37d31b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-headless-1.8.0.212.b04-0.el7_6.x86_64.rpm</filename><sum type="sha256">88919d86c5cacb51b9894dd9e195e292aad55e5f99cc53f5c2e7aa21e3215acd</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-src-debug-1.8.0.212.b04-0.el7_6.i686.rpm</filename><sum type="sha256">e08de1e77f4f4b95734a50912f98fc115fe0ec8ea0687bbed36f88ba161e8d2c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.212.b04-0.el7_6.x86_64.rpm</filename><sum type="sha256">2aad9ab252446ae667d32ca0a39225b969cdd72a5689d8efa49d3211bc1e665c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-devel-1.8.0.212.b04-0.el7_6.x86_64.rpm</filename><sum type="sha256">1c62d701ec0aee5b8df4b4b97f5b2dae3d6bb5322a07e989a51901783b3dd923</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.212.b04-0.el7_6.i686.rpm</filename><sum type="sha256">53934f02cb09cc42933d6eb266b0e5a5fd0989e50c7eb3708cfbc72819fb7c12</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-src-1.8.0.212.b04-0.el7_6.x86_64.rpm</filename><sum type="sha256">a8664b2b3f5cfda06e5c193b333b80d040dc3ac4345dadb26f82be9c9b4f47f7</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.i686.rpm</filename><sum type="sha256">5a86ac62be08b9ac6cbb2c79ce0826e3a0693266ed7e026dbf960e430ca5c187</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-src-debug-1.8.0.212.b04-0.el7_6.x86_64.rpm</filename><sum type="sha256">356e9128dae444492b4ea7ac923487c46ebe5cea1f9e1cd55d2a0e802e49b68f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-demo-1.8.0.212.b04-0.el7_6.i686.rpm</filename><sum type="sha256">fa11f0d21c31416bc110cd2f6b641091e85124e2283223e2aa15e6358a61306f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.212.b04-0.el7_6.i686.rpm</filename><sum type="sha256">f3a78c6086eeee3653d24ff51c5bd2f57c25d0133e8fb1c62c8d3c6a04ab5659</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.212.b04-0.el7_6.noarch.rpm</filename><sum type="sha256">68d4c227154b800d0ef1fab85e6e6ab9f19c66a947fb6bb95a80952c2afbeef9</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.212.b04-0.el7_6.noarch.rpm</filename><sum type="sha256">a49dd1d2609690271976e1dc6eee6254aa59bf74c3fb484ee8b3d84ed4de89cb</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-accessibility-1.8.0.212.b04-0.el7_6.i686.rpm</filename><sum type="sha256">bbf00dca7691b00912dce58ac4e8f0501206e5e0b91b16c8dfe6e5e07fcedf74</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.212.b04-0.el7_6.src.rpm" version="1.8.0.212.b04"><filename>java-1.8.0-openjdk-devel-1.8.0.212.b04-0.el7_6.i686.rpm</filename><sum type="sha256">c29ea595b100005c18ecb0e13f0490c4c2e5963462cf56d25e19c46274dd539d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2602" id="CVE-2019-2602" title="Openjdk: Slow Conversion Of Bigdecimal To Long " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2684" id="CVE-2019-2684" title="Openjdk: Incorrect Skeleton Selection In Rmi " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2698" id="CVE-2019-2698" title="Openjdk: Font Layout Engine Out Of Bounds Access " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0775" id="RHSA-2019:0775-1" title="Rhsa-2019:0775-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700440" id="1700440" title="Openjdk: Slow Conversion Of Bigdecimal To Long " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700447" id="1700447" title="Openjdk: Font Layout Engine Out Of Bounds Access " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700564" id="1700564" title="Openjdk: Incorrect Skeleton Selection In Rmi " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0778-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) (CVE-2019-2602) 
* OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) (CVE-2019-2684)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-04-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-javadoc-zip-11.0.3.7-0.el7_6.i686.rpm</filename><sum type="sha256">f5127fa75fffea1567eb879da84d5576fbc26bccd4ba7468d84665bc4d46683f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-jmods-debug-11.0.3.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">b9101b84dc74289d5ecc4f770058c208bab23870bc0461b993de4012bacfc89e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-devel-debug-11.0.3.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">465f1e16baba3098956df9d4b546bc44950441d01405a92a205aaa84e3092f81</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-demo-debug-11.0.3.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">3f92382f2594d9bd7c4a1cd27dadd055fecf28d51dd03a9e417e0555f7c707ff</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-headless-11.0.3.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">5bc1c1362951f15154211df35fefc2db621c2643d0a968b528687708e93a13e1</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-src-11.0.3.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">9f2b32154868aff67192245e5616acec3fa9d953eb35005d356cfc3bf0659bac</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-debug-11.0.3.7-0.el7_6.i686.rpm</filename><sum type="sha256">41426a8195e66438d9ef3213828355099a2f48a75a306d5450be7de4a9d0e6e1</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-headless-debug-11.0.3.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">e423189d7a22ca773a97341eec9db015e89acf3e242eace0210a1585eddd5730</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-src-debug-11.0.3.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">3d6d01445574930e7b764b415a60479b0cb791b9854b495e126a1bc1365c50e2</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-src-11.0.3.7-0.el7_6.i686.rpm</filename><sum type="sha256">4d9172f0b0d16ad4b4d305eebbea98adc938e71be2025163f4a0a9fadc211086</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-devel-11.0.3.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">8d71ddfc72d9727de98a5743da890fbe5be786c9c899846ae4ea96a0859515ee</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-javadoc-11.0.3.7-0.el7_6.i686.rpm</filename><sum type="sha256">1364fcf16fca65a3e6204ddbcec4d56a5eb0e7d47f69bf88ead2f28ee5c88270</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-javadoc-debug-11.0.3.7-0.el7_6.i686.rpm</filename><sum type="sha256">4c34413a22797fa3dc9765b731e09bef46e8549e52249bbe863d347978d816f6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-jmods-11.0.3.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">85d384caf5cc5d86643486470e5938c3f86231f254ac45f925ca54001c900507</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-11.0.3.7-0.el7_6.i686.rpm</filename><sum type="sha256">02e9d5607d1ba7ba5a931fe4f62eb2578ee8768544f234f1690dbb5f44271df6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-javadoc-11.0.3.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">224a41424f45a3423d20a27c9fd9d15d31831f05cf17875b4f9914c20f660dbd</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-headless-debug-11.0.3.7-0.el7_6.i686.rpm</filename><sum type="sha256">d96a15392c2846b8e9aad856b4e8ceccb1dcb8ac52f153013b8133a531deda60</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-demo-11.0.3.7-0.el7_6.i686.rpm</filename><sum type="sha256">c865f80be10daf1edcb361562c46e3af2f7f3de7c97f26ecefa8a1f4113dbe0f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-jmods-debug-11.0.3.7-0.el7_6.i686.rpm</filename><sum type="sha256">39f1fe9ddd80939cb6dc7a3df7b91f6d2fdbd61afc2bde67fcf386c4e4bc4de2</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-javadoc-debug-11.0.3.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">2d03f2986f66d10d3f319c25441b4886266f55f5ff185a8ba75f9426d736a07b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-src-debug-11.0.3.7-0.el7_6.i686.rpm</filename><sum type="sha256">04842dfe23aac36ed74d567416c4331f8283dc1521039b7e0bd13941eae75c05</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-demo-11.0.3.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">75ab5781279abe13d80d948840891802695bb321bbad2cc6fef390f5a68b6712</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-demo-debug-11.0.3.7-0.el7_6.i686.rpm</filename><sum type="sha256">ae8997f7a1e21f8642d8d44502bbc0c83c135b5908a93b2603e3723caaa4552e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-devel-11.0.3.7-0.el7_6.i686.rpm</filename><sum type="sha256">bac7e931416340179b334c751b548ba8f268d17e7e222e95a1b4ddaa574cca6d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-headless-11.0.3.7-0.el7_6.i686.rpm</filename><sum type="sha256">b8283c82db02ebb02e05717f7e1b63afd83d85ca249c6385617a2ea3a30ad7bd</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-jmods-11.0.3.7-0.el7_6.i686.rpm</filename><sum type="sha256">14d528e8da64a869989d84d5d343a94a6995daaad9293961b89556fe9a0ea0f8</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-devel-debug-11.0.3.7-0.el7_6.i686.rpm</filename><sum type="sha256">fd876058d65c149c245fe3b2c94ccb6e639347bed4c724d9daa6d466ae6bf751</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-debug-11.0.3.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">8a67bf17de1bc75b94db5d8029464d91e2f9300101e8c5e920574f8bb774768a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-javadoc-zip-debug-11.0.3.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">ff3ad2242e5e651cfcf7733d821531695be4aa2657c5434dce295bab55a9ee79</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-javadoc-zip-debug-11.0.3.7-0.el7_6.i686.rpm</filename><sum type="sha256">7e7a255743db9eb93692ec1a1dc68c8222d5a985f564d4fe0978595c86f8f0ea</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-javadoc-zip-11.0.3.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">9ad53b58c6e4a29fe2a844917d7714cca7832dd846d38accff1dd837c935ebf6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="0.el7_6" src="java-11-openjdk-11.0.3.7-0.el7_6.src.rpm" version="11.0.3.7"><filename>java-11-openjdk-11.0.3.7-0.el7_6.x86_64.rpm</filename><sum type="sha256">65beb2f348165979798c7b3ce2956f899bbf6a3601a03871184e58e4c72de1bc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2602" id="CVE-2019-2602" title="Openjdk: Slow Conversion Of Bigdecimal To Long " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2684" id="CVE-2019-2684" title="Openjdk: Incorrect Skeleton Selection In Rmi " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0778" id="RHSA-2019:0778-1" title="Rhsa-2019:0778-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700440" id="1700440" title="Openjdk: Slow Conversion Of Bigdecimal To Long " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700564" id="1700564" title="Openjdk: Incorrect Skeleton Selection In Rmi " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0791-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Font layout engine out of bounds access setCurrGlyphID() (2D, 8219022) (CVE-2019-2698) 
* OpenJDK: Slow conversion of BigDecimal to long (Libraries, 8211936) (CVE-2019-2602) 
* OpenJDK: Incorrect skeleton selection in RMI registry server-side dispatch handling (RMI, 8218453) (CVE-2019-2684)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-04-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.18.0.el7_6" src="java-1.7.0-openjdk-1.7.0.221-2.6.18.0.el7_6.src.rpm" version="1.7.0.221"><filename>java-1.7.0-openjdk-headless-1.7.0.221-2.6.18.0.el7_6.x86_64.rpm</filename><sum type="sha256">bad0c78033a01a8df6c59d4b40d43be15b92474b2c780e8f17e0b12176a666db</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.18.0.el7_6" src="java-1.7.0-openjdk-1.7.0.221-2.6.18.0.el7_6.src.rpm" version="1.7.0.221"><filename>java-1.7.0-openjdk-1.7.0.221-2.6.18.0.el7_6.x86_64.rpm</filename><sum type="sha256">500f5afcf8a7aa18fa804be05576940cc077a157c29ceba71381f21519a07bce</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.18.0.el7_6" src="java-1.7.0-openjdk-1.7.0.221-2.6.18.0.el7_6.src.rpm" version="1.7.0.221"><filename>java-1.7.0-openjdk-demo-1.7.0.221-2.6.18.0.el7_6.x86_64.rpm</filename><sum type="sha256">73541f10ca5612593d8c297436de6633f97c6a592b5f81bd5517577c3bcf2640</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.18.0.el7_6" src="java-1.7.0-openjdk-1.7.0.221-2.6.18.0.el7_6.src.rpm" version="1.7.0.221"><filename>java-1.7.0-openjdk-accessibility-1.7.0.221-2.6.18.0.el7_6.x86_64.rpm</filename><sum type="sha256">bccebef46b073ecf242aea1d6849020c5519653c85ebf4769ce818b85e0859dc</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.18.0.el7_6" src="java-1.7.0-openjdk-1.7.0.221-2.6.18.0.el7_6.src.rpm" version="1.7.0.221"><filename>java-1.7.0-openjdk-javadoc-1.7.0.221-2.6.18.0.el7_6.noarch.rpm</filename><sum type="sha256">f0077781738a08e30c0bcfcf429f4360e0e6d3d27d78a3f44877028e3be73d88</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.18.0.el7_6" src="java-1.7.0-openjdk-1.7.0.221-2.6.18.0.el7_6.src.rpm" version="1.7.0.221"><filename>java-1.7.0-openjdk-devel-1.7.0.221-2.6.18.0.el7_6.x86_64.rpm</filename><sum type="sha256">23e65c2d02e42a1fe54ead6f9c773a90a60e620123cc82ba6df72e4f54d1c242</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.18.0.el7_6" src="java-1.7.0-openjdk-1.7.0.221-2.6.18.0.el7_6.src.rpm" version="1.7.0.221"><filename>java-1.7.0-openjdk-src-1.7.0.221-2.6.18.0.el7_6.x86_64.rpm</filename><sum type="sha256">5580b16943635baa3160d34b47b3508a2528af41973cd34639475366726e27fb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2602" id="CVE-2019-2602" title="Openjdk: Slow Conversion Of Bigdecimal To Long " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2684" id="CVE-2019-2684" title="Openjdk: Incorrect Skeleton Selection In Rmi " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2698" id="CVE-2019-2698" title="Openjdk: Font Layout Engine Out Of Bounds Access " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0791" id="RHSA-2019:0791-1" title="Rhsa-2019:0791-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700440" id="1700440" title="Openjdk: Slow Conversion Of Bigdecimal To Long " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700447" id="1700447" title="Openjdk: Font Layout Engine Out Of Bounds Access " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700564" id="1700564" title="Openjdk: Incorrect Skeleton Selection In Rmi " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0809-1</id><title>Ovmf</title><description>Security Fix(es): 
* edk2: Buffer Overflow in BlockIo service for RAM disk (CVE-2018-12180)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-04-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="OVMF" release="3.gitee3198e672e2.el7_6.1" src="ovmf-20180508-3.gitee3198e672e2.el7_6.1.src.rpm" version="20180508"><filename>OVMF-20180508-3.gitee3198e672e2.el7_6.1.noarch.rpm</filename><sum type="sha256">0b2b8b842427d64cccf82c245857c15b5f70f89e1b7576edf44b02cb08477be3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12180" id="CVE-2018-12180" title="Edk2: Buffer Overflow In Blockio Service For " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0809" id="RHSA-2019:0809-1" title="Rhsa-2019:0809-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1683372" id="1683372" title="Edk2: Buffer Overflow In Blockio Service For " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:0818-1</id><title>Kernel</title><description>Security Fix(es): 
* Kernel: KVM: potential use-after-free via kvm_ioctl_create_device() (CVE-2019-6974) 
* Kernel: KVM: nVMX: use-after-free of the hrtimer for emulation of the preemption timer (CVE-2019-7221) 
Bug Fix(es): 
* rbd: avoid corruption on partially completed bios [rhel-7.6.z] 
* xfs_vm_writepages deadly embrace between kworker and user task. [rhel-7.6.z] 
* Offload Connections always get vlan priority 0 [rhel-7.6.z] 
* [NOKIA] SL sends flood of Neighbour Solicitations under specific conditions [rhel-7.6.z] 
* SL 7.6 - Host crash occurred on NVMe/IB system while running controller reset [rhel-7.6.z] 
* [rhel7] raid0 md workqueue deadlock with stacked md devices [rhel-7.6.z] 
* [PureStorage7.6]nvme disconnect following an unsuccessful Admin queue creation causes kernel panic [rhel-7.6.z] 
* RFC: Regression with -fstack-check in 'backport upstream large stack guard patch to SL6' patch [rhel-7.6.z] 
* [Hyper-V] [SL 7.6]hv_netvsc: Fix a network regression after ifdown/ifup [rhel-7.6.z] 
* rtc_cmos: probe of 00:01 failed with error -16 [rhel-7.6.z] 
* ACPI WDAT watchdog update [rhel-7.6.z] 
* high ovs-vswitchd CPU usage when VRRP over VXLAN tunnel causing qrouter fail-over [rhel-7.6.z] 
* Openshift node drops outgoing POD traffic due to NAT hashtable race in __ip_conntrack_confirm() [rhel-7.6.z] 
* [Backport] [v3,2/2] net: igmp: Allow user-space configuration of igmp unsolicited report interval [rhel-7.6.z] 
* [SL7.6]: Intermittently seen FIFO parity error on T6225-SO adapter [rhel-7.6.z] 
* The number of unsolict report about IGMP is incorrect [rhel-7.6.z] 
* RDT driver causing failure to boot on AMD Rome system with more than 255 CPUs [rhel-7.6.z] 
* mpt3sas_cm0: fault_state(0x2100)! [rhel-7.6.z] 
* rwsem in inconsistent state leading system to hung [rhel-7.6.z]</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-04-24 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="perf" release="957.12.1.el7" src="kernel-3.10.0-957.12.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-957.12.1.el7.x86_64.rpm</filename><sum type="sha256">ebec746e5a0bed80812e8d2ee33cd9aa53a35e0421813bc9e39d8872fecb294e</sum></package><package arch="x86_64" name="kernel-tools-libs" release="957.12.1.el7" src="kernel-3.10.0-957.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-957.12.1.el7.x86_64.rpm</filename><sum type="sha256">d250bded11467317fb39df173dbeb2f382a430d341d4a14842b0439ef2f54e3e</sum></package><package arch="x86_64" name="kernel-debug-devel" release="957.12.1.el7" src="kernel-3.10.0-957.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-957.12.1.el7.x86_64.rpm</filename><sum type="sha256">2a62f350980e29fc3d55e703a6359b6986bd717332b3b71b4418be0d3a4725f9</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="957.12.1.el7" src="kernel-3.10.0-957.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-957.12.1.el7.x86_64.rpm</filename><sum type="sha256">7813a42f81726d58700faeddbc95ebb144bb8249bbcd649b0246b1c38768d564</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="957.12.1.el7" src="kernel-3.10.0-957.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-957.12.1.el7.noarch.rpm</filename><sum type="sha256">cfda2ac951006767cf2a47f4c9bf5a5f9861ab8955edc1b8973cde1274559560</sum></package><package arch="noarch" name="kernel-doc" release="957.12.1.el7" src="kernel-3.10.0-957.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-957.12.1.el7.noarch.rpm</filename><sum type="sha256">ede561e07a0122870bb385d6323111c81d9e7a63b2976cf06152e266ee3418d5</sum></package><package arch="x86_64" name="kernel-devel" release="957.12.1.el7" src="kernel-3.10.0-957.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-957.12.1.el7.x86_64.rpm</filename><sum type="sha256">3293b007fed10f2592dcdea42b6313bf7689e5163bbbced2feb36c089ff7f472</sum></package><package arch="x86_64" name="python-perf" release="957.12.1.el7" src="kernel-3.10.0-957.12.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-957.12.1.el7.x86_64.rpm</filename><sum type="sha256">5b70a532572cd6612d29ae11f458932753a5779a2f75d78d717a459d2af4ad8d</sum></package><package arch="x86_64" name="kernel-headers" release="957.12.1.el7" src="kernel-3.10.0-957.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-957.12.1.el7.x86_64.rpm</filename><sum type="sha256">ae0f3a3152e5acf4b8459c97c8428ca118d8e2ede9583f95f5927e0445747a27</sum></package><package arch="x86_64" name="kernel" release="957.12.1.el7" src="kernel-3.10.0-957.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-957.12.1.el7.x86_64.rpm</filename><sum type="sha256">e2540a0570b30dd8e6d0dfc52fc445fc61e4e9d6f828a63aa248bcaeb878628c</sum></package><package arch="x86_64" name="bpftool" release="957.12.1.el7" src="kernel-3.10.0-957.12.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-957.12.1.el7.x86_64.rpm</filename><sum type="sha256">b485941f1a4110b47e0db06db5f4bef4ae0fb4ec19eb79eca8053316390255a8</sum></package><package arch="x86_64" name="kernel-tools" release="957.12.1.el7" src="kernel-3.10.0-957.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-957.12.1.el7.x86_64.rpm</filename><sum type="sha256">8547b2bbe480ed22e84fe8a34ee132127d110c0eacd121214f6508af3f76ee51</sum></package><package arch="x86_64" name="kernel-debug" release="957.12.1.el7" src="kernel-3.10.0-957.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-957.12.1.el7.x86_64.rpm</filename><sum type="sha256">d18a4250f6aaeefa019a71c849aec0c248c6f033a63408c76c18a22662f5e22e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6974" id="CVE-2019-6974" title="Kernel: Kvm: Potential Use-After-Free Via " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7221" id="CVE-2019-7221" title="Kernel: Kvm: Nvmx: Use-After-Free Of The Hrtimer " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:0818" id="RHSA-2019:0818-1" title="Rhsa-2019:0818-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1671904" id="1671904" title="Kernel: Kvm: Nvmx: Use-After-Free Of The Hrtimer " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1671913" id="1671913" title="Kernel: Kvm: Potential Use-After-Free Via " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1017-1</id><title>Ghostscript</title><description>Security Fix(es): 
* ghostscript: missing attack vector protections for CVE-2019-6116 (CVE-2019-3839)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-05-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="ghostscript" release="31.el7_6.11" src="ghostscript-9.07-31.el7_6.11.src.rpm" version="9.07"><filename>ghostscript-9.07-31.el7_6.11.i686.rpm</filename><sum type="sha256">47c27cfcf3168ebebea339e114f4a3dd9ed05de0b4c5975ca117545b2d1b31b3</sum></package><package arch="noarch" name="ghostscript-doc" release="31.el7_6.11" src="ghostscript-9.07-31.el7_6.11.src.rpm" version="9.07"><filename>ghostscript-doc-9.07-31.el7_6.11.noarch.rpm</filename><sum type="sha256">1941374265a4470de35749e18d78086ea022fce0db058d1183280da4d38b9713</sum></package><package arch="x86_64" name="ghostscript-cups" release="31.el7_6.11" src="ghostscript-9.07-31.el7_6.11.src.rpm" version="9.07"><filename>ghostscript-cups-9.07-31.el7_6.11.x86_64.rpm</filename><sum type="sha256">77fc2e5b1245a94a0b4b86dee3b91bb2bd2d204ead18db872a322041c0277e40</sum></package><package arch="x86_64" name="ghostscript-gtk" release="31.el7_6.11" src="ghostscript-9.07-31.el7_6.11.src.rpm" version="9.07"><filename>ghostscript-gtk-9.07-31.el7_6.11.x86_64.rpm</filename><sum type="sha256">2cf96a18433bfcbd53147fd01692bb2d8f22c41194aa42bc1a67bf585a3e8e25</sum></package><package arch="x86_64" name="ghostscript" release="31.el7_6.11" src="ghostscript-9.07-31.el7_6.11.src.rpm" version="9.07"><filename>ghostscript-9.07-31.el7_6.11.x86_64.rpm</filename><sum type="sha256">c1403617434b8cff6a1c9b2bd1f2586c9c7cc37702c3c50a8714b00b0992e394</sum></package><package arch="x86_64" name="ghostscript-devel" release="31.el7_6.11" src="ghostscript-9.07-31.el7_6.11.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-31.el7_6.11.x86_64.rpm</filename><sum type="sha256">e9b1d95cec502945d6330ff1161160fa87d67d74d30cd58e905929c8f377d1d1</sum></package><package arch="i686" name="ghostscript-devel" release="31.el7_6.11" src="ghostscript-9.07-31.el7_6.11.src.rpm" version="9.07"><filename>ghostscript-devel-9.07-31.el7_6.11.i686.rpm</filename><sum type="sha256">5ebfe57239815f0f06fd8457d688ae29b4442ed55190d06271e5a3809bd02d19</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3839" id="CVE-2019-3839" title="Ghostscript: Missing Attack Vector Protections" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1017" id="RHSA-2019:1017-1" title="Rhsa-2019:1017-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1673304" id="1673304" title="Ghostscript: Missing Attack Vector Protections" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1022-1</id><title>Python-Jinja2</title><description>* python-jinja2: Sandbox escape due to information disclosure via str.format (CVE-2016-10745)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-05-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-jinja2" release="3.el7_6" src="python-jinja2-2.7.2-3.el7_6.src.rpm" version="2.7.2"><filename>python-jinja2-2.7.2-3.el7_6.noarch.rpm</filename><sum type="sha256">2d478961299f05460deb5e51e8417d8bc6075b610d5d372bba0f83023172e7b1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10745" id="CVE-2016-10745" title="Python-Jinja2: Sandbox Escape Due To" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1022" id="RHSA-2019:1022-1" title="Rhsa-2019:1022-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1698345" id="1698345" title="Python-Jinja2: Sandbox Escape Due To" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1024-1</id><title>Flatpak</title><description>Security Fix(es): 
* flatpak: Sandbox bypass via IOCSTI (incomplete fix for CVE-2017-5226) (CVE-2019-10063)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-05-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="flatpak-builder" release="5.el7_6" src="flatpak-1.0.2-5.el7_6.src.rpm" version="1.0.0"><filename>flatpak-builder-1.0.0-5.el7_6.x86_64.rpm</filename><sum type="sha256">c2d3eebd529963eaeb94a4d08d2552aa98c56ccedc0eca88874781abe6540ffd</sum></package><package arch="x86_64" name="flatpak-devel" release="5.el7_6" src="flatpak-1.0.2-5.el7_6.src.rpm" version="1.0.2"><filename>flatpak-devel-1.0.2-5.el7_6.x86_64.rpm</filename><sum type="sha256">303fa037ae1bdfafb826e829b0ece1fda938458a409e5b9ec1d60e7307ab1083</sum></package><package arch="x86_64" name="flatpak-libs" release="5.el7_6" src="flatpak-1.0.2-5.el7_6.src.rpm" version="1.0.2"><filename>flatpak-libs-1.0.2-5.el7_6.x86_64.rpm</filename><sum type="sha256">1f1cc9383f43a10df4576c274925ed0fe9635e3cab34fa8d8b3c692dc5e590a4</sum></package><package arch="x86_64" name="flatpak" release="5.el7_6" src="flatpak-1.0.2-5.el7_6.src.rpm" version="1.0.2"><filename>flatpak-1.0.2-5.el7_6.x86_64.rpm</filename><sum type="sha256">3aeb197909f940c7a11dc8f984b03a8827febd1201a8dc1341988d29b33d8464</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10063" id="CVE-2019-10063" title="Flatpak: Sandbox Bypass Via Iocsti (Incomplete" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1024" id="RHSA-2019:1024-1" title="Rhsa-2019:1024-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1695973" id="1695973" title="Flatpak: Sandbox Bypass Via Iocsti (Incomplete" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1131-1</id><title>Freeradius</title><description>Security Fix(es): 
* freeradius: eap-pwd: authentication bypass via an invalid curve attack (CVE-2019-11235) 
* freeradius: eap-pwd: fake authentication using reflection (CVE-2019-11234)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-05-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="freeradius-devel" release="10.el7_6" src="freeradius-3.0.13-10.el7_6.src.rpm" version="3.0.13"><filename>freeradius-devel-3.0.13-10.el7_6.x86_64.rpm</filename><sum type="sha256">c633458bc8613ec9fde6495c1fe7f7d1b1b70b60dda0606cf894638dcc2ee07f</sum></package><package arch="x86_64" name="freeradius-unixODBC" release="10.el7_6" src="freeradius-3.0.13-10.el7_6.src.rpm" version="3.0.13"><filename>freeradius-unixODBC-3.0.13-10.el7_6.x86_64.rpm</filename><sum type="sha256">15bc23b5addb30f53551fd75a33ae7e54c388476d9ea786856656e8f4726b1ab</sum></package><package arch="i686" name="freeradius-devel" release="10.el7_6" src="freeradius-3.0.13-10.el7_6.src.rpm" version="3.0.13"><filename>freeradius-devel-3.0.13-10.el7_6.i686.rpm</filename><sum type="sha256">35ddb1ae298cbf0866ec66065b9bd7e2d0e5d4fccc6e9ca1502db4c855563b44</sum></package><package arch="x86_64" name="freeradius" release="10.el7_6" src="freeradius-3.0.13-10.el7_6.src.rpm" version="3.0.13"><filename>freeradius-3.0.13-10.el7_6.x86_64.rpm</filename><sum type="sha256">2464c41b4fb36ff8b5e84a2f1c8023efc78a12c743c88f30977d051b0abd17ce</sum></package><package arch="x86_64" name="freeradius-mysql" release="10.el7_6" src="freeradius-3.0.13-10.el7_6.src.rpm" version="3.0.13"><filename>freeradius-mysql-3.0.13-10.el7_6.x86_64.rpm</filename><sum type="sha256">a1d849372b5fbf6e3172644292246008d0eb79ca25ebc9ec099123c6549ce9b2</sum></package><package arch="x86_64" name="freeradius-python" release="10.el7_6" src="freeradius-3.0.13-10.el7_6.src.rpm" version="3.0.13"><filename>freeradius-python-3.0.13-10.el7_6.x86_64.rpm</filename><sum type="sha256">fef90b82488dc559054209e854f1402deaee15bba8e2a20724c61a5536c901a6</sum></package><package arch="x86_64" name="freeradius-perl" release="10.el7_6" src="freeradius-3.0.13-10.el7_6.src.rpm" version="3.0.13"><filename>freeradius-perl-3.0.13-10.el7_6.x86_64.rpm</filename><sum type="sha256">cf5933e25a545e34353283ba02a711cfd9aaa8bd9a6fb13fc141ced8416cf8df</sum></package><package arch="x86_64" name="freeradius-sqlite" release="10.el7_6" src="freeradius-3.0.13-10.el7_6.src.rpm" version="3.0.13"><filename>freeradius-sqlite-3.0.13-10.el7_6.x86_64.rpm</filename><sum type="sha256">4184971fe0e08dbe6407da48ada294599727400e5423babd4e6f7efede9b571e</sum></package><package arch="x86_64" name="freeradius-postgresql" release="10.el7_6" src="freeradius-3.0.13-10.el7_6.src.rpm" version="3.0.13"><filename>freeradius-postgresql-3.0.13-10.el7_6.x86_64.rpm</filename><sum type="sha256">2336ecde76f7d187460ebca640a228b4db03e8260c0c8c92e6a5fa6b0192cdd7</sum></package><package arch="x86_64" name="freeradius-utils" release="10.el7_6" src="freeradius-3.0.13-10.el7_6.src.rpm" version="3.0.13"><filename>freeradius-utils-3.0.13-10.el7_6.x86_64.rpm</filename><sum type="sha256">dee4192c6e8dad5634caa5bc4f6dbcfda5c477e277635d7ca65a620a75f27f58</sum></package><package arch="x86_64" name="freeradius-doc" release="10.el7_6" src="freeradius-3.0.13-10.el7_6.src.rpm" version="3.0.13"><filename>freeradius-doc-3.0.13-10.el7_6.x86_64.rpm</filename><sum type="sha256">cb611c09b8cdd525ee82585ac6da8b514ccfd906dc3850e29c66e4d9d18164be</sum></package><package arch="x86_64" name="freeradius-ldap" release="10.el7_6" src="freeradius-3.0.13-10.el7_6.src.rpm" version="3.0.13"><filename>freeradius-ldap-3.0.13-10.el7_6.x86_64.rpm</filename><sum type="sha256">afae6c3615d4430f6af2da1612e389d4009c675e2d30935086aaca30cdf63097</sum></package><package arch="x86_64" name="freeradius-krb5" release="10.el7_6" src="freeradius-3.0.13-10.el7_6.src.rpm" version="3.0.13"><filename>freeradius-krb5-3.0.13-10.el7_6.x86_64.rpm</filename><sum type="sha256">b2be6c1fc13d8748c8f385728d5b5e529aac8f4f0dc496b6a00859793faa9f9b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11234" id="CVE-2019-11234" title="Freeradius: Eap-Pwd: Fake Authentication Using" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11235" id="CVE-2019-11235" title="Freeradius: Eap-Pwd: Authentication Bypass Via" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1131" id="RHSA-2019:1131-1" title="Rhsa-2019:1131-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1695748" id="1695748" title="Freeradius: Eap-Pwd: Authentication Bypass Via" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1695783" id="1695783" title="Freeradius: Eap-Pwd: Fake Authentication Using" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1168-1</id><title>Kernel</title><description>Security Fix(es): 
* A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer. (CVE-2018-12130) 
* Modern Intel microprocessors implement hardware-level micro- optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'. As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126) 
* Microprocessors use a load port subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPUs pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2018-12127) 
* Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. (CVE-2019-11091)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-05-15 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools" release="957.12.2.el7" src="kernel-3.10.0-957.12.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-957.12.2.el7.x86_64.rpm</filename><sum type="sha256">de1414227fa5d20a8611823daf4b1f865ebd235db18c246af078c41b171c6d59</sum></package><package arch="x86_64" name="kernel-tools-libs" release="957.12.2.el7" src="kernel-3.10.0-957.12.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-957.12.2.el7.x86_64.rpm</filename><sum type="sha256">4d43a011799d448f47fa4e8147fed519628d724f2f085ffc26d3546c3d591faa</sum></package><package arch="noarch" name="kernel-doc" release="957.12.2.el7" src="kernel-3.10.0-957.12.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-957.12.2.el7.noarch.rpm</filename><sum type="sha256">e46758550b8d2b718b9bac7b58d15de9ea18e9218ccd18cf9f01572dce9f321f</sum></package><package arch="x86_64" name="kernel-headers" release="957.12.2.el7" src="kernel-3.10.0-957.12.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-957.12.2.el7.x86_64.rpm</filename><sum type="sha256">b71994c1ab412a08e126f54f162f70c042a4d7ffd200ef21f4bd15ba9eebc59a</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="957.12.2.el7" src="kernel-3.10.0-957.12.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-957.12.2.el7.noarch.rpm</filename><sum type="sha256">4cd3e8a1835f4a33ba7e80a2863f309407bb2060954a9e7b9110a80ca4f07b19</sum></package><package arch="x86_64" name="python-perf" release="957.12.2.el7" src="kernel-3.10.0-957.12.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-957.12.2.el7.x86_64.rpm</filename><sum type="sha256">3527c40314b65183bc36eaa21b1c54260c012f1edd7365965dd57604a14af2c4</sum></package><package arch="x86_64" name="kernel-devel" release="957.12.2.el7" src="kernel-3.10.0-957.12.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-957.12.2.el7.x86_64.rpm</filename><sum type="sha256">1949f57000d28f7c2769a702ec83f62b051c12e1bfdbea3e832d959625effcef</sum></package><package arch="x86_64" name="kernel-debug" release="957.12.2.el7" src="kernel-3.10.0-957.12.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-957.12.2.el7.x86_64.rpm</filename><sum type="sha256">e589fa81b473807cd63f3f57a13ea6f910150110be919872da18ab8589930bfd</sum></package><package arch="x86_64" name="kernel" release="957.12.2.el7" src="kernel-3.10.0-957.12.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-957.12.2.el7.x86_64.rpm</filename><sum type="sha256">772d9c37e24593b0879a89b5e84f1e0c707082238cef9374ae7ebc56da21f853</sum></package><package arch="x86_64" name="perf" release="957.12.2.el7" src="kernel-3.10.0-957.12.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-957.12.2.el7.x86_64.rpm</filename><sum type="sha256">c4612d7839e6734704a2ccb75db141913dd9f735f102c407de5ae45c1abba8a7</sum></package><package arch="x86_64" name="kernel-debug-devel" release="957.12.2.el7" src="kernel-3.10.0-957.12.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-957.12.2.el7.x86_64.rpm</filename><sum type="sha256">9ffb55c71e06ea6a551bb6ad52b2baf4f2571508ba4e3bfd6c6127f3fdee055d</sum></package><package arch="x86_64" name="bpftool" release="957.12.2.el7" src="kernel-3.10.0-957.12.2.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-957.12.2.el7.x86_64.rpm</filename><sum type="sha256">ebf1daf0a2bcc9fcc30677fcb93fa83dbcfc3e9d47a80c3f3c489165064f7260</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="957.12.2.el7" src="kernel-3.10.0-957.12.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-957.12.2.el7.x86_64.rpm</filename><sum type="sha256">b1b208a4a420b953d3c3354772e2bff79731073cb5d66e639158a4401839cb00</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" id="CVE-2018-12126" title="Hardware: Microarchitectural Store Buffer Data " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" id="CVE-2018-12127" title="Hardware: Micro-Architectural Load Port Data " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" id="CVE-2018-12130" title="Hardware: Microarchitectural Fill Buffer Data " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" id="CVE-2019-11091" title="Hardware: Microarchitectural Data Sampling " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1168" id="RHSA-2019:1168-1" title="Rhsa-2019:1168-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646781" id="1646781" title="Hardware: Microarchitectural Store Buffer Data " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646784" id="1646784" title="Hardware: Microarchitectural Fill Buffer Data " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1667782" id="1667782" title="Hardware: Micro-Architectural Load Port Data " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1705312" id="1705312" title="Hardware: Microarchitectural Data Sampling " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1177-1</id><title>Libvirt</title><description>Security Fix(es): 
* A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer. (CVE-2018-12130) 
* Modern Intel microprocessors implement hardware-level micro- optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'. As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126) 
* Microprocessors use a load port subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPUs pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2018-12127) 
* Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. (CVE-2019-11091)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-05-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libvirt-bash-completion" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-bash-completion-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">5b52a9f779aa6aac684f5ce573f91f5fe92d3f9d187d8401f5aa1b1345df7d0c</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-gluster" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">991fab546cc4fcc0579a5c5c770bf12b8bb90bdf42cb046382e9a5f60d4c5012</sum></package><package arch="x86_64" name="libvirt-admin" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-admin-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">ab568c9f71a41b24e08e9a1b544bf7191a71513bed4c78d2eb923e6dec42d8b5</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-logical" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">b486b009b2a18d94448e21b63fe6c86f1edc8074d74e64b1b84139a46366ae3e</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-lock-sanlock-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">5fc3718c23be4bfa83a63502ba61fe085a9e9b461b195c504146657ef1c23c59</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">a4e68cccd4ca063538f448add745d3dee8c7c59104e42bdf71df9d84b39b3c52</sum></package><package arch="i686" name="libvirt-nss" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-10.el7_6.9.i686.rpm</filename><sum type="sha256">aae902e29b0ef0a864747eabd8fd62d41693e51370688ba73d9140decdd13241</sum></package><package arch="x86_64" name="libvirt-daemon-config-nwfilter" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">a2f9bbd0ac81c63f4aa16530c0ad9976d4144219a647bc2c420eeb22840ec7e5</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-rbd" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">2b16a055fb1a282499d62c55617b1d63617e1ce5fee436753cce59a5b7b8a95e</sum></package><package arch="x86_64" name="libvirt-daemon-config-network" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-network-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">4c6f6a50e1632be0960e1f82d58122f6d3ded6138c39e0cc7b74bbdccb066758</sum></package><package arch="x86_64" name="libvirt-daemon-driver-lxc" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-lxc-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">4c34a81697bfa96d2cea705ecb266daee02969e640c77d172e5025ff655c6998</sum></package><package arch="i686" name="libvirt-devel" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-10.el7_6.9.i686.rpm</filename><sum type="sha256">b6da9e08e583d38f71452dd0eea0f6b4d9a945180f4b2d8845b6394c34727850</sum></package><package arch="x86_64" name="libvirt-devel" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">b52007bf454a35ca1e75d4f6427b7200b53e30be21e09cfd0972fe3c673fc142</sum></package><package arch="x86_64" name="libvirt-daemon-driver-secret" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-secret-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">902a6ae23b5a862f7727476bb2f2b905908800883f04e79c5d870ccde538dae0</sum></package><package arch="i686" name="libvirt-libs" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-10.el7_6.9.i686.rpm</filename><sum type="sha256">b803b7a397c010700e19a4137e7c7e10498b5ea4dd24d65e840d1f40dfb98550</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-disk" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">f705d0a5b2cfc76f4e086530bb0214368f5ceb5f6073bccb0377cc9f28e792c4</sum></package><package arch="x86_64" name="libvirt-nss" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">e1966584ae1e97346d374e03ce9ab72c405ac9af3db6a44a484b35bdd559fc7e</sum></package><package arch="x86_64" name="libvirt-daemon-driver-interface" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-interface-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">3d5c69b78035235813d6b93ec0b39c7475d5ccd542d7d41c0801388983feb9f2</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-mpath" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">59fbf0f545d8519e88d18b8e3af4c41e81a95ab7807383a1308a601b6cb70d44</sum></package><package arch="x86_64" name="libvirt-daemon-driver-qemu" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-qemu-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">f196fe7c7a1c0c82af35e585e8e16f8959efa279ab443eddfbb3e4b5326d69c1</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nwfilter" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">b39b175c40db2c3116f71a2ec93b2a23b3185f406c870c82c9f35fd5f5f9f083</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-core" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">8af321fb574a928ec5d0c1659d06b1d94a4f7c89d5afd2f953f3bc96e4c0907e</sum></package><package arch="i686" name="libvirt-client" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-10.el7_6.9.i686.rpm</filename><sum type="sha256">b4b5bdf76e75af572e899c4d69458b0d1d4e5f04dd923730ef60a9f523fc6a50</sum></package><package arch="x86_64" name="libvirt-login-shell" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-login-shell-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">4136bf7cfe31e92d9d7cb4ebc186f47214e2df535a1ef71d80be1caeb89c44fc</sum></package><package arch="x86_64" name="libvirt-daemon-lxc" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-lxc-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">65bba7d6c7ff53809db96d45dc418785a53d983f00be9580d34cb45d71d7042d</sum></package><package arch="x86_64" name="libvirt-docs" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-docs-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">2a3fbdccc7bccb0ac05a6da716004d688bb739888873bb6eb24e868b97e5d1c9</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-iscsi" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">60b57dcec7742b3242e938eec6f47844466e39d6b6a35fcb44c601bfbcf6e33f</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-scsi" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">0ddf1988af2e5fb27eb9e36576c49f0abb12d3efd317b9a5ea6f74b8064159fd</sum></package><package arch="x86_64" name="libvirt-client" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">d5c92bd706ba1c347e20dc75cedcdb8a28e43e848e78d79ce0c405048472995e</sum></package><package arch="x86_64" name="libvirt" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">fd0713f515a79a0adef43cdd347c244bd5441e3692b92ddbcdf4104054c536bf</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nodedev" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">224bbc0dcc361a2c3a98edea297d168e43682de604d369a1bc5fdfdd97d3cb6d</sum></package><package arch="x86_64" name="libvirt-daemon-driver-network" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-network-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">208e0b2565c9242ca171d6754b3f23e01f7f6b854d93f7a6421063ebdfdcce06</sum></package><package arch="x86_64" name="libvirt-daemon" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">ef7bec9a13cafedaf41de52793b21a19cac0ebd266c23e734621088ac1072794</sum></package><package arch="x86_64" name="libvirt-daemon-kvm" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-daemon-kvm-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">03a41d758775fddf912385e7873974f35ec4892b5b5862535ea054c507ad45ed</sum></package><package arch="x86_64" name="libvirt-libs" release="10.el7_6.9" src="libvirt-4.5.0-10.el7_6.9.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-10.el7_6.9.x86_64.rpm</filename><sum type="sha256">78453a128cae9d62dcb8a5286dc525294ee9fbf9e39e80465056eefcc75544e6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" id="CVE-2018-12126" title="Hardware: Microarchitectural Store Buffer Data " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" id="CVE-2018-12127" title="Hardware: Micro-Architectural Load Port Data " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" id="CVE-2018-12130" title="Hardware: Microarchitectural Fill Buffer Data " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" id="CVE-2019-11091" title="Hardware: Microarchitectural Data Sampling " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1177" id="RHSA-2019:1177-1" title="Rhsa-2019:1177-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646781" id="1646781" title="Hardware: Microarchitectural Store Buffer Data " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646784" id="1646784" title="Hardware: Microarchitectural Fill Buffer Data " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1667782" id="1667782" title="Hardware: Micro-Architectural Load Port Data " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1705312" id="1705312" title="Hardware: Microarchitectural Data Sampling " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1178-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer. (CVE-2018-12130) 
* Modern Intel microprocessors implement hardware-level micro- optimizations to improve the performance of writing data back to CPU caches. The write operation is split into STA (STore Address) and STD (STore Data) sub-operations. These sub-operations allow the processor to hand-off address generation logic into these sub-operations for optimized writes. Both of these sub-operations write to a shared distributed processor structure called the 'processor store buffer'. As a result, an unprivileged attacker could use this flaw to read private data resident within the CPU's processor store buffer. (CVE-2018-12126) 
* Microprocessors use a load port subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPUs pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel. (CVE-2018-12127) 
* Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. (CVE-2019-11091)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-05-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="160.el7_6.2" src="qemu-kvm-1.5.3-160.el7_6.2.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-160.el7_6.2.x86_64.rpm</filename><sum type="sha256">eaa61e274ad8fd9fd15ba5c82d21b72f7e0471b8bf03504c2d1c42a13960b80b</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="160.el7_6.2" src="qemu-kvm-1.5.3-160.el7_6.2.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-160.el7_6.2.x86_64.rpm</filename><sum type="sha256">8a13d3c875c37c25cb5e54c281470eb11594dc1326e2ccca57c7c4127ff27502</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="160.el7_6.2" src="qemu-kvm-1.5.3-160.el7_6.2.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-160.el7_6.2.x86_64.rpm</filename><sum type="sha256">a9e701fc822b168b857867da9a03760bbb2a3ab4a381130a9ee23eabb6cb47f2</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="160.el7_6.2" src="qemu-kvm-1.5.3-160.el7_6.2.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-160.el7_6.2.x86_64.rpm</filename><sum type="sha256">108208506e233873a7d4c082ac1989cc2b23a8cefcbdf3fe7199dc9162d7c5df</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126" id="CVE-2018-12126" title="Hardware: Microarchitectural Store Buffer Data " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127" id="CVE-2018-12127" title="Hardware: Micro-Architectural Load Port Data " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130" id="CVE-2018-12130" title="Hardware: Microarchitectural Fill Buffer Data " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091" id="CVE-2019-11091" title="Hardware: Microarchitectural Data Sampling " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1178" id="RHSA-2019:1178-1" title="Rhsa-2019:1178-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646781" id="1646781" title="Hardware: Microarchitectural Store Buffer Data " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646784" id="1646784" title="Hardware: Microarchitectural Fill Buffer Data " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1667782" id="1667782" title="Hardware: Micro-Architectural Load Port Data " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1705312" id="1705312" title="Hardware: Microarchitectural Data Sampling " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1228-1</id><title>Wget</title><description>Security Fix(es): 
* wget: do_conversion() heap-based buffer overflow vulnerability (CVE-2019-5953)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-05-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="wget" release="18.el7_6.1" src="wget-1.14-18.el7_6.1.src.rpm" version="1.14"><filename>wget-1.14-18.el7_6.1.x86_64.rpm</filename><sum type="sha256">0ff361a85649c75fa5922cee2d526dca51f34a7f6bf126751f60c6946d45c1d7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5953" id="CVE-2019-5953" title="Wget: Do_Conversion() Heap-Based Buffer Overflow " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1228" id="RHSA-2019:1228-1" title="Rhsa-2019:1228-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1695679" id="1695679" title="Wget: Do_Conversion() Heap-Based Buffer Overflow " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1235-1</id><title>Ruby</title><description>Security Fix(es): 
* rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324) 
* rubygems: Escape sequence injection vulnerability in gem owner (CVE-2019-8322) 
* rubygems: Escape sequence injection vulnerability in API response handling (CVE-2019-8323) 
* rubygems: Escape sequence injection vulnerability in errors (CVE-2019-8325)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-05-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="rubygem-rdoc" release="35.el7_6" src="ruby-2.0.0.648-35.el7_6.src.rpm" version="4.0.0"><filename>rubygem-rdoc-4.0.0-35.el7_6.noarch.rpm</filename><sum type="sha256">b77e8464f018e412cdc789e85f100a3791f091b1fe8deeaca595084ab98816f7</sum></package><package arch="x86_64" name="rubygem-json" release="35.el7_6" src="ruby-2.0.0.648-35.el7_6.src.rpm" version="1.7.7"><filename>rubygem-json-1.7.7-35.el7_6.x86_64.rpm</filename><sum type="sha256">7279e9cd2b567127b61a8545338cd06d91b1ef8b6071f4155147861b456f2276</sum></package><package arch="noarch" name="rubygem-minitest" release="35.el7_6" src="ruby-2.0.0.648-35.el7_6.src.rpm" version="4.3.2"><filename>rubygem-minitest-4.3.2-35.el7_6.noarch.rpm</filename><sum type="sha256">aa376d4923bf63759802df72bd786b6876f066861bebeacacce2f6e96ab6f701</sum></package><package arch="noarch" name="rubygems" release="35.el7_6" src="ruby-2.0.0.648-35.el7_6.src.rpm" version="2.0.14.1"><filename>rubygems-2.0.14.1-35.el7_6.noarch.rpm</filename><sum type="sha256">c778b0f790dc43d2fb4e1e3dfdb12e2ea665915ab197de362a81fd835ddafaee</sum></package><package arch="x86_64" name="ruby-libs" release="35.el7_6" src="ruby-2.0.0.648-35.el7_6.src.rpm" version="2.0.0.648"><filename>ruby-libs-2.0.0.648-35.el7_6.x86_64.rpm</filename><sum type="sha256">9c7903cc877da8693dd30978f1a8e7a7f71470ef96b30bb1f039b4aee38b40f4</sum></package><package arch="noarch" name="ruby-doc" release="35.el7_6" src="ruby-2.0.0.648-35.el7_6.src.rpm" version="2.0.0.648"><filename>ruby-doc-2.0.0.648-35.el7_6.noarch.rpm</filename><sum type="sha256">b306f18adf247063945e7a94bf7cb50a28a71aab1fe26c0ddced9767a4e6340f</sum></package><package arch="x86_64" name="ruby-tcltk" release="35.el7_6" src="ruby-2.0.0.648-35.el7_6.src.rpm" version="2.0.0.648"><filename>ruby-tcltk-2.0.0.648-35.el7_6.x86_64.rpm</filename><sum type="sha256">fb29d26609cf39238f7e03e065450498b91a0c1f9376e49da3ed8f5a04cdb653</sum></package><package arch="noarch" name="rubygem-rake" release="35.el7_6" src="ruby-2.0.0.648-35.el7_6.src.rpm" version="0.9.6"><filename>rubygem-rake-0.9.6-35.el7_6.noarch.rpm</filename><sum type="sha256">cb26dbf95a982b8824eeabd880c26752738aa50b98d65b62f49a1ee04ce5ad32</sum></package><package arch="noarch" name="ruby-irb" release="35.el7_6" src="ruby-2.0.0.648-35.el7_6.src.rpm" version="2.0.0.648"><filename>ruby-irb-2.0.0.648-35.el7_6.noarch.rpm</filename><sum type="sha256">536e9c0d345efb6a5d0f886e360aa02a0283492c66633e2bf65bf47f8570e829</sum></package><package arch="i686" name="ruby-libs" release="35.el7_6" src="ruby-2.0.0.648-35.el7_6.src.rpm" version="2.0.0.648"><filename>ruby-libs-2.0.0.648-35.el7_6.i686.rpm</filename><sum type="sha256">7533642f70d979272d598b597471794c665f60af9f7157d73117e1c3791fcbe0</sum></package><package arch="x86_64" name="ruby" release="35.el7_6" src="ruby-2.0.0.648-35.el7_6.src.rpm" version="2.0.0.648"><filename>ruby-2.0.0.648-35.el7_6.x86_64.rpm</filename><sum type="sha256">fdb67e9a754544c02a472c4c8e52e0c3cb82d7b91c41da187a60616c9dd91ddc</sum></package><package arch="x86_64" name="rubygem-io-console" release="35.el7_6" src="ruby-2.0.0.648-35.el7_6.src.rpm" version="0.4.2"><filename>rubygem-io-console-0.4.2-35.el7_6.x86_64.rpm</filename><sum type="sha256">32cfeb7cf0b32e4178fb6b17de2c50ba4b9eb59b81f30c6c5638dff940e13bd2</sum></package><package arch="x86_64" name="ruby-devel" release="35.el7_6" src="ruby-2.0.0.648-35.el7_6.src.rpm" version="2.0.0.648"><filename>ruby-devel-2.0.0.648-35.el7_6.x86_64.rpm</filename><sum type="sha256">b2a106f9864a2005b3a8a75d908d546db731aa30d5cc9ebb1f62a3fdf3240088</sum></package><package arch="x86_64" name="rubygem-bigdecimal" release="35.el7_6" src="ruby-2.0.0.648-35.el7_6.src.rpm" version="1.2.0"><filename>rubygem-bigdecimal-1.2.0-35.el7_6.x86_64.rpm</filename><sum type="sha256">9873fc81ca531750d007d1b882c6b9d78b284ff21da9e947da830ed1c7d58264</sum></package><package arch="x86_64" name="rubygem-psych" release="35.el7_6" src="ruby-2.0.0.648-35.el7_6.src.rpm" version="2.0.0"><filename>rubygem-psych-2.0.0-35.el7_6.x86_64.rpm</filename><sum type="sha256">4de7035b00bb284a79113dbabdee30edb9ff4dc5f68642eb5fa968155fbd1550</sum></package><package arch="noarch" name="rubygems-devel" release="35.el7_6" src="ruby-2.0.0.648-35.el7_6.src.rpm" version="2.0.14.1"><filename>rubygems-devel-2.0.14.1-35.el7_6.noarch.rpm</filename><sum type="sha256">c1327e2498427d06987358764eebb5e4b32967ad2bc4becc371b3b2fb5723a2e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8322" id="CVE-2019-8322" title="Rubygems: Escape Sequence Injection " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8323" id="CVE-2019-8323" title="Rubygems: Escape Sequence Injection " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8324" id="CVE-2019-8324" title="Rubygems: Installing A Malicious Gem May Lead To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8325" id="CVE-2019-8325" title="Rubygems: Escape Sequence Injection " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1235" id="RHSA-2019:1235-1" title="Rhsa-2019:1235-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1692516" id="1692516" title="Rubygems: Escape Sequence Injection " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1692519" id="1692519" title="Rubygems: Escape Sequence Injection " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1692520" id="1692520" title="Rubygems: Installing A Malicious Gem May Lead To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1692522" id="1692522" title="Rubygems: Escape Sequence Injection " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1264-1</id><title>Libvirt</title><description>Security Fix(es): 
* libvirt: wrong permissions in systemd admin-sock due to missing SocketMode parameter (CVE-2019-10132) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE  
Bug Fix(es): 
* libvirt terminates and core-dumps with SIGABRT as a result of a invalid pointer error trying to free memory in virNWFilterBindingDefFree()</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-05-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libvirt-daemon-driver-lxc" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-lxc-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">537f081e0750436ea0947abd1b77cb54d482816c380757a9fb6b9bdd5d8e0709</sum></package><package arch="x86_64" name="libvirt" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">f92fcb9ee0d1b675275e1deb5c6f74b77582d57c9c6de09e9420e4a54db83033</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-gluster" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">53e14765bb70f24b629a8521b709c0551bb7b5aa5a68a2487b27f99462f82985</sum></package><package arch="x86_64" name="libvirt-daemon-driver-secret" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-secret-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">1cf6877d71aa4ab25d95b18f16bbd34f980aeedb7bd9dfe3dd0f4b591f398a2d</sum></package><package arch="x86_64" name="libvirt-daemon-driver-network" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-network-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">96fc96848ee4d9811a48a2559703c0562cb6d3614e098d54830ae00a1a643fda</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nwfilter" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">acff8175a789843d74eb785eb3951c7abf133833aed7312c2e432994a4f120c6</sum></package><package arch="x86_64" name="libvirt-daemon-driver-interface" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-interface-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">ee9fa5e5999fb6952f1c7eac2c717f40a655e2fa4494f3e3661d66c32f99f2a6</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-rbd" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">a92f781f23095a94267d420a9022703927b0c896437a5965de6577347df620b4</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-mpath" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">b91b95dcff1f1e04b627ed966804f7202f8ac764f0e1b14cd0925f50596f578b</sum></package><package arch="i686" name="libvirt-libs" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-10.el7_6.10.i686.rpm</filename><sum type="sha256">a3365f17b6afa3bc322dc65b0c0b2314613d8fd3c3b7fdfcd993b383f993f059</sum></package><package arch="x86_64" name="libvirt-daemon-config-network" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-network-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">34532fa5936b53bed74dd17570cebb57aaa1c793ef1e9be2474286e8017af9ef</sum></package><package arch="i686" name="libvirt-client" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-10.el7_6.10.i686.rpm</filename><sum type="sha256">c30b44316df811f04067c78a228332bf7fa31d56b56434c7834766215a9d3d0e</sum></package><package arch="x86_64" name="libvirt-daemon-lxc" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-lxc-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">2828deb2605ed571a77e92273ad1ec1bdc27f9fbb3598d13384a0e4bb0b45300</sum></package><package arch="x86_64" name="libvirt-nss" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">7ada5f035406a2b30d6f6d16105aef561cf044a940f2a2a85c3d0f17034a9492</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nodedev" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">d9265d60430e9d85a3eda8078cc7e1a1d86c12e8f9403c5dc9998c9f1187bb7a</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-disk" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">e010d8c0708bf86b98f065574dffb83ca45d5b455c356540c5cf67d9d07b0585</sum></package><package arch="x86_64" name="libvirt-daemon" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">76ca534c4ec42a7ec8990a20799e1c1a949c109de3ebf124012c034d7321968f</sum></package><package arch="x86_64" name="libvirt-daemon-kvm" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-kvm-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">57c70d0e750cd2ffebb920faa699c85e3f550a7e92b3b79f18d93e1f0a1753ed</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-lock-sanlock-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">87f78fe0dbb2501313b8e84ed1d0ae637c461ee4521c4f3cb756c71d4d14905b</sum></package><package arch="x86_64" name="libvirt-admin" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-admin-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">d858fd15df74144625490c763233dcdb17bb453f8994333940478bf7f36ab46c</sum></package><package arch="x86_64" name="libvirt-bash-completion" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-bash-completion-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">7c5ad77b4ee39e80a4666192cbac2690ba9cfe1871115a4eed61baed88e16cd6</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-iscsi" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">8a32c7dc9531b6772d06f443ca23fdb46436c2ecb0015ea37b5c6c43b3bcddf6</sum></package><package arch="x86_64" name="libvirt-libs" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">fb12eef2e5cde3bc5437b7b798a2c74bca681c0156afa31d9b990af7d8f28ccf</sum></package><package arch="i686" name="libvirt-nss" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-10.el7_6.10.i686.rpm</filename><sum type="sha256">e0a2724f169967e5dbe617971cb87246867c7e7d5168534c490d340491e09af7</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-logical" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">bbb7c225413ceeb3a9ca042bb611a04ed309d3746e8b92c2df95fe81851d0753</sum></package><package arch="x86_64" name="libvirt-login-shell" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-login-shell-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">a774009064fe9734d05c1ee7cb4c03297e2ee9fddf1379831929dc0a3d4764bd</sum></package><package arch="x86_64" name="libvirt-daemon-driver-qemu" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-qemu-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">a788a72440f9e085f18cbb3a85573ae7fe76a2f9a118b970087d5087a4451461</sum></package><package arch="x86_64" name="libvirt-daemon-config-nwfilter" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">1b764fb2157b3a4e842352a97e92d6aae2a5dfd33c80d8ee06e3f2f367124c4d</sum></package><package arch="x86_64" name="libvirt-client" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">8bf27fb075ceeb36733a9ccaae8b524b68603abc24b4f98d0e39ce5ec11993bf</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">db7433d13d5c0ae01617676688117bd2569273a5048f17f56d523b2959bf9aff</sum></package><package arch="x86_64" name="libvirt-devel" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">dc25ad116f573b040e7dc52bc193b3af6db4b6644f15a320a7a5b614942734e8</sum></package><package arch="x86_64" name="libvirt-docs" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-docs-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">d1a391b4fa465ebc9d4a633f2f79bac5f96e7c038aa8e8243133d439b16e7918</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-scsi" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">89c49e17e51815b36863b192b4e6f066ec72dac81b29e670f7bb3e9749d04a50</sum></package><package arch="i686" name="libvirt-devel" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-10.el7_6.10.i686.rpm</filename><sum type="sha256">1c9b9490016436ede0c9c6028b1e76937cedd2ac064def9f8849864d77e9ceac</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-core" release="10.el7_6.10" src="libvirt-4.5.0-10.el7_6.10.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.10.x86_64.rpm</filename><sum type="sha256">bb03f6cbb46115b71efe9ec5c73e03cc5cb8d9ac1a3d80bf9048acf960acad70</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:1264" id="RHSA-2019:1264-1" title="Rhsa-2019:1264-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1265-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.7.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7 (CVE-2019-9800) 
* Mozilla: Cross-origin theft of images with createImageBitmap (CVE-2019-9797) 
* Mozilla: Type confusion with object groups and UnboxedObjects (CVE-2019-9816) 
* Mozilla: Stealing of cross-domain images using canvas (CVE-2019-9817) 
* Mozilla: Compartment mismatch with fetch API (CVE-2019-9819) 
* Mozilla: Use-after-free of ChromeEventHandler by DocShell (CVE-2019-9820) 
* Mozilla: Use-after-free in XMLHttpRequest (CVE-2019-11691) 
* Mozilla: Use-after-free removing listeners in the event listener manager (CVE-2019-11692) 
* Mozilla: Buffer overflow in WebGL bufferdata on Linux (CVE-2019-11693) 
* mozilla: Cross-origin theft of images with ImageBitmapRenderingContext (CVE-2018-18511) 
* chromium-browser: Out of bounds read in Skia (CVE-2019-5798) 
* Mozilla: Theft of user history data through drag and drop of hyperlinks to and from bookmarks (CVE-2019-11698) 
* libpng: use-after-free in png_image_free in png.c (CVE-2019-7317)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2019-05-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_6" src="firefox-60.7.0-1.el7_6.src.rpm" version="60.7.0"><filename>firefox-60.7.0-1.el7_6.x86_64.rpm</filename><sum type="sha256">e9407ff8f3ea071cb5d1929f7764978fbaf0b559fc1c638b8649506e0b15de99</sum></package><package arch="i686" name="firefox" release="1.el7_6" src="firefox-60.7.0-1.el7_6.src.rpm" version="60.7.0"><filename>firefox-60.7.0-1.el7_6.i686.rpm</filename><sum type="sha256">c23dd1c4bf8d4e3a521848f837101a7814af5b37604d4e97fe528f962e7cb928</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18511" id="CVE-2018-18511" title="Mozilla: Cross-Origin Theft Of Images With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691" id="CVE-2019-11691" title="Mozilla: Use-After-Free In Xmlhttprequest" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692" id="CVE-2019-11692" title="Mozilla: Use-After-Free Removing Listeners In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693" id="CVE-2019-11693" title="Mozilla: Buffer Overflow In Webgl Bufferdata On " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698" id="CVE-2019-11698" title="Mozilla: Theft Of User History Data Through " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5798" id="CVE-2019-5798" title="Chromium-Browser: Out Of Bounds Read In Skia" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317" id="CVE-2019-7317" title="Libpng: Use-After-Free In Png_Image_Free In Png.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9797" id="CVE-2019-9797" title="Mozilla: Cross-Origin Theft Of Images With " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800" id="CVE-2019-9800" title="Mozilla: Memory Safety Bugs Fixed In Firefox 67 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816" id="CVE-2019-9816" title="Mozilla: Type Confusion With Object Groups And " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817" id="CVE-2019-9817" title="Mozilla: Stealing Of Cross-Domain Images Using " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819" id="CVE-2019-9819" title="Mozilla: Compartment Mismatch With Fetch Api" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820" id="CVE-2019-9820" title="Mozilla: Use-After-Free Of Chromeeventhandler By " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1265" id="RHSA-2019:1265-1" title="Rhsa-2019:1265-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1672409" id="1672409" title="Libpng: Use-After-Free In Png_Image_Free In Png.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1676997" id="1676997" title="Mozilla: Cross-Origin Theft Of Images With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1688200" id="1688200" title="Chromium-Browser: Out Of Bounds Read In Skia" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1712617" id="1712617" title="Mozilla: Use-After-Free In Xmlhttprequest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1712618" id="1712618" title="Mozilla: Use-After-Free Removing Listeners In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1712619" id="1712619" title="Mozilla: Buffer Overflow In Webgl Bufferdata On " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1712621" id="1712621" title="Mozilla: Theft Of User History Data Through " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1712622" id="1712622" title="Mozilla: Cross-Origin Theft Of Images With " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1712623" id="1712623" title="Mozilla: Memory Safety Bugs Fixed In Firefox 67 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1712625" id="1712625" title="Mozilla: Type Confusion With Object Groups And " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1712626" id="1712626" title="Mozilla: Stealing Of Cross-Domain Images Using " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1712628" id="1712628" title="Mozilla: Compartment Mismatch With Fetch Api" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1712629" id="1712629" title="Mozilla: Use-After-Free Of Chromeeventhandler By " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1278-1</id><title>Pacemaker</title><description>Security Fix(es): 
* pacemaker: Insufficient local IPC client-server authentication on the client's side can lead to local privesc (CVE-2018-16877) 
* pacemaker: Insufficient verification inflicted preference of uncontrolled processes can lead to DoS (CVE-2018-16878) 
* pacemaker: Information disclosure through use-after-free (CVE-2019-3885)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-05-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pacemaker" release="8.el7_6.5" src="pacemaker-1.1.19-8.el7_6.5.src.rpm" version="1.1.19"><filename>pacemaker-1.1.19-8.el7_6.5.x86_64.rpm</filename><sum type="sha256">ec37f4ee1c380907ff719907922f0acacb4e64230697b6e4c0ff0287f73127c2</sum></package><package arch="x86_64" name="pacemaker-cli" release="8.el7_6.5" src="pacemaker-1.1.19-8.el7_6.5.src.rpm" version="1.1.19"><filename>pacemaker-cli-1.1.19-8.el7_6.5.x86_64.rpm</filename><sum type="sha256">37eb53034a38c11e43defd9e965fc5807fd21d7289b4598072b66afe4d8245d6</sum></package><package arch="x86_64" name="pacemaker-cts" release="8.el7_6.5" src="pacemaker-1.1.19-8.el7_6.5.src.rpm" version="1.1.19"><filename>pacemaker-cts-1.1.19-8.el7_6.5.x86_64.rpm</filename><sum type="sha256">fa4b409673858ab8a57af41f0cf78d6663157c4429ed71a048ae9a770fad21e6</sum></package><package arch="i686" name="pacemaker-libs-devel" release="8.el7_6.5" src="pacemaker-1.1.19-8.el7_6.5.src.rpm" version="1.1.19"><filename>pacemaker-libs-devel-1.1.19-8.el7_6.5.i686.rpm</filename><sum type="sha256">7c34ef3fdc9f5e66b460f541dc7869bc050bd986809e7e76f68bc6f1c529c516</sum></package><package arch="x86_64" name="pacemaker-cluster-libs" release="8.el7_6.5" src="pacemaker-1.1.19-8.el7_6.5.src.rpm" version="1.1.19"><filename>pacemaker-cluster-libs-1.1.19-8.el7_6.5.x86_64.rpm</filename><sum type="sha256">f06aa4c8b4efd60b11c705892db3080782c5f78e3b905a6046a255ece2cd8a48</sum></package><package arch="x86_64" name="pacemaker-libs-devel" release="8.el7_6.5" src="pacemaker-1.1.19-8.el7_6.5.src.rpm" version="1.1.19"><filename>pacemaker-libs-devel-1.1.19-8.el7_6.5.x86_64.rpm</filename><sum type="sha256">764a2a583a17f35e97d2c4819d99ec9ef8f5a65df74e14218387d5efd44d6f3e</sum></package><package arch="x86_64" name="pacemaker-libs" release="8.el7_6.5" src="pacemaker-1.1.19-8.el7_6.5.src.rpm" version="1.1.19"><filename>pacemaker-libs-1.1.19-8.el7_6.5.x86_64.rpm</filename><sum type="sha256">0ce1e80e6347ec65ca00b6082de830865b033d0b794fd0051bb6e5709abd784f</sum></package><package arch="x86_64" name="pacemaker-doc" release="8.el7_6.5" src="pacemaker-1.1.19-8.el7_6.5.src.rpm" version="1.1.19"><filename>pacemaker-doc-1.1.19-8.el7_6.5.x86_64.rpm</filename><sum type="sha256">9d272537a81a3673f9c8a8d4717a895cef7b1fd9ba16a984c52df335b89c0df8</sum></package><package arch="i686" name="pacemaker-cluster-libs" release="8.el7_6.5" src="pacemaker-1.1.19-8.el7_6.5.src.rpm" version="1.1.19"><filename>pacemaker-cluster-libs-1.1.19-8.el7_6.5.i686.rpm</filename><sum type="sha256">c92ceaeb32f8cbd9b07919b011e216362931f3a930cc9a2a725cc7a1cac6270c</sum></package><package arch="i686" name="pacemaker-libs" release="8.el7_6.5" src="pacemaker-1.1.19-8.el7_6.5.src.rpm" version="1.1.19"><filename>pacemaker-libs-1.1.19-8.el7_6.5.i686.rpm</filename><sum type="sha256">0472e488b9730b087f70a196820ddf6c7a597d2bd8d0a25a150fa6b686fcf27f</sum></package><package arch="x86_64" name="pacemaker-nagios-plugins-metadata" release="8.el7_6.5" src="pacemaker-1.1.19-8.el7_6.5.src.rpm" version="1.1.19"><filename>pacemaker-nagios-plugins-metadata-1.1.19-8.el7_6.5.x86_64.rpm</filename><sum type="sha256">2a80198e19e0e93d4e19cd888d4f3338036fe738fe04d7d6acc6d9dded6f7997</sum></package><package arch="x86_64" name="pacemaker-remote" release="8.el7_6.5" src="pacemaker-1.1.19-8.el7_6.5.src.rpm" version="1.1.19"><filename>pacemaker-remote-1.1.19-8.el7_6.5.x86_64.rpm</filename><sum type="sha256">31f44e53637c49a3d47696f0be94fc8ced32781abc8cefbbcf741a49f7e51b5d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:1278" id="RHSA-2019:1278-1" title="Rhsa-2019:1278-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1294-1</id><title>Bind</title><description>Security Fix(es): 
* bind: Limiting simultaneous TCP clients is ineffective (CVE-2018-5743)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-05-29 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-libs" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-74.el7_6.1.x86_64.rpm</filename><sum type="sha256">48a2d864e994c75ea6922f7d9f3d1aa501b71b8f9244a28ce485826388070d63</sum></package><package arch="i686" epoch="32" name="bind-libs" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-libs-9.9.4-74.el7_6.1.i686.rpm</filename><sum type="sha256">25a28249d1365dbd14d2e5f6af0b14f888474bb9f56999e1eaf12b89a66b185b</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-chroot-9.9.4-74.el7_6.1.x86_64.rpm</filename><sum type="sha256">9ca236b4031ba707dd7b6bda1e5ed820ab41f54c58220ed49e57d34b709534cf</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-sdb-chroot-9.9.4-74.el7_6.1.x86_64.rpm</filename><sum type="sha256">4fd1498a3a6d28a41a9fac502a47f81628f0f974d54ad1fa66943d381c57f015</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-74.el7_6.1.x86_64.rpm</filename><sum type="sha256">3c6ea898e4a570a405a829d7404a14a0e2ba5102385a98e1ef9588b92c1065fa</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-utils-9.9.4-74.el7_6.1.x86_64.rpm</filename><sum type="sha256">683c4d6bd308b941b28e3583456c35109c6a033cbff5c655c12704a6d7f384b7</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-74.el7_6.1.i686.rpm</filename><sum type="sha256">f9f23356c93cb5b5914eac5ba2975074528188e97119ccca180b41224cc961c9</sum></package><package arch="x86_64" epoch="32" name="bind" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-9.9.4-74.el7_6.1.x86_64.rpm</filename><sum type="sha256">c178a5d00e94bb0cbd653b5b2dea28b76bb377b417a179d554b91d505abdb44b</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-74.el7_6.1.i686.rpm</filename><sum type="sha256">d1075d9b79bee1bc278e798c52836132885c6fbf4a2e5ee9f009bae7c3e22996</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-sdb-9.9.4-74.el7_6.1.x86_64.rpm</filename><sum type="sha256">7eb12e39c51e0ca6fe899b6eacfeadc3204a727d0175de469ccbe51b90f51c21</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-libs-9.9.4-74.el7_6.1.x86_64.rpm</filename><sum type="sha256">ecc2e012d441136886b9bfadeb78a30e3ffce3d92f69f8d3738c4172a38571d7</sum></package><package arch="noarch" epoch="32" name="bind-license" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-license-9.9.4-74.el7_6.1.noarch.rpm</filename><sum type="sha256">72c7108c7301a8c1d58c2ea3b6351c3fd552bcd395c77fa4cd4cd38ba6e7953d</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-lite-devel-9.9.4-74.el7_6.1.i686.rpm</filename><sum type="sha256">747b12d2e7988e12f428a83bb434cb3f15cc51e7cba982d7fd08f2a5759c956f</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-74.el7_6.1.i686.rpm</filename><sum type="sha256">a68d38ccd7f8f7a243b1f799d456cf0dac853ee12a94ae2d333a98cc56446abd</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-devel-9.9.4-74.el7_6.1.x86_64.rpm</filename><sum type="sha256">54297d827a4afdb659a6ab28bee6dfa38b444ce79f9b11d1a7e0279c9582ec5f</sum></package><package arch="i686" epoch="32" name="bind-devel" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-74.el7_6.1.i686.rpm</filename><sum type="sha256">c347ad7e18e81dc998861eb65eb8cee81ca52d721ef1f81be8974eb9d71ed6e5</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-9.9.4-74.el7_6.1.x86_64.rpm</filename><sum type="sha256">1a05d44a674f5471862b93748495d62d10be67057d9df1cc5748e3faf3930084</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-libs-lite-9.9.4-74.el7_6.1.x86_64.rpm</filename><sum type="sha256">5e5bcd0733401d5700895a9bd0f7f312433488624c576df206ee10fcb6fa2cc4</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-devel-9.9.4-74.el7_6.1.x86_64.rpm</filename><sum type="sha256">8554468e82eb597ad7062526c5ca1fc9ccc93871eafe4aa3a2b6d1013e67f348</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="74.el7_6.1" src="bind-9.9.4-74.el7_6.1.src.rpm" version="9.9.4"><filename>bind-pkcs11-utils-9.9.4-74.el7_6.1.x86_64.rpm</filename><sum type="sha256">b6cc9defb9459c461ed467a569b019f3325ab6fb0b27ddfe5a9dd9eaac087cdf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5743" id="CVE-2018-5743" title="Bind: Limiting Simultaneous Tcp Clients Is " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1294" id="RHSA-2019:1294-1" title="Rhsa-2019:1294-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1702541" id="1702541" title="Bind: Limiting Simultaneous Tcp Clients Is " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1309-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7 (CVE-2019-9800) 
* Mozilla: Cross-origin theft of images with createImageBitmap (CVE-2019-9797) 
* Mozilla: Stealing of cross-domain images using canvas (CVE-2019-9817) 
* Mozilla: Compartment mismatch with fetch API (CVE-2019-9819) 
* Mozilla: Use-after-free of ChromeEventHandler by DocShell (CVE-2019-9820) 
* Mozilla: Use-after-free in XMLHttpRequest (CVE-2019-11691) 
* Mozilla: Use-after-free removing listeners in the event listener manager (CVE-2019-11692) 
* Mozilla: Buffer overflow in WebGL bufferdata on Linux (CVE-2019-11693) 
* mozilla: Cross-origin theft of images with ImageBitmapRenderingContext (CVE-2018-18511) 
* chromium-browser: Out of bounds read in Skia (CVE-2019-5798) 
* Mozilla: Theft of user history data through drag and drop of hyperlinks to and from bookmarks (CVE-2019-11698) 
* libpng: use-after-free in png_image_free in png.c (CVE-2019-7317)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-06-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_6" src="thunderbird-60.7.0-1.el7_6.src.rpm" version="60.7.0"><filename>thunderbird-60.7.0-1.el7_6.x86_64.rpm</filename><sum type="sha256">ea1e8b4a567a62ac2dc1b588c656d4c62026a29f08ffeb3b7098022d92108639</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:1309" id="RHSA-2019:1309-1" title="Rhsa-2019:1309-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1481-1</id><title>Kernel</title><description>Security Fix(es): 
* An integer overflow flaw was found in the way the Linux kernel's networking subsystem processed TCP Selective Acknowledgment (SACK) segments. While processing SACK segments, the Linux kernel's socket buffer (SKB) data structure becomes fragmented. Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments. A remote attacker could use this flaw to crash the Linux kernel by sending a crafted sequence of SACK segments on a TCP connection with small value of TCP MSS, resulting in a denial of service (DoS). (CVE-2019-11477) 
* Kernel: tcp: excessive resource consumption while processing SACK blocks allows remote denial of service (CVE-2019-11478) 
* Kernel: tcp: excessive resource consumption for TCP connections with low MSS allows remote denial of service (CVE-2019-11479)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-06-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel" release="957.21.3.el7" src="kernel-3.10.0-957.21.3.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-957.21.3.el7.x86_64.rpm</filename><sum type="sha256">fdce6241396d5fab1469a3f74d436880054d30b118f167ffba895a8d5dd4c5d9</sum></package><package arch="x86_64" name="perf" release="957.21.3.el7" src="kernel-3.10.0-957.21.3.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-957.21.3.el7.x86_64.rpm</filename><sum type="sha256">f64687cb62ba001be7b229968d51a36cade320115fbd9e8cf5c94b25d639a6ac</sum></package><package arch="x86_64" name="kernel-devel" release="957.21.3.el7" src="kernel-3.10.0-957.21.3.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-957.21.3.el7.x86_64.rpm</filename><sum type="sha256">5d0a7985e620a34088d66627e0151fcf18c207b12e3f8deb3fcad6c5d7b9a838</sum></package><package arch="x86_64" name="kernel-debug" release="957.21.3.el7" src="kernel-3.10.0-957.21.3.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-957.21.3.el7.x86_64.rpm</filename><sum type="sha256">9e8c0a9e4e2a3829e6c5234a58c2fb905036edbfcf74be1047c3a71050bc4529</sum></package><package arch="noarch" name="kernel-doc" release="957.21.3.el7" src="kernel-3.10.0-957.21.3.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-957.21.3.el7.noarch.rpm</filename><sum type="sha256">d46baf9c8e5239d4e90410f051c4e114f476a8f44865438e801fba54b5bc53de</sum></package><package arch="x86_64" name="bpftool" release="957.21.3.el7" src="kernel-3.10.0-957.21.3.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-957.21.3.el7.x86_64.rpm</filename><sum type="sha256">b2380aa3a2b0cb3cf7d4fb2eee4d80d121082848b89839ec744afbfe0cd4dfea</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="957.21.3.el7" src="kernel-3.10.0-957.21.3.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-957.21.3.el7.noarch.rpm</filename><sum type="sha256">3a370cd8239d4dee746f48171831b364e2a7333e4aeeeded88c440af074be2a8</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="957.21.3.el7" src="kernel-3.10.0-957.21.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-957.21.3.el7.x86_64.rpm</filename><sum type="sha256">3dff7f67ebd35452d43c81505e938bcae26acb75cd66bbbd217e4489ba95c8a9</sum></package><package arch="x86_64" name="kernel-tools" release="957.21.3.el7" src="kernel-3.10.0-957.21.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-957.21.3.el7.x86_64.rpm</filename><sum type="sha256">937aa465c9fdf80c7ab6647f81440a5ae2a28cd0217167c7a18537493ec4aca1</sum></package><package arch="x86_64" name="kernel-debug-devel" release="957.21.3.el7" src="kernel-3.10.0-957.21.3.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-957.21.3.el7.x86_64.rpm</filename><sum type="sha256">dbf39b1c7d5aab5519d0b0b8b376764aa69803d257573fb0af368876b2eb7351</sum></package><package arch="x86_64" name="python-perf" release="957.21.3.el7" src="kernel-3.10.0-957.21.3.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-957.21.3.el7.x86_64.rpm</filename><sum type="sha256">8d0343cb0be308d6241a4b00a6da3a070b131ea6cd12b7946ab5c9b76264ac9b</sum></package><package arch="x86_64" name="kernel-headers" release="957.21.3.el7" src="kernel-3.10.0-957.21.3.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-957.21.3.el7.x86_64.rpm</filename><sum type="sha256">2648ca7cd42a68ee0d95308850050694fb42ede86f8cc4bd0c4fa40fff32c5cf</sum></package><package arch="x86_64" name="kernel-tools-libs" release="957.21.3.el7" src="kernel-3.10.0-957.21.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-957.21.3.el7.x86_64.rpm</filename><sum type="sha256">fab63c06e1fc0a6c6c488bf0424f53b712f2d45470fc98572a515a713ad6e84b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11477" id="CVE-2019-11477" title="Kernel: Tcp: Integer Overflow While Processing " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11478" id="CVE-2019-11478" title="Kernel: Tcp: Excessive Resource Consumption " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11479" id="CVE-2019-11479" title="Kernel: Tcp: Excessive Resource Consumption For " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1481" id="RHSA-2019:1481-1" title="Rhsa-2019:1481-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719123" id="1719123" title="Kernel: Tcp: Integer Overflow While Processing " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719128" id="1719128" title="Kernel: Tcp: Excessive Resource Consumption " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719129" id="1719129" title="Kernel: Tcp: Excessive Resource Consumption For " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1579-1</id><title>Libvirt</title><description>Security Fix(es): 
* libvirt: arbitrary file read/exec via virDomainSaveImageGetXMLDesc API (CVE-2019-10161) 
* libvirt: virDomainManagedSaveDefineXML API exposed to readonly clients (CVE-2019-10166) 
* libvirt: arbitrary command execution via virConnectGetDomainCapabilities API (CVE-2019-10167) 
* libvirt: arbitrary command execution via virConnectBaselineHypervisorCPU and virConnectCompareHypervisorCPU APIs (CVE-2019-10168) 
Bug Fix(es): 
* Live migration fail with unsafe error when GPFS is used as shared filesystem</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-06-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libvirt-daemon-driver-storage-logical" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-logical-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">f9b07d5f59ef0d0e5cba1a696ddb053709c32556e4133d2bd39f30695752aa7d</sum></package><package arch="i686" name="libvirt-libs" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-10.el7_6.12.i686.rpm</filename><sum type="sha256">e18e409b43d76c3dcb2e186e367d999484ca92afdd509f738ff5bfdc1fccb72e</sum></package><package arch="x86_64" name="libvirt-daemon-driver-lxc" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-lxc-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">595955e0d3f5624da3a2bd5ec6df02bf9676506197ef5a7f56a541d0037a207f</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-scsi" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-scsi-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">31b7ff2af663df4659c67dc0085b3548e5ccef2b34d2e3faedd56ef2ee46835c</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-iscsi" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-iscsi-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">1aca865b0035fdd857202b8738bed3c2bd51f192ffa2c6b85f1d97a2fe5b1523</sum></package><package arch="x86_64" name="libvirt-docs" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-docs-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">1125987ec0118264b0aed6ac479535426aca2384797acdcbf7ffb78dd7f9b76c</sum></package><package arch="x86_64" name="libvirt-daemon-driver-interface" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-interface-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">2c2195bde021c9b323954b5a81bf735881aaa327c9cbeb95810ac5937b39afa6</sum></package><package arch="x86_64" name="libvirt" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">652bded0dcf0e8b21d0bf76750417d0e65dda9e6cab49701c6f00f80c0dcc206</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">887051482df0e00cd6304c085dcdc1c4558120930822cc1a716a783f9ed852ab</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-lock-sanlock-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">54d9fc3236cb39cbfb23dfcc8e7a48e85b1e8bd81fd79cb460050143b1f26aad</sum></package><package arch="x86_64" name="libvirt-daemon-config-nwfilter" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-nwfilter-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">c7add86df6c9b49b154728b2978c7e9778b6717df09c3ffbbf8778ba710d1b29</sum></package><package arch="x86_64" name="libvirt-daemon-driver-qemu" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-qemu-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">adb0c9914c67132301b4a869bf5c28461457791903fb71e8818cc9ba87a9c991</sum></package><package arch="x86_64" name="libvirt-daemon-driver-secret" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-secret-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">1fdfbf6fa4145baf0bb9eb1945ae0da4d8d67a65e216006892c106a7e8a8160d</sum></package><package arch="x86_64" name="libvirt-daemon-kvm" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-kvm-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">c52ee6d9ef7b3282d82c7b5a7e120f96546499972354c4ba55e02da7c02e9939</sum></package><package arch="x86_64" name="libvirt-devel" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">a20a1effeb3467fa5814bbc875150c425423a7787911266c45c66e9d6ada26e1</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-rbd" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-rbd-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">f7460a2cd4a41e2a152ea3769ae767d41a477f0b9a89669c413601abe2645fc7</sum></package><package arch="x86_64" name="libvirt-daemon" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">9f0c12bfc01d65873182ca1cf7cae8fb8a4c80d7b3b6f591ae19f80ed4ddf506</sum></package><package arch="x86_64" name="libvirt-nss" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">dccf69350fa243d5437290ba82f49dd708f2418b2d348ddaf45d3e87fa922a4d</sum></package><package arch="i686" name="libvirt-client" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-10.el7_6.12.i686.rpm</filename><sum type="sha256">49cd89a2edc15503fe96bc8ab03357ecb7833ec6ea0cf68fa054a05b75d6894b</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-disk" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-disk-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">6917613d33d365ac4dc6892a62de817e178eda467f6d4bd021d71020487884aa</sum></package><package arch="x86_64" name="libvirt-daemon-driver-network" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-network-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">dacb29e152dd707e81751759f1a5030ead22e27aa6951d345a368b8651456a14</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-mpath" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-mpath-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">035eea4e11a51bb104908a9c41cface86445b4e0ef8114ba1a8d71766dfba83d</sum></package><package arch="i686" name="libvirt-devel" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-10.el7_6.12.i686.rpm</filename><sum type="sha256">a989250839aaafa49f2a4720be37f443c0a0e85963e24705d467cf3cb0a54d59</sum></package><package arch="x86_64" name="libvirt-client" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">7bda9f96f4300bbfd022f24098d821c9e7259cb873ca2ec1a78da56beea9098a</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nodedev" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nodedev-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">46bd20e2d26fd300dfd6fc57e18ac840d54c597a72792eb054a7fcffa89d0c14</sum></package><package arch="x86_64" name="libvirt-bash-completion" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-bash-completion-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">2df3a9952c83fdb852a44bdcfaa771e036765936e9a7df6c07f6ffe484d32e26</sum></package><package arch="i686" name="libvirt-nss" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-10.el7_6.12.i686.rpm</filename><sum type="sha256">fc0dbe6acd827873194549d2dd8180e2af59379114515be0c8b46e96a006268e</sum></package><package arch="x86_64" name="libvirt-admin" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-admin-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">c2c8504ee143860ad3a5753130d73da137af14c43081b75cd402e20a12d1a727</sum></package><package arch="x86_64" name="libvirt-libs" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">1e4895093dc1ccd0a15c44d57c17c903aed0994db0cfd023c6f436e85d7a61cc</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-core" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-core-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">076afa165a66a81ecdd3a0b3b876d10ca3ad308771de9e12284cbe4c2addbcd6</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nwfilter" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nwfilter-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">6cf4fd98e1b5a6718d5ad1f8d574627aded9b1b305ec300534a483c4b52c2df0</sum></package><package arch="x86_64" name="libvirt-daemon-lxc" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-lxc-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">ec83f01f9f277a337973eb46ee588ecd7be61099d22cd5f7bacc03cb4e6c6283</sum></package><package arch="x86_64" name="libvirt-daemon-config-network" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-network-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">7b1c0245f22127511bbe1dcb17c2f246330794d2b211997d232bb646abaa33c3</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-gluster" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-gluster-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">224c8b899a9628d8de8d98e0bbb2ea03abafb344d6dfc2b7bd9aa1817142c017</sum></package><package arch="x86_64" name="libvirt-login-shell" release="10.el7_6.12" src="libvirt-4.5.0-10.el7_6.12.src.rpm" version="4.5.0"><filename>libvirt-login-shell-4.5.0-10.el7_6.12.x86_64.rpm</filename><sum type="sha256">146273525d617530f1db044ac75e4b48ff7a202f2ff3eb08dd89f334fc3a1fc2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10161" id="CVE-2019-10161" title="Libvirt: Arbitrary File Read/Exec Via " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10166" id="CVE-2019-10166" title="Libvirt: Virdomainmanagedsavedefinexml Api " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10167" id="CVE-2019-10167" title="Libvirt: Arbitrary Command Execution Via " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10168" id="CVE-2019-10168" title="Libvirt: Arbitrary Command Execution Via " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1579" id="RHSA-2019:1579-1" title="Rhsa-2019:1579-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1720114" id="1720114" title="Libvirt: Virdomainmanagedsavedefinexml Api " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1720115" id="1720115" title="Libvirt: Arbitrary File Read/Exec Via " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1720117" id="1720117" title="Libvirt: Arbitrary Command Execution Via " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1720118" id="1720118" title="Libvirt: Arbitrary Command Execution Via " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1587-1</id><title>Python</title><description>Security Fix(es): 
* python: regression of CVE-2019-9636 due to functional fix to allow port numbers in netloc (CVE-2019-10160)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-06-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="python-libs" release="80.el7_6" src="python-2.7.5-80.el7_6.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-80.el7_6.i686.rpm</filename><sum type="sha256">6e9ed1c38f12914035607bbd2457e21e9a67a0ee3e8a032b6ae3ac7cbb27a85a</sum></package><package arch="x86_64" name="python-test" release="80.el7_6" src="python-2.7.5-80.el7_6.src.rpm" version="2.7.5"><filename>python-test-2.7.5-80.el7_6.x86_64.rpm</filename><sum type="sha256">528c913a2d15ded6a6b32a677962baf4b01c1d4d39b0b01802dd4ed4686997a8</sum></package><package arch="x86_64" name="python-libs" release="80.el7_6" src="python-2.7.5-80.el7_6.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-80.el7_6.x86_64.rpm</filename><sum type="sha256">bbd51ab9d415a54ebe7aef31aed1b79fd6bf99e1a268132726e9ab93599a3755</sum></package><package arch="x86_64" name="python-tools" release="80.el7_6" src="python-2.7.5-80.el7_6.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-80.el7_6.x86_64.rpm</filename><sum type="sha256">ef63bbf1a473c814bc895a0d16274495f11c781d4f047294796ba12654a82213</sum></package><package arch="x86_64" name="python-devel" release="80.el7_6" src="python-2.7.5-80.el7_6.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-80.el7_6.x86_64.rpm</filename><sum type="sha256">4cd8fb7fbabe886b053361334544ea27283d816dad47c856b04ad6861468b373</sum></package><package arch="x86_64" name="python-debug" release="80.el7_6" src="python-2.7.5-80.el7_6.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-80.el7_6.x86_64.rpm</filename><sum type="sha256">fc6960e7ca5aa68f9a7135f40700e7c022f8db0581fa43476cf723f09fb75c3d</sum></package><package arch="x86_64" name="tkinter" release="80.el7_6" src="python-2.7.5-80.el7_6.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-80.el7_6.x86_64.rpm</filename><sum type="sha256">49f60f381de93f4f84486c25ea629334c86131f565ae90b04090008367ea78e7</sum></package><package arch="x86_64" name="python" release="80.el7_6" src="python-2.7.5-80.el7_6.src.rpm" version="2.7.5"><filename>python-2.7.5-80.el7_6.x86_64.rpm</filename><sum type="sha256">3e9ede77b07cb13ae29b43e08893b7c515af062ccfbec0c8b4f5c5036d1c8c94</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10160" id="CVE-2019-10160" title="Python: Regression Of Cve-2019-9636 Due To " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1587" id="RHSA-2019:1587-1" title="Rhsa-2019:1587-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1718388" id="1718388" title="Python: Regression Of Cve-2019-9636 Due To " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1603-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Type confusion in Array.pop (CVE-2019-11707) 
* Mozilla: Sandbox escape using Prompt:Open (CVE-2019-11708)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2019-07-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_6" src="firefox-60.7.2-1.el7_6.src.rpm" version="60.7.2"><filename>firefox-60.7.2-1.el7_6.i686.rpm</filename><sum type="sha256">2c3f8cc3afd4791520447ccda510055af35b12c13b8f05f1028332f70708bef8</sum></package><package arch="x86_64" name="firefox" release="1.el7_6" src="firefox-60.7.2-1.el7_6.src.rpm" version="60.7.2"><filename>firefox-60.7.2-1.el7_6.x86_64.rpm</filename><sum type="sha256">51e0bbea0a60e05c04ceb0a1211f73e449e8172b58e367d275793436af42510c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:1603" id="RHSA-2019:1603-1" title="Rhsa-2019:1603-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1619-1</id><title>Vim</title><description>Security Fix(es): 
* vim/neovim: ':source!' command allows arbitrary command execution via modelines (CVE-2019-12735)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-07-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="vim-common" release="6.el7_6" src="vim-7.4.160-6.el7_6.src.rpm" version="7.4.160"><filename>vim-common-7.4.160-6.el7_6.x86_64.rpm</filename><sum type="sha256">61634e49e75686731b93201d8b96cceb817cfaf8ad2779c53cd54d7e4983854b</sum></package><package arch="x86_64" epoch="2" name="vim-X11" release="6.el7_6" src="vim-7.4.160-6.el7_6.src.rpm" version="7.4.160"><filename>vim-X11-7.4.160-6.el7_6.x86_64.rpm</filename><sum type="sha256">7b9d087111b99bd158d1e217f5b5874d3316ee7e1585b08ebbba65b4f2565015</sum></package><package arch="x86_64" epoch="2" name="vim-enhanced" release="6.el7_6" src="vim-7.4.160-6.el7_6.src.rpm" version="7.4.160"><filename>vim-enhanced-7.4.160-6.el7_6.x86_64.rpm</filename><sum type="sha256">62677c87b13e49e65ed5f1d1d04f08e5e629e02ba305809b948a9c46b8c4eaa1</sum></package><package arch="x86_64" epoch="2" name="vim-filesystem" release="6.el7_6" src="vim-7.4.160-6.el7_6.src.rpm" version="7.4.160"><filename>vim-filesystem-7.4.160-6.el7_6.x86_64.rpm</filename><sum type="sha256">173891f6d8127e720099dc85b2f4b10de9a61a9ad37be98451f6aa089bdc7a57</sum></package><package arch="x86_64" epoch="2" name="vim-minimal" release="6.el7_6" src="vim-7.4.160-6.el7_6.src.rpm" version="7.4.160"><filename>vim-minimal-7.4.160-6.el7_6.x86_64.rpm</filename><sum type="sha256">ee1ad0f96a80cd5be71d53643293c3d64c9358eba745ebf7569e1f9c6e444f19</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12735" id="CVE-2019-12735" title="Vim/Neovim: ':Source!' Command Allows Arbitrary " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1619" id="RHSA-2019:1619-1" title="Rhsa-2019:1619-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1718308" id="1718308" title="Vim/Neovim: ':Source!' Command Allows Arbitrary " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1626-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Type confusion in Array.pop (CVE-2019-11707) 
* thunderbird: Stack buffer overflow in icalrecur_add_bydayrules in icalrecur.c (CVE-2019-11705) 
* Mozilla: Sandbox escape using Prompt:Open (CVE-2019-11708) 
* thunderbird: Heap buffer over read in icalparser.c parser_get_next_char (CVE-2019-11703) 
* thunderbird: Heap buffer overflow in icalmemory_strdup_and_dequote function in icalvalue.c (CVE-2019-11704) 
* thunderbird: Type confusion in icaltimezone_get_vtimezone_properties function in icalproperty.c (CVE-2019-11706)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-07-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_6" src="thunderbird-60.7.2-2.el7_6.src.rpm" version="60.7.2"><filename>thunderbird-60.7.2-2.el7_6.x86_64.rpm</filename><sum type="sha256">72252b9ff5bf5cb1105ba687c1776ec857a8d105caa982ea7d6fb3e688c4f558</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:1626" id="RHSA-2019:1626-1" title="Rhsa-2019:1626-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1763-1</id><title>Firefox</title><description>This update upgrades Firefox to version 60.8.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8 (CVE-2019-11709) 
* Mozilla: Sandbox escape via installation of malicious language pack (CVE-2019-9811) 
* Mozilla: Script injection within domain through inner window reuse (CVE-2019-11711) 
* Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (CVE-2019-11712) 
* Mozilla: Use-after-free with HTTP/2 cached stream (CVE-2019-11713) 
* Mozilla: HTML parsing error can contribute to content XSS (CVE-2019-11715) 
* Mozilla: Caret character improperly escaped in origins (CVE-2019-11717) 
* Mozilla: Same-origin policy treats all files in a directory as having the same-origin (CVE-2019-11730)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2019-07-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_6" src="firefox-60.8.0-1.el7_6.src.rpm" version="60.8.0"><filename>firefox-60.8.0-1.el7_6.x86_64.rpm</filename><sum type="sha256">126d2d55613f87f38b26e139743d94f4ea356ff6d23f10df2a79560af6853a90</sum></package><package arch="i686" name="firefox" release="1.el7_6" src="firefox-60.8.0-1.el7_6.src.rpm" version="60.8.0"><filename>firefox-60.8.0-1.el7_6.i686.rpm</filename><sum type="sha256">42fe07b65fc07271919a4f9094875ebbc188f0e72bb2d9cc2377034312a594f8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11709" id="CVE-2019-11709" title="Mozilla: Memory Safety Bugs Fixed In Firefox 68 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11711" id="CVE-2019-11711" title="Mozilla: Script Injection Within Domain Through " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11712" id="CVE-2019-11712" title="Mozilla: Cross-Origin Post Requests Can Be Made " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11713" id="CVE-2019-11713" title="Mozilla: Use-After-Free With Http/2 Cached Stream" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11715" id="CVE-2019-11715" title="Mozilla: Html Parsing Error Can Contribute To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11717" id="CVE-2019-11717" title="Mozilla: Caret Character Improperly Escaped In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11730" id="CVE-2019-11730" title="Mozilla: Same-Origin Policy Treats All Files In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9811" id="CVE-2019-9811" title="Mozilla: Sandbox Escape Via Installation Of " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1763" id="RHSA-2019:1763-1" title="Rhsa-2019:1763-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728430" id="1728430" title="Mozilla: Memory Safety Bugs Fixed In Firefox 68 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728431" id="1728431" title="Mozilla: Script Injection Within Domain Through " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728432" id="1728432" title="Mozilla: Cross-Origin Post Requests Can Be Made " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728433" id="1728433" title="Mozilla: Use-After-Free With Http/2 Cached Stream" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728434" id="1728434" title="Mozilla: Html Parsing Error Can Contribute To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728435" id="1728435" title="Mozilla: Caret Character Improperly Escaped In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728438" id="1728438" title="Mozilla: Same-Origin Policy Treats All Files In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728439" id="1728439" title="Mozilla: Sandbox Escape Via Installation Of " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1775-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 60.8.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8 (CVE-2019-11709) 
* Mozilla: Sandbox escape via installation of malicious language pack (CVE-2019-9811) 
* Mozilla: Script injection within domain through inner window reuse (CVE-2019-11711) 
* Mozilla: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects (CVE-2019-11712) 
* Mozilla: Use-after-free with HTTP/2 cached stream (CVE-2019-11713) 
* Mozilla: HTML parsing error can contribute to content XSS (CVE-2019-11715) 
* Mozilla: Caret character improperly escaped in origins (CVE-2019-11717) 
* Mozilla: Same-origin policy treats all files in a directory as having the same-origin (CVE-2019-11730)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-07-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_6" src="thunderbird-60.8.0-1.el7_6.src.rpm" version="60.8.0"><filename>thunderbird-60.8.0-1.el7_6.x86_64.rpm</filename><sum type="sha256">6bddb08175b85dfab59de5c769b765e7dc52a41c82b211e0d34a1434ef6d994d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11709" id="CVE-2019-11709" title="Mozilla: Memory Safety Bugs Fixed In Firefox 68 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11711" id="CVE-2019-11711" title="Mozilla: Script Injection Within Domain Through " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11712" id="CVE-2019-11712" title="Mozilla: Cross-Origin Post Requests Can Be Made " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11713" id="CVE-2019-11713" title="Mozilla: Use-After-Free With Http/2 Cached Stream" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11715" id="CVE-2019-11715" title="Mozilla: Html Parsing Error Can Contribute To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11717" id="CVE-2019-11717" title="Mozilla: Caret Character Improperly Escaped In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11730" id="CVE-2019-11730" title="Mozilla: Same-Origin Policy Treats All Files In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9811" id="CVE-2019-9811" title="Mozilla: Sandbox Escape Via Installation Of " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1775" id="RHSA-2019:1775-1" title="Rhsa-2019:1775-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728430" id="1728430" title="Mozilla: Memory Safety Bugs Fixed In Firefox 68 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728431" id="1728431" title="Mozilla: Script Injection Within Domain Through " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728432" id="1728432" title="Mozilla: Cross-Origin Post Requests Can Be Made " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728433" id="1728433" title="Mozilla: Use-After-Free With Http/2 Cached Stream" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728434" id="1728434" title="Mozilla: Html Parsing Error Can Contribute To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728435" id="1728435" title="Mozilla: Caret Character Improperly Escaped In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728438" id="1728438" title="Mozilla: Same-Origin Policy Treats All Files In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728439" id="1728439" title="Mozilla: Sandbox Escape Via Installation Of " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1810-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) (CVE-2019-2745) 
* OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762) 
* OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769) 
* OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816) 
* OpenJDK: Incorrect handling of certificate status messages during TLS handshake (JSSE, 8222678) (CVE-2019-2821) 
* OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) (CVE-2019-2786) 
* OpenJDK: Non-constant time comparison in ChaCha20Cipher (Security, 8221344) (CVE-2019-2818)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-07-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-demo-11.0.4.11-0.el7_6.x86_64.rpm</filename><sum type="sha256">591112f9c6f767f6065415cd5f74da8c9863bd89d520bf7d9b0aa200276a626f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-javadoc-zip-11.0.4.11-0.el7_6.x86_64.rpm</filename><sum type="sha256">c384e407a554b78430ec59934fb2a8790ef0c7a2b716a17a799593f80e7747ba</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-jmods-11.0.4.11-0.el7_6.x86_64.rpm</filename><sum type="sha256">ca7334eec7ae2bf61f24432512268242d216b749b9e1f25ec46d9f49bc4fcab3</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-demo-debug-11.0.4.11-0.el7_6.x86_64.rpm</filename><sum type="sha256">a0a57e7fd9030d01cf64e0d15da2744f722be2fc605ded9185b2b49b03ec4169</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-src-11.0.4.11-0.el7_6.i686.rpm</filename><sum type="sha256">1a99ac65e1a3ededd24434ce1489915228a34f2b8c0b7cffe96d975a21092c49</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-demo-debug-11.0.4.11-0.el7_6.i686.rpm</filename><sum type="sha256">c4200636f0372d5c1f54330be4f33677d7b8c55a9d8487c418290f17e189cb99</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-javadoc-zip-debug-11.0.4.11-0.el7_6.x86_64.rpm</filename><sum type="sha256">1c6de5ff1ef8540789a59a3b9747ce1e504a9f11f9214f13257d1256d30b9c03</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-11.0.4.11-0.el7_6.i686.rpm</filename><sum type="sha256">d2b76f737398a0914201c6c2f0b627b7c11ff8007a684d9c910d6aea9a04f5e8</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-src-debug-11.0.4.11-0.el7_6.x86_64.rpm</filename><sum type="sha256">56ad1d89a116654ad45b6b6fdbfaddf7beebddd18c609980b564b6c15ecb0871</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-javadoc-11.0.4.11-0.el7_6.i686.rpm</filename><sum type="sha256">e80c662ca88ac4820132f765946842fd9e60dbbcf1a442c2eea0eabaa74e757a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-devel-11.0.4.11-0.el7_6.i686.rpm</filename><sum type="sha256">5f9ebf70ca546fb96e0f1ba46fe8739c5dce60e44de08d83fb17a4c721cdf4ad</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-demo-11.0.4.11-0.el7_6.i686.rpm</filename><sum type="sha256">44c697ec5c3a2952470fecd68ea09fc811f312d7945e0f502fbaf31ed0602405</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-javadoc-zip-11.0.4.11-0.el7_6.i686.rpm</filename><sum type="sha256">489d33b9684186906536b26471d618234866c5d3da352efe341c18cb2e9b5147</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-javadoc-11.0.4.11-0.el7_6.x86_64.rpm</filename><sum type="sha256">1c0371dca43650ac57a7f2d7570f562dba90ca8748fc7b603b763bc49d1ee07a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-headless-11.0.4.11-0.el7_6.i686.rpm</filename><sum type="sha256">da38f1c58a045cf357683cd04d5f95e45756a92e81ea62d5ea5daebd19273619</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-jmods-debug-11.0.4.11-0.el7_6.x86_64.rpm</filename><sum type="sha256">a348435446548799dae825f30b6f267cfc4a9766c4b808662c09ff1ba15f3dcf</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-devel-debug-11.0.4.11-0.el7_6.x86_64.rpm</filename><sum type="sha256">e8f959a5249202a78dd92e58dccff88fa7ccf213f69928d4534524a3fe82d082</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-headless-debug-11.0.4.11-0.el7_6.i686.rpm</filename><sum type="sha256">3a8a865d8efa5eff0d33e72286396e646d74c9f497ecf1911d86c91ee735f814</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-debug-11.0.4.11-0.el7_6.x86_64.rpm</filename><sum type="sha256">eade03a37958bdeb8e59c1aa131d891fb654296ea6ff9ae7f43524537fd1a6dc</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-src-debug-11.0.4.11-0.el7_6.i686.rpm</filename><sum type="sha256">df599f4cdc496007e38b55940e0395567fd76a0210d81aa1811221b4e67adce7</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-debug-11.0.4.11-0.el7_6.i686.rpm</filename><sum type="sha256">5f5f175aaef45b1136c0e38eba4aea22a70b534a7a3c1870aae91e7f29b13d02</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-javadoc-debug-11.0.4.11-0.el7_6.i686.rpm</filename><sum type="sha256">2d620d14044937a11d1e2f135d968bc5d98addd60a05f8ba6d5faccb18f7bab7</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-devel-debug-11.0.4.11-0.el7_6.i686.rpm</filename><sum type="sha256">7145db8aaebdc9e114dc662a4d761f29e17165a51c7b3d4c08ba50896c746bbf</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-jmods-11.0.4.11-0.el7_6.i686.rpm</filename><sum type="sha256">b1bb884e9deca1691385f837f77b09d71747b6107cc535f89345e9d68044a6ec</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-javadoc-debug-11.0.4.11-0.el7_6.x86_64.rpm</filename><sum type="sha256">cb6d00e20df4f47d8fd89e0a491468c6e11237e8ee6b3272c6ffb6a41e5250c6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-11.0.4.11-0.el7_6.x86_64.rpm</filename><sum type="sha256">84dd3ba2f40feaa50f28b50e5e92e74908c13262b349b22135ecb1d706a7b06c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-headless-debug-11.0.4.11-0.el7_6.x86_64.rpm</filename><sum type="sha256">4003ce94d07d075f945dc7049be87b71983376df48ff3f695922d28a70a469d9</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-src-11.0.4.11-0.el7_6.x86_64.rpm</filename><sum type="sha256">456d551aad1ba2b75b1d38480c7acd73f0df988891d8068f4ead088366f6eaf0</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-headless-11.0.4.11-0.el7_6.x86_64.rpm</filename><sum type="sha256">afb061b2fcc72d53b087807e9e833f417f4cf7a30a6e0800e645302719d4c348</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-devel-11.0.4.11-0.el7_6.x86_64.rpm</filename><sum type="sha256">315bca265bde1c28b5cd536b53a329352970fee1d3476cf4dcc4e06eeb97ea1e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-jmods-debug-11.0.4.11-0.el7_6.i686.rpm</filename><sum type="sha256">1d0260405ecaa737cdfaa945b1d940a6e7bbc1d2045c4b4e1b0aa083e8eb6778</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_6" src="java-11-openjdk-11.0.4.11-0.el7_6.src.rpm" version="11.0.4.11"><filename>java-11-openjdk-javadoc-zip-debug-11.0.4.11-0.el7_6.i686.rpm</filename><sum type="sha256">59d8166727801bbf05e4004e8942f4f9d1df4e72431159352392ff0b35cf14cc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745" id="CVE-2019-2745" title="Openjdk: Side-Channel Attack Risks In Elliptic " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762" id="CVE-2019-2762" title="Openjdk: Insufficient Checks Of Suppressed " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769" id="CVE-2019-2769" title="Openjdk: Unbounded Memory Allocation During " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786" id="CVE-2019-2786" title="Openjdk: Insufficient Restriction Of Privileges " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816" id="CVE-2019-2816" title="Openjdk: Missing Url Format Validation " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2818" id="CVE-2019-2818" title="Openjdk: Non-Constant Time Comparison In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2821" id="CVE-2019-2821" title="Openjdk: Incorrect Handling Of Certificate " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1810" id="RHSA-2019:1810-1" title="Rhsa-2019:1810-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730056" id="1730056" title="Openjdk: Unbounded Memory Allocation During " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730078" id="1730078" title="Openjdk: Non-Constant Time Comparison In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730099" id="1730099" title="Openjdk: Missing Url Format Validation " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730251" id="1730251" title="Openjdk: Incorrect Handling Of Certificate " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730255" id="1730255" title="Openjdk: Insufficient Restriction Of Privileges " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730411" id="1730411" title="Openjdk: Side-Channel Attack Risks In Elliptic " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730415" id="1730415" title="Openjdk: Insufficient Checks Of Suppressed " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1815-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) (CVE-2019-2745) 
* OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762) 
* OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769) 
* OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816) 
* OpenJDK: Missing array bounds check in crypto providers (JCE, 8223511) (CVE-2019-2842) 
* OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) (CVE-2019-2786)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-07-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-headless-1.8.0.222.b10-0.el7_6.x86_64.rpm</filename><sum type="sha256">6958e54fe909aeed091e34e34e7f3077944df3bd573eff8d775fb277ac8387dd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.222.b10-0.el7_6.x86_64.rpm</filename><sum type="sha256">e189f5eceec525d6f899e70c627f7b66e0316bd8fdf94a4c29037343698b153a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-accessibility-1.8.0.222.b10-0.el7_6.x86_64.rpm</filename><sum type="sha256">1cb1bc4b155ef266ebe999c799073a5f882e8d3f206e02b949ad041a226acdff</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-debug-1.8.0.222.b10-0.el7_6.i686.rpm</filename><sum type="sha256">cbe296b528243af76a218cee48f6f450aff571e6f49e3ed0b0f0768eb9f54c51</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-debug-1.8.0.222.b10-0.el7_6.x86_64.rpm</filename><sum type="sha256">58893f399cd12fc27b5e7161a80cbf152a464fe65a809204f50371706417029a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.222.b10-0.el7_6.x86_64.rpm</filename><sum type="sha256">9392ad8778e79613124abe925c99a6775beca760b28232b7343d27b2dc6cdf29</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.x86_64.rpm</filename><sum type="sha256">e3f297c39952ea8096bbdf8249d2b6ba4e24a92f2de1b7b9bddd990b5b28f8b5</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-headless-1.8.0.222.b10-0.el7_6.i686.rpm</filename><sum type="sha256">93cb00a9e9b2dd7edbae23654ff53e3968146bff466d4faacc4ec2dfb66d1c52</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-javadoc-1.8.0.222.b10-0.el7_6.noarch.rpm</filename><sum type="sha256">cceff5db39e1c6f09f7bec4f4e23315b92ee8d3226193da6fc5228ca982a2439</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.222.b10-0.el7_6.noarch.rpm</filename><sum type="sha256">baed0d18bfde493dd9358001c53920a26d2a7b70bbf473a8bdf0c29632846f50</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-src-1.8.0.222.b10-0.el7_6.i686.rpm</filename><sum type="sha256">003c780db610898b83bfaaed98e426a1b022475bc6adade08ec27c7ccfba733e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-demo-1.8.0.222.b10-0.el7_6.x86_64.rpm</filename><sum type="sha256">379cd6f3dcf6d1c4d49e1e16fd3acce8c440a205d9d63dcd0a33354f4f41131e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.222.b10-0.el7_6.i686.rpm</filename><sum type="sha256">fcfc1267fb0e17d5ad5afdb17923ee06e18d6cbcfa5420ae22ae8e658e92c9aa</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.222.b10-0.el7_6.x86_64.rpm</filename><sum type="sha256">af7d23d108936d15f9d42ee27da11197d7861314faf808b2c1cd44e2b5d57370</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.i686.rpm</filename><sum type="sha256">66632d331752a80faf6d53057297516b6107ee7689200b1f46ca2e1ed79a051b</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.222.b10-0.el7_6.noarch.rpm</filename><sum type="sha256">af47b3b7e2250e4e81425430f22301a0a2315f24f2947a47a4ecb087d22eda0d</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.222.b10-0.el7_6.i686.rpm</filename><sum type="sha256">cd7c5d159594c45e1e5c9a7be7daaf9853e476ebb6e9fafd4ccae1ef5fade5ce</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-devel-1.8.0.222.b10-0.el7_6.i686.rpm</filename><sum type="sha256">a93d71fe77604e55ba0f699370a20c51645df4772d51e19dcaea10efd55a4116</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.222.b10-0.el7_6.i686.rpm</filename><sum type="sha256">e65808deba1032fe727fa95f9a48f3aa758db00a35dc3844b1abc7f8b304ac28</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.222.b10-0.el7_6.x86_64.rpm</filename><sum type="sha256">a91691a0a7cf2927aa6be4ead72dac18dea0230d14b8e4a62b5e79f94d2f538c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-accessibility-1.8.0.222.b10-0.el7_6.i686.rpm</filename><sum type="sha256">58be1052a7a0d5c0791c0620b2877acba24f7481711d4dae8e008b9f7facde33</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.222.b10-0.el7_6.i686.rpm</filename><sum type="sha256">c9654f0466b6695f7feb47b3bf03145d3b91dcc015816e2411c9a7404c834dea</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-src-debug-1.8.0.222.b10-0.el7_6.x86_64.rpm</filename><sum type="sha256">5091228b50317c85f07de6d66522170a8f831ea37a67df02bcba49b234d7432e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-devel-1.8.0.222.b10-0.el7_6.x86_64.rpm</filename><sum type="sha256">30fbdad254274f2a7441256d005e6322a8a980dd5e79f43441819f355cab65c7</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-src-debug-1.8.0.222.b10-0.el7_6.i686.rpm</filename><sum type="sha256">e6739e1f685e9c5a2a505eef857f1b813590b2a5f37287d3a20c7f3972383b42</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.222.b10-0.el7_6.noarch.rpm</filename><sum type="sha256">98a2588a5b26b9625a4d8ab649088317e324c3ed927a598d5ec49655dc7dba17</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-src-1.8.0.222.b10-0.el7_6.x86_64.rpm</filename><sum type="sha256">bde458f89e120666f4da3bf6beb10c1082ed76223103d1865d84ad90d608ca46</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el7_6" src="java-1.8.0-openjdk-1.8.0.222.b10-0.el7_6.src.rpm" version="1.8.0.222.b10"><filename>java-1.8.0-openjdk-demo-1.8.0.222.b10-0.el7_6.i686.rpm</filename><sum type="sha256">a00b98c01d91c947648f66435f3112d5000285042e0771c6860a9403af513b20</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745" id="CVE-2019-2745" title="Openjdk: Side-Channel Attack Risks In Elliptic " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762" id="CVE-2019-2762" title="Openjdk: Insufficient Checks Of Suppressed " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769" id="CVE-2019-2769" title="Openjdk: Unbounded Memory Allocation During " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786" id="CVE-2019-2786" title="Openjdk: Insufficient Restriction Of Privileges " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816" id="CVE-2019-2816" title="Openjdk: Missing Url Format Validation " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842" id="CVE-2019-2842" title="Openjdk: Missing Array Bounds Check In Crypto " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1815" id="RHSA-2019:1815-1" title="Rhsa-2019:1815-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730056" id="1730056" title="Openjdk: Unbounded Memory Allocation During " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730099" id="1730099" title="Openjdk: Missing Url Format Validation " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730110" id="1730110" title="Openjdk: Missing Array Bounds Check In Crypto " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730255" id="1730255" title="Openjdk: Insufficient Restriction Of Privileges " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730411" id="1730411" title="Openjdk: Side-Channel Attack Risks In Elliptic " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730415" id="1730415" title="Openjdk: Insufficient Checks Of Suppressed " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1839-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Side-channel attack risks in Elliptic Curve (EC) cryptography (Security, 8208698) (CVE-2019-2745) 
* OpenJDK: Insufficient checks of suppressed exceptions in deserialization (Utilities, 8212328) (CVE-2019-2762) 
* OpenJDK: Unbounded memory allocation during deserialization in Collections (Utilities, 8213432) (CVE-2019-2769) 
* OpenJDK: Missing URL format validation (Networking, 8221518) (CVE-2019-2816) 
* OpenJDK: Missing array bounds check in crypto providers (JCE, 8223511) (CVE-2019-2842) 
* OpenJDK: Insufficient restriction of privileges in AccessController (Security, 8216381) (CVE-2019-2786)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-07-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.19.1.el7_6" src="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el7_6.src.rpm" version="1.7.0.231"><filename>java-1.7.0-openjdk-accessibility-1.7.0.231-2.6.19.1.el7_6.x86_64.rpm</filename><sum type="sha256">fd33308664f1eb7cb9d01032bf57ae755492150a5b0c96389d3c3547284158e6</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.19.1.el7_6" src="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el7_6.src.rpm" version="1.7.0.231"><filename>java-1.7.0-openjdk-javadoc-1.7.0.231-2.6.19.1.el7_6.noarch.rpm</filename><sum type="sha256">c01077f4ec163c99b46eb92dad5a53b8435acc6c52f4ed74943a0997704f05c3</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.19.1.el7_6" src="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el7_6.src.rpm" version="1.7.0.231"><filename>java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el7_6.x86_64.rpm</filename><sum type="sha256">711170051ba2c38457007cd7b61646c61bcb40d276db3cdf8e3d14dd3d0f145d</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.19.1.el7_6" src="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el7_6.src.rpm" version="1.7.0.231"><filename>java-1.7.0-openjdk-headless-1.7.0.231-2.6.19.1.el7_6.x86_64.rpm</filename><sum type="sha256">83af3ec05112d04234172651a750ae62dfa84ded6dc89ebb18394584a18e5c9a</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.19.1.el7_6" src="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el7_6.src.rpm" version="1.7.0.231"><filename>java-1.7.0-openjdk-src-1.7.0.231-2.6.19.1.el7_6.x86_64.rpm</filename><sum type="sha256">ec3fe358bfc6253f1247a3e1f6784321d82145e2a977a051bc91844b11e2f641</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.19.1.el7_6" src="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el7_6.src.rpm" version="1.7.0.231"><filename>java-1.7.0-openjdk-devel-1.7.0.231-2.6.19.1.el7_6.x86_64.rpm</filename><sum type="sha256">5a74e703616c0b7b504452b210712857fb32c11f8aa0b747d13355d2becf1274</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.19.1.el7_6" src="java-1.7.0-openjdk-1.7.0.231-2.6.19.1.el7_6.src.rpm" version="1.7.0.231"><filename>java-1.7.0-openjdk-demo-1.7.0.231-2.6.19.1.el7_6.x86_64.rpm</filename><sum type="sha256">f82d2d747293eca0a0c6749bda353f0a1852a4ae6b3197f8a096a3cebbbe22a5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2745" id="CVE-2019-2745" title="Openjdk: Side-Channel Attack Risks In Elliptic " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2762" id="CVE-2019-2762" title="Openjdk: Insufficient Checks Of Suppressed " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2769" id="CVE-2019-2769" title="Openjdk: Unbounded Memory Allocation During " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2786" id="CVE-2019-2786" title="Openjdk: Insufficient Restriction Of Privileges " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2816" id="CVE-2019-2816" title="Openjdk: Missing Url Format Validation " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2842" id="CVE-2019-2842" title="Openjdk: Missing Array Bounds Check In Crypto " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1839" id="RHSA-2019:1839-1" title="Rhsa-2019:1839-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730056" id="1730056" title="Openjdk: Unbounded Memory Allocation During " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730099" id="1730099" title="Openjdk: Missing Url Format Validation " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730110" id="1730110" title="Openjdk: Missing Array Bounds Check In Crypto " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730255" id="1730255" title="Openjdk: Insufficient Restriction Of Privileges " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730411" id="1730411" title="Openjdk: Side-Channel Attack Risks In Elliptic " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730415" id="1730415" title="Openjdk: Insufficient Checks Of Suppressed " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1873-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: nfs: use-after-free in svc_process_common() (CVE-2018-16884) 
* kernel: insufficient input validation in kernel mode driver in Intel i915 graphics leads to privilege escalation (CVE-2019-11085) 
* kernel: nfs: NULL pointer dereference due to an anomalized NFS message sequence (CVE-2018-16871) 
* kernel: use-after-free in drivers/char/ipmi/ipmi_si_intf.c, ipmi_si_mem_io.c, ipmi_si_port_io.c (CVE-2019-11811)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-07-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools" release="957.27.2.el7" src="kernel-3.10.0-957.27.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-957.27.2.el7.x86_64.rpm</filename><sum type="sha256">fbd81b85f33663aaaed9c8e44a029db15bdbf12c2f335fc6830fbb0af4440059</sum></package><package arch="x86_64" name="kernel-devel" release="957.27.2.el7" src="kernel-3.10.0-957.27.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-957.27.2.el7.x86_64.rpm</filename><sum type="sha256">30bd158da247ef12560097a6d2a2dac254af2c6b6aef396c91517465d4effe41</sum></package><package arch="x86_64" name="kernel-tools-libs" release="957.27.2.el7" src="kernel-3.10.0-957.27.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-957.27.2.el7.x86_64.rpm</filename><sum type="sha256">31fa9142927360b24a193e04038443d1d32d8fe8179cf2b5ee15d3569414ed2e</sum></package><package arch="noarch" name="kernel-doc" release="957.27.2.el7" src="kernel-3.10.0-957.27.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-957.27.2.el7.noarch.rpm</filename><sum type="sha256">5f3b220c9c914c58bf725ffbafedac93c8831c374c00341f4fc034bb7a5c060f</sum></package><package arch="x86_64" name="kernel-debug" release="957.27.2.el7" src="kernel-3.10.0-957.27.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-957.27.2.el7.x86_64.rpm</filename><sum type="sha256">dadc7b68a925b62101a8e92ef74be2d974f65c1e7930392e44c1c5cc54904cbc</sum></package><package arch="x86_64" name="perf" release="957.27.2.el7" src="kernel-3.10.0-957.27.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-957.27.2.el7.x86_64.rpm</filename><sum type="sha256">8bc1774319c3d9477c4c5dc3c4a0ba10161f6389efcf9c57631597b747b97267</sum></package><package arch="x86_64" name="kernel" release="957.27.2.el7" src="kernel-3.10.0-957.27.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-957.27.2.el7.x86_64.rpm</filename><sum type="sha256">e8ebba191ac42937be0f1d79f3da7405344d5f1a2e96566ecbc41f324e6d783c</sum></package><package arch="x86_64" name="python-perf" release="957.27.2.el7" src="kernel-3.10.0-957.27.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-957.27.2.el7.x86_64.rpm</filename><sum type="sha256">896ff9245dec061c2ff291e0345ec43009cf06cca3aa63875b341614f95dc49b</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="957.27.2.el7" src="kernel-3.10.0-957.27.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-957.27.2.el7.noarch.rpm</filename><sum type="sha256">f72d5bef3f7131fe040f2760bab7cc38cfe6fb7382e17d5359313ffcd96dbf44</sum></package><package arch="x86_64" name="bpftool" release="957.27.2.el7" src="kernel-3.10.0-957.27.2.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-957.27.2.el7.x86_64.rpm</filename><sum type="sha256">d9c5be02c096c1dae2a97c6826f631fbc468614944a4af2d80b601734b8be412</sum></package><package arch="x86_64" name="kernel-debug-devel" release="957.27.2.el7" src="kernel-3.10.0-957.27.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-957.27.2.el7.x86_64.rpm</filename><sum type="sha256">48151e15e31a991a06ea0e33c193a1df6a16ee5f2b84983ee970758d27e71446</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="957.27.2.el7" src="kernel-3.10.0-957.27.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-957.27.2.el7.x86_64.rpm</filename><sum type="sha256">542fd050935f7360ecbba7b619198e1409d57da315c19096bf5fff070a622639</sum></package><package arch="x86_64" name="kernel-headers" release="957.27.2.el7" src="kernel-3.10.0-957.27.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-957.27.2.el7.x86_64.rpm</filename><sum type="sha256">3b57a3ff7658bd3355534e71bda9c01cd1747dd47df5b55f7a7524e922117325</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16871" id="CVE-2018-16871" title="Kernel: Nfs: Null Pointer Dereference Due To An " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16884" id="CVE-2018-16884" title="Kernel: Nfs: Use-After-Free In Svc_Process_Common()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11085" id="CVE-2019-11085" title="Kernel: Insufficient Input Validation In Kernel " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11811" id="CVE-2019-11811" title="Kernel: Use-After-Free In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1873" id="RHSA-2019:1873-1" title="Rhsa-2019:1873-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1655162" id="1655162" title="Kernel: Nfs: Null Pointer Dereference Due To An " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1660375" id="1660375" title="Kernel: Nfs: Use-After-Free In Svc_Process_Common()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1709180" id="1709180" title="Kernel: Use-After-Free In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1710405" id="1710405" title="Kernel: Insufficient Input Validation In Kernel " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1880-1</id><title>Curl</title><description>The curl packages provide the libcurl library and the curl utility for     downloading files from servers using various protocols, including HTTP,     FTP, and LDAP.          Security Fix(es):          * curl: NTLM password overflow via integer overflow (CVE-2018-14618)          For more details about the security issue(s), including the impact, a CVSS     score, acknowledgments, and other related information, refer to the CVE           Bug Fix(es):          * baseurl with file:// hangs and then timeout in yum repo          * curl crashes on http links with rate-limit</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-07-29 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libcurl-devel" release="51.el7_6.3" src="curl-7.29.0-51.el7_6.3.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-51.el7_6.3.i686.rpm</filename><sum type="sha256">064aba008b886dc82c669739a936e2b077c0f07114409a68cc29031f90c5a8cb</sum></package><package arch="x86_64" name="curl" release="51.el7_6.3" src="curl-7.29.0-51.el7_6.3.src.rpm" version="7.29.0"><filename>curl-7.29.0-51.el7_6.3.x86_64.rpm</filename><sum type="sha256">39fea7925843be06418a77ad97de0f42a0537712c0c3515e39d007164c9983d0</sum></package><package arch="x86_64" name="libcurl-devel" release="51.el7_6.3" src="curl-7.29.0-51.el7_6.3.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-51.el7_6.3.x86_64.rpm</filename><sum type="sha256">870aa45eb5eea12e6ce3b20c2a7cc56487ee9de13abeb960629e7f3271c934ea</sum></package><package arch="x86_64" name="libcurl" release="51.el7_6.3" src="curl-7.29.0-51.el7_6.3.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-51.el7_6.3.x86_64.rpm</filename><sum type="sha256">8db528f7d40eae727d1efbf4658c621ce58e8379903f5b6ff03dc0802b4ddbae</sum></package><package arch="i686" name="libcurl" release="51.el7_6.3" src="curl-7.29.0-51.el7_6.3.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-51.el7_6.3.i686.rpm</filename><sum type="sha256">44330507a6dcc830b8efe5647ff6c0d484cf7ec972734da3af8566971723deeb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14618" id="CVE-2018-14618" title="Curl: Ntlm Password Overflow Via Integer Overflow" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1880" id="RHSA-2019:1880-1" title="Rhsa-2019:1880-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1622707" id="1622707" title="Curl: Ntlm Password Overflow Via Integer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1709474" id="1709474" title="Baseurl With File:// Hangs And Then Timeout In Yum Repo " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1883-1</id><title>Qemu-Kvm</title><description>Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. 
Security Fix(es): 
* QEMU: device_tree: heap buffer overflow while loading device tree blob (CVE-2018-20815) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE  
Bug Fix(es): 
* As newer machine remove csske feature, detection of the processor fail and machine used old version as fallback. This update make feature conditional so detection of newer cpu works properly.</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-07-29 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-img" release="160.el7_6.3" src="qemu-kvm-1.5.3-160.el7_6.3.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-160.el7_6.3.x86_64.rpm</filename><sum type="sha256">8b94e5d1de94d04960aba1aa74974a7025a2bfa7605974afb1b7f0d74b0744b8</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="160.el7_6.3" src="qemu-kvm-1.5.3-160.el7_6.3.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-160.el7_6.3.x86_64.rpm</filename><sum type="sha256">20a9cdb53e9496722ecb2528acb49f46f93f4bedc5a01a69f4895e26d392b6a0</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="160.el7_6.3" src="qemu-kvm-1.5.3-160.el7_6.3.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-160.el7_6.3.x86_64.rpm</filename><sum type="sha256">def2bb682462b27dade792d679828a6e977f1f8e53d457875c0c624478066d92</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="160.el7_6.3" src="qemu-kvm-1.5.3-160.el7_6.3.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-160.el7_6.3.x86_64.rpm</filename><sum type="sha256">e42dcec36b1576d41577c3a236b50a6bcc9afd4ce3aff0b62ead5fe7d0461f55</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6778" id="CVE-2019-6778" title="Qemu: Slirp: Heap Buffer Overflow In Tcp_Emu()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1883" id="RHSA-2019:1883-1" title="Rhsa-2019:1883-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1664205" id="1664205" title="Qemu: Slirp: Heap Buffer Overflow In Tcp_Emu()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1884-1</id><title>Libssh2</title><description>Security Fix(es): 
* libssh2: Out-of-bounds memory comparison with specially crafted message channel request (CVE-2019-3862)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-07-29 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libssh2-devel" release="12.el7_6.3" src="libssh2-1.4.3-12.el7_6.3.src.rpm" version="1.4.3"><filename>libssh2-devel-1.4.3-12.el7_6.3.i686.rpm</filename><sum type="sha256">453feab9a385bb6072cf1f4808efa14e65ad46332dc01218bef585cd513360ef</sum></package><package arch="noarch" name="libssh2-docs" release="12.el7_6.3" src="libssh2-1.4.3-12.el7_6.3.src.rpm" version="1.4.3"><filename>libssh2-docs-1.4.3-12.el7_6.3.noarch.rpm</filename><sum type="sha256">401daeed4d9a4c2796c9b1a465d23fd6cfa6a03ad68d4f0d5d2b141b09ca41f8</sum></package><package arch="i686" name="libssh2" release="12.el7_6.3" src="libssh2-1.4.3-12.el7_6.3.src.rpm" version="1.4.3"><filename>libssh2-1.4.3-12.el7_6.3.i686.rpm</filename><sum type="sha256">896c52d7ea00d3852fede7f3f0d45b08abb271637a8c7de0e3eae016fe7ae75f</sum></package><package arch="x86_64" name="libssh2" release="12.el7_6.3" src="libssh2-1.4.3-12.el7_6.3.src.rpm" version="1.4.3"><filename>libssh2-1.4.3-12.el7_6.3.x86_64.rpm</filename><sum type="sha256">046e551216c6acdde2a969c2ebbfdee9bb0d511eba18cc93472fe5956df5b292</sum></package><package arch="x86_64" name="libssh2-devel" release="12.el7_6.3" src="libssh2-1.4.3-12.el7_6.3.src.rpm" version="1.4.3"><filename>libssh2-devel-1.4.3-12.el7_6.3.x86_64.rpm</filename><sum type="sha256">f5b1bd332e10125d3e265711aeb5de576d549f2de7fe02dcb3c353170926a6a7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3862" id="CVE-2019-3862" title="Libssh2: Out-Of-Bounds Memory Comparison With " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1884" id="RHSA-2019:1884-1" title="Rhsa-2019:1884-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1687312" id="1687312" title="Libssh2: Out-Of-Bounds Memory Comparison With " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1896-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* 389-ds-base: DoS via hanging secured connections (CVE-2019-3883) 
Bug Fix(es): 
* Previously, if you were using the PAM plugin and attempted to bind as a dn that doesn't exist, the server would crash. This has now been fixed.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-07-29 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-snmp" release="25.1.el7_6" src="389-ds-base-1.3.8.4-25.1.el7_6.src.rpm" version="1.3.8.4"><filename>389-ds-base-snmp-1.3.8.4-25.1.el7_6.x86_64.rpm</filename><sum type="sha256">5c646b6ef5e62fd672beb6c637d70b93e6391bc7315e79b305d2b0b39065bf85</sum></package><package arch="x86_64" name="389-ds-base" release="25.1.el7_6" src="389-ds-base-1.3.8.4-25.1.el7_6.src.rpm" version="1.3.8.4"><filename>389-ds-base-1.3.8.4-25.1.el7_6.x86_64.rpm</filename><sum type="sha256">3fb74196e4750e8466f1b8e59fb45d5dfbcbd2ffbb0030be1293cd72efaecfda</sum></package><package arch="x86_64" name="389-ds-base-libs" release="25.1.el7_6" src="389-ds-base-1.3.8.4-25.1.el7_6.src.rpm" version="1.3.8.4"><filename>389-ds-base-libs-1.3.8.4-25.1.el7_6.x86_64.rpm</filename><sum type="sha256">16cd8ae8acb33a8b76e6c09d38a17a01632b8f4be6740cfde00c789525a3eee1</sum></package><package arch="x86_64" name="389-ds-base-devel" release="25.1.el7_6" src="389-ds-base-1.3.8.4-25.1.el7_6.src.rpm" version="1.3.8.4"><filename>389-ds-base-devel-1.3.8.4-25.1.el7_6.x86_64.rpm</filename><sum type="sha256">318e8242e366e9b5cde1ef702a67db599af87a8313594e6c922b03fed515ae99</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3883" id="CVE-2019-3883" title="389-Ds-Base: Dos Via Hanging Secured Connections" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1896" id="RHSA-2019:1896-1" title="Rhsa-2019:1896-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1693612" id="1693612" title="389-Ds-Base: Dos Via Hanging Secured Connections" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1718184" id="1718184" title="Segfault When Using Pam Passthru And Addn Plugins Together " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:1898-1</id><title>Httpd</title><description>Security Fix(es): 
* httpd: Weak Digest auth nonce generation in mod_auth_digest (CVE-2018-1312)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-07-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="mod_ldap" release="89.sl7_6.1" src="httpd-2.4.6-89.sl7_6.1.src.rpm" version="2.4.6"><filename>mod_ldap-2.4.6-89.sl7_6.1.x86_64.rpm</filename><sum type="sha256">2fd74f29430f70f58fde1ed5560f52c2c6e8c27ebcc562717045f3cfe0824d0b</sum></package><package arch="x86_64" name="httpd" release="89.sl7_6.1" src="httpd-2.4.6-89.sl7_6.1.src.rpm" version="2.4.6"><filename>httpd-2.4.6-89.sl7_6.1.x86_64.rpm</filename><sum type="sha256">bcd9b2517876a2268c285b0033813966392de1c306fba030be7453c18ae5b983</sum></package><package arch="x86_64" name="mod_session" release="89.sl7_6.1" src="httpd-2.4.6-89.sl7_6.1.src.rpm" version="2.4.6"><filename>mod_session-2.4.6-89.sl7_6.1.x86_64.rpm</filename><sum type="sha256">ab0f6d24e6f4aaed8afb0e0d47208c57226a52563b1f0ae0467d8ab4a51fafc8</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="89.sl7_6.1" src="httpd-2.4.6-89.sl7_6.1.src.rpm" version="2.4.6"><filename>mod_ssl-2.4.6-89.sl7_6.1.x86_64.rpm</filename><sum type="sha256">a5efe103d3defcdde5521a32e146a587b35ba33f82c969c22b6afd69c80b7f28</sum></package><package arch="x86_64" name="httpd-devel" release="89.sl7_6.1" src="httpd-2.4.6-89.sl7_6.1.src.rpm" version="2.4.6"><filename>httpd-devel-2.4.6-89.sl7_6.1.x86_64.rpm</filename><sum type="sha256">5ad32a07a1dfe5a6798de2f0604acd0c0fc77ee7a6cf1c0164973a64ff085f2e</sum></package><package arch="noarch" name="httpd-manual" release="89.sl7_6.1" src="httpd-2.4.6-89.sl7_6.1.src.rpm" version="2.4.6"><filename>httpd-manual-2.4.6-89.sl7_6.1.noarch.rpm</filename><sum type="sha256">65283214519aee248d29a0ae40afb98389550f1811c57e7283a426653f96f7e9</sum></package><package arch="x86_64" epoch="1" name="mod_proxy_html" release="89.sl7_6.1" src="httpd-2.4.6-89.sl7_6.1.src.rpm" version="2.4.6"><filename>mod_proxy_html-2.4.6-89.sl7_6.1.x86_64.rpm</filename><sum type="sha256">1d3cee7bff485654792a8f1c0547193f5703ae15ecfc85cfcf916a395c95cc3f</sum></package><package arch="x86_64" name="httpd-tools" release="89.sl7_6.1" src="httpd-2.4.6-89.sl7_6.1.src.rpm" version="2.4.6"><filename>httpd-tools-2.4.6-89.sl7_6.1.x86_64.rpm</filename><sum type="sha256">568115c0fed0bca38a1291992b389c2776d29483a4d0da6218625a28aa276df3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1312" id="CVE-2018-1312" title="Httpd: Weak Digest Auth Nonce Generation In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:1898" id="RHSA-2019:1898-1" title="Rhsa-2019:1898-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560634" id="1560634" title="Httpd: Weak Digest Auth Nonce Generation In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2003-1</id><title>Icedtea-Web</title><description>Security Fix(es): 
* icedtea-web: path traversal while processing &lt;jar/&gt; elements of JNLP files results in arbitrary file overwrite (CVE-2019-10182) 
* icedtea-web: directory traversal in the nested jar auto-extraction leading to arbitrary file overwrite (CVE-2019-10185) 
* icedtea-web: unsigned code injection in a signed JAR file (CVE-2019-10181)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-07-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="icedtea-web" release="2.el7_6" src="icedtea-web-1.7.1-2.el7_6.src.rpm" version="1.7.1"><filename>icedtea-web-1.7.1-2.el7_6.x86_64.rpm</filename><sum type="sha256">bf2fb0b95b6afef5b1af87084fd9ce50f321a4fb050b935178f7a0948b40b1fa</sum></package><package arch="noarch" name="icedtea-web-devel" release="2.el7_6" src="icedtea-web-1.7.1-2.el7_6.src.rpm" version="1.7.1"><filename>icedtea-web-devel-1.7.1-2.el7_6.noarch.rpm</filename><sum type="sha256">4b91d96aa1d50beef9712d1381b50bd349de36a35da0be6923e688e3b6b4b901</sum></package><package arch="noarch" name="icedtea-web-javadoc" release="2.el7_6" src="icedtea-web-1.7.1-2.el7_6.src.rpm" version="1.7.1"><filename>icedtea-web-javadoc-1.7.1-2.el7_6.noarch.rpm</filename><sum type="sha256">c40e35eeeb53ceb78c3f14736562136e39b14735c8436aef499129dad0a6788f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10181" id="CVE-2019-10181" title="Icedtea-Web: Unsigned Code Injection In A " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10182" id="CVE-2019-10182" title="Icedtea-Web: Path Traversal While Processing " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10185" id="CVE-2019-10185" title="Icedtea-Web: Directory Traversal In The Nested " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2003" id="RHSA-2019:2003-1" title="Rhsa-2019:2003-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1724958" id="1724958" title="Icedtea-Web: Path Traversal While Processing " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1724989" id="1724989" title="Icedtea-Web: Directory Traversal In The Nested " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1725928" id="1725928" title="Icedtea-Web: Unsigned Code Injection In A " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2017-1</id><title>Zsh</title><description>Security Fix(es): 
* zsh: Improper handling of shebang line longer than 64 (CVE-2018-13259)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="zsh" release="33.el7" src="zsh-5.0.2-33.el7.src.rpm" version="5.0.2"><filename>zsh-5.0.2-33.el7.x86_64.rpm</filename><sum type="sha256">2d9e03c821560e782b684bd40f4a2659b6b4ea4c05ea6e43503e8b1b88a336ab</sum></package><package arch="x86_64" name="zsh-html" release="33.el7" src="zsh-5.0.2-33.el7.src.rpm" version="5.0.2"><filename>zsh-html-5.0.2-33.el7.x86_64.rpm</filename><sum type="sha256">3efc548c5c41e574afb2a743f5a5c18c24c228adb8ee509269ee83a25cc7b12d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13259" id="CVE-2018-13259" title="Cve-2018-13259" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2017" id="RHSA-2019:2017-1" title="Rhsa-2019:2017-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1626184" id="1626184" title="Cve-2018-13259 Zsh: Improper Handling Of Shebang Line Longer Than 64" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2022-1</id><title>Poppler</title><description>Security Fix(es): 
* poppler: heap-based buffer over-read in XRef::getEntry in XRef.cc (CVE-2019-7310) 
* poppler: heap-based buffer overflow in function ImageStream::getLine() in Stream.cc (CVE-2019-9200) 
* poppler: infinite recursion in Parser::getObj function in Parser.cc (CVE-2018-16646) 
* poppler: memory leak in GfxColorSpace::setDisplayProfile in GfxState.cc (CVE-2018-18897) 
* poppler: reachable abort in Object.h (CVE-2018-19058) 
* poppler: out-of-bounds read in EmbFile::save2 in FileSpec.cc (CVE-2018-19059) 
* poppler: pdfdetach utility does not validate save paths (CVE-2018-19060) 
* poppler: NULL pointer dereference in _poppler_attachment_new (CVE-2018-19149) 
* poppler: NULL pointer dereference in the XRef::getEntry in XRef.cc (CVE-2018-20481) 
* poppler: reachable Object::dictLookup assertion in FileSpec class in FileSpec.cc (CVE-2018-20650) 
* poppler: SIGABRT PDFDoc::setup class in PDFDoc.cc (CVE-2018-20662) 
* poppler: heap-based buffer over-read in function downsample_row_box_filter in CairoRescaleBox.cc (CVE-2019-9631)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="evince-nautilus" release="8.el7" src="evince-3.28.2-8.el7.src.rpm" version="3.28.2"><filename>evince-nautilus-3.28.2-8.el7.x86_64.rpm</filename><sum type="sha256">b7a799cc5aed5b4042832fa62141170173c2c98d2bd0a15572632cb9a080744a</sum></package><package arch="i686" name="poppler-qt-devel" release="38.el7" src="poppler-0.26.5-38.el7.src.rpm" version="0.26.5"><filename>poppler-qt-devel-0.26.5-38.el7.i686.rpm</filename><sum type="sha256">a29f5eb61e317b4043d8d0a28094ae796d9d47ac461246680cba6b3aeb1baea6</sum></package><package arch="x86_64" name="okular-devel" release="7.el7" src="okular-4.10.5-7.el7.src.rpm" version="4.10.5"><filename>okular-devel-4.10.5-7.el7.x86_64.rpm</filename><sum type="sha256">d8e5b42ebc3238b377fd16ec19017e200bba3372003525e5a764933dc0cdab57</sum></package><package arch="x86_64" name="evince-dvi" release="8.el7" src="evince-3.28.2-8.el7.src.rpm" version="3.28.2"><filename>evince-dvi-3.28.2-8.el7.x86_64.rpm</filename><sum type="sha256">17f89371b60aa34cbff04cd2e634d59347701401552fa183bd8e6f2ed91939d0</sum></package><package arch="x86_64" name="poppler-demos" release="38.el7" src="poppler-0.26.5-38.el7.src.rpm" version="0.26.5"><filename>poppler-demos-0.26.5-38.el7.x86_64.rpm</filename><sum type="sha256">6062a3ec00a2a3baf5df980748ce731b0a0749bc450dc7d000bb50d4d1acb448</sum></package><package arch="x86_64" name="poppler-glib" release="38.el7" src="poppler-0.26.5-38.el7.src.rpm" version="0.26.5"><filename>poppler-glib-0.26.5-38.el7.x86_64.rpm</filename><sum type="sha256">01eb9039559921deac7d2e1122beb73f595638255031b6d602e3948c71754d6d</sum></package><package arch="i686" name="poppler-qt" release="38.el7" src="poppler-0.26.5-38.el7.src.rpm" version="0.26.5"><filename>poppler-qt-0.26.5-38.el7.i686.rpm</filename><sum type="sha256">c58fddc7174d01b547d70085d396afa0dc826a6d1c7ed6d1e09701497c49b50f</sum></package><package arch="x86_64" name="okular-libs" release="7.el7" src="okular-4.10.5-7.el7.src.rpm" version="4.10.5"><filename>okular-libs-4.10.5-7.el7.x86_64.rpm</filename><sum type="sha256">cfbcbd6300401f7b7c911ee731db76b984d539da663a9a6a6b907f2f7b25a34c</sum></package><package arch="x86_64" name="okular-part" release="7.el7" src="okular-4.10.5-7.el7.src.rpm" version="4.10.5"><filename>okular-part-4.10.5-7.el7.x86_64.rpm</filename><sum type="sha256">5523de9c70076af86f5fad1d61ffa3d284715539416f4bcb727f1ad7a317ef48</sum></package><package arch="x86_64" name="evince-libs" release="8.el7" src="evince-3.28.2-8.el7.src.rpm" version="3.28.2"><filename>evince-libs-3.28.2-8.el7.x86_64.rpm</filename><sum type="sha256">057199893ce80be695189754730b354b053e2cb00ce5be43f350284312cab88c</sum></package><package arch="x86_64" name="poppler-cpp" release="38.el7" src="poppler-0.26.5-38.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-0.26.5-38.el7.x86_64.rpm</filename><sum type="sha256">6b14b1965247d10ad9ae1743e147bad7332512cd2e07ee868290cff31e7b5b12</sum></package><package arch="i686" name="evince-libs" release="8.el7" src="evince-3.28.2-8.el7.src.rpm" version="3.28.2"><filename>evince-libs-3.28.2-8.el7.i686.rpm</filename><sum type="sha256">efb195b9f6effd1fc3f2f7c2b6057c033b10aa3a741c7d403b1b6f1e908a39ae</sum></package><package arch="x86_64" name="poppler-utils" release="38.el7" src="poppler-0.26.5-38.el7.src.rpm" version="0.26.5"><filename>poppler-utils-0.26.5-38.el7.x86_64.rpm</filename><sum type="sha256">98f8ba6ba84e3e36cdef5aa98e89b619cd1ffe1f8055795e1a105bc3469df01f</sum></package><package arch="x86_64" name="evince-devel" release="8.el7" src="evince-3.28.2-8.el7.src.rpm" version="3.28.2"><filename>evince-devel-3.28.2-8.el7.x86_64.rpm</filename><sum type="sha256">414787fe1287b350803cb08195cb526a8503e008ea92ec153847ca42fdd8dd9a</sum></package><package arch="x86_64" name="okular" release="7.el7" src="okular-4.10.5-7.el7.src.rpm" version="4.10.5"><filename>okular-4.10.5-7.el7.x86_64.rpm</filename><sum type="sha256">ba04b42268808c767d17c76ed25681b55b31d92a9517faa7d3f0bb20391ae8fb</sum></package><package arch="x86_64" name="poppler-qt" release="38.el7" src="poppler-0.26.5-38.el7.src.rpm" version="0.26.5"><filename>poppler-qt-0.26.5-38.el7.x86_64.rpm</filename><sum type="sha256">8f58ac013e48fd6305a1389577e8c295e5eff13f21c2bda7bb526a5c285521de</sum></package><package arch="i686" name="poppler-glib" release="38.el7" src="poppler-0.26.5-38.el7.src.rpm" version="0.26.5"><filename>poppler-glib-0.26.5-38.el7.i686.rpm</filename><sum type="sha256">bba01f17055d6e1204aa1c9dca450f535f3abb92debb23cad2030e3f77ce3409</sum></package><package arch="x86_64" name="poppler-cpp-devel" release="38.el7" src="poppler-0.26.5-38.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-devel-0.26.5-38.el7.x86_64.rpm</filename><sum type="sha256">6f49a6a0a97976854f6816df359957ed2998255f1985d1758d062a3d0a0ba6d4</sum></package><package arch="i686" name="poppler-devel" release="38.el7" src="poppler-0.26.5-38.el7.src.rpm" version="0.26.5"><filename>poppler-devel-0.26.5-38.el7.i686.rpm</filename><sum type="sha256">ac8be02a59af5e6691b656ba67acc7d5774e1092d6f687966af1d9fb1bb0402b</sum></package><package arch="x86_64" name="poppler" release="38.el7" src="poppler-0.26.5-38.el7.src.rpm" version="0.26.5"><filename>poppler-0.26.5-38.el7.x86_64.rpm</filename><sum type="sha256">e0820defb8f7748951bbe8e5702d21efd444f38eeac7e6663df33cdf3ee7d1bb</sum></package><package arch="i686" name="okular-devel" release="7.el7" src="okular-4.10.5-7.el7.src.rpm" version="4.10.5"><filename>okular-devel-4.10.5-7.el7.i686.rpm</filename><sum type="sha256">b72f2f9a2c812c8d699785b3eced579695e5303b99e7740b76638b86001a853a</sum></package><package arch="i686" name="poppler-glib-devel" release="38.el7" src="poppler-0.26.5-38.el7.src.rpm" version="0.26.5"><filename>poppler-glib-devel-0.26.5-38.el7.i686.rpm</filename><sum type="sha256">9530a383ce211d677b204797bbbfc0d806f550933bc770412b07ea12f7dd389c</sum></package><package arch="i686" name="evince-devel" release="8.el7" src="evince-3.28.2-8.el7.src.rpm" version="3.28.2"><filename>evince-devel-3.28.2-8.el7.i686.rpm</filename><sum type="sha256">2518412c39b1bc73fd39bf9412ee48cc7cbe2bb026adeecbc9c13c3c93dcf137</sum></package><package arch="x86_64" name="poppler-devel" release="38.el7" src="poppler-0.26.5-38.el7.src.rpm" version="0.26.5"><filename>poppler-devel-0.26.5-38.el7.x86_64.rpm</filename><sum type="sha256">3d0daffda0292b9a716143192c078f8c2df5dfecdcdfda38e730cfa6fc688ea5</sum></package><package arch="i686" name="poppler-cpp-devel" release="38.el7" src="poppler-0.26.5-38.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-devel-0.26.5-38.el7.i686.rpm</filename><sum type="sha256">449607645576b117484fc0b8b9361382e2c76e27c6a10579db4f959754df5d33</sum></package><package arch="i686" name="okular-libs" release="7.el7" src="okular-4.10.5-7.el7.src.rpm" version="4.10.5"><filename>okular-libs-4.10.5-7.el7.i686.rpm</filename><sum type="sha256">d5b61b01d976a3f7cc4c85c51d13b6317cdcb47dd594c09ae499a2190edb22b3</sum></package><package arch="i686" name="poppler-cpp" release="38.el7" src="poppler-0.26.5-38.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-0.26.5-38.el7.i686.rpm</filename><sum type="sha256">d5585933b406ba245ed58235088086077909c4912bfdb0806014e25e8add3277</sum></package><package arch="x86_64" name="poppler-qt-devel" release="38.el7" src="poppler-0.26.5-38.el7.src.rpm" version="0.26.5"><filename>poppler-qt-devel-0.26.5-38.el7.x86_64.rpm</filename><sum type="sha256">84431ef7f6134ef3d44bc38f201e17e390dbaffad035d2253d0f55ee3afe1130</sum></package><package arch="x86_64" name="evince-browser-plugin" release="8.el7" src="evince-3.28.2-8.el7.src.rpm" version="3.28.2"><filename>evince-browser-plugin-3.28.2-8.el7.x86_64.rpm</filename><sum type="sha256">e8cd1f672f49f2beb546591a14f716168db85716fb7e528d9ffaa3faefe3f110</sum></package><package arch="x86_64" name="evince" release="8.el7" src="evince-3.28.2-8.el7.src.rpm" version="3.28.2"><filename>evince-3.28.2-8.el7.x86_64.rpm</filename><sum type="sha256">7c12c47b7a003b8f3223ab303c7e2bc2ddcd5ee562bbf6bf84209dc57b69a880</sum></package><package arch="i686" name="poppler" release="38.el7" src="poppler-0.26.5-38.el7.src.rpm" version="0.26.5"><filename>poppler-0.26.5-38.el7.i686.rpm</filename><sum type="sha256">830ddf2a436ddd6e4c8494bcc50ea6b6e6faf4a9432fc11f2d5301a4cbd6f8fe</sum></package><package arch="x86_64" name="poppler-glib-devel" release="38.el7" src="poppler-0.26.5-38.el7.src.rpm" version="0.26.5"><filename>poppler-glib-devel-0.26.5-38.el7.x86_64.rpm</filename><sum type="sha256">add4ff127888e439171b57c8fda81e8a20b4e4bdfb51d8392e618150133f177d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16646" id="CVE-2018-16646" title="Cve-2018-16646" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18897" id="CVE-2018-18897" title="Cve-2018-18897" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19058" id="CVE-2018-19058" title="Cve-2018-19058" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19059" id="CVE-2018-19059" title="Cve-2018-19059" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19060" id="CVE-2018-19060" title="Cve-2018-19060" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19149" id="CVE-2018-19149" title="Cve-2018-19149" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20481" id="CVE-2018-20481" title="Cve-2018-20481" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20650" id="CVE-2018-20650" title="Cve-2018-20650" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20662" id="CVE-2018-20662" title="Cve-2018-20662" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7310" id="CVE-2019-7310" title="Cve-2019-7310" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9200" id="CVE-2019-9200" title="Cve-2019-9200" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9631" id="CVE-2019-9631" title="Cve-2019-9631" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2022" id="RHSA-2019:2022-1" title="Rhsa-2019:2022-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378075" id="1378075" title="Evince Is Not Showing Comments In Document" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1378961" id="1378961" title="Error Displaying Pdf In Evince" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1458037" id="1458037" title="[Rfe] Okular Should Also Display The Fontname (After Font Path)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1541358" id="1541358" title="[Rfe] Evince Does Not Read Pdf File Printscaling Scaling Tags" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1626618" id="1626618" title="Cve-2018-16646 Poppler: Infinite Recursion In Parser::Getobj Function In Parser.Cc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639595" id="1639595" title="[Rfe] Provide Fontname For Used Fonts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646546" id="1646546" title="Cve-2018-18897 Poppler: Memory Leak In Gfxcolorspace::Setdisplayprofile In Gfxstate.Cc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1649435" id="1649435" title="Cve-2018-19058 Poppler: Reachable Abort In Object.H" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1649440" id="1649440" title="Cve-2018-19059 Poppler: Out-Of-Bounds Read In Embfile::Save2 In Filespec.Cc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1649450" id="1649450" title="Cve-2018-19060 Poppler: Pdfdetach Utility Does Not Validate Save Paths" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1649457" id="1649457" title="Cve-2018-19149 Poppler: Null Pointer Dereference In _Poppler_Attachment_New" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658304" id="1658304" title="Export Printscaling Preference" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665263" id="1665263" title="Cve-2018-20650 Poppler: Reachable Object::Dictlookup Assertion In Filespec Class In Filespec.Cc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665266" id="1665266" title="Cve-2018-20481 Poppler: Null Pointer Dereference In The Xref::Getentry In Xref.Cc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665273" id="1665273" title="Cve-2018-20662 Poppler: Sigabrt Pdfdoc::Setup Class In Pdfdoc.Cc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1672419" id="1672419" title="Cve-2019-7310 Poppler: Heap-Based Buffer Over-Read In Xref::Getentry In Xref.Cc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1683632" id="1683632" title="Cve-2019-9200 Poppler: Heap-Based Buffer Overflow In Function Imagestream::Getline() In Stream.Cc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1686802" id="1686802" title="Cve-2019-9631 Poppler: Heap-Based Buffer Over-Read In Function Downsample_Row_Box_Filter In Cairorescalebox.Cc" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2028-1</id><title>Ruby</title><description>Security Fix(es): 
* ruby: HTTP response splitting in WEBrick (CVE-2017-17742) 
* ruby: DoS by large request in WEBrick (CVE-2018-8777) 
* ruby: Buffer under-read in String#unpack (CVE-2018-8778) 
* ruby: Unintentional directory traversal by poisoned NULL byte in Dir (CVE-2018-8780) 
* ruby: Tainted flags are not propagated in Array#pack and String#unpack with some directives (CVE-2018-16396) 
* rubygems: Path traversal when writing to a symlinked basedir outside of the root (CVE-2018-1000073) 
* rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML (CVE-2018-1000074) 
* rubygems: Improper verification of signatures in tarball allows to install mis-signed gem (CVE-2018-1000076) 
* rubygems: Missing URL validation on spec home attribute allows malicious gem to set an invalid homepage URL (CVE-2018-1000077) 
* rubygems: XSS vulnerability in homepage attribute when displayed via gem server (CVE-2018-1000078) 
* rubygems: Path traversal issue during gem installation allows to write to arbitrary filesystem locations (CVE-2018-1000079) 
* ruby: Unintentional file and directory creation with directory traversal in tempfile and tmpdir (CVE-2018-6914) 
* ruby: Unintentional socket creation by poisoned NULL byte in UNIXServer and UNIXSocket (CVE-2018-8779) 
* rubygems: Infinite loop vulnerability due to negative size in tar header causes Denial of Service (CVE-2018-1000075)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ruby-tcltk" release="36.el7" src="ruby-2.0.0.648-36.el7.src.rpm" version="2.0.0.648"><filename>ruby-tcltk-2.0.0.648-36.el7.x86_64.rpm</filename><sum type="sha256">6783cdba73b27585cc8c7d077b49a3cb5d4c9008176ebe44352cc1d2e362eeb1</sum></package><package arch="x86_64" name="rubygem-json" release="36.el7" src="ruby-2.0.0.648-36.el7.src.rpm" version="1.7.7"><filename>rubygem-json-1.7.7-36.el7.x86_64.rpm</filename><sum type="sha256">9cc88d73fdcae3886babf646cc72000689ddfa033e9156ea8ac4bc12d1c61e4e</sum></package><package arch="noarch" name="rubygems" release="36.el7" src="ruby-2.0.0.648-36.el7.src.rpm" version="2.0.14.1"><filename>rubygems-2.0.14.1-36.el7.noarch.rpm</filename><sum type="sha256">51c49312c71a5d4e2ef6f2bd9971bb717eb0f926dcf6d86f6814e35704f01729</sum></package><package arch="x86_64" name="rubygem-bigdecimal" release="36.el7" src="ruby-2.0.0.648-36.el7.src.rpm" version="1.2.0"><filename>rubygem-bigdecimal-1.2.0-36.el7.x86_64.rpm</filename><sum type="sha256">56d9f180d32a28067e57062c660b3f0e4380e6ca8559b79699a81af362796cbd</sum></package><package arch="x86_64" name="ruby" release="36.el7" src="ruby-2.0.0.648-36.el7.src.rpm" version="2.0.0.648"><filename>ruby-2.0.0.648-36.el7.x86_64.rpm</filename><sum type="sha256">4df96e6080a3043371e9ce57d0ec9994458553b7f694c3b56d602223931edea0</sum></package><package arch="x86_64" name="ruby-devel" release="36.el7" src="ruby-2.0.0.648-36.el7.src.rpm" version="2.0.0.648"><filename>ruby-devel-2.0.0.648-36.el7.x86_64.rpm</filename><sum type="sha256">aaa51d3c7b1470b3d636d1bd584c90e57f9e34e50823bfe9d60c7689ec5b35ec</sum></package><package arch="noarch" name="rubygem-minitest" release="36.el7" src="ruby-2.0.0.648-36.el7.src.rpm" version="4.3.2"><filename>rubygem-minitest-4.3.2-36.el7.noarch.rpm</filename><sum type="sha256">6fb491f42f071742aab4c0f904edcd35c82b05359f5e80133dd75b238f6af1d7</sum></package><package arch="x86_64" name="rubygem-io-console" release="36.el7" src="ruby-2.0.0.648-36.el7.src.rpm" version="0.4.2"><filename>rubygem-io-console-0.4.2-36.el7.x86_64.rpm</filename><sum type="sha256">4170a71a95d28025d087c2ca253d5bad9b9919b3addec2ea6274e6d98f640f64</sum></package><package arch="noarch" name="rubygems-devel" release="36.el7" src="ruby-2.0.0.648-36.el7.src.rpm" version="2.0.14.1"><filename>rubygems-devel-2.0.14.1-36.el7.noarch.rpm</filename><sum type="sha256">dc1d1c67ad9a0c176bf2481065e19d59e95f5d9f6a500afd4a67d1cbb70da987</sum></package><package arch="noarch" name="ruby-doc" release="36.el7" src="ruby-2.0.0.648-36.el7.src.rpm" version="2.0.0.648"><filename>ruby-doc-2.0.0.648-36.el7.noarch.rpm</filename><sum type="sha256">febc35c03b1a1f3c8bde8bcafaf9fe7b7fc0f58de3981639c070bd2e7b7e431b</sum></package><package arch="x86_64" name="rubygem-psych" release="36.el7" src="ruby-2.0.0.648-36.el7.src.rpm" version="2.0.0"><filename>rubygem-psych-2.0.0-36.el7.x86_64.rpm</filename><sum type="sha256">f15f4e5bdb98d281c73808d2990fbf729b562781a462e5ee89fa6c42f95338e4</sum></package><package arch="noarch" name="ruby-irb" release="36.el7" src="ruby-2.0.0.648-36.el7.src.rpm" version="2.0.0.648"><filename>ruby-irb-2.0.0.648-36.el7.noarch.rpm</filename><sum type="sha256">483d9daadf9768362fc76c852a6e9a7f5cabe569d9cfc36599326b1c43573853</sum></package><package arch="i686" name="ruby-libs" release="36.el7" src="ruby-2.0.0.648-36.el7.src.rpm" version="2.0.0.648"><filename>ruby-libs-2.0.0.648-36.el7.i686.rpm</filename><sum type="sha256">d9fb759df79a9feaac6e810a0237f3c318b270e25d7fb7bd65584895f41be5d4</sum></package><package arch="noarch" name="rubygem-rdoc" release="36.el7" src="ruby-2.0.0.648-36.el7.src.rpm" version="4.0.0"><filename>rubygem-rdoc-4.0.0-36.el7.noarch.rpm</filename><sum type="sha256">e922d2bb4bf096a628c049b90e8277a14fab06bc646ec156bf37e68421b1e077</sum></package><package arch="x86_64" name="ruby-libs" release="36.el7" src="ruby-2.0.0.648-36.el7.src.rpm" version="2.0.0.648"><filename>ruby-libs-2.0.0.648-36.el7.x86_64.rpm</filename><sum type="sha256">0350f7109b6ac9cb061ad65ebd0d707d4db0075064b950c593704f2fca1b1c3d</sum></package><package arch="noarch" name="rubygem-rake" release="36.el7" src="ruby-2.0.0.648-36.el7.src.rpm" version="0.9.6"><filename>rubygem-rake-0.9.6-36.el7.noarch.rpm</filename><sum type="sha256">4834b8b3a6ee4debcb21fddc04692e37f8cf488fcecede6ea747bcc290ea8d69</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17742" id="CVE-2017-17742" title="Cve-2017-17742" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000073" id="CVE-2018-1000073" title="Cve-2018-1000073" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074" id="CVE-2018-1000074" title="Cve-2018-1000074" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000075" id="CVE-2018-1000075" title="Cve-2018-1000075" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000076" id="CVE-2018-1000076" title="Cve-2018-1000076" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000077" id="CVE-2018-1000077" title="Cve-2018-1000077" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000078" id="CVE-2018-1000078" title="Cve-2018-1000078" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000079" id="CVE-2018-1000079" title="Cve-2018-1000079" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16396" id="CVE-2018-16396" title="Cve-2018-16396" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6914" id="CVE-2018-6914" title="Cve-2018-6914" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8777" id="CVE-2018-8777" title="Cve-2018-8777" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8778" id="CVE-2018-8778" title="Cve-2018-8778" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8779" id="CVE-2018-8779" title="Cve-2018-8779" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8780" id="CVE-2018-8780" title="Cve-2018-8780" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2028" id="RHSA-2019:2028-1" title="Rhsa-2019:2028-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1547418" id="1547418" title="Cve-2018-1000073 Rubygems: Path Traversal When Writing To A Symlinked Basedir Outside Of The Root" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1547419" id="1547419" title="Cve-2018-1000074 Rubygems: Unsafe Object Deserialization Vulnerability In Gem Owner Allowing Arbitrary Code Execution On Specially Crafted Yaml" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1547420" id="1547420" title="Cve-2018-1000075 Rubygems: Infinite Loop Vulnerability Due To Negative Size In Tar Header Causes Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1547421" id="1547421" title="Cve-2018-1000076 Rubygems: Improper Verification Of Signatures In Tarball Allows To Install Mis-Signed Gem" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1547422" id="1547422" title="Cve-2018-1000077 Rubygems: Missing Url Validation On Spec Home Attribute Allows Malicious Gem To Set An Invalid Homepage Url" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1547425" id="1547425" title="Cve-2018-1000078 Rubygems: Xss Vulnerability In Homepage Attribute When Displayed Via Gem Server" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1547426" id="1547426" title="Cve-2018-1000079 Rubygems: Path Traversal Issue During Gem Installation Allows To Write To Arbitrary Filesystem Locations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1561947" id="1561947" title="Cve-2018-6914 Ruby: Unintentional File And Directory Creation With Directory Traversal In Tempfile And Tmpdir" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1561948" id="1561948" title="Cve-2018-8779 Ruby: Unintentional Socket Creation By Poisoned Null Byte In Unixserver And Unixsocket" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1561949" id="1561949" title="Cve-2018-8780 Ruby: Unintentional Directory Traversal By Poisoned Null Byte In Dir" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1561950" id="1561950" title="Cve-2018-8777 Ruby: Dos By Large Request In Webrick" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1561952" id="1561952" title="Cve-2017-17742 Ruby: Http Response Splitting In Webrick" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1561953" id="1561953" title="Cve-2018-8778 Ruby: Buffer Under-Read In String#Unpack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1585737" id="1585737" title="Backport %Gemspec_{Add,Remove}_File Macros" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1601934" id="1601934" title="Trace On Non Existent Home Directory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1643089" id="1643089" title="Cve-2018-16396 Ruby: Tainted Flags Are Not Propagated In Array#Pack And String#Unpack With Some Directives" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2029-1</id><title>Kernel</title><description>Security Fix(es): 
* Kernel: vhost_net: infinite loop while receiving packets leads to DoS (CVE-2019-3900) 
* Kernel: page cache side channel attacks (CVE-2019-5489) 
* kernel: Buffer overflow in hidp_process_report (CVE-2018-9363) 
* kernel: l2tp: Race condition between pppol2tp_session_create() and l2tp_eth_create() (CVE-2018-9517) 
* kernel: kvm: guest userspace to guest kernel write (CVE-2018-10853) 
* kernel: use-after-free Read in vhost_transport_send_pkt (CVE-2018-14625) 
* kernel: use-after-free in ucma_leave_multicast in drivers/infiniband/core/ucma.c (CVE-2018-14734) 
* kernel: Mishandling of indirect calls weakens Spectre mitigation for paravirtual guests (CVE-2018-15594) 
* kernel: TLB flush happens too late on mremap (CVE-2018-18281) 
* kernel: Heap address information leak while using L2CAP_GET_CONF_OPT (CVE-2019-3459) 
* kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP (CVE-2019-3460) 
* kernel: denial of service vector through vfio DMA mappings (CVE-2019-3882) 
* kernel: fix race condition between mmget_not_zero()/get_task_mm() and core dumping (CVE-2019-11599) 
* kernel: a NULL pointer dereference in drivers/scsi/megaraid/megaraid_sas_base.c leading to DoS (CVE-2019-11810) 
* kernel: fs/ext4/extents.c leads to information disclosure (CVE-2019-11833) 
* kernel: Information exposure in fd_locked_ioctl function in drivers/block/floppy.c (CVE-2018-7755) 
* kernel: Memory leak in drivers/net/wireless/mac80211_hwsim.c:hwsim_new_radio_nl() can lead to potential denial of service (CVE-2018-8087) 
* kernel: HID: debug: Buffer overflow in hid_debug_events_read() in drivers/hid/hid-debug.c (CVE-2018-9516) 
* kernel: Integer overflow in the alarm_timer_nsleep function (CVE-2018-13053) 
* kernel: NULL pointer dereference in lookup_slow function (CVE-2018-13093) 
* kernel: NULL pointer dereference in xfs_da_shrink_inode function (CVE-2018-13094) 
* kernel: NULL pointer dereference in fs/xfs/libxfs/xfs_inode_buf.c (CVE-2018-13095) 
* kernel: Information leak in cdrom_ioctl_drive_status (CVE-2018-16658) 
* kernel: out-of-bound read in memcpy_fromiovecend() (CVE-2018-16885) 
* Kernel: KVM: leak of uninitialized stack contents to guest (CVE-2019-7222)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-debug-devel" release="1062.el7" src="kernel-3.10.0-1062.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1062.el7.x86_64.rpm</filename><sum type="sha256">ca5071e03205bdd59a39910d8a4a3d2c03bcf781dab15c5584391bcbefac3895</sum></package><package arch="x86_64" name="kernel-tools" release="1062.el7" src="kernel-3.10.0-1062.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1062.el7.x86_64.rpm</filename><sum type="sha256">9ca20b7e947f841582326738db014c285ed2cfd49a5be7a0899c084439d38744</sum></package><package arch="x86_64" name="kernel" release="1062.el7" src="kernel-3.10.0-1062.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1062.el7.x86_64.rpm</filename><sum type="sha256">a4ca9692fef93553fdae43550a0fc44c187d1df55c3315ef07d262d62d394779</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1062.el7" src="kernel-3.10.0-1062.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1062.el7.noarch.rpm</filename><sum type="sha256">4cf0e67b1f31d87e3f690aed1d952572709d77b487109e4261794cae45b6dc71</sum></package><package arch="x86_64" name="kernel-debug" release="1062.el7" src="kernel-3.10.0-1062.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1062.el7.x86_64.rpm</filename><sum type="sha256">6ce355a234754990e6b0f95868c2718dc92b20922078f0afbfbba77517bcbc28</sum></package><package arch="noarch" name="kmod-openafs-1.6-sl" release="1.SL77.el7" src="kmod-openafs-1.6-sl-1.6.23-1.SL77.el7.src.rpm" version="1.6.23"><filename>kmod-openafs-1.6-sl-1.6.23-1.SL77.el7.noarch.rpm</filename><sum type="sha256">58feb7290fc3b6fc3633d50c1b99f4df58aafc5f3db17a6bda5145b4653c275a</sum></package><package arch="x86_64" name="perf" release="1062.el7" src="kernel-3.10.0-1062.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1062.el7.x86_64.rpm</filename><sum type="sha256">9a622fd2efcf0053b2f12e6ff725293f6d258ad925ab8aa157aa2503f035d2ff</sum></package><package arch="x86_64" name="kernel-devel" release="1062.el7" src="kernel-3.10.0-1062.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1062.el7.x86_64.rpm</filename><sum type="sha256">f46bd7b2ff6f7d9b974f35c6fb5f481bf459cd092f0f3e0a482ae1d0314f6341</sum></package><package arch="x86_64" name="python-perf" release="1062.el7" src="kernel-3.10.0-1062.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1062.el7.x86_64.rpm</filename><sum type="sha256">efd0a024c2f25d004ed387e821a54f69d4bb7867a68970e4aa6943629d871041</sum></package><package arch="x86_64" name="kernel-headers" release="1062.el7" src="kernel-3.10.0-1062.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1062.el7.x86_64.rpm</filename><sum type="sha256">c3673dc08f46f8bd50c6ba8e33ffbd8b0737882ca5b8fee4de720aff3fb96b59</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1062.el7" src="kernel-3.10.0-1062.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1062.el7.x86_64.rpm</filename><sum type="sha256">799fac0269040859fe62acd4dc5f5ef8a65b68db6519abec5c302952789dca44</sum></package><package arch="x86_64" name="bpftool" release="1062.el7" src="kernel-3.10.0-1062.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1062.el7.x86_64.rpm</filename><sum type="sha256">a0b7aa9b79176e8eabc4c7966cf246ee439de04847d623c7b6cb9d7f1480d61a</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1062.el7" src="kernel-3.10.0-1062.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1062.el7.x86_64.rpm</filename><sum type="sha256">51c372a008839238d24af9d8ac023996bc0b35b4474abe2ca6f448e6c677ddff</sum></package><package arch="x86_64" name="kmod-openafs-1.6-sl-1062" release="289.sl7.1062" src="openafs.SLx-1.6.23-289.src.rpm" version="1.6.23"><filename>kmod-openafs-1.6-sl-1062-1.6.23-289.sl7.1062.x86_64.rpm</filename><sum type="sha256">941d17a6fa3eb287b00224bb15c0ecebddd60512cf8d06584a2819f5e998a4ef</sum></package><package arch="noarch" name="kernel-doc" release="1062.el7" src="kernel-3.10.0-1062.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1062.el7.noarch.rpm</filename><sum type="sha256">f3d9bde4872ee4f712e2f262528987ea7253d620542446fca63e33cbce808beb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10853" id="CVE-2018-10853" title="Cve-2018-10853" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13053" id="CVE-2018-13053" title="Cve-2018-13053" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13093" id="CVE-2018-13093" title="Cve-2018-13093" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13094" id="CVE-2018-13094" title="Cve-2018-13094" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13095" id="CVE-2018-13095" title="Cve-2018-13095" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14625" id="CVE-2018-14625" title="Cve-2018-14625" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14734" id="CVE-2018-14734" title="Cve-2018-14734" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15594" id="CVE-2018-15594" title="Cve-2018-15594" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16658" id="CVE-2018-16658" title="Cve-2018-16658" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16885" id="CVE-2018-16885" title="Cve-2018-16885" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18281" id="CVE-2018-18281" title="Cve-2018-18281" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7755" id="CVE-2018-7755" title="Cve-2018-7755" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8087" id="CVE-2018-8087" title="Cve-2018-8087" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9363" id="CVE-2018-9363" title="Cve-2018-9363" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9516" id="CVE-2018-9516" title="Cve-2018-9516" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9517" id="CVE-2018-9517" title="Cve-2018-9517" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11599" id="CVE-2019-11599" title="Cve-2019-11599" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11810" id="CVE-2019-11810" title="Cve-2019-11810" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11833" id="CVE-2019-11833" title="Cve-2019-11833" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3459" id="CVE-2019-3459" title="Cve-2019-3459" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3460" id="CVE-2019-3460" title="Cve-2019-3460" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882" id="CVE-2019-3882" title="Cve-2019-3882" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900" id="CVE-2019-3900" title="Cve-2019-3900" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5489" id="CVE-2019-5489" title="Cve-2019-5489" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7222" id="CVE-2019-7222" title="Cve-2019-7222" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2029" id="RHSA-2019:2029-1" title="Rhsa-2019:2029-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1335986" id="1335986" title="Bug: Memory Allocation Failure In Inode_Doinit_With_Dentry()/Context_To_Sid()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1436351" id="1436351" title="[Nohz]: Wrong User And System Time Accounting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537033" id="1537033" title="[Rhel7.6] Bug_On(S-&gt;Uptodate &lt; Disks - 1) Condition Encountered In Raid6 Array With 6 Disks And While One Disk Had Failed." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1552203" id="1552203" title="Rhel7.4 Nfs4.1 Client And Server Repeated Sequence / Test_Stateids With Sequence Reply Has Seq4_Status_Recallable_State_Revoked Set - Nfs Server Should Return Nfs4Err_Deleg_Revoked Or Nfs4Err_Bad_Stateid For Revoked Delegations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1553216" id="1553216" title="Cve-2018-7755 Kernel: Information Exposure In Fd_Locked_Ioctl Function In Drivers/Block/Floppy.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555145" id="1555145" title="Cve-2018-8087 Kernel: Memory Leak In Drivers/Net/Wireless/Mac80211_Hwsim.C:Hwsim_New_Radio_Nl() Can Lead To Potential Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1577640" id="1577640" title="Getdents On Cifs With 4K Buffer Loses Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1589890" id="1589890" title="Cve-2018-10853 Kernel: Kvm: Guest Userspace To Guest Kernel Write" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1590228" id="1590228" title="Kernel: Openat With O_Tmpfile And Mode 0 Fails With Eacces (If Not Root)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1593417" id="1593417" title="[Mm] Kernel Bug At Lib/Idr.C:1157, Kmemcg_Id Is -1 When Creating Or Destroying Mem Cgroups" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1597747" id="1597747" title="Cve-2018-13053 Kernel: Integer Overflow In The Alarm_Timer_Nsleep Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1597766" id="1597766" title="Cve-2018-13093 Kernel: Null Pointer Dereference In Lookup_Slow Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1597771" id="1597771" title="Cve-2018-13094 Kernel: Null Pointer Dereference In Xfs_Da_Shrink_Inode Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1597775" id="1597775" title="Cve-2018-13095 Kernel: Null Pointer Dereference In Fs/Xfs/Libxfs/Xfs_Inode_Buf.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1608955" id="1608955" title="Efi Stub: Error: Failed To Alloc Highmem For Initrd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1609699" id="1609699" title="Virtio-Vsock - Guest Kernel Panic With Ctrl+C After Hot-Unplug" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1611005" id="1611005" title="Cve-2018-14734 Kernel: Use-After-Free In Ucma_Leave_Multicast In Drivers/Infiniband/Core/Ucma.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1613056" id="1613056" title="Bug: Selinux Does Not Skip Mmap/Prot_Exec Checks For Internal Files When Invoking Shmat(2)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1616109" id="1616109" title="7.6 Alpha - Lenovo P52 Gnome-Shell, Suspend Reboots Machine" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1616425" id="1616425" title="7.6 Alpha - Lenovo P52 - Screen Goes Blank And Stays Blank(Dies)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1619846" id="1619846" title="Cve-2018-14625 Kernel: Use-After-Free Read In Vhost_Transport_Send_Pkt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1620555" id="1620555" title="Cve-2018-15594 Kernel: Mishandling Of Indirect Calls Weakens Spectre Mitigation For Paravirtual Guests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1622167" id="1622167" title="Fix Potential Divide-By-Zero In Sunrpc Reserved Port Range Calculation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623067" id="1623067" title="Cve-2018-9363 Kernel: Buffer Overflow In Hidp_Process_Report" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1627563" id="1627563" title="[Rhel 7.7] Raid10 Kernel Null Pointer Dereference In Md_Do_Sync During Raid Creation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1627731" id="1627731" title="Cve-2018-16658 Kernel: Information Leak In Cdrom_Ioctl_Drive_Status" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1628378" id="1628378" title="Dm-Cache Does Not Pass Discard I/Os To Origin Storage Device" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1631036" id="1631036" title="Cve-2018-9516 Kernel: Hid: Debug: Buffer Overflow In Hid_Debug_Events_Read() In Drivers/Hid/Hid-Debug.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1631045" id="1631045" title="Cve-2018-9517 Kernel: L2Tp: Race Condition Between Pppol2Tp_Session_Create() And L2Tp_Eth_Create()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1645121" id="1645121" title="Cve-2018-18281 Kernel: Tlb Flush Happens Too Late On Mremap" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1659146" id="1659146" title="Allow Drivers To Set .Force_Blk_Mq In Scsi_Host_Template To Enable Per-Driver Scsi-Mq Usage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1661503" id="1661503" title="Cve-2018-16885 Kernel: Out-Of-Bound Read In Memcpy_Fromiovecend()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1663176" id="1663176" title="Cve-2019-3459 Kernel: Heap Address Information Leak While Using L2Cap_Get_Conf_Opt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1663179" id="1663179" title="Cve-2019-3460 Kernel: Heap Address Information Leak While Using L2Cap_Parse_Conf_Rsp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1664110" id="1664110" title="Cve-2019-5489 Kernel: Page Cache Side Channel Attacks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665990" id="1665990" title="Df Reports Negative Iused Value For Prjquota Set Directories." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1671930" id="1671930" title="Cve-2019-7222 Kernel: Kvm: Leak Of Uninitialized Stack Contents To Guest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1684780" id="1684780" title="Aio O_Direct Writes To Non-Page-Aligned File Locations On Ext4 Can Result In The Overlapped Portion Of The Page Containing Zeros" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1689426" id="1689426" title="Cve-2019-3882 Kernel: Denial Of Service Vector Through Vfio Dma Mappings" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1693457" id="1693457" title="Overlayfs Update To Upstream 4.18" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1698757" id="1698757" title="Cve-2019-3900 Kernel: Vhost_Net: Infinite Loop While Receiving Packets Leads To Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1705937" id="1705937" title="Cve-2019-11599 Kernel: Fix Race Condition Between Mmget_Not_Zero()/Get_Task_Mm() And Core Dumping" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1709164" id="1709164" title="Cve-2019-11810 Kernel: A Null Pointer Dereference In Drivers/Scsi/Megaraid/Megaraid_Sas_Base.C Leading To Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1712072" id="1712072" title="Cve-2019-11833 Kernel: Fs/Ext4/Extents.C Leads To Information Disclosure" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2030-1</id><title>Python</title><description>Security Fix(es): 
* python: Missing salt initialization in _elementtree.c module (CVE-2018-14647) 
* python: NULL pointer dereference using a specially crafted X509 certificate (CVE-2019-5010) 
* python: CRLF injection via the query part of the url passed to urlopen() (CVE-2019-9740) 
* python: CRLF injection via the path part of the url passed to urlopen() (CVE-2019-9947) 
* python: Undocumented local_file protocol allows remote attackers to bypass protection mechanisms (CVE-2019-9948)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-libs" release="86.el7" src="python-2.7.5-86.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-86.el7.x86_64.rpm</filename><sum type="sha256">2cec35cc90145ccc1a33a1f44dd5d3a54eb9fd49e603a8687d3f4fad9562de13</sum></package><package arch="x86_64" name="python" release="86.el7" src="python-2.7.5-86.el7.src.rpm" version="2.7.5"><filename>python-2.7.5-86.el7.x86_64.rpm</filename><sum type="sha256">e9b6d35bc58428e5d112039dfad510c1c54239568063c5ef716fbe8e07be3404</sum></package><package arch="x86_64" name="python-test" release="86.el7" src="python-2.7.5-86.el7.src.rpm" version="2.7.5"><filename>python-test-2.7.5-86.el7.x86_64.rpm</filename><sum type="sha256">38be9321e392383e78a223f56488d2736d9f1a6b569d0a9b029b285b7771a80f</sum></package><package arch="x86_64" name="python-debug" release="86.el7" src="python-2.7.5-86.el7.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-86.el7.x86_64.rpm</filename><sum type="sha256">61ea66c8bb37394e425be7b386d9e3cad40f02460a277b3c62c162ec7ead0b9c</sum></package><package arch="x86_64" name="tkinter" release="86.el7" src="python-2.7.5-86.el7.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-86.el7.x86_64.rpm</filename><sum type="sha256">12d3c7178b77149b5c1dde2af90e961059dd99414c21fd2186935f0251caf976</sum></package><package arch="i686" name="python-libs" release="86.el7" src="python-2.7.5-86.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-86.el7.i686.rpm</filename><sum type="sha256">5e596aa85f4be3af24e4c7b69bde9b47d5f4308f5fe3e84b7e1b6084aefce768</sum></package><package arch="x86_64" name="python-devel" release="86.el7" src="python-2.7.5-86.el7.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-86.el7.x86_64.rpm</filename><sum type="sha256">bbfd5b99b5eb9834756ddbcd2d0aff1c6a6c3b792e4e3694d73cdc3a632d5f70</sum></package><package arch="x86_64" name="python-tools" release="86.el7" src="python-2.7.5-86.el7.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-86.el7.x86_64.rpm</filename><sum type="sha256">3aedf53ea720c6f8b73a3f8eeaf359e857b36830b2ad17c2d13cd730addb7c64</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14647" id="CVE-2018-14647" title="Cve-2018-14647" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5010" id="CVE-2019-5010" title="Cve-2019-5010" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9740" id="CVE-2019-9740" title="Cve-2019-9740" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9947" id="CVE-2019-9947" title="Cve-2019-9947" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9948" id="CVE-2019-9948" title="Cve-2019-9948" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2030" id="RHSA-2019:2030-1" title="Rhsa-2019:2030-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1629982" id="1629982" title="Python Can Sometimes Create Incorrect .Pyc Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1631822" id="1631822" title="Cve-2018-14647 Python: Missing Salt Initialization In _Elementtree.C Module" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1666519" id="1666519" title="Cve-2019-5010 Python: Null Pointer Dereference Using A Specially Crafted X509 Certificate" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1688169" id="1688169" title="Cve-2019-9740 Python: Crlf Injection Via The Query Part Of The Url Passed To Urlopen()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1695570" id="1695570" title="Cve-2019-9948 Python: Undocumented Local_File Protocol Allows Remote Attackers To Bypass Protection Mechanisms" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1695572" id="1695572" title="Cve-2019-9947 Python: Crlf Injection Via The Path Part Of The Url Passed To Urlopen()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1703600" id="1703600" title="Python2-Devel Can'T Be Installed During Rhel 7 To 8 Upgrade Due To Incorrect Obsoletes" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2033-1</id><title>Patch</title><description>Security Fix(es): 
* patch: Out-of-bounds access in pch_write_line function in pch.c (CVE-2016-10713) 
* patch: Double free of memory in pch.c:another_hunk() causes a crash (CVE-2018-6952)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="patch" release="11.el7" src="patch-2.7.1-11.el7.src.rpm" version="2.7.1"><filename>patch-2.7.1-11.el7.x86_64.rpm</filename><sum type="sha256">17c48e5349e58b0f84080293a7ffd33116f6efc011c6b5ca0c7e944ae3363ef0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10713" id="CVE-2016-10713" title="Cve-2016-10713" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6952" id="CVE-2018-6952" title="Cve-2018-6952" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2033" id="RHSA-2019:2033-1" title="Rhsa-2019:2033-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1545053" id="1545053" title="Cve-2018-6952 Patch: Double Free Of Memory In Pch.C:Another_Hunk() Causes A Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1545405" id="1545405" title="Cve-2016-10713 Patch: Out-Of-Bounds Access In Pch_Write_Line Function In Pch.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1626473" id="1626473" title="Rpmbuild Doesn'T Honor &quot;New File Mode 100755&quot; When Applying Patches" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1653294" id="1653294" title="Patch: Gnulib Bundled But No Bundled(Gnulib) Provides" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2035-1</id><title>Python-Requests</title><description>Security Fix(es): 
* python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-requests" release="5.el7" src="python-requests-2.6.0-5.el7.src.rpm" version="2.6.0"><filename>python-requests-2.6.0-5.el7.noarch.rpm</filename><sum type="sha256">5abf96a77b98ef4a701287ee83c569440787b4d004ce880f2cfee3ceead945cf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18074" id="CVE-2018-18074" title="Cve-2018-18074" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2035" id="RHSA-2019:2035-1" title="Rhsa-2019:2035-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1643829" id="1643829" title="Cve-2018-18074 Python-Requests: Redirect From Https To Http Does Not Remove Authorization Header" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2037-1</id><title>Fence-Agents</title><description>* fence-agents: mis-handling of non-ASCII characters in guest comment fields (CVE-2019-10153)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="fence-agents-amt-ws" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-amt-ws-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">d5360918cadc0cb719c82c1256f60468909f4178ab506152977a46ab17ea8675</sum></package><package arch="x86_64" name="fence-agents-redfish" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-redfish-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">97036dd151bcd17f287ba7286a3b24421ebf66a68d2327b90d3aee8e4797aff0</sum></package><package arch="x86_64" name="fence-agents-gce" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-gce-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">fc7bae26e7521d5fd4f2ec66362c3e2ac0a1ceb4309748b78fc920ea969357c2</sum></package><package arch="x86_64" name="fence-agents-hpblade" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-hpblade-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">193dd0f1fc048eaada935d4cecbd95aee6d83972f81682bb1d109da5f20906c6</sum></package><package arch="x86_64" name="fence-agents-rsb" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-rsb-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">bbed2e8a0045036da940102052a6579c343085a418cf071b4860252c0526b4e7</sum></package><package arch="x86_64" name="fence-agents-aws" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-aws-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">4bc0fefe2f6e1ceba779a2f62aec4aa7e735cbd4fe84a6730176604d5129a8a3</sum></package><package arch="x86_64" name="fence-agents-ibmblade" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-ibmblade-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">ab7b259cd10819d57d20d833c1230d7317caca04ed5012025d58d2da4edf40fa</sum></package><package arch="x86_64" name="fence-agents-rsa" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-rsa-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">9a459db7d49e3af9390402e7f63661cf809f822d17c3ac903073737bf7606f81</sum></package><package arch="x86_64" name="fence-agents-mpath" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-mpath-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">1f6007303a59797807a2e3e9f05437caa202726b5babd976da3d6a06f06d6715</sum></package><package arch="x86_64" name="fence-agents-eaton-snmp" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-eaton-snmp-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">00675282f039541328c2a76e1b8453dc79d8c250f7e26eaa2c13685658f9a272</sum></package><package arch="x86_64" name="fence-agents-brocade" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-brocade-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">ce19052315c8728b5e41a674cc7b39a5bfdeddeec4bad2780ee2cced6b9d6b7a</sum></package><package arch="x86_64" name="fence-agents-aliyun" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-aliyun-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">9f165d0f821ca154e68abc4b2cbbe1f56db94e86deee0b455fdd97d507e41f36</sum></package><package arch="x86_64" name="fence-agents-sbd" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-sbd-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">341b3ab294f764dca9bbf7e0aa654d62b6237c3ae002ca1aa7d98bb6353f5ddf</sum></package><package arch="x86_64" name="fence-agents-ipmilan" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-ipmilan-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">f2476f79c4bf545d828f56402bd07cc7446dc2c073de5d8162224bd350f78abf</sum></package><package arch="x86_64" name="fence-agents-kdump" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-kdump-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">8c1d6edbb220a468e36d24e3bccca7288844498b75afc5853e33e431796a922a</sum></package><package arch="x86_64" name="fence-agents-cisco-mds" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-cisco-mds-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">35226a958d4a8d0bdc0c0566232d7af4878863ba87768f3f2b93fa0ed9cda2d9</sum></package><package arch="x86_64" name="fence-agents-eps" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-eps-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">0958d9cd3c0896f279b5fafd77e6d320e1a633ecfda5d63a4ac0313ffafa9818</sum></package><package arch="x86_64" name="fence-agents-cisco-ucs" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-cisco-ucs-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">86ad2c1fd68096c949b8f3db3cbcc16fbe06a53ba0f3d0ff26d9cd2aed7f77ba</sum></package><package arch="x86_64" name="fence-agents-apc-snmp" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-apc-snmp-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">45ab566340ecc97b25f521b20ce37fac8198b2c3cfb42dabcc19ec9d959fe4bb</sum></package><package arch="x86_64" name="fence-agents-vmware-rest" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-vmware-rest-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">0737ed30a112a743db45f853f18b7a67e4b1657f2a6cef6864b3dbe5582fdb25</sum></package><package arch="x86_64" name="fence-agents-scsi" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-scsi-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">ab7bc939a8ef703ff10bdd6e27771834ea876d60a92973a254c065d8d6f54264</sum></package><package arch="x86_64" name="fence-agents-virsh" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-virsh-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">ec9874436205ec8876f568b3fe3c6d620218766671b39e7e22956ad558bfb123</sum></package><package arch="x86_64" name="fence-agents-all" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-all-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">163298feb249c4d5f1719112694a13dc19a3d8940add4f4958b2622f611c47b9</sum></package><package arch="x86_64" name="fence-agents-apc" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-apc-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">6b486c4445561a166eae13bb49159ba909dfd9d1d4853fafd33ba6beaa3a0d50</sum></package><package arch="x86_64" name="fence-agents-ilo2" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-ilo2-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">4a246dcfee4aaa667f1c372f0917b15ca03d6b91b50bc5a31e5a75e2baa13118</sum></package><package arch="x86_64" name="fence-agents-ifmib" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-ifmib-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">504904b836865efb011ae7dd809de147180ba959af7a8b0a79dfe830531284fc</sum></package><package arch="x86_64" name="fence-agents-heuristics-ping" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-heuristics-ping-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">5e99c9c22d631debc82780b27225761a62087fdc92020c1a851458fbe210d90d</sum></package><package arch="x86_64" name="fence-agents-emerson" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-emerson-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">1ec60bc3d868f74ad4e895867477048a7543a4e30a116ccbd7f8da185eb76e82</sum></package><package arch="x86_64" name="fence-agents-common" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-common-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">6c357358f7745321f05487a6990891155de10575686c51ec41179b2ac3255ef6</sum></package><package arch="x86_64" name="fence-agents-bladecenter" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-bladecenter-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">5f783c947c43e915f99631b9fbabc8d39665e0cf7ce11617506c8e832e9e8070</sum></package><package arch="x86_64" name="fence-agents-vmware-soap" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-vmware-soap-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">2fa583f92d997c6a46e3bf1e135ae0bd27a93acacdf4bfdeab18bcd6b8e6c5e6</sum></package><package arch="x86_64" name="fence-agents-rhevm" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-rhevm-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">d46009074c2015d1bc5c64ca6c25fdd63156ef86bae67d0b7f77621061857f76</sum></package><package arch="x86_64" name="fence-agents-azure-arm" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-azure-arm-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">92b29d4fd0481a13e16cb849effe49c9ca682a4bac691332bfb28b2ce81651df</sum></package><package arch="x86_64" name="fence-agents-drac5" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-drac5-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">a055853dbee87977dc6f4a49fd2eff90478aa6016121d50ed968160c12e6b263</sum></package><package arch="x86_64" name="fence-agents-compute" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-compute-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">a5fd3ea32d7f5e2e9e4f0e5825c40f213091bf755cefdb0cfa55efeb75db5e76</sum></package><package arch="x86_64" name="fence-agents-ilo-mp" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-ilo-mp-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">4eb9ae3e87d3cdcc281169f900dfe86aa93cb902d9adc7c4272cb0f4fc3cffe3</sum></package><package arch="x86_64" name="fence-agents-ilo-ssh" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-ilo-ssh-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">2c3b79fddbe8919b3dfc188dd0b966d44f8f27db3949b2164275ee7b857eea43</sum></package><package arch="x86_64" name="fence-agents-ilo-moonshot" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-ilo-moonshot-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">6edc29e4e1b98cc7fe0a30498edcebae36ab420a6dd455e04d14b45f3600a4f1</sum></package><package arch="x86_64" name="fence-agents-intelmodular" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-intelmodular-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">09bb551c7b6a1816014f20b1f6e15d9981e1b1e52eec0dfe5911d7ce38fc85ac</sum></package><package arch="x86_64" name="fence-agents-ipdu" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-ipdu-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">5a38a2b7958c880eb318bc718d469c7c373c35450a91f82975b8cd41e6bfcaa0</sum></package><package arch="x86_64" name="fence-agents-wti" release="24.el7" src="fence-agents-4.2.1-24.el7.src.rpm" version="4.2.1"><filename>fence-agents-wti-4.2.1-24.el7.x86_64.rpm</filename><sum type="sha256">8b6562b8029edc5a2fd24c1352b689ee22f9ff44e9b557e52dbe17aea9e7a091</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10153" id="CVE-2019-10153" title="Cve-2019-10153" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2037" id="RHSA-2019:2037-1" title="Rhsa-2019:2037-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1402862" id="1402862" title="Fence-Rhevm Has To Move To V4 Api Of Rhv (V3 Will Be Deprecated)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1464933" id="1464933" title="[Rfe][Fence-Agents] Fencing Agent For Redfish Api Needed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1608550" id="1608550" title="Fence_Kdump Should Support The Validate-All Command" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1650526" id="1650526" title="Fence_Hpblade.Py Fails With &quot;Typeerror: Log_Expect() Takes Exactly 3 Arguments (4 Given)&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1670460" id="1670460" title="Fence_Rhevm Is Limited To Ascii Content Only, Throwing Stack-Trace On Utf-8 Characters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1709879" id="1709879" title="Fence_Mpath_Check_Hardreboot: Missing Import Ctypes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1716286" id="1716286" title="Cve-2019-10153 Fence-Agents: Mis-Handling Of Non-Ascii Characters In Guest Comment Fields" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2046-1</id><title>Polkit</title><description>Security Fix(es): 
* polkit: Improper handling of user with uid &gt; INT_MAX leading to authentication bypass (CVE-2018-19788)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="polkit-devel" release="22.el7" src="polkit-0.112-22.el7.src.rpm" version="0.112"><filename>polkit-devel-0.112-22.el7.x86_64.rpm</filename><sum type="sha256">593234726ad9d0a1c7951568108bd730059c12cd68ac9cb9fa29ce63fb729299</sum></package><package arch="x86_64" name="polkit" release="22.el7" src="polkit-0.112-22.el7.src.rpm" version="0.112"><filename>polkit-0.112-22.el7.x86_64.rpm</filename><sum type="sha256">44a769568ca617b47151aba4253ce8d805f2b6b4ba100ad4bae73818db152c47</sum></package><package arch="i686" name="polkit-devel" release="22.el7" src="polkit-0.112-22.el7.src.rpm" version="0.112"><filename>polkit-devel-0.112-22.el7.i686.rpm</filename><sum type="sha256">3c04a46041ef2b7e995e31f3e3f36cb4889235f5634752d789f8ca831dbf980c</sum></package><package arch="noarch" name="polkit-docs" release="22.el7" src="polkit-0.112-22.el7.src.rpm" version="0.112"><filename>polkit-docs-0.112-22.el7.noarch.rpm</filename><sum type="sha256">d8398e382bbf16b99dd40e97bf473591ad944538242325b0da65a0ed9ad5142e</sum></package><package arch="i686" name="polkit" release="22.el7" src="polkit-0.112-22.el7.src.rpm" version="0.112"><filename>polkit-0.112-22.el7.i686.rpm</filename><sum type="sha256">76279d1a9e4975730f3bb04c25af91b5e83c49a78552cc04f6e8df5085129f9f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19788" id="CVE-2018-19788" title="Cve-2018-19788" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2046" id="RHSA-2019:2046-1" title="Rhsa-2019:2046-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1655925" id="1655925" title="Cve-2018-19788 Polkit: Improper Handling Of User With Uid &gt; Int_Max Leading To Authentication Bypass" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2047-1</id><title>Libcgroup</title><description>Security Fix(es): 
* libcgroup: cgrulesengd creates log files with insecure permissions (CVE-2018-14348)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libcgroup-pam" release="21.el7" src="libcgroup-0.41-21.el7.src.rpm" version="0.41"><filename>libcgroup-pam-0.41-21.el7.x86_64.rpm</filename><sum type="sha256">bef14fb8755e7a1fe33b3741969931c6d71b91318d8ba7df94aa449d3c159985</sum></package><package arch="i686" name="libcgroup" release="21.el7" src="libcgroup-0.41-21.el7.src.rpm" version="0.41"><filename>libcgroup-0.41-21.el7.i686.rpm</filename><sum type="sha256">7656ddd7d02318c43947836395dd425f938ab2577836e0939e7c66a83a4e04d1</sum></package><package arch="x86_64" name="libcgroup-devel" release="21.el7" src="libcgroup-0.41-21.el7.src.rpm" version="0.41"><filename>libcgroup-devel-0.41-21.el7.x86_64.rpm</filename><sum type="sha256">05a6cda0c377cfcc847242f424594f7c503a0ff1c798c21d07ea5c719d79952e</sum></package><package arch="x86_64" name="libcgroup-tools" release="21.el7" src="libcgroup-0.41-21.el7.src.rpm" version="0.41"><filename>libcgroup-tools-0.41-21.el7.x86_64.rpm</filename><sum type="sha256">d15d295f687f20a6cf2f394166dce74a0431688ff0abffd33bbe5fad76463a39</sum></package><package arch="i686" name="libcgroup-devel" release="21.el7" src="libcgroup-0.41-21.el7.src.rpm" version="0.41"><filename>libcgroup-devel-0.41-21.el7.i686.rpm</filename><sum type="sha256">8525a8f00d62826b904340935358a2ee87f0d058434a642bc61e2077ef236a80</sum></package><package arch="x86_64" name="libcgroup" release="21.el7" src="libcgroup-0.41-21.el7.src.rpm" version="0.41"><filename>libcgroup-0.41-21.el7.x86_64.rpm</filename><sum type="sha256">a518e2fd6ee1012aa24be0467012b3ce43567099732b868e22a8144d4db8ed45</sum></package><package arch="i686" name="libcgroup-pam" release="21.el7" src="libcgroup-0.41-21.el7.src.rpm" version="0.41"><filename>libcgroup-pam-0.41-21.el7.i686.rpm</filename><sum type="sha256">6e3b2d1bb35bb27d5b78baa7673b466efc0d6b6278d2976f2a5d442cbbce3f0a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14348" id="CVE-2018-14348" title="Cve-2018-14348" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2047" id="RHSA-2019:2047-1" title="Rhsa-2019:2047-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1611119" id="1611119" title="Cve-2018-14348 Libcgroup: Cgrulesengd Creates Log Files With Insecure Permissions" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2048-1</id><title>Exempi</title><description>Security Fix(es): 
* exempi: Infinite Loop in Chunk class in XMPFiles/source/FormatSupport/RIFF.cpp (CVE-2017-18233) 
* exempi: Use after free via a PDF file containing JPEG data (CVE-2017-18234) 
* exempi: Infinite loop in ASF_Support::ReadHeaderObject function in XMPFiles/source/FormatSupport/ASF_Support.cpp (CVE-2017-18236) 
* exempi: Infinite loop in TradQT_Manager::ParseCachedBoxes function in XMPFiles/source/FormatSupport/QuickTime_Support.cpp (CVE-2017-18238) 
* exempi: Heap-based buffer overflow in PSD_MetaHandler::CacheFileData function in XMPFiles/source/FormatSupport/PSIR_FileWriter.cpp allows for denial of service via crafted XLS file (CVE-2018-7730)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="exempi" release="9.el7" src="exempi-2.2.0-9.el7.src.rpm" version="2.2.0"><filename>exempi-2.2.0-9.el7.i686.rpm</filename><sum type="sha256">25394520590874140f7aa18c143ddfa3f0210f8670b3c6fe122b01b1ce2b09f1</sum></package><package arch="i686" name="exempi-devel" release="9.el7" src="exempi-2.2.0-9.el7.src.rpm" version="2.2.0"><filename>exempi-devel-2.2.0-9.el7.i686.rpm</filename><sum type="sha256">16dd7be33385d6e9b7cc15dd0cc80b46d8898b95e8bca9ca73dcb8ec1e83b8d2</sum></package><package arch="x86_64" name="exempi" release="9.el7" src="exempi-2.2.0-9.el7.src.rpm" version="2.2.0"><filename>exempi-2.2.0-9.el7.x86_64.rpm</filename><sum type="sha256">a975084cedd91d858c3a11a9acfe001f07f2ee3a2088a4f0d7eb43b10e82dc09</sum></package><package arch="x86_64" name="exempi-devel" release="9.el7" src="exempi-2.2.0-9.el7.src.rpm" version="2.2.0"><filename>exempi-devel-2.2.0-9.el7.x86_64.rpm</filename><sum type="sha256">e318f7b6e35ff75e294e231c0ed3ae86346085235947a50b42ad278380dcf3b7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18233" id="CVE-2017-18233" title="Cve-2017-18233" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18234" id="CVE-2017-18234" title="Cve-2017-18234" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18236" id="CVE-2017-18236" title="Cve-2017-18236" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18238" id="CVE-2017-18238" title="Cve-2017-18238" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7730" id="CVE-2018-7730" title="Cve-2018-7730" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2048" id="RHSA-2019:2048-1" title="Rhsa-2019:2048-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555163" id="1555163" title="Cve-2018-7730 Exempi: Heap-Based Buffer Overflow In Psd_Metahandler::Cachefiledata Function In Xmpfiles/Source/Formatsupport/Psir_Filewriter.Cpp Allows For Denial Of Service Via Crafted Xls File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1558715" id="1558715" title="Cve-2017-18238 Exempi: Infinite Loop In Tradqt_Manager::Parsecachedboxes Function In Xmpfiles/Source/Formatsupport/Quicktime_Support.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1559575" id="1559575" title="Cve-2017-18233 Exempi: Infinite Loop In Chunk Class In Xmpfiles/Source/Formatsupport/Riff.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1559590" id="1559590" title="Cve-2017-18234 Exempi: Use After Free Via A Pdf File Containing Jpeg Data" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1559596" id="1559596" title="Cve-2017-18236 Exempi: Infinite Loop In Asf_Support::Readheaderobject Function In Xmpfiles/Source/Formatsupport/Asf_Support.Cpp" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2049-1</id><title>Libmspack</title><description>Security Fix(es): 
* libmspack: Out-of-bounds write in mspack/cab.h (CVE-2018-18584) 
* libmspack: chmd_read_headers() fails to reject filenames containing NULL bytes (CVE-2018-18585)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libmspack" release="0.7.alpha.el7" src="libmspack-0.5-0.7.alpha.el7.src.rpm" version="0.5"><filename>libmspack-0.5-0.7.alpha.el7.i686.rpm</filename><sum type="sha256">ed481c31b5dcd954a4f9b17f15413090233198db358229aaf304f56ea005348c</sum></package><package arch="x86_64" name="libmspack" release="0.7.alpha.el7" src="libmspack-0.5-0.7.alpha.el7.src.rpm" version="0.5"><filename>libmspack-0.5-0.7.alpha.el7.x86_64.rpm</filename><sum type="sha256">f02ba305946c08a543d80a5923f171bea17b657b1ae93f917f922a3f513269fd</sum></package><package arch="x86_64" name="libmspack-devel" release="0.7.alpha.el7" src="libmspack-0.5-0.7.alpha.el7.src.rpm" version="0.5"><filename>libmspack-devel-0.5-0.7.alpha.el7.x86_64.rpm</filename><sum type="sha256">fed7e74e45dbfb3d53f1e47c88aae7e059c19f2a3deeab3511c0f94e80a8238f</sum></package><package arch="i686" name="libmspack-devel" release="0.7.alpha.el7" src="libmspack-0.5-0.7.alpha.el7.src.rpm" version="0.5"><filename>libmspack-devel-0.5-0.7.alpha.el7.i686.rpm</filename><sum type="sha256">11ff2e0f577ad3457978cf06788ddcc4454659dfe3e9b8bbcf1f15239ba90a4a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18584" id="CVE-2018-18584" title="Cve-2018-18584" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18585" id="CVE-2018-18585" title="Cve-2018-18585" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2049" id="RHSA-2019:2049-1" title="Rhsa-2019:2049-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1644214" id="1644214" title="Cve-2018-18584 Libmspack: Out-Of-Bounds Write In Mspack/Cab.H" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1644215" id="1644215" title="Cve-2018-18585 Libmspack: Chmd_Read_Headers() Fails To Reject Filenames Containing Null Bytes" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2051-1</id><title>Compat-Libtiff3</title><description>Security Fix(es): 
* libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes a denial of service (CVE-2018-7456)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="compat-libtiff3" release="12.el7" src="compat-libtiff3-3.9.4-12.el7.src.rpm" version="3.9.4"><filename>compat-libtiff3-3.9.4-12.el7.i686.rpm</filename><sum type="sha256">0dbc48ddd384bfbe3e80413c9fbc8d8b856dcbe69141ca119d2d58c1f1959ddf</sum></package><package arch="x86_64" name="compat-libtiff3" release="12.el7" src="compat-libtiff3-3.9.4-12.el7.src.rpm" version="3.9.4"><filename>compat-libtiff3-3.9.4-12.el7.x86_64.rpm</filename><sum type="sha256">e2f56b9eab6ab38140c40de97247b9edd2e6b426cb4cf7625b55f53e2e65fbae</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7456" id="CVE-2018-7456" title="Cve-2018-7456" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2051" id="RHSA-2019:2051-1" title="Rhsa-2019:2051-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1556708" id="1556708" title="Cve-2018-7456 Libtiff: Null Pointer Dereference In Tif_Print.C:Tiffprintdirectory() Causes A Denial Of Service" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2052-1</id><title>Libjpeg-Turbo</title><description>Security Fix(es): 
* libjpeg: null pointer dereference in cjpeg (CVE-2016-3616) 
* libjpeg-turbo: heap-based buffer over-read via crafted 8-bit BMP in get_8bit_row in rdbmp.c leads to denial of service (CVE-2018-14498) 
* libjpeg-turbo: Divide By Zero in alloc_sarray function in jmemmgr.c (CVE-2018-11212) 
* libjpeg: Segmentation fault in get_text_gray_row function in rdppm.c (CVE-2018-11213) 
* libjpeg: Segmentation fault in get_text_rgb_row function in rdppm.c (CVE-2018-11214) 
* libjpeg: "cjpeg" utility large loop because read_pixel in rdtarga.c mishandles EOF (CVE-2018-11813)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libjpeg-turbo-static" release="8.el7" src="libjpeg-turbo-1.2.90-8.el7.src.rpm" version="1.2.90"><filename>libjpeg-turbo-static-1.2.90-8.el7.x86_64.rpm</filename><sum type="sha256">679208e525c3cae714a7f71b029182a307a26647c160160301da90eb71662dcd</sum></package><package arch="i686" name="turbojpeg-devel" release="8.el7" src="libjpeg-turbo-1.2.90-8.el7.src.rpm" version="1.2.90"><filename>turbojpeg-devel-1.2.90-8.el7.i686.rpm</filename><sum type="sha256">642cb0655b9144b2de73bb5da105933a7d92320b1543309652eade31349a5df8</sum></package><package arch="x86_64" name="turbojpeg" release="8.el7" src="libjpeg-turbo-1.2.90-8.el7.src.rpm" version="1.2.90"><filename>turbojpeg-1.2.90-8.el7.x86_64.rpm</filename><sum type="sha256">1a41a3c83d3f43a339eea99a6d6df43ec4d66f7cd40fcdb8cd7f18e518cf8ee9</sum></package><package arch="i686" name="libjpeg-turbo-devel" release="8.el7" src="libjpeg-turbo-1.2.90-8.el7.src.rpm" version="1.2.90"><filename>libjpeg-turbo-devel-1.2.90-8.el7.i686.rpm</filename><sum type="sha256">d897738481a4e8574f7089273a351cbd0be3a12a9369cef45219f7e33f450b94</sum></package><package arch="x86_64" name="libjpeg-turbo-utils" release="8.el7" src="libjpeg-turbo-1.2.90-8.el7.src.rpm" version="1.2.90"><filename>libjpeg-turbo-utils-1.2.90-8.el7.x86_64.rpm</filename><sum type="sha256">fd57b64abde40ed19079e33df00ba662acd1933288975f59977d2b35143578d8</sum></package><package arch="x86_64" name="turbojpeg-devel" release="8.el7" src="libjpeg-turbo-1.2.90-8.el7.src.rpm" version="1.2.90"><filename>turbojpeg-devel-1.2.90-8.el7.x86_64.rpm</filename><sum type="sha256">f299409f4c53d1f699a2b34670db6af67b4fe7029579372dd43fd43d5b7c4629</sum></package><package arch="x86_64" name="libjpeg-turbo-devel" release="8.el7" src="libjpeg-turbo-1.2.90-8.el7.src.rpm" version="1.2.90"><filename>libjpeg-turbo-devel-1.2.90-8.el7.x86_64.rpm</filename><sum type="sha256">5d2f5eaf2f05cf2b89ad26a7a7fb90b6426aedce93df5d56380e1193b24d3012</sum></package><package arch="i686" name="turbojpeg" release="8.el7" src="libjpeg-turbo-1.2.90-8.el7.src.rpm" version="1.2.90"><filename>turbojpeg-1.2.90-8.el7.i686.rpm</filename><sum type="sha256">e4216c0137e9a983f5eb8d7c7c0089143599c3a664ddfaa4638c2bf4a34e2fa2</sum></package><package arch="i686" name="libjpeg-turbo" release="8.el7" src="libjpeg-turbo-1.2.90-8.el7.src.rpm" version="1.2.90"><filename>libjpeg-turbo-1.2.90-8.el7.i686.rpm</filename><sum type="sha256">3d18d4c23312ac9fbe7e497e9313d310faf77e063fa83a28f98c6505782a4be1</sum></package><package arch="i686" name="libjpeg-turbo-static" release="8.el7" src="libjpeg-turbo-1.2.90-8.el7.src.rpm" version="1.2.90"><filename>libjpeg-turbo-static-1.2.90-8.el7.i686.rpm</filename><sum type="sha256">2e3e42756a73003ced383a18aaa234d51393154230f51b6f670dd41d9a3267ac</sum></package><package arch="x86_64" name="libjpeg-turbo" release="8.el7" src="libjpeg-turbo-1.2.90-8.el7.src.rpm" version="1.2.90"><filename>libjpeg-turbo-1.2.90-8.el7.x86_64.rpm</filename><sum type="sha256">3c912244cdd5e94707a35f394cb4e5327c1e5519976352970728ed647d9d3103</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3616" id="CVE-2016-3616" title="Cve-2016-3616" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11212" id="CVE-2018-11212" title="Cve-2018-11212" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11213" id="CVE-2018-11213" title="Cve-2018-11213" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11214" id="CVE-2018-11214" title="Cve-2018-11214" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11813" id="CVE-2018-11813" title="Cve-2018-11813" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14498" id="CVE-2018-14498" title="Cve-2018-14498" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2052" id="RHSA-2019:2052-1" title="Rhsa-2019:2052-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1318509" id="1318509" title="Null Pointer Dereference In Libjpeg Library In Cjpeg" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319661" id="1319661" title="Cve-2016-3616 Libjpeg: Null Pointer Dereference In Cjpeg" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1579973" id="1579973" title="Cve-2018-11212 Libjpeg-Turbo: Divide By Zero In Alloc_Sarray Function In Jmemmgr.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1579979" id="1579979" title="Cve-2018-11213 Libjpeg: Segmentation Fault In Get_Text_Gray_Row Function In Rdppm.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1579980" id="1579980" title="Cve-2018-11214 Libjpeg: Segmentation Fault In Get_Text_Rgb_Row Function In Rdppm.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1588803" id="1588803" title="Cve-2018-11813 Libjpeg: &quot;Cjpeg&quot; Utility Large Loop Because Read_Pixel In Rdtarga.C Mishandles Eof" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1687424" id="1687424" title="Cve-2018-14498 Libjpeg-Turbo: Heap-Based Buffer Over-Read Via Crafted 8-Bit Bmp In Get_8Bit_Row In Rdbmp.C Leads To Denial Of Service" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2053-1</id><title>Libtiff</title><description>Security Fix(es): 
* libtiff: buffer overflow in gif2tiff (CVE-2016-3186) 
* libtiff: Heap-based buffer overflow in the cpSeparateBufToContigBuf function resulting in a denial of service or possibly code execution (CVE-2018-12900) 
* libtiff: Out-of-bounds write in tif_jbig.c (CVE-2018-18557) 
* libtiff: NULL pointer dereference in tif_print.c:TIFFPrintDirectory() causes a denial of service (CVE-2018-7456) 
* libtiff: heap-based buffer overflow in tif_lzw.c:LZWDecodeCompat() allows for denial of service (CVE-2018-8905) 
* libtiff: heap-based buffer over-read in TIFFWriteScanline function in tif_write.c (CVE-2018-10779) 
* libtiff: reachable assertion in TIFFWriteDirectorySec function in tif_dirwrite.c (CVE-2018-10963) 
* libtiff: Integer overflow in multiply_ms in tools/ppm2tiff.c (CVE-2018-17100) 
* libtiff: Two out-of-bounds writes in cpTags in tools/tiff2bw.c and tools/pal2rgb.c (CVE-2018-17101) 
* libtiff: tiff2bw tool failed memory allocation leads to crash (CVE-2018-18661)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libtiff-devel" release="32.el7" src="libtiff-4.0.3-32.el7.src.rpm" version="4.0.3"><filename>libtiff-devel-4.0.3-32.el7.i686.rpm</filename><sum type="sha256">409a3f85e272254896f9cda8bf09412f6ff4831e46193ceac02fd9b358d4c1f9</sum></package><package arch="i686" name="libtiff" release="32.el7" src="libtiff-4.0.3-32.el7.src.rpm" version="4.0.3"><filename>libtiff-4.0.3-32.el7.i686.rpm</filename><sum type="sha256">d679df3b5d55b8f7aa5519fb2ab85187baf6a49645aa305caebf4b91f7870be0</sum></package><package arch="x86_64" name="libtiff-static" release="32.el7" src="libtiff-4.0.3-32.el7.src.rpm" version="4.0.3"><filename>libtiff-static-4.0.3-32.el7.x86_64.rpm</filename><sum type="sha256">5d6e4b3177989105899f2d2c5e560d045468ff697b0ae4384a2243676fac2221</sum></package><package arch="x86_64" name="libtiff-devel" release="32.el7" src="libtiff-4.0.3-32.el7.src.rpm" version="4.0.3"><filename>libtiff-devel-4.0.3-32.el7.x86_64.rpm</filename><sum type="sha256">60cc34093bf4f7cc31b5f6e72cd73cc927ea6545e37b302ceb2bdd155de679ff</sum></package><package arch="x86_64" name="libtiff" release="32.el7" src="libtiff-4.0.3-32.el7.src.rpm" version="4.0.3"><filename>libtiff-4.0.3-32.el7.x86_64.rpm</filename><sum type="sha256">004f9399979a65c6027e4f891790505a36656e79b5981e1405912aebff254613</sum></package><package arch="i686" name="libtiff-static" release="32.el7" src="libtiff-4.0.3-32.el7.src.rpm" version="4.0.3"><filename>libtiff-static-4.0.3-32.el7.i686.rpm</filename><sum type="sha256">42dd6b45af27dc78696762c980f62a3493433d287d9f8bacd5a6053f9341fcaa</sum></package><package arch="x86_64" name="libtiff-tools" release="32.el7" src="libtiff-4.0.3-32.el7.src.rpm" version="4.0.3"><filename>libtiff-tools-4.0.3-32.el7.x86_64.rpm</filename><sum type="sha256">7bea8ee091862ca222bbcfda38275bed5348f381166fdfc9f5f1f39997419528</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3186" id="CVE-2016-3186" title="Cve-2016-3186" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10779" id="CVE-2018-10779" title="Cve-2018-10779" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10963" id="CVE-2018-10963" title="Cve-2018-10963" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12900" id="CVE-2018-12900" title="Cve-2018-12900" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17100" id="CVE-2018-17100" title="Cve-2018-17100" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17101" id="CVE-2018-17101" title="Cve-2018-17101" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18557" id="CVE-2018-18557" title="Cve-2018-18557" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18661" id="CVE-2018-18661" title="Cve-2018-18661" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7456" id="CVE-2018-7456" title="Cve-2018-7456" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8905" id="CVE-2018-8905" title="Cve-2018-8905" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2053" id="RHSA-2019:2053-1" title="Rhsa-2019:2053-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319503" id="1319503" title="Buffer Overflow In Gif2Tiff" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1319666" id="1319666" title="Cve-2016-3186 Libtiff: Buffer Overflow In Gif2Tiff" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1556708" id="1556708" title="Cve-2018-7456 Libtiff: Null Pointer Dereference In Tif_Print.C:Tiffprintdirectory() Causes A Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1559704" id="1559704" title="Cve-2018-8905 Libtiff: Heap-Based Buffer Overflow In Tif_Lzw.C:Lzwdecodecompat() Allows For Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1577311" id="1577311" title="Cve-2018-10779 Libtiff: Heap-Based Buffer Over-Read In Tiffwritescanline Function In Tif_Write.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1579058" id="1579058" title="Cve-2018-10963 Libtiff: Reachable Assertion In Tiffwritedirectorysec Function In Tif_Dirwrite.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595575" id="1595575" title="Cve-2018-12900 Libtiff: Heap-Based Buffer Overflow In The Cpseparatebuftocontigbuf Function Resulting In A Denial Of Service Or Possibly Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1631069" id="1631069" title="Cve-2018-17100 Libtiff: Integer Overflow In Multiply_Ms In Tools/Ppm2Tiff.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1631078" id="1631078" title="Cve-2018-17101 Libtiff: Two Out-Of-Bounds Writes In Cptags In Tools/Tiff2Bw.C And Tools/Pal2Rgb.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1644229" id="1644229" title="Cve-2018-18557 Libtiff: Out-Of-Bounds Write In Tif_Jbig.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1644448" id="1644448" title="Cve-2018-18661 Libtiff: Tiff2Bw Tool Failed Memory Allocation Leads To Crash" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2057-1</id><title>Bind</title><description>The following packages have been upgraded to a later upstream version: bind (9.11.4). 
Security Fix(es): 
* bind: Incorrect documentation of krb5-subdomain and ms-subdomain update policies (CVE-2018-5741)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-9.11.4-9.P2.el7.x86_64.rpm</filename><sum type="sha256">1e747576450b306fd44dc35c12b21e2ea89cdc68f8fe2d73e1fc7892581def02</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-9.P2.el7.x86_64.rpm</filename><sum type="sha256">3d9d3b7024d8109f4b53db78e8f41220fd8ed79489262590685dbc87a8d42ba7</sum></package><package arch="noarch" epoch="32" name="bind-license" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-9.P2.el7.noarch.rpm</filename><sum type="sha256">710bfa21b7be185487418ad3703d316262fa19490ced3fc51a4aee95453a07ad</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-9.P2.el7.x86_64.rpm</filename><sum type="sha256">aba22b0045efa6620c0f2c6e951b55c6a84d15c8ff7398f262cd4237135bbf62</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-9.P2.el7.x86_64.rpm</filename><sum type="sha256">f894d2964d4e05dc52364106657aa5ce97401b281e0aa50a8f1709586d533534</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-9.P2.el7.i686.rpm</filename><sum type="sha256">d48d493ea03c8d848889c59a6f5c34c15ce8f0bc85460b9f4cb3a6e3424e76c7</sum></package><package arch="i686" epoch="32" name="bind-devel" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-9.P2.el7.i686.rpm</filename><sum type="sha256">a3d2fc224fceeab1a47594f5b9423cd1fcaf9bce566735e5a5b611c85d1ed52f</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-9.P2.el7.x86_64.rpm</filename><sum type="sha256">16e84b5a2871fc52eae749d37f502b526866682e5719ff308eaa029fd3916e75</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-9.P2.el7.i686.rpm</filename><sum type="sha256">e73fcb276e2dd481f68f0722cbe36f01f776f5aaf24a42a67c605663c3b4dd5a</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-9.P2.el7.x86_64.rpm</filename><sum type="sha256">2235c369edf68efdaf875afd448544f7880086016925571f6001cd993171205f</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-9.P2.el7.x86_64.rpm</filename><sum type="sha256">e8ce3b78c784eac2b5e1d339412ee0e6260b16e63d9ab209c2551a84b93aff05</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-9.P2.el7.i686.rpm</filename><sum type="sha256">310374f182f34550c34d36d4a1d2888365ae608e04efb9617f66d2c0f988b05c</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-9.P2.el7.x86_64.rpm</filename><sum type="sha256">41f9010cc0ddbd6d023a941716e70b42124a48421bbff57065875b1babe64882</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-9.P2.el7.x86_64.rpm</filename><sum type="sha256">778aa56f823ee3f2f9da73fd659d42e9788c9654b84d15f239bd23ea5d4c7b11</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-9.P2.el7.x86_64.rpm</filename><sum type="sha256">71829fc942974d6c8565d8f15173b5d746ef12e8499bc4dd92cf7ccbf9b49f61</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-9.P2.el7.x86_64.rpm</filename><sum type="sha256">40f6bf6c7f91027e8c10eadefdd22e25401c2ced8f9cbdbac57b5f8fc6a23af0</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-9.P2.el7.i686.rpm</filename><sum type="sha256">337c0047175ed7068d077ff5f190cb4f8608a97946d38b36456fa071ce80e89f</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-9.P2.el7.x86_64.rpm</filename><sum type="sha256">d2a9e4e3b6df7ee5c079ab98d2a6b41089718325af4e2183d930ad237d7fc841</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-9.P2.el7.x86_64.rpm</filename><sum type="sha256">a60a63f69302dd2e2637119ef6458a2c4c4e301b8b566a425a1bca2f23eba03d</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-9.P2.el7.x86_64.rpm</filename><sum type="sha256">36ca856375317548bcfd9acecd9f280051503a3d2f78239cf9707809ed296ff2</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-9.P2.el7.i686.rpm</filename><sum type="sha256">61abe33a603ac7c8fd2810655173598176ec0548bcda1970558ff65da7ed30e3</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-9.P2.el7.x86_64.rpm</filename><sum type="sha256">9dda045215e7b7623535996b4dcbd1c47061d96123b81e4fd0c2df8a9f42639c</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-9.P2.el7.i686.rpm</filename><sum type="sha256">82400dfea91a07ce5b877fb74c92b6efdc5203c5a0204469f1c10ad31f994d15</sum></package><package arch="i686" epoch="32" name="bind-libs" release="9.P2.el7" src="bind-9.11.4-9.P2.el7.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-9.P2.el7.i686.rpm</filename><sum type="sha256">d00dd97941c6f973f66a9c2e2f12acce418488e38d012aee91dc7e2caf1794ed</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5741" id="CVE-2018-5741" title="Cve-2018-5741" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2057" id="RHSA-2019:2057-1" title="Rhsa-2019:2057-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1520808" id="1520808" title="B-Root-Server'S Ip-Address In Named.Ca Is Old." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1578128" id="1578128" title="[Rfe] Provide Delv Functionality" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1630058" id="1630058" title="Bind Does Not Support The &quot;Log&quot; Keyword In A Response-Policy Zone Definitions (Feature From Bind 9.11)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1630160" id="1630160" title="Internal Testsuite Uses Command Dig Instead Of Variable $Dig" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1631131" id="1631131" title="Cve-2018-5741 Bind: Incorrect Documentation Of Krb5-Subdomain And Ms-Subdomain Update Policies" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1631407" id="1631407" title="Man Rndc Should Mention &quot;Negative Trust Anchors&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1640561" id="1640561" title="[Rfe] Rebase To Esv Bind 9.11" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1676661" id="1676661" title="Named User Has Outdated /Bin/False As A Shell" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1685940" id="1685940" title="Libisc Doesn'T Initialize Entropy Pool For Ssl Context" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1720703" id="1720703" title="Latest Bind (9.9) Update Now Causes Zone Transfer To Always Fail." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2060-1</id><title>Dhcp</title><description>Security Fix(es): 
* dhcp: double-deletion of the released addresses in the dhcpv6 code leading to crash and possible DoS (CVE-2019-6470)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="12" name="dhcp-common" release="77.sl7" src="dhcp-4.2.5-77.sl7.src.rpm" version="4.2.5"><filename>dhcp-common-4.2.5-77.sl7.x86_64.rpm</filename><sum type="sha256">5865ec15f45ec81d0b40e23d55428b92cc519c26096e9a0969b2c00f34a6e216</sum></package><package arch="x86_64" epoch="12" name="dhcp-devel" release="77.sl7" src="dhcp-4.2.5-77.sl7.src.rpm" version="4.2.5"><filename>dhcp-devel-4.2.5-77.sl7.x86_64.rpm</filename><sum type="sha256">83eff4bbbf960f2e6eba6aceac399ade55c5db539d64d1c6dcc83637db639b78</sum></package><package arch="x86_64" epoch="12" name="dhclient" release="77.sl7" src="dhcp-4.2.5-77.sl7.src.rpm" version="4.2.5"><filename>dhclient-4.2.5-77.sl7.x86_64.rpm</filename><sum type="sha256">b4e198ba533ed6e69e6aaef2a4993e3f5cd285276759ce954bf81447065e95eb</sum></package><package arch="x86_64" epoch="12" name="dhcp-libs" release="77.sl7" src="dhcp-4.2.5-77.sl7.src.rpm" version="4.2.5"><filename>dhcp-libs-4.2.5-77.sl7.x86_64.rpm</filename><sum type="sha256">e35df8a762fed441e029c6f560f8976bce8115bd3a21be7069f37876946531f8</sum></package><package arch="i686" epoch="12" name="dhcp-libs" release="77.sl7" src="dhcp-4.2.5-77.sl7.src.rpm" version="4.2.5"><filename>dhcp-libs-4.2.5-77.sl7.i686.rpm</filename><sum type="sha256">77483ade12fd99f9ed47dad5064007eed957185851aeed6cdc85e5616b6facf3</sum></package><package arch="i686" epoch="12" name="dhcp-devel" release="77.sl7" src="dhcp-4.2.5-77.sl7.src.rpm" version="4.2.5"><filename>dhcp-devel-4.2.5-77.sl7.i686.rpm</filename><sum type="sha256">a0c59989fc999e407d935b903e31a397222e9a0e9b391d3a083bc1dce6f7306e</sum></package><package arch="x86_64" epoch="12" name="dhcp" release="77.sl7" src="dhcp-4.2.5-77.sl7.src.rpm" version="4.2.5"><filename>dhcp-4.2.5-77.sl7.x86_64.rpm</filename><sum type="sha256">94b415d6a2271f40f8361c75af907936f77998ee859cb3812ffb311a5e957bb1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6470" id="CVE-2019-6470" title="Cve-2019-6470" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2060" id="RHSA-2019:2060-1" title="Rhsa-2019:2060-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1574292" id="1574292" title="&quot;Dhclient -I&quot; Shows &quot;Cant Find Device Client&quot; After Upgrade" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1613174" id="1613174" title="Isc Dhcpd Cannot Start Tls Session To 389-Ds After Updating Openldap Rpm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623792" id="1623792" title="/Var/Lib/Dhcpd/Dhcpd.Leases: File Is Too Long To Buffer. Is Displayed When Dhcpd Tries To Start." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1672308" id="1672308" title="Avoid Unnecessary Dhcpd Restarts By Networkmanager On Certain Up Events W.R.T. Bug #565921" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677382" id="1677382" title="Dhcp Does Not Compile With Rebased Bind 9.11" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1708641" id="1708641" title="Cve-2019-6470 Dhcp: Double-Deletion Of The Released Addresses In The Dhcpv6 Code Leading To Crash And Possible Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2075-1</id><title>Binutils</title><description>Security Fix(es): 
* binutils: integer overflow leads to heap-based buffer overflow in objdump (CVE-2018-1000876) 
* binutils: Stack Exhaustion in the demangling functions provided by libiberty (CVE-2018-12641) 
* binutils: NULL pointer dereference in work_stuff_copy_to_from in cplus- dem.c. (CVE-2018-12697)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="binutils-devel" release="41.base.el7" src="binutils-2.27-41.base.el7.src.rpm" version="2.27"><filename>binutils-devel-2.27-41.base.el7.i686.rpm</filename><sum type="sha256">58a33f3df9d8d1ff800fad12c24ecae4444ff14d80ef07c032ece079d8ef21d0</sum></package><package arch="x86_64" name="binutils" release="41.base.el7" src="binutils-2.27-41.base.el7.src.rpm" version="2.27"><filename>binutils-2.27-41.base.el7.x86_64.rpm</filename><sum type="sha256">b16aef9ddf8d212343bad96bb41af4908bf503693eb0b471f1e70254c20fed83</sum></package><package arch="x86_64" name="binutils-devel" release="41.base.el7" src="binutils-2.27-41.base.el7.src.rpm" version="2.27"><filename>binutils-devel-2.27-41.base.el7.x86_64.rpm</filename><sum type="sha256">241f249d38afebf4db8bbe0d1cacfd4d69eb0ba8d22fa715a360a9dcedc0c4ab</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000876" id="CVE-2018-1000876" title="Cve-2018-1000876" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12641" id="CVE-2018-12641" title="Cve-2018-12641" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12697" id="CVE-2018-12697" title="Cve-2018-12697" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2075" id="RHSA-2019:2075-1" title="Rhsa-2019:2075-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1594410" id="1594410" title="Cve-2018-12641 Binutils: Stack Exhaustion In The Demangling Functions Provided By Libiberty" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595417" id="1595417" title="Cve-2018-12697 Binutils: Null Pointer Dereference In Work_Stuff_Copy_To_From In Cplus-Dem.C." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1624776" id="1624776" title="Binutils: Ld Removes Some R_X86_64_Jump_Slot Relocations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1652587" id="1652587" title="Add Support For The .Attach_To_Group Pseudo-Op To The Assembler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1664699" id="1664699" title="Cve-2018-1000876 Binutils: Integer Overflow Leads To Heap-Based Buffer Overflow In Objdump" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1670014" id="1670014" title="Binutils: Enable Gold Linker On All Architectures With Upstream Implementation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1699745" id="1699745" title="Failed Ld Plt-Main/Pltgot Test Cases" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2077-1</id><title>Ntp</title><description>Security Fix(es): 
* ntp: Stack-based buffer overflow in ntpq and ntpdc allows denial of service or code execution (CVE-2018-12327)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ntp-doc" release="29.el7" src="ntp-4.2.6p5-29.el7.src.rpm" version="4.2.6p5"><filename>ntp-doc-4.2.6p5-29.el7.noarch.rpm</filename><sum type="sha256">10bd2e9e78e9f68f9862319885e4b39c71e7afa026738e378eceb4f0b2a0be40</sum></package><package arch="x86_64" name="sntp" release="29.el7" src="ntp-4.2.6p5-29.el7.src.rpm" version="4.2.6p5"><filename>sntp-4.2.6p5-29.el7.x86_64.rpm</filename><sum type="sha256">6a1d74a67c26d2865b769d01cec6008189de9a3468d7b70c0b950e5e15b33da6</sum></package><package arch="x86_64" name="ntpdate" release="29.el7" src="ntp-4.2.6p5-29.el7.src.rpm" version="4.2.6p5"><filename>ntpdate-4.2.6p5-29.el7.x86_64.rpm</filename><sum type="sha256">a1639fb30d51ecc198232bed1b60058309db02a580afccb0c92b1e4b3827d6bc</sum></package><package arch="noarch" name="ntp-perl" release="29.el7" src="ntp-4.2.6p5-29.el7.src.rpm" version="4.2.6p5"><filename>ntp-perl-4.2.6p5-29.el7.noarch.rpm</filename><sum type="sha256">96050106e75f675389902209714d73600585be8beb1dcc6295d9c6a2f626b9c9</sum></package><package arch="x86_64" name="ntp" release="29.el7" src="ntp-4.2.6p5-29.el7.src.rpm" version="4.2.6p5"><filename>ntp-4.2.6p5-29.el7.x86_64.rpm</filename><sum type="sha256">a3d1b723213098195e119adb864f806566b2e393b31242ba3b1012358babc856</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12327" id="CVE-2018-12327" title="Ntp: Stack-Based Buffer Overflow In Ntpq And" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2077" id="RHSA-2019:2077-1" title="Rhsa-2019:2077-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1550637" id="1550637" title="Server Time Not Being Synchronised With Ntp After Upgrading Ntp Packages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1593580" id="1593580" title="Ntp: Stack-Based Buffer Overflow In Ntpq And" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2078-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* QEMU: Slirp: information leakage in tcp_emu() due to uninitialized stack variables (CVE-2019-9824)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="167.el7" src="qemu-kvm-1.5.3-167.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-167.el7.x86_64.rpm</filename><sum type="sha256">4dadf9034add07c6ba471fc8d9af885bbb854a771312e5177b2eba130b37c436</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="167.el7" src="qemu-kvm-1.5.3-167.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-167.el7.x86_64.rpm</filename><sum type="sha256">dc107fa62a41cfd2508bfcca57e5793cc67efdb9ec72376f1bc379866dc33a69</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="167.el7" src="qemu-kvm-1.5.3-167.el7.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-167.el7.x86_64.rpm</filename><sum type="sha256">d20cfd994cab77aa1d0628f94a4369adf4229f9d067274f59bdd12c9d1b2133d</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="167.el7" src="qemu-kvm-1.5.3-167.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-167.el7.x86_64.rpm</filename><sum type="sha256">f8d6e871854394ef265d4f15117a25762e13e3b02e05e7ebbcf7d36994a80d44</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9824" id="CVE-2019-9824" title="Qemu: Slirp: Information Leakage In Tcp_Emu() " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2078" id="RHSA-2019:2078-1" title="Rhsa-2019:2078-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1654627" id="1654627" title="Qemu: Hw: Bt: Keep Bt/* Objects From Building [Rhel-7.7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658407" id="1658407" title="Mode=&quot;Host-Model&quot; Vms Include Broken &quot;Arch-Facilities&quot; Flag Name [Qemu-Kvm]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1659229" id="1659229" title="Ballooning Is Incompatible With Vfio Assigned Devices, But Not Prevented" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1678515" id="1678515" title="Qemu: Slirp: Information Leakage In Tcp_Emu() " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1686253" id="1686253" title="Bitmap Merge: Segment Fault When Merge With A Not Existed Src_Name In Transaction Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1709495" id="1709495" title="Change Cpuid[0X40000000].Eax From 0 To Kvm_Cpuid_Fe...Atures (0X40000001)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2079-1</id><title>Xorg</title><description>Security Fix(es): 
* libX11: Crash on invalid reply in XListExtensions in ListExt.c (CVE-2018-14598) 
* libX11: Off-by-one error in XListExtensions in ListExt.c (CVE-2018-14599) 
* libX11: Out of Bounds write in XListExtensions in ListExt.c (CVE-2018-14600) 
* libxkbcommon: Invalid free in ExprAppendMultiKeysymList resulting in a crash (CVE-2018-15857) 
* libxkbcommon: Endless recursion in xkbcomp/expr.c resulting in a crash (CVE-2018-15853) 
* libxkbcommon: NULL pointer dereference resulting in a crash (CVE-2018-15854) 
* libxkbcommon: NULL pointer dereference when handling xkb_geometry (CVE-2018-15855) 
* libxkbcommon: Infinite loop when reaching EOL unexpectedly resulting in a crash (CVE-2018-15856) 
* libxkbcommon: NULL pointer dereference when parsing invalid atoms in ExprResolveLhs resulting in a crash (CVE-2018-15859) 
* libxkbcommon: NULL pointer dereference in ExprResolveLhs resulting in a crash (CVE-2018-15861) 
* libxkbcommon: NULL pointer dereference in LookupModMask resulting in a crash (CVE-2018-15862) 
* libxkbcommon: NULL pointer dereference in ResolveStateAndPredicate resulting in a crash (CVE-2018-15863) 
* libxkbcommon: NULL pointer dereference in resolve_keysym resulting in a crash (CVE-2018-15864)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="xorg-x11-drv-wacom-devel" release="3.el7" src="xorg-x11-drv-wacom-0.36.1-3.el7.src.rpm" version="0.36.1"><filename>xorg-x11-drv-wacom-devel-0.36.1-3.el7.i686.rpm</filename><sum type="sha256">ab300556a07abeaa6bfee14bad024b2722a80fcfbb1f9a332cad47189af1dd11</sum></package><package arch="x86_64" name="libxkbcommon-x11" release="3.el7" src="libxkbcommon-0.7.1-3.el7.src.rpm" version="0.7.1"><filename>libxkbcommon-x11-0.7.1-3.el7.x86_64.rpm</filename><sum type="sha256">cd4daf47a4b371d75ddb6dbac951a847050dfe67c68868dccb09290860947853</sum></package><package arch="x86_64" name="mesa-libGLw-devel" release="5.el7" src="mesa-libGLw-8.0.0-5.el7.src.rpm" version="8.0.0"><filename>mesa-libGLw-devel-8.0.0-5.el7.x86_64.rpm</filename><sum type="sha256">1d63beb80e0e1291d305a3e75909fb711ea5196eaf7605a4fbd4a375d3882280</sum></package><package arch="i686" name="libX11-devel" release="2.el7" src="libX11-1.6.7-2.el7.src.rpm" version="1.6.7"><filename>libX11-devel-1.6.7-2.el7.i686.rpm</filename><sum type="sha256">8f659c533c8a51353f254fb03f10e2bc5828127d7332943ad43399c1027370c1</sum></package><package arch="x86_64" epoch="1" name="gdm-devel" release="16.el7" src="gdm-3.28.2-16.el7.src.rpm" version="3.28.2"><filename>gdm-devel-3.28.2-16.el7.x86_64.rpm</filename><sum type="sha256">420fd8f5035a74aa1d4124d2d443e0eb6ab1ece4b2743ba35eb5e746eadf49a9</sum></package><package arch="i686" name="libxkbcommon-x11" release="3.el7" src="libxkbcommon-0.7.1-3.el7.src.rpm" version="0.7.1"><filename>libxkbcommon-x11-0.7.1-3.el7.i686.rpm</filename><sum type="sha256">9dafc5f1f6c39f1e723c71aa3dfc43763cb4eec143ad983a2f8b30b2e7d068a3</sum></package><package arch="x86_64" name="libxkbcommon-x11-devel" release="3.el7" src="libxkbcommon-0.7.1-3.el7.src.rpm" version="0.7.1"><filename>libxkbcommon-x11-devel-0.7.1-3.el7.x86_64.rpm</filename><sum type="sha256">b73bd5f3b2521d6c1c44d280d3722517e73f9b5025267cdb668f879db01c1948</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="7.el7" src="xorg-x11-server-1.20.4-7.el7.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-7.el7.x86_64.rpm</filename><sum type="sha256">09756f301958e6d427b6f6ce2e250c7def16332de7fb2ff4d220ae24c6515e2f</sum></package><package arch="i686" name="xorg-x11-server-devel" release="7.el7" src="xorg-x11-server-1.20.4-7.el7.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-7.el7.i686.rpm</filename><sum type="sha256">824e719e037cff7c48cad7703b448431a01f0bc51e4e1fc6ff0917a74892b670</sum></package><package arch="i686" name="libxkbcommon-devel" release="3.el7" src="libxkbcommon-0.7.1-3.el7.src.rpm" version="0.7.1"><filename>libxkbcommon-devel-0.7.1-3.el7.i686.rpm</filename><sum type="sha256">80da18324acb830e34ecafab3af92ad1b235e0efae0f819c3492bbc84d32675b</sum></package><package arch="i686" name="mesa-libGLw-devel" release="5.el7" src="mesa-libGLw-8.0.0-5.el7.src.rpm" version="8.0.0"><filename>mesa-libGLw-devel-8.0.0-5.el7.i686.rpm</filename><sum type="sha256">154d620ab9dfa702a6ffe254ec1d05634b243f12c44773944038cdd0584a1f6c</sum></package><package arch="x86_64" name="xorg-x11-drv-wacom" release="3.el7" src="xorg-x11-drv-wacom-0.36.1-3.el7.src.rpm" version="0.36.1"><filename>xorg-x11-drv-wacom-0.36.1-3.el7.x86_64.rpm</filename><sum type="sha256">b3fbf0026c73bce3c42c8223ca7e9b4c977f7312ec3e067404cb4ad422fda068</sum></package><package arch="i686" epoch="1" name="gdm" release="16.el7" src="gdm-3.28.2-16.el7.src.rpm" version="3.28.2"><filename>gdm-3.28.2-16.el7.i686.rpm</filename><sum type="sha256">b6d9ec2cbe608ceb486a46bb355819e6cb173c303c043040efacb0542ac644cb</sum></package><package arch="i686" name="libxkbcommon" release="3.el7" src="libxkbcommon-0.7.1-3.el7.src.rpm" version="0.7.1"><filename>libxkbcommon-0.7.1-3.el7.i686.rpm</filename><sum type="sha256">93f8e484981911cd4a44647815e70cf003ae1c00cd84c826506375f18de67d08</sum></package><package arch="x86_64" name="libX11" release="2.el7" src="libX11-1.6.7-2.el7.src.rpm" version="1.6.7"><filename>libX11-1.6.7-2.el7.x86_64.rpm</filename><sum type="sha256">f3e76ba41f4a744fe50ba37d9feb7836a6bb33d5519f1c6b7b340bf8ea70ea63</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="7.el7" src="xorg-x11-server-1.20.4-7.el7.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-7.el7.x86_64.rpm</filename><sum type="sha256">dbb7353e9ff1d79092d04c7e0723acacec935d4e6f359a249bf2c2ae74e80a7e</sum></package><package arch="i686" name="libxkbcommon-x11-devel" release="3.el7" src="libxkbcommon-0.7.1-3.el7.src.rpm" version="0.7.1"><filename>libxkbcommon-x11-devel-0.7.1-3.el7.i686.rpm</filename><sum type="sha256">92d1e0613446b46d272346cad5c4b40c99c14f471209e7d5dde7676468827fb2</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="7.el7" src="xorg-x11-server-1.20.4-7.el7.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-7.el7.x86_64.rpm</filename><sum type="sha256">fb84aa3e3cdb84937e3a431b2e2c26b705b9eecfc70408576af3cc40e6e29658</sum></package><package arch="x86_64" epoch="1" name="gdm-pam-extensions-devel" release="16.el7" src="gdm-3.28.2-16.el7.src.rpm" version="3.28.2"><filename>gdm-pam-extensions-devel-3.28.2-16.el7.x86_64.rpm</filename><sum type="sha256">e8c5fb34d5bce9dfc5bf458689d6f4bf54f7ef0245e97162ef635f921b4b9c95</sum></package><package arch="i686" epoch="1" name="gdm-pam-extensions-devel" release="16.el7" src="gdm-3.28.2-16.el7.src.rpm" version="3.28.2"><filename>gdm-pam-extensions-devel-3.28.2-16.el7.i686.rpm</filename><sum type="sha256">9b680e6218e0cdd67763de96299deeff9a9e08ea72e9167fd31d0c1c9c54a5e9</sum></package><package arch="x86_64" name="libxkbcommon-devel" release="3.el7" src="libxkbcommon-0.7.1-3.el7.src.rpm" version="0.7.1"><filename>libxkbcommon-devel-0.7.1-3.el7.x86_64.rpm</filename><sum type="sha256">17d5b89129bc3dc9d7cabfe05a1f8c6e3c21326aa9c7a21cf1acb69c87f6bf4d</sum></package><package arch="i686" name="libX11" release="2.el7" src="libX11-1.6.7-2.el7.src.rpm" version="1.6.7"><filename>libX11-1.6.7-2.el7.i686.rpm</filename><sum type="sha256">92d7b388f5dc8881aef0455879eaf520837e101068b4c70298cbebf7aeb73d18</sum></package><package arch="noarch" name="libX11-common" release="2.el7" src="libX11-1.6.7-2.el7.src.rpm" version="1.6.7"><filename>libX11-common-1.6.7-2.el7.noarch.rpm</filename><sum type="sha256">9b2675f6e611922d7f0771e8ba88cd1252a190e71387a6076a5bcac988b15dc7</sum></package><package arch="i686" name="mesa-libGLw" release="5.el7" src="mesa-libGLw-8.0.0-5.el7.src.rpm" version="8.0.0"><filename>mesa-libGLw-8.0.0-5.el7.i686.rpm</filename><sum type="sha256">90bb80b8ef51b9f3fde8b9fff63952b38619c679f91386a16c47f0546c4b0941</sum></package><package arch="noarch" name="xorg-x11-server-source" release="7.el7" src="xorg-x11-server-1.20.4-7.el7.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-7.el7.noarch.rpm</filename><sum type="sha256">bb783221f8291f03a3a71274bfa7d5310e5f9af8b2762994a9bfca7c0c1226ad</sum></package><package arch="x86_64" name="xorg-x11-drv-ati" release="2.el7" src="xorg-x11-drv-ati-19.0.1-2.el7.src.rpm" version="19.0.1"><filename>xorg-x11-drv-ati-19.0.1-2.el7.x86_64.rpm</filename><sum type="sha256">d49904af575d427945d5dfe7ad7d4ce208512db2f7aec82fff138a4003eb62c5</sum></package><package arch="x86_64" name="xorg-x11-drv-vesa" release="3.el7" src="xorg-x11-drv-vesa-2.4.0-3.el7.src.rpm" version="2.4.0"><filename>xorg-x11-drv-vesa-2.4.0-3.el7.x86_64.rpm</filename><sum type="sha256">5e005325f5c50fa0b99320840002a22c199e9f1fa90802fbfca9215c83d7a3cb</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="7.el7" src="xorg-x11-server-1.20.4-7.el7.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-7.el7.x86_64.rpm</filename><sum type="sha256">0785a1c8f1fd65b1454708896f5bad35babfc60d27f24957fcc2c52d43c3c31b</sum></package><package arch="x86_64" name="libxkbcommon" release="3.el7" src="libxkbcommon-0.7.1-3.el7.src.rpm" version="0.7.1"><filename>libxkbcommon-0.7.1-3.el7.x86_64.rpm</filename><sum type="sha256">c216b93ba3637913e65a9ff19f93715d1f57995f96a605fd67c84fe8977bc27f</sum></package><package arch="i686" epoch="1" name="gdm-devel" release="16.el7" src="gdm-3.28.2-16.el7.src.rpm" version="3.28.2"><filename>gdm-devel-3.28.2-16.el7.i686.rpm</filename><sum type="sha256">f0bbd6772932cef5c2825b5ab81d97ea2644310aa50a43c31059a36df421b92b</sum></package><package arch="x86_64" name="xorg-x11-drv-wacom-devel" release="3.el7" src="xorg-x11-drv-wacom-0.36.1-3.el7.src.rpm" version="0.36.1"><filename>xorg-x11-drv-wacom-devel-0.36.1-3.el7.x86_64.rpm</filename><sum type="sha256">ba51b64c9770dcaa4741f0ac711b81938b21baa5d99709ef6a87bc6c9f8140bf</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="7.el7" src="xorg-x11-server-1.20.4-7.el7.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-7.el7.x86_64.rpm</filename><sum type="sha256">b3e187fbce2f08b11a09341b2a0ac4bbf08680bde3f355df3eb461d1b6755434</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="7.el7" src="xorg-x11-server-1.20.4-7.el7.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-7.el7.x86_64.rpm</filename><sum type="sha256">86c24c4033cc92493cd4a829e5ce592df4d4c6b0abaf75737963d46ef1fc9368</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="7.el7" src="xorg-x11-server-1.20.4-7.el7.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-7.el7.x86_64.rpm</filename><sum type="sha256">f3f376dda5b1f80d3008ee182b66385680b78dd2e6abae9be4ff765b0aac8d9f</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="7.el7" src="xorg-x11-server-1.20.4-7.el7.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-7.el7.x86_64.rpm</filename><sum type="sha256">1d0783681519fb367db1ce05b220f231dd1e6047764966af0e0ae7178e787941</sum></package><package arch="x86_64" name="mesa-libGLw" release="5.el7" src="mesa-libGLw-8.0.0-5.el7.src.rpm" version="8.0.0"><filename>mesa-libGLw-8.0.0-5.el7.x86_64.rpm</filename><sum type="sha256">22991fef470328c675a012ac05aa468bcbb2c95bb6f1dd10ab263e658a88486b</sum></package><package arch="x86_64" epoch="1" name="gdm" release="16.el7" src="gdm-3.28.2-16.el7.src.rpm" version="3.28.2"><filename>gdm-3.28.2-16.el7.x86_64.rpm</filename><sum type="sha256">f1268435099b72ffec6896f8fc62eb1756eee988ae95bd28c3ca5cd05f8639ef</sum></package><package arch="x86_64" name="libX11-devel" release="2.el7" src="libX11-1.6.7-2.el7.src.rpm" version="1.6.7"><filename>libX11-devel-1.6.7-2.el7.x86_64.rpm</filename><sum type="sha256">0c9c313498d6f0aba65f1ed3dc1312ff068d383cfa9460807a6d02fa666a239b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14598" id="CVE-2018-14598" title="Cve-2018-14598" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14599" id="CVE-2018-14599" title="Cve-2018-14599" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14600" id="CVE-2018-14600" title="Cve-2018-14600" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15853" id="CVE-2018-15853" title="Cve-2018-15853" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15854" id="CVE-2018-15854" title="Cve-2018-15854" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15855" id="CVE-2018-15855" title="Cve-2018-15855" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15856" id="CVE-2018-15856" title="Cve-2018-15856" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15857" id="CVE-2018-15857" title="Cve-2018-15857" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15859" id="CVE-2018-15859" title="Cve-2018-15859" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15861" id="CVE-2018-15861" title="Cve-2018-15861" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15862" id="CVE-2018-15862" title="Cve-2018-15862" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15863" id="CVE-2018-15863" title="Cve-2018-15863" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15864" id="CVE-2018-15864" title="Cve-2018-15864" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2079" id="RHSA-2019:2079-1" title="Rhsa-2019:2079-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1529419" id="1529419" title="Rhel-7.5-Alpha Message Log Show &quot; Fatal Io Error 11 (Resource Temporarily Unavailable) On X Server &quot;:9&quot;&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623009" id="1623009" title="Cve-2018-15853 Libxkbcommon: Endless Recursion In Xkbcomp/Expr.C Resulting In A Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623012" id="1623012" title="Cve-2018-15854 Libxkbcommon: Null Pointer Dereference Resulting In A Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623013" id="1623013" title="Cve-2018-15855 Libxkbcommon: Null Pointer Dereference When Handling Xkb_Geometry" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623018" id="1623018" title="Cve-2018-15856 Libxkbcommon: Infinite Loop When Reaching Eol Unexpectedly Resulting In A Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623022" id="1623022" title="Cve-2018-15857 Libxkbcommon: Invalid Free In Exprappendmultikeysymlist Resulting In A Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623026" id="1623026" title="Cve-2018-15859 Libxkbcommon: Null Pointer Dereference When Parsing Invalid Atoms In Exprresolvelhs Resulting In A Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623028" id="1623028" title="Cve-2018-15861 Libxkbcommon: Null Pointer Dereference In Exprresolvelhs Resulting In A Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623029" id="1623029" title="Cve-2018-15862 Libxkbcommon: Null Pointer Dereference In Lookupmodmask Resulting In A Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623030" id="1623030" title="Cve-2018-15863 Libxkbcommon: Null Pointer Dereference In Resolvestateandpredicate Resulting In A Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623033" id="1623033" title="Cve-2018-15864 Libxkbcommon: Null Pointer Dereference In Resolve_Keysym Resulting In A Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623238" id="1623238" title="Cve-2018-14598 Libx11: Crash On Invalid Reply In Xlistextensions In Listext.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623242" id="1623242" title="Cve-2018-14600 Libx11: Out Of Bounds Write In Xlistextensions In Listext.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623250" id="1623250" title="Cve-2018-14599 Libx11: Off-By-One Error In Xlistextensions In Listext.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1624847" id="1624847" title="[Rhel 7.6 Bug] Can Not Install With Graphic Mode Or Boot Into Graphic Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1632807" id="1632807" title="User Session Is Terminated After User Switch" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1635747" id="1635747" title="Switching Users In Gnome Session Is Starting New X Servers For The User, And A User Logout Is Making It Unusable." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642197" id="1642197" title="Cintiq 27Qhd Triggers Error Messages On Proximity In" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1648116" id="1648116" title="Radeon Caicos Family Gpu Locks Up In Ring 0 After Update To 7.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1650166" id="1650166" title="Xorg Crash After Rhel7.6 Update" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1650634" id="1650634" title="Fbdev(1): Fbioputcmap And Xorg Fails To Load" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665433" id="1665433" title="[Hyper-V][Rhel 7.6]Startx Will Have Segment Fault With Hyper-V Environment" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1674474" id="1674474" title="Xorg Crashes With Sigabrt With Radeon Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1680120" id="1680120" title="Killing Inactive User Causes Active Session To Fail" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1724300" id="1724300" title="Visual Lag And Screen Update Delays With Libx11" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2091-1</id><title>Systemd</title><description>Security Fix(es): 
* systemd: line splitting via fgets() allows for state injection during daemon-reexec (CVE-2018-15686) 
* systemd: out-of-bounds read when parsing a crafted syslog message (CVE-2018-16866) 
* systemd: kills privileged process if unprivileged PIDFile was tampered (CVE-2018-16888)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="systemd-devel" release="67.el7" src="systemd-219-67.el7.src.rpm" version="219"><filename>systemd-devel-219-67.el7.i686.rpm</filename><sum type="sha256">4ef6d97d7dd7f34ee5f5ec57055ec3c94cf0a8ea9df16d0a6fb2d44d7303e396</sum></package><package arch="x86_64" name="systemd-resolved" release="67.el7" src="systemd-219-67.el7.src.rpm" version="219"><filename>systemd-resolved-219-67.el7.x86_64.rpm</filename><sum type="sha256">906017985af93b0c23e4800b93fa650c90492acbd028380288c11588d124d7af</sum></package><package arch="i686" name="systemd-resolved" release="67.el7" src="systemd-219-67.el7.src.rpm" version="219"><filename>systemd-resolved-219-67.el7.i686.rpm</filename><sum type="sha256">33ec641b5d13cafd797bbd6385ae6b8d49a270377cf67bb025625d44b5fe2d39</sum></package><package arch="x86_64" name="systemd-devel" release="67.el7" src="systemd-219-67.el7.src.rpm" version="219"><filename>systemd-devel-219-67.el7.x86_64.rpm</filename><sum type="sha256">fc60baaea372f841c8af9db84b62ebc63a006ca4cd58719dd76a561a788dfb69</sum></package><package arch="i686" name="libgudev1" release="67.el7" src="systemd-219-67.el7.src.rpm" version="219"><filename>libgudev1-219-67.el7.i686.rpm</filename><sum type="sha256">f7c867bc896abdc5fc8589b0a61d7b89a58eaf5e4a2e5b9ff5db160f8ecd5dcf</sum></package><package arch="x86_64" name="libgudev1-devel" release="67.el7" src="systemd-219-67.el7.src.rpm" version="219"><filename>libgudev1-devel-219-67.el7.x86_64.rpm</filename><sum type="sha256">70af9fa3915d73ca6972d414ce56e40c6f3b74c904a8aa9c104689f7a776474e</sum></package><package arch="i686" name="libgudev1-devel" release="67.el7" src="systemd-219-67.el7.src.rpm" version="219"><filename>libgudev1-devel-219-67.el7.i686.rpm</filename><sum type="sha256">83d533c2d778ad6f524833b0a8d45aaae0b44e2e0a5c5e381634467c00184e39</sum></package><package arch="x86_64" name="libgudev1" release="67.el7" src="systemd-219-67.el7.src.rpm" version="219"><filename>libgudev1-219-67.el7.x86_64.rpm</filename><sum type="sha256">897be3abab6330ce4b2a2f6ad65e5e84bd1dc853914589a2936c095b34da1f8a</sum></package><package arch="x86_64" name="systemd-journal-gateway" release="67.el7" src="systemd-219-67.el7.src.rpm" version="219"><filename>systemd-journal-gateway-219-67.el7.x86_64.rpm</filename><sum type="sha256">ec1775a504933b373b77a6bf1bad8e805c5763a8a910961cc784a36e840e4971</sum></package><package arch="x86_64" name="systemd" release="67.el7" src="systemd-219-67.el7.src.rpm" version="219"><filename>systemd-219-67.el7.x86_64.rpm</filename><sum type="sha256">de0f8741b86d4366ced0fc81c17d312236eef97bd34419c7a320bbedcde2d43c</sum></package><package arch="x86_64" name="systemd-networkd" release="67.el7" src="systemd-219-67.el7.src.rpm" version="219"><filename>systemd-networkd-219-67.el7.x86_64.rpm</filename><sum type="sha256">5daf17091083732100c069c7584401694b53e8eb14ebb13fd487316a1c8930ef</sum></package><package arch="x86_64" name="systemd-python" release="67.el7" src="systemd-219-67.el7.src.rpm" version="219"><filename>systemd-python-219-67.el7.x86_64.rpm</filename><sum type="sha256">da2bbeeb76b0a7a4f97f76e8c70ba6f38a7d4d38055a3fdcf0c530d30b07cb62</sum></package><package arch="x86_64" name="systemd-sysv" release="67.el7" src="systemd-219-67.el7.src.rpm" version="219"><filename>systemd-sysv-219-67.el7.x86_64.rpm</filename><sum type="sha256">ac76adc4ecaeab1a19961b947cf8192eddad79009a8474ac9e846b77c9a4549e</sum></package><package arch="i686" name="systemd-libs" release="67.el7" src="systemd-219-67.el7.src.rpm" version="219"><filename>systemd-libs-219-67.el7.i686.rpm</filename><sum type="sha256">3c0eea3c162cae9caed859fc1f73cb2bf57fa8bf18f0c693ed73b04f67bcbb2a</sum></package><package arch="x86_64" name="systemd-libs" release="67.el7" src="systemd-219-67.el7.src.rpm" version="219"><filename>systemd-libs-219-67.el7.x86_64.rpm</filename><sum type="sha256">911685a941d85d3054ae5132cbc444d4ffb65ba50a0d571106b110ec5944f3e5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15686" id="CVE-2018-15686" title="Cve-2018-15686" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16866" id="CVE-2018-16866" title="Cve-2018-16866" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16888" id="CVE-2018-16888" title="Cve-2018-16888" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2091" id="RHSA-2019:2091-1" title="Rhsa-2019:2091-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1267552" id="1267552" title="Systemd-Journal-Remote Fails With A Cryptic Error Message If Output File Doesn'T Have Extension .Journal" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1272485" id="1272485" title="Difference In Multilib Ppc64 And Ppc In Case Of Intltool Translation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1463678" id="1463678" title="Cannot Use &quot;-B&quot; And &quot;-D&quot; Parameters To Journalctl Command Simultaneously" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1585913" id="1585913" title="Systemd Backport Fix For Nofile Improvements In Containerized Environments" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1619543" id="1619543" title="Assertion Failure When System Journal Rotation Fails" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1631625" id="1631625" title="[Rhel7.6]Hostnamectl Set-Hostname Fail With 63 Characters Hostname" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639071" id="1639071" title="Cve-2018-15686 Systemd: Line Splitting Via Fgets() Allows For State Injection During Daemon-Reexec" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1641764" id="1641764" title="Backport Patch To Allow Tmpfiles E Directive To Accept Glob-Style Wildcards" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1643172" id="1643172" title="Escaped Systemd Unit Returns Wrongly Escaped (And Different) Id" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1651257" id="1651257" title="Access To Automounted Dir With Expiration Time Set Can Hang" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1653867" id="1653867" title="Cve-2018-16866 Systemd: Out-Of-Bounds Read When Parsing A Crafted Syslog Message" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1660422" id="1660422" title="Rescue.Service Announces Itself As Emergency Mode, Not Rescue Mode." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1662867" id="1662867" title="Cve-2018-16888 Systemd: Kills Privileged Process If Unprivileged Pidfile Was Tampered" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1663365" id="1663365" title="Systemd-Networkd Ignores Useroutes=False In [Dhcp] Of .Network File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1666612" id="1666612" title="Rules &quot;Uname -P&quot; And &quot;Systemd-Detect-Virt&quot; Kill The System Boot Time On Large Systems" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1691511" id="1691511" title="Repeated Systemd-Run --Scope -- Mount -T Tmpfs Tmpfs /&lt;Path&gt; Under Directories Bind-Mounted To Themselves Result In E2Big Failures" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1693559" id="1693559" title="Sd-Bus: Deal With Cookie Overruns" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1693716" id="1693716" title="Core/Shutdown.C: In_Container Is Used Before It Is Defined" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1697909" id="1697909" title="[Rhel7.7]  Failed To Start Udev Wait For Complete Device Initialization." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2097-1</id><title>Perl-Archive-Tar</title><description>Security Fix(es): 
* perl: Directory traversal in Archive::Tar (CVE-2018-12015)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="perl-Archive-Tar" release="3.el7" src="perl-Archive-Tar-1.92-3.el7.src.rpm" version="1.92"><filename>perl-Archive-Tar-1.92-3.el7.noarch.rpm</filename><sum type="sha256">ebda773d8d103ae64a2b2096975c46cb109cc65311b9b205fa3305644dd24f5f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12015" id="CVE-2018-12015" title="Cve-2018-12015" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2097" id="RHSA-2019:2097-1" title="Rhsa-2019:2097-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1588760" id="1588760" title="Cve-2018-12015 Perl: Directory Traversal In Archive::Tar" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2099-1</id><title>Samba</title><description>The following packages have been upgraded to a later upstream version: samba (4.9.1). 
Security Fix(es): 
* samba: save registry file outside share as unprivileged user (CVE-2019-3880)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="samba-test-libs" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-test-libs-4.9.1-6.el7.i686.rpm</filename><sum type="sha256">3d79e5aad6f604ad2dccc8be2fc6f358a95fdc7559743db51ebed4541fce716d</sum></package><package arch="noarch" name="samba-pidl" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-pidl-4.9.1-6.el7.noarch.rpm</filename><sum type="sha256">cdfe300c74c4576114842fcf15928d80077ab441666545780d78fd555499dd28</sum></package><package arch="x86_64" name="samba-test-libs" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-test-libs-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">f937dc596cd93b2910fed00b649bafd009b122c039bfa642ab19064978c5cb93</sum></package><package arch="i686" name="samba-devel" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-devel-4.9.1-6.el7.i686.rpm</filename><sum type="sha256">bd3a459bd8531ebce6bf5d09ad765b6d7ac8d9a9621e5b06cb7cfd3fd2aef15c</sum></package><package arch="x86_64" name="samba-dc-libs" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-dc-libs-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">ccba60e648429919f9280826cb8c1f98c4b5efd0d0ee345070214a1780409276</sum></package><package arch="noarch" name="samba-common" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-common-4.9.1-6.el7.noarch.rpm</filename><sum type="sha256">1b41d6355469473f7a279808dc5d2ff1fa22b8aa1532748b936f47db80256d14</sum></package><package arch="x86_64" name="samba-client" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-client-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">00b41585952124978ca99a8deb29362d1ccbb73d522d4205579d18c9d8b789e4</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-vfs-glusterfs-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">67130377e73c20fe4e384eb2d068f212d3c893498c0d23d2c4ffe35c0ae1e860</sum></package><package arch="x86_64" name="samba-winbind-clients" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-winbind-clients-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">d7813ed6342677d755b2b8fb31ede4773f8866d9f77a8057df12c6c6709757e9</sum></package><package arch="x86_64" name="samba-devel" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-devel-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">f3c86a12d5e46b9de71c9ce6cd46a94f2feefcec8eaca7ac6b8471d739ce9e9f</sum></package><package arch="x86_64" name="samba-winbind-modules" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-winbind-modules-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">3f76de7592478b1e619b2e3e9efcef47cd25dbda3f01e40f720b5347db248dbc</sum></package><package arch="x86_64" name="samba-dc" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-dc-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">d7db5cdc0c4b298193d8fde2577b1d2ae68c052a26227d89b9fd07224c3c4d79</sum></package><package arch="x86_64" name="samba-client-libs" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-client-libs-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">dcc2147d54af5e33dee2ccf83202e90dcc3d857df58d70f79a35ac7d393797fc</sum></package><package arch="x86_64" name="samba-krb5-printing" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-krb5-printing-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">c5a49497b00c9d4309c6356f56f4f81327c157b19d2f6e5422c8cc56f430a01e</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-winbind-krb5-locator-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">ee018d59665d90fe5dea7163418395799db16712d49d213a46c40375f2ec7fd0</sum></package><package arch="i686" name="libsmbclient-devel" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>libsmbclient-devel-4.9.1-6.el7.i686.rpm</filename><sum type="sha256">8b242cfa519373668beec55123054fc0038143f74e1d4e8fd83f62157d7c329e</sum></package><package arch="x86_64" name="samba-test" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-test-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">ac0c143479ce47a6fbd6a8f6c47ef34787cb7ff3daf22149894e62ea193885a9</sum></package><package arch="x86_64" name="samba" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">2cee54a66475e3528b20491b47efb75a949b63b805ec0cb455595be86a990f33</sum></package><package arch="x86_64" name="samba-common-libs" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-common-libs-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">107dd5a8f472b093b3f0303ea4fa5bc0d238c61db135687c39a12d12c8cdd022</sum></package><package arch="i686" name="libsmbclient" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>libsmbclient-4.9.1-6.el7.i686.rpm</filename><sum type="sha256">a0e0bcb99d12848c5ff34d705c26d46eefa00b0175e4536685da32b7165941ac</sum></package><package arch="x86_64" name="libwbclient-devel" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>libwbclient-devel-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">3526a6c271cc93ba318c706e7dccb2f01de14aa819e55b5cd58bd58c4508cc5a</sum></package><package arch="x86_64" name="ctdb-tests" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>ctdb-tests-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">f2b4f05b97b24d473899db0ab94bb300760d6a232e19f9129fa04042474d1eea</sum></package><package arch="i686" name="libwbclient-devel" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>libwbclient-devel-4.9.1-6.el7.i686.rpm</filename><sum type="sha256">c890ac9e1edb9fc414ebd54a041a92edbaab251e9657b936a9701b502c7989fd</sum></package><package arch="i686" name="libwbclient" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>libwbclient-4.9.1-6.el7.i686.rpm</filename><sum type="sha256">5b304a1dba64d52f6c75e1576d18ccbbb93094cf832ec51d574bf66f332cbc3a</sum></package><package arch="x86_64" name="ctdb" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>ctdb-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">089fc01403a66b1988970d94de79b42dcb2618899b93cc0369d8250cdecad4c8</sum></package><package arch="x86_64" name="samba-libs" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-libs-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">f3111dccd7dc68fdd875ab92241ce6034a867154bbcfbad1569c93534d06100d</sum></package><package arch="i686" name="samba-client-libs" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-client-libs-4.9.1-6.el7.i686.rpm</filename><sum type="sha256">a166c2b09c6f97a640e46f351a9b5c6fe25f60ba4f79196feedc5e74cc37658c</sum></package><package arch="i686" name="samba-python" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-python-4.9.1-6.el7.i686.rpm</filename><sum type="sha256">d738ab6f4113cf117b1a88a632f886ee750393a86efeb08bdb06ddad3d79b1a3</sum></package><package arch="x86_64" name="libwbclient" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>libwbclient-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">bdb16d2ffb586915f5efa4372d6efb00159986e2e4f004721dc7a61bfc8f53f9</sum></package><package arch="i686" name="samba-winbind-modules" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-winbind-modules-4.9.1-6.el7.i686.rpm</filename><sum type="sha256">c82c3b1b82cdcaba8ca65773a52a95953b021167f853a5abe4d9b559f5b9e3d8</sum></package><package arch="x86_64" name="samba-python-test" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-python-test-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">de371479d4d90474281ac7383278a409f822883bbe6ce9cfd1c28a7fae6fd556</sum></package><package arch="x86_64" name="samba-winbind" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-winbind-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">e524e939230876fc9c36c75cf4963268f2410cba0d0c7c3e152e1876e93f7fc2</sum></package><package arch="x86_64" name="samba-common-tools" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-common-tools-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">e9b4f20159532525ba3a49fae2e2fb6e57fe44e427c9349e54ae86a43513233b</sum></package><package arch="x86_64" name="libsmbclient" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>libsmbclient-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">2277e412060a0f70ae58a46996168f9b166e96aa7752172ed482f9ef551c40b1</sum></package><package arch="x86_64" name="libsmbclient-devel" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>libsmbclient-devel-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">e9ed78f4b54767e43c02c37fe2207aef254dc8d52560fabf7e7018ac58452036</sum></package><package arch="i686" name="samba-libs" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-libs-4.9.1-6.el7.i686.rpm</filename><sum type="sha256">bfa0de6a5285721610f55ae458810206baae441489e6ed4eb4668595b63b76c6</sum></package><package arch="x86_64" name="samba-python" release="6.el7" src="samba-4.9.1-6.el7.src.rpm" version="4.9.1"><filename>samba-python-4.9.1-6.el7.x86_64.rpm</filename><sum type="sha256">289c0dd007bd8a0a5e223217de1726459fe1c7db56d9657c053990389d0004f8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3880" id="CVE-2019-3880" title="Cve-2019-3880" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2099" id="RHSA-2019:2099-1" title="Rhsa-2019:2099-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1479451" id="1479451" title="Unable To Authenticate Against Ad With Kerberos Using The `Net' Command" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1529301" id="1529301" title="[Rfe] Support Adding Spn Of A Different Host With &quot;Net Ads Keytab Add&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600274" id="1600274" title="Vfs_Audit Log Does Not Show Full Path Names" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623140" id="1623140" title="Samba Still Sending On Port 139" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1649434" id="1649434" title="Rebase Samba In Rhel-7.7 To The Same Version As Rhel 8.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1650452" id="1650452" title="Backport Smbc_Setoptionprotocols() Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1656405" id="1656405" title="Classic Domain Requires Domain Name To Authenticate After Last Update" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1659533" id="1659533" title="Unable To Create New Files Or Folders Using Samba And Vfs_Glusterfs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1662408" id="1662408" title="Cups Allows The Smbspool Backend To Overwrite A Configured Printers Authinforequired As &quot;Username,Password&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1674403" id="1674403" title="Adding `Force Group = ...` To An Active Smb Sessoin Causes Panic" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690222" id="1690222" title="Smbclient Man Page Needs Update On Rhel7.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1691518" id="1691518" title="Cve-2019-3880 Samba: Save Registry File Outside Share As Unprivileged User" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2101-1</id><title>Exiv2</title><description>The following packages have been upgraded to a later upstream version: exiv2 (0.27.0). 
Security Fix(es): 
* exiv2: heap-buffer-overflow in Exiv2::IptcData::printStructure in src/iptc.cpp (CVE-2017-17724) 
* exiv2: out-of-bounds read in Exiv2::Internal::stringFormat image.cpp (CVE-2018-8976) 
* exiv2: invalid memory access in Exiv2::Internal::printCsLensFFFF function in canonmn_int.cpp (CVE-2018-8977) 
* exiv2: out of bounds read in IptcData::printStructure in iptc.c (CVE-2018-9305) 
* exiv2: OOB read in pngimage.cpp:tEXtToDataBuf() allows for crash via crafted file (CVE-2018-10772) 
* exiv2: SIGABRT caused by memory allocation in types.cpp:Exiv2::Internal::PngChunk::zlibUncompress() (CVE-2018-10958) 
* exiv2: SIGABRT by triggering an incorrect Safe::add call (CVE-2018-10998) 
* exiv2: information leak via a crafted file (CVE-2018-11037) 
* exiv2: integer overflow in getData function in preview.cpp (CVE-2018-12264) 
* exiv2: integer overflow in the LoaderExifJpeg class in preview.cpp (CVE-2018-12265) 
* exiv2: heap-based buffer over-read in WebPImage::decodeChunks in webpimage.cpp (CVE-2018-14046) 
* exiv2: NULL pointer dereference in Exiv2::DataValue::copy in value.cpp leading to application crash (CVE-2018-17282) 
* exiv2: Stack overflow in CiffDirectory::readDirectory() at crwimage_int.cpp leading to denial of service (CVE-2018-17581) 
* exiv2: infinite loop in Exiv2::Image::printIFDStructure function in image.cpp (CVE-2018-18915) 
* exiv2: heap-based buffer over-read in Exiv2::IptcParser::decode in iptc.cpp (CVE-2018-19107) 
* exiv2: infinite loop in Exiv2::PsdImage::readMetadata in psdimage.cpp (CVE-2018-19108) 
* exiv2: heap-based buffer over-read in PngChunk::readRawProfile in pngchunk_int.cpp (CVE-2018-19535) 
* exiv2: NULL pointer dereference in Exiv2::isoSpeed in easyaccess.cpp (CVE-2018-19607) 
* exiv2: Heap-based buffer over-read in Exiv2::tEXtToDataBuf function resulting in a denial of service (CVE-2018-20096) 
* exiv2: Segmentation fault in Exiv2::Internal::TiffParserWorker::findPrimaryGroups function (CVE-2018-20097) 
* exiv2: Heap-based buffer over-read in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20098) 
* exiv2: Infinite loop in Exiv2::Jp2Image::encodeJp2Header resulting in a denial of service (CVE-2018-20099)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="exiv2-devel" release="2.el7_6" src="exiv2-0.27.0-2.el7_6.src.rpm" version="0.27.0"><filename>exiv2-devel-0.27.0-2.el7_6.i686.rpm</filename><sum type="sha256">00af42e53ccdcdd2bcf83a6c1bafe45e33b78a4b6677410843516b4556ffd7e6</sum></package><package arch="x86_64" name="exiv2-libs" release="2.el7_6" src="exiv2-0.27.0-2.el7_6.src.rpm" version="0.27.0"><filename>exiv2-libs-0.27.0-2.el7_6.x86_64.rpm</filename><sum type="sha256">f5571a2cfeb70941bc3cfec25e7f90532f4ff6c0fe1e164edab5f88102bbe97a</sum></package><package arch="i686" name="exiv2-libs" release="2.el7_6" src="exiv2-0.27.0-2.el7_6.src.rpm" version="0.27.0"><filename>exiv2-libs-0.27.0-2.el7_6.i686.rpm</filename><sum type="sha256">e7abba1a703cffdba30effc95a3b055c697a781ef9741a5c03991f71e0d10c25</sum></package><package arch="noarch" name="exiv2-doc" release="2.el7_6" src="exiv2-0.27.0-2.el7_6.src.rpm" version="0.27.0"><filename>exiv2-doc-0.27.0-2.el7_6.noarch.rpm</filename><sum type="sha256">d881733ce982d42838762b1ec41a6ce2d324b511a628b5cecd3186a762c74cd9</sum></package><package arch="x86_64" name="exiv2-devel" release="2.el7_6" src="exiv2-0.27.0-2.el7_6.src.rpm" version="0.27.0"><filename>exiv2-devel-0.27.0-2.el7_6.x86_64.rpm</filename><sum type="sha256">abab0f13d029090bb4f6b0ffa4778dba54c66d46be672319a3f5f31d60aead86</sum></package><package arch="x86_64" name="exiv2" release="2.el7_6" src="exiv2-0.27.0-2.el7_6.src.rpm" version="0.27.0"><filename>exiv2-0.27.0-2.el7_6.x86_64.rpm</filename><sum type="sha256">c56e4688f298c0b951ab918cec5e7e96b7f55d12c9b727422be846cb0043a0b3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17724" id="CVE-2017-17724" title="Cve-2017-17724" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10772" id="CVE-2018-10772" title="Cve-2018-10772" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10958" id="CVE-2018-10958" title="Cve-2018-10958" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10998" id="CVE-2018-10998" title="Cve-2018-10998" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11037" id="CVE-2018-11037" title="Cve-2018-11037" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12264" id="CVE-2018-12264" title="Cve-2018-12264" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12265" id="CVE-2018-12265" title="Cve-2018-12265" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14046" id="CVE-2018-14046" title="Cve-2018-14046" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17282" id="CVE-2018-17282" title="Cve-2018-17282" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17581" id="CVE-2018-17581" title="Cve-2018-17581" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18915" id="CVE-2018-18915" title="Cve-2018-18915" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19107" id="CVE-2018-19107" title="Cve-2018-19107" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19108" id="CVE-2018-19108" title="Cve-2018-19108" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19535" id="CVE-2018-19535" title="Cve-2018-19535" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19607" id="CVE-2018-19607" title="Cve-2018-19607" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20096" id="CVE-2018-20096" title="Cve-2018-20096" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20097" id="CVE-2018-20097" title="Cve-2018-20097" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20098" id="CVE-2018-20098" title="Cve-2018-20098" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20099" id="CVE-2018-20099" title="Cve-2018-20099" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8976" id="CVE-2018-8976" title="Cve-2018-8976" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8977" id="CVE-2018-8977" title="Cve-2018-8977" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9305" id="CVE-2018-9305" title="Cve-2018-9305" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2101" id="RHSA-2019:2101-1" title="Rhsa-2019:2101-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1465061" id="1465061" title="There Is An Invalid Free In Image::Printifdstructure That Leads To A Segmentation Fault At Exiv2. A Crafted Input Will Lead To Remote Denial Of Service Attack." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1470729" id="1470729" title="There Is A Heap Overflow In The Software Exiv2." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1470737" id="1470737" title="There Is An Invalid Free In  Action::Taskfactory::Cleanup  Funtion Of Actions.Cpp In  Exiv2. A Crafted Input Will Lead To Remote Denial Of Service Attack." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1470913" id="1470913" title="There Is An Infinite Loop In  Exiv2::Image::Printifdstructure Funtion Of Image.Cpp In  Exiv2. A Crafted Input Will Lead To Remote Denial Of Service Attack." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1470946" id="1470946" title="There Is A Heap-Buffer-Overflow In Image.Cpp Of Exiv2." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1470950" id="1470950" title="There Is A Segmentation Fault In The Software Exiv2 While The Function  Exiv2::Xmpparser::Terminate() Is Finished." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1471772" id="1471772" title="There Is An Illegal Address Access In Basicio.Cpp Of Exiv2." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1473888" id="1473888" title="There Is A Floating Point Exception In Exiv2::Valuetype Of Exiv2." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1473889" id="1473889" title="There Is Alloc-Dealloc-Mismatch In  Exiv2::Fileio::Seek Of Exiv2." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1475123" id="1475123" title="There Is An Assertion Aborted In  Tiffvisitor.Cpp Of  Exiv2/Libexiv2." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1475124" id="1475124" title="There Is An Assertion Aborted In  Tiffvisitor.Cpp Of  Exiv2/Libexiv2." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1482295" id="1482295" title="There Is A Heap-Buffer-Overflow In  Basicio.Cpp Of Exiv2." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1482296" id="1482296" title="There Is An Illegal Address Access In Exiv2::Fileio::Path[Abi:Cxx11]() Of Exiv2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1482423" id="1482423" title="There Is A Heap-Buffer-Overflow In The Software Exiv2 Which Is Triggered In Exiv2::Image::Io  Function." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1494443" id="1494443" title="Null Pointer Dereference Vulnerability In Exiv2::Image::Printifdstructure (Image.Cpp:408)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1494467" id="1494467" title="Invalid Memory Address Dereference In Exiv2::Getulong(Types.Cpp:246)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1494776" id="1494776" title="It Is A Heap-Buffer-Overflow In Exiv2::Jp2Image::Readmetadata (Jp2Image.Cpp:277)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1494778" id="1494778" title="It Is A Heap-Buffer-Overflow In Exiv2::Us2Data (Types.Cpp:346)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1494780" id="1494780" title="Invalid Memory Address Dereference In Exiv2::Stringvaluebase::Read ( In Value.Cpp:302)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1494781" id="1494781" title="It Is A Heap-Buffer-Overflow In Exiv2::S2Data (Types.Cpp:383)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1494782" id="1494782" title="It Is A Heap-Buffer-Overflow In Exiv2::L2Data (Types.Cpp:398)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1494786" id="1494786" title="Invalid Memory Address Dereference In Exiv2::Datavalue::Read (Value.Cpp:193)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1494787" id="1494787" title="It Is A Stack-Overflow Vulnerability In Exiv2::Internal::Stringformat[Abi:Cxx11] ( In Image.Cpp:975 )" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1495043" id="1495043" title="Bad Free In Exiv2::Image::~Image (Image.Cpp:173)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1524104" id="1524104" title="Exiv2 Library: Heap-Based Buffer Over-Read In Exiv2::Image::Byteswap4 (Image.Cpp)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1524107" id="1524107" title="Exiv2 Library: Heap-Based Buffer Over-Read In Exiv2::Iptcdata::Printstructure (Iptc.Cpp)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1524116" id="1524116" title="Exiv2 Library: Assertion Aborted In Exiv2::(Anonymous Namespace)::Readheader (Bigtiffimage.Cpp)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1525055" id="1525055" title="Exiv2 Library: Heap-Buffer-Overflow In Exiv2::Getulong (Types.Cpp)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1537353" id="1537353" title="Exiv2: Integer Overflow In Floattorationalcast  Function (Src/Types.Cpp)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1545237" id="1545237" title="Cve-2017-17724 Exiv2: Heap-Buffer-Overflow In Exiv2::Iptcdata::Printstructure In Src/Iptc.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1561213" id="1561213" title="Cve-2018-8976 Exiv2: Out-Of-Bounds Read In Exiv2::Internal::Stringformat Image.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1561217" id="1561217" title="Cve-2018-8977 Exiv2: Invalid Memory Access In Exiv2::Internal::Printcslensffff Function In Canonmn_Int.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566260" id="1566260" title="There Is A Segmentation Fault In The Software Exiv2 When The Function Exiv2::Texttodatabuf() Is Finished" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566735" id="1566735" title="Cve-2018-9305 Exiv2: Out Of Bounds Read In Iptcdata::Printstructure In Iptc.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1578659" id="1578659" title="Cve-2018-10958 Exiv2: Sigabrt Caused By Memory Allocation In Types.Cpp:Exiv2::Internal::Pngchunk::Zlibuncompress()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1579481" id="1579481" title="Cve-2018-10998 Exiv2: Sigabrt By Triggering An Incorrect Safe::Add Call" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1579544" id="1579544" title="Cve-2018-11037 Exiv2: Information Leak Via A Crafted File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1590993" id="1590993" title="Cve-2018-12264 Exiv2: Integer Overflow In Getdata Function In Preview.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1590994" id="1590994" title="Cve-2018-12265 Exiv2: Integer Overflow In The Loaderexifjpeg Class In Preview.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1594627" id="1594627" title="Cve-2018-10772 Exiv2: Oob Read In Pngimage.Cpp:Texttodatabuf() Allows For Crash Via Crafted File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1601628" id="1601628" title="Cve-2018-14046 Exiv2: Heap-Based Buffer Over-Read In Webpimage::Decodechunks In Webpimage.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1632490" id="1632490" title="Cve-2018-17282 Exiv2: Null Pointer Dereference In Exiv2::Datavalue::Copy In Value.Cpp Leading To Application Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1635045" id="1635045" title="Cve-2018-17581 Exiv2: Stack Overflow In Ciffdirectory::Readdirectory() At Crwimage_Int.Cpp Leading To Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646555" id="1646555" title="Cve-2018-18915 Exiv2: Infinite Loop In Exiv2::Image::Printifdstructure Function In Image.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1649094" id="1649094" title="Cve-2018-19107 Exiv2: Heap-Based Buffer Over-Read In Exiv2::Iptcparser::Decode In Iptc.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1649101" id="1649101" title="Cve-2018-19108 Exiv2: Infinite Loop In Exiv2::Psdimage::Readmetadata In Psdimage.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1652637" id="1652637" title="Rebase Exiv2 To 0.27" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1656187" id="1656187" title="Cve-2018-19535 Exiv2: Heap-Based Buffer Over-Read In Pngchunk::Readrawprofile In Pngchunk_Int.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1656195" id="1656195" title="Cve-2018-19607 Exiv2: Null Pointer Dereference In Exiv2::Isospeed In Easyaccess.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1660423" id="1660423" title="Cve-2018-20096 Exiv2: Heap-Based Buffer Over-Read In Exiv2::Texttodatabuf Function Resulting In A Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1660424" id="1660424" title="Cve-2018-20097 Exiv2: Segmentation Fault In Exiv2::Internal::Tiffparserworker::Findprimarygroups Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1660425" id="1660425" title="Cve-2018-20098 Exiv2: Heap-Based Buffer Over-Read In Exiv2::Jp2Image::Encodejp2Header Resulting In A Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1660426" id="1660426" title="Cve-2018-20099 Exiv2: Infinite Loop In Exiv2::Jp2Image::Encodejp2Header Resulting In A Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1664361" id="1664361" title="Gwenview + Exiv2 Crash In Pentax Camera Files" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2110-1</id><title>Rsyslog</title><description>Security Fix(es): 
* rsyslog: imptcp: integer overflow when Octet-Counted TCP Framing is enabled (CVE-2018-16881)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="rsyslog-snmp" release="38.el7" src="rsyslog-8.24.0-38.el7.src.rpm" version="8.24.0"><filename>rsyslog-snmp-8.24.0-38.el7.x86_64.rpm</filename><sum type="sha256">09709fc9f836967294fad47de4fc79fe585fb7c2e07b378b74d242e750cb7dbb</sum></package><package arch="x86_64" name="rsyslog-libdbi" release="38.el7" src="rsyslog-8.24.0-38.el7.src.rpm" version="8.24.0"><filename>rsyslog-libdbi-8.24.0-38.el7.x86_64.rpm</filename><sum type="sha256">6079522192a516eea69b9a5277c326261653e1eecca2ca74336face581e141b2</sum></package><package arch="x86_64" name="rsyslog-mmnormalize" release="38.el7" src="rsyslog-8.24.0-38.el7.src.rpm" version="8.24.0"><filename>rsyslog-mmnormalize-8.24.0-38.el7.x86_64.rpm</filename><sum type="sha256">d47851ca4bab1e493ad7fe65117f02e3d8397aae75236519cd1c4a478b5a70bb</sum></package><package arch="noarch" name="rsyslog-doc" release="38.el7" src="rsyslog-8.24.0-38.el7.src.rpm" version="8.24.0"><filename>rsyslog-doc-8.24.0-38.el7.noarch.rpm</filename><sum type="sha256">42bd47d23b1ad297e032c24d530b0f9bf321fafac6c38957d1b726f91e2fdc01</sum></package><package arch="x86_64" name="rsyslog-elasticsearch" release="38.el7" src="rsyslog-8.24.0-38.el7.src.rpm" version="8.24.0"><filename>rsyslog-elasticsearch-8.24.0-38.el7.x86_64.rpm</filename><sum type="sha256">b68107ce4fd6dd1914b256350baa197ae8d07383375e56bc6ee9063a9a6b76c2</sum></package><package arch="x86_64" name="rsyslog-mmkubernetes" release="38.el7" src="rsyslog-8.24.0-38.el7.src.rpm" version="8.24.0"><filename>rsyslog-mmkubernetes-8.24.0-38.el7.x86_64.rpm</filename><sum type="sha256">19aacc88f31bf9668cb3f5e0c08b70b35c7aca33e6efea79e94289ff205a76c9</sum></package><package arch="x86_64" name="rsyslog-relp" release="38.el7" src="rsyslog-8.24.0-38.el7.src.rpm" version="8.24.0"><filename>rsyslog-relp-8.24.0-38.el7.x86_64.rpm</filename><sum type="sha256">d3638b10f1887931b3116ef8216b99434fcb1375edec4a599e3ac991bc20575c</sum></package><package arch="x86_64" name="rsyslog-gnutls" release="38.el7" src="rsyslog-8.24.0-38.el7.src.rpm" version="8.24.0"><filename>rsyslog-gnutls-8.24.0-38.el7.x86_64.rpm</filename><sum type="sha256">c6e4fa256c7e27a59a197c411e3e69740f7ece7fcd520adbb471812938ee1855</sum></package><package arch="x86_64" name="rsyslog-gssapi" release="38.el7" src="rsyslog-8.24.0-38.el7.src.rpm" version="8.24.0"><filename>rsyslog-gssapi-8.24.0-38.el7.x86_64.rpm</filename><sum type="sha256">b0ab139172cabd78d30b861199a665600b234c7a6f4ea0a7250db245b4c60c04</sum></package><package arch="x86_64" name="rsyslog-udpspoof" release="38.el7" src="rsyslog-8.24.0-38.el7.src.rpm" version="8.24.0"><filename>rsyslog-udpspoof-8.24.0-38.el7.x86_64.rpm</filename><sum type="sha256">f5e5b31f4eeb083ebd8801a8d36668af1f6ef43e9402cd25a56a46e887de1903</sum></package><package arch="x86_64" name="rsyslog-mmsnmptrapd" release="38.el7" src="rsyslog-8.24.0-38.el7.src.rpm" version="8.24.0"><filename>rsyslog-mmsnmptrapd-8.24.0-38.el7.x86_64.rpm</filename><sum type="sha256">ab5753660d9d1526a26e9807b382802ded37833a8044dcf41db6b40c72d8cdb4</sum></package><package arch="x86_64" name="rsyslog" release="38.el7" src="rsyslog-8.24.0-38.el7.src.rpm" version="8.24.0"><filename>rsyslog-8.24.0-38.el7.x86_64.rpm</filename><sum type="sha256">e04d1cd2a6beb5ab0a0d4a700286023bea5561a7f99d87e079ef6ec5794fd9ae</sum></package><package arch="x86_64" name="rsyslog-mmaudit" release="38.el7" src="rsyslog-8.24.0-38.el7.src.rpm" version="8.24.0"><filename>rsyslog-mmaudit-8.24.0-38.el7.x86_64.rpm</filename><sum type="sha256">df447d46c271b458ac5ba3835c1be567926303a483ba8ad0888e809fa5553df8</sum></package><package arch="x86_64" name="rsyslog-mysql" release="38.el7" src="rsyslog-8.24.0-38.el7.src.rpm" version="8.24.0"><filename>rsyslog-mysql-8.24.0-38.el7.x86_64.rpm</filename><sum type="sha256">5e696e1d24aea3d71dd40026bd2f50913c34f5eb8ce9ca3d9a18269f301a566b</sum></package><package arch="x86_64" name="rsyslog-crypto" release="38.el7" src="rsyslog-8.24.0-38.el7.src.rpm" version="8.24.0"><filename>rsyslog-crypto-8.24.0-38.el7.x86_64.rpm</filename><sum type="sha256">00d5be89a18cdd8fba27d17babdc88c11947f00d93a76ef6b5a55f3917aabc96</sum></package><package arch="x86_64" name="rsyslog-pgsql" release="38.el7" src="rsyslog-8.24.0-38.el7.src.rpm" version="8.24.0"><filename>rsyslog-pgsql-8.24.0-38.el7.x86_64.rpm</filename><sum type="sha256">62cba1d5efcab7e8e7567beea50cda8e639dcd1d380db4d3856779bc0bbe565a</sum></package><package arch="x86_64" name="rsyslog-kafka" release="38.el7" src="rsyslog-8.24.0-38.el7.src.rpm" version="8.24.0"><filename>rsyslog-kafka-8.24.0-38.el7.x86_64.rpm</filename><sum type="sha256">4f9574a4ed06f86aeada79196323cc12d2dcd88c6adf517e2b0fc2cef46cf2b9</sum></package><package arch="x86_64" name="rsyslog-mmjsonparse" release="38.el7" src="rsyslog-8.24.0-38.el7.src.rpm" version="8.24.0"><filename>rsyslog-mmjsonparse-8.24.0-38.el7.x86_64.rpm</filename><sum type="sha256">7c7dee5078444cf6d50e941860e2c852e5e2e62488309ed2302e05d8c02a1abc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16881" id="CVE-2018-16881" title="Cve-2018-16881" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2110" id="RHSA-2019:2110-1" title="Rhsa-2019:2110-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1622767" id="1622767" title="Mmkubernetes - Deletion Of Pod Causes Logs To Stop Flowing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1632211" id="1632211" title="Sd_Journal_Get_Cursor() Failed - When Time Is Changed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1649250" id="1649250" title="Rsyslog-8.24.0-34.El7.X86_64 Imfile Broken With Logrotate And Tomcat Rotated Logs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1656860" id="1656860" title="Rsyslog Imfile Buffer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658366" id="1658366" title="Cve-2018-16881 Rsyslog: Imptcp: Integer Overflow When Octet-Counted Tcp Framing Is Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1685901" id="1685901" title="Rsyslog Floods Log Files When Watching Files Through A Symlink" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2112-1</id><title>Mod_Auth_Openidc</title><description>Security Fix(es): 
* mod_auth_openidc: OIDC_CLAIM and OIDCAuthNHeader not skipped in an "AuthType oauth20" configuration (CVE-2017-6413) 
* mod_auth_openidc: Shows user-supplied content on error pages (CVE-2017-6059)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="mod_auth_openidc" release="5.el7" src="mod_auth_openidc-1.8.8-5.el7.src.rpm" version="1.8.8"><filename>mod_auth_openidc-1.8.8-5.el7.x86_64.rpm</filename><sum type="sha256">69a346bba4e4e38726f20404f022bcd466fb61e2804e7581bf7b40090d5f206e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6059" id="CVE-2017-6059" title="Cve-2017-6059" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-6413" id="CVE-2017-6413" title="Cve-2017-6413" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2112" id="RHSA-2019:2112-1" title="Rhsa-2019:2112-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1425350" id="1425350" title="Cve-2017-6059 Mod_Auth_Openidc: Shows User-Supplied Content On Error Pages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1428855" id="1428855" title="Cve-2017-6413 Mod_Auth_Openidc: Oidc_Claim And Oidcauthnheader Not Skipped In An &quot;Authtype Oauth20&quot; Configuration" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2118-1</id><title>Glibc</title><description>Security Fix(es): 
* glibc: getaddrinfo should reject IP addresses with trailing characters (CVE-2016-10739)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="glibc-static" release="292.el7" src="glibc-2.17-292.el7.src.rpm" version="2.17"><filename>glibc-static-2.17-292.el7.x86_64.rpm</filename><sum type="sha256">49f50e24c589507e9948f025d230b6f5f3aab59ca3dca3c55952e331765782d1</sum></package><package arch="i686" name="glibc-static" release="292.el7" src="glibc-2.17-292.el7.src.rpm" version="2.17"><filename>glibc-static-2.17-292.el7.i686.rpm</filename><sum type="sha256">e17b5c3a9562cecb4e984394b253b220976c2f8a3be926f6de24a8d0c5f2e08a</sum></package><package arch="x86_64" name="glibc" release="292.el7" src="glibc-2.17-292.el7.src.rpm" version="2.17"><filename>glibc-2.17-292.el7.x86_64.rpm</filename><sum type="sha256">d3e151b8844cf0a2e5de3becc0f1370ab03483557183708d253056bec02fc41d</sum></package><package arch="i686" name="glibc-devel" release="292.el7" src="glibc-2.17-292.el7.src.rpm" version="2.17"><filename>glibc-devel-2.17-292.el7.i686.rpm</filename><sum type="sha256">3db541f4a94f12b984d0f0ba2f7ef094c44aaf6c4b70558d49147c7ebc969a9a</sum></package><package arch="i686" name="glibc" release="292.el7" src="glibc-2.17-292.el7.src.rpm" version="2.17"><filename>glibc-2.17-292.el7.i686.rpm</filename><sum type="sha256">1e16dc712b3f311bc6e1b718b663ef99ebbbfd71753885c83f5d5f79fb9accd3</sum></package><package arch="x86_64" name="glibc-common" release="292.el7" src="glibc-2.17-292.el7.src.rpm" version="2.17"><filename>glibc-common-2.17-292.el7.x86_64.rpm</filename><sum type="sha256">a2c0792213f3a012200a3bc98f855e5244dd18bf90da7cfa7d6ce04757c62767</sum></package><package arch="x86_64" name="glibc-headers" release="292.el7" src="glibc-2.17-292.el7.src.rpm" version="2.17"><filename>glibc-headers-2.17-292.el7.x86_64.rpm</filename><sum type="sha256">07d519db92765b4a2c23be932f112900626e49ea1b295181c27077285170e73b</sum></package><package arch="x86_64" name="nscd" release="292.el7" src="glibc-2.17-292.el7.src.rpm" version="2.17"><filename>nscd-2.17-292.el7.x86_64.rpm</filename><sum type="sha256">ac8a77010a3a1c77b70b03b4f0584e0b463874f53c69723c9c39da99e2b62cee</sum></package><package arch="x86_64" name="glibc-utils" release="292.el7" src="glibc-2.17-292.el7.src.rpm" version="2.17"><filename>glibc-utils-2.17-292.el7.x86_64.rpm</filename><sum type="sha256">b8ce41ff6a007893f2c0b2092261080ca9fdad6f58f656bcd2433fefb5730cf9</sum></package><package arch="x86_64" name="glibc-devel" release="292.el7" src="glibc-2.17-292.el7.src.rpm" version="2.17"><filename>glibc-devel-2.17-292.el7.x86_64.rpm</filename><sum type="sha256">5845234ec70c0d6f90bc93bad5db3ce91bdd2eafbdf352717fac4b8955331856</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10739" id="CVE-2016-10739" title="Cve-2016-10739" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2118" id="RHSA-2019:2118-1" title="Rhsa-2019:2118-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1039304" id="1039304" title="Glibc: More Precise Dns Name Checks (Accepting Dash-.Example.Com, Among Other Things)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1347549" id="1347549" title="Cve-2016-10739 Glibc: Getaddrinfo Should Reject Ip Addresses With Trailing Characters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1443872" id="1443872" title="Glibc: Terminate Process On Invalid Netlink Response From Kernel" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1488370" id="1488370" title="Nscd: Add A Comment To The Default Nscd.Conf File That Is It Not Recommended To Use Nscd And Sssd For The Same Nss Maps" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1555189" id="1555189" title="Glibc: The Japanese Era Name Will Be Changed On May 1, 2019 [Rhel-7.7.0]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1579354" id="1579354" title="Glibc: Initialize Msg_Flags To Zero For Sendmmsg In Resolver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1579730" id="1579730" title="Glibc: Fix I386 Sigaction Sa_Restorer Initialization" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1579739" id="1579739" title="Glibc: Fix Stack Overflow With Huge Pt_Note Segment" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1591268" id="1591268" title="Glibc: Problem With Iconv Converting Iso8859-1 To Ibm273 [Rhel-7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1592475" id="1592475" title="Glibc Headers: Add Ipc Stat_Any Constants" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595191" id="1595191" title="Glibc: Backport Libio Vtable Validation Improvements" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1609067" id="1609067" title="Pldd Does Not Wait For Sigstop After Ptrace_Attach" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1640764" id="1640764" title="Glibc-Rh1505492-Prototypes-Intl.Patch Causes Intermittent Problems Building Glibc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1641981" id="1641981" title="Glibc: Incorrect Analysis Of X86 Cpu Properties Selects Wrong String Functions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646373" id="1646373" title="Glibc: Crash In Getaddrinfo_A When Thread Creation Fails" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1647490" id="1647490" title="Glibc: Stdlib/Test-Bz22786 Test Suite Failure On S390X [Rhel-7.7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1661508" id="1661508" title="Glibc: Adjust To Rpm'S Find-Debuginfo.Sh Changes, To Keep Stripping Binaries [Rhel-7.7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1662842" id="1662842" title="Glibc: Realloc Ncopies Integer Overflow [Rhel-7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1684874" id="1684874" title="Glibc: Add More Linux Definitions To &lt;Netinet/In.H&gt;, Including Ip*_Pmtudisc_Omit" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2125-1</id><title>Ovmf</title><description>Security Fix(es): 
* edk2: Privilege escalation via processing of malformed files in TianoCompress.c (CVE-2017-5731) 
* edk2: Privilege escalation via processing of malformed files in BaseUefiDecompressLib.c (CVE-2017-5732) 
* edk2: Privilege escalation via heap-based buffer overflow in MakeTable() function (CVE-2017-5733) 
* edk2: Privilege escalation via stack-based buffer overflow in MakeTable() function (CVE-2017-5734) 
* edk2: Privilege escalation via heap-based buffer overflow in Decode() function (CVE-2017-5735) 
* edk2: Logic error in MdeModulePkg in EDK II firmware allows for privilege escalation by authenticated users (CVE-2018-3613) 
* openssl: Side-channel vulnerability on SMT/Hyper-Threading architectures (PortSmash) (CVE-2018-5407) 
* edk2: Stack buffer overflow with corrupted BMP (CVE-2018-12181) 
* edk2: buffer overflows in PartitionDxe and UdfDxe with long file names and invalid UDF media (CVE-2019-0160) 
* edk2: stack overflow in XHCI causing denial of service (CVE-2019-0161)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="OVMF" release="6.gitee3198e672e2.el7" src="ovmf-20180508-6.gitee3198e672e2.el7.src.rpm" version="20180508"><filename>OVMF-20180508-6.gitee3198e672e2.el7.noarch.rpm</filename><sum type="sha256">ec69ea1f27f537059545320e0eda6dea912a1771e185175a4c25e743b4276721</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5731" id="CVE-2017-5731" title="Cve-2017-5731" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5732" id="CVE-2017-5732" title="Cve-2017-5732" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5733" id="CVE-2017-5733" title="Cve-2017-5733" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5734" id="CVE-2017-5734" title="Cve-2017-5734" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5735" id="CVE-2017-5735" title="Cve-2017-5735" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12181" id="CVE-2018-12181" title="Cve-2018-12181" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3613" id="CVE-2018-3613" title="Cve-2018-3613" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5407" id="CVE-2018-5407" title="Openssl: Side-Channel Vulnerability On " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0160" id="CVE-2019-0160" title="Cve-2019-0160" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0161" id="CVE-2019-0161" title="Cve-2019-0161" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2125" id="RHSA-2019:2125-1" title="Rhsa-2019:2125-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1641433" id="1641433" title="Cve-2018-3613 Edk2: Logic Error In Mdemodulepkg In Edk Ii Firmware Allows For Privilege Escalation By Authenticated Users" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1641442" id="1641442" title="Cve-2017-5731 Edk2: Privilege Escalation Via Processing Of Malformed Files In Tianocompress.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1641446" id="1641446" title="Cve-2017-5732 Edk2: Privilege Escalation Via Processing Of Malformed Files In Baseuefidecompresslib.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1641450" id="1641450" title="Cve-2017-5733 Edk2: Privilege Escalation Via Heap-Based Buffer Overflow In Maketable() Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1641458" id="1641458" title="Cve-2017-5734 Edk2: Privilege Escalation Via Stack-Based Buffer Overflow In Maketable() Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1641465" id="1641465" title="Cve-2017-5735 Edk2: Privilege Escalation Via Heap-Based Buffer Overflow In Decode() Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1645695" id="1645695" title="Openssl: Side-Channel Vulnerability On " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1686783" id="1686783" title="Cve-2018-12181 Edk2: Stack Buffer Overflow With Corrupted Bmp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1691640" id="1691640" title="Cve-2019-0160 Edk2: Buffer Overflows In Partitiondxe And Udfdxe With Long File Names And Invalid Udf Media" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1694065" id="1694065" title="Cve-2019-0161 Edk2: Stack Overflow In Xhci Causing Denial Of Service" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2126-1</id><title>Libwpd</title><description>Security Fix(es): 
* libwpd: NULL pointer dereference in the function WP6ContentListener::defineTable in WP6ContentListener.cpp (CVE-2018-19208)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="libwpd-doc" release="2.el7" src="libwpd-0.10.0-2.el7.src.rpm" version="0.10.0"><filename>libwpd-doc-0.10.0-2.el7.noarch.rpm</filename><sum type="sha256">4bd2834daaf2ca681fc73cdc0286504163f267404d46b841166cfd69b559c5ca</sum></package><package arch="x86_64" name="libwpd" release="2.el7" src="libwpd-0.10.0-2.el7.src.rpm" version="0.10.0"><filename>libwpd-0.10.0-2.el7.x86_64.rpm</filename><sum type="sha256">6ff7c5cd7ba79e1d8c8cc3375e9c3dbc501e911151fa66f33a8ecfa6106fcf37</sum></package><package arch="i686" name="libwpd" release="2.el7" src="libwpd-0.10.0-2.el7.src.rpm" version="0.10.0"><filename>libwpd-0.10.0-2.el7.i686.rpm</filename><sum type="sha256">27f175af92cbd09b8e456dac3fdbe0106c89cfce3d56ce4cafb36c33a580e9b6</sum></package><package arch="i686" name="libwpd-devel" release="2.el7" src="libwpd-0.10.0-2.el7.src.rpm" version="0.10.0"><filename>libwpd-devel-0.10.0-2.el7.i686.rpm</filename><sum type="sha256">0030d67a739d64f4e82df0f13c63db9ad121e3d7292f485ae1f903d76bb18037</sum></package><package arch="x86_64" name="libwpd-tools" release="2.el7" src="libwpd-0.10.0-2.el7.src.rpm" version="0.10.0"><filename>libwpd-tools-0.10.0-2.el7.x86_64.rpm</filename><sum type="sha256">56d920c6ead371974caf2c9ec2ecea04f3afeb4d65ef2eee1734d79818a867ba</sum></package><package arch="x86_64" name="libwpd-devel" release="2.el7" src="libwpd-0.10.0-2.el7.src.rpm" version="0.10.0"><filename>libwpd-devel-0.10.0-2.el7.x86_64.rpm</filename><sum type="sha256">4c6b4cecd1d0f36108be65affa6c638c163173e8935b1b13a18475ba35312366</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19208" id="CVE-2018-19208" title="Cve-2018-19208" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2126" id="RHSA-2019:2126-1" title="Rhsa-2019:2126-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1649414" id="1649414" title="Cve-2018-19208 Libwpd: Null Pointer Dereference In The Function Wp6Contentlistener::Definetable In Wp6Contentlistener.Cpp" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2130-1</id><title>Libreoffice</title><description>Security Fix(es): 
* libreoffice: Arbitrary python functions in arbitrary modules on the filesystem can be executed without warning (CVE-2018-16858)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="libreofficekit" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreofficekit-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">359d0d3480c60e2c2a3ec2e8ea77b042fe78eacb11b42acb3659cd008df7a143</sum></package><package arch="x86_64" epoch="1" name="libreoffice-base" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-base-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">d90fd63a397d29f58e89acc5283ed5e1ed96e9715a8870bfc15f696ee3f07e58</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pdfimport" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-pdfimport-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">9c1bdfdd6e22e5d44968e5f88f0e75600ab67daa34bab4c42a498dbb31767159</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-pt-BR" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-pt-BR-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">38475197be1b168c0878bc770dfb901ed9c5fa55c4247d0a93a56cc564bd673c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-fi" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-fi-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">25436276053b726333ce380b8eda618b3d5276d138d28411169b349cc72e60cc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tn" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-tn-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">4f65f186b9babf20db43e28b751efa39436d9a259dddcf7c4f160013e4f99c3e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-zh-Hant" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-zh-Hant-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">74b8b653d527d02ad223e2cc5c06cc91ebc0312368c3e7de0e8c1f010074bb91</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-lt" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-lt-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">b6d30d63169a471b70624ccd4293242d22506f1d91ca70475a1e342623b7e510</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-si" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-si-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">22b7dafd02eb7ff9d85173735d535e206d9e760366057ecadf479d2ead2409b5</sum></package><package arch="noarch" epoch="1" name="autocorr-mn" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-mn-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">2999f81a0feab81b620684d162523325ce36286938128b3b8381e4005a408321</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-eu" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-eu-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">ee62c670383f3ded3158b5c414672a677cf0069f668d5a1244bff6b86f924f50</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hr" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-hr-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">19959489b91e46402fbd8a8287efa79858e88abeb10501698492656c659fda5e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-wiki-publisher" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-wiki-publisher-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">b61cc3c373b7b7cab2f22dfcaa59226f5340ce28b128250c8ca6fdb7a2a44edb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ogltrans" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-ogltrans-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">7c4641b081ef706280009bc386b9ecb5732a568dc4371321d551a40cf3978034</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-nn" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-nn-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">045c4ca6baa37df39ddae7ba1e5657cafe7599b55795a01781e89de234ce605d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-tr" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-tr-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">92cb5aa3990e088ca5414ad5b4f5cf2e17f8ee4dbc042400e340ce76888bb737</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-pl" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-pl-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">3ccae46b13a796ff91d0920e65e6dd93723362ac0796be13d0dbc68163c04b0d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-he" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-he-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">f2f041c8e2bdd7a2574ed3826e79b2d53c4cbe5b538505b9b46c814bf506cb49</sum></package><package arch="noarch" epoch="1" name="autocorr-hu" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-hu-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">41e2586b409b74fa1561b39a45f9f1247625fd383aefdf13b8dc2300638e0a2b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-or" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-or-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">2d7359cd90ce76eba177140d54b3a204ad0c58c2f7b480282bffb6ee79ffa119</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ro" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ro-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">b786240efa527af84255a12112c03ce52731c4511f748305d6a0aa8fbca0610a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-af" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-af-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">6b2cf436d02b00818f9ceea71bc8a95367252b3d1e4c6d2716c3dc8c7bda9642</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-el" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-el-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">c5c05d323597f55d5ae9d243fe0ae5cfbca9b0a5a31fd45dd18a13b78e036e25</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-BR" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pt-BR-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">9686f6305b96bbd5dbde438182b09937eb6750d708d2aae69a16f9c207791069</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bg" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-bg-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">01d4cc371d9df5f3bb0f2aa75dbeca33d364263c4f166f03173867a78e4f47c7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nr" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nr-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">40739a1dab273421e038973fea094d137e3678a0dc452a96d3edbc6e0601dc0a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-it" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-it-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">985d9eda812ada7a2dc22c386b1514ab971ab0f1d8f290d549fa9f74cc72ec55</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-bg" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-bg-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">9f44cbe347305d0836df44c20c342d37c8c1900b0e98056d82ac51c2107cbc74</sum></package><package arch="noarch" epoch="1" name="autocorr-pl" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-pl-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">8e5725ea7eed2f7948638c5f74f070e44bd3905ada09b75221925f04127b3f00</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-si" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-si-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">456d07bfd5f72c275da09ac8eb0c52a30a1b16714f2f8bfb8be55c430e9f1693</sum></package><package arch="x86_64" epoch="1" name="libreoffice-emailmerge" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-emailmerge-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">696615a18cf5dacf60eb30dc9a22abd42324823781b118d36bb22933fcc0c54d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ja" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ja-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">15a8798d79d2f4b4badacdea433e106007fbf716db429a02095246395eaa0718</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-gu" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-gu-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">0f4ee67b2347c98f3904a8e672b16f3f48111dbc5a811db77533d964be5d1218</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-sk" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-sk-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">70ce7d3b9963aba4e8a7aeb23d59a8e650c88b005bee9a9e1bed207968666b43</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ko" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ko-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">ebb6accd522624a2e8917b233344d91690f84f17bf6b9a8bf4099a21444a61ec</sum></package><package arch="noarch" epoch="1" name="autocorr-bg" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-bg-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">020d50e50a22ef80bb79a6f7e3c412268c38ec060e14993195d854830ab22923</sum></package><package arch="noarch" epoch="1" name="libreoffice-opensymbol-fonts" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-opensymbol-fonts-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">22ff16c3b248df8aaaad8c60dcfbe8624a8a70980dfaf77fe6cb9d154315b51a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mr" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-mr-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">a278308946ca8b4abd21baaaf29609560ca343dbe9f1bc9a0c7ea43c7b2270cb</sum></package><package arch="noarch" epoch="1" name="autocorr-ca" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ca-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">8b7cf066402c88c176c619c30c8f6415dce7b51aca3035daa5225e2ea9d5ea5f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-lv" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-lv-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">ea444a5c4f5656eb61e57ac7703e14a94b2b169a2da6ec7e9097dd3245c175a3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-dz" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-dz-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">cb2b07eea10129af10ae0be24d83e08ef1fbef045f28e3bd24aa0e6288b2f372</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-xh" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-xh-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">5060ad112ff966dcd75105bff9f2142a058143a937a3ea84a42143c5198c6784</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-hr" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-hr-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">62543e3cf4969b1d8cd6ed56a01a0dc5bd4357eb8a26e091f582a312f6526768</sum></package><package arch="noarch" epoch="1" name="autocorr-ja" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ja-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">2261a184af543fab88aeff61403b1c621922770b910e1a53e9b1c3218ea21c96</sum></package><package arch="noarch" epoch="1" name="autocorr-ro" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ro-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">c552b1ec3907083693bfe7a9c04cbed751fdb8be211fd7737a4a5d94c389f34a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-es" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-es-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">e2c9dc8a4bc0e53a2543dbf9ee88cd2de120b26ccc13b1fc79343ef948978f50</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-te" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-te-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">17aaf54d67e7324cba8ef0ad7a29582bba6faeca2c30899fabfcd6f30cf052d4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zu" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-zu-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">fba19878e9b260f6c42081b1d88c7e8fbbbf598f672d2b17148782ceef77f827</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-sdk-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">df5765d9f98151db4d55c4e686c62acda6c5fedf1559a34cd2c0e514853bd4bf</sum></package><package arch="x86_64" epoch="1" name="libreoffice-filters" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-filters-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">18593c36e66210f031e19f862ac3b998b1472f3baa3c41b2937e8a13df2012bc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-xsltfilter" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-xsltfilter-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">5fee3acf9f01c12b7d04fafc55592f90379d3f457e18e21b6a9b198175ed9eeb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ml" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ml-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">83402c0dade8888c578a5279ee61003753cd8664db9f1e04a4c1ed319796172e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-fr" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-fr-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">33e04864a273383d6ae17499bb4db86248a3cac9e36dfb0eb6c9f0f1067432c6</sum></package><package arch="noarch" epoch="1" name="autocorr-sl" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-sl-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">766ff158b19e7c58c6cf9cc9435da6b1359887024ed9b50607f0546fafdb322f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-impress" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-impress-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">297ffdfe23ddd2ca5b00e5bdc5c57b5ec3d88dd6cf38f86890ed7df5a7655f4b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-st" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-st-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">f0cdb03fa345ed2f07ea64d15aa23b5d8c1b8b1fca3a1c82fa67bf6e23f7cdbc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kk" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-kk-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">82339ca3adf16847d112b88737e20d769227d70c9b777469a76288c793ed5875</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-uk" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-uk-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">2cf842c343f92e3c50e7766fc0cb7ed97bd18225bbec6ca953b0d4329b324642</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-as" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-as-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">0f4de6a007f90b69b979f88521dfa39528f382f6a8eb2d4f41d9688ac0304343</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gu" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-gu-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">17f092a4badb5d0a40a940201087397d7bf22fc96911631995278028ed772330</sum></package><package arch="noarch" epoch="1" name="autocorr-hr" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-hr-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">85ab9cd94bd58cd29fbd6b2afd06278abce9b2781f880546d5d6d7690c7881f1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mai" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-mai-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">38b176702daa7d52bf2f25affe56a62b38d35a5868b4d8c3d4bf71bd99f3ad5d</sum></package><package arch="noarch" epoch="1" name="autocorr-ru" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ru-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">f32d4e63a6a040caf6ecf60b1ad46a9649d6b9a3eb56ad69612c710eb7ba3476</sum></package><package arch="noarch" epoch="1" name="autocorr-tr" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-tr-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">3aa1519f86f5eb495e3847d884c6322269b012817049a0bafb3e248653897f8f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-it" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-it-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">4b224554ba2a41745d16ff9748f8e233fb94b847b1bbb0aecc6560c7415682c6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pl" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pl-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">2bf6037aa76d33320effdf3db24bc3fdbea97f5cd25afe0d2070a339bfa82c63</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ve" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ve-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">2aff83d400da26ca5f56a5960ac77c5007e924f726eaea2150aa6bebc3db213a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cy" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-cy-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">fcff4b7da1c4bbbb0f674decf2ac45c0b6ef1a87f450e0f0a9f22f72ccbf3c2d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-pt-PT" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-pt-PT-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">55b46a96a9734663af698008f0e0815a4daa7eea0db75c200a724918488a57fb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-sl" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-sl-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">334b22e1e465618741f7039db513cb567995002a0bcd00ecb0259ef4b6bf6076</sum></package><package arch="x86_64" epoch="1" name="libreoffice" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">86e4df83bdd52355799bb793dc8e4645d0d57f9c78511ada3647115a785693dd</sum></package><package arch="noarch" epoch="1" name="autocorr-it" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-it-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">0ca9e449408c536a24cefe153cfb9fbb27e4080c07a76f1e86e752aed0c812b6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-rhino" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-rhino-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">ce13c6c9f4ae229a58e934f8554f3a3a136cf4c0dbfaf6ee0ec16d182d264969</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-hu" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-hu-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">dcc343cbc4c6fe52a93415224b136c90c359429a742fffb4b3e9817cd5dc69f2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ar" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ar-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">03ef77b264dfdfbca603ee81043b109a3f1d40ce1d37f3b73c37d751868daee3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-sv" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-sv-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">c86d0fc59234d7182cefae772b565d5d8b18027fc7f7b2a343d323fdd289b325</sum></package><package arch="noarch" epoch="1" name="autocorr-is" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-is-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">e23b8834dff6c6f455b6de3504d735f7b335789b798e341c8f8cb5dfbb2b01ac</sum></package><package arch="x86_64" epoch="1" name="libreoffice-glade" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-glade-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">e45cf1325152f4e6d40a047ac1c4b3f940d069c86db271bbfa5fe118371f9352</sum></package><package arch="noarch" epoch="1" name="autocorr-ko" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ko-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">6f6372e4562118073db59136e68a2cc7e0f5fde6e37e0c83eab4441402533a99</sum></package><package arch="x86_64" epoch="1" name="libreoffice-calc" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-calc-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">85d620eba8ec99765637954a29e873b9966b8f08f0cee2039acfcbcff48ff49f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ca" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ca-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">9e5939d61d20c1b94ce9019787976959dfd1e1c91bf441eb176b885a584dba60</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nl" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nl-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">365fc9a9bc019be9de532bbbf6c146a55852489e00b1a1972904b62f7badc865</sum></package><package arch="x86_64" epoch="1" name="libreoffice-postgresql" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-postgresql-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">31f984b0c909ba1990344e3687c412348df9b99fcc2bd85eb98277fc3d429829</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gdb-debug-support" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-gdb-debug-support-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">fcb9d32b1bc34cf53b2acfc4872c105c6b6482ceee655074064d8bbdb4ffa7e4</sum></package><package arch="noarch" epoch="1" name="libreoffice-ure-common" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-ure-common-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">b36bf4766ebeb10b177f41ca6eb75e668d93f675788456020ef8506c81c1c4b6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ga" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ga-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">8b23d8dd2d8659488fbac897b95e3f811eccc1c5b0027206827f252cab81882d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-et" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-et-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">37fd2e31532397c6364f72593ef2461791e1ab92145035a1cb7985d6a3b35fd6</sum></package><package arch="noarch" epoch="1" name="autocorr-sr" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-sr-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">a47140c802427c27788666e24c0ea80a591f6b0c9886f3808892bfaac2205a4a</sum></package><package arch="noarch" epoch="1" name="autocorr-sv" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-sv-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">b0a5ddd0c846334ee34400b0351fe365249af1465eb72f46dbeb81cf5c01fb9d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nn" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nn-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">57e63cb2f1d9a3df3c1b9094980f5d2c9c3b4621c84c5989c28473ee734a404a</sum></package><package arch="noarch" epoch="1" name="autocorr-lt" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-lt-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">f65ef377a6bab1f3fb17f2a448171bcb331cdccff4c51bff5a280c83f6fd98a3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fr" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-fr-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">3da4ce3bbb5cb2bd4c585193ddfdd13c4a96711a135e2c7abbd30942319acf7f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kn" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-kn-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">80c58fc78e8831df1311d06b15fa8abe568893c0ad9280dd6ca1aba6ef3e904c</sum></package><package arch="x86_64" epoch="1" name="libreofficekit-devel" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreofficekit-devel-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">1876975595c9e777865966dba1b44b6c9725394eccfb1841d2d861f54112ac53</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hans" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-zh-Hans-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">0a64e443581f77688425161f50de79438d34632c8fc45c46a2dbeee26f8cb62b</sum></package><package arch="noarch" epoch="1" name="autocorr-fa" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-fa-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">977d3bf675bf2fdd77c67db851d6a9f0f4fd08e4f63cd8b8fc8b816efe1ecf57</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-uk" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-uk-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">d39d1bf6ae53a53eb40a2b4e9a05420f1fbc22a53d97c514ec2ae69da76e9768</sum></package><package arch="noarch" epoch="1" name="autocorr-de" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-de-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">5de780d72868c2b960925e383d8441dff579b64fea3aecc486f34454a81b7b84</sum></package><package arch="noarch" epoch="1" name="libreoffice-officebean-common" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-officebean-common-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">ba9855b11a469811efdf7c0e0bdbc16475dbefa5c3c1c603edbabc93e1967ac5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nso" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nso-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">971752a84593a5fc223c998161333fec2f6434e352c8fa103ac588f8b79cc899</sum></package><package arch="noarch" epoch="1" name="autocorr-da" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-da-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">c91c3bdfbd2321083f497bdf28acf166804c5ee9d6a400d7539c1b91a9b06f4d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-br" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-br-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">08d0d0ae636a8ea2c9ca80668a1ce61a06517ac28d774c309aefd2be36f00eb9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-nlpsolver" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-nlpsolver-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">b6ebccecb1d6e254ac6ea7f57de0a5ebcc8203989653c3cea85d07048f2f5398</sum></package><package arch="noarch" epoch="1" name="autocorr-lb" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-lb-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">3392664b47338be628db482c94b29003ec28619a6f555f39798fc718622a6d85</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ar" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ar-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">28528b3f407a786cc06481fd7a16c2fb8e136b984c0f0552518b91744b250eb1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-librelogo" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-librelogo-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">723deed94495ed8d4b880ce5c4b3b02612444c6e0a3cfb9ac279cfeb1e27ee07</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-PT" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pt-PT-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">d1435220e18eaaba95b0c77d25452925a22776b5004044b484e4632d36f6086c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ko" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ko-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">91714041dbd319fdbb4eccb36a5d1db6fd29ebc94745561698748ee10e74f60d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hu" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-hu-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">8ca22a96d591af6f97abbbd10dc8d2805c19db216164d8d0d522b1e128be1c91</sum></package><package arch="noarch" epoch="1" name="autocorr-ga" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ga-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">300f0500edbdcc2f8c1afe3b7a88a48183e1ea8506f4fb3a64f5b36a4d7e2a32</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pyuno" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-pyuno-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">8943bba4f3c697a3fbc346616b06b3262f235eb5696d39fdc5594f8a9ae2ed9c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ta" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ta-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">16e42ee3e6847dce27d58b93348bed32c15298e01be5fd36e3cbe96df9fb067d</sum></package><package arch="noarch" epoch="1" name="autocorr-af" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-af-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">154769b7e49ba7dbd3702b79db1fa764badc12492d06b38d57226d54533149cb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-id" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-id-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">8cbe1d83ca6469d35d234fe7c8f626f0dd769f57c86b47f0ca7ded04f680d51c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-nl" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-nl-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">ed423aecdf21de0005b254842dd2ecadd4f45ad322852b6198cd9b2cc6ca1ee1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-x11" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-x11-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">c41cfa24dc9a67e4408c12e2373fb86f588039ef6db6541698766e891c594030</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-he" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-he-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">eb33875b380a6aca7a873bda6fc5d977ad4ae5bae76088123731f8bdab07a517</sum></package><package arch="noarch" epoch="1" name="libreoffice-data" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-data-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">85eb7c760770c2355617601075abb806322ee5d32df7b06267c96bbc1fc736a7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ure" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-ure-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">cc70ec2915baaccc6fa1824515eb3efc6295120b921e07fa2e108cff8a1a3d65</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sr" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sr-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">1a371769195584e03527a66d5115614aeb8e055f3b1086c605e9f2c8d13afad2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-zh-Hans" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-zh-Hans-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">0dc9ddb783a9465a7790f0cfc1e45d6810a9d8b2e4a6f4c73e023fb2de98547d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk-doc" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-sdk-doc-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">3aab3291d1b01b0e005a2f9c07c499966c05aa25a4bea9fae0cde867e834f47c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tr" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-tr-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">aa6c19707493dc8dd34c7a37232377870fb9d1ac417a27d7d76418723749de7d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sv" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sv-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">4dd72c073b55dc04487c8c72709f25c01724ef6d6cb0deb02732776e3605fe54</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ts" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ts-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">a2089f5630652830a219d18dc6067b19997c494a03a41d51e96e568aa8935623</sum></package><package arch="noarch" epoch="1" name="autocorr-nl" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-nl-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">092a6e14137f6a8b1bd63360b05d59eeab0280cbeae1501b257a5fc3e4d02eab</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ca" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ca-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">b44b70b6805da3957c6aeb16667c93d74c092d3e536b60829b39202fb6ea4d91</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-hi" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-hi-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">1f6e55ae9cad0ecebed298966c3e6041223e5fd3c96b9b201c3e393317c9f972</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cs" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-cs-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">28efca78cf611e1194eeabef322e72bec3890e7fae3912b47fb79b1da525c42f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-th" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-th-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">ca0cc16fb189717a478c060795008592e625eddaa51401ee6e07d01f25c3de16</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ta" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ta-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">008882dcd84ac646950c9b960dac2de62d13dce95b84e117c3c9d57ad42afece</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fi" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-fi-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">73f665b23905bcd7aacb63fbbaa5180a191e4c294169a09238f0eb775275e60f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lv" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-lv-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">01da12ee23a698aae6aa0c7a8642508380a877f18da0819893e508e363890170</sum></package><package arch="x86_64" epoch="1" name="libreoffice-draw" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-draw-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">8f55f125d42a3b569f578d9e15d9d4bf2c3d045fd29ee4f1b461b599a67dda0d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nb" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nb-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">9bb0a7c214d2ef9da0b022df88a5a568306a74cf2ef4434a220a9999bc41b91c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ss" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ss-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">d8213fefb56a9072a263a929370793d1313c5f2d9ecc099123520f2720151af8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-da" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-da-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">3202d5d924482d74ef0b02d023b090004a27d1055bcfda762f2aaf2e30ce424c</sum></package><package arch="noarch" epoch="1" name="autocorr-zh" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-zh-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">b0b1869022819164c1c26e73c13c97ab78644415033d2195bd2ef71e0233c092</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-dz" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-dz-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">06a7446fe3dd04ebe1168cc7e1f122d44a6ceeeed9fae771f8bee69ecb09d9be</sum></package><package arch="noarch" epoch="1" name="autocorr-sk" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-sk-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">2931d9fb4c349e09750c2752367c97163d2d2874b8e446ffa90da0ff1c8b863b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ro" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ro-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">d628fd91045eccd48bf0e55d17e8e55805a22e11ac664b8517b260b008377aae</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-en" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-en-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">e1528d3106bd3625e6fb8528e3875124966b2b0d31223a3e96bd2b92a9d638ff</sum></package><package arch="noarch" epoch="1" name="autocorr-es" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-es-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">d6320aafabee518b11ee8ce8a36443b2b04cbe7aae57bc5d05dc6fc71f68eccc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lt" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-lt-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">e35e3486c35c0dde70e72898294c71347558f3ea41ee6473a69dc45b8074546a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-de" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-de-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">9b89a9a29b0eccb2e1777c91cee430ce6a0992fb3dc4297e15293893febe40ac</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-gl" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-gl-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">04dab2e090da3dae910f10ffa67b0cd9adc0253672925dcbdcf81506d75d9239</sum></package><package arch="noarch" epoch="1" name="autocorr-pt" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-pt-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">1685982c38c444ffa69c850b91dab217e33c5647d376acea4b88a5467090cedd</sum></package><package arch="noarch" epoch="1" name="autocorr-fr" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-fr-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">bc067f1603aaadcda348dc0d36cb98d229b7189f32ca2c4b84442b1cfe0e936a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fa" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-fa-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">32c8c161486782dfba2feb2e06d6bb60872e7dc5a7c948b36f5925764c523e76</sum></package><package arch="x86_64" epoch="1" name="libreoffice-core" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-core-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">1ae88e968658b4497a52a5d6ac863d72b672ff478c7df87043409d8670c4da2d</sum></package><package arch="noarch" epoch="1" name="autocorr-cs" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-cs-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">363a409cfaa7b37e982bf73f286ffe1c3b6f4e2d972964833b2a118d5178f9e2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-math" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-math-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">ce8a6c1a856595197239715070e61a117aa293b2ed3c080978a73a1a694a70f1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-writer" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-writer-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">ac1fa31cfdc1d0dabca9907bcc2c5432884b045f708e619630416dd17afe86ac</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ru" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ru-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">bd96623c4dd7e42d9d7790604be6cec1f37277aa257f37295265d6645c7f4e1b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-bn" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-bn-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">c23f7cf99667175101cbcfc8e715d91a3e427469b42747ba4008772d61636ea8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bn" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-bn-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">4554f93c5198b5a64e8831f4c7c14dd745900e2c0ce1d782670d6b399fd4e1f5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-bsh" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-bsh-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">4d2ad2c7e546cc5936cffd9aa5a476ac6ff9555fcf05131e71fe6d0241f4974f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hi" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-hi-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">038d9dd821212278918a0e2929034f103402cbe006ed53de34990a1ca6155a59</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ja" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ja-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">efa46fd9eac871f3ee7e2c0ecaaf8e4fcfdd317f54c88ec75476c7cda1235e53</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-et" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-et-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">3ee20df121414db1b36034c1f519885362ca0ac70d07934defd35dd66e401889</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pa" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pa-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">4c98d4ba3f31d799c1668c228e142e9a6785cc6b8ee28cef1eea9a072299bdea</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-eu" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-eu-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">c6d36abec441ea41037daac8de37539e48352caa2ac669bad17b5bf7f1108be5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-cs" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-cs-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">59cbc09835fbd5e0e1f6670b365950e40b501a4cbdf6ccdd7561c14ae33033ed</sum></package><package arch="noarch" epoch="1" name="autocorr-fi" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-fi-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">168b94c7602fdee50cf0ad431f358ef1fe7a31b485bcb93323ee0e6c82fc34ee</sum></package><package arch="noarch" epoch="1" name="autocorr-vi" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-vi-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">43155f401e218709fa09056969a7f17ae274c1b49b926b6c660e44562197a14b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gl" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-gl-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">a2569128224323862f1160e4b9c61e081e9a003cd5b9b8495fb37bc0be4c6e26</sum></package><package arch="x86_64" epoch="1" name="libreoffice-officebean" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-officebean-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">e53512f879c5f4ac5c63a60b5ab4de3c2e403e0a0515ab5f3beed0ed6c86537c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-es" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-es-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">f99cdb436be48453133cf7c047fdb6b357387497861eb8d3a50f0555c950dee2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hant" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-zh-Hant-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">e0a2c4a62455ad36985dcbd5f2a5948a6718cf5a195b76cc6a8946c708a4da05</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-el" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-el-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">d474a4184414809f6c98cd9d02fdbffabd7ee718b4f045517ec9ada0e0a6e15c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-da" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-da-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">348d3339ff3fa6fe916ec4aa1768686502849c41f737c95ed5d064e883d3e823</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gtk3" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-gtk3-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">de11fc19c78875e62c81b669af6d3e49bf6799081c1167b509f6fb1c0d82a24c</sum></package><package arch="noarch" epoch="1" name="autocorr-en" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>autocorr-en-5.3.6.1-21.el7.noarch.rpm</filename><sum type="sha256">da5cf942bbe7a53bf578034c2378281f0aa01061d50cdc35d238e073fde74d69</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sl" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sl-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">35152ad20e0871cc07954b5ebaa1e9fca9812c47c12c2a5346d30c51a9e3d822</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gtk2" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-gtk2-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">bd47ae987cd6e04bbc871dd485992bf88a37d6be98167873843bd50fd1dc25df</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-nb" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-nb-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">6926d9baa39f6651c01abe4f69ad746c8ed576e5397cada1a4ed4bf2388e6d2f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-graphicfilter" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-graphicfilter-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">00130ac5aba73b94bac0b7af38f71d57ffefb7df82a8c45e553cc3271bddca1a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-de" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-de-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">c8e2c72625181bc372236c75940404fbf15ec00da8e2ecb1b171f98f0e591aca</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ru" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ru-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">fb51bcc49dda3e48b0c64ee35c284dc5e2c14bd45d0a545c31cf4ebeab06f6b6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sk" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sk-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">f0088df61485ca68f6daf023b827e74f25c00aac63132da9e0444b53299dd279</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-id" release="21.el7" src="libreoffice-5.3.6.1-21.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-id-5.3.6.1-21.el7.x86_64.rpm</filename><sum type="sha256">4e8279770c27dfcae60ddce213b20804e6f8b9cab60552948ffddd12c0645687</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16858" id="CVE-2018-16858" title="Cve-2018-16858" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2130" id="RHSA-2019:2130-1" title="Rhsa-2019:2130-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1066844" id="1066844" title="Gnome Docs Depend On Libreoffice (Was: Libreoffice Installed For Client Without @Office-Suite Being Selected)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1649841" id="1649841" title="Cve-2018-16858 Libreoffice: Arbitrary Python Functions In Arbitrary Modules On The Filesystem Can Be Executed Without Warning" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2135-1</id><title>Qt5</title><description>The following packages have been upgraded to a later upstream version: qt5-qt3d (5.9.7), qt5-qtbase (5.9.7), qt5-qtcanvas3d (5.9.7), qt5-qtconnectivity (5.9.7), qt5-qtdeclarative (5.9.7), qt5-qtdoc (5.9.7), qt5-qtgraphicaleffects (5.9.7), qt5-qtimageformats (5.9.7), qt5-qtlocation (5.9.7), qt5-qtmultimedia (5.9.7), qt5-qtquickcontrols (5.9.7), qt5-qtquickcontrols2 (5.9.7), qt5-qtscript (5.9.7), qt5-qtsensors (5.9.7), qt5-qtserialbus (5.9.7), qt5-qtserialport (5.9.7), qt5-qtsvg (5.9.7), qt5-qttools (5.9.7), qt5-qttranslations (5.9.7), qt5-qtwayland (5.9.7), qt5-qtwebchannel (5.9.7), qt5-qtwebsockets (5.9.7), qt5-qtx11extras (5.9.7), qt5-qtxmlpatterns (5.9.7). 
Security Fix(es): 
* qt5-qtbase: Double free in QXmlStreamReader (CVE-2018-15518) 
* qt5-qtsvg: Invalid parsing of malformed url reference resulting in a denial of service (CVE-2018-19869) 
* qt5-qtbase: QImage allocation failure in qgifhandler (CVE-2018-19870) 
* qt5-qtimageformats: QTgaFile CPU exhaustion (CVE-2018-19871) 
* qt5-qtbase: QBmpHandler segmentation fault on malformed BMP file (CVE-2018-19873)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="qt5-qtwayland" release="1.el7" src="qt5-qtwayland-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtwayland-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">fba68ee7116ffaeb761d93d27ab13ec6c3dce6977ae826a648bfc76fe5aba661</sum></package><package arch="i686" name="qt5-qtconnectivity-devel" release="1.el7" src="qt5-qtconnectivity-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtconnectivity-devel-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">2fd4a0514e144955fd3a669482adb898a535bef4f34d9183d49591971e6c1b94</sum></package><package arch="i686" name="qt5-qtmultimedia" release="1.el7" src="qt5-qtmultimedia-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtmultimedia-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">c927e0ee756f670ee5742647106cae5892b7b20500c7bfda953f2ea9847ed27a</sum></package><package arch="i686" name="qt5-qtserialport" release="1.el7" src="qt5-qtserialport-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtserialport-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">cdfa41fe64fdfe8bbb17c64050769933b873a1c7dd37dc0b41d0bdd4524edb90</sum></package><package arch="noarch" name="qt5-qttools-common" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qttools-common-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">754b3c169de6debc6b08b4dccc22656a64798c955d65c936ebc9ace8f357470c</sum></package><package arch="x86_64" name="qt5-qtwebsockets-examples" release="1.el7" src="qt5-qtwebsockets-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtwebsockets-examples-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">1aacd2cfd657d0426b9b9b4da680a7bd12d739fcbaa6aa08067b85d8c6b4ac11</sum></package><package arch="i686" name="qt5-designer" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-designer-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">4c6d434711267f05c9dcea1c27e78e084f025e837507e57c3eafc10f8952b27d</sum></package><package arch="x86_64" name="qt5-qtconnectivity-devel" release="1.el7" src="qt5-qtconnectivity-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtconnectivity-devel-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">927aeb7ae6c5d0280f3005a210d964f7730a87611695f93ac8f95022c1739fae</sum></package><package arch="noarch" name="qt5-qtscript-doc" release="1.el7" src="qt5-qtscript-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtscript-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">51a442f8bd9bf31ddf4184291cff8f9a7e41be213f9cf5f246506eb88b076089</sum></package><package arch="x86_64" name="qt5-qtquickcontrols2-doc" release="1.el7" src="qt5-qtquickcontrols2-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtquickcontrols2-doc-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">647b0d2e93e29a67e6ad8800f92291069daea92071ee44e7a9793373b432a7fc</sum></package><package arch="x86_64" name="qt5-qtserialport" release="1.el7" src="qt5-qtserialport-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtserialport-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">ee6779cda4e8bad1de3e95a3863f1a0a07e7a64ba6727c077ded218b2e9886e1</sum></package><package arch="i686" name="qt5-qtwebchannel-devel" release="1.el7" src="qt5-qtwebchannel-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtwebchannel-devel-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">7e05ae0432aa93a2aef0917868c5372c36cf63211974a6f4baa1befa9f66588b</sum></package><package arch="x86_64" name="qt5-qtbase-doc" release="2.el7" src="qt5-qtbase-5.9.7-2.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-doc-5.9.7-2.el7.x86_64.rpm</filename><sum type="sha256">8b6e0f1fbb7778cd11dfb81ee688575bf22319e2a60418acc5e3bff150af85de</sum></package><package arch="x86_64" name="qt5-qtx11extras" release="1.el7" src="qt5-qtx11extras-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtx11extras-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">3213f297554619066cc74845c09e8977fb262cfedd2c9f3ffa1e12e336b161aa</sum></package><package arch="x86_64" name="qt5-qt3d" release="1.el7" src="qt5-qt3d-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qt3d-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">b85798f5dd0c8573cdf4916fef96c87133f6f162657192e8b89a777e33710c4e</sum></package><package arch="x86_64" name="qt5-qtwebsockets" release="1.el7" src="qt5-qtwebsockets-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtwebsockets-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">61b5eff50d6e2d07c05363161d6d6073bff27279da4a19053b892bf7172def67</sum></package><package arch="i686" name="qt5-qtwebsockets-devel" release="1.el7" src="qt5-qtwebsockets-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtwebsockets-devel-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">e95df498574fed70f9df8c1ea70a9b2ace35f2cfdb87fa19c107bcdfda20cd3b</sum></package><package arch="x86_64" name="qt5-qt3d-examples" release="1.el7" src="qt5-qt3d-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qt3d-examples-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">c95842bc388fde5deb86dc3c6f0537c66929bd5bfa12d2fba1df40153664ab0e</sum></package><package arch="i686" name="qt5-qtquickcontrols2-devel" release="1.el7" src="qt5-qtquickcontrols2-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtquickcontrols2-devel-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">996f79a2063f12c9d5fa2b0c84f2585ebe250b726d0115846d3674fd8a4fcb70</sum></package><package arch="x86_64" name="qt5-qtwebsockets-devel" release="1.el7" src="qt5-qtwebsockets-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtwebsockets-devel-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">8cb758227b83e440dd950a45a1e2c5f29b1c4fc77dd723fea0a56d1ebb2a1ec0</sum></package><package arch="i686" name="qt5-qttools-static" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qttools-static-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">37bbb85e7507a17737c8907c95e3f1280ed89316050ae5f5b516978764931b2c</sum></package><package arch="i686" name="qt5-qtsensors-devel" release="1.el7" src="qt5-qtsensors-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtsensors-devel-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">a73d315c05df9ff90d670aaae8fdb1c464e2a50088cfa8e39cf52c431a5bc9a3</sum></package><package arch="noarch" name="qt5-qt3d-doc" release="1.el7" src="qt5-qt3d-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qt3d-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">869f6e90e2e6aa08ed4379b6797e163e6cc2870a2acefb27b898b315f32701cd</sum></package><package arch="noarch" name="qt5-qtdoc" release="1.el7" src="qt5-qtdoc-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtdoc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">1aa1d66f59d21cfc6afa8a5142062a442a1e0e71622629b45f2b86d37c41969b</sum></package><package arch="x86_64" name="qt5-qtwebchannel-devel" release="1.el7" src="qt5-qtwebchannel-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtwebchannel-devel-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">c30c9e35d6fc54370a039429bf418d6d599b7c131c332511b7c6613d8fe0efab</sum></package><package arch="x86_64" name="qt5-qttools-libs-designercomponents" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qttools-libs-designercomponents-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">0f4f91c633c4c7c4ede915bdfb34076a1291760e3661122c38740fd7f81b17ca</sum></package><package arch="x86_64" name="qt5-qtdeclarative" release="1.el7" src="qt5-qtdeclarative-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtdeclarative-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">897111207b0ba1e24f0983e3870e9c566d4b151b84927deaeb287b6098d6c002</sum></package><package arch="x86_64" name="qt5-qtmultimedia-examples" release="1.el7" src="qt5-qtmultimedia-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtmultimedia-examples-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">ce434a402e5ffe17e2f5483ebd4a809ab5b9f8f4c688906878e00d3cd57aec27</sum></package><package arch="i686" name="qt5-qtquickcontrols2" release="1.el7" src="qt5-qtquickcontrols2-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtquickcontrols2-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">3fad049c05f32df1bdbe72849e6d8cc68ac9bafac5a28ea664ef804303bf3331</sum></package><package arch="x86_64" name="qt5-qtbase-postgresql" release="2.el7" src="qt5-qtbase-5.9.7-2.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-postgresql-5.9.7-2.el7.x86_64.rpm</filename><sum type="sha256">21be3f89fa15c79cabe52d5f77a21972e12cd5ca2485df6089ac31ff0c08517e</sum></package><package arch="i686" name="qt5-qtimageformats" release="1.el7" src="qt5-qtimageformats-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtimageformats-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">590bf51630f86b11208c68b78aa96cb35e4ecc0242f5b991516afa2b7e6eedcb</sum></package><package arch="x86_64" name="qt5-qtbase-mysql" release="2.el7" src="qt5-qtbase-5.9.7-2.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-mysql-5.9.7-2.el7.x86_64.rpm</filename><sum type="sha256">98190178faa9fd320b300fb2ad20f50422f7bcc405332ebf79d6f5429bbec3c3</sum></package><package arch="x86_64" name="qt5-qttools-libs-help" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qttools-libs-help-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">55115acb856cae8ccc2b2263092872273e42a4d9b16c3b428d018d0b267d516a</sum></package><package arch="i686" name="qt5-qtbase-gui" release="2.el7" src="qt5-qtbase-5.9.7-2.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-gui-5.9.7-2.el7.i686.rpm</filename><sum type="sha256">4b831754b5f0884a93e18b2ff810a84e9baa9b78841d6e76643921c2f6f6cb01</sum></package><package arch="i686" name="qt5-qtscript" release="1.el7" src="qt5-qtscript-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtscript-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">e2429ba227f355de76267d23e7a740d3fa6edbee952b2ffce46aa20831e353a5</sum></package><package arch="i686" name="qt5-qtsensors" release="1.el7" src="qt5-qtsensors-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtsensors-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">8bab2eaa6b8240bf8785be16263848304bed9b2c8378fc21c97a80e54233e2af</sum></package><package arch="i686" name="qt5-qtbase-odbc" release="2.el7" src="qt5-qtbase-5.9.7-2.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-odbc-5.9.7-2.el7.i686.rpm</filename><sum type="sha256">58fc91f964dd089a8b732a5096029fb3da7dc2a3924b0e8ef1f9f9930ec2dd46</sum></package><package arch="noarch" name="qt5-qtquickcontrols-doc" release="1.el7" src="qt5-qtquickcontrols-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtquickcontrols-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">dd6866d2d67f160d720e984d6ec50218188ce3b5156af568a968fe78395de0eb</sum></package><package arch="x86_64" name="qt5-qtquickcontrols2-devel" release="1.el7" src="qt5-qtquickcontrols2-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtquickcontrols2-devel-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">68ffcac74b90546d411f7a808d261a5cb6eff92d4dfd30201acbf3d8ffa05ad6</sum></package><package arch="i686" name="qt5-qtlocation-devel" release="1.el7" src="qt5-qtlocation-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtlocation-devel-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">bd68ba42dec78d2acb7ab7cfb5c3ac212609dc0958be4a9e71abaea9adea33cd</sum></package><package arch="x86_64" name="qt5-qtxmlpatterns-devel" release="1.el7" src="qt5-qtxmlpatterns-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtxmlpatterns-devel-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">1dd97f0222e3d5cb35cdc07236f9f50fa7e390b0f44af290d19811a3b3a84d55</sum></package><package arch="x86_64" name="qt5-qtdeclarative-devel" release="1.el7" src="qt5-qtdeclarative-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtdeclarative-devel-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">94fb265781559bd009314db8ec622689b35b1a9b52f08fb1e3b94ca8bb4c6501</sum></package><package arch="x86_64" name="qt5-qtwebchannel-examples" release="1.el7" src="qt5-qtwebchannel-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtwebchannel-examples-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">d94cdb49b3bb60c0b0f21028ba1a589621ac8b48a2a72338671ecb053548ab7e</sum></package><package arch="x86_64" name="qt5-qtwayland-devel" release="1.el7" src="qt5-qtwayland-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtwayland-devel-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">dcd688c9a5603da6c3452b16c01d29e3c0f93e2bb87b3766a888e822527d8e9d</sum></package><package arch="x86_64" name="qt5-qtwebchannel" release="1.el7" src="qt5-qtwebchannel-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtwebchannel-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">4f67b3468978e8ea40fa1d9ff4e964bcce7b779a56b75e580101a76f131b06fd</sum></package><package arch="noarch" name="qt5-qtlocation-doc" release="1.el7" src="qt5-qtlocation-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtlocation-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">3111f0697fe6d5f2075caf1af8e35f5c342b44cded42c4e1f91707e16f96325b</sum></package><package arch="x86_64" name="qt5-qdbusviewer" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qdbusviewer-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">bc55922bdf091e323dbee6632c380352543cafa5b25d457fb3be77006b330eb6</sum></package><package arch="x86_64" name="qt5-qtlocation-examples" release="1.el7" src="qt5-qtlocation-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtlocation-examples-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">042b22741a88015f7a1ed535956b591132d3d5624cf5332610b234aedc3908eb</sum></package><package arch="i686" name="qt5-qtgraphicaleffects" release="1.el7" src="qt5-qtgraphicaleffects-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtgraphicaleffects-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">5126eef2595496c3fb17391fad205be5dc810e1f46c8d2c864813de23609f5ec</sum></package><package arch="x86_64" name="qt5-qtscript-examples" release="1.el7" src="qt5-qtscript-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtscript-examples-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">fb7734fb678a1014064df19cacea63e60196a65e7f3664e85307ced40910fa76</sum></package><package arch="x86_64" name="qt5-qtquickcontrols2" release="1.el7" src="qt5-qtquickcontrols2-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtquickcontrols2-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">87837187078c0093e398cff0c1c57905885c5e709b14fd477c0c5b9dde70a590</sum></package><package arch="x86_64" name="qt5-qtbase-static" release="2.el7" src="qt5-qtbase-5.9.7-2.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-static-5.9.7-2.el7.x86_64.rpm</filename><sum type="sha256">14b81b0868fa881ee77750c2049ee046f44eb3923db69b345a046eeedfcc27e9</sum></package><package arch="i686" name="qt5-qtx11extras-devel" release="1.el7" src="qt5-qtx11extras-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtx11extras-devel-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">2e810b306d02008f0bfb642d2940eba45012a89ea69640f3960dae42e046078d</sum></package><package arch="i686" name="qt5-qtserialbus" release="1.el7" src="qt5-qtserialbus-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtserialbus-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">d62738c358e60ea776873f0b5a73836e1c83318ed4004a44a6a5838661ef7db8</sum></package><package arch="x86_64" name="qt5-qtwayland" release="1.el7" src="qt5-qtwayland-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtwayland-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">e867f8f072e4ecf5f376e304f0a8e60af9ae8c7acdc4bdfda801cb89902e116d</sum></package><package arch="noarch" name="qt5-qtsensors-doc" release="1.el7" src="qt5-qtsensors-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtsensors-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">c5f7783c1caa527b9e43ab9e2a88db733a07ceb348c510468545953467cae959</sum></package><package arch="noarch" name="qt5-qttools-doc" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qttools-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">f0ded8755e8cbe06141c347a0e427f755c460596a9e374850eccf7c0b1e72c37</sum></package><package arch="i686" name="qt5-qtdeclarative" release="1.el7" src="qt5-qtdeclarative-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtdeclarative-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">419eb0ee21dfd735763ad7a6a8953c7d718cc8887222cfae565f8ee9d31495ae</sum></package><package arch="noarch" name="qt5-qtwebchannel-doc" release="1.el7" src="qt5-qtwebchannel-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtwebchannel-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">986a237c485a0001e7ecf4818de44fc4d8c5a73dc4d0aef1a6b57e8f4bc2f2c3</sum></package><package arch="x86_64" name="qt5-qtwayland-examples" release="1.el7" src="qt5-qtwayland-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtwayland-examples-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">1a609016ebc7581578ba3ae38a1827ec709de08e96577a3ea61abd2a98c76d29</sum></package><package arch="i686" name="qt5-qtbase-mysql" release="2.el7" src="qt5-qtbase-5.9.7-2.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-mysql-5.9.7-2.el7.i686.rpm</filename><sum type="sha256">2ff8c920e23fca558e153f51c0cb6a033c3384e3037a73f479a2512a4cbb9ba8</sum></package><package arch="i686" name="qt5-qtsvg-devel" release="1.el7" src="qt5-qtsvg-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtsvg-devel-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">35d0731d51b7c2945d9507a534e3e05ebe110ecf88491d8c7ce9670146cd03fb</sum></package><package arch="noarch" name="qt5-qtsvg-doc" release="1.el7" src="qt5-qtsvg-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtsvg-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">19c113f6826dc55fa7b75bf1b7f1c0ed7772d330f9ef14d987197236f995bf87</sum></package><package arch="x86_64" name="qt5-designer" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-designer-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">333d29edcb2046a513358bcd00238868e883e6e7926ba856ed41a8b67fb9a7c6</sum></package><package arch="x86_64" name="qt5-qtcanvas3d" release="1.el7" src="qt5-qtcanvas3d-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtcanvas3d-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">167384d8db00574f7a7d66416419b907ef7e90f99498c34f087fb097077fc61b</sum></package><package arch="x86_64" name="qt5-qtdeclarative-examples" release="1.el7" src="qt5-qtdeclarative-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtdeclarative-examples-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">d301ae6b33fa805613130e818c3d24a2ba7a28c5d57bc9712d589926cb3bc09e</sum></package><package arch="x86_64" name="qt5-qtdeclarative-doc" release="1.el7" src="qt5-qtdeclarative-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtdeclarative-doc-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">953aa28ac1499509af2f60504d11781226ec3402eed4aa9d3d44f5f290bec3a4</sum></package><package arch="x86_64" name="qt5-qtmultimedia-devel" release="1.el7" src="qt5-qtmultimedia-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtmultimedia-devel-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">2d7ae744c299bfef24be0e335cba47ebf4eaaa54727c17ea5203265bb1c8086b</sum></package><package arch="i686" name="qt5-qtwebchannel" release="1.el7" src="qt5-qtwebchannel-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtwebchannel-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">37d772cb746059ce5411967d49eb14ce1f58aeb926c1903ce912285e6c719723</sum></package><package arch="i686" name="qt5-qtxmlpatterns-devel" release="1.el7" src="qt5-qtxmlpatterns-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtxmlpatterns-devel-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">bf5ba826ac856957646467dfe46db277757d198000654779f4025c8f8d363ba4</sum></package><package arch="x86_64" name="qt5-assistant" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-assistant-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">d46462a77d6c8465772f7b3203238d275d8f9d088cc99155b34a933fd132bd5b</sum></package><package arch="noarch" name="qt5-rpm-macros" release="2.el7" src="qt5-qtbase-5.9.7-2.el7.src.rpm" version="5.9.7"><filename>qt5-rpm-macros-5.9.7-2.el7.noarch.rpm</filename><sum type="sha256">cddbf0a2e603acb62fcb6f5020d70139df067c74e8039d660f1ad53e1fb1ae68</sum></package><package arch="x86_64" name="qt5-qtserialbus" release="1.el7" src="qt5-qtserialbus-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtserialbus-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">29d6fd2ec31ecc7419cda93e42643e691bcc1034d3d1655565f1d1bf4f928ad5</sum></package><package arch="x86_64" name="qt5-qtserialport-examples" release="1.el7" src="qt5-qtserialport-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtserialport-examples-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">cee8d36e5e9e6bb34d4563afadea2e91e2f0d9cf168f2d9d67c00794a1029487</sum></package><package arch="x86_64" name="qt5-qtx11extras-devel" release="1.el7" src="qt5-qtx11extras-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtx11extras-devel-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">9865c70b7e024a74775c7250cacd662132bd71848d7a12992b7755a47eea67bf</sum></package><package arch="i686" name="qt5-qtscript-devel" release="1.el7" src="qt5-qtscript-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtscript-devel-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">c17b309751f9c0e10ffcff2dff9fae87e846cafb52a629a7994bea35528721e9</sum></package><package arch="x86_64" name="qt5-qttools" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qttools-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">ca1e9888f650085cca8cd2448e76b105c9a663a592f150a72c55b1cf80952991</sum></package><package arch="i686" name="qt5-qtmultimedia-examples" release="1.el7" src="qt5-qtmultimedia-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtmultimedia-examples-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">1802b39844da23760f6e3a9503e2c27d66493bfb44820266955ecb32ce138d17</sum></package><package arch="x86_64" name="qt5-qtmultimedia" release="1.el7" src="qt5-qtmultimedia-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtmultimedia-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">5e433526b7d314ae4e8fc9d39875b1527917f864488032bb8fb1ebb25cb37cf3</sum></package><package arch="x86_64" name="qt5-qtserialport-devel" release="1.el7" src="qt5-qtserialport-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtserialport-devel-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">d0e6eac8b961a7ce6da95adebc428a7aff56b79d3f28221468231ce2ed23c0b1</sum></package><package arch="i686" name="qt5-qt3d" release="1.el7" src="qt5-qt3d-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qt3d-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">622bad27697f5835693c8badd8c8da1aa63ac83180926007e5aaefc0d4013037</sum></package><package arch="x86_64" name="qt5-qtconnectivity" release="1.el7" src="qt5-qtconnectivity-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtconnectivity-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">c15d72bd942510ca35328e5ea558c961d3d1f8ccd5e894e1caa9d5a22f6dfc24</sum></package><package arch="noarch" name="qt5-qtimageformats-doc" release="1.el7" src="qt5-qtimageformats-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtimageformats-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">cec80015cb94b9ab2e8905baed2f8117badb0d24dbfecd4e45d9bfe3464ae328</sum></package><package arch="x86_64" name="qt5-qtbase-odbc" release="2.el7" src="qt5-qtbase-5.9.7-2.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-odbc-5.9.7-2.el7.x86_64.rpm</filename><sum type="sha256">2a57e17c284ab461003772f31bfd96d122b9d2a78d2e385a03c0ba11dc2b6ede</sum></package><package arch="x86_64" name="qt5-qtimageformats" release="1.el7" src="qt5-qtimageformats-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtimageformats-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">4732252ea01c7934395d52f79da1bfb73c6362619044924d906782828f1ba498</sum></package><package arch="i686" name="qt5-qtxmlpatterns" release="1.el7" src="qt5-qtxmlpatterns-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtxmlpatterns-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">aa14ad7f5792151c6176a0a84a4f6d44449e815a3acd0e8551621931ffd2f62e</sum></package><package arch="i686" name="qt5-qtbase-postgresql" release="2.el7" src="qt5-qtbase-5.9.7-2.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-postgresql-5.9.7-2.el7.i686.rpm</filename><sum type="sha256">7d11651119d37e3071eadc48ff82044c82aea6953371b541d9b0ec4b36609d13</sum></package><package arch="noarch" name="qt5-qtconnectivity-doc" release="1.el7" src="qt5-qtconnectivity-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtconnectivity-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">2e7852b49bde000b6c7acbd250f269a6807308c7db176d634639efc00ea11cb1</sum></package><package arch="i686" name="qt5-qtsvg" release="1.el7" src="qt5-qtsvg-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtsvg-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">a1fadc9d7d88ab5f2fb822c934c000ccb72d2f8d526da13a49da91e5dcc6a2bb</sum></package><package arch="noarch" name="qt5-qttranslations" release="1.el7" src="qt5-qttranslations-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qttranslations-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">46c62d89fa98d272b0505885f33b10317e1f5bcdf9ed5d9859cc1a7117a9f2ba</sum></package><package arch="x86_64" name="qt5-qtscript-devel" release="1.el7" src="qt5-qtscript-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtscript-devel-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">4f6ae7e0f0fcf96d76aecf2d0ff9b0e736af3831a4c1b861a22d9c9cc6a286ab</sum></package><package arch="i686" name="qt5-qtserialbus-devel" release="1.el7" src="qt5-qtserialbus-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtserialbus-devel-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">4dbcf0e0964c13928180ac90a4d421e2d957c0c4543d29fb575181eba48690db</sum></package><package arch="i686" name="qt5-qtsensors-examples" release="1.el7" src="qt5-qtsensors-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtsensors-examples-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">5c94e368958478eafe68cd3f6f91c5ecddff6d2735ebacfb6190fb75bcf9253d</sum></package><package arch="i686" name="qt5-qtwebsockets" release="1.el7" src="qt5-qtwebsockets-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtwebsockets-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">b30b2bf01bffeda4d08e2477aeea811459be19684a76f68cccb5625d1b313109</sum></package><package arch="i686" name="qt5-qtbase-devel" release="2.el7" src="qt5-qtbase-5.9.7-2.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-devel-5.9.7-2.el7.i686.rpm</filename><sum type="sha256">1934ffa71693ff138852c0685d8560aff4db0f72ff735792eaff4b7963b23327</sum></package><package arch="x86_64" name="qt5-qtbase-gui" release="2.el7" src="qt5-qtbase-5.9.7-2.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-gui-5.9.7-2.el7.x86_64.rpm</filename><sum type="sha256">ae7e469a60db967bd584fa96f72fcceaf56218c2acb1467406c81450a11c4179</sum></package><package arch="x86_64" name="qt5-qtsvg-devel" release="1.el7" src="qt5-qtsvg-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtsvg-devel-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">5724d27be0a4907beb48b96a14715c0ef73ceee8ac4f93397216cfccbc489209</sum></package><package arch="noarch" name="qt5-qtbase-common" release="2.el7" src="qt5-qtbase-5.9.7-2.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-common-5.9.7-2.el7.noarch.rpm</filename><sum type="sha256">c7a59f50c8858ea91d49a0b657d24e837f6360300e6ce7974eb46010e06deabf</sum></package><package arch="noarch" name="qt5-qtserialbus-doc" release="1.el7" src="qt5-qtserialbus-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtserialbus-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">338401e894fccab9e9b293b7efc336a83ca7c8afe0e8d88b0de6af50d3621759</sum></package><package arch="x86_64" name="qt5-qtbase-devel" release="2.el7" src="qt5-qtbase-5.9.7-2.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-devel-5.9.7-2.el7.x86_64.rpm</filename><sum type="sha256">43a44ded6a8e97bd7caf2cc2cf6da2aa700fcab7ed810b105d5a09ba8332c4c3</sum></package><package arch="i686" name="qt5-qtx11extras" release="1.el7" src="qt5-qtx11extras-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtx11extras-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">3f9bd2022681404ddd7b12e798e53c17dfce91c0f07debdfaca4e51ae9b40287</sum></package><package arch="x86_64" name="qt5-qtlocation" release="1.el7" src="qt5-qtlocation-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtlocation-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">c2c4cbdd5bc4f5ac890473d57de112edab473cb140b766cba199223721b00e43</sum></package><package arch="x86_64" name="qt5-qtquickcontrols-examples" release="1.el7" src="qt5-qtquickcontrols-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtquickcontrols-examples-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">47cc2b6dc703103136d49634abffbe90efcaaaedf6c8e3b26bdaf513161e5787</sum></package><package arch="x86_64" name="qt5-qtserialbus-devel" release="1.el7" src="qt5-qtserialbus-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtserialbus-devel-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">c760d18c75277028d4e5f76840e8ce27ce416f875a4d554633f82b0dc25893bf</sum></package><package arch="i686" name="qt5-qtdeclarative-static" release="1.el7" src="qt5-qtdeclarative-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtdeclarative-static-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">25a5b34b17367f470fabba947cdbb56e3c8881ad81214698325f26076c7d0497</sum></package><package arch="x86_64" name="qt5-qtxmlpatterns" release="1.el7" src="qt5-qtxmlpatterns-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtxmlpatterns-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">6fe7fd8ec7cf634c0ab29988f8845ea5cc67c6a2001da0a44b246be1a2d9d262</sum></package><package arch="x86_64" name="qt5-qtsvg" release="1.el7" src="qt5-qtsvg-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtsvg-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">441fb0a4b698fe0acc967e704a18c3966de8bcef4ed84566a05c50bf90e1a8a1</sum></package><package arch="i686" name="qt5-qtlocation" release="1.el7" src="qt5-qtlocation-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtlocation-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">d2b203f4f2ff3a5067c34021f3a37849c30a0a89a330010d12191976bcabd329</sum></package><package arch="x86_64" name="qt5-qttools-static" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qttools-static-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">55b58ed4c8e221426b90e65a64b2f936c87854087df35e39428a394577eb65ae</sum></package><package arch="x86_64" name="qt5-qtsensors-devel" release="1.el7" src="qt5-qtsensors-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtsensors-devel-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">f4524a1285d2079633eef148bb06c4747d13361f4b257e1e3c53af4bf3e9b5cb</sum></package><package arch="i686" name="qt5-qt3d-devel" release="1.el7" src="qt5-qt3d-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qt3d-devel-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">7088fbceb837ad24e1710bdaab95a050a1769a84ab87be8205a0943a4c2c00c4</sum></package><package arch="x86_64" name="qt5-qtgraphicaleffects" release="1.el7" src="qt5-qtgraphicaleffects-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtgraphicaleffects-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">7ed5081e3bd7543d00f79590be1423c13d289c842d5a90c46b802de56daf6003</sum></package><package arch="noarch" name="qt5-qtx11extras-doc" release="1.el7" src="qt5-qtx11extras-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtx11extras-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">c3d936cf5602154ab0d7b9d1e18e16434e4229074db82a2d853add796d3ba04a</sum></package><package arch="x86_64" name="qt5-qtscript" release="1.el7" src="qt5-qtscript-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtscript-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">7f86e5ccd249bafd215ad9e2e6526a2c65c84bc0a786a4692ec567db3d68aaad</sum></package><package arch="x86_64" name="qt5-qtcanvas3d-examples" release="1.el7" src="qt5-qtcanvas3d-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtcanvas3d-examples-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">f53f554082bf23440efed1139078dbfcc7a3d0c6d4c8ab712ab38c3e3247cf9c</sum></package><package arch="i686" name="qt5-qtconnectivity" release="1.el7" src="qt5-qtconnectivity-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtconnectivity-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">7b3181923a83fab33dfdad9c5bef4b507b23c593dca11903474b0347895b2508</sum></package><package arch="x86_64" name="qt5-linguist" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-linguist-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">a555e5d9ac765386fd1cc244398eae99e6310d4bd9ea7f2661cd944ccdf8f7b7</sum></package><package arch="x86_64" name="qt5-qtsensors" release="1.el7" src="qt5-qtsensors-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtsensors-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">222cf4577430eb8190ba758fca5b5979ade13b40fabf37fad5f2ba65c95470e7</sum></package><package arch="x86_64" name="qt5-qtserialbus-examples" release="1.el7" src="qt5-qtserialbus-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtserialbus-examples-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">820be6ef8df2621bb44aa42310c9872ee9246d990db8fe3f6adc8e1622fa5e23</sum></package><package arch="noarch" name="qt5-qtwayland-doc" release="1.el7" src="qt5-qtwayland-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtwayland-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">f7c17c276b28c2b38e9b2114b0e22b54335a7406553368792ce9010478f032ce</sum></package><package arch="x86_64" name="qt5-qttools-devel" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qttools-devel-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">f6a864729a577bfa20b4ca5454956854886527f0eeaf3ce1ecd69540f749c895</sum></package><package arch="noarch" name="qt5-qtcanvas3d-doc" release="1.el7" src="qt5-qtcanvas3d-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtcanvas3d-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">1c8a398b66274a323cb13a4df9dc76c2cf8dfa3552b1f7bd8663cde61dae1357</sum></package><package arch="x86_64" name="qt5-qtdeclarative-static" release="1.el7" src="qt5-qtdeclarative-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtdeclarative-static-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">6090171c2eac076fd5162c398f3083625fa56b5fb40082622c7141cc79e80980</sum></package><package arch="x86_64" name="qt5-qtquickcontrols2-examples" release="1.el7" src="qt5-qtquickcontrols2-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtquickcontrols2-examples-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">3c246fe62d13d1004419fc6f21497ae2cfba5b578d10da711fd7ad89299a6ffb</sum></package><package arch="x86_64" name="qt5-qtconnectivity-examples" release="1.el7" src="qt5-qtconnectivity-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtconnectivity-examples-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">d10ba4bb75e410b8710f4b24bafd11117357b25a00c8931fe08b8d41d5d9dba4</sum></package><package arch="x86_64" name="qt5-qttools-examples" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qttools-examples-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">00629a7ed26649f683e79cd2f928ce2e8e28d78013109f901e0896333416c84b</sum></package><package arch="i686" name="qt5-qtwayland-devel" release="1.el7" src="qt5-qtwayland-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtwayland-devel-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">cbd2db4a2c3fa5b672abfb030591a21bbd0c2f64db5709c83cd9ea4b3903560a</sum></package><package arch="i686" name="qt5-qttools-devel" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qttools-devel-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">0832f57b12b62e1477df19cffa1b6bed4944722f03570f58b6c26623b1d8d1a5</sum></package><package arch="i686" name="qt5-qttools-libs-help" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qttools-libs-help-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">27014b3a8b5959addf228a44accc8bbedd609c82d469d20a958b25afdcb198af</sum></package><package arch="noarch" name="qt5-qtxmlpatterns-doc" release="1.el7" src="qt5-qtxmlpatterns-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtxmlpatterns-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">ff051d42b731c82dd7689395af94178c4e741651624b227499d8ff9be72dbba5</sum></package><package arch="i686" name="qt5-qttools-libs-designercomponents" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qttools-libs-designercomponents-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">6ae08a47cffa168d53e30b63a57b5ed67e0f4267d8ca2baa9c7ffcc3fa3e3ea4</sum></package><package arch="i686" name="qt5-qtdeclarative-devel" release="1.el7" src="qt5-qtdeclarative-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtdeclarative-devel-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">9b09a9aa69371975f2a151a90450e7a7d2d651a9a3f1c154a736087a217e1338</sum></package><package arch="x86_64" name="qt5-qtlocation-devel" release="1.el7" src="qt5-qtlocation-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtlocation-devel-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">071416ab0b16bd1a8772c8404eed1442be817dd94773300e0c703d230521313d</sum></package><package arch="i686" name="qt5-qtserialport-devel" release="1.el7" src="qt5-qtserialport-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtserialport-devel-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">84f615f1b5b17af8f82d8666ebde9dc3dbe6492bff61ffdd4f950cb3f493e73f</sum></package><package arch="x86_64" name="qt5-qtbase" release="2.el7" src="qt5-qtbase-5.9.7-2.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-5.9.7-2.el7.x86_64.rpm</filename><sum type="sha256">a24c6ad30164f0fb0a36ec016044a2d7749c37268d0f1c5620402f73a3e3f2c5</sum></package><package arch="x86_64" name="qt5-doctools" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-doctools-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">16c30added32c2136bb593cb9f9aa0e985b4a206628b87d07f5affb42c248c98</sum></package><package arch="noarch" name="qt5-qtserialport-doc" release="1.el7" src="qt5-qtserialport-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtserialport-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">e056080ce51741014fdc20b7ae33a32ee45ede2e3b17a9f7bc9471c57047ef37</sum></package><package arch="noarch" name="qt5-qtmultimedia-doc" release="1.el7" src="qt5-qtmultimedia-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtmultimedia-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">c28d6ea768fbe848d3e9adb0bb5d9924100603449e3d4dd3f0564783b65623b4</sum></package><package arch="noarch" name="qt5-qtwebsockets-doc" release="1.el7" src="qt5-qtwebsockets-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtwebsockets-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">82d498ac0842998280a82d7bd4a96b7c676596b87079495bf80795cdfdcbffa4</sum></package><package arch="i686" name="qt5-qtmultimedia-devel" release="1.el7" src="qt5-qtmultimedia-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtmultimedia-devel-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">14ff83cb6c7d6c28623b404a69927491f6ea6d199eebc106eb53cd519ff15db0</sum></package><package arch="x86_64" name="qt5-qttools-libs-designer" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qttools-libs-designer-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">66482b0fd967f4e0c5801068b556f79c9cb02c119556904f42061e7dbfda2c43</sum></package><package arch="x86_64" name="qt5-qt3d-devel" release="1.el7" src="qt5-qt3d-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qt3d-devel-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">0f5658a5caaa96b8bf7a03c464eac9931655c670e068ccbfcc12db4166b9f96b</sum></package><package arch="i686" name="qt5-qtbase" release="2.el7" src="qt5-qtbase-5.9.7-2.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-5.9.7-2.el7.i686.rpm</filename><sum type="sha256">9c619179ffd3944647aa55a8526e40518d8d5bd96d8df7a39c57646a307bfd4d</sum></package><package arch="x86_64" name="qt5-qtquickcontrols" release="1.el7" src="qt5-qtquickcontrols-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtquickcontrols-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">688604e813d93a29785e4f454f847d5d8a793333445c6abf70f2e8f73c8b432f</sum></package><package arch="x86_64" name="qt5-qtsensors-examples" release="1.el7" src="qt5-qtsensors-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtsensors-examples-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">10ac5cfb99f28868e7839e06531cd067fb61c5dfd656cd5db8b8f1af1ee15221</sum></package><package arch="i686" name="qt5-qtbase-static" release="2.el7" src="qt5-qtbase-5.9.7-2.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-static-5.9.7-2.el7.i686.rpm</filename><sum type="sha256">597607bd478df57af12ef119960a955d6ce9882da0699f8beaba83957a90349d</sum></package><package arch="x86_64" name="qt5-qtbase-examples" release="2.el7" src="qt5-qtbase-5.9.7-2.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-examples-5.9.7-2.el7.x86_64.rpm</filename><sum type="sha256">a25a5220ee9637359439582a438f1286041a0d5dcd3c7a52c72f503fb3d2f2cc</sum></package><package arch="x86_64" name="qt5-qtxmlpatterns-examples" release="1.el7" src="qt5-qtxmlpatterns-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtxmlpatterns-examples-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">485eb94b84c0775f08f59fb7f6f6bf9a9ba6ba5bd2f3c936f0a5eaea89e7bf9b</sum></package><package arch="noarch" name="qt5-qtgraphicaleffects-doc" release="1.el7" src="qt5-qtgraphicaleffects-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtgraphicaleffects-doc-5.9.7-1.el7.noarch.rpm</filename><sum type="sha256">32fad95c365861c5452df4e2e3caee0e8a3212abb917a4fa4cd3376df298ed93</sum></package><package arch="x86_64" name="qt5-qtsvg-examples" release="1.el7" src="qt5-qtsvg-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qtsvg-examples-5.9.7-1.el7.x86_64.rpm</filename><sum type="sha256">b09f14eaec9152a99835dc7eb9d1631b159b78516587fe4247dfd2cc0d27e336</sum></package><package arch="i686" name="qt5-qttools-libs-designer" release="1.el7" src="qt5-qttools-5.9.7-1.el7.src.rpm" version="5.9.7"><filename>qt5-qttools-libs-designer-5.9.7-1.el7.i686.rpm</filename><sum type="sha256">a8457673837e6ccae99d1846037ee88edce183b368707b7e870061de02f1b854</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15518" id="CVE-2018-15518" title="Cve-2018-15518" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19869" id="CVE-2018-19869" title="Cve-2018-19869" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19870" id="CVE-2018-19870" title="Cve-2018-19870" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19871" id="CVE-2018-19871" title="Cve-2018-19871" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19873" id="CVE-2018-19873" title="Cve-2018-19873" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2135" id="RHSA-2019:2135-1" title="Rhsa-2019:2135-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564000" id="1564000" title="Rebase Qt5-Qtbase To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564001" id="1564001" title="Rebase Qt5-Qtcanvas3D To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564002" id="1564002" title="Rebase Qt5-Qtconnectivity To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564003" id="1564003" title="Rebase Qt5-Qtdeclarative To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564004" id="1564004" title="Rebase Qt5-Qtdoc To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564006" id="1564006" title="Rebase Qt5-Qtgraphicaleffects To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564007" id="1564007" title="Rebase Qt5-Qtimageformats To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564008" id="1564008" title="Rebase Qt5-Qtlocation To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564009" id="1564009" title="Rebase Qt5-Qtmultimedia To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564010" id="1564010" title="Rebase Qt5-Qtquickcontrols To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564011" id="1564011" title="Rebase Qt5-Qtquickcontrols2 To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564012" id="1564012" title="Rebase Qt5-Qtscript To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564013" id="1564013" title="Rebase Qt5-Qtsensors To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564014" id="1564014" title="Rebase Qt5-Qtserialbus To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564015" id="1564015" title="Rebase Qt5-Qtserialport To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564016" id="1564016" title="Rebase Qt5-Qtsvg To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564017" id="1564017" title="Rebase Qt5-Qttools To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564018" id="1564018" title="Rebase Qt5-Qttranslations To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564019" id="1564019" title="Rebase Qt5-Qtwayland To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564020" id="1564020" title="Rebase Qt5-Qtwebchannel To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564021" id="1564021" title="Rebase Qt5-Qtwebsockets To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564022" id="1564022" title="Rebase Qt5-Qtxmlpatterns To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564023" id="1564023" title="Rebase Qt5-Qtx11Extras To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1564024" id="1564024" title="Rebase Qt5-Qt3D To 5.9.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658996" id="1658996" title="Cve-2018-19870 Qt5-Qtbase: Qimage Allocation Failure In Qgifhandler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658998" id="1658998" title="Cve-2018-19873 Qt5-Qtbase: Qbmphandler Segmentation Fault On Malformed Bmp File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1659000" id="1659000" title="Cve-2018-15518 Qt5-Qtbase: Double Free In Qxmlstreamreader" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1661460" id="1661460" title="Cve-2018-19869 Qt5-Qtsvg: Invalid Parsing Of Malformed Url Reference Resulting In A Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1661465" id="1661465" title="Cve-2018-19871 Qt5-Qtimageformats: Qtgafile Cpu Exhaustion" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2136-1</id><title>Libssh2</title><description>The following packages have been upgraded to a later upstream version: libssh2 (1.8.0). 
Security Fix(es): 
* libssh2: Zero-byte allocation with a specially crafted SFTP packed leading to an out-of-bounds read (CVE-2019-3858) 
* libssh2: Out-of-bounds reads with specially crafted SSH packets (CVE-2019-3861)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libssh2" release="3.el7" src="libssh2-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>libssh2-1.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">a9ecfcc252676e16e0ff42b631a4d75aa19459ed0ff38d27dd8602e225fdb1da</sum></package><package arch="i686" name="libssh2-devel" release="3.el7" src="libssh2-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>libssh2-devel-1.8.0-3.el7.i686.rpm</filename><sum type="sha256">3e204ddbe1fb56aa52bcc1aba2f232bb4345208e11f5f68e323c1a99071f002c</sum></package><package arch="x86_64" name="libssh2-devel" release="3.el7" src="libssh2-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>libssh2-devel-1.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">6d94121c0103d571eef4da43d6d9dea23d6e86afeb032b803b696d5f869206cd</sum></package><package arch="noarch" name="libssh2-docs" release="3.el7" src="libssh2-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>libssh2-docs-1.8.0-3.el7.noarch.rpm</filename><sum type="sha256">dcb0775c5f82b23c88445f06b1d094b0cdcf6428796a02df443dbd0867068afc</sum></package><package arch="i686" name="libssh2" release="3.el7" src="libssh2-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>libssh2-1.8.0-3.el7.i686.rpm</filename><sum type="sha256">23107e0287d7035121fed766677292739b521b18f44c2dc3e0f59f7bcbe85a1d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3858" id="CVE-2019-3858" title="Cve-2019-3858" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3861" id="CVE-2019-3861" title="Cve-2019-3861" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2136" id="RHSA-2019:2136-1" title="Rhsa-2019:2136-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1687306" id="1687306" title="Cve-2019-3858 Libssh2: Zero-Byte Allocation With A Specially Crafted Sftp Packed Leading To An Out-Of-Bounds Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1687311" id="1687311" title="Cve-2019-3861 Libssh2: Out-Of-Bounds Reads With Specially Crafted Ssh Packets" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2137-1</id><title>Keycloak-Httpd-Client-Install</title><description>Security Fix(es): 
* keycloak-httpd-client-install: unsafe /tmp log file in --log-file option in keycloak_cli.py (CVE-2017-15111) 
* keycloak-httpd-client-install: unsafe use of -p/--admin-password on command line (CVE-2017-15112)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python2-keycloak-httpd-client-install" release="1.el7" src="keycloak-httpd-client-install-0.8-1.el7.src.rpm" version="0.8"><filename>python2-keycloak-httpd-client-install-0.8-1.el7.noarch.rpm</filename><sum type="sha256">82ad5aa0e83d6dcc902c4c88a5b244783cb126217831aeeceaefcd2ca55f3b8e</sum></package><package arch="noarch" name="keycloak-httpd-client-install" release="1.el7" src="keycloak-httpd-client-install-0.8-1.el7.src.rpm" version="0.8"><filename>keycloak-httpd-client-install-0.8-1.el7.noarch.rpm</filename><sum type="sha256">51002e27d278f90359a2c58415293935c31b183aee693f295d6cd90480206b52</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15111" id="CVE-2017-15111" title="Cve-2017-15111" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15112" id="CVE-2017-15112" title="Cve-2017-15112" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2137" id="RHSA-2019:2137-1" title="Rhsa-2019:2137-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1511623" id="1511623" title="Cve-2017-15111 Keycloak-Httpd-Client-Install: Unsafe /Tmp Log File In --Log-File Option In Keycloak_Cli.Py" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1511626" id="1511626" title="Cve-2017-15112 Keycloak-Httpd-Client-Install: Unsafe Use Of -P/--Admin-Password On Command Line" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1673716" id="1673716" title="Rebase K-H-C-I To Version 0.8" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2141-1</id><title>Kde-Workspace</title><description>Security Fix(es): 
* kde-workspace: Missing sanitization of notifications allows to leak client IP address via IMG element (CVE-2018-6790)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libkworkspace" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>libkworkspace-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">e5acae8c05cb2469856efaee2fff457aad9ef0478d807259ec11872a7d3cb821</sum></package><package arch="noarch" name="kde-settings" release="23.9.el7" src="kde-settings-19-23.9.el7.src.rpm" version="19"><filename>kde-settings-19-23.9.el7.noarch.rpm</filename><sum type="sha256">db52778332ef52245665115de3884cb57f0ae999b23abbe1322969454528a2ed</sum></package><package arch="noarch" name="kde-settings-pulseaudio" release="23.9.el7" src="kde-settings-19-23.9.el7.src.rpm" version="19"><filename>kde-settings-pulseaudio-19-23.9.el7.noarch.rpm</filename><sum type="sha256">960d26a0d1547505bfe7a7198ef3b157fc14bca0a49749ec878021a8e131f29b</sum></package><package arch="x86_64" name="ksysguardd" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>ksysguardd-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">3b67687f188674983ba506130de0579f50a5b8aee3d7bce499cd288d0ea44c95</sum></package><package arch="x86_64" name="kinfocenter" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kinfocenter-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">f7d8da3efa52d147819737f595c2f23230b2b193a21e27c1ce9f56e5d187d99b</sum></package><package arch="x86_64" name="kwin-gles-libs" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kwin-gles-libs-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">b2f581a57adefe8586e1a5052fd14a26ed3f3ed80deb1d3e3c025d8e4e347125</sum></package><package arch="i686" name="libkworkspace" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>libkworkspace-4.11.19-13.el7.i686.rpm</filename><sum type="sha256">05955900e945defab673e81c1868397ef7a58d6ea2bb1667f7995c1bc45687fb</sum></package><package arch="x86_64" epoch="6" name="kdelibs-devel" release="10.el7" src="kdelibs-4.14.8-10.el7.src.rpm" version="4.14.8"><filename>kdelibs-devel-4.14.8-10.el7.x86_64.rpm</filename><sum type="sha256">237fcf540b5d2caa815d384a05a81c4c8117542397139e109a5aaaa96870fa06</sum></package><package arch="x86_64" name="kgreeter-plugins" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kgreeter-plugins-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">de0c5d9f051d4b4007f309d96dee4e89e09fd929cfc466a1d449e56137801f0f</sum></package><package arch="x86_64" name="kmenuedit" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kmenuedit-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">5261cb9edaba0899e93ea2bcf8eab511651fb0e27b4b67d894792bb0ebd1ab31</sum></package><package arch="x86_64" name="kde-workspace-devel" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kde-workspace-devel-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">a27814f357216aa6e4968b7d66f4a7dfbf417775acc44f50755bf9e3a3f6a7ff</sum></package><package arch="x86_64" name="plasma-scriptengine-python" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>plasma-scriptengine-python-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">1cf15b53c2e7934b2b4df41702d49c739605007ea6e0c6eb955606ef82748883</sum></package><package arch="i686" name="kde-workspace-devel" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kde-workspace-devel-4.11.19-13.el7.i686.rpm</filename><sum type="sha256">5941575a985a489724938b0cea25bbde258622297af1822d07de8d57c9d7941e</sum></package><package arch="noarch" name="kde-workspace-ksplash-themes" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kde-workspace-ksplash-themes-4.11.19-13.el7.noarch.rpm</filename><sum type="sha256">47c1dbe94d975538a75327511c943b789f19352fbb570fcf99c53f1f7f49eef1</sum></package><package arch="x86_64" name="kwin-libs" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kwin-libs-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">4f2a52b368a86b28ae388b1a065cf8c0522fe5f69374c935aab14c2750ed6bce</sum></package><package arch="i686" epoch="6" name="kdelibs" release="10.el7" src="kdelibs-4.14.8-10.el7.src.rpm" version="4.14.8"><filename>kdelibs-4.14.8-10.el7.i686.rpm</filename><sum type="sha256">618ad8e45950e483d7b506c16c20d1058c0541a24c55e019697b7f1d0a87e3a2</sum></package><package arch="x86_64" name="kmag" release="4.el7" src="kmag-4.10.5-4.el7.src.rpm" version="4.10.5"><filename>kmag-4.10.5-4.el7.x86_64.rpm</filename><sum type="sha256">81467d39e4fa1f3b3f405ff79547b7feec7a392082939707dc8d1a9b6b8d1881</sum></package><package arch="x86_64" epoch="1" name="virtuoso-opensource" release="7.el7" src="virtuoso-opensource-6.1.6-7.el7.src.rpm" version="6.1.6"><filename>virtuoso-opensource-6.1.6-7.el7.x86_64.rpm</filename><sum type="sha256">cd108e7b4f0a8d9fef122a588f9d1ed7ed8b27a5acb57095d695ecc8afb4434f</sum></package><package arch="noarch" name="kde-settings-ksplash" release="23.9.el7" src="kde-settings-19-23.9.el7.src.rpm" version="19"><filename>kde-settings-ksplash-19-23.9.el7.noarch.rpm</filename><sum type="sha256">469126160a647135bef42c2323f258ec16d5a20a745933492500182d5bdb9596</sum></package><package arch="x86_64" name="kde-style-oxygen" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kde-style-oxygen-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">d244beb32997a14e6d4412dd203c2a2680d14aeddc67466e8a8c4293d63c3604</sum></package><package arch="i686" epoch="6" name="kdelibs-ktexteditor" release="10.el7" src="kdelibs-4.14.8-10.el7.src.rpm" version="4.14.8"><filename>kdelibs-ktexteditor-4.14.8-10.el7.i686.rpm</filename><sum type="sha256">3de74bcab91626b4b1a865167440b5aae92b5f2d929a5d42d4b20892f0028bbc</sum></package><package arch="x86_64" epoch="1" name="virtuoso-opensource-utils" release="7.el7" src="virtuoso-opensource-6.1.6-7.el7.src.rpm" version="6.1.6"><filename>virtuoso-opensource-utils-6.1.6-7.el7.x86_64.rpm</filename><sum type="sha256">94558b5102e358ca477d0a1fe7d0efd822782a0f0fcdc121cc048676a94606dc</sum></package><package arch="i686" name="ksysguard-libs" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>ksysguard-libs-4.11.19-13.el7.i686.rpm</filename><sum type="sha256">8bbccfca7abed3e1fcce9ae0aaeaf55d9d1544f779a0a23a1f505f5f63a82939</sum></package><package arch="x86_64" epoch="6" name="kdelibs-ktexteditor" release="10.el7" src="kdelibs-4.14.8-10.el7.src.rpm" version="4.14.8"><filename>kdelibs-ktexteditor-4.14.8-10.el7.x86_64.rpm</filename><sum type="sha256">2c03843cda651628d174ab0cc705de1f14be8a014be21fde008b2f868174869f</sum></package><package arch="noarch" name="kde-settings-plasma" release="23.9.el7" src="kde-settings-19-23.9.el7.src.rpm" version="19"><filename>kde-settings-plasma-19-23.9.el7.noarch.rpm</filename><sum type="sha256">13757123ed49bc24b9301467cc076d07ebfacc14f5616635c611574f6c8d0df9</sum></package><package arch="i686" name="kwin-gles-libs" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kwin-gles-libs-4.11.19-13.el7.i686.rpm</filename><sum type="sha256">95a3073616f1446403162770dd6eb4327f046e36cdbc05a067de5653162fb9ba</sum></package><package arch="x86_64" name="ksysguard" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>ksysguard-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">4caea1f9485f665804f6ac52ade15111d7ba2a70c25da023e2b978dd434da680</sum></package><package arch="i686" epoch="6" name="kdelibs-devel" release="10.el7" src="kdelibs-4.14.8-10.el7.src.rpm" version="4.14.8"><filename>kdelibs-devel-4.14.8-10.el7.i686.rpm</filename><sum type="sha256">bc4b018ab60badb8cf37419aced770a35dd0e95d61031895c23099765bf375c4</sum></package><package arch="x86_64" name="kcm_colors" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kcm_colors-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">2eddff740ce84692c943edaac9591af1a41ddec57918929ba2d490fec69c3cca</sum></package><package arch="x86_64" name="ksysguard-libs" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>ksysguard-libs-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">70b1b00f16fefebc81d41db17ffe4210010a002eaa2a4bb458c74552a94d60f1</sum></package><package arch="noarch" name="kdeclassic-cursor-theme" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kdeclassic-cursor-theme-4.11.19-13.el7.noarch.rpm</filename><sum type="sha256">bf70ad86f2c1789e6c84072ffad1846da654db06c6863dfb7f7fe68a6fcec0b3</sum></package><package arch="x86_64" name="plasma-scriptengine-ruby" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>plasma-scriptengine-ruby-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">2775ac37df99e333a4057ff995fc54970be80959243be8cccdeff29a3b8b83f3</sum></package><package arch="x86_64" name="kde-workspace-libs" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kde-workspace-libs-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">5871bc039e1157bed8332f7f5f669926bd99a070e72d6b8d0702eb608c293b8d</sum></package><package arch="i686" name="kwin-libs" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kwin-libs-4.11.19-13.el7.i686.rpm</filename><sum type="sha256">8ac6b6be8b2a51a2d6b2ce09f787b3e8c25012d0652d2c990d93e83d1f7381f8</sum></package><package arch="x86_64" name="kwin-gles" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kwin-gles-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">8c009042e8952fa28424329b1213560b13a5a801323baff6bc73f5ac47706088</sum></package><package arch="noarch" name="oxygen-cursor-themes" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>oxygen-cursor-themes-4.11.19-13.el7.noarch.rpm</filename><sum type="sha256">b8635675befb9260a0db65e4b2cf529854106f37a635aecb1776ee1012e988d0</sum></package><package arch="x86_64" name="kde-workspace" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kde-workspace-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">89e0b8e2766d40a0e3b0144ad4b83be530e4f3f78e35aacb8cadeaf56dcd4651</sum></package><package arch="noarch" name="kde-settings-minimal" release="23.9.el7" src="kde-settings-19-23.9.el7.src.rpm" version="19"><filename>kde-settings-minimal-19-23.9.el7.noarch.rpm</filename><sum type="sha256">94dbe0ed97b50196ae27ff21da066112201f224fbe21084260acb0e822f8ab5d</sum></package><package arch="i686" name="kde-workspace-libs" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kde-workspace-libs-4.11.19-13.el7.i686.rpm</filename><sum type="sha256">b03a574058bbe7888ca3b0bcb18e5403a1c50387b6c8c4cf38a33a5e8cadee46</sum></package><package arch="noarch" epoch="6" name="kdelibs-apidocs" release="10.el7" src="kdelibs-4.14.8-10.el7.src.rpm" version="4.14.8"><filename>kdelibs-apidocs-4.14.8-10.el7.noarch.rpm</filename><sum type="sha256">8a9f3b2f0b8041f2ad538f35a3079356954f5aacdd119f1d3617250011c5db75</sum></package><package arch="noarch" name="qt-settings" release="23.9.el7" src="kde-settings-19-23.9.el7.src.rpm" version="19"><filename>qt-settings-19-23.9.el7.noarch.rpm</filename><sum type="sha256">a614df3e97398e5752c3afb31858b00b51b98df0ef3a66e9964d8f077fc7fa86</sum></package><package arch="x86_64" name="khotkeys-libs" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>khotkeys-libs-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">cab6338479ead61bc41c2ddcb84ef8695eb913c59f52e3926ce05f830d5ba2ae</sum></package><package arch="x86_64" epoch="6" name="kdelibs-common" release="10.el7" src="kdelibs-4.14.8-10.el7.src.rpm" version="4.14.8"><filename>kdelibs-common-4.14.8-10.el7.x86_64.rpm</filename><sum type="sha256">3f5274b0111bc32b23dacf5b93e24a165ade4c5b36f9190265f2c45fd090b31b</sum></package><package arch="x86_64" name="khotkeys" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>khotkeys-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">59e735418cf2dd64a7b3cfb8f26d732459cc35142057d50a5b1fe2639c9fdd38</sum></package><package arch="i686" name="kde-style-oxygen" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kde-style-oxygen-4.11.19-13.el7.i686.rpm</filename><sum type="sha256">2f79e2360c03928e20998b6dd3db53b0479eafde609c3af819a0194f0040eae6</sum></package><package arch="i686" name="khotkeys-libs" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>khotkeys-libs-4.11.19-13.el7.i686.rpm</filename><sum type="sha256">032f739a1b24c8f8d1fa2f4a4e6c0747b87a64de4b23ad61f9a4a64a4c66e861</sum></package><package arch="x86_64" epoch="6" name="kdelibs" release="10.el7" src="kdelibs-4.14.8-10.el7.src.rpm" version="4.14.8"><filename>kdelibs-4.14.8-10.el7.x86_64.rpm</filename><sum type="sha256">25cf28e9cd8b51fd64238d684a58485d35b66ff1be5c2b8747fec04a2c53ee06</sum></package><package arch="x86_64" name="kwin" release="13.el7" src="kde-workspace-4.11.19-13.el7.src.rpm" version="4.11.19"><filename>kwin-4.11.19-13.el7.x86_64.rpm</filename><sum type="sha256">a23be23d8577bd5230c8ef417d5c8b7838b97534a77e2bd56e42f86c5cb4acf4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6790" id="CVE-2018-6790" title="Cve-2018-6790" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2141" id="RHSA-2019:2141-1" title="Rhsa-2019:2141-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1543454" id="1543454" title="Cve-2018-6790 Kde-Workspace: Missing Sanitization Of Notifications Allows To Leak Client Ip Address Via Img Element" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1579764" id="1579764" title="Running 'Sudo -S' Gives 'Error': Mkdir: Cannot Create Directory &#8216;/Home/User/.Local&#8217;: Permission Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1611762" id="1611762" title="Ksysguardd: &quot;Internal Buffer Too Small To Read /Proc/Cpuinfo&quot; When Running With Many Cpus" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1619362" id="1619362" title="Backport Kde Commit To Deal With Mouse Pointer Visibility Issue" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2143-1</id><title>Openssh</title><description>Security Fix(es): 
* openssh: User enumeration via malformed packets in authentication requests (CVE-2018-15473)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openssh" release="21.el7" src="openssh-7.4p1-21.el7.src.rpm" version="7.4p1"><filename>openssh-7.4p1-21.el7.x86_64.rpm</filename><sum type="sha256">e427038224b39894087d00c6966d2f77b7ff3b729c581e652124b61d8bd7a4d6</sum></package><package arch="x86_64" name="openssh-server" release="21.el7" src="openssh-7.4p1-21.el7.src.rpm" version="7.4p1"><filename>openssh-server-7.4p1-21.el7.x86_64.rpm</filename><sum type="sha256">2b8361a9434ee5f0e89c72e57924df7757fc61ce7c9aa5a83a9f3d323b5cfad0</sum></package><package arch="x86_64" name="openssh-ldap" release="21.el7" src="openssh-7.4p1-21.el7.src.rpm" version="7.4p1"><filename>openssh-ldap-7.4p1-21.el7.x86_64.rpm</filename><sum type="sha256">52488e9d113f207b4ffa25e3e5bd902b92bef8bfd2a125d65c02375ba8d4d26c</sum></package><package arch="x86_64" name="pam_ssh_agent_auth" release="2.21.el7" src="openssh-7.4p1-21.el7.src.rpm" version="0.10.3"><filename>pam_ssh_agent_auth-0.10.3-2.21.el7.x86_64.rpm</filename><sum type="sha256">1c3dd63661d5c10b28fe3078edc3603c151ccda85e877bcf02b495b79ec79dae</sum></package><package arch="x86_64" name="openssh-clients" release="21.el7" src="openssh-7.4p1-21.el7.src.rpm" version="7.4p1"><filename>openssh-clients-7.4p1-21.el7.x86_64.rpm</filename><sum type="sha256">d81c1e0fae411968ee7cc0643000f5307782058154ce123135e74a13da9c7ce1</sum></package><package arch="x86_64" name="openssh-keycat" release="21.el7" src="openssh-7.4p1-21.el7.src.rpm" version="7.4p1"><filename>openssh-keycat-7.4p1-21.el7.x86_64.rpm</filename><sum type="sha256">f233a5aa174371c7ce61f80f034cb874af70cae43d7dc0ec00f5df769ce7b2a8</sum></package><package arch="i686" name="pam_ssh_agent_auth" release="2.21.el7" src="openssh-7.4p1-21.el7.src.rpm" version="0.10.3"><filename>pam_ssh_agent_auth-0.10.3-2.21.el7.i686.rpm</filename><sum type="sha256">d93795d096e593240b86221ad5e272e463ec525f01ed92c53dd0883cc6a73a88</sum></package><package arch="x86_64" name="openssh-askpass" release="21.el7" src="openssh-7.4p1-21.el7.src.rpm" version="7.4p1"><filename>openssh-askpass-7.4p1-21.el7.x86_64.rpm</filename><sum type="sha256">7cca2c139407f9f62cae44acb305dfd6413ec86ee5b37348e48a53c1a08bb502</sum></package><package arch="x86_64" name="openssh-server-sysvinit" release="21.el7" src="openssh-7.4p1-21.el7.src.rpm" version="7.4p1"><filename>openssh-server-sysvinit-7.4p1-21.el7.x86_64.rpm</filename><sum type="sha256">5d409c02055b2fdaa756acbcd0d8da1dff60aa747725057892f38ed6db242613</sum></package><package arch="x86_64" name="openssh-cavs" release="21.el7" src="openssh-7.4p1-21.el7.src.rpm" version="7.4p1"><filename>openssh-cavs-7.4p1-21.el7.x86_64.rpm</filename><sum type="sha256">151938ecf48e4be538ecbe770f1c141c925dd9a6429c332a79f0e56f724a5ab7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15473" id="CVE-2018-15473" title="Openssh: User Enumeration Via Malformed Packets " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2143" id="RHSA-2019:2143-1" title="Rhsa-2019:2143-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1583735" id="1583735" title="Permission Denied Reading Authorized_Keys When Setting Authorizedkeyscommand" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1619063" id="1619063" title="Openssh: User Enumeration Via Malformed Packets " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1712053" id="1712053" title="Tmux Session Not Attached Automatically During Manual Installation On S390X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1722446" id="1722446" title="Openssh Fips Cipher List Has An Extra Comma In It" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2145-1</id><title>Gvfs</title><description>Security Fix(es): 
* gvfs: Incorrect authorization in admin backend allows privileged users to read and modify arbitrary files without prompting for password (CVE-2019-3827)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gvfs-mtp" release="3.el7" src="gvfs-1.36.2-3.el7.src.rpm" version="1.36.2"><filename>gvfs-mtp-1.36.2-3.el7.x86_64.rpm</filename><sum type="sha256">9546dc42ff20344a9d3c5810250f8a1fc3442df5ffec88cfac3e8db8ef6e20af</sum></package><package arch="x86_64" name="gvfs-smb" release="3.el7" src="gvfs-1.36.2-3.el7.src.rpm" version="1.36.2"><filename>gvfs-smb-1.36.2-3.el7.x86_64.rpm</filename><sum type="sha256">f77684f83ec2c10e0e6287afcd42ed147c8d3fdb16ed77f545bf1a77a114533c</sum></package><package arch="x86_64" name="gvfs-afp" release="3.el7" src="gvfs-1.36.2-3.el7.src.rpm" version="1.36.2"><filename>gvfs-afp-1.36.2-3.el7.x86_64.rpm</filename><sum type="sha256">49700d11bb00674c78912692a2715b6bf9e136f82a5eac8aaa2d2bc15a7876f9</sum></package><package arch="i686" name="gvfs" release="3.el7" src="gvfs-1.36.2-3.el7.src.rpm" version="1.36.2"><filename>gvfs-1.36.2-3.el7.i686.rpm</filename><sum type="sha256">479486d976c4e82f012c0edc858256393130c06c48191d1969285e586b6fe94d</sum></package><package arch="x86_64" name="gvfs-devel" release="3.el7" src="gvfs-1.36.2-3.el7.src.rpm" version="1.36.2"><filename>gvfs-devel-1.36.2-3.el7.x86_64.rpm</filename><sum type="sha256">3eb6dad7a391cbe1dcafbf205686a50555a71a26d39d36cf4a410dc268ef4bcf</sum></package><package arch="x86_64" name="gvfs-client" release="3.el7" src="gvfs-1.36.2-3.el7.src.rpm" version="1.36.2"><filename>gvfs-client-1.36.2-3.el7.x86_64.rpm</filename><sum type="sha256">b3c77d044e087efb74870ec65d017cc17db8c1fe985286bb5b26b35bdca69125</sum></package><package arch="x86_64" name="gvfs-gphoto2" release="3.el7" src="gvfs-1.36.2-3.el7.src.rpm" version="1.36.2"><filename>gvfs-gphoto2-1.36.2-3.el7.x86_64.rpm</filename><sum type="sha256">6d215e6e725b4a90fd3ec35d5292904e27b8a6dce1a4b4900111e8b9b2cc0666</sum></package><package arch="x86_64" name="gvfs" release="3.el7" src="gvfs-1.36.2-3.el7.src.rpm" version="1.36.2"><filename>gvfs-1.36.2-3.el7.x86_64.rpm</filename><sum type="sha256">13f31748e59249c2ffffee8632802db7dadc8f8405a31f4bbb20457a39bc0086</sum></package><package arch="i686" name="gvfs-devel" release="3.el7" src="gvfs-1.36.2-3.el7.src.rpm" version="1.36.2"><filename>gvfs-devel-1.36.2-3.el7.i686.rpm</filename><sum type="sha256">4432e56a9cbe48fd370b4a3c288ce0b52273b018a685eccfa4f38bd73e8ab034</sum></package><package arch="i686" name="gvfs-client" release="3.el7" src="gvfs-1.36.2-3.el7.src.rpm" version="1.36.2"><filename>gvfs-client-1.36.2-3.el7.i686.rpm</filename><sum type="sha256">a8b252b84e278b68773e7ffe5bcd309c5faf587901b3a7f350b2fea2915a5da7</sum></package><package arch="x86_64" name="gvfs-afc" release="3.el7" src="gvfs-1.36.2-3.el7.src.rpm" version="1.36.2"><filename>gvfs-afc-1.36.2-3.el7.x86_64.rpm</filename><sum type="sha256">13ddd76fef29b2e31a993dd12e0871e48e2331fe73f5f45e6964408d82c0e6af</sum></package><package arch="x86_64" name="gvfs-tests" release="3.el7" src="gvfs-1.36.2-3.el7.src.rpm" version="1.36.2"><filename>gvfs-tests-1.36.2-3.el7.x86_64.rpm</filename><sum type="sha256">5506cce40692d41d463c2afc225ef4c39c8b4b650026413264c3f57f5067b827</sum></package><package arch="x86_64" name="gvfs-goa" release="3.el7" src="gvfs-1.36.2-3.el7.src.rpm" version="1.36.2"><filename>gvfs-goa-1.36.2-3.el7.x86_64.rpm</filename><sum type="sha256">75c2cec84e9037d8ce82a540a844aefa578b529f2946198961a489fe0852b56f</sum></package><package arch="x86_64" name="gvfs-fuse" release="3.el7" src="gvfs-1.36.2-3.el7.src.rpm" version="1.36.2"><filename>gvfs-fuse-1.36.2-3.el7.x86_64.rpm</filename><sum type="sha256">ab66732c6e0fa050d6e8b89f0e1ba67f1d439616434b23f536661f8b47699707</sum></package><package arch="x86_64" name="gvfs-archive" release="3.el7" src="gvfs-1.36.2-3.el7.src.rpm" version="1.36.2"><filename>gvfs-archive-1.36.2-3.el7.x86_64.rpm</filename><sum type="sha256">8c49e288984cab70c2eaad07dfd1fd99a2c63637b32a58ccbb07039baf776666</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3827" id="CVE-2019-3827" title="Cve-2019-3827" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2145" id="RHSA-2019:2145-1" title="Rhsa-2019:2145-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1619719" id="1619719" title="Cannot Browse Smb Shares From Gnome After Update To Rhel 7.5" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1632960" id="1632960" title="Hundreds Of Gvfsd-Trash Processes Are Spawned When User Runs Xsession/Gnome After An Nfs Session Failed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665578" id="1665578" title="Cve-2019-3827 Gvfs: Incorrect Authorization In Admin Backend Allows Privileged Users To Read And Modify Arbitrary Files Without Prompting For Password" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2154-1</id><title>Opensc</title><description>The following packages have been upgraded to a later upstream version: opensc (0.19.0). 
Security Fix(es): 
* opensc: Buffer overflows handling responses from Muscle Cards in card- muscle.c:muscle_list_files() (CVE-2018-16391) 
* opensc: Buffer overflows handling responses from TCOS Cards in card- tcos.c:tcos_select_file() (CVE-2018-16392) 
* opensc: Buffer overflows handling responses from Gemsafe V1 Smartcards in pkcs15-gemsafeV1.c:gemsafe_get_cert_len() (CVE-2018-16393) 
* opensc: Buffer overflow handling string concatention in tools/util.c:util_acl_to_str() (CVE-2018-16418) 
* opensc: Buffer overflow handling responses from Cryptoflex cards in cryptoflex-tool.c:read_public_key() (CVE-2018-16419) 
* opensc: Buffer overflows handling responses from ePass 2003 Cards in card-epass2003.c:decrypt_response() (CVE-2018-16420) 
* opensc: Buffer overflows handling responses from CAC Cards in card- cac.c:cac_get_serial_nr_from_CUID() (CVE-2018-16421) 
* opensc: Buffer overflow handling responses from esteid cards in pkcs15-esteid.c:sc_pkcs15emu_esteid_init() (CVE-2018-16422) 
* opensc: Double free handling responses from smartcards in libopensc/sc.c:sc_file_set_sec_attr() (CVE-2018-16423) 
* opensc: Out of bounds reads handling responses from smartcards (CVE-2018-16427) 
* opensc: Infinite recusrion handling responses from IAS-ECC cards in card-iasecc.c:iasecc_select_file() (CVE-2018-16426)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="opensc" release="3.el7" src="opensc-0.19.0-3.el7.src.rpm" version="0.19.0"><filename>opensc-0.19.0-3.el7.x86_64.rpm</filename><sum type="sha256">93a0e753b95c345df793d57cb2d55333df6d66ade5a1afc7ed5553d5b531b279</sum></package><package arch="i686" name="opensc" release="3.el7" src="opensc-0.19.0-3.el7.src.rpm" version="0.19.0"><filename>opensc-0.19.0-3.el7.i686.rpm</filename><sum type="sha256">4dd5b2e34f970043f6cc87da460f4a132a2dec5eedd0acdd2666d95c643cce04</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16391" id="CVE-2018-16391" title="Cve-2018-16391" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16392" id="CVE-2018-16392" title="Cve-2018-16392" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16393" id="CVE-2018-16393" title="Cve-2018-16393" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16418" id="CVE-2018-16418" title="Cve-2018-16418" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16419" id="CVE-2018-16419" title="Cve-2018-16419" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16420" id="CVE-2018-16420" title="Cve-2018-16420" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16421" id="CVE-2018-16421" title="Cve-2018-16421" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16422" id="CVE-2018-16422" title="Cve-2018-16422" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16423" id="CVE-2018-16423" title="Cve-2018-16423" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16426" id="CVE-2018-16426" title="Cve-2018-16426" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16427" id="CVE-2018-16427" title="Cve-2018-16427" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2154" id="RHSA-2019:2154-1" title="Rhsa-2019:2154-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1627998" id="1627998" title="Cve-2018-16391 Opensc: Buffer Overflows Handling Responses From Muscle Cards In Card-Muscle.C:Muscle_List_Files()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1628002" id="1628002" title="Cve-2018-16392 Opensc: Buffer Overflows Handling Responses From Tcos Cards In Card-Tcos.C:Tcos_Select_File()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1628006" id="1628006" title="Cve-2018-16393 Opensc: Buffer Overflows Handling Responses From Gemsafe V1 Smartcards In Pkcs15-Gemsafev1.C:Gemsafe_Get_Cert_Len()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1628010" id="1628010" title="Cve-2018-16418 Opensc: Buffer Overflow Handling String Concatention In Tools/Util.C:Util_Acl_To_Str()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1628013" id="1628013" title="Cve-2018-16419 Opensc: Buffer Overflow Handling Responses From Cryptoflex Cards In Cryptoflex-Tool.C:Read_Public_Key()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1628016" id="1628016" title="Cve-2018-16422 Opensc: Buffer Overflow Handling Responses From Esteid Cards In Pkcs15-Esteid.C:Sc_Pkcs15Emu_Esteid_Init()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1628020" id="1628020" title="Cve-2018-16423 Opensc: Double Free Handling Responses From Smartcards In Libopensc/Sc.C:Sc_File_Set_Sec_Attr()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1628026" id="1628026" title="Cve-2018-16420 Opensc: Buffer Overflows Handling Responses From Epass 2003 Cards In Card-Epass2003.C:Decrypt_Response()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1628034" id="1628034" title="Cve-2018-16421 Opensc: Buffer Overflows Handling Responses From Cac Cards In Card-Cac.C:Cac_Get_Serial_Nr_From_Cuid()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1628044" id="1628044" title="Cve-2018-16426 Opensc: Infinite Recusrion Handling Responses From Ias-Ecc Cards In Card-Iasecc.C:Iasecc_Select_File()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1628052" id="1628052" title="Cve-2018-16427 Opensc: Out Of Bounds Reads Handling Responses From Smartcards" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1656791" id="1656791" title="Rebase To Latest Opensc 0.19.0" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1672898" id="1672898" title="Ckr_Key_Type_Inconsistent While Doing Ssh Using Sssd Smart Card" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2157-1</id><title>Freerdp And Vinagre</title><description>The vinagre packages provide the Vinagre remote desktop viewer for the GNOME desktop. 
The following packages have been upgraded to a later upstream version: freerdp (2.0.0). 
Security Fix(es): 
* freerdp: out of bounds read in drdynvc_process_capability_request (CVE-2018-1000852)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="vinagre" release="12.el7" src="vinagre-3.22.0-12.el7.src.rpm" version="3.22.0"><filename>vinagre-3.22.0-12.el7.i686.rpm</filename><sum type="sha256">558b3cf0c619417434f88dc42847303ed4438b2ee9d47a669e9cd6f4eb27a4f5</sum></package><package arch="i686" name="freerdp-devel" release="1.rc4.el7" src="freerdp-2.0.0-1.rc4.el7.src.rpm" version="2.0.0"><filename>freerdp-devel-2.0.0-1.rc4.el7.i686.rpm</filename><sum type="sha256">dbc731671dd96f884ed646524030ed4624d67f55737ceb077e7af6f47a9ca60a</sum></package><package arch="x86_64" name="libwinpr-devel" release="1.rc4.el7" src="freerdp-2.0.0-1.rc4.el7.src.rpm" version="2.0.0"><filename>libwinpr-devel-2.0.0-1.rc4.el7.x86_64.rpm</filename><sum type="sha256">81bead18205364de3c76ecb92c7200ab6ec98f5e9526a47e57a3ba5362d0afae</sum></package><package arch="x86_64" name="freerdp-libs" release="1.rc4.el7" src="freerdp-2.0.0-1.rc4.el7.src.rpm" version="2.0.0"><filename>freerdp-libs-2.0.0-1.rc4.el7.x86_64.rpm</filename><sum type="sha256">404485a3c405a1393abe5b832ae5f7d5a34b1553e24d3c252ae3cd96af7c11d4</sum></package><package arch="x86_64" name="freerdp-devel" release="1.rc4.el7" src="freerdp-2.0.0-1.rc4.el7.src.rpm" version="2.0.0"><filename>freerdp-devel-2.0.0-1.rc4.el7.x86_64.rpm</filename><sum type="sha256">5e7dbbda4176d39b07d667ebafc411aeb790effa61fd173574a251cfb92e6972</sum></package><package arch="i686" name="libwinpr-devel" release="1.rc4.el7" src="freerdp-2.0.0-1.rc4.el7.src.rpm" version="2.0.0"><filename>libwinpr-devel-2.0.0-1.rc4.el7.i686.rpm</filename><sum type="sha256">af91fdf08aa80d3ab366b4e77077567a3b9c9d3889f6f15431e5660f8872aeee</sum></package><package arch="x86_64" name="libwinpr" release="1.rc4.el7" src="freerdp-2.0.0-1.rc4.el7.src.rpm" version="2.0.0"><filename>libwinpr-2.0.0-1.rc4.el7.x86_64.rpm</filename><sum type="sha256">003ee7f09bb739a3719a71751eb0186600a875f4d67ff672f38a344eb572feed</sum></package><package arch="x86_64" name="vinagre" release="12.el7" src="vinagre-3.22.0-12.el7.src.rpm" version="3.22.0"><filename>vinagre-3.22.0-12.el7.x86_64.rpm</filename><sum type="sha256">795fbb77a21737d404bbd2730b4c80b9a8f328349050ce52b18c19be8273e913</sum></package><package arch="x86_64" name="freerdp" release="1.rc4.el7" src="freerdp-2.0.0-1.rc4.el7.src.rpm" version="2.0.0"><filename>freerdp-2.0.0-1.rc4.el7.x86_64.rpm</filename><sum type="sha256">081a81b6a78262fe7b216b1212eb38a3149f7a4e706c8c07a28e139d73556df3</sum></package><package arch="i686" name="libwinpr" release="1.rc4.el7" src="freerdp-2.0.0-1.rc4.el7.src.rpm" version="2.0.0"><filename>libwinpr-2.0.0-1.rc4.el7.i686.rpm</filename><sum type="sha256">337652bd0852c1cc96d11d75491c4e0c199188602448e6772722964f57187494</sum></package><package arch="i686" name="freerdp-libs" release="1.rc4.el7" src="freerdp-2.0.0-1.rc4.el7.src.rpm" version="2.0.0"><filename>freerdp-libs-2.0.0-1.rc4.el7.i686.rpm</filename><sum type="sha256">f0c42e5774329f88c823b3fa459aede050a4c80535cc77004c303156a3447e25</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000852" id="CVE-2018-1000852" title="Cve-2018-1000852" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2157" id="RHSA-2019:2157-1" title="Rhsa-2019:2157-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1291254" id="1291254" title="Rebase Freerdp To Newer Version" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1569552" id="1569552" title="Vinagre Does Not Accept Passwords Longer Than 20 Characters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1661640" id="1661640" title="Cve-2018-1000852 Freerdp: Out Of Bounds Read In Drdynvc_Process_Capability_Request" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1680229" id="1680229" title="Rebuild Vinagre Against New Freerdp" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2159-1</id><title>Unzip</title><description>Security Fix(es): 
* unzip: Buffer overflow in list.c resulting in a denial of service (CVE-2018-18384)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="unzip" release="20.el7" src="unzip-6.0-20.el7.src.rpm" version="6.0"><filename>unzip-6.0-20.el7.x86_64.rpm</filename><sum type="sha256">f3d4a89a956bc341c528d7f064da771d1bf0c6406ed9e8d9b364ec3c71329355</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18384" id="CVE-2018-18384" title="Cve-2018-18384" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2159" id="RHSA-2019:2159-1" title="Rhsa-2019:2159-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642931" id="1642931" title="Cve-2018-18384 Unzip: Buffer Overflow In List.C Resulting In A Denial Of Service" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2162-1</id><title>Blktrace</title><description>Security Fix(es): 
* blktrace: buffer overflow in the dev_map_read function in btt/devmap.c (CVE-2018-10689)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="blktrace" release="9.el7" src="blktrace-1.0.5-9.el7.src.rpm" version="1.0.5"><filename>blktrace-1.0.5-9.el7.x86_64.rpm</filename><sum type="sha256">be81d8e4a095fcc4c87787a898a1fba4dd8afb6496ee1430695fd4274d7d4c53</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10689" id="CVE-2018-10689" title="Cve-2018-10689" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2162" id="RHSA-2019:2162-1" title="Rhsa-2019:2162-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1575119" id="1575119" title="Cve-2018-10689 Blktrace: Buffer Overflow In The Dev_Map_Read Function In Btt/Devmap.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2169-1</id><title>Linux-Firmware</title><description>Security Fix(es): 
* kernel: Bluetooth implementations may not sufficiently validate elliptic curve parameters during Diffie-Hellman key exchange (CVE-2018-5383)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="iwl7260-firmware" release="72.el7" src="linux-firmware-20190429-72.gitddde598.el7.src.rpm" version="22.0.7.0"><filename>iwl7260-firmware-22.0.7.0-72.el7.noarch.rpm</filename><sum type="sha256">331bb8d1bd194dc53ade0f993fa86faa716f0c275027fd7b2427c1515ad6d193</sum></package><package arch="noarch" name="iwl135-firmware" release="72.el7" src="linux-firmware-20190429-72.gitddde598.el7.src.rpm" version="18.168.6.1"><filename>iwl135-firmware-18.168.6.1-72.el7.noarch.rpm</filename><sum type="sha256">43d6c48540cc9c8e917dde2fb8e23266c1172a1cbf0feec8353f0ee94f370542</sum></package><package arch="noarch" name="iwl4965-firmware" release="72.el7" src="linux-firmware-20190429-72.gitddde598.el7.src.rpm" version="228.61.2.24"><filename>iwl4965-firmware-228.61.2.24-72.el7.noarch.rpm</filename><sum type="sha256">5243e5201c96448beb7bae63abf1be584edfd98d58c1d54466a051a0f4dc5593</sum></package><package arch="noarch" name="iwl3160-firmware" release="72.el7" src="linux-firmware-20190429-72.gitddde598.el7.src.rpm" version="22.0.7.0"><filename>iwl3160-firmware-22.0.7.0-72.el7.noarch.rpm</filename><sum type="sha256">9b14a898d58c7d8bd550baa5782816f7adbb97115e2ef7dd0f9f7e834f20417b</sum></package><package arch="noarch" name="iwl7265-firmware" release="72.el7" src="linux-firmware-20190429-72.gitddde598.el7.src.rpm" version="22.0.7.0"><filename>iwl7265-firmware-22.0.7.0-72.el7.noarch.rpm</filename><sum type="sha256">60ae7c0c429a560243ff047847067446df8a9759c24a397b859593f7752bd851</sum></package><package arch="noarch" name="iwl3945-firmware" release="72.el7" src="linux-firmware-20190429-72.gitddde598.el7.src.rpm" version="15.32.2.9"><filename>iwl3945-firmware-15.32.2.9-72.el7.noarch.rpm</filename><sum type="sha256">70be41dac087d7416959c5e3241159c960e59026053f3919055187cfac8821a3</sum></package><package arch="noarch" name="iwl2030-firmware" release="72.el7" src="linux-firmware-20190429-72.gitddde598.el7.src.rpm" version="18.168.6.1"><filename>iwl2030-firmware-18.168.6.1-72.el7.noarch.rpm</filename><sum type="sha256">5b18d972510fdf9f94f9ea5e5cb804a56509271dbc23b8e5a91fdbb6fb208120</sum></package><package arch="noarch" name="iwl6000g2a-firmware" release="72.el7" src="linux-firmware-20190429-72.gitddde598.el7.src.rpm" version="17.168.5.3"><filename>iwl6000g2a-firmware-17.168.5.3-72.el7.noarch.rpm</filename><sum type="sha256">e96cd2773f9ec06f457fc37d2cbaa4e61282060a69788a85d6c2e95218b99c0f</sum></package><package arch="noarch" name="iwl6000-firmware" release="72.el7" src="linux-firmware-20190429-72.gitddde598.el7.src.rpm" version="9.221.4.1"><filename>iwl6000-firmware-9.221.4.1-72.el7.noarch.rpm</filename><sum type="sha256">e53bf45f0422f5ffede6431bfea4ad7d6c77ec2aff1dd748892f7aeb3e229149</sum></package><package arch="noarch" name="iwl5150-firmware" release="72.el7" src="linux-firmware-20190429-72.gitddde598.el7.src.rpm" version="8.24.2.2"><filename>iwl5150-firmware-8.24.2.2-72.el7.noarch.rpm</filename><sum type="sha256">d9585771e78955802c159825bda08bf60fec22cf18511023e81c48ce8930aa6b</sum></package><package arch="noarch" epoch="1" name="iwl1000-firmware" release="72.el7" src="linux-firmware-20190429-72.gitddde598.el7.src.rpm" version="39.31.5.1"><filename>iwl1000-firmware-39.31.5.1-72.el7.noarch.rpm</filename><sum type="sha256">00b2cfe9c9dc60d6fe742433501c272e42a1b2a4278233553cc29a6405ca1287</sum></package><package arch="noarch" name="linux-firmware" release="72.gitddde598.el7" src="linux-firmware-20190429-72.gitddde598.el7.src.rpm" version="20190429"><filename>linux-firmware-20190429-72.gitddde598.el7.noarch.rpm</filename><sum type="sha256">1c9f36285117e6639365f9de2363365fd2d8d930c4c1c04e71198a507e897798</sum></package><package arch="noarch" name="iwl5000-firmware" release="72.el7" src="linux-firmware-20190429-72.gitddde598.el7.src.rpm" version="8.83.5.1_1"><filename>iwl5000-firmware-8.83.5.1_1-72.el7.noarch.rpm</filename><sum type="sha256">75972082bd982c590759c3000776b72ef4e3dea2031ab8c678864e1b88f86377</sum></package><package arch="noarch" name="iwl105-firmware" release="72.el7" src="linux-firmware-20190429-72.gitddde598.el7.src.rpm" version="18.168.6.1"><filename>iwl105-firmware-18.168.6.1-72.el7.noarch.rpm</filename><sum type="sha256">d5b7be32de7144f85f9565e45674ea36df2d8f802803f06c56c2679a14f4185a</sum></package><package arch="noarch" name="iwl100-firmware" release="72.el7" src="linux-firmware-20190429-72.gitddde598.el7.src.rpm" version="39.31.5.1"><filename>iwl100-firmware-39.31.5.1-72.el7.noarch.rpm</filename><sum type="sha256">a804828ae01930099e12f476540a420a2e8fa0187e523b807dc7f7d7a3e3c164</sum></package><package arch="noarch" name="iwl6000g2b-firmware" release="72.el7" src="linux-firmware-20190429-72.gitddde598.el7.src.rpm" version="17.168.5.2"><filename>iwl6000g2b-firmware-17.168.5.2-72.el7.noarch.rpm</filename><sum type="sha256">195b7d77e4899d62a097f698c2efc6e9447eef4ea1008322a5f4841b2efe86fe</sum></package><package arch="noarch" name="iwl6050-firmware" release="72.el7" src="linux-firmware-20190429-72.gitddde598.el7.src.rpm" version="41.28.5.1"><filename>iwl6050-firmware-41.28.5.1-72.el7.noarch.rpm</filename><sum type="sha256">f8ebd2e82e1790efa33ea2e48375a63a56c2934ed34cc91eb40e02c585c06feb</sum></package><package arch="noarch" name="iwl2000-firmware" release="72.el7" src="linux-firmware-20190429-72.gitddde598.el7.src.rpm" version="18.168.6.1"><filename>iwl2000-firmware-18.168.6.1-72.el7.noarch.rpm</filename><sum type="sha256">919b26331adaa4ab21a99f6b94b9aa28e17872f6d4ab884c10ce403ceb76b760</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5383" id="CVE-2018-5383" title="Cve-2018-5383" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2169" id="RHSA-2019:2169-1" title="Rhsa-2019:2169-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1614159" id="1614159" title="Cve-2018-5383 Kernel: Bluetooth Implementations May Not Sufficiently Validate Elliptic Curve Parameters During Diffie-Hellman Key Exchange" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1654809" id="1654809" title="[Qed] 8.37.7.0 Firmware Image Is Needed For Dpdk 18.11" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1671610" id="1671610" title="[Diamanti]Programming The Vf Mac Address Fails Without Updated Fw" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1698960" id="1698960" title="Cavium/Marvell 7.7 Feat] Bnx2X_Fw: Update To 7.13.11.0 Firmware Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1702330" id="1702330" title="[Netro 7.7 Feat] Pull New Version Of Netronome Flower Firmware (Aotc-2.10.A.23)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2177-1</id><title>Sssd</title><description>The following packages have been upgraded to a later upstream version: sssd (1.16.4). 
Security Fix(es): 
* sssd: fallback_homedir returns '/' for empty home directories in passwd file (CVE-2019-3811) 
* sssd: improper implementation of GPOs due to too restrictive permissions (CVE-2018-16838)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="sssd-polkit-rules" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-polkit-rules-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">25c6faa267fe14c7ecde40fcaafebaea2a00d7ab6bd8cab0a518ef3f4286fa45</sum></package><package arch="x86_64" name="sssd-proxy" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-proxy-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">5fef42ae0361a37b158d7e03805c1faaef56762863223c01a92f1899265150c0</sum></package><package arch="i686" name="libsss_certmap-devel" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libsss_certmap-devel-1.16.4-21.el7.i686.rpm</filename><sum type="sha256">93306e7a9df2e31a7bdbb67c02b582899632d2f4172bc66de0dab7222a934fa9</sum></package><package arch="x86_64" name="libsss_nss_idmap-devel" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libsss_nss_idmap-devel-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">0f561505d8fc74b731efd49d3df05f264a616d04c48693b8a785ffc9bca09cdb</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libsss_nss_idmap-devel-1.16.4-21.el7.i686.rpm</filename><sum type="sha256">4a6e73e2e41cbd191655b4067fcde2db9973d1712852f7283799a38eac3eaf20</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libsss_idmap-devel-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">1ee3e735bfec09f8c3a93674cc98efb94695ab8ff5c24f5e06be3018d752940d</sum></package><package arch="x86_64" name="libsss_certmap-devel" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libsss_certmap-devel-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">3698196727d6a4785a08c72b593b97123361f47c8b0afa61b7cd92721c498ce3</sum></package><package arch="x86_64" name="libsss_certmap" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libsss_certmap-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">cdad6f6e440805980254d09764e6de0c1e200bcaa2577b48323f882fc536fa09</sum></package><package arch="x86_64" name="libsss_nss_idmap" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libsss_nss_idmap-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">673996d00a59add58c5ae648c1c64322696d115e21a5b1a5a058289f2455d562</sum></package><package arch="i686" name="libipa_hbac-devel" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libipa_hbac-devel-1.16.4-21.el7.i686.rpm</filename><sum type="sha256">a3aa82c5f14e90e0e0498b742c47af09ed04f54ba3f0e56bd35f25501ca87c0c</sum></package><package arch="i686" name="libsss_nss_idmap" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libsss_nss_idmap-1.16.4-21.el7.i686.rpm</filename><sum type="sha256">721a911c8960b7849e629cbdfbb56f01dcef5d05e6ea4670b8d4815d69d0a6fb</sum></package><package arch="x86_64" name="sssd-ipa" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-ipa-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">5c2a0902b40412691818983eb6bacf794e782c876b83536a60e6c871aaf12b9b</sum></package><package arch="x86_64" name="libipa_hbac" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libipa_hbac-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">27c9a1fbe06053b4d42549502c11e8f8474be3a3c3cc9aea56c3017f883f6dfc</sum></package><package arch="x86_64" name="libsss_simpleifp" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libsss_simpleifp-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">2e1f87b69ea9991453fe3df1a3a8426cee9a3c15d27940951e4e4f61ae6b8d64</sum></package><package arch="x86_64" name="libsss_sudo" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libsss_sudo-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">c67c6d27920b36caa413e2908e97b75314351c7ba148cc42b72f0463303eaec9</sum></package><package arch="x86_64" name="sssd-dbus" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-dbus-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">87aa2cb4ccda61001c05800923feb0196045cc196f118c152709f05ec1525b13</sum></package><package arch="noarch" name="python-sssdconfig" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>python-sssdconfig-1.16.4-21.el7.noarch.rpm</filename><sum type="sha256">54f965a0503ccab3c558c1c4d50fb2f6ef95692bc6c2aa334a31855b4bfaaa0e</sum></package><package arch="i686" name="libsss_idmap" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libsss_idmap-1.16.4-21.el7.i686.rpm</filename><sum type="sha256">8e4f08523cf4a373f69d06a266301c1ba1a0eb2e6d7756ab6e3ddf2579e29035</sum></package><package arch="x86_64" name="sssd" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">15fcded7444bce08443cc157a387380e5e288155215fc05fe0948f7358eb5f9a</sum></package><package arch="i686" name="libsss_simpleifp-devel" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libsss_simpleifp-devel-1.16.4-21.el7.i686.rpm</filename><sum type="sha256">2e6f41bfe745e2dd97eaac14d99430089e945473f355567ba8bf1625788c7a36</sum></package><package arch="x86_64" name="libsss_autofs" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libsss_autofs-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">6913ea836b1366888798fdf2e75daeb7a2311f497951245469a638137841e949</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libipa_hbac-devel-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">11f0a6b994be43b40a4608b2680bce027d5d21e469770e40df634f20e8209dd9</sum></package><package arch="i686" name="libsss_certmap" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libsss_certmap-1.16.4-21.el7.i686.rpm</filename><sum type="sha256">934295c20ff242018ee09b5d51ffe95c62bb0d6aeb80bdac82af9411e63cf6b6</sum></package><package arch="i686" name="libipa_hbac" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libipa_hbac-1.16.4-21.el7.i686.rpm</filename><sum type="sha256">21f8bd29c49398a5f3b8cda6d5e9b7ee446d28d7ec0942ba047be9616d743bd5</sum></package><package arch="i686" name="sssd-client" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-client-1.16.4-21.el7.i686.rpm</filename><sum type="sha256">ca1edb2e0706dbc57c82951405cf206708f48a17f267e8dfb0c233c5a20d9f72</sum></package><package arch="x86_64" name="sssd-client" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-client-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">ffd79fc44f062efde47ad3d23457062b8cf683cb944d90a7c9e5d3627bb9fef5</sum></package><package arch="i686" name="libsss_idmap-devel" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libsss_idmap-devel-1.16.4-21.el7.i686.rpm</filename><sum type="sha256">234aa1bd5ed29f907f3df9a985ae5150e1f50bfed33f25026d4a390c76d0ac89</sum></package><package arch="x86_64" name="sssd-libwbclient-devel" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-libwbclient-devel-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">422e2540c461f8d3981305d3d62bf261cfbe7b947ba7036dfcf5c68c4cad828a</sum></package><package arch="x86_64" name="sssd-krb5-common" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-krb5-common-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">c09e70ce8d3a8d8e6f5daf9935ab6b538cd87f221ed55994c7f64cf89ca9566b</sum></package><package arch="x86_64" name="python-sss" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>python-sss-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">6d2c4249b14cf5b4bc1029960cbf02c3cdef69c793aa9c1a34be837eacaedb54</sum></package><package arch="x86_64" name="sssd-krb5" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-krb5-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">563b406e42a62bf19f57091536dd2442ca655870b4a5bd6b124d52abda28d1db</sum></package><package arch="x86_64" name="sssd-common" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-common-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">edce2b5c409af1535155d46766d8f26025e49aa4aeada37e9c00c736f5c32260</sum></package><package arch="x86_64" name="python-libipa_hbac" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>python-libipa_hbac-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">e64a40026d7316dcba68f6b683787ffe700250af14054a5349ee18eed3a1f47b</sum></package><package arch="x86_64" name="sssd-winbind-idmap" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-winbind-idmap-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">240c62805c74d3916edf2a6e6b0b78aad81fb9274e45f9a30bb5900119a2a683</sum></package><package arch="x86_64" name="sssd-ad" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-ad-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">0ef260b336080dd9b55c5f48e6fa565ab6104260b74a77a10b0c52961dafe509</sum></package><package arch="i686" name="libsss_simpleifp" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libsss_simpleifp-1.16.4-21.el7.i686.rpm</filename><sum type="sha256">b4051d37b1c16b63c628abfbdba0df3b23d6dc501279792aedc42aa29d4fc9fe</sum></package><package arch="i686" name="sssd-libwbclient-devel" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-libwbclient-devel-1.16.4-21.el7.i686.rpm</filename><sum type="sha256">8cd66da996986184b741e5e625f1ff391471706416040629afacb3655f84312f</sum></package><package arch="x86_64" name="python-libsss_nss_idmap" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>python-libsss_nss_idmap-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">51fdd7f9716d7b96efab4687a195bc633540d7444ec3a48102fa7ea029f2d235</sum></package><package arch="x86_64" name="sssd-libwbclient" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-libwbclient-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">9dfad753a409df6d2e2504d6f32da49756d74e961aea7b4162d8150ad493ff4c</sum></package><package arch="x86_64" name="libsss_idmap" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libsss_idmap-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">5dca16fa549eccfba77ad0ff079cb3d6ab2be44227e38aa7b833b70d7d2b2527</sum></package><package arch="x86_64" name="sssd-ldap" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-ldap-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">e2145c276e0871cf7bb6d0e45c036eb77327389d7589c4719abb3e3d74fbb160</sum></package><package arch="x86_64" name="sssd-kcm" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-kcm-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">7512db1643fac76189a0decf405348851af9dce04dd9ba21baaa789f2928cef1</sum></package><package arch="x86_64" name="python-sss-murmur" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>python-sss-murmur-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">e622affbebee15c3e37ac63ce7981c2ced45e0bddb85f4fc8bf30bca40b288e8</sum></package><package arch="x86_64" name="libsss_simpleifp-devel" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>libsss_simpleifp-devel-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">77a7aeafb66c7de4585c98183c960be777a68b125832ee6bf8fc3604dd008979</sum></package><package arch="x86_64" name="sssd-tools" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-tools-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">60209f3e02fb70b45c5f590dbca8d88ed0526f540c71d689ad10bfa7fb16a716</sum></package><package arch="x86_64" name="sssd-common-pac" release="21.el7" src="sssd-1.16.4-21.el7.src.rpm" version="1.16.4"><filename>sssd-common-pac-1.16.4-21.el7.x86_64.rpm</filename><sum type="sha256">4d85ced2f6770354df7be9d41b5bfc345a1ce21247a6806ff548e288b372e0e6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16838" id="CVE-2018-16838" title="Cve-2018-16838" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3811" id="CVE-2019-3811" title="Cve-2019-3811" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2177" id="RHSA-2019:2177-1" title="Rhsa-2019:2177-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1350012" id="1350012" title="Kinit / Sssd Kerberos Fail Over" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1402056" id="1402056" title="[Rfe] Make 2Fa Prompting Configurable" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1406678" id="1406678" title="Sssd Service Is Starting Before Network Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1614296" id="1614296" title="Sssd Netgroups Do Not Honor Entry_Cache_Nowait_Percentage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1619706" id="1619706" title="Sssd Only Sets The Selinux Login Context If It Differs From The Default" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1631656" id="1631656" title="Kcm: Kinit: Matching Credential Not Found While Getting Default Ccache" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1640820" id="1640820" title="Cve-2018-16838 Sssd: Improper Implementation Of Gpos Due To Too Restrictive Permissions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1645461" id="1645461" title="Slow Ldb Search Causes Blocking During Startup Which Might Cause The Registration To Time Out" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1653759" id="1653759" title="Sss_Cache Shouldn'T Return Enoent When No Entries Match" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1656618" id="1656618" title="Cve-2019-3811 Sssd: Fallback_Homedir Returns '/' For Empty Home Directories In Passwd File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658994" id="1658994" title="Rebase Sssd To 1.16.X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1671138" id="1671138" title="User Is Unable To Perform Sudo As A User On Ipa Server, Even Though `Sudo -L` Shows Permissions To Do So" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1672527" id="1672527" title="Sssd_Krb5_Locator_Plugin Introduces Delay In Cifs.Upcall Krb5 Calls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677355" id="1677355" title="Nss Responder Does No Refresh Domain List When Busy" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677665" id="1677665" title="Ipa: Deleted User From Trusted Domain Is Not Removed Properly From The Cache On Ipa Clients" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1679173" id="1679173" title="Filter_Users Option Is Not Applied To Sub-Domains If Sssd Starts Offline" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1684979" id="1684979" title="The Hbac Code Requires Dereference To Be Enabled And Fails Otherwise" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1685472" id="1685472" title="Upn Negative Cache Does Not Use Values From 'Filter_Users' Config Option" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1685581" id="1685581" title="Extend Cached_Auth_Timeout To Cover Subdomains / Trusts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1707759" id="1707759" title="Error Accessing Files On Samba Share Randomly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1710286" id="1710286" title="The Server Error Message Is Not Returned If Password Change Fails" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1711832" id="1711832" title="The Files Provider Does Not Handle Resetoffline Properly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=720688" id="720688" title="[Rfe] Return Multiple Server Addresses To The Kerberos Locator Plugin" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2178-1</id><title>Udisks2</title><description>Security Fix(es): 
* udisks: Format string vulnerability in udisks_log in udiskslogging.c (CVE-2018-17336)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="udisks2-lvm2" release="9.el7" src="udisks2-2.7.3-9.el7.src.rpm" version="2.7.3"><filename>udisks2-lvm2-2.7.3-9.el7.x86_64.rpm</filename><sum type="sha256">2c2f64a68ab09e18bda038c2294d285927e0393d38043e1497d467847424026b</sum></package><package arch="x86_64" name="udisks2" release="9.el7" src="udisks2-2.7.3-9.el7.src.rpm" version="2.7.3"><filename>udisks2-2.7.3-9.el7.x86_64.rpm</filename><sum type="sha256">9099ee1dc754900e4b5c2b93b7a30d0dfd21f7de59ff88eb9230116d8a4e5326</sum></package><package arch="x86_64" name="libudisks2-devel" release="9.el7" src="udisks2-2.7.3-9.el7.src.rpm" version="2.7.3"><filename>libudisks2-devel-2.7.3-9.el7.x86_64.rpm</filename><sum type="sha256">6acf30af273f190b9843721949c1eff0a429b2ba8adbb57307794d8dea682a77</sum></package><package arch="x86_64" name="udisks2-lsm" release="9.el7" src="udisks2-2.7.3-9.el7.src.rpm" version="2.7.3"><filename>udisks2-lsm-2.7.3-9.el7.x86_64.rpm</filename><sum type="sha256">026261e258efa4f334b530b2caf600d6677dd4babe729f3e87127b4d92875b4e</sum></package><package arch="x86_64" name="udisks2-iscsi" release="9.el7" src="udisks2-2.7.3-9.el7.src.rpm" version="2.7.3"><filename>udisks2-iscsi-2.7.3-9.el7.x86_64.rpm</filename><sum type="sha256">c80474df53b0a481bd1ce080cda220a9b0b0e9698699422ac780c199b65a1460</sum></package><package arch="i686" name="libudisks2-devel" release="9.el7" src="udisks2-2.7.3-9.el7.src.rpm" version="2.7.3"><filename>libudisks2-devel-2.7.3-9.el7.i686.rpm</filename><sum type="sha256">5fed46879d7a498128575616cb45ee4ea9da3c1c4ec77b58a95962688efe1947</sum></package><package arch="i686" name="libudisks2" release="9.el7" src="udisks2-2.7.3-9.el7.src.rpm" version="2.7.3"><filename>libudisks2-2.7.3-9.el7.i686.rpm</filename><sum type="sha256">47fee8b93cd2a17707cb3878a45ee63a4067667b5563b8811d2c179af93c562b</sum></package><package arch="x86_64" name="libudisks2" release="9.el7" src="udisks2-2.7.3-9.el7.src.rpm" version="2.7.3"><filename>libudisks2-2.7.3-9.el7.x86_64.rpm</filename><sum type="sha256">39ee5aa547850d13ca3ad0bba3a4ade65a43a379d0121810799ae6ba01f90520</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17336" id="CVE-2018-17336" title="Cve-2018-17336" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2178" id="RHSA-2019:2178-1" title="Rhsa-2019:2178-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1568269" id="1568269" title="Rfe - Man Page Improvement For Udisksctl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1632828" id="1632828" title="Cve-2018-17336 Udisks: Format String Vulnerability In Udisks_Log In Udiskslogging.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1643350" id="1643350" title="Udisksd Core Dump" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1672664" id="1672664" title="Package Udisks2-Lsm (Libstoragemgmt Modules For Udisks2)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2181-1</id><title>Curl</title><description>Security Fix(es): 
* curl: Heap-based buffer over-read in the curl tool warning formatting (CVE-2018-16842)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="curl" release="54.el7" src="curl-7.29.0-54.el7.src.rpm" version="7.29.0"><filename>curl-7.29.0-54.el7.x86_64.rpm</filename><sum type="sha256">eba04f278b4e6b3063e6872f04f134c6c7c4d5bb4e20dc361a0d0f1b84d593db</sum></package><package arch="i686" name="libcurl-devel" release="54.el7" src="curl-7.29.0-54.el7.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-54.el7.i686.rpm</filename><sum type="sha256">93b8ab80da1a536a9812786c912eb9a2962eab0656ad9f0a572a8fe5f3789b23</sum></package><package arch="x86_64" name="libcurl" release="54.el7" src="curl-7.29.0-54.el7.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-54.el7.x86_64.rpm</filename><sum type="sha256">fa683a257866522bc5f029fbd8bf0b19b3feacb0091d6673735c53c55f4dd14a</sum></package><package arch="i686" name="libcurl" release="54.el7" src="curl-7.29.0-54.el7.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-54.el7.i686.rpm</filename><sum type="sha256">20267e94fb8a5c723daf193e2a426feab9bbf7ec710a1c23bc1a99a3226106d7</sum></package><package arch="x86_64" name="libcurl-devel" release="54.el7" src="curl-7.29.0-54.el7.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-54.el7.x86_64.rpm</filename><sum type="sha256">2b3acef1c65037fac0beb8fb076d479a2a9ac8800cd9f5343b42220a3834da70</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16842" id="CVE-2018-16842" title="Cve-2018-16842" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2181" id="RHSA-2019:2181-1" title="Rhsa-2019:2181-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1281969" id="1281969" title="Baseurl With File:// Hangs And Then Timeout In Yum Repo" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1644124" id="1644124" title="Cve-2018-16842 Curl: Heap-Based Buffer Over-Read In The Curl Tool Warning Formatting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1683292" id="1683292" title="Curl Crashes On Http Links With Rate-Limit" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2189-1</id><title>Procps-Ng</title><description>Security Fix(es): 
* procps-ng, procps: Local privilege escalation in top (CVE-2018-1122)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="procps-ng-i18n" release="26.el7" src="procps-ng-3.3.10-26.el7.src.rpm" version="3.3.10"><filename>procps-ng-i18n-3.3.10-26.el7.x86_64.rpm</filename><sum type="sha256">3374a9e82d434cc84350c7c80cafd06dab78335c7ef160b675f902b7fdfb71e1</sum></package><package arch="x86_64" name="procps-ng" release="26.el7" src="procps-ng-3.3.10-26.el7.src.rpm" version="3.3.10"><filename>procps-ng-3.3.10-26.el7.x86_64.rpm</filename><sum type="sha256">876f9050e44129dac4efa03e3e48a0c11b460d7c3fcfb204b7a6ce2ad632297e</sum></package><package arch="x86_64" name="procps-ng-devel" release="26.el7" src="procps-ng-3.3.10-26.el7.src.rpm" version="3.3.10"><filename>procps-ng-devel-3.3.10-26.el7.x86_64.rpm</filename><sum type="sha256">014f5cc26127c9f075ce066168010133bbf03326d4c793a037831d47690835a4</sum></package><package arch="i686" name="procps-ng" release="26.el7" src="procps-ng-3.3.10-26.el7.src.rpm" version="3.3.10"><filename>procps-ng-3.3.10-26.el7.i686.rpm</filename><sum type="sha256">c6a8e6d442666a657018a1ff611c9f664858c357ac03a984e12e4f777f87607c</sum></package><package arch="i686" name="procps-ng-devel" release="26.el7" src="procps-ng-3.3.10-26.el7.src.rpm" version="3.3.10"><filename>procps-ng-devel-3.3.10-26.el7.i686.rpm</filename><sum type="sha256">371c579d6b29ddc191149d79f615b69d0cdd9638ebfdc836206a2675b153a640</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1122" id="CVE-2018-1122" title="Cve-2018-1122" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2189" id="RHSA-2019:2189-1" title="Rhsa-2019:2189-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1575466" id="1575466" title="Cve-2018-1122 Procps-Ng, Procps: Local Privilege Escalation In Top" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1692843" id="1692843" title="Ps Reports Numerical Cls Value Of &quot;#6&quot; For Sched_Deadline Policy Tasks Instead Of Dln" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1699264" id="1699264" title="Free Output Is Wrong" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2196-1</id><title>Zziplib</title><description>Security Fix(es): 
* zziplib: Bus error caused by loading of a misaligned address inzzip/zip.c (CVE-2018-6541) 
* zziplib: Memory leak triggered in the function __zzip_parse_root_directory in zip.c (CVE-2018-16548)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="zziplib" release="11.el7" src="zziplib-0.13.62-11.el7.src.rpm" version="0.13.62"><filename>zziplib-0.13.62-11.el7.i686.rpm</filename><sum type="sha256">977e14c37a992d871a2cf119601c300c1a8fac7e4c5840e64fbc2c5931503df2</sum></package><package arch="x86_64" name="zziplib" release="11.el7" src="zziplib-0.13.62-11.el7.src.rpm" version="0.13.62"><filename>zziplib-0.13.62-11.el7.x86_64.rpm</filename><sum type="sha256">d3324d50a0df992e625199e127bb7e791e27105d32bcc136fa458409c59b579e</sum></package><package arch="x86_64" name="zziplib-devel" release="11.el7" src="zziplib-0.13.62-11.el7.src.rpm" version="0.13.62"><filename>zziplib-devel-0.13.62-11.el7.x86_64.rpm</filename><sum type="sha256">e851e0b0bc58416f41b3a33e02ad891dcbe1e964f2ae3bda53ea88605feb6613</sum></package><package arch="x86_64" name="zziplib-utils" release="11.el7" src="zziplib-0.13.62-11.el7.src.rpm" version="0.13.62"><filename>zziplib-utils-0.13.62-11.el7.x86_64.rpm</filename><sum type="sha256">de62ace322bf8c575626c21ab1fc8afcb64dc50b3d5a89100c05d5d40dcd6799</sum></package><package arch="i686" name="zziplib-devel" release="11.el7" src="zziplib-0.13.62-11.el7.src.rpm" version="0.13.62"><filename>zziplib-devel-0.13.62-11.el7.i686.rpm</filename><sum type="sha256">8008989b12129a125ce2f3e8b47eae0414ad4d617bbe3d7d29b7a7b2762a1fb3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16548" id="CVE-2018-16548" title="Cve-2018-16548" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6541" id="CVE-2018-6541" title="Cve-2018-6541" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2196" id="RHSA-2019:2196-1" title="Rhsa-2019:2196-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598244" id="1598244" title="Cve-2018-6541 Zziplib: Bus Error Caused By Loading Of A Misaligned Address Inzzip/Zip.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1626200" id="1626200" title="Cve-2018-16548 Zziplib: Memory Leak Triggered In The Function __Zzip_Parse_Root_Directory In Zip.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2197-1</id><title>Elfutils</title><description>The following packages have been upgraded to a later upstream version: elfutils (0.176). 
Security Fix(es): 
* elfutils: Heap-based buffer over-read in libdw/dwarf_getaranges.c:dwarf_getaranges() via crafted file (CVE-2018-16062) 
* elfutils: Double-free due to double decompression of sections in crafted ELF causes crash (CVE-2018-16402) 
* elfutils: Heap-based buffer over-read in libdw/dwarf_getabbrev.c and libwd/dwarf_hasattr.c causes crash (CVE-2018-16403) 
* elfutils: invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl (CVE-2018-18310) 
* elfutils: eu-size cannot handle recursive ar files (CVE-2018-18520) 
* elfutils: Divide-by-zero in arlib_add_symbols function in arlib.c (CVE-2018-18521) 
* elfutils: heap-based buffer over-read in read_srclines in dwarf_getsrclines.c in libdw (CVE-2019-7149) 
* elfutils: segmentation fault in elf64_xlatetom in libelf/elf32_xlatetom.c (CVE-2019-7150) 
* elfutils: Out of bound write in elf_cvt_note in libelf/note_xlate.h (CVE-2019-7664) 
* elfutils: heap-based buffer over-read in function elf32_xlatetom in elf32_xlatetom.c (CVE-2019-7665)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="elfutils-libs" release="2.el7" src="elfutils-0.176-2.el7.src.rpm" version="0.176"><filename>elfutils-libs-0.176-2.el7.i686.rpm</filename><sum type="sha256">1c58fb5f2d15a8ab28ff74ad37f524ae14bc78ef4697205c6c6a66b6160dbe9d</sum></package><package arch="x86_64" name="elfutils-libelf-devel-static" release="2.el7" src="elfutils-0.176-2.el7.src.rpm" version="0.176"><filename>elfutils-libelf-devel-static-0.176-2.el7.x86_64.rpm</filename><sum type="sha256">154ba76a017a045028509260fe689b706460df8453613efc0eba26ee135804f8</sum></package><package arch="x86_64" name="elfutils-devel-static" release="2.el7" src="elfutils-0.176-2.el7.src.rpm" version="0.176"><filename>elfutils-devel-static-0.176-2.el7.x86_64.rpm</filename><sum type="sha256">eabd22e44d35ec6c1d9589d82f358040f5ce451127dca0f0f04dda0a4c13df0b</sum></package><package arch="noarch" name="elfutils-default-yama-scope" release="2.el7" src="elfutils-0.176-2.el7.src.rpm" version="0.176"><filename>elfutils-default-yama-scope-0.176-2.el7.noarch.rpm</filename><sum type="sha256">012f95e89b352215a93a3f2e021cbbc5242b1bb6984328e5252d0fa4bd8d64d3</sum></package><package arch="i686" name="elfutils-libelf-devel" release="2.el7" src="elfutils-0.176-2.el7.src.rpm" version="0.176"><filename>elfutils-libelf-devel-0.176-2.el7.i686.rpm</filename><sum type="sha256">dfbee40e24223f5153725d56226ee26c586c5c8cfcd2606f8272f49f5558492d</sum></package><package arch="x86_64" name="elfutils-libelf-devel" release="2.el7" src="elfutils-0.176-2.el7.src.rpm" version="0.176"><filename>elfutils-libelf-devel-0.176-2.el7.x86_64.rpm</filename><sum type="sha256">57e2023dfff8636deb25ca44b6696e758e3f921e718c7b6e8aec53d47cd7a9fe</sum></package><package arch="x86_64" name="elfutils-libelf" release="2.el7" src="elfutils-0.176-2.el7.src.rpm" version="0.176"><filename>elfutils-libelf-0.176-2.el7.x86_64.rpm</filename><sum type="sha256">178df255df91b7ac6fc2145410acd5b73facfd8fce4e8bd17719df3bd10552d5</sum></package><package arch="i686" name="elfutils-devel-static" release="2.el7" src="elfutils-0.176-2.el7.src.rpm" version="0.176"><filename>elfutils-devel-static-0.176-2.el7.i686.rpm</filename><sum type="sha256">73288f6efd2d3561fe78c17f4d3df4afccb29006733822c24354c72c456526bb</sum></package><package arch="x86_64" name="elfutils" release="2.el7" src="elfutils-0.176-2.el7.src.rpm" version="0.176"><filename>elfutils-0.176-2.el7.x86_64.rpm</filename><sum type="sha256">4cb85a1e910cb449b6b2cb1f696371738a7bddd1d2150d19ba9530f157725079</sum></package><package arch="x86_64" name="elfutils-libs" release="2.el7" src="elfutils-0.176-2.el7.src.rpm" version="0.176"><filename>elfutils-libs-0.176-2.el7.x86_64.rpm</filename><sum type="sha256">0a70cdf59cb533854696f6b4713319b0b7d0070634c80bfc64b41586f55b3b94</sum></package><package arch="i686" name="elfutils-devel" release="2.el7" src="elfutils-0.176-2.el7.src.rpm" version="0.176"><filename>elfutils-devel-0.176-2.el7.i686.rpm</filename><sum type="sha256">238bcd68e55cfc4e8a90b03ec2cdce9f976ea7d71e7e0b61538c276c55635397</sum></package><package arch="i686" name="elfutils-libelf" release="2.el7" src="elfutils-0.176-2.el7.src.rpm" version="0.176"><filename>elfutils-libelf-0.176-2.el7.i686.rpm</filename><sum type="sha256">05229aade9def1e7ba7cc63b4d6e197a3dc42ab8a7b452c746ae82b20d972b30</sum></package><package arch="i686" name="elfutils-libelf-devel-static" release="2.el7" src="elfutils-0.176-2.el7.src.rpm" version="0.176"><filename>elfutils-libelf-devel-static-0.176-2.el7.i686.rpm</filename><sum type="sha256">1d8b665c6700565aeec69c802d7812f711d0532fdd4d80b6d08f44c8317a6434</sum></package><package arch="x86_64" name="elfutils-devel" release="2.el7" src="elfutils-0.176-2.el7.src.rpm" version="0.176"><filename>elfutils-devel-0.176-2.el7.x86_64.rpm</filename><sum type="sha256">c7c80b236167b2a2d2e1e5c1f8dc967dbb0809a75a979659df2a7b09204e220c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16062" id="CVE-2018-16062" title="Cve-2018-16062" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16402" id="CVE-2018-16402" title="Cve-2018-16402" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16403" id="CVE-2018-16403" title="Cve-2018-16403" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18310" id="CVE-2018-18310" title="Cve-2018-18310" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18520" id="CVE-2018-18520" title="Cve-2018-18520" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18521" id="CVE-2018-18521" title="Cve-2018-18521" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7149" id="CVE-2019-7149" title="Cve-2019-7149" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7150" id="CVE-2019-7150" title="Cve-2019-7150" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7664" id="CVE-2019-7664" title="Cve-2019-7664" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7665" id="CVE-2019-7665" title="Cve-2019-7665" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2197" id="RHSA-2019:2197-1" title="Rhsa-2019:2197-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623752" id="1623752" title="Cve-2018-16062 Elfutils: Heap-Based Buffer Over-Read In Libdw/Dwarf_Getaranges.C:Dwarf_Getaranges() Via Crafted File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625050" id="1625050" title="Cve-2018-16402 Elfutils: Double-Free Due To Double Decompression Of Sections In Crafted Elf Causes Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625055" id="1625055" title="Cve-2018-16403 Elfutils: Heap-Based Buffer Over-Read In Libdw/Dwarf_Getabbrev.C And Libwd/Dwarf_Hasattr.C Causes Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642604" id="1642604" title="Cve-2018-18310 Elfutils: Invalid Memory Address Dereference Was Discovered In Dwfl_Segment_Report_Module.C In Libdwfl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646477" id="1646477" title="Cve-2018-18520 Elfutils: Eu-Size Cannot Handle Recursive Ar Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646482" id="1646482" title="Cve-2018-18521 Elfutils: Divide-By-Zero In Arlib_Add_Symbols Function In Arlib.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1671443" id="1671443" title="Cve-2019-7149 Elfutils: Heap-Based Buffer Over-Read In Read_Srclines In Dwarf_Getsrclines.C In Libdw" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1671446" id="1671446" title="Cve-2019-7150 Elfutils: Segmentation Fault In Elf64_Xlatetom In Libelf/Elf32_Xlatetom.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677536" id="1677536" title="Cve-2019-7664 Elfutils: Out Of Bound Write In Elf_Cvt_Note In Libelf/Note_Xlate.H" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677538" id="1677538" title="Cve-2019-7665 Elfutils: Heap-Based Buffer Over-Read In Function Elf32_Xlatetom In Elf32_Xlatetom.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1704754" id="1704754" title="Elfutils Xlate (Cross-Endian) Functions Might Not Convert An Elf Note Header" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2205-1</id><title>Tomcat</title><description>Security Fix(es): 
* tomcat: Incorrect handling of empty string URL in security constraints can lead to unintended exposure of resources (CVE-2018-1304) 
* tomcat: Late application of security constraints can lead to resource exposure for unauthorised users (CVE-2018-1305) 
* tomcat: Insecure defaults in CORS filter enable 'supportsCredentials' for all origins (CVE-2018-8014) 
* tomcat: Host name verification missing in WebSocket client (CVE-2018-8034)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcat-docs-webapp" release="9.el7" src="tomcat-7.0.76-9.el7.src.rpm" version="7.0.76"><filename>tomcat-docs-webapp-7.0.76-9.el7.noarch.rpm</filename><sum type="sha256">74a7cbfe82daace38212731d02be4068fed88088097e894c1e8db23f298bd105</sum></package><package arch="noarch" name="tomcat" release="9.el7" src="tomcat-7.0.76-9.el7.src.rpm" version="7.0.76"><filename>tomcat-7.0.76-9.el7.noarch.rpm</filename><sum type="sha256">91fe1cfb599c72f1f944735aae9b0dbee21b701dcd0bd338dcea5418c0f9a5d5</sum></package><package arch="noarch" name="tomcat-jsvc" release="9.el7" src="tomcat-7.0.76-9.el7.src.rpm" version="7.0.76"><filename>tomcat-jsvc-7.0.76-9.el7.noarch.rpm</filename><sum type="sha256">e78654e4904e1fcc98012caac5348122dbd3c093effa7f76e869f334996f36a2</sum></package><package arch="noarch" name="tomcat-jsp-2.2-api" release="9.el7" src="tomcat-7.0.76-9.el7.src.rpm" version="7.0.76"><filename>tomcat-jsp-2.2-api-7.0.76-9.el7.noarch.rpm</filename><sum type="sha256">498cb473cf01690492d233dedd0cf3f9ef4d8c1a0e5b3e493a160b364b0dd8a3</sum></package><package arch="noarch" name="tomcat-admin-webapps" release="9.el7" src="tomcat-7.0.76-9.el7.src.rpm" version="7.0.76"><filename>tomcat-admin-webapps-7.0.76-9.el7.noarch.rpm</filename><sum type="sha256">7d713ef41d520749fe2b0ef011206d49380a1348c1406938e34621d0d512caff</sum></package><package arch="noarch" name="tomcat-javadoc" release="9.el7" src="tomcat-7.0.76-9.el7.src.rpm" version="7.0.76"><filename>tomcat-javadoc-7.0.76-9.el7.noarch.rpm</filename><sum type="sha256">cc9612dc527478821d5b1bf93ecc8631f350133409006e5ff4ce965231674242</sum></package><package arch="noarch" name="tomcat-el-2.2-api" release="9.el7" src="tomcat-7.0.76-9.el7.src.rpm" version="7.0.76"><filename>tomcat-el-2.2-api-7.0.76-9.el7.noarch.rpm</filename><sum type="sha256">c97fc1b7a9b5d1f9badd68f9d759622054912089cf2402b7c9178bb8835574dc</sum></package><package arch="noarch" name="tomcat-servlet-3.0-api" release="9.el7" src="tomcat-7.0.76-9.el7.src.rpm" version="7.0.76"><filename>tomcat-servlet-3.0-api-7.0.76-9.el7.noarch.rpm</filename><sum type="sha256">2c5f2909daddc5b36ee6d6266a07b173911d9efa258674fc9faf8ef1d9017b8b</sum></package><package arch="noarch" name="tomcat-lib" release="9.el7" src="tomcat-7.0.76-9.el7.src.rpm" version="7.0.76"><filename>tomcat-lib-7.0.76-9.el7.noarch.rpm</filename><sum type="sha256">c5b46f1a64280e7212590fba523393d1a9218e89919f03822fdcb560d01cf94d</sum></package><package arch="noarch" name="tomcat-webapps" release="9.el7" src="tomcat-7.0.76-9.el7.src.rpm" version="7.0.76"><filename>tomcat-webapps-7.0.76-9.el7.noarch.rpm</filename><sum type="sha256">d60acefc27c055da431682c97fac87cefcb4d1f092ab88fb8490883dc385dd24</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1304" id="CVE-2018-1304" title="Tomcat: Incorrect Handling Of Empty String Url In Security Constraints Can Lead To Unintended Exposure Of Resources" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1305" id="CVE-2018-1305" title="Tomcat: Late Application Of Security Constraints Can Lead To Resource Exposure For Unauthorised Users" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8014" id="CVE-2018-8014" title="Cve-2018-8014" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8034" id="CVE-2018-8034" title="Cve-2018-8034" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2205" id="RHSA-2019:2205-1" title="Rhsa-2019:2205-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1472950" id="1472950" title="Shutdown_Wait Option Is Not Working For Tomcat" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1548282" id="1548282" title="Tomcat: Late Application Of Security Constraints Can Lead To Resource Exposure For Unauthorised Users" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1548289" id="1548289" title="Tomcat: Incorrect Handling Of Empty String Url In Security Constraints Can Lead To Unintended Exposure Of Resources" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1579611" id="1579611" title="Cve-2018-8014 Tomcat: Insecure Defaults In Cors Filter Enable 'Supportscredentials' For All Origins" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1588703" id="1588703" title="Backport Of Negative Maxcookiecount Value Causes Exception For Tomcat" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1607580" id="1607580" title="Cve-2018-8034 Tomcat: Host Name Verification Missing In Websocket Client" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2229-1</id><title>Spice-Gtk</title><description>The libgovirt packages contain a library that allows applications to use the oVirt Representational State Transfer (REST) API to list virtual machines (VMs) managed by an oVirt instance. The library is also used to get the connection parameters needed to establish a connection to the VMs using Simple Protocol For Independent Computing Environments (SPICE) or Virtual Network Computing (VNC). 
The spice-vdagent packages provide a SPICE agent for Linux guests. 
The virt-viewer packages provide Virtual Machine Viewer, which is a lightweight interface for interacting with the graphical display of a virtualized guest. 
Security Fix(es): 
* spice-client: Insufficient encoding checks for LZ can cause different integer/buffer overflows (CVE-2018-10893)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="spice-gtk3-vala" release="4.el7" src="spice-gtk-0.35-4.el7.src.rpm" version="0.35"><filename>spice-gtk3-vala-0.35-4.el7.x86_64.rpm</filename><sum type="sha256">ec708b84a8e8ce5ff04840b6fe9f1cf1860ddbda6ee0018dfc9f5e6ca59d51e2</sum></package><package arch="x86_64" name="libgovirt-devel" release="3.el7" src="libgovirt-0.3.4-3.el7.src.rpm" version="0.3.4"><filename>libgovirt-devel-0.3.4-3.el7.x86_64.rpm</filename><sum type="sha256">562ff91b1d0c38bef5261a0f714ceb32bb7ae59f59843eb9c12e07b9c5b0c6c0</sum></package><package arch="i686" name="spice-gtk3-devel" release="4.el7" src="spice-gtk-0.35-4.el7.src.rpm" version="0.35"><filename>spice-gtk3-devel-0.35-4.el7.i686.rpm</filename><sum type="sha256">d4436a6bb39022d2efc6977adcd7bdaaea6be70d908abd11d413f49716092358</sum></package><package arch="i686" name="libgovirt" release="3.el7" src="libgovirt-0.3.4-3.el7.src.rpm" version="0.3.4"><filename>libgovirt-0.3.4-3.el7.i686.rpm</filename><sum type="sha256">be275b364e4b402f6c60a610be093b8dc4c9b259760325679aae10557c84a09f</sum></package><package arch="i686" name="spice-gtk3" release="4.el7" src="spice-gtk-0.35-4.el7.src.rpm" version="0.35"><filename>spice-gtk3-0.35-4.el7.i686.rpm</filename><sum type="sha256">7b9fd2dfaf4edb714ff319e9e4547581746351f6f78e34bae84f492f784de5a6</sum></package><package arch="x86_64" name="spice-glib" release="4.el7" src="spice-gtk-0.35-4.el7.src.rpm" version="0.35"><filename>spice-glib-0.35-4.el7.x86_64.rpm</filename><sum type="sha256">1870fa90d3a83d01e2c901a1caaf9b0aafeafa32d492011d93dea831ba57f477</sum></package><package arch="x86_64" name="virt-viewer" release="15.el7" src="virt-viewer-5.0-15.el7.src.rpm" version="5.0"><filename>virt-viewer-5.0-15.el7.x86_64.rpm</filename><sum type="sha256">75974baff920eb162199b78b3ec8a545c47b69b5c5ce9cb6c4541d2fb35c83d8</sum></package><package arch="x86_64" name="libgovirt" release="3.el7" src="libgovirt-0.3.4-3.el7.src.rpm" version="0.3.4"><filename>libgovirt-0.3.4-3.el7.x86_64.rpm</filename><sum type="sha256">c139a5196f632f840856d1c6268411a4976416b308b5ec9f47ece07e75f168b8</sum></package><package arch="x86_64" name="spice-vdagent" release="18.el7" src="spice-vdagent-0.14.0-18.el7.src.rpm" version="0.14.0"><filename>spice-vdagent-0.14.0-18.el7.x86_64.rpm</filename><sum type="sha256">cb431b071406fc028747be8ebecead529c935003330082b36aa90c15976995fe</sum></package><package arch="i686" name="libgovirt-devel" release="3.el7" src="libgovirt-0.3.4-3.el7.src.rpm" version="0.3.4"><filename>libgovirt-devel-0.3.4-3.el7.i686.rpm</filename><sum type="sha256">207f2291369165880a389aee83d5165bbc9fb29de623916502bec0fbfe44f69c</sum></package><package arch="i686" name="spice-glib-devel" release="4.el7" src="spice-gtk-0.35-4.el7.src.rpm" version="0.35"><filename>spice-glib-devel-0.35-4.el7.i686.rpm</filename><sum type="sha256">23bd0a72fe8f5829241d6a95f79d9fafc56dca87d0d7c4efea8a5267a4324bf2</sum></package><package arch="x86_64" name="spice-gtk3-devel" release="4.el7" src="spice-gtk-0.35-4.el7.src.rpm" version="0.35"><filename>spice-gtk3-devel-0.35-4.el7.x86_64.rpm</filename><sum type="sha256">e8f15392a140e9e2f17dabda7144a5eb457e4f6535f74218618353b75eeee533</sum></package><package arch="x86_64" name="spice-glib-devel" release="4.el7" src="spice-gtk-0.35-4.el7.src.rpm" version="0.35"><filename>spice-glib-devel-0.35-4.el7.x86_64.rpm</filename><sum type="sha256">d988c92f5d1152dedda8feb25958f08f24829a035f9807ba6e5aabe0eb626e1c</sum></package><package arch="x86_64" name="spice-gtk-tools" release="4.el7" src="spice-gtk-0.35-4.el7.src.rpm" version="0.35"><filename>spice-gtk-tools-0.35-4.el7.x86_64.rpm</filename><sum type="sha256">c8313f20e593682c8989ddcb048f8936eb8bf50bbe7e67daa09bf714f763db67</sum></package><package arch="x86_64" name="spice-gtk3" release="4.el7" src="spice-gtk-0.35-4.el7.src.rpm" version="0.35"><filename>spice-gtk3-0.35-4.el7.x86_64.rpm</filename><sum type="sha256">569b44c8a85e075eef107c7c20c9a41271b445cbdf4f6067b1557d13b4b7afe9</sum></package><package arch="i686" name="spice-glib" release="4.el7" src="spice-gtk-0.35-4.el7.src.rpm" version="0.35"><filename>spice-glib-0.35-4.el7.i686.rpm</filename><sum type="sha256">f50be60b197a60cb70f4d09e26a2f2f5f3d7be811324acc69a125bdd9dc64c1b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10893" id="CVE-2018-10893" title="Cve-2018-10893" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2229" id="RHSA-2019:2229-1" title="Rhsa-2019:2229-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1427467" id="1427467" title="Foreign Menu - Incorrect Rest Endpoint Used To Load The Storagedomains" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1505809" id="1505809" title="Release The Physical Usb  Stick From Guest ,Host Can Not Work Well" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1508274" id="1508274" title="Remote-Viewer Recent Dialog Doesn'T Pop Up At The Center Of The Main Window" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1510411" id="1510411" title="Mark &quot;Printscreen&quot; Translatable As &quot;Ctrl+Alt+Fx&quot; Keys" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1545212" id="1545212" title="Dependency Failed For Activation Socket For Spice Guest Agent Daemon." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1594876" id="1594876" title="Spice-Vdagent Print Error Messages To Systemd Journal When Selecting Text On Host" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598234" id="1598234" title="Cve-2018-10893 Spice-Client: Insufficient Encoding Checks For Lz Can Cause Different Integer/Buffer Overflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1623756" id="1623756" title="Vm'S Name Could Not Be Added Into Settings File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625550" id="1625550" title="Virt-Viewer Can Not Establish Tls Connection For Usbredir" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1650596" id="1650596" title="The Spice-Vdagent Is Not Starting And Spice Is Opening Thousands Of Unix Sockets." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658325" id="1658325" title="New Version Of Virt-Viewer Removes /Usr/Libexec/Spice-Xpi-Client-Remote-Viewer But Fails To Remove Alternatives For  Spice-Xpi-Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1686008" id="1686008" title="&quot;Clipboard: Unexpected Selection Type X-Special/Gnome-Copied-Files&quot; Errors In Journal" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2237-1</id><title>Nss, Nss-Softokn, Nss-Util, And Nspr</title><description>Netscape Portable Runtime (NSPR) provides platform independence for non- GUI operating system facilities. 
The following packages have been upgraded to a later upstream version: nss (3.44.0), nss-softokn (3.44.0), nss-util (3.44.0), nspr (4.21.0). 
Security Fix(es): 
* ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries (CVE-2018-0495) 
* nss: Cache side-channel variant of the Bleichenbacher attack (CVE-2018-12404)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-softokn" release="5.el7" src="nss-softokn-3.44.0-5.el7.src.rpm" version="3.44.0"><filename>nss-softokn-3.44.0-5.el7.x86_64.rpm</filename><sum type="sha256">146c05085a965a06f8f830390f193e790e6f360d0ea5fbff1585ea6e3c434cbd</sum></package><package arch="i686" name="nss-devel" release="4.el7" src="nss-3.44.0-4.el7.src.rpm" version="3.44.0"><filename>nss-devel-3.44.0-4.el7.i686.rpm</filename><sum type="sha256">1369795b9a89ef6e4bf74edf32270b91115c760d5de1b6b98aa2a9e0e1c48782</sum></package><package arch="i686" name="nss-softokn-freebl" release="5.el7" src="nss-softokn-3.44.0-5.el7.src.rpm" version="3.44.0"><filename>nss-softokn-freebl-3.44.0-5.el7.i686.rpm</filename><sum type="sha256">9e413d12915178d4416a35501077485121e50ebadcb3e2d29e09e4a42a04ccbb</sum></package><package arch="i686" name="nspr-devel" release="1.el7" src="nspr-4.21.0-1.el7.src.rpm" version="4.21.0"><filename>nspr-devel-4.21.0-1.el7.i686.rpm</filename><sum type="sha256">864c539df80fc3f1db33e511518ebcdd54c3b336d7f1af6faf7b5e50f1f4f034</sum></package><package arch="x86_64" name="nss-devel" release="4.el7" src="nss-3.44.0-4.el7.src.rpm" version="3.44.0"><filename>nss-devel-3.44.0-4.el7.x86_64.rpm</filename><sum type="sha256">085e6392c89c788ac8815f53160ac93f3cc608884cda542022b3410eea3d5b26</sum></package><package arch="x86_64" name="nss-tools" release="4.el7" src="nss-3.44.0-4.el7.src.rpm" version="3.44.0"><filename>nss-tools-3.44.0-4.el7.x86_64.rpm</filename><sum type="sha256">ca3b70a0bb881e2d7469a4605f6da954bd8ed601fb4ebd5bb650a7b0c2a346a4</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="4.el7" src="nss-3.44.0-4.el7.src.rpm" version="3.44.0"><filename>nss-pkcs11-devel-3.44.0-4.el7.x86_64.rpm</filename><sum type="sha256">d794c60e34298070d9754e0fe4629576a1bc753de6ec18c05499eaa4800d7dac</sum></package><package arch="i686" name="nss-softokn-devel" release="5.el7" src="nss-softokn-3.44.0-5.el7.src.rpm" version="3.44.0"><filename>nss-softokn-devel-3.44.0-5.el7.i686.rpm</filename><sum type="sha256">f0c2f053dbbf6c7b664e354bdfc27236f7d8fbf706a2cf82d459b289986d5987</sum></package><package arch="x86_64" name="nss-sysinit" release="4.el7" src="nss-3.44.0-4.el7.src.rpm" version="3.44.0"><filename>nss-sysinit-3.44.0-4.el7.x86_64.rpm</filename><sum type="sha256">86995364e3943b0e206c11a64cb7e71be12289d2d5fd898a47999e8de4bc459d</sum></package><package arch="x86_64" name="nss-util-devel" release="3.el7" src="nss-util-3.44.0-3.el7.src.rpm" version="3.44.0"><filename>nss-util-devel-3.44.0-3.el7.x86_64.rpm</filename><sum type="sha256">bfb1a54266db5dd4494ff302b5ed1be3ee9798b10ab24b2f893bccf5f2f150e1</sum></package><package arch="x86_64" name="nspr" release="1.el7" src="nspr-4.21.0-1.el7.src.rpm" version="4.21.0"><filename>nspr-4.21.0-1.el7.x86_64.rpm</filename><sum type="sha256">6ac4ab8db58e7aa40a62354f44607267d82d472eca91b205a35f01091f4046d0</sum></package><package arch="x86_64" name="nspr-devel" release="1.el7" src="nspr-4.21.0-1.el7.src.rpm" version="4.21.0"><filename>nspr-devel-4.21.0-1.el7.x86_64.rpm</filename><sum type="sha256">dde4719aa2f67f866a4ae1afdb9fb4ce46fe3bdba785b85e20ae54445b47564f</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="5.el7" src="nss-softokn-3.44.0-5.el7.src.rpm" version="3.44.0"><filename>nss-softokn-freebl-devel-3.44.0-5.el7.i686.rpm</filename><sum type="sha256">a75c14e4735e51dd21e9b54fae7912728968048037a534f024437e26bef17e5b</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="5.el7" src="nss-softokn-3.44.0-5.el7.src.rpm" version="3.44.0"><filename>nss-softokn-freebl-devel-3.44.0-5.el7.x86_64.rpm</filename><sum type="sha256">89514ba2276782a76fb459308d2bfa5d943c8c7fbce78c16496915a0ef4968c3</sum></package><package arch="i686" name="nss-pkcs11-devel" release="4.el7" src="nss-3.44.0-4.el7.src.rpm" version="3.44.0"><filename>nss-pkcs11-devel-3.44.0-4.el7.i686.rpm</filename><sum type="sha256">bf0a3a04f309e10f4ca1dfa4162dd6dcc9906bdc1f319c83020d976d0c8a1e1f</sum></package><package arch="x86_64" name="nss-util" release="3.el7" src="nss-util-3.44.0-3.el7.src.rpm" version="3.44.0"><filename>nss-util-3.44.0-3.el7.x86_64.rpm</filename><sum type="sha256">d00efa3be2125bac037dc35adc7fbf35a11938609b6fad6e0f17097cb92396db</sum></package><package arch="i686" name="nss-softokn" release="5.el7" src="nss-softokn-3.44.0-5.el7.src.rpm" version="3.44.0"><filename>nss-softokn-3.44.0-5.el7.i686.rpm</filename><sum type="sha256">31920d1b61ece4c377ee87445a951de89be853a14eeefbf6cdc20f3be7f25542</sum></package><package arch="i686" name="nss-util-devel" release="3.el7" src="nss-util-3.44.0-3.el7.src.rpm" version="3.44.0"><filename>nss-util-devel-3.44.0-3.el7.i686.rpm</filename><sum type="sha256">97b8b4fc7e3ad07de2af30be4037554789b8bab990113aafa897e6c5ca31ce34</sum></package><package arch="x86_64" name="nss-softokn-devel" release="5.el7" src="nss-softokn-3.44.0-5.el7.src.rpm" version="3.44.0"><filename>nss-softokn-devel-3.44.0-5.el7.x86_64.rpm</filename><sum type="sha256">11ece7f154d3c52942b0d0e3f697cca36839b48b9adfb5870e33893151c81d84</sum></package><package arch="i686" name="nss" release="4.el7" src="nss-3.44.0-4.el7.src.rpm" version="3.44.0"><filename>nss-3.44.0-4.el7.i686.rpm</filename><sum type="sha256">cfb646ff03c5e18929e6ecdaf35142cf9da0ed953df9381aa8629c773829b04d</sum></package><package arch="i686" name="nspr" release="1.el7" src="nspr-4.21.0-1.el7.src.rpm" version="4.21.0"><filename>nspr-4.21.0-1.el7.i686.rpm</filename><sum type="sha256">ad99e36575c53ad86217025e3e5796f7d8f046c1defd1a3f10b62a1794caa9c8</sum></package><package arch="x86_64" name="nss" release="4.el7" src="nss-3.44.0-4.el7.src.rpm" version="3.44.0"><filename>nss-3.44.0-4.el7.x86_64.rpm</filename><sum type="sha256">d16d0ebcabf0078678d2e94b89240e8ed0764bbac4619a53de7c019c4b9b10cb</sum></package><package arch="i686" name="nss-util" release="3.el7" src="nss-util-3.44.0-3.el7.src.rpm" version="3.44.0"><filename>nss-util-3.44.0-3.el7.i686.rpm</filename><sum type="sha256">e0be655623edc1c0b405fa712aedf9121d4585748ebfa028f2c90b02a5258e13</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="5.el7" src="nss-softokn-3.44.0-5.el7.src.rpm" version="3.44.0"><filename>nss-softokn-freebl-3.44.0-5.el7.x86_64.rpm</filename><sum type="sha256">819800bfc96b48f23364d69262b17296b919023c8c900a1496aa97899efc1873</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0495" id="CVE-2018-0495" title="Openssl: Rohnp - Key Extraction Side Channel In " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12404" id="CVE-2018-12404" title="Cve-2018-12404" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2237" id="RHSA-2019:2237-1" title="Rhsa-2019:2237-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1144186" id="1144186" title="Cannot Delete Orphan Private Keys With Certutil." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1212132" id="1212132" title="Support For Ike/Ipsec Typical Pkix Usage So Libreswan Can Use Nss Without Rejecting Certs Based On Eku" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1431241" id="1431241" title="Fully Implement Verification Of Rsa-Pss Keys In Certificates In Tstclnt And Selfserv [Rhel-7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1444136" id="1444136" title="Move Nss Signtool To The Unsupported Tools In Rhel 7.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1455288" id="1455288" title="Tls 1.3 Handshake Fails With Ssl_Require_Safe_Negotiation On" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1508571" id="1508571" title="Exporting Rsa-Pss Keys To Pkcs#12 Drops The Rsa-Pss Identifier From Them [Rhel-7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1508595" id="1508595" title="Regression In Handling Unknown Signature Algorithms Extensions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1509045" id="1509045" title="Selfserv Refuses To Use Rsa-Pss Keys [Rhel-7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1509396" id="1509396" title="Rfc 5246 Non Compliance With Certificateverify Fallback To Sha-1 [Rhel-7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1510156" id="1510156" title="Rsa Pkcs#1 V1.5 Signatures Made Using Rsa-Pss Keys Are Accepted As Valid [Rhel-7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1514041" id="1514041" title="Certutil -O Output Isn'T Precise When The Input Is An Ambiguous Nickname Used By Multiple Certificates" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1533729" id="1533729" title="[Rfe] Certutil Capability: Generate Csr From Orphan Private Key" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1538081" id="1538081" title="Policy Does Not Apply To Mgf1 Hash In Rsa-Pss Signatures [Rhel-7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1591163" id="1591163" title="Openssl: Rohnp - Key Extraction Side Channel In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1639873" id="1639873" title="Mod_Nss - Tls Session Id Is Still Not Maintained (Ref Bz 1461580)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1657164" id="1657164" title="`Certutil -U I` Is Not Documented" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1657913" id="1657913" title="Cve-2018-12404 Nss: Cache Side-Channel Variant Of The Bleichenbacher Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1670239" id="1670239" title="Libpkix Name Constraints Check Treats Cn As Dns Name When It Should Not" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1712876" id="1712876" title="Post Handshake Authentication With Selfserv Does Not Work If Ssl_Enable_Session_Tickets Is Set [Rhel-7]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2258-1</id><title>Http-Parser</title><description>Security Fix(es): 
* nodejs: Denial of Service with large HTTP headers (CVE-2018-12121) 
* nodejs: HTTP parser allowed for spaces inside Content-Length header values (CVE-2018-7159)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="http-parser-devel" release="8.el7" src="http-parser-2.7.1-8.el7.src.rpm" version="2.7.1"><filename>http-parser-devel-2.7.1-8.el7.x86_64.rpm</filename><sum type="sha256">586f539c645af9f5b7b0eecd063f8ecec47a86cf28b582d18c5614a769435fdf</sum></package><package arch="i686" name="http-parser" release="8.el7" src="http-parser-2.7.1-8.el7.src.rpm" version="2.7.1"><filename>http-parser-2.7.1-8.el7.i686.rpm</filename><sum type="sha256">e9255b46da5640ef0ab2b4f6fed9abb58f6cdeab08cec0235162531c35c0ccd7</sum></package><package arch="i686" name="http-parser-devel" release="8.el7" src="http-parser-2.7.1-8.el7.src.rpm" version="2.7.1"><filename>http-parser-devel-2.7.1-8.el7.i686.rpm</filename><sum type="sha256">7f85b9ac2fc7a9801a90cfc392b1a775621ac7401c471b20e82ba3584d5de836</sum></package><package arch="x86_64" name="http-parser" release="8.el7" src="http-parser-2.7.1-8.el7.src.rpm" version="2.7.1"><filename>http-parser-2.7.1-8.el7.x86_64.rpm</filename><sum type="sha256">f29e27f4df29f183916edd892ca42f91a5185b06e5de3d45e6334f4aedbaa334</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12121" id="CVE-2018-12121" title="Cve-2018-12121" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7159" id="CVE-2018-7159" title="Cve-2018-7159" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2258" id="RHSA-2019:2258-1" title="Rhsa-2019:2258-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1561981" id="1561981" title="Cve-2018-7159 Nodejs: Http Parser Allowed For Spaces Inside Content-Length Header Values" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1661002" id="1661002" title="Cve-2018-12121 Nodejs: Denial Of Service With Large Http Headers" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2272-1</id><title>Python-Urllib3</title><description>Security Fix(es): 
* python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) 
* python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-urllib3" release="7.el7" src="python-urllib3-1.10.2-7.el7.src.rpm" version="1.10.2"><filename>python-urllib3-1.10.2-7.el7.noarch.rpm</filename><sum type="sha256">301138848f3705220b04a9363064f84d50dfdda8266e1475aa90da0c263f10fd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20060" id="CVE-2018-20060" title="Cve-2018-20060" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11236" id="CVE-2019-11236" title="Cve-2019-11236" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2272" id="RHSA-2019:2272-1" title="Rhsa-2019:2272-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1649153" id="1649153" title="Cve-2018-20060 Python-Urllib3: Cross-Host Redirect Does Not Remove Authorization Header Allow For Credential Exposure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700824" id="1700824" title="Cve-2019-11236 Python-Urllib3: Crlf Injection Due To Not Encoding The '\R\N' Sequence Leading To Possible Attack On Internal Service" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2276-1</id><title>Mercurial</title><description>Security Fix(es): 
* mercurial: Buffer underflow in mpatch.c:mpatch_apply() (CVE-2018-13347) 
* mercurial: HTTP server permissions bypass (CVE-2018-1000132) 
* mercurial: Missing check for fragment start position in mpatch.c:mpatch_apply() (CVE-2018-13346)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="emacs-mercurial-el" release="10.el7" src="mercurial-2.6.2-10.el7.src.rpm" version="2.6.2"><filename>emacs-mercurial-el-2.6.2-10.el7.x86_64.rpm</filename><sum type="sha256">bc2a89a871354b8b67e46b89018a5cb180bd20ac7650ecc83f0617dacb456fc9</sum></package><package arch="x86_64" name="mercurial" release="10.el7" src="mercurial-2.6.2-10.el7.src.rpm" version="2.6.2"><filename>mercurial-2.6.2-10.el7.x86_64.rpm</filename><sum type="sha256">7df7c7eb0ebc2a89b3db5fe99774ef4006b3fa28d3fca7c161a011a46f87fe80</sum></package><package arch="x86_64" name="emacs-mercurial" release="10.el7" src="mercurial-2.6.2-10.el7.src.rpm" version="2.6.2"><filename>emacs-mercurial-2.6.2-10.el7.x86_64.rpm</filename><sum type="sha256">8ae7810144e78ae2c6f00c87d6c09254cfec7d1759ff9a3f4a265984e3c292e2</sum></package><package arch="x86_64" name="mercurial-hgk" release="10.el7" src="mercurial-2.6.2-10.el7.src.rpm" version="2.6.2"><filename>mercurial-hgk-2.6.2-10.el7.x86_64.rpm</filename><sum type="sha256">f02a8a6b49f71038d52712acfbe7d0d4d9f83515696399c22a207115cb7d3b05</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000132" id="CVE-2018-1000132" title="Cve-2018-1000132" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13346" id="CVE-2018-13346" title="Cve-2018-13346" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13347" id="CVE-2018-13347" title="Cve-2018-13347" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2276" id="RHSA-2019:2276-1" title="Rhsa-2019:2276-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1553265" id="1553265" title="Cve-2018-1000132 Mercurial: Http Server Permissions Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1594087" id="1594087" title="Cve-2018-13347 Mercurial: Buffer Underflow In Mpatch.C:Mpatch_Apply()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1594090" id="1594090" title="Cve-2018-13346 Mercurial: Missing Check For Fragment Start Position In Mpatch.C:Mpatch_Apply()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2280-1</id><title>Uriparser</title><description>* uriparser: Out-of-bounds write via uriComposeQuery* or uriComposeQueryEx* function (CVE-2018-19198) 
* uriparser: Integer overflow via uriComposeQuery* or uriComposeQueryEx* function (CVE-2018-19199)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="uriparser" release="10.el7" src="uriparser-0.7.5-10.el7.src.rpm" version="0.7.5"><filename>uriparser-0.7.5-10.el7.x86_64.rpm</filename><sum type="sha256">8b41cc10ea7188c7e5aab68d1c35b690e7691b85ed1d94883fae432d8788a885</sum></package><package arch="x86_64" name="uriparser-devel" release="10.el7" src="uriparser-0.7.5-10.el7.src.rpm" version="0.7.5"><filename>uriparser-devel-0.7.5-10.el7.x86_64.rpm</filename><sum type="sha256">2b6d4bbb162ddfce3bd6bcd38169025c2e18b06b98bd3ff69a5bf0954acbe832</sum></package><package arch="i686" name="uriparser-devel" release="10.el7" src="uriparser-0.7.5-10.el7.src.rpm" version="0.7.5"><filename>uriparser-devel-0.7.5-10.el7.i686.rpm</filename><sum type="sha256">0b74b7ba5608f9314639afb5bfec5d8e294d98fdd7df76dc3edcd0f9a949b41b</sum></package><package arch="i686" name="uriparser" release="10.el7" src="uriparser-0.7.5-10.el7.src.rpm" version="0.7.5"><filename>uriparser-0.7.5-10.el7.i686.rpm</filename><sum type="sha256">b6250ba3e1e12713b15609e41f2182b020f4dc61743eb75726f47a5086ba2406</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19198" id="CVE-2018-19198" title="Cve-2018-19198" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19199" id="CVE-2018-19199" title="Cve-2018-19199" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2280" id="RHSA-2019:2280-1" title="Rhsa-2019:2280-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1651946" id="1651946" title="Cve-2018-19198 Uriparser: Out-Of-Bounds Write Via Uricomposequery* Or Uricomposequeryex* Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1651948" id="1651948" title="Cve-2018-19199 Uriparser: Integer Overflow Via Uricomposequery* Or Uricomposequeryex* Function" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2281-1</id><title>Ghostscript</title><description>The following packages have been upgraded to a later upstream version: ghostscript (9.25). 
Security Fix(es): 
* ghostscript: status command permitted with -dSAFER in psi/zfile.c allowing attackers to identify the size and existence of files (CVE-2018-11645)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ghostscript-doc" release="2.el7" src="ghostscript-9.25-2.el7.src.rpm" version="9.25"><filename>ghostscript-doc-9.25-2.el7.noarch.rpm</filename><sum type="sha256">8d5ee86fd50d0addcd8702ebc40e2258acf6e96127441d7016df1a7d03ac47bd</sum></package><package arch="i686" name="ghostscript" release="2.el7" src="ghostscript-9.25-2.el7.src.rpm" version="9.25"><filename>ghostscript-9.25-2.el7.i686.rpm</filename><sum type="sha256">9280d7c7b2d75d42cd33977487059454428813f259d43c363386b1476a6f05ae</sum></package><package arch="x86_64" name="libgs" release="2.el7" src="ghostscript-9.25-2.el7.src.rpm" version="9.25"><filename>libgs-9.25-2.el7.x86_64.rpm</filename><sum type="sha256">d9d2f10ceb28a86acfda1ba01ce8c5f7318a2d2e1f5f73771c14239cd098fe6e</sum></package><package arch="x86_64" name="libgs-devel" release="2.el7" src="ghostscript-9.25-2.el7.src.rpm" version="9.25"><filename>libgs-devel-9.25-2.el7.x86_64.rpm</filename><sum type="sha256">34d907a4d8cfc20e882b180db19fe9725b8f1f88a51873e874ab72c1b67bd96b</sum></package><package arch="x86_64" name="ghostscript-cups" release="2.el7" src="ghostscript-9.25-2.el7.src.rpm" version="9.25"><filename>ghostscript-cups-9.25-2.el7.x86_64.rpm</filename><sum type="sha256">05979f8ad296db4d04d83e01b724a839996027e92157ed61d7e56da1d3444a81</sum></package><package arch="x86_64" name="ghostscript" release="2.el7" src="ghostscript-9.25-2.el7.src.rpm" version="9.25"><filename>ghostscript-9.25-2.el7.x86_64.rpm</filename><sum type="sha256">c59d8a179a31f338177f81630175a9941a09583c1b8a95b4cd226b8dbd6c9f1e</sum></package><package arch="x86_64" name="ghostscript-gtk" release="2.el7" src="ghostscript-9.25-2.el7.src.rpm" version="9.25"><filename>ghostscript-gtk-9.25-2.el7.x86_64.rpm</filename><sum type="sha256">d91c6d09d35e2f0d779311148639b0a933d6b704626bd86fc801f28dcaa834e3</sum></package><package arch="i686" name="libgs-devel" release="2.el7" src="ghostscript-9.25-2.el7.src.rpm" version="9.25"><filename>libgs-devel-9.25-2.el7.i686.rpm</filename><sum type="sha256">d610f5c4902c17a83e17dfe7a84e144d395b88ac9769b821e16ca3ec06a5e5d7</sum></package><package arch="i686" name="libgs" release="2.el7" src="ghostscript-9.25-2.el7.src.rpm" version="9.25"><filename>libgs-9.25-2.el7.i686.rpm</filename><sum type="sha256">4393d6ec6eac856e7f4d9bd9d20dbafac469b8e1d76d49c53dbbd93de145fde3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11645" id="CVE-2018-11645" title="Cve-2018-11645" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2281" id="RHSA-2019:2281-1" title="Rhsa-2019:2281-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1585914" id="1585914" title="Cve-2018-11645 Ghostscript: Status Command Permitted With -Dsafer In Psi/Zfile.C Allowing Attackers To Identify The Size And Existence Of Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1653706" id="1653706" title="Ps2Pdf Fails After Fontconfig Upgrade In Rhel 7.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1654045" id="1654045" title="Ghostscript Update Breaks Xdvi (Gs: Error: /Undefined In Flushpage)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1657694" id="1657694" title="Ghostscript: Regression: Warning: Dropping Incorrect Smooth Shading Object (Error: /Rangecheck In --Run--)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1661210" id="1661210" title="Ghostscript: Regression: Pdf2Ps Reports An Error When Reading From Stdin (Error: /Invalidfileaccess In --Run--)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1669611" id="1669611" title="Ghostscript: Regression: Segv In Names_Ref On Converting Faulty Ps To Pdf" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2283-1</id><title>Sox</title><description>Security Fix(es): 
* sox: NULL pointer dereference in startread function in xa.c (CVE-2017-18189)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="sox" release="7.el7" src="sox-14.4.1-7.el7.src.rpm" version="14.4.1"><filename>sox-14.4.1-7.el7.x86_64.rpm</filename><sum type="sha256">326d37a578f9e655acaac2e66b4b9d038c1f925bc7a7a530f20e4abeabf01670</sum></package><package arch="i686" name="sox-devel" release="7.el7" src="sox-14.4.1-7.el7.src.rpm" version="14.4.1"><filename>sox-devel-14.4.1-7.el7.i686.rpm</filename><sum type="sha256">4d432a674ef5dd0ddb7df0b29d5a19f79ab5b93b034fdb0e08c07cf1e4932d83</sum></package><package arch="i686" name="sox" release="7.el7" src="sox-14.4.1-7.el7.src.rpm" version="14.4.1"><filename>sox-14.4.1-7.el7.i686.rpm</filename><sum type="sha256">e0cfa4615cc81336bc6596faf71eb26bb5ddffdfbe6dfebece9edc2724419fc5</sum></package><package arch="x86_64" name="sox-devel" release="7.el7" src="sox-14.4.1-7.el7.src.rpm" version="14.4.1"><filename>sox-devel-14.4.1-7.el7.x86_64.rpm</filename><sum type="sha256">43f1f775215b8fa8348328267cb92e11503fd2021db021b192b8b58294734ad8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18189" id="CVE-2017-18189" title="Cve-2017-18189" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2283" id="RHSA-2019:2283-1" title="Rhsa-2019:2283-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1545866" id="1545866" title="Cve-2017-18189 Sox: Null Pointer Dereference In Startread Function In Xa.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2285-1</id><title>Keepalived</title><description>Security Fix(es): 
* keepalived: Improper pathname validation allows for overwrite of arbitrary filenames via symlinks (CVE-2018-19044)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="keepalived" release="16.el7" src="keepalived-1.3.5-16.el7.src.rpm" version="1.3.5"><filename>keepalived-1.3.5-16.el7.x86_64.rpm</filename><sum type="sha256">c25e76d995e1eb6587e7b1d962fa72fd05f29229a8a495d877fd1cd52fb9a184</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19044" id="CVE-2018-19044" title="Cve-2018-19044" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2285" id="RHSA-2019:2285-1" title="Rhsa-2019:2285-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1651863" id="1651863" title="Cve-2018-19044 Keepalived: Improper Pathname Validation Allows For Overwrite Of Arbitrary Filenames Via Symlinks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1667292" id="1667292" title="Vrrp_Script Broken From V1.3.0 With Syntax &quot;&lt;/Dev/Tcp/127.0.0.1/22&quot;" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2290-1</id><title>Libsolv</title><description>Security Fix(es): 
* libsolv: NULL pointer dereference in function testcase_read (CVE-2018-20532) 
* libsolv: NULL pointer dereference in function testcase_str2dep_complex (CVE-2018-20533) 
* libsolv: illegal address access in pool_whatprovides in src/pool.h (CVE-2018-20534)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libsolv-devel" release="4.el7" src="libsolv-0.6.34-4.el7.src.rpm" version="0.6.34"><filename>libsolv-devel-0.6.34-4.el7.i686.rpm</filename><sum type="sha256">9617b121e9d2d6090eb520c191b384d1e21255f35773c070c3eac3f68f7ff2bb</sum></package><package arch="x86_64" name="libsolv-tools" release="4.el7" src="libsolv-0.6.34-4.el7.src.rpm" version="0.6.34"><filename>libsolv-tools-0.6.34-4.el7.x86_64.rpm</filename><sum type="sha256">e611fd3e093e996c644b414df52eadf9ffe3fbacd89b7c83b608b62f3ab76778</sum></package><package arch="x86_64" name="libsolv-demo" release="4.el7" src="libsolv-0.6.34-4.el7.src.rpm" version="0.6.34"><filename>libsolv-demo-0.6.34-4.el7.x86_64.rpm</filename><sum type="sha256">5004290a4325c6fd1b9ce014977dd1cb61fa9f9048055ee5283e817e589428a4</sum></package><package arch="x86_64" name="python2-solv" release="4.el7" src="libsolv-0.6.34-4.el7.src.rpm" version="0.6.34"><filename>python2-solv-0.6.34-4.el7.x86_64.rpm</filename><sum type="sha256">d7acf68f149ceeb96bfe0fff1dbed64d9db8c7aadb0bcc5e0e7ff5fb1a3c08eb</sum></package><package arch="x86_64" name="libsolv-devel" release="4.el7" src="libsolv-0.6.34-4.el7.src.rpm" version="0.6.34"><filename>libsolv-devel-0.6.34-4.el7.x86_64.rpm</filename><sum type="sha256">45f5d16ae91bd2b2acc9a4d5b7b874dde742026ec31f84ad227a37106a368a09</sum></package><package arch="i686" name="libsolv-tools" release="4.el7" src="libsolv-0.6.34-4.el7.src.rpm" version="0.6.34"><filename>libsolv-tools-0.6.34-4.el7.i686.rpm</filename><sum type="sha256">5f5c85dc730640e7d1302b1ed020b53cdad66016b8b34b1980b2ed2d39aa03a0</sum></package><package arch="x86_64" name="libsolv" release="4.el7" src="libsolv-0.6.34-4.el7.src.rpm" version="0.6.34"><filename>libsolv-0.6.34-4.el7.x86_64.rpm</filename><sum type="sha256">eda429e432e0c1d94763fa7d9b27050aa13a4b4bed5fa23dbd7be4252c9fb9bf</sum></package><package arch="i686" name="libsolv" release="4.el7" src="libsolv-0.6.34-4.el7.src.rpm" version="0.6.34"><filename>libsolv-0.6.34-4.el7.i686.rpm</filename><sum type="sha256">23ff2d693f0c3284add7d63425dadaf7e22481fb456d4c6a961c0fe231d3cb56</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20532" id="CVE-2018-20532" title="Cve-2018-20532" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20533" id="CVE-2018-20533" title="Cve-2018-20533" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20534" id="CVE-2018-20534" title="Cve-2018-20534" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2290" id="RHSA-2019:2290-1" title="Rhsa-2019:2290-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665532" id="1665532" title="Cve-2018-20532 Libsolv: Null Pointer Dereference In Function Testcase_Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665535" id="1665535" title="Cve-2018-20533 Libsolv: Null Pointer Dereference In Function Testcase_Str2Dep_Complex" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665538" id="1665538" title="Cve-2018-20534 Libsolv: Illegal Address Access In Pool_Whatprovides In Src/Pool.H" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1668256" id="1668256" title="&quot;Dnf Upgrade&quot; Reinstalls Kernel Packages Reporting It Cannot Install Best Update Candidate" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2294-1</id><title>Libvirt</title><description>Security Fix(es): 
* libvirt: NULL pointer dereference after running qemuAgentCommand in qemuAgentGetInterfaces function (CVE-2019-3840)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libvirt-bash-completion" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-bash-completion-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">3f4c0c0d26d46fc34ca52b7a312592e108525bbc29bebb7e274a3055ded832a1</sum></package><package arch="x86_64" name="libvirt-login-shell" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-login-shell-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">8e82e1d8a73a3caa12acdc074e4ee147045e85ecba7e6b9170eff471259ad142</sum></package><package arch="x86_64" name="libvirt-nss" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">b83e3af5dc590f5b47dbd02f3bb34f992ea8a579ddea16c8fee9c8e1bc2dbd2b</sum></package><package arch="i686" name="libvirt-nss" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-23.el7.i686.rpm</filename><sum type="sha256">2f713eef42902927c7b44b8c7793d3d30343baaf95b82396e3c0152cd45d9b82</sum></package><package arch="x86_64" name="libvirt-daemon-config-nwfilter" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-nwfilter-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">7d3424ae3bf92cee36192d24255f0dba257373073d0ed7630341dfe512fa94b2</sum></package><package arch="x86_64" name="libvirt-client" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">489f6ca067d091d9b7b48979f88e703220307d273a9c264f0e74c2c80acfac9a</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-core" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-core-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">3ae659d672cd6555a9af1af15d0f6f73356631268fa030bf55e23a6f04666eed</sum></package><package arch="x86_64" name="libvirt-admin" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-admin-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">7baaf3f212b43f434d3d4d6e08ea4e9e27b87577234ff84b9ed807035c48bbe9</sum></package><package arch="x86_64" name="libvirt-daemon" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">f0208b2a1e8f18a0957c13db8e13238e8273094a2613bae0b7f5b9c6e2d4baab</sum></package><package arch="x86_64" name="libvirt-daemon-kvm" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-kvm-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">da9cfbb0a753ee0033cd612ac658f3962487fe61c3bb3183dfcca2ca79fed20d</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-scsi" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-scsi-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">bc49a8498fc4402220baa314a86018537a31a6c82906e24d8af666e041c64949</sum></package><package arch="x86_64" name="libvirt" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">61161019662f3d343b704314b204b71bac7c8e58cf22b1dcf3ad40b818981a76</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nodedev" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nodedev-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">aa20a12eabc1fe27cbae8c44a4eeb30d7f435dc3bb8d1acd00b0e5d83e613ae2</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-gluster" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-gluster-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">265cc43228cbb5a9a7d07d26e4e79470c0384913b8ebb0ece15e364d5556708d</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-logical" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-logical-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">da0e5dc32766bb5574db4a50032f9f270b2b33e5e8a2234f550f4850eb3da4d5</sum></package><package arch="x86_64" name="libvirt-daemon-lxc" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-lxc-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">9d38499f320775f4400984b7cc71cdafcb386aebefaabee4e51dee5b9847f15f</sum></package><package arch="x86_64" name="libvirt-daemon-config-network" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-network-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">02f52f1a65c104a662613d6d0ac66d60e403e27ae9e249f6b7acb28a9360994f</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-rbd" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-rbd-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">8147b039f8b514caa839d0aa7d47f2b3dd24dab1eb213eef9639cb03d0dd8336</sum></package><package arch="x86_64" name="libvirt-daemon-driver-network" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-network-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">a6f4bdd6fac53dd34a8798ebf027c66fb09796833241568aee6522fa3f640c01</sum></package><package arch="x86_64" name="libvirt-daemon-driver-lxc" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-lxc-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">a9a9c6db3b4cd30116991505c8a871c241fcc91ed0306c8ef8ef4037ee3d9751</sum></package><package arch="x86_64" name="libvirt-daemon-driver-qemu" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-qemu-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">f6468be0c8202c0231767acd60c55afbf0f3096497ca853224af892a6c3151da</sum></package><package arch="i686" name="libvirt-client" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-23.el7.i686.rpm</filename><sum type="sha256">cbd0153393bdc70231bca080a3c007180b5c16e5767688db256f1323314cc1c1</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nwfilter" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nwfilter-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">08cd87bc73d9f76b1e986e3d8ca0052de47cc249df6b17fa6f19c90299efd75c</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">dd689f79fd7b1691e5d03f3a2c2afaaa2d23d11f59d5e4482f5db8614c5d2da8</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-mpath" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-mpath-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">87bfaf7abf83cb5adcb71aa4a5494ae65c18982373a76a9a71ca2ce3fc2a8c5a</sum></package><package arch="x86_64" name="libvirt-daemon-driver-secret" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-secret-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">aa31f78a33060cf8d6231fbf0566e31e84963ddd032676e95db3a7b2dea62bf8</sum></package><package arch="x86_64" name="libvirt-devel" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">da5fa2aeb548ae46ee2939e83704e0b87609a40fe328c232771bbab24102a000</sum></package><package arch="x86_64" name="libvirt-libs" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">8e174b55ec3d927e5d437ad30187265416f8edd0d8824412eae6e910c97b6aaf</sum></package><package arch="i686" name="libvirt-devel" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-23.el7.i686.rpm</filename><sum type="sha256">c554295552fd975eaa681f6d92099c3c0904f5961b6c1c92e503b23a92ece213</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-disk" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-disk-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">561fa6bcc30ce74a729d9cb2cb7d8c1ca3f252f019ab188b20d4ed034516f3d0</sum></package><package arch="x86_64" name="libvirt-daemon-driver-interface" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-interface-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">241582692d7b5e2329b7c71af7ef172e2892d6adca670299d8903b00258c791e</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-lock-sanlock-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">39fb152238b5c9c3c8d14b7cfcb138dbd549acf93834e1a7f379bd929fa58652</sum></package><package arch="x86_64" name="libvirt-docs" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-docs-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">95d18ae2fb90c8eb933f3e9e4450f59ee89fca1aca1b5a557b0089010f289a52</sum></package><package arch="i686" name="libvirt-libs" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-23.el7.i686.rpm</filename><sum type="sha256">598a354ab72d7f1bf01d99de785a039cb01e17edc4ac9746334919ea339ec510</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-iscsi" release="23.el7" src="libvirt-4.5.0-23.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-iscsi-4.5.0-23.el7.x86_64.rpm</filename><sum type="sha256">c4a1c272520be2b2954a8b0a500827cc40f8d5de481eca1bcf414e8adddcc8bc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3840" id="CVE-2019-3840" title="Cve-2019-3840" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2294" id="RHSA-2019:2294-1" title="Rhsa-2019:2294-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1501450" id="1501450" title="Race Starting Multiple Libvirtd User Sessions At The Same Time" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1558558" id="1558558" title="Enhance Detection Of Host Cpu Model To Avoid Guesses Based On Fea.Ture List Length" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1584663" id="1584663" title="[Rfe] Add Functionality To Virsh To Mount Nfs Shares Using Commands Like Mountvers, Nosuid, Nodev." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1592737" id="1592737" title="Cannot Use A Xml File With Xml Declaration As A Input Of Cpu-Compare" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1594266" id="1594266" title="Virt-Xml-Validate Validate Fails For Volume Having Backing File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1609454" id="1609454" title="Nwfilter-Binding-Create Succeed On Interface Which Does Not Exist" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1609720" id="1609720" title="Starting Vm Without Source Configured For Pci-Serial Device Caused Libvirtd Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1612943" id="1612943" title="Wrong Resume Event After I/O Error" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1613737" id="1613737" title="Allow The Inputvol To Be Encrypted When Creating A Volume From Another Volume" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1615680" id="1615680" title="Improve --Adapter-Parent-Wwnn,--Adapter-Parent-Wwpn And --Adapter-Parent-Fabric-Wwn Info For Pool-Define-As In Man Page" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1628469" id="1628469" title="Libvirt Uses Incorrect Method To Detect That Kvm Is Working" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1628892" id="1628892" title="Permission Denied When Start Guest With Egl-Headless Display" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1631606" id="1631606" title="Create Luks Vol Failed When Give The User Access Control For Storage-Vol Api" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1631622" id="1631622" title="Guest With An Interface Referred To Nwfilter Killed By Libvirt When Restart Libvirtd With Access Driver Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1632711" id="1632711" title="[Rhel] Vms On Gluster Storage Domain Can'T Be Migrated" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1632833" id="1632833" title="Scsi Host Device Passthrough Limits Io Writes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1633077" id="1633077" title="Domxml-To-Native Should Treat --Xml As The Default Option" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1633389" id="1633389" title="Libvirt Creating Qemu Channels With The Wrong Permissions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1640465" id="1640465" title="[Rhhi] Hosted Engine Migration Fails In Gluster Storage Domain" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1641702" id="1641702" title="Check Tsc Scaling Fea-Ture Of Destination Host On Migration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1647365" id="1647365" title="Vir_Domain_Event_Suspended_Postcopy Is Never Used In Postcopy Migration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1652894" id="1652894" title="When Create Vhba Without Indicating Wwpn/Wwnn, Libvirt Will Generate Duplicated Ones" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1656360" id="1656360" title="When &lt;Shareable/&gt; Removed From Scsi Hostdev Xml, Related Chardev'S Unpriv_Sgio Not Set Back To Zero." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1657468" id="1657468" title="Different Behaviors When Create Storage Pool Via Npiv In Rhel7.5 And Rhel7.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658198" id="1658198" title="Libvirt Sends Vir_Domain_Event_Id_Device_Removed Event Too Soon (Before It Has Finished Tearing Down The Device'S Resources And Objects)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658406" id="1658406" title="Mode=&quot;Host-Model&quot; Vms Include Broken &quot;Arch-Facilities&quot; Flag Name [Libvirt]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658652" id="1658652" title="Missing Librbd1 Dependecy For Libvirt-Daemon-Driver-Storage-Rbd Is Causing Problem With Rhel Host Upgrade" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1660531" id="1660531" title="Garbled Output On Memory Locking Failure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1663051" id="1663051" title="Libvirtd Encountered Sigsegv Due To Null Pointer In Virjsonvalueobjecthaskey()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665228" id="1665228" title="Cve-2019-3840 Libvirt: Null Pointer Dereference After Running Qemuagentcommand In Qemuagentgetinterfaces Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665474" id="1665474" title="Libvirt Segfaults With Vfio-Pci Hostdev Device" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1665553" id="1665553" title="Unable To Migrate Vm'S Using Ceph Storage - Unsafe Migration: Migration Without Shared Storage Is Unsafe" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1669581" id="1669581" title="Libvirtd Crash When Hotplug 'Block' Type 'Lun' Device Disk Without 'Sgio' Setting To Guest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1669586" id="1669586" title="Cannot Passthrough A Iscsi Lun To Vm As A Hostdev Device" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1672957" id="1672957" title="[Rhel 7.7] [Libvirt] Backport 07C9D6601 (&quot;Qemu: Use Line Breaks In Command Line Args Written To Log&quot;)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1683175" id="1683175" title="Don'T Emit A Log Error Message  If Ovs-Vsctl Doesn'T Support A Particular Statistic Type On A Vif" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690122" id="1690122" title="Rfe: Backport Upstream Patches For Polling Buffers/Caches From Balloon Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1690703" id="1690703" title="Fails To Query Domjobinfo When Do Snapshot" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1691358" id="1691358" title="Network Filters Are Not Honouring Explicitly Listed Parameters For Mac" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1692296" id="1692296" title="Attaching A Device With A Taken Address Succeeds" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1703661" id="1703661" title="'Cannot Set Cpu Affinity' Error When Starting Guest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1716387" id="1716387" title="Internal Error: Failed To Parse Bitmap '' When Starting Guest" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1718172" id="1718172" title="Null Pointer Access In Qemuprocessinitcpuaffinity()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2298-1</id><title>Libarchive</title><description>Security Fix(es): 
* libarchive: Double free in RAR decoder resulting in a denial of service (CVE-2018-1000877) 
* libarchive: Use after free in RAR decoder resulting in a denial of service (CVE-2018-1000878) 
* libarchive: Out of bounds read in archive_read_support_format_7zip.c resulting in a denial of service (CVE-2019-1000019) 
* libarchive: Infinite recursion in archive_read_support_format_iso9660.c resulting in denial of service (CVE-2019-1000020) 
* libarchive: Out-of-bounds read in lha_read_data_none (CVE-2017-14503)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libarchive-devel" release="12.el7" src="libarchive-3.1.2-12.el7.src.rpm" version="3.1.2"><filename>libarchive-devel-3.1.2-12.el7.i686.rpm</filename><sum type="sha256">b78ed3d6a7c5c20c733b8991f61ab5ff7283c1d08b870d871b48abdc84d4c9a0</sum></package><package arch="x86_64" name="bsdcpio" release="12.el7" src="libarchive-3.1.2-12.el7.src.rpm" version="3.1.2"><filename>bsdcpio-3.1.2-12.el7.x86_64.rpm</filename><sum type="sha256">bdbb977457b9f0b160303ce2ee7332ea4a40dcf9fe89e3df60192efd2bcb83d8</sum></package><package arch="i686" name="libarchive" release="12.el7" src="libarchive-3.1.2-12.el7.src.rpm" version="3.1.2"><filename>libarchive-3.1.2-12.el7.i686.rpm</filename><sum type="sha256">3d34ee4691ecbb75791cdeb5c3cb4e13db3acc4a8141a229a2e584cbd3ce5310</sum></package><package arch="x86_64" name="libarchive" release="12.el7" src="libarchive-3.1.2-12.el7.src.rpm" version="3.1.2"><filename>libarchive-3.1.2-12.el7.x86_64.rpm</filename><sum type="sha256">549ea2c82b13329869197988028c69745170b30208495a131fff60c46c908ed8</sum></package><package arch="x86_64" name="bsdtar" release="12.el7" src="libarchive-3.1.2-12.el7.src.rpm" version="3.1.2"><filename>bsdtar-3.1.2-12.el7.x86_64.rpm</filename><sum type="sha256">e79dd4fd6c9cf943b41cc05837a416845ebb092ad6e8d6ce732e223114a77e54</sum></package><package arch="x86_64" name="libarchive-devel" release="12.el7" src="libarchive-3.1.2-12.el7.src.rpm" version="3.1.2"><filename>libarchive-devel-3.1.2-12.el7.x86_64.rpm</filename><sum type="sha256">b95b9e14331fafea490d2dd6e7b100a81d93438565784b4b71c690c418e093d4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14503" id="CVE-2017-14503" title="Cve-2017-14503" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000877" id="CVE-2018-1000877" title="Cve-2018-1000877" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000878" id="CVE-2018-1000878" title="Cve-2018-1000878" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1000019" id="CVE-2019-1000019" title="Cve-2019-1000019" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1000020" id="CVE-2019-1000020" title="Cve-2019-1000020" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2298" id="RHSA-2019:2298-1" title="Rhsa-2019:2298-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1494449" id="1494449" title="Cve-2017-14503 Libarchive: Out-Of-Bounds Read In Lha_Read_Data_None" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1663887" id="1663887" title="Cve-2018-1000877 Libarchive: Double Free In Rar Decoder Resulting In A Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1663889" id="1663889" title="Cve-2018-1000878 Libarchive: Use After Free In Rar Decoder Resulting In A Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1672888" id="1672888" title="Cve-2019-1000020 Libarchive: Infinite Recursion In Archive_Read_Support_Format_Iso9660.C Resulting In Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1672892" id="1672892" title="Cve-2019-1000019 Libarchive: Out Of Bounds Read In Archive_Read_Support_Format_7Zip.C Resulting In A Denial Of Service" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2304-1</id><title>Openssl</title><description>Security Fix(es): 
* openssl: 0-byte record padding oracle (CVE-2019-1559) 
* openssl: timing side channel attack in the DSA signature algorithm (CVE-2018-0734)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl" release="19.el7" src="openssl-1.0.2k-19.el7.src.rpm" version="1.0.2k"><filename>openssl-1.0.2k-19.el7.x86_64.rpm</filename><sum type="sha256">f1d57b3a15f280720a5bbdc2669906efa55d763a1ae72d3a8e39c73c11abc371</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="19.el7" src="openssl-1.0.2k-19.el7.src.rpm" version="1.0.2k"><filename>openssl-perl-1.0.2k-19.el7.x86_64.rpm</filename><sum type="sha256">dc23e2311234dc17947a558c6a965a0700023d6428c86740e5009fc413c16145</sum></package><package arch="x86_64" epoch="1" name="openssl-libs" release="19.el7" src="openssl-1.0.2k-19.el7.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-19.el7.x86_64.rpm</filename><sum type="sha256">91c9b330d9ce694388e566a45fcf3068b039e3f815be2f5c717a3a88f8c7f3b5</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="19.el7" src="openssl-1.0.2k-19.el7.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-19.el7.i686.rpm</filename><sum type="sha256">9066e02688f238a76a6823230b33622171170bead7c363c013cc706defd2a4ea</sum></package><package arch="i686" epoch="1" name="openssl-static" release="19.el7" src="openssl-1.0.2k-19.el7.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-19.el7.i686.rpm</filename><sum type="sha256">913443f58cfa01bad45d2394be858087722d483620f178beec696092a25e0734</sum></package><package arch="x86_64" epoch="1" name="openssl-devel" release="19.el7" src="openssl-1.0.2k-19.el7.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-19.el7.x86_64.rpm</filename><sum type="sha256">b04c37db6bc04e3fdcbbe2b3ba4d35471922916b0058f21e916b2e8f5f4d352f</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="19.el7" src="openssl-1.0.2k-19.el7.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-19.el7.x86_64.rpm</filename><sum type="sha256">894d2f90b1b60ff96bef99a9a92df116c03bffaa8e8028e410a2241a1d5412f7</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="19.el7" src="openssl-1.0.2k-19.el7.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-19.el7.i686.rpm</filename><sum type="sha256">6bd3b43823c8e8c2a2b60fe30b7a02ada40cb8ade796ddd541517bf8f924c73d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0734" id="CVE-2018-0734" title="Cve-2018-0734" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1559" id="CVE-2019-1559" title="Cve-2019-1559" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2304" id="RHSA-2019:2304-1" title="Rhsa-2019:2304-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1644364" id="1644364" title="Cve-2018-0734 Openssl: Timing Side Channel Attack In The Dsa Signature Algorithm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1649568" id="1649568" title="Openssl: Microarchitectural And Timing Side Channel Padding Oracle Attack Against Rsa" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1683804" id="1683804" title="Cve-2019-1559 Openssl: 0-Byte Record Padding Oracle" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2308-1</id><title>Libguestfs-Winsupport</title><description>Security Fix(es): 
* ntfs-3g: heap-based buffer overflow leads to local root privilege escalation (CVE-2019-9755)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libguestfs-winsupport" release="3.el7" src="libguestfs-winsupport-7.2-3.el7.src.rpm" version="7.2"><filename>libguestfs-winsupport-7.2-3.el7.x86_64.rpm</filename><sum type="sha256">92618e79d4015060f695f4d9f0d706149829986bb4b8ea80867ab09ce10210b4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9755" id="CVE-2019-9755" title="Cve-2019-9755" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2308" id="RHSA-2019:2308-1" title="Rhsa-2019:2308-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1691624" id="1691624" title="Cve-2019-9755 Ntfs-3G: Heap-Based Buffer Overflow Leads To Local Root Privilege Escalation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2327-1</id><title>Mariadb</title><description>Security Fix(es): 
* mysql: MyISAM unspecified vulnerability (CPU Jul 2018) (CVE-2018-3058) 
* mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul 2018) (CVE-2018-3063) 
* mysql: Client programs unspecified vulnerability (CPU Jul 2018) (CVE-2018-3081) 
* mysql: Server: Storage Engines unspecified vulnerability (CPU Oct 2018) (CVE-2018-3282) 
* mysql: Server: Connection Handling unspecified vulnerability (CPU Jan 2019) (CVE-2019-2503) 
* mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2019) (CVE-2019-2529) 
* mysql: Server: Replication unspecified vulnerability (CPU Apr 2019) (CVE-2019-2614) 
* mysql: Server: Security: Privileges unspecified vulnerability (CPU Apr 2019) (CVE-2019-2627) 
* mysql: Server: Options unspecified vulnerability (CPU Jul 2018) (CVE-2018-3066)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="mariadb-bench" release="1.el7" src="mariadb-5.5.64-1.el7.src.rpm" version="5.5.64"><filename>mariadb-bench-5.5.64-1.el7.x86_64.rpm</filename><sum type="sha256">10b9581a853f15b71be84ee31d55aebd20a01a25eee4e581b0a7a22c5683e882</sum></package><package arch="x86_64" epoch="1" name="mariadb" release="1.el7" src="mariadb-5.5.64-1.el7.src.rpm" version="5.5.64"><filename>mariadb-5.5.64-1.el7.x86_64.rpm</filename><sum type="sha256">551ea44a2482fe8b00ce8ba99823d2ea75637d9953883b528b5172ca6934f556</sum></package><package arch="i686" epoch="1" name="mariadb-devel" release="1.el7" src="mariadb-5.5.64-1.el7.src.rpm" version="5.5.64"><filename>mariadb-devel-5.5.64-1.el7.i686.rpm</filename><sum type="sha256">55239eb77d23fd3db781dd56bd80682d77d3865dfb45084a5a7b94580b005a56</sum></package><package arch="x86_64" epoch="1" name="mariadb-libs" release="1.el7" src="mariadb-5.5.64-1.el7.src.rpm" version="5.5.64"><filename>mariadb-libs-5.5.64-1.el7.x86_64.rpm</filename><sum type="sha256">9e6abffac659fbac9b2d3efa14930b9cfbab53cfea0c4d1c1718e697d097156f</sum></package><package arch="x86_64" epoch="1" name="mariadb-server" release="1.el7" src="mariadb-5.5.64-1.el7.src.rpm" version="5.5.64"><filename>mariadb-server-5.5.64-1.el7.x86_64.rpm</filename><sum type="sha256">b6a969bdbb91564dda440fb66f7103303a6f353a6a4ebbabde9cd5253544f79f</sum></package><package arch="x86_64" epoch="1" name="mariadb-test" release="1.el7" src="mariadb-5.5.64-1.el7.src.rpm" version="5.5.64"><filename>mariadb-test-5.5.64-1.el7.x86_64.rpm</filename><sum type="sha256">383ad2e6ad307966a9a0c1496f3fc4e16ebc7e45e9ce8853d4f32a19470d2ce8</sum></package><package arch="x86_64" epoch="1" name="mariadb-embedded" release="1.el7" src="mariadb-5.5.64-1.el7.src.rpm" version="5.5.64"><filename>mariadb-embedded-5.5.64-1.el7.x86_64.rpm</filename><sum type="sha256">3a4da368aa562970889a0b00a60fdbbd7680ae9165606ce1573ee872f6effdbc</sum></package><package arch="x86_64" epoch="1" name="mariadb-embedded-devel" release="1.el7" src="mariadb-5.5.64-1.el7.src.rpm" version="5.5.64"><filename>mariadb-embedded-devel-5.5.64-1.el7.x86_64.rpm</filename><sum type="sha256">9f4f4ad4559d50df6ea57d1df134d6e486d8cc6fd191cfdec397d211371e266a</sum></package><package arch="i686" epoch="1" name="mariadb-libs" release="1.el7" src="mariadb-5.5.64-1.el7.src.rpm" version="5.5.64"><filename>mariadb-libs-5.5.64-1.el7.i686.rpm</filename><sum type="sha256">f7860872017cef08fa2b5de9ebfe12a0b6da621704b57d8e4dab304784accec4</sum></package><package arch="i686" epoch="1" name="mariadb-embedded-devel" release="1.el7" src="mariadb-5.5.64-1.el7.src.rpm" version="5.5.64"><filename>mariadb-embedded-devel-5.5.64-1.el7.i686.rpm</filename><sum type="sha256">614153030ef846dceff49b9c2b1134673d1f1a57f71d35ef60d96d30ede1c72c</sum></package><package arch="i686" epoch="1" name="mariadb-embedded" release="1.el7" src="mariadb-5.5.64-1.el7.src.rpm" version="5.5.64"><filename>mariadb-embedded-5.5.64-1.el7.i686.rpm</filename><sum type="sha256">57d320919b4857f89561f51991c9f4e6031f052bbab42037afcb89d71147b869</sum></package><package arch="x86_64" epoch="1" name="mariadb-devel" release="1.el7" src="mariadb-5.5.64-1.el7.src.rpm" version="5.5.64"><filename>mariadb-devel-5.5.64-1.el7.x86_64.rpm</filename><sum type="sha256">b186bbdcee0604499acb6864cec672b0860aa6478b7a1fc0ec578668f65806f8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3058" id="CVE-2018-3058" title="Cve-2018-3058" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3063" id="CVE-2018-3063" title="Cve-2018-3063" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3066" id="CVE-2018-3066" title="Cve-2018-3066" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3081" id="CVE-2018-3081" title="Cve-2018-3081" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3282" id="CVE-2018-3282" title="Cve-2018-3282" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2503" id="CVE-2019-2503" title="Cve-2019-2503" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2529" id="CVE-2019-2529" title="Cve-2019-2529" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2614" id="CVE-2019-2614" title="Cve-2019-2614" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2627" id="CVE-2019-2627" title="Cve-2019-2627" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2327" id="RHSA-2019:2327-1" title="Rhsa-2019:2327-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1490398" id="1490398" title="Mysql_Upgrade Fails When The Same Stored Procedure Name To Uppercase And Lowercase Database Names Exists." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598095" id="1598095" title="Problem With Fuser Usage During Init" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1602356" id="1602356" title="Cve-2018-3058 Mysql: Myisam Unspecified Vulnerability (Cpu Jul 2018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1602363" id="1602363" title="Cve-2018-3063 Mysql: Server: Security: Privileges Unspecified Vulnerability (Cpu Jul 2018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1602366" id="1602366" title="Cve-2018-3066 Mysql: Server: Options Unspecified Vulnerability (Cpu Jul 2018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1602424" id="1602424" title="Cve-2018-3081 Mysql: Client Programs Unspecified Vulnerability (Cpu Jul 2018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625196" id="1625196" title="Fcontext Missing For Mysqld_Safe_Helper" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1640322" id="1640322" title="Cve-2018-3282 Mysql: Server: Storage Engines Unspecified Vulnerability (Cpu Oct 2018)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1666749" id="1666749" title="Cve-2019-2503 Mysql: Server: Connection Handling Unspecified Vulnerability (Cpu Jan 2019)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1666755" id="1666755" title="Cve-2019-2529 Mysql: Server: Optimizer Unspecified Vulnerability (Cpu Jan 2019)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1678662" id="1678662" title="Mariadb Table Checksum Calculation Sometimes Ignore Columns" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1702969" id="1702969" title="Cve-2019-2614 Mysql: Server: Replication Unspecified Vulnerability (Cpu Apr 2019)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1702976" id="1702976" title="Cve-2019-2627 Mysql: Server: Security: Privileges Unspecified Vulnerability (Cpu Apr 2019)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2332-1</id><title>Advancecomp</title><description>Security Fix(es): 
* advancecomp: null pointer dereference in function be_uint32_read() in endianrw.h (CVE-2019-8379) 
* advancecomp: denial of service in function adv_png_unfilter_8 in lib/png.c (CVE-2019-8383)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="advancecomp" release="21.el7" src="advancecomp-1.15-21.el7.src.rpm" version="1.15"><filename>advancecomp-1.15-21.el7.x86_64.rpm</filename><sum type="sha256">7d605f357f5f7f41cc02cd7e37d272f65f653c989cc99542b8b77bb5ae54240f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8379" id="CVE-2019-8379" title="Cve-2019-8379" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8383" id="CVE-2019-8383" title="Cve-2019-8383" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2332" id="RHSA-2019:2332-1" title="Rhsa-2019:2332-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1708561" id="1708561" title="Cve-2019-8379 Advancecomp: Null Pointer Dereference In Function Be_Uint32_Read() In Endianrw.H" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1708563" id="1708563" title="Cve-2019-8383 Advancecomp: Denial Of Service In Function Adv_Png_Unfilter_8 In Lib/Png.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2336-1</id><title>Unixodbc</title><description>Security Fix(es): 
* unixODBC: Buffer overflow in unicode_to_ansi_copy() can lead to crash or other unspecified impact (CVE-2018-7409) 
* unixODBC: Insecure buffer copy in SQLWriteFileDSN function in odbcinst/SQLWriteFileDSN.c (CVE-2018-7485)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="unixODBC-devel" release="14.el7" src="unixODBC-2.3.1-14.el7.src.rpm" version="2.3.1"><filename>unixODBC-devel-2.3.1-14.el7.x86_64.rpm</filename><sum type="sha256">66d93285c1c70a8ebf08eccc4582f8419ec48790563f8f945ee2cd2ed0344b5e</sum></package><package arch="i686" name="unixODBC" release="14.el7" src="unixODBC-2.3.1-14.el7.src.rpm" version="2.3.1"><filename>unixODBC-2.3.1-14.el7.i686.rpm</filename><sum type="sha256">66643d81c538a4c70a773e47f70806460c1a72a5d3559c8423ac26b4c852ba93</sum></package><package arch="i686" name="unixODBC-devel" release="14.el7" src="unixODBC-2.3.1-14.el7.src.rpm" version="2.3.1"><filename>unixODBC-devel-2.3.1-14.el7.i686.rpm</filename><sum type="sha256">95ce183b513ebdd03df315d825ea44d4a9facac7fa4a433653d1ced86fecafcd</sum></package><package arch="x86_64" name="unixODBC" release="14.el7" src="unixODBC-2.3.1-14.el7.src.rpm" version="2.3.1"><filename>unixODBC-2.3.1-14.el7.x86_64.rpm</filename><sum type="sha256">bdb238e90309237930883144902c1eddc3ab3dbf85dc430adb3eca10a920be42</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7409" id="CVE-2018-7409" title="Cve-2018-7409" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7485" id="CVE-2018-7485" title="Cve-2018-7485" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2336" id="RHSA-2019:2336-1" title="Rhsa-2019:2336-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1548305" id="1548305" title="Cve-2018-7409 Unixodbc: Buffer Overflow In Unicode_To_Ansi_Copy() Can Lead To Crash Or Other Unspecified Impact" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549636" id="1549636" title="Cve-2018-7485 Unixodbc: Insecure Buffer Copy In Sqlwritefiledsn Function In Odbcinst/Sqlwritefiledsn.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2343-1</id><title>Httpd</title><description>Security Fix(es): 
* httpd: mod_auth_digest: access control bypass due to race condition (CVE-2019-0217) 
* httpd: URL normalization inconsistency (CVE-2019-0220)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="httpd" release="90.sl7" src="httpd-2.4.6-90.sl7.src.rpm" version="2.4.6"><filename>httpd-2.4.6-90.sl7.x86_64.rpm</filename><sum type="sha256">9873a6acbf5f7c0e0745c99efaab202277fbf724f0cfb55a9b6f8f784bc5663c</sum></package><package arch="x86_64" name="mod_ldap" release="90.sl7" src="httpd-2.4.6-90.sl7.src.rpm" version="2.4.6"><filename>mod_ldap-2.4.6-90.sl7.x86_64.rpm</filename><sum type="sha256">3ea48c89f6cba16a2e955f75ecd9b425753fbd6fdca05ddd8bce6c61056a50ec</sum></package><package arch="x86_64" name="mod_session" release="90.sl7" src="httpd-2.4.6-90.sl7.src.rpm" version="2.4.6"><filename>mod_session-2.4.6-90.sl7.x86_64.rpm</filename><sum type="sha256">bf8f33ea4f916869ad49c92be8aa9d088a6170013357f50ca6f77a24c7761565</sum></package><package arch="x86_64" epoch="1" name="mod_proxy_html" release="90.sl7" src="httpd-2.4.6-90.sl7.src.rpm" version="2.4.6"><filename>mod_proxy_html-2.4.6-90.sl7.x86_64.rpm</filename><sum type="sha256">beee4b311bbae9cf632e1cc707a403a9d7dd6bcfae2bd7ce5e2a623084593040</sum></package><package arch="noarch" name="httpd-manual" release="90.sl7" src="httpd-2.4.6-90.sl7.src.rpm" version="2.4.6"><filename>httpd-manual-2.4.6-90.sl7.noarch.rpm</filename><sum type="sha256">dd42b269e561e231fc5f4f83b1991a6d4b3ab22a513e2d7d4bfdc6d9c38a6db8</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="90.sl7" src="httpd-2.4.6-90.sl7.src.rpm" version="2.4.6"><filename>mod_ssl-2.4.6-90.sl7.x86_64.rpm</filename><sum type="sha256">b0ad732a61aa5373e1195103702d0ddc5cec09c3cbe637ae04c1af2e4b949c36</sum></package><package arch="x86_64" name="httpd-devel" release="90.sl7" src="httpd-2.4.6-90.sl7.src.rpm" version="2.4.6"><filename>httpd-devel-2.4.6-90.sl7.x86_64.rpm</filename><sum type="sha256">4e754ce2bfbe0419fa51bb7508e3540cceda3ca2f18295e490efe93caa24252d</sum></package><package arch="x86_64" name="httpd-tools" release="90.sl7" src="httpd-2.4.6-90.sl7.src.rpm" version="2.4.6"><filename>httpd-tools-2.4.6-90.sl7.x86_64.rpm</filename><sum type="sha256">ae80f01449c43cdde6eefd15a8270cce88f1cbeeeb0515e53cf81face144645c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0217" id="CVE-2019-0217" title="Cve-2019-0217" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0220" id="CVE-2019-0220" title="Cve-2019-0220" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2343" id="RHSA-2019:2343-1" title="Rhsa-2019:2343-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1695020" id="1695020" title="Cve-2019-0217 Httpd: Mod_Auth_Digest: Access Control Bypass Due To Race Condition" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1695036" id="1695036" title="Cve-2019-0220 Httpd: Url Normalization Inconsistency" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2462-1</id><title>Ghostscript</title><description>Security Fix(es): 
* ghostscript: -dSAFER escape via .buildfont1 (701394) (CVE-2019-10216)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ghostscript" release="2.el7_7.1" src="ghostscript-9.25-2.el7_7.1.src.rpm" version="9.25"><filename>ghostscript-9.25-2.el7_7.1.x86_64.rpm</filename><sum type="sha256">3467611d94328fd77643f6698059f4f2059760f5a3d0f873816332e8bd3ba3dc</sum></package><package arch="i686" name="libgs" release="2.el7_7.1" src="ghostscript-9.25-2.el7_7.1.src.rpm" version="9.25"><filename>libgs-9.25-2.el7_7.1.i686.rpm</filename><sum type="sha256">83037955afd598a9adaf417cf933775a1ad5485b0391f971241aac2e5222b877</sum></package><package arch="noarch" name="ghostscript-doc" release="2.el7_7.1" src="ghostscript-9.25-2.el7_7.1.src.rpm" version="9.25"><filename>ghostscript-doc-9.25-2.el7_7.1.noarch.rpm</filename><sum type="sha256">023b35b0a6f219e869f72285609a58ac50bee627b947373fa233f16abfd4a5ad</sum></package><package arch="i686" name="libgs-devel" release="2.el7_7.1" src="ghostscript-9.25-2.el7_7.1.src.rpm" version="9.25"><filename>libgs-devel-9.25-2.el7_7.1.i686.rpm</filename><sum type="sha256">e688808b5b759f7a2e43208bcf1049dca008f32bed65667a827f5ed05979cb77</sum></package><package arch="i686" name="ghostscript" release="2.el7_7.1" src="ghostscript-9.25-2.el7_7.1.src.rpm" version="9.25"><filename>ghostscript-9.25-2.el7_7.1.i686.rpm</filename><sum type="sha256">fd53f6804615a79e3ff5a882148d749a7806a877989ef4cceb3b4393b619aa6e</sum></package><package arch="x86_64" name="ghostscript-cups" release="2.el7_7.1" src="ghostscript-9.25-2.el7_7.1.src.rpm" version="9.25"><filename>ghostscript-cups-9.25-2.el7_7.1.x86_64.rpm</filename><sum type="sha256">640485e1179500f23895c5803ce3259806735cfd57d5607cdfc6f8df26f914d8</sum></package><package arch="x86_64" name="ghostscript-gtk" release="2.el7_7.1" src="ghostscript-9.25-2.el7_7.1.src.rpm" version="9.25"><filename>ghostscript-gtk-9.25-2.el7_7.1.x86_64.rpm</filename><sum type="sha256">6037e0c4e0606461e8a2d7f1bd3df580150fc4e6a68f5721c01ed97b31e64b37</sum></package><package arch="x86_64" name="libgs-devel" release="2.el7_7.1" src="ghostscript-9.25-2.el7_7.1.src.rpm" version="9.25"><filename>libgs-devel-9.25-2.el7_7.1.x86_64.rpm</filename><sum type="sha256">f50f2e8574431bd03375b27e4895c5d638933d869410ff675f39dc4644c5c645</sum></package><package arch="x86_64" name="libgs" release="2.el7_7.1" src="ghostscript-9.25-2.el7_7.1.src.rpm" version="9.25"><filename>libgs-9.25-2.el7_7.1.x86_64.rpm</filename><sum type="sha256">04a234ca5fcf6f6deb60fb900df709500a349c8e34dfa44445b8646f1dc3e351</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10216" id="CVE-2019-10216" title="Ghostscript: -Dsafer Escape Via .Buildfont1 " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2462" id="RHSA-2019:2462-1" title="Rhsa-2019:2462-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1737080" id="1737080" title="Ghostscript: -Dsafer Escape Via .Buildfont1 " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2571-1</id><title>Pango</title><description>Security Fix(es): 
* pango: pango_log2vis_get_embedding_levels() heap-based buffer overflow (CVE-2019-1010238)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-08-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pango-devel" release="4.el7_7" src="pango-1.42.4-4.el7_7.src.rpm" version="1.42.4"><filename>pango-devel-1.42.4-4.el7_7.x86_64.rpm</filename><sum type="sha256">321e3a8017466347ccf258b722e928e712633c797f46a11c97f24796d1bca066</sum></package><package arch="i686" name="pango" release="4.el7_7" src="pango-1.42.4-4.el7_7.src.rpm" version="1.42.4"><filename>pango-1.42.4-4.el7_7.i686.rpm</filename><sum type="sha256">5594d56a8c595d630365467840fdd9e9abef47d3826d8587069bda20d568c49f</sum></package><package arch="i686" name="pango-devel" release="4.el7_7" src="pango-1.42.4-4.el7_7.src.rpm" version="1.42.4"><filename>pango-devel-1.42.4-4.el7_7.i686.rpm</filename><sum type="sha256">1769126a1a9c3e8f8c523d1623fcca33d52483d5c9c5cfe5e73d1d978b3fe84f</sum></package><package arch="x86_64" name="pango" release="4.el7_7" src="pango-1.42.4-4.el7_7.src.rpm" version="1.42.4"><filename>pango-1.42.4-4.el7_7.x86_64.rpm</filename><sum type="sha256">73d58aeee40ae0884e2a2da6b7c36fcdcd5435093eb6826468718e6d43a4a680</sum></package><package arch="x86_64" name="pango-tests" release="4.el7_7" src="pango-1.42.4-4.el7_7.src.rpm" version="1.42.4"><filename>pango-tests-1.42.4-4.el7_7.x86_64.rpm</filename><sum type="sha256">35ae734d6175a4e94e13a13138209cea509bbd9439f640a404c58cd81b3f44c0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010238" id="CVE-2019-1010238" title="Pango: Pango_Log2Vis_Get_Embedding_Levels() " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2571" id="RHSA-2019:2571-1" title="Rhsa-2019:2571-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1737785" id="1737785" title="Pango: Pango_Log2Vis_Get_Embedding_Levels() " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2586-1</id><title>Ghostscript</title><description>Security Fix(es): 
* ghostscript: Safer mode bypass by .forceput exposure in .pdf_hook_DSC_Creator (701445) (CVE-2019-14811) 
* ghostscript: Safer mode bypass by .forceput exposure in setuserparams (701444) (CVE-2019-14812) 
* ghostscript: Safer mode bypass by .forceput exposure in setsystemparams (701443) (CVE-2019-14813) 
* ghostscript: Safer mode bypass by .forceput exposure in .pdfexectoken and other procedures (701450) (CVE-2019-14817)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-09-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ghostscript-doc" release="2.el7_7.2" src="ghostscript-9.25-2.el7_7.2.src.rpm" version="9.25"><filename>ghostscript-doc-9.25-2.el7_7.2.noarch.rpm</filename><sum type="sha256">a937f757e1f1c554b6a294547b2829c163373bdf010c9606ae7485b258c7a024</sum></package><package arch="x86_64" name="ghostscript-cups" release="2.el7_7.2" src="ghostscript-9.25-2.el7_7.2.src.rpm" version="9.25"><filename>ghostscript-cups-9.25-2.el7_7.2.x86_64.rpm</filename><sum type="sha256">7dcdaeff50da16ce5083e7b1b2f9f099e50b8a90aad77755c371add328b3fcc0</sum></package><package arch="x86_64" name="ghostscript-gtk" release="2.el7_7.2" src="ghostscript-9.25-2.el7_7.2.src.rpm" version="9.25"><filename>ghostscript-gtk-9.25-2.el7_7.2.x86_64.rpm</filename><sum type="sha256">12163e6188b41db4c53ffaf0923aab230cb9f8e4449c60377aa5d07264660d86</sum></package><package arch="i686" name="libgs" release="2.el7_7.2" src="ghostscript-9.25-2.el7_7.2.src.rpm" version="9.25"><filename>libgs-9.25-2.el7_7.2.i686.rpm</filename><sum type="sha256">bacf91f9a401402c2b04bd4f48b79b7e2deeefb7ccbe563f386d1fda64416c06</sum></package><package arch="x86_64" name="libgs-devel" release="2.el7_7.2" src="ghostscript-9.25-2.el7_7.2.src.rpm" version="9.25"><filename>libgs-devel-9.25-2.el7_7.2.x86_64.rpm</filename><sum type="sha256">0fce5a3c13b8c22c57894b7536ec623fbe4b882b49e96d7397020c11bf20d999</sum></package><package arch="x86_64" name="ghostscript" release="2.el7_7.2" src="ghostscript-9.25-2.el7_7.2.src.rpm" version="9.25"><filename>ghostscript-9.25-2.el7_7.2.x86_64.rpm</filename><sum type="sha256">f18c6a42e6272acbbd95b26c0beb472ce78270e48205513ddd8b6b80773c40fb</sum></package><package arch="x86_64" name="libgs" release="2.el7_7.2" src="ghostscript-9.25-2.el7_7.2.src.rpm" version="9.25"><filename>libgs-9.25-2.el7_7.2.x86_64.rpm</filename><sum type="sha256">54ce651a0d18f05e50ef5abbf07ec476dac9680e93f7d81907a7e00c33259cb5</sum></package><package arch="i686" name="ghostscript" release="2.el7_7.2" src="ghostscript-9.25-2.el7_7.2.src.rpm" version="9.25"><filename>ghostscript-9.25-2.el7_7.2.i686.rpm</filename><sum type="sha256">182e2b5fe0fad66137327d8ea287594248ad0af7bfbb9eedf7db5596cb8a3cdb</sum></package><package arch="i686" name="libgs-devel" release="2.el7_7.2" src="ghostscript-9.25-2.el7_7.2.src.rpm" version="9.25"><filename>libgs-devel-9.25-2.el7_7.2.i686.rpm</filename><sum type="sha256">a5b07e023836e7d20a529315f9d16d87eb44bd089faf464539aaec06ac4bd529</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811" id="CVE-2019-14811" title="Ghostscript: Safer Mode Bypass By .Forceput " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812" id="CVE-2019-14812" title="Ghostscript: Safer Mode Bypass By .Forceput " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813" id="CVE-2019-14813" title="Ghostscript: Safer Mode Bypass By .Forceput " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817" id="CVE-2019-14817" title="Ghostscript: Safer Mode Bypass By .Forceput " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2586" id="RHSA-2019:2586-1" title="Rhsa-2019:2586-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1743737" id="1743737" title="Ghostscript: Safer Mode Bypass By .Forceput " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1743754" id="1743754" title="Ghostscript: Safer Mode Bypass By .Forceput " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1743757" id="1743757" title="Ghostscript: Safer Mode Bypass By .Forceput " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1744042" id="1744042" title="Ghostscript: Safer Mode Bypass By .Forceput " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2600-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: hw: Spectre SWAPGS gadget vulnerability (CVE-2019-1125) 
* kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results (CVE-2019-9500) 
Bug Fix(es): 
* [mlx4] VXLAN over VLAN TCP segmentation 
* Race condition in /dev/sg due to missing synchronization causes corruption in RHV 
* panic handing smb2_reconnect due to a use after free 
* NFSv4.1 client stuck in infinite loop when received NFS4ERR_SEQ_MISORDERED error 
* Backport TCP follow-up for small buffers</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-09-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-devel" release="1062.1.1.el7" src="kernel-3.10.0-1062.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1062.1.1.el7.x86_64.rpm</filename><sum type="sha256">d50b3920395e2e3fdf9ac37377810447b4f786de981163bc41e624f21942de46</sum></package><package arch="x86_64" name="python-perf" release="1062.1.1.el7" src="kernel-3.10.0-1062.1.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1062.1.1.el7.x86_64.rpm</filename><sum type="sha256">da6be4ab037413ee83fb64b8bff188c06877fe4c49e219505ce7ddf7dfc3aa7a</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1062.1.1.el7" src="kernel-3.10.0-1062.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1062.1.1.el7.x86_64.rpm</filename><sum type="sha256">43004300794b17bbadf674aa2e9f0633ec5d4746fcbb39bc96a81bf2215f5075</sum></package><package arch="noarch" name="kernel-doc" release="1062.1.1.el7" src="kernel-3.10.0-1062.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1062.1.1.el7.noarch.rpm</filename><sum type="sha256">2e65aeff0093bdf9e38d58cb2443c6f22b173dc2aa3170466635e6a23aa163a7</sum></package><package arch="x86_64" name="kernel-tools" release="1062.1.1.el7" src="kernel-3.10.0-1062.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1062.1.1.el7.x86_64.rpm</filename><sum type="sha256">9590a172d750a68a482c3209f5e766fd287bd022608545a2b6de215706a3f9dd</sum></package><package arch="x86_64" name="kernel-debug" release="1062.1.1.el7" src="kernel-3.10.0-1062.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1062.1.1.el7.x86_64.rpm</filename><sum type="sha256">457a73ab3ad2f477781544fa2427063fbd8d2264f8c49b416b47fb65e52c6c4d</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1062.1.1.el7" src="kernel-3.10.0-1062.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1062.1.1.el7.x86_64.rpm</filename><sum type="sha256">72f436d4492b24a75602c98f0d7cd7bb2cb050d70b033c5674841049becc2f48</sum></package><package arch="x86_64" name="bpftool" release="1062.1.1.el7" src="kernel-3.10.0-1062.1.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1062.1.1.el7.x86_64.rpm</filename><sum type="sha256">ab0c1b357de43ecd9dd3d095f10406e529e3669e50835391bfe8bf0078f5312d</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1062.1.1.el7" src="kernel-3.10.0-1062.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1062.1.1.el7.noarch.rpm</filename><sum type="sha256">78692e0e8767c86d94a1320b70e2d3bc7bccea3e993591842f92bc259fba736d</sum></package><package arch="x86_64" name="kernel-headers" release="1062.1.1.el7" src="kernel-3.10.0-1062.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1062.1.1.el7.x86_64.rpm</filename><sum type="sha256">908ac854e0a67b92fa902b293bc345a1ca9e75240aa02d79842380c87725c98a</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1062.1.1.el7" src="kernel-3.10.0-1062.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1062.1.1.el7.x86_64.rpm</filename><sum type="sha256">bd4f347030ea67c140eaa780df37232deaae8f381e60bc3c394dd6a8cd2cebfd</sum></package><package arch="x86_64" name="kernel" release="1062.1.1.el7" src="kernel-3.10.0-1062.1.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1062.1.1.el7.x86_64.rpm</filename><sum type="sha256">9cd5ee440e0f4b78d7ef4f637a6f2a3cdf01bf10d530f9a955ef2c2338b1e144</sum></package><package arch="x86_64" name="perf" release="1062.1.1.el7" src="kernel-3.10.0-1062.1.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1062.1.1.el7.x86_64.rpm</filename><sum type="sha256">9ab476f5889435c7dd6b444f405818b7b2baaa4c7e34f8d1f9284a3ce0bdba68</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1125" id="CVE-2019-1125" title="Cve-2019-1125" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9500" id="CVE-2019-9500" title="Kernel: Brcmfmac Heap Buffer Overflow In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2600" id="RHSA-2019:2600-1" title="Rhsa-2019:2600-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1701224" id="1701224" title="Kernel: Brcmfmac Heap Buffer Overflow In " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1724389" id="1724389" title="Kernel: Hw: Spectre Swapgs Gadget Vulnerability" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2606-1</id><title>Kdelibs And Kde-Settings</title><description>* kdelibs: malicious desktop files and configuration files lead to code execution with minimal user interaction (CVE-2019-14744) 
Bug Fix(es): 
* kde.csh profile file contains bourne-shell code</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-09-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="qt-settings" release="23.10.el7_7" src="kde-settings-19-23.10.el7_7.src.rpm" version="19"><filename>qt-settings-19-23.10.el7_7.noarch.rpm</filename><sum type="sha256">37e3132c07c9f37e72384b7bcd9411ca8c61270252586becd40eae630f2f6153</sum></package><package arch="i686" epoch="6" name="kdelibs" release="11.el7_7" src="kdelibs-4.14.8-11.el7_7.src.rpm" version="4.14.8"><filename>kdelibs-4.14.8-11.el7_7.i686.rpm</filename><sum type="sha256">3568dba998fcef4c10d864f37fbd16dc5b5492b61d19ac86461b4e55af0f0c8b</sum></package><package arch="noarch" epoch="6" name="kdelibs-apidocs" release="11.el7_7" src="kdelibs-4.14.8-11.el7_7.src.rpm" version="4.14.8"><filename>kdelibs-apidocs-4.14.8-11.el7_7.noarch.rpm</filename><sum type="sha256">53f7b5c39a35391d109a53b5fe69f63b87b62dd4a3f11a217a656c985abc191a</sum></package><package arch="noarch" name="kde-settings" release="23.10.el7_7" src="kde-settings-19-23.10.el7_7.src.rpm" version="19"><filename>kde-settings-19-23.10.el7_7.noarch.rpm</filename><sum type="sha256">2ee4b0a0c9e9dc41f1286d27f12389788d0f84032ab170ff54fd28a8af0a706e</sum></package><package arch="noarch" name="kde-settings-pulseaudio" release="23.10.el7_7" src="kde-settings-19-23.10.el7_7.src.rpm" version="19"><filename>kde-settings-pulseaudio-19-23.10.el7_7.noarch.rpm</filename><sum type="sha256">d1385efd9629e1cb33a702d8ded9eed41a83cd8f3de7aff257b9f1190084adec</sum></package><package arch="noarch" name="kde-settings-minimal" release="23.10.el7_7" src="kde-settings-19-23.10.el7_7.src.rpm" version="19"><filename>kde-settings-minimal-19-23.10.el7_7.noarch.rpm</filename><sum type="sha256">f68dc11e20d8523dcbe32318df7f9f98537f8eaab946e0df35f1b25d8aa94a6f</sum></package><package arch="x86_64" epoch="6" name="kdelibs-ktexteditor" release="11.el7_7" src="kdelibs-4.14.8-11.el7_7.src.rpm" version="4.14.8"><filename>kdelibs-ktexteditor-4.14.8-11.el7_7.x86_64.rpm</filename><sum type="sha256">9a072728a3dcb36c8343a2575c42d44e37a2bd955a5db7c043587dd29387e61a</sum></package><package arch="x86_64" epoch="6" name="kdelibs-devel" release="11.el7_7" src="kdelibs-4.14.8-11.el7_7.src.rpm" version="4.14.8"><filename>kdelibs-devel-4.14.8-11.el7_7.x86_64.rpm</filename><sum type="sha256">840e8aed19076d738d7c6e534a345a6be78ae7d938fac731d4faad2b4594e4c0</sum></package><package arch="i686" epoch="6" name="kdelibs-ktexteditor" release="11.el7_7" src="kdelibs-4.14.8-11.el7_7.src.rpm" version="4.14.8"><filename>kdelibs-ktexteditor-4.14.8-11.el7_7.i686.rpm</filename><sum type="sha256">1d061db54509f4fce7e950d802f72f843c2b30a8b1a859d77d67e82feaf82c46</sum></package><package arch="noarch" name="kde-settings-plasma" release="23.10.el7_7" src="kde-settings-19-23.10.el7_7.src.rpm" version="19"><filename>kde-settings-plasma-19-23.10.el7_7.noarch.rpm</filename><sum type="sha256">d146b28621c0573dd0ca4beb941e05d819432fbb950b0f7e31cd52fa6c732138</sum></package><package arch="noarch" name="kde-settings-ksplash" release="23.10.el7_7" src="kde-settings-19-23.10.el7_7.src.rpm" version="19"><filename>kde-settings-ksplash-19-23.10.el7_7.noarch.rpm</filename><sum type="sha256">4bcea9b803c6e4156fd243c62b9ec7dd93312697d2d2203b06c458609a033682</sum></package><package arch="i686" epoch="6" name="kdelibs-devel" release="11.el7_7" src="kdelibs-4.14.8-11.el7_7.src.rpm" version="4.14.8"><filename>kdelibs-devel-4.14.8-11.el7_7.i686.rpm</filename><sum type="sha256">b71cbc362e5d335df428d3a385f5a70e4bf114ec7bffd34bcb01e13e3ab2258f</sum></package><package arch="x86_64" epoch="6" name="kdelibs-common" release="11.el7_7" src="kdelibs-4.14.8-11.el7_7.src.rpm" version="4.14.8"><filename>kdelibs-common-4.14.8-11.el7_7.x86_64.rpm</filename><sum type="sha256">e71f0e862c92bd8d85903615a5a4942ad723428709cd37aace459c8fd594ffc3</sum></package><package arch="x86_64" epoch="6" name="kdelibs" release="11.el7_7" src="kdelibs-4.14.8-11.el7_7.src.rpm" version="4.14.8"><filename>kdelibs-4.14.8-11.el7_7.x86_64.rpm</filename><sum type="sha256">7dd31b48801c05e99d08900182811455fa193b98b39fb6fc3cfaf0ea6f6b336b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14744" id="CVE-2019-14744" title="Kdelibs: Malicious Desktop Files And " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2606" id="RHSA-2019:2606-1" title="Rhsa-2019:2606-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1740138" id="1740138" title="Kdelibs: Malicious Desktop Files And " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2607-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* QEMU: qxl: null pointer dereference while releasing spice resources (CVE-2019-12155)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-09-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="167.el7_7.1" src="qemu-kvm-1.5.3-167.el7_7.1.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-167.el7_7.1.x86_64.rpm</filename><sum type="sha256">6e675ebb9396dc99ee5ee21fff3d090f45cc53e37975a586eff161e0303efdcf</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="167.el7_7.1" src="qemu-kvm-1.5.3-167.el7_7.1.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-167.el7_7.1.x86_64.rpm</filename><sum type="sha256">a558b0a28593a639f76d75fc7e6c265d2ab7b4a025e4143bdc4a8de275249088</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="167.el7_7.1" src="qemu-kvm-1.5.3-167.el7_7.1.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-167.el7_7.1.x86_64.rpm</filename><sum type="sha256">7ea40346c5ed7e0355053aee2f66c35b2e5ca10bf729a2fcb3081e0d99cea05e</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="167.el7_7.1" src="qemu-kvm-1.5.3-167.el7_7.1.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-167.el7_7.1.x86_64.rpm</filename><sum type="sha256">09050b6b9de4892fc4b9212f68dee677acf68699d7aaec7057ae6ce61b5000d3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12155" id="CVE-2019-12155" title="Qemu: Qxl: Null Pointer Dereference While " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2607" id="RHSA-2019:2607-1" title="Rhsa-2019:2607-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1712670" id="1712670" title="Qemu: Qxl: Null Pointer Dereference While " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2729-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Sandbox escape through Firefox Sync (CVE-2019-9812) 
* Mozilla: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9 (CVE-2019-11740) 
* Mozilla: Same-origin policy violation with SVG filters and canvas to steal cross-origin images (CVE-2019-11742) 
* Mozilla: XSS by breaking out of title and textarea elements using innerHTML (CVE-2019-11744) 
* Mozilla: Use-after-free while manipulating video (CVE-2019-11746) 
* Mozilla: Use-after-free while extracting a key value in IndexedDB (CVE-2019-11752) 
* firefox: stored passwords in 'Saved Logins' can be copied without master password entry (CVE-2019-11733) 
* Mozilla: Cross-origin access to unload event attributes (CVE-2019-11743)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2019-09-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_7" src="firefox-60.9.0-1.el7_7.src.rpm" version="60.9.0"><filename>firefox-60.9.0-1.el7_7.x86_64.rpm</filename><sum type="sha256">3f643b791b283370da25205b99f6537fb03b84c897e58e942a47c72dff291c63</sum></package><package arch="i686" name="firefox" release="1.el7_7" src="firefox-60.9.0-1.el7_7.src.rpm" version="60.9.0"><filename>firefox-60.9.0-1.el7_7.i686.rpm</filename><sum type="sha256">1fe1e8874faddaf3516db69fd15071814cb63e56ea145d203a8fff0ca2cacf82</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:2729" id="RHSA-2019:2729-1" title="Rhsa-2019:2729-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2773-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 60.9.0. 
Security Fix(es): 
* Mozilla: Covert Content Attack on S/MIME encryption using a crafted multipart/alternative message (CVE-2019-11739) 
* Mozilla: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9 (CVE-2019-11740) 
* Mozilla: Same-origin policy violation with SVG filters and canvas to steal cross-origin images (CVE-2019-11742) 
* Mozilla: XSS by breaking out of title and textarea elements using innerHTML (CVE-2019-11744) 
* Mozilla: Use-after-free while manipulating video (CVE-2019-11746) 
* Mozilla: Use-after-free while extracting a key value in IndexedDB (CVE-2019-11752) 
* Mozilla: Cross-origin access to unload event attributes (CVE-2019-11743)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-09-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_7" src="thunderbird-60.9.0-1.el7_7.src.rpm" version="60.9.0"><filename>thunderbird-60.9.0-1.el7_7.x86_64.rpm</filename><sum type="sha256">d3aafe990ff5989700a7dd3e49d0f66200500ae720af093340b019f6adc666d3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11739" id="CVE-2019-11739" title="Mozilla: Covert Content Attack On S/Mime " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11740" id="CVE-2019-11740" title="Mozilla: Memory Safety Bugs Fixed In Firefox " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11742" id="CVE-2019-11742" title="Mozilla: Same-Origin Policy Violation With Svg " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11743" id="CVE-2019-11743" title="Mozilla: Cross-Origin Access To Unload Event " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11744" id="CVE-2019-11744" title="Mozilla: Xss By Breaking Out Of Title And " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11746" id="CVE-2019-11746" title="Mozilla: Use-After-Free While Manipulating Video" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11752" id="CVE-2019-11752" title="Mozilla: Use-After-Free While Extracting A Key " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2773" id="RHSA-2019:2773-1" title="Rhsa-2019:2773-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748652" id="1748652" title="Mozilla: Memory Safety Bugs Fixed In Firefox " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748653" id="1748653" title="Mozilla: Same-Origin Policy Violation With Svg " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748654" id="1748654" title="Mozilla: Cross-Origin Access To Unload Event " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748655" id="1748655" title="Mozilla: Xss By Breaking Out Of Title And " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748656" id="1748656" title="Mozilla: Use-After-Free While Manipulating Video" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748657" id="1748657" title="Mozilla: Use-After-Free While Extracting A Key " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1752307" id="1752307" title="Mozilla: Covert Content Attack On S/Mime " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2829-1</id><title>Kernel</title><description>Security Fix(es):          * A buffer overflow flaw was found in the way Linux kernel's vhost     functionality that translates virtqueue buffers to IOVs, logged the buffer     descriptors during migration. A privileged guest user able to pass     descriptors with invalid length to the host when migration is underway,     could use this flaw to increase their privileges on the host.     (CVE-2019-14835)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-09-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="bpftool" release="1062.1.2.el7" src="kernel-3.10.0-1062.1.2.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1062.1.2.el7.x86_64.rpm</filename><sum type="sha256">dcefb8bda878f4600da21beef8e82de9dcccc62fb8b1403ec6d22ddd0209e846</sum></package><package arch="x86_64" name="kernel-debug" release="1062.1.2.el7" src="kernel-3.10.0-1062.1.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1062.1.2.el7.x86_64.rpm</filename><sum type="sha256">ddd736f5c034db246dcb6fc2ae9d078c715ae74f38a23a8c17e4514e18d33dc1</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1062.1.2.el7" src="kernel-3.10.0-1062.1.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1062.1.2.el7.x86_64.rpm</filename><sum type="sha256">5a0ab7c7add7d332d95522c45fb37340a46216e309749ade4e640bc3fa122d10</sum></package><package arch="x86_64" name="kernel-tools" release="1062.1.2.el7" src="kernel-3.10.0-1062.1.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1062.1.2.el7.x86_64.rpm</filename><sum type="sha256">d18c0c82630c2cbb91bfb11f678c9b5a09adc684307dc7c77e163b18a8c9b91f</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1062.1.2.el7" src="kernel-3.10.0-1062.1.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1062.1.2.el7.noarch.rpm</filename><sum type="sha256">e5fb5262c12120cab02503a7fce1e421e89beeb060366c57278575a88f284537</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1062.1.2.el7" src="kernel-3.10.0-1062.1.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1062.1.2.el7.x86_64.rpm</filename><sum type="sha256">b83adaee3ef3db2a5043cc72d14435f3c8caf6ab8c60a43a8ae5ab8fc2588762</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1062.1.2.el7" src="kernel-3.10.0-1062.1.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1062.1.2.el7.x86_64.rpm</filename><sum type="sha256">c9c9197ea4660e8cf5d5818499274d0424541f48fdf3f4f798024c39bddd5625</sum></package><package arch="x86_64" name="perf" release="1062.1.2.el7" src="kernel-3.10.0-1062.1.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1062.1.2.el7.x86_64.rpm</filename><sum type="sha256">b827b8094f1d550a74a300161e1889085a50d1e089aca2803e94245852e5d66e</sum></package><package arch="noarch" name="kernel-doc" release="1062.1.2.el7" src="kernel-3.10.0-1062.1.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1062.1.2.el7.noarch.rpm</filename><sum type="sha256">214eaff2430ee61e2d3261bb9c21b60f6f07f0440e13ba95acfea79c17825bdc</sum></package><package arch="x86_64" name="kernel-headers" release="1062.1.2.el7" src="kernel-3.10.0-1062.1.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1062.1.2.el7.x86_64.rpm</filename><sum type="sha256">06dc7edb6d99757f15db4a9f94a5471aae8b93976c39f227b80334d5948cfd4f</sum></package><package arch="x86_64" name="kernel" release="1062.1.2.el7" src="kernel-3.10.0-1062.1.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1062.1.2.el7.x86_64.rpm</filename><sum type="sha256">7b874522c733adf3808ce18dc8cdf00f886a1d38b03b5509be1149169382480d</sum></package><package arch="x86_64" name="python-perf" release="1062.1.2.el7" src="kernel-3.10.0-1062.1.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1062.1.2.el7.x86_64.rpm</filename><sum type="sha256">89b314e0ec763f52f97c20b1afe4cebfbc63448b31b8c91f06fe14638c43193d</sum></package><package arch="x86_64" name="kernel-devel" release="1062.1.2.el7" src="kernel-3.10.0-1062.1.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1062.1.2.el7.x86_64.rpm</filename><sum type="sha256">407f18fe00fb89661de019766d31ec3d6f12f59c95172105de7df6d8865caf72</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:2829" id="RHSA-2019:2829-1" title="Rhsa-2019:2829-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2836-1</id><title>Dovecot</title><description>Security Fix(es):          * dovecot: improper NULL byte handling in IMAP and ManageSieve protocol     parsers leads to out of bounds writes (CVE-2019-11500)          For more details about the security issue(s), including the impact, a CVSS     score, acknowledgments, and other related information, refer to the CVE </description><severity>important</severity><release>Scientific Linux</release><issued date="2019-09-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="dovecot-pgsql" release="3.el7_7.1" src="dovecot-2.2.36-3.el7_7.1.src.rpm" version="2.2.36"><filename>dovecot-pgsql-2.2.36-3.el7_7.1.x86_64.rpm</filename><sum type="sha256">dccc18b6fad729aa0e34cbbc8c8a7d58de6124c68a7aba3fef1f37bfddb3c066</sum></package><package arch="i686" epoch="1" name="dovecot" release="3.el7_7.1" src="dovecot-2.2.36-3.el7_7.1.src.rpm" version="2.2.36"><filename>dovecot-2.2.36-3.el7_7.1.i686.rpm</filename><sum type="sha256">d7da8c2f84a4db51e4d1c25aed5d43bd1521decae766ecf8908af7e00b564588</sum></package><package arch="x86_64" epoch="1" name="dovecot-mysql" release="3.el7_7.1" src="dovecot-2.2.36-3.el7_7.1.src.rpm" version="2.2.36"><filename>dovecot-mysql-2.2.36-3.el7_7.1.x86_64.rpm</filename><sum type="sha256">aecefe12da6dbfe278c271d4e51caa6943a95cf455fa21c2006213c843833fd5</sum></package><package arch="x86_64" epoch="1" name="dovecot" release="3.el7_7.1" src="dovecot-2.2.36-3.el7_7.1.src.rpm" version="2.2.36"><filename>dovecot-2.2.36-3.el7_7.1.x86_64.rpm</filename><sum type="sha256">10963fefe2a41c6147830d68b53d5a566c7df30da457a03ac80a711c934143c3</sum></package><package arch="x86_64" epoch="1" name="dovecot-pigeonhole" release="3.el7_7.1" src="dovecot-2.2.36-3.el7_7.1.src.rpm" version="2.2.36"><filename>dovecot-pigeonhole-2.2.36-3.el7_7.1.x86_64.rpm</filename><sum type="sha256">db4018a2d22fb0328931edd7b56ce63c951cb2361973c7755f868a1a2f227e47</sum></package><package arch="i686" epoch="1" name="dovecot-devel" release="3.el7_7.1" src="dovecot-2.2.36-3.el7_7.1.src.rpm" version="2.2.36"><filename>dovecot-devel-2.2.36-3.el7_7.1.i686.rpm</filename><sum type="sha256">62e457c171ef6540ae69d62a832d60ef0d64a5a0c490bda5e30b1f4f60c6954c</sum></package><package arch="x86_64" epoch="1" name="dovecot-devel" release="3.el7_7.1" src="dovecot-2.2.36-3.el7_7.1.src.rpm" version="2.2.36"><filename>dovecot-devel-2.2.36-3.el7_7.1.x86_64.rpm</filename><sum type="sha256">d6b98470220073ee7f6b4fce454a7eaf28a1583eb95e950d8d50f6f35da7ce20</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:2836" id="RHSA-2019:2836-1" title="Rhsa-2019:2836-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:2964-1</id><title>Patch</title><description>Security Fix(es):

* patch: do_ed_script in pch.c does not block strings beginning with a ! character (CVE-2018-20969)

* patch: OS shell command injection when processing crafted patch files (CVE-2019-13638)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-10-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="patch" release="12.el7_7" src="patch-2.7.1-12.el7_7.src.rpm" version="2.7.1"><filename>patch-2.7.1-12.el7_7.x86_64.rpm</filename><sum type="sha256">de563b9bbcb3fabc14d814d6476e2e9bac5bfcb5dc6955a62e50ad4462f1e412</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20969" id="CVE-2018-20969" title="Patch: Do_Ed_Script In Pch.C Does Not Block " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13638" id="CVE-2019-13638" title="Patch: Os Shell Command Injection When " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:2964" id="RHSA-2019:2964-1" title="Rhsa-2019:2964-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1733916" id="1733916" title="Patch: Os Shell Command Injection When " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1746672" id="1746672" title="Patch: Do_Ed_Script In Pch.C Does Not Block " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3055-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: Use-after-free in __blk_drain_queue() function in block/blk-core.c (CVE-2018-20856) 
* kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in marvell/mwifiex/scan.c (CVE-2019-3846) 
* hardware: bluetooth: BR/EDR encryption key negotiation attacks (KNOB) (CVE-2019-9506) 
* kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE  
Bug Fixes: 
* gfs2: Fix iomap write page reclaim deadlock 
* [FJ7.6 Bug]: [REG] kernel: ipc: ipc_free should use kvfree 
* high update_cfs_rq_blocked_load contention 
* [Hyper-V][SL 7] kdump fails to start on a Hyper-V guest of Windows Server 2019. 
* kvm: backport cpuidle-haltpoll driver 
* Growing unreclaimable slab memory 
* [bnx2x] ping failed from pf to vf which has been attached to vm 
* [Hyper-V]vPCI devices cannot allocate IRQs vectors in a Hyper-V VM with &gt; 240 vCPUs (i.e., when in x2APIC mode) 
* Macsec: inbound MACSEC frame is unexpectedly dropped with InPktsNotValid 
* SL 7.7 Beta - Hit error when trying to run nvme connect with IPv6 address 
* SL 7.6 SS4 - Paths lost when running straight I/O on NVMe/RoCE system 
* NFSv4.0 client sending a double CLOSE (leading to EIO application failure) 
* [Azure] CRI-RDOS | [SL 7.8] Live migration only takes 10 seconds, but the VM was unavailable for 2 hours 
* NFS client autodisconnect timer may fire immediately after TCP connection setup and may cause DoS type reconnect problem in complex network environments 
* [Inspur] SL7.6 ASPEED graphic card display issue 
* Allows macvlan to operated correctly over the active-backup mode to support bonding events. 
* [LLNL 7.5 Bug] slab leak causing a crash when using kmem control group 
fix these bugs.</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-10-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel" release="1062.4.1.el7" src="kernel-3.10.0-1062.4.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1062.4.1.el7.x86_64.rpm</filename><sum type="sha256">77f787e95ac70b444de3b0e953826dc1e41e67804f892cb6e28faf14f1afaebc</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1062.4.1.el7" src="kernel-3.10.0-1062.4.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1062.4.1.el7.x86_64.rpm</filename><sum type="sha256">9f06a17bd53338df5d0ec0c1d04f57b5bf1138e68d7453e5cead277a59bb889f</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1062.4.1.el7" src="kernel-3.10.0-1062.4.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1062.4.1.el7.x86_64.rpm</filename><sum type="sha256">f36afc74125b5bea5b1b587a4a60a83125db30283a28a96ce6863fba3d41e959</sum></package><package arch="x86_64" name="kernel-tools" release="1062.4.1.el7" src="kernel-3.10.0-1062.4.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1062.4.1.el7.x86_64.rpm</filename><sum type="sha256">8a9415d8373583918aaa0db4808c0d1c8759758587d7e1870d489857f6115e2e</sum></package><package arch="x86_64" name="perf" release="1062.4.1.el7" src="kernel-3.10.0-1062.4.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1062.4.1.el7.x86_64.rpm</filename><sum type="sha256">0f4824143d4ea3e78175359a0d6c726a4b5b2d7041bcc4c65e0f233453e7c238</sum></package><package arch="noarch" name="kernel-doc" release="1062.4.1.el7" src="kernel-3.10.0-1062.4.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1062.4.1.el7.noarch.rpm</filename><sum type="sha256">04745765b47a9bcb00b4e46744c575812b67164aede8625da8b6bae23b6a91cd</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1062.4.1.el7" src="kernel-3.10.0-1062.4.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1062.4.1.el7.x86_64.rpm</filename><sum type="sha256">dfc0c2b4f3a1e85fed98e4cf697aa65453be62d28d76c5ab4edb5d5482b56d67</sum></package><package arch="x86_64" name="python-perf" release="1062.4.1.el7" src="kernel-3.10.0-1062.4.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1062.4.1.el7.x86_64.rpm</filename><sum type="sha256">11beccaac383ea2515cda98eea79ef1b776242448fc3ac83c5ecff8abb977a91</sum></package><package arch="x86_64" name="kernel-devel" release="1062.4.1.el7" src="kernel-3.10.0-1062.4.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1062.4.1.el7.x86_64.rpm</filename><sum type="sha256">b0d29a5436058c09b3a4230610830067d3b7ce7816a365f16b8466b4bab295d3</sum></package><package arch="x86_64" name="bpftool" release="1062.4.1.el7" src="kernel-3.10.0-1062.4.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1062.4.1.el7.x86_64.rpm</filename><sum type="sha256">0503c3ecf1dd7c8d0ed7d5842c08b3837a014347055f9600772e8a89671bfad4</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1062.4.1.el7" src="kernel-3.10.0-1062.4.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1062.4.1.el7.noarch.rpm</filename><sum type="sha256">7a0034f13f3ae005c9058dbb95036a284297ceaa7ef660d405f86f1c86e5aa7d</sum></package><package arch="x86_64" name="kernel-headers" release="1062.4.1.el7" src="kernel-3.10.0-1062.4.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1062.4.1.el7.x86_64.rpm</filename><sum type="sha256">1a364ad571516dcf3767dba95256391663e42cfb0078ee7983eec994d3417d6e</sum></package><package arch="x86_64" name="kernel-debug" release="1062.4.1.el7" src="kernel-3.10.0-1062.4.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1062.4.1.el7.x86_64.rpm</filename><sum type="sha256">30d2d6fb0b7d18437448d1f839926497a0f6a9241abf75c393b4db1c08d3e8f9</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:3055" id="RHSA-2019:3055-1" title="Rhsa-2019:3055-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3067-1</id><title>Jss</title><description>Security Fix(es): 
* JSS: OCSP policy "Leaf and Chain" implicitly trusts the root certificate (CVE-2019-14823) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE </description><severity>important</severity><release>Scientific Linux</release><issued date="2019-10-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="jss-javadoc" release="3.el7_7" src="jss-4.4.6-3.el7_7.src.rpm" version="4.4.6"><filename>jss-javadoc-4.4.6-3.el7_7.x86_64.rpm</filename><sum type="sha256">390e4ecf669a37d7dcdb0c63d0a5fc243a54e3641dc72c81efb19636a8669b1c</sum></package><package arch="x86_64" name="jss" release="3.el7_7" src="jss-4.4.6-3.el7_7.src.rpm" version="4.4.6"><filename>jss-4.4.6-3.el7_7.x86_64.rpm</filename><sum type="sha256">5eb8316da281593f4827463498f405eab6eaeacf09cec516db88fc566ea45a00</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:3067" id="RHSA-2019:3067-1" title="Rhsa-2019:3067-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3127-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) (CVE-2019-2949) 
* OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) (CVE-2019-2975) 
* OpenJDK: Out of bounds access in optimized String indexof implementation (Hotspot, 8224062) (CVE-2019-2977) 
* OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) (CVE-2019-2978) 
* OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) (CVE-2019-2989) 
* OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) (CVE-2019-2945) 
* OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) (CVE-2019-2962) 
* OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) (CVE-2019-2964) 
* OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) (CVE-2019-2973) 
* OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) (CVE-2019-2981) 
* OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) (CVE-2019-2983) 
* OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) (CVE-2019-2987) 
* OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) (CVE-2019-2988) 
* OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) (CVE-2019-2992) 
* OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) (CVE-2019-2999) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE </description><severity>important</severity><release>Scientific Linux</release><issued date="2019-10-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7.i686.rpm</filename><sum type="sha256">b15bf5ba762fb696e36df4244f002217174f1d9fd1e981bf039f37a604245e91</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7.i686.rpm</filename><sum type="sha256">c2f8c4e9e9575c6804f875905feb0065bb9ebcfbc35d5b9610cabc39a4f28c44</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-demo-debug-11.0.5.10-0.el7_7.x86_64.rpm</filename><sum type="sha256">605533f2353a458c96d0c3ba368cf8b6853755de28f7f2a5143722e85dc49660</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7.x86_64.rpm</filename><sum type="sha256">43d80ddb3f061bcc70e6378a858527afb1125be04fb4497c59280f4e9540aed9</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7.x86_64.rpm</filename><sum type="sha256">a89f4802ab11b465b734a4bdbcf8114dc33bccdef15e8c05002a653ecacca66c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-jmods-11.0.5.10-0.el7_7.x86_64.rpm</filename><sum type="sha256">710d54f3af41dfa323f38e3543cfb6f67018759ed93a5a883b5095079044ca3a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7.i686.rpm</filename><sum type="sha256">4055766ee453898078c5f92811aa0ac1fff310ce1e5df473b28d756771035828</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-11.0.5.10-0.el7_7.x86_64.rpm</filename><sum type="sha256">4d0559baceb9d642bf3b84c3ab9d9ab97ba977e5874596904d5795ee6b2eeb14</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-src-11.0.5.10-0.el7_7.i686.rpm</filename><sum type="sha256">0e5f22d8153146f3115d61e70e09f69d764001b68a81b36da614bb4b0d82b2b3</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-javadoc-11.0.5.10-0.el7_7.i686.rpm</filename><sum type="sha256">5554af2bca4ca7802df90524f4d9f15f68cd550f6c3bb84cd3ce0261efa59000</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-debug-11.0.5.10-0.el7_7.i686.rpm</filename><sum type="sha256">f2657eb8c512eea99b3b52989a0b96d15a37b8a3b2cefaab7856e2f451191ff4</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-demo-11.0.5.10-0.el7_7.i686.rpm</filename><sum type="sha256">7ea2dd5974763d4583453623946199267e0c8e45c5020d387bada72fdc9d20f5</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-src-11.0.5.10-0.el7_7.x86_64.rpm</filename><sum type="sha256">a2f721f922cb3e0c1faf36fd6fc550193d573474a2047e9da7cab360f58e3301</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-11.0.5.10-0.el7_7.i686.rpm</filename><sum type="sha256">ef12c024f9cdfb6679d5ddc85a78cb1b701c590cb2db73f95494b0e26667463e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-debug-11.0.5.10-0.el7_7.x86_64.rpm</filename><sum type="sha256">8111210a431e85db32bf7ecc8f5183e2c9ca2f71c08d5f013f832ebe25bba89e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-devel-debug-11.0.5.10-0.el7_7.x86_64.rpm</filename><sum type="sha256">3a2ad542f0313a2b0dbeb1fd4610605ea2ead806c3b9c806b3a413df7b746104</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-headless-11.0.5.10-0.el7_7.x86_64.rpm</filename><sum type="sha256">ec45f955ee85cfe8dfd436616d39c126ff2463cde9385ac092cd14da493a72e8</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-jmods-11.0.5.10-0.el7_7.i686.rpm</filename><sum type="sha256">0020e636a9918e1d4b28f2054267f8deda43ef89ad4d2681e7594202e04eaf6f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-devel-11.0.5.10-0.el7_7.x86_64.rpm</filename><sum type="sha256">5549a3fd8ab3b77d387161970b928a1e7a89bff89c287e2917b4d3c08f1c658b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-src-debug-11.0.5.10-0.el7_7.x86_64.rpm</filename><sum type="sha256">47fbc6bcd7a71e10f610d317c531440c622cfdd3fc0bc5caee717040003b0886</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-headless-11.0.5.10-0.el7_7.i686.rpm</filename><sum type="sha256">427eb3a50a50966963b3ee9974d868a6091a218670366ce123ff7193bf2fe753</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-devel-11.0.5.10-0.el7_7.i686.rpm</filename><sum type="sha256">b5cd1324cc6fff88631564db9295cf2afeab2a064eacced749e851499f1adbce</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-demo-debug-11.0.5.10-0.el7_7.i686.rpm</filename><sum type="sha256">9adfa3191f0299c96438dff11777cfb9ab611bd022961fa4c581083b31ffc90f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-devel-debug-11.0.5.10-0.el7_7.i686.rpm</filename><sum type="sha256">50f63fe72749e9a0358ad83900dd03d1b7ce4be3deff8fec8f49e9e9e2211c61</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7.x86_64.rpm</filename><sum type="sha256">04b01056d583c79c7b459977fe2bad8d447a9f0c803be749a2c6598981a5db0b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-headless-debug-11.0.5.10-0.el7_7.x86_64.rpm</filename><sum type="sha256">0117e2b6f12ce9133bbfd1d48e86138a496aacc92ae8ac3d2b5010c42422bdfe</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-demo-11.0.5.10-0.el7_7.x86_64.rpm</filename><sum type="sha256">bb12875f7405ca73dce61dad02bf0f971eefee58e08504b220d01b27abd21c5e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-headless-debug-11.0.5.10-0.el7_7.i686.rpm</filename><sum type="sha256">196075fc21a9b4b279095786ffee99317fa167b0b44242d9cbdec33fa503d04d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7.i686.rpm</filename><sum type="sha256">81fb7669d5e7dbdd7d19343625f73515ef01a635031679b1c5485600075cf9c0</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-src-debug-11.0.5.10-0.el7_7.i686.rpm</filename><sum type="sha256">f9ff1f47a541aa3f8b1e24e6f2f191cefc108d9802a9e3c10c3969e40261487f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-javadoc-11.0.5.10-0.el7_7.x86_64.rpm</filename><sum type="sha256">1dece4372aaf7de698cf2cfb9a8fcc3878f4edaaf5750df0514b9e420509b627</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_7" src="java-11-openjdk-11.0.5.10-0.el7_7.src.rpm" version="11.0.5.10"><filename>java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7.x86_64.rpm</filename><sum type="sha256">cdaec75b40d5204529e79cc62183dc5eaeb5b9ce9c9276e67434267db050efd6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:3127" id="RHSA-2019:3127-1" title="Rhsa-2019:3127-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3128-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) (CVE-2019-2949) 
* OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) (CVE-2019-2975) 
* OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) (CVE-2019-2978) 
* OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) (CVE-2019-2989) 
* OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) (CVE-2019-2945) 
* OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) (CVE-2019-2962) 
* OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) (CVE-2019-2964) 
* OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) (CVE-2019-2973) 
* OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) (CVE-2019-2981) 
* OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) (CVE-2019-2983) 
* OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) (CVE-2019-2987) 
* OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) (CVE-2019-2988) 
* OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) (CVE-2019-2992) 
* OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) (CVE-2019-2999)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-10-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7.x86_64.rpm</filename><sum type="sha256">eee5aa2f880814e8c48c22e6da04622d1ef063275546b07a94d2a1143bc8562f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7.x86_64.rpm</filename><sum type="sha256">c3eab471015223be9302c1cac082606f92c147dc2d1c7c7acb6c46468e4dd117</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7.i686.rpm</filename><sum type="sha256">66130f5d808fe7f9dc4b2339c69714eda5caf206a8ea1838491b944c38b59c77</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7.x86_64.rpm</filename><sum type="sha256">1b4ce36d97d043767a7afe44c8a7fa153d105e8d3b12c3d1c9aa80c0b2463435</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-javadoc-1.8.0.232.b09-0.el7_7.noarch.rpm</filename><sum type="sha256">9e019e7c3c493be9b46ee48ce8d1c42efc634ad11d4d8432186037cf195bc911</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7.i686.rpm</filename><sum type="sha256">042d4bb95c6420e28ebbee5e54d59a38da6aa411d3f3af64cde4c2f69b3c7585</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7.i686.rpm</filename><sum type="sha256">e8846661780faf5bd4f183e22aa6ab1a97149d9eb2ecbc9c19100849db33e5fd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7.x86_64.rpm</filename><sum type="sha256">f17c3df298739e2c2c20f1a76e66b2f72353703c90da7bf656a1193f609edf9e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7.x86_64.rpm</filename><sum type="sha256">d084b526e02a9541ee79a345267b54c11c4f3cb175dd2704bc0c9cfe6c7fbe77</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.x86_64.rpm</filename><sum type="sha256">7e993b1ec77019e1eabe0dbaa88bc1aa26941b2dda9c2f69db5847e44f373c11</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-demo-1.8.0.232.b09-0.el7_7.i686.rpm</filename><sum type="sha256">7d45e73a3886021f2735cb75ff4d85273278cd3afc4b3329a4a8b88ceafd4ddd</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7.i686.rpm</filename><sum type="sha256">9a865f57772ad469a5bceb6495b57b3250d05c8ba112994e43b6dfc47c545f7d</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-devel-1.8.0.232.b09-0.el7_7.i686.rpm</filename><sum type="sha256">7dfa1dd8c41a7df54e61a67cd908b54a753fe432a5da1ac583d916439aeea262</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7.i686.rpm</filename><sum type="sha256">b3a6b70c62326a6b8d3d6fdfbfd1c291a5678668fa970a1e7ce19b5d448de269</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.232.b09-0.el7_7.noarch.rpm</filename><sum type="sha256">b319d93f0be48e33331bed6c09d537084abfa3da2a8dea882f3109aa12f7d9d2</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7.i686.rpm</filename><sum type="sha256">f2499d2a2669ac6f77f22c775853a322055a77025fe66ae8e5092c460a87ef1c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-src-debug-1.8.0.232.b09-0.el7_7.i686.rpm</filename><sum type="sha256">d3776d3e409ef371a9e9a2c0a1cd1a0f4f2a09019124f1420e9133fbbf6d8fa1</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.232.b09-0.el7_7.x86_64.rpm</filename><sum type="sha256">80c6974857fb895661fec0b95b84b77b820a82eabe79aed3bce8a21245de6a39</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.232.b09-0.el7_7.noarch.rpm</filename><sum type="sha256">820f990c80ee88ee377463b099e03bfbd98ca2bcdca2dc7fed6a95f6d15bcc1c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-headless-1.8.0.232.b09-0.el7_7.x86_64.rpm</filename><sum type="sha256">53d089a42ce336786c277ae9505650a054d0e2bd1699cb6e267880c4958d2296</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.232.b09-0.el7_7.i686.rpm</filename><sum type="sha256">604f241fc017191862eb2467b9cf7f34cafd3f3e75e3f89c7a793087cde5225e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-accessibility-1.8.0.232.b09-0.el7_7.x86_64.rpm</filename><sum type="sha256">30d172a6905bd977abe7f710aa0872d5550e73f6e3c20625db9446d413e6fced</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.232.b09-0.el7_7.noarch.rpm</filename><sum type="sha256">ebb50f9e2743723b4a7b3e58b4946540190f25c9b249832a4eababb6cee3e48c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-src-1.8.0.232.b09-0.el7_7.i686.rpm</filename><sum type="sha256">9e0b24c410374a16c15e4cd8562e6b712d88bbb157fbbda14a0569a06aac115b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-debug-1.8.0.232.b09-0.el7_7.x86_64.rpm</filename><sum type="sha256">873eee7ea3f02ff3b80a2b7e2786fdd8b02ae042829a4500dd2445206fd4b081</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.232.b09-0.el7_7.x86_64.rpm</filename><sum type="sha256">85bb6a28f9bfd9179d5b93251e6e5532891dce91ea2be7429ef830f54fa3afce</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.232.b09-0.el7_7.x86_64.rpm</filename><sum type="sha256">2b6e884d5bdaccefe61770d352b62da4277303e024ca99548669a821d8b0743d</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.src.rpm" version="1.8.0.232.b09"><filename>java-1.8.0-openjdk-1.8.0.232.b09-0.el7_7.i686.rpm</filename><sum type="sha256">bf25d0aa5b9ab9cbba586b1f725ae291b02ae8762ea5f994da1959fedc05db67</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:3128" id="RHSA-2019:3128-1" title="Rhsa-2019:3128-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3157-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) (CVE-2019-2978) 
* OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) (CVE-2019-2989) 
* OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) (CVE-2019-2945) 
* OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) (CVE-2019-2962) 
* OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) (CVE-2019-2964) 
* OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) (CVE-2019-2973) 
* OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) (CVE-2019-2981) 
* OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) (CVE-2019-2983) 
* OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) (CVE-2019-2987) 
* OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) (CVE-2019-2988) 
* OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) (CVE-2019-2992) 
* OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) (CVE-2019-2999) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE </description><severity>moderate</severity><release>Scientific Linux</release><issued date="2019-10-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.20.0.el7_7" src="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7.src.rpm" version="1.7.0.241"><filename>java-1.7.0-openjdk-devel-1.7.0.241-2.6.20.0.el7_7.x86_64.rpm</filename><sum type="sha256">69af4c5976e160b428fbe9ba451c18880aa78fe478220e8e41a9529db05bae2f</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.20.0.el7_7" src="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7.src.rpm" version="1.7.0.241"><filename>java-1.7.0-openjdk-src-1.7.0.241-2.6.20.0.el7_7.x86_64.rpm</filename><sum type="sha256">12648738968dc63de3377e98a03742c843695c26c2d879c8978b7ddc5fa82c5c</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.20.0.el7_7" src="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7.src.rpm" version="1.7.0.241"><filename>java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7.x86_64.rpm</filename><sum type="sha256">81136ad8e52bf505b0b38ef42346e52299e03d5e6402a30cff1da7727dc3911e</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.20.0.el7_7" src="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7.src.rpm" version="1.7.0.241"><filename>java-1.7.0-openjdk-demo-1.7.0.241-2.6.20.0.el7_7.x86_64.rpm</filename><sum type="sha256">31dc5fff76cafece75c1da203cab822e9c2f68750f6ca0efc253c0fcae907ef6</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.20.0.el7_7" src="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7.src.rpm" version="1.7.0.241"><filename>java-1.7.0-openjdk-accessibility-1.7.0.241-2.6.20.0.el7_7.x86_64.rpm</filename><sum type="sha256">cce3300e996da2a9df10c1efcb794404fe89b1342feab634bf3e86b871190131</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.20.0.el7_7" src="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7.src.rpm" version="1.7.0.241"><filename>java-1.7.0-openjdk-headless-1.7.0.241-2.6.20.0.el7_7.x86_64.rpm</filename><sum type="sha256">c1afdb9e26ad60c96d352b4fadbc7c7a4f44c6c992ec24bc647face89995fb48</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.20.0.el7_7" src="java-1.7.0-openjdk-1.7.0.241-2.6.20.0.el7_7.src.rpm" version="1.7.0.241"><filename>java-1.7.0-openjdk-javadoc-1.7.0.241-2.6.20.0.el7_7.noarch.rpm</filename><sum type="sha256">488560baf5d511ef1f0119fb0a294fb219b0f60c54da46f4a6b7ea2a17ee0a32</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:3157" id="RHSA-2019:3157-1" title="Rhsa-2019:3157-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3193-1</id><title>Firefox</title><description>This update upgrades Firefox to version 68.2.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 (CVE-2019-11764) 
* Mozilla: Use-after-free when creating index updates in IndexedDB (CVE-2019-11757) 
* Mozilla: Potentially exploitable crash due to 360 Total Security (CVE-2019-11758) 
* Mozilla: Stack buffer overflow in HKDF output (CVE-2019-11759) 
* Mozilla: Stack buffer overflow in WebRTC networking (CVE-2019-11760) 
* Mozilla: Unintended access to a privileged JSONView object (CVE-2019-11761) 
* Mozilla: document.domain-based origin isolation has same-origin-property violation (CVE-2019-11762) 
* Mozilla: Incorrect HTML parsing results in XSS bypass technique (CVE-2019-11763)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2019-10-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_7" src="firefox-68.2.0-1.el7_7.src.rpm" version="68.2.0"><filename>firefox-68.2.0-1.el7_7.x86_64.rpm</filename><sum type="sha256">9c684d5a8a4b035b9e2e51eb8c188566327505c5552d358032feee78b3d55de9</sum></package><package arch="i686" name="firefox" release="1.el7_7" src="firefox-68.2.0-1.el7_7.src.rpm" version="68.2.0"><filename>firefox-68.2.0-1.el7_7.i686.rpm</filename><sum type="sha256">cd74722b0a295558189bb9662f1defbd8dfae81bdc546e75ad60c3167c03af94</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757" id="CVE-2019-11757" title="Mozilla: Use-After-Free When Creating Index " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11758" id="CVE-2019-11758" title="Mozilla: Potentially Exploitable Crash Due To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759" id="CVE-2019-11759" title="Mozilla: Stack Buffer Overflow In Hkdf Output" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760" id="CVE-2019-11760" title="Mozilla: Stack Buffer Overflow In Webrtc Networking" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761" id="CVE-2019-11761" title="Mozilla: Unintended Access To A Privileged " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762" id="CVE-2019-11762" title="Mozilla: Document.Domain-Based Origin Isolation " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763" id="CVE-2019-11763" title="Mozilla: Incorrect Html Parsing Results In Xss " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764" id="CVE-2019-11764" title="Mozilla: Memory Safety Bugs Fixed In Firefox 70 " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:3193" id="RHSA-2019:3193-1" title="Rhsa-2019:3193-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764438" id="1764438" title="Mozilla: Use-After-Free When Creating Index " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764439" id="1764439" title="Mozilla: Potentially Exploitable Crash Due To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764440" id="1764440" title="Mozilla: Stack Buffer Overflow In Hkdf Output" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764441" id="1764441" title="Mozilla: Stack Buffer Overflow In Webrtc Networking" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764442" id="1764442" title="Mozilla: Unintended Access To A Privileged " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764443" id="1764443" title="Mozilla: Document.Domain-Based Origin Isolation " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764444" id="1764444" title="Mozilla: Incorrect Html Parsing Results In Xss " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764446" id="1764446" title="Mozilla: Memory Safety Bugs Fixed In Firefox 70 " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3197-1</id><title>Sudo</title><description>Security Fix(es): 
* sudo: Privilege escalation via 'Runas' specification with 'ALL' keyword (CVE-2019-14287)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-10-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="sudo" release="4.el7_7.1" src="sudo-1.8.23-4.el7_7.1.src.rpm" version="1.8.23"><filename>sudo-1.8.23-4.el7_7.1.x86_64.rpm</filename><sum type="sha256">b2ed1fc10e8c8d2bdca725c05913497603429e559c8a1ea1a841eaadc01064ed</sum></package><package arch="x86_64" name="sudo-devel" release="4.el7_7.1" src="sudo-1.8.23-4.el7_7.1.src.rpm" version="1.8.23"><filename>sudo-devel-1.8.23-4.el7_7.1.x86_64.rpm</filename><sum type="sha256">e7b953a0023f2ed4e450fa34153cce3caebe400b4b6ce2195ed5de0649df7ca5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14287" id="CVE-2019-14287" title="Sudo: Privilege Escalation Via 'Runas' " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:3197" id="RHSA-2019:3197-1" title="Rhsa-2019:3197-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760531" id="1760531" title="Sudo: Privilege Escalation Via 'Runas' " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3210-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 68.2.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 70 and Firefox ESR 68.2 (CVE-2019-11764) 
* Mozilla: Use-after-free when creating index updates in IndexedDB (CVE-2019-11757) 
* Mozilla: Potentially exploitable crash due to 360 Total Security (CVE-2019-11758) 
* Mozilla: Stack buffer overflow in HKDF output (CVE-2019-11759) 
* Mozilla: Stack buffer overflow in WebRTC networking (CVE-2019-11760) 
* Mozilla: Unintended access to a privileged JSONView object (CVE-2019-11761) 
* Mozilla: document.domain-based origin isolation has same-origin-property violation (CVE-2019-11762) 
* Mozilla: Incorrect HTML parsing results in XSS bypass technique (CVE-2019-11763) 
* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-10-29 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_7" src="thunderbird-68.2.0-1.el7_7.src.rpm" version="68.2.0"><filename>thunderbird-68.2.0-1.el7_7.x86_64.rpm</filename><sum type="sha256">c3ab426a01ffc671ef54666b773d5b7216f1fd7f29f9bd78338afe87f7d64988</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11757" id="CVE-2019-11757" title="Mozilla: Use-After-Free When Creating Index " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11758" id="CVE-2019-11758" title="Mozilla: Potentially Exploitable Crash Due To " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11759" id="CVE-2019-11759" title="Mozilla: Stack Buffer Overflow In Hkdf Output" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11760" id="CVE-2019-11760" title="Mozilla: Stack Buffer Overflow In Webrtc Networking" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11761" id="CVE-2019-11761" title="Mozilla: Unintended Access To A Privileged " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11762" id="CVE-2019-11762" title="Mozilla: Document.Domain-Based Origin Isolation " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11763" id="CVE-2019-11763" title="Mozilla: Incorrect Html Parsing Results In Xss " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11764" id="CVE-2019-11764" title="Mozilla: Memory Safety Bugs Fixed In Firefox 70 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15903" id="CVE-2019-15903" title="Expat: Heap-Based Buffer Over-Read Via Crafted " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:3210" id="RHSA-2019:3210-1" title="Rhsa-2019:3210-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1752592" id="1752592" title="Expat: Heap-Based Buffer Over-Read Via Crafted " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764438" id="1764438" title="Mozilla: Use-After-Free When Creating Index " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764439" id="1764439" title="Mozilla: Potentially Exploitable Crash Due To " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764440" id="1764440" title="Mozilla: Stack Buffer Overflow In Hkdf Output" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764441" id="1764441" title="Mozilla: Stack Buffer Overflow In Webrtc Networking" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764442" id="1764442" title="Mozilla: Unintended Access To A Privileged " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764443" id="1764443" title="Mozilla: Document.Domain-Based Origin Isolation " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764444" id="1764444" title="Mozilla: Incorrect Html Parsing Results In Xss " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764446" id="1764446" title="Mozilla: Memory Safety Bugs Fixed In Firefox 70 " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3286-1</id><title>Php</title><description>Security Fix(es): 
* php: underflow in env_path_info in fpm_main.c (CVE-2019-11043)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2019-10-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="php-mysql" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-mysql-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">3e876ca64724335cba3c44d43766cd39d1c027f4eaf9ba2dafe0e22c87cb6d7d</sum></package><package arch="x86_64" name="php-xml" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-xml-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">6b41c7bff5d0605c29847161a1d6d5a6dcefd85f58b66c8289957fd6ec65df20</sum></package><package arch="x86_64" name="php-pspell" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-pspell-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">2ca187d6f8d60a9ccf3eb0dcdac20fd2a8d379c97d0b6ed0742fb181a32595f1</sum></package><package arch="x86_64" name="php-intl" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-intl-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">1d803470cf7230063896bb8d1b0af973d25159b5875739b46265ed68b65cadf0</sum></package><package arch="x86_64" name="php-embedded" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-embedded-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">763ea98fb1a17c4596037c7d885fa90d1c59299642efe871d61dea81c380a400</sum></package><package arch="x86_64" name="php-process" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-process-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">1e023c6a830155ce7bc64de5a85c5637b73831da265d3484e18d85f7b37ca1d6</sum></package><package arch="x86_64" name="php-soap" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-soap-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">2c695f63ef1f9cf1f45430caf412037fd0378d1deffb44d3b61903172b976262</sum></package><package arch="x86_64" name="php-odbc" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-odbc-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">0377a81fadaf8cd07780f80fdae950b55c914a3ff50c1c6128aef974bb06fdd5</sum></package><package arch="x86_64" name="php-snmp" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-snmp-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">82b5b691c79e8a6e07760eb39fb98ddeea89502d6ff09773d8c5a73a209eb879</sum></package><package arch="x86_64" name="php-pgsql" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-pgsql-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">4968f771e8b089ec312547cf7cf7fa3e78331deb664ebdb6514699d18be8b23c</sum></package><package arch="x86_64" name="php-dba" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-dba-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">3535f2edf7765c92aeaf338990c553b87857406ba9a3c5df39abe1eeb5999f9d</sum></package><package arch="x86_64" name="php-devel" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-devel-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">7bbb7e4697e879272a2cd99f6cb233c421d3c1c19f714a7871c7031915b92fa6</sum></package><package arch="x86_64" name="php-common" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-common-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">9e76932a4cf7c8a597f0aa8ed7fc6b9d1ff2085d8131303088ce93dd6ea52468</sum></package><package arch="x86_64" name="php-bcmath" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-bcmath-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">62906137e65b9e36156ab21e920cfef86fc6e3361c54f4b7f6468b3b27731dae</sum></package><package arch="x86_64" name="php-fpm" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-fpm-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">072c8f559ad274bc5f83a545afe07e50b5645064d2221ac349d15a3c5508c447</sum></package><package arch="x86_64" name="php-cli" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-cli-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">f6b6a774b17d9991b0dbf1b4d853e4f94beaba1de019b6efcd1c09e041f4159f</sum></package><package arch="x86_64" name="php-pdo" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-pdo-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">7704f6f421bf9addcc612a077a2482d4da2be707d0ff16d3e4e4417f9124c9e2</sum></package><package arch="x86_64" name="php-enchant" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-enchant-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">9a206f4f477a79f96c37788e131fe8077143db65da66b3eff4d4f02a5041da95</sum></package><package arch="x86_64" name="php-recode" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-recode-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">e2320bc886ab362cc37fe347fbde0dc1e19bb70243f109b2f3e5fbb7912b1297</sum></package><package arch="x86_64" name="php-mbstring" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-mbstring-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">0045419028ffc6eaa78638dc05a42ec9132dad50e7b694018180d795454b8634</sum></package><package arch="x86_64" name="php-mysqlnd" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-mysqlnd-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">d5503139024849d4b05d3062b88d6dbbfe560dca097162bad0e525848246578a</sum></package><package arch="x86_64" name="php-ldap" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-ldap-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">b7d4139addbe905196d3800173e5e63984d8e529db8b303d90ba68d7c161e867</sum></package><package arch="x86_64" name="php" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">772ef21a218686bc1bbd921cfdac7a978ddda26c8ba6dedcddbd7594f3f92c76</sum></package><package arch="x86_64" name="php-xmlrpc" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-xmlrpc-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">15c3c049c21672d3c6bb30a2d3a5810514108a7aec20df7f25de1d82e369f770</sum></package><package arch="x86_64" name="php-gd" release="46.1.el7_7" src="php-5.4.16-46.1.el7_7.src.rpm" version="5.4.16"><filename>php-gd-5.4.16-46.1.el7_7.x86_64.rpm</filename><sum type="sha256">5f51b366ede557eb59a64377417bd770c49e9797ef027c663eaf4e63e133ecbb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11043" id="CVE-2019-11043" title="Php: Underflow In Env_Path_Info In Fpm_Main.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:3286" id="RHSA-2019:3286-1" title="Rhsa-2019:3286-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1766378" id="1766378" title="Php: Underflow In Env_Path_Info In Fpm_Main.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3834-1</id><title>Kernel</title><description>Security Fix(es): 
* hw: Machine Check Error on Page Size Change (IFU) (CVE-2018-12207) 
* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135) 
* hw: Intel GPU Denial Of Service while accessing MMIO in lower power state (CVE-2019-0154) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE </description><severity>important</severity><release>Scientific Linux</release><issued date="2019-11-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools-libs" release="1062.4.2.el7" src="kernel-3.10.0-1062.4.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1062.4.2.el7.x86_64.rpm</filename><sum type="sha256">7b9608da8b1cb20e6b8dc297a828061bcedc15bfaa667f805dd6dda4fe24aa55</sum></package><package arch="x86_64" name="kernel-devel" release="1062.4.2.el7" src="kernel-3.10.0-1062.4.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1062.4.2.el7.x86_64.rpm</filename><sum type="sha256">55a97d7e1ab4882e82ddfa7268a2bbf24f796efe8d25a28e229fd570bd5c0812</sum></package><package arch="x86_64" name="perf" release="1062.4.2.el7" src="kernel-3.10.0-1062.4.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1062.4.2.el7.x86_64.rpm</filename><sum type="sha256">d41766830378a6d44f2797272c2fc2bdd543de8a4bfbaae7b85da681202d87cf</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1062.4.2.el7" src="kernel-3.10.0-1062.4.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1062.4.2.el7.x86_64.rpm</filename><sum type="sha256">8483171ec11fb3f52fc1d6dea3803749206a260e80a34ded6a3eb2956aced9c3</sum></package><package arch="x86_64" name="kernel" release="1062.4.2.el7" src="kernel-3.10.0-1062.4.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1062.4.2.el7.x86_64.rpm</filename><sum type="sha256">48f1b0ae96e25c773e04278cc0011e5587cd88ff19427a09ae66c3a2f6fa3c26</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1062.4.2.el7" src="kernel-3.10.0-1062.4.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1062.4.2.el7.x86_64.rpm</filename><sum type="sha256">c4aa563a328a8bc141f850ffe21b512e764871be316a994c4563ecf75bcd35eb</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1062.4.2.el7" src="kernel-3.10.0-1062.4.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1062.4.2.el7.noarch.rpm</filename><sum type="sha256">c91bac3d5ec62965469a4f2de67fb1db2de9e49dd4e588315c8c0aa01329d0c4</sum></package><package arch="x86_64" name="bpftool" release="1062.4.2.el7" src="kernel-3.10.0-1062.4.2.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1062.4.2.el7.x86_64.rpm</filename><sum type="sha256">0b8bd93edd676fd39d0fc2a7ccfd40b234ed64aeb0dbb256bb347f925b315f9f</sum></package><package arch="x86_64" name="python-perf" release="1062.4.2.el7" src="kernel-3.10.0-1062.4.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1062.4.2.el7.x86_64.rpm</filename><sum type="sha256">73b7252214dccb8dafd3073ceb79c5cf2a92419a8037ec4bfbf5d4338d5b4791</sum></package><package arch="noarch" name="kernel-doc" release="1062.4.2.el7" src="kernel-3.10.0-1062.4.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1062.4.2.el7.noarch.rpm</filename><sum type="sha256">76158ea0b39f4ec2837d4934dd8da5adf7767f80817d896a5d36cf70119f6b47</sum></package><package arch="x86_64" name="kernel-headers" release="1062.4.2.el7" src="kernel-3.10.0-1062.4.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1062.4.2.el7.x86_64.rpm</filename><sum type="sha256">c788939de8beff6ccca85a53ef5feec0dd7630436474a8c3a344fbf3a21c5e25</sum></package><package arch="x86_64" name="kernel-tools" release="1062.4.2.el7" src="kernel-3.10.0-1062.4.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1062.4.2.el7.x86_64.rpm</filename><sum type="sha256">7ea0b9ba581775e981983a98a948c095a6834b52f4d7972840d3663e42bb171f</sum></package><package arch="x86_64" name="kernel-debug" release="1062.4.2.el7" src="kernel-3.10.0-1062.4.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1062.4.2.el7.x86_64.rpm</filename><sum type="sha256">2843f498464ecf9b4c26ca9347d772ee8e7e778e32206d6620f78ae951d2126c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:3834" id="RHSA-2019:3834-1" title="Rhsa-2019:3834-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3872-1</id><title>Kernel</title><description>Security Fix(es): 
* hw: Intel GPU blitter manipulation can allow for arbitrary kernel memory write (CVE-2019-0155)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-11-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="bpftool" release="1062.4.3.el7" src="kernel-3.10.0-1062.4.3.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1062.4.3.el7.x86_64.rpm</filename><sum type="sha256">fadc96c01c3eada90c238c4ba9338c515328023afeabe564943e084f318c904e</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1062.4.3.el7" src="kernel-3.10.0-1062.4.3.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1062.4.3.el7.noarch.rpm</filename><sum type="sha256">24d3c649a0b974970ae73f8b72a13e4ca815e5fe889e346ba008fc08cc600d25</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1062.4.3.el7" src="kernel-3.10.0-1062.4.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1062.4.3.el7.x86_64.rpm</filename><sum type="sha256">5e1b5f5b39449ce1de02d8488d700a9f542cf9da7c8e6a1d3280021e5640df87</sum></package><package arch="x86_64" name="kernel-tools" release="1062.4.3.el7" src="kernel-3.10.0-1062.4.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1062.4.3.el7.x86_64.rpm</filename><sum type="sha256">ece90b29e9fb18a660568d2917f676f4e15ee9be29a5a5bf20963e22ec0af613</sum></package><package arch="x86_64" name="python-perf" release="1062.4.3.el7" src="kernel-3.10.0-1062.4.3.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1062.4.3.el7.x86_64.rpm</filename><sum type="sha256">a008b02b8e87ff3aab9f5ef6887d57868d46e3d4bb3abe0b20f10c0be29a936c</sum></package><package arch="x86_64" name="kernel-debug" release="1062.4.3.el7" src="kernel-3.10.0-1062.4.3.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1062.4.3.el7.x86_64.rpm</filename><sum type="sha256">44ecb1da111c96092b3cf4867fffa9a3d2ee093b25d70f28e8587a52e6c4503c</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1062.4.3.el7" src="kernel-3.10.0-1062.4.3.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1062.4.3.el7.x86_64.rpm</filename><sum type="sha256">0403dd6b2d31d8cc20ac8654a22a18a6bc1e0697a512687b763596a199649c59</sum></package><package arch="x86_64" name="kernel-headers" release="1062.4.3.el7" src="kernel-3.10.0-1062.4.3.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1062.4.3.el7.x86_64.rpm</filename><sum type="sha256">18387014feee8c0ab9ecb65fd18cc54add00f220429e3754d787dabab12ef416</sum></package><package arch="x86_64" name="kernel" release="1062.4.3.el7" src="kernel-3.10.0-1062.4.3.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1062.4.3.el7.x86_64.rpm</filename><sum type="sha256">749683ed464154f60b612a6421e21ae716af98397aa0b7893602207dd402f056</sum></package><package arch="noarch" name="kernel-doc" release="1062.4.3.el7" src="kernel-3.10.0-1062.4.3.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1062.4.3.el7.noarch.rpm</filename><sum type="sha256">cf0612247202337ea6f2edbe36ac11bff53878d3ca28eaf1c17b3483a3e1303b</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1062.4.3.el7" src="kernel-3.10.0-1062.4.3.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1062.4.3.el7.x86_64.rpm</filename><sum type="sha256">6509dfe8428969e27f4dfde21206c3bf9682c50c89e06eee1d16a19a6884a9fe</sum></package><package arch="x86_64" name="perf" release="1062.4.3.el7" src="kernel-3.10.0-1062.4.3.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1062.4.3.el7.x86_64.rpm</filename><sum type="sha256">fcfed7cff267e6ebb4cc44a524009340ee925a0d06ab799ed766a49ac31fc590</sum></package><package arch="x86_64" name="kernel-devel" release="1062.4.3.el7" src="kernel-3.10.0-1062.4.3.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1062.4.3.el7.x86_64.rpm</filename><sum type="sha256">7b463c4465adb7df3999bd90b1fedf9091df2ac31b8c5a6ebb965371ff8d73a1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:3872" id="RHSA-2019:3872-1" title="Rhsa-2019:3872-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3888-1</id><title>Ghostscript</title><description>Security Fix(es): 
* ghostscript: -dSAFER escape in .charkeys (701841) (CVE-2019-14869)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-11-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libgs" release="2.el7_7.3" src="ghostscript-9.25-2.el7_7.3.src.rpm" version="9.25"><filename>libgs-9.25-2.el7_7.3.i686.rpm</filename><sum type="sha256">0f8d2279140e14480f3313c995c20fe5035b697306bd3835243c707e84a89823</sum></package><package arch="x86_64" name="ghostscript" release="2.el7_7.3" src="ghostscript-9.25-2.el7_7.3.src.rpm" version="9.25"><filename>ghostscript-9.25-2.el7_7.3.x86_64.rpm</filename><sum type="sha256">ceb265008bc4c949408cccea197365896ca07576d7a4804b566e4754f3bafd68</sum></package><package arch="i686" name="libgs-devel" release="2.el7_7.3" src="ghostscript-9.25-2.el7_7.3.src.rpm" version="9.25"><filename>libgs-devel-9.25-2.el7_7.3.i686.rpm</filename><sum type="sha256">6ee4f5907ee50e370abf33ca181e4882995763ede699e797948483b3b032cdb6</sum></package><package arch="x86_64" name="ghostscript-cups" release="2.el7_7.3" src="ghostscript-9.25-2.el7_7.3.src.rpm" version="9.25"><filename>ghostscript-cups-9.25-2.el7_7.3.x86_64.rpm</filename><sum type="sha256">c317b4b6f81a110406f2b3c89824b5030b841c3a39fe254439fb4b0e8315971e</sum></package><package arch="x86_64" name="libgs" release="2.el7_7.3" src="ghostscript-9.25-2.el7_7.3.src.rpm" version="9.25"><filename>libgs-9.25-2.el7_7.3.x86_64.rpm</filename><sum type="sha256">7020d4d7d3508197fc936b7ec0b5092001352b41114503434aaeca0b7053b460</sum></package><package arch="x86_64" name="libgs-devel" release="2.el7_7.3" src="ghostscript-9.25-2.el7_7.3.src.rpm" version="9.25"><filename>libgs-devel-9.25-2.el7_7.3.x86_64.rpm</filename><sum type="sha256">c7b64a1077134abd811636f6871b03f1bfe6d476da88bc70907f4212f9035d4a</sum></package><package arch="noarch" name="ghostscript-doc" release="2.el7_7.3" src="ghostscript-9.25-2.el7_7.3.src.rpm" version="9.25"><filename>ghostscript-doc-9.25-2.el7_7.3.noarch.rpm</filename><sum type="sha256">67dc0fa1254d3e0aa16f95ce6dcc2f2ed542cf1a0586865f8bebece5cbaf5a53</sum></package><package arch="x86_64" name="ghostscript-gtk" release="2.el7_7.3" src="ghostscript-9.25-2.el7_7.3.src.rpm" version="9.25"><filename>ghostscript-gtk-9.25-2.el7_7.3.x86_64.rpm</filename><sum type="sha256">81b42b588f054534571a70bdc55c765044d9bfa9718c4644d64de50fa0e20d77</sum></package><package arch="i686" name="ghostscript" release="2.el7_7.3" src="ghostscript-9.25-2.el7_7.3.src.rpm" version="9.25"><filename>ghostscript-9.25-2.el7_7.3.i686.rpm</filename><sum type="sha256">6cd265e78bd8b71405eae320db4e68338bd3237b90a3f9a125f212313a293c88</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14869" id="CVE-2019-14869" title="Ghostscript: -Dsafer Escape In .Charkeys (701841)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:3888" id="RHSA-2019:3888-1" title="Rhsa-2019:3888-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1768911" id="1768911" title="Ghostscript: -Dsafer Escape In .Charkeys (701841)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3976-1</id><title>Tcpdump</title><description>Security Fix(es): 
* tcpdump: Stack-based buffer over-read in print-hncp.c:print_prefix() via crafted pcap (CVE-2018-19519)</description><severity>low</severity><release>Scientific Linux</release><issued date="2019-12-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="14" name="tcpdump" release="4.el7_7.1" src="tcpdump-4.9.2-4.el7_7.1.src.rpm" version="4.9.2"><filename>tcpdump-4.9.2-4.el7_7.1.x86_64.rpm</filename><sum type="sha256">0e998b4d908226530c1363ee88e0c8a57813486da5d1d18813c2ec1bca85d47a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:3976" id="RHSA-2019:3976-1" title="Rhsa-2019:3976-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3979-1</id><title>Kernel</title><description>Security Fix(es): 
* Kernel: KVM: OOB memory access via mmio ring buffer (CVE-2019-14821) 
* kernel: local attacker can trigger multiple use-after-free conditions results in privilege escalation (CVE-2019-15239) 
Bug Fix(es): 
* On SL 7.7 kernel SCSI VPD information for NVMe drives is missing (breaks InfoScale) 
* SL7 fnic spamming logs: Current vnic speed set to : 40000 
* kernel build: parallelize redhat/mod-sign.sh 
* kernel build: speed up module compression step 
* Nested VirtualBox VMs on Windows guest has the potential of impacting memory region allocated to other KVM guests 
* NULL pointer dereference at check_preempt_wakeup+0x109 
* Regression: panic in pick_next_task_rt 
* ixgbe reports "Detected Tx Unit Hang" with adapter reset on SL 7 
* [Intel 7.8 Bug] [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM. 
* nvme: dead loop in blk_mq_tagset_wait_completed_request() when it is called from timeout handler 
* [mlx5] VF Representer naming is not consistent/persistent through reboots with OSPD deployment 
* OS getting restarted because of driver issue with QLogic Corp. ISP2532-based 8Gb Fibre Channel to PCI Express HBA [1077:2532] (rev 02). 
* mlx5: Load balancing not working over VF LAG configuration 
* SL7.8 - ISST-LTE: vimlp1: Running LTP af_alg04.c (crypto) crash the LPAR 
* SL7.5 - Fix security issues on crypto vmx 
* SL 7.7 RC1 - Host crashes about 4.5 hours into switch port bounce test 
* SL7.6 - cacheinfo code unsafe vs LPM 
* xfs hangs on acquiring xfs_buf semaphore 
* single CPU VM hangs during open_posix_testsuite 
* rcu_sched self-detected stall on CPU while booting with nohz_full</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-12-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-debug" release="1062.7.1.el7" src="kernel-3.10.0-1062.7.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1062.7.1.el7.x86_64.rpm</filename><sum type="sha256">39abb1928dc778048af228989a613ed640475ad4b5b68b9238800d14f666b092</sum></package><package arch="x86_64" name="python-perf" release="1062.7.1.el7" src="kernel-3.10.0-1062.7.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1062.7.1.el7.x86_64.rpm</filename><sum type="sha256">6de91cf17dd2e7280cd0981e013787e15d1ba0841da10b30d9084042e3cf588e</sum></package><package arch="noarch" name="kernel-doc" release="1062.7.1.el7" src="kernel-3.10.0-1062.7.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1062.7.1.el7.noarch.rpm</filename><sum type="sha256">fc11413f39840407354d49b4e38278e295ef2e30b207f431cd5bacf69b888287</sum></package><package arch="x86_64" name="kernel" release="1062.7.1.el7" src="kernel-3.10.0-1062.7.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1062.7.1.el7.x86_64.rpm</filename><sum type="sha256">12f68c2dc34e2d7ccbc8bf156dd85f0316bf42db96c6e1510948a9d0fc0a288c</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1062.7.1.el7" src="kernel-3.10.0-1062.7.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1062.7.1.el7.x86_64.rpm</filename><sum type="sha256">98eeefe7ecfacc0326e388561a01f8ee84a1d35de7f2701ba78cb62075d5db12</sum></package><package arch="x86_64" name="perf" release="1062.7.1.el7" src="kernel-3.10.0-1062.7.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1062.7.1.el7.x86_64.rpm</filename><sum type="sha256">7e3c2e04003b37fc9768cae0a10c4a2ce40e8aaa779f2ca9652e5b94b5993b26</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1062.7.1.el7" src="kernel-3.10.0-1062.7.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1062.7.1.el7.noarch.rpm</filename><sum type="sha256">a438b7b20c554eca776065b26d1d529ffef4b9aa43bbfff12130523f8778bbe1</sum></package><package arch="x86_64" name="kernel-headers" release="1062.7.1.el7" src="kernel-3.10.0-1062.7.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1062.7.1.el7.x86_64.rpm</filename><sum type="sha256">3a32873cbbed8e5ebdb299796848c248ffb0d5a4f23f1ec6e9c41c731afba9a1</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1062.7.1.el7" src="kernel-3.10.0-1062.7.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1062.7.1.el7.x86_64.rpm</filename><sum type="sha256">2cc40436ce2a891e9876315d5e6717351b155214c383af466a6b3d74f0dac25b</sum></package><package arch="x86_64" name="kernel-devel" release="1062.7.1.el7" src="kernel-3.10.0-1062.7.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1062.7.1.el7.x86_64.rpm</filename><sum type="sha256">91f31d186b219712f191dfd433a4b563a40502b905e292c9ca680bd206c15bfa</sum></package><package arch="x86_64" name="kernel-tools" release="1062.7.1.el7" src="kernel-3.10.0-1062.7.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1062.7.1.el7.x86_64.rpm</filename><sum type="sha256">a05f3f703007285ffdc03adc54ba4bf7c26642c5a969245258229febcd1b2b8c</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1062.7.1.el7" src="kernel-3.10.0-1062.7.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1062.7.1.el7.x86_64.rpm</filename><sum type="sha256">2a948f8b38d105b33c4ccc795b37faf599e2f54dd0c5168aad7dbda3f8df8954</sum></package><package arch="x86_64" name="bpftool" release="1062.7.1.el7" src="kernel-3.10.0-1062.7.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1062.7.1.el7.x86_64.rpm</filename><sum type="sha256">f59d52d8f5609dd918f9182341b25a0ca13584765df8e35b65a3c6c833956042</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821" id="CVE-2019-14821" title="Kernel: Kvm: Oob Memory Access Via Mmio Ring Buffer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15239" id="CVE-2019-15239" title="Kernel: Local Attacker Can Trigger Multiple " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:3979" id="RHSA-2019:3979-1" title="Rhsa-2019:3979-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1746708" id="1746708" title="Kernel: Kvm: Oob Memory Access Via Mmio Ring Buffer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1747353" id="1747353" title="Kernel: Local Attacker Can Trigger Multiple " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:3981-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* 389-ds-base: Read permission check bypass via the deref plugin (CVE-2019-14824)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-12-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base" release="12.el7_7" src="389-ds-base-1.3.9.1-12.el7_7.src.rpm" version="1.3.9.1"><filename>389-ds-base-1.3.9.1-12.el7_7.x86_64.rpm</filename><sum type="sha256">b992265f3adeae49a77c83e5f54672cf6796ce98fd5448a3f26a986e15aa5107</sum></package><package arch="x86_64" name="389-ds-base-libs" release="12.el7_7" src="389-ds-base-1.3.9.1-12.el7_7.src.rpm" version="1.3.9.1"><filename>389-ds-base-libs-1.3.9.1-12.el7_7.x86_64.rpm</filename><sum type="sha256">55a99fc16001a415a752b2f20efc9e0772d9ebc6333ed708b908e1916a8e6601</sum></package><package arch="x86_64" name="389-ds-base-devel" release="12.el7_7" src="389-ds-base-1.3.9.1-12.el7_7.src.rpm" version="1.3.9.1"><filename>389-ds-base-devel-1.3.9.1-12.el7_7.x86_64.rpm</filename><sum type="sha256">58011db55e171d0323c3a46f9ba670eb7238f2ac237c0cc18edb5103d984d0b1</sum></package><package arch="x86_64" name="389-ds-base-snmp" release="12.el7_7" src="389-ds-base-1.3.9.1-12.el7_7.src.rpm" version="1.3.9.1"><filename>389-ds-base-snmp-1.3.9.1-12.el7_7.x86_64.rpm</filename><sum type="sha256">4019171a26172f2b674748bac8c13149a8ed54ad25277e5d739a41acec71be33</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:3981" id="RHSA-2019:3981-1" title="Rhsa-2019:3981-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:4024-1</id><title>Sdl</title><description>Security Fix(es): 
* SDL: CVE-2019-13616 not fixed in Red Hat Enterprise Linux 7 erratum SLSA-2019:3950 (CVE-2019-14906)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-12-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="SDL-static" release="15.el7_7" src="SDL-1.2.15-15.el7_7.src.rpm" version="1.2.15"><filename>SDL-static-1.2.15-15.el7_7.x86_64.rpm</filename><sum type="sha256">293a9e77f42b6ac238dbc25a06ea0f92b38c120317f76020054303a62493da01</sum></package><package arch="i686" name="SDL-devel" release="15.el7_7" src="SDL-1.2.15-15.el7_7.src.rpm" version="1.2.15"><filename>SDL-devel-1.2.15-15.el7_7.i686.rpm</filename><sum type="sha256">3a76e50692d44dc09850bea3ff25b7c21ac7abebb91941c4138a4a33f694b2f9</sum></package><package arch="x86_64" name="SDL" release="15.el7_7" src="SDL-1.2.15-15.el7_7.src.rpm" version="1.2.15"><filename>SDL-1.2.15-15.el7_7.x86_64.rpm</filename><sum type="sha256">cce6cd575ff5599bb662631eac9fa04f4eb40507f173f520e0351ea04a5b4d16</sum></package><package arch="i686" name="SDL" release="15.el7_7" src="SDL-1.2.15-15.el7_7.src.rpm" version="1.2.15"><filename>SDL-1.2.15-15.el7_7.i686.rpm</filename><sum type="sha256">e92de6951738ca492f73d919a50e030ea58ee36d3168a7e3efbec781e0e74de0</sum></package><package arch="x86_64" name="SDL-devel" release="15.el7_7" src="SDL-1.2.15-15.el7_7.src.rpm" version="1.2.15"><filename>SDL-devel-1.2.15-15.el7_7.x86_64.rpm</filename><sum type="sha256">01325c90ebbdf0c5c78d69ed74342c87433e2e6023d0684a09b57e5a1071a04f</sum></package><package arch="i686" name="SDL-static" release="15.el7_7" src="SDL-1.2.15-15.el7_7.src.rpm" version="1.2.15"><filename>SDL-static-1.2.15-15.el7_7.i686.rpm</filename><sum type="sha256">9d23e24c6f4baa0c7071acd1bb6ae5c5cdd08d50baf2a5abe3bb6faeb3c47ad2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:4024" id="RHSA-2019:4024-1" title="Rhsa-2019:4024-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:4107-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Use-after-free in worker destruction (CVE-2019-17008) 
* Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3  (CVE-2019-17012)      * Mozilla: Buffer overflow in plain text serializer (CVE-2019-17005) 
* Mozilla: Use-after-free when performing device orientation checks  (CVE-2019-17010) 
* Mozilla: Use-after-free when retrieving a document in antitracking  (CVE-2019-17011)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2019-12-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_7" src="firefox-68.3.0-1.el7_7.src.rpm" version="68.3.0"><filename>firefox-68.3.0-1.el7_7.x86_64.rpm</filename><sum type="sha256">89abb1df077335d4923665277810732ccba6049222fc6a3e9ab1adb174ecc535</sum></package><package arch="i686" name="firefox" release="1.el7_7" src="firefox-68.3.0-1.el7_7.src.rpm" version="68.3.0"><filename>firefox-68.3.0-1.el7_7.i686.rpm</filename><sum type="sha256">f09566293d1eb758bdbf38c42be97f21e9e34cf0671bd4e225cb29b79875b13c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005" id="CVE-2019-17005" title="Mozilla: Buffer Overflow In Plain Text Serializer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008" id="CVE-2019-17008" title="Mozilla: Use-After-Free In Worker Destruction" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010" id="CVE-2019-17010" title="Mozilla: Use-After-Free When Performing Device " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011" id="CVE-2019-17011" title="Mozilla: Use-After-Free When Retrieving A " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012" id="CVE-2019-17012" title="Mozilla: Memory Safety Bugs Fixed In Firefox 71 " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:4107" id="RHSA-2019:4107-1" title="Rhsa-2019:4107-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779431" id="1779431" title="Mozilla: Use-After-Free In Worker Destruction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779434" id="1779434" title="Mozilla: Use-After-Free When Performing Device " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779435" id="1779435" title="Mozilla: Buffer Overflow In Plain Text Serializer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779436" id="1779436" title="Mozilla: Use-After-Free When Retrieving A " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779437" id="1779437" title="Mozilla: Memory Safety Bugs Fixed In Firefox 71 " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:4148-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 68.3.0. 
Security Fix(es): 
* Mozilla: Use-after-free in worker destruction (CVE-2019-17008) 
* Mozilla: Memory safety bugs fixed in Firefox 71 and Firefox ESR 68.3 (CVE-2019-17012) 
* Mozilla: Buffer overflow in plain text serializer (CVE-2019-17005) 
* Mozilla: Use-after-free when performing device orientation checks (CVE-2019-17010) 
* Mozilla: Use-after-free when retrieving a document in antitracking (CVE-2019-17011)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-12-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_7" src="thunderbird-68.3.0-1.el7_7.src.rpm" version="68.3.0"><filename>thunderbird-68.3.0-1.el7_7.x86_64.rpm</filename><sum type="sha256">1b5f51e2be8e7df7bf6a3c91d9760cca15d48ed0a074839cab61032d237cbf2b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17005" id="CVE-2019-17005" title="Mozilla: Buffer Overflow In Plain Text Serializer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17008" id="CVE-2019-17008" title="Mozilla: Use-After-Free In Worker Destruction" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17010" id="CVE-2019-17010" title="Mozilla: Use-After-Free When Performing Device " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17011" id="CVE-2019-17011" title="Mozilla: Use-After-Free When Retrieving A " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17012" id="CVE-2019-17012" title="Mozilla: Memory Safety Bugs Fixed In Firefox 71 " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:4148" id="RHSA-2019:4148-1" title="Rhsa-2019:4148-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779431" id="1779431" title="Mozilla: Use-After-Free In Worker Destruction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779434" id="1779434" title="Mozilla: Use-After-Free When Performing Device " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779435" id="1779435" title="Mozilla: Buffer Overflow In Plain Text Serializer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779436" id="1779436" title="Mozilla: Use-After-Free When Retrieving A " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779437" id="1779437" title="Mozilla: Memory Safety Bugs Fixed In Firefox 71 " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:4190-1</id><title>Nss, Nss-Softokn, Nss-Util</title><description>Security Fix(es): 
* nss: Out-of-bounds write when passing an output buffer smaller than the block size to NSC_EncryptUpdate (CVE-2019-11745) 
* nss: Empty or malformed p256-ECDH public keys may trigger a segmentation fault (CVE-2019-11729)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-12-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="nss-softokn-freebl-devel" release="8.el7_7" src="nss-softokn-3.44.0-8.el7_7.src.rpm" version="3.44.0"><filename>nss-softokn-freebl-devel-3.44.0-8.el7_7.i686.rpm</filename><sum type="sha256">941f3150a0fa3ccb16d55ee2fa400f1ec1c6736431d9a94832837a494e929877</sum></package><package arch="i686" name="nss-softokn" release="8.el7_7" src="nss-softokn-3.44.0-8.el7_7.src.rpm" version="3.44.0"><filename>nss-softokn-3.44.0-8.el7_7.i686.rpm</filename><sum type="sha256">efe0b2d8859df15c93ee8dba6852fe618aae28ff6ed5ec7ec577e4106456805c</sum></package><package arch="x86_64" name="nss-devel" release="7.el7_7" src="nss-3.44.0-7.el7_7.src.rpm" version="3.44.0"><filename>nss-devel-3.44.0-7.el7_7.x86_64.rpm</filename><sum type="sha256">f2819cfb2a896de0ff8fbefd23c70e828f220009f55b5aad5d9fe1a883f19b90</sum></package><package arch="i686" name="nss" release="7.el7_7" src="nss-3.44.0-7.el7_7.src.rpm" version="3.44.0"><filename>nss-3.44.0-7.el7_7.i686.rpm</filename><sum type="sha256">4611534576064691157fece9d0c436568b23b63697b85c7bb2ad255e982f10fd</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="8.el7_7" src="nss-softokn-3.44.0-8.el7_7.src.rpm" version="3.44.0"><filename>nss-softokn-freebl-3.44.0-8.el7_7.x86_64.rpm</filename><sum type="sha256">523a80a6b06b06196ccc309739042570ed22193782f08f91e23d4da9d9fb76f7</sum></package><package arch="i686" name="nss-softokn-freebl" release="8.el7_7" src="nss-softokn-3.44.0-8.el7_7.src.rpm" version="3.44.0"><filename>nss-softokn-freebl-3.44.0-8.el7_7.i686.rpm</filename><sum type="sha256">0311ef50716cc00cb2497c68d86f27e765edce722618602dd9b5305fe355ff54</sum></package><package arch="x86_64" name="nss-tools" release="7.el7_7" src="nss-3.44.0-7.el7_7.src.rpm" version="3.44.0"><filename>nss-tools-3.44.0-7.el7_7.x86_64.rpm</filename><sum type="sha256">26d5d9deac7d356e9f809c7a0cb6f6e37f59875afd950925bc60c4191e9a5931</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="8.el7_7" src="nss-softokn-3.44.0-8.el7_7.src.rpm" version="3.44.0"><filename>nss-softokn-freebl-devel-3.44.0-8.el7_7.x86_64.rpm</filename><sum type="sha256">4c5a91e43234e8234f4d56d570abb2d574cff79656d0a43dbb317f05109a5083</sum></package><package arch="i686" name="nss-pkcs11-devel" release="7.el7_7" src="nss-3.44.0-7.el7_7.src.rpm" version="3.44.0"><filename>nss-pkcs11-devel-3.44.0-7.el7_7.i686.rpm</filename><sum type="sha256">e4ca8839e44d9578e63b9258b9ebcd81377a9ba88359506d1a09ffc8debcb859</sum></package><package arch="i686" name="nss-util" release="4.el7_7" src="nss-util-3.44.0-4.el7_7.src.rpm" version="3.44.0"><filename>nss-util-3.44.0-4.el7_7.i686.rpm</filename><sum type="sha256">a81be3bb2c1127550d8a0df16ac39da0e5502d6a3c9679b659f1fb092d316f19</sum></package><package arch="x86_64" name="nss-sysinit" release="7.el7_7" src="nss-3.44.0-7.el7_7.src.rpm" version="3.44.0"><filename>nss-sysinit-3.44.0-7.el7_7.x86_64.rpm</filename><sum type="sha256">154a6576cc083f1254a5c4870c6886c02030f68a8d10da6a726daed45f5d2434</sum></package><package arch="i686" name="nss-devel" release="7.el7_7" src="nss-3.44.0-7.el7_7.src.rpm" version="3.44.0"><filename>nss-devel-3.44.0-7.el7_7.i686.rpm</filename><sum type="sha256">bf5c53e849f81348838a17a0e6a646767f6a62cbbb6cfe4b9d97a8ff5194f9c8</sum></package><package arch="x86_64" name="nss-softokn" release="8.el7_7" src="nss-softokn-3.44.0-8.el7_7.src.rpm" version="3.44.0"><filename>nss-softokn-3.44.0-8.el7_7.x86_64.rpm</filename><sum type="sha256">e839b674ced6fa1a115538fdb0729959822343ce51163fa30bd8a01385e2bf3f</sum></package><package arch="x86_64" name="nss-util" release="4.el7_7" src="nss-util-3.44.0-4.el7_7.src.rpm" version="3.44.0"><filename>nss-util-3.44.0-4.el7_7.x86_64.rpm</filename><sum type="sha256">467c3bcf5d2000a19f0f4aa15c02ccc73d484f4b393d0227183cccd1100ff3af</sum></package><package arch="i686" name="nss-softokn-devel" release="8.el7_7" src="nss-softokn-3.44.0-8.el7_7.src.rpm" version="3.44.0"><filename>nss-softokn-devel-3.44.0-8.el7_7.i686.rpm</filename><sum type="sha256">653c4ecb49f71731370c273ed96c936abcf825f6671d8b19b3390f159219c9f7</sum></package><package arch="x86_64" name="nss-softokn-devel" release="8.el7_7" src="nss-softokn-3.44.0-8.el7_7.src.rpm" version="3.44.0"><filename>nss-softokn-devel-3.44.0-8.el7_7.x86_64.rpm</filename><sum type="sha256">af21dd3d1dda0da8f02f5f18ca35811c03dda3ea095f43f64aa348e254939265</sum></package><package arch="x86_64" name="nss-util-devel" release="4.el7_7" src="nss-util-3.44.0-4.el7_7.src.rpm" version="3.44.0"><filename>nss-util-devel-3.44.0-4.el7_7.x86_64.rpm</filename><sum type="sha256">66c639d5163020550f741153105c4d237d22926f9a5d2ef521c6e2c5d3679854</sum></package><package arch="i686" name="nss-util-devel" release="4.el7_7" src="nss-util-3.44.0-4.el7_7.src.rpm" version="3.44.0"><filename>nss-util-devel-3.44.0-4.el7_7.i686.rpm</filename><sum type="sha256">1f3429b800e8a585946ec771dfbfc21ad92519afb916a9965a7a0e709ddbff40</sum></package><package arch="x86_64" name="nss" release="7.el7_7" src="nss-3.44.0-7.el7_7.src.rpm" version="3.44.0"><filename>nss-3.44.0-7.el7_7.x86_64.rpm</filename><sum type="sha256">7fa0c549868bbf6f4e408a65adf747dda0a339997016c38a5732d97f61cb5ff9</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="7.el7_7" src="nss-3.44.0-7.el7_7.src.rpm" version="3.44.0"><filename>nss-pkcs11-devel-3.44.0-7.el7_7.x86_64.rpm</filename><sum type="sha256">3a29745b29a90e8ff5abbf2d22a9b4cf3b152555e5a53ed7f65cd9c98f8c82ec</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2019:4190" id="RHSA-2019:4190-1" title="Rhsa-2019:4190-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:4240-1</id><title>Openslp</title><description>Security Fix(es): 
* openslp: Heap-based buffer overflow in ProcessSrvRqst() in slpd_process.c leading to remote code execution (CVE-2019-5544)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2019-12-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openslp-server" release="8.el7_7" src="openslp-2.0.0-8.el7_7.src.rpm" version="2.0.0"><filename>openslp-server-2.0.0-8.el7_7.x86_64.rpm</filename><sum type="sha256">cf1e9b66622bea11895ee99e384bc573fc4c9f5bad886b420283fdb785ada711</sum></package><package arch="x86_64" epoch="1" name="openslp-devel" release="8.el7_7" src="openslp-2.0.0-8.el7_7.src.rpm" version="2.0.0"><filename>openslp-devel-2.0.0-8.el7_7.x86_64.rpm</filename><sum type="sha256">c98df762efc91994747387a183e54d6365bfa83bfe74a608d1f42e5f42400d33</sum></package><package arch="x86_64" epoch="1" name="openslp" release="8.el7_7" src="openslp-2.0.0-8.el7_7.src.rpm" version="2.0.0"><filename>openslp-2.0.0-8.el7_7.x86_64.rpm</filename><sum type="sha256">9ac77cb21153493c097256a5a2ab983a048a715805813545403961f2638e2b13</sum></package><package arch="i686" epoch="1" name="openslp-devel" release="8.el7_7" src="openslp-2.0.0-8.el7_7.src.rpm" version="2.0.0"><filename>openslp-devel-2.0.0-8.el7_7.i686.rpm</filename><sum type="sha256">921ff9f839cf1f82ae10b5c90e9a38dfc83b31c8d855e190470a97ecaa0a4f7f</sum></package><package arch="i686" epoch="1" name="openslp" release="8.el7_7" src="openslp-2.0.0-8.el7_7.src.rpm" version="2.0.0"><filename>openslp-2.0.0-8.el7_7.i686.rpm</filename><sum type="sha256">d296cd473e61af81ef0f29f37c8bacf0375e8cb32d97d739b6544e8d78470d6b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5544" id="CVE-2019-5544" title="Openslp: Heap-Based Buffer Overflow In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:4240" id="RHSA-2019:4240-1" title="Rhsa-2019:4240-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1777788" id="1777788" title="Openslp: Heap-Based Buffer Overflow In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2019:4326-1</id><title>Fribidi</title><description>Security Fix(es): 
* fribidi: buffer overflow in fribidi_get_par_embedding_levels_ex() in lib /fribidi-bidi.c leading to denial of service and possible code execution (CVE-2019-18397)</description><severity>important</severity><release>Scientific Linux</release><issued date="2019-12-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="fribidi" release="1.el7_7.1" src="fribidi-1.0.2-1.el7_7.1.src.rpm" version="1.0.2"><filename>fribidi-1.0.2-1.el7_7.1.i686.rpm</filename><sum type="sha256">f23220491cb94364f5aaf4d7064d28a7911b651d5b9a764fb2030d30123e32cb</sum></package><package arch="x86_64" name="fribidi" release="1.el7_7.1" src="fribidi-1.0.2-1.el7_7.1.src.rpm" version="1.0.2"><filename>fribidi-1.0.2-1.el7_7.1.x86_64.rpm</filename><sum type="sha256">89308ed4fcdf6775f0fb546d0dca2cb72ea07aeaa1e040cc1428128cff09b494</sum></package><package arch="x86_64" name="fribidi-devel" release="1.el7_7.1" src="fribidi-1.0.2-1.el7_7.1.src.rpm" version="1.0.2"><filename>fribidi-devel-1.0.2-1.el7_7.1.x86_64.rpm</filename><sum type="sha256">fe5002e289f8bd8a3608a2d08528783ef4ab112e493c2f30043fafded011856d</sum></package><package arch="i686" name="fribidi-devel" release="1.el7_7.1" src="fribidi-1.0.2-1.el7_7.1.src.rpm" version="1.0.2"><filename>fribidi-devel-1.0.2-1.el7_7.1.i686.rpm</filename><sum type="sha256">74ea2da2b06f1945a1675abf0e5141afdb4cb535555ff746917317843fa501ac</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18397" id="CVE-2019-18397" title="Fribidi: Buffer Overflow In " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2019:4326" id="RHSA-2019:4326-1" title="Rhsa-2019:4326-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1768750" id="1768750" title="Fribidi: Buffer Overflow In " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0085-1</id><title>Firefox</title><description>This update upgrades Firefox to version 68.4.1 ESR. 
Security Fix(es): 
* Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement (CVE-2019-17026) 
* Mozilla: Bypass of @namespace CSS sanitization during pasting (CVE-2019-17016) 
* Mozilla: Type Confusion in XPCVariant.cpp (CVE-2019-17017) 
* Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 (CVE-2019-17024) 
* Mozilla: CSS sanitization does not escape HTML tags (CVE-2019-17022)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2020-01-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_7" src="firefox-68.4.1-1.el7_7.src.rpm" version="68.4.1"><filename>firefox-68.4.1-1.el7_7.x86_64.rpm</filename><sum type="sha256">4aa490cb45ccc4e9fec6675b85f620cd1bfbcc04bd4aeb8dea448030d527a946</sum></package><package arch="i686" name="firefox" release="1.el7_7" src="firefox-68.4.1-1.el7_7.src.rpm" version="68.4.1"><filename>firefox-68.4.1-1.el7_7.i686.rpm</filename><sum type="sha256">2431d0595402120a241cd3a5281390b60dfc94fbdd62e111b606eeaf49f57cf5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17016" id="CVE-2019-17016" title="Mozilla: Bypass Of @Namespace Css Sanitization " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17017" id="CVE-2019-17017" title="Mozilla: Type Confusion In Xpcvariant.Cpp" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17022" id="CVE-2019-17022" title="Mozilla: Css Sanitization Does Not Escape Html Tags" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17024" id="CVE-2019-17024" title="Mozilla: Memory Safety Bugs Fixed In Firefox 72 " type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17026" id="CVE-2019-17026" title="Mozilla: Ionmonkey Type Confusion With " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0085" id="RHSA-2020:0085-1" title="Rhsa-2020:0085-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788723" id="1788723" title="Mozilla: Bypass Of @Namespace Css Sanitization " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788724" id="1788724" title="Mozilla: Type Confusion In Xpcvariant.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788726" id="1788726" title="Mozilla: Css Sanitization Does Not Escape Html Tags" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788727" id="1788727" title="Mozilla: Memory Safety Bugs Fixed In Firefox 72 " type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1789214" id="1789214" title="Mozilla: Ionmonkey Type Confusion With " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0120-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement (CVE-2019-17026) 
* Mozilla: Bypass of @namespace CSS sanitization during pasting (CVE-2019-17016) 
* Mozilla: Type Confusion in XPCVariant.cpp (CVE-2019-17017) 
* Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 (CVE-2019-17024) 
* Mozilla: CSS sanitization does not escape HTML tags (CVE-2019-17022)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-01-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_7" src="thunderbird-68.4.1-2.el7_7.src.rpm" version="68.4.1"><filename>thunderbird-68.4.1-2.el7_7.x86_64.rpm</filename><sum type="sha256">6c05501be4091d245f0153f8863cc3778983599079c9ae2b67d7e6bb580d9234</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0120" id="RHSA-2020:0120-1" title="Rhsa-2020:0120-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0122-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Use of unsafe RSA-MD5 checkum in Kerberos TGS (Security, 8229951) (CVE-2020-2601) 
* OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604) 
* OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590) 
* OpenJDK: Incorrect isBuiltinStreamHandler causing URL normalization issues (Networking, 8228548) (CVE-2020-2593) 
* OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) (CVE-2020-2654) 
* OpenJDK: Incorrect handling of unexpected CertificateVerify TLS handshake messages (JSSE, 8231780) (CVE-2020-2655) 
* OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) (CVE-2020-2583)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-01-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-devel-debug-11.0.6.10-1.el7_7.i686.rpm</filename><sum type="sha256">97ae765cbeee8ec11956dfbdf238b7a66fa597391dfb0ec34928fd57c21656d4</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-headless-debug-11.0.6.10-1.el7_7.i686.rpm</filename><sum type="sha256">9466fe9386b85978f950a7a4bcbc2abfe3573c86e9de8c8221dc1fbf7f067b23</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-debug-11.0.6.10-1.el7_7.i686.rpm</filename><sum type="sha256">4fde268e1bea510d818ae7cba8f7cdd265e5589037ed57b38187fe2366379f3c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-javadoc-zip-11.0.6.10-1.el7_7.x86_64.rpm</filename><sum type="sha256">ee7e63a9f2f61c294f9d7f29f56962e4484b5a2f0f142d1a44f9de5e0cf628bf</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-devel-11.0.6.10-1.el7_7.i686.rpm</filename><sum type="sha256">8f07b9baa8145f0aeaa46e4575bb3e444cd88877ed32e0df0de356b99643a003</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-javadoc-zip-11.0.6.10-1.el7_7.i686.rpm</filename><sum type="sha256">bba176e001406d67fda33722105fc510af8366905354aa41155ebb1d56f0f687</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-headless-debug-11.0.6.10-1.el7_7.x86_64.rpm</filename><sum type="sha256">782f5a98996b72ebb6489ad156950ef1bf60a355bec8b91c2bcacd880bf11f70</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-javadoc-11.0.6.10-1.el7_7.i686.rpm</filename><sum type="sha256">8f871e23c71789bad64af1f8feea12b366bdcd52387b725e3a1e3250c5c26afa</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-src-11.0.6.10-1.el7_7.i686.rpm</filename><sum type="sha256">f7bac68361b5f6749deff2f15bca09ce68f0e90345d1fc4ecd0f61ee33eb0d72</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-headless-11.0.6.10-1.el7_7.x86_64.rpm</filename><sum type="sha256">9508ca6aa6fe923e7f535804b2f7e3b4f4743d41c52248316e0947c5088eb550</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-jmods-11.0.6.10-1.el7_7.i686.rpm</filename><sum type="sha256">f432187e025460650af8ddd39f81271752131e6333fd147fee782184421e6c93</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-jmods-debug-11.0.6.10-1.el7_7.i686.rpm</filename><sum type="sha256">03a18a3c29017750e221238a323af071cbd45791fa24fa37b81476cea48dd20e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-jmods-11.0.6.10-1.el7_7.x86_64.rpm</filename><sum type="sha256">583074faa25491cc042b28b6364763ee04796e0ed9a5de0762e04677a4b86966</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-src-11.0.6.10-1.el7_7.x86_64.rpm</filename><sum type="sha256">8aff8370d21a70b02e3a82c6816d9b3c891c469fa9e74e1c17bfe55d7a2b0e03</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-11.0.6.10-1.el7_7.x86_64.rpm</filename><sum type="sha256">ad20cb7c66b78ebfd85edbeb9bbd30fbee2c443380fdffb866587aefcaa9f32b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-jmods-debug-11.0.6.10-1.el7_7.x86_64.rpm</filename><sum type="sha256">9cd1495b028add1aac2ece538889bebd80b76ca9c301f4c127bc30b83dbff8f5</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-demo-debug-11.0.6.10-1.el7_7.x86_64.rpm</filename><sum type="sha256">6b66d63dba28010b036df871aa158a1e9029b27c98d7467a246373e61a6b4635</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-demo-11.0.6.10-1.el7_7.i686.rpm</filename><sum type="sha256">982b457d0f4f444034db792078ed62dd4f942c6b608a00f292bd3f7f5e9e7100</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-javadoc-debug-11.0.6.10-1.el7_7.x86_64.rpm</filename><sum type="sha256">0104b3362fee91c162d2cde754448b2c94218fec823ef25ba2900f841dd914cd</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-demo-11.0.6.10-1.el7_7.x86_64.rpm</filename><sum type="sha256">19c3c4c047d984c360d6a173b8f6e589abcbef395a491ed4805191a87510c725</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-javadoc-11.0.6.10-1.el7_7.x86_64.rpm</filename><sum type="sha256">c654e206ed4db458dfb49f7f7b8849a49e931694de95636149978abc2efac452</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-src-debug-11.0.6.10-1.el7_7.i686.rpm</filename><sum type="sha256">7fe91221d1054f71eb57406ffddb0270ccb9080bb3347236698a4b47e4e266fc</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-devel-debug-11.0.6.10-1.el7_7.x86_64.rpm</filename><sum type="sha256">0b2697cc94e1ee86af1c9907291334fd0c818d15b3fe3e35ddd27979887f173d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-devel-11.0.6.10-1.el7_7.x86_64.rpm</filename><sum type="sha256">68ef645650acffb65d6a2c5ae1cb4a97f5bda0f577f166c143fdc25cbfd8f4d1</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-debug-11.0.6.10-1.el7_7.x86_64.rpm</filename><sum type="sha256">8ad8632f4ef253fdcf6a9f28b008f0d450b485621334370f22bebbd7b933e181</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-javadoc-debug-11.0.6.10-1.el7_7.i686.rpm</filename><sum type="sha256">a229a04f8ae72eee06af2aa012a1abc75b185c5aabfcdea2cf6f384e60fd988e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-demo-debug-11.0.6.10-1.el7_7.i686.rpm</filename><sum type="sha256">dbd47feefa9fae9e88d3327a9d707aa6141f6b6cdcc1ba4f076c1b73bc684154</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-src-debug-11.0.6.10-1.el7_7.x86_64.rpm</filename><sum type="sha256">0445e384bfb46d4f947d923911c1aee5d5146c27b92f8e95eb5b9b170d961795</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-headless-11.0.6.10-1.el7_7.i686.rpm</filename><sum type="sha256">da79afceedac1f62d98bd98f1df34e87e16fc677a018dc4f0803ec1cf0032cb4</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-javadoc-zip-debug-11.0.6.10-1.el7_7.i686.rpm</filename><sum type="sha256">aadf5c6cc37786f2e77b4fd4d66901615ecc7ac8f736f64e847ac8752910f0bf</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-javadoc-zip-debug-11.0.6.10-1.el7_7.x86_64.rpm</filename><sum type="sha256">f1320700ea6f52db3b6f48b7a7a0e0f328002ea4192228952b844a920699a705</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_7" src="java-11-openjdk-11.0.6.10-1.el7_7.src.rpm" version="11.0.6.10"><filename>java-11-openjdk-11.0.6.10-1.el7_7.i686.rpm</filename><sum type="sha256">c116ade9eb3aaa4d988ab341a10c6c93b7f7405ef595946d00597ac69908ac8c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0122" id="RHSA-2020:0122-1" title="Rhsa-2020:0122-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0124-1</id><title>Git</title><description>Security Fix(es): 
* git: Remote code execution in recursive clones with nested submodules (CVE-2019-1387)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-01-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="perl-Git-SVN" release="21.el7_7" src="git-1.8.3.1-21.el7_7.src.rpm" version="1.8.3.1"><filename>perl-Git-SVN-1.8.3.1-21.el7_7.noarch.rpm</filename><sum type="sha256">2162b4c4e3a4fe9429fb8f79b9cc60b51c936d81f98a12880db86ee82e5db6df</sum></package><package arch="noarch" name="git-cvs" release="21.el7_7" src="git-1.8.3.1-21.el7_7.src.rpm" version="1.8.3.1"><filename>git-cvs-1.8.3.1-21.el7_7.noarch.rpm</filename><sum type="sha256">e3ddd2591519c91d33a7e6013b708b2aaf5cf0aa5f6913444b39ad32bbbb055b</sum></package><package arch="noarch" name="gitweb" release="21.el7_7" src="git-1.8.3.1-21.el7_7.src.rpm" version="1.8.3.1"><filename>gitweb-1.8.3.1-21.el7_7.noarch.rpm</filename><sum type="sha256">7793132e4c0a4e8b2491e9981318b0e0590980d6197bcb160714ad3c4de34069</sum></package><package arch="noarch" name="git-email" release="21.el7_7" src="git-1.8.3.1-21.el7_7.src.rpm" version="1.8.3.1"><filename>git-email-1.8.3.1-21.el7_7.noarch.rpm</filename><sum type="sha256">8677bb51033b8e57cd430dcf3ba44fb615a86b4869c06e9ce498dcb4dd2f7254</sum></package><package arch="noarch" name="git-p4" release="21.el7_7" src="git-1.8.3.1-21.el7_7.src.rpm" version="1.8.3.1"><filename>git-p4-1.8.3.1-21.el7_7.noarch.rpm</filename><sum type="sha256">59820b8ba25495b7537c5244a4c858a5ac32acfdab9273aad57b02cf458ef429</sum></package><package arch="x86_64" name="git-gnome-keyring" release="21.el7_7" src="git-1.8.3.1-21.el7_7.src.rpm" version="1.8.3.1"><filename>git-gnome-keyring-1.8.3.1-21.el7_7.x86_64.rpm</filename><sum type="sha256">a09ba4abf7020ac72edef850b93450ab580db4de8d4755dd80ca97d5f0705fd7</sum></package><package arch="x86_64" name="git-daemon" release="21.el7_7" src="git-1.8.3.1-21.el7_7.src.rpm" version="1.8.3.1"><filename>git-daemon-1.8.3.1-21.el7_7.x86_64.rpm</filename><sum type="sha256">b52884597fee974fb795368aa996853bdec90aecb52d8f8f4add9d3720d2a6e6</sum></package><package arch="noarch" name="emacs-git" release="21.el7_7" src="git-1.8.3.1-21.el7_7.src.rpm" version="1.8.3.1"><filename>emacs-git-1.8.3.1-21.el7_7.noarch.rpm</filename><sum type="sha256">55fe3fcf0420f5ffb8c862609b1d0029075878d3d17f5fd5c25f684634169593</sum></package><package arch="noarch" name="emacs-git-el" release="21.el7_7" src="git-1.8.3.1-21.el7_7.src.rpm" version="1.8.3.1"><filename>emacs-git-el-1.8.3.1-21.el7_7.noarch.rpm</filename><sum type="sha256">88d3b6e815f9772b45905a3b0926c84bb2ea6f205059b65f046fe835f5646891</sum></package><package arch="noarch" name="git-hg" release="21.el7_7" src="git-1.8.3.1-21.el7_7.src.rpm" version="1.8.3.1"><filename>git-hg-1.8.3.1-21.el7_7.noarch.rpm</filename><sum type="sha256">44751bed36d37955072044905935ea836a0b972b14ed6c952371c92112996073</sum></package><package arch="noarch" name="git-bzr" release="21.el7_7" src="git-1.8.3.1-21.el7_7.src.rpm" version="1.8.3.1"><filename>git-bzr-1.8.3.1-21.el7_7.noarch.rpm</filename><sum type="sha256">212f7c7629db3c765683edd906cc286df814b6f875a53436a31366c14ac23484</sum></package><package arch="noarch" name="git-gui" release="21.el7_7" src="git-1.8.3.1-21.el7_7.src.rpm" version="1.8.3.1"><filename>git-gui-1.8.3.1-21.el7_7.noarch.rpm</filename><sum type="sha256">82e75213647d7bf65cf382f79da4a8b6678ac9e837e9be0855b51ae40f91339c</sum></package><package arch="noarch" name="git-all" release="21.el7_7" src="git-1.8.3.1-21.el7_7.src.rpm" version="1.8.3.1"><filename>git-all-1.8.3.1-21.el7_7.noarch.rpm</filename><sum type="sha256">9dde44bfdc20f5627cb4216183e9557699628cc83782cbf1b6e0df5287cec9dc</sum></package><package arch="x86_64" name="git" release="21.el7_7" src="git-1.8.3.1-21.el7_7.src.rpm" version="1.8.3.1"><filename>git-1.8.3.1-21.el7_7.x86_64.rpm</filename><sum type="sha256">1b445597abd8d68dcf18948d039addcfd692d8205d3eda3d1c5db6eff96d9ce5</sum></package><package arch="noarch" name="gitk" release="21.el7_7" src="git-1.8.3.1-21.el7_7.src.rpm" version="1.8.3.1"><filename>gitk-1.8.3.1-21.el7_7.noarch.rpm</filename><sum type="sha256">0342933206ac0bb2366a48dde0501437316b2b7637fd7354b49094920ee0a0d3</sum></package><package arch="x86_64" name="git-svn" release="21.el7_7" src="git-1.8.3.1-21.el7_7.src.rpm" version="1.8.3.1"><filename>git-svn-1.8.3.1-21.el7_7.x86_64.rpm</filename><sum type="sha256">12ed98b88a25be6a728aa8cd409024be313172dd2f371b9e4aa732c5471358d4</sum></package><package arch="noarch" name="git-instaweb" release="21.el7_7" src="git-1.8.3.1-21.el7_7.src.rpm" version="1.8.3.1"><filename>git-instaweb-1.8.3.1-21.el7_7.noarch.rpm</filename><sum type="sha256">cae388a2afbaa98b888bfffcc9415a61d84f0b3eb034a6d2ee9bb16270b26f83</sum></package><package arch="noarch" name="perl-Git" release="21.el7_7" src="git-1.8.3.1-21.el7_7.src.rpm" version="1.8.3.1"><filename>perl-Git-1.8.3.1-21.el7_7.noarch.rpm</filename><sum type="sha256">2b5d813c223b8790dde195188fe45200c3598ff53d6f5d401609a34023895f45</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0124" id="RHSA-2020:0124-1" title="Rhsa-2020:0124-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0194-1</id><title>Apache-Commons-Beanutils</title><description>Security Fix(es): 
* apache-commons-beanutils: does not suppresses the class property in PropertyUtilsBean by default (CVE-2019-10086)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-01-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="apache-commons-beanutils-javadoc" release="15.el7_7" src="apache-commons-beanutils-1.8.3-15.el7_7.src.rpm" version="1.8.3"><filename>apache-commons-beanutils-javadoc-1.8.3-15.el7_7.noarch.rpm</filename><sum type="sha256">98b472b18fe8bce810c08ec0eb26380bb9d3ca4d7866497494c0b6dccfe96537</sum></package><package arch="noarch" name="apache-commons-beanutils" release="15.el7_7" src="apache-commons-beanutils-1.8.3-15.el7_7.src.rpm" version="1.8.3"><filename>apache-commons-beanutils-1.8.3-15.el7_7.noarch.rpm</filename><sum type="sha256">c99ec5164423f9a4793b49d48da92c1c593d3db669d7952c876d0e68be87774f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10086" id="CVE-2019-10086" title="Apache-Commons-Beanutils: Does Not Suppresses " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0194" id="RHSA-2020:0194-1" title="Rhsa-2020:0194-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1767483" id="1767483" title="Apache-Commons-Beanutils: Does Not Suppresses " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0195-1</id><title>Python-Reportlab</title><description>Security Fix(es): 
* python-reportlab: code injection in colors.py allows attacker to execute code (CVE-2019-17626)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-01-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-reportlab-docs" release="9.el7_7.1" src="python-reportlab-2.5-9.el7_7.1.src.rpm" version="2.5"><filename>python-reportlab-docs-2.5-9.el7_7.1.x86_64.rpm</filename><sum type="sha256">552b0e526e06517730dba733e3a0dddcb3b8fe8f8a0d506121a4035de8d18d47</sum></package><package arch="x86_64" name="python-reportlab" release="9.el7_7.1" src="python-reportlab-2.5-9.el7_7.1.src.rpm" version="2.5"><filename>python-reportlab-2.5-9.el7_7.1.x86_64.rpm</filename><sum type="sha256">9b8b87477716bc1f8d3eb4606f506f551de3d2497707bbfcc687b73e0d3ca438</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0195" id="RHSA-2020:0195-1" title="Rhsa-2020:0195-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0196-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Use of unsafe RSA-MD5 checkum in Kerberos TGS (Security, 8229951) (CVE-2020-2601) 
* OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604) 
* OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590) 
* OpenJDK: Incorrect isBuiltinStreamHandler causing URL normalization issues (Networking, 8228548) (CVE-2020-2593) 
* OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) (CVE-2020-2654) 
* OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) (CVE-2020-2583) 
* OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) (CVE-2020-2659)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-01-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.242.b08-0.el7_7.i686.rpm</filename><sum type="sha256">9a167c41dd208870d7c4a3faf51063e782cb271f0d03e33bbc8a23d852bc8f0b</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-src-1.8.0.242.b08-0.el7_7.i686.rpm</filename><sum type="sha256">1e3f5120658683ef11266980fb73e716ce6f5ce5e85ceb70619361fdbe32f439</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm</filename><sum type="sha256">54f427fae1f961eeccdd6ce68781fc25e36c60cabceb5e463fd2f698f110ecd2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm</filename><sum type="sha256">8e595ea034bbc56eabf461822f1fb05ee57189f13b8e89534dc92ee838aba601</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-javadoc-1.8.0.242.b08-0.el7_7.noarch.rpm</filename><sum type="sha256">2bf617aa79566f04338d46fd346890a0cbf2692a611969c924ccc250c334eb5a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-src-1.8.0.242.b08-0.el7_7.x86_64.rpm</filename><sum type="sha256">2f9f51b77cff48b013c101e4d0900d67f71d890f799c5fc1050e39b4cdc3460f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.242.b08-0.el7_7.i686.rpm</filename><sum type="sha256">1069f2a144663f0f77c4c8399dc3b204fae780c074cb68cbdd981ddf6dc10a4b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm</filename><sum type="sha256">945ea95869f62cb6402a5627cb778c8a148dc630666f937df8375c59aa3bc123</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.242.b08-0.el7_7.noarch.rpm</filename><sum type="sha256">409d3e08400259e30329c170048a427e1a2b646b6d77e7761c3c2a35d8e61660</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm</filename><sum type="sha256">8b46f74609d899f3b396168af5fdb47bfab16504d3382421dcaf0305d5fecad0</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.242.b08-0.el7_7.i686.rpm</filename><sum type="sha256">70d7a907059f3e12da66053252d7410c3197a72d366896e61e57218a34170d23</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.242.b08-0.el7_7.noarch.rpm</filename><sum type="sha256">b04084dddc589b56a6ae619e6ee1eaa28636c5b2aa84bed11548f84d8c819fcf</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.242.b08-0.el7_7.x86_64.rpm</filename><sum type="sha256">ecaafd42f5f76eea1ffb23f93266e2d0003f5de71b9236ed135d30a1bed32f1d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.x86_64.rpm</filename><sum type="sha256">828eff829769a5e9519e271dbbce2fb6cfb89519cd8b56f5224eeb6af62f9fb2</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.242.b08-0.el7_7.i686.rpm</filename><sum type="sha256">717497708a7033e571f0f61b766dd9b821e28591865950ee91c75e439697d91c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.242.b08-0.el7_7.i686.rpm</filename><sum type="sha256">97ede619a9fd73e4c82efa6ac461acfad400361cc7e277c031b492938f9b90de</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.242.b08-0.el7_7.x86_64.rpm</filename><sum type="sha256">c7ff935e2150da10bff47654775843f2be10f7386240a46726d15b683d3b3180</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.242.b08-0.el7_7.i686.rpm</filename><sum type="sha256">81535722a060ca73b844ccd67037288957ab4e34b004c56144283782ef9cdd21</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm</filename><sum type="sha256">b9627b00aa20032ac92db4800e2a63052a707998240877f9f8741395ef171bf3</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.242.b08-0.el7_7.noarch.rpm</filename><sum type="sha256">c43a14ff50e420e6082bac4a82779bd60007788385ff054e5ad1da323b28f166</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.242.b08-0.el7_7.i686.rpm</filename><sum type="sha256">b5f0b5d6e2a6ef88c9f3d85e9a2eacbf49d11c76b98dbd431d627115bc9158aa</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.i686.rpm</filename><sum type="sha256">be1bab845e1ee4dbe1bf9489d05f087f960d62a912727003a32698cedd4fff79</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.242.b08-0.el7_7.x86_64.rpm</filename><sum type="sha256">b4461162baf7612da51d42eda654400f705f5a9997dd83adabecc52394a4a54d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.242.b08-0.el7_7.x86_64.rpm</filename><sum type="sha256">555fd3f9099bb49f1086b7836e77bd53bc8e3a3a3a34de9f60a86bc9fdc46745</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.242.b08-0.el7_7.i686.rpm</filename><sum type="sha256">f53471a410d34ac7af37504154b62f31db9956b19d66ef587284b7add44da770</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.242.b08-0.el7_7.i686.rpm</filename><sum type="sha256">80ba983246e92994235e5e94124e153adf3500dd7de03a9a7a0848fcd927a680</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.242.b08-0.el7_7.i686.rpm</filename><sum type="sha256">bce06ef2bbc9489fd94641c4b08dc21fc4a202467002cab62ccdbd621d7f2b4d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el7_7" src="java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.src.rpm" version="1.8.0.242.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.242.b08-0.el7_7.x86_64.rpm</filename><sum type="sha256">e7d6174e3bce4adcc115f2a3b19931108e4dcac42d1c5a8a457306b8aff10371</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0196" id="RHSA-2020:0196-1" title="Rhsa-2020:0196-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0203-1</id><title>Libarchive</title><description>Security Fix(es): 
* libarchive: use-after-free in archive_read_format_rar_read_data when there is an error in the decompression of an archive entry (CVE-2019-18408)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-01-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libarchive-devel" release="14.el7_7" src="libarchive-3.1.2-14.el7_7.src.rpm" version="3.1.2"><filename>libarchive-devel-3.1.2-14.el7_7.i686.rpm</filename><sum type="sha256">0cc2f7ac0c5642186c3bb5779bdfc5da651bedf7dea87c67a382a2f5f882c8c3</sum></package><package arch="x86_64" name="bsdtar" release="14.el7_7" src="libarchive-3.1.2-14.el7_7.src.rpm" version="3.1.2"><filename>bsdtar-3.1.2-14.el7_7.x86_64.rpm</filename><sum type="sha256">732525fbb720279190f83af5754f64c2250f78e82ab6313060bc0b341f595b3d</sum></package><package arch="x86_64" name="bsdcpio" release="14.el7_7" src="libarchive-3.1.2-14.el7_7.src.rpm" version="3.1.2"><filename>bsdcpio-3.1.2-14.el7_7.x86_64.rpm</filename><sum type="sha256">a64a51142a141052495c4650493174d99da67f794fb65e944a88b4081bb4b7cb</sum></package><package arch="x86_64" name="libarchive" release="14.el7_7" src="libarchive-3.1.2-14.el7_7.src.rpm" version="3.1.2"><filename>libarchive-3.1.2-14.el7_7.x86_64.rpm</filename><sum type="sha256">653ab086e559d2ea562d3073828890e147e7cf1b8f91e5db63cee52891f78342</sum></package><package arch="i686" name="libarchive" release="14.el7_7" src="libarchive-3.1.2-14.el7_7.src.rpm" version="3.1.2"><filename>libarchive-3.1.2-14.el7_7.i686.rpm</filename><sum type="sha256">aa6ab41a43076a37c860ee2cdd9d3487098b7c3b566a43e0092b0f9b168f2522</sum></package><package arch="x86_64" name="libarchive-devel" release="14.el7_7" src="libarchive-3.1.2-14.el7_7.src.rpm" version="3.1.2"><filename>libarchive-devel-3.1.2-14.el7_7.x86_64.rpm</filename><sum type="sha256">525e61608db869772013cdb15b5ce0b7545b244dae4cf25d1dd55848dcd83ef2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0203" id="RHSA-2020:0203-1" title="Rhsa-2020:0203-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0227-1</id><title>Sqlite</title><description>Security Fix(es): 
* sqlite: fts3: improve shadow table corruption detection (CVE-2019-13734)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-01-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="sqlite-devel" release="8.el7_7.1" src="sqlite-3.7.17-8.el7_7.1.src.rpm" version="3.7.17"><filename>sqlite-devel-3.7.17-8.el7_7.1.x86_64.rpm</filename><sum type="sha256">b5a69b5f1a960930d0f34a03be888d4f4e2b6dd8fba5c9da541fb0bcb8456369</sum></package><package arch="i686" name="sqlite-devel" release="8.el7_7.1" src="sqlite-3.7.17-8.el7_7.1.src.rpm" version="3.7.17"><filename>sqlite-devel-3.7.17-8.el7_7.1.i686.rpm</filename><sum type="sha256">ca45feae55907951d999f8818ee9865005e86c0500a16f622ccd3f7c375baf8a</sum></package><package arch="x86_64" name="lemon" release="8.el7_7.1" src="sqlite-3.7.17-8.el7_7.1.src.rpm" version="3.7.17"><filename>lemon-3.7.17-8.el7_7.1.x86_64.rpm</filename><sum type="sha256">d6e23b6e2a6da0722a873983ff4d758feff99a4dbdd7a4f8647f758a848a9d52</sum></package><package arch="noarch" name="sqlite-doc" release="8.el7_7.1" src="sqlite-3.7.17-8.el7_7.1.src.rpm" version="3.7.17"><filename>sqlite-doc-3.7.17-8.el7_7.1.noarch.rpm</filename><sum type="sha256">6c5be22ed80b7408119ab9e7f5c6f3d393d72b975fc20d05aeae0ce412d822ab</sum></package><package arch="i686" name="sqlite" release="8.el7_7.1" src="sqlite-3.7.17-8.el7_7.1.src.rpm" version="3.7.17"><filename>sqlite-3.7.17-8.el7_7.1.i686.rpm</filename><sum type="sha256">3e0cd96e1b8cc53c760b2efc78c5d8360eefc98b8e1ad712adee4e7848d3fc8c</sum></package><package arch="x86_64" name="sqlite" release="8.el7_7.1" src="sqlite-3.7.17-8.el7_7.1.src.rpm" version="3.7.17"><filename>sqlite-3.7.17-8.el7_7.1.x86_64.rpm</filename><sum type="sha256">ee7fbbd791f47640b5db00cfb874ea2f3f3cd0758ecbb80e2b04a8dc7c5fe91a</sum></package><package arch="x86_64" name="sqlite-tcl" release="8.el7_7.1" src="sqlite-3.7.17-8.el7_7.1.src.rpm" version="3.7.17"><filename>sqlite-tcl-3.7.17-8.el7_7.1.x86_64.rpm</filename><sum type="sha256">680e8ccf7fa92f2e7b687cb21f9283abe50a7c54dc473302113298a9e648eb1a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0227" id="RHSA-2020:0227-1" title="Rhsa-2020:0227-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0262-1</id><title>Openjpeg2</title><description>Security Fix(es): 
* openjpeg: Heap-based buffer overflow in opj_t1_clbl_decode_processor() (CVE-2020-6851)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-01-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="openjpeg2" release="2.el7_7" src="openjpeg2-2.3.1-2.el7_7.src.rpm" version="2.3.1"><filename>openjpeg2-2.3.1-2.el7_7.i686.rpm</filename><sum type="sha256">f09c869a14d0330b165ab26324c5bbadb8029f032c0672157a42ef68193d675d</sum></package><package arch="noarch" name="openjpeg2-devel-docs" release="2.el7_7" src="openjpeg2-2.3.1-2.el7_7.src.rpm" version="2.3.1"><filename>openjpeg2-devel-docs-2.3.1-2.el7_7.noarch.rpm</filename><sum type="sha256">bfa8c48a10425ac5047a8488da6103d0035e7ec9475414b1e0b1da54ffada79d</sum></package><package arch="i686" name="openjpeg2-tools" release="2.el7_7" src="openjpeg2-2.3.1-2.el7_7.src.rpm" version="2.3.1"><filename>openjpeg2-tools-2.3.1-2.el7_7.i686.rpm</filename><sum type="sha256">153826fc6f578eb08adfd6a77557d883f21492db8fd9998307ef95ea81db4b6d</sum></package><package arch="x86_64" name="openjpeg2" release="2.el7_7" src="openjpeg2-2.3.1-2.el7_7.src.rpm" version="2.3.1"><filename>openjpeg2-2.3.1-2.el7_7.x86_64.rpm</filename><sum type="sha256">0443ad8a7880ca1f0988a3e112cf07f6285ec90f4012ada8c5452713470de4d5</sum></package><package arch="x86_64" name="openjpeg2-devel" release="2.el7_7" src="openjpeg2-2.3.1-2.el7_7.src.rpm" version="2.3.1"><filename>openjpeg2-devel-2.3.1-2.el7_7.x86_64.rpm</filename><sum type="sha256">40793a6523c6cfc309b1bdc3011668e172ab89d1dccebf401700f99f68e15341</sum></package><package arch="x86_64" name="openjpeg2-tools" release="2.el7_7" src="openjpeg2-2.3.1-2.el7_7.src.rpm" version="2.3.1"><filename>openjpeg2-tools-2.3.1-2.el7_7.x86_64.rpm</filename><sum type="sha256">9bb74281089d3b27094cd36f8af97785c1137618b330499117651ad701e3fd68</sum></package><package arch="i686" name="openjpeg2-devel" release="2.el7_7" src="openjpeg2-2.3.1-2.el7_7.src.rpm" version="2.3.1"><filename>openjpeg2-devel-2.3.1-2.el7_7.i686.rpm</filename><sum type="sha256">6fe1720011f65c9d1acfb6506fa903d786e062be3f3ff178bb3329dbcb7e5812</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0262" id="RHSA-2020:0262-1" title="Rhsa-2020:0262-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0366-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* hw: TSX Transaction Asynchronous Abort (TAA) (CVE-2019-11135) 
* QEMU: slirp: heap buffer overflow during packet reassembly (CVE-2019-14378)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-02-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="167.el7_7.4" src="qemu-kvm-1.5.3-167.el7_7.4.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-167.el7_7.4.x86_64.rpm</filename><sum type="sha256">99adb41d4bfacb07a0f99829ece6b0f309d1953227001682f38b00d0a879ebab</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="167.el7_7.4" src="qemu-kvm-1.5.3-167.el7_7.4.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-167.el7_7.4.x86_64.rpm</filename><sum type="sha256">3b041f07cb95a6fd5a4a231ce47b8dba86e520510a53602ca794b093d4cf6777</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="167.el7_7.4" src="qemu-kvm-1.5.3-167.el7_7.4.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-167.el7_7.4.x86_64.rpm</filename><sum type="sha256">e4cb8aecb40be801731a1d7d39f14f967faac4f7795d78ce7b35160e02c690c8</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="167.el7_7.4" src="qemu-kvm-1.5.3-167.el7_7.4.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-167.el7_7.4.x86_64.rpm</filename><sum type="sha256">a6cc5f4fde94c75bc6a0d69d46703eb62937195ebd1fa5d9c4d12c4ae2051b17</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0366" id="RHSA-2020:0366-1" title="Rhsa-2020:0366-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0374-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver (CVE-2019-14816) 
* kernel: heap-based buffer overflow in mwifiex_process_country_ie() function in drivers/net/wireless/marvell/mwifiex/sta_ioctl.c (CVE-2019-14895) 
* kernel: heap overflow in marvell/mwifiex/tdls.c (CVE-2019-14901) 
* kernel: buffer overflow in cfg80211_mgd_wext_giwessid in net/wireless/wext-sme.c (CVE-2019-17133) 
* kernel: incomplete fix  for race condition between mmget_not_zero()/get_task_mm() and core dumping in CVE-2019-11599 (CVE-2019-14898) 
Bug Fix(es): 
* [Azure][7.8] Include patch "PCI: hv: Avoid use of hv_pci_dev-&gt;pci_slot after freeing it" 
* [Hyper-V][SL7.8] When accelerated networking is enabled on RedHat, network interface(eth0) moved to new network namespace does not obtain IP address. 
* [Azure][SL 7.6] hv_vmbus probe pass-through GPU card failed 
* SMB3: Do not error out on large file transfers if server responds with STATUS_INSUFFICIENT_RESOURCES 
* Since SL commit 5330f5d09820 high load can cause dm-multipath path failures 
* Hard lockup in free_one_page()-&gt;_raw_spin_lock() because sosreport command is reading from /proc/pagetypeinfo 
* patchset for x86/atomic: Fix smp_mb__{before,after}_atomic() 
* fix compat statfs64() returning EOVERFLOW for when _FILE_OFFSET_BITS=64 
* Guest crash after load cpuidle-haltpoll driver 
* SL 7.7 long I/O stalls with bnx2fc from not masking off scope bits of retry delay value 
* Multiple "mv" processes hung on a gfs2 filesystem 
* Moving Egress IP will result in conntrack sessions being DESTROYED 
* core: backports from upstream 
* kernel BUG at arch/powerpc/platforms/pseries/lpar.c:482! 
* Race between tty_open() and flush_to_ldisc()  using the tty_struct-&gt;driver_data field.</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-02-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools" release="1062.12.1.el7" src="kernel-3.10.0-1062.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1062.12.1.el7.x86_64.rpm</filename><sum type="sha256">678df641a81fd93cbfcfd40920cedc1f3b7e3695150d5a6fbbbd6d0cf6047513</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1062.12.1.el7" src="kernel-3.10.0-1062.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1062.12.1.el7.x86_64.rpm</filename><sum type="sha256">c9b728fae4d85bbaa20e176cfb00f642e1bf1802b02cdfe9d39e04204b34098e</sum></package><package arch="x86_64" name="kernel-headers" release="1062.12.1.el7" src="kernel-3.10.0-1062.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1062.12.1.el7.x86_64.rpm</filename><sum type="sha256">7c973327b37ca38c1e700823e7d01b0a8ad4155122feff8e419ec4693b9544d6</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1062.12.1.el7" src="kernel-3.10.0-1062.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1062.12.1.el7.noarch.rpm</filename><sum type="sha256">398c5671cb36044813412900d10d37b55e14d95923c9aa7e6c34d2533e17074a</sum></package><package arch="x86_64" name="kernel" release="1062.12.1.el7" src="kernel-3.10.0-1062.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1062.12.1.el7.x86_64.rpm</filename><sum type="sha256">fdc18e2f637c04eb92abb2650a37f186a50e15cbff8ae56ec296b36f445b3726</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1062.12.1.el7" src="kernel-3.10.0-1062.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1062.12.1.el7.x86_64.rpm</filename><sum type="sha256">27c77dcaaa3fe4662dc2e6bc7352cdf3e6f9324aa2b7288f00c9770e93e41503</sum></package><package arch="x86_64" name="kernel-devel" release="1062.12.1.el7" src="kernel-3.10.0-1062.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1062.12.1.el7.x86_64.rpm</filename><sum type="sha256">3615f4a9cb7aef285bba47f901242445161a4d16151a884dffa01b1d254ecbe1</sum></package><package arch="x86_64" name="python-perf" release="1062.12.1.el7" src="kernel-3.10.0-1062.12.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1062.12.1.el7.x86_64.rpm</filename><sum type="sha256">9a4501600513edf7980b6e201a2e836f68ec90cb6ebee4c664f0be81583675a1</sum></package><package arch="noarch" name="kernel-doc" release="1062.12.1.el7" src="kernel-3.10.0-1062.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1062.12.1.el7.noarch.rpm</filename><sum type="sha256">ac4ed5265d0c02061c41193a3e12bd3165ee5617ba628f7a410c51e799bbbeed</sum></package><package arch="x86_64" name="perf" release="1062.12.1.el7" src="kernel-3.10.0-1062.12.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1062.12.1.el7.x86_64.rpm</filename><sum type="sha256">0b7fa3d1f43787e42f8e74e62e1ac0296eccac6c793f188f1c0b2a7dfeccf02f</sum></package><package arch="x86_64" name="bpftool" release="1062.12.1.el7" src="kernel-3.10.0-1062.12.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1062.12.1.el7.x86_64.rpm</filename><sum type="sha256">ba9aad83c3de995708bb3d7e5c4400567bced1b4a48e6dcbebec70a3554ade34</sum></package><package arch="x86_64" name="kernel-debug" release="1062.12.1.el7" src="kernel-3.10.0-1062.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1062.12.1.el7.x86_64.rpm</filename><sum type="sha256">7f2d6bac01fefb630bb4ca6a05d83353c73f76da24066efbce6f3268dfcdd2dd</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1062.12.1.el7" src="kernel-3.10.0-1062.12.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1062.12.1.el7.x86_64.rpm</filename><sum type="sha256">342c41e6e16dc17163d2267929ffa6f1491110dedfaaf35bab5a704936acbbde</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0374" id="RHSA-2020:0374-1" title="Rhsa-2020:0374-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0378-1</id><title>Ipa</title><description>Security Fix(es): 
* ipa: Denial of service in IPA server due to wrong use of ber_scanf() (CVE-2019-14867) 
* ipa: Batch API logging user passwords to /var/log/httpd/error_log (CVE-2019-10195)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-02-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ipa-common" release="11.sl7_7.4" src="ipa-4.6.5-11.sl7_7.4.src.rpm" version="4.6.5"><filename>ipa-common-4.6.5-11.sl7_7.4.noarch.rpm</filename><sum type="sha256">7b1852d36bbbb09d30b24b0e293eccc434ddc2a65d3abc1d2c9ef5ba0e5ba9f2</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="11.sl7_7.4" src="ipa-4.6.5-11.sl7_7.4.src.rpm" version="4.6.5"><filename>ipa-server-trust-ad-4.6.5-11.sl7_7.4.x86_64.rpm</filename><sum type="sha256">f5abcf4e281590b38d237213acc0e59332574d773c928d459351330dbf74508b</sum></package><package arch="noarch" name="python2-ipaserver" release="11.sl7_7.4" src="ipa-4.6.5-11.sl7_7.4.src.rpm" version="4.6.5"><filename>python2-ipaserver-4.6.5-11.sl7_7.4.noarch.rpm</filename><sum type="sha256">3cbd6ff946df6c34a43dfa8fb1615fdc67e8720d50472e55842135fd15ed29c2</sum></package><package arch="noarch" name="ipa-python-compat" release="11.sl7_7.4" src="ipa-4.6.5-11.sl7_7.4.src.rpm" version="4.6.5"><filename>ipa-python-compat-4.6.5-11.sl7_7.4.noarch.rpm</filename><sum type="sha256">1bf34c8b0f25e6b952e5d5fd343547fac2794336494ce1b691ddf142e16b1aa8</sum></package><package arch="x86_64" name="ipa-server" release="11.sl7_7.4" src="ipa-4.6.5-11.sl7_7.4.src.rpm" version="4.6.5"><filename>ipa-server-4.6.5-11.sl7_7.4.x86_64.rpm</filename><sum type="sha256">180de961de0bbfd64888fe7cea257f8810a0d33f1988a676f3f3101209f39cae</sum></package><package arch="noarch" name="ipa-client-common" release="11.sl7_7.4" src="ipa-4.6.5-11.sl7_7.4.src.rpm" version="4.6.5"><filename>ipa-client-common-4.6.5-11.sl7_7.4.noarch.rpm</filename><sum type="sha256">8eb3f12e3b3269fd7e2e1820d364f04e13b0ea3b9e1d942d3a949d095d531d96</sum></package><package arch="noarch" name="python2-ipalib" release="11.sl7_7.4" src="ipa-4.6.5-11.sl7_7.4.src.rpm" version="4.6.5"><filename>python2-ipalib-4.6.5-11.sl7_7.4.noarch.rpm</filename><sum type="sha256">3c48403dcaf45da4932abc0c519589dc679e551079e797d45f012c6508b2dd80</sum></package><package arch="x86_64" name="ipa-client" release="11.sl7_7.4" src="ipa-4.6.5-11.sl7_7.4.src.rpm" version="4.6.5"><filename>ipa-client-4.6.5-11.sl7_7.4.x86_64.rpm</filename><sum type="sha256">8e63051595bbc6af6bbe7b1983b42a7a1dee191f8abc0154e1b9ec0001cefcab</sum></package><package arch="noarch" name="ipa-server-common" release="11.sl7_7.4" src="ipa-4.6.5-11.sl7_7.4.src.rpm" version="4.6.5"><filename>ipa-server-common-4.6.5-11.sl7_7.4.noarch.rpm</filename><sum type="sha256">e79c2d28aa6faea4ed498c4596a5e92002655dd4111c77196959179583bc2d45</sum></package><package arch="noarch" name="python2-ipaclient" release="11.sl7_7.4" src="ipa-4.6.5-11.sl7_7.4.src.rpm" version="4.6.5"><filename>python2-ipaclient-4.6.5-11.sl7_7.4.noarch.rpm</filename><sum type="sha256">6479a9dc9ce9df5ecfaa1c2408f54463d7415548556c0baba3e578df3705b1b1</sum></package><package arch="noarch" name="ipa-server-dns" release="11.sl7_7.4" src="ipa-4.6.5-11.sl7_7.4.src.rpm" version="4.6.5"><filename>ipa-server-dns-4.6.5-11.sl7_7.4.noarch.rpm</filename><sum type="sha256">0f822699bbbc6ae9a621e00d1ce688119df166a78d70b62f4017f745a87362a6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0378" id="RHSA-2020:0378-1" title="Rhsa-2020:0378-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0520-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Missing bounds check on shared memory read in the parent process (CVE-2020-6796) 
* Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5 (CVE-2020-6800) 
* Mozilla: Incorrect parsing of template tag could result in JavaScript injection (CVE-2020-6798)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-02-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="2.el7_7" src="firefox-68.5.0-2.el7_7.src.rpm" version="68.5.0"><filename>firefox-68.5.0-2.el7_7.x86_64.rpm</filename><sum type="sha256">175699e39486c45858d9496ca1230e1c8e4e5463d9b10e1bde45897184fc2fa9</sum></package><package arch="i686" name="firefox" release="2.el7_7" src="firefox-68.5.0-2.el7_7.src.rpm" version="68.5.0"><filename>firefox-68.5.0-2.el7_7.i686.rpm</filename><sum type="sha256">6e1418713ff4949b278fe5595f3765f83bb173b149ac7e7dfc6cdca2f4a3c371</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0520" id="RHSA-2020:0520-1" title="Rhsa-2020:0520-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0540-1</id><title>Sudo</title><description>Security Fix(es): 
* sudo: Stack based buffer overflow when pwfeedback is enabled (CVE-2019-18634)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-02-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="sudo" release="4.el7_7.2" src="sudo-1.8.23-4.el7_7.2.src.rpm" version="1.8.23"><filename>sudo-1.8.23-4.el7_7.2.x86_64.rpm</filename><sum type="sha256">2a0983d382baccae0a2b20635df66f8b45e4e68d86ef99a6b50bb616dc918d54</sum></package><package arch="x86_64" name="sudo-devel" release="4.el7_7.2" src="sudo-1.8.23-4.el7_7.2.src.rpm" version="1.8.23"><filename>sudo-devel-1.8.23-4.el7_7.2.x86_64.rpm</filename><sum type="sha256">a280d8794e307450fc85171837c769e3c856446f27f634156f3475d1ba08f08d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0540" id="RHSA-2020:0540-1" title="Rhsa-2020:0540-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0541-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) (CVE-2020-2601) 
* OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604) 
* OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590) 
* OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) (CVE-2020-2593) 
* OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) (CVE-2020-2654) 
* OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) (CVE-2020-2583) 
* OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) (CVE-2020-2659)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-02-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.21.0.el7_7" src="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el7_7.src.rpm" version="1.7.0.251"><filename>java-1.7.0-openjdk-headless-1.7.0.251-2.6.21.0.el7_7.x86_64.rpm</filename><sum type="sha256">c8e3bd91e252b8f5e256f40f4e09a6cead43df4a8bef5c439f9576b9d7231520</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.21.0.el7_7" src="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el7_7.src.rpm" version="1.7.0.251"><filename>java-1.7.0-openjdk-javadoc-1.7.0.251-2.6.21.0.el7_7.noarch.rpm</filename><sum type="sha256">74ecb156bebeb43b8cc843c9288642ad923b7a0e949874a79239a7b401df7509</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.21.0.el7_7" src="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el7_7.src.rpm" version="1.7.0.251"><filename>java-1.7.0-openjdk-demo-1.7.0.251-2.6.21.0.el7_7.x86_64.rpm</filename><sum type="sha256">f7a70c4f7609c54b5b62dd0a3cad5056a67b02219804a1d3d16c5a7d07113aac</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.21.0.el7_7" src="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el7_7.src.rpm" version="1.7.0.251"><filename>java-1.7.0-openjdk-src-1.7.0.251-2.6.21.0.el7_7.x86_64.rpm</filename><sum type="sha256">21039ad614cb33f7d1315a6d9d39d16f9ff72b64a3801eda4783ff2c24e6388f</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.21.0.el7_7" src="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el7_7.src.rpm" version="1.7.0.251"><filename>java-1.7.0-openjdk-accessibility-1.7.0.251-2.6.21.0.el7_7.x86_64.rpm</filename><sum type="sha256">1943f705c257331671a603efd1ad86f98bb4ecc5a5d84b4ce103fcd993dfa7c4</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.21.0.el7_7" src="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el7_7.src.rpm" version="1.7.0.251"><filename>java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el7_7.x86_64.rpm</filename><sum type="sha256">cee782279d763c673ae4068f27c6e7db66c7b109fd11fe02ba9196471ebc4594</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.21.0.el7_7" src="java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el7_7.src.rpm" version="1.7.0.251"><filename>java-1.7.0-openjdk-devel-1.7.0.251-2.6.21.0.el7_7.x86_64.rpm</filename><sum type="sha256">f7ebfb5ed0c2c10ad6f70180fe640a0141b2d7065c2fb4c1b506e1e67c78e12b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0541" id="RHSA-2020:0541-1" title="Rhsa-2020:0541-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0550-1</id><title>Openjpeg2</title><description>Security Fix(es): 
* openjpeg: heap-based buffer overflow in pj_t1_clbl_decode_processor in openjp2/t1.c (CVE-2020-8112)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-02-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="openjpeg2" release="3.el7_7" src="openjpeg2-2.3.1-3.el7_7.src.rpm" version="2.3.1"><filename>openjpeg2-2.3.1-3.el7_7.i686.rpm</filename><sum type="sha256">059dde7537851f6dc7756c7bdf8aa7af0d7bb0ee04f3c0c8d9c409a9d2df8be5</sum></package><package arch="x86_64" name="openjpeg2-tools" release="3.el7_7" src="openjpeg2-2.3.1-3.el7_7.src.rpm" version="2.3.1"><filename>openjpeg2-tools-2.3.1-3.el7_7.x86_64.rpm</filename><sum type="sha256">e03f2c1aba39f70bd1d7c9e3d77729393488fe0e990f2f2f3e7648fe46c13ee0</sum></package><package arch="x86_64" name="openjpeg2" release="3.el7_7" src="openjpeg2-2.3.1-3.el7_7.src.rpm" version="2.3.1"><filename>openjpeg2-2.3.1-3.el7_7.x86_64.rpm</filename><sum type="sha256">c58a91b3d8572df5ec1035fb963a50ba14dcc86475cf50b3b834ac5aab1b0775</sum></package><package arch="noarch" name="openjpeg2-devel-docs" release="3.el7_7" src="openjpeg2-2.3.1-3.el7_7.src.rpm" version="2.3.1"><filename>openjpeg2-devel-docs-2.3.1-3.el7_7.noarch.rpm</filename><sum type="sha256">01290ac606e5820379fb688b6b0a05694ab57949d49ce3bda6dad2a29f45d69a</sum></package><package arch="i686" name="openjpeg2-devel" release="3.el7_7" src="openjpeg2-2.3.1-3.el7_7.src.rpm" version="2.3.1"><filename>openjpeg2-devel-2.3.1-3.el7_7.i686.rpm</filename><sum type="sha256">ef22a60d67a2ae98a63f471d8a7d5da921466f4207d65c24b9925de29980ffc4</sum></package><package arch="x86_64" name="openjpeg2-devel" release="3.el7_7" src="openjpeg2-2.3.1-3.el7_7.src.rpm" version="2.3.1"><filename>openjpeg2-devel-2.3.1-3.el7_7.x86_64.rpm</filename><sum type="sha256">126b0e9f6dc38e0a18205f32290e367a0428e2d8fe8f5ff4336fc5c30f87a040</sum></package><package arch="i686" name="openjpeg2-tools" release="3.el7_7" src="openjpeg2-2.3.1-3.el7_7.src.rpm" version="2.3.1"><filename>openjpeg2-tools-2.3.1-3.el7_7.i686.rpm</filename><sum type="sha256">9a42e995d4c9dab1bfd4a120a13374673ce443cf28352490c947ed06b7b19bc3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0550" id="RHSA-2020:0550-1" title="Rhsa-2020:0550-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0568-1</id><title>Ksh</title><description>Security Fix(es): 
ksh: certain environment variables interpreted as arithmetic expressions on startup, leading to code injection (CVE-2019-14868)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-02-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ksh" release="140.el7_7" src="ksh-20120801-140.el7_7.src.rpm" version="20120801"><filename>ksh-20120801-140.el7_7.x86_64.rpm</filename><sum type="sha256">93ea15c7942bc73a8cfe8a36c20d8304b5496c2167369b073240d5e6ae6df625</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0568" id="RHSA-2020:0568-1" title="Rhsa-2020:0568-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0576-1</id><title>Thunderbird</title><description>Security Fix(es): 
Mozilla: Memory safety bugs fixed in Firefox 73 and Firefox ESR 68.5 (CVE-2020-6800) Mozilla: Out-of-bounds read when processing certain email messages (CVE-2020-6793) Mozilla: Setting a master password post-Thunderbird 52 does not delete unencrypted previously stored passwords (CVE-2020-6794) Mozilla: Crash processing S/MIME messages with multiple signatures (CVE-2020-6795) Mozilla: Incorrect parsing of template tag could result in JavaScript injection (CVE-2020-6798) Mozilla: Message ID calculation was based on uninitialized data (CVE-2020-6792)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-02-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_7" src="thunderbird-68.5.0-1.el7_7.src.rpm" version="68.5.0"><filename>thunderbird-68.5.0-1.el7_7.x86_64.rpm</filename><sum type="sha256">6f1cf3ad1169f6cb72de7698056e27375e33b76776d55bb4d66b0f980a8cf0d7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0576" id="RHSA-2020:0576-1" title="Rhsa-2020:0576-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0578-1</id><title>Python-Pillow</title><description>Security Fix(es): 
python-pillow: improperly restricted operations on memory buffer in libImaging/PcxDecode.c (CVE-2020-5312) python-pillow: reading specially crafted image files leads to allocation of large amounts of memory and denial of service (CVE-2019-16865)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-02-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-pillow-tk" release="20.gitd1c6db8.el7_7" src="python-pillow-2.0.0-20.gitd1c6db8.el7_7.src.rpm" version="2.0.0"><filename>python-pillow-tk-2.0.0-20.gitd1c6db8.el7_7.x86_64.rpm</filename><sum type="sha256">9a01184939d4815d1cdf54eb3e445ae68eb4dd48a904fd4a7ea01a6dca75bdae</sum></package><package arch="x86_64" name="python-pillow-sane" release="20.gitd1c6db8.el7_7" src="python-pillow-2.0.0-20.gitd1c6db8.el7_7.src.rpm" version="2.0.0"><filename>python-pillow-sane-2.0.0-20.gitd1c6db8.el7_7.x86_64.rpm</filename><sum type="sha256">eb876da3a660b89a307f203226b1ff473d9b64fe3ddc0a15be72894c03045f28</sum></package><package arch="x86_64" name="python-pillow-devel" release="20.gitd1c6db8.el7_7" src="python-pillow-2.0.0-20.gitd1c6db8.el7_7.src.rpm" version="2.0.0"><filename>python-pillow-devel-2.0.0-20.gitd1c6db8.el7_7.x86_64.rpm</filename><sum type="sha256">89d889079dd5ee2a4530d0515c42222630fb30d8943c6c2ee44c442fd8d58a49</sum></package><package arch="x86_64" name="python-pillow" release="20.gitd1c6db8.el7_7" src="python-pillow-2.0.0-20.gitd1c6db8.el7_7.src.rpm" version="2.0.0"><filename>python-pillow-2.0.0-20.gitd1c6db8.el7_7.x86_64.rpm</filename><sum type="sha256">cd338138e9b4f1fcf2af4c0f14634bcc575cf00a1f2d5eb75e8270b3507ce12b</sum></package><package arch="i686" name="python-pillow-devel" release="20.gitd1c6db8.el7_7" src="python-pillow-2.0.0-20.gitd1c6db8.el7_7.src.rpm" version="2.0.0"><filename>python-pillow-devel-2.0.0-20.gitd1c6db8.el7_7.i686.rpm</filename><sum type="sha256">8ee0e753216a22e34ae1b1e71a2d14fe83e7e2fe98cc6bb91cd5233edbc39432</sum></package><package arch="x86_64" name="python-pillow-qt" release="20.gitd1c6db8.el7_7" src="python-pillow-2.0.0-20.gitd1c6db8.el7_7.src.rpm" version="2.0.0"><filename>python-pillow-qt-2.0.0-20.gitd1c6db8.el7_7.x86_64.rpm</filename><sum type="sha256">1ba70357d951b45b0ef0898a4703285e8bad8a63af13244cdc10e6949becaa77</sum></package><package arch="i686" name="python-pillow" release="20.gitd1c6db8.el7_7" src="python-pillow-2.0.0-20.gitd1c6db8.el7_7.src.rpm" version="2.0.0"><filename>python-pillow-2.0.0-20.gitd1c6db8.el7_7.i686.rpm</filename><sum type="sha256">eebb3e573fb8538d36ddfd7a8678b1924d86b045ffbe28e74cda0f2ec4cf1767</sum></package><package arch="x86_64" name="python-pillow-doc" release="20.gitd1c6db8.el7_7" src="python-pillow-2.0.0-20.gitd1c6db8.el7_7.src.rpm" version="2.0.0"><filename>python-pillow-doc-2.0.0-20.gitd1c6db8.el7_7.x86_64.rpm</filename><sum type="sha256">d59f714fb4d82265456809b87f7638150234709fc68f7f9c9bf3d083b28bdfe0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0578" id="RHSA-2020:0578-1" title="Rhsa-2020:0578-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0630-1</id><title>Ppp</title><description>Security Fix(es): 
* ppp: Buffer overflow in the eap_request and eap_response functions in eap.c (CVE-2020-8597)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-02-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ppp-devel" release="34.el7_7" src="ppp-2.4.5-34.el7_7.src.rpm" version="2.4.5"><filename>ppp-devel-2.4.5-34.el7_7.x86_64.rpm</filename><sum type="sha256">e7c6832368636f2a647dbb994be772bb4f325bbd6f38c7895f3cd3ea56fd56e9</sum></package><package arch="i686" name="ppp-devel" release="34.el7_7" src="ppp-2.4.5-34.el7_7.src.rpm" version="2.4.5"><filename>ppp-devel-2.4.5-34.el7_7.i686.rpm</filename><sum type="sha256">bbcd5ab1611f1a4a2323afd1ba11d1cd870992757ee25b16ac785226d4d31b3c</sum></package><package arch="x86_64" name="ppp" release="34.el7_7" src="ppp-2.4.5-34.el7_7.src.rpm" version="2.4.5"><filename>ppp-2.4.5-34.el7_7.x86_64.rpm</filename><sum type="sha256">8468a95c88796f4c58d3a4f765c31f42cf7fe38d1a715e4a324316d28aa67c05</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8597" id="CVE-2020-8597" title="Ppp: Buffer Overflow In The Eap_Request And " type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0630" id="RHSA-2020:0630-1" title="Rhsa-2020:0630-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1800727" id="1800727" title="Ppp: Buffer Overflow In The Eap_Request And " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0703-1</id><title>Http-Parser</title><description>Security Fix(es): 
* nodejs: HTTP request smuggling using malformed Transfer-Encoding header (CVE-2019-15605)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-03-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="http-parser-devel" release="8.el7_7.2" src="http-parser-2.7.1-8.el7_7.2.src.rpm" version="2.7.1"><filename>http-parser-devel-2.7.1-8.el7_7.2.x86_64.rpm</filename><sum type="sha256">6a61bc6d5de0d5f50ea54528de095131f9b4f07a7f8f0a41004b6fbdb56a9a3c</sum></package><package arch="i686" name="http-parser" release="8.el7_7.2" src="http-parser-2.7.1-8.el7_7.2.src.rpm" version="2.7.1"><filename>http-parser-2.7.1-8.el7_7.2.i686.rpm</filename><sum type="sha256">4a9b2db6354b8d42a3aac260c026d6a04ef1f6993c1a588c6d6e60e787b342f7</sum></package><package arch="i686" name="http-parser-devel" release="8.el7_7.2" src="http-parser-2.7.1-8.el7_7.2.src.rpm" version="2.7.1"><filename>http-parser-devel-2.7.1-8.el7_7.2.i686.rpm</filename><sum type="sha256">ac4a73bc8cf0b942d7543272ee7c600262bb5572db23273638f60d9b3723e679</sum></package><package arch="x86_64" name="http-parser" release="8.el7_7.2" src="http-parser-2.7.1-8.el7_7.2.src.rpm" version="2.7.1"><filename>http-parser-2.7.1-8.el7_7.2.x86_64.rpm</filename><sum type="sha256">6a50ce65455a4f6b584e1406473a4892f8c61a9d88e42865cb7f5f8b63fa30ac</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15605" id="CVE-2019-15605" title="Nodejs: Http Request Smuggling Using Malformed Transfer-Encoding Header" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0703" id="RHSA-2020:0703-1" title="Rhsa-2020:0703-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1800364" id="1800364" title="Nodejs: Http Request Smuggling Using Malformed Transfer-Encoding Header" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0704-1</id><title>Xerces-C</title><description>Security Fix(es): 
* xerces-c: XML parser contains a use-after-free error triggered during the scanning of external DTDs (CVE-2018-1311)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-03-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xerces-c-devel" release="10.el7_7" src="xerces-c-3.1.1-10.el7_7.src.rpm" version="3.1.1"><filename>xerces-c-devel-3.1.1-10.el7_7.x86_64.rpm</filename><sum type="sha256">9c6982620609b837e25da54ccf1372ab92a7560d05c0d4c46bbfa45e43187285</sum></package><package arch="i686" name="xerces-c-devel" release="10.el7_7" src="xerces-c-3.1.1-10.el7_7.src.rpm" version="3.1.1"><filename>xerces-c-devel-3.1.1-10.el7_7.i686.rpm</filename><sum type="sha256">9dcb5caccbdd245eaa140b4783824ba134030677850b03bc837eb816d54bf6d8</sum></package><package arch="i686" name="xerces-c" release="10.el7_7" src="xerces-c-3.1.1-10.el7_7.src.rpm" version="3.1.1"><filename>xerces-c-3.1.1-10.el7_7.i686.rpm</filename><sum type="sha256">0c961eedcb6caadf75f6d2fedd84f5da31b524edc2aa77d223a71281d47262df</sum></package><package arch="noarch" name="xerces-c-doc" release="10.el7_7" src="xerces-c-3.1.1-10.el7_7.src.rpm" version="3.1.1"><filename>xerces-c-doc-3.1.1-10.el7_7.noarch.rpm</filename><sum type="sha256">2de81100d58f2179f44e8dab3a6b632ec359946a90c91bfd1f9e324bf9a9e258</sum></package><package arch="x86_64" name="xerces-c" release="10.el7_7" src="xerces-c-3.1.1-10.el7_7.src.rpm" version="3.1.1"><filename>xerces-c-3.1.1-10.el7_7.x86_64.rpm</filename><sum type="sha256">187263e91b89b8e7563d2819ac02c758c7e06b7ffeecc222617d9c6b001d52bc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1311" id="CVE-2018-1311" title="Xerces-C: Xml Parser Contains A Use-After-Free Error Triggered During The Scanning Of External Dtds" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0704" id="RHSA-2020:0704-1" title="Rhsa-2020:0704-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788472" id="1788472" title="Xerces-C: Xml Parser Contains A Use-After-Free Error Triggered During The Scanning Of External Dtds" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0815-1</id><title>Firefox</title><description>This update upgrades Firefox to version 68.6.0 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free when removing data about origins (CVE-2020-6805) 
* Mozilla: BodyStream::OnInputStreamReady was missing protections against state confusion (CVE-2020-6806) 
* Mozilla: Use-after-free in cubeb during stream destruction (CVE-2020-6807) 
* Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6 (CVE-2020-6814) 
* Mozilla: Out of bounds reads in sctp_load_addresses_from_init (CVE-2019-20503) 
* Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website- controlled data, potentially leading to command injection (CVE-2020-6811) 
* Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission (CVE-2020-6812)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-03-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_7" src="firefox-68.6.0-1.el7_7.src.rpm" version="68.6.0"><filename>firefox-68.6.0-1.el7_7.i686.rpm</filename><sum type="sha256">88cb26207d17f77e32c4410bfe7397ce686f318d2750b82a29b190af4bde8f9a</sum></package><package arch="x86_64" name="firefox" release="1.el7_7" src="firefox-68.6.0-1.el7_7.src.rpm" version="68.6.0"><filename>firefox-68.6.0-1.el7_7.x86_64.rpm</filename><sum type="sha256">58086f74ec53209bcfa1174c6501b4695ce714acb0a3fe0b6ce47640eaa58936</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20503" id="CVE-2019-20503" title="Mozilla: Out Of Bounds Reads In Sctp_Load_Addresses_From_Init" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6805" id="CVE-2020-6805" title="Mozilla: Use-After-Free When Removing Data About Origins" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6806" id="CVE-2020-6806" title="Mozilla: Bodystream::Oninputstreamready Was Missing Protections Against State Confusion" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6807" id="CVE-2020-6807" title="Mozilla: Use-After-Free In Cubeb During Stream Destruction" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6811" id="CVE-2020-6811" title="Mozilla: Devtools' 'Copy As Curl' Feature Did Not Fully Escape Website-Controlled Data, Potentially Leading To Command Injection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6812" id="CVE-2020-6812" title="Mozilla: The Names Of Airpods With Personally Identifiable Information Were Exposed To Websites With Camera Or Microphone Permission" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6814" id="CVE-2020-6814" title="Mozilla: Memory Safety Bugs Fixed In Firefox 74 And Firefox Esr 68.6" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0815" id="RHSA-2020:0815-1" title="Rhsa-2020:0815-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1812199" id="1812199" title="Mozilla: Use-After-Free When Removing Data About Origins" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1812200" id="1812200" title="Mozilla: Bodystream::Oninputstreamready Was Missing Protections Against State Confusion" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1812201" id="1812201" title="Mozilla: Use-After-Free In Cubeb During Stream Destruction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1812202" id="1812202" title="Mozilla: Devtools' 'Copy As Curl' Feature Did Not Fully Escape Website-Controlled Data, Potentially Leading To Command Injection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1812203" id="1812203" title="Mozilla: Out Of Bounds Reads In Sctp_Load_Addresses_From_Init" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1812204" id="1812204" title="Mozilla: The Names Of Airpods With Personally Identifiable Information Were Exposed To Websites With Camera Or Microphone Permission" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1812205" id="1812205" title="Mozilla: Memory Safety Bugs Fixed In Firefox 74 And Firefox Esr 68.6" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0834-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: Count overflow in FUSE request leading to use-after-free issues. (CVE-2019-11487) 
* kernel: rtl_p2p_noa_ie in drivers/net/wireless/realtek/rtlwifi/ps.c in the Linux kernel lacks a certain upper-bound check, leading to a buffer overflow (CVE-2019-17666) 
* Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135) (CVE-2019-19338) 
Bug Fix(es): 
* SL7.7 - default idle mishandles lazy irq state 
* Sanitize MM backported code for SL7 
* A bio with a flush and write to an md device can be lost and never complete by the md layer 
* [FJ7.7 Bug]: [REG] Read from /proc/net/if_inet6 never stop. 
* SL7.7 - zfcp: fix reaction on bit error threshold notification 
* SL7.7 Snapshot3 - Kernel Panic when running LTP mm test on s390x 
* Leak in cachefiles driver 
* VFS: Busy inodes after unmount of loop0 when encountering duplicate directory inodes 
* Allocation failure in md's r10buf_pool_alloc function leads to a crash from accessing uninitialized pointers 
* [Hyper-V][SL7.6]Hyper-V guest waiting indefinitely for RCU callback when removing a mem cgroup 
* A bnx2fc abort attempt doesn't timeout from miscalculation causing a huge timeout value 
* scsi: libiscsi: fall back to sendmsg for slab pages 
* SL7.7 - kernel: avoid cpu yield in SMT environment 
* SL7.6 - kernel: jump label transformation performance 
* drm radeon power management warning on VERDE cards 
* Duplicate enum value in include/linux/blk_types.h 
* [HPE 7.7 Bug] hpsa: bug fix for reset issue 
* System Crash on vport creation (NPIV on FCoE) 
* [Hyper-V][SL 7.8] Four Mellanox Patches needed for kernels that have that have SRIOV 
* WARNING: CPU: 7 PID: 2049 at mm/slub.c:2296 ___slab_alloc+0x508/0x520 
* fio with ioengine=pmemblk on fsdax failed 
* [HPE 7.7 Bug] hpsa: bug fixes 
* perf top -p PID does not show anything 
* Delay in RT task scheduled. Incorrect nr_scheduled value. 
* A directory on a gfs2 filesystem appears corrupt on nodeB after nodeA renames the directory 
* ixgbevf interface goes down on hypervisor and causes outage 
* Can't enable virt-ssbd on some AMD hosts 
* [HPEMC 7.8 BUG] x86/boot/64: Avoid mapping reserved ranges in early page tables 
Enhancement(s): 
* scsi: qla2xxx: Fix panic in qla_dfs_tgt_counters_show'</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-03-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="bpftool" release="1062.18.1.el7" src="kernel-3.10.0-1062.18.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1062.18.1.el7.x86_64.rpm</filename><sum type="sha256">15b27b60c6abec50a3e579a2fbe9b44cc6a79e0822c38d319edecf5f47c781cd</sum></package><package arch="noarch" name="kernel-doc" release="1062.18.1.el7" src="kernel-3.10.0-1062.18.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1062.18.1.el7.noarch.rpm</filename><sum type="sha256">04fbe850802d58e3b2e3687f2140db4842e6a2054a6de580b8c43e7b4de6e461</sum></package><package arch="x86_64" name="kernel" release="1062.18.1.el7" src="kernel-3.10.0-1062.18.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1062.18.1.el7.x86_64.rpm</filename><sum type="sha256">ad2d3f07961fa26652945b0eefb2c831d1d31ab0aaaa424dd0f3bf5beef4ae9c</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1062.18.1.el7" src="kernel-3.10.0-1062.18.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1062.18.1.el7.x86_64.rpm</filename><sum type="sha256">384b51e810e0668328ba8b978c03167475cbb00c0b73ccf0bdd096d81582964c</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1062.18.1.el7" src="kernel-3.10.0-1062.18.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1062.18.1.el7.x86_64.rpm</filename><sum type="sha256">fdcebc135c16d897fcebdc49df9bb55ef9163e12e98b36f62d7502fc4697e29f</sum></package><package arch="x86_64" name="kernel-devel" release="1062.18.1.el7" src="kernel-3.10.0-1062.18.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1062.18.1.el7.x86_64.rpm</filename><sum type="sha256">c529d11d6cb3f355d9e270b8ef0a1bda91fa3e7b1615e6777897c084a047081d</sum></package><package arch="x86_64" name="perf" release="1062.18.1.el7" src="kernel-3.10.0-1062.18.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1062.18.1.el7.x86_64.rpm</filename><sum type="sha256">4d3ae0654a52d68aa7d5d98a45c85dbe69fa91882d4d9287af9c36799da54fda</sum></package><package arch="x86_64" name="kernel-headers" release="1062.18.1.el7" src="kernel-3.10.0-1062.18.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1062.18.1.el7.x86_64.rpm</filename><sum type="sha256">55a7bb9d091432175915295858c27501d3ecd67c827ab4cd67b36428aa83817f</sum></package><package arch="x86_64" name="kernel-debug" release="1062.18.1.el7" src="kernel-3.10.0-1062.18.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1062.18.1.el7.x86_64.rpm</filename><sum type="sha256">4139f61327cbe9ce9d5fb33866ef7527ec0f0b1b63bd3870c16df70cdd279bae</sum></package><package arch="x86_64" name="python-perf" release="1062.18.1.el7" src="kernel-3.10.0-1062.18.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1062.18.1.el7.x86_64.rpm</filename><sum type="sha256">8d82ad81a6f1143e244f3e5e51401be1457b0c831d68f7ddf4bb4af9d318b0ce</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1062.18.1.el7" src="kernel-3.10.0-1062.18.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1062.18.1.el7.noarch.rpm</filename><sum type="sha256">b374b706c3ee5f983ad07eab2356a7cb81a67ca5731eff4c1bac1831cf863cf1</sum></package><package arch="x86_64" name="kernel-tools" release="1062.18.1.el7" src="kernel-3.10.0-1062.18.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1062.18.1.el7.x86_64.rpm</filename><sum type="sha256">e9512b3c7e9cd4dfab6d46b9bb16edd69daeb3db60ed86dc742272e123d6a1c1</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1062.18.1.el7" src="kernel-3.10.0-1062.18.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1062.18.1.el7.x86_64.rpm</filename><sum type="sha256">1ab2836bce97f4f239e4ede7fc9416cc514c5a6682eff353adebd449953c8430</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11487" id="CVE-2019-11487" title="Kernel: Count Overflow In Fuse Request Leading To Use-After-Free Issues." type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17666" id="CVE-2019-17666" title="Kernel: Rtl_P2P_Noa_Ie In Drivers/Net/Wireless/Realtek/Rtlwifi/Ps.C In The Linux Kernel Lacks A Certain Upper-Bound Check, Leading To A Buffer Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19338" id="CVE-2019-19338" title="Kernel: Kvm: Export Msr_Ia32_Tsx_Ctrl To Guest - Incomplete Fix For Taa (Cve-2019-11135)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0834" id="RHSA-2020:0834-1" title="Rhsa-2020:0834-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1703063" id="1703063" title="Kernel: Count Overflow In Fuse Request Leading To Use-After-Free Issues." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1763690" id="1763690" title="Kernel: Rtl_P2P_Noa_Ie In Drivers/Net/Wireless/Realtek/Rtlwifi/Ps.C In The Linux Kernel Lacks A Certain Upper-Bound Check, Leading To A Buffer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1781514" id="1781514" title="Kernel: Kvm: Export Msr_Ia32_Tsx_Ctrl To Guest - Incomplete Fix For Taa (Cve-2019-11135)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0850-1</id><title>Python-Pip</title><description>Security Fix(es): 
* python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) 
* python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) 
* python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324) 
* python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-03-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python3-pip" release="7.el7_7" src="python-pip-9.0.3-7.el7_7.src.rpm" version="9.0.3"><filename>python3-pip-9.0.3-7.el7_7.noarch.rpm</filename><sum type="sha256">c18ccab066d89eae69c10565c5b66be611fe72b63f49403109a1f648343e2b7b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18074" id="CVE-2018-18074" title="Cve-2018-18074" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20060" id="CVE-2018-20060" title="Cve-2018-20060" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11236" id="CVE-2019-11236" title="Cve-2019-11236" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11324" id="CVE-2019-11324" title="Python-Urllib3: Certification Mishandle When Error Should Be Thrown" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0850" id="RHSA-2020:0850-1" title="Rhsa-2020:0850-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1643829" id="1643829" title="Cve-2018-18074 Python-Requests: Redirect From Https To Http Does Not Remove Authorization Header" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1649153" id="1649153" title="Cve-2018-20060 Python-Urllib3: Cross-Host Redirect Does Not Remove Authorization Header Allow For Credential Exposure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700824" id="1700824" title="Cve-2019-11236 Python-Urllib3: Crlf Injection Due To Not Encoding The '\R\N' Sequence Leading To Possible Attack On Internal Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1702473" id="1702473" title="Python-Urllib3: Certification Mishandle When Error Should Be Thrown" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0851-1</id><title>Python-Virtualenv</title><description>Security Fix(es): 
* python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) 
* python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) 
* python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-03-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-virtualenv" release="4.el7_7" src="python-virtualenv-15.1.0-4.el7_7.src.rpm" version="15.1.0"><filename>python-virtualenv-15.1.0-4.el7_7.noarch.rpm</filename><sum type="sha256">0ab1fc8fa3937b844dc11e7fa58d53d520e7a13fdfebc29c41fc51d020b58e20</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18074" id="CVE-2018-18074" title="Cve-2018-18074" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20060" id="CVE-2018-20060" title="Cve-2018-20060" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11236" id="CVE-2019-11236" title="Cve-2019-11236" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0851" id="RHSA-2020:0851-1" title="Rhsa-2020:0851-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1643829" id="1643829" title="Cve-2018-18074 Python-Requests: Redirect From Https To Http Does Not Remove Authorization Header" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1649153" id="1649153" title="Cve-2018-20060 Python-Urllib3: Cross-Host Redirect Does Not Remove Authorization Header Allow For Credential Exposure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700824" id="1700824" title="Cve-2019-11236 Python-Urllib3: Crlf Injection Due To Not Encoding The '\R\N' Sequence Leading To Possible Attack On Internal Service" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0853-1</id><title>Zsh</title><description>Security Fix(es): 
* zsh: insecure dropping of privileges when unsetting PRIVILEGED option (CVE-2019-20044)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-03-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="zsh-html" release="34.el7_7.2" src="zsh-5.0.2-34.el7_7.2.src.rpm" version="5.0.2"><filename>zsh-html-5.0.2-34.el7_7.2.x86_64.rpm</filename><sum type="sha256">4b38cf11956e7571e4bd366bee17882082d5408c8adf33c45a592237882f018a</sum></package><package arch="x86_64" name="zsh" release="34.el7_7.2" src="zsh-5.0.2-34.el7_7.2.src.rpm" version="5.0.2"><filename>zsh-5.0.2-34.el7_7.2.x86_64.rpm</filename><sum type="sha256">a49b04839177e93a489a28b91e43e20d39d7b7cf27f0e9c167ec18ba9d979d42</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20044" id="CVE-2019-20044" title="Zsh: Insecure Dropping Of Privileges When Unsetting Privileged Option" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0853" id="RHSA-2020:0853-1" title="Rhsa-2020:0853-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1804859" id="1804859" title="Zsh: Insecure Dropping Of Privileges When Unsetting Privileged Option" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0855-1</id><title>Tomcat</title><description>Security Fix(es): 
* tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability (CVE-2020-1938)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-03-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcat-servlet-3.0-api" release="11.el7_7" src="tomcat-7.0.76-11.el7_7.src.rpm" version="7.0.76"><filename>tomcat-servlet-3.0-api-7.0.76-11.el7_7.noarch.rpm</filename><sum type="sha256">d19028a7be2470720f852678cb19939ecc95dcc31619f9dda1334aeab787a650</sum></package><package arch="noarch" name="tomcat-javadoc" release="11.el7_7" src="tomcat-7.0.76-11.el7_7.src.rpm" version="7.0.76"><filename>tomcat-javadoc-7.0.76-11.el7_7.noarch.rpm</filename><sum type="sha256">873bcf3de628f118510280491113f225bfa4d726037b3febafc573717974ef32</sum></package><package arch="noarch" name="tomcat-jsvc" release="11.el7_7" src="tomcat-7.0.76-11.el7_7.src.rpm" version="7.0.76"><filename>tomcat-jsvc-7.0.76-11.el7_7.noarch.rpm</filename><sum type="sha256">8abadce8deeda47eb4c198ce7c4c1ae991751ae267d6ee08a73a0a32bd32e99b</sum></package><package arch="noarch" name="tomcat-jsp-2.2-api" release="11.el7_7" src="tomcat-7.0.76-11.el7_7.src.rpm" version="7.0.76"><filename>tomcat-jsp-2.2-api-7.0.76-11.el7_7.noarch.rpm</filename><sum type="sha256">ced0dc7fe005335b65b542207c35f1a7f9574420e10828ed1c258d5ee52e855a</sum></package><package arch="noarch" name="tomcat-lib" release="11.el7_7" src="tomcat-7.0.76-11.el7_7.src.rpm" version="7.0.76"><filename>tomcat-lib-7.0.76-11.el7_7.noarch.rpm</filename><sum type="sha256">c989defcba861abf249c8247e935ef77a6e24d8e03fbce9825fa7ca92073ca0b</sum></package><package arch="noarch" name="tomcat-docs-webapp" release="11.el7_7" src="tomcat-7.0.76-11.el7_7.src.rpm" version="7.0.76"><filename>tomcat-docs-webapp-7.0.76-11.el7_7.noarch.rpm</filename><sum type="sha256">91e5dafa58e19c0a6ab13d82ea86e462c388c60c0bbeeece2997c23ac8832e2a</sum></package><package arch="noarch" name="tomcat" release="11.el7_7" src="tomcat-7.0.76-11.el7_7.src.rpm" version="7.0.76"><filename>tomcat-7.0.76-11.el7_7.noarch.rpm</filename><sum type="sha256">4936de1712d833283822d5515f50e5bbc45fcdb543be89d49d0078967f3a212f</sum></package><package arch="noarch" name="tomcat-webapps" release="11.el7_7" src="tomcat-7.0.76-11.el7_7.src.rpm" version="7.0.76"><filename>tomcat-webapps-7.0.76-11.el7_7.noarch.rpm</filename><sum type="sha256">e22b22b10fba4b5aa6d22250bf2c5a112295c2e837ea81668d5c6e60db1912d4</sum></package><package arch="noarch" name="tomcat-admin-webapps" release="11.el7_7" src="tomcat-7.0.76-11.el7_7.src.rpm" version="7.0.76"><filename>tomcat-admin-webapps-7.0.76-11.el7_7.noarch.rpm</filename><sum type="sha256">b4ce51368ed5943129e3f2a7d224992681588f7c48abf119d9ff3927ac943e80</sum></package><package arch="noarch" name="tomcat-el-2.2-api" release="11.el7_7" src="tomcat-7.0.76-11.el7_7.src.rpm" version="7.0.76"><filename>tomcat-el-2.2-api-7.0.76-11.el7_7.noarch.rpm</filename><sum type="sha256">e23ae1f4532b4c933362efbdd98d1542c17fdebff5e81de942e60fcb83b9219a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1938" id="CVE-2020-1938" title="Tomcat: Apache Tomcat Ajp File Read/Inclusion Vulnerability" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:0855" id="RHSA-2020:0855-1" title="Rhsa-2020:0855-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1806398" id="1806398" title="Tomcat: Apache Tomcat Ajp File Read/Inclusion Vulnerability" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0897-1</id><title>Icu</title><description>Security Fix(es): 
* ICU: Integer overflow in UnicodeString::doAppend() (CVE-2020-10531)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-03-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libicu-devel" release="4.el7_7" src="icu-50.2-4.el7_7.src.rpm" version="50.2"><filename>libicu-devel-50.2-4.el7_7.i686.rpm</filename><sum type="sha256">40140bcf1a104ca5e33ea0a2e9c0c85d1fb3a50e666c196d8f9fe7e1c32089e2</sum></package><package arch="x86_64" name="libicu-devel" release="4.el7_7" src="icu-50.2-4.el7_7.src.rpm" version="50.2"><filename>libicu-devel-50.2-4.el7_7.x86_64.rpm</filename><sum type="sha256">fad4a0d6535549306d65e54b12feb572aa25ac7879ed9e97f51c7e44ffef88ae</sum></package><package arch="i686" name="libicu" release="4.el7_7" src="icu-50.2-4.el7_7.src.rpm" version="50.2"><filename>libicu-50.2-4.el7_7.i686.rpm</filename><sum type="sha256">1133c8f24b2cef8f9ab8debac53cd6065f3ca89cab3ba8cef9b8ff5b6d441c64</sum></package><package arch="x86_64" name="icu" release="4.el7_7" src="icu-50.2-4.el7_7.src.rpm" version="50.2"><filename>icu-50.2-4.el7_7.x86_64.rpm</filename><sum type="sha256">976e3b73467d16abcd82f0d2baeca50966ea2ce874eb8aed0b83789c5ee9ccb1</sum></package><package arch="x86_64" name="libicu" release="4.el7_7" src="icu-50.2-4.el7_7.src.rpm" version="50.2"><filename>libicu-50.2-4.el7_7.x86_64.rpm</filename><sum type="sha256">3e2eeea9ccf5b04619edd469f5154004fb07685af25ac99dd2cf6a2513d775bc</sum></package><package arch="noarch" name="libicu-doc" release="4.el7_7" src="icu-50.2-4.el7_7.src.rpm" version="50.2"><filename>libicu-doc-50.2-4.el7_7.noarch.rpm</filename><sum type="sha256">35aa86936a25bd792a8cdcd1fd9fb5ed0b2558fe51eea44067f84f51c1f50bfd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0897" id="RHSA-2020:0897-1" title="Rhsa-2020:0897-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0905-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Use-after-free when removing data about origins (CVE-2020-6805) 
* Mozilla: BodyStream::OnInputStreamReady was missing protections against state confusion (CVE-2020-6806) 
* Mozilla: Use-after-free in cubeb during stream destruction (CVE-2020-6807) 
* Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6 (CVE-2020-6814) 
* Mozilla: Out of bounds reads in sctp_load_addresses_from_init (CVE-2019-20503) 
* Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection (CVE-2020-6811) 
* Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission (CVE-2020-6812)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-03-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_7" src="thunderbird-68.6.0-1.el7_7.src.rpm" version="68.6.0"><filename>thunderbird-68.6.0-1.el7_7.x86_64.rpm</filename><sum type="sha256">93f78377831f2a42bebf4510767fc96dbbc0786f91048358ac95199ce827959c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0905" id="RHSA-2020:0905-1" title="Rhsa-2020:0905-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0913-1</id><title>Libvncserver</title><description>Security Fix(es): 
* libvncserver: HandleCursorShape() integer overflow resulting in heap-based buffer overflow (CVE-2019-15690)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-03-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libvncserver" release="14.el7_7" src="libvncserver-0.9.9-14.el7_7.src.rpm" version="0.9.9"><filename>libvncserver-0.9.9-14.el7_7.x86_64.rpm</filename><sum type="sha256">4ce9bcc81c5e73162ec9317c66b66e39ad183df86a48f3c2c934f215c741cd0e</sum></package><package arch="x86_64" name="libvncserver-devel" release="14.el7_7" src="libvncserver-0.9.9-14.el7_7.src.rpm" version="0.9.9"><filename>libvncserver-devel-0.9.9-14.el7_7.x86_64.rpm</filename><sum type="sha256">44424e89b258932d51a2a4e1499ded842e05e45b8341a3ff53914ad9897c3e9f</sum></package><package arch="i686" name="libvncserver-devel" release="14.el7_7" src="libvncserver-0.9.9-14.el7_7.src.rpm" version="0.9.9"><filename>libvncserver-devel-0.9.9-14.el7_7.i686.rpm</filename><sum type="sha256">6c23b682e9efbfa7ed90e8d7c137792a3c5c496aba8b31284787482e6314cb43</sum></package><package arch="i686" name="libvncserver" release="14.el7_7" src="libvncserver-0.9.9-14.el7_7.src.rpm" version="0.9.9"><filename>libvncserver-0.9.9-14.el7_7.i686.rpm</filename><sum type="sha256">517772e158f8ee469b9cb32761ec5baa384ea7739e108f3c3cc628f0d3d432b1</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0913" id="RHSA-2020:0913-1" title="Rhsa-2020:0913-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:0984-1</id><title>Ipmitool</title><description>Security Fix(es): 
* ipmitool: Buffer overflow in read_fru_area_section function in lib/ipmi_fru.c (CVE-2020-5208)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-03-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="bmc-snmp-proxy" release="9.el7_7" src="ipmitool-1.8.18-9.el7_7.src.rpm" version="1.8.18"><filename>bmc-snmp-proxy-1.8.18-9.el7_7.noarch.rpm</filename><sum type="sha256">a983e96bea5aeb0b9563f65d7bf687142a9b7e8e3857976c9d9dd896d4faca79</sum></package><package arch="x86_64" name="ipmitool" release="9.el7_7" src="ipmitool-1.8.18-9.el7_7.src.rpm" version="1.8.18"><filename>ipmitool-1.8.18-9.el7_7.x86_64.rpm</filename><sum type="sha256">f47b232bc0d2de0dfea63dc6d0987fc322026d1b73e6b3c4b8f3c1e9465ada8e</sum></package><package arch="noarch" name="exchange-bmc-os-info" release="9.el7_7" src="ipmitool-1.8.18-9.el7_7.src.rpm" version="1.8.18"><filename>exchange-bmc-os-info-1.8.18-9.el7_7.noarch.rpm</filename><sum type="sha256">7ea6f62e7c6e7d82eb5513ea02ce0dd433397289b60553a5e4494bdd67ec4ce7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:0984" id="RHSA-2020:0984-1" title="Rhsa-2020:0984-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1000-1</id><title>Rsyslog</title><description>* rsyslog: heap-based overflow in     contrib/pmaixforwardedfrom/pmaixforwardedfrom.c      * rsyslog: heap-based overflow in contrib/pmcisconames/pmcisconames.c</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="rsyslog-udpspoof" release="52.el7" src="rsyslog-8.24.0-52.el7.src.rpm" version="8.24.0"><filename>rsyslog-udpspoof-8.24.0-52.el7.x86_64.rpm</filename><sum type="sha256">054274aa227e4fe3b55ec71e6a3f7927150334c19eda2520e3035de8028e08c9</sum></package><package arch="x86_64" name="rsyslog-snmp" release="52.el7" src="rsyslog-8.24.0-52.el7.src.rpm" version="8.24.0"><filename>rsyslog-snmp-8.24.0-52.el7.x86_64.rpm</filename><sum type="sha256">592719bab9955cc7930b8dcbaf72908c594e3f803440f48cad00d47144575486</sum></package><package arch="x86_64" name="rsyslog-libdbi" release="52.el7" src="rsyslog-8.24.0-52.el7.src.rpm" version="8.24.0"><filename>rsyslog-libdbi-8.24.0-52.el7.x86_64.rpm</filename><sum type="sha256">3c0fb154e76585e524848ea794ffdfbb48042344755f097804cfba7ed3e9fc86</sum></package><package arch="noarch" name="rsyslog-doc" release="52.el7" src="rsyslog-8.24.0-52.el7.src.rpm" version="8.24.0"><filename>rsyslog-doc-8.24.0-52.el7.noarch.rpm</filename><sum type="sha256">13e0f961f1a1d3c61f9311e2ab7040c099cd75f1a416961edd9cfedea05b252c</sum></package><package arch="x86_64" name="rsyslog-mmaudit" release="52.el7" src="rsyslog-8.24.0-52.el7.src.rpm" version="8.24.0"><filename>rsyslog-mmaudit-8.24.0-52.el7.x86_64.rpm</filename><sum type="sha256">c7439980fc256f6155ea5f1b14b60f13c3421c3b65b33cdfbde7e62a58f252df</sum></package><package arch="x86_64" name="rsyslog-relp" release="52.el7" src="rsyslog-8.24.0-52.el7.src.rpm" version="8.24.0"><filename>rsyslog-relp-8.24.0-52.el7.x86_64.rpm</filename><sum type="sha256">b23d8d2063183b677364a4f08a7cd2e35b8676ec7a3335582ca8d66057acb82d</sum></package><package arch="x86_64" name="rsyslog-mmkubernetes" release="52.el7" src="rsyslog-8.24.0-52.el7.src.rpm" version="8.24.0"><filename>rsyslog-mmkubernetes-8.24.0-52.el7.x86_64.rpm</filename><sum type="sha256">2f224c163f06583c0f9d99b2d6d215dca194512d97d98ee0a619febae2efd4dd</sum></package><package arch="x86_64" name="rsyslog-gnutls" release="52.el7" src="rsyslog-8.24.0-52.el7.src.rpm" version="8.24.0"><filename>rsyslog-gnutls-8.24.0-52.el7.x86_64.rpm</filename><sum type="sha256">70b15b27225a692912f388f13ba387a1ffa0fa64c633730a900b64d9cf134c31</sum></package><package arch="x86_64" name="rsyslog-mmnormalize" release="52.el7" src="rsyslog-8.24.0-52.el7.src.rpm" version="8.24.0"><filename>rsyslog-mmnormalize-8.24.0-52.el7.x86_64.rpm</filename><sum type="sha256">e35a646f0ec31f7a423d74d74c339701f28704be8bc8546dde925701c62fd842</sum></package><package arch="x86_64" name="rsyslog-crypto" release="52.el7" src="rsyslog-8.24.0-52.el7.src.rpm" version="8.24.0"><filename>rsyslog-crypto-8.24.0-52.el7.x86_64.rpm</filename><sum type="sha256">29d90d976c52475c09fdb8bb2e0f64bf7802a87c7af4bc826ce48a3038c9b47b</sum></package><package arch="x86_64" name="rsyslog-elasticsearch" release="52.el7" src="rsyslog-8.24.0-52.el7.src.rpm" version="8.24.0"><filename>rsyslog-elasticsearch-8.24.0-52.el7.x86_64.rpm</filename><sum type="sha256">e86d1b6835415282527fa2b42ec9d224ce8b15f40e782006f1b8fc6093221923</sum></package><package arch="x86_64" name="rsyslog-mmjsonparse" release="52.el7" src="rsyslog-8.24.0-52.el7.src.rpm" version="8.24.0"><filename>rsyslog-mmjsonparse-8.24.0-52.el7.x86_64.rpm</filename><sum type="sha256">2838add15e23220dbe64fd66d3f8ceedf2fc76ae0878b97da5ab6713d374e846</sum></package><package arch="x86_64" name="rsyslog-mysql" release="52.el7" src="rsyslog-8.24.0-52.el7.src.rpm" version="8.24.0"><filename>rsyslog-mysql-8.24.0-52.el7.x86_64.rpm</filename><sum type="sha256">dd107f8c819e4b43a78414cb4162764b79fc252f167a46c14a7da163e8d6bd9d</sum></package><package arch="x86_64" name="rsyslog" release="52.el7" src="rsyslog-8.24.0-52.el7.src.rpm" version="8.24.0"><filename>rsyslog-8.24.0-52.el7.x86_64.rpm</filename><sum type="sha256">53fc086d770d38f543be3d35860cebe34c5a0d571f4c79b92055a617e8bcc16f</sum></package><package arch="x86_64" name="rsyslog-pgsql" release="52.el7" src="rsyslog-8.24.0-52.el7.src.rpm" version="8.24.0"><filename>rsyslog-pgsql-8.24.0-52.el7.x86_64.rpm</filename><sum type="sha256">e56cfbd72ff9b1b7b73ac4ff602f2100d20cc7591ffcc77557bfa41b60a58744</sum></package><package arch="x86_64" name="rsyslog-gssapi" release="52.el7" src="rsyslog-8.24.0-52.el7.src.rpm" version="8.24.0"><filename>rsyslog-gssapi-8.24.0-52.el7.x86_64.rpm</filename><sum type="sha256">b9c6d4384a8bad53de6f964f45e0ecd9c53e69f5eab1cfa8185ab5cd9df34c93</sum></package><package arch="x86_64" name="rsyslog-mmsnmptrapd" release="52.el7" src="rsyslog-8.24.0-52.el7.src.rpm" version="8.24.0"><filename>rsyslog-mmsnmptrapd-8.24.0-52.el7.x86_64.rpm</filename><sum type="sha256">9797bfee7e8453399ed24380cba0b1a12abbf647ea740b4931ecf8894f168150</sum></package><package arch="x86_64" name="rsyslog-kafka" release="52.el7" src="rsyslog-8.24.0-52.el7.src.rpm" version="8.24.0"><filename>rsyslog-kafka-8.24.0-52.el7.x86_64.rpm</filename><sum type="sha256">379976f284bbf9fefab125dcbc7b7227576a9ff095c6c2e836d869b314714b43</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17041" id="CVE-2019-17041" title="Cve-2019-17041" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17042" id="CVE-2019-17042" title="Cve-2019-17042" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1000" id="RHSA-2020:1000-1" title="Rhsa-2020:1000-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549706" id="1549706" title="Rsyslog Segv With Disk-Assisted Queues, Possible Corruption" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1600171" id="1600171" title="Rsyslog Omelasticsearch Does Not Work With Es 6.X Strict Headers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1684236" id="1684236" title="Rsyslog-8.24.0-34.El7.X86_64 Sigsegv When Using Rsyslog-Elasticsearch-8.24.0-34" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1714094" id="1714094" title="Rsyslog Causes Memory Leak" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1744617" id="1744617" title="Memory Leak In Readjournal() When Cs.Bworkaroundjournalbug = 1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1744682" id="1744682" title="Rsyslog: Imfile Crash On Log Rotation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1744856" id="1744856" title="Truncation Detected, (Cannot Seek Backward To Begin Of Last Block) - Re-Start Reading From Beginning: Inappropriate Ioctl For Device" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1763746" id="1763746" title="Rsyslog Doesn'T Read Lines From Imfile After Rotation Of Logs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1766693" id="1766693" title="Cve-2019-17041 Rsyslog: Heap-Based Overflow In Contrib/Pmaixforwardedfrom/Pmaixforwardedfrom.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1766700" id="1766700" title="Cve-2019-17042 Rsyslog: Heap-Based Overflow In Contrib/Pmcisconames/Pmcisconames.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1003-1</id><title>Mod_Auth_Mellon</title><description>* mod_auth_mellon: Open Redirect via the login?ReturnTo= substring which     could facilitate information theft</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="mod_auth_mellon-diagnostics" release="8.el7" src="mod_auth_mellon-0.14.0-8.el7.src.rpm" version="0.14.0"><filename>mod_auth_mellon-diagnostics-0.14.0-8.el7.x86_64.rpm</filename><sum type="sha256">22b333e13396e543dd8054d76e6e1c6985bee59ae305607f3ac5ddf28b38620c</sum></package><package arch="x86_64" name="mod_auth_mellon" release="8.el7" src="mod_auth_mellon-0.14.0-8.el7.src.rpm" version="0.14.0"><filename>mod_auth_mellon-0.14.0-8.el7.x86_64.rpm</filename><sum type="sha256">c48105c86c2bbdbe32d4d82f4d8424b32ead66f663aecc1d1c9e8d0893aee87f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13038" id="CVE-2019-13038" title="Cve-2019-13038" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1003" id="RHSA-2020:1003-1" title="Rhsa-2020:1003-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1725740" id="1725740" title="Cve-2019-13038 Mod_Auth_Mellon: Open Redirect Via The Login?Returnto= Substring Which Could Facilitate Information Theft" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1727789" id="1727789" title="Mod_Auth_Mellon Fix For Ajax Header Name X-Requested-With" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1011-1</id><title>Expat</title><description>* expat: Integer overflow leading to buffer overflow in XML_GetBuffer()</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="expat-devel" release="11.el7" src="expat-2.1.0-11.el7.src.rpm" version="2.1.0"><filename>expat-devel-2.1.0-11.el7.x86_64.rpm</filename><sum type="sha256">3b30147bb8cc10ba6c987030e273b87e12fc62229dc55286097ac4af9127d7a1</sum></package><package arch="i686" name="expat" release="11.el7" src="expat-2.1.0-11.el7.src.rpm" version="2.1.0"><filename>expat-2.1.0-11.el7.i686.rpm</filename><sum type="sha256">0d487af4044dc0998baefb06d2cf8e0bee06decaffe9e6c28f2e13f3d12ac41f</sum></package><package arch="x86_64" name="expat" release="11.el7" src="expat-2.1.0-11.el7.src.rpm" version="2.1.0"><filename>expat-2.1.0-11.el7.x86_64.rpm</filename><sum type="sha256">583fd88a4116685b83112e8332bc5bbbc7909ddf783e5f6fd0f0eea33e0eebed</sum></package><package arch="x86_64" name="expat-static" release="11.el7" src="expat-2.1.0-11.el7.src.rpm" version="2.1.0"><filename>expat-static-2.1.0-11.el7.x86_64.rpm</filename><sum type="sha256">6a4e066bcdbcc56c60ba96fc9415134eae09679ae1d5d347bdfd0785facd1abb</sum></package><package arch="i686" name="expat-static" release="11.el7" src="expat-2.1.0-11.el7.src.rpm" version="2.1.0"><filename>expat-static-2.1.0-11.el7.i686.rpm</filename><sum type="sha256">2db032c6d7fd89e1ea29ef8de7d74ea9f60f4b7d2a635b410afcb2a5e003f012</sum></package><package arch="i686" name="expat-devel" release="11.el7" src="expat-2.1.0-11.el7.src.rpm" version="2.1.0"><filename>expat-devel-2.1.0-11.el7.i686.rpm</filename><sum type="sha256">de6733bdeb210a9fd5b3ecd5ffaced0b6628576032a7426c38c38b6e42413b6e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1011" id="RHSA-2020:1011-1" title="Rhsa-2020:1011-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1220607" id="1220607" title="Mozilla: Buffer Overflow When Parsing Compressed Xml (Mfsa 2015-54)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1016-1</id><title>Kernel</title><description>* kernel: out of bound read in DVB connexant driver.      * kernel: Missing permissions check for request_key() destination allows     local attackers to add keys to keyring without Write permission      * kernel: denial of service via ioctl call in network tun handling      * kernel: usb: missing size check in the __usb_get_extra_descriptor()      * kernel: perf_event_open() and execve() race in setuid programs allows a     data leak      * kernel: brcmfmac frame validation bypass      * kernel: null-pointer dereference in hci_uart_set_flow_control      * kernel: sensitive information disclosure from kernel stack memory via     HIDPCONNADD command      * kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to     denial of service      * kernel: use-after-free in arch/x86/lib/insn-eval.c      * kernel: denial of service in arch/powerpc/kernel/signal_32.c and     arch/powerpc/kernel/signal_64.c via sigreturn() system call      * kernel: integer overflow and OOB read in drivers/block/floppy.c      * kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c     leads to denial of service      * kernel: buffer-overflow hardening in WiFi beacon validation code.      * kernel: (powerpc) incomplete Spectre-RSB mitigation leads to information     exposure      * kernel: oob memory read in hso_probe in drivers/net/usb/hso.c      * Kernel: net: weak IP ID generation leads to remote device tracking      * Kernel: net: using kernel space address bits to derive IP ID may     potentially break KASLR      * kernel: ASLR bypass for setuid binaries due to late install_exec_creds()</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel" release="1127.el7" src="kernel-3.10.0-1127.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1127.el7.x86_64.rpm</filename><sum type="sha256">9b69f31633dbbf7cc5b8476755e44b66134da547e005ec394e74542085a12088</sum></package><package arch="noarch" name="kernel-doc" release="1127.el7" src="kernel-3.10.0-1127.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1127.el7.noarch.rpm</filename><sum type="sha256">ad45d86863e386e4c6f6fa1e47c1cc6ca322cc3b3a61ec2e79d3d48389a6aa88</sum></package><package arch="x86_64" name="bpftool" release="1127.el7" src="kernel-3.10.0-1127.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1127.el7.x86_64.rpm</filename><sum type="sha256">f57740eef1d2994a9e51d90150cb8eb8e156b8631327d0451efae3aa7c595dc7</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1127.el7" src="kernel-3.10.0-1127.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1127.el7.x86_64.rpm</filename><sum type="sha256">a96fbcd14c2c295700cad30cf24e628edbef8568efc5fa9cf8df784bad38d429</sum></package><package arch="x86_64" name="kernel-devel" release="1127.el7" src="kernel-3.10.0-1127.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1127.el7.x86_64.rpm</filename><sum type="sha256">6f4ea50495b4dd0e68b1658ef8f224afdd95610cd41de957faf9bae5b23f3068</sum></package><package arch="x86_64" name="python-perf" release="1127.el7" src="kernel-3.10.0-1127.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1127.el7.x86_64.rpm</filename><sum type="sha256">b2401a0b7be65c1130f0859cbb8d0379af68ab2a5fb54d27b29a119b11c0a585</sum></package><package arch="x86_64" name="kmod-openafs-1.6-sl-1127" release="290.sl7.1127" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>kmod-openafs-1.6-sl-1127-1.6.24-290.sl7.1127.x86_64.rpm</filename><sum type="sha256">65f2c381872b26afa49d2a71012b3cde549c7eedb5f948faaf108a52c52dd571</sum></package><package arch="x86_64" name="kernel-tools" release="1127.el7" src="kernel-3.10.0-1127.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1127.el7.x86_64.rpm</filename><sum type="sha256">2bed1532028f0b9973105dfa8c468bda0a578283c20c7061a8225e572acb53aa</sum></package><package arch="x86_64" name="kernel-debug" release="1127.el7" src="kernel-3.10.0-1127.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1127.el7.x86_64.rpm</filename><sum type="sha256">5b44d9384ea4dffe424ff19963b690af34c19b6b6ff54abd47912f69379581b8</sum></package><package arch="x86_64" name="kernel-headers" release="1127.el7" src="kernel-3.10.0-1127.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1127.el7.x86_64.rpm</filename><sum type="sha256">bdc747cbd76a1c5a2c113809af4073a6ca7f2519ee9e3dc68b26cc00ca40c5ed</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1127.el7" src="kernel-3.10.0-1127.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1127.el7.x86_64.rpm</filename><sum type="sha256">39003cda3cad7f449a74ad954c0e4129d5808d27fc1479b3799e4c2a51d0c92a</sum></package><package arch="x86_64" name="perf" release="1127.el7" src="kernel-3.10.0-1127.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1127.el7.x86_64.rpm</filename><sum type="sha256">aeeb0cd87014cc1fbf4ceb4d1885c9b1687fd2973e2098bdee041cb9420ad3cd</sum></package><package arch="noarch" name="kmod-openafs-1.6-sl" release="1.SL78.el7" src="kmod-openafs-1.6-sl-1.6.24-1.SL78.el7.src.rpm" version="1.6.24"><filename>kmod-openafs-1.6-sl-1.6.24-1.SL78.el7.noarch.rpm</filename><sum type="sha256">93144a759115baea17333359192f2d53c724e385c2f9c6b9ac2b120179fd913d</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1127.el7" src="kernel-3.10.0-1127.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1127.el7.noarch.rpm</filename><sum type="sha256">d0a1266e426c905094a6fe9c4c774add976a5ffbd7e390734f21659561c0de4c</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1127.el7" src="kernel-3.10.0-1127.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1127.el7.x86_64.rpm</filename><sum type="sha256">6beea5e777cf6b3223d7e5f11f38cb26eb4ca7bd3549ed6b0e67b0f8532d48fc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9289" id="CVE-2015-9289" title="Cve-2015-9289" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17807" id="CVE-2017-17807" title="Cve-2017-17807" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19985" id="CVE-2018-19985" title="Cve-2018-19985" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20169" id="CVE-2018-20169" title="Cve-2018-20169" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7191" id="CVE-2018-7191" title="Cve-2018-7191" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10207" id="CVE-2019-10207" title="Cve-2019-10207" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638" id="CVE-2019-10638" title="Cve-2019-10638" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10639" id="CVE-2019-10639" title="Cve-2019-10639" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11190" id="CVE-2019-11190" title="Cve-2019-11190" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884" id="CVE-2019-11884" title="Cve-2019-11884" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12382" id="CVE-2019-12382" title="Cve-2019-12382" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13233" id="CVE-2019-13233" title="Cve-2019-13233" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13648" id="CVE-2019-13648" title="Cve-2019-13648" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14283" id="CVE-2019-14283" title="Cve-2019-14283" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15916" id="CVE-2019-15916" title="Cve-2019-15916" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16746" id="CVE-2019-16746" title="Cve-2019-16746" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18660" id="CVE-2019-18660" title="Cve-2019-18660" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3901" id="CVE-2019-3901" title="Cve-2019-3901" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503" id="CVE-2019-9503" title="Cve-2019-9503" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1016" id="RHSA-2020:1016-1" title="Rhsa-2020:1016-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1507149" id="1507149" title="[Llnl 7.5 Bug] Slab Leak Causing A Crash When Using Kmem Control Group" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1528335" id="1528335" title="Cve-2017-17807 Kernel: Missing Permissions Check For Request_Key() Destination Allows Local Attackers To Add Keys To Keyring Without Write Permission" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1651706" id="1651706" title="Kernel: Sd 0:0:9:0: Timing Out Command, Waited Xxxs - Which Command Timed Out?" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1660385" id="1660385" title="Cve-2018-20169 Kernel: Usb: Missing Size Check In The __Usb_Get_Extra_Descriptor() Leading To Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1666106" id="1666106" title="Cve-2018-19985 Kernel: Oob Memory Read In Hso_Probe In Drivers/Net/Usb/Hso.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1694201" id="1694201" title="Cifs Repeatedly Tries To Open A File Using Smb V1 On An Smb2 Mount After Receiving Status_Sharing_Violation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1699856" id="1699856" title="Cve-2019-11190 Kernel: Aslr Bypass For Setuid Binaries Due To Late Install_Exec_Creds()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1701245" id="1701245" title="Cve-2019-3901 Kernel: Perf_Event_Open() And Execve() Race In Setuid Programs Allows A Data Leak" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1701842" id="1701842" title="Cve-2019-9503 Kernel: Brcmfmac Frame Validation Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1702264" id="1702264" title="Panic Handing Smb2_Reconnect Due To A Use After Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1709837" id="1709837" title="Cve-2019-11884 Kernel: Sensitive Information Disclosure From Kernel Stack Memory Via Hidpconnadd Command" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1711520" id="1711520" title="Ipset List - Size In Memory Wildly Inconsistent" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1715554" id="1715554" title="Cve-2019-12382 Kernel: Unchecked Kstrdup Of Fwstr In Drm_Load_Edid_Firmware Leads To Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1716328" id="1716328" title="Cve-2018-7191 Kernel: Denial Of Service Via Ioctl Call In Network Tun Handling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1727756" id="1727756" title="Cve-2019-13233 Kernel: Use-After-Free In Arch/X86/Lib/Insn-Eval.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1729931" id="1729931" title="Cve-2019-10638 Kernel: Net: Weak Ip Id Generation Leads To Remote Device Tracking" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1729933" id="1729933" title="Cve-2019-10639 Kernel: Net: Using Kernel Space Address Bits To Derive Ip Id May Potentially Break Kaslr" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1733347" id="1733347" title="Nfsv4.0 Client Sending A Double Close (Leading To Eio Application Failure)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1733874" id="1733874" title="Cve-2019-10207 Kernel: Null-Pointer Dereference In Hci_Uart_Set_Flow_Control" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1734243" id="1734243" title="Cve-2019-14283 Kernel: Integer Overflow And Oob Read In Drivers/Block/Floppy.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1735630" id="1735630" title="Cve-2019-13648 Kernel: Denial Of Service In Arch/Powerpc/Kernel/Signal_32.C And Arch/Powerpc/Kernel/Signal_64.C Via Sigreturn() System Call" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1735655" id="1735655" title="Cve-2015-9289 Kernel: Out Of Bound Read In Dvb Connexant Driver." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1749390" id="1749390" title="Vfs: Busy Inodes After Unmount Of Loop0 When Encountering Duplicate Directory Inodes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1750577" id="1750577" title="Rhel 7.7 Long I/O Stalls With Bnx2Fc From Not Masking Off Scope Bits Of Retry Delay Value" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1750813" id="1750813" title="Cve-2019-15916 Kernel: Memory Leak In Register_Queue_Kobjects() In Net/Core/Net-Sysfs.C Leads To Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1757325" id="1757325" title="Perf Top -P Pid Does Not Show Anything" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1757872" id="1757872" title="Crash In Is_Size_Safe_To_Change In 3.10.0-1062.El7 Kernel As A Result Of Another Condition / Race Similar To Earlier Bug 1580165" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1758001" id="1758001" title="Fix Compat Statfs64() Returning Eoverflow For When _File_Offset_Bits=64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760294" id="1760294" title="Kernel: Seccomp: Wrong Return Value For Blocked Syscalls On S390X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760306" id="1760306" title="Cve-2019-16746 Kernel: Buffer-Overflow Hardening In Wifi Beacon Validation Code." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1770404" id="1770404" title="Cifs Client System Hung With All Cpus At 100% Inside Smb2_Reconnect Spinning On Tcp_Server_Info.Response_Q.Lock Spinlock" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1777825" id="1777825" title="Cve-2019-18660 Kernel: (Powerpc) Incomplete Spectre-Rsb Mitigation Leads To Information Exposure" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1020-1</id><title>Curl</title><description>* curl: TFTP receive heap buffer overflow in tftp_receive_packet() function</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libcurl-devel" release="57.el7" src="curl-7.29.0-57.el7.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-57.el7.x86_64.rpm</filename><sum type="sha256">4e7c5dadbdcd39272e42e1d40613428c158ec07372234918fceaf0192daab209</sum></package><package arch="x86_64" name="curl" release="57.el7" src="curl-7.29.0-57.el7.src.rpm" version="7.29.0"><filename>curl-7.29.0-57.el7.x86_64.rpm</filename><sum type="sha256">89a176200d620756c6f014da326fbae32ece5bde0f57e58be17d908b53e6b5b7</sum></package><package arch="x86_64" name="libcurl" release="57.el7" src="curl-7.29.0-57.el7.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-57.el7.x86_64.rpm</filename><sum type="sha256">f14bb4c9533b4a31e2fb61afceca1fb659d3586cbe175f9f388ba839e28e7a9c</sum></package><package arch="i686" name="libcurl-devel" release="57.el7" src="curl-7.29.0-57.el7.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-57.el7.i686.rpm</filename><sum type="sha256">f4b33d4552a70977b1e3398259f43482200a7d0275453efcd3d04831cae0ff75</sum></package><package arch="i686" name="libcurl" release="57.el7" src="curl-7.29.0-57.el7.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-57.el7.i686.rpm</filename><sum type="sha256">62ca5dbe0401553c8eed177631be5c607eb676d65eb02eeaa717eb95226ad221</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5436" id="CVE-2019-5436" title="Cve-2019-5436" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1020" id="RHSA-2020:1020-1" title="Rhsa-2020:1020-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1710620" id="1710620" title="Cve-2019-5436 Curl: Tftp Receive Heap Buffer Overflow In Tftp_Receive_Packet() Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1754736" id="1754736" title="Curl Does Not Send Authorization Header When Receiving Www-Authenticate Header Twice" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1769307" id="1769307" title="Curl Fails While Attempting To Post A Char Device" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1021-1</id><title>Gnome</title><description>* gnome-shell: partial lock screen bypass</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gnome-shell" release="24.el7" src="gnome-shell-3.28.3-24.el7.src.rpm" version="3.28.3"><filename>gnome-shell-3.28.3-24.el7.x86_64.rpm</filename><sum type="sha256">71cf1edc3c01009a6aea8084769f212f61277a0af8edaecbfc0b2a0ab9d05df5</sum></package><package arch="i686" name="gnome-online-accounts" release="1.el7" src="gnome-online-accounts-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-online-accounts-3.28.2-1.el7.i686.rpm</filename><sum type="sha256">559f9f84ae7aee5af489eb81c35bc6f5de6aa1c27a4fd4c947ddcdfff565778f</sum></package><package arch="noarch" name="gnome-shell-extension-drive-menu" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-drive-menu-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">6d59a1d091b053a7e52fdf6ed20cbdcac0fee98054992c2cccd6b64255e59ccc</sum></package><package arch="i686" name="LibRaw-static" release="1.el7" src="LibRaw-0.19.4-1.el7.src.rpm" version="0.19.4"><filename>LibRaw-static-0.19.4-1.el7.i686.rpm</filename><sum type="sha256">c8198898ae3d0cd607b9e29b1f9f9ec66ce4edf661fd586392cea2a8ac0297be</sum></package><package arch="noarch" name="gnome-shell-extension-auto-move-windows" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-auto-move-windows-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">e83fbc8e369107edc149a99de75dc7ece6fa3fb59699fbcafc12d1f032cc4dea</sum></package><package arch="noarch" name="gnome-shell-extension-native-window-placement" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-native-window-placement-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">0a873608d038dc310d7347020e5579f6ebb3c11779ba91cc02a7e416244af848</sum></package><package arch="x86_64" name="colord-libs" release="2.el7" src="colord-1.3.4-2.el7.src.rpm" version="1.3.4"><filename>colord-libs-1.3.4-2.el7.x86_64.rpm</filename><sum type="sha256">d6fd1cb9ff2fa9021c557bc9127825d3383e838c4f1d51419de7fefb381a7ca7</sum></package><package arch="x86_64" name="gnome-settings-daemon-devel" release="8.el7" src="gnome-settings-daemon-3.28.1-8.el7.src.rpm" version="3.28.1"><filename>gnome-settings-daemon-devel-3.28.1-8.el7.x86_64.rpm</filename><sum type="sha256">e70246e454f6c5d39d69b6180aa450cab341a22d6942e99bef74583c0b00a0b8</sum></package><package arch="x86_64" name="shared-mime-info" release="5.el7" src="shared-mime-info-1.8-5.el7.src.rpm" version="1.8"><filename>shared-mime-info-1.8-5.el7.x86_64.rpm</filename><sum type="sha256">9595990593a1d9e96ba9249a541892b52708fb3a99f7b2370ade40a570eb427d</sum></package><package arch="i686" epoch="1" name="gdm-pam-extensions-devel" release="22.el7" src="gdm-3.28.2-22.el7.src.rpm" version="3.28.2"><filename>gdm-pam-extensions-devel-3.28.2-22.el7.i686.rpm</filename><sum type="sha256">a23bfc02e867114a490916e0759c97287afe9194536ac5bcf5548a977336f40e</sum></package><package arch="x86_64" name="gtk3-immodule-xim" release="5.el7" src="gtk3-3.22.30-5.el7.src.rpm" version="3.22.30"><filename>gtk3-immodule-xim-3.22.30-5.el7.x86_64.rpm</filename><sum type="sha256">23cd47e022316e2357ad99b711f147f1b79c1f7d62547cf4c49bbe4ce2a08045</sum></package><package arch="noarch" name="gnome-shell-extension-apps-menu" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-apps-menu-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">a2b58451cca163842166d84e3baf872a82e938e710a43956d29bf0081fc9ec8f</sum></package><package arch="noarch" name="osinfo-db" release="2.el7" src="osinfo-db-20190805-2.el7.src.rpm" version="20190805"><filename>osinfo-db-20190805-2.el7.noarch.rpm</filename><sum type="sha256">c4e694ecd8faf86efe9fe166924595040899ccc82653b98f68050b9caf6ea5e4</sum></package><package arch="x86_64" epoch="1" name="gdm" release="22.el7" src="gdm-3.28.2-22.el7.src.rpm" version="3.28.2"><filename>gdm-3.28.2-22.el7.x86_64.rpm</filename><sum type="sha256">e3a32fc3a60333cf28aaff08ec398a703ecf75f12a44e50c0c5873e9d4647923</sum></package><package arch="x86_64" epoch="1" name="gdm-pam-extensions-devel" release="22.el7" src="gdm-3.28.2-22.el7.src.rpm" version="3.28.2"><filename>gdm-pam-extensions-devel-3.28.2-22.el7.x86_64.rpm</filename><sum type="sha256">bcf7955fbe3cd4e8b9e5b3f8b14089f0fdcc839c3d88cd6531c49cc8c5de79f7</sum></package><package arch="noarch" name="gnome-shell-extension-user-theme" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-user-theme-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">0b479c11f2c35a8eca7cdc14df3d0fd665ce4091aa7bdd452aeb45b18bb93899</sum></package><package arch="i686" epoch="1" name="gdm" release="22.el7" src="gdm-3.28.2-22.el7.src.rpm" version="3.28.2"><filename>gdm-3.28.2-22.el7.i686.rpm</filename><sum type="sha256">6d0082803dec555d1f41b7b3c643b348db027b49c4d7e392bf833575697b150a</sum></package><package arch="x86_64" name="tracker-preferences" release="8.el7" src="tracker-1.10.5-8.el7.src.rpm" version="1.10.5"><filename>tracker-preferences-1.10.5-8.el7.x86_64.rpm</filename><sum type="sha256">dd5ce637f8dd23eb038a6341b51341be077a9cfa248ab631520925ebe4d9c064</sum></package><package arch="x86_64" name="colord-devel" release="2.el7" src="colord-1.3.4-2.el7.src.rpm" version="1.3.4"><filename>colord-devel-1.3.4-2.el7.x86_64.rpm</filename><sum type="sha256">27727d86fd77eee20d74e4cdba6efaf33c00418e1795a625c249d7bf8b54901b</sum></package><package arch="x86_64" epoch="1" name="control-center" release="6.el7" src="control-center-3.28.1-6.el7.src.rpm" version="3.28.1"><filename>control-center-3.28.1-6.el7.x86_64.rpm</filename><sum type="sha256">0cb889a0bf28b286cd3d4f9a366fad350a98d66a0f929ad446ee165ded3f703c</sum></package><package arch="x86_64" name="nautilus" release="7.el7" src="nautilus-3.26.3.1-7.el7.src.rpm" version="3.26.3.1"><filename>nautilus-3.26.3.1-7.el7.x86_64.rpm</filename><sum type="sha256">3888a3dbc9427b0d31b7dc013cc7a1547be4de8ea005c852f2221c6aaef9e13c</sum></package><package arch="noarch" name="gnome-shell-extension-window-list" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-window-list-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">d02cb581e105cef2cfcbde9076b413171d3073f4e9350e9c5b0e099407f0cd23</sum></package><package arch="x86_64" name="libgweather" release="3.el7" src="libgweather-3.28.2-3.el7.src.rpm" version="3.28.2"><filename>libgweather-3.28.2-3.el7.x86_64.rpm</filename><sum type="sha256">33c9f6c3b909f2fdf272c2fa8d36920ee80b2443b069fbf0eb23664e45b43e9d</sum></package><package arch="noarch" name="colord-devel-docs" release="2.el7" src="colord-1.3.4-2.el7.src.rpm" version="1.3.4"><filename>colord-devel-docs-1.3.4-2.el7.noarch.rpm</filename><sum type="sha256">ca893715e7bd0d3a885c63bffd50140b32c1097bf9c64fa5e9455f989d2befc8</sum></package><package arch="x86_64" name="mutter" release="20.el7" src="mutter-3.28.3-20.el7.src.rpm" version="3.28.3"><filename>mutter-3.28.3-20.el7.x86_64.rpm</filename><sum type="sha256">4a012f99f16e5e02263f1d85a5b2c182a29ba3eb3109b00eea19282de0ab1e6c</sum></package><package arch="i686" name="gnome-settings-daemon" release="8.el7" src="gnome-settings-daemon-3.28.1-8.el7.src.rpm" version="3.28.1"><filename>gnome-settings-daemon-3.28.1-8.el7.i686.rpm</filename><sum type="sha256">b37026144d808285562bfb7499981be792309647585f04b52bd949388bb9554a</sum></package><package arch="noarch" name="gnome-shell-extension-extra-osk-keys" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-extra-osk-keys-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">58a45900ba0247321584abf43f2e191d00e43f089e05dc8597af99fb69cb5abd</sum></package><package arch="noarch" name="colord-extra-profiles" release="2.el7" src="colord-1.3.4-2.el7.src.rpm" version="1.3.4"><filename>colord-extra-profiles-1.3.4-2.el7.noarch.rpm</filename><sum type="sha256">cdbce679683350a96ac2c9083cb2f0c5b81fdad39d39848102ac472d7e7f96bc</sum></package><package arch="i686" name="libcanberra-gtk3" release="9.el7" src="libcanberra-0.30-9.el7.src.rpm" version="0.30"><filename>libcanberra-gtk3-0.30-9.el7.i686.rpm</filename><sum type="sha256">31c7122e98e8e1d1d4b554444532081f0b0c8a99f2fda4f579f1f5ec50818997</sum></package><package arch="i686" epoch="1" name="control-center" release="6.el7" src="control-center-3.28.1-6.el7.src.rpm" version="3.28.1"><filename>control-center-3.28.1-6.el7.i686.rpm</filename><sum type="sha256">d1ebbb62b1b85f60fa1f7149ea634597fdf0cf977596450c26994fa90f921e11</sum></package><package arch="noarch" name="gnome-shell-extension-alternate-tab" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-alternate-tab-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">8b75a7af378fa6b83d429dc0da1a7b0fb8524482bb9721984d2e48fc95555641</sum></package><package arch="noarch" name="gnome-shell-extension-places-menu" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-places-menu-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">a3c6407677dbd7627ce1e2f2ba8738520fe294d6c5e8fec47a9e375fb4d8836e</sum></package><package arch="i686" name="gnome-settings-daemon-devel" release="8.el7" src="gnome-settings-daemon-3.28.1-8.el7.src.rpm" version="3.28.1"><filename>gnome-settings-daemon-devel-3.28.1-8.el7.i686.rpm</filename><sum type="sha256">37f9fd7d27d3cd9ac678009ac36af40642ac59a5a44d4835bd942f47aaf00f1f</sum></package><package arch="i686" name="gtk3-devel" release="5.el7" src="gtk3-3.22.30-5.el7.src.rpm" version="3.22.30"><filename>gtk3-devel-3.22.30-5.el7.i686.rpm</filename><sum type="sha256">d91a8d52dc734166a60f256cda76b039c283f7e40bd7f304499232b472e63844</sum></package><package arch="noarch" name="gnome-shell-extension-systemMonitor" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-systemMonitor-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">d8e5f043f02ed79b87d92a8e49e4f0e3ea80f24a781cf7d1db78254b3646afaf</sum></package><package arch="x86_64" name="libgweather-devel" release="3.el7" src="libgweather-3.28.2-3.el7.src.rpm" version="3.28.2"><filename>libgweather-devel-3.28.2-3.el7.x86_64.rpm</filename><sum type="sha256">146155ca24af492b4354f0271c690cb100e5ded14d69e82a50743e4da66da31b</sum></package><package arch="x86_64" name="accountsservice-devel" release="7.el7" src="accountsservice-0.6.50-7.el7.src.rpm" version="0.6.50"><filename>accountsservice-devel-0.6.50-7.el7.x86_64.rpm</filename><sum type="sha256">6018c5f6413fe00f986a55604ff169e8013cedcab325911ab5ca08f389958c0b</sum></package><package arch="x86_64" epoch="1" name="control-center-filesystem" release="6.el7" src="control-center-3.28.1-6.el7.src.rpm" version="3.28.1"><filename>control-center-filesystem-3.28.1-6.el7.x86_64.rpm</filename><sum type="sha256">61b79d0416a2268954839f8bb9be9d405eeaaa22d1dad046eea35cb8e9916375</sum></package><package arch="x86_64" name="gtk3-tests" release="5.el7" src="gtk3-3.22.30-5.el7.src.rpm" version="3.22.30"><filename>gtk3-tests-3.22.30-5.el7.x86_64.rpm</filename><sum type="sha256">80818e5c07c881820e9d8a9e5d98d9f911a519c6ca99b343b4d95dd5dc5d05b7</sum></package><package arch="noarch" name="gnome-shell-extension-no-hot-corner" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-no-hot-corner-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">39e87c650b9ca12c1fba8745324de54138c326d8275a7cbeec74d9182d559c9e</sum></package><package arch="x86_64" name="gnome-online-accounts" release="1.el7" src="gnome-online-accounts-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-online-accounts-3.28.2-1.el7.x86_64.rpm</filename><sum type="sha256">9682512a4c261661dbcb252d7bf586f71b42e5c07eedd0977313acf5b24d7083</sum></package><package arch="noarch" name="gnome-shell-extension-windowsNavigator" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-windowsNavigator-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">d479b91d0a3aba8229b7f7cd8e41be7af61f3c1d1b8b6bbc4febd9f03141b7eb</sum></package><package arch="x86_64" name="gtk3-devel" release="5.el7" src="gtk3-3.22.30-5.el7.src.rpm" version="3.22.30"><filename>gtk3-devel-3.22.30-5.el7.x86_64.rpm</filename><sum type="sha256">4665878bd65cad446af7faa317deb9be3581f88974b296ce765cd23c6d96db71</sum></package><package arch="x86_64" name="gnome-settings-daemon" release="8.el7" src="gnome-settings-daemon-3.28.1-8.el7.src.rpm" version="3.28.1"><filename>gnome-settings-daemon-3.28.1-8.el7.x86_64.rpm</filename><sum type="sha256">0e398b9b07dafac1fd8029f6cefc03abbe89f32931dbb66b02603df52c344cb0</sum></package><package arch="i686" name="libcanberra-devel" release="9.el7" src="libcanberra-0.30-9.el7.src.rpm" version="0.30"><filename>libcanberra-devel-0.30-9.el7.i686.rpm</filename><sum type="sha256">373bd559fdbe42d6effc70446b3147c96d984754ca3ab466445605106e9d6e2d</sum></package><package arch="i686" name="colord-libs" release="2.el7" src="colord-1.3.4-2.el7.src.rpm" version="1.3.4"><filename>colord-libs-1.3.4-2.el7.i686.rpm</filename><sum type="sha256">1424d0f76891bc7499f68dfcde9ecc7ae3fe40acd9534c22d826b4f8aa648bc2</sum></package><package arch="x86_64" name="colord" release="2.el7" src="colord-1.3.4-2.el7.src.rpm" version="1.3.4"><filename>colord-1.3.4-2.el7.x86_64.rpm</filename><sum type="sha256">39c307cdcd8f036d5cb16cca4109a7529499ebc85bbd0507f397551ef23e52ef</sum></package><package arch="x86_64" name="gtk3" release="5.el7" src="gtk3-3.22.30-5.el7.src.rpm" version="3.22.30"><filename>gtk3-3.22.30-5.el7.x86_64.rpm</filename><sum type="sha256">e6c6c444155c88afc6d29cb32e2a9af58738297542b5c18214b0eddcb500dafe</sum></package><package arch="i686" name="gsettings-desktop-schemas-devel" release="3.el7" src="gsettings-desktop-schemas-3.28.0-3.el7.src.rpm" version="3.28.0"><filename>gsettings-desktop-schemas-devel-3.28.0-3.el7.i686.rpm</filename><sum type="sha256">becac5dbe7dad083baaa94ade5c2e63a22034567f835854c8f7133efb0cc779d</sum></package><package arch="i686" name="libcanberra-gtk2" release="9.el7" src="libcanberra-0.30-9.el7.src.rpm" version="0.30"><filename>libcanberra-gtk2-0.30-9.el7.i686.rpm</filename><sum type="sha256">052408ae876e54b960119da2172bf50a3b9a7e2ea066ba6b95e850ad1bad918f</sum></package><package arch="noarch" name="gnome-shell-extension-updates-dialog" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-updates-dialog-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">c1ff51b0b485310e54f3ffc790fc9fea5ee22f22271f0811b8e81524f5c1e467</sum></package><package arch="i686" name="LibRaw-devel" release="1.el7" src="LibRaw-0.19.4-1.el7.src.rpm" version="0.19.4"><filename>LibRaw-devel-0.19.4-1.el7.i686.rpm</filename><sum type="sha256">de897c6c834a1b7e141867e9e6c881b9e5a96f42f903a4ce65ed72a807ac7f0d</sum></package><package arch="i686" name="nautilus-extensions" release="7.el7" src="nautilus-3.26.3.1-7.el7.src.rpm" version="3.26.3.1"><filename>nautilus-extensions-3.26.3.1-7.el7.i686.rpm</filename><sum type="sha256">d567499b2b739046d0bcedbdb361798d28402c253dcb618f2119dd4bd6bbd31f</sum></package><package arch="x86_64" name="gsettings-desktop-schemas" release="3.el7" src="gsettings-desktop-schemas-3.28.0-3.el7.src.rpm" version="3.28.0"><filename>gsettings-desktop-schemas-3.28.0-3.el7.x86_64.rpm</filename><sum type="sha256">e4ee021ba2f98622dc5bd22278239a04b2a21d0b8bf01497e1dabe9ffbc8506f</sum></package><package arch="i686" name="colord-devel" release="2.el7" src="colord-1.3.4-2.el7.src.rpm" version="1.3.4"><filename>colord-devel-1.3.4-2.el7.i686.rpm</filename><sum type="sha256">f0392a3dacf873983621d91a8ce9700fa97ed61930de02677098add129259f17</sum></package><package arch="x86_64" name="LibRaw-static" release="1.el7" src="LibRaw-0.19.4-1.el7.src.rpm" version="0.19.4"><filename>LibRaw-static-0.19.4-1.el7.x86_64.rpm</filename><sum type="sha256">ebf8eba1019e883d66567804a68ab2d957da8c64cf17bcdcbcc0376f0d0c2cf9</sum></package><package arch="x86_64" name="mutter-devel" release="20.el7" src="mutter-3.28.3-20.el7.src.rpm" version="3.28.3"><filename>mutter-devel-3.28.3-20.el7.x86_64.rpm</filename><sum type="sha256">aaa77db7b627bd49afbe7cda02747f4f766ee40341b4b974e5857edf9b30abf5</sum></package><package arch="i686" name="mutter" release="20.el7" src="mutter-3.28.3-20.el7.src.rpm" version="3.28.3"><filename>mutter-3.28.3-20.el7.i686.rpm</filename><sum type="sha256">057aca87c6075403aabf348046469fffc04fea7944a540ec7283ac639b95546b</sum></package><package arch="x86_64" epoch="1" name="xchat-tcl" release="25.el7" src="xchat-2.8.8-25.el7.src.rpm" version="2.8.8"><filename>xchat-tcl-2.8.8-25.el7.x86_64.rpm</filename><sum type="sha256">22723e2cf290e12edce7bf2533088f6e2b30d41359f5bcda2088b9b830450d8e</sum></package><package arch="i686" name="nautilus-devel" release="7.el7" src="nautilus-3.26.3.1-7.el7.src.rpm" version="3.26.3.1"><filename>nautilus-devel-3.26.3.1-7.el7.i686.rpm</filename><sum type="sha256">2619c80ca4f63bc786ddc0b8c9c60affc5bab6b450970b57cf472d23a8e93fd8</sum></package><package arch="x86_64" name="nautilus-devel" release="7.el7" src="nautilus-3.26.3.1-7.el7.src.rpm" version="3.26.3.1"><filename>nautilus-devel-3.26.3.1-7.el7.x86_64.rpm</filename><sum type="sha256">980d680ba1e47b88ee77235ddefc879d4d5ee82681b2625c6f43ff71f4e899be</sum></package><package arch="x86_64" name="accountsservice" release="7.el7" src="accountsservice-0.6.50-7.el7.src.rpm" version="0.6.50"><filename>accountsservice-0.6.50-7.el7.x86_64.rpm</filename><sum type="sha256">fae9e5c4fe85efe14bb9d5d26d1bdeb254064bd78193dbe0ba56fb208ba76827</sum></package><package arch="x86_64" name="accountsservice-libs" release="7.el7" src="accountsservice-0.6.50-7.el7.src.rpm" version="0.6.50"><filename>accountsservice-libs-0.6.50-7.el7.x86_64.rpm</filename><sum type="sha256">29435c616d5ea2fd504ee4ca498f8361fbe86f340ca6ffacce7df751be07fb0a</sum></package><package arch="i686" name="mutter-devel" release="20.el7" src="mutter-3.28.3-20.el7.src.rpm" version="3.28.3"><filename>mutter-devel-3.28.3-20.el7.i686.rpm</filename><sum type="sha256">ddb957f060cba7f1d35ed5cc0b351b0f25610e449fd3ea3cae47c13ea5e3c8a7</sum></package><package arch="i686" name="gtk3" release="5.el7" src="gtk3-3.22.30-5.el7.src.rpm" version="3.22.30"><filename>gtk3-3.22.30-5.el7.i686.rpm</filename><sum type="sha256">e34102fed6500921805f6d5aaa85bb676c87aab37676d1335be6261358fba490</sum></package><package arch="x86_64" name="gsettings-desktop-schemas-devel" release="3.el7" src="gsettings-desktop-schemas-3.28.0-3.el7.src.rpm" version="3.28.0"><filename>gsettings-desktop-schemas-devel-3.28.0-3.el7.x86_64.rpm</filename><sum type="sha256">f7c78a30ebbaed4745945138cd4f4b00ab5e3133f8a1333da3b75281d8cd688a</sum></package><package arch="noarch" name="gnome-classic-session" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-classic-session-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">7b711e7511256f706db6a414e7e99b6258fa70a6fa1bee28af47ab9b5cb33211</sum></package><package arch="noarch" name="gnome-shell-extension-workspace-indicator" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-workspace-indicator-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">a50dfb261d2ff21c2da0d403854339b3078eab7064877a33e7a1e2de386e3386</sum></package><package arch="i686" name="libgweather-devel" release="3.el7" src="libgweather-3.28.2-3.el7.src.rpm" version="3.28.2"><filename>libgweather-devel-3.28.2-3.el7.i686.rpm</filename><sum type="sha256">2d194f6a5459a71ce78b7d08964265508d5aad7d2be4e8405e1c8d260db5dae0</sum></package><package arch="x86_64" epoch="1" name="xchat" release="25.el7" src="xchat-2.8.8-25.el7.src.rpm" version="2.8.8"><filename>xchat-2.8.8-25.el7.x86_64.rpm</filename><sum type="sha256">fb5af867730d73c501f5383ff60df006beb9756230774b32895726e0b8483bd0</sum></package><package arch="noarch" name="gnome-shell-extension-window-grouper" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-window-grouper-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">2dc217f76508eabbdd883eab3f557628d8a96f1fefba393e69a1d64bafbfdc73</sum></package><package arch="noarch" name="gnome-shell-extension-top-icons" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-top-icons-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">979455db1fee536ae95d85812edf33d16707cde10027c080756df25c16d66af3</sum></package><package arch="x86_64" name="nautilus-extensions" release="7.el7" src="nautilus-3.26.3.1-7.el7.src.rpm" version="3.26.3.1"><filename>nautilus-extensions-3.26.3.1-7.el7.x86_64.rpm</filename><sum type="sha256">aa50685f5208d76ed3b6345f8663bbd5ba284732307e1dab443619fb74c00f31</sum></package><package arch="noarch" name="gnome-shell-extension-disable-screenshield" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-disable-screenshield-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">9cd8d50b722cca964a89189f110363c21b3ca8cb837a73f62a4a66b3b9247c4d</sum></package><package arch="x86_64" name="LibRaw-devel" release="1.el7" src="LibRaw-0.19.4-1.el7.src.rpm" version="0.19.4"><filename>LibRaw-devel-0.19.4-1.el7.x86_64.rpm</filename><sum type="sha256">aee4a5a1b6cca331078e72d47846ebea21ea58fdced83220a02a09993750ba8b</sum></package><package arch="i686" name="libcanberra" release="9.el7" src="libcanberra-0.30-9.el7.src.rpm" version="0.30"><filename>libcanberra-0.30-9.el7.i686.rpm</filename><sum type="sha256">18524340ca81b2e1600808d110a80e38faea3c8d8994fbd5196d2ad3cc10e71c</sum></package><package arch="i686" name="gsettings-desktop-schemas" release="3.el7" src="gsettings-desktop-schemas-3.28.0-3.el7.src.rpm" version="3.28.0"><filename>gsettings-desktop-schemas-3.28.0-3.el7.i686.rpm</filename><sum type="sha256">d8af116cf05fdfcd588540c5da2d94ac7578bc9f81b8a5e845b14d17df550369</sum></package><package arch="x86_64" name="tracker-devel" release="8.el7" src="tracker-1.10.5-8.el7.src.rpm" version="1.10.5"><filename>tracker-devel-1.10.5-8.el7.x86_64.rpm</filename><sum type="sha256">1830b02fa9b6980a056face17cd1c9e90095c1925dbe5a0b96d0cb054139cd10</sum></package><package arch="x86_64" epoch="1" name="gdm-devel" release="22.el7" src="gdm-3.28.2-22.el7.src.rpm" version="3.28.2"><filename>gdm-devel-3.28.2-22.el7.x86_64.rpm</filename><sum type="sha256">dd020157e5dd78348c18dc4b6f55d9c9ad558a5a51d66c2c7e768b231c68830f</sum></package><package arch="noarch" name="tracker-docs" release="8.el7" src="tracker-1.10.5-8.el7.src.rpm" version="1.10.5"><filename>tracker-docs-1.10.5-8.el7.noarch.rpm</filename><sum type="sha256">b5623a167c5705c39dc159e72f2ab85b8d3deab569bf121490464094810b7505</sum></package><package arch="x86_64" name="tracker-needle" release="8.el7" src="tracker-1.10.5-8.el7.src.rpm" version="1.10.5"><filename>tracker-needle-1.10.5-8.el7.x86_64.rpm</filename><sum type="sha256">19648e165bd333932d4d83f99aed0aced25362821001f6ee2e65c933fce01273</sum></package><package arch="x86_64" name="gtk-update-icon-cache" release="5.el7" src="gtk3-3.22.30-5.el7.src.rpm" version="3.22.30"><filename>gtk-update-icon-cache-3.22.30-5.el7.x86_64.rpm</filename><sum type="sha256">848ef780d440d041c6c28890f59ce28da85a8497ad3e37f188417aa2ffd96830</sum></package><package arch="noarch" name="gnome-shell-extension-panel-favorites" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-panel-favorites-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">3ee20c7241880630ea304c90d07f755d8fede394a297fe2afbf7dd2ff9092c42</sum></package><package arch="noarch" name="gnome-shell-extension-horizontal-workspaces" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-horizontal-workspaces-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">5f08e4e41a305ceeed52b7898626f06be5407acb519f4f2a654307a9dc4e6fc0</sum></package><package arch="noarch" name="gnome-shell-extension-screenshot-window-sizer" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-screenshot-window-sizer-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">0167939b636430f6344bada2d9026493f56eac1fd8a28f37b4debb6168b3fe6f</sum></package><package arch="x86_64" name="libcanberra-gtk3" release="9.el7" src="libcanberra-0.30-9.el7.src.rpm" version="0.30"><filename>libcanberra-gtk3-0.30-9.el7.x86_64.rpm</filename><sum type="sha256">c5c5c45abc697a303659038822f838c2bed69d309034789398673e8e1931bea3</sum></package><package arch="i686" epoch="1" name="gdm-devel" release="22.el7" src="gdm-3.28.2-22.el7.src.rpm" version="3.28.2"><filename>gdm-devel-3.28.2-22.el7.i686.rpm</filename><sum type="sha256">e731a3104fe6e61a35690a281e5ba8c068172d9ec8ddc983f91ee53785ad103a</sum></package><package arch="i686" name="libgweather" release="3.el7" src="libgweather-3.28.2-3.el7.src.rpm" version="3.28.2"><filename>libgweather-3.28.2-3.el7.i686.rpm</filename><sum type="sha256">fbaa60e1ee6ce613a380f40c60dfc9f7faee179ccba729eb7ba47400f9ec4818</sum></package><package arch="x86_64" name="libcanberra-devel" release="9.el7" src="libcanberra-0.30-9.el7.src.rpm" version="0.30"><filename>libcanberra-devel-0.30-9.el7.x86_64.rpm</filename><sum type="sha256">08c3514904b6daf6e7f11c69e23c1cc3f26813f3cf12f5d2c59276945adf2e15</sum></package><package arch="x86_64" name="tracker" release="8.el7" src="tracker-1.10.5-8.el7.src.rpm" version="1.10.5"><filename>tracker-1.10.5-8.el7.x86_64.rpm</filename><sum type="sha256">9d7cbeceb53e1d5161f5f52dbdbc3540f9aca3a18c1d2f49d4bbbf2f76ea55a8</sum></package><package arch="x86_64" name="LibRaw" release="1.el7" src="LibRaw-0.19.4-1.el7.src.rpm" version="0.19.4"><filename>LibRaw-0.19.4-1.el7.x86_64.rpm</filename><sum type="sha256">33f17cb83fc07632ba59c9abdff51aa34d80422c496dc1ef383b78cf4cf6d144</sum></package><package arch="i686" name="nautilus" release="7.el7" src="nautilus-3.26.3.1-7.el7.src.rpm" version="3.26.3.1"><filename>nautilus-3.26.3.1-7.el7.i686.rpm</filename><sum type="sha256">41ae0ba07db98eef6e8dcf5d144ac19e9d8db34789460cb09e6d8d34b31f49f0</sum></package><package arch="noarch" name="gnome-shell-extension-launch-new-instance" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-launch-new-instance-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">6fd6060f19843ffe27949eb546a413f8f69afd255840ec81c23dc9d0069ff3db</sum></package><package arch="i686" name="accountsservice-devel" release="7.el7" src="accountsservice-0.6.50-7.el7.src.rpm" version="0.6.50"><filename>accountsservice-devel-0.6.50-7.el7.i686.rpm</filename><sum type="sha256">b7b4e6dc2b757550a1f445ae7da4be9c06de2168ace3d5a181666ecc0576f293</sum></package><package arch="i686" name="LibRaw" release="1.el7" src="LibRaw-0.19.4-1.el7.src.rpm" version="0.19.4"><filename>LibRaw-0.19.4-1.el7.i686.rpm</filename><sum type="sha256">342dfcf3ded9b4f4c67df292e0e7ec1113971431985df0aa75a802fb3112c838</sum></package><package arch="i686" name="accountsservice-libs" release="7.el7" src="accountsservice-0.6.50-7.el7.src.rpm" version="0.6.50"><filename>accountsservice-libs-0.6.50-7.el7.i686.rpm</filename><sum type="sha256">14695786c04298f17af7a6d16b758314d8f9f811a772e2d1a0d50fc8f5537eaa</sum></package><package arch="x86_64" name="gnome-online-accounts-devel" release="1.el7" src="gnome-online-accounts-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-online-accounts-devel-3.28.2-1.el7.x86_64.rpm</filename><sum type="sha256">a0e48b648b9110f38518b4932cf77f5ac5419c3cc6d8cde5b757592d67cdd6a8</sum></package><package arch="noarch" name="gnome-shell-extension-common" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-common-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">48f9252fcbe62d4b0f0893e7e84a6f9474837d9f894e2c572062c0422c27e340</sum></package><package arch="i686" name="gnome-online-accounts-devel" release="1.el7" src="gnome-online-accounts-3.28.2-1.el7.src.rpm" version="3.28.2"><filename>gnome-online-accounts-devel-3.28.2-1.el7.i686.rpm</filename><sum type="sha256">a4dd0c49580a22aed512bbf249348f464a4e156997db0c24bb97b3d6d0e6e63c</sum></package><package arch="i686" name="tracker" release="8.el7" src="tracker-1.10.5-8.el7.src.rpm" version="1.10.5"><filename>tracker-1.10.5-8.el7.i686.rpm</filename><sum type="sha256">ee1af99b38b7f50ae027b980ebf5e6e96dbfaea1a54068d5c48fe39ae620c9a0</sum></package><package arch="i686" name="tracker-devel" release="8.el7" src="tracker-1.10.5-8.el7.src.rpm" version="1.10.5"><filename>tracker-devel-1.10.5-8.el7.i686.rpm</filename><sum type="sha256">671ebd3ffdb0366610eb0b220cc4c01c162ecea950cd589b10d6c398cb248545</sum></package><package arch="noarch" name="gnome-shell-extension-dash-to-dock" release="11.el7" src="gnome-shell-extensions-3.28.1-11.el7.src.rpm" version="3.28.1"><filename>gnome-shell-extension-dash-to-dock-3.28.1-11.el7.noarch.rpm</filename><sum type="sha256">71a3fd584f441a1d535d9bf10b1a08722644f6c3f6c2965700a857f595d1d9c5</sum></package><package arch="noarch" name="gnome-tweak-tool" release="7.el7" src="gnome-tweak-tool-3.28.1-7.el7.src.rpm" version="3.28.1"><filename>gnome-tweak-tool-3.28.1-7.el7.noarch.rpm</filename><sum type="sha256">a223cb19095e7daf54d12cdac758ef8014c0972880e8d5621151dcbca5114473</sum></package><package arch="x86_64" name="libcanberra-gtk2" release="9.el7" src="libcanberra-0.30-9.el7.src.rpm" version="0.30"><filename>libcanberra-gtk2-0.30-9.el7.x86_64.rpm</filename><sum type="sha256">84f9e038c96c6815902bd0b7caf49e1f3eefcfbd60b2d96182c0db732ebb86aa</sum></package><package arch="x86_64" name="libcanberra" release="9.el7" src="libcanberra-0.30-9.el7.src.rpm" version="0.30"><filename>libcanberra-0.30-9.el7.x86_64.rpm</filename><sum type="sha256">128cdb792fc0eb004b83f2d69989bf249af68b7b6da2706a19464f9512d2fadc</sum></package><package arch="x86_64" name="gtk3-devel-docs" release="5.el7" src="gtk3-3.22.30-5.el7.src.rpm" version="3.22.30"><filename>gtk3-devel-docs-3.22.30-5.el7.x86_64.rpm</filename><sum type="sha256">8b31f644a0ff44620d834f3e9b87522dad33259b508edf1c3e1204afaf6070ef</sum></package><package arch="x86_64" name="gtk3-immodules" release="5.el7" src="gtk3-3.22.30-5.el7.src.rpm" version="3.22.30"><filename>gtk3-immodules-3.22.30-5.el7.x86_64.rpm</filename><sum type="sha256">5ec25c28cd37f5fcd39f340f9c9b0529837f4a1e47c22532e293dbc1d73a7ce8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3820" id="CVE-2019-3820" title="Cve-2019-3820" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1021" id="RHSA-2020:1021-1" title="Rhsa-2020:1021-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1421231" id="1421231" title="Error In Default Configurations: Cd-Warning **: Failed To Get Session [Pid 1408]: Unknown Error -2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1474305" id="1474305" title="Tracker-Extract Gives Permission Denied Error In Log File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1506370" id="1506370" title="[Rfe] Disable Show Text In Gdm Login Screen/Lock Screen" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1547158" id="1547158" title="Postsession Script Not Executed On Reboot/Shutdown" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1556776" id="1556776" title="Name &quot;Org.Gnome.Mutter.Displayconfig&quot; Does Not Exist" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1556800" id="1556800" title="Libcanberra-Login-Sound.Desktop: Failed To Play Sound: File Or Data Not Found" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1583836" id="1583836" title="Not Able To Unlock Gnome Screen With Smartcard Using Coolkey" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1607839" id="1607839" title="Invisible Panel Is Made Visible On Click Between Setting And Toggle Button" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1624461" id="1624461" title="Gnome-Shell Crashes In Meta_Window_Get_Monitor, Processing An Unmanaged Window" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1630686" id="1630686" title="Window Title Bar Shows Garbled Characters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1632904" id="1632904" title="On Screen Keyboard Not Visible To Access With Gtk Apps" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1638727" id="1638727" title="Gnome-Shell Crashed With Sigsegv In Meta_Monitor_Mode_Get_Resolution()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1646345" id="1646345" title="Tracker-Miner-Fs Killed By Sigabrt When Connected From Remote Machine With Xdmcp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1657887" id="1657887" title="Mouse Buttons Stop Responding After Rapid Input" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1669391" id="1669391" title="Cve-2019-3820 Gnome-Shell: Partial Lock Screen Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1672289" id="1672289" title="Gnome-Control-Center Thunderbolt-Cc-Panel-Warning  Could Not Create Client Error Calling Startservicebyname For Org.Freedesktop.Bolt: Gdbus.Error:Org.Freedesktop.Systemd1.Unitmasked: Unit Is Masked. Memory Fault(Coredump)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1674534" id="1674534" title="Rebase To 3.28.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1678448" id="1678448" title="Invalid Syntax In /Usr/Share/Applications/Org.Gnome.Font-Viewer.Desktop [Rhel 7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1687745" id="1687745" title="Java Windows That Have A Preferred Width Larger Than Short.Max_Value Are Not Properly Displayed In Rhel7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1691197" id="1691197" title="'Error Setting Up Rfkill: Could Not Open Rfkill Control Device, Please Verify Your Installation' Output In Message." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1691474" id="1691474" title="Network Icon Missing In Gnome-Shell" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1702417" id="1702417" title="Ctrl,Alt Keys And Arrow Keys Missing On Virtual Keyboard" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1720286" id="1720286" title="A More Traditional Workspace Switcher For Classic Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1721562" id="1721562" title="Daemon: Ensure Cache Files For System Users Are Processed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1723283" id="1723283" title="Nautlus Should Not Require Brasero-Nautilus On Ppc64 And S390X" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728761" id="1728761" title="Keyboard And Mouse Are Unresponsive After ~45 Days Of Uptime" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1737367" id="1737367" title="Update To Latest Upstream Release" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1737369" id="1737369" title="Add 7.8 To The Osinfo-Db Which Will Be Used On 7.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1737515" id="1737515" title="Abnormally High Cpu Usage When Dragging Windows, Cursor Movement, And Applications That Cause Frequent Redraw Events" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1741274" id="1741274" title="Rebase To 0.19.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1743913" id="1743913" title="Gnome-Shell Crashes With Signal 11" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1749325" id="1749325" title="Systemd-Udevd: Failed To Execute '/Usr/Libexec/Gdm-Disable-Wayland' '/Usr/Libexec/Gdm-Disable-Wayland': No Such File Or Directory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1750807" id="1750807" title="Fedora/Rhel/Centos Jeos Kickstart Files For Unattended Installation Are Broken" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1752357" id="1752357" title="Workspace Switcher Jumps On Secondary Display Unexpectedly" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1752367" id="1752367" title="Type To Search Entry Doesn'T Show Typed Letters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1752378" id="1752378" title="Invalid Read Under Idle_Monitor_Dispatch_Timeout()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1752547" id="1752547" title="Gnome-Shell Crashes In Tcl/Tk Saveas Dialog When The User Clicks Cancel" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1753799" id="1753799" title="Unresponsive Gnome Due To Javascript Errors In Rhel 7.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1766501" id="1766501" title="Backport Performance Improvements To Gnome-Shell In Rhel-7.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1772896" id="1772896" title="Login Screen Shows Dots When Entering Username" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1778270" id="1778270" title="Fix Horizontal-Workspaces Extension In Non-Classic Session" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1789491" id="1789491" title="Extensions Panel Is Empty" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1022-1</id><title>File</title><description>* file: out-of-bounds read via a crafted ELF file</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="file-devel" release="36.el7" src="file-5.11-36.el7.src.rpm" version="5.11"><filename>file-devel-5.11-36.el7.i686.rpm</filename><sum type="sha256">91ba82c93c89111fccc3353acd8684f4858c9dabfb4c8251226878f01ce1e22b</sum></package><package arch="i686" name="file-static" release="36.el7" src="file-5.11-36.el7.src.rpm" version="5.11"><filename>file-static-5.11-36.el7.i686.rpm</filename><sum type="sha256">60fe7c5f507afb7a6d1e572e602161b55c22976a150e43aa98fe9fd6f58c5fa2</sum></package><package arch="x86_64" name="file-devel" release="36.el7" src="file-5.11-36.el7.src.rpm" version="5.11"><filename>file-devel-5.11-36.el7.x86_64.rpm</filename><sum type="sha256">4c12336f048667427d8217d26c775c9d3c953e8f5d48cbcb09c08ebc6c23d106</sum></package><package arch="x86_64" name="file-libs" release="36.el7" src="file-5.11-36.el7.src.rpm" version="5.11"><filename>file-libs-5.11-36.el7.x86_64.rpm</filename><sum type="sha256">26aafdb0380b1e463875941a1e928c8622b753c388f368adcb59a8457150fd63</sum></package><package arch="noarch" name="python-magic" release="36.el7" src="file-5.11-36.el7.src.rpm" version="5.11"><filename>python-magic-5.11-36.el7.noarch.rpm</filename><sum type="sha256">2f83861a72dc701a447b6c842a713f846986e8c0ca888a7162b1d1b2ba536dcc</sum></package><package arch="i686" name="file-libs" release="36.el7" src="file-5.11-36.el7.src.rpm" version="5.11"><filename>file-libs-5.11-36.el7.i686.rpm</filename><sum type="sha256">08980b0a6638fad706b45aa983ce3a5b33060d481ec4b29edfa76d71e6922486</sum></package><package arch="x86_64" name="file" release="36.el7" src="file-5.11-36.el7.src.rpm" version="5.11"><filename>file-5.11-36.el7.x86_64.rpm</filename><sum type="sha256">955282c9d706565c8c9d77abe174aa71132481b2871c140dfdd983073c1783b1</sum></package><package arch="x86_64" name="file-static" release="36.el7" src="file-5.11-36.el7.src.rpm" version="5.11"><filename>file-static-5.11-36.el7.x86_64.rpm</filename><sum type="sha256">d00d4d364bc0be344a988ff64345f916ec07cbb4763aba9150fb7ef3888c551e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10360" id="CVE-2018-10360" title="Cve-2018-10360" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1022" id="RHSA-2020:1022-1" title="Rhsa-2020:1022-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1590000" id="1590000" title="Cve-2018-10360 File: Out-Of-Bounds Read Via A Crafted Elf File" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1034-1</id><title>Doxygen</title><description>* doxygen: cross-site scripting in templates/html/search_opensearch.php</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="doxygen-doxywizard" release="4.el7" src="doxygen-1.8.5-4.el7.src.rpm" version="1.8.5"><filename>doxygen-doxywizard-1.8.5-4.el7.x86_64.rpm</filename><sum type="sha256">1f5b41c408263fd5a5cf742391f997e047e0f58393e73dac43c1a03216da7092</sum></package><package arch="x86_64" epoch="1" name="doxygen-latex" release="4.el7" src="doxygen-1.8.5-4.el7.src.rpm" version="1.8.5"><filename>doxygen-latex-1.8.5-4.el7.x86_64.rpm</filename><sum type="sha256">479c8dd6f79cdeb014d7076bdbc854e3c7f46c69665e2c04a56751ff22d2663a</sum></package><package arch="x86_64" epoch="1" name="doxygen" release="4.el7" src="doxygen-1.8.5-4.el7.src.rpm" version="1.8.5"><filename>doxygen-1.8.5-4.el7.x86_64.rpm</filename><sum type="sha256">a0265a372bffa73719a193bed0fa80599a6cc4ed1594acfa642ae82d15150f49</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10245" id="CVE-2016-10245" title="Cve-2016-10245" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1034" id="RHSA-2020:1034-1" title="Rhsa-2020:1034-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1483569" id="1483569" title="Incorrect Processing Of Code Blocks In Doxygen" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1714190" id="1714190" title="Cve-2016-10245 Doxygen: Cross-Site Scripting In Templates/Html/Search_Opensearch.Php" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1036-1</id><title>Texlive</title><description>* texlive: Buffer overflow in t1_check_unusual_charstring function in     writet1.c</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="2" name="texlive-mathspec-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0.2"><filename>texlive-mathspec-doc-svn15878.0.2-45.el7.noarch.rpm</filename><sum type="sha256">4f949d0333de62e45d3c76da0181819d0332cf5d010ea1721ac2d430613f047b</sum></package><package arch="noarch" epoch="2" name="texlive-sectsty-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.0.2"><filename>texlive-sectsty-doc-svn15878.2.0.2-45.el7.noarch.rpm</filename><sum type="sha256">842743380a57c1495d40e1a09e85e40fe0d93896de3ec3bd76ac09b06b262454</sum></package><package arch="noarch" epoch="2" name="texlive-iftex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29654.0.2"><filename>texlive-iftex-svn29654.0.2-45.el7.noarch.rpm</filename><sum type="sha256">d5b64676eedd02562d63086f027be5af124d7c7664508dfbaa14754655847192</sum></package><package arch="noarch" epoch="2" name="texlive-changepage" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.0c"><filename>texlive-changepage-svn15878.1.0c-45.el7.noarch.rpm</filename><sum type="sha256">df967f31ca270fab04f2bf6996bc9525268c29084277d19e45bcedae2f1a093a</sum></package><package arch="noarch" epoch="2" name="texlive-chngcntr-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17157.1.0a"><filename>texlive-chngcntr-doc-svn17157.1.0a-45.el7.noarch.rpm</filename><sum type="sha256">f2b547427c49f62da018d2ecc5b9e3b6310152b3b48695b73ef1431864398b08</sum></package><package arch="noarch" epoch="2" name="texlive-rcs" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-rcs-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">400f3c3a85770d0d950124681c41b1202f20fed14769bb7fa1bb15373a7041ba</sum></package><package arch="noarch" epoch="2" name="texlive-stmaryrd-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn22027.0"><filename>texlive-stmaryrd-doc-svn22027.0-45.el7.noarch.rpm</filename><sum type="sha256">2e76e04f0359091127d8c4062a645b0e0080c433c53f59eb9ad74bf4d3441408</sum></package><package arch="noarch" epoch="2" name="texlive-setspace" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24881.6.7a"><filename>texlive-setspace-svn24881.6.7a-45.el7.noarch.rpm</filename><sum type="sha256">f47f7eccbe71b76ab466fbf7eb907072de92b2144326fafd9af5552b82beaf3f</sum></package><package arch="noarch" epoch="2" name="texlive-fancybox" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18304.1.4"><filename>texlive-fancybox-svn18304.1.4-45.el7.noarch.rpm</filename><sum type="sha256">1d72bd678591c7b3b6027e8039c7e9055f5e94ebe543125bb8aaabe519d778ed</sum></package><package arch="noarch" epoch="2" name="texlive-xetex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26330.0.9997.5"><filename>texlive-xetex-svn26330.0.9997.5-45.el7.noarch.rpm</filename><sum type="sha256">e52e3cfb4794bbe746f224f4fdadc981f28f0eee7f3eb2ea3e8de7a4f1936ef8</sum></package><package arch="noarch" epoch="2" name="texlive-collection-xetex" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29634.0"><filename>texlive-collection-xetex-svn29634.0-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">35f98c174b57a1dfcd0a2a7f4b91482b6c86a514b2e54b48edd3a84268081b78</sum></package><package arch="noarch" epoch="2" name="texlive-varwidth-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24104.0.92"><filename>texlive-varwidth-doc-svn24104.0.92-45.el7.noarch.rpm</filename><sum type="sha256">0de09468f82a155ac5d0e234aaeed7a455d9904f71c123c5f8786942ca4f4ed6</sum></package><package arch="noarch" epoch="2" name="texlive-geometry" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19716.5.6"><filename>texlive-geometry-svn19716.5.6-45.el7.noarch.rpm</filename><sum type="sha256">a542181f26b72e7ffdca58e04da9ac338076eaf643261cdff2c189ff2793c632</sum></package><package arch="noarch" epoch="2" name="texlive-geometry-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19716.5.6"><filename>texlive-geometry-doc-svn19716.5.6-45.el7.noarch.rpm</filename><sum type="sha256">32c07d085e0797e313b678b700b258b9dacedf26bc87d42e8497777bb1cbaa45</sum></package><package arch="noarch" epoch="2" name="texlive-cm-lgc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28250.0.5"><filename>texlive-cm-lgc-svn28250.0.5-45.el7.noarch.rpm</filename><sum type="sha256">cfd3d34b4b417bfbf53893165e586b550a9739db7eb79a372bb735cb86073153</sum></package><package arch="noarch" epoch="2" name="texlive-charter" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-charter-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">1c5cde84928b78ebc18d2aa8ed1f40dfca2506a9590eca0e485e14a8f8577bb4</sum></package><package arch="x86_64" epoch="2" name="texlive-texlive.infra-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn22566.0"><filename>texlive-texlive.infra-bin-svn22566.0-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">add689952647c5d2897b635e428b191f16f26cd39c2d90863639cc5426d64896</sum></package><package arch="noarch" epoch="2" name="texlive-etex-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn22198.2.1"><filename>texlive-etex-doc-svn22198.2.1-45.el7.noarch.rpm</filename><sum type="sha256">12bc2a4043c1142afe098c02c66e59cb5d9ac771cec5b485fe9b67589c64a5b0</sum></package><package arch="noarch" epoch="2" name="texlive-luaotfload-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26718.1.26"><filename>texlive-luaotfload-doc-svn26718.1.26-45.el7.noarch.rpm</filename><sum type="sha256">eee97b66240b640eed91189fa8a2d94e98ee48e12ce4f4ea661b61ecd621d693</sum></package><package arch="noarch" epoch="2" name="texlive-mathpazo" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.003"><filename>texlive-mathpazo-svn15878.1.003-45.el7.noarch.rpm</filename><sum type="sha256">72a60efcdcc7f099eb7ca15140575cbe0834acc099af55cd56d683bb727984dc</sum></package><package arch="noarch" epoch="2" name="texlive-ucharclasses" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27820.2.0"><filename>texlive-ucharclasses-svn27820.2.0-45.el7.noarch.rpm</filename><sum type="sha256">c73faa2214c6ff224e521503c18660ef29bf2c6603d10afaf2b4bdd6b77a25d4</sum></package><package arch="noarch" epoch="2" name="texlive-etoolbox-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn20922.2.1"><filename>texlive-etoolbox-doc-svn20922.2.1-45.el7.noarch.rpm</filename><sum type="sha256">438365a7e5c524b91e0aa88f4394deacd9a0d5bded87fde1d7a3217aa2809ff8</sum></package><package arch="noarch" epoch="2" name="texlive-xetex-tibetan-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28847.0.1"><filename>texlive-xetex-tibetan-doc-svn28847.0.1-45.el7.noarch.rpm</filename><sum type="sha256">c6e0bc9c456ce930924768359fad14fbc2be063e00f42a5df5e5c8e671727ff2</sum></package><package arch="noarch" epoch="2" name="texlive-cite" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19955.5.3"><filename>texlive-cite-svn19955.5.3-45.el7.noarch.rpm</filename><sum type="sha256">66a4dd596a75e18c187b7c2399388e7aea01b4066ce7b5356bba51d2eae842c7</sum></package><package arch="noarch" epoch="2" name="texlive-overpic-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19712.0.53"><filename>texlive-overpic-doc-svn19712.0.53-45.el7.noarch.rpm</filename><sum type="sha256">de7475d58c3d92a84abc09fb268c524cc8525e8c5f990bc05b19b21eecf47827</sum></package><package arch="noarch" epoch="2" name="texlive-base" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="2012"><filename>texlive-base-2012-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">823bef94bef5ea13707f357a9240bd0119b8422cdbe83249f85de6d8ce3dfc5c</sum></package><package arch="noarch" epoch="2" name="texlive-type1cm-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn21820.0"><filename>texlive-type1cm-doc-svn21820.0-45.el7.noarch.rpm</filename><sum type="sha256">a58d5308b7df0e6c4c1ba882aeb41af0efebe5d77cbe3a4e68f4a6e688f38e9b</sum></package><package arch="noarch" epoch="2" name="texlive-kerkis-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-kerkis-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">faabd184219bfabf6bd718c3ca907eed1bdeb50dde8f520db01ee34bfdb22215</sum></package><package arch="noarch" epoch="2" name="texlive-mdwtools-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.05.4"><filename>texlive-mdwtools-doc-svn15878.1.05.4-45.el7.noarch.rpm</filename><sum type="sha256">67c519846d56727958f6598fe25907b6c0e791e0612097508906fc8f8d5f02b1</sum></package><package arch="noarch" epoch="2" name="texlive-epsf" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn21461.2.7.4"><filename>texlive-epsf-svn21461.2.7.4-45.el7.noarch.rpm</filename><sum type="sha256">7ca8902b944845b4e17e2a1597221c00b56054c943a9689c12734d5108f53da1</sum></package><package arch="noarch" epoch="2" name="texlive-cjk" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26296.4.8.3"><filename>texlive-cjk-svn26296.4.8.3-45.el7.noarch.rpm</filename><sum type="sha256">799a5b595192f5be72bdd7d1b853c07476a7dd833126c31838a132a8ce4a3e91</sum></package><package arch="noarch" epoch="2" name="texlive-xcolor" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.11"><filename>texlive-xcolor-svn15878.2.11-45.el7.noarch.rpm</filename><sum type="sha256">29f5b78741f56cc5dc97c3e3c7fd1f82dd754aebb463f9085d986c4cd65a70ea</sum></package><package arch="noarch" epoch="2" name="texlive-paralist" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.3b"><filename>texlive-paralist-svn15878.2.3b-45.el7.noarch.rpm</filename><sum type="sha256">882470ed40d7d63bdf8d4f1ce96560d0538e05d2b1d23e705566384368ea2ea5</sum></package><package arch="noarch" epoch="2" name="texlive-mflogo" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17487.0"><filename>texlive-mflogo-svn17487.0-45.el7.noarch.rpm</filename><sum type="sha256">41d5103ce1cf6a40a703da8d4608fcaeba67f7e0095587c98fe6876540f5f5a7</sum></package><package arch="noarch" epoch="2" name="texlive-epstopdf" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26577.0"><filename>texlive-epstopdf-svn26577.0-45.el7.noarch.rpm</filename><sum type="sha256">673e32c4a9b70627baa10b19383f45dd275d8c5ce37498534424210864d937db</sum></package><package arch="x86_64" epoch="2" name="texlive-bibtex-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26509.0"><filename>texlive-bibtex-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">8c035d9d16c07a8f4de6d5c172ae83311b88009a51c5de3b7fbc7206197d5e44</sum></package><package arch="noarch" epoch="2" name="texlive-euler-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17261.2.5"><filename>texlive-euler-doc-svn17261.2.5-45.el7.noarch.rpm</filename><sum type="sha256">88d7cae6961b795d878881eaf329ad0fe25fd295294b743a0e0229403374ae82</sum></package><package arch="noarch" epoch="2" name="texlive-courier" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28614.0"><filename>texlive-courier-svn28614.0-45.el7.noarch.rpm</filename><sum type="sha256">8668977798bb65e67e7d7ebf98ae4083ad93637ce4387254d863c9430fcd7c61</sum></package><package arch="noarch" epoch="2" name="texlive-mnsymbol-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18651.1.4"><filename>texlive-mnsymbol-doc-svn18651.1.4-45.el7.noarch.rpm</filename><sum type="sha256">d9803379ab595503312c4c67b62e8fd7f373def32a65cf4f19003a9173eb5c91</sum></package><package arch="noarch" epoch="2" name="texlive-cm-super-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-cm-super-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">963762f5aec40aaeed76bec68a63cfce7bb8a39faa5ffb3ea7432d85f838788f</sum></package><package arch="noarch" epoch="2" name="texlive-tools-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26263.0"><filename>texlive-tools-doc-svn26263.0-45.el7.noarch.rpm</filename><sum type="sha256">a2d11fb0b764116f893fbc1a8bbcbba31e55e92c959369c69934d082f64e1bc2</sum></package><package arch="noarch" epoch="2" name="texlive-etex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn22198.2.1"><filename>texlive-etex-svn22198.2.1-45.el7.noarch.rpm</filename><sum type="sha256">c1e685ecbc946ece3b26bbf5ba375a1d84ee23feb42a488f51c6230cf8e3ab33</sum></package><package arch="noarch" epoch="2" name="texlive-pst-text" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.00"><filename>texlive-pst-text-svn15878.1.00-45.el7.noarch.rpm</filename><sum type="sha256">74cf20338f31010399f4ca97e7adb902463e688bdfd1baeecffd0693e7010de5</sum></package><package arch="noarch" epoch="2" name="texlive-amscls-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29207.0"><filename>texlive-amscls-doc-svn29207.0-45.el7.noarch.rpm</filename><sum type="sha256">ba2578d90e92a465dfafcf87ae12c1f0e90f9dd22752853dbae2f218aaa27506</sum></package><package arch="noarch" epoch="2" name="texlive-bidi-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29650.12.2"><filename>texlive-bidi-doc-svn29650.12.2-45.el7.noarch.rpm</filename><sum type="sha256">08a39d9554c6cd03a0c1752537591a92bd002b99ec3a83aca120ec78ca50b363</sum></package><package arch="noarch" epoch="2" name="texlive-pdfpages-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27574.0.4t"><filename>texlive-pdfpages-doc-svn27574.0.4t-45.el7.noarch.rpm</filename><sum type="sha256">1b424e31e9db8c143579a1c335bc188ea180bb1434175b7eee61172206acb1f7</sum></package><package arch="noarch" epoch="2" name="texlive-pst-text-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.00"><filename>texlive-pst-text-doc-svn15878.1.00-45.el7.noarch.rpm</filename><sum type="sha256">6a14d5c4602d4090afcec0506c80622820db5b3ece223066776dc52df6ccbb66</sum></package><package arch="noarch" epoch="2" name="texlive-amsfonts" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29208.3.04"><filename>texlive-amsfonts-svn29208.3.04-45.el7.noarch.rpm</filename><sum type="sha256">b9b992042817246eec0c8b4176bdd222c4a9da0cb41828836fdb3f44ba61fba8</sum></package><package arch="noarch" epoch="2" name="texlive-xetex-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26330.0.9997.5"><filename>texlive-xetex-doc-svn26330.0.9997.5-45.el7.noarch.rpm</filename><sum type="sha256">053952a9d74be130c7c79fb2ad7922e25699d94804b4ad551ca48a301e8a5f93</sum></package><package arch="x86_64" epoch="2" name="texlive-pdftex-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27321.0"><filename>texlive-pdftex-bin-svn27321.0-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">5fc4d508f1ffdd1e5d037a1aecbfc5ca954d5f4a9e99a825db927d962f36f89b</sum></package><package arch="noarch" epoch="2" name="texlive-etex-pkg" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.0"><filename>texlive-etex-pkg-svn15878.2.0-45.el7.noarch.rpm</filename><sum type="sha256">880f5c4270e4bb1a3f40cef93989bdfcb0f6c32dbc81a04388c1b030e66f8a0f</sum></package><package arch="noarch" epoch="2" name="texlive-pst-tree" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24142.1.12"><filename>texlive-pst-tree-svn24142.1.12-45.el7.noarch.rpm</filename><sum type="sha256">9fa1c877355ad06977e6c367b793ffef562f610adfd1b5e5ae8d176000d4cd6c</sum></package><package arch="noarch" epoch="2" name="texlive-latex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27907.0"><filename>texlive-latex-svn27907.0-45.el7.noarch.rpm</filename><sum type="sha256">39ca571bd0a0b08dd1c9f32fac775efef80f358719150078e97b932ba740f80a</sum></package><package arch="noarch" epoch="2" name="texlive-fancyvrb-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18492.2.8"><filename>texlive-fancyvrb-doc-svn18492.2.8-45.el7.noarch.rpm</filename><sum type="sha256">f9386ea3cea168fab859e9b9b18f220fd8f726a82890dc4d0e772807425d7f1b</sum></package><package arch="noarch" epoch="2" name="texlive-mparhack-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.4"><filename>texlive-mparhack-doc-svn15878.1.4-45.el7.noarch.rpm</filename><sum type="sha256">80cc7db34b389d98f4cef4af5bacaaed2444c0d01b82aa123f36bf3f48f428ea</sum></package><package arch="noarch" epoch="2" name="texlive-cmap" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26568.0"><filename>texlive-cmap-svn26568.0-45.el7.noarch.rpm</filename><sum type="sha256">305b0c6f1c8c1885760df56cbbe5ac23135794a8fa346e3e432020a77dad5bb8</sum></package><package arch="noarch" epoch="2" name="texlive-xtab" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn23347.2.3f"><filename>texlive-xtab-svn23347.2.3f-45.el7.noarch.rpm</filename><sum type="sha256">0e7b0495b160d19196f67f6382b8a2590e957777917620929784a8339dc710b7</sum></package><package arch="noarch" epoch="2" name="texlive-eso-pic" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn21515.2.0c"><filename>texlive-eso-pic-svn21515.2.0c-45.el7.noarch.rpm</filename><sum type="sha256">d8b16f7d8e1ea1c46c32e45a8cf0514cc88a7faeaac88019ebfbe3f169670bd6</sum></package><package arch="noarch" epoch="2" name="texlive-passivetex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-passivetex-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">2ca111e1bfde110072e1b5f2ae148444efa8dd280ee1a006c43de03cb18012de</sum></package><package arch="noarch" epoch="2" name="texlive-scheme-basic" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn25923.0"><filename>texlive-scheme-basic-svn25923.0-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">a23deb183a2502cc3ed198d864b7183a5bacb1cd50791e0e0016445c8a496e15</sum></package><package arch="noarch" epoch="2" name="texlive-tipa" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29349.1.3"><filename>texlive-tipa-svn29349.1.3-45.el7.noarch.rpm</filename><sum type="sha256">c2e926c326f7ee6693f670d08313b8dccce9890032968391217e7c0fab759ebe</sum></package><package arch="noarch" epoch="2" name="texlive-bibtex-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.0.99d"><filename>texlive-bibtex-doc-svn26689.0.99d-45.el7.noarch.rpm</filename><sum type="sha256">eab64a7610ba57ea33b811a5260b0141fc61eaabd4c9e89d2407c444eeb77db6</sum></package><package arch="noarch" epoch="2" name="texlive-cm-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29581.0"><filename>texlive-cm-doc-svn29581.0-45.el7.noarch.rpm</filename><sum type="sha256">3a829be50dba0658f38f7a535b07e596be7b9f71e6cf3b77670143f38cb42d11</sum></package><package arch="noarch" epoch="2" name="texlive-lua-alt-getopt" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29349.0.7.0"><filename>texlive-lua-alt-getopt-svn29349.0.7.0-45.el7.noarch.rpm</filename><sum type="sha256">69d73d8d3c5277c017bf19feffdd6f8c30a66ce295450b6fe0d4274aa948263d</sum></package><package arch="noarch" epoch="2" name="texlive-footmisc-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn23330.5.5b"><filename>texlive-footmisc-doc-svn23330.5.5b-45.el7.noarch.rpm</filename><sum type="sha256">6770e3a49deecc25be58863089fa025ec216fa7f600b5e4078e915402a7c751d</sum></package><package arch="noarch" epoch="2" name="texlive-etoolbox" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn20922.2.1"><filename>texlive-etoolbox-svn20922.2.1-45.el7.noarch.rpm</filename><sum type="sha256">2938910476d222f5228cbc36e5c840374d669b4ed4d26b137cbe37e494ec3507</sum></package><package arch="noarch" epoch="2" name="texlive-thumbpdf" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.3.15"><filename>texlive-thumbpdf-svn26689.3.15-45.el7.noarch.rpm</filename><sum type="sha256">2959212e16958d1aab5a0ea3c5d6797e01428e31570bd3d1f91a2d22d1027cd9</sum></package><package arch="noarch" epoch="2" name="texlive-dvipdfm" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.0.13.2d"><filename>texlive-dvipdfm-svn26689.0.13.2d-45.el7.noarch.rpm</filename><sum type="sha256">1cc91289178ef2ddaa37bebc799aba68cc271584e66bdfadb70b8d86cb8e720c</sum></package><package arch="noarch" epoch="2" name="texlive-metapost-examples-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-metapost-examples-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">ca2a97f08e0b29a1c9609ee1c0d1ae0a915ec768c7d96fad64a6a3cab52844e6</sum></package><package arch="noarch" epoch="2" name="texlive-pdftex-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29585.1.40.11"><filename>texlive-pdftex-doc-svn29585.1.40.11-45.el7.noarch.rpm</filename><sum type="sha256">b564850b1ed1b67f2f96f5c44377ec7899c3b03c4a0ecb0071708025390a5215</sum></package><package arch="noarch" epoch="2" name="texlive-ifmtarg" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19363.1.2a"><filename>texlive-ifmtarg-svn19363.1.2a-45.el7.noarch.rpm</filename><sum type="sha256">30dd1a492428914d824d653d8709daa630150e35ed8071bdb10d5a0aab706269</sum></package><package arch="noarch" epoch="2" name="texlive-sectsty" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.0.2"><filename>texlive-sectsty-svn15878.2.0.2-45.el7.noarch.rpm</filename><sum type="sha256">b1ce7f20421dca4e0f3cb5808b71ad43de9c2bc04702614d455e788111f4528b</sum></package><package arch="noarch" epoch="2" name="texlive-url" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn16864.3.2"><filename>texlive-url-svn16864.3.2-45.el7.noarch.rpm</filename><sum type="sha256">0a69d5ca3edbf45d29f60ab153d92b9a4b1596a08a7eeb93b5a53cac534094fe</sum></package><package arch="noarch" epoch="2" name="texlive-subfigure-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.1.5"><filename>texlive-subfigure-doc-svn15878.2.1.5-45.el7.noarch.rpm</filename><sum type="sha256">8cccf08f4d73cd58290c6a5596abba3fa61ba77ac2e701c94aec94079f56975f</sum></package><package arch="noarch" epoch="2" name="texlive-beton" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-beton-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">c0a38f079ceb2791885c4d09c9983df782706e8c93c6394cb86ba42993a69a53</sum></package><package arch="noarch" epoch="2" name="texlive-xmltex-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28273.0.8"><filename>texlive-xmltex-doc-svn28273.0.8-45.el7.noarch.rpm</filename><sum type="sha256">763cb2de87ddf283d7829ac57baf7d8b6ad057eaaf1afbcb845e251e9d345468</sum></package><package arch="noarch" epoch="2" name="texlive-kastrup-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-kastrup-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">b840a775cbaf99c9649039c11ee8a67a598a08f68f1c0d802b8333f7710f2c91</sum></package><package arch="noarch" epoch="2" name="texlive-pst-node-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27799.1.25"><filename>texlive-pst-node-doc-svn27799.1.25-45.el7.noarch.rpm</filename><sum type="sha256">7e29239fc8203503adfbff18c3357c01aceef00ea67f716c9e3a5e41e3418560</sum></package><package arch="noarch" epoch="2" name="texlive-texlive.infra" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28217.0"><filename>texlive-texlive.infra-svn28217.0-45.el7.noarch.rpm</filename><sum type="sha256">8a417478678475ee68da5b013af80c224d2a13590decf3ca2dac6f835e029e3d</sum></package><package arch="noarch" epoch="2" name="texlive-fancyhdr" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.3.1"><filename>texlive-fancyhdr-svn15878.3.1-45.el7.noarch.rpm</filename><sum type="sha256">c5331a2fabb79ca068013051913f8a776c99ed8cb4421d212cf9c2ad1bf537f8</sum></package><package arch="noarch" epoch="2" name="texlive-extsizes-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17263.1.4a"><filename>texlive-extsizes-doc-svn17263.1.4a-45.el7.noarch.rpm</filename><sum type="sha256">603425638ccf77c82a605e192422c9240d92cba29ac7713bffa9faa9c93da877</sum></package><package arch="noarch" epoch="2" name="texlive-rsfs-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-rsfs-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">fc207758a5524b3be78e45e73befa872f4e37dc64f42d9e3ca94ff23772bf8f7</sum></package><package arch="noarch" epoch="2" name="texlive-sansmath-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17997.1.1"><filename>texlive-sansmath-doc-svn17997.1.1-45.el7.noarch.rpm</filename><sum type="sha256">084fd308b5785da6b642128d416f884fad425c4dbfad0e963bbdb60d842a0598</sum></package><package arch="noarch" epoch="2" name="texlive-pdftex-def" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn22653.0.06d"><filename>texlive-pdftex-def-svn22653.0.06d-45.el7.noarch.rpm</filename><sum type="sha256">e1818ce0ccbd1c57b287b82ea907a6fc07a4a8c091b7575b108ac0f18b1da3c9</sum></package><package arch="noarch" epoch="2" name="texlive-xecjk-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28816.3.1.2"><filename>texlive-xecjk-doc-svn28816.3.1.2-45.el7.noarch.rpm</filename><sum type="sha256">54535cee6780cc6b8bf164225e56c0d8757e5bc225c5a4275fcf35d11dffbb13</sum></package><package arch="noarch" epoch="2" name="texlive-wrapfig-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn22048.3.6"><filename>texlive-wrapfig-doc-svn22048.3.6-45.el7.noarch.rpm</filename><sum type="sha256">2e705627c149403a72a5a047e1436cdc77b3c253d9fc9cd0446f23323a7c9b40</sum></package><package arch="noarch" epoch="2" name="texlive-philokalia-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18651.1.1"><filename>texlive-philokalia-doc-svn18651.1.1-45.el7.noarch.rpm</filename><sum type="sha256">80e0e141382f8f0fa4735a19c6ebe7e3be178d65a9ceb0d1ff27a46b121817d8</sum></package><package arch="noarch" epoch="2" name="texlive-titlesec-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24852.2.10.0"><filename>texlive-titlesec-doc-svn24852.2.10.0-45.el7.noarch.rpm</filename><sum type="sha256">1cee81eb0a925b9eda51220f740b9b84833bcdfdbb4f721557ac458005865a9b</sum></package><package arch="noarch" epoch="2" name="texlive-ifluatex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26725.1.3"><filename>texlive-ifluatex-svn26725.1.3-45.el7.noarch.rpm</filename><sum type="sha256">fd671f3734d4bdd5e40670b693524ed1e4c07ddd025965e290335b452b2974ae</sum></package><package arch="noarch" epoch="2" name="texlive-ifmtarg-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19363.1.2a"><filename>texlive-ifmtarg-doc-svn19363.1.2a-45.el7.noarch.rpm</filename><sum type="sha256">e2648a180416fa7f5a0805b1d53d11be438badfda0b191576d575505e7bf0bef</sum></package><package arch="noarch" epoch="2" name="texlive-euenc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19795.0.1h"><filename>texlive-euenc-svn19795.0.1h-45.el7.noarch.rpm</filename><sum type="sha256">f79870e7ea2856090a526c9fb1c86616423da39973bd6b281cf8913c81bfaee6</sum></package><package arch="noarch" epoch="2" name="texlive-collection-documentation-base" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17091.0"><filename>texlive-collection-documentation-base-svn17091.0-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">226ced27a423a9b6ea3f0bc28cc09486425fa71e665a47e76956c062deb0ee8e</sum></package><package arch="noarch" epoch="2" name="texlive-amsmath-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29327.2.14"><filename>texlive-amsmath-doc-svn29327.2.14-45.el7.noarch.rpm</filename><sum type="sha256">5f4abf32b3e339740db88fe9b2cb133849a1f54917a9ae0b6a8ce2b2235b1aba</sum></package><package arch="noarch" epoch="2" name="texlive-sauerj" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-sauerj-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">120676aec8a28caa426b66bffd96ffeb18499314f6298e8ff24c96a5141d70c4</sum></package><package arch="noarch" epoch="2" name="texlive-parskip" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19963.2.0"><filename>texlive-parskip-svn19963.2.0-45.el7.noarch.rpm</filename><sum type="sha256">2feb0fe12df7d6a6a02f500e23ff3434d90438f2b30c97aac19375dcd3d59c53</sum></package><package arch="x86_64" epoch="2" name="texlive-mfware-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26509.0"><filename>texlive-mfware-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">b01b0ecb4ade5c5f70dc965809f5cbc08d369b75ad76a235e916799d3c472f77</sum></package><package arch="noarch" epoch="2" name="texlive-tetex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29585.3.0"><filename>texlive-tetex-svn29585.3.0-45.el7.noarch.rpm</filename><sum type="sha256">f4bcb149dbf464cbdd07cf55f7e6b63d4c38876e2b23bfecba15442a2035f2b5</sum></package><package arch="noarch" epoch="2" name="texlive-mdwtools" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.05.4"><filename>texlive-mdwtools-svn15878.1.05.4-45.el7.noarch.rpm</filename><sum type="sha256">79259551c697773243dd4c44cedfb31a4c24a3d088c4800e423904fa774ed3e3</sum></package><package arch="noarch" epoch="2" name="texlive-ifxetex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19685.0.5"><filename>texlive-ifxetex-svn19685.0.5-45.el7.noarch.rpm</filename><sum type="sha256">474fe2e64456f37d5d701c9ae57c6ef0eb512344fa3582586bc4310bf441c70e</sum></package><package arch="noarch" epoch="2" name="texlive-ms" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24467.0"><filename>texlive-ms-svn24467.0-45.el7.noarch.rpm</filename><sum type="sha256">be6940aed1e6f6475d92d15a642d015c24cf0244e331a82d9f5c08d141468039</sum></package><package arch="noarch" epoch="2" name="texlive-xstring" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29258.1.7a"><filename>texlive-xstring-svn29258.1.7a-45.el7.noarch.rpm</filename><sum type="sha256">5486866c84612ce11fb401a48d376eddfce9b4b7ec2997848b4cf2f39c7b0b10</sum></package><package arch="noarch" epoch="2" name="texlive-metapost" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.1.212"><filename>texlive-metapost-svn26689.1.212-45.el7.noarch.rpm</filename><sum type="sha256">6d576aa5e6b3c0921768963633246076d201e088136a35263242793d4166aff1</sum></package><package arch="noarch" epoch="2" name="texlive-dvips" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29585.0"><filename>texlive-dvips-svn29585.0-45.el7.noarch.rpm</filename><sum type="sha256">a00646d8182ea039845a3c3e46c7836890dfe2e5798e28cab726a110b6546b64</sum></package><package arch="noarch" epoch="2" name="texlive-filecontents" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24250.1.3"><filename>texlive-filecontents-svn24250.1.3-45.el7.noarch.rpm</filename><sum type="sha256">7b4879551a95fb109e9d19f84eaf80d2f3c6b9fea212f305cebe78f85df881e3</sum></package><package arch="noarch" epoch="2" name="texlive-collection-basic" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26314.0"><filename>texlive-collection-basic-svn26314.0-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">deb420ff838ef295b24fd8be83301c2986355520941442aad34afc9dfdd46ca5</sum></package><package arch="noarch" epoch="2" name="texlive-polyglossia" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26163.v1.2.1"><filename>texlive-polyglossia-svn26163.v1.2.1-45.el7.noarch.rpm</filename><sum type="sha256">6ce7e41d143bf4d9981c8ffb523da007598e68bc29a5a38ab5112abb4d23fadc</sum></package><package arch="noarch" epoch="2" name="texlive-dvipng-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.1.14"><filename>texlive-dvipng-doc-svn26689.1.14-45.el7.noarch.rpm</filename><sum type="sha256">87727d8c6f4a10e2e810c1a130280c22bda441eac38a83314617de6998aad001</sum></package><package arch="noarch" epoch="2" name="texlive-tocloft-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn20084.2.3e"><filename>texlive-tocloft-doc-svn20084.2.3e-45.el7.noarch.rpm</filename><sum type="sha256">d0b117426e0ffa5ec06dd907b0d0e558b8b29f26a66f94fcb47a8ca2504b45bc</sum></package><package arch="x86_64" epoch="2" name="texlive-xetex-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26912.0"><filename>texlive-xetex-bin-svn26912.0-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">b8503cd968d2dfed61253d791c23450c80eb9d48643e9b065ca99ee558b6abc3</sum></package><package arch="noarch" epoch="2" name="texlive-multirow-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17256.1.6"><filename>texlive-multirow-doc-svn17256.1.6-45.el7.noarch.rpm</filename><sum type="sha256">74410daa4bd1aec4fc5d6d928794c0f8b6da2a4ef2f7f14ecaaec5bfb0badbcb</sum></package><package arch="noarch" epoch="2" name="texlive-tex4ht" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29474.0"><filename>texlive-tex4ht-svn29474.0-45.el7.noarch.rpm</filename><sum type="sha256">3e4a2d01c69251cc3e3f0ecbdb58b468d1aff5fdd97bca70ee37c1d84572fb19</sum></package><package arch="noarch" epoch="2" name="texlive-latex-fonts-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28888.0"><filename>texlive-latex-fonts-doc-svn28888.0-45.el7.noarch.rpm</filename><sum type="sha256">470239e47851b2de1f0a5c25e95e2ab82aee795976f28784a03fe40c77a6813a</sum></package><package arch="noarch" epoch="2" name="texlive-latex-fonts" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28888.0"><filename>texlive-latex-fonts-svn28888.0-45.el7.noarch.rpm</filename><sum type="sha256">01f043b0f05e5da23568c8ea07fe52fcaf0a427fb45bed87b43640a0f3c51763</sum></package><package arch="noarch" epoch="2" name="texlive-fontbook-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn23608.0.2"><filename>texlive-fontbook-doc-svn23608.0.2-45.el7.noarch.rpm</filename><sum type="sha256">70f9991451e99a013b78f035d93f33e4784c038812adbbe2f4cd5e90913b7296</sum></package><package arch="noarch" epoch="2" name="texlive-pst-eps" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.0"><filename>texlive-pst-eps-svn15878.1.0-45.el7.noarch.rpm</filename><sum type="sha256">65040aef62ef448c43b9b03a80dd7bcb4954ae72f68eebdd6c400fb6a5e62e46</sum></package><package arch="i686" epoch="2" name="texlive-kpathsea-lib-devel" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="2012"><filename>texlive-kpathsea-lib-devel-2012-45.20130427_r30134.el7.i686.rpm</filename><sum type="sha256">c5bf738c144e4ed11393219c205655cd5b441acd47d6df9c7a196c927c4a59df</sum></package><package arch="noarch" epoch="2" name="texlive-tools" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26263.0"><filename>texlive-tools-svn26263.0-45.el7.noarch.rpm</filename><sum type="sha256">8c97f1a002c8d79fd871155734d99c1246a83deafba9d65f855eb99f6b81e6c2</sum></package><package arch="noarch" epoch="2" name="texlive-index-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24099.4.1beta"><filename>texlive-index-doc-svn24099.4.1beta-45.el7.noarch.rpm</filename><sum type="sha256">7a8c3fa1b18f7ee70b290158e15ed473a2bc412e7dde0ae191e3424d8d640bff</sum></package><package arch="noarch" epoch="2" name="texlive-bibtopic-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.1a"><filename>texlive-bibtopic-doc-svn15878.1.1a-45.el7.noarch.rpm</filename><sum type="sha256">be4f77229a1ebd5f778abbd1e116bc372c3e67df28b8ba30dd1eec530672d101</sum></package><package arch="noarch" epoch="2" name="texlive-sansmath" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17997.1.1"><filename>texlive-sansmath-svn17997.1.1-45.el7.noarch.rpm</filename><sum type="sha256">08680775ebb0afee34b26acb6438c69a3d21ebfbd876bb371e0fdef1d04d6f87</sum></package><package arch="noarch" epoch="2" name="texlive-ncntrsbk" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28614.0"><filename>texlive-ncntrsbk-svn28614.0-45.el7.noarch.rpm</filename><sum type="sha256">8bb1be66510d86334285a05b421392ed0c16572e288e2cc6127310534716c28d</sum></package><package arch="x86_64" epoch="2" name="texlive-fontware-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26509.0"><filename>texlive-fontware-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">01a69c8f37a82f378c64fd999c6ba3477675e9baba0711e4a88f1f663860bd15</sum></package><package arch="noarch" epoch="2" name="texlive-xecyr" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn20221.1.1"><filename>texlive-xecyr-svn20221.1.1-45.el7.noarch.rpm</filename><sum type="sha256">c6620374644007ee0c00e1e1571b1659cbfea5cb06aa7fc92625189857577f8e</sum></package><package arch="noarch" epoch="2" name="texlive-sepnum" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn20186.2.0"><filename>texlive-sepnum-svn20186.2.0-45.el7.noarch.rpm</filename><sum type="sha256">d891e3c8cd1f431a261126f854ecfbdc44b924c97f5bd875c981371bb23b9df9</sum></package><package arch="noarch" epoch="2" name="texlive-cmap-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26568.0"><filename>texlive-cmap-doc-svn26568.0-45.el7.noarch.rpm</filename><sum type="sha256">8d53b4393d7012d4190b2319d59d2747af0edeb65818e6d96818090cb471e1bd</sum></package><package arch="noarch" epoch="2" name="texlive-pst-3d" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17257.1.10"><filename>texlive-pst-3d-svn17257.1.10-45.el7.noarch.rpm</filename><sum type="sha256">a7512ab53a8390e31622aae8ec7c0dae9b200a1d8a0ec6b50a6677ff30bc9c9b</sum></package><package arch="noarch" epoch="2" name="texlive-texlive.infra-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28217.0"><filename>texlive-texlive.infra-doc-svn28217.0-45.el7.noarch.rpm</filename><sum type="sha256">252b9d7abf7d192fe1c05a035b3420e957cdbe6f1b0ef0a2467e9ff83f249251</sum></package><package arch="noarch" epoch="2" name="texlive-jknapltx-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19440.0"><filename>texlive-jknapltx-doc-svn19440.0-45.el7.noarch.rpm</filename><sum type="sha256">da395a9f06494f3a1fe9ed3558831800602d94c67f1286c7f26aa2c324944d20</sum></package><package arch="noarch" epoch="2" name="texlive-mptopdf-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18674.0"><filename>texlive-mptopdf-bin-svn18674.0-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">9232432b3a7fdbd78daf1668e20454fb46545e4ec6444a38df5b319d829cca8d</sum></package><package arch="noarch" epoch="2" name="texlive-bookman" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28614.0"><filename>texlive-bookman-svn28614.0-45.el7.noarch.rpm</filename><sum type="sha256">0aa8dacfc91c8df352aa67b1cd5eaf492e3a80d0992d311e2ff454a74e52b733</sum></package><package arch="x86_64" epoch="2" name="texlive-kpathsea-lib-devel" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="2012"><filename>texlive-kpathsea-lib-devel-2012-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">2232b06be98390c8132598a082c1a98f3bfeff246d2bd95f0dab334a80febe82</sum></package><package arch="noarch" epoch="2" name="texlive-cite-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19955.5.3"><filename>texlive-cite-doc-svn19955.5.3-45.el7.noarch.rpm</filename><sum type="sha256">0ffeb9c4c9c839ed46adc472a787f09112ff342fb0b9b6c936e862d8380735f5</sum></package><package arch="noarch" epoch="2" name="texlive-seminar" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18322.1.5"><filename>texlive-seminar-svn18322.1.5-45.el7.noarch.rpm</filename><sum type="sha256">f3ce1b6d4ce71382ef41d20845e038964ea4160849f20b85d4ac77e854167299</sum></package><package arch="noarch" epoch="2" name="texlive-lm-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28119.2.004"><filename>texlive-lm-doc-svn28119.2.004-45.el7.noarch.rpm</filename><sum type="sha256">45502f0c2440cc8a5297e0aac1aca1e4afdf6e18d2469384020ae40d37379774</sum></package><package arch="noarch" epoch="2" name="texlive-qstest" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-qstest-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">3bc95effafef9406971c47c8f8d1dbc11f68c731715983d486451790029f8b66</sum></package><package arch="noarch" epoch="2" name="texlive-anysize" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-anysize-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">1ee1f994c9690169981c3096f98be49ca91a23b2698f30d8ec6d5dd1a64106ad</sum></package><package arch="noarch" epoch="2" name="texlive-pgf" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn22614.2.10"><filename>texlive-pgf-svn22614.2.10-45.el7.noarch.rpm</filename><sum type="sha256">1fbfe441e8b3caba4b66ac7a48df4b63b7ee5786d7e714c233f3499140f2cadf</sum></package><package arch="noarch" epoch="2" name="texlive-t2-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29349.0"><filename>texlive-t2-doc-svn29349.0-45.el7.noarch.rpm</filename><sum type="sha256">e6187ef1aa3fcb7c299ea2963417fef43968c79794c71117283b6a187767d600</sum></package><package arch="noarch" epoch="2" name="texlive-fp" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-fp-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">02169f9103fb12d68651cda7c8ddc1790866f8c2c68fca9e7c2361eb33bad571</sum></package><package arch="noarch" epoch="2" name="texlive-times" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28614.0"><filename>texlive-times-svn28614.0-45.el7.noarch.rpm</filename><sum type="sha256">bdc55ace64a56b86e24e2404888746e2519c7a65794317f8da0461d2132eb33e</sum></package><package arch="noarch" epoch="2" name="texlive-xmltex-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn3006.0"><filename>texlive-xmltex-bin-svn3006.0-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">b88984d5c985736b354daa1f2341a37a83ba12b32770b8407f19a35363764d1d</sum></package><package arch="noarch" epoch="2" name="texlive-eurosym" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17265.1.4_subrfix"><filename>texlive-eurosym-svn17265.1.4_subrfix-45.el7.noarch.rpm</filename><sum type="sha256">65c70d1893322a939643794fb0bbded06cd16321f1f7dfcdb4d669704fb09dbc</sum></package><package arch="noarch" epoch="2" name="texlive-pstricks" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29678.2.39"><filename>texlive-pstricks-svn29678.2.39-45.el7.noarch.rpm</filename><sum type="sha256">62a435b711e41fd303c882fe5cf30da9455facfe1c8518fb44d62fb31d53d748</sum></package><package arch="noarch" epoch="2" name="texlive-tetex-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29585.3.0"><filename>texlive-tetex-doc-svn29585.3.0-45.el7.noarch.rpm</filename><sum type="sha256">de9994cca10bee3194f2ab0d5cb9caf7b578dc800b56c6b56a5af7087bef1494</sum></package><package arch="noarch" epoch="2" name="texlive-psnfss" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn23394.9.2a"><filename>texlive-psnfss-svn23394.9.2a-45.el7.noarch.rpm</filename><sum type="sha256">9cae432f7b3c09c0c0b9e72bc14685e3f6803f6696d49b7ae57e908faa284223</sum></package><package arch="noarch" epoch="2" name="texlive-framed-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26789.0.96"><filename>texlive-framed-doc-svn26789.0.96-45.el7.noarch.rpm</filename><sum type="sha256">44ad41c363f14345b956eb926fa353322437b3fbbf7b3e1a2b0591f81fee065b</sum></package><package arch="noarch" epoch="2" name="texlive-changebar" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29349.3.5c"><filename>texlive-changebar-svn29349.3.5c-45.el7.noarch.rpm</filename><sum type="sha256">fe6d4645e70453f96cb647bb440bbbdb669ed474c92d22fcf6e5b994656755cd</sum></package><package arch="noarch" epoch="2" name="texlive-extsizes" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17263.1.4a"><filename>texlive-extsizes-svn17263.1.4a-45.el7.noarch.rpm</filename><sum type="sha256">0eff2053ff8b068c7395c61b1f8a6982a0253699b451a0f1bb166beb05b581a9</sum></package><package arch="noarch" epoch="2" name="texlive-txfonts" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-txfonts-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">4935e192a8dc83dd566159619404c99afa040b315130e2c6486cdc2b30cc431f</sum></package><package arch="noarch" epoch="2" name="texlive-txfonts-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-txfonts-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">3921175810d9dfb0206d292bc984a16069109679b34e8891907e00781503b9f0</sum></package><package arch="noarch" epoch="2" name="texlive-wasysym-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.0"><filename>texlive-wasysym-doc-svn15878.2.0-45.el7.noarch.rpm</filename><sum type="sha256">922d138d5352fd50b0f689cd94795b0654d61b271aa6df3cee32d48e26774fe2</sum></package><package arch="noarch" epoch="2" name="texlive-xstring-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29258.1.7a"><filename>texlive-xstring-doc-svn29258.1.7a-45.el7.noarch.rpm</filename><sum type="sha256">bfa572d89624d3d83ef03d63a0c1c8026b757ca9f2bfca0bd107008465b5364e</sum></package><package arch="noarch" epoch="2" name="texlive-ptext" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28124.1"><filename>texlive-ptext-svn28124.1-45.el7.noarch.rpm</filename><sum type="sha256">f994a00bf927032b7fe3be85ceadc5cdfaad166193e944ebd2029a9eaad9e3cb</sum></package><package arch="noarch" epoch="2" name="texlive-natbib-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn20668.8.31b"><filename>texlive-natbib-doc-svn20668.8.31b-45.el7.noarch.rpm</filename><sum type="sha256">4dd45329c1e2fc9e21b93cf9c9a87445a85d8cfdd86c21157a68d914dde778bc</sum></package><package arch="noarch" epoch="2" name="texlive-pstricks-add-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28750.3.59"><filename>texlive-pstricks-add-doc-svn28750.3.59-45.el7.noarch.rpm</filename><sum type="sha256">88dd7701f6d5b2422167086dfe0089491ec54e4ade7cab5a6498eeecc5c0325a</sum></package><package arch="noarch" epoch="2" name="texlive-kastrup" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-kastrup-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">f3b20097bef1e623b9bb9a53b3fef2b3478427a58a009e8367ac29420b34e6c8</sum></package><package arch="noarch" epoch="2" name="texlive-showexpl-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27790.v0.3j"><filename>texlive-showexpl-doc-svn27790.v0.3j-45.el7.noarch.rpm</filename><sum type="sha256">1d7fda126c0c8ee09c8679b035f2abd05da76c4f6db3ee468dda8f2633a35569</sum></package><package arch="noarch" epoch="2" name="texlive-mathpazo-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.003"><filename>texlive-mathpazo-doc-svn15878.1.003-45.el7.noarch.rpm</filename><sum type="sha256">ff870fcb84606917e6afb2012a697877215ee1c6d14929927f58b6de3b36492c</sum></package><package arch="noarch" epoch="2" name="texlive-listings" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.4"><filename>texlive-listings-svn15878.1.4-45.el7.noarch.rpm</filename><sum type="sha256">67bce833df60834210aba6e6cc06bbdb14dce817ff228c17a303ff2880c17b31</sum></package><package arch="noarch" epoch="2" name="texlive-tex-gyre" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18651.2.004"><filename>texlive-tex-gyre-svn18651.2.004-45.el7.noarch.rpm</filename><sum type="sha256">62c6e38d93fec24564a5e747ff36272a7a7080e0f8e488bf686a68424be4ee25</sum></package><package arch="noarch" epoch="2" name="texlive-hyph-utf8" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29641.0"><filename>texlive-hyph-utf8-svn29641.0-45.el7.noarch.rpm</filename><sum type="sha256">939e8b2603c4d2964f65034634780ad2d4fd69b83e2acd04042b338ceb6565d3</sum></package><package arch="noarch" epoch="2" name="texlive-ae" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.4"><filename>texlive-ae-svn15878.1.4-45.el7.noarch.rpm</filename><sum type="sha256">0a0db8ca6f7f426e7b147cfb0b268b6971b5bc96633f818b83641dd49706a79c</sum></package><package arch="noarch" epoch="2" name="texlive-thailatex-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29349.0.5.1"><filename>texlive-thailatex-doc-svn29349.0.5.1-45.el7.noarch.rpm</filename><sum type="sha256">37b724c2f56ce1644324fc4a78cc2c24dd5c8742995885ea9a24bc24c8edc724</sum></package><package arch="noarch" epoch="2" name="texlive-chngcntr" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17157.1.0a"><filename>texlive-chngcntr-svn17157.1.0a-45.el7.noarch.rpm</filename><sum type="sha256">c47a02df88dc08ddd38d184ac2dee16e7207cab52bc4fc38bb422bd9d5b530fd</sum></package><package arch="noarch" epoch="2" name="texlive-eurosym-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17265.1.4_subrfix"><filename>texlive-eurosym-doc-svn17265.1.4_subrfix-45.el7.noarch.rpm</filename><sum type="sha256">0630ab6b0abd32e469709a48faf8d88426a84ba61bae3a0e99094e6ae66295c4</sum></package><package arch="noarch" epoch="2" name="texlive-texconfig" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29349.0"><filename>texlive-texconfig-svn29349.0-45.el7.noarch.rpm</filename><sum type="sha256">bb5fe2cf9574aceab195e9112d0865085d0bff2ada4ea8919b9d0008b68cc4b8</sum></package><package arch="noarch" epoch="2" name="texlive-uhc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn16791.0"><filename>texlive-uhc-svn16791.0-45.el7.noarch.rpm</filename><sum type="sha256">05e3bc6195c02c718ecdc34153a59c69965342dff68b02688c24ec4d15216e83</sum></package><package arch="noarch" epoch="2" name="texlive-pst-grad-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.06"><filename>texlive-pst-grad-doc-svn15878.1.06-45.el7.noarch.rpm</filename><sum type="sha256">4c061fc10850a2724e2b5506bb09c5bd4afea356da0af57dade34148ec265498</sum></package><package arch="noarch" epoch="2" name="texlive-enctex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28602.0"><filename>texlive-enctex-svn28602.0-45.el7.noarch.rpm</filename><sum type="sha256">e9e2ce8bade060e7793318201e2d22e76418b2989fd24d0a1f88555de0eab153</sum></package><package arch="noarch" epoch="2" name="texlive-underscore-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18261.0"><filename>texlive-underscore-doc-svn18261.0-45.el7.noarch.rpm</filename><sum type="sha256">97eeb2d22fa86d42db9bc58ec6fa4626f8ab8dbf526d6ca7f789387b1e514155</sum></package><package arch="noarch" epoch="2" name="texlive-pst-plot-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28729.1.44"><filename>texlive-pst-plot-doc-svn28729.1.44-45.el7.noarch.rpm</filename><sum type="sha256">ace65da04b9eab57534f702e608c8afb7c61d323f09c04f1475e847490a7e0dc</sum></package><package arch="noarch" epoch="2" name="texlive-memoir" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn21638.3.6j_patch_6.0g"><filename>texlive-memoir-svn21638.3.6j_patch_6.0g-45.el7.noarch.rpm</filename><sum type="sha256">8c2eca02762830123db292b77d6975bb97d473d91e048283c280f6c7dfcf3e1b</sum></package><package arch="noarch" epoch="2" name="texlive-euro" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn22191.1.1"><filename>texlive-euro-svn22191.1.1-45.el7.noarch.rpm</filename><sum type="sha256">f5379d45464d4ae3bfb5de8489a268b70d4f2fcf326c1a7008fa742c793546bf</sum></package><package arch="noarch" epoch="2" name="texlive-xetex-pstricks-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17055.0"><filename>texlive-xetex-pstricks-doc-svn17055.0-45.el7.noarch.rpm</filename><sum type="sha256">b29277a5d1a0c9b8d45ac4be059a147c216c235dad389b1fc2e293c44b7a1469</sum></package><package arch="noarch" epoch="2" name="texlive-pslatex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn16416.0"><filename>texlive-pslatex-svn16416.0-45.el7.noarch.rpm</filename><sum type="sha256">79813ea9fe59ddf5f46719083a831dab19caefd533309fd7419ab274e3e63a82</sum></package><package arch="x86_64" epoch="2" name="texlive-kpathsea-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27347.0"><filename>texlive-kpathsea-bin-svn27347.0-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">97efe19f0f3324b2b88012540949d65ce82ad810e35861a804db4f3364598548</sum></package><package arch="noarch" epoch="2" name="texlive-soul-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.4"><filename>texlive-soul-doc-svn15878.2.4-45.el7.noarch.rpm</filename><sum type="sha256">fc0f50e8aab070baeffa9d4152446c8f6dd6738073cfbcb2209fb16e5e0453f8</sum></package><package arch="noarch" epoch="2" name="texlive-mathspec" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0.2"><filename>texlive-mathspec-svn15878.0.2-45.el7.noarch.rpm</filename><sum type="sha256">d8b37597e4489dd8ca9c3c2c892fe87281eca60f1ca451b910c675c1d802d620</sum></package><package arch="noarch" epoch="2" name="texlive-pst-blur" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.0"><filename>texlive-pst-blur-svn15878.2.0-45.el7.noarch.rpm</filename><sum type="sha256">e6af6f9dc63ff9b8ea23927d1ed20ae5058f0945630438ee84f95d379b308c74</sum></package><package arch="noarch" epoch="2" name="texlive-iftex-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29654.0.2"><filename>texlive-iftex-doc-svn29654.0.2-45.el7.noarch.rpm</filename><sum type="sha256">dd57fd3b5bf93c6a9ea150f9c76f623a686a6425cfb1604566cb9d92b80b5490</sum></package><package arch="x86_64" epoch="2" name="texlive" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="2012"><filename>texlive-2012-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">fd8f3d38631d33650a15b5acdb88971ea7ee364a4af3b29cecdc1071a0471471</sum></package><package arch="noarch" epoch="2" name="texlive-wadalab" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn22576.0"><filename>texlive-wadalab-svn22576.0-45.el7.noarch.rpm</filename><sum type="sha256">68711264c3e91f8ed8d8e0743f240448b05db8a07babec02145e025f64051acd</sum></package><package arch="noarch" epoch="2" name="texlive-latexconfig" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28991.0"><filename>texlive-latexconfig-svn28991.0-45.el7.noarch.rpm</filename><sum type="sha256">4fd069fd9494cb6810bb1cdba312c89cbe13fd14711b897abfce7b413af44ac8</sum></package><package arch="noarch" epoch="2" name="texlive-makecmds" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-makecmds-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">2f78be340cc0e2cd8f0e240418bfd2c6fab26c1c972184ec953b682093b4e380</sum></package><package arch="noarch" epoch="2" name="texlive-palatino" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28614.0"><filename>texlive-palatino-svn28614.0-45.el7.noarch.rpm</filename><sum type="sha256">f0d6bc6576157854e649a2317c3fde1ab7b7082ab9c1e52d12392a14fb19ca4f</sum></package><package arch="noarch" epoch="2" name="texlive-parallel" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-parallel-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">ef109ee3a4b18f9d44dd6ea50e46f838f7125cf59c3ac837754e0334a147b0d6</sum></package><package arch="noarch" epoch="2" name="texlive-graphics-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn25405.1.0o"><filename>texlive-graphics-doc-svn25405.1.0o-45.el7.noarch.rpm</filename><sum type="sha256">67bb876a8b833a205f2978af0d1a147c29692e3523cc2c9860f93fcae1d7370c</sum></package><package arch="noarch" epoch="2" name="texlive-dvipdfmx" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26765.0"><filename>texlive-dvipdfmx-svn26765.0-45.el7.noarch.rpm</filename><sum type="sha256">8771a923fa4b9b19d424806450f2a3aa10c3f4087b2ada06b29a015a6b15d436</sum></package><package arch="noarch" epoch="2" name="texlive-mnsymbol" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18651.1.4"><filename>texlive-mnsymbol-svn18651.1.4-45.el7.noarch.rpm</filename><sum type="sha256">d75dc35d34a94c380be3f4e2ab90246a3aa0c4a56ebb0ab68dd5d8cf8fe35ad9</sum></package><package arch="noarch" epoch="2" name="texlive-utopia-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-utopia-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">1bf151a7da7af484747140a0543309652af867dcf669c4d4b46dfae3d630e068</sum></package><package arch="noarch" epoch="2" name="texlive-hyphenat-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.3c"><filename>texlive-hyphenat-doc-svn15878.2.3c-45.el7.noarch.rpm</filename><sum type="sha256">eb01e04710b27dea038575bd60945e2ee1329f188e8e71ad7012e74a1f990fe7</sum></package><package arch="noarch" epoch="2" name="texlive-t2" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29349.0"><filename>texlive-t2-svn29349.0-45.el7.noarch.rpm</filename><sum type="sha256">5a1f77cb58268413cd03e9efcc36bab038517de753b7e93d8f2a82275b537458</sum></package><package arch="noarch" epoch="2" name="texlive-textpos" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28261.1.7h"><filename>texlive-textpos-svn28261.1.7h-45.el7.noarch.rpm</filename><sum type="sha256">8ccb56ac9b9e4873faa946ce0153a041a1aab9917550a9205d75d8fa1eb58171</sum></package><package arch="noarch" epoch="2" name="texlive-xetex-def" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29154.0.95"><filename>texlive-xetex-def-svn29154.0.95-45.el7.noarch.rpm</filename><sum type="sha256">4416b76f27f4d4e5711e9c4ed95cac6ab92e6d099be51104fec445f68e1bdebb</sum></package><package arch="noarch" epoch="2" name="texlive-utopia" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-utopia-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">37ffefdce4b6dea3b8406238519e1a75cb5d7cbcea15ac1b31df1f6163e7d7bd</sum></package><package arch="noarch" epoch="2" name="texlive-tocloft" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn20084.2.3e"><filename>texlive-tocloft-svn20084.2.3e-45.el7.noarch.rpm</filename><sum type="sha256">a1423f22609cdff7e7b713ce881d1cde0a82156cd5be4279815246746c4f4f7e</sum></package><package arch="noarch" epoch="2" name="texlive-oberdiek" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26725.0"><filename>texlive-oberdiek-svn26725.0-45.el7.noarch.rpm</filename><sum type="sha256">4bda9b9dc45eadba92f991e4fe950505e6604de758f2743ec3d694966e5ce4d6</sum></package><package arch="noarch" epoch="2" name="texlive-epstopdf-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26577.0"><filename>texlive-epstopdf-doc-svn26577.0-45.el7.noarch.rpm</filename><sum type="sha256">463350636e9acc7f61305056ce7e3985fd26fb7f031c64fd8dc45d0a8c3a7310</sum></package><package arch="noarch" epoch="2" name="texlive-anysize-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-anysize-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">9a7b232e0dbee718d7239a3917ffde5654b48955a2f6f1e7334681120189b31a</sum></package><package arch="noarch" epoch="2" name="texlive-adjustbox" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26555.0"><filename>texlive-adjustbox-svn26555.0-45.el7.noarch.rpm</filename><sum type="sha256">5660804528c96a7aa393fe51550ba5bddbd0f349849e091559d1cee53726d41f</sum></package><package arch="noarch" epoch="2" name="texlive-l3packages" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29361.SVN_4467"><filename>texlive-l3packages-svn29361.SVN_4467-45.el7.noarch.rpm</filename><sum type="sha256">bfffdfaab7ae034166b1de37432d346277eafa1a93422e0c3938948abef456ff</sum></package><package arch="noarch" epoch="2" name="texlive-typehtml-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17134.0"><filename>texlive-typehtml-doc-svn17134.0-45.el7.noarch.rpm</filename><sum type="sha256">df5b09029180c2b9bc993bdf87ed83758d7a755eaf8a81b5b052f6f0732aeb64</sum></package><package arch="noarch" epoch="2" name="texlive-pdftex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29585.1.40.11"><filename>texlive-pdftex-svn29585.1.40.11-45.el7.noarch.rpm</filename><sum type="sha256">a5d865311c341edaf56a855b2fe0a56616ef1a783b1108fea1b410dbcb5e5e27</sum></package><package arch="noarch" epoch="2" name="texlive-xecyr-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn20221.1.1"><filename>texlive-xecyr-doc-svn20221.1.1-45.el7.noarch.rpm</filename><sum type="sha256">1a28abfdf7a25ae040280d890bd7770bc2fd036b1d4976351abc88032e23461b</sum></package><package arch="noarch" epoch="2" name="texlive-xetex-itrans" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24105.4.0"><filename>texlive-xetex-itrans-svn24105.4.0-45.el7.noarch.rpm</filename><sum type="sha256">e1c87910fe9dc0b82ae87c9527f2633607e342935c5bf660f2e3f82ecafeae40</sum></package><package arch="noarch" epoch="2" name="texlive-zapfding" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28614.0"><filename>texlive-zapfding-svn28614.0-45.el7.noarch.rpm</filename><sum type="sha256">f94499b8383fe2d357b5463d1d0cd7bb1161cb73f099f6d3de50ad5dc16fbfa5</sum></package><package arch="noarch" epoch="2" name="texlive-fontspec-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29412.v2.3a"><filename>texlive-fontspec-doc-svn29412.v2.3a-45.el7.noarch.rpm</filename><sum type="sha256">32c080356697c6ff4934049f0e72a91489a6f19988a4263b0c4fade1f1425c24</sum></package><package arch="noarch" epoch="2" name="texlive-ifluatex-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26725.1.3"><filename>texlive-ifluatex-doc-svn26725.1.3-45.el7.noarch.rpm</filename><sum type="sha256">e9f920f71733ccfb340e910d847d6a304113eef7b0c714718d921420f4e6d3f9</sum></package><package arch="noarch" epoch="2" name="texlive-ctable-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26694.1.23"><filename>texlive-ctable-doc-svn26694.1.23-45.el7.noarch.rpm</filename><sum type="sha256">5a560e7fb722af53bd978cbfdd81d3c1ffc3a6800febba51f4bc872ce2a30fdf</sum></package><package arch="noarch" epoch="2" name="texlive-fancybox-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18304.1.4"><filename>texlive-fancybox-doc-svn18304.1.4-45.el7.noarch.rpm</filename><sum type="sha256">0dd97ed218cb7f4ecc080f3746223e2966915e8c5e24abfc1ffc96110d2524fd</sum></package><package arch="noarch" epoch="2" name="texlive-dvipdfm-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.0.13.2d"><filename>texlive-dvipdfm-doc-svn26689.0.13.2d-45.el7.noarch.rpm</filename><sum type="sha256">16dcea9a1d005bafcae6fe8316d3fc448d67316374b5d6bc979bce952598cf5d</sum></package><package arch="noarch" epoch="2" name="texlive-mfnfss-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19410.0"><filename>texlive-mfnfss-doc-svn19410.0-45.el7.noarch.rpm</filename><sum type="sha256">3fe3dad3bc41b93915482d313ac8fa1a294870410fb76d6c48e14f4a17e952b0</sum></package><package arch="noarch" epoch="2" name="texlive-mh-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29420.0"><filename>texlive-mh-doc-svn29420.0-45.el7.noarch.rpm</filename><sum type="sha256">9d7b38ae0834382ff72bb27c476ce799777df81719a71b3eb234ff091c420f3c</sum></package><package arch="noarch" epoch="2" name="texlive-xmltex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28273.0.8"><filename>texlive-xmltex-svn28273.0.8-45.el7.noarch.rpm</filename><sum type="sha256">9e488cfa170049440e708de1c31aeb5ec29199e2d3b97196ac2da62244a76886</sum></package><package arch="noarch" epoch="2" name="texlive-underscore" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18261.0"><filename>texlive-underscore-svn18261.0-45.el7.noarch.rpm</filename><sum type="sha256">6abfd0b1409a3b4731efda7385907e074f912fd3a263dad93cc2ce76d52f5906</sum></package><package arch="noarch" epoch="2" name="texlive-luaotfload" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26718.1.26"><filename>texlive-luaotfload-svn26718.1.26-45.el7.noarch.rpm</filename><sum type="sha256">534baf70d61c472ce0656e6013fd8b4078b462e5dc2764b07d007523cd93373e</sum></package><package arch="noarch" epoch="2" name="texlive-setspace-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24881.6.7a"><filename>texlive-setspace-doc-svn24881.6.7a-45.el7.noarch.rpm</filename><sum type="sha256">4f7f199444740acfc4af9fd86c7a4f406ce8a4a8e8f63455c39b084afc1c5532</sum></package><package arch="noarch" epoch="2" name="texlive-cm-lgc-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28250.0.5"><filename>texlive-cm-lgc-doc-svn28250.0.5-45.el7.noarch.rpm</filename><sum type="sha256">776100b2951fc52a8c09c7cf550eceab44f2cb2c949e8b205ac313c886c21657</sum></package><package arch="noarch" epoch="2" name="texlive-colortbl-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn25394.v1.0a"><filename>texlive-colortbl-doc-svn25394.v1.0a-45.el7.noarch.rpm</filename><sum type="sha256">afd00af4a66ad16006eb40104bc49aac0bea85ca699731e0344de061506f1c7b</sum></package><package arch="noarch" epoch="2" name="texlive-xetexfontinfo-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-xetexfontinfo-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">30743ccc027197d9c10332c7d0c57eaa411575c5c19bd2107e9129d4ebb6ee54</sum></package><package arch="noarch" epoch="2" name="texlive-ulem-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26785.0"><filename>texlive-ulem-doc-svn26785.0-45.el7.noarch.rpm</filename><sum type="sha256">7a0f3184e7c81d8bfa14e39a083b5ac73c7664ed4b739c6df3c1eae75110689b</sum></package><package arch="noarch" epoch="2" name="texlive-algorithms-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0.1"><filename>texlive-algorithms-doc-svn15878.0.1-45.el7.noarch.rpm</filename><sum type="sha256">783ee700fa8a8f5d342c46a72ba44e8b47fc300be6e0ce0bb0f57e88f7a76495</sum></package><package arch="noarch" epoch="2" name="texlive-titlesec" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24852.2.10.0"><filename>texlive-titlesec-svn24852.2.10.0-45.el7.noarch.rpm</filename><sum type="sha256">548c2928c48bf14419f86aebd5c290c950dd1937a31fbe8471aa40315ecfc995</sum></package><package arch="noarch" epoch="2" name="texlive-jadetex-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn3006.0"><filename>texlive-jadetex-bin-svn3006.0-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">43d5e9a282880bb8f1b6bb136ddbfdec703527a8ae82662f8917142619ac7922</sum></package><package arch="noarch" epoch="2" name="texlive-fixlatvian-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn21631.1a"><filename>texlive-fixlatvian-doc-svn21631.1a-45.el7.noarch.rpm</filename><sum type="sha256">bf87786a7aedb17fa51fc53897d50ab752dfbf7167ac630e3b84b4db92c0c652</sum></package><package arch="noarch" epoch="2" name="texlive-ucs" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27549.2.1"><filename>texlive-ucs-svn27549.2.1-45.el7.noarch.rpm</filename><sum type="sha256">fea318e93ba5016272b0563b1966b3a127cde96a5cf7bf5c24c40ee1f3443d4e</sum></package><package arch="noarch" epoch="2" name="texlive-xeindex-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn16760.0.2"><filename>texlive-xeindex-doc-svn16760.0.2-45.el7.noarch.rpm</filename><sum type="sha256">4a13424af84c48e760f221a56428fdae586cca52838a6ccc90581dc67e60141b</sum></package><package arch="noarch" epoch="2" name="texlive-svn-prov-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18017.3.1862"><filename>texlive-svn-prov-doc-svn18017.3.1862-45.el7.noarch.rpm</filename><sum type="sha256">b4f38f1ea6709fb99057375ed2f5bc0fba9b07dc12d1429f93292b451d0de62f</sum></package><package arch="noarch" epoch="2" name="texlive-euro-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn22191.1.1"><filename>texlive-euro-doc-svn22191.1.1-45.el7.noarch.rpm</filename><sum type="sha256">5f59b6a30f9bcb65aeaed3a9287e165ea2f64c4165e40222f8c445391e725b62</sum></package><package arch="noarch" epoch="2" name="texlive-carlisle-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18258.0"><filename>texlive-carlisle-doc-svn18258.0-45.el7.noarch.rpm</filename><sum type="sha256">82ad4b0cea6116a7cd4ff2f8b4f583ac879c13f412161d9e3d342d360ea4df94</sum></package><package arch="noarch" epoch="2" name="texlive-ae-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.4"><filename>texlive-ae-doc-svn15878.1.4-45.el7.noarch.rpm</filename><sum type="sha256">7ae93318bf4e82f316de2e8bb9523ff34f70c4ada1c837eb3a13b4700c152f8d</sum></package><package arch="noarch" epoch="2" name="texlive-natbib" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn20668.8.31b"><filename>texlive-natbib-svn20668.8.31b-45.el7.noarch.rpm</filename><sum type="sha256">f008585a71ae5d0884cf6d369ff933b2ce64343e3a12b3018a69bffd5388b0ad</sum></package><package arch="noarch" epoch="2" name="texlive-zapfchan" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28614.0"><filename>texlive-zapfchan-svn28614.0-45.el7.noarch.rpm</filename><sum type="sha256">a85793871769ceca8480e83929df9b6b10778945734a030e06565f8ddbc7528d</sum></package><package arch="noarch" epoch="2" name="texlive-caption" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29026.3.3__2013_02_03_"><filename>texlive-caption-svn29026.3.3__2013_02_03_-45.el7.noarch.rpm</filename><sum type="sha256">8b3562227a70604978591ad6e98bb0949db11a2cd725be7a54c98a15ddb90e5c</sum></package><package arch="noarch" epoch="2" name="texlive-norasi-c90" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-norasi-c90-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">20816e14bb1f82a2abed52c284f4b0f891ea3bcae104591ae8d7495115b9fa37</sum></package><package arch="noarch" epoch="2" name="texlive-fix2col-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17133.0"><filename>texlive-fix2col-doc-svn17133.0-45.el7.noarch.rpm</filename><sum type="sha256">5d5aae9855a9631a39afc682ee0019dac9749991d60d0e20d49d807fd3fe5918</sum></package><package arch="noarch" epoch="2" name="texlive-metalogo" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18611.0.12"><filename>texlive-metalogo-svn18611.0.12-45.el7.noarch.rpm</filename><sum type="sha256">e97df90649f450b59e58acf8de55a9fe4a763aae36ec4f71278cce7f4e1965c8</sum></package><package arch="noarch" epoch="2" name="texlive-wasysym" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.0"><filename>texlive-wasysym-svn15878.2.0-45.el7.noarch.rpm</filename><sum type="sha256">287c7e10f17a95f837519a5868c75b7b1e73a8db9b88f845f9d39df69f8a451c</sum></package><package arch="noarch" epoch="2" name="texlive-fpl" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.002"><filename>texlive-fpl-svn15878.1.002-45.el7.noarch.rpm</filename><sum type="sha256">627d9cc45db0311519318cff538af610ec7ca32e16830152b090efb90c99180d</sum></package><package arch="noarch" epoch="2" name="texlive-enctex-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28602.0"><filename>texlive-enctex-doc-svn28602.0-45.el7.noarch.rpm</filename><sum type="sha256">5040ba682014165448526752ec82e4bcb810aa08e7dfe8714ae5d8f9ac6e9261</sum></package><package arch="noarch" epoch="2" name="texlive-fontware" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.0"><filename>texlive-fontware-svn26689.0-45.el7.noarch.rpm</filename><sum type="sha256">bee24b19d612a418ec07d3918ef8cbddf89159da89ec69e772e32865f62d3a8d</sum></package><package arch="noarch" epoch="2" name="texlive-wadalab-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn22576.0"><filename>texlive-wadalab-doc-svn22576.0-45.el7.noarch.rpm</filename><sum type="sha256">30c555cecff7d6fec80973ee2f01d15acb20ae3c49300395703483c88e015cb8</sum></package><package arch="noarch" epoch="2" name="texlive-float" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.3d"><filename>texlive-float-svn15878.1.3d-45.el7.noarch.rpm</filename><sum type="sha256">8aa9294cfd448dd7a54a1cd69319a9cf702d97b5922c6aa41726264226903627</sum></package><package arch="noarch" epoch="2" name="texlive-eepic" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.1e"><filename>texlive-eepic-svn15878.1.1e-45.el7.noarch.rpm</filename><sum type="sha256">88920ec133c3dce2e12a7691228b505a1420284611b47817205f492f5dfbe46a</sum></package><package arch="noarch" epoch="2" name="texlive-threeparttable" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17383.0"><filename>texlive-threeparttable-svn17383.0-45.el7.noarch.rpm</filename><sum type="sha256">bcf5dfd2af5c6e9a260b452539423780e428dd4ddd12dff1eec722b3b525e325</sum></package><package arch="noarch" epoch="2" name="texlive-beamer-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29349.3.26"><filename>texlive-beamer-doc-svn29349.3.26-45.el7.noarch.rpm</filename><sum type="sha256">cf3833c6f543f5708349a15419a7ca07e19c988e1392f6f591432d82dbaa13f8</sum></package><package arch="noarch" epoch="2" name="texlive-titling" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.1d"><filename>texlive-titling-svn15878.2.1d-45.el7.noarch.rpm</filename><sum type="sha256">cb7a187ca00ca4f916f53593179b6cac08dd2681202b44f1d0d7edbc27ebc069</sum></package><package arch="noarch" epoch="2" name="texlive-fncychap-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn20710.v1.34"><filename>texlive-fncychap-doc-svn20710.v1.34-45.el7.noarch.rpm</filename><sum type="sha256">cdd5a1f6fe7300a2c8402064467698e83c7e440e1bfc17bdc863b8a5c48e0fa6</sum></package><package arch="noarch" epoch="2" name="texlive-xetex-pstricks" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17055.0"><filename>texlive-xetex-pstricks-svn17055.0-45.el7.noarch.rpm</filename><sum type="sha256">226dd647edb7ecf717f50c8fd39d7ee7f883c33ee64adc3bc5bce8074fc6583d</sum></package><package arch="x86_64" epoch="2" name="texlive-luatex-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26912.0"><filename>texlive-luatex-bin-svn26912.0-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">883de235b79957465f31a9065d8acd67d5a9507324f2cb358285f0ce0662d284</sum></package><package arch="noarch" epoch="2" name="texlive-uhc-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn16791.0"><filename>texlive-uhc-doc-svn16791.0-45.el7.noarch.rpm</filename><sum type="sha256">6f83b8987f47cbda9a34c09e96fa97e801afef7e84a06cc82068560c67138405</sum></package><package arch="x86_64" epoch="2" name="texlive-dvipdfmx-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26509.0"><filename>texlive-dvipdfmx-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">097cee6e9a306fa36f68e6d9861733341df30897a9a0308d5f7dd0f7795f16b4</sum></package><package arch="noarch" epoch="2" name="texlive-pxfonts-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-pxfonts-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">0fb125dbd1202c33230f9c874912bd45186acf85e6e3fe9d0d7c2735eb670417</sum></package><package arch="noarch" epoch="2" name="texlive-xepersian" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29661.12.1"><filename>texlive-xepersian-svn29661.12.1-45.el7.noarch.rpm</filename><sum type="sha256">1a970cb699a8c8ac89798a65bc9afa1dcd9974b6f4c584d6efd1b4dd93906f3c</sum></package><package arch="noarch" epoch="2" name="texlive-collection-latex" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn25030.0"><filename>texlive-collection-latex-svn25030.0-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">73e9476f4ffe126867a8a0c6ca052beb15901a19b8e76eece209612f40448cbe</sum></package><package arch="noarch" epoch="2" name="texlive-seminar-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18322.1.5"><filename>texlive-seminar-doc-svn18322.1.5-45.el7.noarch.rpm</filename><sum type="sha256">ddcc2b702fc34cb8191e0506a446c147afb876cc0e4da717fca118c5dcea1924</sum></package><package arch="noarch" epoch="2" name="texlive-xesearch-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn16041.0"><filename>texlive-xesearch-doc-svn16041.0-45.el7.noarch.rpm</filename><sum type="sha256">80055c8f2373fd6ac332572a2551e95e013084847bcd5923e0996a24ddedd78c</sum></package><package arch="noarch" epoch="2" name="texlive-pst-coil-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24020.1.06"><filename>texlive-pst-coil-doc-svn24020.1.06-45.el7.noarch.rpm</filename><sum type="sha256">3acf08d69a44b86db020e28678936141aab47f46dca8ed8cd636a6022359c9c1</sum></package><package arch="noarch" epoch="2" name="texlive-pst-node" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27799.1.25"><filename>texlive-pst-node-svn27799.1.25-45.el7.noarch.rpm</filename><sum type="sha256">c84400c207dfaf559c8762955b6c5530b4da8f6dd4608f23eb3141e6b5c8adf3</sum></package><package arch="noarch" epoch="2" name="texlive-jadetex-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn23409.3.13"><filename>texlive-jadetex-doc-svn23409.3.13-45.el7.noarch.rpm</filename><sum type="sha256">fe6d3f8c9d92b178e8257dfb5e4732dbc40a3453ba7ae17168bef04c5251a8b3</sum></package><package arch="noarch" epoch="2" name="texlive-garuda-c90" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-garuda-c90-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">5632e8213c5ea8d4b0bd1ff07d6d0ddea8e65c306c7a511156529c6fa01564e0</sum></package><package arch="noarch" epoch="2" name="texlive-xkeyval-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27995.2.6a"><filename>texlive-xkeyval-doc-svn27995.2.6a-45.el7.noarch.rpm</filename><sum type="sha256">3d83501273e4eb504c830a2a9a255d3acbc34e3bf8d39a3c8f713f40cced8357</sum></package><package arch="noarch" epoch="2" name="texlive-was" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn21439.0"><filename>texlive-was-svn21439.0-45.el7.noarch.rpm</filename><sum type="sha256">e1f21bc86738541050b696010103fbf1ad414f79201b483852247af11825156b</sum></package><package arch="noarch" epoch="2" name="texlive-psfrag" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.3.04"><filename>texlive-psfrag-svn15878.3.04-45.el7.noarch.rpm</filename><sum type="sha256">8e84b806351c4c7f2892dbf82b5302b77582140c545d68655fd38122db1ece57</sum></package><package arch="noarch" epoch="2" name="texlive-breakurl-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.30"><filename>texlive-breakurl-doc-svn15878.1.30-45.el7.noarch.rpm</filename><sum type="sha256">3c0243e3e6df4d0218b7017394bdea8841057a27c204310964f8de0bd6fea878</sum></package><package arch="noarch" epoch="2" name="texlive-changebar-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29349.3.5c"><filename>texlive-changebar-doc-svn29349.3.5c-45.el7.noarch.rpm</filename><sum type="sha256">00669a9fe964f6e4a35d80960188791d3eb5412ac4f49f8cf7688db54b750c09</sum></package><package arch="noarch" epoch="2" name="texlive-footmisc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn23330.5.5b"><filename>texlive-footmisc-svn23330.5.5b-45.el7.noarch.rpm</filename><sum type="sha256">c8bf81dd554ed485facab5a6437f485565c83d5ec38c7c8d38f44a7f30de81e1</sum></package><package arch="noarch" epoch="2" name="texlive-thumbpdf-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.3.15"><filename>texlive-thumbpdf-doc-svn26689.3.15-45.el7.noarch.rpm</filename><sum type="sha256">e24b56e0cb963a02e81dae0b0816bd2f906c94578159b768064e6ab45f714dc9</sum></package><package arch="noarch" epoch="2" name="texlive-graphics" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn25405.1.0o"><filename>texlive-graphics-svn25405.1.0o-45.el7.noarch.rpm</filename><sum type="sha256">6db60a82fe2cf0fccfd775007005d7c68f0a37b1ec3609dbc5cd64ee2805e97a</sum></package><package arch="noarch" epoch="2" name="texlive-philokalia" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18651.1.1"><filename>texlive-philokalia-svn18651.1.1-45.el7.noarch.rpm</filename><sum type="sha256">92c6d1c860bfad352f77737aebc88792946fe1ae3495db1a8fb9e587073fcd34</sum></package><package arch="noarch" epoch="2" name="texlive-enumitem" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24146.3.5.2"><filename>texlive-enumitem-svn24146.3.5.2-45.el7.noarch.rpm</filename><sum type="sha256">f00d1725918dcffe076e3a621bbb70d85696f0fe562ab616bed658b43b57dd67</sum></package><package arch="noarch" epoch="2" name="texlive-xetex-itrans-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24105.4.0"><filename>texlive-xetex-itrans-doc-svn24105.4.0-45.el7.noarch.rpm</filename><sum type="sha256">2f09388fd9dd200b370ef2b0e319292b9254ebd249bfd8f2ed326bb5861fb9d3</sum></package><package arch="noarch" epoch="2" name="texlive-currfile-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29012.0.7b"><filename>texlive-currfile-doc-svn29012.0.7b-45.el7.noarch.rpm</filename><sum type="sha256">081c37293c115278280f1dcdb288676ec813dab30e74ad2d851c6b2c2a0aa850</sum></package><package arch="noarch" epoch="2" name="texlive-pst-blur-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.0"><filename>texlive-pst-blur-doc-svn15878.2.0-45.el7.noarch.rpm</filename><sum type="sha256">e3927d0aa38f9c60f210e3d0c166f127f6161859c543c2befd61e945d81715d5</sum></package><package arch="noarch" epoch="2" name="texlive-hyperref" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28213.6.83m"><filename>texlive-hyperref-svn28213.6.83m-45.el7.noarch.rpm</filename><sum type="sha256">ed4a220b5c41156e751a3467d87807497293fe176326e749264a3ecbabeebc51</sum></package><package arch="noarch" epoch="2" name="texlive-bigfoot-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-bigfoot-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">25ee0079843baf06770253e74915c3e626dc7815b73f68aa8c709f07d1fecc66</sum></package><package arch="noarch" epoch="2" name="texlive-marvosym-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29349.2.2a"><filename>texlive-marvosym-doc-svn29349.2.2a-45.el7.noarch.rpm</filename><sum type="sha256">180cffee896ef031ec55552a462d655969829f0957418f6a996f2545ddca2f4f</sum></package><package arch="noarch" epoch="2" name="texlive-appendix-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.2b"><filename>texlive-appendix-doc-svn15878.1.2b-45.el7.noarch.rpm</filename><sum type="sha256">49e802089b564aeac5ee1609af538997ab38d7158969985d3919e183cf285c94</sum></package><package arch="noarch" epoch="2" name="texlive-unicode-math" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29413.0.7d"><filename>texlive-unicode-math-svn29413.0.7d-45.el7.noarch.rpm</filename><sum type="sha256">937e6fd4911615f3615a25ba4cd15f795868917804161f3799ec9334e6857aa7</sum></package><package arch="noarch" epoch="2" name="texlive-tex-gyre-math-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29045.0"><filename>texlive-tex-gyre-math-doc-svn29045.0-45.el7.noarch.rpm</filename><sum type="sha256">5f9d5be1fd68ce7db39cb8a133940a00121437316f49da8e73f636a084c90b39</sum></package><package arch="noarch" epoch="2" name="texlive-mparhack" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.4"><filename>texlive-mparhack-svn15878.1.4-45.el7.noarch.rpm</filename><sum type="sha256">2eff5482b122629ea94d5bbd65eb7298ddedd916277ec060d293fb203dc6b235</sum></package><package arch="noarch" epoch="2" name="texlive-ulem" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26785.0"><filename>texlive-ulem-svn26785.0-45.el7.noarch.rpm</filename><sum type="sha256">19d996ce82ba352a71bab1cd0fdbf54ffec415ef1ac1779e9e5a36a9085911b2</sum></package><package arch="noarch" epoch="2" name="texlive-oberdiek-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26725.0"><filename>texlive-oberdiek-doc-svn26725.0-45.el7.noarch.rpm</filename><sum type="sha256">5f308100fc8bb7fca406d60d292fc1d139cb50fc046f304a06e3536f46ce09f5</sum></package><package arch="noarch" epoch="2" name="texlive-koma-script" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27255.3.11b"><filename>texlive-koma-script-svn27255.3.11b-45.el7.noarch.rpm</filename><sum type="sha256">edad8611aa3b25d156245c59b4cc70560c7913d1e7fb7007a683ee3e1e8a8f3a</sum></package><package arch="noarch" epoch="2" name="texlive-epstopdf-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18336.0"><filename>texlive-epstopdf-bin-svn18336.0-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">12a9a2e0a8edd63ad8cfa5f2b05ce32c6014425d1189753919c3c3a1e9c40eba</sum></package><package arch="noarch" epoch="2" name="texlive-luatexbase-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn22560.0.31"><filename>texlive-luatexbase-doc-svn22560.0.31-45.el7.noarch.rpm</filename><sum type="sha256">37c9bab1b4358a2d69f28c2fc5ccfc9da3654bbe23c404e62bcb49d0ce43e22a</sum></package><package arch="noarch" epoch="2" name="texlive-parskip-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19963.2.0"><filename>texlive-parskip-doc-svn19963.2.0-45.el7.noarch.rpm</filename><sum type="sha256">93fd637429984bf9d440ba338f49a9a585a3bfbb47389a8871c0497af2184bd9</sum></package><package arch="noarch" epoch="2" name="texlive-collection-fontsrecommended" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28082.0"><filename>texlive-collection-fontsrecommended-svn28082.0-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">90e4066ac06b903a02ba867598d76e998e37ed7707de29a80a568c90b277960f</sum></package><package arch="noarch" epoch="2" name="texlive-hyphenat" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.3c"><filename>texlive-hyphenat-svn15878.2.3c-45.el7.noarch.rpm</filename><sum type="sha256">b8bbf4a46866a4a5e9c0235ff17ea23b23968022c7b550023fadf28c7d8cc4c0</sum></package><package arch="noarch" epoch="2" name="texlive-pdfpages" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27574.0.4t"><filename>texlive-pdfpages-svn27574.0.4t-45.el7.noarch.rpm</filename><sum type="sha256">bdfa440bd18fa1d673c301b112b6a55ad1a84ac8f1abfc05de2722dbe82287b9</sum></package><package arch="noarch" epoch="2" name="texlive-placeins-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19848.2.2"><filename>texlive-placeins-doc-svn19848.2.2-45.el7.noarch.rpm</filename><sum type="sha256">a398cf6700688d75e4191b8fd2107566cdf610131e75eb814434a098fff837eb</sum></package><package arch="noarch" epoch="2" name="texlive-cns" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-cns-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">13783ed40f364f78bbceae11b59e1f886fb073c599edda8e9972f04ff6c74edc</sum></package><package arch="x86_64" epoch="2" name="texlive-tex4ht-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26509.0"><filename>texlive-tex4ht-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">a29d879e4b52b2659355f778ace1d462d494d6cb135b3386377b43db3d39cec3</sum></package><package arch="noarch" epoch="2" name="texlive-ntgclass" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-ntgclass-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">393b87c8eb6a50ed6a8b6765218191d35b3ddfc72b61cc9d6254dce1f2adeeaa</sum></package><package arch="noarch" epoch="2" name="texlive-xetex-tibetan" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28847.0.1"><filename>texlive-xetex-tibetan-svn28847.0.1-45.el7.noarch.rpm</filename><sum type="sha256">043d62074dd901ab6a58bf6793fefde96f5a997f374b6720227699602352fb6b</sum></package><package arch="noarch" epoch="2" name="texlive-fncychap" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn20710.v1.34"><filename>texlive-fncychap-svn20710.v1.34-45.el7.noarch.rpm</filename><sum type="sha256">2652f5028d5fdd952663aaca269b3daa4c4ba575fb39fe2a7736e039de9b955b</sum></package><package arch="noarch" epoch="2" name="texlive-subfigure" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.1.5"><filename>texlive-subfigure-svn15878.2.1.5-45.el7.noarch.rpm</filename><sum type="sha256">04dd3fd713915e1ea2d876fe18e13f1da0c82f983a644cdf3ff01dece22a3962</sum></package><package arch="noarch" epoch="2" name="texlive-makeindex-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.2.12"><filename>texlive-makeindex-doc-svn26689.2.12-45.el7.noarch.rpm</filename><sum type="sha256">d59fb53527215f1089f793693f6d24aee20b47bfadd3999a902e7d78e7436602</sum></package><package arch="noarch" epoch="2" name="texlive-fixlatvian" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn21631.1a"><filename>texlive-fixlatvian-svn21631.1a-45.el7.noarch.rpm</filename><sum type="sha256">f34e1736be0bd441aea57bee1516493cfe713a01487debf82b7ebab19bab6681</sum></package><package arch="x86_64" epoch="2" name="texlive-dvipng-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26509.0"><filename>texlive-dvipng-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">695504ac04a7502eaf1abae69e69eb704f0116c0412390d9c358b2c18c548d16</sum></package><package arch="noarch" epoch="2" name="texlive-makecmds-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-makecmds-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">9b1a22f8373fd3079bf467e9366d5969735690b3814f3757a6fb92fd4772d708</sum></package><package arch="x86_64" epoch="2" name="texlive-metapost-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26509.0"><filename>texlive-metapost-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">f1612773a292449e76975710a3b0013d05d4766841d4f7638845474a46b20b0f</sum></package><package arch="noarch" epoch="2" name="texlive-latex-bin-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn14050.0"><filename>texlive-latex-bin-bin-svn14050.0-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">c112b457fd4a5e2e628d748836d56819f3c435ade4ebd41550d92884147cd496</sum></package><package arch="noarch" epoch="2" name="texlive-lm-math" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29044.1.958"><filename>texlive-lm-math-svn29044.1.958-45.el7.noarch.rpm</filename><sum type="sha256">24a56c7febe63d789299ca6721978ad386fb9163b7ea79da66de8827e2851a4c</sum></package><package arch="noarch" epoch="2" name="texlive-varwidth" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24104.0.92"><filename>texlive-varwidth-svn24104.0.92-45.el7.noarch.rpm</filename><sum type="sha256">836af5f88e838f4fe3bacdd86f289ccac4b31543de56c396f2e6710df8a720f7</sum></package><package arch="noarch" epoch="2" name="texlive-jknapltx" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19440.0"><filename>texlive-jknapltx-svn19440.0-45.el7.noarch.rpm</filename><sum type="sha256">55de3b6d7fc6702ba12b93fd0377ae9bdaf0b42fcd5cc9d73210c8d2655b3c5a</sum></package><package arch="noarch" epoch="2" name="texlive-ifoddpage" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn23979.0"><filename>texlive-ifoddpage-svn23979.0-45.el7.noarch.rpm</filename><sum type="sha256">69f1543399793f676a280b3c973044ba3457da59f56da26a7f4f439b36df93a8</sum></package><package arch="noarch" epoch="2" name="texlive-powerdot" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn25656.1.4i"><filename>texlive-powerdot-svn25656.1.4i-45.el7.noarch.rpm</filename><sum type="sha256">f9b56f4bb1aa5b09345cc3ae88d44274f35afda6f58c3f2d23758c98dc78f8b8</sum></package><package arch="noarch" epoch="2" name="texlive-pgf-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn22614.2.10"><filename>texlive-pgf-doc-svn22614.2.10-45.el7.noarch.rpm</filename><sum type="sha256">3510e63a99fadf48de7b579c0f7f7378a139bab3689966e0496439717ab1d63f</sum></package><package arch="noarch" epoch="2" name="texlive-pst-math-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn20176.0.61"><filename>texlive-pst-math-doc-svn20176.0.61-45.el7.noarch.rpm</filename><sum type="sha256">4b65d5e2923857435476577e195d910754f47d88d961cd845f9e0898d2300e60</sum></package><package arch="x86_64" epoch="2" name="texlive-gsftopk-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26509.0"><filename>texlive-gsftopk-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">a2a628701d0262f4de2990489fac1385a37705922f73c4c2efcbe00d9b5ac5ca</sum></package><package arch="noarch" epoch="2" name="texlive-subfig" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.3"><filename>texlive-subfig-svn15878.1.3-45.el7.noarch.rpm</filename><sum type="sha256">153bea0b844337c310bd4a6ef579cc3829c5cff434ab4d4d3c9885b1a83fe09e</sum></package><package arch="noarch" epoch="2" name="texlive-babelbib-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn25245.1.31"><filename>texlive-babelbib-doc-svn25245.1.31-45.el7.noarch.rpm</filename><sum type="sha256">205d7da7011d955f625c6202e2fe9751abd56d8038d891708a36ccfa573c622b</sum></package><package arch="noarch" epoch="2" name="texlive-textpos-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28261.1.7h"><filename>texlive-textpos-doc-svn28261.1.7h-45.el7.noarch.rpm</filename><sum type="sha256">b7abce255c5fdf831c4e211ac85849a7bf262de2c2566e0403a0e09108f6209d</sum></package><package arch="noarch" epoch="2" name="texlive-marvosym" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29349.2.2a"><filename>texlive-marvosym-svn29349.2.2a-45.el7.noarch.rpm</filename><sum type="sha256">84bad1b2d91e240149516180080cd0cb2019d647c8dbb1211b04a57e4df258d6</sum></package><package arch="noarch" epoch="2" name="texlive-bibtopic" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.1a"><filename>texlive-bibtopic-svn15878.1.1a-45.el7.noarch.rpm</filename><sum type="sha256">7ef056f6988b275a23d9dc7ee3d6370e929ede130a03c9d7c22223ea4c7d50ba</sum></package><package arch="noarch" epoch="2" name="texlive-titling-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.1d"><filename>texlive-titling-doc-svn15878.2.1d-45.el7.noarch.rpm</filename><sum type="sha256">10c006dc6f42596301054aff37f5d48a75abc20a8923d52cc3c687936eb397e0</sum></package><package arch="noarch" epoch="2" name="texlive-dvipdfmx-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26765.0"><filename>texlive-dvipdfmx-doc-svn26765.0-45.el7.noarch.rpm</filename><sum type="sha256">554b25b001a7aedf708dc097dc78a215ff85dd4b2c86dc1e4ac019dd69092f55</sum></package><package arch="noarch" epoch="2" name="texlive-filehook" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24280.0.5d"><filename>texlive-filehook-svn24280.0.5d-45.el7.noarch.rpm</filename><sum type="sha256">c71cd6d0ebbb92935bf826bbb8750fef9641c1dac4ebfd4ae9cce650e701a2d1</sum></package><package arch="noarch" epoch="2" name="texlive-bibtex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.0.99d"><filename>texlive-bibtex-svn26689.0.99d-45.el7.noarch.rpm</filename><sum type="sha256">d71606c2d98a6b273fc9e2354630a87274a2c8e3c77610099e0074e3256272f9</sum></package><package arch="noarch" epoch="2" name="texlive-fmtcount" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28068.2.02"><filename>texlive-fmtcount-svn28068.2.02-45.el7.noarch.rpm</filename><sum type="sha256">37cc1ec1d2ad32153724cc071a8be79615d021a7bfc72a23cd4970cb89b04095</sum></package><package arch="noarch" epoch="2" name="texlive-unicode-math-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29413.0.7d"><filename>texlive-unicode-math-doc-svn29413.0.7d-45.el7.noarch.rpm</filename><sum type="sha256">dc731737e60c31ac5d51f3327dfc60719bf6dd3bc0cd41277815e5174ddb08c2</sum></package><package arch="noarch" epoch="2" name="texlive-metapost-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.1.212"><filename>texlive-metapost-doc-svn26689.1.212-45.el7.noarch.rpm</filename><sum type="sha256">d440496268c377733dc67031b4753c52784f48cacc325262fbadc2b1b0a4d9cb</sum></package><package arch="noarch" epoch="2" name="texlive-ncctools-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.3.5"><filename>texlive-ncctools-doc-svn15878.3.5-45.el7.noarch.rpm</filename><sum type="sha256">55e55793a247f77f8494d0efab62046067337aed14f6e266d3630e9b5274da25</sum></package><package arch="noarch" epoch="2" name="texlive-appendix" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.2b"><filename>texlive-appendix-svn15878.1.2b-45.el7.noarch.rpm</filename><sum type="sha256">4675b54bde8131f766940c611705bf5dcd8851f06e493113a7c706c00b15166a</sum></package><package arch="noarch" epoch="2" name="texlive-xecolor-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29660.0.1"><filename>texlive-xecolor-doc-svn29660.0.1-45.el7.noarch.rpm</filename><sum type="sha256">2d9969df989cc06cc72e823c39e061b7da7841ecab292cfc09f12769d434734e</sum></package><package arch="noarch" epoch="2" name="texlive-thailatex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29349.0.5.1"><filename>texlive-thailatex-svn29349.0.5.1-45.el7.noarch.rpm</filename><sum type="sha256">aa3806fa577604e211ff0a5c2983d52df0eb38120db72b1f57f6e88bfcacb66a</sum></package><package arch="noarch" epoch="2" name="texlive-xesearch" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn16041.0"><filename>texlive-xesearch-svn16041.0-45.el7.noarch.rpm</filename><sum type="sha256">004a26efd40d17e9e66969f893ff704174dfd42be25820fc417cb0b104589d6b</sum></package><package arch="noarch" epoch="2" name="texlive-hyperref-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28213.6.83m"><filename>texlive-hyperref-doc-svn28213.6.83m-45.el7.noarch.rpm</filename><sum type="sha256">b0378f56bead85c0d0bffa4638fc1c2bfcffbf3074752cb48855526caffe5585</sum></package><package arch="noarch" epoch="2" name="texlive-pst-slpe-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24391.1.31"><filename>texlive-pst-slpe-doc-svn24391.1.31-45.el7.noarch.rpm</filename><sum type="sha256">18f242efb2e38be49a9b89da3a0badae842c8f25ffb65bccbbe3c7501a42b259</sum></package><package arch="noarch" epoch="2" name="texlive-luatex-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.0.70.1"><filename>texlive-luatex-doc-svn26689.0.70.1-45.el7.noarch.rpm</filename><sum type="sha256">d6fbee84fa53c5bfcdd80f5d75d48c597ad56623113f07160320486e95c613c9</sum></package><package arch="noarch" epoch="2" name="texlive-avantgar" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28614.0"><filename>texlive-avantgar-svn28614.0-45.el7.noarch.rpm</filename><sum type="sha256">d3801c03b236e6972457405776793103daf3ce067fd546345b5ef4312d6a8603</sum></package><package arch="noarch" epoch="2" name="texlive-xifthen" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.3"><filename>texlive-xifthen-svn15878.1.3-45.el7.noarch.rpm</filename><sum type="sha256">2211b93ccee206457b5bfbec1aff1b9e72ffe33684e9a5cdf472568f0467d1fa</sum></package><package arch="noarch" epoch="2" name="texlive-placeins" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19848.2.2"><filename>texlive-placeins-svn19848.2.2-45.el7.noarch.rpm</filename><sum type="sha256">c4548682b0a9f57488e9a414632431aadcdc6b478a28d17b06300107c880964a</sum></package><package arch="noarch" epoch="2" name="texlive-fpl-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.002"><filename>texlive-fpl-doc-svn15878.1.002-45.el7.noarch.rpm</filename><sum type="sha256">1ae835615408c68d1e23fcbfc4abbe36a031b6c5d57749852ca13ee8f1f7969f</sum></package><package arch="noarch" epoch="2" name="texlive-ctable" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26694.1.23"><filename>texlive-ctable-svn26694.1.23-45.el7.noarch.rpm</filename><sum type="sha256">15aad23678f41008bb7ed548dbfc2f911e488d48bbd56080880a816416546b71</sum></package><package arch="noarch" epoch="2" name="texlive-fancyvrb" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18492.2.8"><filename>texlive-fancyvrb-svn18492.2.8-45.el7.noarch.rpm</filename><sum type="sha256">190aaa0d8cc02e9c7fae73cc917a6fc5afba9f3e898bfd505c133728054279e5</sum></package><package arch="noarch" epoch="2" name="texlive-gsftopk" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.1.19.2"><filename>texlive-gsftopk-svn26689.1.19.2-45.el7.noarch.rpm</filename><sum type="sha256">aac40e794bef7df266c4d0db88f97bc8d8a8241882fb65f5704d2e975e6b4e30</sum></package><package arch="noarch" epoch="2" name="texlive-pst-fill-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.01"><filename>texlive-pst-fill-doc-svn15878.1.01-45.el7.noarch.rpm</filename><sum type="sha256">86cf2f9381331519c1db63122ccf4ba78f63ab60146e20b2bc8104e54345b54d</sum></package><package arch="noarch" epoch="2" name="texlive-textcase" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-textcase-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">c750e214d1a0f0cec7eb2ee1d075773abb7e7d6cc374a2aaaf2e77952cb17c3a</sum></package><package arch="noarch" epoch="2" name="texlive-arabxetex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17470.v1.1.4"><filename>texlive-arabxetex-svn17470.v1.1.4-45.el7.noarch.rpm</filename><sum type="sha256">7d5ef5a3f3983ceeb38e1b827785852c03482f99280e3921d38f2356423427e8</sum></package><package arch="noarch" epoch="2" name="texlive-babelbib" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn25245.1.31"><filename>texlive-babelbib-svn25245.1.31-45.el7.noarch.rpm</filename><sum type="sha256">b0ae3478ff87f1188777126607b523af705988e427c0d25f7e0342fdeeb91646</sum></package><package arch="noarch" epoch="2" name="texlive-euler" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17261.2.5"><filename>texlive-euler-svn17261.2.5-45.el7.noarch.rpm</filename><sum type="sha256">4330efad869862bbdad35dedb1601b18eb1c6da3b51a2d44d6c870a11b81225c</sum></package><package arch="noarch" epoch="2" name="texlive-pst-eps-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.0"><filename>texlive-pst-eps-doc-svn15878.1.0-45.el7.noarch.rpm</filename><sum type="sha256">d139d5a31cdbff6d3b69d4847f18a70c5da43ba1c32c30d61998b210f8b7da27</sum></package><package arch="noarch" epoch="2" name="texlive-xdvi" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.22.85"><filename>texlive-xdvi-svn26689.22.85-45.el7.noarch.rpm</filename><sum type="sha256">ae9010165081d45e0194a7e4091596c7b74639c6d84a97b94ebed79e671c0c49</sum></package><package arch="noarch" epoch="2" name="texlive-psfrag-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.3.04"><filename>texlive-psfrag-doc-svn15878.3.04-45.el7.noarch.rpm</filename><sum type="sha256">81c36074d5c24c89a087a1e1947eed82957972bd3a7fa4f846efe289e70b20f6</sum></package><package arch="noarch" epoch="2" name="texlive-pst-slpe" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24391.1.31"><filename>texlive-pst-slpe-svn24391.1.31-45.el7.noarch.rpm</filename><sum type="sha256">eac19da90c9c19f431f684d7486c3619617a249471377e471504886d20432bb0</sum></package><package arch="noarch" epoch="2" name="texlive-mptopdf" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.0"><filename>texlive-mptopdf-svn26689.0-45.el7.noarch.rpm</filename><sum type="sha256">3eb07ffbdef82782ee39b7dd5d02a0ea57ea7337eed9613a0f02dbe18f5634cb</sum></package><package arch="noarch" epoch="2" name="texlive-xifthen-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.3"><filename>texlive-xifthen-doc-svn15878.1.3-45.el7.noarch.rpm</filename><sum type="sha256">8395cbefac1d3e0cbbea476046a6af2e37555874bb128c071ae8ccaee5b4c34b</sum></package><package arch="noarch" epoch="2" name="texlive-framed" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26789.0.96"><filename>texlive-framed-svn26789.0.96-45.el7.noarch.rpm</filename><sum type="sha256">402b2ab97b3fa25aaec7c7652fd402151d2da9bf253949ed8ca7d30fc74b3d04</sum></package><package arch="noarch" epoch="2" name="texlive-kpathsea-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28792.0"><filename>texlive-kpathsea-doc-svn28792.0-45.el7.noarch.rpm</filename><sum type="sha256">95a9b1ce2ec8613375406c7cfe480ae41497b90b2957e7764d86d1c23011b0f6</sum></package><package arch="noarch" epoch="2" name="texlive-rotating-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn16832.2.16b"><filename>texlive-rotating-doc-svn16832.2.16b-45.el7.noarch.rpm</filename><sum type="sha256">e47a39776020cae536002d8733df8c0fff0c2a6d57bead36543545abc7d412f9</sum></package><package arch="noarch" epoch="2" name="texlive-pst-math" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn20176.0.61"><filename>texlive-pst-math-svn20176.0.61-45.el7.noarch.rpm</filename><sum type="sha256">4124f3396d0375112a6116cdbed23d048279b4e6746b93d0ea546e019f3364e1</sum></package><package arch="noarch" epoch="2" name="texlive-type1cm" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn21820.0"><filename>texlive-type1cm-svn21820.0-45.el7.noarch.rpm</filename><sum type="sha256">d65786dd2ce2619d35e3969cd3df78bb747ea5d1c0b1228d60e87ec85dc79442</sum></package><package arch="noarch" epoch="2" name="texlive-ifetex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24853.1.2"><filename>texlive-ifetex-svn24853.1.2-45.el7.noarch.rpm</filename><sum type="sha256">bbc3cbce21fdda31cb62aedd97c4f158618843370f9242b101b1978c9685e951</sum></package><package arch="noarch" epoch="2" name="texlive-rcs-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-rcs-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">2f6e0716058d5eac51ab7a5e19f069aa492be6591f646baff33d125f8c24ca5a</sum></package><package arch="noarch" epoch="2" name="texlive-sauerj-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-sauerj-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">25daf5da5c382ace875f461b169bfb87745cbdbfe502eabf5201b0e83d220c32</sum></package><package arch="noarch" epoch="2" name="texlive-parallel-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-parallel-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">f10102102fffe2c628f7b75bd12d9b14618ec8199c0a5e11eb5a639e9570727c</sum></package><package arch="noarch" epoch="2" name="texlive-section-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn20180.0"><filename>texlive-section-doc-svn20180.0-45.el7.noarch.rpm</filename><sum type="sha256">338e642955ce425555289caa07470ed67615177e25c05cae695723f5b9f83152</sum></package><package arch="noarch" epoch="2" name="texlive-beton-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-beton-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">7f84ef7ae4d703d456105445bcc8babf2f7560d8ef5425072f37b0d2762560cd</sum></package><package arch="noarch" epoch="2" name="texlive-tetex-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27344.0"><filename>texlive-tetex-bin-svn27344.0-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">e5e0326adb8923fb25ce42d60f1a0691fc15db4b221edf488f3cbe21403210a0</sum></package><package arch="noarch" epoch="2" name="texlive-currfile" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29012.0.7b"><filename>texlive-currfile-svn29012.0.7b-45.el7.noarch.rpm</filename><sum type="sha256">51cccc6d2f567ea0c749ebed159d0f2c14e1dcf369c7d4911addbb6f6ac6692b</sum></package><package arch="noarch" epoch="2" name="texlive-arphic-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-arphic-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">3f0d4cbac80473ef2e4d212e8cdff7285be2cd4400b6879e4bb7851dfc294b97</sum></package><package arch="noarch" epoch="2" name="texlive-powerdot-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn25656.1.4i"><filename>texlive-powerdot-doc-svn25656.1.4i-45.el7.noarch.rpm</filename><sum type="sha256">615f48ec23fc18dd2e3212c561f528a1d5029b81705b125a052b0db4bc3fa676</sum></package><package arch="noarch" epoch="2" name="texlive-l3kernel" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29409.SVN_4469"><filename>texlive-l3kernel-svn29409.SVN_4469-45.el7.noarch.rpm</filename><sum type="sha256">afa9d4d37be0f93c0c6f619b927fc8a03dfc89a52aa4af65c7d9c164e30798eb</sum></package><package arch="noarch" epoch="2" name="texlive-multirow" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17256.1.6"><filename>texlive-multirow-svn17256.1.6-45.el7.noarch.rpm</filename><sum type="sha256">a25cb754d919483527e476e940c77f37ca525d49e06dc6f22c94c2740db32d91</sum></package><package arch="noarch" epoch="2" name="texlive-changepage-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.0c"><filename>texlive-changepage-doc-svn15878.1.0c-45.el7.noarch.rpm</filename><sum type="sha256">226ae2b709f40236e6d941daf3e68e8d42e8db93cf6b281a2367fac75bad04b7</sum></package><package arch="noarch" epoch="2" name="texlive-arabxetex-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17470.v1.1.4"><filename>texlive-arabxetex-doc-svn17470.v1.1.4-45.el7.noarch.rpm</filename><sum type="sha256">edd54d38669377bf4486f363dfdef22c3c3408d6cfdc3b4912b74413646f864f</sum></package><package arch="noarch" epoch="2" name="texlive-symbol" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28614.0"><filename>texlive-symbol-svn28614.0-45.el7.noarch.rpm</filename><sum type="sha256">35dc4de24fc0f550f6e2356ac658efb6e42afa751040f7a19d7b04ab2c5aa089</sum></package><package arch="noarch" epoch="2" name="texlive-babel" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24756.3.8m"><filename>texlive-babel-svn24756.3.8m-45.el7.noarch.rpm</filename><sum type="sha256">87007f702a313c8a93c2e73976a56226665b8770b97d605eff836a28662d29da</sum></package><package arch="noarch" epoch="2" name="texlive-textcase-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-textcase-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">2983a658ec4fcd5474db5bcf89f407a1342196ffb04ec73495f67c35195ca0d4</sum></package><package arch="noarch" epoch="2" name="texlive-caption-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29026.3.3__2013_02_03_"><filename>texlive-caption-doc-svn29026.3.3__2013_02_03_-45.el7.noarch.rpm</filename><sum type="sha256">b7918883ae2fb18c259ca49e7e790f5317e12927447afd332e973f9cc121271a</sum></package><package arch="noarch" epoch="2" name="texlive-tex-gyre-math" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29045.0"><filename>texlive-tex-gyre-math-svn29045.0-45.el7.noarch.rpm</filename><sum type="sha256">a57ac23e30fc015a2e6eae75052ff8d789290c6be928f625e61007c4469404be</sum></package><package arch="noarch" epoch="2" name="texlive-collectbox-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26557.0"><filename>texlive-collectbox-doc-svn26557.0-45.el7.noarch.rpm</filename><sum type="sha256">ca128cbaf0aaa32ab96adf6ddda37ebd72175b59bb1b981f1f6b99d8998c58bc</sum></package><package arch="noarch" epoch="2" name="texlive-charter-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-charter-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">0b65c0aa9644aae54ff2aae5f7c96f811f5293824d6d1eb2d47f9565ef4d3cd9</sum></package><package arch="noarch" epoch="2" name="texlive-latex-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27907.0"><filename>texlive-latex-doc-svn27907.0-45.el7.noarch.rpm</filename><sum type="sha256">cf46a1be0d32b9620455c301c05f30c48ed16aeef86f70c931d36c751e23e75a</sum></package><package arch="noarch" epoch="2" name="texlive-fancyref" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0.9c"><filename>texlive-fancyref-svn15878.0.9c-45.el7.noarch.rpm</filename><sum type="sha256">2274a3a276e04d326945cfb84e3765d4c9691ead1ae02e3179c4101e1e889af2</sum></package><package arch="noarch" epoch="2" name="texlive-luaotfload-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18579.0"><filename>texlive-luaotfload-bin-svn18579.0-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">25f927ef3e5754a7b66343eb19b3c548086997b08be0e4bf72f01277620862fb</sum></package><package arch="noarch" epoch="2" name="texlive-euenc-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19795.0.1h"><filename>texlive-euenc-doc-svn19795.0.1h-45.el7.noarch.rpm</filename><sum type="sha256">d347ccd51803aed824eff694aefa3bca92ce96525bdbedf06e102fd888e6d842</sum></package><package arch="noarch" epoch="2" name="texlive-soul" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.4"><filename>texlive-soul-svn15878.2.4-45.el7.noarch.rpm</filename><sum type="sha256">b8cff200d52e432c992b56308875132eaa725fd71de21cf2e821644c0bbed1b8</sum></package><package arch="noarch" epoch="2" name="texlive-rotating" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn16832.2.16b"><filename>texlive-rotating-svn16832.2.16b-45.el7.noarch.rpm</filename><sum type="sha256">1281509d8b75346e14714c332aa1c93fd27e0aad87ca65eb1a49cfe6ced62be4</sum></package><package arch="noarch" epoch="2" name="texlive-stmaryrd" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn22027.0"><filename>texlive-stmaryrd-svn22027.0-45.el7.noarch.rpm</filename><sum type="sha256">ce5121821f5bc9143333d4ddfa0c2598257f4fe4d83477a58ca2881bc8d76e97</sum></package><package arch="noarch" epoch="2" name="texlive-pspicture" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-pspicture-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">957e4d8dd2dd1226442c23763b7eaa67f56cf2e17b324d6b2fbb60ef11f73abf</sum></package><package arch="noarch" epoch="2" name="texlive-amsfonts-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29208.3.04"><filename>texlive-amsfonts-doc-svn29208.3.04-45.el7.noarch.rpm</filename><sum type="sha256">1dd40ff8fd36119cb26c0413d1c288e3786df892c21cce655d4b82562ab604e2</sum></package><package arch="noarch" epoch="2" name="texlive-ucharclasses-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27820.2.0"><filename>texlive-ucharclasses-doc-svn27820.2.0-45.el7.noarch.rpm</filename><sum type="sha256">056d9a641342768cbb97c632d4e5cf4608f15b7541007ff2b74b03a4bcdb991f</sum></package><package arch="noarch" epoch="2" name="texlive-pst-3d-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17257.1.10"><filename>texlive-pst-3d-doc-svn17257.1.10-45.el7.noarch.rpm</filename><sum type="sha256">59e6ed46a6b58ee1e18409d053dc6cfd29cdc93f72dd72b207fbd6786831ad23</sum></package><package arch="noarch" epoch="2" name="texlive-sepnum-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn20186.2.0"><filename>texlive-sepnum-doc-svn20186.2.0-45.el7.noarch.rpm</filename><sum type="sha256">dad60d10f41faf7e064bb5d5bc537d22f3a2f6685e8a7c430adf3a93491b2b69</sum></package><package arch="noarch" epoch="2" name="texlive-lettrine" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29391.1.64"><filename>texlive-lettrine-svn29391.1.64-45.el7.noarch.rpm</filename><sum type="sha256">2a9e153403df873c7ae3b781296274543d0c9cd3fbde6e26439d885f5bdb1f27</sum></package><package arch="noarch" epoch="2" name="texlive-preprint" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn16085.0"><filename>texlive-preprint-svn16085.0-45.el7.noarch.rpm</filename><sum type="sha256">f34798ca1866edeefd22be293d51cd53d27fe75d26b09d953597a01b1c67fbc4</sum></package><package arch="noarch" epoch="2" name="texlive-bera" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn20031.0"><filename>texlive-bera-svn20031.0-45.el7.noarch.rpm</filename><sum type="sha256">683eda1a4fdaf01ecedc4219b70b4388fd8946e35672bc27a71cfc361b192207</sum></package><package arch="noarch" epoch="2" name="texlive-dvipng" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.1.14"><filename>texlive-dvipng-svn26689.1.14-45.el7.noarch.rpm</filename><sum type="sha256">5260feb910f86f389fed891357d8385e335bf0e87e21e9a1447fa068ba84d93a</sum></package><package arch="noarch" epoch="2" name="texlive-ltxmisc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn21927.0"><filename>texlive-ltxmisc-svn21927.0-45.el7.noarch.rpm</filename><sum type="sha256">03649e45aaa6d98e54cbc8beebce3f6c438db196ebc5c16ac3c7296f8411b2ec</sum></package><package arch="noarch" epoch="2" name="texlive-helvetic" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28614.0"><filename>texlive-helvetic-svn28614.0-45.el7.noarch.rpm</filename><sum type="sha256">234a8ed49c74d5ba9cf3fe299c210ffec1a58e9d1c73f2ce1066f7a71bf7e04b</sum></package><package arch="noarch" epoch="2" name="texlive-float-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.3d"><filename>texlive-float-doc-svn15878.1.3d-45.el7.noarch.rpm</filename><sum type="sha256">99b7e3f821afb4b864550d4359741ae43a1507008f4100aac342a37d4a2830c8</sum></package><package arch="noarch" epoch="2" name="texlive-l3experimental-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29361.SVN_4467"><filename>texlive-l3experimental-doc-svn29361.SVN_4467-45.el7.noarch.rpm</filename><sum type="sha256">72aebaf86ce9971b1c5fb3490fd1ce7b715bacd5e08aacbf7ea19b98e50c2335</sum></package><package arch="noarch" epoch="2" name="texlive-carlisle" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18258.0"><filename>texlive-carlisle-svn18258.0-45.el7.noarch.rpm</filename><sum type="sha256">ad70faf28030cb58b49202d37f3aae9c4595c3c6fc834fcaa726fdc64854ec29</sum></package><package arch="noarch" epoch="2" name="texlive-memoir-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn21638.3.6j_patch_6.0g"><filename>texlive-memoir-doc-svn21638.3.6j_patch_6.0g-45.el7.noarch.rpm</filename><sum type="sha256">9329fd14577c0cd8b947dda029cae08f3f566664dfa517353d46ffaded69a228</sum></package><package arch="noarch" epoch="2" name="texlive-csquotes" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24393.5.1d"><filename>texlive-csquotes-svn24393.5.1d-45.el7.noarch.rpm</filename><sum type="sha256">aed60512ba4d718585db0514a778b17fc5c4d096cf2d77465dec2e16b0515a1f</sum></package><package arch="noarch" epoch="2" name="texlive-tex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.3.1415926"><filename>texlive-tex-svn26689.3.1415926-45.el7.noarch.rpm</filename><sum type="sha256">521b89f6b18a060f0d094d806be94fa11fe567fa42a0494a0e6f083c19dfbab8</sum></package><package arch="noarch" epoch="2" name="texlive-pst-fill" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.01"><filename>texlive-pst-fill-svn15878.1.01-45.el7.noarch.rpm</filename><sum type="sha256">69ab985fbdef4743622e4c716159eac2f0b78b4ffdd8dddb2b39a28d65723709</sum></package><package arch="noarch" epoch="2" name="texlive-tex-gyre-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18651.2.004"><filename>texlive-tex-gyre-doc-svn18651.2.004-45.el7.noarch.rpm</filename><sum type="sha256">ad17e728f34ef09acded33b60cdd6fb3ecab726c4f5f35072c613c5ef909f0ae</sum></package><package arch="noarch" epoch="2" name="texlive-tex4ht-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29474.0"><filename>texlive-tex4ht-doc-svn29474.0-45.el7.noarch.rpm</filename><sum type="sha256">10c1aa65b7930e47edcc3c33e6dbd44feae54c523c9c0b798238aa55d6b1c6e8</sum></package><package arch="noarch" epoch="2" name="texlive-multido" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18302.1.42"><filename>texlive-multido-svn18302.1.42-45.el7.noarch.rpm</filename><sum type="sha256">f0b2ba953e0863ed5d9715875f5b8315b4e9156451f213d7f0592c27e196e603</sum></package><package arch="noarch" epoch="2" name="texlive-mh" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29420.0"><filename>texlive-mh-svn29420.0-45.el7.noarch.rpm</filename><sum type="sha256">93328a57bed6b3e7054ee2de21c9f8cfadcf111a824908b30d8bdcb0b639f64e</sum></package><package arch="noarch" epoch="2" name="texlive-arphic" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-arphic-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">d610caa0cf142b1511297b32b09b6c2ccdfbb7da70ea2bef05889972d3898200</sum></package><package arch="noarch" epoch="2" name="texlive-metafont" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.2.718281"><filename>texlive-metafont-svn26689.2.718281-45.el7.noarch.rpm</filename><sum type="sha256">c1b22b98491ce58a551c17539ce9241977dbbd1f40d945a643b742d095f7968f</sum></package><package arch="noarch" epoch="2" name="texlive-lettrine-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29391.1.64"><filename>texlive-lettrine-doc-svn29391.1.64-45.el7.noarch.rpm</filename><sum type="sha256">ddf7164b7e750f5f51f588344888ad835eddd86911e34081f824e458e0476fa4</sum></package><package arch="noarch" epoch="2" name="texlive-fix2col" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17133.0"><filename>texlive-fix2col-svn17133.0-45.el7.noarch.rpm</filename><sum type="sha256">60ea3726110da68292842db4cd0dab79a5a57d4d7900314fa03006b60ed4ae8d</sum></package><package arch="noarch" epoch="2" name="texlive-unisugar" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn22357.0.92"><filename>texlive-unisugar-svn22357.0.92-45.el7.noarch.rpm</filename><sum type="sha256">7647cac8152028fac82eaf58555b12eb1a8599bf8542c12524a6b7409d2a34e9</sum></package><package arch="noarch" epoch="2" name="texlive-bidi" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29650.12.2"><filename>texlive-bidi-svn29650.12.2-45.el7.noarch.rpm</filename><sum type="sha256">a21f516c283b2f722e7836b3d80ce65cd99c29a79787e9ceaf666f7cd39a00e2</sum></package><package arch="noarch" epoch="2" name="texlive-etex-pkg-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.0"><filename>texlive-etex-pkg-doc-svn15878.2.0-45.el7.noarch.rpm</filename><sum type="sha256">492f142a423e3411bb39fe7b5b9df1c94ae3f53bc2a49846bd226299dc072add</sum></package><package arch="noarch" epoch="2" name="texlive-epsf-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn21461.2.7.4"><filename>texlive-epsf-doc-svn21461.2.7.4-45.el7.noarch.rpm</filename><sum type="sha256">ab121f992318bd2085a7535e30c099ada576962ca419f5fc7a0689611002878c</sum></package><package arch="noarch" epoch="2" name="texlive-listings-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.4"><filename>texlive-listings-doc-svn15878.1.4-45.el7.noarch.rpm</filename><sum type="sha256">15b6c68bab1996161c6b3a1121cb7a2206af1cd53f36eb295d74d8cee44c8369</sum></package><package arch="noarch" epoch="2" name="texlive-booktabs" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.61803"><filename>texlive-booktabs-svn15878.1.61803-45.el7.noarch.rpm</filename><sum type="sha256">af54ac96eacc18457228965c97d4d37efa5b7ba16e3c2ead92bffff91b54e7bd</sum></package><package arch="noarch" epoch="2" name="texlive-algorithms" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0.1"><filename>texlive-algorithms-svn15878.0.1-45.el7.noarch.rpm</filename><sum type="sha256">bc848b29eedce7d1680450daab4a0771e06eff1dc7e8e2217c302da9346a6428</sum></package><package arch="noarch" epoch="2" name="texlive-mflogo-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17487.0"><filename>texlive-mflogo-doc-svn17487.0-45.el7.noarch.rpm</filename><sum type="sha256">763d2f4923fcddcfa665d255d491db83303dad2d6b3fdebec4a820c715388093</sum></package><package arch="noarch" epoch="2" name="texlive-csquotes-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24393.5.1d"><filename>texlive-csquotes-doc-svn24393.5.1d-45.el7.noarch.rpm</filename><sum type="sha256">aefcab45f943b8d23d951ae0867e38e2b42c050c808d41d0f7a811954a6c6e29</sum></package><package arch="noarch" epoch="2" name="texlive-cm-super" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-cm-super-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">7716b49b325f233e750c657853f685a504eff53c1ded6dbb9472cb53999c6fd2</sum></package><package arch="noarch" epoch="2" name="texlive-luatexbase" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn22560.0.31"><filename>texlive-luatexbase-svn22560.0.31-45.el7.noarch.rpm</filename><sum type="sha256">a17c548beedb84405c093b989d399178a65e7b3000e4e1f97f2b501c133d313d</sum></package><package arch="noarch" epoch="2" name="texlive-microtype-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29392.2.5"><filename>texlive-microtype-doc-svn29392.2.5-45.el7.noarch.rpm</filename><sum type="sha256">76d614b05997f3a6567e5a2b0e50a5921c8b97055fb3198259804110018449b0</sum></package><package arch="noarch" epoch="2" name="texlive-fontwrap-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-fontwrap-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">9ea5822d668688ac4a6ba687e761d86c11903d9c8c07b914bf7efbdbcb1e5844</sum></package><package arch="noarch" epoch="2" name="texlive-wasy-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-wasy-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">f2990708623d2a14390b65256b074c1e243a2d451200b0526ab9ca1e73fdd7c7</sum></package><package arch="noarch" epoch="2" name="texlive-crop" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.5"><filename>texlive-crop-svn15878.1.5-45.el7.noarch.rpm</filename><sum type="sha256">c8df289f16c1c6d44896f6763a2bd41bdb3856fda63c88bf88823f049a720d0d</sum></package><package arch="noarch" epoch="2" name="texlive-makeindex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.2.12"><filename>texlive-makeindex-svn26689.2.12-45.el7.noarch.rpm</filename><sum type="sha256">d73f039d529f5945b617a3bf81c8ea884044b49043be24b4eb0e51e2e0a350e9</sum></package><package arch="noarch" epoch="2" name="texlive-section" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn20180.0"><filename>texlive-section-svn20180.0-45.el7.noarch.rpm</filename><sum type="sha256">2d91224592a7f0849c91922baecd3507dbefee0af5c0af882768913b524247d0</sum></package><package arch="noarch" epoch="2" name="texlive-latex-bin" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.0"><filename>texlive-latex-bin-svn26689.0-45.el7.noarch.rpm</filename><sum type="sha256">7c03ec52e04d0658fed074538996d6e93d36accf694526b666b0d9e98a517893</sum></package><package arch="noarch" epoch="2" name="texlive-texconfig-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27344.0"><filename>texlive-texconfig-bin-svn27344.0-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">16079e5de222defb3975d35c62a5adf6911eebd36884c1917889b9ae706915e6</sum></package><package arch="noarch" epoch="2" name="texlive-kpathsea" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28792.0"><filename>texlive-kpathsea-svn28792.0-45.el7.noarch.rpm</filename><sum type="sha256">d679347135b641cf7b777836146047a1351ae602dc8c4feb6b93e47ce0c51775</sum></package><package arch="noarch" epoch="2" name="texlive-collection-latexrecommended" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn25795.0"><filename>texlive-collection-latexrecommended-svn25795.0-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">3b0489fa6270629b7b6ef085470a4053da383400d2c5667444e5429c55b8cd78</sum></package><package arch="noarch" epoch="2" name="texlive-xunicode" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn23897.0.981"><filename>texlive-xunicode-svn23897.0.981-45.el7.noarch.rpm</filename><sum type="sha256">7b2a4c8e67705eed8c237b6118c57b0aeea2caf844dd6256a2145ec0568120dc</sum></package><package arch="noarch" epoch="2" name="texlive-xltxtra" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19809.0.5e"><filename>texlive-xltxtra-svn19809.0.5e-45.el7.noarch.rpm</filename><sum type="sha256">638c0219fa14418ade6b51dca03119f34753bbe6a72c4a5718a402f05019db4c</sum></package><package arch="x86_64" epoch="2" name="texlive-dvips-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26509.0"><filename>texlive-dvips-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">f2c7ad4b1030efaf5cdde84184f3366b6e9a8a5bee68ce2865ac2478bf1543b0</sum></package><package arch="noarch" epoch="2" name="texlive-collection-htmlxml" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28251.0"><filename>texlive-collection-htmlxml-svn28251.0-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">9d11a70093d6284f026b8581984aabcff98d864bb16b1753f604107858d807cd</sum></package><package arch="noarch" epoch="2" name="texlive-marginnote-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn25880.v1.1i"><filename>texlive-marginnote-doc-svn25880.v1.1i-45.el7.noarch.rpm</filename><sum type="sha256">17e135f84d21deba67a05b9aee17e2192b4b1acda03ce88d76b3ead549fb52c9</sum></package><package arch="noarch" epoch="2" name="texlive-metalogo-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18611.0.12"><filename>texlive-metalogo-doc-svn18611.0.12-45.el7.noarch.rpm</filename><sum type="sha256">ceb535309f841d72175a4a9c5badbb442db6087ffbd799115727a84da1ef2bc5</sum></package><package arch="x86_64" epoch="2" name="texlive-xdvi-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26509.0"><filename>texlive-xdvi-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">f180857385d6b28bb6570c162bc179db7a057831234df4d5b3b4023973ffd182</sum></package><package arch="noarch" epoch="2" name="texlive-ucs-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27549.2.1"><filename>texlive-ucs-doc-svn27549.2.1-45.el7.noarch.rpm</filename><sum type="sha256">177eba8a07842b54c96e897509740729423d7841a69250f7a3b157c8f14dd335</sum></package><package arch="noarch" epoch="2" name="texlive-eso-pic-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn21515.2.0c"><filename>texlive-eso-pic-doc-svn21515.2.0c-45.el7.noarch.rpm</filename><sum type="sha256">97167df5d36a17b243489622cb37b052406f7e9c7f6ff6382771e8c649edaadf</sum></package><package arch="noarch" epoch="2" name="texlive-pspicture-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-pspicture-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">eafeeb812f0506e9e8fd8007a758812a8fa92dd0a0a2bb7403235e13e9374f6d</sum></package><package arch="noarch" epoch="2" name="texlive-realscripts" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29423.0.3b"><filename>texlive-realscripts-svn29423.0.3b-45.el7.noarch.rpm</filename><sum type="sha256">4d6a64630e26e7a6004ec8b0580e6bf6662bfb0ae826083362783369a4efee60</sum></package><package arch="noarch" epoch="2" name="texlive-ntgclass-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-ntgclass-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">1160dbc9fea01a669d29c3e72491df393c79598ce9c404b30a5092bb7a3ece0c</sum></package><package arch="noarch" epoch="2" name="texlive-xcolor-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.11"><filename>texlive-xcolor-doc-svn15878.2.11-45.el7.noarch.rpm</filename><sum type="sha256">9eca645b4e576f811881292cccb7aac40debc3ebd58ec0ca34b2431bb85efb0c</sum></package><package arch="noarch" epoch="2" name="texlive-xeindex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn16760.0.2"><filename>texlive-xeindex-svn16760.0.2-45.el7.noarch.rpm</filename><sum type="sha256">ac8547ae3842763a85119f1da5b78a8869eccf69cd3932e1fc6f0a6db1bf6240</sum></package><package arch="noarch" epoch="2" name="texlive-lua-alt-getopt-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29349.0.7.0"><filename>texlive-lua-alt-getopt-doc-svn29349.0.7.0-45.el7.noarch.rpm</filename><sum type="sha256">c219da3d2c72900d65d3f2cfa75c1117b5408490e8b695bd4fe1c2aad3f31a1b</sum></package><package arch="noarch" epoch="2" name="texlive-lastpage-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28985.1.2l"><filename>texlive-lastpage-doc-svn28985.1.2l-45.el7.noarch.rpm</filename><sum type="sha256">c20223a843a7ea12c862016c7ea52940954c5f5d53f37d3bf5b9c3aae20ba803</sum></package><package arch="noarch" epoch="2" name="texlive-hyph-utf8-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29641.0"><filename>texlive-hyph-utf8-doc-svn29641.0-45.el7.noarch.rpm</filename><sum type="sha256">fe8ceb07145a51367e1aeed61cbde402123aa6738f1d2c250e03db889ed64832</sum></package><package arch="noarch" epoch="2" name="texlive-crop-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.5"><filename>texlive-crop-doc-svn15878.1.5-45.el7.noarch.rpm</filename><sum type="sha256">df6d98c6e30878d8ab49d46f4a97faa9aef4e0666bdc71654479ef1e04703c41</sum></package><package arch="noarch" epoch="2" name="texlive-bera-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn20031.0"><filename>texlive-bera-doc-svn20031.0-45.el7.noarch.rpm</filename><sum type="sha256">21cd7897540b3583d7cba613648504ace8f8bda2262be03fc0bb5e9f2600e2c4</sum></package><package arch="noarch" epoch="2" name="texlive-mfware" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.0"><filename>texlive-mfware-svn26689.0-45.el7.noarch.rpm</filename><sum type="sha256">f660af8b657c4c2be84dadfe7fad4a61eb2835ac0c3886b4384a722d5c74f93f</sum></package><package arch="noarch" epoch="2" name="texlive-pxfonts" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-pxfonts-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">f21e5e970073e7dffb352c052398b2ea55d4d877d514d2f23f2fc7e9960c7146</sum></package><package arch="noarch" epoch="2" name="texlive-preprint-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn16085.0"><filename>texlive-preprint-doc-svn16085.0-45.el7.noarch.rpm</filename><sum type="sha256">f15a5763e9d58c85eea318bbee13a86a66bee86f3a805f1e8dc824c6ab331094</sum></package><package arch="noarch" epoch="2" name="texlive-lualatex-math-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29346.1.2"><filename>texlive-lualatex-math-doc-svn29346.1.2-45.el7.noarch.rpm</filename><sum type="sha256">3a20fd0a400fa843ae7d61927931b7b7e75d48c09c47d9d2d79555883c4b0c08</sum></package><package arch="noarch" epoch="2" name="texlive-dvips-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29585.0"><filename>texlive-dvips-doc-svn29585.0-45.el7.noarch.rpm</filename><sum type="sha256">8b01d3f2da177dceeeccd758722c9aa513484903f9cdb090063ff5ff2f0be923</sum></package><package arch="noarch" epoch="2" name="texlive-enumitem-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24146.3.5.2"><filename>texlive-enumitem-doc-svn24146.3.5.2-45.el7.noarch.rpm</filename><sum type="sha256">bf61168c2edb6796ebd5982bcf2c46945db82d5f8c46cf14815d1295b3f87820</sum></package><package arch="noarch" epoch="2" name="texlive-adjustbox-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26555.0"><filename>texlive-adjustbox-doc-svn26555.0-45.el7.noarch.rpm</filename><sum type="sha256">ba7a05005c049a96cb14f8a659643c09a59e994a223e0ab772a96f5f600004ab</sum></package><package arch="noarch" epoch="2" name="texlive-multido-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18302.1.42"><filename>texlive-multido-doc-svn18302.1.42-45.el7.noarch.rpm</filename><sum type="sha256">5d2ce52e73784c47f004d40da9fd89cfebf28bbe9ca74a65c0423abde7b824d2</sum></package><package arch="noarch" epoch="2" name="texlive-lualatex-math" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29346.1.2"><filename>texlive-lualatex-math-svn29346.1.2-45.el7.noarch.rpm</filename><sum type="sha256">68c340a3c99d80904f68986d0af55f62d3b6b1e99d83f2d7a0aaf9a8b46d43e5</sum></package><package arch="x86_64" epoch="2" name="texlive-tex-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26912.0"><filename>texlive-tex-bin-svn26912.0-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">368a9edcdf22002a47311e369cbff9b7405e7d0954222c9b6a79d392157de7ae</sum></package><package arch="noarch" epoch="2" name="texlive-xetexfontinfo" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-xetexfontinfo-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">7066a703b7d58068f1a38f513943f649ac8d5b60b5b5bd0212e25ae408d50591</sum></package><package arch="noarch" epoch="2" name="texlive-glyphlist" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28576.0"><filename>texlive-glyphlist-svn28576.0-45.el7.noarch.rpm</filename><sum type="sha256">4b55fad5aad011635ee1c3acb0990c230284d00ae8d93f8a594fc3d1361c8605</sum></package><package arch="noarch" epoch="2" name="texlive-xetexconfig" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28819.0"><filename>texlive-xetexconfig-svn28819.0-45.el7.noarch.rpm</filename><sum type="sha256">58e54f67832883d7d8aad3bf42ffaa6a2f3736a4a82802c06e82d3eb50e5d823</sum></package><package arch="noarch" epoch="2" name="texlive-pst-coil" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24020.1.06"><filename>texlive-pst-coil-svn24020.1.06-45.el7.noarch.rpm</filename><sum type="sha256">ae3dccde2e188b8186ca86d4880ab64754d78e82ecdc7754db824cd4788d091d</sum></package><package arch="noarch" epoch="2" name="texlive-amsmath" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29327.2.14"><filename>texlive-amsmath-svn29327.2.14-45.el7.noarch.rpm</filename><sum type="sha256">e34e68ab8c3476c5e4b6ddd39e572e516db384f95024accba3806cd50b1be9d5</sum></package><package arch="noarch" epoch="2" name="texlive-datetime" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19834.2.58"><filename>texlive-datetime-svn19834.2.58-45.el7.noarch.rpm</filename><sum type="sha256">5436589c3a83b8d82fd02c7d3abd6cfbbda8a785274938a38cc1d63884beb942</sum></package><package arch="noarch" epoch="2" name="texlive-hyphen-base" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29197.0"><filename>texlive-hyphen-base-svn29197.0-45.el7.noarch.rpm</filename><sum type="sha256">6c3b45534d05fd2b37a21c801b62ab002a5854c084852033cd35abe921dce3c4</sum></package><package arch="noarch" epoch="2" name="texlive-wrapfig" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn22048.3.6"><filename>texlive-wrapfig-svn22048.3.6-45.el7.noarch.rpm</filename><sum type="sha256">2a2d4c8b24be29239aec620c644defb741e3bab4443cad555ceaa301ba9414b5</sum></package><package arch="noarch" epoch="2" name="texlive-bigfoot" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-bigfoot-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">2061faa0b09dea232537f58aa1f93c1f1675b1ed222fc09c628bfec8b1adffb2</sum></package><package arch="noarch" epoch="2" name="texlive-pstricks-add" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28750.3.59"><filename>texlive-pstricks-add-svn28750.3.59-45.el7.noarch.rpm</filename><sum type="sha256">638ae37b321251062bc50b3657c30713311c95b28287a14706109317d0fc842a</sum></package><package arch="noarch" epoch="2" name="texlive-paralist-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.2.3b"><filename>texlive-paralist-doc-svn15878.2.3b-45.el7.noarch.rpm</filename><sum type="sha256">1878c2d52a7169d0f917e315b26223a8855864ee6c9139aad45055c7e6d54bf1</sum></package><package arch="noarch" epoch="2" name="texlive-microtype" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29392.2.5"><filename>texlive-microtype-svn29392.2.5-45.el7.noarch.rpm</filename><sum type="sha256">8173e4bfc5f65ad87c0ef461d4c5ef19271ce209b450e1032bfb896dc2e2fd1b</sum></package><package arch="x86_64" epoch="2" name="texlive-kpathsea-lib" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="2012"><filename>texlive-kpathsea-lib-2012-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">ec4b6f1f13cbdf2c17d4b814e28d6e63584883453faef5c33f8804b812960c22</sum></package><package arch="noarch" epoch="2" name="texlive-ifetex-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24853.1.2"><filename>texlive-ifetex-doc-svn24853.1.2-45.el7.noarch.rpm</filename><sum type="sha256">ce056f7887b3235548053ddf317a24698d7ebb1e587390d97988071ad90dbde8</sum></package><package arch="noarch" epoch="2" name="texlive-kerkis" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-kerkis-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">ef072c5a6bba9f3a3f475c481e1a0655e266ba0dc686cdb6fec89ddf741901b6</sum></package><package arch="noarch" epoch="2" name="texlive-realscripts-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29423.0.3b"><filename>texlive-realscripts-doc-svn29423.0.3b-45.el7.noarch.rpm</filename><sum type="sha256">497d10316c48450dbf71c006b2799683cb82802c7b7380960955f56201297141</sum></package><package arch="noarch" epoch="2" name="texlive-ms-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24467.0"><filename>texlive-ms-doc-svn24467.0-45.el7.noarch.rpm</filename><sum type="sha256">0a1228cd4ce8b9fa3cce3a843bf4778fb3c9515370f1cf693113abd8408f6933</sum></package><package arch="noarch" epoch="2" name="texlive-fontbook" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn23608.0.2"><filename>texlive-fontbook-svn23608.0.2-45.el7.noarch.rpm</filename><sum type="sha256">ea980b0e9973a6a864e9ec59b4b1ce0f0f9014af0d034121654ce0d6219c70d7</sum></package><package arch="noarch" epoch="2" name="texlive-showexpl" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27790.v0.3j"><filename>texlive-showexpl-svn27790.v0.3j-45.el7.noarch.rpm</filename><sum type="sha256">6aa9a26716db68e91c26764af4d9202b0854f660dbc6f5abeef5db3d5099451b</sum></package><package arch="noarch" epoch="2" name="texlive-xunicode-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn23897.0.981"><filename>texlive-xunicode-doc-svn23897.0.981-45.el7.noarch.rpm</filename><sum type="sha256">bc9eb32e1b00dad0a407dd4848a907ddf28c1f57263ff47ddee53a1fc282a5cd</sum></package><package arch="noarch" epoch="2" name="texlive-breakurl" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.30"><filename>texlive-breakurl-svn15878.1.30-45.el7.noarch.rpm</filename><sum type="sha256">6b4f1c04a23792596e52e4db6dea23d3cc71bac9c76bb16b5c9cf5ce6bb9d979</sum></package><package arch="noarch" epoch="2" name="texlive-unisugar-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn22357.0.92"><filename>texlive-unisugar-doc-svn22357.0.92-45.el7.noarch.rpm</filename><sum type="sha256">259b35b618a28c6bbdef3c2be552d2756492720aee677830e3fd1bbbed032ec9</sum></package><package arch="noarch" epoch="2" name="texlive-typehtml" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17134.0"><filename>texlive-typehtml-svn17134.0-45.el7.noarch.rpm</filename><sum type="sha256">0baf2f5b8f9c01b7697bb651d4281cea78eeb93505fc29ec3f43f45440c44df2</sum></package><package arch="noarch" epoch="2" name="texlive-cjk-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26296.4.8.3"><filename>texlive-cjk-doc-svn26296.4.8.3-45.el7.noarch.rpm</filename><sum type="sha256">b383de9e58a91d9972b7771d79b817d036d5497361e07f62c7b72da9da4e0aab</sum></package><package arch="noarch" epoch="2" name="texlive-xecjk" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28816.3.1.2"><filename>texlive-xecjk-svn28816.3.1.2-45.el7.noarch.rpm</filename><sum type="sha256">3fc34779b3aa5aca3fd8c0b3caacf40a69117861e9bc3d115f7e65d6a6dee73b</sum></package><package arch="noarch" epoch="2" name="texlive-attachfile" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn21866.v1.5b"><filename>texlive-attachfile-svn21866.v1.5b-45.el7.noarch.rpm</filename><sum type="sha256">368e6b89a4d8ef703d5bb4d1d7f4e4d7cc308b9361ffb9bb12c1b827a41b95e1</sum></package><package arch="noarch" epoch="2" name="texlive-l3kernel-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29409.SVN_4469"><filename>texlive-l3kernel-doc-svn29409.SVN_4469-45.el7.noarch.rpm</filename><sum type="sha256">3c5acb0fc00c53586e685592fccac24948d566c29a21d54f32b22829817be1b3</sum></package><package arch="noarch" epoch="2" name="texlive-pst-tree-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24142.1.12"><filename>texlive-pst-tree-doc-svn24142.1.12-45.el7.noarch.rpm</filename><sum type="sha256">534af4ce72b8c6ada892852a537d196886bb90c4920ffebd6b080f439ec2cfa3</sum></package><package arch="noarch" epoch="2" name="texlive-luatex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26689.0.70.1"><filename>texlive-luatex-svn26689.0.70.1-45.el7.noarch.rpm</filename><sum type="sha256">f1824b29566d973ee39d3b0ba28c77da97a3f606c494b8b3d10b29c82674865e</sum></package><package arch="noarch" epoch="2" name="texlive-psnfss-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn23394.9.2a"><filename>texlive-psnfss-doc-svn23394.9.2a-45.el7.noarch.rpm</filename><sum type="sha256">586dad93a57170811d005221734776ecb32053ea9716126444d1eefc8d2d9e29</sum></package><package arch="noarch" epoch="2" name="texlive-misc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24955.0"><filename>texlive-misc-svn24955.0-45.el7.noarch.rpm</filename><sum type="sha256">a13ac5a29a446be376bc7ab40e5c3b534068f07828813517f2c36af437816c2d</sum></package><package arch="noarch" epoch="2" name="texlive-fancyref-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0.9c"><filename>texlive-fancyref-doc-svn15878.0.9c-45.el7.noarch.rpm</filename><sum type="sha256">61fd0b303a29dd56602e13c2221fae2d6b8dca202294ac7dc3be922732b306ce</sum></package><package arch="noarch" epoch="2" name="texlive-fmtcount-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28068.2.02"><filename>texlive-fmtcount-doc-svn28068.2.02-45.el7.noarch.rpm</filename><sum type="sha256">0f94c064ab1bed5ffad901e0da32ecebdd34acd6d593c75c731b585201de0b16</sum></package><package arch="noarch" epoch="2" name="texlive-ncctools" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.3.5"><filename>texlive-ncctools-svn15878.3.5-45.el7.noarch.rpm</filename><sum type="sha256">97f8f32905ed6a2c211def5a77847cbce98d24651e491fe7423c043c6d72136c</sum></package><package arch="noarch" epoch="2" name="texlive-l3experimental" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29361.SVN_4467"><filename>texlive-l3experimental-svn29361.SVN_4467-45.el7.noarch.rpm</filename><sum type="sha256">2dad1cd055dfb374db3aee650ea5cc97fd4a4ec62ef024fed237177d5c4b3b59</sum></package><package arch="noarch" epoch="2" name="texlive-dvipdfm-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn13663.0"><filename>texlive-dvipdfm-bin-svn13663.0-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">45d36439f752d1701262b335531804321eba0945a586a3592f439cdd0207e1b8</sum></package><package arch="noarch" epoch="2" name="texlive-ec" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn25033.1.0"><filename>texlive-ec-svn25033.1.0-45.el7.noarch.rpm</filename><sum type="sha256">6f48630bd22224e59838677911cf29961cc389c351ad117b7d5520bf841935ca</sum></package><package arch="noarch" epoch="2" name="texlive-url-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn16864.3.2"><filename>texlive-url-doc-svn16864.3.2-45.el7.noarch.rpm</filename><sum type="sha256">4d7eff924a39e6438d4e8e0bb44dd1828ce009f2046e5ca3883df7bc23020965</sum></package><package arch="i686" epoch="2" name="texlive-kpathsea-lib" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="2012"><filename>texlive-kpathsea-lib-2012-45.20130427_r30134.el7.i686.rpm</filename><sum type="sha256">2f95fdc6b75d32c54b860e4454a15d807caf07ecbd5caedb85bb985c782d47da</sum></package><package arch="noarch" epoch="2" name="texlive-babel-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24756.3.8m"><filename>texlive-babel-doc-svn24756.3.8m-45.el7.noarch.rpm</filename><sum type="sha256">5831ec988e8514a61ddc6086a49d82221a66eb3fb9c9d2d43facaa8c37c2dc42</sum></package><package arch="noarch" epoch="2" name="texlive-index" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24099.4.1beta"><filename>texlive-index-svn24099.4.1beta-45.el7.noarch.rpm</filename><sum type="sha256">e7b0eb2328c27ab8a69e1300f5e5ca6295293b30ce7d4670de694044949e9b14</sum></package><package arch="noarch" epoch="2" name="texlive-booktabs-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.61803"><filename>texlive-booktabs-doc-svn15878.1.61803-45.el7.noarch.rpm</filename><sum type="sha256">0110638ea381d8de838ed7f45c23412ba8389ce27250ddec2035c6110f757421</sum></package><package arch="noarch" epoch="2" name="texlive-mfnfss" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19410.0"><filename>texlive-mfnfss-svn19410.0-45.el7.noarch.rpm</filename><sum type="sha256">990920514fa3bde7b70974da177b87e86dc90c00768a503820fafc1e9b4ce290</sum></package><package arch="noarch" epoch="2" name="texlive-colortbl" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn25394.v1.0a"><filename>texlive-colortbl-svn25394.v1.0a-45.el7.noarch.rpm</filename><sum type="sha256">9b006bf2907a8321fb75a0d9f3e7b4683cb38e1440c28e920befc08d4ce77502</sum></package><package arch="noarch" epoch="2" name="texlive-amscls" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29207.0"><filename>texlive-amscls-svn29207.0-45.el7.noarch.rpm</filename><sum type="sha256">4ccdf117df1508769a9f3f92419e4630cd8e217c8b60c14f62cd489a6ecfc6c5</sum></package><package arch="noarch" epoch="2" name="texlive-thumbpdf-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn6898.0"><filename>texlive-thumbpdf-bin-svn6898.0-45.20130427_r30134.el7.noarch.rpm</filename><sum type="sha256">00787cc0743467eafe9ba349e2d0c1f340d122d8474e05784284ab8c2dd70900</sum></package><package arch="noarch" epoch="2" name="texlive-ifoddpage-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn23979.0"><filename>texlive-ifoddpage-doc-svn23979.0-45.el7.noarch.rpm</filename><sum type="sha256">6a179f54c46d6bf77f1b663c977a0d51572ffff46ead2689732b403e70ac9b12</sum></package><package arch="noarch" epoch="2" name="texlive-dvipdfmx-def" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-dvipdfmx-def-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">a9a3a929ba7271a68d14871eb5a8d5f62d77972dde516dd5076742043fd5b01f</sum></package><package arch="x86_64" epoch="2" name="texlive-makeindex-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26509.0"><filename>texlive-makeindex-bin-svn26509.0-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">6b71d84dd9489fb8ee9d116a58ef2bdc4b0a029e6f30062ce0c0256e4a4d2db7</sum></package><package arch="noarch" epoch="2" name="texlive-fancyhdr-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.3.1"><filename>texlive-fancyhdr-doc-svn15878.3.1-45.el7.noarch.rpm</filename><sum type="sha256">a982ff1d5c93d669ad03f55b723aed51205c2cec976592e320398d76314ee225</sum></package><package arch="noarch" epoch="2" name="texlive-fontwrap" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-fontwrap-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">9677c0d03956b5ffde531875c41c0d41d62fc8f2bd7e779760df34edace2196a</sum></package><package arch="noarch" epoch="2" name="texlive-eepic-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.1e"><filename>texlive-eepic-doc-svn15878.1.1e-45.el7.noarch.rpm</filename><sum type="sha256">fdc5b975f2f50d0abe12855c7a207855291788b9447b7b8eb73ca773072161b5</sum></package><package arch="noarch" epoch="2" name="texlive-lm" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28119.2.004"><filename>texlive-lm-svn28119.2.004-45.el7.noarch.rpm</filename><sum type="sha256">04ed7ee8cf7556bbcd6d5668ea08ee0b51cce5a1ec0d7e6bf880352a906a4b11</sum></package><package arch="noarch" epoch="2" name="texlive-rsfs" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-rsfs-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">6279ec647b8c2a97754335ff3d0ff655926b6440151d47bf6613f3cc75da0412</sum></package><package arch="noarch" epoch="2" name="texlive-threeparttable-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn17383.0"><filename>texlive-threeparttable-doc-svn17383.0-45.el7.noarch.rpm</filename><sum type="sha256">b63830fabc590b373d877f1aac6f5daf87e1b0efb10af1c0ab9b88ca9281144f</sum></package><package arch="noarch" epoch="2" name="texlive-collectbox" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26557.0"><filename>texlive-collectbox-svn26557.0-45.el7.noarch.rpm</filename><sum type="sha256">f523f9c508c4d0f7b50738bbe875c7a88f5e4d88e7a2ea86b0786eafa9f7ed78</sum></package><package arch="noarch" epoch="2" name="texlive-wasy" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-wasy-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">c51ac0c23dd20ece6f013f1c11999bdd2d1a840825a0c339d565952efaccb648</sum></package><package arch="noarch" epoch="2" name="texlive-svn-prov" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn18017.3.1862"><filename>texlive-svn-prov-svn18017.3.1862-45.el7.noarch.rpm</filename><sum type="sha256">122f29cedd4fcfa3846862e80ba32cb93c81b5e9970e78e0eeeb13dac213f750</sum></package><package arch="noarch" epoch="2" name="texlive-jadetex" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn23409.3.13"><filename>texlive-jadetex-svn23409.3.13-45.el7.noarch.rpm</filename><sum type="sha256">9f3409f44e2554385fd081510502899cbb869a3d371424c7ac9b1839f784358d</sum></package><package arch="noarch" epoch="2" name="texlive-fontspec" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29412.v2.3a"><filename>texlive-fontspec-svn29412.v2.3a-45.el7.noarch.rpm</filename><sum type="sha256">9d8e832f048d9c557eb80388ea1b947381641023b51c904f2bec1d0241c25e05</sum></package><package arch="noarch" epoch="2" name="texlive-filehook-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24280.0.5d"><filename>texlive-filehook-doc-svn24280.0.5d-45.el7.noarch.rpm</filename><sum type="sha256">c3af90602efa3ea325e9e51336cfc3fae3e8bfdf02a89126ae2f2485743b0cb1</sum></package><package arch="noarch" epoch="2" name="texlive-ptext-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28124.1"><filename>texlive-ptext-doc-svn28124.1-45.el7.noarch.rpm</filename><sum type="sha256">ece3f66848e11ab5cb3dea4a8421872da85b7fc83a1597c2525029db82dfcd62</sum></package><package arch="noarch" epoch="2" name="texlive-xepersian-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29661.12.1"><filename>texlive-xepersian-doc-svn29661.12.1-45.el7.noarch.rpm</filename><sum type="sha256">848ba4618ee6906a65a1536e5cd51cf74c7ec405074cea0626c1f42232e62c87</sum></package><package arch="noarch" epoch="2" name="texlive-filecontents-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn24250.1.3"><filename>texlive-filecontents-doc-svn24250.1.3-45.el7.noarch.rpm</filename><sum type="sha256">c1c4bb646116e875abdf371a594f044d3097174b0daad20849aff6635bafc217</sum></package><package arch="noarch" epoch="2" name="texlive-qstest-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-qstest-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">3e4eace6e6986243d2f03fac24593287cf75f66b2696c2a92e9d08f2892b1197</sum></package><package arch="noarch" epoch="2" name="texlive-xtab-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn23347.2.3f"><filename>texlive-xtab-doc-svn23347.2.3f-45.el7.noarch.rpm</filename><sum type="sha256">0b1142e0e134bfb7f72064db96ec92966cb58af74d8ae87c7cffd461713b235f</sum></package><package arch="noarch" epoch="2" name="texlive-xltxtra-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19809.0.5e"><filename>texlive-xltxtra-doc-svn19809.0.5e-45.el7.noarch.rpm</filename><sum type="sha256">186254377c75069a462fa1336680093b27e285c4fca4c976a0b684644a2875fd</sum></package><package arch="noarch" epoch="2" name="texlive-plain" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26647.0"><filename>texlive-plain-svn26647.0-45.el7.noarch.rpm</filename><sum type="sha256">44843784b9d3778d18c75c38e95ed88916c84bf016d7266fc22397cd63ca9956</sum></package><package arch="noarch" epoch="2" name="texlive-was-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn21439.0"><filename>texlive-was-doc-svn21439.0-45.el7.noarch.rpm</filename><sum type="sha256">8fbc0522b17531d1662d1fe301f2a5cd11aa69374ba2522219e0a629646b9817</sum></package><package arch="noarch" epoch="2" name="texlive-fp-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-fp-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">ba41d61d40e9d02885cb7645794ffc105614b5691b3abba631a0470921502b2d</sum></package><package arch="noarch" epoch="2" name="texlive-xecolor" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29660.0.1"><filename>texlive-xecolor-svn29660.0.1-45.el7.noarch.rpm</filename><sum type="sha256">cab29c6d3b3cd9048df1c1cdd5ac13b64c289c73874a083875ec96bd746af23a</sum></package><package arch="noarch" epoch="2" name="texlive-l3packages-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29361.SVN_4467"><filename>texlive-l3packages-doc-svn29361.SVN_4467-45.el7.noarch.rpm</filename><sum type="sha256">73a253ec818a7cc04ec9bda1fe1f1a0b9cf776928b66c13245181ccf30845bcc</sum></package><package arch="noarch" epoch="2" name="texlive-marginnote" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn25880.v1.1i"><filename>texlive-marginnote-svn25880.v1.1i-45.el7.noarch.rpm</filename><sum type="sha256">a6089281b8d2195cfe7109e22b9feb327db53a50b1a59d8235e75ac0ed935963</sum></package><package arch="noarch" epoch="2" name="texlive-tipa-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29349.1.3"><filename>texlive-tipa-doc-svn29349.1.3-45.el7.noarch.rpm</filename><sum type="sha256">13032c0bc6643c84b46c44e27f4a478d8db05271a3ffee0e8862a55477d6708a</sum></package><package arch="noarch" epoch="2" name="texlive-attachfile-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn21866.v1.5b"><filename>texlive-attachfile-doc-svn21866.v1.5b-45.el7.noarch.rpm</filename><sum type="sha256">976a1fd15deb01475d3e751da068fac9d40c6148499d26cabd90f9e205eda44c</sum></package><package arch="noarch" epoch="2" name="texlive-pstricks-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29678.2.39"><filename>texlive-pstricks-doc-svn29678.2.39-45.el7.noarch.rpm</filename><sum type="sha256">b5303d40ae92c67f4e5177ea69fb3913c294488bfdeb3d2ae0ca7c3051a62e5c</sum></package><package arch="noarch" epoch="2" name="texlive-lastpage" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28985.1.2l"><filename>texlive-lastpage-svn28985.1.2l-45.el7.noarch.rpm</filename><sum type="sha256">94090186af79544c7604e50c91d52029508a9b70fb34dc8c18100b020459027c</sum></package><package arch="x86_64" epoch="2" name="texlive-metafont-bin" release="45.20130427_r30134.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26912.0"><filename>texlive-metafont-bin-svn26912.0-45.20130427_r30134.el7.x86_64.rpm</filename><sum type="sha256">a6e76fcaa33af068af8b1c673f04a94bf5470abbca5e2605b386a38f585d7b85</sum></package><package arch="noarch" epoch="2" name="texlive-ifxetex-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19685.0.5"><filename>texlive-ifxetex-doc-svn19685.0.5-45.el7.noarch.rpm</filename><sum type="sha256">17dbd87df4543e4e8c615181f8189ac42896b0885712a86489610b7e51f8a641</sum></package><package arch="noarch" epoch="2" name="texlive-lm-math-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29044.1.958"><filename>texlive-lm-math-doc-svn29044.1.958-45.el7.noarch.rpm</filename><sum type="sha256">1160cc2f13064534b3253150bb489d4cd9a14e6c4025ed710d3994b3f89071a8</sum></package><package arch="noarch" epoch="2" name="texlive-pst-grad" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.06"><filename>texlive-pst-grad-svn15878.1.06-45.el7.noarch.rpm</filename><sum type="sha256">352c63bfcbaf59181495210b3b30fded3d62b38ef99129eb0339f41580037b58</sum></package><package arch="noarch" epoch="2" name="texlive-ec-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn25033.1.0"><filename>texlive-ec-doc-svn25033.1.0-45.el7.noarch.rpm</filename><sum type="sha256">6eecff776f7ddd405f98537d064e8819d3b7e8c0ff30f4c0c1449dcb731642c9</sum></package><package arch="noarch" epoch="2" name="texlive-cmextra" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn14075.0"><filename>texlive-cmextra-svn14075.0-45.el7.noarch.rpm</filename><sum type="sha256">a1719d0d382fead78b1976c962eced28307ddb2303812482edc1101b4eab0a59</sum></package><package arch="noarch" epoch="2" name="texlive-datetime-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19834.2.58"><filename>texlive-datetime-doc-svn19834.2.58-45.el7.noarch.rpm</filename><sum type="sha256">7929aeb85cbd8344e21852d7b4c8ec7422598ea5f233315be28bbaccb0325011</sum></package><package arch="noarch" epoch="2" name="texlive-polyglossia-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn26163.v1.2.1"><filename>texlive-polyglossia-doc-svn26163.v1.2.1-45.el7.noarch.rpm</filename><sum type="sha256">9907fbaeb71b4aa947c4132788d79b5f38181d3be09c1bd189550c3bab5c79f1</sum></package><package arch="noarch" epoch="2" name="texlive-cns-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.0"><filename>texlive-cns-doc-svn15878.0-45.el7.noarch.rpm</filename><sum type="sha256">2fabfb71f2e3fa36b7aaaff5f8f3638e18442c808a8f9054fcaf34554da64ef3</sum></package><package arch="noarch" epoch="2" name="texlive-overpic" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn19712.0.53"><filename>texlive-overpic-svn19712.0.53-45.el7.noarch.rpm</filename><sum type="sha256">969bdb40f6e25b5313f8c2db5efd24d5d53b8c081865aa78a21185160ea565e5</sum></package><package arch="noarch" epoch="2" name="texlive-cm" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29581.0"><filename>texlive-cm-svn29581.0-45.el7.noarch.rpm</filename><sum type="sha256">a45600141e1f5b3bfc8bdd86c50103026ad94a505b5195b8f6694526e5c6af39</sum></package><package arch="noarch" epoch="2" name="texlive-beamer" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn29349.3.26"><filename>texlive-beamer-svn29349.3.26-45.el7.noarch.rpm</filename><sum type="sha256">54ded66240e2fdd3a23c382eb65b19f88b971d8c42f3bc9cf2da3be49f5f39d9</sum></package><package arch="noarch" epoch="2" name="texlive-xkeyval" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn27995.2.6a"><filename>texlive-xkeyval-svn27995.2.6a-45.el7.noarch.rpm</filename><sum type="sha256">ae892042993b07c3de06b5c7fc1dda195211506c192062ba092b55a54b0c6189</sum></package><package arch="noarch" epoch="2" name="texlive-pst-plot" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn28729.1.44"><filename>texlive-pst-plot-svn28729.1.44-45.el7.noarch.rpm</filename><sum type="sha256">ca6800e92d7b9f90a995f0bcd32835e2490eb4b1c5f0c9afcaf683a7e18700cd</sum></package><package arch="noarch" epoch="2" name="texlive-subfig-doc" release="45.el7" src="texlive-2012-45.20130427_r30134.el7.src.rpm" version="svn15878.1.3"><filename>texlive-subfig-doc-svn15878.1.3-45.el7.noarch.rpm</filename><sum type="sha256">63eeefc793cb66d2c5157e2694677407997d03123db2f3542dc45525b6a01d73</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17407" id="CVE-2018-17407" title="Cve-2018-17407" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1036" id="RHSA-2020:1036-1" title="Rhsa-2020:1036-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1632802" id="1632802" title="Cve-2018-17407 Texlive: Buffer Overflow In T1_Check_Unusual_Charstring Function In Writet1.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1037-1</id><title>Advancecomp</title><description>* advancecomp: integer overflow in png_compress in pngex.cc</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="advancecomp" release="22.el7" src="advancecomp-1.15-22.el7.src.rpm" version="1.15"><filename>advancecomp-1.15-22.el7.x86_64.rpm</filename><sum type="sha256">080ae5091580e5f0529d3c4707a1d14e6d6b8c2137f86e347477d9f2aedda96e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1037" id="RHSA-2020:1037-1" title="Rhsa-2020:1037-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1045-1</id><title>Lftp</title><description>* lftp: particular remote file names may lead to current working directory     erased</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="lftp-scripts" release="12.el7" src="lftp-4.4.8-12.el7.src.rpm" version="4.4.8"><filename>lftp-scripts-4.4.8-12.el7.noarch.rpm</filename><sum type="sha256">121ae03fcd39c1932effcaef3230afee3096878ac399c867e2199225410fe5d2</sum></package><package arch="x86_64" name="lftp" release="12.el7" src="lftp-4.4.8-12.el7.src.rpm" version="4.4.8"><filename>lftp-4.4.8-12.el7.x86_64.rpm</filename><sum type="sha256">fe0e2c48ef4259d3df169f7022ada35f15435b9db1ca41c4fc35e909e8652fec</sum></package><package arch="i686" name="lftp" release="12.el7" src="lftp-4.4.8-12.el7.src.rpm" version="4.4.8"><filename>lftp-4.4.8-12.el7.i686.rpm</filename><sum type="sha256">fe29e90148c072cdf36b4214dcfa98e3d3c2bd1bc3e47070bf2748f6849aceaf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10916" id="CVE-2018-10916" title="Cve-2018-10916" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1045" id="RHSA-2020:1045-1" title="Rhsa-2020:1045-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1610349" id="1610349" title="Cve-2018-10916 Lftp: Particular Remote File Names May Lead To Current Working Directory Erased" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1047-1</id><title>Wireshark</title><description>* wireshark: Out-of-bounds read in packet-ldss.c      * wireshark: Multiple dissectors could crash (wnpa-sec-2018-36)      * wireshark: DICOM dissector infinite loop (wnpa-sec-2018-39)      * wireshark: Bazaar dissector infinite loop (wnpa-sec-2018-40)      * wireshark: SIGCOMP dissector crash in packet-sigcomp.c      * wireshark: Radiotap dissector crash      * wireshark: Infinite loop in the MMSE dissector</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="wireshark" release="24.el7" src="wireshark-1.10.14-24.el7.src.rpm" version="1.10.14"><filename>wireshark-1.10.14-24.el7.x86_64.rpm</filename><sum type="sha256">516cdbef14d71817cb17086e18990dc5bcbe2dc94d003dbc716a854dfa566a03</sum></package><package arch="i686" name="wireshark-devel" release="24.el7" src="wireshark-1.10.14-24.el7.src.rpm" version="1.10.14"><filename>wireshark-devel-1.10.14-24.el7.i686.rpm</filename><sum type="sha256">8dfa2552fe0502309d90600d1069ab93078ec487f2d3e2b64c7465830b46b2df</sum></package><package arch="i686" name="wireshark" release="24.el7" src="wireshark-1.10.14-24.el7.src.rpm" version="1.10.14"><filename>wireshark-1.10.14-24.el7.i686.rpm</filename><sum type="sha256">349a5600321619f97a67a6bc17f265f04ede4fef00e1f3fef03c3c9e2e13570f</sum></package><package arch="x86_64" name="wireshark-devel" release="24.el7" src="wireshark-1.10.14-24.el7.src.rpm" version="1.10.14"><filename>wireshark-devel-1.10.14-24.el7.x86_64.rpm</filename><sum type="sha256">f6def1eeb45a5c5878d6b2a720e8ca1131164a20e27abce41c2f2dbd8e65e95f</sum></package><package arch="x86_64" name="wireshark-gnome" release="24.el7" src="wireshark-1.10.14-24.el7.src.rpm" version="1.10.14"><filename>wireshark-gnome-1.10.14-24.el7.x86_64.rpm</filename><sum type="sha256">c74400819d815a6127f9870642da702166eef2a4a863577d9821ee9f32e5d9c4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11362" id="CVE-2018-11362" title="Cve-2018-11362" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14340" id="CVE-2018-14340" title="Cve-2018-14340" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14341" id="CVE-2018-14341" title="Cve-2018-14341" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14368" id="CVE-2018-14368" title="Cve-2018-14368" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16057" id="CVE-2018-16057" title="Cve-2018-16057" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19622" id="CVE-2018-19622" title="Cve-2018-19622" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7418" id="CVE-2018-7418" title="Cve-2018-7418" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1047" id="RHSA-2020:1047-1" title="Rhsa-2020:1047-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1549305" id="1549305" title="Cve-2018-7418 Wireshark: Sigcomp Dissector Crash In Packet-Sigcomp.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1581787" id="1581787" title="Cve-2018-11362 Wireshark: Out-Of-Bounds Read In Packet-Ldss.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1607323" id="1607323" title="Cve-2018-14340 Wireshark: Multiple Dissectors Could Crash (Wnpa-Sec-2018-36)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1607326" id="1607326" title="Cve-2018-14341 Wireshark: Dicom Dissector Infinite Loop (Wnpa-Sec-2018-39)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1607327" id="1607327" title="Cve-2018-14368 Wireshark: Bazaar Dissector Infinite Loop (Wnpa-Sec-2018-40)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1625925" id="1625925" title="Cve-2018-16057 Wireshark: Radiotap Dissector Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1655932" id="1655932" title="Cve-2018-19622 Wireshark: Infinite Loop In The Mmse Dissector" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1050-1</id><title>Cups</title><description>* cups: Local privilege escalation to root due to insecure environment     variable handling      * cups: Manipulation of cupsd.conf by a local attacker resulting in limited     reads of arbitrary files as root      * cups: Predictable session cookie breaks CSRF protection</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="cups-ipptool" release="43.el7" src="cups-1.6.3-43.el7.src.rpm" version="1.6.3"><filename>cups-ipptool-1.6.3-43.el7.x86_64.rpm</filename><sum type="sha256">30321219fd0e834fd3e02d41d9e35c7bd6374d1226bddd73d5d1c4c90835f2ca</sum></package><package arch="x86_64" epoch="1" name="cups-client" release="43.el7" src="cups-1.6.3-43.el7.src.rpm" version="1.6.3"><filename>cups-client-1.6.3-43.el7.x86_64.rpm</filename><sum type="sha256">aee326fc52d7de87a5db127a99f11c47441d95a12296bcb98781d7d3622b4e33</sum></package><package arch="x86_64" epoch="1" name="cups-libs" release="43.el7" src="cups-1.6.3-43.el7.src.rpm" version="1.6.3"><filename>cups-libs-1.6.3-43.el7.x86_64.rpm</filename><sum type="sha256">c324fc9c255e9b29a610885beec92383e5d50ea3d17cb4ea992c80c726bc4c83</sum></package><package arch="i686" epoch="1" name="cups-libs" release="43.el7" src="cups-1.6.3-43.el7.src.rpm" version="1.6.3"><filename>cups-libs-1.6.3-43.el7.i686.rpm</filename><sum type="sha256">38e0ca48e591497d554d421288ca1eb6224c31cc4fb527cf2b74a25dda61b578</sum></package><package arch="x86_64" epoch="1" name="cups-lpd" release="43.el7" src="cups-1.6.3-43.el7.src.rpm" version="1.6.3"><filename>cups-lpd-1.6.3-43.el7.x86_64.rpm</filename><sum type="sha256">622ff1449cd07bc9a24580519c45409d88a7d128e06bc70c2c7cd9010fcfbd0a</sum></package><package arch="noarch" epoch="1" name="cups-filesystem" release="43.el7" src="cups-1.6.3-43.el7.src.rpm" version="1.6.3"><filename>cups-filesystem-1.6.3-43.el7.noarch.rpm</filename><sum type="sha256">eaa47af47f18b8ec67943dc90377b5586fc337531c386387af094a7723aefd11</sum></package><package arch="i686" epoch="1" name="cups-devel" release="43.el7" src="cups-1.6.3-43.el7.src.rpm" version="1.6.3"><filename>cups-devel-1.6.3-43.el7.i686.rpm</filename><sum type="sha256">5299ab86d0d5fe29a42d979a18a65e4b80e6f3e292d0b80ba56b63a387ba44ed</sum></package><package arch="x86_64" epoch="1" name="cups-devel" release="43.el7" src="cups-1.6.3-43.el7.src.rpm" version="1.6.3"><filename>cups-devel-1.6.3-43.el7.x86_64.rpm</filename><sum type="sha256">1d01c1807758623160a5955b6fd0d7460020cfa1dc152df347d3f23aea3b4ce8</sum></package><package arch="x86_64" epoch="1" name="cups" release="43.el7" src="cups-1.6.3-43.el7.src.rpm" version="1.6.3"><filename>cups-1.6.3-43.el7.x86_64.rpm</filename><sum type="sha256">3e1ed8a149a19feb1a21cda20b7ba6c85ff32a721f06a9de2a2b5f212d0f89d6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4180" id="CVE-2018-4180" title="Cve-2018-4180" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4181" id="CVE-2018-4181" title="Cve-2018-4181" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-4700" id="CVE-2018-4700" title="Cve-2018-4700" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1050" id="RHSA-2020:1050-1" title="Rhsa-2020:1050-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1607282" id="1607282" title="Cve-2018-4180 Cups: Local Privilege Escalation To Root Due To Insecure Environment Variable Handling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1607291" id="1607291" title="Cve-2018-4181 Cups: Manipulation Of Cupsd.Conf By A Local Attacker Resulting In Limited Reads Of Arbitrary Files As Root" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1649347" id="1649347" title="Cve-2018-4700 Cups: Predictable Session Cookie Breaks Csrf Protection" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1051-1</id><title>Libosinfo</title><description>* Libosinfo: osinfo-install-script option leaks password via command line     argument</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libosinfo-vala" release="5.el7" src="libosinfo-1.1.0-5.el7.src.rpm" version="1.1.0"><filename>libosinfo-vala-1.1.0-5.el7.x86_64.rpm</filename><sum type="sha256">c0a39d2fcfb662c0f873763d727eedb62ce16cb624d44052b827b8d8e8b3b828</sum></package><package arch="i686" name="libosinfo-devel" release="5.el7" src="libosinfo-1.1.0-5.el7.src.rpm" version="1.1.0"><filename>libosinfo-devel-1.1.0-5.el7.i686.rpm</filename><sum type="sha256">a677b764e18a9f52406c8a06fd21eef2276683f210000ea9cdb21961d21342f3</sum></package><package arch="i686" name="libosinfo" release="5.el7" src="libosinfo-1.1.0-5.el7.src.rpm" version="1.1.0"><filename>libosinfo-1.1.0-5.el7.i686.rpm</filename><sum type="sha256">3760b63e4738300d8f4a268e3e24b4f008456576150bbc77bf05d013b4cb4869</sum></package><package arch="x86_64" name="libosinfo" release="5.el7" src="libosinfo-1.1.0-5.el7.src.rpm" version="1.1.0"><filename>libosinfo-1.1.0-5.el7.x86_64.rpm</filename><sum type="sha256">c46df50f1634d79546b96f66b0a0319e3da3ef0589b5f0fdba5e511492f18489</sum></package><package arch="x86_64" name="libosinfo-devel" release="5.el7" src="libosinfo-1.1.0-5.el7.src.rpm" version="1.1.0"><filename>libosinfo-devel-1.1.0-5.el7.x86_64.rpm</filename><sum type="sha256">f9af81804295dfc445874d3f45b271fc85914e005047091429f9177e1430ba1c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13313" id="CVE-2019-13313" title="Cve-2019-13313" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1051" id="RHSA-2020:1051-1" title="Rhsa-2020:1051-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1727766" id="1727766" title="Cve-2019-13313 Libosinfo: Osinfo-Install-Script Option Leaks Password Via Command Line Argument" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1054-1</id><title>Mailman</title><description>* mailman: Cross-site scripting vulnerability allows malicious listowners     to inject scripts into listinfo pages      * mailman: Mishandled URLs in Utils.py:GetPathPieces() allows attackers to     display arbitrary text on trusted sites</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="3" name="mailman" release="30.el7" src="mailman-2.1.15-30.el7.src.rpm" version="2.1.15"><filename>mailman-2.1.15-30.el7.x86_64.rpm</filename><sum type="sha256">4c6560cc837ccd4ba6fd04a80ea918cb45f8d6e9bbab48cf383ef98d46890c2b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0618" id="CVE-2018-0618" title="Cve-2018-0618" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13796" id="CVE-2018-13796" title="Cve-2018-13796" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1054" id="RHSA-2020:1054-1" title="Rhsa-2020:1054-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1596458" id="1596458" title="Cve-2018-0618 Mailman: Cross-Site Scripting Vulnerability Allows Malicious Listowners To Inject Scripts Into Listinfo Pages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1609090" id="1609090" title="Cve-2018-13796 Mailman: Mishandled Urls In Utils.Py:Getpathpieces() Allows Attackers To Display Arbitrary Text On Trusted Sites" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1061-1</id><title>Bind</title><description>* bind: TCP Pipelining doesn't limit TCP clients on a single connection      * bind: An assertion failure if a trust anchor rolls over to an unsupported     key algorithm when using managed-keys      * bind: Controls for zone transfers may not be properly applied to DLZs if     the zones are writable</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-export-devel" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-16.P2.el7.x86_64.rpm</filename><sum type="sha256">ea5b762f5baca5a109756607c81a631dca99ab90f52f9423957ab01a3d484ef0</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-16.P2.el7.x86_64.rpm</filename><sum type="sha256">aace8f95ce403ddff5f197510c377ab98aff702f660f1fc8634492cb83884663</sum></package><package arch="i686" epoch="32" name="bind-devel" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-16.P2.el7.i686.rpm</filename><sum type="sha256">712f0d3e2eccf7f978293b5cb9602ca0ecde951ea26400fb2d3e29ef00758256</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-16.P2.el7.x86_64.rpm</filename><sum type="sha256">8b03a36cd661507bb99d34d8e0e4ccd0c0bf7f7af4184e008644a849a6370ee5</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-16.P2.el7.x86_64.rpm</filename><sum type="sha256">0300fcceb4551e69fc6c387cf4c5d96dfa8b6fbcc39395f8c5d34e9b815086c0</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-16.P2.el7.i686.rpm</filename><sum type="sha256">41bb108f63a5a354a05e3ab97ffe6ddbd1da7da58cb977034ea566b89057baf2</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-16.P2.el7.x86_64.rpm</filename><sum type="sha256">34020acaa109c65d78d37007b574923be687851b6d3e292852e493a3d4e73d38</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-16.P2.el7.i686.rpm</filename><sum type="sha256">3292adb152f80f5d640beedab26556b531d760cf82b8a3fcf18cb0723025ecac</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-16.P2.el7.x86_64.rpm</filename><sum type="sha256">6c173d231a58494f95c220e33cc690e4c0614f3b71e7d5e5991a0cc200c695d1</sum></package><package arch="i686" epoch="32" name="bind-libs" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-16.P2.el7.i686.rpm</filename><sum type="sha256">3eb7473bad7b05c936dc1c76cf5c2f5c9e04fb296eeacb360c0a6a057c9f8b48</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-16.P2.el7.x86_64.rpm</filename><sum type="sha256">d419763c2c5e417c7b3ec3acabf281d5f2fec2838213cf30cffebb2fb0c99e9f</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-16.P2.el7.x86_64.rpm</filename><sum type="sha256">cba3e5fb0491c7258cb3a19aca28d07fcdfde4810d8a48d95965be42616848fd</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-16.P2.el7.x86_64.rpm</filename><sum type="sha256">d3c1252b6611a53f60d775e22523f1af9e6373cbd9289c0bb6e6a92ac5b1dc71</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-16.P2.el7.i686.rpm</filename><sum type="sha256">5602ca7f6e9d40561ac5bcca60b4c07257dc523d637b79e04118c3e2ffaa6672</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-16.P2.el7.x86_64.rpm</filename><sum type="sha256">5c0ef59031be1053a97a97c02a38c4fa8a657660ace78e408194e60bf6fab30d</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-16.P2.el7.x86_64.rpm</filename><sum type="sha256">228fe5018d67068d3d6490fbed461a403e2aef39d9374b50f0b397e9a0fa6257</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-16.P2.el7.i686.rpm</filename><sum type="sha256">067ad5557a7166d6ae739135bcc887cb426dbb878edc35823d21da5fe95d0e5b</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-16.P2.el7.i686.rpm</filename><sum type="sha256">9c2e5ad684cfc4ed40779692817568c3dcce4d465f05a6e6c61ac47b835e07be</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-16.P2.el7.x86_64.rpm</filename><sum type="sha256">28c5d31d977c02549e7740b3a15f721257ea9bfe117d1409e43b2f51c131d856</sum></package><package arch="x86_64" epoch="32" name="bind" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-9.11.4-16.P2.el7.x86_64.rpm</filename><sum type="sha256">4c8be268faf8a57adcc6235e074313c36cb63cecb2dfcb30ef0209f467fae598</sum></package><package arch="noarch" epoch="32" name="bind-license" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-16.P2.el7.noarch.rpm</filename><sum type="sha256">510c0d96cc175ddb6261248fb31556db49e5f23eab2ed423bff629db6c321d76</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-16.P2.el7.x86_64.rpm</filename><sum type="sha256">bf36656b723c591e2652907a8c5e00a2f231f730569bcd4892c60be3529396b8</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-16.P2.el7.i686.rpm</filename><sum type="sha256">641e187e4a7f9535d88ce0feef4f46cce6712e86bcef0616328eed50cd365f41</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="16.P2.el7" src="bind-9.11.4-16.P2.el7.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-16.P2.el7.x86_64.rpm</filename><sum type="sha256">30a7ca3ca3c641f815d000d626b366dda84f581e2616b22dc7497bf1001b63e6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5745" id="CVE-2018-5745" title="Cve-2018-5745" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6465" id="CVE-2019-6465" title="Cve-2019-6465" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6477" id="CVE-2019-6477" title="Cve-2019-6477" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1061" id="RHSA-2020:1061-1" title="Rhsa-2020:1061-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1679303" id="1679303" title="Cve-2018-5745 Bind: An Assertion Failure If A Trust Anchor Rolls Over To An Unsupported Key Algorithm When Using Managed-Keys" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1679304" id="1679304" title="Cve-2019-6465 Bind: Controls For Zone Transfers May Not Be Properly Applied To Dlzs If The Zones Are Writable" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1743572" id="1743572" title="Nslookup Doesn'T Try To Search The Search In /Etc/Resolv.Conf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1753259" id="1753259" title="Regression: Bind 9.11 Listens On [::]:53 Even It Isn'T Configured To Do So" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1773617" id="1773617" title="Cve-2019-6477 Bind: Tcp Pipelining Doesn'T Limit Tcp Clients On A Single Connection" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1062-1</id><title>Dovecot</title><description>* dovecot: Improper certificate validation      * dovecot: Buffer overflow in indexer-worker process results in privilege     escalation</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="dovecot-devel" release="6.el7" src="dovecot-2.2.36-6.el7.src.rpm" version="2.2.36"><filename>dovecot-devel-2.2.36-6.el7.i686.rpm</filename><sum type="sha256">3471b2af67be1c41d0df3d33f9f09f82164f081421d757375622ea733c62d0aa</sum></package><package arch="x86_64" epoch="1" name="dovecot-mysql" release="6.el7" src="dovecot-2.2.36-6.el7.src.rpm" version="2.2.36"><filename>dovecot-mysql-2.2.36-6.el7.x86_64.rpm</filename><sum type="sha256">fa5e40e146ef45f111f7f5d9667609784db3a946a6d5d66f2ad69be32253ad53</sum></package><package arch="x86_64" epoch="1" name="dovecot-devel" release="6.el7" src="dovecot-2.2.36-6.el7.src.rpm" version="2.2.36"><filename>dovecot-devel-2.2.36-6.el7.x86_64.rpm</filename><sum type="sha256">4e141672ec5797ea26c911891d44e7446fb90553f9fefa7749ac71b05b7af7f7</sum></package><package arch="x86_64" epoch="1" name="dovecot-pigeonhole" release="6.el7" src="dovecot-2.2.36-6.el7.src.rpm" version="2.2.36"><filename>dovecot-pigeonhole-2.2.36-6.el7.x86_64.rpm</filename><sum type="sha256">9b5a1c340971784ee8c0e5f64d7b82cf2417acc248facc8a21dfd8e458529de5</sum></package><package arch="x86_64" epoch="1" name="dovecot" release="6.el7" src="dovecot-2.2.36-6.el7.src.rpm" version="2.2.36"><filename>dovecot-2.2.36-6.el7.x86_64.rpm</filename><sum type="sha256">8345133371a923a9bd6b155b64fb30508e917d46a375a362ca08047aab24446b</sum></package><package arch="x86_64" epoch="1" name="dovecot-pgsql" release="6.el7" src="dovecot-2.2.36-6.el7.src.rpm" version="2.2.36"><filename>dovecot-pgsql-2.2.36-6.el7.x86_64.rpm</filename><sum type="sha256">74d2556aace15a0243c5b30ea40af5fef33c17b8e560a12663b650d8887be32e</sum></package><package arch="i686" epoch="1" name="dovecot" release="6.el7" src="dovecot-2.2.36-6.el7.src.rpm" version="2.2.36"><filename>dovecot-2.2.36-6.el7.i686.rpm</filename><sum type="sha256">c23d960bf920b3ac7a70005c2802b692d0035648df9094816275cd1e6da511f4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3814" id="CVE-2019-3814" title="Cve-2019-3814" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7524" id="CVE-2019-7524" title="Cve-2019-7524" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1062" id="RHSA-2020:1062-1" title="Rhsa-2020:1062-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1570283" id="1570283" title="Dovecot Should Use Portrelease To Avoid Port Conflicts With Nfsv4 Mounts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1673415" id="1673415" title="Cve-2019-3814 Dovecot: Improper Certificate Validation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1696152" id="1696152" title="Cve-2019-7524 Dovecot: Buffer Overflow In Indexer-Worker Process Results In Privilege Escalation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1068-1</id><title>Squid</title><description>* squid: Incorrect pointer handling when processing ESI Responses can lead     to denial of service           * squid: Incorrect pointer handling in HTTP processing and certificate     download can lead to denial of service 
    * squid: XSS via user_name or auth parameter in cachemgr.cgi</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="squid" release="15.el7" src="squid-3.5.20-15.el7.src.rpm" version="3.5.20"><filename>squid-3.5.20-15.el7.x86_64.rpm</filename><sum type="sha256">15fc5ca999e8a13629671d1eebfa9ad54e6a2a84ef71417a692b163b52a2d7ae</sum></package><package arch="x86_64" epoch="7" name="squid-sysvinit" release="15.el7" src="squid-3.5.20-15.el7.src.rpm" version="3.5.20"><filename>squid-sysvinit-3.5.20-15.el7.x86_64.rpm</filename><sum type="sha256">ad77d33417d11d48fcda68bfd72354b4aeb974a3a7cd78138707c75153dddf69</sum></package><package arch="x86_64" epoch="7" name="squid-migration-script" release="15.el7" src="squid-3.5.20-15.el7.src.rpm" version="3.5.20"><filename>squid-migration-script-3.5.20-15.el7.x86_64.rpm</filename><sum type="sha256">743619611cd8c503214a741ddaf8ab78a9439f53e8d85b606a8a96bdb2c9f402</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000024" id="CVE-2018-1000024" title="Cve-2018-1000024" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000027" id="CVE-2018-1000027" title="Cve-2018-1000027" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13345" id="CVE-2019-13345" title="Cve-2019-13345" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1068" id="RHSA-2020:1068-1" title="Rhsa-2020:1068-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1536939" id="1536939" title="Cve-2018-1000024 Squid: Incorrect Pointer Handling When Processing Esi Responses Can Lead To Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1536942" id="1536942" title="Cve-2018-1000027 Squid: Incorrect Pointer Handling In Http Processing And Certificate Download Can Lead To Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1680022" id="1680022" title="Squid Can'T Display Download/Upload Packet Size For Https Sites" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1717430" id="1717430" title="Excessive Memory Usage When Running Out Of Descriptors" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1727744" id="1727744" title="Cve-2019-13345 Squid: Xss Via User_Name Or Auth Parameter In Cachemgr.Cgi" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1074-1</id><title>Poppler And Evince</title><description>* poppler: integer overflow in Parser::makeStream in Parser.cc      * poppler: heap-based buffer over-read in function     PSOutputDev::checkPageSlice in PSOutputDev.cc      * poppler: heap-based buffer over-read in JPXStream::init in     JPEG2000Stream.cc      * poppler: integer overflow in JPXStream::init function leading to memory     consumption      * evince: uninitialized memory use in function tiff_document_render() and     tiff_document_get_thumbnail()</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="poppler-cpp" release="42.el7" src="poppler-0.26.5-42.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-0.26.5-42.el7.x86_64.rpm</filename><sum type="sha256">121d38e13b1bec5c3d1dbe12e20f7d927faeed46153411e761be3dd2389f5107</sum></package><package arch="x86_64" name="evince-browser-plugin" release="9.el7" src="evince-3.28.2-9.el7.src.rpm" version="3.28.2"><filename>evince-browser-plugin-3.28.2-9.el7.x86_64.rpm</filename><sum type="sha256">41284fbc4a6721db87020b671c8f6ed0c6a230869cbe95702aa9073d767daffe</sum></package><package arch="i686" name="poppler-qt" release="42.el7" src="poppler-0.26.5-42.el7.src.rpm" version="0.26.5"><filename>poppler-qt-0.26.5-42.el7.i686.rpm</filename><sum type="sha256">57f944d40ce2664d5775cd7cc4b696e2d1a3180e076731295e18cdf3e3fe2cf7</sum></package><package arch="i686" name="evince-devel" release="9.el7" src="evince-3.28.2-9.el7.src.rpm" version="3.28.2"><filename>evince-devel-3.28.2-9.el7.i686.rpm</filename><sum type="sha256">e2556ecaa99db1085d4d857e72487284a9f1357c69fe86fec5f6e5e925783ab1</sum></package><package arch="i686" name="poppler-glib-devel" release="42.el7" src="poppler-0.26.5-42.el7.src.rpm" version="0.26.5"><filename>poppler-glib-devel-0.26.5-42.el7.i686.rpm</filename><sum type="sha256">59fdc887f5ca48f0aadd844f2c7a245fdc29a81d50b9936dc119881ee0f407f1</sum></package><package arch="x86_64" name="poppler-qt" release="42.el7" src="poppler-0.26.5-42.el7.src.rpm" version="0.26.5"><filename>poppler-qt-0.26.5-42.el7.x86_64.rpm</filename><sum type="sha256">c8561c93f6833df5e6290578dac9cfdbda8f6e7bc1167597737a9ed89ec267a1</sum></package><package arch="x86_64" name="poppler-glib-devel" release="42.el7" src="poppler-0.26.5-42.el7.src.rpm" version="0.26.5"><filename>poppler-glib-devel-0.26.5-42.el7.x86_64.rpm</filename><sum type="sha256">68ffcab44ffc18c05a0e147d1ab2c8863da70cc5b09d9ed5ae4862855063dcb9</sum></package><package arch="x86_64" name="poppler-utils" release="42.el7" src="poppler-0.26.5-42.el7.src.rpm" version="0.26.5"><filename>poppler-utils-0.26.5-42.el7.x86_64.rpm</filename><sum type="sha256">646b7fe4c208dde5f7d115be14fabf3ad88ce7e6100419b46909dbb349b76a23</sum></package><package arch="i686" name="evince-libs" release="9.el7" src="evince-3.28.2-9.el7.src.rpm" version="3.28.2"><filename>evince-libs-3.28.2-9.el7.i686.rpm</filename><sum type="sha256">35475694cd6e27c3d4a3dd94c815b5530f7b28d4c5cbaf9d1ae7e3f80705675e</sum></package><package arch="x86_64" name="poppler-glib" release="42.el7" src="poppler-0.26.5-42.el7.src.rpm" version="0.26.5"><filename>poppler-glib-0.26.5-42.el7.x86_64.rpm</filename><sum type="sha256">86acd8c0c09f19c9f58414517171b14bcde53bea344d88120da4a56c8da615fe</sum></package><package arch="x86_64" name="evince-libs" release="9.el7" src="evince-3.28.2-9.el7.src.rpm" version="3.28.2"><filename>evince-libs-3.28.2-9.el7.x86_64.rpm</filename><sum type="sha256">0fdbb41c14cd59c9532f66a18f00d9d06bb1fcb0979d1058e9b93a06e613e285</sum></package><package arch="x86_64" name="evince-nautilus" release="9.el7" src="evince-3.28.2-9.el7.src.rpm" version="3.28.2"><filename>evince-nautilus-3.28.2-9.el7.x86_64.rpm</filename><sum type="sha256">ece61e44d447bfe2cf60687a385bed20b74f39aaf1824bed11d4ed9c1c189416</sum></package><package arch="x86_64" name="poppler" release="42.el7" src="poppler-0.26.5-42.el7.src.rpm" version="0.26.5"><filename>poppler-0.26.5-42.el7.x86_64.rpm</filename><sum type="sha256">bcd114783b465399ee55b75330971eddcbf9a6bc0d740e44b0138179d7a8e2ee</sum></package><package arch="x86_64" name="evince-dvi" release="9.el7" src="evince-3.28.2-9.el7.src.rpm" version="3.28.2"><filename>evince-dvi-3.28.2-9.el7.x86_64.rpm</filename><sum type="sha256">1b194752f2075e884891709178cb5ba22636c9c4151e433835821c7459f2ab82</sum></package><package arch="x86_64" name="evince-devel" release="9.el7" src="evince-3.28.2-9.el7.src.rpm" version="3.28.2"><filename>evince-devel-3.28.2-9.el7.x86_64.rpm</filename><sum type="sha256">5bc625c69197cffa3b45f0461d8048e1612a0c57be18d5232ba35063415feb90</sum></package><package arch="i686" name="poppler-qt-devel" release="42.el7" src="poppler-0.26.5-42.el7.src.rpm" version="0.26.5"><filename>poppler-qt-devel-0.26.5-42.el7.i686.rpm</filename><sum type="sha256">aa670777ca20d7fb054e820369612825f8e323e7c62dbbff988393fc20f31436</sum></package><package arch="x86_64" name="poppler-qt-devel" release="42.el7" src="poppler-0.26.5-42.el7.src.rpm" version="0.26.5"><filename>poppler-qt-devel-0.26.5-42.el7.x86_64.rpm</filename><sum type="sha256">6b6b21ea965a82e591a8597ae10dd362cf54464401b899db800ace5990d9fec0</sum></package><package arch="x86_64" name="evince" release="9.el7" src="evince-3.28.2-9.el7.src.rpm" version="3.28.2"><filename>evince-3.28.2-9.el7.x86_64.rpm</filename><sum type="sha256">03461032243ca44b39915b468ea125b5b67f1eb1b8ee57064b38412f475d23e2</sum></package><package arch="i686" name="poppler-devel" release="42.el7" src="poppler-0.26.5-42.el7.src.rpm" version="0.26.5"><filename>poppler-devel-0.26.5-42.el7.i686.rpm</filename><sum type="sha256">8f0e15b6de84c046593322253939f4ecffbdfacb8a71db97842d4cc56e5c9122</sum></package><package arch="x86_64" name="poppler-cpp-devel" release="42.el7" src="poppler-0.26.5-42.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-devel-0.26.5-42.el7.x86_64.rpm</filename><sum type="sha256">fed6077dd7185b610ca776ff5ff44515c7d1d2614cf56b7f1b35422b51531b56</sum></package><package arch="i686" name="poppler-cpp-devel" release="42.el7" src="poppler-0.26.5-42.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-devel-0.26.5-42.el7.i686.rpm</filename><sum type="sha256">ef0fb14d8938a802c8a7ea5829ee528f3b05351b95ec345fa2efd8da5c087042</sum></package><package arch="i686" name="poppler-cpp" release="42.el7" src="poppler-0.26.5-42.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-0.26.5-42.el7.i686.rpm</filename><sum type="sha256">1a0835bbab9409d741bda90b83bf75e735afbd882debbc74e87ab321eba8aa68</sum></package><package arch="i686" name="poppler-glib" release="42.el7" src="poppler-0.26.5-42.el7.src.rpm" version="0.26.5"><filename>poppler-glib-0.26.5-42.el7.i686.rpm</filename><sum type="sha256">e5bd633d589369b80c07da8d5759ce49d4bc0468de2011ec5a7910cb397f584a</sum></package><package arch="x86_64" name="poppler-devel" release="42.el7" src="poppler-0.26.5-42.el7.src.rpm" version="0.26.5"><filename>poppler-devel-0.26.5-42.el7.x86_64.rpm</filename><sum type="sha256">65808c4480bdb4f8454ba467465fa2fe0e59b70be47ac223424278d61720a2e4</sum></package><package arch="x86_64" name="poppler-demos" release="42.el7" src="poppler-0.26.5-42.el7.src.rpm" version="0.26.5"><filename>poppler-demos-0.26.5-42.el7.x86_64.rpm</filename><sum type="sha256">cf8dbe9eb038ad8403b5f5197e47c325015c010fa4c6f650c73c62f67fa0073b</sum></package><package arch="i686" name="poppler" release="42.el7" src="poppler-0.26.5-42.el7.src.rpm" version="0.26.5"><filename>poppler-0.26.5-42.el7.i686.rpm</filename><sum type="sha256">49fdc6a357057025607e0104504715532b731c20dd6b241cd1b53ac7d80fd9f4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-21009" id="CVE-2018-21009" title="Cve-2018-21009" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10871" id="CVE-2019-10871" title="Cve-2019-10871" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11459" id="CVE-2019-11459" title="Cve-2019-11459" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12293" id="CVE-2019-12293" title="Cve-2019-12293" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9959" id="CVE-2019-9959" title="Cve-2019-9959" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1074" id="RHSA-2020:1074-1" title="Rhsa-2020:1074-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1696636" id="1696636" title="Cve-2019-10871 Poppler: Heap-Based Buffer Over-Read In Function Psoutputdev::Checkpageslice In Psoutputdev.Cc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1713582" id="1713582" title="Cve-2019-12293 Poppler: Heap-Based Buffer Over-Read In Jpxstream::Init In Jpeg2000Stream.Cc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1716295" id="1716295" title="Cve-2019-11459 Evince: Uninitialized Memory Use In Function Tiff_Document_Render() And Tiff_Document_Get_Thumbnail()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1732340" id="1732340" title="Cve-2019-9959 Poppler: Integer Overflow In Jpxstream::Init Function Leading To Memory Consumption" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1753850" id="1753850" title="Cve-2018-21009 Poppler: Integer Overflow In Parser::Makestream In Parser.Cc" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1080-1</id><title>Evolution</title><description>* evolution: specially crafted email leading to OpenPGP signatures being     spoofed for arbitrary messages      * evolution-ews: all certificate errors ignored if error is ignored during     initial account setup in gnome-online-accounts</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="evolution-data-server-tests" release="4.el7" src="evolution-data-server-3.28.5-4.el7.src.rpm" version="3.28.5"><filename>evolution-data-server-tests-3.28.5-4.el7.x86_64.rpm</filename><sum type="sha256">b9abf6a378985658960f3d9ecef7e9e6805063ce440ace25948d6fb290e48a05</sum></package><package arch="x86_64" name="evolution-data-server-perl" release="4.el7" src="evolution-data-server-3.28.5-4.el7.src.rpm" version="3.28.5"><filename>evolution-data-server-perl-3.28.5-4.el7.x86_64.rpm</filename><sum type="sha256">2df4f13c318933111156cdf76976f8e4f674847f30c382240a1f689ed0c255f9</sum></package><package arch="x86_64" name="evolution-bogofilter" release="8.el7" src="evolution-3.28.5-8.el7.src.rpm" version="3.28.5"><filename>evolution-bogofilter-3.28.5-8.el7.x86_64.rpm</filename><sum type="sha256">49940792feda2897eef88d20ff914ed4b881d92a23af199423f9aeba4b08081d</sum></package><package arch="i686" name="atk-devel" release="2.el7" src="atk-2.28.1-2.el7.src.rpm" version="2.28.1"><filename>atk-devel-2.28.1-2.el7.i686.rpm</filename><sum type="sha256">00705fdc88ab99690ec0190ae01ecb80b973c62a7c133431fa2d35cbed8ddcb8</sum></package><package arch="x86_64" name="evolution" release="8.el7" src="evolution-3.28.5-8.el7.src.rpm" version="3.28.5"><filename>evolution-3.28.5-8.el7.x86_64.rpm</filename><sum type="sha256">b3680a62611426e31a5c37e818c8c90e108b17fd957dc45003f304328e7acded</sum></package><package arch="i686" name="atk" release="2.el7" src="atk-2.28.1-2.el7.src.rpm" version="2.28.1"><filename>atk-2.28.1-2.el7.i686.rpm</filename><sum type="sha256">c7737c508695ecbf235d2975c573f6a78bb26999499ec4f143f2f50e472a29d6</sum></package><package arch="i686" name="evolution-data-server-tests" release="4.el7" src="evolution-data-server-3.28.5-4.el7.src.rpm" version="3.28.5"><filename>evolution-data-server-tests-3.28.5-4.el7.i686.rpm</filename><sum type="sha256">5eba983479051e37adbd77b75d09c12a08eb49b1739c8ddd2269610d4f7c3b92</sum></package><package arch="noarch" name="evolution-langpacks" release="8.el7" src="evolution-3.28.5-8.el7.src.rpm" version="3.28.5"><filename>evolution-langpacks-3.28.5-8.el7.noarch.rpm</filename><sum type="sha256">89508295c0fed11fbb83709d04a6b69e2d7c5403f045797c12067954c97077b3</sum></package><package arch="i686" name="evolution" release="8.el7" src="evolution-3.28.5-8.el7.src.rpm" version="3.28.5"><filename>evolution-3.28.5-8.el7.i686.rpm</filename><sum type="sha256">05d5b7a4435491a11c6ab8f7246ec8be30f0c973ed4e07b506139aa831a920b2</sum></package><package arch="x86_64" name="atk" release="2.el7" src="atk-2.28.1-2.el7.src.rpm" version="2.28.1"><filename>atk-2.28.1-2.el7.x86_64.rpm</filename><sum type="sha256">8daf64b509c18bf136c6859161f377e5c9e6ee95cc06b9b792b282bad9f68e91</sum></package><package arch="i686" name="evolution-devel" release="8.el7" src="evolution-3.28.5-8.el7.src.rpm" version="3.28.5"><filename>evolution-devel-3.28.5-8.el7.i686.rpm</filename><sum type="sha256">b5bb39ce515cb534b02a6470f3306ff674a9b63a06f6b8224c4af8837e8ecbdc</sum></package><package arch="x86_64" name="evolution-data-server" release="4.el7" src="evolution-data-server-3.28.5-4.el7.src.rpm" version="3.28.5"><filename>evolution-data-server-3.28.5-4.el7.x86_64.rpm</filename><sum type="sha256">c4f18fad5a2815799ca64d34ced60bb5bf4c840ff1774aaab05ff8d213c70cd4</sum></package><package arch="x86_64" name="evolution-ews" release="5.el7" src="evolution-ews-3.28.5-5.el7.src.rpm" version="3.28.5"><filename>evolution-ews-3.28.5-5.el7.x86_64.rpm</filename><sum type="sha256">092b71406f49af7fd2ea65b2001f45d5e11be4faa6653d53db201fba2fbf46f8</sum></package><package arch="i686" name="evolution-data-server-devel" release="4.el7" src="evolution-data-server-3.28.5-4.el7.src.rpm" version="3.28.5"><filename>evolution-data-server-devel-3.28.5-4.el7.i686.rpm</filename><sum type="sha256">dc6314cd177b5da004dcbe7ab7ca487f2208b51fe86e11ecce54f7b88487f95b</sum></package><package arch="i686" name="evolution-data-server" release="4.el7" src="evolution-data-server-3.28.5-4.el7.src.rpm" version="3.28.5"><filename>evolution-data-server-3.28.5-4.el7.i686.rpm</filename><sum type="sha256">b428a74e3b47db49f6318947c5ff2522d62fdcc95f5738097874b0aedd2d48f8</sum></package><package arch="noarch" name="evolution-help" release="8.el7" src="evolution-3.28.5-8.el7.src.rpm" version="3.28.5"><filename>evolution-help-3.28.5-8.el7.noarch.rpm</filename><sum type="sha256">ee15075c645a17203a06b77476425dea37be8e4f6ee68be6d5390dcd4356b175</sum></package><package arch="noarch" name="evolution-ews-langpacks" release="5.el7" src="evolution-ews-3.28.5-5.el7.src.rpm" version="3.28.5"><filename>evolution-ews-langpacks-3.28.5-5.el7.noarch.rpm</filename><sum type="sha256">7be59e52f24ce0fdc41c4e8c7715286204e950900e626a998656aa74c633d81e</sum></package><package arch="i686" name="evolution-ews" release="5.el7" src="evolution-ews-3.28.5-5.el7.src.rpm" version="3.28.5"><filename>evolution-ews-3.28.5-5.el7.i686.rpm</filename><sum type="sha256">057992b90c9ef7efcfc01bcf5b588c11f1008cbeeebd6b08db6f18a9572c70b8</sum></package><package arch="x86_64" name="evolution-data-server-devel" release="4.el7" src="evolution-data-server-3.28.5-4.el7.src.rpm" version="3.28.5"><filename>evolution-data-server-devel-3.28.5-4.el7.x86_64.rpm</filename><sum type="sha256">2c9aa5c3527c2e11567899e14ac8e4c06b8ec751e0866341a968de56836e5e1e</sum></package><package arch="noarch" name="evolution-data-server-langpacks" release="4.el7" src="evolution-data-server-3.28.5-4.el7.src.rpm" version="3.28.5"><filename>evolution-data-server-langpacks-3.28.5-4.el7.noarch.rpm</filename><sum type="sha256">eddfb1078b409d6b1ba84242563fdc5ab2f7ef40bd24c2ca701296107d52d0b3</sum></package><package arch="x86_64" name="atk-devel" release="2.el7" src="atk-2.28.1-2.el7.src.rpm" version="2.28.1"><filename>atk-devel-2.28.1-2.el7.x86_64.rpm</filename><sum type="sha256">3a4d3dca41643fc93d26942c13cbc3988e3c2aa707b3db85cd65f3fc086bac6d</sum></package><package arch="x86_64" name="evolution-devel" release="8.el7" src="evolution-3.28.5-8.el7.src.rpm" version="3.28.5"><filename>evolution-devel-3.28.5-8.el7.x86_64.rpm</filename><sum type="sha256">59b4700df32a1326efc0f040f38f8f785c4971cee88003c722e613dc2814e223</sum></package><package arch="x86_64" name="evolution-spamassassin" release="8.el7" src="evolution-3.28.5-8.el7.src.rpm" version="3.28.5"><filename>evolution-spamassassin-3.28.5-8.el7.x86_64.rpm</filename><sum type="sha256">c241fe203203faa6b493c2c2a8691f270e680a133d995d6c7b778aba80d80020</sum></package><package arch="noarch" name="evolution-data-server-doc" release="4.el7" src="evolution-data-server-3.28.5-4.el7.src.rpm" version="3.28.5"><filename>evolution-data-server-doc-3.28.5-4.el7.noarch.rpm</filename><sum type="sha256">d3cff7d0f6c2e4e3444999de40a155d745f1767179edc3feee30b90ddb83435e</sum></package><package arch="x86_64" name="evolution-pst" release="8.el7" src="evolution-3.28.5-8.el7.src.rpm" version="3.28.5"><filename>evolution-pst-3.28.5-8.el7.x86_64.rpm</filename><sum type="sha256">6126fa8c7dcc092d8a6dd202802c1af9fd00437ad4a6f3fa91eef16f4a00020b</sum></package><package arch="noarch" name="evolution-devel-docs" release="8.el7" src="evolution-3.28.5-8.el7.src.rpm" version="3.28.5"><filename>evolution-devel-docs-3.28.5-8.el7.noarch.rpm</filename><sum type="sha256">b6842fb5ae8079b2a04e26dedb47c3d6e2ca5d6d8a575bef0ead1b4d43515c33</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15587" id="CVE-2018-15587" title="Cve-2018-15587" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3890" id="CVE-2019-3890" title="Cve-2019-3890" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1080" id="RHSA-2020:1080-1" title="Rhsa-2020:1080-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1392567" id="1392567" title="Sync Categorylist With Mail Labels" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677650" id="1677650" title="Cve-2018-15587 Evolution: Specially Crafted Email Leading To Openpgp Signatures Being Spoofed For Arbitrary Messages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1678313" id="1678313" title="Cve-2019-3890 Evolution-Ews: All Certificate Errors Ignored If Error Is Ignored During Initial Account Setup In Gnome-Online-Accounts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1753122" id="1753122" title="Gala11Yetableitem: Incorrect Implementation Of Atkobjectclass::Ref_Child()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1753123" id="1753123" title="Leaks Atkgobjectaccessible Objects" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1081-1</id><title>Net-Snmp</title><description>* net-snmp: NULL pointer exception in snmp_oid_compare in     snmplib/snmp_api.c resulting in a denial of service</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="net-snmp" release="47.el7" src="net-snmp-5.7.2-47.el7.src.rpm" version="5.7.2"><filename>net-snmp-5.7.2-47.el7.x86_64.rpm</filename><sum type="sha256">28b26ba4fd2e242f6bdd8c25a722c51b21976e5f619f4e8cb0b4aa2ee1dbb600</sum></package><package arch="i686" epoch="1" name="net-snmp-devel" release="47.el7" src="net-snmp-5.7.2-47.el7.src.rpm" version="5.7.2"><filename>net-snmp-devel-5.7.2-47.el7.i686.rpm</filename><sum type="sha256">c817c5c0514ab7fca11dc6091e244e6b6c8330c4a0cb3c24b415da17af156cb3</sum></package><package arch="x86_64" epoch="1" name="net-snmp-python" release="47.el7" src="net-snmp-5.7.2-47.el7.src.rpm" version="5.7.2"><filename>net-snmp-python-5.7.2-47.el7.x86_64.rpm</filename><sum type="sha256">499fa38c774703ff7d68d0d4b38c23eb5590a0bdbb7857ee7260c3e4567c05be</sum></package><package arch="x86_64" epoch="1" name="net-snmp-gui" release="47.el7" src="net-snmp-5.7.2-47.el7.src.rpm" version="5.7.2"><filename>net-snmp-gui-5.7.2-47.el7.x86_64.rpm</filename><sum type="sha256">36dfaf441bd764e98071607ec45cc204f4787342b0073bb59f351a648a572076</sum></package><package arch="i686" epoch="1" name="net-snmp-agent-libs" release="47.el7" src="net-snmp-5.7.2-47.el7.src.rpm" version="5.7.2"><filename>net-snmp-agent-libs-5.7.2-47.el7.i686.rpm</filename><sum type="sha256">8064787472b2b75d1ddabb4f5cff53d44c450e3e32a67d919e2b4fac4a150ba4</sum></package><package arch="x86_64" epoch="1" name="net-snmp-perl" release="47.el7" src="net-snmp-5.7.2-47.el7.src.rpm" version="5.7.2"><filename>net-snmp-perl-5.7.2-47.el7.x86_64.rpm</filename><sum type="sha256">7dd1cc490224675bffe1de6363665dde53d760c650221f8c712b4208c987cacf</sum></package><package arch="i686" epoch="1" name="net-snmp-libs" release="47.el7" src="net-snmp-5.7.2-47.el7.src.rpm" version="5.7.2"><filename>net-snmp-libs-5.7.2-47.el7.i686.rpm</filename><sum type="sha256">505c5dc74098375e00e7b2fe3cae12d23eecd0e3fa168bb907b9d9a3d5ceffd7</sum></package><package arch="x86_64" epoch="1" name="net-snmp-libs" release="47.el7" src="net-snmp-5.7.2-47.el7.src.rpm" version="5.7.2"><filename>net-snmp-libs-5.7.2-47.el7.x86_64.rpm</filename><sum type="sha256">f79a44eb802af957194710e4ebf8c2fd491125c1f20daa13e72016f2aa8babf6</sum></package><package arch="x86_64" epoch="1" name="net-snmp-utils" release="47.el7" src="net-snmp-5.7.2-47.el7.src.rpm" version="5.7.2"><filename>net-snmp-utils-5.7.2-47.el7.x86_64.rpm</filename><sum type="sha256">bf5ec2e12d1059a502d38815c8922d34fad2035e4de3a281e669af602fb25483</sum></package><package arch="x86_64" epoch="1" name="net-snmp-sysvinit" release="47.el7" src="net-snmp-5.7.2-47.el7.src.rpm" version="5.7.2"><filename>net-snmp-sysvinit-5.7.2-47.el7.x86_64.rpm</filename><sum type="sha256">a3923f4d96c21a728c58d2289cdc98bbb72be21d373d2ab7ae1d9987a384d886</sum></package><package arch="x86_64" epoch="1" name="net-snmp-devel" release="47.el7" src="net-snmp-5.7.2-47.el7.src.rpm" version="5.7.2"><filename>net-snmp-devel-5.7.2-47.el7.x86_64.rpm</filename><sum type="sha256">0bcd956c1c68ffaf3719d714fa5d489efc604454b60184532df9492c45518662</sum></package><package arch="x86_64" epoch="1" name="net-snmp-agent-libs" release="47.el7" src="net-snmp-5.7.2-47.el7.src.rpm" version="5.7.2"><filename>net-snmp-agent-libs-5.7.2-47.el7.x86_64.rpm</filename><sum type="sha256">69bbf9da197ae36918431a7d7d5f06f10f388bf34942b23f8bbb8a184a424f81</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18066" id="CVE-2018-18066" title="Cve-2018-18066" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1081" id="RHSA-2020:1081-1" title="Rhsa-2020:1081-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1388118" id="1388118" title="Snmpd Starts Before The Network Stack Is Online (Network.Target Vs Network-Online.Target)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1547355" id="1547355" title="Snmpd: Despite Non-Zero Interface_Fadeout, Network Interface Is Deleted Immediately Sometimes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1637572" id="1637572" title="Cve-2018-18066 Net-Snmp: Null Pointer Exception In Snmp_Oid_Compare In Snmplib/Snmp_Api.C Resulting In A Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1695363" id="1695363" title="Mib Pass-Through Does Not Pass String Value For Snmpset String Oid Type" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700494" id="1700494" title="Sscanf Parsing Bug In Get_Sysfs_Stats() - Net-Snmp-5.7.2-Diskio-Whitelist.Patch" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1703752" id="1703752" title="Ucd-Snmp-Mib Uses Integer32 Instead Of Counter64 For Memory Oids Which Limits To 2Tib" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779609" id="1779609" title="Revert Free Memory Patch From Net-Snmp" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1084-1</id><title>Samba</title><description>* samba: Combination of parameters and permissions can allow user to escape     from the share path definition      * samba: smb client vulnerable to filenames containing path separators</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="samba-krb5-printing" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-krb5-printing-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">53d0573afe9a79e8c96d9aef9289a6d8c4a88677d4a21eee2549bc14c3cd48e1</sum></package><package arch="x86_64" name="ctdb-tests" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>ctdb-tests-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">ac75649ada4eae94cf34d8502a7afe6ab30543d70a1664d077bb4bc22805c1e3</sum></package><package arch="noarch" name="samba-pidl" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-pidl-4.10.4-10.el7.noarch.rpm</filename><sum type="sha256">883055b12cb9e573a62a55a40ec1907e00e8cbef853fbf497e1a700aa95b55ab</sum></package><package arch="x86_64" name="samba-test" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-test-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">8479cbe7e3c84fb608910656afbdea3ec4bffe2c0d7aabdaca69bafa88c54859</sum></package><package arch="x86_64" name="libsmbclient" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>libsmbclient-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">78a0d451777470d759403e5de7b0bd0b216374f5483f1713f967d071b722b541</sum></package><package arch="i686" name="samba-test-libs" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-test-libs-4.10.4-10.el7.i686.rpm</filename><sum type="sha256">ff3e175e498ff6d917006aca1c5bacd633b0de13b1aff27a9256749e3a9e9b87</sum></package><package arch="x86_64" name="samba" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">66b2990e8de91113bdd7321116861a4b05b9a56295ccbedc9deddc0348a63538</sum></package><package arch="i686" name="samba-winbind-modules" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-winbind-modules-4.10.4-10.el7.i686.rpm</filename><sum type="sha256">0df9974b4a88620005568a74899c7cf4473cf5144ca2977e7a2fabcac0d22c00</sum></package><package arch="x86_64" name="samba-common-tools" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-common-tools-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">4d2ab30dd98120b8e96b6841d03ea1c629e5b03ae3e3a45a1ef0c1318a85a30d</sum></package><package arch="i686" name="samba-libs" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-libs-4.10.4-10.el7.i686.rpm</filename><sum type="sha256">63f890eefe3034668807776dce328ba44c7bcbd1a8b11ea8fa3412a5eb27c293</sum></package><package arch="x86_64" name="libwbclient-devel" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>libwbclient-devel-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">21c618625d66e5124bd312ab6df4610549a8d0ae2670c9a930722884dcccacb5</sum></package><package arch="i686" name="libsmbclient-devel" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>libsmbclient-devel-4.10.4-10.el7.i686.rpm</filename><sum type="sha256">ab2ba50b1ffdff623934488f7663c45bc11674dc9b788cb88ad4d56358287532</sum></package><package arch="x86_64" name="samba-winbind-clients" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-winbind-clients-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">cf8e03ed35b2d97ed3891ca68759e12618e10f75179e89ebeb87fe3c5e183ec8</sum></package><package arch="x86_64" name="ctdb" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>ctdb-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">8115ae02295060be774386779a92d6d22701c1b3d7d5577327250f7ae25b08d8</sum></package><package arch="x86_64" name="samba-common-libs" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-common-libs-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">da217d025fb4980edb30611792b1eecf1e20c046318b12797f6684fcceef11cb</sum></package><package arch="noarch" name="samba-common" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-common-4.10.4-10.el7.noarch.rpm</filename><sum type="sha256">7f9a7deb2e43292cb140ff30dca9cf1ff6c6afa7d24a033ce150528d71d89fb5</sum></package><package arch="i686" name="samba-client-libs" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-client-libs-4.10.4-10.el7.i686.rpm</filename><sum type="sha256">c1c8e54eedb8d97c63c9e533215fb1778558ebab32a316cc234b2934dd15b366</sum></package><package arch="x86_64" name="samba-test-libs" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-test-libs-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">78b63fe2fdd4f426c8e979614aded3233bdce9308c7a0ad783821c2bf24cd560</sum></package><package arch="x86_64" name="samba-winbind" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-winbind-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">6801991917fe6efcaf54fe98daf4185812dbcb976d526caa4da4fc393261813a</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-winbind-krb5-locator-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">0fb8dac3bdd9a24218f2c40beee8c309769d27310e247bd0a0e5351d8afb1179</sum></package><package arch="i686" name="libsmbclient" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>libsmbclient-4.10.4-10.el7.i686.rpm</filename><sum type="sha256">a280eb0e2c8064053363a1b912088d64308fc1646e117dd76583376cb4884e98</sum></package><package arch="x86_64" name="samba-dc" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-dc-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">5f94a4d31cea4d1982d8ad4e7d45d17f37a46b58cb4adc108e2afcbbedbb4ea6</sum></package><package arch="x86_64" name="samba-libs" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-libs-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">42a12be20ed351ebc3db67124c37c9e42d3329cd8303486b230beab14607c0db</sum></package><package arch="x86_64" name="libwbclient" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>libwbclient-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">7fa0e6a7231463db1cc613181116db2bc3ee977683dd9e37974459147deacc9e</sum></package><package arch="x86_64" name="samba-client-libs" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-client-libs-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">2095ec5b4294c5ceb656bb65e3ce1099c07cdfe48baf2cff8b93b58c3f9586a8</sum></package><package arch="x86_64" name="samba-client" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-client-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">dd9a4759f07fc010d528d5634f658881556367bfd2c968cd2b97cae86a28324c</sum></package><package arch="x86_64" name="samba-dc-libs" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-dc-libs-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">d57365fea2b2b31729a96c0acd93795beb67a77c11478898630f8ac8c700428b</sum></package><package arch="i686" name="libwbclient" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>libwbclient-4.10.4-10.el7.i686.rpm</filename><sum type="sha256">c03c40e65b49d6f2d31d4a630b6ef13533d146ffab37e3eaf75e8691bdbde3de</sum></package><package arch="x86_64" name="samba-python-test" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-python-test-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">f96873e815e6e3f0b0c1bff4b557a22ae42dfcb4b172cc7b464ebe418380dca9</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-vfs-glusterfs-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">be7529351a088a8805f7e930d60cf3dc2bf7503879bcdd84eb5b215a59466acd</sum></package><package arch="i686" name="libwbclient-devel" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>libwbclient-devel-4.10.4-10.el7.i686.rpm</filename><sum type="sha256">0bad370e57a3f18f086cb21fd9c25433b69743a83221aa79d0d2e5aee722c80c</sum></package><package arch="x86_64" name="libsmbclient-devel" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>libsmbclient-devel-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">abe681e3bc08a47eb5b7c0e07674211263522c215e0c676d7fe36dc8d047260e</sum></package><package arch="x86_64" name="samba-python" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-python-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">b7881450727a1b2e72757905b359925b06f07cd08f2bd17e1285474b406f2c66</sum></package><package arch="i686" name="samba-devel" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-devel-4.10.4-10.el7.i686.rpm</filename><sum type="sha256">5fc48433205e752f74977fa9abbf1d00ecedfb32f7d43dfa16d09b2fbc1712aa</sum></package><package arch="x86_64" name="samba-winbind-modules" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-winbind-modules-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">409453df31db84aa8931693a58977265d41450ad3cb08d26e4e1f60569e23e02</sum></package><package arch="i686" name="samba-python" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-python-4.10.4-10.el7.i686.rpm</filename><sum type="sha256">1632d3e081a28a30bb69828036c810ea01ee19d3d2b29530908ece4ac583355a</sum></package><package arch="x86_64" name="samba-devel" release="10.el7" src="samba-4.10.4-10.el7.src.rpm" version="4.10.4"><filename>samba-devel-4.10.4-10.el7.x86_64.rpm</filename><sum type="sha256">efb546877d488c2eb6bf4ecbc514f66c3113a61bcf21ed8fb109ebfc5708e4a4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10197" id="CVE-2019-10197" title="Cve-2019-10197" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10218" id="CVE-2019-10218" title="Cve-2019-10218" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1084" id="RHSA-2020:1084-1" title="Rhsa-2020:1084-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1497809" id="1497809" title="[Rfe] Smbstatus -L Does Not Resolve Uids To Names" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595277" id="1595277" title="Man For Net Doesn'T Have Net Ads Lookup" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1657428" id="1657428" title="Window'S Client Cannot Connect Samba-4.8.3-4 Using Hostname. Ip Connection Works Fine" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1663064" id="1663064" title="Ad Permissions Required To Join Linux Computer To Domain Using Realmd With Samba In An Hardened Ad Environment." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1714947" id="1714947" title="Idmap_Tdb2 Stops Working After Some Time" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1724991" id="1724991" title="Rebase Samba To The Same Version As In Rhel 8.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1740986" id="1740986" title="Samba 4.9.1-6: Failed To Create Builtin\Guests Group Nt_Status_Access_Denied!" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1746225" id="1746225" title="Cve-2019-10197 Samba: Combination Of Parameters And Permissions Can Allow User To Escape From The Share Path Definition" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1753254" id="1753254" title="Trusted Domain Enumeration Stopped Working After Microsoft Patch Update" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1763137" id="1763137" title="Cve-2019-10218 Samba: Smb Client Vulnerable To Filenames Containing Path Separators" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1091-1</id><title>Python-Twisted-Web</title><description>* python-twisted: Improper neutralization of CRLF characters in URIs and     HTTP methods</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-twisted-web" release="6.el7" src="python-twisted-web-12.1.0-6.el7.src.rpm" version="12.1.0"><filename>python-twisted-web-12.1.0-6.el7.x86_64.rpm</filename><sum type="sha256">4deb200bc91aabc54dceed7d66c472df361801c1af3e8a823a86fd96d387cdfb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1091" id="RHSA-2020:1091-1" title="Rhsa-2020:1091-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1100-1</id><title>Mariadb</title><description>* mysql: Server: Pluggable Auth unspecified vulnerability (CPU Jul 2019)      * mysql: Server: Security: Privileges unspecified vulnerability (CPU Jul      * mysql: Server: XML unspecified vulnerability (CPU Jul 2019)      * mysql: Server: Parser unspecified vulnerability (CPU Jul 2019)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="mariadb-devel" release="1.el7" src="mariadb-5.5.65-1.el7.src.rpm" version="5.5.65"><filename>mariadb-devel-5.5.65-1.el7.x86_64.rpm</filename><sum type="sha256">0047cda33f2efc1dce4f0c76b19a2e9a63eb29ef04c5ded8255d21557b43f786</sum></package><package arch="x86_64" epoch="1" name="mariadb-embedded" release="1.el7" src="mariadb-5.5.65-1.el7.src.rpm" version="5.5.65"><filename>mariadb-embedded-5.5.65-1.el7.x86_64.rpm</filename><sum type="sha256">e9bb6deb1e883401655611e95e363afb6255a586f29efb2335fec611a09292bf</sum></package><package arch="x86_64" epoch="1" name="mariadb-test" release="1.el7" src="mariadb-5.5.65-1.el7.src.rpm" version="5.5.65"><filename>mariadb-test-5.5.65-1.el7.x86_64.rpm</filename><sum type="sha256">b34908f8c0904bbd6e018f1a6b22ea219bc38e590803abc5d98cdc455bd5f1b3</sum></package><package arch="x86_64" epoch="1" name="mariadb-server" release="1.el7" src="mariadb-5.5.65-1.el7.src.rpm" version="5.5.65"><filename>mariadb-server-5.5.65-1.el7.x86_64.rpm</filename><sum type="sha256">515d62971a0808eb8d81c8dec7f09a4fea1d9ef6ec26d3cadc3679907da725a5</sum></package><package arch="x86_64" epoch="1" name="mariadb" release="1.el7" src="mariadb-5.5.65-1.el7.src.rpm" version="5.5.65"><filename>mariadb-5.5.65-1.el7.x86_64.rpm</filename><sum type="sha256">68f2f930ac32009c73a644fa9098fcb7379df08922e7702807715dfc2871dc20</sum></package><package arch="i686" epoch="1" name="mariadb-libs" release="1.el7" src="mariadb-5.5.65-1.el7.src.rpm" version="5.5.65"><filename>mariadb-libs-5.5.65-1.el7.i686.rpm</filename><sum type="sha256">83af6331006d48207c991218185e7b8ee4bcdc3420cf4c47f71ec06a7021d800</sum></package><package arch="x86_64" epoch="1" name="mariadb-embedded-devel" release="1.el7" src="mariadb-5.5.65-1.el7.src.rpm" version="5.5.65"><filename>mariadb-embedded-devel-5.5.65-1.el7.x86_64.rpm</filename><sum type="sha256">820129a097711163246d52cfa974b000909e3fa0004e7ba39960cdfc0807920a</sum></package><package arch="i686" epoch="1" name="mariadb-embedded" release="1.el7" src="mariadb-5.5.65-1.el7.src.rpm" version="5.5.65"><filename>mariadb-embedded-5.5.65-1.el7.i686.rpm</filename><sum type="sha256">627a0688d9ed0e3651bbd49604f0c952006100b7908bb7aa9caaab5da65a5fce</sum></package><package arch="i686" epoch="1" name="mariadb-embedded-devel" release="1.el7" src="mariadb-5.5.65-1.el7.src.rpm" version="5.5.65"><filename>mariadb-embedded-devel-5.5.65-1.el7.i686.rpm</filename><sum type="sha256">dbab5781405e3f67745bbc4570aa69b4f719d8e25bf53a521c09fc79402de51e</sum></package><package arch="x86_64" epoch="1" name="mariadb-bench" release="1.el7" src="mariadb-5.5.65-1.el7.src.rpm" version="5.5.65"><filename>mariadb-bench-5.5.65-1.el7.x86_64.rpm</filename><sum type="sha256">878f65b906a307bfa317125987c8315e147ae0937c2e7f6e3200f799abb8bbf6</sum></package><package arch="i686" epoch="1" name="mariadb-devel" release="1.el7" src="mariadb-5.5.65-1.el7.src.rpm" version="5.5.65"><filename>mariadb-devel-5.5.65-1.el7.i686.rpm</filename><sum type="sha256">1012b35b43c21756d79c896818bd52ab34ae934dea358ae26c5b518fd29d5505</sum></package><package arch="x86_64" epoch="1" name="mariadb-libs" release="1.el7" src="mariadb-5.5.65-1.el7.src.rpm" version="5.5.65"><filename>mariadb-libs-5.5.65-1.el7.x86_64.rpm</filename><sum type="sha256">f4b56655dc837d9d5da2a50e4b1ca99bc64c7eb08974a9931b67d652e9f1e803</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2737" id="CVE-2019-2737" title="Cve-2019-2737" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2739" id="CVE-2019-2739" title="Cve-2019-2739" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2740" id="CVE-2019-2740" title="Cve-2019-2740" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2805" id="CVE-2019-2805" title="Cve-2019-2805" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1100" id="RHSA-2020:1100-1" title="Rhsa-2020:1100-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1731997" id="1731997" title="Cve-2019-2737 Mysql: Server: Pluggable Auth Unspecified Vulnerability (Cpu Jul 2019)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1731999" id="1731999" title="Cve-2019-2739 Mysql: Server: Security: Privileges Unspecified Vulnerability (Cpu Jul 2019)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1732000" id="1732000" title="Cve-2019-2740 Mysql: Server: Xml Unspecified Vulnerability (Cpu Jul 2019)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1732025" id="1732025" title="Cve-2019-2805 Mysql: Server: Parser Unspecified Vulnerability (Cpu Jul 2019)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1101-1</id><title>Bluez</title><description>* bluez: failure in disabling Bluetooth discoverability in certain cases     may lead to the unauthorized pairing of Bluetooth devices</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="bluez-libs" release="6.el7" src="bluez-5.44-6.el7.src.rpm" version="5.44"><filename>bluez-libs-5.44-6.el7.x86_64.rpm</filename><sum type="sha256">bbb64bf973fbcfff8f181ef9813a745bdb1809ee2ed96cda73f78db57cb88024</sum></package><package arch="x86_64" name="bluez-cups" release="6.el7" src="bluez-5.44-6.el7.src.rpm" version="5.44"><filename>bluez-cups-5.44-6.el7.x86_64.rpm</filename><sum type="sha256">d1b852098e290d8da8284c73cb4c498a7e8e86ef2ddb7945288a49de955e19e6</sum></package><package arch="x86_64" name="bluez-hid2hci" release="6.el7" src="bluez-5.44-6.el7.src.rpm" version="5.44"><filename>bluez-hid2hci-5.44-6.el7.x86_64.rpm</filename><sum type="sha256">d081ebc590da1091f40e6f40c0ad951fde5481b5c38529a9ad1f8af036f7cd74</sum></package><package arch="x86_64" name="bluez-libs-devel" release="6.el7" src="bluez-5.44-6.el7.src.rpm" version="5.44"><filename>bluez-libs-devel-5.44-6.el7.x86_64.rpm</filename><sum type="sha256">06bef872217dd3b32826dec6fd2aea0dc555797d7388e250ac0b05c8f8c220c8</sum></package><package arch="i686" name="bluez-libs-devel" release="6.el7" src="bluez-5.44-6.el7.src.rpm" version="5.44"><filename>bluez-libs-devel-5.44-6.el7.i686.rpm</filename><sum type="sha256">715f60736b63be50b77e4157f6691c5b051d357750a4871caa179523a630835a</sum></package><package arch="x86_64" name="bluez" release="6.el7" src="bluez-5.44-6.el7.src.rpm" version="5.44"><filename>bluez-5.44-6.el7.x86_64.rpm</filename><sum type="sha256">4117a1c1e697f0fa4b8d7bdf9ca06aecab566fea9218cf1b08e2c88e841360dd</sum></package><package arch="i686" name="bluez-libs" release="6.el7" src="bluez-5.44-6.el7.src.rpm" version="5.44"><filename>bluez-libs-5.44-6.el7.i686.rpm</filename><sum type="sha256">067946753c4781370f874176b66c8f5c97dc03c57a30d8a9582508d21683743b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10910" id="CVE-2018-10910" title="Cve-2018-10910" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1101" id="RHSA-2020:1101-1" title="Rhsa-2020:1101-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1606203" id="1606203" title="Cve-2018-10910 Bluez: Failure In Disabling Bluetooth Discoverability In Certain Cases May Lead To The Unauthorized Pairing Of Bluetooth Devices" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1112-1</id><title>Php</title><description>* php: Reflected XSS on PHAR 404 page      * php: Stack-based buffer under-read in php_stream_url_wrap_http_ex() in     http_fopen_wrapper.c when parsing HTTP response      * php: Reflected XSS vulnerability on PHAR 403 and 404 error pages      * php: Out-of-bounds read in base64_decode_xmlrpc in     ext/xmlrpc/libxmlrpc/base64.c</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="php-pdo" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-pdo-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">5896765672e4e0685c072077942889551debc9af29a6de4de7a7001ac0389e6c</sum></package><package arch="x86_64" name="php-mysqlnd" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-mysqlnd-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">524d82ace659534c74c56b0a73748c1c2d042fcd06532ae5e40323254cef603e</sum></package><package arch="x86_64" name="php-snmp" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-snmp-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">e4af2341e74a003d9eb3e83b1b5a1094f818f90b1f74145b7fbb2b24f3093802</sum></package><package arch="x86_64" name="php-fpm" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-fpm-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">c29a050e280bb102f15dbe2fa6210fa1e230baf89405d54c8adad1fc81223c8a</sum></package><package arch="x86_64" name="php-xml" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-xml-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">2d7578d80481bbc6adc8557c748c99628007502ecfb0cdf8f53841113d35f814</sum></package><package arch="x86_64" name="php-process" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-process-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">d9aed580d95c47c4355b6841e3990bc228f19e7c51b3ddba43504b3f9662fd10</sum></package><package arch="x86_64" name="php-odbc" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-odbc-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">3aff247e0beab1bca7a423286fbbf5ff3512901cb1ae478d94eb5a38ab515fb8</sum></package><package arch="x86_64" name="php-xmlrpc" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-xmlrpc-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">5926f32a4fff5e4f35998c7b9d9c4c5142c429f05cfbb5c86379da1dafe361e3</sum></package><package arch="x86_64" name="php-mbstring" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-mbstring-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">1ae23981cfe9c56853c4b93c48bcf1d0ea48136e5b9778e96d8a8a4b6e4e094a</sum></package><package arch="x86_64" name="php-pspell" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-pspell-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">831e682dcb99aff8cb504c14f2ccdb608d3263928dc14c9d209f941eef6543c6</sum></package><package arch="x86_64" name="php-common" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-common-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">7c76fe8fe597ca87f6d2cea1920f75ee4d0be4f4008a40a357c9e4e1043af5cd</sum></package><package arch="x86_64" name="php-ldap" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-ldap-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">52809ed66acf816918ee1c18d8880fcfc7e1d1ba771228407690ccd75a19abdb</sum></package><package arch="x86_64" name="php-embedded" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-embedded-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">424508cde4c8f307d4bdd183b8614c656d41c6a30d8cab8e89191bd07c1ba263</sum></package><package arch="x86_64" name="php-devel" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-devel-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">fdbdaae454f157ef08404e26ef8d2507cc1a31ac80b5012270ddd1530865c8b6</sum></package><package arch="x86_64" name="php-cli" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-cli-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">455b62bfde65cc6ee6a8112035db06a64a18cc6dee527881905879ab050c2338</sum></package><package arch="x86_64" name="php-bcmath" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-bcmath-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">c825e940d01bde8039f20b65fd64684112e4ac7519078e609b1a501982849ced</sum></package><package arch="x86_64" name="php-recode" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-recode-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">3378335b6c5e3575baf24cec6ebe7326edd6dc13310393a760cf66d06a05419e</sum></package><package arch="x86_64" name="php-intl" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-intl-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">e917b511e746a4d90b2b31d4732062a59de60aac4b1f681e829fcf3e69759da6</sum></package><package arch="x86_64" name="php-dba" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-dba-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">ca1fbd484cf2d928c3e5145a7c908bd951b8dde4a5f3b931d0f4a69fe10790af</sum></package><package arch="x86_64" name="php-pgsql" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-pgsql-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">702e0026e9d0ae28adb32b6ab927578a101a9d77b3950f504dc5f2563faebf78</sum></package><package arch="x86_64" name="php-gd" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-gd-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">fb479b448ecd272339b656b123612d0da7c949fd531a07c1b400b0073833e945</sum></package><package arch="x86_64" name="php-mysql" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-mysql-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">f99db8828f4103f81d9b003ff59d7243c16854b89555066f48cd17d2d91351f0</sum></package><package arch="x86_64" name="php-soap" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-soap-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">2ce662c55974a7baba692b984da81c173075eeedf057a957b28000e6e568b6f1</sum></package><package arch="x86_64" name="php" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">15e82b4c083ee1a2e4640080ef75fb2cdf3830c806725a302401aabb5851d154</sum></package><package arch="x86_64" name="php-enchant" release="48.el7" src="php-5.4.16-48.el7.src.rpm" version="5.4.16"><filename>php-enchant-5.4.16-48.el7.x86_64.rpm</filename><sum type="sha256">e70239757c0406008c52d81ddcc13b675f24def6420bd9e58ea5e1c6f0431b14</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10547" id="CVE-2018-10547" title="Cve-2018-10547" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7584" id="CVE-2018-7584" title="Cve-2018-7584" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9024" id="CVE-2019-9024" title="Cve-2019-9024" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1112" id="RHSA-2020:1112-1" title="Rhsa-2020:1112-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1535251" id="1535251" title="Php: Reflected Xss In .Phar 404 Page" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1551039" id="1551039" title="Cve-2018-7584 Php: Stack-Based Buffer Under-Read In Php_Stream_Url_Wrap_Http_Ex() In Http_Fopen_Wrapper.C When Parsing Http Response" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1573814" id="1573814" title="Cve-2018-10547 Php: Reflected Xss Vulnerability On Phar 403 And 404 Error Pages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1685404" id="1685404" title="Cve-2019-9024 Php: Out-Of-Bounds Read In Base64_Decode_Xmlrpc In Ext/Xmlrpc/Libxmlrpc/Base64.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1113-1</id><title>Bash</title><description>* bash: BASH_CMD is writable in restricted bash shells</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="bash-doc" release="34.el7" src="bash-4.2.46-34.el7.src.rpm" version="4.2.46"><filename>bash-doc-4.2.46-34.el7.x86_64.rpm</filename><sum type="sha256">95ef57c39850b39ee7fdf031eacde80727ef4ab0b1eec82f0eb74793b121699d</sum></package><package arch="x86_64" name="bash" release="34.el7" src="bash-4.2.46-34.el7.src.rpm" version="4.2.46"><filename>bash-4.2.46-34.el7.x86_64.rpm</filename><sum type="sha256">9f0be30f6cddf3a329d88fb0e2beafa3771a4d280afba721fea516deac7ba80e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9924" id="CVE-2019-9924" title="Cve-2019-9924" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1113" id="RHSA-2020:1113-1" title="Rhsa-2020:1113-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1691774" id="1691774" title="Cve-2019-9924 Bash: Bash_Cmd Is Writable In Restricted Bash Shells" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1116-1</id><title>Qemu-Kvm</title><description>* QEMU: slirp: OOB buffer access while emulating tcp protocols in tcp_emu()</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm" release="173.el7" src="qemu-kvm-1.5.3-173.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-173.el7.x86_64.rpm</filename><sum type="sha256">cb3d572587f522854dd88ea631e96b540892cb8ff88a2255e730ee8150fc0586</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="173.el7" src="qemu-kvm-1.5.3-173.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-173.el7.x86_64.rpm</filename><sum type="sha256">90fbcec323bf2e378ed246dae56ac0cf4e2b8e5e1df5d2bcf504f8a1c6df932c</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="173.el7" src="qemu-kvm-1.5.3-173.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-173.el7.x86_64.rpm</filename><sum type="sha256">03ca92caea05c4f5986d2f2f5e03280de4ebd4b439212a308afc0cac41a63b77</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="173.el7" src="qemu-kvm-1.5.3-173.el7.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-173.el7.x86_64.rpm</filename><sum type="sha256">6f4789f733a75a09c11a100113a544ad1900ffc22949e4e7b3e8f75e515caf0a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1116" id="RHSA-2020:1116-1" title="Rhsa-2020:1116-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1270166" id="1270166" title="Udp Packet Checksum Is Not Converted From 0X0000 To 0Xffff With Qemu E1000 Emulation." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1626871" id="1626871" title="[Rfe] Request For Using Tscinvariant Feature With Qemu-Kvm." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760607" id="1760607" title="Corrupted Eax Values Due To Missing Brackets At Cpuid[0X800000008] Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791551" id="1791551" title="Qemu: Slirp: Oob Buffer Access While Emulating Tcp Protocols In Tcp_Emu()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1121-1</id><title>Httpd</title><description>* httpd: mod_session_cookie does not respect expiry time      * httpd: Out of bounds write in mod_authnz_ldap when using too small     Accept-Language values      * httpd: Out of bounds access after failure in reading the HTTP request</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="httpd-manual" release="93.sl7" src="httpd-2.4.6-93.sl7.src.rpm" version="2.4.6"><filename>httpd-manual-2.4.6-93.sl7.noarch.rpm</filename><sum type="sha256">12cdeca3138ed890b721afa0886255c773330a579f2cc3ed7e80e44888270fdc</sum></package><package arch="x86_64" name="httpd-devel" release="93.sl7" src="httpd-2.4.6-93.sl7.src.rpm" version="2.4.6"><filename>httpd-devel-2.4.6-93.sl7.x86_64.rpm</filename><sum type="sha256">a5bee07784e18148e5ef949da8e9cd061195e9f7306530498bff1ac464501b0b</sum></package><package arch="x86_64" name="httpd" release="93.sl7" src="httpd-2.4.6-93.sl7.src.rpm" version="2.4.6"><filename>httpd-2.4.6-93.sl7.x86_64.rpm</filename><sum type="sha256">2e4570bf4f4765a001119331184bfc605d5479c8e97290cd7b0cbff6a847eaec</sum></package><package arch="x86_64" name="mod_session" release="93.sl7" src="httpd-2.4.6-93.sl7.src.rpm" version="2.4.6"><filename>mod_session-2.4.6-93.sl7.x86_64.rpm</filename><sum type="sha256">18a44ac202b4df28605a327908ec6db4eb5d8922b3547fd141fa8df384cbe993</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="93.sl7" src="httpd-2.4.6-93.sl7.src.rpm" version="2.4.6"><filename>mod_ssl-2.4.6-93.sl7.x86_64.rpm</filename><sum type="sha256">124c129fa5e5d5f5775bd92737b25220a15ccf3bd36528687bc9d7508c91d61d</sum></package><package arch="x86_64" name="mod_ldap" release="93.sl7" src="httpd-2.4.6-93.sl7.src.rpm" version="2.4.6"><filename>mod_ldap-2.4.6-93.sl7.x86_64.rpm</filename><sum type="sha256">ebd54a294522a0d7523e75a91875c2edd3759f68cc134c2d6c2effd4537c0c62</sum></package><package arch="x86_64" name="httpd-tools" release="93.sl7" src="httpd-2.4.6-93.sl7.src.rpm" version="2.4.6"><filename>httpd-tools-2.4.6-93.sl7.x86_64.rpm</filename><sum type="sha256">eaeb1bd2f9f8b424234de782d6e7463bae07eb99e1bd77fe4bf371c4b9647d62</sum></package><package arch="x86_64" epoch="1" name="mod_proxy_html" release="93.sl7" src="httpd-2.4.6-93.sl7.src.rpm" version="2.4.6"><filename>mod_proxy_html-2.4.6-93.sl7.x86_64.rpm</filename><sum type="sha256">707a65fd80966ebb01f95a0053dc686c288be41a631d188848a965d8ea759df8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15710" id="CVE-2017-15710" title="Cve-2017-15710" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1301" id="CVE-2018-1301" title="Cve-2018-1301" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17199" id="CVE-2018-17199" title="Cve-2018-17199" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1121" id="RHSA-2020:1121-1" title="Rhsa-2020:1121-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1486889" id="1486889" title="Htpasswd: Support Sha-X Passwords For Fips Compatibility" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560599" id="1560599" title="Cve-2017-15710 Httpd: Out Of Bounds Write In Mod_Authnz_Ldap When Using Too Small Accept-Language Values" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560643" id="1560643" title="Cve-2018-1301 Httpd: Out Of Bounds Access After Failure In Reading The Http Request" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1630886" id="1630886" title="Scriptlet Can Fail If Hostname Is Not Installed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1633152" id="1633152" title="Mod_Session Missing Apr-Util-Openssl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1649470" id="1649470" title="Httpd Response Contains Garbage In Content-Type Header" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1668493" id="1668493" title="Cve-2018-17199 Httpd: Mod_Session_Cookie Does Not Respect Expiry Time" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1673457" id="1673457" title="Apache Child Process Crashes Because Scriptaliasmatch Directive." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1724034" id="1724034" title="Unexpected Ocsp In Proxy Ssl Connection" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1126-1</id><title>Mutt</title><description>* mutt: IMAP header caching path traversal vulnerability</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="5" name="mutt" release="29.el7" src="mutt-1.5.21-29.el7.src.rpm" version="1.5.21"><filename>mutt-1.5.21-29.el7.x86_64.rpm</filename><sum type="sha256">39516f21d38c9d5d4d3986de02f63b5b23b1d36457eab4b1d2e3393e312991a3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14355" id="CVE-2018-14355" title="Cve-2018-14355" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1126" id="RHSA-2020:1126-1" title="Rhsa-2020:1126-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1602081" id="1602081" title="Cve-2018-14355 Mutt: Imap Header Caching Path Traversal Vulnerability" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1131-1</id><title>Python</title><description>* python: Cookie domain check returns incorrect results      * python: email.utils.parseaddr wrongly parses email addresses</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-tools" release="88.el7" src="python-2.7.5-88.el7.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-88.el7.x86_64.rpm</filename><sum type="sha256">3e81921ce8bb619e287fa6cab340354e40a0b83bd130618435c00c838ea69f90</sum></package><package arch="x86_64" name="python-debug" release="88.el7" src="python-2.7.5-88.el7.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-88.el7.x86_64.rpm</filename><sum type="sha256">fbeedbf6a9541721d22f516e78baf8701e80fa2fa0d2f0c327422a8e577dddc4</sum></package><package arch="x86_64" name="python-devel" release="88.el7" src="python-2.7.5-88.el7.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-88.el7.x86_64.rpm</filename><sum type="sha256">5dda4bbb68d526f248c5c6280ac9b5b84a2108873b838ba3326eb975074ad9b7</sum></package><package arch="x86_64" name="tkinter" release="88.el7" src="python-2.7.5-88.el7.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-88.el7.x86_64.rpm</filename><sum type="sha256">3526b706aa711de3b1b8f0139b1251adde90850ef35765b7215ff595cc6b325f</sum></package><package arch="x86_64" name="python" release="88.el7" src="python-2.7.5-88.el7.src.rpm" version="2.7.5"><filename>python-2.7.5-88.el7.x86_64.rpm</filename><sum type="sha256">461c0ab8b1ac9a37273d2b01b8d10e41db8cabd44c9f574d9dac138ff4e430f3</sum></package><package arch="x86_64" name="python-libs" release="88.el7" src="python-2.7.5-88.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-88.el7.x86_64.rpm</filename><sum type="sha256">2c35ec41f6c19b3f7a18d11c3e8e72b66b363d33627705b4bf00eb753d623aae</sum></package><package arch="x86_64" name="python-test" release="88.el7" src="python-2.7.5-88.el7.src.rpm" version="2.7.5"><filename>python-test-2.7.5-88.el7.x86_64.rpm</filename><sum type="sha256">059a0e6b642bdb785a9bfdb0485ed0e0b34736e939ed0468cbee916ba02e0cb6</sum></package><package arch="i686" name="python-libs" release="88.el7" src="python-2.7.5-88.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-88.el7.i686.rpm</filename><sum type="sha256">4ac80cb42b1ef46e03b66b7a894c3eb7baaa7803c799e1871058172463731892</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1131" id="RHSA-2020:1131-1" title="Rhsa-2020:1131-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1740347" id="1740347" title="Cve-2018-20852 Python: Cookie Domain Check Returns Incorrect Results" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1749839" id="1749839" title="Cve-2019-16056 Python: Email.Utils.Parseaddr Wrongly Parses Email Addresses" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1132-1</id><title>Python3</title><description>* python: Cookie domain check returns incorrect results      * python: email.utils.parseaddr wrongly parses email addresses</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="python3" release="13.el7" src="python3-3.6.8-13.el7.src.rpm" version="3.6.8"><filename>python3-3.6.8-13.el7.i686.rpm</filename><sum type="sha256">90873480e4cf053c5830ebcbaf1cbf7be5d247966581013642b609466b59231d</sum></package><package arch="x86_64" name="python3-debug" release="13.el7" src="python3-3.6.8-13.el7.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-13.el7.x86_64.rpm</filename><sum type="sha256">9ea6a8d1a0323a1aea782c0e8c801ea4c30972d4962792fd1ce8e249bbb0877b</sum></package><package arch="x86_64" name="python3-idle" release="13.el7" src="python3-3.6.8-13.el7.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-13.el7.x86_64.rpm</filename><sum type="sha256">7c3faf6828cd8cbfdc3b247357a6c3b944c9fccd2003342374d18a3aadce480f</sum></package><package arch="i686" name="python3-libs" release="13.el7" src="python3-3.6.8-13.el7.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-13.el7.i686.rpm</filename><sum type="sha256">0cc3e332c302a97500459ce0434eb4dd518fd94c28fdfc151484a8df48f1e9c0</sum></package><package arch="i686" name="python3-debug" release="13.el7" src="python3-3.6.8-13.el7.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-13.el7.i686.rpm</filename><sum type="sha256">1bf8eef4d37a645d721364f252a91266d61a6e2cafab7a64e5af69dbf6ccde7d</sum></package><package arch="i686" name="python3-devel" release="13.el7" src="python3-3.6.8-13.el7.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-13.el7.i686.rpm</filename><sum type="sha256">bedb00d3248cfb29da129e8b71ab8e38f8f3482d7d828ecd9c039296a87fbcee</sum></package><package arch="x86_64" name="python3" release="13.el7" src="python3-3.6.8-13.el7.src.rpm" version="3.6.8"><filename>python3-3.6.8-13.el7.x86_64.rpm</filename><sum type="sha256">bc1b155507c5363cb52205db0ffe7de7448d73fd28480405b10fffd317237e0d</sum></package><package arch="x86_64" name="python3-libs" release="13.el7" src="python3-3.6.8-13.el7.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-13.el7.x86_64.rpm</filename><sum type="sha256">531a291e1a1b122b0b974b57d0a19af7e4b01018a3195089f982106ddd26a424</sum></package><package arch="i686" name="python3-tkinter" release="13.el7" src="python3-3.6.8-13.el7.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-13.el7.i686.rpm</filename><sum type="sha256">47382ac2235bb762bb997128c859e0a165ccbe383b6d02819761c44bb30d599d</sum></package><package arch="i686" name="python3-test" release="13.el7" src="python3-3.6.8-13.el7.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-13.el7.i686.rpm</filename><sum type="sha256">9d796504f40c63ab8f4e255515e3e4ca0b8f0dce9290411a2ee928a2cfda6ba0</sum></package><package arch="x86_64" name="python3-devel" release="13.el7" src="python3-3.6.8-13.el7.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-13.el7.x86_64.rpm</filename><sum type="sha256">95a96ddaffcb273f5615b90fe6cf9b68ee4de184fceedffd72f05482140c4b7b</sum></package><package arch="x86_64" name="python3-tkinter" release="13.el7" src="python3-3.6.8-13.el7.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-13.el7.x86_64.rpm</filename><sum type="sha256">6c47b7b108ddef1c5a895b5aad03707e271e3baee4ea828bb9379693393a4ac0</sum></package><package arch="x86_64" name="python3-test" release="13.el7" src="python3-3.6.8-13.el7.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-13.el7.x86_64.rpm</filename><sum type="sha256">6c630d6bfed0d7de2b2eb8c0bc275aff333522b076c16947818ff1e5453cc39d</sum></package><package arch="i686" name="python3-idle" release="13.el7" src="python3-3.6.8-13.el7.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-13.el7.i686.rpm</filename><sum type="sha256">fa561b0065e8697484ca06c7ce5b7b61176eaefc795e89e69e2877439c5207b0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20852" id="CVE-2018-20852" title="Cve-2018-20852" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16056" id="CVE-2019-16056" title="Cve-2019-16056" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1132" id="RHSA-2020:1132-1" title="Rhsa-2020:1132-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1732908" id="1732908" title="Python 3.6 Lacks Fips Support" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1740347" id="1740347" title="Cve-2018-20852 Python: Cookie Domain Check Returns Incorrect Results" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1749839" id="1749839" title="Cve-2019-16056 Python: Email.Utils.Parseaddr Wrongly Parses Email Addresses" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1135-1</id><title>Polkit</title><description>* polkit: Improper authorization in     polkit_backend_interactive_authority_check_authorization function in     polkitd</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="polkit" release="26.el7" src="polkit-0.112-26.el7.src.rpm" version="0.112"><filename>polkit-0.112-26.el7.i686.rpm</filename><sum type="sha256">d317cbf5c7fb21669a4c130e49585e7d2c2647f4f0a2d585d549d192fafc6c9e</sum></package><package arch="noarch" name="polkit-docs" release="26.el7" src="polkit-0.112-26.el7.src.rpm" version="0.112"><filename>polkit-docs-0.112-26.el7.noarch.rpm</filename><sum type="sha256">d4840d1198559dd0c0b3cc7d63b0b31269023f6b662d229f711de0e2def4ff03</sum></package><package arch="x86_64" name="polkit-devel" release="26.el7" src="polkit-0.112-26.el7.src.rpm" version="0.112"><filename>polkit-devel-0.112-26.el7.x86_64.rpm</filename><sum type="sha256">b6876acdda54d5d4dc39c37ec4f2e36597ae7e2160355159777a7eec0da515b2</sum></package><package arch="i686" name="polkit-devel" release="26.el7" src="polkit-0.112-26.el7.src.rpm" version="0.112"><filename>polkit-devel-0.112-26.el7.i686.rpm</filename><sum type="sha256">bc2641a55094fe615b508dff9193f2ef6c405320b94c297b06aca35e7bd3130b</sum></package><package arch="x86_64" name="polkit" release="26.el7" src="polkit-0.112-26.el7.src.rpm" version="0.112"><filename>polkit-0.112-26.el7.x86_64.rpm</filename><sum type="sha256">cff0f34881c95204ad467248b5fe3a30e1184d18057743d328bbecce667c578b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1116" id="CVE-2018-1116" title="Cve-2018-1116" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1135" id="RHSA-2020:1135-1" title="Rhsa-2020:1135-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595404" id="1595404" title="Cve-2018-1116 Polkit: Improper Authorization In Polkit_Backend_Interactive_Authority_Check_Authorization Function In Polkitd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1753037" id="1753037" title="Unable To Paste Anything With Systemctl Or Service Start, Stop, Restart Commands In Terminal Session" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1138-1</id><title>Gettext</title><description>* gettext: double free in default_add_message in read-catalog.c</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="gettext-libs" release="3.el7" src="gettext-0.19.8.1-3.el7.src.rpm" version="0.19.8.1"><filename>gettext-libs-0.19.8.1-3.el7.i686.rpm</filename><sum type="sha256">cdeb6b97e2542ee0f9272f7c9e0894d336150300ad4a90acc422e49762096f2c</sum></package><package arch="x86_64" name="gettext-libs" release="3.el7" src="gettext-0.19.8.1-3.el7.src.rpm" version="0.19.8.1"><filename>gettext-libs-0.19.8.1-3.el7.x86_64.rpm</filename><sum type="sha256">01007120a818da1e3727c668a0b4b2066f789d3ae80aa69dec2985d5e8a7580e</sum></package><package arch="noarch" name="emacs-gettext" release="3.el7" src="gettext-0.19.8.1-3.el7.src.rpm" version="0.19.8.1"><filename>emacs-gettext-0.19.8.1-3.el7.noarch.rpm</filename><sum type="sha256">9eefcac5fac587e36cf3d4c82871eb6e702f0ebbe0a15f6de5321f7cacc91cb5</sum></package><package arch="noarch" name="gettext-common-devel" release="3.el7" src="gettext-0.19.8.1-3.el7.src.rpm" version="0.19.8.1"><filename>gettext-common-devel-0.19.8.1-3.el7.noarch.rpm</filename><sum type="sha256">b659742d587b888316d8d5f34ede272bb8dc613d6caa6118c0cabf5b542cdf4b</sum></package><package arch="x86_64" name="gettext-devel" release="3.el7" src="gettext-0.19.8.1-3.el7.src.rpm" version="0.19.8.1"><filename>gettext-devel-0.19.8.1-3.el7.x86_64.rpm</filename><sum type="sha256">480e38d5bbc39a8096381a9770b83aef59506dfe55e359ea9bdc70c5ed7b2833</sum></package><package arch="x86_64" name="gettext" release="3.el7" src="gettext-0.19.8.1-3.el7.src.rpm" version="0.19.8.1"><filename>gettext-0.19.8.1-3.el7.x86_64.rpm</filename><sum type="sha256">b6018a436c93c9b1b7f77a8bea3bfc4616679136b43af9a8585ab148945a546c</sum></package><package arch="i686" name="gettext-devel" release="3.el7" src="gettext-0.19.8.1-3.el7.src.rpm" version="0.19.8.1"><filename>gettext-devel-0.19.8.1-3.el7.i686.rpm</filename><sum type="sha256">fe533c1cf84dd8c5788fdbd0d2735ebd15b827ab9226c5ead9732f4f31567257</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18751" id="CVE-2018-18751" title="Cve-2018-18751" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1138" id="RHSA-2020:1138-1" title="Rhsa-2020:1138-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1647043" id="1647043" title="Cve-2018-18751 Gettext: Double Free In Default_Add_Message In Read-Catalog.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788414" id="1788414" title="[Gettext] Preuninstall Scripts In Tps Tests Are Failing For 2019:45774" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1151-1</id><title>Libreoffice</title><description>* libreoffice: LibreLogo script can be manipulated into executing arbitrary     python commands      * libreoffice: Insufficient URL validation allowing LibreLogo script     execution      * libreoffice: LibreLogo global-event script execution      * libreoffice: Insufficient URL encoding flaw in allowed script location     check      * libreoffice: Insufficient URL decoding flaw in categorizing macro     location      * libreoffice: Unsafe URL assembly flaw in allowed script location check      * libreoffice: Remote resources protection module not applied to bullet     graphics</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="libreoffice-langpack-it" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-it-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">9a788e93254d57d2e59070c06e71d1d81285e01de9c722b34a4bb6b3ff6608aa</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cs" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-cs-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">24b9f0c2871f18ef868da347e06424b5f35f436061b884cc7f972f3d4cef2752</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-sl" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-sl-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">73098a84f00b1b159e7be909f97c87d8082185f032ca0b22e698f6a59e982a0c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-uk" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-uk-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">cf8b29c29c135bd26f7a9fad45529381ccf09a1bf150b6f8f612768169d8c5c8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-af" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-af-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">e4aae532a496177c153a1ee74aa8aca99969e01b56195d5c3950dcf9bd51a425</sum></package><package arch="noarch" epoch="1" name="autocorr-cs" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-cs-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">299ce9793d214886f4b482a8c775b0188d50ca7cef1008f747dd25a66a7814b9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-el" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-el-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">3b19bd4ab6d6e5ee91d3b5d59790b708d2bad92257b18f00fb948d510e1ab9ae</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sv" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sv-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">24097662d5d5bd46145cebb52dce09cefbd729b98e807f988f28a860bdfc84a3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk-doc" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-sdk-doc-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">417098918e24e87500c32775e92196cb657723823ce29d28d15035798122ef3f</sum></package><package arch="noarch" epoch="1" name="autocorr-sl" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-sl-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">d913e451467673cc99ae79ec95155decac5ed42d90ce4a14796c17b090794b35</sum></package><package arch="noarch" epoch="1" name="autocorr-de" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-de-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">d1cc7f1413deae05b139df01958483a54eb2dde20e1585172220334f1e52297b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-emailmerge" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-emailmerge-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">42f88b2a39335b48ee53afe68f9ce35cea068790e5cf7b5a69f584b41db7c17a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-officebean" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-officebean-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">5f0dffa10f62be36642fa1369aef3748bc18cba98d1b329196107d8f25df72a7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-rhino" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-rhino-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">f75f3a80f82778519bd9c76e528386ef2d359c883ac2d5ce1b21a24f982a2e7b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-gl" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-gl-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">7c322bf19f21073df1fd9cecc99f93a436f33b6fc10188f2c89f0e97cc2a0f62</sum></package><package arch="noarch" epoch="1" name="autocorr-is" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-is-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">49abc6bb9b9c0b582ae0fff15410efe8dccbb8292bdf1564f08a605ef403ba21</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-lv" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-lv-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">37b89c7809f2be648e4a1f9a1aa9abdf6055d25395b70630e7c55819107a41f9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-calc" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-calc-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">bbdadbfab99a4a31972d9e78333366fbef7d719597aa8555cb98a74ff75474ee</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ar" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ar-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">4b1d018dd52851e3065b120f6e11981f849aec8fdc7a598b1bb00ec6cf6a159b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-br" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-br-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">9a98cc9e40744ec15b1f81495600f67148e81056679265e55bfcadb8281e0aef</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-nb" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-nb-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">1015a64a04740692490ebe68dadc5d75e5e9c0ddbcc468554c5704fb4f8c7d96</sum></package><package arch="noarch" epoch="1" name="autocorr-sr" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-sr-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">d49d918c056ee1212e99835c9727c616f600bf229a783ac418ab6dfd1984cf1a</sum></package><package arch="noarch" epoch="1" name="autocorr-mn" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-mn-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">f39bdf08382e42a71c2ecf44b34447d3a0efefcdef7b9c2890c3384e8db6d29f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-es" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-es-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">b5431ba2f090c9c7d2695bd0f29ef591863d96cf9e8a6042dbba504478deb659</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-it" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-it-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">d2238f851b1f3e96ce52e0f1e0eb106648a41b6d2355ccd71735cf9e7cbeb0f5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-nn" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-nn-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">f99de9154d1cd340f93311cc619fde7e71b6f6a8dbd307ba4dd9632699b4255e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hu" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-hu-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">c01f089787f59834b3e38e003ce0f663badc0c2015b993ea31807c7aa76e22da</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ml" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ml-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">f4b4c58e2b8df5ea0ce8ccb3463dad6ebe33b42fc94e188c11d858052624cb0d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-xsltfilter" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-xsltfilter-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">007199197d598f738bee3d0e9a9c6a27b278c08659b0ae756474f31fc4116608</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ru" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ru-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">04706a6f31229bd7fcc3ebd6e513af45810cf46eb6d19fa8abd1e5a29845bbb6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-PT" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pt-PT-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">5e2bb684454407f326688ce0b6c4efd12e93a0408d3fcbe56e90f145e55fed67</sum></package><package arch="x86_64" epoch="1" name="libreoffice-filters" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-filters-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">3086628809a5e1a70b3a5999bc8cc071c21eee1c62b86be292d6d64a254a92e0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nn" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nn-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">dabdb32b391135b5ff6f5948b753169d9b2868c8782599a2cf2afa5ff39640e6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-draw" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-draw-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">7604c7400fc7c170c9aa97a80579e1ce184d723ced362de693171f2778e1dcd3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-pt-BR" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-pt-BR-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">2b0dc76357201e015e461d065f8346f18f2469cb359b79be068f0f60e54c1c20</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fi" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-fi-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">afb6510d8824f3e6ca16dc2bf9b107141829e552da8e7324446ae82289db2b83</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fr" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-fr-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">826d47b00ac2a98c371a531a8f6e13702bd4b1ce650e97f415cb6e4aba46c1c9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-pl" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-pl-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">845b8312eacb97b0c8db1e6598ce97f264fa7ab6c59115528ee717e994b9c33e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-hi" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-hi-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">3fb0e27cef406b5f0d30512675337210bb077a66497cb315186a850b24849bdb</sum></package><package arch="noarch" epoch="1" name="autocorr-lt" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-lt-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">f2d0bf2296ffff769a9edcce38fb60f1c53b430019190ad6578c1c3265686bde</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ca" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ca-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">fc7dd9fd8fd892a4fb02ecbf1514bdf6143d0b186ba090798e6cbf103e69fd6d</sum></package><package arch="noarch" epoch="1" name="autocorr-nl" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-nl-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">8c2b55fc5350341e259dc91d9a9aaaf848d42efc70a379c4bf2780049774d533</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-bg" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-bg-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">682b99ec150099ab0387542ccabcdbab825712eec853868efa25be459efeece5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-he" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-he-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">a8d356c541c4c9e68d0e9ff37d07742d6a720ce743097a09884206385d9414d8</sum></package><package arch="x86_64" epoch="1" name="libreoffice" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">5cb749784f39da86d14d9d0add8d462c6cf4e3a3fa8c4e203bba7ad4ebd588d9</sum></package><package arch="noarch" epoch="1" name="autocorr-ko" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ko-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">80c65bec811df6826acdfbb3b19dca040f67df9ebf0caf8c413893ed482926dc</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-tr" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-tr-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">09210a0f3d1a8f0126f5b07bc30e40bb4372262e34e192dac40014860ef0595b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ko" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ko-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">f55e76d5c26c9f697a50df0fac804944ca190969627f6fe45ceaf7a666720e86</sum></package><package arch="noarch" epoch="1" name="autocorr-da" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-da-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">c6defd1f99af70599df18f9a986874264fbdcf351723fb308a315e78ec76026a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-x11" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-x11-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">0806a13ea01c851e1b177e4d8caa19bfd489f4dcb71585e8d3b4ea5aba334e4b</sum></package><package arch="noarch" epoch="1" name="autocorr-fr" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-fr-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">bfe91d7e7d2b39570d21e3cb8172f2a7a9e05e18126bc55e7aec816a9a806619</sum></package><package arch="noarch" epoch="1" name="libreoffice-ure-common" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-ure-common-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">c5780927929f8926f064d166ebd3f0a9f835120c74e76abed0d6088dcdf1b282</sum></package><package arch="x86_64" epoch="1" name="libreoffice-wiki-publisher" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-wiki-publisher-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">25d5db8bc90ae771cd9518a42c3f6a27732ea86049f22984ab38e625513e912d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-fi" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-fi-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">35e6c6d0f966eb017350093253e4deb5b3598543d13e22f0fa315aa328c423c6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-sdk-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">4eb09b555dd6920d11bc7581e8b4a0da9478e01a4b2eb549d63f6c31dab43191</sum></package><package arch="noarch" epoch="1" name="autocorr-pl" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-pl-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">80429cac2618c9771950447719591c70eede4774433227de506d473a2bc91a5c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hant" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-zh-Hant-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">786f519ce16829c638a88a73ec14daee3adddfd7dffe7105b027bddf425b556f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-BR" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pt-BR-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">07e096b66fff94a7c05227cea698db7b4062f3688ef66e42a59960a84b4db0ae</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-de" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-de-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">024500059b6f129882470e48aa200f5041bd4ee7643f96f8f506ecf9d5fd5b4d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-fr" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-fr-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">d57fa3eae653a05c3876a3291f8b063bcc13e5726d5cb65f44440bc8005bbe15</sum></package><package arch="noarch" epoch="1" name="autocorr-zh" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-zh-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">bcbe611c9d71d576111b821a9b290e0072e3e0aa2772cd41fc7588461663d958</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pdfimport" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-pdfimport-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">4dec42b02f162f5a90c5b6af23e6a62233d401b0a4fb6eb8b3e67737dc14c383</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nso" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nso-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">9b0f1e4b8f51c3b4b438d14774dd1becd6e618dac079796da5d83e1d7ac49a14</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ca" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ca-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">7af2e675a289e9c1990704d63cca049427ffdf15919ff935804c124d0bb2dc44</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-th" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-th-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">0c3c3bc906a971964d3f3f1bf0c749f888f2822b6eb1e1e1df941d7ebfeb19fd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ta" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ta-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">e0a859ee989313fda923518a2eac0c44762e7ed2ea99f65b47829ca12c399928</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ure" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-ure-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">987ba4c0583495b4d37d6bf6ff905578d4ced11ab0c28b2678170e4060aa5cf6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-en" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-en-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">8d71a1350413c33ccbe2065c9056e514428ea22a0abe770ef9281729731545bf</sum></package><package arch="noarch" epoch="1" name="autocorr-sv" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-sv-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">8a2a47ec463dc01c029b4546032e7f90ef868029b70b622e4251566087073c23</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fa" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-fa-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">bfa9e775280919906ccd1114396e1f22c850566e52bb7d8bbf69424351e5ed10</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tn" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-tn-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">9e073c169e1168e1e72304f9db9ef2592839d40b73e32b3e37d9ebc53b646659</sum></package><package arch="noarch" epoch="1" name="autocorr-fa" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-fa-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">9e38568ace5bb858f36c18c436639488ae3a9e31dbe3d73f01a8eae46fe01202</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-lt" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-lt-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">8b429122309425861e8a938e55c1fe98e25aea714e92f4b5827f6bc181be76ea</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kk" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-kk-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">901cccbccbc3f0555de929a9ce518cceab0a373dafcd9c407b5f59871ec91a7f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lt" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-lt-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">8144bce9fd75403f23737f8d4e5780e974c1f1fd5a4cba28252a3e7aa68ce2e0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nr" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nr-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">721a0d21e9b6aa1a952a8305024fc131b3208f06ef1fd31df3e87fccbb0ba702</sum></package><package arch="noarch" epoch="1" name="autocorr-ja" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ja-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">fb0b7e58a379d673482eaadccf30572b3ea0cfd95a6eba85f27600a0d327222c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nb" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nb-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">0bed762126ac3c8832eda580633ad54d58ffc39dc409a523ed8143cce242cb87</sum></package><package arch="x86_64" epoch="1" name="libreoffice-math" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-math-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">e4d7f7209557e98d5b351478708b470c7c1edbdb9b2698f772b3ce4e2bf62a98</sum></package><package arch="noarch" epoch="1" name="autocorr-af" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-af-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">b21ff8c4c1d91c4d964eb64f65bd52209abe5618c2c781bfac35bad6eae666b0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-dz" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-dz-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">2ba081ea8b28d0fb572a37739682d75fff787411a14694b98cca3b1248a8139d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pyuno" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-pyuno-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">5cf4187e6407324d42c2011005444c0a99baafed3509c4821aa64bc03a0d4d44</sum></package><package arch="noarch" epoch="1" name="libreoffice-officebean-common" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-officebean-common-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">8bd2c92fbf105127ffdbd3f9a468e96980866698b5a261d3847fa12a7b9ff3f4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-da" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-da-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">71f25eed108315a20f624f0addd207d37430e68f18ea6ffd6ce6eb1192432e01</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-el" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-el-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">6639e05d3b33d8b4ab2ccd69ccbaca672cc7fc989e187507d969ecfa10b33e49</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-sk" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-sk-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">6b44f84cc0f245793e18f03425909edcb0ad6a4ab741486346c79a2c0fbbf3ba</sum></package><package arch="x86_64" epoch="1" name="libreoffice-impress" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-impress-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">df04f34a22e9a47529c61db39b0eb61dd47e7c52b6218e94cde6622f07c5effa</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mr" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-mr-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">338bac6607a735d711a9fb562209e33791a65d654c76567e22258eaaddb52137</sum></package><package arch="noarch" epoch="1" name="autocorr-ru" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ru-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">0ae103992e552fee250648a2615f8b003c52a11c5137bee7b25fc69a0d37c2c9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ve" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ve-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">b3c11bdabd5507da475a5c0dcd2b588e186316b0f5ad9e550572916331a9ea68</sum></package><package arch="noarch" epoch="1" name="autocorr-tr" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-tr-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">436f60f314abe288acc3b180c11ab9a02dbb84be9ee696f78d11638771ef93b4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bn" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-bn-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">9654817ddfaf9a0dcab71ef910ccabb1ae12bdf332a2fc655b926513411ff052</sum></package><package arch="noarch" epoch="1" name="libreoffice-opensymbol-fonts" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-opensymbol-fonts-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">8a60652b772a694e5903faeafa77fdc7d60c96b729b2238e8db496e26fcff013</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-as" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-as-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">fed2d9e6e4e6a97ce6509f3efef1182fd9ef085dcc60ff1e97743e9173d2e90e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-nlpsolver" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-nlpsolver-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">ff21d3eddb6884c8429e2236cc744c6e56d2c9a715d1ec2a8efb1c02f1593c0a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-zh-Hans" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-zh-Hans-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">6c1f6b6415f2da66fbf74ea664f7ffe647662e91c107ac25be96db16bd4acabb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sr" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sr-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">8aab575f96338044ccc6f235fcf0b9edeaf975f9cc37597d08a7b6779eef0334</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ja" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ja-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">2de21480a0794a497e68e96a7fbf144496e293feb1d94c6de902923b1f23b3b1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cy" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-cy-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">e6f19af8a6193de4104552d38c75115173dd46c5172c749d0f267b923677b52b</sum></package><package arch="noarch" epoch="1" name="libreoffice-data" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-data-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">ea5f9cce207e9424864ee50310bd7f882dec83ede9bbb8acb70170e3b91ba970</sum></package><package arch="noarch" epoch="1" name="autocorr-hr" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-hr-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">d142151dc23140ffcf14fd10696125f579a4f2dd9d7c11733c3b311f5aae5508</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-es" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-es-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">f3eb9168fea9a8d6fc59e42aac00389926da96027fd38a5e973d4d0c4e865f65</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ss" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ss-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">ab2977d1dff078f0b9ce6e6e5ae3b34ef5f6388fd7b12abd47fc95d5d5695f77</sum></package><package arch="noarch" epoch="1" name="autocorr-bg" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-bg-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">a5dfd33897637fa782a54a994d02f7ce50099677430451a411da127920786e74</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sl" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sl-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">8276569bd65cbde23b325db50b74073daf8d60cb97add93ae987740883d735d3</sum></package><package arch="noarch" epoch="1" name="autocorr-ga" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ga-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">e5a950597cac8427d62e966ac7766f60ca0a37d332e106d4d0b42d0af8f61f7b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-id" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-id-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">6d44329c56e2a1de2ea7ed7cf3e1b3917d8cd9229d36797abbdf4c6ff91147b2</sum></package><package arch="x86_64" epoch="1" name="libreofficekit-devel" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreofficekit-devel-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">bcbf08a985ee61fbadc20dbaa0ed34f3a0dae828911f414f6843c87976b8f5dd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-eu" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-eu-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">b24a4683793d598c3c681c2e1936dae895491c47cb37667df87a100c6cc0c94f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-cs" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-cs-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">f7d446d591f4f3b5169c15bfce0a42eaaa54f0c697f23fded6edc41a04dedcf7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hi" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-hi-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">5a019acfd02092c65b66020dace2ab640bc14fd0ea126747ea4f74440bec4740</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ar" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ar-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">93040c51622886d8b6e702b7ac065b0efb89e5c9fb9e1032d717f020b698017f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ts" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ts-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">53a7a808b2641dcfdc91f4ebf85d6aab30800279c4b4417a125e0a6f0203188a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-xh" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-xh-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">7e46d1a5e2e7e928cd34ab41425a1001efd3602da0cc425601af3eb300990fe8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gu" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-gu-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">f13b0a914061853f69df82ead1686c4c63a1fc8552ea319ba3719e9032b48d91</sum></package><package arch="x86_64" epoch="1" name="libreoffice-postgresql" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-postgresql-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">a5450fcf613930041d5e27c6baa7dd119d23f0a8f7a211200631acc6fa33018b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mai" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-mai-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">ca4b1f87cd163c452e2f7d94035f251b4553569da5c0878e2aef48e089e2f3d8</sum></package><package arch="noarch" epoch="1" name="autocorr-sk" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-sk-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">d4d421a3d1f7d36bb2309fb945596997cfa424c3f30d6187d39e038b05ecb494</sum></package><package arch="x86_64" epoch="1" name="libreoffice-graphicfilter" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-graphicfilter-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">8695b35b39400411015104d4c26fa16b0c9eeb4bf1b1e6722ac1fcd318ad655c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ru" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ru-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">7e7e10dffe437d114d9183026fa5fd766453aa01d02f034661ead04a26f192ba</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-de" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-de-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">962c872aa525fd8ba6c6074ce74d8c95252f5517b348c33b03ae73dae8829baa</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bg" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-bg-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">e3b57507e67daeed89deed6ac86738297ecafe94964eeb68caa492e582ff1077</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-si" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-si-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">dd92b2ccf3411ce7c93246fa43f065006a8838f398e812104374f7e9731364bd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gdb-debug-support" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-gdb-debug-support-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">97dfecff60f00b5219972597f6b042e96d33575f283c3221d3bb6a7a5ae77f74</sum></package><package arch="noarch" epoch="1" name="autocorr-ro" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ro-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">07cb201d4a21335c398fc8a27b1aaf10db29819f1c64c42cd7319069ff66d063</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ogltrans" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-ogltrans-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">45ae7b684926956076c524b101a618037f68f9a611e7e141dde68d0ba7095101</sum></package><package arch="noarch" epoch="1" name="autocorr-vi" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-vi-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">a288a2bbdc007e6fe57eee2885b3b4925667e45f7af0e950da0fc3a41740f10a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ro" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ro-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">5b6aa371fcffc5dcbf41270dadcfe2578788e5852fe0d808b8098be08c853dc5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-writer" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-writer-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">cde95738a1488820a3fb659b5a27ea0fc83d40687ad0b2266abf117b519195d5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-et" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-et-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">31c2fbc3511010d609cabea5be5e70534e226c779e6291fc68d936ebaf30d755</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-pt-PT" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-pt-PT-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">e6d61128a202485387c3d4bd7edb0c3927c1b9de4780df8dc9ad1bb4e994286c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-gu" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-gu-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">46719f24dc48759fb4af9af59049842afec4a303c7d6c756a5a85e379a7c801d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sk" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sk-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">055942952eaf6fa8b93c31075747bd13a91cac2bf2eaebe7266427df233e09b6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-librelogo" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-librelogo-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">6aa4cc57c1b564dbab5e596599e2e0744db1ac64ecb5e0b38bbf2a2115ed63cc</sum></package><package arch="noarch" epoch="1" name="autocorr-ca" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-ca-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">af9faad1a7291878b9dd564947904ab29f974ef0e622ce7c6eef2fb6ffe48680</sum></package><package arch="noarch" epoch="1" name="autocorr-lb" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-lb-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">edd774037e0f2dc89d77c6dddbc33545039d9da5ff5eca4e09ca3fdc4aa29bfa</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-nl" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-nl-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">7240a2abc6a68386c6d084ab549282b9472dca19524cbe806b67c403263dde7a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-te" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-te-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">76001e59e198a09b25e0998bc371c778ad1883bc24ed626815eea3131342d483</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-hr" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-hr-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">1b1cc20a954237dcb092f10798132f71a9c09600874c794e3b9daf075684145f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ta" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ta-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">517cc8c5b4807a39fd49e552f201c3dc5c67623322e45ca380ba8f24c32f8743</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gtk2" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-gtk2-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">d39d2cfdc2a08e68065d70238b3371d91bb3a916d03b27616cdd3bc26a599932</sum></package><package arch="noarch" epoch="1" name="autocorr-hu" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-hu-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">12bb4fc9a8762df0d1bbc35829d8f53069e70f64562a03e7a991aee341ae9a1e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gl" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-gl-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">3af463f4cfa0c4d235c2212f838d525c2782de2e0f38d4918f01fe78777655a5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ga" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ga-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">56617f04aada8ddb2aa9e015502b72b0d15c38cbe49f28a046ce394a84e90786</sum></package><package arch="noarch" epoch="1" name="autocorr-es" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-es-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">e5db2a814b4867932cda29b283cd41eb20a40840e423774822833190fcdd2f3d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ro" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ro-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">194d0ad9d6752af94bf44b33e4dbcfceab5742b8304efa19989f764a535f8a64</sum></package><package arch="x86_64" epoch="1" name="libreofficekit" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreofficekit-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">dd043bd6d1043ffcc2f0cb57046af93f89eb1da5f4ca9a8f19a67ab1bdd0876e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pl" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pl-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">bd5849a6b2f525a80edeb750dd857a4274ca81354f9cae2640e6764e7a8e58bd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ko" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ko-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">c05c8d1516c20a1326324e054af6430e5bdb9d85c1ac5ae8816cc0f3a1f361be</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kn" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-kn-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">02eeabfd2981a3842802793283bf99bdf11488e08dd8254a32ab4500254ca331</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hr" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-hr-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">1449e4b794adecc3213e93d06ec548540eaba6fd38f64d2e4980c957a3b6f93e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-si" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-si-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">9d96906fb83c921cbcda6ec1f0c9001e217913992a7021b6e423e7cd0778ec66</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-et" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-et-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">cc9e551acd26c4ea2160152b3fba3164be962ad1e521319f210efcaa6be2538c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-bn" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-bn-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">a71b84c8ba805ab88f95db6a0e7a40cddb723e461e1e082ada3c4923eb07ed1e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-core" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-core-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">c204088f44b85f2bde69620c2dd6218adabf4dbd50d1bdb4fc2b562232ab82a2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lv" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-lv-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">8a23c2846d66378a5c317d1c28a5b98b97bd3aad9fb8578bfa860d9a49b2ed6f</sum></package><package arch="noarch" epoch="1" name="autocorr-pt" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-pt-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">1bf9ef155abf6ab801c864c61439bdeea983146c1e584f0e197c584d5e9d7fa2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-base" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-base-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">5c63e996584dd975709ae00a53781b5f7a25d87f6d434db3315955d04ffd98f2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zu" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-zu-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">e6a06bf0fc4ef139b3ddc594ee9ea6eeffc2d556b5d7ea86056787a34531ed84</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pa" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pa-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">9d8761d593055fceb525515380904ac897ab83463b74e82bc23df53e25981816</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nl" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nl-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">2944587901292b1dec1fbebde652b9352db15984713a3b2923257a6650d9e9d4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gtk3" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-gtk3-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">46dc01b2cfe2956b52bbb1ef0b14aad42c12233fc1f556403db0a6389e58d52f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-st" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-st-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">a497ac357a5115d3b44be3b7ce7de09363c84cefc14e68bad080691b1316c80b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-or" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-or-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">befcb6d9c59b64f896d3c0e185fe72f8f9a5e22dc290590012fabc45db203bf5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-sv" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-sv-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">70d318447345833a013d2446aa9f614e3d965eb4266c52ee52879dd3d0ab6f01</sum></package><package arch="noarch" epoch="1" name="autocorr-it" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-it-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">e5a3d3ef8a458478c0c72ded0fd45a169583e0ddb67f32852823403917ac47c0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tr" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-tr-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">f836ec1da7411fc990a9612d8bc4b36df0a522f1eb2e968e1a03fe7756354232</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-zh-Hant" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-zh-Hant-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">c19fbe21b45e65ec96d562ff722b97ad7806a516079d534ea5e9aa16157e0181</sum></package><package arch="noarch" epoch="1" name="autocorr-en" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-en-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">0731199ba48841cfa0d51564f066e5be675503f70422457c68b4dd923642225c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-da" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-da-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">59713b73de96f6b8b83e18e15191463640770c045a857927c591e0e43d6ed621</sum></package><package arch="x86_64" epoch="1" name="libreoffice-bsh" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-bsh-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">2fa91c3b860730adc647e2bab34d5211ef807c856aa231c4e819a250abe30ddf</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-id" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-id-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">3a55b6672c42bdc09e6e891d2f2a25ece93b865578cea7d2081871fbfd4ee8d3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-he" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-he-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">960d5f670778be892cc24c24b29057cb88ba0df2e7481f44d8ba75962877fb0d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hans" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-zh-Hans-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">b0616a26785d5674dad0e00286ed29bc91a67ada4bd4f72d046350d819f7f485</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-uk" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-uk-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">698c5389e87773c3d54d475f4923f2764ea1edcf72e6e491e2e3e0cd58a95ca5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-glade" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-glade-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">58a8bed6cccd72e676801962ad413edea608fa2a2befcfedc01255c007ba6834</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ja" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ja-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">f3737edf3792b9d39868abb60beec55d5a5b068968133ed43bc7cfac3ac97d60</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-eu" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-eu-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">3e25b8440f36a2d8ecc07f157a6663f9526d950550c18be9c3682fbd4bc4620d</sum></package><package arch="noarch" epoch="1" name="autocorr-fi" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>autocorr-fi-5.3.6.1-24.el7.noarch.rpm</filename><sum type="sha256">a75dbccf0df3d1d66f35c931a5359575affd657ac136bfad640284ae259db797</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-hu" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-help-hu-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">3f6bd5114d256ca8c0c2c71c2f226a79fd9f78fca995e452cb28ac67c29f3cf2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-dz" release="24.el7" src="libreoffice-5.3.6.1-24.el7.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-dz-5.3.6.1-24.el7.x86_64.rpm</filename><sum type="sha256">66db4a0122caba8c01c2eedb3983883ebecb6ac8bf756befa2ca89ead3fa7ff3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1151" id="RHSA-2020:1151-1" title="Rhsa-2020:1151-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1167-1</id><title>Nbdkit</title><description>* nbdkit: denial of service due to premature opening of back-end connection</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nbdkit-plugin-vddk" release="3.el7" src="nbdkit-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>nbdkit-plugin-vddk-1.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">e2cd1b3993d20f1bae2b01bb977730d6527c71f943c55e7e408c9b94f2b5b956</sum></package><package arch="x86_64" name="nbdkit-plugin-python-common" release="3.el7" src="nbdkit-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>nbdkit-plugin-python-common-1.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">0d32a05782c76faadf4c42c3580ee4dc8752b7b9bddc12b71f311d5ad8b6bc9c</sum></package><package arch="x86_64" name="nbdkit-devel" release="3.el7" src="nbdkit-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>nbdkit-devel-1.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">6722148017e193300c356e1d9b5bfa36bb06ef3ff6c031529d94f596bb767b79</sum></package><package arch="x86_64" name="nbdkit" release="3.el7" src="nbdkit-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>nbdkit-1.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">0b8b38a60728ba26889cbcdd3e64fcf7430cac2ca0f78585294d20eeb72e4516</sum></package><package arch="x86_64" name="nbdkit-example-plugins" release="3.el7" src="nbdkit-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>nbdkit-example-plugins-1.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">e6a7b09dbc82d349c92ac76c6f4d5306b863d785bad4ef7254aef35e8250e2bb</sum></package><package arch="x86_64" name="nbdkit-plugin-python2" release="3.el7" src="nbdkit-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>nbdkit-plugin-python2-1.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">1e2de9cc4cc3944070b79429d5bfbb25300a7f8dd3062af9ce9ca2146114f6c7</sum></package><package arch="x86_64" name="nbdkit-basic-plugins" release="3.el7" src="nbdkit-1.8.0-3.el7.src.rpm" version="1.8.0"><filename>nbdkit-basic-plugins-1.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">37917595a7f0955f954a67bb55c5e5599792722a2f843fb9114412589882e56a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14850" id="CVE-2019-14850" title="Cve-2019-14850" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1167" id="RHSA-2020:1167-1" title="Rhsa-2020:1167-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1724242" id="1724242" title="Should Ignore The Ext2Fs Libraries During Building Rpms From Nbdkit Src Package" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1757258" id="1757258" title="Cve-2019-14850 Nbdkit: Denial Of Service Due To Premature Opening Of Back-End Connection" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1172-1</id><title>Qt</title><description>* qt5-qtbase: Double free in QXmlStreamReader      * qt: Malformed PPM image causing division by zero and crash in     qppmhandler.cpp      * qt5-qtsvg: Invalid parsing of malformed url reference resulting in a     denial of service      * qt5-qtbase: QImage allocation failure in qgifhandler      * qt5-qtimageformats: QTgaFile CPU exhaustion      * qt5-qtbase: QBmpHandler segmentation fault on malformed BMP file</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="qt" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-4.8.7-8.el7.x86_64.rpm</filename><sum type="sha256">79cdd873ee3d50763a260f55fba368b0141870f6e0a3481932ebbfd61f47e66f</sum></package><package arch="noarch" epoch="1" name="qt-doc" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-doc-4.8.7-8.el7.noarch.rpm</filename><sum type="sha256">78ff8c50509a36604254dd05330601458f4caad6e89b616c778978df571ca4cf</sum></package><package arch="i686" epoch="1" name="qt" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-4.8.7-8.el7.i686.rpm</filename><sum type="sha256">06ce85228c0eb6a4575842e8dfc38a0d8108343a8d08678b5f2b0270c5e49714</sum></package><package arch="x86_64" epoch="1" name="qt-devel" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-devel-4.8.7-8.el7.x86_64.rpm</filename><sum type="sha256">388c3b2fe1da065a8336753ed69291e65ced3e9015b49c3330daee528e49dd3a</sum></package><package arch="i686" epoch="1" name="qt-x11" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-x11-4.8.7-8.el7.i686.rpm</filename><sum type="sha256">15b890d9fcd1e7af77df7a08fe5aa1e0bfad82ce4e4545ada61636ce16bfe868</sum></package><package arch="i686" epoch="1" name="qt-mysql" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-mysql-4.8.7-8.el7.i686.rpm</filename><sum type="sha256">b02eafd4c53c58fa6dfccf7739c92f331e986cc91eae6556164fbb1e64ca22c4</sum></package><package arch="x86_64" epoch="1" name="qt-odbc" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-odbc-4.8.7-8.el7.x86_64.rpm</filename><sum type="sha256">1237ce49b54ca542baa37096687b1cdfa386987a19115f2160432c1a933092bc</sum></package><package arch="x86_64" epoch="1" name="qt-qvfb" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-qvfb-4.8.7-8.el7.x86_64.rpm</filename><sum type="sha256">f52d65f5151cd52696835eeedd8e039e8c63401ac5c823cb32dbd872cd3f6c94</sum></package><package arch="i686" epoch="1" name="qt-odbc" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-odbc-4.8.7-8.el7.i686.rpm</filename><sum type="sha256">318114429841232f268636293b6afe1725948e49f80fb81ba0d907d22b6781c4</sum></package><package arch="x86_64" epoch="1" name="qt-postgresql" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-postgresql-4.8.7-8.el7.x86_64.rpm</filename><sum type="sha256">4e582a8e6f99b584d68064ef4ae0132ced8c22c270eb4b01b675c8b2f5e20460</sum></package><package arch="x86_64" epoch="1" name="qt-mysql" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-mysql-4.8.7-8.el7.x86_64.rpm</filename><sum type="sha256">63a3ec807e7e67c9ec1ebb4be6be598d3230f6a88145fd180e5290c745939b27</sum></package><package arch="i686" epoch="1" name="qt-devel" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-devel-4.8.7-8.el7.i686.rpm</filename><sum type="sha256">72aeba1b617cbf06a4147b5f77188d6af9c43732aaca79277873784478648cdf</sum></package><package arch="noarch" epoch="1" name="qt-devel-private" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-devel-private-4.8.7-8.el7.noarch.rpm</filename><sum type="sha256">396dd64d2a8265c49ce4c6fa9a921141e49076fb168bc28b5c1e2d382f4b67e7</sum></package><package arch="x86_64" epoch="1" name="qt-assistant" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-assistant-4.8.7-8.el7.x86_64.rpm</filename><sum type="sha256">c1fb351e6a9ae76643a3e3ace078b9053858d537fa593d7afddf2fd7f4a25d58</sum></package><package arch="x86_64" epoch="1" name="qt-config" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-config-4.8.7-8.el7.x86_64.rpm</filename><sum type="sha256">be4ade249a93a40c4bd67c879ccd254d3b343b0b9ae30f1976dc8d50e76c432a</sum></package><package arch="x86_64" epoch="1" name="qt-examples" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-examples-4.8.7-8.el7.x86_64.rpm</filename><sum type="sha256">7c3bd5d755119f41157b891839cbd29bd9b5bf890785e5c5902f7eed58cbb7dd</sum></package><package arch="x86_64" epoch="1" name="qt-x11" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-x11-4.8.7-8.el7.x86_64.rpm</filename><sum type="sha256">f32db3715612f38c4b2fe8a80591ec40716b3bb9aef967bbc81d56eeadd0d36d</sum></package><package arch="i686" epoch="1" name="qt-postgresql" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-postgresql-4.8.7-8.el7.i686.rpm</filename><sum type="sha256">1b1d48152d96192d5ff660f347d66969d011690eb6b9be5fb5dda10f74b25922</sum></package><package arch="x86_64" epoch="1" name="qt-demos" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-demos-4.8.7-8.el7.x86_64.rpm</filename><sum type="sha256">49792f727a908765683f41a9eb66be65e253bb5bd9545a9eb297daed4cc2f11d</sum></package><package arch="x86_64" epoch="1" name="qt-qdbusviewer" release="8.el7" src="qt-4.8.7-8.el7.src.rpm" version="4.8.7"><filename>qt-qdbusviewer-4.8.7-8.el7.x86_64.rpm</filename><sum type="sha256">7abc2f54a53953f0560a3d8c67218ca49445634d1ce59df949fa405bff7e8467</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19872" id="CVE-2018-19872" title="Cve-2018-19872" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1172" id="RHSA-2020:1172-1" title="Rhsa-2020:1172-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658996" id="1658996" title="Cve-2018-19870 Qt5-Qtbase: Qimage Allocation Failure In Qgifhandler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1658998" id="1658998" title="Cve-2018-19873 Qt5-Qtbase: Qbmphandler Segmentation Fault On Malformed Bmp File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1659000" id="1659000" title="Cve-2018-15518 Qt5-Qtbase: Double Free In Qxmlstreamreader" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1661460" id="1661460" title="Cve-2018-19869 Qt5-Qtsvg: Invalid Parsing Of Malformed Url Reference Resulting In A Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1661465" id="1661465" title="Cve-2018-19871 Qt5-Qtimageformats: Qtgafile Cpu Exhaustion" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1691636" id="1691636" title="Cve-2018-19872 Qt: Malformed Ppm Image Causing Division By Zero And Crash In Qppmhandler.Cpp" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1173-1</id><title>Okular</title><description>* okular: Directory traversal in function unpackDocumentArchive() in     core/document.cpp</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="okular-part" release="8.el7" src="okular-4.10.5-8.el7.src.rpm" version="4.10.5"><filename>okular-part-4.10.5-8.el7.x86_64.rpm</filename><sum type="sha256">72f07b485044422f7332defa1137720553f9f3e3b46075c14459afb92359c4bd</sum></package><package arch="i686" name="okular-devel" release="8.el7" src="okular-4.10.5-8.el7.src.rpm" version="4.10.5"><filename>okular-devel-4.10.5-8.el7.i686.rpm</filename><sum type="sha256">56c0b82557aad934482c70ea694c10df6b1daaf81a3608340b38450616cef775</sum></package><package arch="x86_64" name="okular-libs" release="8.el7" src="okular-4.10.5-8.el7.src.rpm" version="4.10.5"><filename>okular-libs-4.10.5-8.el7.x86_64.rpm</filename><sum type="sha256">3b8b75fde43459df275e6b74cc406e53ee84960c1037311a29fc26d0a2d7dba6</sum></package><package arch="i686" name="okular-libs" release="8.el7" src="okular-4.10.5-8.el7.src.rpm" version="4.10.5"><filename>okular-libs-4.10.5-8.el7.i686.rpm</filename><sum type="sha256">6b3c19b0c3776ef5f28c48d08a4be0cd9011e875c270c0a6dc4e7eceedd21e30</sum></package><package arch="x86_64" name="okular-devel" release="8.el7" src="okular-4.10.5-8.el7.src.rpm" version="4.10.5"><filename>okular-devel-4.10.5-8.el7.x86_64.rpm</filename><sum type="sha256">bb9338b0661efa6124dbaffb257c0ea48631f803849e49d93bbc3d0c0d6ec709</sum></package><package arch="x86_64" name="okular" release="8.el7" src="okular-4.10.5-8.el7.src.rpm" version="4.10.5"><filename>okular-4.10.5-8.el7.x86_64.rpm</filename><sum type="sha256">c09c3774fefe80794af09098d51af3e301045d2f5da88434c48e5cfc1fd50cc3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000801" id="CVE-2018-1000801" title="Cve-2018-1000801" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1173" id="RHSA-2020:1173-1" title="Rhsa-2020:1173-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1626265" id="1626265" title="Cve-2018-1000801 Okular: Directory Traversal In Function Unpackdocumentarchive() In Core/Document.Cpp" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1175-1</id><title>Taglib</title><description>* taglib: heap-based buffer over-read via a crafted audio file</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="taglib-doc" release="8.20130218git.el7" src="taglib-1.8-8.20130218git.el7.src.rpm" version="1.8"><filename>taglib-doc-1.8-8.20130218git.el7.noarch.rpm</filename><sum type="sha256">6ea08f0b9fa734f25558f4040e38684c9b309a09f7cceea2334c69176ac15b64</sum></package><package arch="i686" name="taglib-devel" release="8.20130218git.el7" src="taglib-1.8-8.20130218git.el7.src.rpm" version="1.8"><filename>taglib-devel-1.8-8.20130218git.el7.i686.rpm</filename><sum type="sha256">963cd3113710c986d6e282a5f73d5de07ba0065e9ca8ff283ab0b68c3275151d</sum></package><package arch="x86_64" name="taglib" release="8.20130218git.el7" src="taglib-1.8-8.20130218git.el7.src.rpm" version="1.8"><filename>taglib-1.8-8.20130218git.el7.x86_64.rpm</filename><sum type="sha256">20583449743a7ba18961aef7a16fee865a301890a88b57320f28202be844add5</sum></package><package arch="x86_64" name="taglib-devel" release="8.20130218git.el7" src="taglib-1.8-8.20130218git.el7.src.rpm" version="1.8"><filename>taglib-devel-1.8-8.20130218git.el7.x86_64.rpm</filename><sum type="sha256">e20449b0b066f6b81575290a5d7107df2f8202b51d59f50b59f30a6e876589d0</sum></package><package arch="i686" name="taglib" release="8.20130218git.el7" src="taglib-1.8-8.20130218git.el7.src.rpm" version="1.8"><filename>taglib-1.8-8.20130218git.el7.i686.rpm</filename><sum type="sha256">f5280a8ad2b4602a453ccfac9133484ee9140ecfd11cb749b605024ac0074a29</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11439" id="CVE-2018-11439" title="Cve-2018-11439" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1175" id="RHSA-2020:1175-1" title="Rhsa-2020:1175-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1584868" id="1584868" title="Cve-2018-11439 Taglib: Heap-Based Buffer Over-Read Via A Crafted Audio File" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1176-1</id><title>Avahi</title><description>* avahi: Multicast DNS responds to unicast queries outside of local network</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="avahi-libs" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-libs-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">7cb2f10f045899b53133750c03ac7224dcc35f9ba7837a77b6689fda6ddf333a</sum></package><package arch="i686" name="avahi-ui" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-ui-0.6.31-20.el7.i686.rpm</filename><sum type="sha256">f9f2d35c751fca490764b3691f6c46b349d7a030b96c7e5d1426f1e5bd37c349</sum></package><package arch="x86_64" name="avahi-ui-tools" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-ui-tools-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">1e74dfea1cb7bacd3818a2a0c5bfce14e834efd6377aeaf40778c426280d3acc</sum></package><package arch="i686" name="avahi-libs" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-libs-0.6.31-20.el7.i686.rpm</filename><sum type="sha256">2ed4282b30a8f017ac3a691760e6c5077308c7e0a846ac4f581059ee3f62e232</sum></package><package arch="i686" name="avahi-compat-libdns_sd-devel" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-compat-libdns_sd-devel-0.6.31-20.el7.i686.rpm</filename><sum type="sha256">1321310d311dfff88f53696a108fa8b3d7e4c2c642a366570e8dedac7bef434b</sum></package><package arch="x86_64" name="avahi" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">2e8b563077167e0599910ec1aa6d566f65934add557b538e0969390bb4f3ff56</sum></package><package arch="x86_64" name="avahi-ui-devel" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-ui-devel-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">dfe29fccd67b260c8ad1483a0a7301f5da57195ad0ca09cbf8ca9822ade18838</sum></package><package arch="x86_64" name="avahi-glib" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-glib-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">00b323944b3cc135ba7f9753d72fad02484336457ca7c5caac5ac74130a512de</sum></package><package arch="i686" name="avahi-compat-howl" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-compat-howl-0.6.31-20.el7.i686.rpm</filename><sum type="sha256">eb0e5a994ece3f1ad7d335af08c0be16a833a286efe83ea682fee1fe1317b19c</sum></package><package arch="x86_64" name="avahi-devel" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-devel-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">2eb70083b4939853bfc23956b034d5e105ffd5c482a267c41587f30d73482db4</sum></package><package arch="i686" name="avahi-glib-devel" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-glib-devel-0.6.31-20.el7.i686.rpm</filename><sum type="sha256">3622d0292974db194ed61df492e9f4fa0d31b97888d89affdd2df9f611545114</sum></package><package arch="i686" name="avahi-compat-howl-devel" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-compat-howl-devel-0.6.31-20.el7.i686.rpm</filename><sum type="sha256">a60f6f0d2874233f403a7dd2ac80b20db7c0cf9230dc9f6fdd878bc13f9e5bda</sum></package><package arch="x86_64" name="avahi-qt3-devel" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-qt3-devel-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">0ac47bfa54e22844633d07eb0a05a31757494e83095a4fb4b7317c4420017766</sum></package><package arch="i686" name="avahi-compat-libdns_sd" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-compat-libdns_sd-0.6.31-20.el7.i686.rpm</filename><sum type="sha256">ad47208d58d1cb322347d7fa061d66dd5a58447bc9dae828d39c1e08f5d6c4f1</sum></package><package arch="x86_64" name="avahi-compat-howl-devel" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-compat-howl-devel-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">72f234d1277b0566985506067e917bff130645e40b2225cdfe604e500042a813</sum></package><package arch="x86_64" name="avahi-qt4" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-qt4-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">50eb995355c8c1dabeb8054bc40f9293ddfa9ac217495a3336d21fe06ca8938e</sum></package><package arch="i686" name="avahi-devel" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-devel-0.6.31-20.el7.i686.rpm</filename><sum type="sha256">efbab8cf0439e1149a53a5c5bfd21e9b9bcc17b3bd12d95858082c5ceca60025</sum></package><package arch="i686" name="avahi-ui-devel" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-ui-devel-0.6.31-20.el7.i686.rpm</filename><sum type="sha256">612ff55e2de379ed90e29472a4ace7bf138e3b0df9dccbdec80e721571d66c78</sum></package><package arch="i686" name="avahi-gobject" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-gobject-0.6.31-20.el7.i686.rpm</filename><sum type="sha256">88c29639a8c0a04d7f8181702eb19a048d5d8bdd892ea27f88c6f8bb2057d022</sum></package><package arch="x86_64" name="avahi-qt4-devel" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-qt4-devel-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">0f3658639366b6a771061b4a161a117364ca6fe99f0e4a73dd661d0d2852a254</sum></package><package arch="i686" name="avahi" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-0.6.31-20.el7.i686.rpm</filename><sum type="sha256">1400f47774aa56f64934f383007436acd5d69f6eab27df8603a193ed91d15ed2</sum></package><package arch="x86_64" name="avahi-gobject" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-gobject-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">ac5997995ba5455ae7f8761bc871b566c67746cc975be2ae1e82406a4c8ddc32</sum></package><package arch="x86_64" name="avahi-compat-howl" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-compat-howl-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">7a9a49e3a2bac857d9955198935f132073dd3cb2034394efb8da6015b2b9e731</sum></package><package arch="i686" name="avahi-qt3" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-qt3-0.6.31-20.el7.i686.rpm</filename><sum type="sha256">77669d1ee33c94c3e299d8773c3c5ef0a05867674369b5212114f825b40699b0</sum></package><package arch="i686" name="avahi-glib" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-glib-0.6.31-20.el7.i686.rpm</filename><sum type="sha256">fa8cf354dcd29aac120bb8d46379cba1e9bd9cad59d6b7c902a2069a1f08fd12</sum></package><package arch="x86_64" name="avahi-ui-gtk3" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-ui-gtk3-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">b40d2569b7f47bcdee999cbd91985dba3e538d1acb2332a6eb0bd3f89b912fcc</sum></package><package arch="x86_64" name="avahi-tools" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-tools-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">eac5cc37c6f54138efc33c0ccbf5fb71f4fa72b5321fb81e5c36d518468d7c41</sum></package><package arch="x86_64" name="avahi-compat-libdns_sd" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-compat-libdns_sd-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">05046031a9e8d440d1aed829ccb70cf7705e84abe99875d31f632fa75be81b9d</sum></package><package arch="x86_64" name="avahi-compat-libdns_sd-devel" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-compat-libdns_sd-devel-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">cc3ee0dcb613acab3adbaca2507864597afc2232a11ecb79af08b01ee8e6c5cb</sum></package><package arch="x86_64" name="avahi-glib-devel" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-glib-devel-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">74e1854674895bbd807747ba31e5457e1ddc29575af58d61d68f007f516fc50c</sum></package><package arch="x86_64" name="avahi-dnsconfd" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-dnsconfd-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">d61e3e540306208db74d1465a55924b7275a6db15b3cbd9c494b1a9f159950e1</sum></package><package arch="x86_64" name="avahi-qt3" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-qt3-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">36565554d7d7baa967a0f2b38caf67c7dc72445e08cbcb26b07f1d5c4d8ec2ee</sum></package><package arch="x86_64" name="avahi-gobject-devel" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-gobject-devel-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">3741cb08303c58c9d6153ef2f3528b403b9d2b249f456331e4f749fe75f890a0</sum></package><package arch="i686" name="avahi-gobject-devel" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-gobject-devel-0.6.31-20.el7.i686.rpm</filename><sum type="sha256">d5bc87bcc9c3fa7920af1d54eb46146942e53661ca759899c5c0332df83a5f2a</sum></package><package arch="i686" name="avahi-qt3-devel" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-qt3-devel-0.6.31-20.el7.i686.rpm</filename><sum type="sha256">ef1a6525107eebfb70b0bd0a4fe7b2725948d1685b27b84db7255c3fe7d469ca</sum></package><package arch="i686" name="avahi-qt4" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-qt4-0.6.31-20.el7.i686.rpm</filename><sum type="sha256">8c3b816d2765e372fcbb4f1c276f99f1faaddad442a375317eed666a7f29d73b</sum></package><package arch="i686" name="avahi-ui-gtk3" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-ui-gtk3-0.6.31-20.el7.i686.rpm</filename><sum type="sha256">cf98f5cd9818af34aea04d712b1b5b4169d4c3ae7f034ad3e12afacdecf49b51</sum></package><package arch="x86_64" name="avahi-ui" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-ui-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">025a4d00c990f03ca9af453a4ef4f92e5aa9c31df85c20206d6a1ad1f64c60d0</sum></package><package arch="x86_64" name="avahi-autoipd" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-autoipd-0.6.31-20.el7.x86_64.rpm</filename><sum type="sha256">91c3eec43445fda974a20210c99e8150567c9287a3e5fb0a3bb508a578dacef2</sum></package><package arch="i686" name="avahi-qt4-devel" release="20.el7" src="avahi-0.6.31-20.el7.src.rpm" version="0.6.31"><filename>avahi-qt4-devel-0.6.31-20.el7.i686.rpm</filename><sum type="sha256">a36f72b93d7dd4e64c8cd5593744d4a2b4214890aafa275f34bcfeccef415007</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1176" id="RHSA-2020:1176-1" title="Rhsa-2020:1176-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1178-1</id><title>Zziplib</title><description>* zziplib: directory traversal in unzzip_cat in the bins/unzzipcat-mem.c</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="zziplib-utils" release="12.el7" src="zziplib-0.13.62-12.el7.src.rpm" version="0.13.62"><filename>zziplib-utils-0.13.62-12.el7.x86_64.rpm</filename><sum type="sha256">98a8d2d8a46a13eba3c4ae441d5d00365a07b62ce01310f6ddce76ff235798bd</sum></package><package arch="i686" name="zziplib" release="12.el7" src="zziplib-0.13.62-12.el7.src.rpm" version="0.13.62"><filename>zziplib-0.13.62-12.el7.i686.rpm</filename><sum type="sha256">9a2706d83766611aac5999c5fcb0a55935f17e640db445bdb088f49e22bac11a</sum></package><package arch="x86_64" name="zziplib-devel" release="12.el7" src="zziplib-0.13.62-12.el7.src.rpm" version="0.13.62"><filename>zziplib-devel-0.13.62-12.el7.x86_64.rpm</filename><sum type="sha256">bffc6304ef03bb7e2228bf2a2451b4d798f451cdc80fa073493a1ebb3c58ca7c</sum></package><package arch="x86_64" name="zziplib" release="12.el7" src="zziplib-0.13.62-12.el7.src.rpm" version="0.13.62"><filename>zziplib-0.13.62-12.el7.x86_64.rpm</filename><sum type="sha256">97da238881ad98d139dc4d29dc1c56e74e2f79c3f721348bf0c19d06f3b204b4</sum></package><package arch="i686" name="zziplib-devel" release="12.el7" src="zziplib-0.13.62-12.el7.src.rpm" version="0.13.62"><filename>zziplib-devel-0.13.62-12.el7.i686.rpm</filename><sum type="sha256">285315cf445233607cd29bdc49d18bfe7adf9c64e27ee6986efe55793359eb18</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17828" id="CVE-2018-17828" title="Cve-2018-17828" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1178" id="RHSA-2020:1178-1" title="Rhsa-2020:1178-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1635888" id="1635888" title="Cve-2018-17828 Zziplib: Directory Traversal In Unzzip_Cat In The Bins/Unzzipcat-Mem.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1180-1</id><title>Imagemagick</title><description>* ImageMagick: multiple security vulnerabilities</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="emacs" release="23.el7" src="emacs-24.3-23.el7.src.rpm" version="24.3"><filename>emacs-24.3-23.el7.x86_64.rpm</filename><sum type="sha256">d11cf9d323e523243ce442b4ba7d38f1eaeb7d3f141f7f42fb34ccdc3d9b426e</sum></package><package arch="i686" name="ImageMagick" release="3.el7" src="ImageMagick-6.9.10.68-3.el7.src.rpm" version="6.9.10.68"><filename>ImageMagick-6.9.10.68-3.el7.i686.rpm</filename><sum type="sha256">d73565d840e9d4bcc6a5a398eaa25f7b7c1524eb86f355a5d29adcfa77bf4ce0</sum></package><package arch="noarch" epoch="1" name="emacs-el" release="23.el7" src="emacs-24.3-23.el7.src.rpm" version="24.3"><filename>emacs-el-24.3-23.el7.noarch.rpm</filename><sum type="sha256">d6c6829a7973b4b8e8fc714a8523e89e747602ffba234eae29ce10ec816518fb</sum></package><package arch="x86_64" name="inkscape" release="3.el7" src="inkscape-0.92.2-3.el7.src.rpm" version="0.92.2"><filename>inkscape-0.92.2-3.el7.x86_64.rpm</filename><sum type="sha256">0e87e06bd04d76d6ec93a471c7280adf76d676157de3d5cd97593b042b5ed36d</sum></package><package arch="noarch" epoch="1" name="emacs-terminal" release="23.el7" src="emacs-24.3-23.el7.src.rpm" version="24.3"><filename>emacs-terminal-24.3-23.el7.noarch.rpm</filename><sum type="sha256">f063131f958e130aa43ac2e619c55b05d223063c70f6781b84ef491d3d488d8e</sum></package><package arch="i686" name="ImageMagick-c++" release="3.el7" src="ImageMagick-6.9.10.68-3.el7.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-6.9.10.68-3.el7.i686.rpm</filename><sum type="sha256">9ab5f4683878bfa91b8baf6492494e6be1b5c9a209fb6810d9f11f025a3442b0</sum></package><package arch="x86_64" name="ImageMagick-devel" release="3.el7" src="ImageMagick-6.9.10.68-3.el7.src.rpm" version="6.9.10.68"><filename>ImageMagick-devel-6.9.10.68-3.el7.x86_64.rpm</filename><sum type="sha256">d5b35d044766211a8c203c4dad4579aaebe5d97a6f9cde50b6bd63dff3f83ab9</sum></package><package arch="x86_64" name="ImageMagick-c++-devel" release="3.el7" src="ImageMagick-6.9.10.68-3.el7.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-devel-6.9.10.68-3.el7.x86_64.rpm</filename><sum type="sha256">669731d3611dfe806762efda7c35ec0cccb3afff8e0a01fbedd3857f94d76d49</sum></package><package arch="x86_64" name="inkscape-view" release="3.el7" src="inkscape-0.92.2-3.el7.src.rpm" version="0.92.2"><filename>inkscape-view-0.92.2-3.el7.x86_64.rpm</filename><sum type="sha256">6ac2e22082ae96e818ed2a02a0a9584c8d49552e9901a25ee5490106373f9279</sum></package><package arch="x86_64" name="ImageMagick-doc" release="3.el7" src="ImageMagick-6.9.10.68-3.el7.src.rpm" version="6.9.10.68"><filename>ImageMagick-doc-6.9.10.68-3.el7.x86_64.rpm</filename><sum type="sha256">1a1fc29264f248251fd6a2214149007127151a0c23a26c1eb3cdf82fc29d117b</sum></package><package arch="x86_64" name="ImageMagick" release="3.el7" src="ImageMagick-6.9.10.68-3.el7.src.rpm" version="6.9.10.68"><filename>ImageMagick-6.9.10.68-3.el7.x86_64.rpm</filename><sum type="sha256">c0e52dbe9d8e3730f9d54f0dc25329d02ef18d6655e855a91c84bb96458c441c</sum></package><package arch="i686" name="autotrace" release="38.el7" src="autotrace-0.31.1-38.el7.src.rpm" version="0.31.1"><filename>autotrace-0.31.1-38.el7.i686.rpm</filename><sum type="sha256">ae3a24a599fa1b8cec3f874e6cd261f6852010a9af7b5d581b83ad96c01700e6</sum></package><package arch="noarch" epoch="1" name="emacs-filesystem" release="23.el7" src="emacs-24.3-23.el7.src.rpm" version="24.3"><filename>emacs-filesystem-24.3-23.el7.noarch.rpm</filename><sum type="sha256">daa510effd241b1292a768fb59ad4f8f0f56a2dff8be6fa8f6035cec36de70b3</sum></package><package arch="i686" name="ImageMagick-devel" release="3.el7" src="ImageMagick-6.9.10.68-3.el7.src.rpm" version="6.9.10.68"><filename>ImageMagick-devel-6.9.10.68-3.el7.i686.rpm</filename><sum type="sha256">fd02685c22977f3d206b8054b5ce0be8a00c1f504ce41af0d21d4cb10e434aac</sum></package><package arch="i686" name="ImageMagick-c++-devel" release="3.el7" src="ImageMagick-6.9.10.68-3.el7.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-devel-6.9.10.68-3.el7.i686.rpm</filename><sum type="sha256">1cdc4eb382098e29f365c597eb87bfd8923b63b790ed0228ca24d11244e6c0a1</sum></package><package arch="x86_64" name="autotrace-devel" release="38.el7" src="autotrace-0.31.1-38.el7.src.rpm" version="0.31.1"><filename>autotrace-devel-0.31.1-38.el7.x86_64.rpm</filename><sum type="sha256">34134bbc97889b198ad9d6c2df76471622b6fc8ad9df177345b68fa7cf68142d</sum></package><package arch="i686" name="autotrace-devel" release="38.el7" src="autotrace-0.31.1-38.el7.src.rpm" version="0.31.1"><filename>autotrace-devel-0.31.1-38.el7.i686.rpm</filename><sum type="sha256">0703d29d1fec744068c3de5de40edd668cd8213b83b6bdcb4e7cf8b521c6abff</sum></package><package arch="x86_64" name="autotrace" release="38.el7" src="autotrace-0.31.1-38.el7.src.rpm" version="0.31.1"><filename>autotrace-0.31.1-38.el7.x86_64.rpm</filename><sum type="sha256">dd74de6dae2413eb56a6c3f3bd0d921a3f7317115d6af45cfc5d132d302b6822</sum></package><package arch="x86_64" epoch="1" name="emacs-nox" release="23.el7" src="emacs-24.3-23.el7.src.rpm" version="24.3"><filename>emacs-nox-24.3-23.el7.x86_64.rpm</filename><sum type="sha256">3981d377abb5d82b42462b58f5ffb6d18ca217fe072e21589ba2923271e3957c</sum></package><package arch="x86_64" name="ImageMagick-c++" release="3.el7" src="ImageMagick-6.9.10.68-3.el7.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-6.9.10.68-3.el7.x86_64.rpm</filename><sum type="sha256">7f32e0325f44f6c13382c158e11cdceb9fbcb99e06ccf22666df025666c5929f</sum></package><package arch="x86_64" name="ImageMagick-perl" release="3.el7" src="ImageMagick-6.9.10.68-3.el7.src.rpm" version="6.9.10.68"><filename>ImageMagick-perl-6.9.10.68-3.el7.x86_64.rpm</filename><sum type="sha256">f2fcbb6f9d26c7542df7a9f16d9dcd8f8902bcced93ab6290a9e4e085a4c7cd7</sum></package><package arch="x86_64" name="inkscape-docs" release="3.el7" src="inkscape-0.92.2-3.el7.src.rpm" version="0.92.2"><filename>inkscape-docs-0.92.2-3.el7.x86_64.rpm</filename><sum type="sha256">d7f44d8d3c8f89fe532823557ea7dd56775d345d04b32aaa1c9fa736b73aba63</sum></package><package arch="x86_64" epoch="1" name="emacs-common" release="23.el7" src="emacs-24.3-23.el7.src.rpm" version="24.3"><filename>emacs-common-24.3-23.el7.x86_64.rpm</filename><sum type="sha256">8b83d8ffe3888877c54c56675f1061eb559310a6e31febaf49b8e1cf9e6bc0aa</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000476" id="CVE-2017-1000476" title="Cve-2017-1000476" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11166" id="CVE-2017-11166" title="Cve-2017-11166" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12805" id="CVE-2017-12805" title="Cve-2017-12805" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12806" id="CVE-2017-12806" title="Cve-2017-12806" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18251" id="CVE-2017-18251" title="Cve-2017-18251" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18252" id="CVE-2017-18252" title="Cve-2017-18252" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18254" id="CVE-2017-18254" title="Cve-2017-18254" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18271" id="CVE-2017-18271" title="Cve-2017-18271" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18273" id="CVE-2017-18273" title="Cve-2017-18273" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10177" id="CVE-2018-10177" title="Cve-2018-10177" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10804" id="CVE-2018-10804" title="Cve-2018-10804" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10805" id="CVE-2018-10805" title="Cve-2018-10805" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11656" id="CVE-2018-11656" title="Cve-2018-11656" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12599" id="CVE-2018-12599" title="Cve-2018-12599" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12600" id="CVE-2018-12600" title="Cve-2018-12600" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13153" id="CVE-2018-13153" title="Cve-2018-13153" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14434" id="CVE-2018-14434" title="Cve-2018-14434" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14435" id="CVE-2018-14435" title="Cve-2018-14435" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14436" id="CVE-2018-14436" title="Cve-2018-14436" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14437" id="CVE-2018-14437" title="Cve-2018-14437" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15607" id="CVE-2018-15607" title="Cve-2018-15607" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16328" id="CVE-2018-16328" title="Cve-2018-16328" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16749" id="CVE-2018-16749" title="Cve-2018-16749" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16750" id="CVE-2018-16750" title="Cve-2018-16750" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-18544" id="CVE-2018-18544" title="Cve-2018-18544" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20467" id="CVE-2018-20467" title="Cve-2018-20467" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8804" id="CVE-2018-8804" title="Cve-2018-8804" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-9133" id="CVE-2018-9133" title="Cve-2018-9133" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10131" id="CVE-2019-10131" title="Cve-2019-10131" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10650" id="CVE-2019-10650" title="Cve-2019-10650" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11470" id="CVE-2019-11470" title="Cve-2019-11470" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11472" id="CVE-2019-11472" title="Cve-2019-11472" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11597" id="CVE-2019-11597" title="Cve-2019-11597" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11598" id="CVE-2019-11598" title="Cve-2019-11598" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12974" id="CVE-2019-12974" title="Cve-2019-12974" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12975" id="CVE-2019-12975" title="Cve-2019-12975" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12976" id="CVE-2019-12976" title="Cve-2019-12976" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12978" id="CVE-2019-12978" title="Cve-2019-12978" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12979" id="CVE-2019-12979" title="Cve-2019-12979" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13133" id="CVE-2019-13133" title="Cve-2019-13133" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13134" id="CVE-2019-13134" title="Cve-2019-13134" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13135" id="CVE-2019-13135" title="Cve-2019-13135" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13295" id="CVE-2019-13295" title="Cve-2019-13295" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13297" id="CVE-2019-13297" title="Cve-2019-13297" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13300" id="CVE-2019-13300" title="Cve-2019-13300" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13301" id="CVE-2019-13301" title="Cve-2019-13301" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13304" id="CVE-2019-13304" title="Cve-2019-13304" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13305" id="CVE-2019-13305" title="Cve-2019-13305" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13306" id="CVE-2019-13306" title="Cve-2019-13306" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13307" id="CVE-2019-13307" title="Cve-2019-13307" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13309" id="CVE-2019-13309" title="Cve-2019-13309" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13310" id="CVE-2019-13310" title="Cve-2019-13310" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13311" id="CVE-2019-13311" title="Cve-2019-13311" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13454" id="CVE-2019-13454" title="Cve-2019-13454" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14980" id="CVE-2019-14980" title="Cve-2019-14980" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14981" id="CVE-2019-14981" title="Cve-2019-14981" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15139" id="CVE-2019-15139" title="Cve-2019-15139" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15140" id="CVE-2019-15140" title="Cve-2019-15140" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15141" id="CVE-2019-15141" title="Cve-2019-15141" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16708" id="CVE-2019-16708" title="Cve-2019-16708" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16709" id="CVE-2019-16709" title="Cve-2019-16709" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16710" id="CVE-2019-16710" title="Cve-2019-16710" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16711" id="CVE-2019-16711" title="Cve-2019-16711" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16712" id="CVE-2019-16712" title="Cve-2019-16712" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16713" id="CVE-2019-16713" title="Cve-2019-16713" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17540" id="CVE-2019-17540" title="Cve-2019-17540" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17541" id="CVE-2019-17541" title="Cve-2019-17541" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19948" id="CVE-2019-19948" title="Cve-2019-19948" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19949" id="CVE-2019-19949" title="Cve-2019-19949" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7175" id="CVE-2019-7175" title="Cve-2019-7175" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7397" id="CVE-2019-7397" title="Cve-2019-7397" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7398" id="CVE-2019-7398" title="Cve-2019-7398" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9956" id="CVE-2019-9956" title="Cve-2019-9956" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1180" id="RHSA-2020:1180-1" title="Rhsa-2020:1180-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1532845" id="1532845" title="Cve-2017-1000476 Imagemagick: Cpu Exhaustion Vulnerability In Function Readddsinfo In Coders/Dds.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1559892" id="1559892" title="Cve-2018-8804 Imagemagick: Double Free In Writeeptimage Function In Coders/Ept.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1561741" id="1561741" title="Cve-2017-18251 Imagemagick: Memory Leak In Readpcdimage Function In Coders/Pcd.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1561742" id="1561742" title="Cve-2017-18252 Imagemagick: Assertion Failure In Mogrifyimagelist Function In Magickwand/Mogrify.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1561744" id="1561744" title="Cve-2017-18254 Imagemagick: Memory Leak In Writegifimage Function In Coders/Gif.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1563875" id="1563875" title="Cve-2018-9133 Imagemagick: Excessive Iteration In The Decodelabimage And Encodelabimage Functions In Coders/Tiff.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1572044" id="1572044" title="Cve-2018-10177 Imagemagick: Infinite Loop In Coders/Png.C:Readonemngimage() Allows Attackers To Cause A Denial Of Service Via Crafted Mng File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1577398" id="1577398" title="Cve-2018-10805 Imagemagick: Memory Leak In Readycbcrimage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1577399" id="1577399" title="Cve-2018-10804 Imagemagick: Memory Leak In Writetiffimage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1581486" id="1581486" title="Cve-2017-18271 Imagemagick: Infinite Loop In Readmiffimage Function In Coders/Miff.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1581489" id="1581489" title="Cve-2017-18273 Imagemagick: Infinite Loop Readtxtimage  In Function In Coders/Txt.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1588170" id="1588170" title="Cve-2018-11656 Imagemagick: Memory Leak In Readdcmimage Function In Coders/Dcm.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1594338" id="1594338" title="Cve-2018-12599 Imagemagick: Out Of Bounds Write In Readbmpimage And Writebmpimage In Coders/Bmp.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1594339" id="1594339" title="Cve-2018-12600 Imagemagick: Out Of Bounds Write Readdibimage And Writedibimage In Coders/Dib.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598471" id="1598471" title="Cve-2018-13153 Imagemagick: Memory Leak In The Xmagickcommand Function In Magickcore/Animate.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1609933" id="1609933" title="Cve-2018-14434 Imagemagick: Memory Leak For A Colormap In Writempcimage In Coders/Mpc.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1609936" id="1609936" title="Cve-2018-14435 Imagemagick: Memory Leak In Decodeimage In Coders/Pcd.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1609939" id="1609939" title="Cve-2018-14436 Imagemagick: Memory Leak In Readmiffimage In Coders/Miff.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1609942" id="1609942" title="Cve-2018-14437 Imagemagick: Memory Leak In Parse8Bim In Coders/Meta.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1622738" id="1622738" title="Cve-2018-15607 Imagemagick: Cpu Exhaustion Via Crafted Input File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1624955" id="1624955" title="Cve-2018-16328 Imagemagick: Null Pointer Dereference In Checkeventlogging Function In Magickcore/Log.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1627916" id="1627916" title="Cve-2018-16749 Imagemagick: Reachable Assertion In Readonejngimage In Coders/Png.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1627917" id="1627917" title="Cve-2018-16750 Imagemagick: Memory Leak In The Formatiptcfrombuffer Function In Coders/Meta.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1642614" id="1642614" title="Cve-2018-18544 Imagemagick: Memory Leak In Writemslimage Of Coders/Msl.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1664845" id="1664845" title="Cve-2018-20467 Imagemagick: Infinite Loop In Coders/Bmp.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1672560" id="1672560" title="Cve-2019-7398 Imagemagick: Memory Leak In The Writedibimage Function In Coders/Dib.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1672564" id="1672564" title="Cve-2019-7397 Imagemagick: Memory Leak In The Writepdfimage Function In Coders/Pdf.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1687436" id="1687436" title="Cve-2019-7175 Imagemagick: Memory Leak In Function Decodeimage In Coders/Pcd.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1692300" id="1692300" title="Cve-2019-9956 Imagemagick: Stack-Based Buffer Overflow In Function Pophexpixel In Coders/Ps.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1700755" id="1700755" title="Cve-2019-10650 Imagemagick: Heap-Based Buffer Over-Read In Writetiffimage Of Coders/Tiff.C Leads To Denial Of Service Or Information Disclosure Via Crafted Image File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1704762" id="1704762" title="Cve-2019-10131 Imagemagick: Off-By-One Read In Formatiptcfrombuffer Function In Coders/Meta.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1705406" id="1705406" title="Cve-2019-11597 Imagemagick: Heap-Based Buffer Over-Read In The Function Writetiffimage Of Coders/Tiff.C Leading To Dos Or Information Disclosure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1705414" id="1705414" title="Cve-2019-11598 Imagemagick: Heap-Based Buffer Over-Read In The Function Writepnmimage Of Coders/Pnm.C Leading To Dos Or Information Disclosure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1707768" id="1707768" title="Cve-2019-11472 Imagemagick: Denial Of Service In Readxwdimage In Coders/Xwd.C In The Xwd Image Parsing Component" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1707770" id="1707770" title="Cve-2019-11470 Imagemagick: Denial Of Service In Cineon Parsing Component" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1708517" id="1708517" title="Cve-2017-12806 Imagemagick: Memory Exhaustion In Function Format8Bim Causing Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1708521" id="1708521" title="Cve-2017-12805 Imagemagick: Memory Exhaustion In Function Readtiffimage Causing Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1726078" id="1726078" title="Cve-2019-13133 Imagemagick: A Memory Leak Vulnerability In The Function Readbmpimage In Coders/Bmp.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1726081" id="1726081" title="Cve-2019-13134 Imagemagick: A Memory Leak Vulnerability In The Function Readviffimage In Coders/Viff.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1726104" id="1726104" title="Cve-2019-13135 Imagemagick: A &quot;Use Of Uninitialized Value&quot; Vulnerability In The Function Readcutimage Leading To A Crash And Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728474" id="1728474" title="Cve-2019-13454 Imagemagick: Division By Zero In Removeduplicatelayers In Magickcore/Layer.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730329" id="1730329" title="Cve-2019-13311 Imagemagick: Memory Leaks At Acquiremagickmemory Because Of A Wand/Mogrify.C Error" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730333" id="1730333" title="Cve-2019-13310 Imagemagick: Memory Leaks At Acquiremagickmemory Because Of An Error In Magickwand/Mogrify.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730337" id="1730337" title="Cve-2019-13309 Imagemagick: Memory Leaks At Acquiremagickmemory Due To Mishandling The Nosuchimage Error In Clilistoperatorimages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730351" id="1730351" title="Cve-2019-13307 Imagemagick: Heap-Based Buffer Overflow At Magickcore/Statistic.C In Evaluateimages Because Of Mishandling Rows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730357" id="1730357" title="Cve-2019-13306 Imagemagick: Stack-Based Buffer Overflow At Coders/Pnm.C In Writepnmimage Because Of Off-By-One Errors" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730361" id="1730361" title="Cve-2019-13305 Imagemagick: Stack-Based Buffer Overflow At Coders/Pnm.C In Writepnmimage Because Of A Misplaced Strncpy And An Off-By-One Error" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730364" id="1730364" title="Cve-2019-13304 Imagemagick: Stack-Based Buffer Overflow At Coders/Pnm.C In Writepnmimage Because Of A Misplaced Assignment" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730575" id="1730575" title="Cve-2019-13301 Imagemagick: Memory Leaks In Acquiremagickmemory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730580" id="1730580" title="Cve-2019-13300 Imagemagick: Heap-Based Buffer Overflow At Magickcore/Statistic.C In Evaluateimages Because Of Mishandling Columns" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730596" id="1730596" title="Cve-2019-13297 Imagemagick: Heap-Based Buffer Over-Read At Magickcore/Threshold.C In Adaptivethresholdimage Because A Height Of Zero Is Mishandled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730604" id="1730604" title="Cve-2019-13295 Imagemagick: Heap-Based Buffer Over-Read At Magickcore/Threshold.C In Adaptivethresholdimage Because A Width Of Zero Is Mishandled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1732278" id="1732278" title="Cve-2019-12974 Imagemagick: Null-Pointer Dereference In Function Readpangoimage In Coders/Pango.C And Readvidimage In Coders/Vid.C Causing Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1732282" id="1732282" title="Cve-2019-12975 Imagemagick: Memory Leak Vulnerability In Function Writedpximage In Coders/Dpx.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1732284" id="1732284" title="Cve-2019-12976 Imagemagick: Memory Leak Vulnerability In Function Readpclimage In Coders/Pcl.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1732292" id="1732292" title="Cve-2019-12978 Imagemagick: Use Of Uninitialized Value In Function Readpangoimage In Coders/Pango.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1732294" id="1732294" title="Cve-2019-12979 Imagemagick: Use Of Uninitialized Value In Functionsyncimagesettings In Magickcore/Image.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1743658" id="1743658" title="[Config/Type-Ghostscript.Xml.In] Using Outdated Hardcoded Paths For (Urw)++ Fonts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1757779" id="1757779" title="Cve-2019-14980 Imagemagick: Use-After-Free In Magick/Blob.C Resulting In A Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1757911" id="1757911" title="Cve-2019-14981 Imagemagick: Division By Zero In Meanshiftimage In Magickcore/Feature.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764595" id="1764595" title="Rebase To Imagemagick 6.9" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1765205" id="1765205" title="Rebuild Autotrace Due To Imagemagick Rebase" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1765208" id="1765208" title="Rebuild Emacs Due To Imagemagick Rebase" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1765211" id="1765211" title="Rebuild Inkscape Due To Imagemagick Rebase" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1765330" id="1765330" title="Cve-2019-17540 Imagemagick: Heap-Based Buffer Overflow In Readpsinfo In Coders/Ps.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1767087" id="1767087" title="Cve-2019-17541 Imagemagick: Use After Free In Readiccprofile Function In Coders/Jpeg.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1767802" id="1767802" title="Cve-2019-15141 Imagemagick: Heap-Based Buffer Overflow In Writetiffimage In Coders/Tiff.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1767812" id="1767812" title="Cve-2019-15139 Imagemagick: Out-Of-Bounds Read In Readxwdimage In Coders/Xwd.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1767828" id="1767828" title="Cve-2019-15140 Imagemagick: Use After Free In Readmatimage In Coders/Mat.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1772643" id="1772643" title="Cve-2017-11166 Imagemagick: Memory Leak Vulnerability In Readxwdimage Function In Coders/Xwd.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1792480" id="1792480" title="Cve-2019-19949 Imagemagick: Heap-Based Buffer Over-Read In Writepngimage In Coders/Png.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1793177" id="1793177" title="Cve-2019-19948 Imagemagick: Heap-Based Buffer Overflow In Writesgiimage In Coders/Sgi.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1801661" id="1801661" title="Cve-2019-16709 Imagemagick: Memory Leak In Coders/Dps.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1801665" id="1801665" title="Cve-2019-16708 Imagemagick: Memory Leak In Magick/Xwindow.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1801667" id="1801667" title="Cve-2019-16710 Imagemagick: Memory Leak In Coders/Dot.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1801673" id="1801673" title="Cve-2019-16711 Imagemagick: Memory Leak In Huffman2Dencodeimage In Coders/Ps2.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1801674" id="1801674" title="Cve-2019-16712 Imagemagick: Memory Leak In Huffman2Dencodeimage In Coders/Ps3.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1801681" id="1801681" title="Cve-2019-16713 Imagemagick: Memory Leak In Coders/Dot.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1181-1</id><title>Unzip</title><description>* unzip: overlapping of files in ZIP container leads to denial of service</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="unzip" release="21.el7" src="unzip-6.0-21.el7.src.rpm" version="6.0"><filename>unzip-6.0-21.el7.x86_64.rpm</filename><sum type="sha256">85608f0bce38e465f7058134129737363e68a840e072c87d41aff7353c85b663</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13232" id="CVE-2019-13232" title="Cve-2019-13232" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1181" id="RHSA-2020:1181-1" title="Rhsa-2020:1181-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1727761" id="1727761" title="Cve-2019-13232 Unzip: Overlapping Of Files In Zip Container Leads To Denial Of Service" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1185-1</id><title>Libsndfile</title><description>* libsndfile: stack-based buffer overflow in sndfile-deinterleave utility</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libsndfile-devel" release="11.el7" src="libsndfile-1.0.25-11.el7.src.rpm" version="1.0.25"><filename>libsndfile-devel-1.0.25-11.el7.i686.rpm</filename><sum type="sha256">be75f2676006d3a8c300bc35ff848afc8ca19e0e1eaa1183e5d92b33169e85e7</sum></package><package arch="i686" name="libsndfile" release="11.el7" src="libsndfile-1.0.25-11.el7.src.rpm" version="1.0.25"><filename>libsndfile-1.0.25-11.el7.i686.rpm</filename><sum type="sha256">231ac4acb07be83ad83b3394627576d4d81548ee857ed12e565a8c867f0142ac</sum></package><package arch="x86_64" name="libsndfile-utils" release="11.el7" src="libsndfile-1.0.25-11.el7.src.rpm" version="1.0.25"><filename>libsndfile-utils-1.0.25-11.el7.x86_64.rpm</filename><sum type="sha256">0c2d38785cf7148085445b5e1c356bd52f8588af9a8e9c00f26bff4226ae4752</sum></package><package arch="x86_64" name="libsndfile-devel" release="11.el7" src="libsndfile-1.0.25-11.el7.src.rpm" version="1.0.25"><filename>libsndfile-devel-1.0.25-11.el7.x86_64.rpm</filename><sum type="sha256">a2b607673e71979c46bcf1b9472519e86a1a16e2c74cf08106ae952ab679d6c4</sum></package><package arch="x86_64" name="libsndfile" release="11.el7" src="libsndfile-1.0.25-11.el7.src.rpm" version="1.0.25"><filename>libsndfile-1.0.25-11.el7.x86_64.rpm</filename><sum type="sha256">2c5f6f55e792ef15a5b7eb7538ef0ed8df547c441027262b0ab01cc67d589d68</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13139" id="CVE-2018-13139" title="Cve-2018-13139" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1185" id="RHSA-2020:1185-1" title="Rhsa-2020:1185-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598480" id="1598480" title="Cve-2018-13139 Libsndfile: Stack-Based Buffer Overflow In Sndfile-Deinterleave Utility" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1189-1</id><title>Libqb</title><description>* libqb: Insecure treatment of IPC (temporary) files</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libqb-devel" release="9.el7" src="libqb-1.0.1-9.el7.src.rpm" version="1.0.1"><filename>libqb-devel-1.0.1-9.el7.i686.rpm</filename><sum type="sha256">9b33619c14e1f63e80faf6b2d1f426c5fa58c9fc0a00e73c7efa120079950de1</sum></package><package arch="x86_64" name="libqb-devel" release="9.el7" src="libqb-1.0.1-9.el7.src.rpm" version="1.0.1"><filename>libqb-devel-1.0.1-9.el7.x86_64.rpm</filename><sum type="sha256">63e69c4efe8b3b9370a1c8bc500d7365845ee7f1c5f758d3c711cc757a24bd92</sum></package><package arch="x86_64" name="libqb" release="9.el7" src="libqb-1.0.1-9.el7.src.rpm" version="1.0.1"><filename>libqb-1.0.1-9.el7.x86_64.rpm</filename><sum type="sha256">486fa1b7b12bc06a6a7f541133333811b94447de86d9bf9ed8d199b5b3c51dc3</sum></package><package arch="i686" name="libqb" release="9.el7" src="libqb-1.0.1-9.el7.src.rpm" version="1.0.1"><filename>libqb-1.0.1-9.el7.i686.rpm</filename><sum type="sha256">9eaee9004ed8df6b4cdcd22f6ffff5e07a819271ca0b4580c0018b1f6f5c8293</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12779" id="CVE-2019-12779" title="Cve-2019-12779" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1189" id="RHSA-2020:1189-1" title="Rhsa-2020:1189-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1695948" id="1695948" title="Cve-2019-12779 Libqb: Insecure Treatment Of Ipc (Temporary) Files" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1190-1</id><title>Libxml2</title><description>* libxml2: Use after free triggered by XPointer paths beginning with     range-to      * libxml2: Use after free in xmlXPathCompOpEvalPositionalPredicate()     function in xpath.c      * libxml2: DoS caused by incorrect error detection during XZ decompression      * libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in     xpath.c      * libxml2: Unrestricted memory usage in xz_head() function in xzlib.c      * libxml2: Infinite loop caused by incorrect error detection during LZMA     decompression</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libxml2-devel" release="6.el7.4" src="libxml2-2.9.1-6.el7.4.src.rpm" version="2.9.1"><filename>libxml2-devel-2.9.1-6.el7.4.i686.rpm</filename><sum type="sha256">5b42befd79706109e9fca556fbc5fce2e52404eaf68c7aa1b160ba101eefc93f</sum></package><package arch="i686" name="libxml2-static" release="6.el7.4" src="libxml2-2.9.1-6.el7.4.src.rpm" version="2.9.1"><filename>libxml2-static-2.9.1-6.el7.4.i686.rpm</filename><sum type="sha256">7f6ba7b20cb3a86460df5fa134b4aa5a4dd997ee975114d3f96ef114e8848ec1</sum></package><package arch="x86_64" name="libxml2-python" release="6.el7.4" src="libxml2-2.9.1-6.el7.4.src.rpm" version="2.9.1"><filename>libxml2-python-2.9.1-6.el7.4.x86_64.rpm</filename><sum type="sha256">9892a4e1fb126374c920016af6a88c1d1244206deb6a4f5171c1e27bc267c868</sum></package><package arch="i686" name="libxml2" release="6.el7.4" src="libxml2-2.9.1-6.el7.4.src.rpm" version="2.9.1"><filename>libxml2-2.9.1-6.el7.4.i686.rpm</filename><sum type="sha256">85a8c3a6ed6612c5a53ef09429cc33340bc1a17e1ae026cd46f1317234e10646</sum></package><package arch="x86_64" name="libxml2-static" release="6.el7.4" src="libxml2-2.9.1-6.el7.4.src.rpm" version="2.9.1"><filename>libxml2-static-2.9.1-6.el7.4.x86_64.rpm</filename><sum type="sha256">b740723f65c2626684bcc0acbf260cf6cac248deff05020282e837ed0adea15d</sum></package><package arch="x86_64" name="libxml2" release="6.el7.4" src="libxml2-2.9.1-6.el7.4.src.rpm" version="2.9.1"><filename>libxml2-2.9.1-6.el7.4.x86_64.rpm</filename><sum type="sha256">773e875478acbd66489226b4177c11040269c26cac13a12dfd4bcd607b26e45c</sum></package><package arch="x86_64" name="libxml2-devel" release="6.el7.4" src="libxml2-2.9.1-6.el7.4.src.rpm" version="2.9.1"><filename>libxml2-devel-2.9.1-6.el7.4.x86_64.rpm</filename><sum type="sha256">90b0f2c254bf1311fc753addef6e90b673f930810c12b56c783755983009d1b4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8035" id="CVE-2015-8035" title="Cve-2015-8035" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18258" id="CVE-2017-18258" title="Cve-2017-18258" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14404" id="CVE-2018-14404" title="Cve-2018-14404" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14567" id="CVE-2018-14567" title="Cve-2018-14567" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1190" id="RHSA-2020:1190-1" title="Rhsa-2020:1190-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1277146" id="1277146" title="Cve-2015-8035 Libxml2: Dos Caused By Incorrect Error Detection During Xz Decompression" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1358641" id="1358641" title="Chromium-Browser: Use-After-Free In Libxml" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1523128" id="1523128" title="Cve-2017-15412 Libxml2: Use After Free In Xmlxpathcompopevalpositionalpredicate() Function In Xpath.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1566749" id="1566749" title="Cve-2017-18258 Libxml2: Unrestricted Memory Usage In Xz_Head() Function In Xzlib.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1595985" id="1595985" title="Cve-2018-14404 Libxml2: Null Pointer Dereference In Xmlxpathcompopeval() Function In Xpath.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1619875" id="1619875" title="Cve-2018-14567 Libxml2: Infinite Loop Caused By Incorrect Error Detection During Lzma Decompression" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1208-1</id><title>Qemu-Kvm</title><description>* QEMU: Slirp: potential OOB access due to unsafe snprintf() usages</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-img" release="173.el7_8.1" src="qemu-kvm-1.5.3-173.el7_8.1.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-173.el7_8.1.x86_64.rpm</filename><sum type="sha256">f1f386968dae58c7e07d5bcbc4277a8a7d67f07b2f108834f2fdb4755e40684e</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="173.el7_8.1" src="qemu-kvm-1.5.3-173.el7_8.1.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-173.el7_8.1.x86_64.rpm</filename><sum type="sha256">b60771a97444f24c04eceaa47d0d8a7fece951440850f95a4d2326bf91c51a63</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="173.el7_8.1" src="qemu-kvm-1.5.3-173.el7_8.1.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-173.el7_8.1.x86_64.rpm</filename><sum type="sha256">ca31403c3cac507d0ee7ae6ef34332451a7ce09e6d3f33e9426db7aafae4d567</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="173.el7_8.1" src="qemu-kvm-1.5.3-173.el7_8.1.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-173.el7_8.1.x86_64.rpm</filename><sum type="sha256">5bd1383d8f4395a9e246490900007bfe3d7d57cb879a0e8c3d748d31cf788b7e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1208" id="RHSA-2020:1208-1" title="Rhsa-2020:1208-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1798453" id="1798453" title="Qemu: Slirp: Potential Oob Access Due To Unsafe Snprintf() Usages" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1334-1</id><title>Telnet</title><description>telnet-server: no bounds checks in nextitem() function allows to remotely     execute arbitrary code</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="telnet-server" release="65.el7_8" src="telnet-0.17-65.el7_8.src.rpm" version="0.17"><filename>telnet-server-0.17-65.el7_8.x86_64.rpm</filename><sum type="sha256">b9639924e1c258f6c87d9fe7d0b9baa870674e2a918bb2c68eeb67b93427bb8e</sum></package><package arch="x86_64" epoch="1" name="telnet" release="65.el7_8" src="telnet-0.17-65.el7_8.src.rpm" version="0.17"><filename>telnet-0.17-65.el7_8.x86_64.rpm</filename><sum type="sha256">609aae6d0869323d6faaa642adab306b9a6b0ea5ea60eb440d7fd2a0e4f5a865</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10188" id="CVE-2020-10188" title="Cve-2020-10188" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1334" id="RHSA-2020:1334-1" title="Rhsa-2020:1334-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1811673" id="1811673" title="Cve-2020-10188 Telnet-Server: No Bounds Checks In Nextitem() Function Allows To Remotely Execute Arbitrary Code" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1338-1</id><title>Firefox</title><description>* Mozilla: Use-after-free while running the nsDocShell destructor      * Mozilla: Use-after-free when handling a ReadableStream</description><severity>critical</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_8" src="firefox-68.6.1-1.el7_8.src.rpm" version="68.6.1"><filename>firefox-68.6.1-1.el7_8.i686.rpm</filename><sum type="sha256">01993ba3a72af6b78917dc5f00a91720fc89e982c7e28f2e7d02058f15e1867c</sum></package><package arch="x86_64" name="firefox" release="1.el7_8" src="firefox-68.6.1-1.el7_8.src.rpm" version="68.6.1"><filename>firefox-68.6.1-1.el7_8.x86_64.rpm</filename><sum type="sha256">8176a25e5e267f5a6b45265286ed42c223a8975b660a4942731d486aaa670ca8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6819" id="CVE-2020-6819" title="Cve-2020-6819" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6820" id="CVE-2020-6820" title="Cve-2020-6820" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1338" id="RHSA-2020:1338-1" title="Rhsa-2020:1338-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1820869" id="1820869" title="Cve-2020-6819 Mozilla: Use-After-Free While Running The Nsdocshell Destructor" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1820878" id="1820878" title="Cve-2020-6820 Mozilla: Use-After-Free When Handling A Readablestream" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1420-1</id><title>Firefox</title><description>This update upgrades Firefox to version 68.7.0 ESR. 
Security Fix(es): 
* Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method (CVE-2020-6821) 
* Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7 (CVE-2020-6825) 
* Mozilla: Out of bounds write in GMPDecodeData when processing large images (CVE-2020-6822)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="2.el7_8" src="firefox-68.7.0-2.el7_8.src.rpm" version="68.7.0"><filename>firefox-68.7.0-2.el7_8.x86_64.rpm</filename><sum type="sha256">1e5b267966f341537590d6654c97a355566964cdcf62bbc544e37277a5f55a3d</sum></package><package arch="i686" name="firefox" release="2.el7_8" src="firefox-68.7.0-2.el7_8.src.rpm" version="68.7.0"><filename>firefox-68.7.0-2.el7_8.i686.rpm</filename><sum type="sha256">853584adc4e08413c4606997e925c9851ddc2fd92a0a8dab4e5ad77e0833da42</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6821" id="CVE-2020-6821" title="Mozilla: Uninitialized Memory Could Be Read When Using The Webgl Copytexsubimage Method" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6822" id="CVE-2020-6822" title="Mozilla: Out Of Bounds Write In Gmpdecodedata When Processing Large Images" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6825" id="CVE-2020-6825" title="Mozilla: Memory Safety Bugs Fixed In Firefox 75 And Firefox Esr 68.7" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:1420" id="RHSA-2020:1420-1" title="Rhsa-2020:1420-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1821674" id="1821674" title="Mozilla: Uninitialized Memory Could Be Read When Using The Webgl Copytexsubimage Method" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1821676" id="1821676" title="Mozilla: Out Of Bounds Write In Gmpdecodedata When Processing Large Images" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1821682" id="1821682" title="Mozilla: Memory Safety Bugs Fixed In Firefox 75 And Firefox Esr 68.7" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1489-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Use-after-free while running the nsDocShell destructor (CVE-2020-6819) 
* Mozilla: Use-after-free when handling a ReadableStream (CVE-2020-6820) 
* Mozilla: Uninitialized memory could be read when using the WebGL copyTexSubImage method (CVE-2020-6821) 
* Mozilla: Memory safety bugs fixed in Firefox 75 and Firefox ESR 68.7 (CVE-2020-6825) 
* Mozilla: Out of bounds write in GMPDecodeData when processing large images (CVE-2020-6822)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_8" src="thunderbird-68.7.0-1.el7_8.src.rpm" version="68.7.0"><filename>thunderbird-68.7.0-1.el7_8.x86_64.rpm</filename><sum type="sha256">b8f86a931a0edd41a317cad1b77d524a69ded0be84ae61dcd2a67c03987d2479</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1489" id="RHSA-2020:1489-1" title="Rhsa-2020:1489-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1507-1</id><title>Java-1.7.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) (CVE-2020-2803) 
* OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) (CVE-2020-2805) 
* OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) (CVE-2020-2773) 
* OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) (CVE-2020-2781) 
* OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) (CVE-2020-2800) 
* OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) (CVE-2020-2830) 
* OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) (CVE-2020-2756) 
* OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) (CVE-2020-2757)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-04-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-devel" release="2.6.22.2.el7_8" src="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8.src.rpm" version="1.7.0.261"><filename>java-1.7.0-openjdk-devel-1.7.0.261-2.6.22.2.el7_8.x86_64.rpm</filename><sum type="sha256">56d6cedb4273d200fae0d2ba93880da162f5bcd45a64ec69130c645ee4948f86</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-demo" release="2.6.22.2.el7_8" src="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8.src.rpm" version="1.7.0.261"><filename>java-1.7.0-openjdk-demo-1.7.0.261-2.6.22.2.el7_8.x86_64.rpm</filename><sum type="sha256">ac2f7f749a3b29f0116e9d47abbed6f0dea039defb4dcb85da2ace29d70b2c40</sum></package><package arch="noarch" epoch="1" name="java-1.7.0-openjdk-javadoc" release="2.6.22.2.el7_8" src="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8.src.rpm" version="1.7.0.261"><filename>java-1.7.0-openjdk-javadoc-1.7.0.261-2.6.22.2.el7_8.noarch.rpm</filename><sum type="sha256">d361f061477aaffb7f8aecf0ca6237dfa87fee152f38c9871ce18fc8e4fd4a76</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-src" release="2.6.22.2.el7_8" src="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8.src.rpm" version="1.7.0.261"><filename>java-1.7.0-openjdk-src-1.7.0.261-2.6.22.2.el7_8.x86_64.rpm</filename><sum type="sha256">c3070a4b2e6170f01d179917f2436d1c415354c2df70ffb7760de5f5b34de193</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-accessibility" release="2.6.22.2.el7_8" src="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8.src.rpm" version="1.7.0.261"><filename>java-1.7.0-openjdk-accessibility-1.7.0.261-2.6.22.2.el7_8.x86_64.rpm</filename><sum type="sha256">c252a80290bfa8e59fb5a01a0b48892a6e7d8baccea833e3b27b42b34838d0e8</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk" release="2.6.22.2.el7_8" src="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8.src.rpm" version="1.7.0.261"><filename>java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8.x86_64.rpm</filename><sum type="sha256">5cfb6e9f434aee2d625bea0fc6ac25db12ef77e8086b525a79db06596697f987</sum></package><package arch="x86_64" epoch="1" name="java-1.7.0-openjdk-headless" release="2.6.22.2.el7_8" src="java-1.7.0-openjdk-1.7.0.261-2.6.22.2.el7_8.src.rpm" version="1.7.0.261"><filename>java-1.7.0-openjdk-headless-1.7.0.261-2.6.22.2.el7_8.x86_64.rpm</filename><sum type="sha256">b7cf63289d514e300887eedcdd5b8a48c71e261b5013ef4d929547265f67ead3</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1507" id="RHSA-2020:1507-1" title="Rhsa-2020:1507-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1509-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) (CVE-2020-2803) 
* OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) (CVE-2020-2805) 
* OpenJDK: Application data accepted before TLS handshake completion (JSSE, 8235691) (CVE-2020-2816) 
* OpenJDK: Incorrect handling of Certificate messages during TLS handshake (JSSE, 8232581) (CVE-2020-2767) 
* OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) (CVE-2020-2773) 
* OpenJDK: Incomplete enforcement of algorithm restrictions for TLS (JSSE, 8232424) (CVE-2020-2778) 
* OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) (CVE-2020-2781) 
* OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) (CVE-2020-2800) 
* OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) (CVE-2020-2830) 
* OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898) (CVE-2020-2754) 
* OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904) (CVE-2020-2755) 
* OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) (CVE-2020-2756) 
* OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) (CVE-2020-2757)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-04-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-11.0.7.10-4.el7_8.x86_64.rpm</filename><sum type="sha256">78e63a6d891b057dad896a66da4245e6781ea1cea7e859919d778e28da5771dd</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-demo-11.0.7.10-4.el7_8.x86_64.rpm</filename><sum type="sha256">3809dfed8a3345dc8aae1a35a90eb4d9c358531bbdf2caa4efa7222021dbc5f9</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-demo-debug-11.0.7.10-4.el7_8.i686.rpm</filename><sum type="sha256">50643e76eae1edf0aae04793221ffebc353e7e68bcd342ad090ad7e898bf0ed5</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-src-11.0.7.10-4.el7_8.x86_64.rpm</filename><sum type="sha256">ab85871e725c2fd2794fb839d720c236d4f02f9d07e2cf5034b5a99f889725a4</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-demo-11.0.7.10-4.el7_8.i686.rpm</filename><sum type="sha256">20848af99256c249e985b483406886a5bda510dc6256a381b8d83fbb6b5df261</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-debug-11.0.7.10-4.el7_8.x86_64.rpm</filename><sum type="sha256">876afc21a0f727a737e927b7eb3e869d70965e2b64653b6936ec278788165d81</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-src-debug-11.0.7.10-4.el7_8.i686.rpm</filename><sum type="sha256">e92fcf0d0943f66468e339bbcccde7fcd7d1dc12ea44bad3978308615b0ef272</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-javadoc-zip-debug-11.0.7.10-4.el7_8.i686.rpm</filename><sum type="sha256">db14c224be2d2203f62c459b0079ac7fb497fb2cf81f7aca979caf909b9ed6d4</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8.x86_64.rpm</filename><sum type="sha256">2fb46205c9f9f87f07bd7a7f72f6f5939fccaee14528d392b98eafb4c93bb74b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-devel-11.0.7.10-4.el7_8.x86_64.rpm</filename><sum type="sha256">aeb453576033f9281bdaddf05fa93871b0f0d938dcf55eeae9629f08ca53b256</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-javadoc-debug-11.0.7.10-4.el7_8.x86_64.rpm</filename><sum type="sha256">9a3d798dbd225407f84649e581ea80177710c856fe509234f6422464132262c3</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-headless-11.0.7.10-4.el7_8.i686.rpm</filename><sum type="sha256">75e4f9b7103000b896c85b822ae894639fca70458a6fd1c5c495cd1f7e01cbe7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-headless-debug-11.0.7.10-4.el7_8.x86_64.rpm</filename><sum type="sha256">3156a26c2ecf50f0811db32f47b020653546009e2b15ad6599c3fba21380ceb0</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-debug-11.0.7.10-4.el7_8.i686.rpm</filename><sum type="sha256">7344e10823cc2328323fc34f45567ea27a4aa55584352d21227d0a93c9560e16</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-javadoc-11.0.7.10-4.el7_8.x86_64.rpm</filename><sum type="sha256">524bcef4b6fca48fcc056dd98ba9c888d4d3c5e10d70229bf87f4cae5abf224d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-javadoc-11.0.7.10-4.el7_8.i686.rpm</filename><sum type="sha256">baeec652fd2ea7bfadb392612b81abf1c931713463077f5eebf0b1ffd5f0a725</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-11.0.7.10-4.el7_8.i686.rpm</filename><sum type="sha256">1f813c60a4cebd2c4b1b04937c4cc6a07c5f828b3cfd63c8b508e7bb4dccd01e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-jmods-debug-11.0.7.10-4.el7_8.x86_64.rpm</filename><sum type="sha256">853150e0df8a322126bbdb0683158d05ffdd627fa8eac41851ba3dbada1fc086</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-devel-debug-11.0.7.10-4.el7_8.i686.rpm</filename><sum type="sha256">1ce89b6a7a64bde744c1b40869cc8d12ea59637099963b9aa0a50a1eac2efbfa</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-jmods-11.0.7.10-4.el7_8.i686.rpm</filename><sum type="sha256">0e499905360df088f13d6ff980e6215870b08d467a3468d97d84afe44114388e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-devel-11.0.7.10-4.el7_8.i686.rpm</filename><sum type="sha256">49d6cec33de6e7383fde799957928dc07b222d123336e65f880140a88b1c5ee4</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-src-debug-11.0.7.10-4.el7_8.x86_64.rpm</filename><sum type="sha256">bccd7888a55d0c8c551842891199166bf600732200a61eb575fafd11108e4dbb</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-jmods-11.0.7.10-4.el7_8.x86_64.rpm</filename><sum type="sha256">61b07ea180ad2fae0b002370febad2a8c1ecd3495d86c7d7cecd4e9ede421370</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-jmods-debug-11.0.7.10-4.el7_8.i686.rpm</filename><sum type="sha256">f455324da739f14b5585a1f1352b376f4fcab462ada2fa8f5e0cc9728d5a63b0</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-headless-11.0.7.10-4.el7_8.x86_64.rpm</filename><sum type="sha256">72f973c0cb28b0053904bc3e637af7b568eb617fcf8ca39d4389fa5bc2da99a1</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-headless-debug-11.0.7.10-4.el7_8.i686.rpm</filename><sum type="sha256">d52887605c8a0c62c9d74942269d4f765ba1b7ecf4cc856914fecdda6682fbf8</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-devel-debug-11.0.7.10-4.el7_8.x86_64.rpm</filename><sum type="sha256">ceaaf361e555f7cffab53ce57487a29edd3685ea826ff6b457951c3c8909d21f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-demo-debug-11.0.7.10-4.el7_8.x86_64.rpm</filename><sum type="sha256">024b6a02ae009d3a837670275b2e6e8b0d9da78a2f12cdd00991d7344995820e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-javadoc-zip-11.0.7.10-4.el7_8.i686.rpm</filename><sum type="sha256">5cec9a806eb7be609b4c88de76862c196822a386d5277819b2985c71136a6be4</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-src-11.0.7.10-4.el7_8.i686.rpm</filename><sum type="sha256">49c77300e0c16c1064fcc94f9c51ba34bd31cbde03dbe2002495463b8b0e668f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-javadoc-debug-11.0.7.10-4.el7_8.i686.rpm</filename><sum type="sha256">1a6f1ed433b9aeec0b68e852d084b9091e89a67b17a73eb2715ed673bec46a62</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="4.el7_8" src="java-11-openjdk-11.0.7.10-4.el7_8.src.rpm" version="11.0.7.10"><filename>java-11-openjdk-javadoc-zip-debug-11.0.7.10-4.el7_8.x86_64.rpm</filename><sum type="sha256">a21441a347e279862e253138a5afe664c4f1a7accae09fe8b4d3290dc0b416d8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1509" id="RHSA-2020:1509-1" title="Rhsa-2020:1509-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1511-1</id><title>Git</title><description>Security Fix(es): 
* git: Crafted URL containing new lines can cause credential leak (CVE-2020-5260)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-04-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="perl-Git" release="22.el7_8" src="git-1.8.3.1-22.el7_8.src.rpm" version="1.8.3.1"><filename>perl-Git-1.8.3.1-22.el7_8.noarch.rpm</filename><sum type="sha256">8c1ad66b18ccfa7bcdc5656c6744c0043e7e2106102889b6b2e206ad53232e45</sum></package><package arch="noarch" name="git-hg" release="22.el7_8" src="git-1.8.3.1-22.el7_8.src.rpm" version="1.8.3.1"><filename>git-hg-1.8.3.1-22.el7_8.noarch.rpm</filename><sum type="sha256">1ae90a2a5f3ce55dc018e0fa4b3f8fd38b7c675152398906fe3a8130aad68948</sum></package><package arch="noarch" name="git-email" release="22.el7_8" src="git-1.8.3.1-22.el7_8.src.rpm" version="1.8.3.1"><filename>git-email-1.8.3.1-22.el7_8.noarch.rpm</filename><sum type="sha256">a5b4a83030845c35d4693f77d07d2026eca4e41a4376c56ea1371ff64061814b</sum></package><package arch="noarch" name="git-p4" release="22.el7_8" src="git-1.8.3.1-22.el7_8.src.rpm" version="1.8.3.1"><filename>git-p4-1.8.3.1-22.el7_8.noarch.rpm</filename><sum type="sha256">d1e0b2702173d87a77d6474d7a29dd492c1049bdc90b22595d02cb91f57301ea</sum></package><package arch="x86_64" name="git-gnome-keyring" release="22.el7_8" src="git-1.8.3.1-22.el7_8.src.rpm" version="1.8.3.1"><filename>git-gnome-keyring-1.8.3.1-22.el7_8.x86_64.rpm</filename><sum type="sha256">476b74790af0848bef3a905d5ba4defdfaaa62c6e0bbb08fe151c15bc378b15a</sum></package><package arch="noarch" name="git-cvs" release="22.el7_8" src="git-1.8.3.1-22.el7_8.src.rpm" version="1.8.3.1"><filename>git-cvs-1.8.3.1-22.el7_8.noarch.rpm</filename><sum type="sha256">e20feec6bda667f900b2225c696388a5445009db93d414a688b55d32f3f99ed3</sum></package><package arch="noarch" name="emacs-git" release="22.el7_8" src="git-1.8.3.1-22.el7_8.src.rpm" version="1.8.3.1"><filename>emacs-git-1.8.3.1-22.el7_8.noarch.rpm</filename><sum type="sha256">4e2ce4c9685c44b01c1055437eb1bcfd57c3348546cdc0d44416a438181b5b74</sum></package><package arch="noarch" name="git-gui" release="22.el7_8" src="git-1.8.3.1-22.el7_8.src.rpm" version="1.8.3.1"><filename>git-gui-1.8.3.1-22.el7_8.noarch.rpm</filename><sum type="sha256">0786e633a3b9de657dcd58b68cfbf285677b4c3f223dc96dc50c47389eedf7a6</sum></package><package arch="noarch" name="gitweb" release="22.el7_8" src="git-1.8.3.1-22.el7_8.src.rpm" version="1.8.3.1"><filename>gitweb-1.8.3.1-22.el7_8.noarch.rpm</filename><sum type="sha256">56bb9ba6d3b9542357ba50380aa4d88f25abb117167394abea0e7fd0bf12654c</sum></package><package arch="noarch" name="gitk" release="22.el7_8" src="git-1.8.3.1-22.el7_8.src.rpm" version="1.8.3.1"><filename>gitk-1.8.3.1-22.el7_8.noarch.rpm</filename><sum type="sha256">ec37c467486a230d4b51a41d8f60f264296ee071d069061ff521f63c52ab7bb6</sum></package><package arch="noarch" name="perl-Git-SVN" release="22.el7_8" src="git-1.8.3.1-22.el7_8.src.rpm" version="1.8.3.1"><filename>perl-Git-SVN-1.8.3.1-22.el7_8.noarch.rpm</filename><sum type="sha256">3e706b4684ab9c75b2090165e8bd6653d6a0e8b76b2e605f53dc69dfb8c04b35</sum></package><package arch="x86_64" name="git-daemon" release="22.el7_8" src="git-1.8.3.1-22.el7_8.src.rpm" version="1.8.3.1"><filename>git-daemon-1.8.3.1-22.el7_8.x86_64.rpm</filename><sum type="sha256">13c3a7b8c3fc840899e2b35680ea35d3852180234881d871c5a0ba30c0e0c478</sum></package><package arch="noarch" name="git-bzr" release="22.el7_8" src="git-1.8.3.1-22.el7_8.src.rpm" version="1.8.3.1"><filename>git-bzr-1.8.3.1-22.el7_8.noarch.rpm</filename><sum type="sha256">71c610f7280e06790462c689915bd2fe7739aa853de4a6b09972fa944d4d4e26</sum></package><package arch="x86_64" name="git-svn" release="22.el7_8" src="git-1.8.3.1-22.el7_8.src.rpm" version="1.8.3.1"><filename>git-svn-1.8.3.1-22.el7_8.x86_64.rpm</filename><sum type="sha256">b2bace95a1f2240aadffa64fd700499a3b592a63fe9432df409c8c6908bbbaae</sum></package><package arch="noarch" name="git-instaweb" release="22.el7_8" src="git-1.8.3.1-22.el7_8.src.rpm" version="1.8.3.1"><filename>git-instaweb-1.8.3.1-22.el7_8.noarch.rpm</filename><sum type="sha256">8872bb46393c28d37f5795e35497c138f8e6231b2f024353b57b396bd78f3778</sum></package><package arch="x86_64" name="git" release="22.el7_8" src="git-1.8.3.1-22.el7_8.src.rpm" version="1.8.3.1"><filename>git-1.8.3.1-22.el7_8.x86_64.rpm</filename><sum type="sha256">67959abfbaa88629e264578caf6b0c4a1ae273603c2b77299b18e22f4a9e4761</sum></package><package arch="noarch" name="emacs-git-el" release="22.el7_8" src="git-1.8.3.1-22.el7_8.src.rpm" version="1.8.3.1"><filename>emacs-git-el-1.8.3.1-22.el7_8.noarch.rpm</filename><sum type="sha256">35a71d11c1e5246619c1a7a5c805270b317d025f7f11ace3eec1afe4d7982ce5</sum></package><package arch="noarch" name="git-all" release="22.el7_8" src="git-1.8.3.1-22.el7_8.src.rpm" version="1.8.3.1"><filename>git-all-1.8.3.1-22.el7_8.noarch.rpm</filename><sum type="sha256">8ffa81715af249e1303e3176eb2a0a1a4b85aadf1e23855d7c73b8120da07576</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1511" id="RHSA-2020:1511-1" title="Rhsa-2020:1511-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1512-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) (CVE-2020-2803) 
* OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) (CVE-2020-2805) 
* OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) (CVE-2020-2773) 
* OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) (CVE-2020-2781) 
* OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) (CVE-2020-2800) 
* OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) (CVE-2020-2830) 
* OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898) (CVE-2020-2754) 
* OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904) (CVE-2020-2755) 
* OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) (CVE-2020-2756) 
* OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) (CVE-2020-2757)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-04-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-accessibility-1.8.0.252.b09-2.el7_8.x86_64.rpm</filename><sum type="sha256">1069141af62491f1a021cf79fbf46e8724c41e4bbdc73ac940c71050ce435292</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el7_8.i686.rpm</filename><sum type="sha256">7f4a7605aa00e05b5ef57522afd7adfd6d1d0d2f82d6dedef78e8703536fb081</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.252.b09-2.el7_8.noarch.rpm</filename><sum type="sha256">efea41c24e51fc6b4ffd6913f428438ab77058a4f2b92f614d7c85158a564341</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-devel-1.8.0.252.b09-2.el7_8.x86_64.rpm</filename><sum type="sha256">436ed40f59b987fc9f1537cc8faa715c07befb2ca24d71559b67ed886bd5c786</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.252.b09-2.el7_8.noarch.rpm</filename><sum type="sha256">daa5e33d513dd54ceb036b8b4a702c9f37dca5d33aec6802a5903a376dca92cd</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-debug-1.8.0.252.b09-2.el7_8.i686.rpm</filename><sum type="sha256">b8692f5b5fa33f8e07a00b393a7181e1191b25b0a6edc76596d7eaba528e87f2</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-debug-1.8.0.252.b09-2.el7_8.x86_64.rpm</filename><sum type="sha256">8b4c0d19fe598c8f930b4bf9eb0c7c80f047e0a41c7c980edb4bf82bcd093cb3</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.252.b09-2.el7_8.x86_64.rpm</filename><sum type="sha256">67ef968322d2949443729d7bf2c18297d4a54ada2c5903f7cec70cbf33181746</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.252.b09-2.el7_8.x86_64.rpm</filename><sum type="sha256">397cc5fbf2499dc2f1ca13de3d240a860d08dc4b430ab6bcbe09f6a36aeca9d5</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.i686.rpm</filename><sum type="sha256">350db7c8ce15487c58aad33192d0d21b135b6939aa2f27437dba653a01547229</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.252.b09-2.el7_8.x86_64.rpm</filename><sum type="sha256">bd24c2c842814ba5c79abb989c4e1a6a680648450bf07791ec78cc4d56971448</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.252.b09-2.el7_8.i686.rpm</filename><sum type="sha256">76dd4d34e289c0d4a001dc741dd689d8a9371ee9c074e06d2fd2946d38ec4743</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.252.b09-2.el7_8.noarch.rpm</filename><sum type="sha256">350c196bf4c5dcc0fc3384c42e1cdfe5c2235f90c98ab0255a578c0ec1bc3e8f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.252.b09-2.el7_8.i686.rpm</filename><sum type="sha256">381a40a7b6dca26c2e31afced75f71524ad1ed734a14dbee58313deccdb13b2a</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-accessibility-1.8.0.252.b09-2.el7_8.i686.rpm</filename><sum type="sha256">8bc5da3d2b4bcbd255775cb9dda1ed49d33d688f541b97496a237a5cdc395bd3</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.x86_64.rpm</filename><sum type="sha256">b8c62dcff7d47d204a047f0b5a52bb2805bf42ab776d9e870eec3ce6a186e4d3</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-src-1.8.0.252.b09-2.el7_8.i686.rpm</filename><sum type="sha256">6898f10477b6d40c18931b7508897915b790800419b2d28dd9b73a817d6a046a</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.252.b09-2.el7_8.i686.rpm</filename><sum type="sha256">c365ec1768b4ebf48cdb466a39c169afc720741e7905853d1ea74ef79642e0e8</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el7_8.i686.rpm</filename><sum type="sha256">eefcb409662d3e530f8fe67a18b65cb211181c581c396fe3264160611d5cf534</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.252.b09-2.el7_8.i686.rpm</filename><sum type="sha256">4fdd4e3f37596045a104194d90e3fb4f58555acf61eefcb2740350b9c3a862d9</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.252.b09-2.el7_8.x86_64.rpm</filename><sum type="sha256">060938775abcbab4e0d34d439f1d54d29e0e4e078cb820685d183fd72944cd24</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-src-debug-1.8.0.252.b09-2.el7_8.x86_64.rpm</filename><sum type="sha256">c38370deee5569f096495c5555c0d0b73f5fe86faafa355c4a718b49687b2633</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-src-debug-1.8.0.252.b09-2.el7_8.i686.rpm</filename><sum type="sha256">8b0d08202104cec64552d36769514d7f5bda544dc4fd94b07d42d787783753a6</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-headless-1.8.0.252.b09-2.el7_8.i686.rpm</filename><sum type="sha256">32dde1f75ff0d154e0f7d379ea57a09dc0ff8fc8c08b418dbdc888bf17e33165</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-demo-1.8.0.252.b09-2.el7_8.x86_64.rpm</filename><sum type="sha256">2a79b6e90d600c913f8b6831b56fa3d5b6281828856c63c6af1c005353daaf34</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-src-1.8.0.252.b09-2.el7_8.x86_64.rpm</filename><sum type="sha256">7c65a3d8c9e61685fe41b82e56f99cb8397986028148c8081dcc769ef3851a1c</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-javadoc-1.8.0.252.b09-2.el7_8.noarch.rpm</filename><sum type="sha256">6e5ca39f62145c96c5f75be1cd2e6bb3c81557923ab8a60f5b020b88d038481b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="2.el7_8" src="java-1.8.0-openjdk-1.8.0.252.b09-2.el7_8.src.rpm" version="1.8.0.252.b09"><filename>java-1.8.0-openjdk-headless-1.8.0.252.b09-2.el7_8.x86_64.rpm</filename><sum type="sha256">ed48285098be9426b6c74dcdaf01573aa9dfd511405386705744f07c1860ac89</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1512" id="RHSA-2020:1512-1" title="Rhsa-2020:1512-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:1561-1</id><title>Python-Twisted-Web</title><description>Security Fix(es): 
* python-twisted: HTTP request smuggling when presented with two Content-Length headers (CVE-2020-10108) 
* python-twisted: HTTP request smuggling when presented with a Content-Length and a chunked Transfer-Encoding header (CVE-2020-10109)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-04-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-twisted-web" release="7.el7_8" src="python-twisted-web-12.1.0-7.el7_8.src.rpm" version="12.1.0"><filename>python-twisted-web-12.1.0-7.el7_8.x86_64.rpm</filename><sum type="sha256">db3aa75c0081fdc7fe5f6e93bb2228a194a7bbaba5020869dc5670326ac4ad18</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:1561" id="RHSA-2020:1561-1" title="Rhsa-2020:1561-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2037-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Use-after-free during worker shutdown (CVE-2020-12387) 
* Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 (CVE-2020-12395) 
* Mozilla: Buffer overflow in SCTP chunk input validation (CVE-2020-6831) 
* Mozilla: Arbitrary local file access with 'Copy as cURL' (CVE-2020-12392)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2020-05-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_8" src="firefox-68.8.0-1.el7_8.src.rpm" version="68.8.0"><filename>firefox-68.8.0-1.el7_8.x86_64.rpm</filename><sum type="sha256">d8d41c0b72aad0a8ad8da51a43a042dfd4e76df4405ef442db0db5451466b2f8</sum></package><package arch="i686" name="firefox" release="1.el7_8" src="firefox-68.8.0-1.el7_8.src.rpm" version="68.8.0"><filename>firefox-68.8.0-1.el7_8.i686.rpm</filename><sum type="sha256">aa427e2246d1f439484a1d6c89dc37bd65a6aeb54286995ed310663a8963dcf2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2037" id="RHSA-2020:2037-1" title="Rhsa-2020:2037-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2040-1</id><title>Squid</title><description>Security Fix(es): 
* squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow (CVE-2019-12519) 
* squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution (CVE-2020-11945) 
* squid: parsing of header Proxy-Authentication leads to memory corruption (CVE-2019-12525)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-05-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="squid-migration-script" release="15.el7_8.1" src="squid-3.5.20-15.el7_8.1.src.rpm" version="3.5.20"><filename>squid-migration-script-3.5.20-15.el7_8.1.x86_64.rpm</filename><sum type="sha256">e48a229cb920a5df8c1185b05641598a74c1890fab92862bbf07a7d3a7adb506</sum></package><package arch="x86_64" epoch="7" name="squid" release="15.el7_8.1" src="squid-3.5.20-15.el7_8.1.src.rpm" version="3.5.20"><filename>squid-3.5.20-15.el7_8.1.x86_64.rpm</filename><sum type="sha256">2c851b785f68bb2782b17e95f33e52e09dd4908ea53dc680eaf9f14c9e4c768a</sum></package><package arch="x86_64" epoch="7" name="squid-sysvinit" release="15.el7_8.1" src="squid-3.5.20-15.el7_8.1.src.rpm" version="3.5.20"><filename>squid-sysvinit-3.5.20-15.el7_8.1.x86_64.rpm</filename><sum type="sha256">3f78238d5cfad3ec426387a41f248bd8736f8061e3db21903f10d45dcad68d68</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2040" id="RHSA-2020:2040-1" title="Rhsa-2020:2040-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2050-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Use-after-free during worker shutdown (CVE-2020-12387) 
* Mozilla: Memory safety bugs fixed in Firefox 76 and Firefox ESR 68.8 (CVE-2020-12395) 
* usrsctp: Buffer overflow in AUTH chunk input validation (CVE-2020-6831) 
* Mozilla: Arbitrary local file access with 'Copy as cURL' (CVE-2020-12392) 
* Mozilla: Sender Email Address Spoofing using encoded Unicode characters (CVE-2020-12397)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2020-05-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_8" src="thunderbird-68.8.0-1.el7_8.src.rpm" version="68.8.0"><filename>thunderbird-68.8.0-1.el7_8.x86_64.rpm</filename><sum type="sha256">df4fff2e0e48eaac06f00aa8f68c9c88e5b9099b0faafc14bfb33150cdbecd50</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2050" id="RHSA-2020:2050-1" title="Rhsa-2020:2050-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2068-1</id><title>Python-Pip</title><description>Security Fix(es): 
* python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) 
* python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) 
* python-urllib3: Certification mishandle when error should be thrown (CVE-2019-11324) 
* python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-06-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python3-pip" release="7.el7_8" src="python-pip-9.0.3-7.el7_8.src.rpm" version="9.0.3"><filename>python3-pip-9.0.3-7.el7_8.noarch.rpm</filename><sum type="sha256">820454d2e9444926b53f576c8ec461bf7fe8510af46c99782ba7c7b72ada90ce</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2068" id="RHSA-2020:2068-1" title="Rhsa-2020:2068-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2081-1</id><title>Python-Virtualenv</title><description>Security Fix(es): 
* python-urllib3: Cross-host redirect does not remove Authorization header allow for credential exposure (CVE-2018-20060) 
* python-urllib3: CRLF injection due to not encoding the '\r\n' sequence leading to possible attack on internal service (CVE-2019-11236) 
* python-requests: Redirect from HTTPS to HTTP does not remove Authorization header (CVE-2018-18074)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-06-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-virtualenv" release="4.el7_8" src="python-virtualenv-15.1.0-4.el7_8.src.rpm" version="15.1.0"><filename>python-virtualenv-15.1.0-4.el7_8.noarch.rpm</filename><sum type="sha256">91df44f1cf0fc7bd093fecfb3046aba54dda019317d2354a0b8b44c11824a0ec</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2081" id="RHSA-2020:2081-1" title="Rhsa-2020:2081-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2082-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c (CVE-2017-18595) 
* kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c (CVE-2019-19768) 
* Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic (CVE-2020-10711)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-05-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="perf" release="1127.8.2.el7" src="kernel-3.10.0-1127.8.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1127.8.2.el7.x86_64.rpm</filename><sum type="sha256">a615a5d374a43e51fb57d2e39fd6bd3635458425f8883634b06f01fc56cafb31</sum></package><package arch="x86_64" name="kernel-debug" release="1127.8.2.el7" src="kernel-3.10.0-1127.8.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1127.8.2.el7.x86_64.rpm</filename><sum type="sha256">e9d206fe6d585fb3da067b10ac17f7bf1272d74b2fea657c022f9d517cf81fe6</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1127.8.2.el7" src="kernel-3.10.0-1127.8.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1127.8.2.el7.x86_64.rpm</filename><sum type="sha256">b6950f0e9d60e8daf11cc0471bc03dc41ff90a3dea25da467ff3eb8f180d3d13</sum></package><package arch="x86_64" name="kernel-devel" release="1127.8.2.el7" src="kernel-3.10.0-1127.8.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1127.8.2.el7.x86_64.rpm</filename><sum type="sha256">1c99f69d2e920b2f72f2cc9ee5a577f1d16d1b1f6e0de0f4dfeb2bedd5fd6879</sum></package><package arch="x86_64" name="bpftool" release="1127.8.2.el7" src="kernel-3.10.0-1127.8.2.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1127.8.2.el7.x86_64.rpm</filename><sum type="sha256">6580c5b3853e8f2d2af589894e884ba564777be228337acbbe63bd3f971935dc</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1127.8.2.el7" src="kernel-3.10.0-1127.8.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1127.8.2.el7.x86_64.rpm</filename><sum type="sha256">fbca904b670a1b581572ea3b7ec94d33080d501a8abc6fcea7db01f002ddcce1</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1127.8.2.el7" src="kernel-3.10.0-1127.8.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1127.8.2.el7.x86_64.rpm</filename><sum type="sha256">da3321490968b1636bd4a30f980f7ad7609ab005c3e047a31cf86c7cf5e66792</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1127.8.2.el7" src="kernel-3.10.0-1127.8.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1127.8.2.el7.noarch.rpm</filename><sum type="sha256">3847d3dd6328593f8f438e4a6d63df714c1b3742dddeaacc57da3f7debad08c2</sum></package><package arch="x86_64" name="kernel-headers" release="1127.8.2.el7" src="kernel-3.10.0-1127.8.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1127.8.2.el7.x86_64.rpm</filename><sum type="sha256">87755f06f96f52401c96eb6407ccda21828cd0c2cdefc106dddace5a1856ab06</sum></package><package arch="x86_64" name="python-perf" release="1127.8.2.el7" src="kernel-3.10.0-1127.8.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1127.8.2.el7.x86_64.rpm</filename><sum type="sha256">bade20520df0a6debd0c02835e3417b6bb11de4b7b2144b5968e1508a9163d2e</sum></package><package arch="x86_64" name="kernel-tools" release="1127.8.2.el7" src="kernel-3.10.0-1127.8.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1127.8.2.el7.x86_64.rpm</filename><sum type="sha256">c2d6dbc5fba50c460519d994bb9473a6da99297413ed758b471c4662809cd81b</sum></package><package arch="noarch" name="kernel-doc" release="1127.8.2.el7" src="kernel-3.10.0-1127.8.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1127.8.2.el7.noarch.rpm</filename><sum type="sha256">4e5fa4ac78f4f2e6fb3318f0966f810994fd488ad714828a6b430da15ceeddfa</sum></package><package arch="x86_64" name="kernel" release="1127.8.2.el7" src="kernel-3.10.0-1127.8.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1127.8.2.el7.x86_64.rpm</filename><sum type="sha256">37d3e1c3a515452ae61717af7c2463e12466099ca8b8ef47a9b4969b7be0e244</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2082" id="RHSA-2020:2082-1" title="Rhsa-2020:2082-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2334-1</id><title>Freerdp</title><description>Security Fix(es): 
* freerdp: Out-of-bounds write in planar.c (CVE-2020-11521) 
* freerdp: Integer overflow in region.c (CVE-2020-11523) 
* freerdp: Out-of-bounds write in interleaved.c (CVE-2020-11524)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-06-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="freerdp" release="4.rc4.el7_8" src="freerdp-2.0.0-4.rc4.el7_8.src.rpm" version="2.0.0"><filename>freerdp-2.0.0-4.rc4.el7_8.x86_64.rpm</filename><sum type="sha256">791d36c8dc6db5b52ee3e517cb072f983477ad30785fd7e990f4b8239da4b9e6</sum></package><package arch="x86_64" name="freerdp-libs" release="4.rc4.el7_8" src="freerdp-2.0.0-4.rc4.el7_8.src.rpm" version="2.0.0"><filename>freerdp-libs-2.0.0-4.rc4.el7_8.x86_64.rpm</filename><sum type="sha256">fd62a93230b38a0518bbfea1b6f9b6cda7503a05f10ee41891f77351d8947c06</sum></package><package arch="i686" name="freerdp-devel" release="4.rc4.el7_8" src="freerdp-2.0.0-4.rc4.el7_8.src.rpm" version="2.0.0"><filename>freerdp-devel-2.0.0-4.rc4.el7_8.i686.rpm</filename><sum type="sha256">584707a19ce635e2eb24ca3dac5bd44a1e5b9bf130705922bb6b8f9012f1d326</sum></package><package arch="x86_64" name="libwinpr-devel" release="4.rc4.el7_8" src="freerdp-2.0.0-4.rc4.el7_8.src.rpm" version="2.0.0"><filename>libwinpr-devel-2.0.0-4.rc4.el7_8.x86_64.rpm</filename><sum type="sha256">2757b56c550b71bd702dbe896b7b307303ff2bc0ee46aa16bdbb037b3579c1df</sum></package><package arch="x86_64" name="libwinpr" release="4.rc4.el7_8" src="freerdp-2.0.0-4.rc4.el7_8.src.rpm" version="2.0.0"><filename>libwinpr-2.0.0-4.rc4.el7_8.x86_64.rpm</filename><sum type="sha256">396f79278b4fc772d3a5e5f9edab779e3c4811c153572bb72bcaa9b001e4ec67</sum></package><package arch="i686" name="libwinpr" release="4.rc4.el7_8" src="freerdp-2.0.0-4.rc4.el7_8.src.rpm" version="2.0.0"><filename>libwinpr-2.0.0-4.rc4.el7_8.i686.rpm</filename><sum type="sha256">7256febcc91b39f536ed215dfc8d7eeb44d6e9dc375ddc9236c98686348a4f08</sum></package><package arch="i686" name="libwinpr-devel" release="4.rc4.el7_8" src="freerdp-2.0.0-4.rc4.el7_8.src.rpm" version="2.0.0"><filename>libwinpr-devel-2.0.0-4.rc4.el7_8.i686.rpm</filename><sum type="sha256">84f88e9442ee196a88bddbc4b113ada765f7baafb290c18d0921cb7da57f2d33</sum></package><package arch="i686" name="freerdp-libs" release="4.rc4.el7_8" src="freerdp-2.0.0-4.rc4.el7_8.src.rpm" version="2.0.0"><filename>freerdp-libs-2.0.0-4.rc4.el7_8.i686.rpm</filename><sum type="sha256">030f3031e662efad0b0dceba551900e45bf888a4e830c0a0cb5a41d41ad660ac</sum></package><package arch="x86_64" name="freerdp-devel" release="4.rc4.el7_8" src="freerdp-2.0.0-4.rc4.el7_8.src.rpm" version="2.0.0"><filename>freerdp-devel-2.0.0-4.rc4.el7_8.x86_64.rpm</filename><sum type="sha256">61169318a91709f9eb63b092c68484e4cb532f72f873b4fad2bf90ffeada157c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2334" id="RHSA-2020:2334-1" title="Rhsa-2020:2334-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2337-1</id><title>Git</title><description>Security Fix(es): 
* git: Crafted URL containing new lines, empty host or lacks a scheme can cause credential leak (CVE-2020-11008)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-05-29 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="git-svn" release="23.el7_8" src="git-1.8.3.1-23.el7_8.src.rpm" version="1.8.3.1"><filename>git-svn-1.8.3.1-23.el7_8.x86_64.rpm</filename><sum type="sha256">baef16b8ee609bdfe586df52f6d9a6d60ed37b5385e83cc287e7c308c88b421c</sum></package><package arch="noarch" name="perl-Git-SVN" release="23.el7_8" src="git-1.8.3.1-23.el7_8.src.rpm" version="1.8.3.1"><filename>perl-Git-SVN-1.8.3.1-23.el7_8.noarch.rpm</filename><sum type="sha256">e99450c166ad1b31e011b06880bc1f6cb6b10af5ae9a5028ef20bc092fffe799</sum></package><package arch="noarch" name="gitk" release="23.el7_8" src="git-1.8.3.1-23.el7_8.src.rpm" version="1.8.3.1"><filename>gitk-1.8.3.1-23.el7_8.noarch.rpm</filename><sum type="sha256">6ea8bfabe4087bf3b7cb3631d5fe8aa3661361a574d2c2e325f1186d997915ab</sum></package><package arch="noarch" name="git-all" release="23.el7_8" src="git-1.8.3.1-23.el7_8.src.rpm" version="1.8.3.1"><filename>git-all-1.8.3.1-23.el7_8.noarch.rpm</filename><sum type="sha256">353a55e783cb44262427760ecf2b978c5864f9f5fc90a33e58dd54402f1aab90</sum></package><package arch="noarch" name="git-gui" release="23.el7_8" src="git-1.8.3.1-23.el7_8.src.rpm" version="1.8.3.1"><filename>git-gui-1.8.3.1-23.el7_8.noarch.rpm</filename><sum type="sha256">49125643d46e92cb68315c96e7da69d633fa2c4cf3a6a5c984efb2603022a77c</sum></package><package arch="noarch" name="git-instaweb" release="23.el7_8" src="git-1.8.3.1-23.el7_8.src.rpm" version="1.8.3.1"><filename>git-instaweb-1.8.3.1-23.el7_8.noarch.rpm</filename><sum type="sha256">8b40eb707791625e153b45b7fad989aa1131453f273b728a1eb58662e1462f38</sum></package><package arch="noarch" name="gitweb" release="23.el7_8" src="git-1.8.3.1-23.el7_8.src.rpm" version="1.8.3.1"><filename>gitweb-1.8.3.1-23.el7_8.noarch.rpm</filename><sum type="sha256">93c8a63edee34034ecd2b5017c57f0901e3f1ac89cce2d60dc6c03b1867ffef4</sum></package><package arch="noarch" name="git-email" release="23.el7_8" src="git-1.8.3.1-23.el7_8.src.rpm" version="1.8.3.1"><filename>git-email-1.8.3.1-23.el7_8.noarch.rpm</filename><sum type="sha256">543d003eb48ad2030701efdab9845ad91fb82f2d9b7a81b279d34fa2a40eb5ac</sum></package><package arch="x86_64" name="git" release="23.el7_8" src="git-1.8.3.1-23.el7_8.src.rpm" version="1.8.3.1"><filename>git-1.8.3.1-23.el7_8.x86_64.rpm</filename><sum type="sha256">8cc6a6a4546ee960304bab2bc221c0b09c87f1a113a9761b9cfa2f4fdb764e83</sum></package><package arch="noarch" name="git-p4" release="23.el7_8" src="git-1.8.3.1-23.el7_8.src.rpm" version="1.8.3.1"><filename>git-p4-1.8.3.1-23.el7_8.noarch.rpm</filename><sum type="sha256">e1e4d06d9f1c0de7ac4c16107b98d7413dc03b84524056e87d0e19d0ea683c01</sum></package><package arch="noarch" name="emacs-git" release="23.el7_8" src="git-1.8.3.1-23.el7_8.src.rpm" version="1.8.3.1"><filename>emacs-git-1.8.3.1-23.el7_8.noarch.rpm</filename><sum type="sha256">4bbf2dd337e1c85f44d0e79d530ee711a8ba6419cd62eb0f016639bbb28b02d1</sum></package><package arch="noarch" name="emacs-git-el" release="23.el7_8" src="git-1.8.3.1-23.el7_8.src.rpm" version="1.8.3.1"><filename>emacs-git-el-1.8.3.1-23.el7_8.noarch.rpm</filename><sum type="sha256">69ff078d441376524f9a33285797d8f023d5c05782194318344e739c049a1efb</sum></package><package arch="noarch" name="git-cvs" release="23.el7_8" src="git-1.8.3.1-23.el7_8.src.rpm" version="1.8.3.1"><filename>git-cvs-1.8.3.1-23.el7_8.noarch.rpm</filename><sum type="sha256">dbcfa3c27922ab9f2f4a3223e0cf03ed4b25b55bcf2b3baf6b0b9f40396af93b</sum></package><package arch="noarch" name="perl-Git" release="23.el7_8" src="git-1.8.3.1-23.el7_8.src.rpm" version="1.8.3.1"><filename>perl-Git-1.8.3.1-23.el7_8.noarch.rpm</filename><sum type="sha256">4f6f4c1dff39fd3e0dc307eb595de1bd712db53c6f757a6d0b0b51303dea460a</sum></package><package arch="noarch" name="git-hg" release="23.el7_8" src="git-1.8.3.1-23.el7_8.src.rpm" version="1.8.3.1"><filename>git-hg-1.8.3.1-23.el7_8.noarch.rpm</filename><sum type="sha256">651a7175975dc36a527c224e54f46d4a2b7e2cc80022175b51f8e08410d6daf6</sum></package><package arch="x86_64" name="git-gnome-keyring" release="23.el7_8" src="git-1.8.3.1-23.el7_8.src.rpm" version="1.8.3.1"><filename>git-gnome-keyring-1.8.3.1-23.el7_8.x86_64.rpm</filename><sum type="sha256">6d6cf2c56c45bab713aa10feaaaa73f0a981c82fa5f33e91463f2915df237fe5</sum></package><package arch="x86_64" name="git-daemon" release="23.el7_8" src="git-1.8.3.1-23.el7_8.src.rpm" version="1.8.3.1"><filename>git-daemon-1.8.3.1-23.el7_8.x86_64.rpm</filename><sum type="sha256">d29ed04f5280d41b36c95efbd120a352df3b663d2963846d0ab939a95d771899</sum></package><package arch="noarch" name="git-bzr" release="23.el7_8" src="git-1.8.3.1-23.el7_8.src.rpm" version="1.8.3.1"><filename>git-bzr-1.8.3.1-23.el7_8.noarch.rpm</filename><sum type="sha256">399931e89538f32cc5e64f50f09a622f622b2b8d770b01175a737c8617aa021c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2337" id="RHSA-2020:2337-1" title="Rhsa-2020:2337-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2344-1</id><title>Bind</title><description>Security Fix(es): 
* bind: BIND does not sufficiently limit the number of fetches performed when processing referrals (CVE-2020-8616) 
* bind: A logic error in code which checks TSIG validity can be used to trigger an assertion failure in tsig.c (CVE-2020-8617)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-06-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="32" name="bind-libs-lite" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-16.P2.el7_8.6.i686.rpm</filename><sum type="sha256">865166806f97792e91d6d926e010b247a749354ce3588ba1c96bcd5133010188</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-16.P2.el7_8.6.x86_64.rpm</filename><sum type="sha256">e76d41362055a509b2677d8f8ca04353eba163cc900bb2f708b62387ba33fdfd</sum></package><package arch="i686" epoch="32" name="bind-libs" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-16.P2.el7_8.6.i686.rpm</filename><sum type="sha256">7af89eb55fa3a14f6cdd0e27314444627d8968e32bd8bf26f3917c3e58016dd4</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-16.P2.el7_8.6.i686.rpm</filename><sum type="sha256">0b130c09a42a4a737d1e81ff962832583b838bcd776982d22addffadceabf01e</sum></package><package arch="i686" epoch="32" name="bind-devel" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-16.P2.el7_8.6.i686.rpm</filename><sum type="sha256">a2a0e46b35bf46cc794497abdbf92ac9e942ca2c51f225bce6765cbd895cc136</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-16.P2.el7_8.6.i686.rpm</filename><sum type="sha256">4da8d1d6136758376a4006696e85f580f769c995856d269fd33026319176c2d8</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-16.P2.el7_8.6.x86_64.rpm</filename><sum type="sha256">c5af589224e73977c166cdb538ddf1e072439fe5a0a47414c619491191047dc1</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-16.P2.el7_8.6.i686.rpm</filename><sum type="sha256">6af2ccf1e3af2a568536262910fee7e353ee8c62f3f89378b3f5db24e7728dbf</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-16.P2.el7_8.6.x86_64.rpm</filename><sum type="sha256">02840d07c325d09899e9946a6bc88708a915b302b05d21357a686f98fe9b7827</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-16.P2.el7_8.6.x86_64.rpm</filename><sum type="sha256">6719c57f322a045a5ad433c26ff3a4331767a06a764808ccdc4cb8a3b94bf9bb</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-16.P2.el7_8.6.x86_64.rpm</filename><sum type="sha256">082dfc5f40c56cf69e7bf9b1b61b145d8b91ebfed682ed82abb084b53024e218</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-16.P2.el7_8.6.i686.rpm</filename><sum type="sha256">25326445adb75522121d13028d3c17645afee82784a9f53edaa10e892226c991</sum></package><package arch="noarch" epoch="32" name="bind-license" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-16.P2.el7_8.6.noarch.rpm</filename><sum type="sha256">2775325acad81999f31309573fbe879bb39782a3f10daa040d9eaca0bc3732ef</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-16.P2.el7_8.6.x86_64.rpm</filename><sum type="sha256">48b8b1f932d3def08107e353f28520e4562e4a9beab1dc50c67a38861ebf1c9d</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-16.P2.el7_8.6.x86_64.rpm</filename><sum type="sha256">05db4ac72f517852f6478f3173b9c1111cb408eb5ea7f7a575a62f3347572364</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-16.P2.el7_8.6.x86_64.rpm</filename><sum type="sha256">7fa9a189b00574f45b614defceffff68feaf5d021186a0e0a6fd59717a257194</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-16.P2.el7_8.6.x86_64.rpm</filename><sum type="sha256">5955ebd3462199cd66880ffc33cec10c6031a1ca872a4efb9851207cb0fd40c7</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-16.P2.el7_8.6.x86_64.rpm</filename><sum type="sha256">171c8fdc73ce0337634b40bff9937cd311741b4123335dc07f9a7f9b4d55ba86</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-16.P2.el7_8.6.x86_64.rpm</filename><sum type="sha256">9adb7f285c5634860761fa9fe5f69d654dce14adae7bb7097cefb82abb5a26e4</sum></package><package arch="x86_64" epoch="32" name="bind" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-9.11.4-16.P2.el7_8.6.x86_64.rpm</filename><sum type="sha256">c6be42ce4f35b91ad377c16393bdfc436b438bfff49fa3bbe657321c3b09cf10</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-16.P2.el7_8.6.i686.rpm</filename><sum type="sha256">f46b2a0972a5d0e0afb565741dfa330aee73a5a98a66cb269d9b690b93efe4b4</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-16.P2.el7_8.6.x86_64.rpm</filename><sum type="sha256">7ab441e92275caff0bb44a55eefeb4882558a3e6a8b22ed4f3e63cbac094507f</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-16.P2.el7_8.6.x86_64.rpm</filename><sum type="sha256">9ad5b85464486b92eab1ff265646e373cc5d8ca569793d163a05fc6fc803382d</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="16.P2.el7_8.6" src="bind-9.11.4-16.P2.el7_8.6.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-16.P2.el7_8.6.x86_64.rpm</filename><sum type="sha256">4ad390960e0bbc8b98c71b64536ef1359b5a9d362f37d5bcbc038d89dccec50f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2344" id="RHSA-2020:2344-1" title="Rhsa-2020:2344-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2381-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Use-after-free in SharedWorkerService (CVE-2020-12405) 
* Mozilla: JavaScript Type confusion with NativeTypes (CVE-2020-12406) 
* Mozilla: Memory safety bugs fixed in Firefox 77 and Firefox ESR 68.9 (CVE-2020-12410)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-06-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_8" src="firefox-68.9.0-1.el7_8.src.rpm" version="68.9.0"><filename>firefox-68.9.0-1.el7_8.x86_64.rpm</filename><sum type="sha256">cd822f257cbbc2481bafa0c646abbc44d04deeafc4c5616aea0f81634de4f0e6</sum></package><package arch="i686" name="firefox" release="1.el7_8" src="firefox-68.9.0-1.el7_8.src.rpm" version="68.9.0"><filename>firefox-68.9.0-1.el7_8.i686.rpm</filename><sum type="sha256">c420fd11cd7adcdcb333cefe7fa4ec64a300b29cbf824b89bc48a69f2c9833cd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2381" id="RHSA-2020:2381-1" title="Rhsa-2020:2381-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2405-1</id><title>Freerdp</title><description>Security Fix(es): 
* freerdp: Out-of-bounds write in crypto_rsa_common in libfreerdp/crypto/crypto.c (CVE-2020-13398)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="freerdp-devel" release="4.rc4.el7_8.1" src="freerdp-2.0.0-4.rc4.el7_8.1.src.rpm" version="2.0.0"><filename>freerdp-devel-2.0.0-4.rc4.el7_8.1.i686.rpm</filename><sum type="sha256">13129daebb1c1a7172c47fc0cd0b94f6cfae58e3a0ac151faaeedfbf08ded0e9</sum></package><package arch="i686" name="libwinpr" release="4.rc4.el7_8.1" src="freerdp-2.0.0-4.rc4.el7_8.1.src.rpm" version="2.0.0"><filename>libwinpr-2.0.0-4.rc4.el7_8.1.i686.rpm</filename><sum type="sha256">7188677256bfc2ac5ba16e976a8d9ee89770758ca183040572619aff716ce661</sum></package><package arch="x86_64" name="libwinpr" release="4.rc4.el7_8.1" src="freerdp-2.0.0-4.rc4.el7_8.1.src.rpm" version="2.0.0"><filename>libwinpr-2.0.0-4.rc4.el7_8.1.x86_64.rpm</filename><sum type="sha256">278aa434e8b95a5e62afe2dc9b54d705f876afa504918928a7ea888409ea6e6d</sum></package><package arch="x86_64" name="freerdp-devel" release="4.rc4.el7_8.1" src="freerdp-2.0.0-4.rc4.el7_8.1.src.rpm" version="2.0.0"><filename>freerdp-devel-2.0.0-4.rc4.el7_8.1.x86_64.rpm</filename><sum type="sha256">51380744620ee17d2352dff3f9612f0dfbe2627946b1dbf50fd805cfd1e1a26a</sum></package><package arch="x86_64" name="freerdp-libs" release="4.rc4.el7_8.1" src="freerdp-2.0.0-4.rc4.el7_8.1.src.rpm" version="2.0.0"><filename>freerdp-libs-2.0.0-4.rc4.el7_8.1.x86_64.rpm</filename><sum type="sha256">482a081506c17dcc1a64727bb644fd2ce6615d9c8368b0cc9f489a0e2e8d5aa0</sum></package><package arch="i686" name="freerdp-libs" release="4.rc4.el7_8.1" src="freerdp-2.0.0-4.rc4.el7_8.1.src.rpm" version="2.0.0"><filename>freerdp-libs-2.0.0-4.rc4.el7_8.1.i686.rpm</filename><sum type="sha256">079b0e811e8b7caeaea6bbecea90cf638bacfe7d854a6da1a73e1b27b32076f3</sum></package><package arch="x86_64" name="libwinpr-devel" release="4.rc4.el7_8.1" src="freerdp-2.0.0-4.rc4.el7_8.1.src.rpm" version="2.0.0"><filename>libwinpr-devel-2.0.0-4.rc4.el7_8.1.x86_64.rpm</filename><sum type="sha256">ef881ffa2b57a093a646d147b53cdfefae69310a5756fd756cdf42f4a06dbe04</sum></package><package arch="x86_64" name="freerdp" release="4.rc4.el7_8.1" src="freerdp-2.0.0-4.rc4.el7_8.1.src.rpm" version="2.0.0"><filename>freerdp-2.0.0-4.rc4.el7_8.1.x86_64.rpm</filename><sum type="sha256">65de402e659f95ac09a7a858b506744a0074e0d45a952691d47fbf98ae4870a6</sum></package><package arch="i686" name="libwinpr-devel" release="4.rc4.el7_8.1" src="freerdp-2.0.0-4.rc4.el7_8.1.src.rpm" version="2.0.0"><filename>libwinpr-devel-2.0.0-4.rc4.el7_8.1.i686.rpm</filename><sum type="sha256">437d89858624d282a9e8f9b9d6d719ff049e609936a3ab29c230178c646b1cd8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2405" id="RHSA-2020:2405-1" title="Rhsa-2020:2405-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2414-1</id><title>Unbound</title><description>Security Fix(es): 
* unbound: amplification of an incoming query into a large number of queries directed to a target (CVE-2020-12662) 
* unbound: infinite loop via malformed DNS answers received from upstream servers (CVE-2020-12663)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="unbound-python" release="4.el7_8" src="unbound-1.6.6-4.el7_8.src.rpm" version="1.6.6"><filename>unbound-python-1.6.6-4.el7_8.x86_64.rpm</filename><sum type="sha256">b368c0fa9b82908b1b54840cd3649358b985d3d97773e0e07c144d61e0af1a2e</sum></package><package arch="i686" name="unbound-libs" release="4.el7_8" src="unbound-1.6.6-4.el7_8.src.rpm" version="1.6.6"><filename>unbound-libs-1.6.6-4.el7_8.i686.rpm</filename><sum type="sha256">d976b05ca9239fd0cbec53d0a0adae9b33ee3962bfaf9be8e0df52317463ba79</sum></package><package arch="x86_64" name="unbound-libs" release="4.el7_8" src="unbound-1.6.6-4.el7_8.src.rpm" version="1.6.6"><filename>unbound-libs-1.6.6-4.el7_8.x86_64.rpm</filename><sum type="sha256">2e65e1e4399a5f2d9549972e087bfc79c1b708b6b859b446b9afea97142e860f</sum></package><package arch="x86_64" name="unbound-devel" release="4.el7_8" src="unbound-1.6.6-4.el7_8.src.rpm" version="1.6.6"><filename>unbound-devel-1.6.6-4.el7_8.x86_64.rpm</filename><sum type="sha256">168f3304c412a5b6e5a55a145f31af42fab9c1bf0a3f67437e45078fd85a162c</sum></package><package arch="x86_64" name="unbound" release="4.el7_8" src="unbound-1.6.6-4.el7_8.src.rpm" version="1.6.6"><filename>unbound-1.6.6-4.el7_8.x86_64.rpm</filename><sum type="sha256">b7eca75b5551a800e8556c5a6050dc0c76aa34e240db7d417c8fda6a66f85ea8</sum></package><package arch="i686" name="unbound-devel" release="4.el7_8" src="unbound-1.6.6-4.el7_8.src.rpm" version="1.6.6"><filename>unbound-devel-1.6.6-4.el7_8.i686.rpm</filename><sum type="sha256">0d60a73df62f24faaded98cddc9b8591d34b856e6fe8d60bf500e992bb876110</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2414" id="RHSA-2020:2414-1" title="Rhsa-2020:2414-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2432-1</id><title>Microcode_Ctl</title><description>* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543)

* hw: L1D Cache Eviction Sampling (CVE-2020-0549)

* hw: Vector Register Data Sampling (CVE-2020-0548)

Bug Fix(es):

* Update Intel CPU microcode to microcode-20200602 release, addresses:   - Update of 06-2d-06/0x6d (SNB-E/EN/EP C1/M0) microcode from revision 0x61f up to 0x621;   - Update of 06-2d-07/0x6d (SNB-E/EN/EP C2/M1) microcode from revision 0x718     up to 0x71a;   - Update of 06-3c-03/0x32 (HSW C0) microcode from revision 0x27 up to 0x28;   - Update of 06-3d-04/0xc0 (BDW-U/Y E0/F0) microcode from revision 0x2e     up to 0x2f;   - Update of 06-45-01/0x72 (HSW-U C0/D0) microcode from revision 0x25     up to 0x26; - Update of 06-46-01/0x32 (HSW-H C0) microcode from revision 0x1b up to 0x1c;   - Update of 06-47-01/0x22 (BDW-H/Xeon E3 E0/G0) microcode from revision 0x21     up to 0x22;   - Update of 06-4e-03/0xc0 (SKL-U/Y D0) microcode from revision 0xd6     up to 0xdc;   - Update of 06-55-03/0x97 (SKX-SP B1) microcode from revision 0x1000151     up to 0x1000157;   - Update of 06-55-04/0xb7 (SKX-SP H0/M0/U0, SKX-D M1) microcode     (in intel-06-55-04/intel-ucode/06-55-04) from revision 0x2000065     up to 0x2006906;   - Update of 06-55-06/0xbf (CLX-SP B0) microcode from revision 0x400002c     up to 0x4002f01;   - Update of 06-55-07/0xbf (CLX-SP B1) microcode from revision 0x500002c     up to 0x5002f01;   - Update of 06-5e-03/0x36 (SKL-H/S R0/N0) microcode from revision 0xd6     up to 0xdc; - Update of 06-7e-05/0x80 (ICL-U/Y D1) microcode from revision 0x46     up to 0x78;   - Update of 06-8e-09/0x10 (AML-Y22 H0) microcode from revision 0xca     up to 0xd6;   - Update of 06-8e-09/0xc0 (KBL-U/Y H0) microcode from revision 0xca     up to 0xd6;   - Update of 06-8e-0a/0xc0 (CFL-U43e D0) microcode from revision 0xca     up to 0xd6;   - Update of 06-8e- 0b/0xd0 (WHL-U W0) microcode from revision 0xca     up to 0xd6;   - Update of 06-8e-0c/0x94 (AML-Y42 V0, CML-Y42 V0, WHL-U V0) microcode     from revision 0xca up to 0xd6;   - Update of 06-9e-09/0x2a (KBL-G/H/S/X/Xeon E3 B0) microcode from revision     0xca up to 0xd6;   - Update of 06-9e- 0a/0x22 (CFL-H/S/Xeon E3 U0) microcode from revision 0xca     up to 0xd6; - Update of 06-9e-0b/0x02 (CFL-S B0) microcode from revision 0xca up to 0xd6;   - Update of 06-9e-0c/0x22 (CFL-H/S P0) microcode from revision 0xca     up to 0xd6;   - Update of 06-9e-0d/0x22 (CFL-H R0) microcode from revision 0xca up to 0xd6. - Change the URL in the intel-microcode2ucode.8 to point to the GitHub   repository since the microcode download section at Intel Download Center   does not exist anymore.

* Narrow down SKL-SP/W/X blacklist to exclude Server/FPGA/Fabric segment models.

* Re-generate initramfs not only for the currently running kernel,   but for several recently installed kernels as well.

* Avoid find being SIGPIPE'd on early "grep -q" exit in the dracut script.

* Update stale posttrans dependency, add triggers for proper handling   of the debug kernel flavour along with kernel-rt.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="61.6.el7_8" src="microcode_ctl-2.1-61.6.el7_8.src.rpm" version="2.1"><filename>microcode_ctl-2.1-61.6.el7_8.x86_64.rpm</filename><sum type="sha256">c0337f87bab2fb65118dc5c52c1b62beaff73ed5ab9d905a015b21a13f8adc63</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543" id="CVE-2020-0543" title="Cve-2020-0543" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548" id="CVE-2020-0548" title="Cve-2020-0548" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549" id="CVE-2020-0549" title="Cve-2020-0549" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:2432" id="RHSA-2020:2432-1" title="Rhsa-2020:2432-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788786" id="1788786" title="Cve-2020-0548 Hw: Vector Register Data Sampling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788788" id="1788788" title="Cve-2020-0549 Hw: L1D Cache Eviction Sampling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1827165" id="1827165" title="Cve-2020-0543 Hw: Special Register Buffer Data Sampling (Srbds)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2530-1</id><title>Tomcat</title><description>Security Fix(es): 
* tomcat: deserialization flaw in session persistence storage leading to RCE (CVE-2020-9484)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-06-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcat-webapps" release="12.el7_8" src="tomcat-7.0.76-12.el7_8.src.rpm" version="7.0.76"><filename>tomcat-webapps-7.0.76-12.el7_8.noarch.rpm</filename><sum type="sha256">5175039ebbd3e0343682ed4c890b72f738e3a5135b7a0c81e662040c5576a96d</sum></package><package arch="noarch" name="tomcat-el-2.2-api" release="12.el7_8" src="tomcat-7.0.76-12.el7_8.src.rpm" version="7.0.76"><filename>tomcat-el-2.2-api-7.0.76-12.el7_8.noarch.rpm</filename><sum type="sha256">44af55c03f6f1144395846f7ed0b61a78d37fda048e67881876c5b60573740c9</sum></package><package arch="noarch" name="tomcat-jsvc" release="12.el7_8" src="tomcat-7.0.76-12.el7_8.src.rpm" version="7.0.76"><filename>tomcat-jsvc-7.0.76-12.el7_8.noarch.rpm</filename><sum type="sha256">f08fb679877651d3e9a323f90ffe8661a80f5c4feb22ff3763be7d8702ac7097</sum></package><package arch="noarch" name="tomcat-servlet-3.0-api" release="12.el7_8" src="tomcat-7.0.76-12.el7_8.src.rpm" version="7.0.76"><filename>tomcat-servlet-3.0-api-7.0.76-12.el7_8.noarch.rpm</filename><sum type="sha256">29693e64398dc9648a646e53600ad28aaa7b367b57ba7defd864e2d6f26d936a</sum></package><package arch="noarch" name="tomcat-docs-webapp" release="12.el7_8" src="tomcat-7.0.76-12.el7_8.src.rpm" version="7.0.76"><filename>tomcat-docs-webapp-7.0.76-12.el7_8.noarch.rpm</filename><sum type="sha256">71c5c6d72f624ffa6b839e9bcfbbbcbe3913c825cdaf925512c67fd690a05f5d</sum></package><package arch="noarch" name="tomcat-jsp-2.2-api" release="12.el7_8" src="tomcat-7.0.76-12.el7_8.src.rpm" version="7.0.76"><filename>tomcat-jsp-2.2-api-7.0.76-12.el7_8.noarch.rpm</filename><sum type="sha256">89faea5c27f9ba37fcf946043744a979e2c99313428a1a2935966e972bd4b793</sum></package><package arch="noarch" name="tomcat" release="12.el7_8" src="tomcat-7.0.76-12.el7_8.src.rpm" version="7.0.76"><filename>tomcat-7.0.76-12.el7_8.noarch.rpm</filename><sum type="sha256">2234847dcd7fa60361a4accac11ec3349e136d5dd0a01b48268c648fd1eff9cc</sum></package><package arch="noarch" name="tomcat-javadoc" release="12.el7_8" src="tomcat-7.0.76-12.el7_8.src.rpm" version="7.0.76"><filename>tomcat-javadoc-7.0.76-12.el7_8.noarch.rpm</filename><sum type="sha256">bd20b2ff25aab62f88dc50ebd511b1efa213633c9a392956294be1e8569bb830</sum></package><package arch="noarch" name="tomcat-lib" release="12.el7_8" src="tomcat-7.0.76-12.el7_8.src.rpm" version="7.0.76"><filename>tomcat-lib-7.0.76-12.el7_8.noarch.rpm</filename><sum type="sha256">eda892448414e87da9ff32ad5932c5f291979dc375c0a6644f7ac2a6b21597d5</sum></package><package arch="noarch" name="tomcat-admin-webapps" release="12.el7_8" src="tomcat-7.0.76-12.el7_8.src.rpm" version="7.0.76"><filename>tomcat-admin-webapps-7.0.76-12.el7_8.noarch.rpm</filename><sum type="sha256">6f8c274a9812b9636f362949523d38f849a474bff8a6c76b60547dfa3b9d1ffd</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2530" id="RHSA-2020:2530-1" title="Rhsa-2020:2530-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2549-1</id><title>Libexif</title><description>Security Fix(es): 
* libexif: several buffer over-reads in EXIF MakerNote handling can lead to information disclosure and DoS (CVE-2020-13112)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-06-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libexif-devel" release="7.el7_8" src="libexif-0.6.21-7.el7_8.src.rpm" version="0.6.21"><filename>libexif-devel-0.6.21-7.el7_8.i686.rpm</filename><sum type="sha256">373ba02ed9b2ae6bc06f267481a798a08fec0261c71b72a2100df9d252f83332</sum></package><package arch="i686" name="libexif" release="7.el7_8" src="libexif-0.6.21-7.el7_8.src.rpm" version="0.6.21"><filename>libexif-0.6.21-7.el7_8.i686.rpm</filename><sum type="sha256">c731f7c864d5c08eb8018f648acb6c8fb480af267187a33208686f026019a228</sum></package><package arch="x86_64" name="libexif-doc" release="7.el7_8" src="libexif-0.6.21-7.el7_8.src.rpm" version="0.6.21"><filename>libexif-doc-0.6.21-7.el7_8.x86_64.rpm</filename><sum type="sha256">fb6c09c5635eca3582102cac1ad55a2622147ce56a0a8f82118acdab2c25f03f</sum></package><package arch="x86_64" name="libexif" release="7.el7_8" src="libexif-0.6.21-7.el7_8.src.rpm" version="0.6.21"><filename>libexif-0.6.21-7.el7_8.x86_64.rpm</filename><sum type="sha256">7a3c4f8ad022dfdb13821c3acd66aeb43aa6733187964b1f76edbab3796ca8de</sum></package><package arch="x86_64" name="libexif-devel" release="7.el7_8" src="libexif-0.6.21-7.el7_8.src.rpm" version="0.6.21"><filename>libexif-devel-0.6.21-7.el7_8.x86_64.rpm</filename><sum type="sha256">a059fdf6e7ec0706d9ce204422d7d8f28771890b01be3f18aea052f098d36e45</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2549" id="RHSA-2020:2549-1" title="Rhsa-2020:2549-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2615-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Security downgrade with IMAP STARTTLS leads to information leakage (CVE-2020-12398) 
* Mozilla: Use-after-free in SharedWorkerService (CVE-2020-12405) 
* Mozilla: JavaScript Type confusion with NativeTypes (CVE-2020-12406) 
* Mozilla: Memory safety bugs fixed in Firefox 77 and Firefox ESR 68.9 (CVE-2020-12410)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-06-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_8" src="thunderbird-68.9.0-1.el7_8.src.rpm" version="68.9.0"><filename>thunderbird-68.9.0-1.el7_8.x86_64.rpm</filename><sum type="sha256">067390d0a29459a3cbee073306c004ad2891f458b865be0fdc25264f51456f33</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2615" id="RHSA-2020:2615-1" title="Rhsa-2020:2615-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2642-1</id><title>Unbound</title><description>Security Fix(es): 
* unbound: incomplete fix for CVE-2020-12662 in SL7 (CVE-2020-10772)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-06-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="unbound-devel" release="5.el7_8" src="unbound-1.6.6-5.el7_8.src.rpm" version="1.6.6"><filename>unbound-devel-1.6.6-5.el7_8.x86_64.rpm</filename><sum type="sha256">7c6a0a9a3ce954b42f441f984c16e5007148b2044b2c1ca4b702fdf3425c187f</sum></package><package arch="i686" name="unbound-devel" release="5.el7_8" src="unbound-1.6.6-5.el7_8.src.rpm" version="1.6.6"><filename>unbound-devel-1.6.6-5.el7_8.i686.rpm</filename><sum type="sha256">e4d1194d308cbbe07ceb33b12bf886fdeb4daa6d46dca5d96f1f0832e8e62eeb</sum></package><package arch="i686" name="unbound-libs" release="5.el7_8" src="unbound-1.6.6-5.el7_8.src.rpm" version="1.6.6"><filename>unbound-libs-1.6.6-5.el7_8.i686.rpm</filename><sum type="sha256">6a9e60a66c4be3b716934ed18899cf66467fb19964156094a4d74029159a67bb</sum></package><package arch="x86_64" name="unbound" release="5.el7_8" src="unbound-1.6.6-5.el7_8.src.rpm" version="1.6.6"><filename>unbound-1.6.6-5.el7_8.x86_64.rpm</filename><sum type="sha256">c68935a7548914dd8fabd3c8d5b3eff283b4178c889ed7544f793ba942b514ec</sum></package><package arch="x86_64" name="unbound-libs" release="5.el7_8" src="unbound-1.6.6-5.el7_8.src.rpm" version="1.6.6"><filename>unbound-libs-1.6.6-5.el7_8.x86_64.rpm</filename><sum type="sha256">f0af67c9e40d854eb96469c365377a4aa5a3acb581ff8a5c89a31d001fee6148</sum></package><package arch="x86_64" name="unbound-python" release="5.el7_8" src="unbound-1.6.6-5.el7_8.src.rpm" version="1.6.6"><filename>unbound-python-1.6.6-5.el7_8.x86_64.rpm</filename><sum type="sha256">4db9dbfe2b4069672ed6659c68246288e5cc71f54f41f492c63f36b58d11f5a7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2642" id="RHSA-2020:2642-1" title="Rhsa-2020:2642-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2663-1</id><title>Ntp</title><description>Security Fix(es): 
* ntp: ntpd using highly predictable transmit timestamps could result in time change or DoS (CVE-2020-13817) 
* ntp: DoS on client ntpd using server mode packet (CVE-2020-11868)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-06-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ntpdate" release="29.el7_8.2" src="ntp-4.2.6p5-29.el7_8.2.src.rpm" version="4.2.6p5"><filename>ntpdate-4.2.6p5-29.el7_8.2.x86_64.rpm</filename><sum type="sha256">f4c6ac47a1840ed72d2fc8d8a16624c4e51fda030897495d3a45231b091d4818</sum></package><package arch="noarch" name="ntp-perl" release="29.el7_8.2" src="ntp-4.2.6p5-29.el7_8.2.src.rpm" version="4.2.6p5"><filename>ntp-perl-4.2.6p5-29.el7_8.2.noarch.rpm</filename><sum type="sha256">48732021b8c5aa13132971e6568f7758144a5107e46eff4890b62ecd7b833c99</sum></package><package arch="x86_64" name="ntp" release="29.el7_8.2" src="ntp-4.2.6p5-29.el7_8.2.src.rpm" version="4.2.6p5"><filename>ntp-4.2.6p5-29.el7_8.2.x86_64.rpm</filename><sum type="sha256">c59dadad0707f467fdb42c482350d8eb1b8f9ad6525ab4bfa958d26cf582c197</sum></package><package arch="x86_64" name="sntp" release="29.el7_8.2" src="ntp-4.2.6p5-29.el7_8.2.src.rpm" version="4.2.6p5"><filename>sntp-4.2.6p5-29.el7_8.2.x86_64.rpm</filename><sum type="sha256">bdbf0c685b0eeb1cb023568bd9595c0d6882427d1c16169716959daabf770cd4</sum></package><package arch="noarch" name="ntp-doc" release="29.el7_8.2" src="ntp-4.2.6p5-29.el7_8.2.src.rpm" version="4.2.6p5"><filename>ntp-doc-4.2.6p5-29.el7_8.2.noarch.rpm</filename><sum type="sha256">9c302ecfc45afe6bf258a77897eae9ca69b4b5bd7099e68b4d956e3bae7ee900</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2663" id="RHSA-2020:2663-1" title="Rhsa-2020:2663-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2664-1</id><title>Kernel</title><description>Security Fix(es): 
* Kernel: vfio: access to disabled MMIO space of some devices may lead to DoS scenario (CVE-2020-12888)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-06-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="perf" release="1127.13.1.el7" src="kernel-3.10.0-1127.13.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1127.13.1.el7.x86_64.rpm</filename><sum type="sha256">73760a7f5ed4f2f865f1240e8201129eb3c6cf59ca5ffdcea9cf599685236dc8</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1127.13.1.el7" src="kernel-3.10.0-1127.13.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1127.13.1.el7.noarch.rpm</filename><sum type="sha256">39c06e89374fcf4a058cb271a3a2d5a80024de40f3b9914e87bcc51553788346</sum></package><package arch="x86_64" name="kernel" release="1127.13.1.el7" src="kernel-3.10.0-1127.13.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1127.13.1.el7.x86_64.rpm</filename><sum type="sha256">260bbfe988600b5b26a7c446a0b7b8b9e50bb1f904176d1b4b646196aef2f125</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1127.13.1.el7" src="kernel-3.10.0-1127.13.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1127.13.1.el7.x86_64.rpm</filename><sum type="sha256">b45deac3bbab816df551e1cdb11d1d981dc039d03f7837c26ed1c7643b3d04cd</sum></package><package arch="noarch" name="kernel-doc" release="1127.13.1.el7" src="kernel-3.10.0-1127.13.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1127.13.1.el7.noarch.rpm</filename><sum type="sha256">340fdf47cbe5cd0ac1fd7aea3b8a4baa81d8bf2653899238971633d61d361d99</sum></package><package arch="x86_64" name="kernel-headers" release="1127.13.1.el7" src="kernel-3.10.0-1127.13.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1127.13.1.el7.x86_64.rpm</filename><sum type="sha256">deb9a3548569007092ef2aa5c493856874aedac630280d85e5235386d4fabdbf</sum></package><package arch="x86_64" name="kernel-devel" release="1127.13.1.el7" src="kernel-3.10.0-1127.13.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1127.13.1.el7.x86_64.rpm</filename><sum type="sha256">bec147380af93c9e21766f4f9c0a92b12ce2457acd25563504f977aec94e6f5c</sum></package><package arch="x86_64" name="python-perf" release="1127.13.1.el7" src="kernel-3.10.0-1127.13.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1127.13.1.el7.x86_64.rpm</filename><sum type="sha256">a25454d4ace4e8f382747605e7e3c11a0189991dc6c55b577e18874cde7d24b5</sum></package><package arch="x86_64" name="kernel-debug" release="1127.13.1.el7" src="kernel-3.10.0-1127.13.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1127.13.1.el7.x86_64.rpm</filename><sum type="sha256">5562ab6d6e7d07dbb96039bf153f8d6c9e297c83832e9ec8e9e0676094dc58a0</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1127.13.1.el7" src="kernel-3.10.0-1127.13.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1127.13.1.el7.x86_64.rpm</filename><sum type="sha256">325792a6f0d6d111b18fb035cc00db0e54a1e7444510e621e26f3a1ed0a6cdbe</sum></package><package arch="x86_64" name="kernel-tools" release="1127.13.1.el7" src="kernel-3.10.0-1127.13.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1127.13.1.el7.x86_64.rpm</filename><sum type="sha256">c51c9f94e102d860242a2d8576ef8087c923fb82913893d0e4cc2018aebb025c</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1127.13.1.el7" src="kernel-3.10.0-1127.13.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1127.13.1.el7.x86_64.rpm</filename><sum type="sha256">d19a378b9d759ccbe18331b4cbe0e2648616effc56c054905443ffc8e72c5bf1</sum></package><package arch="x86_64" name="bpftool" release="1127.13.1.el7" src="kernel-3.10.0-1127.13.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1127.13.1.el7.x86_64.rpm</filename><sum type="sha256">59879294d334b00829f6737d527f3874361329c5939a137d75e2f5d465c722c0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2664" id="RHSA-2020:2664-1" title="Rhsa-2020:2664-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2827-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Memory corruption due to missing sign-extension for ValueTags on ARM64 (CVE-2020-12417) 
* Mozilla: Information disclosure due to manipulated URL object (CVE-2020-12418) 
* Mozilla: Use-after-free in nsGlobalWindowInner (CVE-2020-12419) 
* Mozilla: Use-After-Free when trying to connect to a STUN server (CVE-2020-12420) 
* Mozilla: Add-On updates did not respect the same certificate trust rules as software updates (CVE-2020-12421)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-07-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_8" src="firefox-68.10.0-1.el7_8.src.rpm" version="68.10.0"><filename>firefox-68.10.0-1.el7_8.i686.rpm</filename><sum type="sha256">fb0e14e53cefd80e6c2af9aedeadc058d8791914b82c2defd686469c5024962d</sum></package><package arch="x86_64" name="firefox" release="1.el7_8" src="firefox-68.10.0-1.el7_8.src.rpm" version="68.10.0"><filename>firefox-68.10.0-1.el7_8.x86_64.rpm</filename><sum type="sha256">84332b01d8275c1aa7b81f17105c111505a637c65ab1d11d98ec7f82de02b5ee</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2827" id="RHSA-2020:2827-1" title="Rhsa-2020:2827-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2894-1</id><title>Dbus</title><description>Security Fix(es): 
* dbus: denial of service via file descriptor leak (CVE-2020-12049)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-07-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="dbus-x11" release="14.el7_8" src="dbus-1.10.24-14.el7_8.src.rpm" version="1.10.24"><filename>dbus-x11-1.10.24-14.el7_8.x86_64.rpm</filename><sum type="sha256">8b7b8dca07e2b37d52c5f29490c991d4ea65d5a2e41d1b8f88b1069de77ad35c</sum></package><package arch="x86_64" epoch="1" name="dbus-tests" release="14.el7_8" src="dbus-1.10.24-14.el7_8.src.rpm" version="1.10.24"><filename>dbus-tests-1.10.24-14.el7_8.x86_64.rpm</filename><sum type="sha256">2d3b5c804b3644d8aecfafb70cb0f23e98279fa2c84245b069bb7af61369779e</sum></package><package arch="x86_64" epoch="1" name="dbus-libs" release="14.el7_8" src="dbus-1.10.24-14.el7_8.src.rpm" version="1.10.24"><filename>dbus-libs-1.10.24-14.el7_8.x86_64.rpm</filename><sum type="sha256">18d377ccfea34a09a7e92404055a9fa4b3de2cfd75229cf3cab6ebfa8bd2c439</sum></package><package arch="i686" epoch="1" name="dbus-devel" release="14.el7_8" src="dbus-1.10.24-14.el7_8.src.rpm" version="1.10.24"><filename>dbus-devel-1.10.24-14.el7_8.i686.rpm</filename><sum type="sha256">5b0358f9e63d9da0e5fbece921c0dfd3a492f9d1c887aa53081b14df9e4914ba</sum></package><package arch="i686" epoch="1" name="dbus-libs" release="14.el7_8" src="dbus-1.10.24-14.el7_8.src.rpm" version="1.10.24"><filename>dbus-libs-1.10.24-14.el7_8.i686.rpm</filename><sum type="sha256">e3e590e330e2b5379205b0d551eb65e4574bcc1341d8d27e77790bc1514516a5</sum></package><package arch="x86_64" epoch="1" name="dbus-devel" release="14.el7_8" src="dbus-1.10.24-14.el7_8.src.rpm" version="1.10.24"><filename>dbus-devel-1.10.24-14.el7_8.x86_64.rpm</filename><sum type="sha256">b558ba5ac9e20a6514d8aa7476940cec464a3165cedd0f7c6250b4f99d38aed9</sum></package><package arch="noarch" epoch="1" name="dbus-doc" release="14.el7_8" src="dbus-1.10.24-14.el7_8.src.rpm" version="1.10.24"><filename>dbus-doc-1.10.24-14.el7_8.noarch.rpm</filename><sum type="sha256">bced54d940739cd0ae17d64250a1e063e093d5c45ff3666e553d83e58a530ee9</sum></package><package arch="x86_64" epoch="1" name="dbus" release="14.el7_8" src="dbus-1.10.24-14.el7_8.src.rpm" version="1.10.24"><filename>dbus-1.10.24-14.el7_8.x86_64.rpm</filename><sum type="sha256">4f4730bd1a24bc1ffef6f35bf10a374828fa22f1d530e1adcdbe867453a11dd0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2894" id="RHSA-2020:2894-1" title="Rhsa-2020:2894-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2906-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Memory corruption due to missing sign-extension for ValueTags on ARM64 (CVE-2020-12417) 
* Mozilla: Information disclosure due to manipulated URL object (CVE-2020-12418) 
* Mozilla: Use-after-free in nsGlobalWindowInner (CVE-2020-12419) 
* Mozilla: Use-After-Free when trying to connect to a STUN server (CVE-2020-12420) 
* Mozilla: Add-On updates did not respect the same certificate trust rules as software updates (CVE-2020-12421)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-07-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_8" src="thunderbird-68.10.0-1.el7_8.src.rpm" version="68.10.0"><filename>thunderbird-68.10.0-1.el7_8.x86_64.rpm</filename><sum type="sha256">5fce71dd35aa68a2c8c13d9af40d68331a0d63661ac949f9b1e3949d3c2b1d5c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2906" id="RHSA-2020:2906-1" title="Rhsa-2020:2906-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2968-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583) 
* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593) 
* OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556) 
* OpenJDK: Unexpected exception raised by DerInputStream (Libraries, 8237731) (CVE-2020-14578) 
* OpenJDK: Unexpected exception raised by DerValue.equals() (Libraries, 8237736) (CVE-2020-14579) 
* OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621) 
* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-07-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.262.b10-0.el7_8.i686.rpm</filename><sum type="sha256">c25b46a0d2fe83eb11de1b3c67406cbb32d21adf5e36fef22d175b1fa55acbe1</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.262.b10-0.el7_8.x86_64.rpm</filename><sum type="sha256">1ce8d5e98058aa62e74b621b70cb470bbb2e740c8afd71b516dd5d3bdee13e4f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-src-debug-1.8.0.262.b10-0.el7_8.x86_64.rpm</filename><sum type="sha256">62497feef406d5b15f4ba290705aa480747061a4ceb1ab96ebb2a7cfce1c1d46</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.x86_64.rpm</filename><sum type="sha256">33d57328b81fd57106f8ea3d1351bd90fe2297303cb89bef4f1fd43b673d67df</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.262.b10-0.el7_8.i686.rpm</filename><sum type="sha256">badff50ef5eb9b8c1415f5a2a0b15fa903258ff032200a5870296f5d6fceadd3</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-src-debug-1.8.0.262.b10-0.el7_8.i686.rpm</filename><sum type="sha256">b3077b5c669315372b36c27a12b8e88a50bae2d8715bb3f8e09efe3bb1644caa</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-debug-1.8.0.262.b10-0.el7_8.x86_64.rpm</filename><sum type="sha256">d33b17d742e7dd4d19d6b23c10b0ef37d3f68d5110d4aa92ecf6702bfbe06636</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-demo-1.8.0.262.b10-0.el7_8.i686.rpm</filename><sum type="sha256">12926aff4ac3519791ae6b2c8ac72fd448b3a7ca27788be3fff97e353628a6a6</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.262.b10-0.el7_8.i686.rpm</filename><sum type="sha256">2f7f31f5a58b0afbaa8c86636762fe3310f740f66376351c35e3c2500b80638f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-headless-1.8.0.262.b10-0.el7_8.x86_64.rpm</filename><sum type="sha256">9003c15b94226ffb46ce3a4c6450ffe9c97ab26406e58fb9cf8d8d83cdce85e6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-src-1.8.0.262.b10-0.el7_8.x86_64.rpm</filename><sum type="sha256">60d10537b8ebf4032b9e6a05dc87d6bb953a7463285cfec2402129046e4cbb8e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-devel-1.8.0.262.b10-0.el7_8.i686.rpm</filename><sum type="sha256">676b594dafbcf182b6c99b8522dc4ee8ef2145eaa8c51da89dfb812220a267a9</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-devel-1.8.0.262.b10-0.el7_8.x86_64.rpm</filename><sum type="sha256">5599516b9e86a557c7c008ef0da9aaa12c95aa99490912504b295946ed7d0a07</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.262.b10-0.el7_8.noarch.rpm</filename><sum type="sha256">124d974d1d111a6a5763a63b98374a4471590e716124272c4d75f9ffd0cd4c65</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.262.b10-0.el7_8.x86_64.rpm</filename><sum type="sha256">733b5605d57fe3641bbb3ee20eba698a16f11503f8e9034aa74d578897a683fd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.262.b10-0.el7_8.x86_64.rpm</filename><sum type="sha256">99f2678549de7ab83bec22d2e6be32301ec8472ca4d97b0803a5c4be5da90540</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.262.b10-0.el7_8.x86_64.rpm</filename><sum type="sha256">b71b02a5272e24e6aaa0e1332b5f970c0dd3a29f195e019638d2553b80f8e195</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.i686.rpm</filename><sum type="sha256">b2673b9a059a08890340af10eda8f0598b70c835ac2b9acbd55437b7c13c1c64</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.262.b10-0.el7_8.i686.rpm</filename><sum type="sha256">335ca82c895c3d7c895c4568fa6565a1d979a1e27188caff3d048b1c41a73774</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.262.b10-0.el7_8.noarch.rpm</filename><sum type="sha256">996c6b9497139853baa1e5056cc7a8c24976b291b0e32f1a492684eea628890e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-headless-1.8.0.262.b10-0.el7_8.i686.rpm</filename><sum type="sha256">fe27cb5dc3b7653c620c93e1c5a0d4c76e6dc1c7887ee946c18692327dd80f24</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-accessibility-1.8.0.262.b10-0.el7_8.i686.rpm</filename><sum type="sha256">ea621a3aae7486798d54351a033bdc49301bf86a9ffe4f62b57d3f0caa5ab162</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-accessibility-1.8.0.262.b10-0.el7_8.x86_64.rpm</filename><sum type="sha256">b0aef98fcf54214b77c05910e3508cef7e752e45f774a8c234736b2d331e53d7</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-debug-1.8.0.262.b10-0.el7_8.i686.rpm</filename><sum type="sha256">7c929553ac57db6693e4f22c201c682025b3492a12ef5c5214dfcdb3f89f04d4</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-src-1.8.0.262.b10-0.el7_8.i686.rpm</filename><sum type="sha256">292248066f124c758731e9bc2c3eed55b660ac2a4f551e3bd89de7fcb0230eb6</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.262.b10-0.el7_8.noarch.rpm</filename><sum type="sha256">652f496dcc0797a659abc7a25ea9a772c42386f650c98eee0f198cb2bd459e49</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-demo-1.8.0.262.b10-0.el7_8.x86_64.rpm</filename><sum type="sha256">d37e78aae8a614c6543a578e5913d9496533c25b757b36e12f0367d8cf1aab3e</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.el7_8" src="java-1.8.0-openjdk-1.8.0.262.b10-0.el7_8.src.rpm" version="1.8.0.262.b10"><filename>java-1.8.0-openjdk-javadoc-1.8.0.262.b10-0.el7_8.noarch.rpm</filename><sum type="sha256">e11e861a1b9bc2136d69c988f8f64cb2ea670fa18785041bc4becf983ae36b2e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2968" id="RHSA-2020:2968-1" title="Rhsa-2020:2968-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:2969-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Bypass of boundary checks in nio.Buffer via concurrent access (Libraries, 8238920) (CVE-2020-14583) 
* OpenJDK: Incomplete bounds checks in Affine Transformations (2D, 8240119) (CVE-2020-14593) 
* OpenJDK: Incorrect handling of access control context in ForkJoinPool (Libraries, 8237117) (CVE-2020-14556) 
* OpenJDK: Excessive memory usage in ImageIO TIFF plugin (ImageIO, 8233239) (CVE-2020-14562) 
* OpenJDK: Incomplete interface type checks in Graal compiler (Hotspot, 8236867) (CVE-2020-14573) 
* OpenJDK: XML validation manipulation due to incomplete application of the use-grammar-pool-only feature (JAXP, 8242136) (CVE-2020-14621) 
* OpenJDK: HostnameChecker does not ensure X.509 certificate names are in normalized form (JSSE, 8237592) (CVE-2020-14577)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-07-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-debug-11.0.8.10-0.el7_8.i686.rpm</filename><sum type="sha256">a9b0110419f1df152ad813e59f935cfc82b2086cd52190e4d599446033d22be2</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-src-11.0.8.10-0.el7_8.i686.rpm</filename><sum type="sha256">0319a6a2690357159a8ffb7e724f2dc63e65d0f824fea8e1ccb7db206cfefea7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-jmods-debug-11.0.8.10-0.el7_8.x86_64.rpm</filename><sum type="sha256">21f4b120ad248ba5b9b3fe1ac7cbe03ebc0f6ea8cb04a84b8f9b996de8c46da4</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-demo-11.0.8.10-0.el7_8.i686.rpm</filename><sum type="sha256">ffdc82b2637ed4a610baf7ce17f8dc1f1920af7b956d92ee39a57475417db588</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-javadoc-zip-11.0.8.10-0.el7_8.i686.rpm</filename><sum type="sha256">beae6c0ace8672eed4179d03e27af0db9ca384c03b8083a52963d56c68503b69</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-11.0.8.10-0.el7_8.i686.rpm</filename><sum type="sha256">ef778642f06039caca9c495fa2c3451c3dc658f2bdf839d1d8a643aa8eea81e1</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-javadoc-zip-debug-11.0.8.10-0.el7_8.x86_64.rpm</filename><sum type="sha256">77e4e569ae072a1b740159a132f138bc754f1544d9c420bd6786a238758883dd</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-demo-debug-11.0.8.10-0.el7_8.x86_64.rpm</filename><sum type="sha256">86f027d64500ffc8807669355479ea664ac130a726ae38ccc17e3ba2a603b156</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-src-11.0.8.10-0.el7_8.x86_64.rpm</filename><sum type="sha256">39ac0c3a1a8111716bbaf498e8993079c0840924a208ca7ba5973aa863354551</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-headless-debug-11.0.8.10-0.el7_8.i686.rpm</filename><sum type="sha256">6054356c4b57d0c879e97ce6bc12eee483f15421b2c2ca454921c50cd24281d5</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-headless-11.0.8.10-0.el7_8.i686.rpm</filename><sum type="sha256">633cd5aa2cfd41f7c6a46610edd9b5a51f8c414f068df144ad703fe8a78677fc</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-javadoc-zip-11.0.8.10-0.el7_8.x86_64.rpm</filename><sum type="sha256">ee7c81b54bbc1c5f693b457515c634a9ebeaae78a09333d51e6b70c4ed86d27f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-debug-11.0.8.10-0.el7_8.x86_64.rpm</filename><sum type="sha256">35612cf7654f5d8767ecd8687e4f61d507df7d63d37839aaf879f2f2a4631e8c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-src-debug-11.0.8.10-0.el7_8.i686.rpm</filename><sum type="sha256">610bb16318f87ba2db84e3cff209f26a8317146b61936d49c5b33b97266b6a70</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-headless-11.0.8.10-0.el7_8.x86_64.rpm</filename><sum type="sha256">51f59303cc115ffadff1e3cc850dd1b7ee3b3702c013e36c82b58eefa6bb641d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-javadoc-debug-11.0.8.10-0.el7_8.i686.rpm</filename><sum type="sha256">c9fd077067ee02b0c2999fbd750d182859cab791c0994bc636e5d907d858b096</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-jmods-11.0.8.10-0.el7_8.i686.rpm</filename><sum type="sha256">95853bfe16b648ee8486dfc4f076a6b6b3d621f3893bccd14faacb14869d7c45</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-javadoc-zip-debug-11.0.8.10-0.el7_8.i686.rpm</filename><sum type="sha256">808b3edb8a347caf2c5126f87b7b6e1ba8166ed8ea3598265ec3b242733016f2</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-demo-11.0.8.10-0.el7_8.x86_64.rpm</filename><sum type="sha256">7be688a2a93060eec5425fc00f4b7af5ab784ee7c4aef31d629b64b037435794</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-devel-debug-11.0.8.10-0.el7_8.x86_64.rpm</filename><sum type="sha256">8de9124203a43fe5c94405f575f6c42fb868120f6e2766f886cedc2c0e23eb8c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-src-debug-11.0.8.10-0.el7_8.x86_64.rpm</filename><sum type="sha256">ee1245080879d431ec2ef46ab06712e7a073223e13516848dbff8778b54ff40e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-jmods-debug-11.0.8.10-0.el7_8.i686.rpm</filename><sum type="sha256">d71ae88e48578c33a45d6151bc308caf01f54056e76215b8f44a1d262c35552f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-jmods-11.0.8.10-0.el7_8.x86_64.rpm</filename><sum type="sha256">220ed7a3d41c2757e5635f7cde6a313b56ae8a06c7b0b3eed78f34a1d3533367</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-javadoc-debug-11.0.8.10-0.el7_8.x86_64.rpm</filename><sum type="sha256">b5418245f0890743c2846e4f495002efc9736dc3d1bfc82fde9e78eaab81b304</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-devel-11.0.8.10-0.el7_8.x86_64.rpm</filename><sum type="sha256">26e1bfd3f61c884608efb4efab299256215f56bce7a175106e3a62c5e83f5d35</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-javadoc-11.0.8.10-0.el7_8.x86_64.rpm</filename><sum type="sha256">268ce71bdb1210ebdcec9675e7dec2d4e9f8da2917c6d3d56aca61fe3d8b2c23</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-devel-11.0.8.10-0.el7_8.i686.rpm</filename><sum type="sha256">2ec52909847d2f94c62e643b04828c33d547df0a57aeba57d3666192c61924ae</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-demo-debug-11.0.8.10-0.el7_8.i686.rpm</filename><sum type="sha256">d5efda7ddb576c748a34b6427d05b6bfc969c18647f54d0dd55d334ea20de010</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-11.0.8.10-0.el7_8.x86_64.rpm</filename><sum type="sha256">9329751833ad7e0040ce3234c094823dac3879b7c0da664da3660c41cb1e1c5d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-devel-debug-11.0.8.10-0.el7_8.i686.rpm</filename><sum type="sha256">6570ac3910a747e508d90aae0ee3d442c1541e381b48210f4b4b9ccd477f8f08</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-javadoc-11.0.8.10-0.el7_8.i686.rpm</filename><sum type="sha256">413b519b8c832957880ba0fe3cc2901fc0a683df3d1c8274c218edf574d4dd9c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_8" src="java-11-openjdk-11.0.8.10-0.el7_8.src.rpm" version="11.0.8.10"><filename>java-11-openjdk-headless-debug-11.0.8.10-0.el7_8.x86_64.rpm</filename><sum type="sha256">ba7b71dd858372163c956387ea6b510ac790312f58875b579e90b6898ac38058</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:2969" id="RHSA-2020:2969-1" title="Rhsa-2020:2969-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3217-1</id><title>Grub2</title><description>Security Fix(es): 
* grub2: Crafted grub.cfg file can lead to arbitrary code execution during boot process (CVE-2020-10713) 
* grub2: grub_malloc does not validate allocation size allowing for arithmetic overflow and subsequent heap-based buffer overflow (CVE-2020-14308) 
* grub2: Integer overflow in grub_squash_read_symlink may lead to heap-based buffer overflow (CVE-2020-14309) 
* grub2: Integer overflow read_section_as_string may lead to heap-based buffer overflow (CVE-2020-14310) 
* grub2: Integer overflow in grub_ext2_read_link leads to heap-based buffer overflow (CVE-2020-14311) 
* grub2: Fail kernel validation without shim protocol (CVE-2020-15705) 
* grub2: Use-after-free redefining a function whilst the same function is already executing (CVE-2020-15706) 
* grub2: Integer overflow in initrd size handling (CVE-2020-15707)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-07-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="mokutil" release="7.sl7_8" src="shim-signed-15-7.sl7_8.src.rpm" version="15"><filename>mokutil-15-7.sl7_8.x86_64.rpm</filename><sum type="sha256">25149e24397bb7a04aa20ec53bfea557a0bb0606131666472c15f628ab5cc254</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64-cdboot" release="0.86.sl7_8" src="grub2-2.02-0.86.sl7_8.src.rpm" version="2.02"><filename>grub2-efi-x64-cdboot-2.02-0.86.sl7_8.x86_64.rpm</filename><sum type="sha256">a25e9b06a21f68fa1fc8a16c20969e11d4a6a7471cbd44f8605191d16a5da129</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64" release="0.86.sl7_8" src="grub2-2.02-0.86.sl7_8.src.rpm" version="2.02"><filename>grub2-efi-x64-2.02-0.86.sl7_8.x86_64.rpm</filename><sum type="sha256">ca76b954d60a5e3e974f468ce8d2037041b36d8743e88985d7ae0a3a83b55640</sum></package><package arch="x86_64" name="fwupdate-devel" release="6.el7" src="fwupdate-12-6.el7.src.rpm" version="12"><filename>fwupdate-devel-12-6.el7.x86_64.rpm</filename><sum type="sha256">cd508ed1e4060d9fc856667f9c06a35df72dbea1c3549926f23ccf7c005b2e34</sum></package><package arch="x86_64" epoch="1" name="grub2" release="0.86.sl7_8" src="grub2-2.02-0.86.sl7_8.src.rpm" version="2.02"><filename>grub2-2.02-0.86.sl7_8.x86_64.rpm</filename><sum type="sha256">95329c2057da4c23c41507cf9db560277301222eee5259921851deec33a86de3</sum></package><package arch="x86_64" name="shim-ia32" release="7.sl7_8" src="shim-signed-15-7.sl7_8.src.rpm" version="15"><filename>shim-ia32-15-7.sl7_8.x86_64.rpm</filename><sum type="sha256">788f513bbbc9b629bd59fbf93631cf7d54b9a41b3b52d8d1599ea0fbd3f3b2b9</sum></package><package arch="x86_64" name="shim-ia32" release="8.sl7_8" src="shim-signed-15-8.sl7_8.src.rpm" version="15"><filename>shim-ia32-15-8.sl7_8.x86_64.rpm</filename><sum type="sha256">7e4b9f377e73df5edd541b2ce5855eac42369c8408bfd454eeabb9252fcf8aa4</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-extra" release="0.86.sl7_8" src="grub2-2.02-0.86.sl7_8.src.rpm" version="2.02"><filename>grub2-tools-extra-2.02-0.86.sl7_8.x86_64.rpm</filename><sum type="sha256">b15e14291090912c8b1e3b1ca4e3e49020d58caf1d91fe19311d1624c4f64174</sum></package><package arch="x86_64" name="mokutil" release="8.sl7_8" src="shim-signed-15-8.sl7_8.src.rpm" version="15"><filename>mokutil-15-8.sl7_8.x86_64.rpm</filename><sum type="sha256">e242f2611a84fc7af2d5ad684179b38d633e9521aa4ee9538f7eab4f96624774</sum></package><package arch="x86_64" name="shim-unsigned-x64" release="7.sl7_8" src="shim-15-7.sl7_8.src.rpm" version="15"><filename>shim-unsigned-x64-15-7.sl7_8.x86_64.rpm</filename><sum type="sha256">388c84a4a6aeeb792fe7f9720b28ef933186396d72e49f1893fc8839967e3810</sum></package><package arch="x86_64" epoch="1" name="grub2-pc" release="0.86.sl7_8" src="grub2-2.02-0.86.sl7_8.src.rpm" version="2.02"><filename>grub2-pc-2.02-0.86.sl7_8.x86_64.rpm</filename><sum type="sha256">4e11c0dafc44e87829f70827b400353dfd7d1473b517f838c5f545f628f55e24</sum></package><package arch="noarch" epoch="1" name="grub2-efi-ia32-modules" release="0.86.sl7_8" src="grub2-2.02-0.86.sl7_8.src.rpm" version="2.02"><filename>grub2-efi-ia32-modules-2.02-0.86.sl7_8.noarch.rpm</filename><sum type="sha256">383e09759462fdd31408346574526270c4a15c3201c47360a5b35016c073ad1e</sum></package><package arch="noarch" epoch="1" name="grub2-common" release="0.86.sl7_8" src="grub2-2.02-0.86.sl7_8.src.rpm" version="2.02"><filename>grub2-common-2.02-0.86.sl7_8.noarch.rpm</filename><sum type="sha256">8438ecb28b007ae06eee6231a766fc0a55d415f44dc14ff831d895e5a9c527cd</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-minimal" release="0.86.sl7_8" src="grub2-2.02-0.86.sl7_8.src.rpm" version="2.02"><filename>grub2-tools-minimal-2.02-0.86.sl7_8.x86_64.rpm</filename><sum type="sha256">ff7406b6020f013eb36ccf7591fb46c36bbec1ed7b46c6507abef7752dc0615a</sum></package><package arch="x86_64" name="fwupdate-efi" release="6.el7" src="fwupdate-12-6.el7.src.rpm" version="12"><filename>fwupdate-efi-12-6.el7.x86_64.rpm</filename><sum type="sha256">5e9513f385cd09ba69a243b3e00a1a46f1f1410ab0acbb803a3c7b616dd6611c</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32" release="0.86.sl7_8" src="grub2-2.02-0.86.sl7_8.src.rpm" version="2.02"><filename>grub2-efi-ia32-2.02-0.86.sl7_8.x86_64.rpm</filename><sum type="sha256">9c786a669ef363b8b6862cfb5982d5d5d712e2235a536b1ff3fc30176b8444ca</sum></package><package arch="x86_64" name="fwupdate-libs" release="6.el7" src="fwupdate-12-6.el7.src.rpm" version="12"><filename>fwupdate-libs-12-6.el7.x86_64.rpm</filename><sum type="sha256">31f60b8c9f5f402ee306fb5e1a9a4dca1bc700ebd972f7cc2d7b189554226fd4</sum></package><package arch="noarch" epoch="1" name="grub2-pc-modules" release="0.86.sl7_8" src="grub2-2.02-0.86.sl7_8.src.rpm" version="2.02"><filename>grub2-pc-modules-2.02-0.86.sl7_8.noarch.rpm</filename><sum type="sha256">a906cfc95bb28c7a5506ed6509fe26f4c7b0ab9cd42f7c4aa7ff3bd112fd1ca0</sum></package><package arch="x86_64" name="shim-unsigned-ia32" release="7.sl7_8" src="shim-15-7.sl7_8.src.rpm" version="15"><filename>shim-unsigned-ia32-15-7.sl7_8.x86_64.rpm</filename><sum type="sha256">c3bb830b14b10e310d48796ae1b055c730b3143ffac5654e7b49491dd8849721</sum></package><package arch="x86_64" epoch="1" name="grub2-tools" release="0.86.sl7_8" src="grub2-2.02-0.86.sl7_8.src.rpm" version="2.02"><filename>grub2-tools-2.02-0.86.sl7_8.x86_64.rpm</filename><sum type="sha256">9837f02dc7cb340ab34f3155610f0a979c28c25c540c88798c0206c08484e0e1</sum></package><package arch="x86_64" name="fwupdate" release="6.el7" src="fwupdate-12-6.el7.src.rpm" version="12"><filename>fwupdate-12-6.el7.x86_64.rpm</filename><sum type="sha256">25da2674b397b0a9a39a7d6add874969a8546564f3010532a4e4d9b92963d9fe</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32-cdboot" release="0.86.sl7_8" src="grub2-2.02-0.86.sl7_8.src.rpm" version="2.02"><filename>grub2-efi-ia32-cdboot-2.02-0.86.sl7_8.x86_64.rpm</filename><sum type="sha256">ed63193ca324bbae6daf61b5fc08dcbe9c2fd37e43a1481943e96fe8761ced76</sum></package><package arch="x86_64" name="shim-x64" release="7.sl7_8" src="shim-signed-15-7.sl7_8.src.rpm" version="15"><filename>shim-x64-15-7.sl7_8.x86_64.rpm</filename><sum type="sha256">46faa14554f3fa8ea68524bd67bb9bdcef66aca62ef694e8b4b67bdf0b5fa802</sum></package><package arch="x86_64" name="shim-x64" release="8.sl7_8" src="shim-signed-15-8.sl7_8.src.rpm" version="15"><filename>shim-x64-15-8.sl7_8.x86_64.rpm</filename><sum type="sha256">68555de75739afa5dac0bfd9ce0abf46b78421d3ac3d483d41e4058d7074fa7a</sum></package><package arch="noarch" epoch="1" name="grub2-efi-x64-modules" release="0.86.sl7_8" src="grub2-2.02-0.86.sl7_8.src.rpm" version="2.02"><filename>grub2-efi-x64-modules-2.02-0.86.sl7_8.noarch.rpm</filename><sum type="sha256">2806b7d73ed638e7423ed0f09473c2006b2455adfa821e090f6b950f40187585</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3217" id="RHSA-2020:3217-1" title="Rhsa-2020:3217-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3220-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: kernel: DAX hugepages not considered during mremap (CVE-2020-10757) 
* kernel: buffer overflow in mwifiex_cmd_append_vsie_tlv function in drivers/net/wireless/marvell/mwifiex/scan.c (CVE-2020-12653) 
* kernel: heap-based buffer overflow in mwifiex_ret_wmm_get_status function in drivers/net/wireless/marvell/mwifiex/wmm.c (CVE-2020-12654) 
* kernel: use-after-free caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver (CVE-2019-19527)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-07-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kernel-abi-whitelists" release="1127.18.2.el7" src="kernel-3.10.0-1127.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1127.18.2.el7.noarch.rpm</filename><sum type="sha256">88ef67016077eb8a8b942ac97e7f3d8799f1d14279b397761c734d681f1e37b2</sum></package><package arch="x86_64" name="kernel-headers" release="1127.18.2.el7" src="kernel-3.10.0-1127.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1127.18.2.el7.x86_64.rpm</filename><sum type="sha256">f9bacb2300c029b3be53b09443c447567c61af3d4af2848acdfa0020099dcbeb</sum></package><package arch="x86_64" name="kernel-tools" release="1127.18.2.el7" src="kernel-3.10.0-1127.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1127.18.2.el7.x86_64.rpm</filename><sum type="sha256">6bd8eb64278ebdfdbfeff3f9791f404a96bef42fd8c3dfea102d6d675e8b0356</sum></package><package arch="noarch" name="kernel-doc" release="1127.18.2.el7" src="kernel-3.10.0-1127.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1127.18.2.el7.noarch.rpm</filename><sum type="sha256">914614c1e3e9ea42a3f2d570739f691437f51b5e783a87d6503f6838d2a55304</sum></package><package arch="x86_64" name="perf" release="1127.18.2.el7" src="kernel-3.10.0-1127.18.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1127.18.2.el7.x86_64.rpm</filename><sum type="sha256">653935c5e314256387530bd667c6c06cf0b52ffcf3c94d664e41767a545f149b</sum></package><package arch="x86_64" name="kernel-devel" release="1127.18.2.el7" src="kernel-3.10.0-1127.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1127.18.2.el7.x86_64.rpm</filename><sum type="sha256">f748cf0459c04f6ce6740d925a703bcf5b780d9bca65877b4a44d42912dd6a61</sum></package><package arch="x86_64" name="kernel-debug" release="1127.18.2.el7" src="kernel-3.10.0-1127.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1127.18.2.el7.x86_64.rpm</filename><sum type="sha256">30ec54dd441a6ea14c14682f8f718e25ce2787f3b709ead1afe0f54681a0eef6</sum></package><package arch="x86_64" name="python-perf" release="1127.18.2.el7" src="kernel-3.10.0-1127.18.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1127.18.2.el7.x86_64.rpm</filename><sum type="sha256">80ce8ccc6a835980ec28b8571c8cd75bf3e3d63fe8e1162512cbda89e2eb1201</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1127.18.2.el7" src="kernel-3.10.0-1127.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1127.18.2.el7.x86_64.rpm</filename><sum type="sha256">d341efa571760005bd5d2d41362e502d942cd74d6aabf02665c94df99993f5e2</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1127.18.2.el7" src="kernel-3.10.0-1127.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1127.18.2.el7.x86_64.rpm</filename><sum type="sha256">587ea412e4e4ba2cd041c9ffe2f5e899f162b1cda9851db5480c856c549357d5</sum></package><package arch="x86_64" name="bpftool" release="1127.18.2.el7" src="kernel-3.10.0-1127.18.2.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1127.18.2.el7.x86_64.rpm</filename><sum type="sha256">144df27c7cbbbc8e3f48da52b9f104dee49b8664366ad54b28848fba84df7dd6</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1127.18.2.el7" src="kernel-3.10.0-1127.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1127.18.2.el7.x86_64.rpm</filename><sum type="sha256">57c45c7cc9913221da733a6605580c03477fa2ad68ec63f8c35612c7679be57d</sum></package><package arch="x86_64" name="kernel" release="1127.18.2.el7" src="kernel-3.10.0-1127.18.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1127.18.2.el7.x86_64.rpm</filename><sum type="sha256">3021ec30d21977edbc80fc09fa562f665075717c6d0636e1387856f1fed1399c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3220" id="RHSA-2020:3220-1" title="Rhsa-2020:3220-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3253-1</id><title>Firefox</title><description>Security Fix(es): 
* chromium-browser: Use after free in ANGLE (CVE-2020-6463) 
* chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6514) 
* Mozilla: Potential leak of redirect targets when loading scripts in a worker (CVE-2020-15652) 
* Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 (CVE-2020-15659)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-08-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_8" src="firefox-68.11.0-1.el7_8.src.rpm" version="68.11.0"><filename>firefox-68.11.0-1.el7_8.x86_64.rpm</filename><sum type="sha256">891f97022fc7edcd6ade88f35d3a30ef46863d355a5249dba2b02b5f0d3b8043</sum></package><package arch="i686" name="firefox" release="1.el7_8" src="firefox-68.11.0-1.el7_8.src.rpm" version="68.11.0"><filename>firefox-68.11.0-1.el7_8.i686.rpm</filename><sum type="sha256">36cd5a2c005fbcb8a7a0a3ee3e8258a8886069f2da069254baf722d641b254b8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3253" id="RHSA-2020:3253-1" title="Rhsa-2020:3253-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3281-1</id><title>Libvncserver</title><description>Security Fix(es): 
* libvncserver: websocket decoding buffer overflow (CVE-2017-18922)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-08-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libvncserver" release="14.el7_8.1" src="libvncserver-0.9.9-14.el7_8.1.src.rpm" version="0.9.9"><filename>libvncserver-0.9.9-14.el7_8.1.i686.rpm</filename><sum type="sha256">ccc988c09ea9883f4139451b785491799ac2b409bc5077ef5206e911a7c42cc1</sum></package><package arch="x86_64" name="libvncserver-devel" release="14.el7_8.1" src="libvncserver-0.9.9-14.el7_8.1.src.rpm" version="0.9.9"><filename>libvncserver-devel-0.9.9-14.el7_8.1.x86_64.rpm</filename><sum type="sha256">7615c1aa2b9cbe5173daf75127f9dc7ad88f9361597fa68a570188fe2237470f</sum></package><package arch="x86_64" name="libvncserver" release="14.el7_8.1" src="libvncserver-0.9.9-14.el7_8.1.src.rpm" version="0.9.9"><filename>libvncserver-0.9.9-14.el7_8.1.x86_64.rpm</filename><sum type="sha256">9ffc66f52ef7c3e3b2f137e9d2a2f3b0a3116e2f21aa3b3ee039b6c2f4a617b4</sum></package><package arch="i686" name="libvncserver-devel" release="14.el7_8.1" src="libvncserver-0.9.9-14.el7_8.1.src.rpm" version="0.9.9"><filename>libvncserver-devel-0.9.9-14.el7_8.1.i686.rpm</filename><sum type="sha256">4f2981733cb6094d99e319be3895c311d4430ef0f9d78bf50c1758ed0964c237</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3281" id="RHSA-2020:3281-1" title="Rhsa-2020:3281-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3285-1</id><title>Postgresql-Jdbc</title><description>Security Fix(es): 
* postgresql-jdbc: XML external entity (XXE) vulnerability in PgSQLXML (CVE-2020-13692)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-08-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="postgresql-jdbc" release="8.el7_8" src="postgresql-jdbc-9.2.1002-8.el7_8.src.rpm" version="9.2.1002"><filename>postgresql-jdbc-9.2.1002-8.el7_8.noarch.rpm</filename><sum type="sha256">3289199b7bfb79633a8fb67109b9a8458b7c3fba0948164b83d76976e0195228</sum></package><package arch="noarch" name="postgresql-jdbc-javadoc" release="8.el7_8" src="postgresql-jdbc-9.2.1002-8.el7_8.src.rpm" version="9.2.1002"><filename>postgresql-jdbc-javadoc-9.2.1002-8.el7_8.noarch.rpm</filename><sum type="sha256">63b0078e5f040d3d4583dd5976c42a5ba0cfad49a314d60567ea1a85bb00588c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3285" id="RHSA-2020:3285-1" title="Rhsa-2020:3285-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3344-1</id><title>Thunderbird</title><description>Security Fix(es): 
* chromium-browser: Use after free in ANGLE (CVE-2020-6463) 
* chromium-browser: Inappropriate implementation in WebRTC (CVE-2020-6514) 
* Mozilla: Potential leak of redirect targets when loading scripts in a worker (CVE-2020-15652) 
* Mozilla: Memory safety bugs fixed in Firefox 79 and Firefox ESR 68.11 (CVE-2020-15659)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-08-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_8" src="thunderbird-68.11.0-1.el7_8.src.rpm" version="68.11.0"><filename>thunderbird-68.11.0-1.el7_8.x86_64.rpm</filename><sum type="sha256">39bd1f9624b8bb39d2a4ea429c6a261c079ee917961f09ff57cb1f32ff5d1ac2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3344" id="RHSA-2020:3344-1" title="Rhsa-2020:3344-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3556-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Attacker-induced prompt for extension installation (CVE-2020-15664)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_8" src="firefox-68.12.0-1.el7_8.src.rpm" version="68.12.0"><filename>firefox-68.12.0-1.el7_8.i686.rpm</filename><sum type="sha256">c4c7806f3c2ec925e5079abfffdde33edb14dff920a9bdbb53a8d9ad2f19f71f</sum></package><package arch="x86_64" name="firefox" release="1.el7_8" src="firefox-68.12.0-1.el7_8.src.rpm" version="68.12.0"><filename>firefox-68.12.0-1.el7_8.x86_64.rpm</filename><sum type="sha256">a6a85479c9ffbed96a2292cd56983b7bf9f54a69947184ac2854396e66f38957</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3556" id="RHSA-2020:3556-1" title="Rhsa-2020:3556-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3617-1</id><title>Dovecot</title><description>Security Fix(es): 
* dovecot: Resource exhaustion via deeply nested MIME parts (CVE-2020-12100) 
* dovecot: Out of bound reads in dovecot NTLM implementation (CVE-2020-12673) 
* dovecot: Crash due to assert in RPA implementation (CVE-2020-12674)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-09-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="dovecot-mysql" release="6.el7_8.1" src="dovecot-2.2.36-6.el7_8.1.src.rpm" version="2.2.36"><filename>dovecot-mysql-2.2.36-6.el7_8.1.x86_64.rpm</filename><sum type="sha256">a507781d099d497f58bf28a0a357bd8cba7163e41b48f45fdf5693170b2f0fd4</sum></package><package arch="i686" epoch="1" name="dovecot-devel" release="6.el7_8.1" src="dovecot-2.2.36-6.el7_8.1.src.rpm" version="2.2.36"><filename>dovecot-devel-2.2.36-6.el7_8.1.i686.rpm</filename><sum type="sha256">01141fb6f2c7b54ce8ed764f3c7125dfbc24338f1129d23db898bd484cb09958</sum></package><package arch="x86_64" epoch="1" name="dovecot-devel" release="6.el7_8.1" src="dovecot-2.2.36-6.el7_8.1.src.rpm" version="2.2.36"><filename>dovecot-devel-2.2.36-6.el7_8.1.x86_64.rpm</filename><sum type="sha256">814f2c5519e688465446faa3b3d2d24438bb325d672bca752edf466366bab08a</sum></package><package arch="x86_64" epoch="1" name="dovecot" release="6.el7_8.1" src="dovecot-2.2.36-6.el7_8.1.src.rpm" version="2.2.36"><filename>dovecot-2.2.36-6.el7_8.1.x86_64.rpm</filename><sum type="sha256">c71bbc74d5af3dbf7070a4f48976ad5431c8ac657e775beabb3c056758e7848f</sum></package><package arch="x86_64" epoch="1" name="dovecot-pgsql" release="6.el7_8.1" src="dovecot-2.2.36-6.el7_8.1.src.rpm" version="2.2.36"><filename>dovecot-pgsql-2.2.36-6.el7_8.1.x86_64.rpm</filename><sum type="sha256">1ef83742a0476b97e60facf48a5a992985b3cd60e968c43f1f14c497c5c98df0</sum></package><package arch="i686" epoch="1" name="dovecot" release="6.el7_8.1" src="dovecot-2.2.36-6.el7_8.1.src.rpm" version="2.2.36"><filename>dovecot-2.2.36-6.el7_8.1.i686.rpm</filename><sum type="sha256">7731998263496ea7694a4be9c4f0d731f462be7ced5420b5741fa2613cf5126c</sum></package><package arch="x86_64" epoch="1" name="dovecot-pigeonhole" release="6.el7_8.1" src="dovecot-2.2.36-6.el7_8.1.src.rpm" version="2.2.36"><filename>dovecot-pigeonhole-2.2.36-6.el7_8.1.x86_64.rpm</filename><sum type="sha256">2363f0e5efc1185c5e6ba573a7a92df42ceaa1e98583bc2e7f600442e0b8af5d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3617" id="RHSA-2020:3617-1" title="Rhsa-2020:3617-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3631-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Attacker-induced prompt for extension installation (CVE-2020-15664) 
* Mozilla: Use-After-Free when aborting an operation (CVE-2020-15669)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-09-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_8" src="thunderbird-68.12.0-1.el7_8.src.rpm" version="68.12.0"><filename>thunderbird-68.12.0-1.el7_8.x86_64.rpm</filename><sum type="sha256">dff64d6f24363451749037dbcf0758e2f7df584b87719e9f0b78c987476a9979</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3631" id="RHSA-2020:3631-1" title="Rhsa-2020:3631-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3848-1</id><title>Libmspack</title><description>Security Fix(es): 
* libmspack: buffer overflow in function chmd_read_headers() (CVE-2019-1010305)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libmspack" release="0.8.alpha.el7" src="libmspack-0.5-0.8.alpha.el7.src.rpm" version="0.5"><filename>libmspack-0.5-0.8.alpha.el7.x86_64.rpm</filename><sum type="sha256">41311f31457f4f756f9e1942224751cff503b72d974ae4f22f07826c2aa128bf</sum></package><package arch="i686" name="libmspack-devel" release="0.8.alpha.el7" src="libmspack-0.5-0.8.alpha.el7.src.rpm" version="0.5"><filename>libmspack-devel-0.5-0.8.alpha.el7.i686.rpm</filename><sum type="sha256">33ad46ba4af18f39fd96519dccec0d132e06e32c0fff3ae0f184a699fb2ef1d2</sum></package><package arch="i686" name="libmspack" release="0.8.alpha.el7" src="libmspack-0.5-0.8.alpha.el7.src.rpm" version="0.5"><filename>libmspack-0.5-0.8.alpha.el7.i686.rpm</filename><sum type="sha256">71aa1de05bbbd120f8a80c43e91bf43cb02888f16786e63e755847a8e2b9d535</sum></package><package arch="x86_64" name="libmspack-devel" release="0.8.alpha.el7" src="libmspack-0.5-0.8.alpha.el7.src.rpm" version="0.5"><filename>libmspack-devel-0.5-0.8.alpha.el7.x86_64.rpm</filename><sum type="sha256">a7c8d1b66389e0e5b8d28c80232607abbd6c5b2d858566697ba0f15c6e15fa7a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1010305" id="CVE-2019-1010305" title="Cve-2019-1010305" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3848" id="RHSA-2020:3848-1" title="Rhsa-2020:3848-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730568" id="1730568" title="Cve-2019-1010305 Libmspack: Buffer Overflow In Function Chmd_Read_Headers()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3861-1</id><title>Glibc</title><description>Security Fix(es): 
* glibc: LD_PREFER_MAP_32BIT_EXEC not ignored in setuid binaries (CVE-2019-19126)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="glibc-devel" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>glibc-devel-2.17-317.el7.i686.rpm</filename><sum type="sha256">b54addb92e1fd63a02c50f03488e00892a51602fc1208e3d9219ee3b0425097a</sum></package><package arch="x86_64" name="glibc-common" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>glibc-common-2.17-317.el7.x86_64.rpm</filename><sum type="sha256">3e35753d321f94879f260cecfab0f0af189cfbde3be8a81b74a6534e5b61c0b4</sum></package><package arch="x86_64" name="glibc-utils" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>glibc-utils-2.17-317.el7.x86_64.rpm</filename><sum type="sha256">4bee882d975d57ec82e900cd282b206c125da3d188900829f5b4b7b26a7f3c6c</sum></package><package arch="x86_64" name="glibc-headers" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>glibc-headers-2.17-317.el7.x86_64.rpm</filename><sum type="sha256">08b6e6a7a630564ff22d00916d88c866a84cecedd53d96f14fb3213033634c45</sum></package><package arch="x86_64" name="glibc-devel" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>glibc-devel-2.17-317.el7.x86_64.rpm</filename><sum type="sha256">5deae7193de12549166f1cd5b82dcb13ad609a517597b5460c029b2c22bb3c72</sum></package><package arch="x86_64" name="nscd" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>nscd-2.17-317.el7.x86_64.rpm</filename><sum type="sha256">60fed772cfa9694f3f618c1bfedf86fff5300877ff3f31a57e6a65598be2d86f</sum></package><package arch="i686" name="glibc-static" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>glibc-static-2.17-317.el7.i686.rpm</filename><sum type="sha256">298dc4ef9855e9fa6360093578e621ec4cf5f44f9f8a1b1f0adb5f13d9e5ee83</sum></package><package arch="i686" name="glibc" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>glibc-2.17-317.el7.i686.rpm</filename><sum type="sha256">3d66fa6a4fdf2d1c3d2f6853c35958e700556f22826998c21839ef65b535c228</sum></package><package arch="x86_64" name="glibc-static" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>glibc-static-2.17-317.el7.x86_64.rpm</filename><sum type="sha256">6a2e3e27b3b370ff2c77d99f82524a5b5a736b3162dfd214e9e846560fd6b95e</sum></package><package arch="x86_64" name="glibc" release="317.el7" src="glibc-2.17-317.el7.src.rpm" version="2.17"><filename>glibc-2.17-317.el7.x86_64.rpm</filename><sum type="sha256">4c7ef22bb13adea1db797d46db4d7e38144839a990b00791c5b146ee5f1959e0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19126" id="CVE-2019-19126" title="Cve-2019-19126" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3861" id="RHSA-2020:3861-1" title="Rhsa-2020:3861-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1763325" id="1763325" title="Argp.H Kills __Attribute__, Causing Gcc 4.8.5 With -Std=C++ Results In Compile / Link Errors For __Gthrw_Pthread_Mutex_* Functions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1772307" id="1772307" title="Glibc: Measured Performance Loss In Lmbench For Bcopy On Haswell Processor" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1774681" id="1774681" title="Cve-2019-19126 Glibc: Ld_Prefer_Map_32Bit_Exec Not Ignored In Setuid Binaries" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775816" id="1775816" title="Glibc: Disable Libio Vtable Validation For Interposed Pre-2.1 Stdio Handles [Rhel-7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1795573" id="1795573" title="Glibc: Remove Problematic Obsoletes: From The Spec File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1834816" id="1834816" title="Glibc: Internal_End*Ent In Nss_Compat May Clobber Errno, Hiding Erange" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3864-1</id><title>Cups</title><description>Security Fix(es): 
* cups: DNS rebinding attacks via incorrect whitelist (CVE-2017-18190) 
* cups: stack-buffer-overflow in libcups's asn1_get_type function (CVE-2019-8675) 
* cups: stack-buffer-overflow in libcups's asn1_get_packed function (CVE-2019-8696)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="cups-ipptool" release="51.el7" src="cups-1.6.3-51.el7.src.rpm" version="1.6.3"><filename>cups-ipptool-1.6.3-51.el7.x86_64.rpm</filename><sum type="sha256">abbf65d0730c8623d87d754b024e0e71a6c6469b922d4cbf6aee7748986a4f7b</sum></package><package arch="i686" epoch="1" name="cups-libs" release="51.el7" src="cups-1.6.3-51.el7.src.rpm" version="1.6.3"><filename>cups-libs-1.6.3-51.el7.i686.rpm</filename><sum type="sha256">f34fd5420818e5d64bdf14e69b516fc8e7419d8e587a5cc2002ac4eac0fec31d</sum></package><package arch="x86_64" epoch="1" name="cups-client" release="51.el7" src="cups-1.6.3-51.el7.src.rpm" version="1.6.3"><filename>cups-client-1.6.3-51.el7.x86_64.rpm</filename><sum type="sha256">fb79471cac1098e9e9ce97fbab3436252d162e208ed31055af01fc1ec9940a48</sum></package><package arch="i686" epoch="1" name="cups-devel" release="51.el7" src="cups-1.6.3-51.el7.src.rpm" version="1.6.3"><filename>cups-devel-1.6.3-51.el7.i686.rpm</filename><sum type="sha256">48ff95dd5b1ea2d6772013197c49e35e13a13e47cdb8cd694f26ac6419b86f51</sum></package><package arch="x86_64" epoch="1" name="cups-libs" release="51.el7" src="cups-1.6.3-51.el7.src.rpm" version="1.6.3"><filename>cups-libs-1.6.3-51.el7.x86_64.rpm</filename><sum type="sha256">6a4150f8ba8a33881386c4f43fe3ca5d5337d6b4faa98af7c66b4323b49602f5</sum></package><package arch="x86_64" epoch="1" name="cups" release="51.el7" src="cups-1.6.3-51.el7.src.rpm" version="1.6.3"><filename>cups-1.6.3-51.el7.x86_64.rpm</filename><sum type="sha256">e497103a7aa7818ece2a98adcd40446797765527f149a3ca68cb89e52f80303f</sum></package><package arch="x86_64" epoch="1" name="cups-lpd" release="51.el7" src="cups-1.6.3-51.el7.src.rpm" version="1.6.3"><filename>cups-lpd-1.6.3-51.el7.x86_64.rpm</filename><sum type="sha256">3b060a15d6c5d947cc771b8e7e276d15d428243facdd7d802a522fe805f3f5aa</sum></package><package arch="noarch" epoch="1" name="cups-filesystem" release="51.el7" src="cups-1.6.3-51.el7.src.rpm" version="1.6.3"><filename>cups-filesystem-1.6.3-51.el7.noarch.rpm</filename><sum type="sha256">f8efae5dcf706474ab5dc48bfde94d65d3b60290f9d2c1dd064905d205f7b99d</sum></package><package arch="x86_64" epoch="1" name="cups-devel" release="51.el7" src="cups-1.6.3-51.el7.src.rpm" version="1.6.3"><filename>cups-devel-1.6.3-51.el7.x86_64.rpm</filename><sum type="sha256">c6495b6587fa162de9f7af52b39218ec00db42d1c00b9381cfe144b4df09a566</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18190" id="CVE-2017-18190" title="Cve-2017-18190" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8675" id="CVE-2019-8675" title="Cve-2019-8675" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8696" id="CVE-2019-8696" title="Cve-2019-8696" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3864" id="RHSA-2020:3864-1" title="Rhsa-2020:3864-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1546395" id="1546395" title="Cve-2017-18190 Cups: Dns Rebinding Attacks Via Incorrect Whitelist" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1715907" id="1715907" title="Cups- Client: Cupsgetppd3() Function Tries To Load Ppd From Ipp Printer And Not From The Cups Queue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1738455" id="1738455" title="Cve-2019-8675 Cups: Stack-Buffer-Overflow In Libcups'S Asn1_Get_Type Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1738497" id="1738497" title="Cve-2019-8696 Cups: Stack-Buffer-Overflow In Libcups'S Asn1_Get_Packed Function" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3868-1</id><title>Sdl</title><description>Security Fix(es): 
* SDL: buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c (CVE-2019-7572) 
* SDL: heap-based buffer overflow in function MS_ADPCM_decode in audio/SDL_wave.c (CVE-2019-7575) 
* SDL: heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c (CVE-2019-7636) 
* SDL: heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c (CVE-2019-7637) 
* SDL: heap-based buffer over-read in Map1toN in video/SDL_pixels.c (CVE-2019-7638) 
* SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (CVE-2019-7573) 
* SDL: heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c (CVE-2019-7574) 
* SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (CVE-2019-7576) 
* SDL: buffer over-read in function SDL_LoadWAV_RW in audio/SDL_wave.c (CVE-2019-7577) 
* SDL: heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c (CVE-2019-7578) 
* SDL: heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c (CVE-2019-7635)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="SDL-static" release="17.el7" src="SDL-1.2.15-17.el7.src.rpm" version="1.2.15"><filename>SDL-static-1.2.15-17.el7.i686.rpm</filename><sum type="sha256">9f01a6029c0164c93afd860499f7360fa6d73c01e43f68d77bdc39914ea36364</sum></package><package arch="x86_64" name="SDL-static" release="17.el7" src="SDL-1.2.15-17.el7.src.rpm" version="1.2.15"><filename>SDL-static-1.2.15-17.el7.x86_64.rpm</filename><sum type="sha256">184508f6f204d853a4ce76b79a0128684e4daf7db07b8aed42483bda21d95172</sum></package><package arch="x86_64" name="SDL-devel" release="17.el7" src="SDL-1.2.15-17.el7.src.rpm" version="1.2.15"><filename>SDL-devel-1.2.15-17.el7.x86_64.rpm</filename><sum type="sha256">26d9cba78f9af85dd75925d8969cacdd3cd0040c1a33c50cd4538e7f2210dcd8</sum></package><package arch="i686" name="SDL" release="17.el7" src="SDL-1.2.15-17.el7.src.rpm" version="1.2.15"><filename>SDL-1.2.15-17.el7.i686.rpm</filename><sum type="sha256">90afcf2b1ae15e0b807d48864fd939a88b5e584d9e4c4365794a7a739c569d02</sum></package><package arch="i686" name="SDL-devel" release="17.el7" src="SDL-1.2.15-17.el7.src.rpm" version="1.2.15"><filename>SDL-devel-1.2.15-17.el7.i686.rpm</filename><sum type="sha256">9c3dfe7904800b07de5904704f3b43a23e2a692f3f455018e0f5095e47ac0ed1</sum></package><package arch="x86_64" name="SDL" release="17.el7" src="SDL-1.2.15-17.el7.src.rpm" version="1.2.15"><filename>SDL-1.2.15-17.el7.x86_64.rpm</filename><sum type="sha256">740d2d2435ed2310b1ecd7dd28552f2d8e6acea070ed35d416d9c0e05b219085</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7572" id="CVE-2019-7572" title="Cve-2019-7572" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7573" id="CVE-2019-7573" title="Cve-2019-7573" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7574" id="CVE-2019-7574" title="Cve-2019-7574" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7575" id="CVE-2019-7575" title="Cve-2019-7575" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7576" id="CVE-2019-7576" title="Cve-2019-7576" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7577" id="CVE-2019-7577" title="Cve-2019-7577" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7578" id="CVE-2019-7578" title="Cve-2019-7578" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7635" id="CVE-2019-7635" title="Cve-2019-7635" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7636" id="CVE-2019-7636" title="Cve-2019-7636" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7637" id="CVE-2019-7637" title="Cve-2019-7637" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7638" id="CVE-2019-7638" title="Cve-2019-7638" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3868" id="RHSA-2020:3868-1" title="Rhsa-2020:3868-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1676509" id="1676509" title="Cve-2019-7577 Sdl: Buffer Over-Read In Function Sdl_Loadwav_Rw In Audio/Sdl_Wave.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1676743" id="1676743" title="Cve-2019-7575 Sdl: Heap-Based Buffer Overflow In Function Ms_Adpcm_Decode In Audio/Sdl_Wave.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1676749" id="1676749" title="Cve-2019-7574 Sdl: Heap-Based Buffer Over-Read In Ima_Adpcm_Decode In Audio/Sdl_Wave.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1676751" id="1676751" title="Cve-2019-7573 Sdl: Heap-Based Buffer Over-Read In Initms_Adpcm In Audio/Sdl_Wave.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1676753" id="1676753" title="Cve-2019-7572 Sdl: Buffer Over-Read In Ima_Adpcm_Nibble In Audio/Sdl_Wave.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1676755" id="1676755" title="Cve-2019-7576 Sdl: Heap-Based Buffer Over-Read In Initms_Adpcm In Audio/Sdl_Wave.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1676781" id="1676781" title="Cve-2019-7578 Sdl: Heap-Based Buffer Over-Read In Initima_Adpcm In Audio/Sdl_Wave.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677143" id="1677143" title="Cve-2019-7638 Sdl: Heap-Based Buffer Over-Read In Map1Ton In Video/Sdl_Pixels.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677151" id="1677151" title="Cve-2019-7637 Sdl: Heap-Based Buffer Overflow In Sdl_Fillrect In Video/Sdl_Surface.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677156" id="1677156" title="Cve-2019-7636 Sdl: Heap-Based Buffer Over-Read In Sdl_Getrgb In Video/Sdl_Pixels.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677158" id="1677158" title="Cve-2019-7635 Sdl: Heap-Based Buffer Over-Read In Blit1To4 In Video/Sdl_Blit_1.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3869-1</id><title>Pcp</title><description>Security Fix(es): 
* pcp: Local privilege escalation in pcp spec file %post section (CVE-2019-3695) 
* pcp: Local privilege escalation in pcp spec file through migrate_tempdirs (CVE-2019-3696)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pcp-pmda-weblog" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-weblog-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">a454a7212895649230aa8b8773377e2b7abb57748e17dad7c6a82ff91b678e9e</sum></package><package arch="x86_64" name="pcp-pmda-json" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-json-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">0232ddeefa4840d074f9e382a5730369a5b15828c07fadd4c0cd6bc1409ecdd0</sum></package><package arch="x86_64" name="pcp-pmda-lmsensors" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-lmsensors-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">36f129bac1ef3cd113865d963391f70527cd18a9356629a03cc0fc0af2714b17</sum></package><package arch="x86_64" name="pcp-pmda-perfevent" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-perfevent-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">bc5b0bc62804ee029cd8a9ae5c6f87d831d92de5b4826728fc3b07d6cc0e629c</sum></package><package arch="x86_64" name="pcp-import-sar2pcp" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-import-sar2pcp-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">6c0cc250506da7c4c449b0a09b6e1dd6336b0b69222fecac821b7f6ae0ac896f</sum></package><package arch="x86_64" name="pcp-pmda-mounts" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-mounts-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">28f2023572aee618b698185d867d23a2911e6feb479d5eea01c654279162a527</sum></package><package arch="x86_64" name="pcp-pmda-lio" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-lio-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">704fb5287922c28a1f768b7ab9005e3cfef030b9a07fd075e56286fdb3c60933</sum></package><package arch="x86_64" name="perl-PCP-PMDA" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>perl-PCP-PMDA-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">548bf0cce3d40be957caa901a926f47a3bcf4c391ef349dd6abe26a84bac6eb1</sum></package><package arch="x86_64" name="pcp-export-pcp2spark" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-export-pcp2spark-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">43aeeff52449f37de6a073bc442992d0f25c7515a422451e77a9f61e38ce1381</sum></package><package arch="x86_64" name="pcp-pmda-prometheus" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-prometheus-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">1ab5a52191aa2b9032268963b20b966c58219f4c6bcd3a84017fbeb71ddea360</sum></package><package arch="x86_64" name="pcp-import-collectl2pcp" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-import-collectl2pcp-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">7d602a9cf5b23d89c4a2f5a0215355d02fff23b835c1c3bb62be139538be1c9f</sum></package><package arch="noarch" name="pcp-webapp-vector" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-webapp-vector-4.3.2-12.el7.noarch.rpm</filename><sum type="sha256">d965889635760a409ba1db0e6be686732d03ba698e7bd520be67e8eed309507f</sum></package><package arch="x86_64" name="pcp-pmda-elasticsearch" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-elasticsearch-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">fc127b59a84407583f19aa226119fd6b7ec97312321759794c869b12890b79cd</sum></package><package arch="i686" name="pcp-devel" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-devel-4.3.2-12.el7.i686.rpm</filename><sum type="sha256">3a043966b438e7b70b0e746e0eb3a03d5df4ad1ece6323104d995d93a527a5fd</sum></package><package arch="x86_64" name="pcp-export-pcp2xml" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-export-pcp2xml-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">40104f37b00da1b4331d82c02740d2248eec07c53a1cdaa551e6278bb5a4d438</sum></package><package arch="x86_64" name="pcp-pmda-bonding" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-bonding-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">8e311bd3c9a0148dc4605d32cea4328bf95432946f30391189a36c5204bb062f</sum></package><package arch="x86_64" name="pcp-pmda-bcc" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-bcc-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">2872768ff4db2f0331d17ee74575c96d415af909088a89ff6890c3cbe7d5453b</sum></package><package arch="x86_64" name="pcp-manager" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-manager-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">48f8f9458265db55901547921ee51377e23ebbb7b4d4b19cf2d5125805dc58da</sum></package><package arch="x86_64" name="pcp-pmda-dm" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-dm-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">5ac27c3daaff3ccdd950bf47bc8ded829741512b716e07bd27fff2d01ba862c4</sum></package><package arch="x86_64" name="pcp-pmda-bash" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-bash-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">86246b5c92705b14a4e26d93ad8ceba3de4b714685fa028ad4a1115f0e62d9de</sum></package><package arch="x86_64" name="pcp-pmda-mailq" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-mailq-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">69e458711e14465b398401de4bc76dbe05d336c9a897edaf275aadd7b98f1524</sum></package><package arch="x86_64" name="pcp-pmda-postfix" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-postfix-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">aff4025f51ee417d55e1a60bee57a8f5bf06af5fd0cf129cb5ff2de80a3b60cd</sum></package><package arch="x86_64" name="pcp-pmda-zimbra" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-zimbra-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">7c8cc7bd10672add7a8e8aa690da7f28bac36660fb0a2c6296bffa003702bf6e</sum></package><package arch="x86_64" name="pcp-pmda-rsyslog" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-rsyslog-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">b52b4b34f44eebca2f9bb3eaeab201fde66b58c4d9c8f7988ac6003eae3c3d9d</sum></package><package arch="x86_64" name="pcp-pmda-memcache" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-memcache-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">4595abce8417afca060ec4cdf04b48a123d1fc8986d9e1b34626e0b362fbc5b7</sum></package><package arch="x86_64" name="pcp" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">a03dd25155cdafd9f19bdeae3a79f381e5a6d82d22a0feab3288ab2000aaae26</sum></package><package arch="x86_64" name="pcp-pmda-nvidia-gpu" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-nvidia-gpu-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">34b48a857bd683b6b17ef8485c074c4cb666305807584ff03c6210e4660060fe</sum></package><package arch="x86_64" name="pcp-pmda-gpfs" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-gpfs-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">fa2f8d94f8ba6c65436eddda0a96cc35482eb9732202f77158536a668726344a</sum></package><package arch="x86_64" name="pcp-pmda-trace" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-trace-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">8395984bd7a7db5d6519d1d27d8a39899c3a8261e711e856a1613200dfc763d1</sum></package><package arch="x86_64" name="pcp-export-pcp2elasticsearch" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-export-pcp2elasticsearch-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">51509bf3f0dd3a720067d0bf2fe870d4a195979e0bbe284762ce7f0baa376ee6</sum></package><package arch="x86_64" name="pcp-pmda-lustrecomm" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-lustrecomm-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">7fece26ad4fcb4589facea7c55c61305423912557b940f01e59a7f539a9da2e1</sum></package><package arch="x86_64" name="pcp-import-ganglia2pcp" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-import-ganglia2pcp-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">c911207fc5c11570cdb420b9093f109a9e8cf434f6b390a542d3882e76f580c8</sum></package><package arch="x86_64" name="perl-PCP-LogSummary" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>perl-PCP-LogSummary-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">a71ba75848f5455be52c265cc897c20c2406363b7d2b49663105ef124227c3ef</sum></package><package arch="x86_64" name="pcp-pmda-apache" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-apache-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">e6b1aa988dd567e7198948d406e7b39fe274980c0a275c2da12b4ac952a9586c</sum></package><package arch="x86_64" name="pcp-pmda-nfsclient" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-nfsclient-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">5f81174aff5ff1d1450862cc1035c58164b44f9ece54fa0bb695c8e99d4b6053</sum></package><package arch="x86_64" name="pcp-import-mrtg2pcp" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-import-mrtg2pcp-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">c77ade8f3323d958d756bcc7af4f7b4ab957bd82168a3fa8fe430fe4aa40ecac</sum></package><package arch="x86_64" name="pcp-pmda-sendmail" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-sendmail-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">4911131c35164a782591490055311ed91b70f269fa933493ce25463ff7d652f0</sum></package><package arch="x86_64" name="pcp-gui" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-gui-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">57c6e135711aa806c4549f61aec101cffc3780aed81e50a88c59131cab6014f7</sum></package><package arch="x86_64" name="pcp-pmda-nginx" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-nginx-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">3b402e84b2237bea32bc9156516b033d91bc3614b374b47f2a1c6f91f46ab46d</sum></package><package arch="x86_64" name="pcp-export-zabbix-agent" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-export-zabbix-agent-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">eaa0a4f04f576390a7dcfb5b7078ee205f3962991d2f0de623a0cdd032068ca9</sum></package><package arch="x86_64" name="pcp-devel" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-devel-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">8274ec24323e0fd7a1ca0738b43245b1f6a896f499aefe6fe860ee0517bb4f45</sum></package><package arch="x86_64" name="pcp-pmda-cisco" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-cisco-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">5c98e31fd5f60de072922fa0a8d72f62a59fcd400d8f237f4e6eab1401f1ba71</sum></package><package arch="x86_64" name="pcp-webapi" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-webapi-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">d200dad51c7435df07a58883c0ebf0dab0e64fd9ac7255533c3fd2db9742a6cd</sum></package><package arch="noarch" name="pcp-webapp-blinkenlights" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-webapp-blinkenlights-4.3.2-12.el7.noarch.rpm</filename><sum type="sha256">8324ac0d2aa9881d0664a933f14da0c691ed485501c3657f2c083e98853b5378</sum></package><package arch="x86_64" name="pcp-pmda-gpsd" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-gpsd-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">0a4a628f55f730cc52c56210b31184a93dd1350d034ac54df9b705e6f0059fcd</sum></package><package arch="x86_64" name="pcp-pmda-oracle" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-oracle-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">eda0c7d47626662b85706829ddfcb029d5f8fc59ea2f8684319e65e05c175cc9</sum></package><package arch="x86_64" name="pcp-export-pcp2json" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-export-pcp2json-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">48b08bcae33f208ac72b3a27e94c02e231019fd49a4e7cd5c0b4b9df7ddf9aac</sum></package><package arch="x86_64" name="pcp-pmda-smart" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-smart-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">2129308a91344e882d2d295f941b7ae93ccc8d844d94d03766bf7dca7de5cb0e</sum></package><package arch="x86_64" name="pcp-zeroconf" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-zeroconf-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">2e7743a4e438f8fbd0f35e6c24f7f4499575d40253eb99f74d3c298b7de84388</sum></package><package arch="noarch" name="pcp-doc" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-doc-4.3.2-12.el7.noarch.rpm</filename><sum type="sha256">ec41ebaf7da387a1f16f39d6d1fe44289b03ffc7c952fc1e69a9308c5036b2b3</sum></package><package arch="x86_64" name="python-pcp" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>python-pcp-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">ce52a3660802a820ff127957de7f4b874249e660834088ed1b9c0bc428398f26</sum></package><package arch="x86_64" name="pcp-system-tools" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-system-tools-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">333a40445aca73268667005f996a88fd3ed33f381fb4dac5769ea78ef8d9c644</sum></package><package arch="x86_64" name="pcp-testsuite" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-testsuite-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">0d95aa8daef0c28b864be440a2d59665e54d3e6f6e44282003d144662e0027eb</sum></package><package arch="x86_64" name="pcp-export-pcp2influxdb" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-export-pcp2influxdb-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">8b07d0f0b1eceae8f0ef58380bb391b78927e1ca09c4976b5b909a98ea17be95</sum></package><package arch="x86_64" name="pcp-pmda-redis" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-redis-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">bb12895076899f8bb934ab0095597fc4b1d9b33b784fac7f1c008fffa29c5b04</sum></package><package arch="x86_64" name="pcp-pmda-cifs" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-cifs-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">f301c8b3ad6dd7c7c1b9921e2f914a3dce2656c3ea016fa3278f9226f5cd456b</sum></package><package arch="x86_64" name="pcp-pmda-systemd" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-systemd-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">3f9a59a2ee1a7ab01c24f7c7c2f62bf9fd6242cf963e37a207b92048624aaeef</sum></package><package arch="x86_64" name="pcp-conf" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-conf-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">9b6b4e8634b3bfa809bfcebfd3915134b245fb38745e949d61da59490ca2f1a6</sum></package><package arch="x86_64" name="pcp-export-pcp2graphite" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-export-pcp2graphite-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">fbfdef935f7bf379c0736d57f1ffdb001b2f2114a515b0f1553ca911241152d6</sum></package><package arch="x86_64" name="pcp-pmda-ds389" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-ds389-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">87899613e58e5b3d0c15911786a8c606d060c62f3be8b4ba51ac40fffeb1bcf4</sum></package><package arch="x86_64" name="pcp-pmda-gfs2" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-gfs2-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">188c4bd83f512aa350f5a0cde4e885c08d6b5fa3a6078f8089ae60881c44239c</sum></package><package arch="x86_64" name="pcp-pmda-snmp" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-snmp-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">13d4002cca44d54a0c966a8732cd0a012a43ef3b5944375c22948d06fabc2fb4</sum></package><package arch="x86_64" name="pcp-pmda-infiniband" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-infiniband-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">f29e04e7a1a4ee8dbad285d177c418f42dccec6de8fb9d6c8f5f6180b5f8cdbb</sum></package><package arch="i686" name="pcp-libs-devel" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-libs-devel-4.3.2-12.el7.i686.rpm</filename><sum type="sha256">3731054a7e66517359dab6b2f4c2701b392ef92c285d10db904925abe5573a9d</sum></package><package arch="noarch" name="pcp-webjs" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-webjs-4.3.2-12.el7.noarch.rpm</filename><sum type="sha256">34caa133a0b87790de287a87108a295dfee713eab06635eca09012f8a22851ac</sum></package><package arch="x86_64" name="perl-PCP-MMV" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>perl-PCP-MMV-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">2d3af366b35b32fb7a9e0e2086721697df720fc3366c1a35e15070a18d380305</sum></package><package arch="x86_64" name="pcp-libs-devel" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-libs-devel-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">d8537665520b7dc85c3feabbe4ec8e73ff1dc52cd197940837fd768be7f30870</sum></package><package arch="x86_64" name="pcp-pmda-lustre" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-lustre-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">c75fa8443f366dc882869bfd5fd0ce3b18f84be9bb293120cdfa5e3ffacb96eb</sum></package><package arch="noarch" name="pcp-webapp-grafana" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-webapp-grafana-4.3.2-12.el7.noarch.rpm</filename><sum type="sha256">67a08ef8d3c2155f46e24bab1cd4919ecc193e1affa3bcf9154d05691c09e80a</sum></package><package arch="x86_64" name="pcp-pmda-postgresql" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-postgresql-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">3ea66e8554babdc95cb9b215bcffa31a4818b92413706713875c290d4ba6c1d5</sum></package><package arch="x86_64" name="pcp-pmda-news" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-news-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">8ff2db2354e68d26f3ce528494b905646e8fa01a55b4e409a1f7a7fd1ac42f0d</sum></package><package arch="x86_64" name="pcp-pmda-named" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-named-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">ebceb40ee5c385c714234d74bd43d038c1ce73a239452a3fffc57720e27207ad</sum></package><package arch="x86_64" name="pcp-pmda-haproxy" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-haproxy-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">8bbb991de40f0c9585d36a388046369c3aea250d4192f854950549138725fc5b</sum></package><package arch="x86_64" name="pcp-selinux" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-selinux-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">f8c39a44203878dfb7a92115778cfd906c12e3bb008679557ab8b5b7a9ce7126</sum></package><package arch="x86_64" name="perl-PCP-LogImport" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>perl-PCP-LogImport-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">f82a3cb82dfd0960cf3475808fa23a9ac70c3e2f080ce951673bb8c61f17e6cb</sum></package><package arch="x86_64" name="pcp-pmda-summary" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-summary-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">1924bb5fa8c4d179f85a0d54b734e36c30f0d14b2dcc98aa2eb25e887804ed59</sum></package><package arch="x86_64" name="pcp-pmda-pdns" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-pdns-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">f0816da6003870e6b52cf2b2613e5634ab83968b15ed33b8548ab4c4a7455894</sum></package><package arch="x86_64" name="pcp-pmda-gluster" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-gluster-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">db042a9cefac99b68b2036612b7ce4641e9333a03ce969aa89ee9293c7b4e38e</sum></package><package arch="x86_64" name="pcp-import-iostat2pcp" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-import-iostat2pcp-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">6899765db035630361e39765ba1eee15382f9143485affc6ca62fe228abcab77</sum></package><package arch="x86_64" name="pcp-pmda-samba" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-samba-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">d7c4757f33855758ec9e7630a08dd3a62892e0ca48a540eefdd231aecf93df9c</sum></package><package arch="x86_64" name="pcp-pmda-rpm" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-rpm-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">42b8963defba99d9bd04019be374fab137cffdcc344a2982962d9bea760e4bf5</sum></package><package arch="x86_64" name="pcp-pmda-logger" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-logger-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">4a334eaca4cd7400cb9a89f644ee83f63db52c3e5fb9b3c7f3a6a5a085adcc06</sum></package><package arch="x86_64" name="pcp-pmda-ds389log" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-ds389log-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">bc3def914cbe36b1232a0dff5dc68f188a743fb2584fa19fcdc414f6f789a7f7</sum></package><package arch="i686" name="pcp-libs" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-libs-4.3.2-12.el7.i686.rpm</filename><sum type="sha256">586d81a8f97a4911899beb30e1128a1dde2533aa7682197fcb2b6d03aeb846ff</sum></package><package arch="x86_64" name="pcp-pmda-libvirt" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-libvirt-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">f0534334af6c18411356d89d8ad2e598cb1a4dbd284e16addbd08c1476a83427</sum></package><package arch="noarch" name="pcp-webapp-graphite" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-webapp-graphite-4.3.2-12.el7.noarch.rpm</filename><sum type="sha256">5850fbac343b48075fc7a74bdb9972ac452db3414091e2a66b2e81394a2048b9</sum></package><package arch="x86_64" name="pcp-pmda-activemq" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-activemq-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">40f93060970aa2902d25f6757937c9852fa37f2864f576a8c4404e2810152767</sum></package><package arch="x86_64" name="pcp-pmda-dbping" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-dbping-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">7398ff1b648557ea6e52e9487a835598e9f0c209c67079d652e4776f8265432f</sum></package><package arch="x86_64" name="pcp-pmda-shping" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-shping-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">74c4df59928de268d66830f43cac4c561f10c3961b19c31629ad933a6b2f49c2</sum></package><package arch="x86_64" name="pcp-libs" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-libs-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">ab6a8dd6ebec57c9b0f1999b95e2f4107f587187f619f9c171cb7fa2a78f9f83</sum></package><package arch="x86_64" name="pcp-pmda-mic" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-mic-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">4b06c4d24ecdd93b586a641eacf6abc6f5c1a696eefbd66244980c96ba66c877</sum></package><package arch="x86_64" name="pcp-pmda-mysql" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-mysql-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">367a59953bb3c028132ee0a7fb379046bd234773fb86d0a362a72bf0e396a1ed</sum></package><package arch="x86_64" name="pcp-export-pcp2zabbix" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-export-pcp2zabbix-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">018d2534564a9c60dc3b1226d96b5a55906145bc9ede8d682f8746c20b4f4658</sum></package><package arch="x86_64" name="pcp-pmda-slurm" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-slurm-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">c01a166080a10d2b46385ad284e08ef0d0b74614b76e0a94fa23f5529bb334ea</sum></package><package arch="x86_64" name="pcp-pmda-netfilter" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-netfilter-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">46894601507a441e377b4e388970ef04ffc583c2d0d3a0d69d9c2934ea78d193</sum></package><package arch="x86_64" name="pcp-pmda-bind2" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-bind2-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">6a32163e4540f98fa1dc33366cda02fe440f309137a3ccd32f896f599499f800</sum></package><package arch="x86_64" name="pcp-pmda-zswap" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-zswap-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">a7cb05a1dd91152f78d2caf31a139168811953a84d5bb55be76afee453ce71f8</sum></package><package arch="x86_64" name="pcp-pmda-docker" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-docker-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">6f61e4f0094fbe1bce20c623c6918ef026b12a87a794e71d1f8727cc71f6def1</sum></package><package arch="x86_64" name="pcp-pmda-roomtemp" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-roomtemp-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">8634b803899810ff128a29ea217b3423a219782027abbdc2e7b0da767ceb1db3</sum></package><package arch="x86_64" name="pcp-pmda-unbound" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-unbound-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">e515a9a8dec6cc0acb270e426cf887f088bad821a5ac20ce4c250c60f090640b</sum></package><package arch="x86_64" name="pcp-pmda-vmware" release="12.el7" src="pcp-4.3.2-12.el7.src.rpm" version="4.3.2"><filename>pcp-pmda-vmware-4.3.2-12.el7.x86_64.rpm</filename><sum type="sha256">0fafca5834e49f8181ac688bdfa01e4ede409522a5ad37765907d688537b421e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3695" id="CVE-2019-3695" title="Cve-2019-3695" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3696" id="CVE-2019-3696" title="Cve-2019-3696" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3869" id="RHSA-2020:3869-1" title="Rhsa-2020:3869-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730107" id="1730107" title="Hugepage Data Is Incorrect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730492" id="1730492" title="Some Numa Nodes Have No Instances" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1749870" id="1749870" title="Selinux Is Preventing Pcp-Pmda-Named From Executing /Usr/Sbin/Rndc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1756252" id="1756252" title="Missing Dependency Of Pcp-Selinux Package On Selinux-Policy-Targeted Package" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760750" id="1760750" title="Selinux Issue When Running Sanity Tests Of Pcp Testsuite" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764748" id="1764748" title="Pcp Atopsar Ignores 'Samples' Count" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1765641" id="1765641" title="Pcp Atop Crash Due To Devtstat-&gt;Nprocactive Set To One Above The Expected Value" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775373" id="1775373" title="[Rfe] Pcp-Zeroconf Should Gather Per-Thread Info By Default" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1792859" id="1792859" title="Pmlogger Selinux Issue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1811703" id="1811703" title="Cve-2019-3695 Pcp: Local Privilege Escalation In Pcp Spec File %Post Section" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1811707" id="1811707" title="Cve-2019-3696 Pcp: Local Privilege Escalation In Pcp Spec File Through Migrate_Tempdirs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1818710" id="1818710" title="Pcp-Atop Is Crashing Due To An Uninitialized Value Within A Sort Comparison Routine" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3873-1</id><title>Libsrtp</title><description>Security Fix(es): 
* libsrtp: improper handling of CSRC count and extension header length in RTP header (CVE-2015-6360) 
* libsrtp: buffer overflow in application of crypto profiles (CVE-2013-2139)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libsrtp" release="11.20101004cvs.el7" src="libsrtp-1.4.4-11.20101004cvs.el7.src.rpm" version="1.4.4"><filename>libsrtp-1.4.4-11.20101004cvs.el7.x86_64.rpm</filename><sum type="sha256">3d46addf1591cdc73cbb9035da2ea20700eea4bc42ee514c085f204a7fd7afdc</sum></package><package arch="i686" name="libsrtp-devel" release="11.20101004cvs.el7" src="libsrtp-1.4.4-11.20101004cvs.el7.src.rpm" version="1.4.4"><filename>libsrtp-devel-1.4.4-11.20101004cvs.el7.i686.rpm</filename><sum type="sha256">9e481eb4354af9064dc727515da91a84ad0ae703d261dcee68eb6f50891a4fb4</sum></package><package arch="i686" name="libsrtp" release="11.20101004cvs.el7" src="libsrtp-1.4.4-11.20101004cvs.el7.src.rpm" version="1.4.4"><filename>libsrtp-1.4.4-11.20101004cvs.el7.i686.rpm</filename><sum type="sha256">3bcb18505b8aef66783481971e0c7ab5a46d592919b9f799c802b021e2b766c8</sum></package><package arch="x86_64" name="libsrtp-devel" release="11.20101004cvs.el7" src="libsrtp-1.4.4-11.20101004cvs.el7.src.rpm" version="1.4.4"><filename>libsrtp-devel-1.4.4-11.20101004cvs.el7.x86_64.rpm</filename><sum type="sha256">a97d9980586cd80b86756c8c3641a1d4d9145c0ac259182348922b42701e36b4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2139" id="CVE-2013-2139" title="Cve-2013-2139" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6360" id="CVE-2015-6360" title="Cve-2015-6360" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3873" id="RHSA-2020:3873-1" title="Rhsa-2020:3873-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1301202" id="1301202" title="Libsrtp Global-Buffer-Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1323702" id="1323702" title="Cve-2015-6360 Libsrtp: Improper Handling Of Csrc Count And Extension Header Length In Rtp Header" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1323705" id="1323705" title="Cve-2015-6360 Libsrtp: Improper Handling Of Csrc Count And Extension Header Length In Rtp Header [Rhel-7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=970697" id="970697" title="Cve-2013-2139 Libsrtp: Buffer Overflow In Application Of Crypto Profiles" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3875-1</id><title>Tigervnc</title><description>Security Fix(es): 
* tigervnc: Stack use-after-return due to incorrect usage of stack memory in ZRLEDecoder (CVE-2019-15691) 
* tigervnc: Heap buffer overflow triggered from CopyRectDecoder due to incorrect value checks (CVE-2019-15692) 
* tigervnc: Heap buffer overflow in TightDecoder::FilterGradient (CVE-2019-15693) 
* tigervnc: Heap buffer overflow in DecodeManager::decodeRect (CVE-2019-15694) 
* tigervnc: Stack buffer overflow in CMsgReader::readSetCursor (CVE-2019-15695)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tigervnc-license" release="21.el7" src="tigervnc-1.8.0-21.el7.src.rpm" version="1.8.0"><filename>tigervnc-license-1.8.0-21.el7.noarch.rpm</filename><sum type="sha256">60dc13b47f3eaa35a40b7370da949560f4b0a214384164572a0282dd03dc7528</sum></package><package arch="x86_64" name="tigervnc-server" release="21.el7" src="tigervnc-1.8.0-21.el7.src.rpm" version="1.8.0"><filename>tigervnc-server-1.8.0-21.el7.x86_64.rpm</filename><sum type="sha256">da195def7f91aa6e312f33beab418d56b160a60db1cfec308d4480ed95b26c1d</sum></package><package arch="x86_64" name="tigervnc" release="21.el7" src="tigervnc-1.8.0-21.el7.src.rpm" version="1.8.0"><filename>tigervnc-1.8.0-21.el7.x86_64.rpm</filename><sum type="sha256">6dfe2cc20b9f7947721e62e440e119302369357d21ff4f95c975ac4e8442b54e</sum></package><package arch="noarch" name="tigervnc-icons" release="21.el7" src="tigervnc-1.8.0-21.el7.src.rpm" version="1.8.0"><filename>tigervnc-icons-1.8.0-21.el7.noarch.rpm</filename><sum type="sha256">50b608c98ce41c7b39f524660f5c7cf6aeda392512ae5832c2103a6785367c48</sum></package><package arch="x86_64" name="tigervnc-server-minimal" release="21.el7" src="tigervnc-1.8.0-21.el7.src.rpm" version="1.8.0"><filename>tigervnc-server-minimal-1.8.0-21.el7.x86_64.rpm</filename><sum type="sha256">eafd08607c4951ff4a167761a3047dd24a0c1a50a65f34e5295512cb11cbcedd</sum></package><package arch="x86_64" name="tigervnc-server-module" release="21.el7" src="tigervnc-1.8.0-21.el7.src.rpm" version="1.8.0"><filename>tigervnc-server-module-1.8.0-21.el7.x86_64.rpm</filename><sum type="sha256">225539e1f71b76534a9136b9068c0187b57b955cac092df86701be4444be287e</sum></package><package arch="noarch" name="tigervnc-server-applet" release="21.el7" src="tigervnc-1.8.0-21.el7.src.rpm" version="1.8.0"><filename>tigervnc-server-applet-1.8.0-21.el7.noarch.rpm</filename><sum type="sha256">fbb91ee4575bd7b803058c51126747a87126ebc5dda45146450c4058dde3539f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15691" id="CVE-2019-15691" title="Cve-2019-15691" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15692" id="CVE-2019-15692" title="Cve-2019-15692" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15693" id="CVE-2019-15693" title="Cve-2019-15693" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15694" id="CVE-2019-15694" title="Cve-2019-15694" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15695" id="CVE-2019-15695" title="Cve-2019-15695" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3875" id="RHSA-2020:3875-1" title="Rhsa-2020:3875-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1789527" id="1789527" title="Cve-2019-15692 Tigervnc: Heap Buffer Overflow Triggered From Copyrectdecoder Due To Incorrect Value Checks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1789908" id="1789908" title="Cve-2019-15691 Tigervnc: Stack Use-After-Return Due To Incorrect Usage Of Stack Memory In Zrledecoder" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790313" id="1790313" title="Cve-2019-15693 Tigervnc: Heap Buffer Overflow In Tightdecoder::Filtergradient" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790315" id="1790315" title="Cve-2019-15694 Tigervnc: Heap Buffer Overflow In Decodemanager::Decoderect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790318" id="1790318" title="Cve-2019-15695 Tigervnc: Stack Buffer Overflow In Cmsgreader::Readsetcursor" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791996" id="1791996" title="Tigervnc Should Not Arbitrarily Start On Unspecified Ports" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1826822" id="1826822" title="Tigervnc Exits At Startup" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3876-1</id><title>Libvpx</title><description>Security Fix(es): 
* libvpx: Denial of service in mediaserver (CVE-2017-0393) 
* libvpx: Out of bounds read in vp8_norm table (CVE-2019-9232) 
* libvpx: Use-after-free in vp8_deblock() in vp8/common/postproc.c (CVE-2019-9433) 
* libvpx: Out of bounds read in vp8_decode_frame in decodeframe.c (CVE-2020-0034)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libvpx" release="8.el7" src="libvpx-1.3.0-8.el7.src.rpm" version="1.3.0"><filename>libvpx-1.3.0-8.el7.x86_64.rpm</filename><sum type="sha256">52f05b8fee498a4be7e99ff0408af2f735789bb5fbcd167bf6ac3fe94e7ee739</sum></package><package arch="x86_64" name="libvpx-devel" release="8.el7" src="libvpx-1.3.0-8.el7.src.rpm" version="1.3.0"><filename>libvpx-devel-1.3.0-8.el7.x86_64.rpm</filename><sum type="sha256">0ec7b3d61c7211ba012bd89199a4c4ab1639a742fa3d6be7c4f2f0147e119785</sum></package><package arch="i686" name="libvpx" release="8.el7" src="libvpx-1.3.0-8.el7.src.rpm" version="1.3.0"><filename>libvpx-1.3.0-8.el7.i686.rpm</filename><sum type="sha256">c99a2275a9b83069f71bc275c281ca99fcc7c831676e1b473633d5a3cf7ef1d8</sum></package><package arch="x86_64" name="libvpx-utils" release="8.el7" src="libvpx-1.3.0-8.el7.src.rpm" version="1.3.0"><filename>libvpx-utils-1.3.0-8.el7.x86_64.rpm</filename><sum type="sha256">ba63453c446906577c14da5df5fcb30b34dae6d55bcdbc3858687d18fc28cd00</sum></package><package arch="i686" name="libvpx-devel" release="8.el7" src="libvpx-1.3.0-8.el7.src.rpm" version="1.3.0"><filename>libvpx-devel-1.3.0-8.el7.i686.rpm</filename><sum type="sha256">4965e6e8d821d8af743041d219a8560a247ae4815a30e3a77f461599432e970f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-0393" id="CVE-2017-0393" title="Cve-2017-0393" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9232" id="CVE-2019-9232" title="Cve-2019-9232" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9433" id="CVE-2019-9433" title="Cve-2019-9433" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0034" id="CVE-2020-0034" title="Cve-2020-0034" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3876" id="RHSA-2020:3876-1" title="Rhsa-2020:3876-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1769657" id="1769657" title="Cve-2017-0393 Libvpx: Denial Of Service In Mediaserver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788966" id="1788966" title="Cve-2019-9232 Libvpx: Out Of Bounds Read In Vp8_Norm Table" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788994" id="1788994" title="Cve-2019-9433 Libvpx: Use-After-Free In Vp8_Deblock() In Vp8/Common/Postproc.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1813000" id="1813000" title="Cve-2020-0034 Libvpx: Out Of Bounds Read In Vp8_Decode_Frame In Decodeframe.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3877-1</id><title>Audiofile</title><description>Security Fix(es): 
* audiofile: Heap-based buffer overflow in Expand3To4Module::run() when running sfconvert (CVE-2018-17095) 
* audiofile: NULL pointer dereference in ModuleState::setup() in modules/ModuleState.cpp allows for denial of service via crafted file (CVE-2018-13440)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="audiofile" release="9.el7" src="audiofile-0.3.6-9.el7.src.rpm" version="0.3.6"><filename>audiofile-0.3.6-9.el7.i686.rpm</filename><sum type="sha256">9a26fcbae2192fcdecba94b61cf7e69c38b5d1f215a3903e1efd155ced1ad6a1</sum></package><package arch="x86_64" epoch="1" name="audiofile" release="9.el7" src="audiofile-0.3.6-9.el7.src.rpm" version="0.3.6"><filename>audiofile-0.3.6-9.el7.x86_64.rpm</filename><sum type="sha256">5068bee84e675ca2f2d01d126bd58bb37ab11c0bc48d3d108ff1c2f35cba1e88</sum></package><package arch="x86_64" epoch="1" name="audiofile-devel" release="9.el7" src="audiofile-0.3.6-9.el7.src.rpm" version="0.3.6"><filename>audiofile-devel-0.3.6-9.el7.x86_64.rpm</filename><sum type="sha256">56216a297f60c0ee46730c797b75c76b1fe563a3307942a11e3f549a7036b5a0</sum></package><package arch="i686" epoch="1" name="audiofile-devel" release="9.el7" src="audiofile-0.3.6-9.el7.src.rpm" version="0.3.6"><filename>audiofile-devel-0.3.6-9.el7.i686.rpm</filename><sum type="sha256">2282107381450a6ba84215a95078f451c1460c294fa8d3c48833f3d7b77690f8</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3877" id="RHSA-2020:3877-1" title="Rhsa-2020:3877-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3878-1</id><title>Dnsmasq</title><description>Security Fix(es): 
* dnsmasq: memory leak in the create_helper() function in /src/helper.c (CVE-2019-14834)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="dnsmasq" release="16.el7" src="dnsmasq-2.76-16.el7.src.rpm" version="2.76"><filename>dnsmasq-2.76-16.el7.x86_64.rpm</filename><sum type="sha256">daa4d767de0095812b2aa6f65e301a0e8e303c46cdaafece3c3f7f4a4827fd04</sum></package><package arch="x86_64" name="dnsmasq-utils" release="16.el7" src="dnsmasq-2.76-16.el7.src.rpm" version="2.76"><filename>dnsmasq-utils-2.76-16.el7.x86_64.rpm</filename><sum type="sha256">d9c5c1ec38c5880a759e8f8fd74c86a2a8e82bbb74b93188e00b40a042e6b8fc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14834" id="CVE-2019-14834" title="Cve-2019-14834" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3878" id="RHSA-2020:3878-1" title="Rhsa-2020:3878-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1752569" id="1752569" title="[Rhel-7] Change Dhcp_Release To Use Default Address When No Ip Subnet Matches" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1755610" id="1755610" title="Dnsmasq Not Returning Refused To Dns Queries Without The Recursion Bit Set" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1757247" id="1757247" title="Dhcpv6 Relay-Fwd Requests Are Ignored By Dnsmasq" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764425" id="1764425" title="Cve-2019-14834 Dnsmasq: Memory Leak In The Create_Helper() Function In /Src/Helper.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1815080" id="1815080" title="Stop Treating Servfail As A Successful Response From Upstream Servers" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3887-1</id><title>Python-Pillow</title><description>Security Fix(es): 
* python-pillow: out-of-bounds read in ImagingFliDecode when loading FLI images (CVE-2020-5313)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-pillow-doc" release="21.gitd1c6db8.el7" src="python-pillow-2.0.0-21.gitd1c6db8.el7.src.rpm" version="2.0.0"><filename>python-pillow-doc-2.0.0-21.gitd1c6db8.el7.x86_64.rpm</filename><sum type="sha256">b010e860a28fb10f1dc289199f9d53d8e7cb7695fc07bdca7c1e68ecf62fe2d8</sum></package><package arch="i686" name="python-pillow" release="21.gitd1c6db8.el7" src="python-pillow-2.0.0-21.gitd1c6db8.el7.src.rpm" version="2.0.0"><filename>python-pillow-2.0.0-21.gitd1c6db8.el7.i686.rpm</filename><sum type="sha256">8291569a120b0df9e5e6288837682ca4b4c339c45998f2aae2b4dc21d2ee3308</sum></package><package arch="x86_64" name="python-pillow-tk" release="21.gitd1c6db8.el7" src="python-pillow-2.0.0-21.gitd1c6db8.el7.src.rpm" version="2.0.0"><filename>python-pillow-tk-2.0.0-21.gitd1c6db8.el7.x86_64.rpm</filename><sum type="sha256">0858f2e391eb6529e671cadf474bca62bdef7b26d057d0997a29fce49aa00acc</sum></package><package arch="i686" name="python-pillow-devel" release="21.gitd1c6db8.el7" src="python-pillow-2.0.0-21.gitd1c6db8.el7.src.rpm" version="2.0.0"><filename>python-pillow-devel-2.0.0-21.gitd1c6db8.el7.i686.rpm</filename><sum type="sha256">40398008e1a1fe5a8739bb01444ab77dd8acfb6ef4e95c2e24442114e901f637</sum></package><package arch="x86_64" name="python-pillow" release="21.gitd1c6db8.el7" src="python-pillow-2.0.0-21.gitd1c6db8.el7.src.rpm" version="2.0.0"><filename>python-pillow-2.0.0-21.gitd1c6db8.el7.x86_64.rpm</filename><sum type="sha256">dd67334460ba6f58f5bacc7454a593cf2ca27c5be1ddfc7aaedb307b5f4196e6</sum></package><package arch="x86_64" name="python-pillow-sane" release="21.gitd1c6db8.el7" src="python-pillow-2.0.0-21.gitd1c6db8.el7.src.rpm" version="2.0.0"><filename>python-pillow-sane-2.0.0-21.gitd1c6db8.el7.x86_64.rpm</filename><sum type="sha256">1171170eb9c007f0ad256743979db0021b3407c0b6d88adf6367577d3591eadb</sum></package><package arch="x86_64" name="python-pillow-devel" release="21.gitd1c6db8.el7" src="python-pillow-2.0.0-21.gitd1c6db8.el7.src.rpm" version="2.0.0"><filename>python-pillow-devel-2.0.0-21.gitd1c6db8.el7.x86_64.rpm</filename><sum type="sha256">d1cc10c620f775819173ca6106443acba2e7f18fa9b3339d61a15fd74a4f1f2b</sum></package><package arch="x86_64" name="python-pillow-qt" release="21.gitd1c6db8.el7" src="python-pillow-2.0.0-21.gitd1c6db8.el7.src.rpm" version="2.0.0"><filename>python-pillow-qt-2.0.0-21.gitd1c6db8.el7.x86_64.rpm</filename><sum type="sha256">8930062c157d5419b324f5de78c527fd1e0d0e0d1ec54c9e6c8ba31f888f66dd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-5313" id="CVE-2020-5313" title="Cve-2020-5313" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3887" id="RHSA-2020:3887-1" title="Rhsa-2020:3887-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1789532" id="1789532" title="Cve-2020-5313 Python-Pillow: Out-Of-Bounds Read In Imagingflidecode When Loading Fli Images" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3888-1</id><title>Python3</title><description>Security Fix(es): 
* python: XSS vulnerability in the documentation XML-RPC server in server_title field (CVE-2019-16935) 
* python: wrong backtracking in urllib.request.AbstractBasicAuthHandler allows for a ReDoS (CVE-2020-8492)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python3-libs" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-17.el7.x86_64.rpm</filename><sum type="sha256">3786657d74649a5ef22c5f2f998273c99694812081dc386c17b318b5ba37ba29</sum></package><package arch="x86_64" name="python3" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-3.6.8-17.el7.x86_64.rpm</filename><sum type="sha256">5777b19c4aab76059c9b38e47e3f7f6470e10c864e49ffaa2e771281fbe3fc3e</sum></package><package arch="x86_64" name="python3-idle" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-17.el7.x86_64.rpm</filename><sum type="sha256">0529688f400285d529efdce8e4ec0ecb67be47e53a7742a49025f080ce9ab6e2</sum></package><package arch="x86_64" name="python3-tkinter" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-17.el7.x86_64.rpm</filename><sum type="sha256">e19e0c8ded7b6d161afa546da31ac053da70c2907a23e1b010464f4c2045d29b</sum></package><package arch="i686" name="python3" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-3.6.8-17.el7.i686.rpm</filename><sum type="sha256">305afdf13a5f552ffa00dd59f154b6ea0546c90e2962410db11d67b28c602f07</sum></package><package arch="i686" name="python3-devel" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-17.el7.i686.rpm</filename><sum type="sha256">a584ccf6e24363faa109f7c98777f86b3814289758653f29f5cb3b9dab8dbb04</sum></package><package arch="i686" name="python3-tkinter" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-17.el7.i686.rpm</filename><sum type="sha256">11a2d12d28012d1a2c308db52468b86fd56922376a9c87d2779594ea350ec1a7</sum></package><package arch="x86_64" name="python3-devel" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-17.el7.x86_64.rpm</filename><sum type="sha256">ecb31d93f55639cd16cec810b53bd5a250f91b6bb60842aa0b158cf63d6c67f7</sum></package><package arch="i686" name="python3-debug" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-17.el7.i686.rpm</filename><sum type="sha256">b549d3f8ef59e18d3e6bbec90dfd5180d86440ecb66885266b722d1b28337cff</sum></package><package arch="x86_64" name="python3-test" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-17.el7.x86_64.rpm</filename><sum type="sha256">db1880e68d8478b3fd6f648fc76c7b6a7b1e724264da71f3993cd44cfbd09b34</sum></package><package arch="i686" name="python3-test" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-17.el7.i686.rpm</filename><sum type="sha256">71c341657b208a997fa0a9daddcf06784b2fbf0d1ed972a21965902a791150fe</sum></package><package arch="x86_64" name="python3-debug" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-17.el7.x86_64.rpm</filename><sum type="sha256">1e909825758411d5f787c612c08ae2dab9beb4fa7eeacdf2bc7c94c0930b5bc5</sum></package><package arch="i686" name="python3-idle" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-17.el7.i686.rpm</filename><sum type="sha256">82cd4860dfa00c2cce22b6b685a98f4cf465fd7053161eb0338e2cf8c48d0918</sum></package><package arch="i686" name="python3-libs" release="17.el7" src="python3-3.6.8-17.el7.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-17.el7.i686.rpm</filename><sum type="sha256">00b41c5dca14a515d1d4004df978c9e8c86463ce7453e04fd7aad0de3346dac8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8492" id="CVE-2020-8492" title="Cve-2020-8492" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3888" id="RHSA-2020:3888-1" title="Rhsa-2020:3888-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1763229" id="1763229" title="Cve-2019-16935 Python: Xss Vulnerability In The Documentation Xml-Rpc Server In Server_Title Field" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1763730" id="1763730" title="Python3-Idle Is Not Providing Python36-Tools" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1809065" id="1809065" title="Cve-2020-8492 Python: Wrong Backtracking In Urllib.Request.Abstractbasicauthhandler Allows For A Redos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3898-1</id><title>Cloud-Init</title><description>Security Fix(es): 
* cloud-init: Use of random.choice when generating random password (CVE-2020-8631) 
* cloud-init: Too short random password length in cc_set_password in config/cc_set_passwords.py (CVE-2020-8632) 
* cloud-init: default configuration disabled deletion of SSH host keys (CVE-2018-10896)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="cloud-init" release="7.el7" src="cloud-init-19.4-7.el7.src.rpm" version="19.4"><filename>cloud-init-19.4-7.el7.x86_64.rpm</filename><sum type="sha256">55591cfe2ed22e312cd0b8366a69f59cb8b93c12c430cb5e47186b85f942000a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10896" id="CVE-2018-10896" title="Cve-2018-10896" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8631" id="CVE-2020-8631" title="Cve-2020-8631" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8632" id="CVE-2020-8632" title="Cve-2020-8632" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3898" id="RHSA-2020:3898-1" title="Rhsa-2020:3898-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1574338" id="1574338" title="Cve-2018-10896 Cloud-Init: Default Configuration Disabled Deletion Of Ssh Host Keys [Rhel-7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1598831" id="1598831" title="Cve-2018-10896 Cloud-Init: Default Configuration Disabled Deletion Of Ssh Host Keys" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1748015" id="1748015" title="[Cloud-Init][Rhel7] /Etc/Resolv.Conf Lose Config After Reboot (Initial Instance Is Ok)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1772505" id="1772505" title="[Rhel7] Swapon Fails With &quot;Swapfile Has Holes&quot; When Created On A Xfs Filesystem By Cloud-Init" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1793652" id="1793652" title="Support For Aws Imds V2 (Available In Cloud-Init 19.4)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1798728" id="1798728" title="Cve-2020-8632 Cloud-Init: Too Short Random Password Length In Cc_Set_Password In Config/Cc_Set_Passwords.Py" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1798731" id="1798731" title="Cve-2020-8631 Cloud-Init: Use Of Random.Choice When Generating Random Password" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1803094" id="1803094" title="[Rhel-7.9] Cloud-Init Rebase To 19.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1821679" id="1821679" title="[Cloud-Init Test] Cloud-Init Rebase To 19.4 Testing In Rhel-7.9" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1821999" id="1821999" title="[Rhel7.9] Do Not Log Imdsv2 Token Values Into Cloud-Init.Log" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3901-1</id><title>Libpng</title><description>Security Fix(es): 
* libpng: does not check length of chunks against user limit (CVE-2017-12652)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="libpng-devel" release="8.el7" src="libpng-1.5.13-8.el7.src.rpm" version="1.5.13"><filename>libpng-devel-1.5.13-8.el7.x86_64.rpm</filename><sum type="sha256">9675e15c9e84a9cef3d71cf0822605a6aea0120b63bb9c6b0e501b5e9ec4fd21</sum></package><package arch="x86_64" epoch="2" name="libpng-static" release="8.el7" src="libpng-1.5.13-8.el7.src.rpm" version="1.5.13"><filename>libpng-static-1.5.13-8.el7.x86_64.rpm</filename><sum type="sha256">644daab0c8f61d93af68ea63a1329d3e8c85c7c84488316748cd97cf54ec2f3c</sum></package><package arch="x86_64" epoch="2" name="libpng" release="8.el7" src="libpng-1.5.13-8.el7.src.rpm" version="1.5.13"><filename>libpng-1.5.13-8.el7.x86_64.rpm</filename><sum type="sha256">0e4f8cdfd63647f81a806f76b25e797c7a8bd64df53ea28e42d8955dba4781bd</sum></package><package arch="i686" epoch="2" name="libpng-static" release="8.el7" src="libpng-1.5.13-8.el7.src.rpm" version="1.5.13"><filename>libpng-static-1.5.13-8.el7.i686.rpm</filename><sum type="sha256">70fa7e0da54383b8d3de74bcc4fd1b553c53534e41e35b927bf14d2ebe291502</sum></package><package arch="i686" epoch="2" name="libpng" release="8.el7" src="libpng-1.5.13-8.el7.src.rpm" version="1.5.13"><filename>libpng-1.5.13-8.el7.i686.rpm</filename><sum type="sha256">5345462ec540ee430e2470dff68515295d373d88c06aab6e4aac87f47f83081a</sum></package><package arch="i686" epoch="2" name="libpng-devel" release="8.el7" src="libpng-1.5.13-8.el7.src.rpm" version="1.5.13"><filename>libpng-devel-1.5.13-8.el7.i686.rpm</filename><sum type="sha256">cbecd58b02f2f55e095fb0957743f361210530ef6ba1fc06cae838bfc8be6ba4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12652" id="CVE-2017-12652" title="Cve-2017-12652" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3901" id="RHSA-2020:3901-1" title="Rhsa-2020:3901-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1733956" id="1733956" title="Cve-2017-12652 Libpng: Does Not Check Length Of Chunks Against User Limit" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3902-1</id><title>Libtiff</title><description>Security Fix(es): 
* libtiff: integer overflow in _TIFFCheckMalloc and _TIFFCheckRealloc in tif_aux.c (CVE-2019-14973) 
* libtiff: integer overflow leading to heap-based buffer overflow in tif_getimage.c (CVE-2019-17546)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libtiff-static" release="35.el7" src="libtiff-4.0.3-35.el7.src.rpm" version="4.0.3"><filename>libtiff-static-4.0.3-35.el7.i686.rpm</filename><sum type="sha256">4456a90574ff9aefd2dbced4ba6eeb3ddc886eb2574e1c1bc0feaa445f70d6a1</sum></package><package arch="i686" name="libtiff-devel" release="35.el7" src="libtiff-4.0.3-35.el7.src.rpm" version="4.0.3"><filename>libtiff-devel-4.0.3-35.el7.i686.rpm</filename><sum type="sha256">28e354f99c58b96c0667cdd4c28733455e37ef7e83f02d7108584c62490da904</sum></package><package arch="i686" name="libtiff" release="35.el7" src="libtiff-4.0.3-35.el7.src.rpm" version="4.0.3"><filename>libtiff-4.0.3-35.el7.i686.rpm</filename><sum type="sha256">55a2a87e891e5ae9e6f76106a7e7af9e5408261ba9311cc702e2e1000c13052d</sum></package><package arch="x86_64" name="libtiff-devel" release="35.el7" src="libtiff-4.0.3-35.el7.src.rpm" version="4.0.3"><filename>libtiff-devel-4.0.3-35.el7.x86_64.rpm</filename><sum type="sha256">114620bc9f5fc438848ae84a24af1c535ac8f7f843f3403c1f179a7624c00a1d</sum></package><package arch="x86_64" name="libtiff-tools" release="35.el7" src="libtiff-4.0.3-35.el7.src.rpm" version="4.0.3"><filename>libtiff-tools-4.0.3-35.el7.x86_64.rpm</filename><sum type="sha256">21335421bd3acb7c2782aa6f2be48a81df6a8313af864a35f8b0b0a711b12c3c</sum></package><package arch="x86_64" name="libtiff-static" release="35.el7" src="libtiff-4.0.3-35.el7.src.rpm" version="4.0.3"><filename>libtiff-static-4.0.3-35.el7.x86_64.rpm</filename><sum type="sha256">5f50220995c43eedf26e02f65a1dfe4f5ca2afb6d28811d24818233ec1350a49</sum></package><package arch="x86_64" name="libtiff" release="35.el7" src="libtiff-4.0.3-35.el7.src.rpm" version="4.0.3"><filename>libtiff-4.0.3-35.el7.x86_64.rpm</filename><sum type="sha256">80943e54372643083901569fde0f17b642f859629923f381a2fc308e01a31c2c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14973" id="CVE-2019-14973" title="Cve-2019-14973" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17546" id="CVE-2019-17546" title="Cve-2019-17546" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3902" id="RHSA-2020:3902-1" title="Rhsa-2020:3902-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1745951" id="1745951" title="Cve-2019-14973 Libtiff: Integer Overflow In _Tiffcheckmalloc And _Tiffcheckrealloc In Tif_Aux.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1765705" id="1765705" title="Cve-2019-17546 Libtiff: Integer Overflow Leading To Heap-Based Buffer Overflow In Tif_Getimage.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3906-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* QEMU: seccomp: blacklist is not applied to all threads (CVE-2018-15746) 
* QEMU: vnc: memory leakage upon disconnect (CVE-2019-20382)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="175.el7" src="qemu-kvm-1.5.3-175.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-175.el7.x86_64.rpm</filename><sum type="sha256">6d2e2c9316d08af5d94e7984eef0dd6f9b13071883bcb530b8d5b0a2242448d6</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="175.el7" src="qemu-kvm-1.5.3-175.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-175.el7.x86_64.rpm</filename><sum type="sha256">8935d99c77ff3a7742a7f2ec0da11407bdf6613ca2a6a6267ef70e662682d383</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="175.el7" src="qemu-kvm-1.5.3-175.el7.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-175.el7.x86_64.rpm</filename><sum type="sha256">490a44a4f588c2e6fad927d8f679f9568c0ee6392989dbd582b305314eee57ad</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="175.el7" src="qemu-kvm-1.5.3-175.el7.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-175.el7.x86_64.rpm</filename><sum type="sha256">f6487877daa75615bb84590866b1a331a449e6bf4b231691d97c161634f93451</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15746" id="CVE-2018-15746" title="Cve-2018-15746" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20382" id="CVE-2019-20382" title="Cve-2019-20382" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3906" id="RHSA-2020:3906-1" title="Rhsa-2020:3906-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1615637" id="1615637" title="Cve-2018-15746 Qemu: Seccomp: Blacklist Is Not Applied To All Threads" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791679" id="1791679" title="Qemu: Slirp: Disable Emulation Of Tcp Programs Like Ftp Irc Etc. [Rhel-7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1802215" id="1802215" title="Add Support For Newer Glusterfs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1810390" id="1810390" title="Cve-2019-20382 Qemu: Vnc: Memory Leakage Upon Disconnect" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3908-1</id><title>Cpio</title><description>Security Fix(es): 
* cpio: improper input validation when writing tar header fields leads to unexpect tar generation (CVE-2019-14866)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="cpio" release="28.el7" src="cpio-2.11-28.el7.src.rpm" version="2.11"><filename>cpio-2.11-28.el7.x86_64.rpm</filename><sum type="sha256">1abeea9894fe45a8983e0258f79069bad85b9effa640033aae9dbebdb497c3a7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14866" id="CVE-2019-14866" title="Cve-2019-14866" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3908" id="RHSA-2020:3908-1" title="Rhsa-2020:3908-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1765511" id="1765511" title="Cve-2019-14866 Cpio: Improper Input Validation When Writing Tar Header Fields Leads To Unexpect Tar Generation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3911-1</id><title>Python</title><description>Security Fix(es): 
* python: XSS vulnerability in the documentation XML-RPC server in server_title field (CVE-2019-16935)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-debug" release="89.el7" src="python-2.7.5-89.el7.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-89.el7.x86_64.rpm</filename><sum type="sha256">7fde2bf851b595d53b7c14b4f3d1948af9d33b5dd5315610c9b0f7688f753cb4</sum></package><package arch="x86_64" name="python-test" release="89.el7" src="python-2.7.5-89.el7.src.rpm" version="2.7.5"><filename>python-test-2.7.5-89.el7.x86_64.rpm</filename><sum type="sha256">081601053786fb5bf339113a631a01c31622be8022d404ecc8b7b2ee78122097</sum></package><package arch="x86_64" name="python-tools" release="89.el7" src="python-2.7.5-89.el7.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-89.el7.x86_64.rpm</filename><sum type="sha256">9442bbf8a094feddb106bb41188944fa3d74d2263bf742a5e90136d47413608e</sum></package><package arch="x86_64" name="python-libs" release="89.el7" src="python-2.7.5-89.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-89.el7.x86_64.rpm</filename><sum type="sha256">429a0cc93beceebc65292b64f2809b0414206ab4940b0f0708b0ba2fdbe2fafd</sum></package><package arch="x86_64" name="python-devel" release="89.el7" src="python-2.7.5-89.el7.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-89.el7.x86_64.rpm</filename><sum type="sha256">a98e9a7c5b39a55c0dc3114ee895fa705371cc5f1e4b29af071a78d5362cb7cc</sum></package><package arch="x86_64" name="python" release="89.el7" src="python-2.7.5-89.el7.src.rpm" version="2.7.5"><filename>python-2.7.5-89.el7.x86_64.rpm</filename><sum type="sha256">512c563a817b55c187e202e047acf8b53ddb456d814712d495c3aae33b1fad60</sum></package><package arch="i686" name="python-libs" release="89.el7" src="python-2.7.5-89.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-89.el7.i686.rpm</filename><sum type="sha256">119b23cdb1e1b152d671f2933dbc802e277e2c7f3db2cb0c06422430366138e2</sum></package><package arch="x86_64" name="tkinter" release="89.el7" src="python-2.7.5-89.el7.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-89.el7.x86_64.rpm</filename><sum type="sha256">c1308978f2637e9a481d20a9d9d676539f33037c942962fd498a512ba18514ed</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16935" id="CVE-2019-16935" title="Cve-2019-16935" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3911" id="RHSA-2020:3911-1" title="Rhsa-2020:3911-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1763229" id="1763229" title="Cve-2019-16935 Python: Xss Vulnerability In The Documentation Xml-Rpc Server In Server_Title Field" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3915-1</id><title>Libssh2</title><description>Security Fix(es): 
* libssh2: integer overflow in SSH_MSG_DISCONNECT logic in packet.c (CVE-2019-17498)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libssh2-devel" release="4.el7" src="libssh2-1.8.0-4.el7.src.rpm" version="1.8.0"><filename>libssh2-devel-1.8.0-4.el7.i686.rpm</filename><sum type="sha256">de09a90cf07de953e079f73a15570e61771f15212421ae4c688927b5e3c674ce</sum></package><package arch="x86_64" name="libssh2-devel" release="4.el7" src="libssh2-1.8.0-4.el7.src.rpm" version="1.8.0"><filename>libssh2-devel-1.8.0-4.el7.x86_64.rpm</filename><sum type="sha256">e6fa7588e0c282c2611051609f1e0de3f2f4e1bd2dd9251d4e45c4eb61259cdf</sum></package><package arch="i686" name="libssh2" release="4.el7" src="libssh2-1.8.0-4.el7.src.rpm" version="1.8.0"><filename>libssh2-1.8.0-4.el7.i686.rpm</filename><sum type="sha256">158a01f5bc056e08a40a418661ef06d1800d719cc93ed4720b966d62f75c4777</sum></package><package arch="x86_64" name="libssh2" release="4.el7" src="libssh2-1.8.0-4.el7.src.rpm" version="1.8.0"><filename>libssh2-1.8.0-4.el7.x86_64.rpm</filename><sum type="sha256">bcf4dc42888aa5074ae44a1849b80215c1cb26ec7a6e4a10034f4e7979ba6d51</sum></package><package arch="noarch" name="libssh2-docs" release="4.el7" src="libssh2-1.8.0-4.el7.src.rpm" version="1.8.0"><filename>libssh2-docs-1.8.0-4.el7.noarch.rpm</filename><sum type="sha256">41146c005a9cb5bfcc19aaab25ad2a27cc16646a6e53fc57d770d59ee5035ff1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17498" id="CVE-2019-17498" title="Cve-2019-17498" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3915" id="RHSA-2020:3915-1" title="Rhsa-2020:3915-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1766898" id="1766898" title="Cve-2019-17498 Libssh2: Integer Overflow In Ssh_Msg_Disconnect Logic In Packet.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3916-1</id><title>Curl</title><description>Security Fix(es): 
* curl: heap buffer overflow in function tftp_receive_packet() (CVE-2019-5482)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libcurl-devel" release="59.el7" src="curl-7.29.0-59.el7.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-59.el7.i686.rpm</filename><sum type="sha256">9c856db762bc0d68f141856d7ff090c59b88eb98324eaa20a5eaf3a5708f2128</sum></package><package arch="x86_64" name="libcurl-devel" release="59.el7" src="curl-7.29.0-59.el7.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-59.el7.x86_64.rpm</filename><sum type="sha256">ef28b8a79559ef802ae17fb9d184bb8be96478e0672806a3449a831df2791fe7</sum></package><package arch="x86_64" name="libcurl" release="59.el7" src="curl-7.29.0-59.el7.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-59.el7.x86_64.rpm</filename><sum type="sha256">b9c5025044f93b09dd9ab29fc5e0106d9f6114624ebbd9d3f3a1e663197b6da3</sum></package><package arch="i686" name="libcurl" release="59.el7" src="curl-7.29.0-59.el7.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-59.el7.i686.rpm</filename><sum type="sha256">b0754db1cf23accbf020f12c8d5c7cd5b34a9e48b0be6a062d5410c1eb227125</sum></package><package arch="x86_64" name="curl" release="59.el7" src="curl-7.29.0-59.el7.src.rpm" version="7.29.0"><filename>curl-7.29.0-59.el7.x86_64.rpm</filename><sum type="sha256">6dd40f8f62b4aa20eb4088f398bd86eb63bb7b0f20db35e4eb1ececc9ff0934e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5482" id="CVE-2019-5482" title="Cve-2019-5482" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3916" id="RHSA-2020:3916-1" title="Rhsa-2020:3916-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1749652" id="1749652" title="Cve-2019-5482 Curl: Heap Buffer Overflow In Function Tftp_Receive_Packet()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1836773" id="1836773" title="Post Followed By A Get With Large Headers On The Same Connection Leads To A Null Dereference" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3922-1</id><title>Libsndfile</title><description>Security Fix(es): 
* libsndfile: buffer over-read in the function i2alaw_array in alaw.c (CVE-2018-19662)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libsndfile" release="12.el7" src="libsndfile-1.0.25-12.el7.src.rpm" version="1.0.25"><filename>libsndfile-1.0.25-12.el7.i686.rpm</filename><sum type="sha256">71e5162542918806a4652b151f5fd4cd3db47c381fa01ccbe8e3b2d3d1402621</sum></package><package arch="i686" name="libsndfile-devel" release="12.el7" src="libsndfile-1.0.25-12.el7.src.rpm" version="1.0.25"><filename>libsndfile-devel-1.0.25-12.el7.i686.rpm</filename><sum type="sha256">956400c7497fff01c175cc68617a199fe84a679d23c0286d4272880bc43c6da3</sum></package><package arch="x86_64" name="libsndfile-devel" release="12.el7" src="libsndfile-1.0.25-12.el7.src.rpm" version="1.0.25"><filename>libsndfile-devel-1.0.25-12.el7.x86_64.rpm</filename><sum type="sha256">7f488640237061a08ec756d39b5aabe0a362778c64a1a2ea1a6c9dc9dc59886d</sum></package><package arch="x86_64" name="libsndfile-utils" release="12.el7" src="libsndfile-1.0.25-12.el7.src.rpm" version="1.0.25"><filename>libsndfile-utils-1.0.25-12.el7.x86_64.rpm</filename><sum type="sha256">7f5ee5d38598133a1d18c261aab7a039e28273babf667fc9761158cc6f95a83e</sum></package><package arch="x86_64" name="libsndfile" release="12.el7" src="libsndfile-1.0.25-12.el7.src.rpm" version="1.0.25"><filename>libsndfile-1.0.25-12.el7.x86_64.rpm</filename><sum type="sha256">de695e200b57e33040970a26f9031d65ce22de590c21f5fa37e6fbb4e3fa82d9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-19662" id="CVE-2018-19662" title="Cve-2018-19662" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3922" id="RHSA-2020:3922-1" title="Rhsa-2020:3922-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1659631" id="1659631" title="Cve-2018-19662 Libsndfile: Buffer Over-Read In The Function I2Alaw_Array In Alaw.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3936-1</id><title>Ipa</title><description>Security Fix(es): 
* js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251) 
* bootstrap: XSS in the data-target attribute (CVE-2016-10735) 
* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040) 
* bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip. (CVE-2018-14042) 
* bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676) 
* bootstrap: XSS in the affix configuration target property (CVE-2018-20677) 
* bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331) 
* js-jquery: prototype pollution in object's prototype leading to denial of service or remote code execution or property injection (CVE-2019-11358) 
* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022) 
* ipa: No password length restriction leads to denial of service (CVE-2020-1722)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ipa-server" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>ipa-server-4.6.8-5.sl7.x86_64.rpm</filename><sum type="sha256">212f856b3912d675c1fb7be2d49c6137e78a30a80fb3c02a5f699e5a1ad125e0</sum></package><package arch="noarch" name="ipa-common" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>ipa-common-4.6.8-5.sl7.noarch.rpm</filename><sum type="sha256">958b97d9fc31c879fdb2dbea8031420b87898c9b965279e694bf538909f79792</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>ipa-server-trust-ad-4.6.8-5.sl7.x86_64.rpm</filename><sum type="sha256">95e90f07a9f23ede63feb3c4fd5757a4d99f10386c6a1faa05098e6791814077</sum></package><package arch="noarch" name="python2-ipaserver" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>python2-ipaserver-4.6.8-5.sl7.noarch.rpm</filename><sum type="sha256">b003b3c0797415a96115c3e01f3850f3b7938c91770a5901dd2fb36c18921466</sum></package><package arch="noarch" name="python2-ipalib" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>python2-ipalib-4.6.8-5.sl7.noarch.rpm</filename><sum type="sha256">94283f04a0455a3a998e4b570a0395866e61bc6830f3bca211d3ef3feb256d1c</sum></package><package arch="noarch" name="python2-ipaclient" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>python2-ipaclient-4.6.8-5.sl7.noarch.rpm</filename><sum type="sha256">8d477c0f051efd043f9805ff8c8098eedf08b3486b81a230a3d38ff99bd77954</sum></package><package arch="noarch" name="ipa-client-common" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>ipa-client-common-4.6.8-5.sl7.noarch.rpm</filename><sum type="sha256">2ec31f79a3aaa0d80dc2816837aa21b209afe379391da2ec801b9fc2d659cb04</sum></package><package arch="x86_64" name="ipa-client" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>ipa-client-4.6.8-5.sl7.x86_64.rpm</filename><sum type="sha256">9cf9f179f4f658e86a05603a72e8022514431711915e6b68f62f722936d5f0c9</sum></package><package arch="noarch" name="ipa-server-common" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>ipa-server-common-4.6.8-5.sl7.noarch.rpm</filename><sum type="sha256">eb08d748f9cb5646645f1dbe27d87dc5db7a327f3211dc8139f2c519b4bfbf69</sum></package><package arch="noarch" name="ipa-server-dns" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>ipa-server-dns-4.6.8-5.sl7.noarch.rpm</filename><sum type="sha256">495fb3fc28301901f52de79642bbae01063134fa48b82666f9d38ed887839b41</sum></package><package arch="noarch" name="ipa-python-compat" release="5.sl7" src="ipa-4.6.8-5.sl7.src.rpm" version="4.6.8"><filename>ipa-python-compat-4.6.8-5.sl7.noarch.rpm</filename><sum type="sha256">af6dde81ad208f3dd8d38a6fffd9dfcfe14627fd7a159c17e13e4503c0d43ebc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9251" id="CVE-2015-9251" title="Cve-2015-9251" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10735" id="CVE-2016-10735" title="Cve-2016-10735" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14040" id="CVE-2018-14040" title="Cve-2018-14040" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14042" id="CVE-2018-14042" title="Cve-2018-14042" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20676" id="CVE-2018-20676" title="Cve-2018-20676" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20677" id="CVE-2018-20677" title="Cve-2018-20677" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358" id="CVE-2019-11358" title="Cve-2019-11358" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8331" id="CVE-2019-8331" title="Cve-2019-8331" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11022" id="CVE-2020-11022" title="Cve-2020-11022" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1722" id="CVE-2020-1722" title="Cve-2020-1722" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3936" id="RHSA-2020:3936-1" title="Rhsa-2020:3936-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1399546" id="1399546" title="Cve-2015-9251 Js-Jquery: Cross-Site Scripting Via Cross-Domain Ajax Requests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1404770" id="1404770" title="Id Views: Do Not Allow Custom Views For The Masters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1545755" id="1545755" title="Ipa-Replica-Prepare Should Not Update Pki Admin Password." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1601614" id="1601614" title="Cve-2018-14040 Bootstrap: Cross-Site Scripting (Xss) In The Collapse Data-Parent Attribute" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1601617" id="1601617" title="Cve-2018-14042 Bootstrap: Cross-Site Scripting (Xss) In The Data-Container Property Of Tooltip." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1668082" id="1668082" title="Cve-2018-20676 Bootstrap: Xss In The Tooltip Data-Viewport Attribute" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1668089" id="1668089" title="Cve-2018-20677 Bootstrap: Xss In The Affix Configuration Target Property" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1668097" id="1668097" title="Cve-2016-10735 Bootstrap: Xss In The Data-Target Attribute" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1686454" id="1686454" title="Cve-2019-8331 Bootstrap: Xss In The Tooltip Or Popover Data-Template Attribute" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1701972" id="1701972" title="Cve-2019-11358 Js-Jquery: Prototype Pollution In Object'S Prototype Leading To Denial Of Service Or Remote Code Execution Or Property Injection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1754902" id="1754902" title="Running Ipa-Server-Install Fails When Rhel 7.7 Packages Are Installed On Rhel 7.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1755535" id="1755535" title="Ipa-Advise On A Rhel7 Idm Server Is Not Able To Generate A Configuration Script For A Rhel8 Idm Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1756568" id="1756568" title="Ipa-Server-Certinstall Man Page Does Not Match Built-In Help." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1758406" id="1758406" title="Kra Authentication Fails When Ipa Ca Has Custom Subject Dn" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1769791" id="1769791" title="Invisible Part Of Notification Area In Web Ui Intercepts Clicks Of Some Page Elements" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1771356" id="1771356" title="Default Client Configuration Breaks Ssh In Fips Mode." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1780548" id="1780548" title="Man Page Ipa-Cacert-Manage Does Not Display Correctly On Rhel" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1782587" id="1782587" title="Add &quot;Systemctl Restart Sssd&quot; To Warning Message When Adding Trust Agents To Replicas" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788718" id="1788718" title="Ipa-Server-Install Incorrectly Setting Slew Mode (-X) When Setting Up Ntpd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788907" id="1788907" title="Renewed Certs Are Not Picked Up By Ipa Cas" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1793071" id="1793071" title="Cve-2020-1722 Ipa: No Password Length Restriction Leads To Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1795890" id="1795890" title="Ipa-Pkinit-Manage Enable Fails On Replica If It Doesn'T Host The Ca" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1801791" id="1801791" title="Compatibility Schema Difference In Functionality For Systems Following Rhel 7.5 -&gt; 7.6 Upgrade Path As Opposed To New Rhel 7.6 Systems" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817886" id="1817886" title="Ipa Group-Add-Member: Prevent Adding Ipa Objects As External Members" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817918" id="1817918" title="Secure Tomcat Ajp Connector" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817919" id="1817919" title="Enable Compat Tree To Provide Information About Ad Users And Groups On Trust Agents" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817922" id="1817922" title="Covscan Memory Leaks Report" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817923" id="1817923" title="Ipa Upgrade Is Failing With Error &quot;Failed To Get Request: Bus, Object_Path And Dbus_Interface Must Not Be None.&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817927" id="1817927" title="Host-Add --Password Logs Cleartext Userpassword To Apache Error Log" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1819725" id="1819725" title="Rebase Ipa To Latest 4.6.X Version" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1825829" id="1825829" title="Ipa-Advise On A Rhel7 Idm Server Generate A Configuration Script For Client Having Hardcoded Python3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1828406" id="1828406" title="Cve-2020-11022 Jquery: Cross-Site Scripting Due To Improper Injquery.Htmlprefilter Method" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1829787" id="1829787" title="Ipa Service-Del Deletes The Required Principal When Specified In Lower/Upper Case" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1834385" id="1834385" title="Man Page Syntax Issue Detected By Rpminspect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1842950" id="1842950" title="Ipa-Adtrust-Install Fails When Replica Is Offline" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3940-1</id><title>Openwsman</title><description>Security Fix(es): 
* openwsman: Infinite loop in process_connection() allows denial of service (CVE-2019-3833)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libwsman-devel" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>libwsman-devel-2.6.3-7.git4391e5c.el7.x86_64.rpm</filename><sum type="sha256">17355de3560fc7405745ea50c5fb8ecab0f6096568dd89b3813e92ba131902a6</sum></package><package arch="x86_64" name="libwsman1" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>libwsman1-2.6.3-7.git4391e5c.el7.x86_64.rpm</filename><sum type="sha256">b143ae5c86e39bee0b9d0e90cddc05917c4ad6f0fda6df2c89254e4c22c6b37a</sum></package><package arch="i686" name="openwsman-client" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>openwsman-client-2.6.3-7.git4391e5c.el7.i686.rpm</filename><sum type="sha256">ff62a824c5f57da21d2acad939e8b631d536c80d57bb80f0f08b96e413c96eff</sum></package><package arch="x86_64" name="openwsman-client" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>openwsman-client-2.6.3-7.git4391e5c.el7.x86_64.rpm</filename><sum type="sha256">a15665c76215e6eb6065f39cab4965986c3e58f2c64bf59141eff1ed81954e7d</sum></package><package arch="i686" name="openwsman-server" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>openwsman-server-2.6.3-7.git4391e5c.el7.i686.rpm</filename><sum type="sha256">d1e212b90758f5a4b789aed571902ad1bcb6d640084f606b640012c5d0d6f45d</sum></package><package arch="x86_64" name="openwsman-python" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>openwsman-python-2.6.3-7.git4391e5c.el7.x86_64.rpm</filename><sum type="sha256">ab2e2282adff3c60550ea68ae8c6b3b395fef3b455805d0c0a1aaabeb81f0d9a</sum></package><package arch="x86_64" name="openwsman-perl" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>openwsman-perl-2.6.3-7.git4391e5c.el7.x86_64.rpm</filename><sum type="sha256">4594f53f2adc81772658d3beed9db7ff7513cdf06c0b687978c58ad589eb7483</sum></package><package arch="i686" name="libwsman-devel" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>libwsman-devel-2.6.3-7.git4391e5c.el7.i686.rpm</filename><sum type="sha256">b90cc5a6f47f7328d4c465d24613d2fd73b68bc0e358499e31ec9d7ccfa582ff</sum></package><package arch="i686" name="libwsman1" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>libwsman1-2.6.3-7.git4391e5c.el7.i686.rpm</filename><sum type="sha256">2ac3a4e56bc45f14b8a72ee0f98ff4239a4b2d18e0ceb4ef0aca94eac58c80a7</sum></package><package arch="x86_64" name="openwsman-server" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>openwsman-server-2.6.3-7.git4391e5c.el7.x86_64.rpm</filename><sum type="sha256">b56ae81b6084d06b1e50372555f0041f6ef2ece94fe969b83db36469c0e50807</sum></package><package arch="x86_64" name="openwsman-ruby" release="7.git4391e5c.el7" src="openwsman-2.6.3-7.git4391e5c.el7.src.rpm" version="2.6.3"><filename>openwsman-ruby-2.6.3-7.git4391e5c.el7.x86_64.rpm</filename><sum type="sha256">752b88babaa24ded54c6f3f6f2e9aae905326e58e122c0526244a913d3788d9b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3833" id="CVE-2019-3833" title="Cve-2019-3833" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3940" id="RHSA-2020:3940-1" title="Rhsa-2020:3940-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1674478" id="1674478" title="Cve-2019-3833 Openwsman: Infinite Loop In Process_Connection() Allows Denial Of Service" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3943-1</id><title>Libwmf</title><description>Security Fix(es): 
* gd: double free in the gdImage*Ptr in gd_gif_out.c, gd_jpeg.c, and gd_wbmp.c (CVE-2019-6978)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libwmf" release="44.el7" src="libwmf-0.2.8.4-44.el7.src.rpm" version="0.2.8.4"><filename>libwmf-0.2.8.4-44.el7.x86_64.rpm</filename><sum type="sha256">0305c87f54bfeaeedd8830e1e69d72e13f56bb4c1a32a34cee7e9002001567df</sum></package><package arch="i686" name="libwmf" release="44.el7" src="libwmf-0.2.8.4-44.el7.src.rpm" version="0.2.8.4"><filename>libwmf-0.2.8.4-44.el7.i686.rpm</filename><sum type="sha256">a65b16d445a9f49bac7ce47b48450c5e9d251f9b0a74dc3d0513c44ed93bac80</sum></package><package arch="x86_64" name="libwmf-devel" release="44.el7" src="libwmf-0.2.8.4-44.el7.src.rpm" version="0.2.8.4"><filename>libwmf-devel-0.2.8.4-44.el7.x86_64.rpm</filename><sum type="sha256">d9f5ecf2c2176631670e054af0f39e71319279196dea4f44804b35f4eddbcdd4</sum></package><package arch="x86_64" name="libwmf-lite" release="44.el7" src="libwmf-0.2.8.4-44.el7.src.rpm" version="0.2.8.4"><filename>libwmf-lite-0.2.8.4-44.el7.x86_64.rpm</filename><sum type="sha256">34bcc527bc53616bd383b921114d1cc768631b411fa468e17f1323a765130957</sum></package><package arch="i686" name="libwmf-devel" release="44.el7" src="libwmf-0.2.8.4-44.el7.src.rpm" version="0.2.8.4"><filename>libwmf-devel-0.2.8.4-44.el7.i686.rpm</filename><sum type="sha256">8322e751b91b7cf1542c0463119a8afca17870c9459ae1a471e5fd58a4262d8f</sum></package><package arch="i686" name="libwmf-lite" release="44.el7" src="libwmf-0.2.8.4-44.el7.src.rpm" version="0.2.8.4"><filename>libwmf-lite-0.2.8.4-44.el7.i686.rpm</filename><sum type="sha256">ea7e092fccc28d46aa2376e62a935c174a1e29bda5797f40df15ce43e957b719</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6978" id="CVE-2019-6978" title="Cve-2019-6978" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3943" id="RHSA-2020:3943-1" title="Rhsa-2020:3943-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1671390" id="1671390" title="Cve-2019-6978 Gd: Double Free In The Gdimage*Ptr In Gd_Gif_Out.C, Gd_Jpeg.C, And Gd_Wbmp.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1840569" id="1840569" title="Bz1638365 Broke Libwmf Utils" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3944-1</id><title>Unoconv</title><description>Security Fix(es): 
* unoconv: mishandling of pathname leads to SSRF and local file inclusion (CVE-2019-17400)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="unoconv" release="8.el7" src="unoconv-0.6-8.el7.src.rpm" version="0.6"><filename>unoconv-0.6-8.el7.noarch.rpm</filename><sum type="sha256">97695d70feca1dcd27e7ad8d2760e314ae94fcd2b92ab547e24355b42415edd2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3944" id="RHSA-2020:3944-1" title="Rhsa-2020:3944-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3949-1</id><title>Librabbitmq</title><description>Security Fix(es): 
* librabbitmq: integer overflow in amqp_handle_input in amqp_connection.c leads to heap-based buffer overflow (CVE-2019-18609)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="librabbitmq-examples" release="3.el7" src="librabbitmq-0.8.0-3.el7.src.rpm" version="0.8.0"><filename>librabbitmq-examples-0.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">727e41346155507386016f6a7843b9fb983cdd981078d2e1d88c529c063a373a</sum></package><package arch="x86_64" name="librabbitmq-devel" release="3.el7" src="librabbitmq-0.8.0-3.el7.src.rpm" version="0.8.0"><filename>librabbitmq-devel-0.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">b0f8ffaca682b7bf6a64be397e8ea9be66fef21fdeded919285dc972082a3b3f</sum></package><package arch="i686" name="librabbitmq" release="3.el7" src="librabbitmq-0.8.0-3.el7.src.rpm" version="0.8.0"><filename>librabbitmq-0.8.0-3.el7.i686.rpm</filename><sum type="sha256">8e91da77c204be6513fc1b4863c65455ab600e85d74a80596e071ebd9847e64f</sum></package><package arch="i686" name="librabbitmq-devel" release="3.el7" src="librabbitmq-0.8.0-3.el7.src.rpm" version="0.8.0"><filename>librabbitmq-devel-0.8.0-3.el7.i686.rpm</filename><sum type="sha256">4920939d44ebc704eec2f33283fc1a258aa1eb481d60130098595479c717148c</sum></package><package arch="x86_64" name="librabbitmq" release="3.el7" src="librabbitmq-0.8.0-3.el7.src.rpm" version="0.8.0"><filename>librabbitmq-0.8.0-3.el7.x86_64.rpm</filename><sum type="sha256">95019a3bc277abfecc2901a6591a03ef47aed5f54738ab6fae37b9563493a6ff</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18609" id="CVE-2019-18609" title="Cve-2019-18609" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3949" id="RHSA-2020:3949-1" title="Rhsa-2020:3949-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1786646" id="1786646" title="Cve-2019-18609 Librabbitmq: Integer Overflow In Amqp_Handle_Input In Amqp_Connection.C Leads To Heap-Based Buffer Overflow" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3952-1</id><title>Expat</title><description>Security Fix(es): 
* expat: large number of colons in input makes parser consume high amount of resources, leading to DoS (CVE-2018-20843) 
* expat: heap-based buffer over-read via crafted XML input (CVE-2019-15903)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="expat" release="12.el7" src="expat-2.1.0-12.el7.src.rpm" version="2.1.0"><filename>expat-2.1.0-12.el7.i686.rpm</filename><sum type="sha256">2821d8234609253c34b8216e80ac1cb471811ea7cbd2f6fe2996500557fc312c</sum></package><package arch="x86_64" name="expat-devel" release="12.el7" src="expat-2.1.0-12.el7.src.rpm" version="2.1.0"><filename>expat-devel-2.1.0-12.el7.x86_64.rpm</filename><sum type="sha256">7f73d056ec93cd87853f3ed50e15854fd573a27e708d8d8ec86a9ef1c386f8a9</sum></package><package arch="x86_64" name="expat-static" release="12.el7" src="expat-2.1.0-12.el7.src.rpm" version="2.1.0"><filename>expat-static-2.1.0-12.el7.x86_64.rpm</filename><sum type="sha256">baa06e09b3b30fc6775a25044c4286e5e6d919e503bf0dcc78a003444c4759d2</sum></package><package arch="i686" name="expat-devel" release="12.el7" src="expat-2.1.0-12.el7.src.rpm" version="2.1.0"><filename>expat-devel-2.1.0-12.el7.i686.rpm</filename><sum type="sha256">03be57e99f6187bf48e30f38836507c5ad5c166aa752443353649f066b827449</sum></package><package arch="x86_64" name="expat" release="12.el7" src="expat-2.1.0-12.el7.src.rpm" version="2.1.0"><filename>expat-2.1.0-12.el7.x86_64.rpm</filename><sum type="sha256">d1d93801fd83ba106092ab5b688bbad6d0ffa39d000af9bfb9f82feeb2e20401</sum></package><package arch="i686" name="expat-static" release="12.el7" src="expat-2.1.0-12.el7.src.rpm" version="2.1.0"><filename>expat-static-2.1.0-12.el7.i686.rpm</filename><sum type="sha256">c521f597bfb4875495920019ac6fbadf086d279b41a94805e66e0582b4316dfd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20843" id="CVE-2018-20843" title="Cve-2018-20843" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3952" id="RHSA-2020:3952-1" title="Rhsa-2020:3952-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1723723" id="1723723" title="Cve-2018-20843 Expat: Large Number Of Colons In Input Makes Parser Consume High Amount Of Resources, Leading To Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1752592" id="1752592" title="Expat: Heap-Based Buffer Over-Read Via Crafted " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3958-1</id><title>Httpd</title><description>Security Fix(es): 
* httpd: Improper handling of headers in mod_session can allow a remote user to modify session data for CGI applications (CVE-2018-1283) 
* httpd: Out of bounds read in mod_cache_socache can allow a remote attacker to cause DoS (CVE-2018-1303) 
* httpd: mod_rewrite configurations vulnerable to open redirect (CVE-2020-1927) 
* httpd: &lt;FilesMatch&gt; bypass with a trailing newline in the file name (CVE-2017-15715) 
* httpd: mod_rewrite potential open redirect (CVE-2019-10098) 
* httpd: mod_proxy_ftp use of uninitialized value (CVE-2020-1934)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="mod_proxy_html" release="95.sl7" src="httpd-2.4.6-95.sl7.src.rpm" version="2.4.6"><filename>mod_proxy_html-2.4.6-95.sl7.x86_64.rpm</filename><sum type="sha256">56159d40bdb54fe04bc5540e9e046a33f73de0c32386fe0de6c1a200516d273f</sum></package><package arch="x86_64" name="mod_ldap" release="95.sl7" src="httpd-2.4.6-95.sl7.src.rpm" version="2.4.6"><filename>mod_ldap-2.4.6-95.sl7.x86_64.rpm</filename><sum type="sha256">72ce3e7ecec1cbb64444f97de85ca67c4c49b456407ea4c56d3ae8c027b4a566</sum></package><package arch="x86_64" name="httpd-tools" release="95.sl7" src="httpd-2.4.6-95.sl7.src.rpm" version="2.4.6"><filename>httpd-tools-2.4.6-95.sl7.x86_64.rpm</filename><sum type="sha256">4956f09c9255dbec36163703d7ec819ddcbab8e977824971cf9d2a88e0afcbf8</sum></package><package arch="noarch" name="httpd-manual" release="95.sl7" src="httpd-2.4.6-95.sl7.src.rpm" version="2.4.6"><filename>httpd-manual-2.4.6-95.sl7.noarch.rpm</filename><sum type="sha256">d71c6aba2678eea06a0baaa73f1307a24e1baaa644faaa69ee140cfa2fc32a71</sum></package><package arch="x86_64" name="httpd-devel" release="95.sl7" src="httpd-2.4.6-95.sl7.src.rpm" version="2.4.6"><filename>httpd-devel-2.4.6-95.sl7.x86_64.rpm</filename><sum type="sha256">627fb306c6d41a1d20dc9f5cb9b68d173fcba4221a4177538d9885636e270cc1</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="95.sl7" src="httpd-2.4.6-95.sl7.src.rpm" version="2.4.6"><filename>mod_ssl-2.4.6-95.sl7.x86_64.rpm</filename><sum type="sha256">c72c4a6b8d39138716cd25949b11d11f471bfc6d3b32625645963e9fe006af3f</sum></package><package arch="x86_64" name="mod_session" release="95.sl7" src="httpd-2.4.6-95.sl7.src.rpm" version="2.4.6"><filename>mod_session-2.4.6-95.sl7.x86_64.rpm</filename><sum type="sha256">e268ecec31c591436a4f3cbdd2fb223d5b4eccbf731ffc2139db088b4a461692</sum></package><package arch="x86_64" name="httpd" release="95.sl7" src="httpd-2.4.6-95.sl7.src.rpm" version="2.4.6"><filename>httpd-2.4.6-95.sl7.x86_64.rpm</filename><sum type="sha256">8ae239a2a1435334b2013a17c8d9a4f76f2063fd4b2e4800c17c5685e5474a35</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15715" id="CVE-2017-15715" title="Cve-2017-15715" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1283" id="CVE-2018-1283" title="Cve-2018-1283" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1303" id="CVE-2018-1303" title="Cve-2018-1303" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10098" id="CVE-2019-10098" title="Cve-2019-10098" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1927" id="CVE-2020-1927" title="Cve-2020-1927" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1934" id="CVE-2020-1934" title="Cve-2020-1934" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3958" id="RHSA-2020:3958-1" title="Rhsa-2020:3958-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560395" id="1560395" title="Cve-2018-1283 Httpd: Improper Handling Of Headers In Mod_Session Can Allow A Remote User To Modify Session Data For Cgi Applications" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560399" id="1560399" title="Cve-2018-1303 Httpd: Out Of Bounds Read In Mod_Cache_Socache Can Allow A Remote Attacker To Cause Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1560614" id="1560614" title="Cve-2017-15715 Httpd: &lt;Filesmatch&gt; Bypass With A Trailing Newline In The File Name" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1715981" id="1715981" title="Backport Of Sessionexpiryupdateinterval Directive" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1724879" id="1724879" title="Httpd Terminates All Ssl Connections Using An Abortive Shutdown" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1743959" id="1743959" title="Cve-2019-10098 Httpd: Mod_Rewrite Potential Open Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1820761" id="1820761" title="Cve-2020-1927 Httpd: Mod_Rewrite Configurations Vulnerable To Open Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1820772" id="1820772" title="Cve-2020-1934 Httpd: Mod_Proxy_Ftp Use Of Uninitialized Value" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3966-1</id><title>Fontforge</title><description>Security Fix(es): 
* fontforge: out-of-bounds write in SFD_GetFontMetaData function in sfd.c (CVE-2020-5395)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="fontforge-devel" release="13.el7" src="fontforge-20120731b-13.el7.src.rpm" version="20120731b"><filename>fontforge-devel-20120731b-13.el7.x86_64.rpm</filename><sum type="sha256">7b9ec8018b910197e8f886af88df0b2f554ea3dc1256fb045988d26ecf3cf335</sum></package><package arch="i686" name="fontforge" release="13.el7" src="fontforge-20120731b-13.el7.src.rpm" version="20120731b"><filename>fontforge-20120731b-13.el7.i686.rpm</filename><sum type="sha256">a14c4929fd088e999f39b9bace435ea660435f83337354d66a2e04821494ae26</sum></package><package arch="i686" name="fontforge-devel" release="13.el7" src="fontforge-20120731b-13.el7.src.rpm" version="20120731b"><filename>fontforge-devel-20120731b-13.el7.i686.rpm</filename><sum type="sha256">27aaa4c8e0346e188923b9e9d9b669f0ef842343dd8d6310cb26558f44b02c9d</sum></package><package arch="x86_64" name="fontforge" release="13.el7" src="fontforge-20120731b-13.el7.src.rpm" version="20120731b"><filename>fontforge-20120731b-13.el7.x86_64.rpm</filename><sum type="sha256">4dac7c8b6ab4a8b661524f83bb7a58b6fc7ae519682c3894f6a99e68d00d0216</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:3966" id="RHSA-2020:3966-1" title="Rhsa-2020:3966-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3970-1</id><title>Mod_Auth_Openidc</title><description>Security Fix(es): 
* mod_auth_openidc: Open redirect in logout url when using URLs with leading slashes (CVE-2019-14857) 
* mod_auth_openidc: Open redirect issue exists in URLs with slash and backslash (CVE-2019-20479)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="mod_auth_openidc" release="7.el7" src="mod_auth_openidc-1.8.8-7.el7.src.rpm" version="1.8.8"><filename>mod_auth_openidc-1.8.8-7.el7.x86_64.rpm</filename><sum type="sha256">b2dfaf03eb4ebc8d8caeb9fdc01a93c11fe2539156932b02766d5fee41165193</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14857" id="CVE-2019-14857" title="Cve-2019-14857" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20479" id="CVE-2019-20479" title="Cve-2019-20479" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3970" id="RHSA-2020:3970-1" title="Rhsa-2020:3970-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760613" id="1760613" title="Cve-2019-14857 Mod_Auth_Openidc: Open Redirect In Logout Url When Using Urls With Leading Slashes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1805102" id="1805102" title="Cve-2019-20479 Mod_Auth_Openidc: Open Redirect Issue Exists In Urls With Slash And Backslash" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3971-1</id><title>Hunspell</title><description>Security Fix(es): 
* hunspell: out-of-bounds read in SuggestMgr::leftcommonsubstring in suggestmgr.cxx (CVE-2019-16707)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="hunspell" release="16.el7" src="hunspell-1.3.2-16.el7.src.rpm" version="1.3.2"><filename>hunspell-1.3.2-16.el7.i686.rpm</filename><sum type="sha256">afc57b23bf220b4e0bdc5d47b03385ce3e462b56694d27decf794f344f7fe852</sum></package><package arch="x86_64" name="hunspell-devel" release="16.el7" src="hunspell-1.3.2-16.el7.src.rpm" version="1.3.2"><filename>hunspell-devel-1.3.2-16.el7.x86_64.rpm</filename><sum type="sha256">796a35dc7e3ca03b3989f7a1e31d15e36d0b50988167bc6a6895e8c254c36026</sum></package><package arch="x86_64" name="hunspell" release="16.el7" src="hunspell-1.3.2-16.el7.src.rpm" version="1.3.2"><filename>hunspell-1.3.2-16.el7.x86_64.rpm</filename><sum type="sha256">6ea12e07ba97623a9ed74f099804324f7aba437527c9c04fca59cea7af0fa235</sum></package><package arch="i686" name="hunspell-devel" release="16.el7" src="hunspell-1.3.2-16.el7.src.rpm" version="1.3.2"><filename>hunspell-devel-1.3.2-16.el7.i686.rpm</filename><sum type="sha256">529137a8d24c430049873f23d7e4cf1655cc9392eea9f0dc9a7e57568a0ce0fe</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16707" id="CVE-2019-16707" title="Cve-2019-16707" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3971" id="RHSA-2020:3971-1" title="Rhsa-2020:3971-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1771026" id="1771026" title="Cve-2019-16707 Hunspell: Out-Of-Bounds Read In Suggestmgr::Leftcommonsubstring In Suggestmgr.Cxx" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3972-1</id><title>Subversion</title><description>Security Fix(es): 
* subversion: remotely triggerable DoS vulnerability in svnserve 'get-deleted-rev' (CVE-2018-11782)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="subversion-tools" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-tools-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">118e499f5eede7fd3942d9a36e2fd97e2a875e35ef39140befc2ce03be4b4aa0</sum></package><package arch="i686" name="subversion-perl" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-perl-1.7.14-16.el7.i686.rpm</filename><sum type="sha256">88b1c81c21147fd47988ba979e9b71c16d88a7e08a4d7ecba266ca7c87f8c19e</sum></package><package arch="i686" name="subversion-libs" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-libs-1.7.14-16.el7.i686.rpm</filename><sum type="sha256">b60bd800b686799dcfcf3446f081d0e5e965f2ccaf92bca5e1fa8e90081796ab</sum></package><package arch="x86_64" name="subversion-perl" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-perl-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">f5aeb55dca994afb3c1c8bed03eaa09ec1dd5e9980fde2aac4e725355b68fe82</sum></package><package arch="x86_64" name="subversion-kde" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-kde-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">a25ce5dcbb8ab3e39b15ca98efe3c25128f9ba3a548b0c3cebf42e90ebb306dc</sum></package><package arch="i686" name="subversion-javahl" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-javahl-1.7.14-16.el7.i686.rpm</filename><sum type="sha256">9e420241533f135082de5962bcee6e9248e4244dc1d7ae9a6c3d8b5de47fbedb</sum></package><package arch="x86_64" name="subversion-python" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-python-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">1692e14c1dcbce4ca904c18de551b779e2b8296bc1d0c2ea37007f77e792715f</sum></package><package arch="i686" name="subversion-devel" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-devel-1.7.14-16.el7.i686.rpm</filename><sum type="sha256">9af90c245daa07dcd2f23d63eee1f759e9bdbf90064987861c53ac32171261a5</sum></package><package arch="i686" name="subversion-ruby" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-ruby-1.7.14-16.el7.i686.rpm</filename><sum type="sha256">a9b5a8aa8f74e57105df14e52f258227b83e67c3fa1f2c6732bc4cfa5eb23a2b</sum></package><package arch="x86_64" name="subversion-javahl" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-javahl-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">9ad2551310778946957642458a9e7ace2119e53e6266ab9def612fc49c15daa1</sum></package><package arch="x86_64" name="subversion-devel" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-devel-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">ecda44c19b4f383da58b33d7e4fbf4e96c9bb90a2cefde29ec76b83d3d12c142</sum></package><package arch="x86_64" name="subversion-gnome" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-gnome-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">6e4b59df7286843cc7fd87ca04f8d2c7bbc8da3be6d59ea6c9947ac6d17aa7ef</sum></package><package arch="i686" name="subversion-gnome" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-gnome-1.7.14-16.el7.i686.rpm</filename><sum type="sha256">98ce8a27404b1f7097e12536e49cb623f92930957ec02659f5495e581cdea09b</sum></package><package arch="x86_64" name="subversion" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">dc9fa0f11f228fc248be9473998b8736cf3b3f20fe7e04f7a88c34dbee345785</sum></package><package arch="x86_64" name="mod_dav_svn" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>mod_dav_svn-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">475fd383a654fb50705e508b5feaa727f2a2761063bb6715d6296bbdbe8386f3</sum></package><package arch="x86_64" name="subversion-libs" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-libs-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">010444981277e7d62cc5053a15c43c1f1e79daef3eb85cc36bb0275db8722abf</sum></package><package arch="i686" name="subversion-kde" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-kde-1.7.14-16.el7.i686.rpm</filename><sum type="sha256">c0dca587c707bef32984b23bcf2fc8ab3b03014223ee41bfe1b519a58be72c37</sum></package><package arch="x86_64" name="subversion-ruby" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-ruby-1.7.14-16.el7.x86_64.rpm</filename><sum type="sha256">83022b57260bb140ced33314bd05d9276e317c082e214de22c833d4aafbef476</sum></package><package arch="i686" name="subversion" release="16.el7" src="subversion-1.7.14-16.el7.src.rpm" version="1.7.14"><filename>subversion-1.7.14-16.el7.i686.rpm</filename><sum type="sha256">9de49ccc1bde5e1743a1b5798adafa97d28a8edb10271d816049f4d7467aee60</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11782" id="CVE-2018-11782" title="Cve-2018-11782" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3972" id="RHSA-2020:3972-1" title="Rhsa-2020:3972-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1733088" id="1733088" title="Cve-2018-11782 Subversion: Remotely Triggerable Dos Vulnerability In Svnserve 'Get-Deleted-Rev'" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3973-1</id><title>Spamassassin</title><description>Security Fix(es): 
* spamassassin: crafted email message can lead to DoS (CVE-2019-12420)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="spamassassin" release="6.el7" src="spamassassin-3.4.0-6.el7.src.rpm" version="3.4.0"><filename>spamassassin-3.4.0-6.el7.x86_64.rpm</filename><sum type="sha256">7c97448ab50cb66a231bd9eca82c0ca7abd651266984b18985ccc0ca877d4bb5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12420" id="CVE-2019-12420" title="Cve-2019-12420" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3973" id="RHSA-2020:3973-1" title="Rhsa-2020:3973-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1784984" id="1784984" title="Cve-2019-12420 Spamassassin: Crafted Email Message Can Lead To Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3977-1</id><title>Evince And Poppler</title><description>Security Fix(es): 
* poppler: divide-by-zero in function SplashOutputDev::tilingPatternFill in SplashOutputDev.cc (CVE-2019-14494)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="poppler-utils" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-utils-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">5162d9ba3e48d7a413e808bc06676a7edd04bd51a1c8718ea002afdcc9c5c798</sum></package><package arch="i686" name="poppler-qt" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-qt-0.26.5-43.el7.i686.rpm</filename><sum type="sha256">a8c17f651e4689f51fafcdb24b6ceb6a6667de0ebd2a94a0218f7b41369f8a59</sum></package><package arch="i686" name="evince-libs" release="10.el7" src="evince-3.28.2-10.el7.src.rpm" version="3.28.2"><filename>evince-libs-3.28.2-10.el7.i686.rpm</filename><sum type="sha256">0a7e2afa167ac64174373e2176bd9a5b793164fe600eb087b0d9c135321c0958</sum></package><package arch="x86_64" name="evince-devel" release="10.el7" src="evince-3.28.2-10.el7.src.rpm" version="3.28.2"><filename>evince-devel-3.28.2-10.el7.x86_64.rpm</filename><sum type="sha256">440bf76a88b9de54ff33055b838d90ef127bb6f7150c2fed7f779c00671f5c02</sum></package><package arch="x86_64" name="poppler-qt" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-qt-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">f225514c1b098616e6a2e9fcdfe23dd3c46b3660c74c275f15416b80e0536065</sum></package><package arch="i686" name="poppler" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-0.26.5-43.el7.i686.rpm</filename><sum type="sha256">c1507b53f3555f5e0a26321678c2ecf72b064ff523d4676ebb7d4e6fb207adbe</sum></package><package arch="x86_64" name="evince" release="10.el7" src="evince-3.28.2-10.el7.src.rpm" version="3.28.2"><filename>evince-3.28.2-10.el7.x86_64.rpm</filename><sum type="sha256">fa555a23db3376d0c808697903ae356d4e7ebb92c7c80cef1a3c6b0149f885b5</sum></package><package arch="i686" name="poppler-devel" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-devel-0.26.5-43.el7.i686.rpm</filename><sum type="sha256">884787b7f46a499bbbbe89201d6005b32810ef2823634b16b0a87917af768c1c</sum></package><package arch="x86_64" name="poppler" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">cc82fdda6fbfb96c3bc7db238c8f3b6cff6a2c2b2af63d9797cf692e506fac70</sum></package><package arch="x86_64" name="evince-nautilus" release="10.el7" src="evince-3.28.2-10.el7.src.rpm" version="3.28.2"><filename>evince-nautilus-3.28.2-10.el7.x86_64.rpm</filename><sum type="sha256">2e33b3d8b8615beb10e1b3be97f8e8aed5e025cdae69650c97d718adee365fe1</sum></package><package arch="i686" name="poppler-glib" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-glib-0.26.5-43.el7.i686.rpm</filename><sum type="sha256">f9ec3cb0a1ccac2b2bf58a1a355fd3e3bce1edbe4b29debc4b63669b9d8b62cf</sum></package><package arch="x86_64" name="poppler-cpp" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">0b13cd58e466f810a4082a1122d708791267c13ec395b5fcf8583998618b0409</sum></package><package arch="x86_64" name="poppler-demos" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-demos-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">1c42f9eb888f94c4ffacc590c35919688fb5252dd826f1b50b12f1c9f3d3aec5</sum></package><package arch="x86_64" name="poppler-cpp-devel" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-devel-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">f08181c4683469e1625abf561ba0bee55295adaf152c5e70d92542b186505178</sum></package><package arch="i686" name="poppler-qt-devel" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-qt-devel-0.26.5-43.el7.i686.rpm</filename><sum type="sha256">21ec1a1e55d461ee50d50e3be096779910d1012137fa812ab5a77c1d3ef58a09</sum></package><package arch="x86_64" name="poppler-devel" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-devel-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">998e1ecc3582be17d9ffc2ecf64cdbbcfe709fe98be4d7a09e2cff573a8cf5d5</sum></package><package arch="x86_64" name="poppler-glib-devel" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-glib-devel-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">3e7748820b14fa03f68d8be7b2a762c8f6ee1416eecb7cb605d5b7d568942616</sum></package><package arch="i686" name="poppler-glib-devel" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-glib-devel-0.26.5-43.el7.i686.rpm</filename><sum type="sha256">a0e5e60efa02d2706115fbac1f6059cb2c1a29f212b3395edea5c07b14b03600</sum></package><package arch="x86_64" name="poppler-qt-devel" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-qt-devel-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">eb7cdd7ade46da10de65b24fb861a3eb5a7ba70710abb3f21a3e323bd77b92f5</sum></package><package arch="x86_64" name="evince-dvi" release="10.el7" src="evince-3.28.2-10.el7.src.rpm" version="3.28.2"><filename>evince-dvi-3.28.2-10.el7.x86_64.rpm</filename><sum type="sha256">e4ca88fe129792db68f53c68842f5d3d9a55ec1b0d09855ca5903dc12a943f3e</sum></package><package arch="x86_64" name="evince-browser-plugin" release="10.el7" src="evince-3.28.2-10.el7.src.rpm" version="3.28.2"><filename>evince-browser-plugin-3.28.2-10.el7.x86_64.rpm</filename><sum type="sha256">a2cf943feb5433df74daccf975da5ed1a10066171bef5002af436de390a47ed1</sum></package><package arch="i686" name="poppler-cpp-devel" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-devel-0.26.5-43.el7.i686.rpm</filename><sum type="sha256">98d43dff4629260d31e859406a3d58fc1bf6b1c0a8b0783228ac35dc7e6fa6d5</sum></package><package arch="x86_64" name="poppler-glib" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-glib-0.26.5-43.el7.x86_64.rpm</filename><sum type="sha256">6bbefede8c6f9015b890a521f75b2023fcca8f7813ee42d67bab970b92b33d9a</sum></package><package arch="i686" name="evince-devel" release="10.el7" src="evince-3.28.2-10.el7.src.rpm" version="3.28.2"><filename>evince-devel-3.28.2-10.el7.i686.rpm</filename><sum type="sha256">3345138d4c12ed09b94b094fb918e0b55a52f3f1b0333e4e49133ae37c267b03</sum></package><package arch="i686" name="poppler-cpp" release="43.el7" src="poppler-0.26.5-43.el7.src.rpm" version="0.26.5"><filename>poppler-cpp-0.26.5-43.el7.i686.rpm</filename><sum type="sha256">c95bce5df205c729b17580903b5d571758835e9862b07837d7f8ca67d468731e</sum></package><package arch="x86_64" name="evince-libs" release="10.el7" src="evince-3.28.2-10.el7.src.rpm" version="3.28.2"><filename>evince-libs-3.28.2-10.el7.x86_64.rpm</filename><sum type="sha256">2b645c23c0cf4ce5eb5629605682782940d1a7834f2c5e74d337f8476b4d9dbc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14494" id="CVE-2019-14494" title="Cve-2019-14494" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3977" id="RHSA-2020:3977-1" title="Rhsa-2020:3977-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1610436" id="1610436" title="Gtk-Criticals When Scrolling In Thumbnails Bar In Large File" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1797453" id="1797453" title="Cve-2019-14494 Poppler: Divide-By-Zero In Function Splashoutputdev::Tilingpatternfill In Splashoutputdev.Cc" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3978-1</id><title>Glib2 And Ibus</title><description>Security Fix(es): 
* glib2: file_copy_fallback in gio/gfile.c in GNOME GLib does not properly restrict file permissions while a copy operation is in progress (CVE-2019-12450) 
* ibus: missing authorization allows local attacker to access the input bus of another user (CVE-2019-14822)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="glib2" release="7.el7" src="glib2-2.56.1-7.el7.src.rpm" version="2.56.1"><filename>glib2-2.56.1-7.el7.i686.rpm</filename><sum type="sha256">dba2e320e5d55a1ad320f43b87818ebfb57707a36f883864412a3d912f209b60</sum></package><package arch="i686" name="ibus-devel" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-devel-1.5.17-11.el7.i686.rpm</filename><sum type="sha256">812dcaedfae5eb783659c22b0d53a4b126e48d453893be400e2fdc8e2c7d86f1</sum></package><package arch="noarch" name="ibus-devel-docs" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-devel-docs-1.5.17-11.el7.noarch.rpm</filename><sum type="sha256">7b6aa8682348126008cfe3d621c457cca8f6cf8ecfbb6ee0137c150d2944f8e3</sum></package><package arch="x86_64" name="ibus-gtk3" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-gtk3-1.5.17-11.el7.x86_64.rpm</filename><sum type="sha256">41f5c91bc15c18f3c58641ebe933f2fb3b513160e03fd114177282b66fe567bf</sum></package><package arch="x86_64" name="glib2" release="7.el7" src="glib2-2.56.1-7.el7.src.rpm" version="2.56.1"><filename>glib2-2.56.1-7.el7.x86_64.rpm</filename><sum type="sha256">0ff883bb12db31cdc019be14bc63bd925868869886903f8c1cafd5dbd0403a40</sum></package><package arch="x86_64" name="ibus-devel" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-devel-1.5.17-11.el7.x86_64.rpm</filename><sum type="sha256">45e9cf8924dc993d1ba8a39959bc987667bfb0f382a7555a27cf65e60cca809b</sum></package><package arch="x86_64" name="ibus" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-1.5.17-11.el7.x86_64.rpm</filename><sum type="sha256">20015550f6cb008cf8669db337f38c6ada4491d8e9f62aa3cac989e61a0b3a5a</sum></package><package arch="i686" name="ibus-gtk3" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-gtk3-1.5.17-11.el7.i686.rpm</filename><sum type="sha256">695bf7fe48bbcecd3729cfb89e33479d474b6eacb99b2a54e6fed35e1cf7a51c</sum></package><package arch="x86_64" name="glib2-tests" release="7.el7" src="glib2-2.56.1-7.el7.src.rpm" version="2.56.1"><filename>glib2-tests-2.56.1-7.el7.x86_64.rpm</filename><sum type="sha256">a459c1af581430dec38b93d052b964b787c6ceda9ce5dad4a5c34b5a4fd7b16c</sum></package><package arch="x86_64" name="ibus-libs" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-libs-1.5.17-11.el7.x86_64.rpm</filename><sum type="sha256">38de27d5c3a5ed14e693230bb049fa34f2d6b680a37fba8174bc49c12fee0dee</sum></package><package arch="x86_64" name="glib2-static" release="7.el7" src="glib2-2.56.1-7.el7.src.rpm" version="2.56.1"><filename>glib2-static-2.56.1-7.el7.x86_64.rpm</filename><sum type="sha256">0468728a64c29056f6b1aec2bccf23bc0bb28b13f3e5994eb5559b20c631b38d</sum></package><package arch="i686" name="ibus-libs" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-libs-1.5.17-11.el7.i686.rpm</filename><sum type="sha256">20cad8d3bd4754b4af69075d3390e97fa46d7eba49b981cfbc2a16382a80ab8c</sum></package><package arch="i686" name="glib2-static" release="7.el7" src="glib2-2.56.1-7.el7.src.rpm" version="2.56.1"><filename>glib2-static-2.56.1-7.el7.i686.rpm</filename><sum type="sha256">a79b0ccbc423cfe1916d291feb7637fb7452295bbb0dfc4332075a701531cc7f</sum></package><package arch="i686" name="ibus-gtk2" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-gtk2-1.5.17-11.el7.i686.rpm</filename><sum type="sha256">e6dd9f1a17f11a3606114286bacfc7739649dd7e5244968f57f00f22c953b13a</sum></package><package arch="noarch" name="glib2-doc" release="7.el7" src="glib2-2.56.1-7.el7.src.rpm" version="2.56.1"><filename>glib2-doc-2.56.1-7.el7.noarch.rpm</filename><sum type="sha256">b5b8fcfe054e7296605c3716bd48db1d25ecfcb2fe709a40a2d2fd7a1e009e99</sum></package><package arch="i686" name="glib2-devel" release="7.el7" src="glib2-2.56.1-7.el7.src.rpm" version="2.56.1"><filename>glib2-devel-2.56.1-7.el7.i686.rpm</filename><sum type="sha256">4515cefd9767d0724da9ff92efe8ea4d611fd999428a85d14f586a344e2823ac</sum></package><package arch="noarch" name="ibus-setup" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-setup-1.5.17-11.el7.noarch.rpm</filename><sum type="sha256">37dd4e489a8144e9001f16eddec4a3b4f239902e2405405f0399b1f886cae9f2</sum></package><package arch="x86_64" name="glib2-fam" release="7.el7" src="glib2-2.56.1-7.el7.src.rpm" version="2.56.1"><filename>glib2-fam-2.56.1-7.el7.x86_64.rpm</filename><sum type="sha256">979b9d7fc459b432b0a9dbc3439b3e23ec0420784ac5ac11a810fd650ef61c59</sum></package><package arch="noarch" name="ibus-pygtk2" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-pygtk2-1.5.17-11.el7.noarch.rpm</filename><sum type="sha256">ab7a658c8deb5defb98a43fce38cae69bf3d82a183273ad0e0ab2ee448e43e4d</sum></package><package arch="x86_64" name="ibus-gtk2" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-gtk2-1.5.17-11.el7.x86_64.rpm</filename><sum type="sha256">ad6517fb5ddccc13e3330e7f71d482c3cf70be067a2bb94d0707c12288a6e9ee</sum></package><package arch="x86_64" name="glib2-devel" release="7.el7" src="glib2-2.56.1-7.el7.src.rpm" version="2.56.1"><filename>glib2-devel-2.56.1-7.el7.x86_64.rpm</filename><sum type="sha256">39675b88fa1d10df44a36f4101aa8a02d85ecca4c9e8e9ead12dc14dc7696127</sum></package><package arch="i686" name="ibus" release="11.el7" src="ibus-1.5.17-11.el7.src.rpm" version="1.5.17"><filename>ibus-1.5.17-11.el7.i686.rpm</filename><sum type="sha256">1d8930b8c8f78f873d600a6db0d545b567af6da483630e6932cdf5daaa8528a3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12450" id="CVE-2019-12450" title="Cve-2019-12450" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14822" id="CVE-2019-14822" title="Cve-2019-14822" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3978" id="RHSA-2020:3978-1" title="Rhsa-2020:3978-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1717958" id="1717958" title="Cve-2019-14822 Ibus: Missing Authorization Allows Local Attacker To Access The Input Bus Of Another User" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719141" id="1719141" title="Cve-2019-12450 Glib2: File_Copy_Fallback In Gio/Gfile.C In Gnome Glib Does Not Properly Restrict File Permissions While A Copy Operation Is In Progress" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1777221" id="1777221" title="Ibus Input Methods Don'T Work In Qt5-Based Applications" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3981-1</id><title>Samba</title><description>Security Fix(es): 
* samba: Crash after failed character conversion at log level 3 or above (CVE-2019-14907)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="samba-common-libs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">4433702c6f052a4ae01729333ae0306b4a0a9fc8745cc12f64f0460e3a2e07d4</sum></package><package arch="x86_64" name="samba-python-test" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-python-test-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">28b0a289b685cfecb68be9243ec02e94677c4bcfe6e27d2c2e31f2c5a3f4ade7</sum></package><package arch="i686" name="libwbclient" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">da98ab4422063585f85848f30fd290ae964bdb431fca151f47b1087d7a2a8083</sum></package><package arch="i686" name="samba-test-libs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">d515625d0f8c09eca2cbfad9d2fe34085d260ffa5529e44a766ee10d37b3d374</sum></package><package arch="x86_64" name="samba" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">2d0f9329836d6501a33d207858a79dba6c9bb51c2cebec698cced5b7a8665329</sum></package><package arch="x86_64" name="samba-client-libs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">27ea67987195d1416452eba0caa1059c7d4f679f5708aee0e822be2d2b8e464b</sum></package><package arch="i686" name="libwbclient-devel" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">cac6d1848308ec6e87b108f86954d24f117d5f9b67e35b399725cadd16c2746d</sum></package><package arch="x86_64" name="samba-devel" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">2a5fe36b5e561d9a3933e52afc3c5313f410a91799e5e782dc88f0c61777bbcf</sum></package><package arch="x86_64" name="samba-libs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">755f03864afca4db04eb988657f9a59c9b13e797f4bd1e828145b40a90f67649</sum></package><package arch="x86_64" name="samba-python" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">2531e6c7b21b0847d74fe616b02ad83047b6d4a19853687bf3fedb7c4ae9b7f2</sum></package><package arch="x86_64" name="samba-common-libs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">394731b92d6a154d4b35575c8cb3e1ec5af3766b2dfe187c5b68336ea0760403</sum></package><package arch="x86_64" name="samba-test-libs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">9b3c4550839b8993121aaddb28673d70922426420c4f7882f5438cdc278504e3</sum></package><package arch="x86_64" name="libwbclient" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">77934186de7c38d772ad4dad60a9118a7e312029b7d4745dddf51edef7e8304e</sum></package><package arch="x86_64" name="samba-winbind" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-winbind-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">d10108b8d29238429076cb308300d86143b050275725a90c75e691821fe6d61f</sum></package><package arch="x86_64" name="ctdb-tests" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>ctdb-tests-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">76667b5388a6e6d18f1cd220537952b9072e46ca84af15ffefa2f6c34222198e</sum></package><package arch="x86_64" name="samba-dc-libs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-dc-libs-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">4d78134794aa567ff154ed2cd401e57dbb43ef5a96b594a866078b5c33c7e5d2</sum></package><package arch="i686" name="samba-libs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">9187e1b0d2c719896e3c670ef35c4bea2620564afc04f06b0be2f4117f43979c</sum></package><package arch="noarch" name="samba-common" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-common-4.10.16-5.el7.noarch.rpm</filename><sum type="sha256">0bb6a7568e891375b42e986ddfb2cd3787b195493f6f0472625e23dfb4955547</sum></package><package arch="i686" name="libsmbclient-devel" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">e608f00a87f8efa20d4ebc5c97215c826d5c0285225b6275e70e5aa174c7d3d7</sum></package><package arch="x86_64" name="samba-common-tools" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-common-tools-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">fda2273d80424a0add92b6556aaa18126dcfc4c862895da5d7270363c4ed3508</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-winbind-krb5-locator-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">49437a5b961425beb47e7ddcb95eb1d288e0886860dbee4c9e7f1f6c99c1af2c</sum></package><package arch="x86_64" name="libsmbclient" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">316ffb4dadc05783a92dbf777eb9499c65f2aae8b091f180042d6d6908586e1f</sum></package><package arch="x86_64" name="libwbclient-devel" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">c4401295f9bb51233356788c096d7968feb8ba4534ded907333131bcc8829d75</sum></package><package arch="x86_64" name="samba-winbind-clients" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-winbind-clients-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">e75a6bc5aa24e0d8fc5c80c4ffb6f2e67e4e96e7f07df02f3f2ebca35d1b6430</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-vfs-glusterfs-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">ea4b5610a8d66487502c65043cbc2a7836d40263913e72291190b3539717c189</sum></package><package arch="i686" name="samba-python" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">8f11ef77cd00e75ed47dd73d6bb19576e67b818c522d07efbb5fc8fa2253583b</sum></package><package arch="i686" name="samba-devel" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">700ae8bf484c06b74d108510e2a82a32e90a0de557f8d94ea666b4eee6e67723</sum></package><package arch="i686" name="samba-winbind-modules" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">27a8c897c14b2e00d268fb5703740c69c62c9dc432c0396268263ac65bf273db</sum></package><package arch="noarch" name="samba-pidl" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-pidl-4.10.16-5.el7.noarch.rpm</filename><sum type="sha256">5a79235d44f7c7c04080d3bf7115a934667640dbc373f7d51c355304d455263f</sum></package><package arch="x86_64" name="ctdb" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>ctdb-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">da610c0aed36bca99b74785ef1b508b6478783e9b5efed71d4091e158f0f4e08</sum></package><package arch="x86_64" name="samba-client" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-client-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">64fe5f9f2b705c3f9af0515f1f23b948cfd585fc22f9f1eec4d4dc6afb25bdf4</sum></package><package arch="x86_64" name="libsmbclient-devel" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">6ebf1d08b95fd3d6418d3e6c08ad864bcfca13a752788137372b60c4097747a1</sum></package><package arch="x86_64" name="samba-test" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-test-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">8d935b4bad0b99403e1513c347030460ca8502789c64ec540209a6ccc762a857</sum></package><package arch="i686" name="samba-client-libs" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">549d6cb0c8c952851323e8b9af03bd8ef0eb7838bda43f0d31b9a9391a34e44c</sum></package><package arch="x86_64" name="samba-winbind-modules" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">10a914e3a55da8ccd70a14ef850e825b07f4afd8ee8df5afc16c28ac81964b2b</sum></package><package arch="x86_64" name="samba-dc" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-dc-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">427ba84be0d94ba9ecdee57d4427880f0a99bcc12b60e3af8b079de0229b97cf</sum></package><package arch="i686" name="libsmbclient" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-5.el7.i686.rpm</filename><sum type="sha256">09736a08fbf93986ac6f3e134ce18c0cd85f936c93ad64c8739f58791a337655</sum></package><package arch="x86_64" name="samba-krb5-printing" release="5.el7" src="samba-4.10.16-5.el7.src.rpm" version="4.10.16"><filename>samba-krb5-printing-4.10.16-5.el7.x86_64.rpm</filename><sum type="sha256">abc9b834724eaf486d251e83f7c794f6061a25d98223568c80f43b34825eaba2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14907" id="CVE-2019-14907" title="Cve-2019-14907" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3981" id="RHSA-2020:3981-1" title="Rhsa-2020:3981-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1737888" id="1737888" title="Libwbclient Alternatives Manual Setting Lost" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1776333" id="1776333" title="Cli Tools Printing &quot;Unable To Initialize Messaging Context&quot; Running As Non Root" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1785121" id="1785121" title="Rebase Samba To The The Latest 4.10.X Maintenance Release" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791207" id="1791207" title="Cve-2019-14907 Samba: Crash After Failed Character Conversion At Log Level 3 Or Above" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791823" id="1791823" title="Wbinfo -K Doesn'T Work For Users Of Trusted Domains/Forests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1801496" id="1801496" title="Missing Directories In Ctdb Package" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1813017" id="1813017" title="Can'T Get 'Log Events Generated From Smbclient'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1828354" id="1828354" title="After Adding &quot;Additional Dns Hostname&quot; To Smb.Conf It Does Not Generate /Etc/Krb5.Keytab With The Proper Spn." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1828924" id="1828924" title="Fix 'Require_Membership_Of' Documentation In Pam_Winbind Manpages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1831986" id="1831986" title="Unprivileged User Should Be Able To Read-Only To Gencache.Tdb Instead Of Permission Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1836427" id="1836427" title="Net Ads Join Use Of Netbios+Realm Breaks Gssapi Authentication" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3984-1</id><title>Freeradius</title><description>Security Fix(es): 
* freeradius: privilege escalation due to insecure logrotate configuration (CVE-2019-10143) 
* freeradius: eap-pwd: Information leak due to aborting when needing more than 10 iterations (CVE-2019-13456) 
* freeradius: eap-pwd: DoS issues due to multithreaded BN_CTX access (CVE-2019-17185)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="freeradius-utils" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-utils-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">7feb6de238043e6a856a4acd13d187da88ddcc7daf10c7edf6fdf56d3f772801</sum></package><package arch="i686" name="freeradius-devel" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-devel-3.0.13-15.el7.i686.rpm</filename><sum type="sha256">7f9fdea8d5855592486268c8928b6e86fd429c1ff032fe7ca7ec7bf331764d99</sum></package><package arch="x86_64" name="freeradius-krb5" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-krb5-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">36e5b67458d1eb68da1cf45283b6ee493d07c02d17e325850fd91422b7fa5df6</sum></package><package arch="x86_64" name="freeradius-mysql" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-mysql-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">e1d08544abe854a451e745b5dff2d021dc8e13d4c63779359a2c5683d723d185</sum></package><package arch="x86_64" name="freeradius-sqlite" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-sqlite-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">97ab8cff5c543c2eb68fa0d3026c3855c41a1544f4c3f5d1a97236ad42ea3063</sum></package><package arch="x86_64" name="freeradius-doc" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-doc-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">cc604a6ba3277d8d609250a753ba807a3bc957261def0a8ac69d8ceadf003233</sum></package><package arch="x86_64" name="freeradius-devel" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-devel-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">d3f5c2720d685b00d53fbc6d856688947a97acf0bd2303dd28af9a4ca743915f</sum></package><package arch="x86_64" name="freeradius-ldap" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-ldap-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">241fa7606c84c8c850441e373ca5d420ba8c8a41cec600cb22b8189e3b29e9e2</sum></package><package arch="x86_64" name="freeradius-postgresql" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-postgresql-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">2d35bc7bd5d9dd205085a5660dac86558ffabe9b27e5dc73ddcf4c5d09a068e2</sum></package><package arch="x86_64" name="freeradius-python" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-python-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">9f531af4b5d5a6c0fd6b862c87c9e70b644a7e88982c198d22f0f734b2d67e90</sum></package><package arch="x86_64" name="freeradius-unixODBC" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-unixODBC-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">86213d9fbd06e0cb48446face4377f73a241ab26ab752c0eb0e4f1dead64c501</sum></package><package arch="x86_64" name="freeradius" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">ccb6b87a403cc6d513fde29a3a5e6b2581551fddca847ce28ed70c8f475f4e21</sum></package><package arch="x86_64" name="freeradius-perl" release="15.el7" src="freeradius-3.0.13-15.el7.src.rpm" version="3.0.13"><filename>freeradius-perl-3.0.13-15.el7.x86_64.rpm</filename><sum type="sha256">1ebb1fc819a326b63e0c7c84362ca01be3ba1de6917770d5d4d3b603b861d939</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10143" id="CVE-2019-10143" title="Cve-2019-10143" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13456" id="CVE-2019-13456" title="Cve-2019-13456" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17185" id="CVE-2019-17185" title="Cve-2019-17185" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3984" id="RHSA-2020:3984-1" title="Rhsa-2020:3984-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1592741" id="1592741" title="Freeradius Paircompare With Attribute References And Expansions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1630684" id="1630684" title="Correct Receiving Of Multiple Radius Packets Through Radsec By Freeradius" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1677435" id="1677435" title="Freeradius Logs Cleartext Pap Passwords On Failure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1705340" id="1705340" title="Cve-2019-10143 Freeradius: Privilege Escalation Due To Insecure Logrotate Configuration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1737663" id="1737663" title="Cve-2019-13456 Freeradius: Eap-Pwd: Information Leak Due To Aborting When Needing More Than 10 Iterations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1816680" id="1816680" title="Cve-2019-17185 Freeradius: Eap-Pwd: Dos Issues Due To Multithreaded Bn_Ctx Access" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:3996-1</id><title>Libxml2</title><description>Security Fix(es): 
* libxml2: memory leak in xmlParseBalancedChunkMemoryRecover in parser.c (CVE-2019-19956) 
* libxml2: memory leak in xmlSchemaPreRun in xmlschemas.c (CVE-2019-20388) 
* libxml2: infinite loop in xmlStringLenDecodeEntities in some end-of-file situations (CVE-2020-7595)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libxml2-devel" release="6.el7.5" src="libxml2-2.9.1-6.el7.5.src.rpm" version="2.9.1"><filename>libxml2-devel-2.9.1-6.el7.5.x86_64.rpm</filename><sum type="sha256">dbd4aa5cee7ef698a5a3e1668fe4a585f4ae31d42e63ea585f4c75b11978f93c</sum></package><package arch="i686" name="libxml2" release="6.el7.5" src="libxml2-2.9.1-6.el7.5.src.rpm" version="2.9.1"><filename>libxml2-2.9.1-6.el7.5.i686.rpm</filename><sum type="sha256">4ee258fe6435d7b424f6f81240b50508424eee0c11e160d80bd5c470f4e45447</sum></package><package arch="i686" name="libxml2-devel" release="6.el7.5" src="libxml2-2.9.1-6.el7.5.src.rpm" version="2.9.1"><filename>libxml2-devel-2.9.1-6.el7.5.i686.rpm</filename><sum type="sha256">68c1d8263bbd70e213a086a81c0773024a80a6d62ff489ec90711af32e953d5c</sum></package><package arch="x86_64" name="libxml2-static" release="6.el7.5" src="libxml2-2.9.1-6.el7.5.src.rpm" version="2.9.1"><filename>libxml2-static-2.9.1-6.el7.5.x86_64.rpm</filename><sum type="sha256">ae33ed58034989dbd2a87fb25d809eaf1cfcbbc2dbd19ad12874d4ccde897279</sum></package><package arch="x86_64" name="libxml2-python" release="6.el7.5" src="libxml2-2.9.1-6.el7.5.src.rpm" version="2.9.1"><filename>libxml2-python-2.9.1-6.el7.5.x86_64.rpm</filename><sum type="sha256">3b7c67f100e199f2efbeb212e280843a651365b6b0f3b474bfbcf08ac5838cc6</sum></package><package arch="x86_64" name="libxml2" release="6.el7.5" src="libxml2-2.9.1-6.el7.5.src.rpm" version="2.9.1"><filename>libxml2-2.9.1-6.el7.5.x86_64.rpm</filename><sum type="sha256">6419297e1d1a20ae43bff5d8f1dfaa1d30d53c0204a64ca3a74a748e4cdea048</sum></package><package arch="i686" name="libxml2-static" release="6.el7.5" src="libxml2-2.9.1-6.el7.5.src.rpm" version="2.9.1"><filename>libxml2-static-2.9.1-6.el7.5.i686.rpm</filename><sum type="sha256">4744bc51e5511cfc541b88fbb5e944b1739235a38dcc568fe434f91836b35254</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19956" id="CVE-2019-19956" title="Cve-2019-19956" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20388" id="CVE-2019-20388" title="Cve-2019-20388" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7595" id="CVE-2020-7595" title="Cve-2020-7595" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:3996" id="RHSA-2020:3996-1" title="Rhsa-2020:3996-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788856" id="1788856" title="Cve-2019-19956 Libxml2: Memory Leak In Xmlparsebalancedchunkmemoryrecover In Parser.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1799734" id="1799734" title="Cve-2019-20388 Libxml2: Memory Leak In Xmlschemaprerun In Xmlschemas.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1799786" id="1799786" title="Cve-2020-7595 Libxml2: Infinite Loop In Xmlstringlendecodeentities In Some End-Of-File Situations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1812145" id="1812145" title="Xsd Validation Fails On Xsd:Any" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4000-1</id><title>Libvirt</title><description>Security Fix(es): 
* libvirt: Potential DoS by holding a monitor job while querying QEMU guest-agent (CVE-2019-20485) 
* libvirt: Potential denial of service via active pool without target path (CVE-2020-10703)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libvirt-docs" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-docs-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">b75211ad700f417723012281893e8d8bd9c1b4bca51c6eddbd5122dbaa70d7af</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-disk" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-disk-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">496b33c1674c7ae7250cf1896790b186852808bfb5ce0b5cb0ebd6502db4d2ad</sum></package><package arch="x86_64" name="libvirt-daemon-driver-interface" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-interface-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">eb4f8a8f50f1f87916e682635898d022659327f8e0bc753a1f682db73724e04d</sum></package><package arch="x86_64" name="libvirt" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">4342f4ce8801b71d719cb361a768ef40b011b82bc55713242a8f5f98381a9412</sum></package><package arch="x86_64" name="libvirt-daemon-config-nwfilter" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-nwfilter-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">a1ab324cbba9b45adab889d9bc0da6adc0cb3dac91829340eeaca9f68efae820</sum></package><package arch="i686" name="libvirt-client" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-36.el7.i686.rpm</filename><sum type="sha256">b46fd5042892e80519b7c053ceddce9a86285fa457dbef04a488faf7f3d581c4</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-iscsi" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-iscsi-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">10fc3288e9a96eacf3f4116723e2be911e3765435d73b5e56857bb485027b4d2</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-rbd" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-rbd-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">1b5411200b747f1620b6cab3063b7777811e634c0aa7df00a3a52b0e98bd7786</sum></package><package arch="x86_64" name="libvirt-daemon-driver-network" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-network-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">cf6db16e8ffb5da193690a51de76299f497b352a69a111598d08d817e186f6b8</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-lock-sanlock-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">df3f5f92f589c68eabdf536a9095a236e1e7ff95cd8086ae6517fb38312d75b5</sum></package><package arch="x86_64" name="libvirt-bash-completion" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-bash-completion-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">81e67fa91a548e0c1a774884121f9d59f70b38694aa8ad2c00693437eb102c36</sum></package><package arch="x86_64" name="libvirt-libs" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">d92cf06a7b04a889cb9be5df7b18bae2e37a213b974063de5aa00e0212f10755</sum></package><package arch="x86_64" name="libvirt-daemon" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">b82da992e57525d2255417023bf2ba09cac822aa28461efe2ceb3f170b165bd4</sum></package><package arch="x86_64" name="libvirt-daemon-lxc" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-lxc-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">1255e9ff441baa64e74254dab8954eb79ceace3f6e2999c4a08b8996afa69d52</sum></package><package arch="x86_64" name="libvirt-daemon-driver-lxc" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-lxc-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">619d7b207f4b55ef16b0f64822d35693c75f360b0ddbd10b89f4dfa9261e4fb1</sum></package><package arch="x86_64" name="libvirt-nss" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">edbda8b07b56058e5ff680499db324dc4858a4e18e6bbd5ff92a085f743a9cb2</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-scsi" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-scsi-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">fabd0fd7b11570e88a0651b0ba7c04e719fc67670dcbf0c9e87c81483ceec4f6</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-core" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-core-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">f724365cea637756505ba19938ac48245a4ee35ddda05a5996659ebc254b3906</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-logical" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-logical-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">ebf986dc9d961bfaecc99b37ac73f25afdce9daed4d6e60ee8400a0169fb083b</sum></package><package arch="x86_64" name="libvirt-devel" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">bc04447756d3ce6c7bcbf9c0db4e09f5121bf85d7ab746fca00136fa1c3e75d0</sum></package><package arch="x86_64" name="libvirt-daemon-driver-secret" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-secret-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">05ea88240cc245c611a7be42e4247d4f181368e11b1abbe8289d3e02d69bec86</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nodedev" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nodedev-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">0aefc155c8423513f987338b7bfd66ab6e9280c70245c9bc5700943567c5311b</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-mpath" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-mpath-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">cb6833f1004de879a3ad8ceb3596ab1f70b78685958eeefd071af805d9823528</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-gluster" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-gluster-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">1aaef4e813e2102b8ff4734389c3548a1a23ebd6b9ff972379c00dc6272d3121</sum></package><package arch="i686" name="libvirt-devel" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-36.el7.i686.rpm</filename><sum type="sha256">57b2ba8114fe9f847896c89d0a3562a9fe21b6c01f6854326e6f621fe609fa9f</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">4a6fde25b076d001a9ae766ecac2c04dd73d44b5ba039d9685c5669c6bf4e3a8</sum></package><package arch="x86_64" name="libvirt-login-shell" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-login-shell-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">622d332a0ca7e642e1c368f483b2b44b3dcfca419547d115b9981ddeba6a3034</sum></package><package arch="x86_64" name="libvirt-daemon-config-network" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-network-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">b16fb2a5b53721064432a56b0723b4a575418b557008673f5847ad9513e6147a</sum></package><package arch="x86_64" name="libvirt-admin" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-admin-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">86c39d819469ad10d482b6c5c7c4c9cd12fd067c0685607a5079889da6a4dcde</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nwfilter" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nwfilter-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">ebfaef3eb423b6fd65bc0451c87251349a9c5c155a2a005753f9392dc58d4527</sum></package><package arch="i686" name="libvirt-nss" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-36.el7.i686.rpm</filename><sum type="sha256">a53f754c6285352146827f07575ec836229172d7798e6a8625bcf351dfd41346</sum></package><package arch="i686" name="libvirt-libs" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-36.el7.i686.rpm</filename><sum type="sha256">173d7168ddccdf15adb81421561edafc9420d14d80e8ff1e134c96505def39ea</sum></package><package arch="x86_64" name="libvirt-daemon-driver-qemu" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-qemu-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">64e0243d6afed485d0dbf416f1d194a39b0e603faad5d17226d1c36502274483</sum></package><package arch="x86_64" name="libvirt-daemon-kvm" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-daemon-kvm-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">d02123c8e6fd6b554fe1d1302665ea5db756df3c45e92ee732506473e04c350c</sum></package><package arch="x86_64" name="libvirt-client" release="36.el7" src="libvirt-4.5.0-36.el7.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-36.el7.x86_64.rpm</filename><sum type="sha256">0c2ace1e8529336b50bd710718ffed9d99f3f29f550b979d1a9459cbaaa7a076</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20485" id="CVE-2019-20485" title="Cve-2019-20485" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10703" id="CVE-2020-10703" title="Cve-2020-10703" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4000" id="RHSA-2020:4000-1" title="Rhsa-2020:4000-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1809740" id="1809740" title="Cve-2019-20485 Libvirt: Potential Dos By Holding A Monitor Job While Querying Qemu Guest-Agent" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1815269" id="1815269" title="Migration Failing Due To &quot;Internal Error: Missing Essential Config Entry 'Ide0:0.Filename'&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1815572" id="1815572" title="Vm Live Migration Fails: The Cpu Is Incompatible With Host Cpu: Host Cpu Does Not Provide Required Fea-Tures: Virt-Ssbd" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1816650" id="1816650" title="Cve-2020-10703 Libvirt: Potential Denial Of Service Via Active Pool Without Target Path" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1823976" id="1823976" title="Libdevmapper Fails With &quot;Device %S Not Found&quot; When Calling Dm_Task_Set_Name()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4001-1</id><title>Bluez</title><description>Security Fix(es): 
* bluez: Improper access control in subsystem could result in privilege escalation and DoS (CVE-2020-0556)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="bluez" release="7.el7" src="bluez-5.44-7.el7.src.rpm" version="5.44"><filename>bluez-5.44-7.el7.x86_64.rpm</filename><sum type="sha256">2a7c532d13084cce124cb6ca75c9bfab50395636149fe3faffbac839edd8d126</sum></package><package arch="i686" name="bluez-libs" release="7.el7" src="bluez-5.44-7.el7.src.rpm" version="5.44"><filename>bluez-libs-5.44-7.el7.i686.rpm</filename><sum type="sha256">3406c53e60fb9f5dbf082ff4d9c0ffdfa71dd89b9cae3f261acf7d75454bf46f</sum></package><package arch="x86_64" name="bluez-libs-devel" release="7.el7" src="bluez-5.44-7.el7.src.rpm" version="5.44"><filename>bluez-libs-devel-5.44-7.el7.x86_64.rpm</filename><sum type="sha256">5d132f663f3e29b196ff3ea530085cddd445277a12db52ec2ecf37cbdadc2323</sum></package><package arch="x86_64" name="bluez-cups" release="7.el7" src="bluez-5.44-7.el7.src.rpm" version="5.44"><filename>bluez-cups-5.44-7.el7.x86_64.rpm</filename><sum type="sha256">003193f244334d2b54bb844572e00673a3bd5c044690b9faa773ea02a1910e70</sum></package><package arch="x86_64" name="bluez-libs" release="7.el7" src="bluez-5.44-7.el7.src.rpm" version="5.44"><filename>bluez-libs-5.44-7.el7.x86_64.rpm</filename><sum type="sha256">d8c30dad8d8ae6b79e21029a8fd77046b07ed9778d53fc3a37779105b72abd23</sum></package><package arch="i686" name="bluez-libs-devel" release="7.el7" src="bluez-5.44-7.el7.src.rpm" version="5.44"><filename>bluez-libs-devel-5.44-7.el7.i686.rpm</filename><sum type="sha256">e5f47dc7d3a2f07c9caf704265d08e9f97c4f726f6d37a911f84af63e16ba245</sum></package><package arch="x86_64" name="bluez-hid2hci" release="7.el7" src="bluez-5.44-7.el7.src.rpm" version="5.44"><filename>bluez-hid2hci-5.44-7.el7.x86_64.rpm</filename><sum type="sha256">b038da1fc353e81a1f64eecd80292e975ee1b92b81b131dd6c2b702440ad77fc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0556" id="CVE-2020-0556" title="Cve-2020-0556" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4001" id="RHSA-2020:4001-1" title="Rhsa-2020:4001-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1814293" id="1814293" title="Cve-2020-0556 Bluez: Improper Access Control In Subsystem Could Result In Privilege Escalation And Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4003-1</id><title>Networkmanager</title><description>Security Fix(es): 
* NetworkManager: user configuration not honoured leaving the connection unauthenticated via insecure defaults (CVE-2020-10754)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="NetworkManager-adsl" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-adsl-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">d8edc78e849570ddf8483a19e266d9ed2d49bd641169a61347a6295806547d35</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-glib-devel" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-glib-devel-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">89fc41bf847a9f71ed1b3ca0d307466ebc9c842b4d5335f06ae129ffd9af6c22</sum></package><package arch="i686" epoch="1" name="NetworkManager-libnm-devel" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-libnm-devel-1.18.8-1.el7.i686.rpm</filename><sum type="sha256">f76699181515b748d9ce1e6a2e51cad62386648cd42d38b99db74f6101ee784e</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-bluetooth" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-bluetooth-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">4b39ed1225bc8c51480e223d07d307b0d660b3a1348c9e1886d4551229489650</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-ppp" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-ppp-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">e04b4f1b6c062f4c1064c8152741163efc7a639d5ac97defe01a61c225cef30d</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-libnm-devel" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-libnm-devel-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">5d448ac10548d0cf49cfb5d3afd192d8a291290a22ae6bfebfd9af103c8b1ec0</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-team" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-team-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">d09b654320de212d3356a7f307c774205a444aac01063db4d51b05756153a5b2</sum></package><package arch="i686" epoch="1" name="NetworkManager-glib-devel" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-glib-devel-1.18.8-1.el7.i686.rpm</filename><sum type="sha256">838864e66ccb3d6748ed29a152edc3622d8df575bb758969844cbb9201b69c71</sum></package><package arch="i686" epoch="1" name="NetworkManager-glib" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-glib-1.18.8-1.el7.i686.rpm</filename><sum type="sha256">a70a5fe1268909f14a63b9b0b274d7afb27d3e3226b599559a43e3e6c96bb4bf</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-ovs" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-ovs-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">e3d25fd1863714afe048ae512a5f3d491855dcf576dddcd866c25b8dd5e948ad</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-tui" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-tui-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">4701a45225590b1ad266b502a1859c45778bbfb37ed1aabc3232e69932efda0c</sum></package><package arch="x86_64" epoch="1" name="NetworkManager" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">b4ea7cbe44f9840b2cb3c99d1b5755b66ebd88b00a5d564bea3fdf7687cce507</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-glib" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-glib-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">ba74547a0dc95c5498de4f462614d8577c146af750168d73c9ff9312279682e1</sum></package><package arch="noarch" epoch="1" name="NetworkManager-config-server" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-config-server-1.18.8-1.el7.noarch.rpm</filename><sum type="sha256">48f0bc72be92efa7e80d6413d11bf39dfd7eec528472645aa2b97218b8da2ddd</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-libnm" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-libnm-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">9ff9cf68ba518cd85ee7a94539e2d28009e54054bbaee86e70a8e98430730f55</sum></package><package arch="noarch" epoch="1" name="NetworkManager-dispatcher-routing-rules" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-dispatcher-routing-rules-1.18.8-1.el7.noarch.rpm</filename><sum type="sha256">3b73fb6eb579b58910848316231944d75274b0dbc65baae675b1078905a75146</sum></package><package arch="i686" epoch="1" name="NetworkManager-libnm" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-libnm-1.18.8-1.el7.i686.rpm</filename><sum type="sha256">a62d19861728a2bbba0edfee065cc23d686ec219d7c8c24b67d86de1621adda0</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-wwan" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-wwan-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">48b053252567a61b402d37447475ccdd941547bf6609c59834a7a1b9646bd49a</sum></package><package arch="x86_64" epoch="1" name="NetworkManager-wifi" release="1.el7" src="NetworkManager-1.18.8-1.el7.src.rpm" version="1.18.8"><filename>NetworkManager-wifi-1.18.8-1.el7.x86_64.rpm</filename><sum type="sha256">4f9a5bb6f3580553d4058916e93753fcda252e7d2e47188b5067053ddd46d5ad</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10754" id="CVE-2020-10754" title="Cve-2020-10754" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4003" id="RHSA-2020:4003-1" title="Rhsa-2020:4003-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1706646" id="1706646" title="The Network Target Is Reached Before Ipv6 Adresses Are Assigned" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1737774" id="1737774" title="[Abrt] [Faf] Networkmanager: Raise(): /Usr/Sbin/Networkmanager Killed By 6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1758550" id="1758550" title="Conditional Statements From Dhclient.Conf Not Merged" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1765566" id="1765566" title="Bringing Up One Slave Of Team0 Also Brings Up Team1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1785039" id="1785039" title="Nmcli Command To Add Ipv4.Gateway Does Not Work When Defroute=No And Throws No Error" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1797915" id="1797915" title="[Abrt] [Faf] G_Ascii_Strtoll() For &quot;10&quot; Failed With Errno=11 (Resource Temporarily Unavailable)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1832170" id="1832170" title="Cannot Bring Up Ip6Gre Tunnel Connection Via Networkmanager" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1841041" id="1841041" title="Cve-2020-10754 Networkmanager: User Configuration Not Honoured Leaving The Connection Unauthenticated Via Insecure Defaults" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4004-1</id><title>Tomcat</title><description>Security Fix(es): 
* tomcat: multiple requests with invalid payload length in a WebSocket frame could lead to DoS (CVE-2020-13935) 
* tomcat: session fixation when using FORM authentication (CVE-2019-17563)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcat-webapps" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-webapps-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">87b3d642e61504e29155413564fec0b52d5f57b09c4db068f9a05e959791dc23</sum></package><package arch="noarch" name="tomcat-jsvc" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-jsvc-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">51964b41102672ad9252b5e716670cd72fc295b594df3ce2ba17bee8837dde96</sum></package><package arch="noarch" name="tomcat" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">d8b7d8cecb0cdb9287b65b2266c0e626574b30948b4524c1c0774dbd8b725cbf</sum></package><package arch="noarch" name="tomcat-docs-webapp" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-docs-webapp-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">a692cdb3a57907beef6d8360fea12e0c84d8312c78ec7e5573d4359a0efaa409</sum></package><package arch="noarch" name="tomcat-javadoc" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-javadoc-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">eed676b99abdbd7b5b4ed025138ebdb94f103951a7eabb7be5d23fcf916426fb</sum></package><package arch="noarch" name="tomcat-admin-webapps" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-admin-webapps-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">b81c410e21ecb8ebed71b452ff00698b3982880affcce2fe6c1bdbe42b658ef2</sum></package><package arch="noarch" name="tomcat-jsp-2.2-api" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-jsp-2.2-api-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">fc0d17a16d3d5df3fb42abf3c476dbaf7fb20aa0e20927da2e86afb328c0e628</sum></package><package arch="noarch" name="tomcat-lib" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-lib-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">3b5ab3dcdf94abfb690066f4414f22d0cba6854807f38a44b0338f577c10ed8b</sum></package><package arch="noarch" name="tomcat-servlet-3.0-api" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-servlet-3.0-api-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">25a9e1fa67fde116785c962eb8a75cf960a3c8c7b09eed7fac582a45397ad602</sum></package><package arch="noarch" name="tomcat-el-2.2-api" release="15.el7" src="tomcat-7.0.76-15.el7.src.rpm" version="7.0.76"><filename>tomcat-el-2.2-api-7.0.76-15.el7.noarch.rpm</filename><sum type="sha256">2d42ec82abd43740e643aae0207161557c27d966214830b0f646cccf4c351e4b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17563" id="CVE-2019-17563" title="Cve-2019-17563" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13935" id="CVE-2020-13935" title="Cve-2020-13935" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4004" id="RHSA-2020:4004-1" title="Rhsa-2020:4004-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1523112" id="1523112" title="Tomcat Systemd Does Not Cope With - In Service Names." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1629162" id="1629162" title="Tomcat-Dbcp.Jar Is Missing From Tomcat Package" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1785711" id="1785711" title="Cve-2019-17563 Tomcat: Session Fixation When Using Form Authentication" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1795645" id="1795645" title="Connection Leak With Statementcache, Slowqueryreport Or Statementdecoratorinterceptor" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1822453" id="1822453" title="Tomcat Parses A Request Having An Absolute Uri Path Incorrectly And Returns 404 Not Found After Bz#1455483" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1831127" id="1831127" title="Failed To Install Ipa-Server" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1857024" id="1857024" title="Cve-2020-13935 Tomcat: Multiple Requests With Invalid Payload Length In A Websocket Frame Could Lead To Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4005-1</id><title>Libxslt</title><description>Security Fix(es): 
* libxslt: xsltCheckRead and xsltCheckWrite routines security bypass by crafted URL (CVE-2019-11068) 
* libxslt: use after free in xsltCopyText in transform.c could lead to information disclosure (CVE-2019-18197)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libxslt-python" release="6.el7" src="libxslt-1.1.28-6.el7.src.rpm" version="1.1.28"><filename>libxslt-python-1.1.28-6.el7.x86_64.rpm</filename><sum type="sha256">1b508ab0ac76456f425eebc50523e8af8f3799a0248bbda6d3f9a5e66102f9e8</sum></package><package arch="x86_64" name="libxslt-devel" release="6.el7" src="libxslt-1.1.28-6.el7.src.rpm" version="1.1.28"><filename>libxslt-devel-1.1.28-6.el7.x86_64.rpm</filename><sum type="sha256">26426b49f1bf78eefb3c7661f6a3b8ccabf421518246e57c4a0bbc79ac2ff70e</sum></package><package arch="i686" name="libxslt" release="6.el7" src="libxslt-1.1.28-6.el7.src.rpm" version="1.1.28"><filename>libxslt-1.1.28-6.el7.i686.rpm</filename><sum type="sha256">bacab1d3c17759b7844f6aa146f9fd71ed0a261dd7ab1842f660dfe9a5c160a9</sum></package><package arch="i686" name="libxslt-devel" release="6.el7" src="libxslt-1.1.28-6.el7.src.rpm" version="1.1.28"><filename>libxslt-devel-1.1.28-6.el7.i686.rpm</filename><sum type="sha256">c33a3d94a13b4f48be72e87c0e1cae7ee5fef991741568d1fe9dfd3f191aba66</sum></package><package arch="x86_64" name="libxslt" release="6.el7" src="libxslt-1.1.28-6.el7.src.rpm" version="1.1.28"><filename>libxslt-1.1.28-6.el7.x86_64.rpm</filename><sum type="sha256">2cb886c9aec87e6ce4f173be84e20243e3118e9d078d9f13a2e75f69746c3d37</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11068" id="CVE-2019-11068" title="Cve-2019-11068" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4005" id="RHSA-2020:4005-1" title="Rhsa-2020:4005-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1709697" id="1709697" title="Cve-2019-11068 Libxslt: Xsltcheckread And Xsltcheckwrite Routines Security Bypass By Crafted Url" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1770768" id="1770768" title="Cve-2019-18197 Libxslt: Use After Free In Xsltcopytext In Transform.C Could Lead To Information Disclosure" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4007-1</id><title>Systemd</title><description>Security Fix(es): 
* systemd: memory leak in button_open() in login/logind-button.c when udev events are received (CVE-2019-20386)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="systemd-devel" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-devel-219-78.el7.x86_64.rpm</filename><sum type="sha256">9e4a239151efd3c119dc72374bbcf566492374dd93db1a5af3ad4d91b015305a</sum></package><package arch="x86_64" name="libgudev1-devel" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>libgudev1-devel-219-78.el7.x86_64.rpm</filename><sum type="sha256">86cd6d60f6ba9d20d5a3bc76e1a44c2f870ed91756ee13046686061ae716123a</sum></package><package arch="x86_64" name="libgudev1" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>libgudev1-219-78.el7.x86_64.rpm</filename><sum type="sha256">1634fa6c32fef933648f5e283b236bbd9b98e8d54c81d804dec589c8cf92afbb</sum></package><package arch="i686" name="systemd-resolved" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-resolved-219-78.el7.i686.rpm</filename><sum type="sha256">07f83bd725e762217e0a6feaa74d8281b88f4fec6b86de401bbc13a40f82554d</sum></package><package arch="i686" name="systemd-devel" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-devel-219-78.el7.i686.rpm</filename><sum type="sha256">29308d4b3f7d40d0e03caf50269889c3b92646b1c8c7cfbabf5f30b8cc05059b</sum></package><package arch="x86_64" name="systemd-python" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-python-219-78.el7.x86_64.rpm</filename><sum type="sha256">92761bffa75a36304ecc817ce59ffbf6689d078de7445ba5880e023f6ec0eb82</sum></package><package arch="i686" name="libgudev1" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>libgudev1-219-78.el7.i686.rpm</filename><sum type="sha256">69adfbad6505778b4334a38e21414471b3d0f94635f27c359943158dc4672df2</sum></package><package arch="x86_64" name="systemd-journal-gateway" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-journal-gateway-219-78.el7.x86_64.rpm</filename><sum type="sha256">1185a7c7fd7c2849afe7db2bddd6830eba1cc4fab57cfd019d99ef20d0c9be7e</sum></package><package arch="i686" name="systemd-libs" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-libs-219-78.el7.i686.rpm</filename><sum type="sha256">2259559df5e82f98bf8479428bd2322a64f5daf38e8eaf06456b3f44a52c684c</sum></package><package arch="x86_64" name="systemd" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-219-78.el7.x86_64.rpm</filename><sum type="sha256">822e1c3f53cb29006bd164865d072215423d8b50dca9c62147ed26a76a9c30b0</sum></package><package arch="x86_64" name="systemd-networkd" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-networkd-219-78.el7.x86_64.rpm</filename><sum type="sha256">d6e8711e69c48b45fa944c006c4cb2be87314b42a389e4a2dd2b4610f42a42c1</sum></package><package arch="x86_64" name="systemd-resolved" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-resolved-219-78.el7.x86_64.rpm</filename><sum type="sha256">a6af5a300b787c0b0e20defce0ff772e2f4c1b1872aa34557c7096dbb436a4ee</sum></package><package arch="x86_64" name="systemd-sysv" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-sysv-219-78.el7.x86_64.rpm</filename><sum type="sha256">a33a30d06e5107808e2ea9d21e6b3a7315d68327c4d5557b45ebddab6c0552e9</sum></package><package arch="x86_64" name="systemd-libs" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>systemd-libs-219-78.el7.x86_64.rpm</filename><sum type="sha256">fe5ac8fb977e4d3d7f8a80bb4dacdd1792bb6af5e6344de73326cc46af45d2ad</sum></package><package arch="i686" name="libgudev1-devel" release="78.el7" src="systemd-219-78.el7.src.rpm" version="219"><filename>libgudev1-devel-219-78.el7.i686.rpm</filename><sum type="sha256">bba990c649a32557f5e0e2b704752c33c6f8669613635fdc2317238808e0f19e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20386" id="CVE-2019-20386" title="Cve-2019-20386" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4007" id="RHSA-2020:4007-1" title="Rhsa-2020:4007-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1244691" id="1244691" title="Systemd Journal Remote Service Does Not Work When Multiple Virtual Machines Send Logs Via Journal Upload Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1679934" id="1679934" title="Spurious &quot;Failed To Propagate Agent Release Message&quot; Messages On Shutdown" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1689344" id="1689344" title="Please Add Kptr_Restrict=1 To /Usr/Lib/Sysctl.Conf/50-Default.Conf" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1693374" id="1693374" title="Using Quotas On Iscsi-Hosed Filesystems Causes Systemd &quot;Ordering Cycle&quot; Resulting In Random Services Not Starting On Boot" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1757704" id="1757704" title="Restarting Systemd-Journald To Load New Configurations Causes Other Daemons Stop Working" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1766477" id="1766477" title="Systemd Does Not Attempt To Kill Child Processes If Execstoppost Is Set" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1769923" id="1769923" title="Timer: Don'T Use Persistent File Timestamps From The Future" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1769928" id="1769928" title="Systemd Leaks Memory (In Dbus) And Spends Its Time Sending Propertieschanged Notifications" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1770158" id="1770158" title="Sd-Bus: Bump Message Queue Size" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775291" id="1775291" title="Services With Restart=Always Fail To Restart When It Has A Dependent Service With Stopwhenunneeded=True" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1793979" id="1793979" title="Cve-2019-20386 Systemd: Memory Leak In Button_Open() In Login/Logind-Button.C When Udev Events Are Received" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1804757" id="1804757" title="Mount Units End Up In Erroneous State (Not-Found Active Mounted) After Daemon Reload" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1809053" id="1809053" title="[Azure][Rhel7.6]Inconsistent Creation Of Symlinks In /Dev/Disk/By-Path In Azure Vms" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1812889" id="1812889" title="Lazy Setup Of Inotify_Fd In Sd-Journal May Cause Clients To Leak File Descriptors" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1814028" id="1814028" title="Veritas Netbackup Engineering Would Like An Official Rhel Method To Create /Etc/Udev/Rules.D/60-Persistent-Tape.Rules" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817576" id="1817576" title="Backport Systemd Collectmode For Runc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1828953" id="1828953" title="Systemd Segfaults Reloading While Serializing A Service Executing A Execstartpost Command [Rhel-7.7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1829754" id="1829754" title="Systemctl Try-Restart Command Hangs Indefinitely While Being Executed During A Yum Update" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1832816" id="1832816" title="[Azure][Rhel-7.9]Error In `/Usr/Lib/Systemd/Systemd-Udevd': Double Free Or Corruption" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4011-1</id><title>E2Fsprogs</title><description>Security Fix(es): 
* e2fsprogs: Crafted ext4 partition leads to out-of-bounds write (CVE-2019-5094) 
* e2fsprogs: Out-of-bounds write in e2fsck/rehash.c (CVE-2019-5188)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="e2fsprogs-static" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>e2fsprogs-static-1.42.9-19.el7.x86_64.rpm</filename><sum type="sha256">b13acf7be6e3ee574a91e839289b6abbd0d3e894897a67112e536a4d4ca5ed7e</sum></package><package arch="i686" name="libcom_err-devel" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>libcom_err-devel-1.42.9-19.el7.i686.rpm</filename><sum type="sha256">29c3c0d7965321619ca46b50c43c315967302ff0e4dfa216436d97320a007a21</sum></package><package arch="i686" name="libss" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>libss-1.42.9-19.el7.i686.rpm</filename><sum type="sha256">3448fac475a69c773ccc6478561f3ace4bc763c52ba1440ab47fe5ce0ec189c6</sum></package><package arch="x86_64" name="e2fsprogs" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>e2fsprogs-1.42.9-19.el7.x86_64.rpm</filename><sum type="sha256">35e5efa68a1b9e729d60d7300338bb55c88fab016e42eaabc942645b43dcfb23</sum></package><package arch="x86_64" name="libcom_err" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>libcom_err-1.42.9-19.el7.x86_64.rpm</filename><sum type="sha256">643d68b3898aae12e14d804f7ef7ca3e1951bdabe998357d75b5188ef4967642</sum></package><package arch="x86_64" name="libss-devel" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>libss-devel-1.42.9-19.el7.x86_64.rpm</filename><sum type="sha256">adbf8a194351a859e578994d45cb4f40e5d876a0642659f1c6c4246ba0c972da</sum></package><package arch="x86_64" name="libcom_err-devel" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>libcom_err-devel-1.42.9-19.el7.x86_64.rpm</filename><sum type="sha256">6da95fb7be290714e949ddffb21d3049f34307af9272b4579d9fbbe8fdf121c7</sum></package><package arch="i686" name="e2fsprogs-libs" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>e2fsprogs-libs-1.42.9-19.el7.i686.rpm</filename><sum type="sha256">c79875b56cbaaa387b7f382ffa802bef9d1aa507b32d1925dd846958720b996b</sum></package><package arch="x86_64" name="libss" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>libss-1.42.9-19.el7.x86_64.rpm</filename><sum type="sha256">0571c9cc209e9dc2c5cbb4d69ea350677fa0b7d5758bac2c4b3c693778651880</sum></package><package arch="i686" name="libss-devel" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>libss-devel-1.42.9-19.el7.i686.rpm</filename><sum type="sha256">e10b1c8d2a7d13341874177e947aead0e9aa44de33dfff748b09d8b0b63def16</sum></package><package arch="x86_64" name="e2fsprogs-libs" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>e2fsprogs-libs-1.42.9-19.el7.x86_64.rpm</filename><sum type="sha256">cfde5380a1da5cfa2bdee6e4c2f20a2c3ed421d33e9b1201aafc446239e52ce8</sum></package><package arch="i686" name="e2fsprogs-devel" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>e2fsprogs-devel-1.42.9-19.el7.i686.rpm</filename><sum type="sha256">3c9deb8a85a2b74c3d327a22a43fae6a2ddc9f6b7297803095fc8c1bc878759d</sum></package><package arch="i686" name="libcom_err" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>libcom_err-1.42.9-19.el7.i686.rpm</filename><sum type="sha256">4d0990dd22e09ae4e90d0d284a716440f9c20f9fe81e6c6fde627b7770252ad3</sum></package><package arch="x86_64" name="e2fsprogs-devel" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>e2fsprogs-devel-1.42.9-19.el7.x86_64.rpm</filename><sum type="sha256">b989e45b8d91ded5ca37d0b2e45b2276b3de9443b5cb4cb4ded10449654f7753</sum></package><package arch="i686" name="e2fsprogs-static" release="19.el7" src="e2fsprogs-1.42.9-19.el7.src.rpm" version="1.42.9"><filename>e2fsprogs-static-1.42.9-19.el7.i686.rpm</filename><sum type="sha256">c019fa9a7fcc4264ed62c4664e5d613f74696bcccf11227dabc2027590697bd4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5094" id="CVE-2019-5094" title="Cve-2019-5094" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5188" id="CVE-2019-5188" title="Cve-2019-5188" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4011" id="RHSA-2020:4011-1" title="Rhsa-2020:4011-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1711880" id="1711880" title="[Rhel-7.7] E2Image Against Meta_Bg Enabled Ext4 Image Creates Corrupts Metadata On Some Arches" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1720130" id="1720130" title="[Rhel-7.7 E2Fsprogs] Fix Typo In Ext4(5) Man Page" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1768555" id="1768555" title="Cve-2019-5094 E2Fsprogs: Crafted Ext4 Partition Leads To Out-Of-Bounds Write" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1780277" id="1780277" title="Update Mke2Fs.Conf To Provide Easy Method Of Making Rhel6-Compatible Filesystems" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790048" id="1790048" title="Cve-2019-5188 E2Fsprogs: Out-Of-Bounds Write In E2Fsck/Rehash.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4024-1</id><title>Okular</title><description>Security Fix(es): 
* okular: local binary execution via specially crafted PDF files (CVE-2020-9359)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="okular" release="9.el7" src="okular-4.10.5-9.el7.src.rpm" version="4.10.5"><filename>okular-4.10.5-9.el7.x86_64.rpm</filename><sum type="sha256">227ee627aeeb063798344088808c9a66d7dbe0cfe5a2ca556f23e5ecd5ea679b</sum></package><package arch="x86_64" name="okular-devel" release="9.el7" src="okular-4.10.5-9.el7.src.rpm" version="4.10.5"><filename>okular-devel-4.10.5-9.el7.x86_64.rpm</filename><sum type="sha256">e10dc39c17c4e3c58a6ae470a3ddebc05ef3b3d3a19cb652ff1cb519cd087776</sum></package><package arch="i686" name="okular-libs" release="9.el7" src="okular-4.10.5-9.el7.src.rpm" version="4.10.5"><filename>okular-libs-4.10.5-9.el7.i686.rpm</filename><sum type="sha256">6007b024d163f9ee217ee795d79daaa975ef722aefff755990c3ecf0f304d633</sum></package><package arch="x86_64" name="okular-part" release="9.el7" src="okular-4.10.5-9.el7.src.rpm" version="4.10.5"><filename>okular-part-4.10.5-9.el7.x86_64.rpm</filename><sum type="sha256">4108c4a129092e7b3677c768a52b1bf2b93832de180f505b9d27ab656c773173</sum></package><package arch="x86_64" name="okular-libs" release="9.el7" src="okular-4.10.5-9.el7.src.rpm" version="4.10.5"><filename>okular-libs-4.10.5-9.el7.x86_64.rpm</filename><sum type="sha256">ce739b58b2f977bb44604027eb902dc20ea3f179665e6f77915774a7bee0a9ad</sum></package><package arch="i686" name="okular-devel" release="9.el7" src="okular-4.10.5-9.el7.src.rpm" version="4.10.5"><filename>okular-devel-4.10.5-9.el7.i686.rpm</filename><sum type="sha256">e3e89569de22f6209882571e46f9db700b345c11c1e41ebc89246987b80bb9f8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9359" id="CVE-2020-9359" title="Cve-2020-9359" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4024" id="RHSA-2020:4024-1" title="Rhsa-2020:4024-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1815651" id="1815651" title="Cve-2020-9359 Okular: Local Binary Execution Via Specially Crafted Pdf Files" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4025-1</id><title>Qt5-Qtbase</title><description>Security Fix(es): 
* qt: files placed by attacker can influence the working directory and lead to malicious code execution (CVE-2020-0569) 
* qt: files placed by attacker can influence the working directory and lead to malicious code execution (CVE-2020-0570)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="qt5-qtbase-gui" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-gui-5.9.7-4.el7.x86_64.rpm</filename><sum type="sha256">abab1227dc0ff0370441bfd6278dd3be09d19e4e297a5d50eaeaa1d6bcc0f2fe</sum></package><package arch="i686" name="qt5-qtbase-static" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-static-5.9.7-4.el7.i686.rpm</filename><sum type="sha256">85982af26b66ccedeb8e13ca9df958dd07cd2c969597e65d6bf84c7f30717de6</sum></package><package arch="x86_64" name="qt5-qtbase-devel" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-devel-5.9.7-4.el7.x86_64.rpm</filename><sum type="sha256">7bae4add7fbb0e8b397aa454a9a1f1a033fd4a7988b4afe49a99698accd15a43</sum></package><package arch="x86_64" name="qt5-qtbase" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-5.9.7-4.el7.x86_64.rpm</filename><sum type="sha256">fa797e1be38c73b8781cad9156f3b3ce128ccbfd5383824e180594a36da783bc</sum></package><package arch="noarch" name="qt5-qtbase-common" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-common-5.9.7-4.el7.noarch.rpm</filename><sum type="sha256">7f1c9432f93dd8c5dde95696eb73298ec04c0544882f443d64991cb81c3a3e63</sum></package><package arch="x86_64" name="qt5-qtbase-mysql" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-mysql-5.9.7-4.el7.x86_64.rpm</filename><sum type="sha256">ddcfc60323daf117580a3fcee0db370dbb6564a2abc2b9eedae8b40b21515a0c</sum></package><package arch="i686" name="qt5-qtbase-odbc" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-odbc-5.9.7-4.el7.i686.rpm</filename><sum type="sha256">f525b0851ad58810176d72a29f72d3a20e33d5ec1963c984c60fc31111c9fcf6</sum></package><package arch="x86_64" name="qt5-qtbase-odbc" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-odbc-5.9.7-4.el7.x86_64.rpm</filename><sum type="sha256">3065f28397158af1c0fc3072e3e2b5d0a027f27ed7d3875701d83620873139bc</sum></package><package arch="x86_64" name="qt5-qtbase-examples" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-examples-5.9.7-4.el7.x86_64.rpm</filename><sum type="sha256">81c9cdfe894e4e00581b84c4858769dfe4e4ed852c1b5051a7c822a8f4f8b01a</sum></package><package arch="i686" name="qt5-qtbase-postgresql" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-postgresql-5.9.7-4.el7.i686.rpm</filename><sum type="sha256">5e2ba3a99a781f9d33a77f83a2f44ca6a40df0ad61dd32641b151108a1e880eb</sum></package><package arch="noarch" name="qt5-rpm-macros" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-rpm-macros-5.9.7-4.el7.noarch.rpm</filename><sum type="sha256">711f1c0aab7124cafb5d774346c9ae55a5de90e72315ed2d17df91193c4ca07f</sum></package><package arch="x86_64" name="qt5-qtbase-doc" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-doc-5.9.7-4.el7.x86_64.rpm</filename><sum type="sha256">a8ec25d608f268834f7132d62f591d624f927d7b0f5477977270ac880c15552f</sum></package><package arch="i686" name="qt5-qtbase-mysql" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-mysql-5.9.7-4.el7.i686.rpm</filename><sum type="sha256">4c585e99c4fbf42622b8c8e443126da264bc61c7ec907381b0292651494a16dc</sum></package><package arch="i686" name="qt5-qtbase" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-5.9.7-4.el7.i686.rpm</filename><sum type="sha256">504912a51f798dff9d6a988f8d985b776142728f5d2d35151ab118ddacbdc159</sum></package><package arch="x86_64" name="qt5-qtbase-static" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-static-5.9.7-4.el7.x86_64.rpm</filename><sum type="sha256">c457697974f37793091902fec69e8006182da5ace574c164a1e29543226d474a</sum></package><package arch="i686" name="qt5-qtbase-devel" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-devel-5.9.7-4.el7.i686.rpm</filename><sum type="sha256">1e59d1e9cd21ea65f23b6583662395a4ef48a8b46a2c679b385e544baef3b9e6</sum></package><package arch="i686" name="qt5-qtbase-gui" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-gui-5.9.7-4.el7.i686.rpm</filename><sum type="sha256">334b59f119bbfe1554f1da9b6cf1f4eab417c714f66414a221c2754f4fc441a7</sum></package><package arch="x86_64" name="qt5-qtbase-postgresql" release="4.el7" src="qt5-qtbase-5.9.7-4.el7.src.rpm" version="5.9.7"><filename>qt5-qtbase-postgresql-5.9.7-4.el7.x86_64.rpm</filename><sum type="sha256">2bf5dead3482eabeab1d6dd021f72927c072d86c1d09e4cf65c303ac7a58d5f1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0569" id="CVE-2020-0569" title="Cve-2020-0569" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0570" id="CVE-2020-0570" title="Cve-2020-0570" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4025" id="RHSA-2020:4025-1" title="Rhsa-2020:4025-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1800600" id="1800600" title="Cve-2020-0569 Qt: Files Placed By Attacker Can Influence The Working Directory And Lead To Malicious Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1800604" id="1800604" title="Cve-2020-0570 Qt: Files Placed By Attacker Can Influence The Working Directory And Lead To Malicious Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4026-1</id><title>Mariadb</title><description>Security Fix(es): 
* mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2019) (CVE-2019-2974) 
* mysql: C API unspecified vulnerability (CPU Apr 2020) (CVE-2020-2752) 
* mysql: Server: DML unspecified vulnerability (CPU Apr 2020) (CVE-2020-2780) 
* mysql: Server: Stored Procedure unspecified vulnerability (CPU Apr 2020) (CVE-2020-2812) 
* mysql: C API: unspecified vulnerability (CPU Jan 2020) (CVE-2020-2574)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="mariadb-embedded" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-embedded-5.5.68-1.el7.i686.rpm</filename><sum type="sha256">698adde9d3d1b11478b26b49844754a907752444f4bcdbf36d7333b6124644ae</sum></package><package arch="x86_64" epoch="1" name="mariadb-devel" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-devel-5.5.68-1.el7.x86_64.rpm</filename><sum type="sha256">a851ac042508beda19cac0bdbcd6af89a6668867bc5212054ff69ccceda81051</sum></package><package arch="x86_64" epoch="1" name="mariadb-embedded" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-embedded-5.5.68-1.el7.x86_64.rpm</filename><sum type="sha256">1702cdb5c291ebdf5d6276cc6f99980fddfe6d9a80efea64eeb5b34e2adfe5ca</sum></package><package arch="x86_64" epoch="1" name="mariadb-embedded-devel" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-embedded-devel-5.5.68-1.el7.x86_64.rpm</filename><sum type="sha256">c47cc49de59ddb583c025f53f3624d1ae8355c6b57dab59969043e4c4faa3901</sum></package><package arch="i686" epoch="1" name="mariadb-devel" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-devel-5.5.68-1.el7.i686.rpm</filename><sum type="sha256">a64490c6af7b1557f50a34ade4889ec1df0b8b8d00036c99f3c3bae186af3b14</sum></package><package arch="x86_64" epoch="1" name="mariadb" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-5.5.68-1.el7.x86_64.rpm</filename><sum type="sha256">f305d3e78cbc2910e780f9298634aef9754974308eafe7130dc5f2e39c7abd27</sum></package><package arch="x86_64" epoch="1" name="mariadb-test" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-test-5.5.68-1.el7.x86_64.rpm</filename><sum type="sha256">5eacd199a619557bde3bb3fba63c742fad338e57f09525ae410fd12ac79b0cc9</sum></package><package arch="x86_64" epoch="1" name="mariadb-libs" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-libs-5.5.68-1.el7.x86_64.rpm</filename><sum type="sha256">19b4ec56288c2563d082a4af7f23c6d0a408a0b3485cd1d6b9fb1d72511d2832</sum></package><package arch="x86_64" epoch="1" name="mariadb-server" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-server-5.5.68-1.el7.x86_64.rpm</filename><sum type="sha256">c6caf93379bbb675d16f142ed22ba0720c52abbc7f7b132da92ac7e22081fe8e</sum></package><package arch="i686" epoch="1" name="mariadb-libs" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-libs-5.5.68-1.el7.i686.rpm</filename><sum type="sha256">966f5671d0876ee87e6c8e19592314c1db68a9057f130c7d79f334fcd66ed3c2</sum></package><package arch="i686" epoch="1" name="mariadb-embedded-devel" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-embedded-devel-5.5.68-1.el7.i686.rpm</filename><sum type="sha256">b537cec0f706f485eeb58e826d577af79f764d20574b8e8f0298b4ede8a317fd</sum></package><package arch="x86_64" epoch="1" name="mariadb-bench" release="1.el7" src="mariadb-5.5.68-1.el7.src.rpm" version="5.5.68"><filename>mariadb-bench-5.5.68-1.el7.x86_64.rpm</filename><sum type="sha256">9974118028d740e534857e7930076a251c21ab12415a631123b461537b067eb7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2974" id="CVE-2019-2974" title="Cve-2019-2974" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2574" id="CVE-2020-2574" title="Cve-2020-2574" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2752" id="CVE-2020-2752" title="Cve-2020-2752" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2780" id="CVE-2020-2780" title="Cve-2020-2780" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2812" id="CVE-2020-2812" title="Cve-2020-2812" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4026" id="RHSA-2020:4026-1" title="Rhsa-2020:4026-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1465481" id="1465481" title="Test Case Failure: /Coreos/Mariadb55/Testsuite - Perfschema.Func_File_Io / Aarch64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1592735" id="1592735" title="Testsuite Failure During Rebuild - Parts.Partition_Alter1_2_Innodb 'Innodb_Plugin'" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1689827" id="1689827" title="[Mariadb Client] Memory Leak Of Around 2 Kb For Every Mysql Connect()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1704296" id="1704296" title="Test Case Failure: /Coreos/Mariadb55/Testsuite - Main.Mysqldump" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1713365" id="1713365" title="Mysqldump Unit Test Fail" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1718877" id="1718877" title="Main.Innodb_Mrr_Cpk Unit Test Fails" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1764691" id="1764691" title="Cve-2019-2974 Mysql: Server: Optimizer Unspecified Vulnerability (Cpu Oct 2019)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1798587" id="1798587" title="Cve-2020-2574 Mysql: C Api Unspecified Vulnerability (Cpu Jan 2020)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1820269" id="1820269" title="[Ftbfs] Mariadb Main.Events_Bugs Fails Due To 2020-01-01 Date" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1830056" id="1830056" title="Cve-2020-2780 Mysql: Server: Dml Unspecified Vulnerability (Cpu Apr 2020)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1830059" id="1830059" title="Cve-2020-2812 Mysql: Server: Stored Procedure Unspecified Vulnerability (Cpu Apr 2020)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1834835" id="1834835" title="Tracker: Mariadb Rebase To The Latest Version (5.5.68)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835849" id="1835849" title="Cve-2020-2752 Mysql: C Api Unspecified Vulnerability (Cpu Apr 2020)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4030-1</id><title>Exiv2</title><description>Security Fix(es): 
* exiv2: out-of-bounds read in CiffDirectory::readDirectory due to lack of size check (CVE-2019-17402)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="exiv2-devel" release="3.el7_8" src="exiv2-0.27.0-3.el7_8.src.rpm" version="0.27.0"><filename>exiv2-devel-0.27.0-3.el7_8.x86_64.rpm</filename><sum type="sha256">699b7f384aea8609147679d079b0fa531e464c9fab4beda9861a1b6fd06ab980</sum></package><package arch="noarch" name="exiv2-doc" release="3.el7_8" src="exiv2-0.27.0-3.el7_8.src.rpm" version="0.27.0"><filename>exiv2-doc-0.27.0-3.el7_8.noarch.rpm</filename><sum type="sha256">9712b0545f1a74cbb8b7e53f2c2c90f6bf4e8f5b13fe14dad57c8fd90cb82ad7</sum></package><package arch="i686" name="exiv2-devel" release="3.el7_8" src="exiv2-0.27.0-3.el7_8.src.rpm" version="0.27.0"><filename>exiv2-devel-0.27.0-3.el7_8.i686.rpm</filename><sum type="sha256">aa31d9d0acf7fd5f431a3469e9cd75d7e1317328dfc274b957ff4916f8e1d82a</sum></package><package arch="x86_64" name="exiv2-libs" release="3.el7_8" src="exiv2-0.27.0-3.el7_8.src.rpm" version="0.27.0"><filename>exiv2-libs-0.27.0-3.el7_8.x86_64.rpm</filename><sum type="sha256">b4f067e21c8994450c7c4964d2b81305ed823c8bcc67f39a7fab13fdcc52283f</sum></package><package arch="i686" name="exiv2-libs" release="3.el7_8" src="exiv2-0.27.0-3.el7_8.src.rpm" version="0.27.0"><filename>exiv2-libs-0.27.0-3.el7_8.i686.rpm</filename><sum type="sha256">2f1e194e18531d71a2bed100da5671f2d21229ca4731f713862a2a7ae9316ed8</sum></package><package arch="x86_64" name="exiv2" release="3.el7_8" src="exiv2-0.27.0-3.el7_8.src.rpm" version="0.27.0"><filename>exiv2-0.27.0-3.el7_8.x86_64.rpm</filename><sum type="sha256">128fb873cb7d2ffc1a10d64715ee26891c2a7629b3dab15dd784acdef0a6a67a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17402" id="CVE-2019-17402" title="Cve-2019-17402" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4030" id="RHSA-2020:4030-1" title="Rhsa-2020:4030-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1773683" id="1773683" title="Cve-2019-17402 Exiv2: Out-Of-Bounds Read In Ciffdirectory::Readdirectory Due To Lack Of Size Check" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4031-1</id><title>Freerdp</title><description>Security Fix(es): 
* freerdp: Out of bound read in cliprdr_server_receive_capabilities (CVE-2020-11018) 
* freerdp: Out of bound read/write in usb redirection channel (CVE-2020-11039) 
* freerdp: out-of-bounds read in update_read_icon_info function (CVE-2020-11042) 
* freerdp: out-of-bounds read in autodetect_recv_bandwidth_measure_results function (CVE-2020-11047) 
* freerdp: Out-of-bounds read in ntlm_read_ChallengeMessage in winpr/libwinpr/sspi/NTLM/ntlm_message.c. (CVE-2020-13396) 
* freerdp: Out-of-bounds read in security_fips_decrypt in libfreerdp/core/security.c (CVE-2020-13397) 
* freerdp: Out of bound read in update_recv could result in a crash (CVE-2020-11019) 
* freerdp: Integer overflow in VIDEO channel (CVE-2020-11038) 
* freerdp: Out of bound access in clear_decompress_subcode_rlex (CVE-2020-11040) 
* freerdp: Unchecked read of array offset in rdpsnd_recv_wave2_pdu (CVE-2020-11041) 
* freerdp: out of bound read in rfx_process_message_tileset (CVE-2020-11043) 
* freerdp: double free in update_read_cache_bitmap_v3_order function (CVE-2020-11044) 
* freerdp: out of bounds read in update_read_bitmap_data function (CVE-2020-11045) 
* freerdp: out of bounds seek in update_read_synchronize function could lead out of bounds read (CVE-2020-11046) 
* freerdp: out-of-bounds read could result in aborting the session (CVE-2020-11048) 
* freerdp: out-of-bound read of client memory that is then passed on to the protocol parser (CVE-2020-11049) 
* freerdp: stream out-of-bounds seek in rdp_read_font_capability_set could lead to out-of-bounds read (CVE-2020-11058) 
* freerdp: out-of-bounds read in cliprdr_read_format_list function (CVE-2020-11085) 
* freerdp: out-of-bounds read in ntlm_read_ntlm_v2_client_challenge function (CVE-2020-11086) 
* freerdp: out-of-bounds read in ntlm_read_AuthenticateMessage (CVE-2020-11087) 
* freerdp: out-of-bounds read in ntlm_read_NegotiateMessage (CVE-2020-11088) 
* freerdp: out-of-bounds read in irp functions (CVE-2020-11089) 
* freerdp: out-of-bounds read in gdi.c (CVE-2020-11522) 
* freerdp: out-of-bounds read in bitmap.c (CVE-2020-11525) 
* freerdp: Stream pointer out of bounds in update_recv_secondary_order could lead out of bounds read later (CVE-2020-11526)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libwinpr" release="2.el7" src="freerdp-2.1.1-2.el7.src.rpm" version="2.1.1"><filename>libwinpr-2.1.1-2.el7.i686.rpm</filename><sum type="sha256">bed5fd94e38041d14d9606e33eb0a29666be596b107e22604ccec195d57b98ef</sum></package><package arch="x86_64" name="freerdp" release="2.el7" src="freerdp-2.1.1-2.el7.src.rpm" version="2.1.1"><filename>freerdp-2.1.1-2.el7.x86_64.rpm</filename><sum type="sha256">899f978bbb36db7396207aa5631483c9256f46dbea8aacb1ad8b6aa0ce6ad1da</sum></package><package arch="i686" name="libwinpr-devel" release="2.el7" src="freerdp-2.1.1-2.el7.src.rpm" version="2.1.1"><filename>libwinpr-devel-2.1.1-2.el7.i686.rpm</filename><sum type="sha256">8933fcd83816423744b93bedc67f18e0da393f01b50156f0b313ce31dc6def14</sum></package><package arch="x86_64" name="libwinpr" release="2.el7" src="freerdp-2.1.1-2.el7.src.rpm" version="2.1.1"><filename>libwinpr-2.1.1-2.el7.x86_64.rpm</filename><sum type="sha256">a16b61139ef5f5a409a2d34683c6e10bcfbc45c303883acc61f6230065ece19b</sum></package><package arch="x86_64" name="freerdp-libs" release="2.el7" src="freerdp-2.1.1-2.el7.src.rpm" version="2.1.1"><filename>freerdp-libs-2.1.1-2.el7.x86_64.rpm</filename><sum type="sha256">50f478d4d3649092f7c414be5db7af1464e846b8c6f3c6a6942423af7c4521ea</sum></package><package arch="i686" name="freerdp-devel" release="2.el7" src="freerdp-2.1.1-2.el7.src.rpm" version="2.1.1"><filename>freerdp-devel-2.1.1-2.el7.i686.rpm</filename><sum type="sha256">658b8f764bfcded5b3dfe9e506ec8d0ab2f272bf7c73a87fbfe97ac4eb18516b</sum></package><package arch="i686" name="freerdp-libs" release="2.el7" src="freerdp-2.1.1-2.el7.src.rpm" version="2.1.1"><filename>freerdp-libs-2.1.1-2.el7.i686.rpm</filename><sum type="sha256">070079fee97cd015d6aa2bf66249388d99c85eebfac8a252d2e62fe27b44f384</sum></package><package arch="x86_64" name="freerdp-devel" release="2.el7" src="freerdp-2.1.1-2.el7.src.rpm" version="2.1.1"><filename>freerdp-devel-2.1.1-2.el7.x86_64.rpm</filename><sum type="sha256">f0263a6d5bb65e61a7b8f6a62ab158564213b749d76bdf6197f72317b336bc48</sum></package><package arch="x86_64" name="libwinpr-devel" release="2.el7" src="freerdp-2.1.1-2.el7.src.rpm" version="2.1.1"><filename>libwinpr-devel-2.1.1-2.el7.x86_64.rpm</filename><sum type="sha256">1100ac0e91ed41264d2410ac18988a56753b53e8faeb84dfb5248342c16454ba</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11018" id="CVE-2020-11018" title="Cve-2020-11018" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11019" id="CVE-2020-11019" title="Cve-2020-11019" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11038" id="CVE-2020-11038" title="Cve-2020-11038" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11039" id="CVE-2020-11039" title="Cve-2020-11039" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11040" id="CVE-2020-11040" title="Cve-2020-11040" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11041" id="CVE-2020-11041" title="Cve-2020-11041" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11042" id="CVE-2020-11042" title="Cve-2020-11042" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11043" id="CVE-2020-11043" title="Cve-2020-11043" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11044" id="CVE-2020-11044" title="Cve-2020-11044" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11045" id="CVE-2020-11045" title="Cve-2020-11045" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11046" id="CVE-2020-11046" title="Cve-2020-11046" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11047" id="CVE-2020-11047" title="Cve-2020-11047" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11048" id="CVE-2020-11048" title="Cve-2020-11048" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11049" id="CVE-2020-11049" title="Cve-2020-11049" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11058" id="CVE-2020-11058" title="Cve-2020-11058" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11085" id="CVE-2020-11085" title="Cve-2020-11085" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11086" id="CVE-2020-11086" title="Cve-2020-11086" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11087" id="CVE-2020-11087" title="Cve-2020-11087" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11088" id="CVE-2020-11088" title="Cve-2020-11088" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11089" id="CVE-2020-11089" title="Cve-2020-11089" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11522" id="CVE-2020-11522" title="Cve-2020-11522" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11525" id="CVE-2020-11525" title="Cve-2020-11525" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11526" id="CVE-2020-11526" title="Cve-2020-11526" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13396" id="CVE-2020-13396" title="Cve-2020-13396" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13397" id="CVE-2020-13397" title="Cve-2020-13397" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4031" id="RHSA-2020:4031-1" title="Rhsa-2020:4031-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1834286" id="1834286" title="Update Freerdp To 2.1.1" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835382" id="1835382" title="Cve-2020-11042 Freerdp: Out-Of-Bounds Read In Update_Read_Icon_Info Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835391" id="1835391" title="Cve-2020-11044 Freerdp: Double Free In Update_Read_Cache_Bitmap_V3_Order Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835399" id="1835399" title="Cve-2020-11045 Freerdp: Out Of Bounds Read In Update_Read_Bitmap_Data Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835403" id="1835403" title="Cve-2020-11046 Freerdp: Out Of Bounds Seek In Update_Read_Synchronize Function Could Lead Out Of Bounds Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835762" id="1835762" title="Cve-2020-11047 Freerdp: Out-Of-Bounds Read In Autodetect_Recv_Bandwidth_Measure_Results Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835766" id="1835766" title="Cve-2020-11048 Freerdp: Out-Of-Bounds Read Could Result In Aborting The Session" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835772" id="1835772" title="Cve-2020-11049 Freerdp: Out-Of-Bound Read Of Client Memory That Is Then Passed On To The Protocol Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835779" id="1835779" title="Cve-2020-11058 Freerdp: Stream Out-Of-Bounds Seek In Rdp_Read_Font_Capability_Set Could Lead To Out-Of-Bounds Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1836223" id="1836223" title="Cve-2020-11522 Freerdp: Out-Of-Bounds Read In Gdi.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1836239" id="1836239" title="Cve-2020-11525 Freerdp: Out-Of-Bounds Read In Bitmap.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1836247" id="1836247" title="Cve-2020-11526 Freerdp: Stream Pointer Out Of Bounds In Update_Recv_Secondary_Order Could Lead Out Of Bounds Read Later" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1841189" id="1841189" title="Cve-2020-13396 Freerdp: Out-Of-Bounds Read In Ntlm_Read_Challengemessage In Winpr/Libwinpr/Sspi/Ntlm/Ntlm_Message.C." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1841196" id="1841196" title="Cve-2020-13397 Freerdp: Out-Of-Bounds Read In Security_Fips_Decrypt In Libfreerdp/Core/Security.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1844161" id="1844161" title="Cve-2020-11085 Freerdp: Out-Of-Bounds Read In Cliprdr_Read_Format_List Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1844166" id="1844166" title="Cve-2020-11086 Freerdp: Out-Of-Bounds Read In Ntlm_Read_Ntlm_V2_Client_Challenge Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1844171" id="1844171" title="Cve-2020-11087 Freerdp: Out-Of-Bounds Read In Ntlm_Read_Authenticatemessage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1844177" id="1844177" title="Cve-2020-11088 Freerdp: Out-Of-Bounds Read In Ntlm_Read_Negotiatemessage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1844184" id="1844184" title="Cve-2020-11089 Freerdp: Out-Of-Bounds Read In Irp Functions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1848008" id="1848008" title="Cve-2020-11018 Freerdp: Out Of Bound Read In Cliprdr_Server_Receive_Capabilities" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1848012" id="1848012" title="Cve-2020-11019 Freerdp: Out Of Bound Read In Update_Recv Could Result In A Crash" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1848018" id="1848018" title="Cve-2020-11038 Freerdp: Integer Overflow In Video Channel" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1848022" id="1848022" title="Cve-2020-11039 Freerdp: Out Of Bound Read/Write In Usb Redirection Channel" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1848029" id="1848029" title="Cve-2020-11040 Freerdp: Out Of Bound Access In Clear_Decompress_Subcode_Rlex" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1848034" id="1848034" title="Cve-2020-11041 Freerdp: Unchecked Read Of Array Offset In Rdpsnd_Recv_Wave2_Pdu" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1848038" id="1848038" title="Cve-2020-11043 Freerdp: Out Of Bound Read In Rfx_Process_Message_Tileset" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4032-1</id><title>Dbus</title><description>Security Fix(es): 
* dbus: DBusServer DBUS_COOKIE_SHA1 authentication bypass (CVE-2019-12749)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="dbus" release="15.el7" src="dbus-1.10.24-15.el7.src.rpm" version="1.10.24"><filename>dbus-1.10.24-15.el7.x86_64.rpm</filename><sum type="sha256">49613d23e5af1574fead789a20abd2c5a4f3ea9c12836f12ecdf4ceb307b6438</sum></package><package arch="x86_64" epoch="1" name="dbus-x11" release="15.el7" src="dbus-1.10.24-15.el7.src.rpm" version="1.10.24"><filename>dbus-x11-1.10.24-15.el7.x86_64.rpm</filename><sum type="sha256">69faa197f1a91f3de92ff8c0d67eaca2cf0067fc7205ed90f96c6ad3e2029f92</sum></package><package arch="noarch" epoch="1" name="dbus-doc" release="15.el7" src="dbus-1.10.24-15.el7.src.rpm" version="1.10.24"><filename>dbus-doc-1.10.24-15.el7.noarch.rpm</filename><sum type="sha256">0152845e126e3c84a26aaa8c36a9fd1d44978eb885ae6fc23b8c057aa86cb45c</sum></package><package arch="x86_64" epoch="1" name="dbus-libs" release="15.el7" src="dbus-1.10.24-15.el7.src.rpm" version="1.10.24"><filename>dbus-libs-1.10.24-15.el7.x86_64.rpm</filename><sum type="sha256">1af526b357ce623df3bb58d6e8a692a9d0ba31fe8461b764b0570c4fe4e18cd2</sum></package><package arch="i686" epoch="1" name="dbus-devel" release="15.el7" src="dbus-1.10.24-15.el7.src.rpm" version="1.10.24"><filename>dbus-devel-1.10.24-15.el7.i686.rpm</filename><sum type="sha256">2021654c8951ba2e8d71d9065b02f7dea21ceceece169adcb8d8333688c246ad</sum></package><package arch="x86_64" epoch="1" name="dbus-tests" release="15.el7" src="dbus-1.10.24-15.el7.src.rpm" version="1.10.24"><filename>dbus-tests-1.10.24-15.el7.x86_64.rpm</filename><sum type="sha256">e4e97d5cb1e5b020854335e04f51d1f2ee53f7bc79e90cffb42e6cc549a5131d</sum></package><package arch="i686" epoch="1" name="dbus-libs" release="15.el7" src="dbus-1.10.24-15.el7.src.rpm" version="1.10.24"><filename>dbus-libs-1.10.24-15.el7.i686.rpm</filename><sum type="sha256">b296591bca8453364ae229e583e2d8821a0d626792a2d431992a2a08dcc54cbc</sum></package><package arch="x86_64" epoch="1" name="dbus-devel" release="15.el7" src="dbus-1.10.24-15.el7.src.rpm" version="1.10.24"><filename>dbus-devel-1.10.24-15.el7.x86_64.rpm</filename><sum type="sha256">db8141daf59c2fa1e9e07c88e2727c016f087c8f594a5c789ee3c7aeb00b04b6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4032" id="RHSA-2020:4032-1" title="Rhsa-2020:4032-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719344" id="1719344" title="Dbus: Dbusserver Dbus_Cookie_Sha1 " type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4035-1</id><title>Webkitgtk4</title><description>Security Fix(es): 
* webkitgtk: Multiple security issues (CVE-2019-6237, CVE-2019-6251, CVE-2019-8506, CVE-2019-8524, CVE-2019-8535, CVE-2019-8536, CVE-2019-8544, CVE-2019-8551, CVE-2019-8558, CVE-2019-8559, CVE-2019-8563, CVE-2019-8571, CVE-2019-8583, CVE-2019-8584, CVE-2019-8586, CVE-2019-8587, CVE-2019-8594, CVE-2019-8595, CVE-2019-8596, CVE-2019-8597, CVE-2019-8601, CVE-2019-8607, CVE-2019-8608, CVE-2019-8609, CVE-2019-8610, CVE-2019-8611, CVE-2019-8615, CVE-2019-8619, CVE-2019-8622, CVE-2019-8623, CVE-2019-8625, CVE-2019-8644, CVE-2019-8649, CVE-2019-8658, CVE-2019-8666, CVE-2019-8669, CVE-2019-8671, CVE-2019-8672, CVE-2019-8673, CVE-2019-8674, CVE-2019-8676, CVE-2019-8677, CVE-2019-8678, CVE-2019-8679, CVE-2019-8680, CVE-2019-8681, CVE-2019-8683, CVE-2019-8684, CVE-2019-8686, CVE-2019-8687, CVE-2019-8688, CVE-2019-8689, CVE-2019-8690, CVE-2019-8707, CVE-2019-8710, CVE-2019-8719, CVE-2019-8720, CVE-2019-8726, CVE-2019-8733, CVE-2019-8735, CVE-2019-8743, CVE-2019-8763, CVE-2019-8764, CVE-2019-8765, CVE-2019-8766, CVE-2019-8768, CVE-2019-8769, CVE-2019-8771, CVE-2019-8782, CVE-2019-8783, CVE-2019-8808, CVE-2019-8811, CVE-2019-8812, CVE-2019-8813, CVE-2019-8814, CVE-2019-8815, CVE-2019-8816, CVE-2019-8819, CVE-2019-8820, CVE-2019-8821, CVE-2019-8822, CVE-2019-8823, CVE-2019-8835, CVE-2019-8844, CVE-2019-8846, CVE-2019-11070, CVE-2020-3862, CVE-2020-3864, CVE-2020-3865, CVE-2020-3867, CVE-2020-3868, CVE-2020-3885, CVE-2020-3894, CVE-2020-3895, CVE-2020-3897, CVE-2020-3899, CVE-2020-3900, CVE-2020-3901, CVE-2020-3902, CVE-2020-10018, CVE-2020-11793)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="webkitgtk4-jsc-devel" release="2.el7" src="webkitgtk4-2.28.2-2.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-jsc-devel-2.28.2-2.el7.x86_64.rpm</filename><sum type="sha256">aceb7a1c5cd23f70dfed22b1c73b064e692bd4724ed40dfcc6e2acfdc86991b0</sum></package><package arch="x86_64" name="webkitgtk4" release="2.el7" src="webkitgtk4-2.28.2-2.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-2.28.2-2.el7.x86_64.rpm</filename><sum type="sha256">a854513d09cd166c5d487700abc2ceb9975ab4cf584ade02a4570b890e9ca0f9</sum></package><package arch="i686" name="webkitgtk4-jsc-devel" release="2.el7" src="webkitgtk4-2.28.2-2.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-jsc-devel-2.28.2-2.el7.i686.rpm</filename><sum type="sha256">a340b60560733de3fe9cfb6a83c1bbfa27c4fce8bc30c727fde8c50343ea9a23</sum></package><package arch="i686" name="webkitgtk4-jsc" release="2.el7" src="webkitgtk4-2.28.2-2.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-jsc-2.28.2-2.el7.i686.rpm</filename><sum type="sha256">ce6685ad0c4617164c3292239310271f102d836b7fd2e13c4f6d0efc64be8951</sum></package><package arch="i686" name="webkitgtk4" release="2.el7" src="webkitgtk4-2.28.2-2.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-2.28.2-2.el7.i686.rpm</filename><sum type="sha256">6e8bedb988c417322723f3557dd9fefd208e4c5d835ddaec54518a79591008b7</sum></package><package arch="x86_64" name="webkitgtk4-jsc" release="2.el7" src="webkitgtk4-2.28.2-2.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-jsc-2.28.2-2.el7.x86_64.rpm</filename><sum type="sha256">5feddee015f19f292616832b1f0bfbb8398172ec215b24980033ae467b687363</sum></package><package arch="noarch" name="webkitgtk4-doc" release="2.el7" src="webkitgtk4-2.28.2-2.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-doc-2.28.2-2.el7.noarch.rpm</filename><sum type="sha256">a14f84c45f338b6c099ec9f886a9a891560d1b7b197b7a84df5d7af9e16c2950</sum></package><package arch="i686" name="webkitgtk4-devel" release="2.el7" src="webkitgtk4-2.28.2-2.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-devel-2.28.2-2.el7.i686.rpm</filename><sum type="sha256">7bf37530a79b1e5fc06f0ba014a3db9a3bffe8ea6f34a0cc8cc6262f7490e50d</sum></package><package arch="x86_64" name="webkitgtk4-devel" release="2.el7" src="webkitgtk4-2.28.2-2.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-devel-2.28.2-2.el7.x86_64.rpm</filename><sum type="sha256">e95de77af90a26f474731ed34fae4e2cbdd0f8288536d08dceab82c121070800</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11070" id="CVE-2019-11070" title="Cve-2019-11070" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6237" id="CVE-2019-6237" title="Cve-2019-6237" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6251" id="CVE-2019-6251" title="Cve-2019-6251" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8506" id="CVE-2019-8506" title="Cve-2019-8506" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8524" id="CVE-2019-8524" title="Cve-2019-8524" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8535" id="CVE-2019-8535" title="Cve-2019-8535" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8536" id="CVE-2019-8536" title="Cve-2019-8536" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8544" id="CVE-2019-8544" title="Cve-2019-8544" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8551" id="CVE-2019-8551" title="Cve-2019-8551" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8558" id="CVE-2019-8558" title="Cve-2019-8558" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8559" id="CVE-2019-8559" title="Cve-2019-8559" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8563" id="CVE-2019-8563" title="Cve-2019-8563" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8571" id="CVE-2019-8571" title="Cve-2019-8571" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8583" id="CVE-2019-8583" title="Cve-2019-8583" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8584" id="CVE-2019-8584" title="Cve-2019-8584" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8586" id="CVE-2019-8586" title="Cve-2019-8586" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8587" id="CVE-2019-8587" title="Cve-2019-8587" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8594" id="CVE-2019-8594" title="Cve-2019-8594" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8595" id="CVE-2019-8595" title="Cve-2019-8595" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8596" id="CVE-2019-8596" title="Cve-2019-8596" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8597" id="CVE-2019-8597" title="Cve-2019-8597" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8601" id="CVE-2019-8601" title="Cve-2019-8601" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8607" id="CVE-2019-8607" title="Cve-2019-8607" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8608" id="CVE-2019-8608" title="Cve-2019-8608" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8609" id="CVE-2019-8609" title="Cve-2019-8609" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8610" id="CVE-2019-8610" title="Cve-2019-8610" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8611" id="CVE-2019-8611" title="Cve-2019-8611" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8615" id="CVE-2019-8615" title="Cve-2019-8615" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8619" id="CVE-2019-8619" title="Cve-2019-8619" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8622" id="CVE-2019-8622" title="Cve-2019-8622" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8623" id="CVE-2019-8623" title="Cve-2019-8623" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625" id="CVE-2019-8625" title="Cve-2019-8625" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8644" id="CVE-2019-8644" title="Cve-2019-8644" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8649" id="CVE-2019-8649" title="Cve-2019-8649" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8658" id="CVE-2019-8658" title="Cve-2019-8658" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8666" id="CVE-2019-8666" title="Cve-2019-8666" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8669" id="CVE-2019-8669" title="Cve-2019-8669" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8671" id="CVE-2019-8671" title="Cve-2019-8671" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8672" id="CVE-2019-8672" title="Cve-2019-8672" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8673" id="CVE-2019-8673" title="Cve-2019-8673" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8674" id="CVE-2019-8674" title="Cve-2019-8674" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8676" id="CVE-2019-8676" title="Cve-2019-8676" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8677" id="CVE-2019-8677" title="Cve-2019-8677" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8678" id="CVE-2019-8678" title="Cve-2019-8678" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8679" id="CVE-2019-8679" title="Cve-2019-8679" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8680" id="CVE-2019-8680" title="Cve-2019-8680" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8681" id="CVE-2019-8681" title="Cve-2019-8681" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8683" id="CVE-2019-8683" title="Cve-2019-8683" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8684" id="CVE-2019-8684" title="Cve-2019-8684" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8686" id="CVE-2019-8686" title="Cve-2019-8686" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8687" id="CVE-2019-8687" title="Cve-2019-8687" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8688" id="CVE-2019-8688" title="Cve-2019-8688" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8689" id="CVE-2019-8689" title="Cve-2019-8689" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8690" id="CVE-2019-8690" title="Cve-2019-8690" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8707" id="CVE-2019-8707" title="Cve-2019-8707" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710" id="CVE-2019-8710" title="Cve-2019-8710" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8719" id="CVE-2019-8719" title="Cve-2019-8719" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720" id="CVE-2019-8720" title="Cve-2019-8720" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8726" id="CVE-2019-8726" title="Cve-2019-8726" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8733" id="CVE-2019-8733" title="Cve-2019-8733" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8735" id="CVE-2019-8735" title="Cve-2019-8735" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743" id="CVE-2019-8743" title="Cve-2019-8743" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8763" id="CVE-2019-8763" title="Cve-2019-8763" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764" id="CVE-2019-8764" title="Cve-2019-8764" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8765" id="CVE-2019-8765" title="Cve-2019-8765" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766" id="CVE-2019-8766" title="Cve-2019-8766" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8768" id="CVE-2019-8768" title="Cve-2019-8768" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769" id="CVE-2019-8769" title="Cve-2019-8769" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771" id="CVE-2019-8771" title="Cve-2019-8771" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782" id="CVE-2019-8782" title="Cve-2019-8782" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783" id="CVE-2019-8783" title="Cve-2019-8783" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808" id="CVE-2019-8808" title="Cve-2019-8808" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811" id="CVE-2019-8811" title="Cve-2019-8811" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8812" id="CVE-2019-8812" title="Cve-2019-8812" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813" id="CVE-2019-8813" title="Cve-2019-8813" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8814" id="CVE-2019-8814" title="Cve-2019-8814" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815" id="CVE-2019-8815" title="Cve-2019-8815" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816" id="CVE-2019-8816" title="Cve-2019-8816" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819" id="CVE-2019-8819" title="Cve-2019-8819" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820" id="CVE-2019-8820" title="Cve-2019-8820" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8821" id="CVE-2019-8821" title="Cve-2019-8821" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8822" id="CVE-2019-8822" title="Cve-2019-8822" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823" id="CVE-2019-8823" title="Cve-2019-8823" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8835" id="CVE-2019-8835" title="Cve-2019-8835" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8844" id="CVE-2019-8844" title="Cve-2019-8844" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8846" id="CVE-2019-8846" title="Cve-2019-8846" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10018" id="CVE-2020-10018" title="Cve-2020-10018" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11793" id="CVE-2020-11793" title="Cve-2020-11793" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3862" id="CVE-2020-3862" title="Cve-2020-3862" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3864" id="CVE-2020-3864" title="Cve-2020-3864" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3865" id="CVE-2020-3865" title="Cve-2020-3865" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3867" id="CVE-2020-3867" title="Cve-2020-3867" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3868" id="CVE-2020-3868" title="Cve-2020-3868" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885" id="CVE-2020-3885" title="Cve-2020-3885" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894" id="CVE-2020-3894" title="Cve-2020-3894" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895" id="CVE-2020-3895" title="Cve-2020-3895" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897" id="CVE-2020-3897" title="Cve-2020-3897" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899" id="CVE-2020-3899" title="Cve-2020-3899" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900" id="CVE-2020-3900" title="Cve-2020-3900" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901" id="CVE-2020-3901" title="Cve-2020-3901" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902" id="CVE-2020-3902" title="Cve-2020-3902" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4035" id="RHSA-2020:4035-1" title="Rhsa-2020:4035-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1667409" id="1667409" title="Cve-2019-6251 Webkitgtk: Processing Maliciously Crafted Web Content Lead To Uri Spoofing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1709289" id="1709289" title="Cve-2019-11070 Webkitgtk: Http Proxy Setting Deanonymization Information Disclosure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719199" id="1719199" title="Cve-2019-8506 Webkitgtk: Malicous Web Content Leads To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719209" id="1719209" title="Cve-2019-8524 Webkitgtk: Malicious Web Content Leads To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719210" id="1719210" title="Cve-2019-8535 Webkitgtk: Malicious Crafted Web Content Leads To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719213" id="1719213" title="Cve-2019-8536 Webkitgtk: Malicious Crafted Web Content Leads To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719224" id="1719224" title="Cve-2019-8544 Webkitgtk: Malicious Crafted Web Content Leads To Arbitrary We Content" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719231" id="1719231" title="Cve-2019-8558 Webkitgtk: Malicious Crafted Web Content Leads To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719235" id="1719235" title="Cve-2019-8559 Webkitgtk: Malicious Web Content Leads To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719237" id="1719237" title="Cve-2019-8563 Webkitgtk: Malicious Web Content Leads To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1719238" id="1719238" title="Cve-2019-8551 Webkitgtk: Malicious Web Content Leads To Cross Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1811721" id="1811721" title="Cve-2020-10018 Webkitgtk: Use-After-Free Issue In Accessibility/Axobjectcache.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1816678" id="1816678" title="Cve-2019-8846 Webkitgtk: Use After Free Issue May Lead To Remote Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1816684" id="1816684" title="Cve-2019-8835 Webkitgtk: Processing Maliciously Crafted Web Content May Lead To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1816686" id="1816686" title="Cve-2019-8844 Webkitgtk: Processing Maliciously Crafted Web Content May Lead To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817144" id="1817144" title="Rebase Webkitgtk To 2.28" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1829369" id="1829369" title="Cve-2020-11793 Webkitgtk: Use-After-Free Via Crafted Web Content" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876462" id="1876462" title="Cve-2020-3885 Webkitgtk: Incorrect Processing Of File Urls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876463" id="1876463" title="Cve-2020-3894 Webkitgtk: Race Condition Allows Reading Of Restricted Memory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876465" id="1876465" title="Cve-2020-3895 Webkitgtk: Memory Corruption Triggered By A Malicious Web Content" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876468" id="1876468" title="Cve-2020-3897 Webkitgtk: Type Confusion Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876470" id="1876470" title="Cve-2020-3899 Webkitgtk: Memory Consumption Issue Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876472" id="1876472" title="Cve-2020-3900 Webkitgtk: Memory Corruption  Triggered By A Malicious Web Content" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876473" id="1876473" title="Cve-2020-3901 Webkitgtk: Type Confusion Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876476" id="1876476" title="Cve-2020-3902 Webkitgtk: Input Validation Issue Leading To Cross-Site Script Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876516" id="1876516" title="Cve-2020-3862 Webkitgtk: Denial Of Service Via Incorrect Memory Handling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876518" id="1876518" title="Cve-2020-3864 Webkitgtk: Non-Unique Security Origin For Dom Object Contexts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876521" id="1876521" title="Cve-2020-3865 Webkitgtk: Incorrect Security Check For A Top-Level Dom Object Context" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876522" id="1876522" title="Cve-2020-3867 Webkitgtk: Incorrect State Management Leading To Universal Cross-Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876523" id="1876523" title="Cve-2020-3868 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876536" id="1876536" title="Cve-2019-8710 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876537" id="1876537" title="Cve-2019-8743 Webkitgtk: Multiple Memory Corruption  Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876540" id="1876540" title="Cve-2019-8764 Webkitgtk: Incorrect State  Management Leading To Universal Cross-Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876542" id="1876542" title="Cve-2019-8765 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876543" id="1876543" title="Cve-2019-8766 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876545" id="1876545" title="Cve-2019-8782 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876548" id="1876548" title="Cve-2019-8783 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876549" id="1876549" title="Cve-2019-8808 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876550" id="1876550" title="Cve-2019-8811 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876552" id="1876552" title="Cve-2019-8812 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876553" id="1876553" title="Cve-2019-8813 Webkitgtk: Incorrect State Management Leading To Universal Cross-Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876554" id="1876554" title="Cve-2019-8814 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876555" id="1876555" title="Cve-2019-8815 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876556" id="1876556" title="Cve-2019-8816 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876590" id="1876590" title="Cve-2019-8819 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876591" id="1876591" title="Cve-2019-8820 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876592" id="1876592" title="Cve-2019-8821 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876593" id="1876593" title="Cve-2019-8822 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876594" id="1876594" title="Cve-2019-8823 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876607" id="1876607" title="Cve-2019-8625 Webkitgtk: Incorrect State Management Leading To Universal Cross-Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876608" id="1876608" title="Cve-2019-8674 Webkitgtk: Incorrect State Management Leading To Universal Cross-Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876609" id="1876609" title="Cve-2019-8707 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876610" id="1876610" title="Cve-2019-8719 Webkitgtk: Incorrect State Management Leading To Universal Cross-Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876611" id="1876611" title="Cve-2019-8720 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876612" id="1876612" title="Cve-2019-8726 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876613" id="1876613" title="Cve-2019-8733 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876614" id="1876614" title="Cve-2019-8735 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876615" id="1876615" title="Cve-2019-8763 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876616" id="1876616" title="Cve-2019-8768 Webkitgtk: Browsing History Could Not Be Deleted" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876617" id="1876617" title="Cve-2019-8769 Webkitgtk: Websites Could Reveal Browsing History" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876619" id="1876619" title="Cve-2019-8771 Webkitgtk: Violation Of Iframe Sandboxing Policy" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876626" id="1876626" title="Cve-2019-8644 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876628" id="1876628" title="Cve-2019-8649 Webkitgtk: Incorrect State Management Leading To Universal Cross-Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876629" id="1876629" title="Cve-2019-8658 Webkitgtk: Incorrect State Management Leading To Universal Cross-Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876630" id="1876630" title="Cve-2019-8666 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876631" id="1876631" title="Cve-2019-8669 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876632" id="1876632" title="Cve-2019-8671 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876634" id="1876634" title="Cve-2019-8672 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876643" id="1876643" title="Cve-2019-8673 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876644" id="1876644" title="Cve-2019-8676 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876645" id="1876645" title="Cve-2019-8677 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876646" id="1876646" title="Cve-2019-8678 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876647" id="1876647" title="Cve-2019-8679 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876648" id="1876648" title="Cve-2019-8680 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876650" id="1876650" title="Cve-2019-8681 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876651" id="1876651" title="Cve-2019-8683 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876652" id="1876652" title="Cve-2019-8684 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876653" id="1876653" title="Cve-2019-8686 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876655" id="1876655" title="Cve-2019-8687 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876656" id="1876656" title="Cve-2019-8688 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876657" id="1876657" title="Cve-2019-8689 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876664" id="1876664" title="Cve-2019-8690 Webkitgtk: Incorrect State Management Leading To Universal Cross-Site Scripting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876880" id="1876880" title="Cve-2019-6237 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876881" id="1876881" title="Cve-2019-8571 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876882" id="1876882" title="Cve-2019-8583 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876883" id="1876883" title="Cve-2019-8584 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876884" id="1876884" title="Cve-2019-8586 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876887" id="1876887" title="Cve-2019-8587 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876891" id="1876891" title="Cve-2019-8594 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876892" id="1876892" title="Cve-2019-8595 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876893" id="1876893" title="Cve-2019-8596 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876894" id="1876894" title="Cve-2019-8597 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876895" id="1876895" title="Cve-2019-8601 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876897" id="1876897" title="Cve-2019-8607 Webkitgtk: Out-Of-Bounds Read Leading To Memory Disclosure" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876898" id="1876898" title="Cve-2019-8608 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876899" id="1876899" title="Cve-2019-8609 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1876900" id="1876900" title="Cve-2019-8610 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1877045" id="1877045" title="Cve-2019-8615 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1877046" id="1877046" title="Cve-2019-8611 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1877047" id="1877047" title="Cve-2019-8619 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1877048" id="1877048" title="Cve-2019-8622 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1877049" id="1877049" title="Cve-2019-8623 Webkitgtk: Multiple Memory Corruption Issues Leading To Arbitrary Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4039-1</id><title>Openexr</title><description>Security Fix(es): 
* OpenEXR: out-of-bounds read during Huffman uncompression (CVE-2020-11761) 
* OpenEXR: std::vector out-of-bounds read and write in ImfTileOffsets.cpp (CVE-2020-11763) 
* OpenEXR: out-of-bounds write in copyIntoFrameBuffer function in ImfMisc.cpp (CVE-2020-11764)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="OpenEXR-libs" release="8.el7" src="OpenEXR-1.7.1-8.el7.src.rpm" version="1.7.1"><filename>OpenEXR-libs-1.7.1-8.el7.x86_64.rpm</filename><sum type="sha256">718ced468bf51b2002f9affbb2cb4e978272e6de9a1a74ef424c3a78eea82005</sum></package><package arch="x86_64" name="OpenEXR-devel" release="8.el7" src="OpenEXR-1.7.1-8.el7.src.rpm" version="1.7.1"><filename>OpenEXR-devel-1.7.1-8.el7.x86_64.rpm</filename><sum type="sha256">18c2c0c079ff1e9552402956c508d05d41bfc05e82b03a1d8605dca773782c19</sum></package><package arch="i686" name="OpenEXR-libs" release="8.el7" src="OpenEXR-1.7.1-8.el7.src.rpm" version="1.7.1"><filename>OpenEXR-libs-1.7.1-8.el7.i686.rpm</filename><sum type="sha256">8677a62336741f83adde8e09a6ff228e0d7ea4b118d5d0082a216d43a1ba3a38</sum></package><package arch="i686" name="OpenEXR-devel" release="8.el7" src="OpenEXR-1.7.1-8.el7.src.rpm" version="1.7.1"><filename>OpenEXR-devel-1.7.1-8.el7.i686.rpm</filename><sum type="sha256">23931bd35b53dcec540bd01060db7f3b24e8425d5ac6bb065a54bb4b578779ed</sum></package><package arch="x86_64" name="OpenEXR" release="8.el7" src="OpenEXR-1.7.1-8.el7.src.rpm" version="1.7.1"><filename>OpenEXR-1.7.1-8.el7.x86_64.rpm</filename><sum type="sha256">0fdc6cc95ba73c327efefaada1b9f262e579214a66cace2d711a3191be003b87</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11761" id="CVE-2020-11761" title="Cve-2020-11761" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11763" id="CVE-2020-11763" title="Cve-2020-11763" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11764" id="CVE-2020-11764" title="Cve-2020-11764" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4039" id="RHSA-2020:4039-1" title="Rhsa-2020:4039-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1828990" id="1828990" title="Cve-2020-11764 Openexr: Out-Of-Bounds Write In Copyintoframebuffer Function In Imfmisc.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1828995" id="1828995" title="Cve-2020-11763 Openexr: Std::Vector Out-Of-Bounds Read And Write In Imftileoffsets.Cpp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1829002" id="1829002" title="Cve-2020-11761 Openexr: Out-Of-Bounds Read During Huffman Uncompression" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4040-1</id><title>Libexif</title><description>Security Fix(es): 
* libexif: out of bound write in exif-data.c (CVE-2019-9278) 
* libexif: out of bounds read due to a missing bounds check in exif_data_save_data_entry function in exif-data.c (CVE-2020-0093) 
* libexif: use of uninitialized memory in EXIF Makernote handling can lead to crashes and use-after-free (CVE-2020-13113) 
* libexif: unrestricted size in handling Canon EXIF MakerNote data can lead to consumption of large amounts of compute time (CVE-2020-13114) 
* libexif: out of bounds read due to a missing bounds check in exif_entry_get_value function in exif-entry.c (CVE-2020-0182) 
* libexif: divide-by-zero in exif_entry_get_value function in exif-entry.c (CVE-2020-12767)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libexif-doc" release="1.el7" src="libexif-0.6.22-1.el7.src.rpm" version="0.6.22"><filename>libexif-doc-0.6.22-1.el7.x86_64.rpm</filename><sum type="sha256">29c8870ea192bd1a7f25455101ffb9da5bc0eb70a3d1c509be4d041156e70749</sum></package><package arch="x86_64" name="libexif-devel" release="1.el7" src="libexif-0.6.22-1.el7.src.rpm" version="0.6.22"><filename>libexif-devel-0.6.22-1.el7.x86_64.rpm</filename><sum type="sha256">7660c2b5f75652c415c05e4e1281c0fc970455970ec8315d17f74eafbdeeb0ca</sum></package><package arch="i686" name="libexif" release="1.el7" src="libexif-0.6.22-1.el7.src.rpm" version="0.6.22"><filename>libexif-0.6.22-1.el7.i686.rpm</filename><sum type="sha256">c55b7d08e21c66626adc2d006015053d3f6759e16fa2b7a551f93c0b29d401c1</sum></package><package arch="i686" name="libexif-devel" release="1.el7" src="libexif-0.6.22-1.el7.src.rpm" version="0.6.22"><filename>libexif-devel-0.6.22-1.el7.i686.rpm</filename><sum type="sha256">759bcabb28968dd4f558845a96872f25aa7ab7d487ee845956652ea06ee5cad0</sum></package><package arch="x86_64" name="libexif" release="1.el7" src="libexif-0.6.22-1.el7.src.rpm" version="0.6.22"><filename>libexif-0.6.22-1.el7.x86_64.rpm</filename><sum type="sha256">462a6cff319a50bf552362667dfd8b845d5d5742cd1ed0d818486fea72cb19dc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9278" id="CVE-2019-9278" title="Cve-2019-9278" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0093" id="CVE-2020-0093" title="Cve-2020-0093" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0182" id="CVE-2020-0182" title="Cve-2020-0182" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12767" id="CVE-2020-12767" title="Cve-2020-12767" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13113" id="CVE-2020-13113" title="Cve-2020-13113" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13114" id="CVE-2020-13114" title="Cve-2020-13114" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4040" id="RHSA-2020:4040-1" title="Rhsa-2020:4040-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1789031" id="1789031" title="Cve-2019-9278 Libexif: Out Of Bound Write In Exif-Data.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1834950" id="1834950" title="Cve-2020-12767 Libexif: Divide-By-Zero In Exif_Entry_Get_Value Function In Exif-Entry.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1840347" id="1840347" title="Cve-2020-13113 Libexif: Use Of Uninitialized Memory In Exif Makernote Handling Can Lead To Crashes And Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1840350" id="1840350" title="Cve-2020-13114 Libexif: Unrestricted Size In Handling Canon Exif Makernote Data Can Lead To Consumption Of Large Amounts Of Compute Time" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1841316" id="1841316" title="Rebase To Libexif 0.6.22" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1852487" id="1852487" title="Cve-2020-0093 Libexif: Out Of Bounds Read Due To A Missing Bounds Check In Exif_Data_Save_Data_Entry Function In Exif-Data.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1852490" id="1852490" title="Cve-2020-0182 Libexif: Out Of Bounds Read Due To A Missing Bounds Check In Exif_Entry_Get_Value Function In Exif-Entry.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4041-1</id><title>Openldap</title><description>Security Fix(es): 
* openldap: denial of service via nested boolean expressions in LDAP search filters (CVE-2020-12243)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openldap" release="22.el7" src="openldap-2.4.44-22.el7.src.rpm" version="2.4.44"><filename>openldap-2.4.44-22.el7.x86_64.rpm</filename><sum type="sha256">45dd51741f681ba924741cc13c9c0e0679bee065ad86d33579ad269e37a8f7d1</sum></package><package arch="x86_64" name="openldap-servers" release="22.el7" src="openldap-2.4.44-22.el7.src.rpm" version="2.4.44"><filename>openldap-servers-2.4.44-22.el7.x86_64.rpm</filename><sum type="sha256">d4202c530f9ecaa0524744cee78c5b2d4182d8174436a32df0a4c26b6ddafe82</sum></package><package arch="i686" name="openldap" release="22.el7" src="openldap-2.4.44-22.el7.src.rpm" version="2.4.44"><filename>openldap-2.4.44-22.el7.i686.rpm</filename><sum type="sha256">0bdc4ef73447eb751de5c1fd537d1a560a4def7f81efdac649e29ebc0a92960d</sum></package><package arch="x86_64" name="openldap-servers-sql" release="22.el7" src="openldap-2.4.44-22.el7.src.rpm" version="2.4.44"><filename>openldap-servers-sql-2.4.44-22.el7.x86_64.rpm</filename><sum type="sha256">93e88fd229200c0a07889e9a1f8ef9311ed85a5374a49df5e98a602180bfc2e2</sum></package><package arch="i686" name="openldap-devel" release="22.el7" src="openldap-2.4.44-22.el7.src.rpm" version="2.4.44"><filename>openldap-devel-2.4.44-22.el7.i686.rpm</filename><sum type="sha256">ddd4c977e73eef7016cf40ec711b5f0d4ff153510a2016a2f4c44a60c3e72e98</sum></package><package arch="x86_64" name="openldap-devel" release="22.el7" src="openldap-2.4.44-22.el7.src.rpm" version="2.4.44"><filename>openldap-devel-2.4.44-22.el7.x86_64.rpm</filename><sum type="sha256">14982fa0e7b07d91720de6da1a47f092ad681e504be3acee6afb76724318354f</sum></package><package arch="x86_64" name="openldap-clients" release="22.el7" src="openldap-2.4.44-22.el7.src.rpm" version="2.4.44"><filename>openldap-clients-2.4.44-22.el7.x86_64.rpm</filename><sum type="sha256">26847425b742ad43c5306aeff209ff4bc2d782d60aa1ae17eda7b4c842a0a07f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12243" id="CVE-2020-12243" title="Cve-2020-12243" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4041" id="RHSA-2020:4041-1" title="Rhsa-2020:4041-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1833535" id="1833535" title="Cve-2020-12243 Openldap: Denial Of Service Via Nested Boolean Expressions In Ldap Search Filters" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4060-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: use-after-free in sound/core/timer.c (CVE-2019-19807) 
* kernel: out of bounds write in function i2c_smbus_xfer_emulated in drivers/i2c/i2c-core-smbus.c (CVE-2017-18551) 
* kernel: race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c leads to use-after-free (CVE-2018-20836) 
* kernel: out of bounds write in i2c driver leads to local escalation of privilege (CVE-2019-9454) 
* kernel: use after free due to race condition in the video driver leads to local privilege escalation (CVE-2019-9458)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-perf" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">05ee4ea7b278f80f4fd8ae40901116798482739f0c932197a3e8db62348a37c9</sum></package><package arch="x86_64" name="kernel-devel" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">e30ca60530716a375bf5876a5168948c6012e487b6dc5789630a41078a57052b</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">9bae0055d052e84412b1be2b219879ceff924b81efabb571f275a86555eed844</sum></package><package arch="x86_64" name="kernel-headers" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">e1d63994d9db669ec855e25f7f0eafb726996cc9e4e9a613f96474f93f55c4a4</sum></package><package arch="x86_64" name="bpftool" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">c5d517b5e094f8e519d19d1338c6ea8e051c2a5704a01c5d08861bace992e23f</sum></package><package arch="x86_64" name="kernel" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">7eb44887d89dd1c11abb325b3c8693be2cbcbb99e62c3c32d8db52d0ce483d8a</sum></package><package arch="x86_64" name="perf" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">d71f3e601b0d37028d2d378a3ba7dafb0e2c58f5ebf72805c4e0b16b9d497e7c</sum></package><package arch="noarch" name="kernel-doc" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.el7.noarch.rpm</filename><sum type="sha256">57077c9598b9fb2cd9c0742374e9169b29a3a9f26b469e7b3a7ba028c2777df4</sum></package><package arch="x86_64" name="kernel-tools" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">e0f769d0ffd95c24ffae5f1ed3470c7b5f52a009aea99b439db99e5cc12ff716</sum></package><package arch="x86_64" name="kmod-openafs-1.6-sl-1160" release="290.sl7.1160" src="openafs.SLx-1.6.24-290.src.rpm" version="1.6.24"><filename>kmod-openafs-1.6-sl-1160-1.6.24-290.sl7.1160.x86_64.rpm</filename><sum type="sha256">2bc7a46865aef14d675e8485f1a1cbc0823b27f4e5dbf714890b3a0ee874e6ac</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">5a7407e03439617f377f9bab2077d86184aad3c92ce85dac7c6d5a62ba481196</sum></package><package arch="noarch" name="kmod-openafs-1.6-sl" release="1.SL79.el7" src="kmod-openafs-1.6-sl-1.6.24-1.SL79.el7.src.rpm" version="1.6.24"><filename>kmod-openafs-1.6-sl-1.6.24-1.SL79.el7.noarch.rpm</filename><sum type="sha256">477c073309fed9f6024465094de52dfaf0461607e3c0ff972e787a3f8b515e1f</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">198789134d8196e6d8f0c485712fc885c446140b5e915bccc870529c81e94806</sum></package><package arch="x86_64" name="kernel-debug" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.el7.x86_64.rpm</filename><sum type="sha256">9df47dfc2aa200d4e3dd239dbc9fa4d8598d68d3f08b54ab340704d851964bb5</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.el7" src="kernel-3.10.0-1160.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.el7.noarch.rpm</filename><sum type="sha256">05ad8c8d7e419eba02a6ca3fe402f0c112510ebfd17aefa7e9f8866648f3ba90</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18551" id="CVE-2017-18551" title="Cve-2017-18551" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20836" id="CVE-2018-20836" title="Cve-2018-20836" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12614" id="CVE-2019-12614" title="Cve-2019-12614" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15217" id="CVE-2019-15217" title="Cve-2019-15217" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15807" id="CVE-2019-15807" title="Cve-2019-15807" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15917" id="CVE-2019-15917" title="Cve-2019-15917" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16231" id="CVE-2019-16231" title="Cve-2019-16231" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16233" id="CVE-2019-16233" title="Cve-2019-16233" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16994" id="CVE-2019-16994" title="Cve-2019-16994" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17053" id="CVE-2019-17053" title="Cve-2019-17053" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18808" id="CVE-2019-18808" title="Cve-2019-18808" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19046" id="CVE-2019-19046" title="Cve-2019-19046" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19055" id="CVE-2019-19055" title="Cve-2019-19055" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19058" id="CVE-2019-19058" title="Cve-2019-19058" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19059" id="CVE-2019-19059" title="Cve-2019-19059" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19062" id="CVE-2019-19062" title="Cve-2019-19062" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19063" id="CVE-2019-19063" title="Cve-2019-19063" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19332" id="CVE-2019-19332" title="Cve-2019-19332" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19447" id="CVE-2019-19447" title="Cve-2019-19447" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19523" id="CVE-2019-19523" title="Cve-2019-19523" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19524" id="CVE-2019-19524" title="Cve-2019-19524" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19530" id="CVE-2019-19530" title="Cve-2019-19530" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19534" id="CVE-2019-19534" title="Cve-2019-19534" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19537" id="CVE-2019-19537" title="Cve-2019-19537" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19767" id="CVE-2019-19767" title="Cve-2019-19767" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19807" id="CVE-2019-19807" title="Cve-2019-19807" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20054" id="CVE-2019-20054" title="Cve-2019-20054" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20095" id="CVE-2019-20095" title="Cve-2019-20095" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20636" id="CVE-2019-20636" title="Cve-2019-20636" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9454" id="CVE-2019-9454" title="Cve-2019-9454" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9458" id="CVE-2019-9458" title="Cve-2019-9458" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10690" id="CVE-2020-10690" title="Cve-2020-10690" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10732" id="CVE-2020-10732" title="Cve-2020-10732" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10742" id="CVE-2020-10742" title="Cve-2020-10742" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10751" id="CVE-2020-10751" title="Cve-2020-10751" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10942" id="CVE-2020-10942" title="Cve-2020-10942" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11565" id="CVE-2020-11565" title="Cve-2020-11565" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12770" id="CVE-2020-12770" title="Cve-2020-12770" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12826" id="CVE-2020-12826" title="Cve-2020-12826" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14305" id="CVE-2020-14305" title="Cve-2020-14305" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1749" id="CVE-2020-1749" title="Cve-2020-1749" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-2732" id="CVE-2020-2732" title="Cve-2020-2732" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8647" id="CVE-2020-8647" title="Cve-2020-8647" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8649" id="CVE-2020-8649" title="Cve-2020-8649" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9383" id="CVE-2020-9383" title="Cve-2020-9383" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4060" id="RHSA-2020:4060-1" title="Rhsa-2020:4060-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1448750" id="1448750" title="Bug: Unable To Handle Kernel Paging Request At 0; Ip: [&lt;Ffffffffc05Ae76B&gt;] Nfsd4_Cb_Done+0X2B/0X310 [Nfsd]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1699402" id="1699402" title="Smallfile Caused Kernel Cephfs Crash In Rhocs (Openshift-On-Ceph)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1707796" id="1707796" title="Cve-2018-20836 Kernel: Race Condition In Smp_Task_Timedout() And Smp_Task_Done() In Drivers/Scsi/Libsas/Sas_Expander.C Leads To Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1718176" id="1718176" title="Cve-2019-12614 Kernel: Null Pointer Dereference In Dlpar_Parse_Cc_Property In Arch/Powerrc/Platforms/Pseries/Dlpar.C Causing Denial Of Service" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1724345" id="1724345" title="Mkfs.Xfs Hangs Issuing Discards" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1745528" id="1745528" title="Cve-2019-15217 Kernel: Null Pointer Dereference In Drivers/Media/Usb/Zr364Xx/Zr364Xx.C Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1747216" id="1747216" title="Cve-2019-15807 Kernel: Memory Leak In Drivers/Scsi/Libsas/Sas_Expander.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1757368" id="1757368" title="Cve-2017-18551 Kernel: Out Of Bounds Write In Function I2C_Smbus_Xfer_Emulated In Drivers/I2C/I2C-Core-Smbus.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1758242" id="1758242" title="Cve-2019-17053 Kernel: Unprivileged Users Able To Create Raw Sockets In Af_Ieee802154 Network Protocol" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1758248" id="1758248" title="Kernel: Unprivileged Users Able To Create Raw Sockets In Af_Isdn  Network Protocol." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1759681" id="1759681" title="Cve-2019-16994 Kernel: Memory Leak In Sit_Init_Net() In Net/Ipv6/Sit.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760100" id="1760100" title="Cve-2019-15917 Kernel: Use-After-Free In Drivers/Bluetooth/Hci_Ldisc.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760310" id="1760310" title="Cve-2019-16231 Kernel: Null-Pointer Dereference In Drivers/Net/Fjes/Fjes_Main.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1760420" id="1760420" title="Cve-2019-16233 Kernel: Null Pointer Dereference In Drivers/Scsi/Qla2Xxx/Qla_Os.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1774988" id="1774988" title="Cve-2019-19046 Kernel: Denial Of Service In The __Ipmi_Bmc_Register() Function In Drivers/Char/Ipmi/Ipmi_Msghandler.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775015" id="1775015" title="Cve-2019-19063 Kernel: Two Memory Leaks In The Rtl_Usb_Probe() Function In Drivers/Net/Wireless/Realtek/Rtlwifi/Usb.C Allow For A Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775021" id="1775021" title="Cve-2019-19062 Kernel: Memory Leak In The Crypto_Report() Function In Crypto/Crypto_User_Base.C Allows For Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775042" id="1775042" title="Cve-2019-19059 Kernel: Multiple Memory Leaks In The Iwl_Pcie_Ctxt_Info_Gen3_Init() Function In Drivers/Net/Wireless/Intel/Iwlwifi/Pcie/Ctxt-Info-Gen3.C Allows For A Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775047" id="1775047" title="Cve-2019-19058 Kernel: A Memory Leak In The Alloc_Sgtable() Function In Drivers/Net/Wireless/Intel/Iwlwifi/Fw/Dbg.C Allows For A Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775074" id="1775074" title="Cve-2019-19055 Kernel: Memory Leak In The Nl80211_Get_Ftm_Responder_Stats() Function In Net/Wireless/Nl80211.C Allows Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1777239" id="1777239" title="Unable To Exclude Files From Auditing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1777418" id="1777418" title="Cve-2019-18808 Kernel: Memory Leak In Ccp_Run_Sha_Cmd() Function In Drivers/Crypto/Ccp/Ccp-Ops.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779594" id="1779594" title="Cve-2019-19332 Kernel: Kvm: Oob Memory Write Via Kvm_Dev_Ioctl_Get_Cpuid" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1781679" id="1781679" title="Cve-2019-19447 Kernel: Mounting A Crafted Ext4 Filesystem Image, Performing Some Operations, And Unmounting Can Lead To A Use-After-Free In Ext4_Put_Super In Fs/Ext4/Super.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1783434" id="1783434" title="Cve-2019-19523 Kernel: Use-After-Free Caused By A Malicious Usb Device In The Drivers/Usb/Misc/Adutux.C Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1783459" id="1783459" title="Cve-2019-19524 Kernel: A Malicious Usb Device In The Drivers/Input/Ff-Memless.C Leads To Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1783518" id="1783518" title="Cve-2019-19530 Kernel: Use-After-Free Caused By A Malicious Usb Device In The Drivers/Usb/Class/Cdc-Acm.C Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1783540" id="1783540" title="Cve-2019-19534 Kernel: Information Leak Bug Caused By A Malicious Usb Device In The Drivers/Net/Can/Usb/Peak_Usb/Pcan_Usb_Core.C Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1783554" id="1783554" title="Fix Copy_File_Range Return Value In Case Of Same-File Copy On Nfs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1783561" id="1783561" title="Cve-2019-19537 Kernel: Race Condition Caused By A Malicious Usb Device In The Usb Character Device Driver Layer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1786078" id="1786078" title="Cve-2019-19807 Kernel: Use-After-Free In Sound/Core/Timer.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1786160" id="1786160" title="Cve-2019-19767 Kernel: Use-After-Free In __Ext4_Expand_Extra_Isize And Ext4_Xattr_Set_Entry Related To Fs/Ext4/Inode.C And Fs/Ext4/Super.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1790063" id="1790063" title="Cve-2019-20054 Kernel: Null Pointer Dereference In Drop_Sysctl_Table() In Fs/Proc/Proc_Sysctl.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791954" id="1791954" title="Cve-2019-20095 Kernel: Memory Leak In Mwifiex_Tm_Cmd In Drivers/Net/Wireless/Marvell/Mwifiex/Cfg80211.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1802555" id="1802555" title="Cve-2020-8649 Kernel: Invalid Read Location In Vgacon_Invert_Region Function In Drivers/Video/Console/Vgacon.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1802563" id="1802563" title="Cve-2020-8647 Kernel: Out-Of-Bounds Read In In Vc_Do_Resize Function In Drivers/Tty/Vt/Vt.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1805135" id="1805135" title="Cve-2020-2732 Kernel: Kvm: Nvmx: L2 Guest May Trick The L0 Hypervisor To Access Sensitive L1 Resources" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1809833" id="1809833" title="Cve-2020-1749 Kernel: Some Ipv6 Protocols Not Encrypted Over Ipsec Tunnel" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1810685" id="1810685" title="Cve-2020-9383 Kernel: Out-Of-Bounds Read In Set_Fdc In Drivers/Block/Floppy.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817141" id="1817141" title="Cve-2020-10690 Kernel: Use-After-Free In Cdev_Put() When A Ptp Device Is Removed While It'S Chardev Is Open" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1817718" id="1817718" title="Cve-2020-10942 Kernel: Vhost-Net: Stack Overflow In Get_Raw_Socket While Checking Sk_Family Field" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1818818" id="1818818" title="Cve-2019-9454 Kernel: Out Of Bounds Write In I2C Driver Leads To Local Escalation Of Privilege" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1819377" id="1819377" title="Cve-2019-9458 Kernel: Use After Free Due To Race Condition In The Video Driver Leads To Local Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1822077" id="1822077" title="Cve-2020-12826 Kernel: Possible To Send Arbitrary Signals To A Privileged (Suidroot) Parent Process" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1824059" id="1824059" title="Cve-2019-20636 Kernel: Out-Of-Bounds Write Via Crafted Keycode Table" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1824270" id="1824270" title="Cve-2020-10742 Kernel: Nfs Client Crash Due To Index Buffer Overflow During Direct Io Write Causing Kernel Panic [Rhel-7]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1824918" id="1824918" title="Cve-2020-11565 Kernel: Out-Of-Bounds Write In Mpol_Parse_Str Function In Mm/Mempolicy.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1829662" id="1829662" title="Kernel Bug At Fs/Fscache/Operation.C:70! Fs-Cache: 4 == 5 Is False - Current State Is Fscache_Op_St_Complete But Should Be Fscache_Op_Cancelled In Fscache_Enqueue_Operation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1831399" id="1831399" title="Cve-2020-10732 Kernel: Uninitialized Kernel Data Leak In Userspace Coredumps" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1832332" id="1832332" title="&quot;[Sig-Network] Services Should Be Rejected When No Endpoints Exist&quot; Test Fails Frequently On Rhel7 Nodes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1834845" id="1834845" title="Cve-2020-12770 Kernel: Sg_Write Function Lacks An Sg_Remove_Request Call In A Certain Failure Case" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835127" id="1835127" title="Cve-2020-10742 Kernel: Nfs Client Crash Due To Index Buffer Overflow During Direct Io Write Causing Kernel Panic" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1839634" id="1839634" title="Cve-2020-10751 Kernel: Selinux Netlink Permission Check Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1845326" id="1845326" title="Libaio Is Returning Duplicate Events" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1850716" id="1850716" title="Cve-2020-14305 Kernel: Memory Corruption In Voice Over Ip Nf_Conntrack_H323 Module" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4072-1</id><title>Libcroco</title><description>Security Fix(es): 
* libcroco: Stack overflow in function cr_parser_parse_any_core in cr-parser.c (CVE-2020-12825)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libcroco" release="6.el7_9" src="libcroco-0.6.12-6.el7_9.src.rpm" version="0.6.12"><filename>libcroco-0.6.12-6.el7_9.x86_64.rpm</filename><sum type="sha256">d87d08920dc0d6fc8115db1658235f5de735757dd37422431369a61fa249bc82</sum></package><package arch="i686" name="libcroco-devel" release="6.el7_9" src="libcroco-0.6.12-6.el7_9.src.rpm" version="0.6.12"><filename>libcroco-devel-0.6.12-6.el7_9.i686.rpm</filename><sum type="sha256">4b512395a6822fa76d4c0fbc4014b8f33e37eca0dd449e27b22c5393b5532837</sum></package><package arch="i686" name="libcroco" release="6.el7_9" src="libcroco-0.6.12-6.el7_9.src.rpm" version="0.6.12"><filename>libcroco-0.6.12-6.el7_9.i686.rpm</filename><sum type="sha256">4b4a8dbf07510cc58a5400f60b2f8e517bfe51567f1cb13fc26df73e19798391</sum></package><package arch="x86_64" name="libcroco-devel" release="6.el7_9" src="libcroco-0.6.12-6.el7_9.src.rpm" version="0.6.12"><filename>libcroco-devel-0.6.12-6.el7_9.x86_64.rpm</filename><sum type="sha256">bf8fdd5833f8236b37fe8bc05897aa99e052984c436bfda0351d38cc387973bb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12825" id="CVE-2020-12825" title="Cve-2020-12825" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4072" id="RHSA-2020:4072-1" title="Rhsa-2020:4072-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1835377" id="1835377" title="Cve-2020-12825 Libcroco: Stack Overflow In Function Cr_Parser_Parse_Any_Core In Cr-Parser.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4076-1</id><title>Nss And Nspr</title><description>Security Fix(es): 
* nss: Out-of-bounds read when importing curve25519 private key (CVE-2019-11719) 
* nss: Use-after-free in sftk_FreeSession due to improper refcounting (CVE-2019-11756) 
* nss: Check length of inputs for cryptographic primitives (CVE-2019-17006) 
* nss: Side channel attack on ECDSA signature generation (CVE-2020-6829) 
* nss: P-384 and P-521 implementation uses a side-channel vulnerable modular inversion function (CVE-2020-12400) 
* nss: ECDSA timing attack mitigation bypass (CVE-2020-12401) 
* nss: Side channel vulnerabilities during RSA key generation (CVE-2020-12402) 
* nss: CHACHA20-POLY1305 decryption with undersized tag leads to out-of-bounds read (CVE-2020-12403) 
* nss: PKCS#1 v1.5 signatures can be used for TLS 1.3 (CVE-2019-11727) 
* nss: TLS 1.3 HelloRetryRequest downgrade request sets client into invalid state (CVE-2019-17023)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-sysinit" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-sysinit-3.53.1-3.el7_9.x86_64.rpm</filename><sum type="sha256">15a101e35a98f34fac1b771804494d4c6301eff549833e5e78786fb9feacc8ad</sum></package><package arch="i686" name="nss-util-devel" release="1.el7_9" src="nss-util-3.53.1-1.el7_9.src.rpm" version="3.53.1"><filename>nss-util-devel-3.53.1-1.el7_9.i686.rpm</filename><sum type="sha256">60683f92b2008461920e8aefda0a27b834a00c7faf48ecb927eaae4d44292177</sum></package><package arch="i686" name="nspr-devel" release="2.el7_9" src="nspr-4.25.0-2.el7_9.src.rpm" version="4.25.0"><filename>nspr-devel-4.25.0-2.el7_9.i686.rpm</filename><sum type="sha256">3fa4d956eae89cfce468432d9c19af7d360fe488c4e0e6f05e5afa2b9fbae8a1</sum></package><package arch="i686" name="nss-util" release="1.el7_9" src="nss-util-3.53.1-1.el7_9.src.rpm" version="3.53.1"><filename>nss-util-3.53.1-1.el7_9.i686.rpm</filename><sum type="sha256">9262d3904ffb913894939f0d81393714589b96d493ddba11f6ef0dbf62e79022</sum></package><package arch="x86_64" name="nspr" release="2.el7_9" src="nspr-4.25.0-2.el7_9.src.rpm" version="4.25.0"><filename>nspr-4.25.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">e08439dde765b18f4e224a91ae854eeae94dc7dc8f37a60fde90504ab233d7bf</sum></package><package arch="i686" name="nss-devel" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-devel-3.53.1-3.el7_9.i686.rpm</filename><sum type="sha256">0e0db7d4094860e358678dc2afd7975797eb597cee877b304953603ca2e2f5c5</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-pkcs11-devel-3.53.1-3.el7_9.x86_64.rpm</filename><sum type="sha256">6431e62f2f37e81f770ef6c16adf677c8d181bfbbd1a6751ab6852a3a42312ca</sum></package><package arch="i686" name="nss" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-3.53.1-3.el7_9.i686.rpm</filename><sum type="sha256">5dd111c183707e7ceb015f79188e924f397b034aca7c7d274b336cf993c68b2b</sum></package><package arch="i686" name="nss-softokn-freebl" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-freebl-3.53.1-6.el7_9.i686.rpm</filename><sum type="sha256">cae33d2ff8fd02ddf817a0b2ba3293d31b3d563276e4d274205aac710cd30c1b</sum></package><package arch="x86_64" name="nss-softokn-freebl" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-freebl-3.53.1-6.el7_9.x86_64.rpm</filename><sum type="sha256">25e1bf14fd9e2ace713eb7f595db1ee2e60d6099813d5f1fcd98a9970be276ac</sum></package><package arch="i686" name="nss-softokn-freebl-devel" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-freebl-devel-3.53.1-6.el7_9.i686.rpm</filename><sum type="sha256">cbcdecdc2c895a1b0fc34ae177210bbdc8a94f583f59e47c1c64b7f8db0c17b2</sum></package><package arch="x86_64" name="nss-softokn-freebl-devel" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-freebl-devel-3.53.1-6.el7_9.x86_64.rpm</filename><sum type="sha256">ce95acdf422ce3fc7b3662005438988b14f6bcd6195a429730e16d44bec1a098</sum></package><package arch="x86_64" name="nss-util-devel" release="1.el7_9" src="nss-util-3.53.1-1.el7_9.src.rpm" version="3.53.1"><filename>nss-util-devel-3.53.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">216d1def1e80a5867a486fb4d2412663739458dd2ad8b11039291f32e307265d</sum></package><package arch="i686" name="nss-softokn" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-3.53.1-6.el7_9.i686.rpm</filename><sum type="sha256">e96391c99b548cc3fe9f16fe843cfda2d20d5e6d39204401aafc0e1a5492f73f</sum></package><package arch="x86_64" name="nss-util" release="1.el7_9" src="nss-util-3.53.1-1.el7_9.src.rpm" version="3.53.1"><filename>nss-util-3.53.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">fc0d30529d44c6c4edd76892d8700f7f24074c3a0448172bc76bca0df143652c</sum></package><package arch="i686" name="nss-softokn-devel" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-devel-3.53.1-6.el7_9.i686.rpm</filename><sum type="sha256">3f1b6bf28bb95723ac1c3e7ac8b0fba7c45bb42472b4fe44bef21aaa36b48fd5</sum></package><package arch="x86_64" name="nss" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-3.53.1-3.el7_9.x86_64.rpm</filename><sum type="sha256">50faf714fa7d06ecc9cabcfa5e31bfdd489b5a6e1a18e20736f8575c128b032b</sum></package><package arch="x86_64" name="nss-softokn-devel" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-devel-3.53.1-6.el7_9.x86_64.rpm</filename><sum type="sha256">0d0cac5d697578932de17afb870c3df1b9c244b0d9b718a127079b18531b3487</sum></package><package arch="i686" name="nss-pkcs11-devel" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-pkcs11-devel-3.53.1-3.el7_9.i686.rpm</filename><sum type="sha256">5e12474924151c097b3f2bde740bbdd83c387afd02498a1baefc13829bb7cb75</sum></package><package arch="x86_64" name="nss-tools" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-tools-3.53.1-3.el7_9.x86_64.rpm</filename><sum type="sha256">a1f9fa142ea8067c25ed2764b30e0e813ec4d1650d0fb278c73afc1f64fbc787</sum></package><package arch="x86_64" name="nss-softokn" release="6.el7_9" src="nss-softokn-3.53.1-6.el7_9.src.rpm" version="3.53.1"><filename>nss-softokn-3.53.1-6.el7_9.x86_64.rpm</filename><sum type="sha256">4875de4d0a8cda97d3e56860fbecd2284818e04a30520087d0f0e84fd958bce3</sum></package><package arch="x86_64" name="nspr-devel" release="2.el7_9" src="nspr-4.25.0-2.el7_9.src.rpm" version="4.25.0"><filename>nspr-devel-4.25.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">dc2cbeebe55c53402d9a5a92ec9bc3f0e479b8e5b26d2fb7ab73370586edd447</sum></package><package arch="i686" name="nspr" release="2.el7_9" src="nspr-4.25.0-2.el7_9.src.rpm" version="4.25.0"><filename>nspr-4.25.0-2.el7_9.i686.rpm</filename><sum type="sha256">b2a769c0f5a9bf9cd471371b1ce23fb1db144a7fd1e4147634136668b6fd9349</sum></package><package arch="x86_64" name="nss-devel" release="3.el7_9" src="nss-3.53.1-3.el7_9.src.rpm" version="3.53.1"><filename>nss-devel-3.53.1-3.el7_9.x86_64.rpm</filename><sum type="sha256">4fdcf0080023ce61c49172ad09c2e9b10d47698b82a79433039d3ff87ce3f64d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11756" id="CVE-2019-11756" title="Cve-2019-11756" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17006" id="CVE-2019-17006" title="Cve-2019-17006" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17023" id="CVE-2019-17023" title="Cve-2019-17023" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12400" id="CVE-2020-12400" title="Cve-2020-12400" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12401" id="CVE-2020-12401" title="Cve-2020-12401" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12402" id="CVE-2020-12402" title="Cve-2020-12402" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12403" id="CVE-2020-12403" title="Cve-2020-12403" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6829" id="CVE-2020-6829" title="Cve-2020-6829" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4076" id="RHSA-2020:4076-1" title="Rhsa-2020:4076-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1688958" id="1688958" title="Memory Leak: Libcurl Leaks 120 Bytes On Each Connection [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1724251" id="1724251" title="Make Tls 1.3 Work In Fips Mode [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1728436" id="1728436" title="Cve-2019-11719 Nss: Out-Of-Bounds Read When Importing Curve25519 Private Key" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1730988" id="1730988" title="Cve-2019-11727 Nss: Pkcs#1 V1.5 Signatures Can Be Used For Tls 1.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1737910" id="1737910" title="Name Constraints Validation: Cn Treated As Dns Name Even When Syntactically Invalid As Dns Name [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1774835" id="1774835" title="Cve-2019-11756 Nss: Use-After-Free In Sftk_Freesession Due To Improper Refcounting" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1775916" id="1775916" title="Cve-2019-17006 Nss: Check Length Of Inputs For Cryptographic Primitives" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1779325" id="1779325" title="When Nss_Sdb_Use_Cache Not Set, After Curl Access Https, Dentry Increase But Never Released - Consider Alternative Algorithm For Benchmarking Access Call In Sdb_Measureaccess" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1791225" id="1791225" title="Cve-2019-17023 Nss: Tls 1.3 Helloretryrequest Downgrade Request Sets Client Into Invalid State" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1804015" id="1804015" title="Running Ipa-Backup Continuously Causes Httpd To Crash And Makes It Irrecoverable" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1826187" id="1826187" title="Cve-2020-6829 Nss: Side Channel Attack On Ecdsa Signature Generation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1826231" id="1826231" title="Cve-2020-12402 Nss: Side Channel Vulnerabilities During Rsa Key Generation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1851294" id="1851294" title="Cve-2020-12401 Nss: Ecdsa Timing Attack Mitigation Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1853983" id="1853983" title="Cve-2020-12400 Nss: P-384 And P-521 Implementation Uses A Side-Channel Vulnerable Modular Inversion Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1868931" id="1868931" title="Cve-2020-12403 Nss: Chacha20-Poly1305 Decryption With Undersized Tag Leads To Out-Of-Bounds Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1870885" id="1870885" title="Kdf-Self-Tests-Induced Changes For Nss In Rhel 7.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4079-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* QEMU: usb: out-of-bounds r/w access issue while processing usb packets (CVE-2020-14364) 
* QEMU: slirp: use-after-free in ip_reass() function in ip_input.c (CVE-2020-1983)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-img" release="175.el7_9.1" src="qemu-kvm-1.5.3-175.el7_9.1.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-175.el7_9.1.x86_64.rpm</filename><sum type="sha256">cc234b4588abcd0ace2c803e27f48acda0fdbd096ca6f37c4165f7b9af872a60</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="175.el7_9.1" src="qemu-kvm-1.5.3-175.el7_9.1.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-175.el7_9.1.x86_64.rpm</filename><sum type="sha256">780e0463b252a18a14de1b3be1627dfd4eff587bfe3e83a798a52422463cf1f4</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="175.el7_9.1" src="qemu-kvm-1.5.3-175.el7_9.1.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-175.el7_9.1.x86_64.rpm</filename><sum type="sha256">8176a5ae74de01a8446831210e7e4ac7d83a5eafaa628b4e447fbf28d716ba63</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="175.el7_9.1" src="qemu-kvm-1.5.3-175.el7_9.1.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-175.el7_9.1.x86_64.rpm</filename><sum type="sha256">6bbc2982e31448005f29f6958c4a3cf6103d542e2ae8395d4163eb14fe7cabf8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14364" id="CVE-2020-14364" title="Cve-2020-14364" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1983" id="CVE-2020-1983" title="Cve-2020-1983" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4079" id="RHSA-2020:4079-1" title="Rhsa-2020:4079-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1829825" id="1829825" title="Cve-2020-1983 Qemu: Slirp: Use-After-Free In Ip_Reass() Function In Ip_Input.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1869201" id="1869201" title="Cve-2020-14364 Qemu: Usb: Out-Of-Bounds R/W Access Issue While Processing Usb Packets" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4080-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 (CVE-2020-15673) 
* Mozilla: Integer overflow in nsJPEGEncoder::emptyOutputBuffer (CVE-2020-12422) 
* Mozilla: X-Frame-Options bypass using object or embed tags (CVE-2020-15648) 
* Mozilla: Bypassing iframe sandbox when allowing popups (CVE-2020-15653) 
* Mozilla: Type confusion for special arguments in IonMonkey (CVE-2020-15656) 
* Mozilla: XSS when pasting attacker-controlled data into a contenteditable element (CVE-2020-15676) 
* Mozilla: Download origin spoofing via redirect (CVE-2020-15677) 
* Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario (CVE-2020-15678) 
* Mozilla: WebRTC permission prompt could have been bypassed by a compromised content process (CVE-2020-12424) 
* Mozilla: Out of bound read in Date.parse() (CVE-2020-12425) 
* Mozilla: Custom cursor can overlay user interface (CVE-2020-15654) 
* Mozilla: Overriding file type when saving to disk (CVE-2020-15658)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.3.0-1.el7_9.src.rpm" version="78.3.0"><filename>firefox-78.3.0-1.el7_9.i686.rpm</filename><sum type="sha256">60d7ccbae0fb2e7efd40487513ffa31855c8ffc70640fa40f3fc0632303be2fd</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.3.0-1.el7_9.src.rpm" version="78.3.0"><filename>firefox-78.3.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">d32524acf8d66c8f275ec8f19eac5c77f0c48f37d45eb3086f01118fa87a5862</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12422" id="CVE-2020-12422" title="Cve-2020-12422" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12424" id="CVE-2020-12424" title="Cve-2020-12424" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12425" id="CVE-2020-12425" title="Cve-2020-12425" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15648" id="CVE-2020-15648" title="Cve-2020-15648" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15653" id="CVE-2020-15653" title="Cve-2020-15653" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15654" id="CVE-2020-15654" title="Cve-2020-15654" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15656" id="CVE-2020-15656" title="Cve-2020-15656" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15658" id="CVE-2020-15658" title="Cve-2020-15658" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15673" id="CVE-2020-15673" title="Cve-2020-15673" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15676" id="CVE-2020-15676" title="Cve-2020-15676" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15677" id="CVE-2020-15677" title="Cve-2020-15677" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15678" id="CVE-2020-15678" title="Cve-2020-15678" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4080" id="RHSA-2020:4080-1" title="Rhsa-2020:4080-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1861645" id="1861645" title="Cve-2020-15653 Mozilla: Bypassing Iframe Sandbox When Allowing Popups" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1861646" id="1861646" title="Cve-2020-15656 Mozilla: Type Confusion For Special Arguments In Ionmonkey" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1861647" id="1861647" title="Cve-2020-15658 Mozilla: Overriding File Type When Saving To Disk" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1861649" id="1861649" title="Cve-2020-15654 Mozilla: Custom Cursor Can Overlay User Interface" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1868842" id="1868842" title="Warnings Displayed When Removing Firefox Package [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1872537" id="1872537" title="Cve-2020-15648 Mozilla: X-Frame-Options Bypass Using Object Or Embed Tags" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1872538" id="1872538" title="Cve-2020-12422 Mozilla: Integer Overflow In Nsjpegencoder::Emptyoutputbuffer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1872539" id="1872539" title="Cve-2020-12424 Mozilla: Webrtc Permission Prompt Could Have Been Bypassed By A Compromised Content Process" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1872540" id="1872540" title="Cve-2020-12425 Mozilla: Out Of Bound Read In Date.Parse()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1881664" id="1881664" title="Cve-2020-15677 Mozilla: Download Origin Spoofing Via Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1881665" id="1881665" title="Cve-2020-15676 Mozilla: Xss When Pasting Attacker-Controlled Data Into A Contenteditable Element" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1881666" id="1881666" title="Cve-2020-15678 Mozilla: When Recursing Through Layers While Scrolling, An Iterator May Have Become Invalid, Resulting In A Potential Use-After-Free Scenario" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1881667" id="1881667" title="Cve-2020-15673 Mozilla: Memory Safety Bugs Fixed In Firefox 81 And Firefox Esr 78.3" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4082-1</id><title>Squid</title><description>Security Fix(es): 
* squid: HTTP Request Smuggling could result in cache poisoning (CVE-2020-15810) 
* squid: HTTP Request Splitting could result in cache poisoning (CVE-2020-15811) 
* squid: Information Disclosure issue in FTP Gateway (CVE-2019-12528) 
* squid: Improper input validation issues in HTTP Request processing (CVE-2020-8449) 
* squid: Buffer overflow in reverse-proxy configurations (CVE-2020-8450) 
* squid: Request smuggling and poisoning attack against the HTTP cache (CVE-2020-15049) 
* squid: Improper input validation could result in a DoS (CVE-2020-24606)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="squid-migration-script" release="17.el7_9.4" src="squid-3.5.20-17.el7_9.4.src.rpm" version="3.5.20"><filename>squid-migration-script-3.5.20-17.el7_9.4.x86_64.rpm</filename><sum type="sha256">8b1a3a2a254b270fd04a7dd2f33021ff52c0e5a558ad766f1130305e0b5229c8</sum></package><package arch="x86_64" epoch="7" name="squid" release="17.el7_9.4" src="squid-3.5.20-17.el7_9.4.src.rpm" version="3.5.20"><filename>squid-3.5.20-17.el7_9.4.x86_64.rpm</filename><sum type="sha256">ecd073112bc98e8306973eadf51161a824607ae734f6035cf67e1d6b648e4b1c</sum></package><package arch="x86_64" epoch="7" name="squid-sysvinit" release="17.el7_9.4" src="squid-3.5.20-17.el7_9.4.src.rpm" version="3.5.20"><filename>squid-sysvinit-3.5.20-17.el7_9.4.x86_64.rpm</filename><sum type="sha256">23e389475386958ead15f709c786b5aef35748f47648d7ef0fb23fcf0b218c67</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12528" id="CVE-2019-12528" title="Cve-2019-12528" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15049" id="CVE-2020-15049" title="Cve-2020-15049" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15810" id="CVE-2020-15810" title="Cve-2020-15810" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15811" id="CVE-2020-15811" title="Cve-2020-15811" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24606" id="CVE-2020-24606" title="Cve-2020-24606" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8449" id="CVE-2020-8449" title="Cve-2020-8449" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8450" id="CVE-2020-8450" title="Cve-2020-8450" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4082" id="RHSA-2020:4082-1" title="Rhsa-2020:4082-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1798534" id="1798534" title="Cve-2019-12528 Squid: Information Disclosure Issue In Ftp Gateway" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1798540" id="1798540" title="Cve-2020-8449 Squid: Improper Input Validation Issues In Http Request Processing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1798552" id="1798552" title="Cve-2020-8450 Squid: Buffer Overflow In Reverse-Proxy Configurations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1852550" id="1852550" title="Cve-2020-15049 Squid: Request Smuggling And Poisoning Attack Against The Http Cache" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1871700" id="1871700" title="Cve-2020-15810 Squid: Http Request Smuggling Could Result In Cache Poisoning" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1871702" id="1871702" title="Cve-2020-15811 Squid: Http Request Splitting Could Result In Cache Poisoning" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1871705" id="1871705" title="Cve-2020-24606 Squid: Improper Input Validation Could Result In A Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4163-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 81 and Firefox ESR 78.3 (CVE-2020-15673) 
* Mozilla: XSS when pasting attacker-controlled data into a contenteditable element (CVE-2020-15676) 
* Mozilla: Download origin spoofing via redirect (CVE-2020-15677) 
* Mozilla: When recursing through layers while scrolling, an iterator may have become invalid, resulting in a potential use-after-free scenario (CVE-2020-15678)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.3.1-1.el7_9.src.rpm" version="78.3.1"><filename>thunderbird-78.3.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">8cb9469cd9c20428bd5bf8d36bc3fc27f29a59bb3479ebc96ab319f2ce2aabdb</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4163" id="RHSA-2020:4163-1" title="Rhsa-2020:4163-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4187-1</id><title>Important: Spice And Spice-Gtk</title><description>The spice-gtk packages provide a GIMP Toolkit (GTK+) widget for Simple Protocol for Independent Computing Environments (SPICE) clients. Both Virtual Machine Manager and Virtual Machine Viewer can make use of this widget to access virtual machines using the SPICE protocol.

Security Fix(es):

* spice: multiple buffer overflow vulnerabilities in QUIC decoding code (CVE-2020-14355)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="spice-server" release="9.el7_9.1" src="spice-0.14.0-9.el7_9.1.src.rpm" version="0.14.0"><filename>spice-server-0.14.0-9.el7_9.1.x86_64.rpm</filename><sum type="sha256">30ddab719cd3bda859be66754d7d019ffca626947b292b067a2a72dfe1a01a6d</sum></package><package arch="x86_64" name="spice-gtk3-vala" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-gtk3-vala-0.35-5.el7_9.1.x86_64.rpm</filename><sum type="sha256">262d414824db1a2bb0e8ee584ec73af35c3c7db6055033e89edc18aa4fd668a7</sum></package><package arch="x86_64" name="spice-glib-devel" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-glib-devel-0.35-5.el7_9.1.x86_64.rpm</filename><sum type="sha256">5668c3958f2bd0877b5c7434b6ecb4978e0477f7a16563bb3bfa182819435de7</sum></package><package arch="i686" name="spice-glib-devel" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-glib-devel-0.35-5.el7_9.1.i686.rpm</filename><sum type="sha256">6b893540268d67f008da133de195375193a3762a0d193247364e5d35047c66ce</sum></package><package arch="i686" name="spice-glib" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-glib-0.35-5.el7_9.1.i686.rpm</filename><sum type="sha256">9e0dabdc7afa3624b57a12126fc0ce4332d48a001957581c671df2452588e965</sum></package><package arch="x86_64" name="spice-gtk3-devel" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-gtk3-devel-0.35-5.el7_9.1.x86_64.rpm</filename><sum type="sha256">f1e2dba59dec195d5ab66ee51017e2c82d0f693d1da1a486030708b353c79849</sum></package><package arch="x86_64" name="spice-gtk3" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-gtk3-0.35-5.el7_9.1.x86_64.rpm</filename><sum type="sha256">1d890fc3d9e7b196242546c79cfd32d16da1136b607656068dc6e494ae0432f1</sum></package><package arch="x86_64" name="spice-glib" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-glib-0.35-5.el7_9.1.x86_64.rpm</filename><sum type="sha256">27dac680038754a54a867169760f0bde6a9c0de366c074ba11a3316893bd5e83</sum></package><package arch="i686" name="spice-gtk3" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-gtk3-0.35-5.el7_9.1.i686.rpm</filename><sum type="sha256">2ff0e30297f5cc7bad06deabaf27e3f4358401c3cdb42dfefd2a15d7389efe5a</sum></package><package arch="i686" name="spice-gtk3-devel" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-gtk3-devel-0.35-5.el7_9.1.i686.rpm</filename><sum type="sha256">ad0df4223041cd1c29b64383f16fc2695653d6501c31ecb9bd9dce0994238855</sum></package><package arch="x86_64" name="spice-gtk-tools" release="5.el7_9.1" src="spice-gtk-0.35-5.el7_9.1.src.rpm" version="0.35"><filename>spice-gtk-tools-0.35-5.el7_9.1.x86_64.rpm</filename><sum type="sha256">a689d51b6ae85dbbd313c4dd9733e45ab054009104bfd8cdd4f53ddfabe8f7d0</sum></package><package arch="x86_64" name="spice-server-devel" release="9.el7_9.1" src="spice-0.14.0-9.el7_9.1.src.rpm" version="0.14.0"><filename>spice-server-devel-0.14.0-9.el7_9.1.x86_64.rpm</filename><sum type="sha256">2b766e8ccc48003a1738820137238bc972b83cc48a6c1295d680c105fd7a51ad</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14355" id="CVE-2020-14355" title="Cve-2020-14355" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:4187" id="RHSA-2020:4187-1" title="Rhsa-2020:4187-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1868435" id="1868435" title="Cve-2020-14355 Spice: Multiple Buffer Overflow Vulnerabilities In Quic Decoding Code" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4276-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: net: bluetooth: type confusion while processing AMP packets (CVE-2020-12351) 
* kernel: net: bluetooth: information leak when processing certain AMP packets (CVE-2020-12352)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="bpftool" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">47cc98d79612c44ee4c50be036ff1202c827bacc377befbbe255b5e964fe5134</sum></package><package arch="noarch" name="kernel-doc" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.2.2.el7.noarch.rpm</filename><sum type="sha256">727a63e696b987d5633e3b1f12ac7506e0e6c8de8afa32f85e45451effb2aff2</sum></package><package arch="x86_64" name="kernel-headers" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">da5331ece8f1ff9c937d00d93ec8c1c92274df24d1e7b195011c9bacea3a120a</sum></package><package arch="x86_64" name="kernel" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">6c14fb888501068824f2ed38908bb795a5dced8da3ca3a110e10b291b79084b2</sum></package><package arch="x86_64" name="python-perf" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">0dc203103a8e108ebd3e9035912ca0c3c036b2495e563b21611cae6ce04b9ae1</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">243e81730c77eecf1958dcee6298e81ed0a91814ebcc940f777ac975caac5142</sum></package><package arch="x86_64" name="kernel-devel" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">e6af572c94419b586d36fa4592d7f067100928b0977cab2367d22cdaa053678e</sum></package><package arch="x86_64" name="perf" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">4f8c8280a6df9babc06d5b037f4e9892dd15a5814df3794afeebae843de1661e</sum></package><package arch="x86_64" name="kernel-tools" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">222d55b53701eb15e5f6faff4c9efbb061f6c50214ccab31f16c010eb3cc958a</sum></package><package arch="x86_64" name="kernel-debug" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">95227e1a8230974169c9b94c54634753c92c01eff32a5387731e006b4dceb4f8</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">8fc5c8d4c4b9c8824a39c471e5b7b1a7f2fbb955875cb93ee8ae5f2aa389bdb9</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.2.2.el7.noarch.rpm</filename><sum type="sha256">7a19019424a7b2bb7896b09adcc4e479eb6d809b7efff3d1e9387fa579f96b3f</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.2.2.el7" src="kernel-3.10.0-1160.2.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.2.2.el7.x86_64.rpm</filename><sum type="sha256">545d852acb5f838546dd9015a7c2dda4a03847b8fd77d35373ccbfd1ee6c50ef</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4276" id="RHSA-2020:4276-1" title="Rhsa-2020:4276-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4307-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781) 
* OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782) 
* OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) (CVE-2020-14792) 
* OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) (CVE-2020-14797) 
* OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) (CVE-2020-14803) 
* OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) (CVE-2020-14779) 
* OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) (CVE-2020-14796)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-static-libs-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">7773fe9ab00a5e8c1fa37599c574b80af7c1ee660b6c99e28a71207d48ced107</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-src-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">785df6e2691fd683771687fa700cff34019c9eb04cb47b8889d6ac893bb37be1</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-zip-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">dfdba17e9f0906b0f52585265c332e327a2a82f69723e8751c5d44cb735adb16</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-headless-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">4bf919398968b3130277688dc7cfcfa05884ff3075f03a968b2483ee714a7a92</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-zip-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">27f5b0fbd8d539fab8c1a4ea03126541add9095f6eb6a5117f17e91a5e89b81f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-jmods-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">fce83dfde7f0630f6f930fbd5397f0bed2fb0aa112ad8a717766dfe72382a090</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-devel-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">00d0710ee0f2d7fb402b45cc52980e660c7fd3c073124f5ab8d5a8c8fa1c05d2</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">7aaee6e13b69540fa095cf098931f029d21869f2f620cf21b8e04d1ffb78126d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-jmods-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">b357ecf4582909f59a3c364cc226ee82afe3b3a1ff6f4640abd93163eabf7b9b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-headless-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">a00bf0b70968ee49ec3a963c94ad6ae7e3aec54b16592b9af8a7b6aae4165507</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-headless-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">e454ea47a65bf2a519a48a11562b81125f4879bea34a5a8f3f06a7ad1fc4dca5</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">fd1c5e53b94b26df626a313c7db3b0c152f8ce9de178876b29ab259269b42341</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-jmods-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">7646e5a15007012257dae0968a551100a2a1097760531d183b8028a02d41ea5a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-demo-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">6d036817e9eff8bd9ab8b2c6579e62b1bd65e5d6deb3e63e7fcb1ac58d17f54d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-demo-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">d62dc9f69a52e7342d29a506d12f244ff1ed71c35bb9d98e9463b80896699839</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-src-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">843c4d95590a7a3f422307ecad5a20705513c70ea54d3c384ba0499e4423bb80</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-src-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">a34d858422fd29ddaeca302b07a4ae044c1df031e7fbdd9e85d80405ebd3d84e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-demo-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">14b2f5753b2aaa759ab0f96933f8ce6e26c91b6edd91a5545d3a2dd3ad39490a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-devel-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">d6208d100a97ed19eecc9f95cca5ce4d7f635c6c4caff6805a86b34dfde8bad6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">980fdd5684afb67ba596416cd0ddb2883f0957474269e36b86e5063a43855b6f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-jmods-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">3c57bd28c1411992c646173d8a33781d72a541ea82d98483398fef0793276115</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">c7c73df4d3bf0a3af20c68f89b944f55df8ac09ab84cb4c16c5e4b53cfe48317</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-zip-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">8996bc1bf68f25eacd32125341f0fd1650b6e1ba3a7d482c77bb348c58f2a45d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">927bcc99f1a34ca8fa03cdcd6e6adacc2443d4d20ed3a66350d6f330620c64ed</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-headless-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">9463ccd7aefcf1ab73ae5fe04106befaeef8b28a0366ba35b2d03dc604f29bbd</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-devel-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">f996fcb1bae7301ace4b33f230c7237d608983c1b357c30b92596293af396be9</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-static-libs-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">290b0863990ac66b00fb4083c4fa0cd5652aa7dd425b6d7d0125f55add12540b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">7406a9cbd48f8589fe8d021f10a10e13087b1d25ba804f38899e45af24af7648</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-src-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">60c79a1a8ead07a961e19e44366f566b078c1e072ed131ca67b8fb8e4c449df0</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-devel-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">75b390535e29603b8704b9f7a10850d6ec91bb8513c78638bf71dac9dd29c4b0</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-zip-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">cf2e2b4b7d6b2a08ececc865b2db978d4c8ac3e5ab27bc1bdbb22628d6badc00</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">976242e401e45c3996fceab5cdac2d634b5b8fe950e37f1702b881557951ef71</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-demo-debug-11.0.9.11-0.el7_9.i686.rpm</filename><sum type="sha256">2dea15a7b85e8b1588d2903733f00dcc9f960170d0e46d94cbb178e847b5205f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_9" src="java-11-openjdk-11.0.9.11-0.el7_9.src.rpm" version="11.0.9.11"><filename>java-11-openjdk-javadoc-debug-11.0.9.11-0.el7_9.x86_64.rpm</filename><sum type="sha256">8f33384eb89293e170cc12a5699a793ea71f7d2bd7b116da06375d6a8062449d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4307" id="RHSA-2020:4307-1" title="Rhsa-2020:4307-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4310-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683) 
* chromium-browser: Use after free in WebRTC (CVE-2020-15969)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-10-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.4.0-1.el7_9.src.rpm" version="78.4.0"><filename>firefox-78.4.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">0f7cecb12ce176dfe68f58e23a8658f885e895967d328d6dddf495a467874d40</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.4.0-1.el7_9.src.rpm" version="78.4.0"><filename>firefox-78.4.0-1.el7_9.i686.rpm</filename><sum type="sha256">5368bac75f97a694f3d50cc99544bb65499f5d8bc09af1b0212e2a7b49b5590d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4310" id="RHSA-2020:4310-1" title="Rhsa-2020:4310-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4350-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Credentials sent over unencrypted LDAP connection (JNDI, 8237990) (CVE-2020-14781) 
* OpenJDK: Certificate blacklist bypass via alternate certificate encodings (Libraries, 8237995) (CVE-2020-14782) 
* OpenJDK: Integer overflow leading to out-of-bounds access (Hotspot, 8241114) (CVE-2020-14792) 
* OpenJDK: Incomplete check for invalid characters in URI to path conversion (Libraries, 8242685) (CVE-2020-14797) 
* OpenJDK: Race condition in NIO Buffer boundary checks (Libraries, 8244136) (CVE-2020-14803) 
* OpenJDK: High memory usage during deserialization of Proxy class with many interfaces (Serialization, 8236862) (CVE-2020-14779) 
* OpenJDK: Missing permission check in path to URI conversion (Libraries, 8242680) (CVE-2020-14796)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-10-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-src-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">84315cb088343d080c977e86a915e6409155b31470e1dd809df045148936bf74</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">8e53e8a1970a57d292b99eafb9991e560ec8637365609a3beee02c75712490d3</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-devel-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">19c42b5702f1772fb858a7dd625a9b7b25ae36a5a446343251b25d688f52344e</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.272.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">1aa199552998d535623ef176edb0599d6e3ce6ea5c2b304c46e91633ca9c42dd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">291c256aaa593a5b2fadc2c71892cc2cfd49cac62877de65c4d7333d6d1e2766</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">11da3b9851328b21be471ff58700b9b2f5bd82687423bb4aeff49ad5fe74bde7</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-src-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">23e32a42c36201c41a19045602fe6a68c373dc8a114ceea2847e3ff69c95af67</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">0166f48d73f52d1b4960002169d5fdc6a3bc2dee12fb8cd565131982b16df6ac</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">427823d292ddc2e1912dbc3efd235617a03bcc39f55eb6ab6c73999879440526</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">de17e98792cf998ea57892d253aa9a014d87b676323cb00ffe23ffc808a855c1</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-debug-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">2fff35aad1f8f8087da29e944b74e864cf77a51390c4b6a8da086ea967ffb7dd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-devel-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">3e2f48307168177298cebba77c02b2add7e979bb11604f1884e6ac3e5c7ae81b</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">75a2baf703633777a09a0843420f231b218fb5ccf667034b9217546011a5f1f4</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.272.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">e6a43a8ce33d46f21008e0f57a5e9274718a5846f796b6fd574fd749ad0cd256</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.272.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">e4ff55c6a3974510ed0d5a27e453efe217672a67b02dcaf63899407789e101aa</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">9652581e291a509533b2e4ee788ace94e553dbaaeee77f9bea281899d9280f6b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-src-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">cb363849f85f163f11d69c5721b4171bae4f79393951dd15de33b722872d9d0c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">944ae8a673c37a87563b11c7a02b258b99e4ee270605ef31999f3e742fa7b203</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-demo-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">f69ec149f70f7f866239649eb6f5c5a4c0b8fd826fc431f07b08aa8d93a3c054</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-headless-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">c32d7e9e4972acc71800876a40238760a778cca2fb2c037511180e03720602c8</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-accessibility-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">5f035231f2a2dfb229860b0c91dac5dc62d9fe8e22f095fc467d08875dc80a5f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-src-debug-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">d16c13b69c6aa06ee4183431a1edeb59292c109ae4c060ae4ad634d8edca96e3</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">daaa6fd0a3d4bacf1db37e863d92ecee085d896317a68639f52ed55426d1581c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.272.b10-1.el7_9.i686.rpm</filename><sum type="sha256">42bf03a22cc2276874f1429ebc2578e1c28675d80ff51a26adcfca2400c960fc</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-headless-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">ccb82da1647e57bbc6d08fdc599b42fd105616c8daa1899f3729ea126caa883a</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-javadoc-1.8.0.272.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">9a8f96cf3e2853d9be82443633e43a8e6e6272b20a9c2d38fbb40f4621c941a5</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">787f313e98da032ef62f0dfb22807715b5919725bb31240e48f28826aeb1b884</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.src.rpm" version="1.8.0.272.b10"><filename>java-1.8.0-openjdk-1.8.0.272.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">4b751ddb7f6a4e3be1a7475be83045a254e457b2320ef35a477e8aa79e0c7eef</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4350" id="RHSA-2020:4350-1" title="Rhsa-2020:4350-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4907-1</id><title>Freetype</title><description>Security Fix(es): 
* freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png (CVE-2020-15999)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="freetype-demos" release="14.el7_9.1" src="freetype-2.8-14.el7_9.1.src.rpm" version="2.8"><filename>freetype-demos-2.8-14.el7_9.1.x86_64.rpm</filename><sum type="sha256">4bfcf2c7e50e92c1f2d9409f26c5831b3896ec5ce1f8e47ffa61da84870812b6</sum></package><package arch="i686" name="freetype" release="14.el7_9.1" src="freetype-2.8-14.el7_9.1.src.rpm" version="2.8"><filename>freetype-2.8-14.el7_9.1.i686.rpm</filename><sum type="sha256">856e5771864d72fc764d1a8042323f58fa6a121257e801239a8283d4034dd58c</sum></package><package arch="x86_64" name="freetype-devel" release="14.el7_9.1" src="freetype-2.8-14.el7_9.1.src.rpm" version="2.8"><filename>freetype-devel-2.8-14.el7_9.1.x86_64.rpm</filename><sum type="sha256">a55d3145c81d7f556319415342886d99a289c7a2c055ff488a8e8ec4eaeb56c3</sum></package><package arch="x86_64" name="freetype" release="14.el7_9.1" src="freetype-2.8-14.el7_9.1.src.rpm" version="2.8"><filename>freetype-2.8-14.el7_9.1.x86_64.rpm</filename><sum type="sha256">0a2506c221bec596a80aac2b5f9956724acd36ff358e33a36d7a72ab9028ed34</sum></package><package arch="i686" name="freetype-devel" release="14.el7_9.1" src="freetype-2.8-14.el7_9.1.src.rpm" version="2.8"><filename>freetype-devel-2.8-14.el7_9.1.i686.rpm</filename><sum type="sha256">b490be3e3b925087ecd0ba1133a0fb1f6d84b413a04d69e80a0a3c4040a6d12c</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4907" id="RHSA-2020:4907-1" title="Rhsa-2020:4907-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4908-1</id><title>Libx11</title><description>Security Fix(es): 
* libX11: integer overflow leads to double free in locale handling (CVE-2020-14363)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libX11" release="3.el7_9" src="libX11-1.6.7-3.el7_9.src.rpm" version="1.6.7"><filename>libX11-1.6.7-3.el7_9.x86_64.rpm</filename><sum type="sha256">6e8e14ca7f672249ccf93b21f9a05353d9f869e8c9e82c21e193d279eacf068d</sum></package><package arch="x86_64" name="libX11-devel" release="3.el7_9" src="libX11-1.6.7-3.el7_9.src.rpm" version="1.6.7"><filename>libX11-devel-1.6.7-3.el7_9.x86_64.rpm</filename><sum type="sha256">f19a029ec329dc1e1243c645ea26b5a7f62dabf74c5b549969d58b13561ffacd</sum></package><package arch="i686" name="libX11-devel" release="3.el7_9" src="libX11-1.6.7-3.el7_9.src.rpm" version="1.6.7"><filename>libX11-devel-1.6.7-3.el7_9.i686.rpm</filename><sum type="sha256">1dde8930cae65481b398449efa31c5cfb59d23826f5fa96d9e52cb282f70b99f</sum></package><package arch="noarch" name="libX11-common" release="3.el7_9" src="libX11-1.6.7-3.el7_9.src.rpm" version="1.6.7"><filename>libX11-common-1.6.7-3.el7_9.noarch.rpm</filename><sum type="sha256">381c93461e119984e0434b571d08714051e8aa858e2e2094b1bf2d0d1edc6d75</sum></package><package arch="i686" name="libX11" release="3.el7_9" src="libX11-1.6.7-3.el7_9.src.rpm" version="1.6.7"><filename>libX11-1.6.7-3.el7_9.i686.rpm</filename><sum type="sha256">fafea10ff0634bedb1da4a7f7bd5dc1d0ac3b3d282e8c0db6348a5cc6311c657</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4908" id="RHSA-2020:4908-1" title="Rhsa-2020:4908-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4909-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 82 and Firefox ESR 78.4 (CVE-2020-15683) 
* chromium-browser: Use after free in WebRTC (CVE-2020-15969)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.4.0-1.el7_9.src.rpm" version="78.4.0"><filename>thunderbird-78.4.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">25bc3fd79765278178210c5f457310376fb4fdc89b63a3716d1622c585ef860f</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4909" id="RHSA-2020:4909-1" title="Rhsa-2020:4909-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:4910-1</id><title>Xorg-X11-Server</title><description>Security Fix(es): 
* xorg-x11-server: Out-of-bounds access in XkbSetNames function (CVE-2020-14345) 
* xorg-x11-server: Integer underflow in the X input extension protocol (CVE-2020-14346) 
* xorg-x11-server: XkbSelectEvents integer underflow privilege escalation vulnerability (CVE-2020-14361) 
* xorg-x11-server: XRecordRegisterClients integer underflow privilege escalation vulnerability (CVE-2020-14362)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-Xvfb" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">f6838ab4d46d3054257b828a7aa09da6f020cb48bf424014e1be418934f66c74</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">59a891a6804e0ea057830bf640a4a7e10fd3488c6fd198af5ff0ccaa60ebafdb</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">5b1c4f1a7d447b4905e86e7f92cc9afe83d803cadacd5e87d2e0cbf650f0f8d9</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">09033bb3f0b3195c416ec4fd68f5def0470d5a45fb96b8ac599fcf8db93c9ec5</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">e030ba439f9e18e27c1304a0037acde04069f35196f4d1edcb1e520ebb5b9a56</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">9ebc5b0228dc8be2571033eb26e2cb3cee0ac8bb36f72b7366734efbf3c25748</sum></package><package arch="noarch" name="xorg-x11-server-source" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-12.el7_9.noarch.rpm</filename><sum type="sha256">a61f91a5c7e074ebe99958241cf0e74824ed077b38d3eed8ce45ade8cd175ae6</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">10e5862388d8b6540d5d679da3bdd3164dcfd8bf2f7719cdbabb6921943bc62b</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-12.el7_9.x86_64.rpm</filename><sum type="sha256">36769b74f79e05de43a4c183a16bcd665b4d5c8e9015f7bcebdbfbbd472521c7</sum></package><package arch="i686" name="xorg-x11-server-devel" release="12.el7_9" src="xorg-x11-server-1.20.4-12.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-12.el7_9.i686.rpm</filename><sum type="sha256">91ea49af08c78dbd43a08054b978fc8c15fed8ff793db9324e1388e9f68989d4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:4910" id="RHSA-2020:4910-1" title="Rhsa-2020:4910-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5002-1</id><title>Curl</title><description /><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="curl" release="59.el7_9.1" src="curl-7.29.0-59.el7_9.1.src.rpm" version="7.29.0"><filename>curl-7.29.0-59.el7_9.1.x86_64.rpm</filename><sum type="sha256">ba54d7541f99b9c1b96d3b33b9c2e18d90849d7cb66887cc3a1bc986b7c7f482</sum></package><package arch="i686" name="libcurl-devel" release="59.el7_9.1" src="curl-7.29.0-59.el7_9.1.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-59.el7_9.1.i686.rpm</filename><sum type="sha256">5807aead12a31810010e2917c43ef8bc265f212fb924fb1601e9ccf1704807d8</sum></package><package arch="i686" name="libcurl" release="59.el7_9.1" src="curl-7.29.0-59.el7_9.1.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-59.el7_9.1.i686.rpm</filename><sum type="sha256">a1e0db291e8a9c734565c398e9a27b6c860183f135ea3a9d7cc5c228584dd083</sum></package><package arch="x86_64" name="libcurl" release="59.el7_9.1" src="curl-7.29.0-59.el7_9.1.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-59.el7_9.1.x86_64.rpm</filename><sum type="sha256">10d4a066a84d6742cd80208aa0113d24ee91fa5f9920eb44afb28547ed632f79</sum></package><package arch="x86_64" name="libcurl-devel" release="59.el7_9.1" src="curl-7.29.0-59.el7_9.1.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-59.el7_9.1.x86_64.rpm</filename><sum type="sha256">498795c1e33bc252ef6ba34b65cae08deff1823ffc0ba48263b049e343cea197</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8177" id="CVE-2020-8177" title="Cve-2020-8177" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5002" id="RHSA-2020:5002-1" title="Rhsa-2020:5002-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1847915" id="1847915" title="Cve-2020-8177 Curl: Incorrect Argument Check Can Allow Remote Servers To Overwrite Local Files" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5003-1</id><title>Fence-Agents</title><description /><severity>low</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="fence-agents-amt-ws" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-amt-ws-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">19c1b59f34566a07a680e1125699a5601016c4f319a0b75705d98377c2492973</sum></package><package arch="x86_64" name="fence-agents-brocade" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-brocade-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">f02e59eb643f3e54fc7b389da7546ae132453de6cacbde4abbd99385e56ea2e5</sum></package><package arch="x86_64" name="fence-agents-heuristics-ping" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-heuristics-ping-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">94d69c86f62a895488c9b506d6f5cfae82631017a45cb41c0ca9c35c8e1d215a</sum></package><package arch="x86_64" name="fence-agents-aws" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-aws-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">625fa195bf09fd0b2ff93c606f5a10b4b48607c4e7c658eef69c693e2a4349ad</sum></package><package arch="x86_64" name="fence-agents-ifmib" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ifmib-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">f8f38967fe30cdad7aad67901ffaa6bf47b8469b46d6c0e1e3d11aaf7afee7b8</sum></package><package arch="x86_64" name="fence-agents-apc-snmp" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-apc-snmp-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">5a6ed6aaba21a98dcdd9f4401143fc147a0c989312f25d7cbe1db6834b413402</sum></package><package arch="x86_64" name="fence-agents-cisco-ucs" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-cisco-ucs-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">e80734486c4d4890d8320ff21ae677068bca71fe5fe2ba91ff0f5829b4940c1c</sum></package><package arch="x86_64" name="fence-agents-ipmilan" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ipmilan-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">ecf3927df5579f5a536b62f71366d279a3915439e331cd613df65b75c8a8ceed</sum></package><package arch="x86_64" name="fence-agents-emerson" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-emerson-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">93e973edf16a36d9dce880b159f61ff25e2e8ec26970ea2a50ddf29bc65f9b54</sum></package><package arch="x86_64" name="fence-agents-eaton-snmp" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-eaton-snmp-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">87cf4a8df3796539e14f2e45e097ddff5962023dab57efce4dae747dc8706a87</sum></package><package arch="x86_64" name="fence-agents-bladecenter" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-bladecenter-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">97effd14d1127ea087f512a63b22ed75bec9dc9b3cc841f314ffca633bd5a723</sum></package><package arch="x86_64" name="fence-agents-ilo-mp" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ilo-mp-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">9d8ff4d2b0dd185e45ba025d522050a6642a47d963f089b3d899c3e757e15ec8</sum></package><package arch="x86_64" name="fence-agents-ipdu" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ipdu-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">06e39bab1ee277ae744255675cfbb44271fd3f3c903323f1a0917f1f7c322f14</sum></package><package arch="x86_64" name="fence-agents-eps" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-eps-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">acda91e12e2d0ac30de4dcf54773de27a5ddf0d8d2c59ac643733ef5d7d0d725</sum></package><package arch="x86_64" name="fence-agents-compute" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-compute-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">b1a61cc6f553521b7e4e4056b66462718b8e5b59466f1ea3d18c75603bad5cfc</sum></package><package arch="x86_64" name="fence-agents-hpblade" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-hpblade-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">21d3e84059bb8d99d386f4e742374915338e840d53b783e2f45c5bca9fd43138</sum></package><package arch="x86_64" name="fence-agents-azure-arm" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-azure-arm-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">1d8b493c7e010d1bebcde306db5209fddc3e122f7ef2ac1332d13fd044061e9e</sum></package><package arch="x86_64" name="fence-agents-aliyun" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-aliyun-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">decc5ac47e2f630fffdbb821ca6ebf7b38269bbae0565bb8410589351ba59a31</sum></package><package arch="x86_64" name="fence-agents-cisco-mds" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-cisco-mds-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">02a116fb8545da6c0b78a4c1122e6aa029ed2baded2336a6539bd3744f282103</sum></package><package arch="x86_64" name="fence-agents-gce" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-gce-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">6d650ff5a7bc1d93d552eed702fb8ff4af0e255a6e012e1ddb3971204bc91755</sum></package><package arch="x86_64" name="fence-agents-redfish" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-redfish-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">07122c2fadde5f1434def7ae61dd0550c73eb7309b3f87b309c0a2991b14b217</sum></package><package arch="x86_64" name="fence-agents-vmware-soap" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-vmware-soap-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">afac04d76ee59901927a64348eb93e4ea0c48a164cc0e2029847e8b26edc0ddc</sum></package><package arch="x86_64" name="fence-agents-kdump" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-kdump-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">8d6a4bc8e0c2082f7bb2fc692d41ccd385925ae94b94fe095591a846c940c7ce</sum></package><package arch="x86_64" name="fence-agents-rhevm" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-rhevm-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">798e4abc8535513ab7c780003067d0d787535100f412f57adad927899771c7c9</sum></package><package arch="x86_64" name="fence-agents-rsa" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-rsa-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">891ca7ba40226f9600a88b4c203b435de729c7aad318c3d08794bf769091c792</sum></package><package arch="x86_64" name="fence-agents-intelmodular" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-intelmodular-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">9d4cf92a8bd0efc8af62ffa59e709ac8ea92a414e65d08dcb1915cae96da714f</sum></package><package arch="x86_64" name="fence-agents-scsi" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-scsi-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">17c615fffd7a175d4158fe6c35728dd9b713c112f9e99529fc0708769b90fb70</sum></package><package arch="x86_64" name="fence-agents-ilo-moonshot" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ilo-moonshot-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">7a5a2b4de31ed4b73eb64ea6166a28dca4bc14a5a6ed7d2ac80c8d1e5e18260a</sum></package><package arch="x86_64" name="fence-agents-common" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-common-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">3113ef7fa8701385c7a5c6f61e717ac7835c22d5799875b014af41ab19820f98</sum></package><package arch="x86_64" name="fence-agents-wti" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-wti-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">c68f45aa1282b59a0f376da3c37f2f012d3bae05ea7c9c38c304b04359cb989e</sum></package><package arch="x86_64" name="fence-agents-sbd" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-sbd-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">7d1d59df509363d91c0363179db6fcc242c229a2d617512faad157605bb5b391</sum></package><package arch="x86_64" name="fence-agents-drac5" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-drac5-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">39f494fb8d21bdde0e273d8a4c3110f811ba071cf2e9bb1a137ff0bc70799f05</sum></package><package arch="x86_64" name="fence-agents-mpath" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-mpath-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">77d14651c7a89a3873fcb841320bc6c4f37aa9bbcb4b118c292899eb16afad4b</sum></package><package arch="x86_64" name="fence-agents-all" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-all-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">af1d5dde503828705086ed1cfd537bafb76e83b568ad1063e3ae8374cbe99153</sum></package><package arch="x86_64" name="fence-agents-rsb" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-rsb-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">b4ddaf6fcca6625e8b557cd3c7de1d0a230f23a22a0888d793ab0b0ebf9dbb48</sum></package><package arch="x86_64" name="fence-agents-ilo-ssh" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ilo-ssh-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">57abe5040417b44ca1df4883b214df169899cfd1775a2d76c76389f600741506</sum></package><package arch="x86_64" name="fence-agents-ibmblade" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ibmblade-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">c3cf909e55970318c1441c421986aace5355b213f0f27fd605c1929384f6d03c</sum></package><package arch="x86_64" name="fence-agents-lpar" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-lpar-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">b268844e144424fb2899eb26e623c12278f50a473077c04f46012cb21459cc7d</sum></package><package arch="x86_64" name="fence-agents-vmware-rest" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-vmware-rest-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">9cfec09f827118a1a090fd807df6f879dc8c0c728d097cdc1c32225d4d967a25</sum></package><package arch="x86_64" name="fence-agents-virsh" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-virsh-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">68430c1c9dd9c303ef148a63c8ae963e773a7baad7617607883d068bb71d43a7</sum></package><package arch="x86_64" name="fence-agents-ilo2" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-ilo2-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">41ee415447647eed027bb185416b14ded13e68e705ac15690df996d2d3c48084</sum></package><package arch="x86_64" name="fence-agents-apc" release="41.el7_9.2" src="fence-agents-4.2.1-41.el7_9.2.src.rpm" version="4.2.1"><filename>fence-agents-apc-4.2.1-41.el7_9.2.x86_64.rpm</filename><sum type="sha256">8d62c1b3065122e397a7cb931437908eee8860e1f8174171619a6fa1c01fe69d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11078" id="CVE-2020-11078" title="Cve-2020-11078" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5003" id="RHSA-2020:5003-1" title="Rhsa-2020:5003-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1845937" id="1845937" title="Cve-2020-11078 Python-Httplib2: Crlf Injection Via An Attacker Controlled Unescaped Part Of Uri For Httplib2.Http.Request Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1860545" id="1860545" title="Fence_Lpar: Long Username, Hmc Hostname, Or Managed System Name Causes Failures [Rhel 7] [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1862024" id="1862024" title="Instanceha Does Not Evacuate Instances Created With Private Flavor In Tenant Project (Rhel7)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5004-1</id><title>Resource-Agents</title><description /><severity>low</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="resource-agents-aliyun" release="61.el7_9.4" src="resource-agents-4.1.1-61.el7_9.4.src.rpm" version="4.1.1"><filename>resource-agents-aliyun-4.1.1-61.el7_9.4.x86_64.rpm</filename><sum type="sha256">6741e110d07ae95142ad9c8ae7ce0b4ee1d84fa4d443de2263c0efffc0faea0a</sum></package><package arch="x86_64" name="resource-agents-gcp" release="61.el7_9.4" src="resource-agents-4.1.1-61.el7_9.4.src.rpm" version="4.1.1"><filename>resource-agents-gcp-4.1.1-61.el7_9.4.x86_64.rpm</filename><sum type="sha256">24113aaad452a826353ff1a9bb70cd501196a5e195fb1af3a339e6cbd1ab0329</sum></package><package arch="x86_64" name="resource-agents" release="61.el7_9.4" src="resource-agents-4.1.1-61.el7_9.4.src.rpm" version="4.1.1"><filename>resource-agents-4.1.1-61.el7_9.4.x86_64.rpm</filename><sum type="sha256">c655d13e0a6b3232dcb85372644ad9a0e41bd2b42ba00a1ed919d79f31a588f4</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5004" id="RHSA-2020:5004-1" title="Rhsa-2020:5004-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5009-1</id><title>Python</title><description>Security Fix(es): 
* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">4e752d78be10a3150e118f067de4a2c1741192fa3a1b1ccccc7cacb2a1d55ada</sum></package><package arch="x86_64" name="python-devel" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">6fb703ebfb6d07fc86aee57f61ebab154a48b3392f9099feb0f862c34dc60570</sum></package><package arch="x86_64" name="tkinter" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">d3887158f3657a31a93bb8a42b504368e58bd61a76a727d1c5d849cd123e8362</sum></package><package arch="x86_64" name="python-debug" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">c2ff66a4cfe90e016335af67c6f9119b924f27fc10d839788bef5b13de7db1a3</sum></package><package arch="x86_64" name="python-libs" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">fbe061a1f6a0f7e4c2c206db5a149e0fbf9a5e07101a22c47f5850913cd6b10c</sum></package><package arch="x86_64" name="python-tools" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">028b8c625d2bbbc8ddba8669893ce2244b9c34d746b9cd2a11d853ff0de8a2c8</sum></package><package arch="i686" name="python-libs" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-90.el7.i686.rpm</filename><sum type="sha256">2a375c1e3a4738e095ec03be404443859dd6b779f5e580b5bc1eaf005734c925</sum></package><package arch="x86_64" name="python-test" release="90.el7" src="python-2.7.5-90.el7.src.rpm" version="2.7.5"><filename>python-test-2.7.5-90.el7.x86_64.rpm</filename><sum type="sha256">8d4fbc682f98395e2a3b2bd59bfdbc00148c0046f3a93674ef17515ecbd500de</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5009" id="RHSA-2020:5009-1" title="Rhsa-2020:5009-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5010-1</id><title>Python3</title><description>Security Fix(es): 
* python: infinite loop in the tarfile module via crafted TAR archive (CVE-2019-20907) 
* python: DoS via inefficiency in IPv{4,6}Interface classes (CVE-2020-14422)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="python3-libs" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">a7660e2a2f3125d61888433e08d9b119eabfbfee7814b5956f641daaac3d16e7</sum></package><package arch="x86_64" name="python3-devel" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">43aa3c0434b1412eae7822f4051ba310a53d1c3096d9758d21ff6652fbeadcc9</sum></package><package arch="x86_64" name="python3-tkinter" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">e10cafc4bd4ff0c1a0ddbf36d5c7fc9446fafa85804e1ae63c8410cfe65822f2</sum></package><package arch="i686" name="python3-tkinter" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">317fd91d642bdf926eca2d224aec7b948873ca9f78379436fb32cd2d01ac63d4</sum></package><package arch="x86_64" name="python3-test" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">1d09983f1cf741814abec6324ed5c1e8aff39a249e854538ac774ce447973e9a</sum></package><package arch="x86_64" name="python3-libs" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">17b2a06a86a63c0a24c38aca3f59357bb05f561bb409f13c8092423c0084f60b</sum></package><package arch="x86_64" name="python3" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">16d6911fd5e4e2d70be8d42e87fb416477baff5c313c3e251f010af76df67b49</sum></package><package arch="i686" name="python3-devel" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">38bfd095c97c53712cd65a01f6ec085a53ec6a7b043fad17da3a850a0584aeb8</sum></package><package arch="i686" name="python3-idle" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">a59689e48b4c5506ac5031f9d6a3c4f529576283504531c5c70e9439a8cf2d9f</sum></package><package arch="i686" name="python3-test" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">87478d3ab6ff72a3be98c75fcf0cf08a0668c71e8d030671ebeb7579ff5bfa7f</sum></package><package arch="x86_64" name="python3-debug" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">c533139272942d0922d04eb19a99e44fde769aa9f76a93c0cdfa8d9fa1497d37</sum></package><package arch="i686" name="python3-debug" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">aed68cdc24710bf3087d20dc03abb64dbff1a5fbd9d7fa002637558108e158a7</sum></package><package arch="i686" name="python3" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-3.6.8-18.el7.i686.rpm</filename><sum type="sha256">7f812c3e6f365f2e84fdbac137a6976e42f0f3a5f5c1b5fa95aed1c0a784bb15</sum></package><package arch="x86_64" name="python3-idle" release="18.el7" src="python3-3.6.8-18.el7.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-18.el7.x86_64.rpm</filename><sum type="sha256">8d4219b8ff1bc224f28bd8ad7d6bfc5c993aead45dcda9bdb2364414a3984cf0</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5010" id="RHSA-2020:5010-1" title="Rhsa-2020:5010-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5011-1</id><title>Bind</title><description /><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">6e55a724a60ef42a4e13b4bd0f32a3abf34323df4958482ae7662740d6d223bb</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">aac0b90e4609b7004d2027c64a3e27da3b92969c8fbad97d0d053f41f8cac10d</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">d473992a2a6512f6bd697e4200b71804f572691556f4c398170305cc7ec4223c</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">caea82264b0e1e6c343dccf95cc52f257fed2e135b0e15d4d3e5defbc810f433</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">ed3d5cbf0009188355cb6fe08fa821cb0bb6013b6b2f560c3c28a6053f4fc0b7</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">601f32234eb3bc2aaaa8c34b7b814bca3974368c5bcd14b3b20e3391075fc37e</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">f209b01442c24e01c0dbf9b26af008c58b811c96f758b2e58db3985146b10a63</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">2455b597f2205f173708218e701b1a898dfb109b1b3ff6a04e0808b2417d0fb9</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">eec76e247d93cbd1f7a186b88afc0f06111d005d9a21e92861f98222488a46bc</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">dd0ef240b3a27a372f8677ad72902b7ca400c4d6d99a8949e123b8b7fd6c09f3</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">98c7ca6154305aeab368688f1c27a1e05fbc2de5e742b32ed3218bd7fc1f544c</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">35c0bd5b784f981951eb890d7e96f670a92cca814aafde0c84790be6f65d2a9e</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">b1435d0c8da81b0a72b274eca170649f9b76349b539f6421ab4a2687a8fb64a8</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">af95fc594e7fd389c1077dc9950675416f28bbfef92e60bb9d1db4e8054bad3e</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">ba84e4f9783f4a9c8e8d0314626d596326644b918391d562eab30c32a28f97be</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.2.i686.rpm</filename><sum type="sha256">568c85d08f58ab6c94e2f8dd086448b0295ba44be1669d80600c780dad7c1831</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">1137d00e19fe5e5304f4beac20b234bf52ab2cd1df0f0aecaddf6936cd14d078</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">d6bd50edb212bde63536e11a4ca1a861fc56b7096b2ab4953614ad3de87381ca</sum></package><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.2.noarch.rpm</filename><sum type="sha256">91a402777de0497989837c462b009b8a4c06d9536038f7b2ce28ab4003396004</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">adfbe5e8a9b3385e09f7c2e56341682c55a23e8fe1100868dd15e08d3e5dee34</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">a062858ee2760dc527dc773c645df312b22e5440d711a0bf9105450bd563815a</sum></package><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">273e674dedfdc72bb0c9762512c41a5ed7c3323bc79888dfd46352cd41558ff5</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">b28870f9473211a5aab4761aaf1811a52d8f7d737a53892e03fb98700da4e032</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.2" src="bind-9.11.4-26.P2.el7_9.2.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.2.x86_64.rpm</filename><sum type="sha256">682d4b7e4aa8fe2d2eee80929a26956290c764782a27195eaa18ddb39cbabe00</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8623" id="CVE-2020-8623" title="Cve-2020-8623" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8624" id="CVE-2020-8624" title="Cve-2020-8624" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5011" id="RHSA-2020:5011-1" title="Rhsa-2020:5011-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1869473" id="1869473" title="Bind: Truncated Tsig Response Can Lead To An" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1869477" id="1869477" title="Cve-2020-8623 Bind: Remotely Triggerable Assertion Failure In Pk11.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1869480" id="1869480" title="Cve-2020-8624 Bind: Incorrect Enforcement Of Update-Policy Rules Of Type &quot;Subdomain&quot;" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1884530" id="1884530" title="Bind Stops Dnskey Lookup In Get_Dst_Key() When A Key With Unsupported Algorithm Is Found First [Rhel7]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5012-1</id><title>Librepo</title><description /><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="librepo-devel" release="8.el7_9" src="librepo-1.8.1-8.el7_9.src.rpm" version="1.8.1"><filename>librepo-devel-1.8.1-8.el7_9.i686.rpm</filename><sum type="sha256">5e9aa35a981d2840134692f84d2e65150bd03a045a1df0f2432b0c46f8e24f44</sum></package><package arch="i686" name="librepo" release="8.el7_9" src="librepo-1.8.1-8.el7_9.src.rpm" version="1.8.1"><filename>librepo-1.8.1-8.el7_9.i686.rpm</filename><sum type="sha256">54ac0b83a5980f0fe79f81d89bbc74511e224e96f3aa6acc5b69f30f2ba73f4d</sum></package><package arch="x86_64" name="librepo-devel" release="8.el7_9" src="librepo-1.8.1-8.el7_9.src.rpm" version="1.8.1"><filename>librepo-devel-1.8.1-8.el7_9.x86_64.rpm</filename><sum type="sha256">842b884bcff0768ce4bcf18fafeb9f1ab99bd8d1e6249607717fa18cd58b9109</sum></package><package arch="x86_64" name="librepo" release="8.el7_9" src="librepo-1.8.1-8.el7_9.src.rpm" version="1.8.1"><filename>librepo-1.8.1-8.el7_9.x86_64.rpm</filename><sum type="sha256">818449bd35f4147b579a34e08feb2b30eccdb473abe5bcdf6a069186449e303a</sum></package><package arch="x86_64" name="python-librepo" release="8.el7_9" src="librepo-1.8.1-8.el7_9.src.rpm" version="1.8.1"><filename>python-librepo-1.8.1-8.el7_9.x86_64.rpm</filename><sum type="sha256">b29277245dc259c20968baf397c933cc0ec2a338941c8e11b46ac3d016d038b8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14352" id="CVE-2020-14352" title="Cve-2020-14352" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5012" id="RHSA-2020:5012-1" title="Rhsa-2020:5012-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1866498" id="1866498" title="Cve-2020-14352 Librepo: Missing Path Validation In Repomd.Xml May Lead To Directory Traversal" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5020-1</id><title>Tomcat</title><description>Security Fix(es): 
* tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling (CVE-2020-1935)</description><severity>low</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tomcat-admin-webapps" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-admin-webapps-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">aa6977941c1bd2072e8fb52668afe505c2954183b66b3542044143bf50d5a61f</sum></package><package arch="noarch" name="tomcat" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">9278de0d20e9970c899c261f58a8f877dfda254c508e807a26543581b5f2a1cb</sum></package><package arch="noarch" name="tomcat-el-2.2-api" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-el-2.2-api-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">21603edf7a3c774277bf9bd700aa3094ba96a1202a280e3b47028eca16978998</sum></package><package arch="noarch" name="tomcat-javadoc" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-javadoc-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">5cf6522a174594dc8829b733123119299d4b28d31cc1517b9ba363d2e1502949</sum></package><package arch="noarch" name="tomcat-lib" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-lib-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">7b0ac0b8e2b581ecfcdd755f439d5d9f8d1177b580d36862164e42614f57befc</sum></package><package arch="noarch" name="tomcat-jsvc" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-jsvc-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">ab625888831656616637f61767d19ed69855e9bc8b5613b1f2b21a614d4c9fa4</sum></package><package arch="noarch" name="tomcat-docs-webapp" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-docs-webapp-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">f32c86c05713f79a60c47dc334f63927ee9b7e4c2882a0ec800cf568da8d75d5</sum></package><package arch="noarch" name="tomcat-servlet-3.0-api" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-servlet-3.0-api-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">bae2181cfc1afb37bbb46b70c86db7759a895db94e4d2532e82885dec4ad6a76</sum></package><package arch="noarch" name="tomcat-jsp-2.2-api" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-jsp-2.2-api-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">6d36a3c8047de2d05a4432fb9e3a2ef78553a6a23865860d8490688bd4f34d27</sum></package><package arch="noarch" name="tomcat-webapps" release="16.el7_9" src="tomcat-7.0.76-16.el7_9.src.rpm" version="7.0.76"><filename>tomcat-webapps-7.0.76-16.el7_9.noarch.rpm</filename><sum type="sha256">e143514d193ed8743b67b9e1a19c66408778aa408d716b211c28a4e923a3f833</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5020" id="RHSA-2020:5020-1" title="Rhsa-2020:5020-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5021-1</id><title>Qt And Qt5-Qtbase</title><description>Security Fix(es): 
* qt: buffer over-read in read_xbm_body in gui/image/qxbmhandler.cpp (CVE-2020-17507)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="qt-postgresql" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-postgresql-4.8.7-9.el7_9.i686.rpm</filename><sum type="sha256">2f990625aac0eaefe277e1d90296642a9b1769a0ab847d974fc6286a24a7c032</sum></package><package arch="x86_64" epoch="1" name="qt" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">f465ebe6ef7078025b0aef2d83521766c0193731dd513dd340f86e97c40ad4b6</sum></package><package arch="x86_64" name="qt5-qtbase-doc" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-doc-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">2357df991d7653d7a563cff583d91c69ec6f2a4a8b540b12b8ec0fbe40647975</sum></package><package arch="x86_64" epoch="1" name="qt-postgresql" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-postgresql-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">149eaca53c75a7f7715efa7375b2df5b9e7825188b555992a4bd55aa0d3a4b6a</sum></package><package arch="x86_64" epoch="1" name="qt-examples" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-examples-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">eafba1d14ae64d4274b6c589e86ec5469654769e36a98ad2c045e854c79d627e</sum></package><package arch="i686" name="qt5-qtbase-devel" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-devel-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">5ba87d3495269210ce50d1d1d8f9f85aca324920ec8afd356a9f1e264e0063ac</sum></package><package arch="i686" name="qt5-qtbase-postgresql" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-postgresql-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">0a15d3c8e425c94919803f505f5c16e79ee114bfa4a0728e8d6c5fea205dc7e6</sum></package><package arch="i686" name="qt5-qtbase" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">496b6233b011be7d3c40f8ca6ba7099784979e45792a5248866fd658d8f3e41f</sum></package><package arch="i686" epoch="1" name="qt-mysql" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-mysql-4.8.7-9.el7_9.i686.rpm</filename><sum type="sha256">a929b6861f8b6c71c5b8806107be20a35a566658b50f679f7ec99a516832966d</sum></package><package arch="noarch" epoch="1" name="qt-doc" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-doc-4.8.7-9.el7_9.noarch.rpm</filename><sum type="sha256">b1f0394efc9e9b5c449853c0a4b7985aa41366fb86f0b0a5b2a1a04c4a5e21bf</sum></package><package arch="i686" name="qt5-qtbase-odbc" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-odbc-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">39a8424c0f12bf955a09694a34d9d52554f1d69487bd25f7bfaefbea7eedf1c5</sum></package><package arch="x86_64" epoch="1" name="qt-qdbusviewer" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-qdbusviewer-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">c31cd6a5bc81ed156dc959959be0c07c9a77eae076fab9e71bd31c425dc9580f</sum></package><package arch="noarch" name="qt5-rpm-macros" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-rpm-macros-5.9.7-5.el7_9.noarch.rpm</filename><sum type="sha256">477f92195f9f353679121b03e73d2c4b1a890938adba3e8de175814c3c5b2203</sum></package><package arch="x86_64" name="qt5-qtbase-static" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-static-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">e6c9d053df810165e1f2ceed63ff22ffc9223f392eac16b7c0446017e7d8bad2</sum></package><package arch="x86_64" epoch="1" name="qt-odbc" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-odbc-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">be734a03e61cd155d5157f9293d70582a3dec56a806f6d159263e2e43df3453b</sum></package><package arch="i686" epoch="1" name="qt-devel" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-devel-4.8.7-9.el7_9.i686.rpm</filename><sum type="sha256">9e89c257e4ca088f35aaa05d178f8fc7500e8aad245912921618dfad3c3f4539</sum></package><package arch="i686" epoch="1" name="qt" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-4.8.7-9.el7_9.i686.rpm</filename><sum type="sha256">99a1970527986d3b3cf24e7c62f6b13abecc10a37afb1d5185e37f5913043a19</sum></package><package arch="noarch" name="qt5-qtbase-common" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-common-5.9.7-5.el7_9.noarch.rpm</filename><sum type="sha256">1bd4ac9a033b7f25c252543ac7663d0b33543e34b8cc11b6628e6a2535a5ac84</sum></package><package arch="x86_64" epoch="1" name="qt-qvfb" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-qvfb-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">7c7dfcdb90154564be2c0bb73e0c60527fa1e3293115df89d59dccc529ee1f6d</sum></package><package arch="x86_64" epoch="1" name="qt-devel" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-devel-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">5d24d57c02883634e33c1d9ffb5ce1b6fcb0159ad1c355eb3d49db7b325628f1</sum></package><package arch="i686" name="qt5-qtbase-static" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-static-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">f9be3f2d2203d1e2fcca65c02e36c78a22cecb1f9e11d8585ff624120f847bcb</sum></package><package arch="x86_64" epoch="1" name="qt-assistant" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-assistant-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">cb546610e2a63c8897ebbae15c0c09c5df5dd8cfc8339dee8a9697fc5b98567e</sum></package><package arch="x86_64" name="qt5-qtbase-mysql" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-mysql-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">c0e467fe03493409c25efa83cd410e575e50bf5efb6592d7548fdc194873c39d</sum></package><package arch="i686" name="qt5-qtbase-gui" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-gui-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">8410d859b7b9b6895b658d281e39f178f170fffb144fa4a96cf695b8d3f181a2</sum></package><package arch="x86_64" name="qt5-qtbase-examples" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-examples-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">fde83ba6b73398217a03eacb43561b1efe091402f0e46c8bafb7b2c39e129ea1</sum></package><package arch="i686" epoch="1" name="qt-odbc" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-odbc-4.8.7-9.el7_9.i686.rpm</filename><sum type="sha256">266ec15244d156419688218c64525e94997973c67cd35fcd430cf705691701c9</sum></package><package arch="x86_64" name="qt5-qtbase-odbc" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-odbc-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">ddd010fb1e2ac6f97354294d8f0b4fabbe246258d2ee3a8ebd278813a1382fd8</sum></package><package arch="x86_64" epoch="1" name="qt-mysql" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-mysql-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">c78b158f03cd6cd903729cce4953053c132ef22fa81777395da63ea4fbfae809</sum></package><package arch="x86_64" epoch="1" name="qt-config" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-config-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">4fd2cea00c844b2380defbe708ee6002c8a61625f882effe9faad668f8946803</sum></package><package arch="x86_64" name="qt5-qtbase-gui" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-gui-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">1bdf02c469fd8c928c5f7bc4577cf91d538e5948c64d99dd3cce9717fa353a08</sum></package><package arch="i686" epoch="1" name="qt-x11" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-x11-4.8.7-9.el7_9.i686.rpm</filename><sum type="sha256">998752272c7d54ce4a591d170f4f8197ef8c7a373c5ca88230adb00b199eb56a</sum></package><package arch="x86_64" name="qt5-qtbase-devel" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-devel-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">f88198b4c90ff9433ca2a2051df7211a64a455f9d78a234769c486c9986ac744</sum></package><package arch="x86_64" name="qt5-qtbase-postgresql" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-postgresql-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">c666834945473919c0e820375fc1f95feb723453ddab373bc21413acf4056d0e</sum></package><package arch="x86_64" name="qt5-qtbase" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-5.9.7-5.el7_9.x86_64.rpm</filename><sum type="sha256">4e32bb93412d4410552a25aee3725c4e54e83cde7570a39112c0fd22c91467f0</sum></package><package arch="x86_64" epoch="1" name="qt-x11" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-x11-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">e6d8cf8f67ced43c167000c58fc99685d0279f60bf240565e821ecad0c1f67e7</sum></package><package arch="i686" name="qt5-qtbase-mysql" release="5.el7_9" src="qt5-qtbase-5.9.7-5.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtbase-mysql-5.9.7-5.el7_9.i686.rpm</filename><sum type="sha256">929dc10998613b29239d2d0c0df5ff67bfbf9ae456727ec0f4ab2ac7496a9f11</sum></package><package arch="noarch" epoch="1" name="qt-devel-private" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-devel-private-4.8.7-9.el7_9.noarch.rpm</filename><sum type="sha256">5340530c5e9e64293ae99b4eec8571eb6b5bb68e23ee1e54c806ebf25a337ae1</sum></package><package arch="x86_64" epoch="1" name="qt-demos" release="9.el7_9" src="qt-4.8.7-9.el7_9.src.rpm" version="4.8.7"><filename>qt-demos-4.8.7-9.el7_9.x86_64.rpm</filename><sum type="sha256">b138388f394bccf5081a71cbfe11077b9d1293aab2cfabbc8d645e828dd2fd00</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5021" id="RHSA-2020:5021-1" title="Rhsa-2020:5021-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5023-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: buffer over write in vgacon_scroll (CVE-2020-14331) 
* kernel: net-sysfs: *_queue_add_kobject refcount issue (CVE-2019-20811) 
Bug Fix(es): 
* [OSP13,mlx5] SRIOV VF still sending traffic when PF is down 
* gpf panic in virtio_check_driver_offered_fxature+6 when running sg_inq on a dm map for a lost virtio_blk 
* GPF panic in qlt_free_session_done+626 
* [ Brazos ] "Core(s) per socket" and "Socket" values are interchanged in lscpu output. (kernel) 
* megaraid Aero: call trace observed during reboots 
* Crash in mptscsih_io_done() due to buffer overrun in sense_buf_pool 
* The qedf driver fails to re-establish the online F/C port state when the downstream F/C port is toggled unless a LIP is forced 
* tcp_fragment() limit causes packet drop under normal TCP load 
* ip link command shows state as UNKNOWN for MACVLAN interface 
* Lenovo TS 7Z60 Cooper Lake: PCI BAR firmware bug 
* [SL-7/mlx4]  ipoib_flush ipoib_ib_dev_flush_light [ib_ipoib] 
* Uprobes crashes processes under GDB - SIGTRAP and SIGSEGV 
* kernel-3.10.0-1127.19.1.el7.x86_64 crashes after an SSH connection attempt when running as a Xen PV guest on AMD Epyc Rome 
* Null ptr deref after nf_reinject-&gt;nf_queue_entry_release_refs hits Attempt to release error doing inet_sock_destruct()</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><reboot_suggested>true</reboot_suggested><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-devel" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">fa43ac3b28b2a8ab4caaaff4c501aaa62eb34f17d175b59668859842a2dfc67b</sum></package><package arch="x86_64" name="python-perf" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">3cad1140ec4766ed2b2b01cd82d19d1f706fd5b2f813c63d97c5d804a7ab1166</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">ae5303acd4a7d66ac9451fd20e8165b57d9049c0ba2c78c5447419aebc511406</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">6f1b80feb6f65d1f20927fce25cee1c4070164eeb39a4e0247cf7cafa574fffe</sum></package><package arch="x86_64" name="perf" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">e8d3cf4b090395d832d9b94609de61cc6e05b8882aaa11c0bce3f2467bbee963</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.6.1.el7.noarch.rpm</filename><sum type="sha256">a22cea3e44550afadd16969a5e1e921fcb265865c06e12a02f28a45048c6c12c</sum></package><package arch="x86_64" name="kernel-tools" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">35379a584782bb5df8ca0f8ce2d9aeab27ce17bf5c63d748d6cf49a2f4686b08</sum></package><package arch="x86_64" name="kernel" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">b8a8c00cf831a57b9ba0ddcc51dda482b846d42992c80ae25b23f54429b4a697</sum></package><package arch="x86_64" name="kernel-headers" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">b5cf9d49c2f50a57f515fda688ac10e942090ce5336eda682507913e9cc6692c</sum></package><package arch="x86_64" name="bpftool" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">eb459b8bea04b524153136161e04a74bdc58d71fbbdcecf2c5312c67abac7349</sum></package><package arch="noarch" name="kernel-doc" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.6.1.el7.noarch.rpm</filename><sum type="sha256">56f33f85d9f3a92f5b629f9b0e6533bcbba80e6aaf7636c660214210f6313ade</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">f70f095585c8e87bfadb97237bf57c2bcab6d063838b2de7ed3e3bd6b07a5129</sum></package><package arch="x86_64" name="kernel-debug" release="1160.6.1.el7" src="kernel-3.10.0-1160.6.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.6.1.el7.x86_64.rpm</filename><sum type="sha256">be5779f6ededf4a8c550a4c6ed791e39823ebd7af2ee0aefa2042ae67ebb33da</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5023" id="RHSA-2020:5023-1" title="Rhsa-2020:5023-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5040-1</id><title>Libvirt</title><description>Security Fix(es): 
* libvirt: double free in qemuAgentGetInterfaces() in qemu_agent.c (CVE-2020-25637)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libvirt-nss" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-36.el7_9.3.i686.rpm</filename><sum type="sha256">2834e674277a3d4e5c7b920b64448cd37bd2adc9ad0b75c0673a883b5cb42af0</sum></package><package arch="x86_64" name="libvirt-daemon-config-network" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-network-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">e52837fd79aa0d9826502e8fc0fc99fe6040d6d83650ed563e063623cfab3276</sum></package><package arch="i686" name="libvirt-libs" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-36.el7_9.3.i686.rpm</filename><sum type="sha256">46b60bd7c943bde038f8269c067525f00f0a93a8ba84daaadb4a8baff822fe78</sum></package><package arch="x86_64" name="libvirt-nss" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-nss-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">7234513bca5e17ca7de87da8f24343e09ea045c9e45fa1349b5d391b53d046f2</sum></package><package arch="x86_64" name="libvirt-daemon" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">d39fae834251654f0e4be3f781d29f24b50126708581f7db9983f195d84debf6</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">eb732df91cd5bfefea2c0e1ef932e89a2ab33cb3eb0215cbe3aa3d8175c53902</sum></package><package arch="x86_64" name="libvirt-admin" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-admin-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">7aa1a1b7fd3f1ca0cf554f60e93d42021762187e81a733e813184f208e275955</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-disk" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-disk-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">ba769f4988875848ca17fce27df881b29a65f835e8ac237c7f7a8575a40d7973</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-core" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-core-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">73bf5e1ce2f47e28417ca23a447dd3bfed734385d78204c930458c3deaebeee7</sum></package><package arch="x86_64" name="libvirt-client" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">cb146dff7ec24a5bf7cd1a26acb894693db3c5edb11344ccd3c3bf945bab20a0</sum></package><package arch="x86_64" name="libvirt-daemon-driver-interface" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-interface-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">b83688c176dbdd74fb82d3ce011884783b08005d08bd554dffd76245bd1d5405</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-logical" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-logical-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">59f3951acf83f1ec0815442186beb088b5da8c52d531f1d94816e8a300703fa3</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-gluster" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-gluster-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">c029da9d94f4e235fb8c6e39e2c5bbbf7351bd2ac3393e59812213fbd7e90999</sum></package><package arch="x86_64" name="libvirt-login-shell" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-login-shell-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">454d51418987da1014849d4132925cdef134737d1d08fb1cfa779c89c19a3924</sum></package><package arch="x86_64" name="libvirt-daemon-driver-qemu" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-qemu-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">050ef515b3c64595620bf6d53a462b54936c3dfe4126a4fdc609cc9a53d9dda1</sum></package><package arch="i686" name="libvirt-client" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-client-4.5.0-36.el7_9.3.i686.rpm</filename><sum type="sha256">14bb3afa97114d6eeffeb31b1eb538b277f938a05301296d515b7678e4061d07</sum></package><package arch="i686" name="libvirt-devel" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-36.el7_9.3.i686.rpm</filename><sum type="sha256">e02dccd71df37070314abbf77e7e94e6eb1bae0729fe537cc6e981013716fa58</sum></package><package arch="x86_64" name="libvirt-bash-completion" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-bash-completion-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">3dfc31f773bb1efa5ef5e687088ab0f1b47fdaf91cd7e929a6f7c385541ccb37</sum></package><package arch="x86_64" name="libvirt-daemon-driver-network" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-network-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">0efbfbc232bcaca3fedfd060b20a8283fc7613f565f6048d0518818441c089c0</sum></package><package arch="x86_64" name="libvirt" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">157e09bbc77984eafc509c3191726f1dc17fa954ae54bdf641158f7fe20cf557</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-rbd" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-rbd-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">93fbbb3a834d068f53db7b551ba09e14ecb5b2e3fd93582f968124aede4d96dc</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nwfilter" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nwfilter-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">1b59823c76125992f394d22eb838c8c0478a1f5deca52420b620ef0fcb6932f9</sum></package><package arch="x86_64" name="libvirt-devel" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-devel-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">7d0ec88254e280eeb07bdf1bb1252c900681099c26df13ad3245a7e3bde7b64a</sum></package><package arch="x86_64" name="libvirt-daemon-config-nwfilter" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-config-nwfilter-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">57452d96f8978a1410c3ef2338fe270c97148911d03e9debba47513a2cdb9c1b</sum></package><package arch="x86_64" name="libvirt-libs" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-libs-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">e4860ecebc9088da31ce413a567de94ecf49d342e5bbcaae46ebe7087cface77</sum></package><package arch="x86_64" name="libvirt-daemon-kvm" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-kvm-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">1f62e1ba3e85b38d3025b12c077dd9caf6641a553330ddd49f01479942dfafbf</sum></package><package arch="x86_64" name="libvirt-daemon-lxc" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-lxc-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">505fdac487bef830c4d4567539061bf5c9fed6948c86ae44b98fd191025af572</sum></package><package arch="x86_64" name="libvirt-lock-sanlock" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-lock-sanlock-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">664362fcb2c8a7b8ee0bdfaf8c52138a82c9483bd9218a414850e9a21f4aaed6</sum></package><package arch="x86_64" name="libvirt-daemon-driver-nodedev" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-nodedev-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">f5bf6a17338facb41aa3bb9612efa5e11af562e49ebfdef125efaecfa993cedb</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-scsi" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-scsi-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">a02e55e98bac0ae38460a3dee0335f4c09db03805b94c3e8a5406dacdf32a152</sum></package><package arch="x86_64" name="libvirt-daemon-driver-secret" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-secret-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">5cf289a88e882a0dc6dfffd8e313c4fc5c957a4f3b4f352a04a1ae18226f94b1</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-mpath" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-mpath-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">10f8c9d89b219b32a7d6f3d52e2f9431d37878c6a14c8c463148e6921bdb38ea</sum></package><package arch="x86_64" name="libvirt-daemon-driver-storage-iscsi" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-storage-iscsi-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">9b80a91b5a9f66eafe3468984eea8a0972f7b87dd2cc42f4c75491d687e0b1b7</sum></package><package arch="x86_64" name="libvirt-daemon-driver-lxc" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-daemon-driver-lxc-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">9c92d5f80c668de652d744c66676942226c077b22154a8834a69ff2ba0d9b75f</sum></package><package arch="x86_64" name="libvirt-docs" release="36.el7_9.3" src="libvirt-4.5.0-36.el7_9.3.src.rpm" version="4.5.0"><filename>libvirt-docs-4.5.0-36.el7_9.3.x86_64.rpm</filename><sum type="sha256">0235ba04c3a98a9b5d2d31e85027b2a62fda74d77152debd17e4e99064e8a3e7</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5040" id="RHSA-2020:5040-1" title="Rhsa-2020:5040-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5083-1</id><title>Microcode_Ctl</title><description>Security Fix(es): 
* hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695) 
* hw: Vector Register Leakage-Active (CVE-2020-8696) 
* hw: Fast forward store predictor (CVE-2020-8698)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-11-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="73.2.el7_9" src="microcode_ctl-2.1-73.2.el7_9.src.rpm" version="2.1"><filename>microcode_ctl-2.1-73.2.el7_9.x86_64.rpm</filename><sum type="sha256">69c381a9699c988fbdc4fd0b3bf8fa247e4ecd50868a7e2dda3900188d845d0e</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5083" id="RHSA-2020:5083-1" title="Rhsa-2020:5083-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5099-1</id><title>Firefox</title><description>Security Fix(es): 
* Mozilla: Write side effects in MCallGetProperty opcode not accounted for (CVE-2020-26950)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2020-11-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.4.1-1.el7_9.src.rpm" version="78.4.1"><filename>firefox-78.4.1-1.el7_9.i686.rpm</filename><sum type="sha256">e94ecc4b20facf2606282703cebc3026a4dedd3039002f228c9c9c7e379fb682</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.4.1-1.el7_9.src.rpm" version="78.4.1"><filename>firefox-78.4.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">ba519645c1953d71030a3ab3e27da0c317a547ef9d7fdd4fcb158af75e5f3fa6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5099" id="RHSA-2020:5099-1" title="Rhsa-2020:5099-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5163-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.4.3.

Security Fix(es):

* Mozilla: Write side effects in MCallGetProperty opcode not accounted for (CVE-2020-26950)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.4.3-1.el7_9.src.rpm" version="78.4.3"><filename>thunderbird-78.4.3-1.el7_9.x86_64.rpm</filename><sum type="sha256">92c042553512da9c96c8ee1f78a34771072021043df5e88a87657128ef708ae9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26950" id="CVE-2020-26950" title="Mozilla: Write Side Effects In Mcallgetproperty Opcode Not Accounted For" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5163" id="RHSA-2020:5163-1" title="Rhsa-2020:5163-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1896306" id="1896306" title="Mozilla: Write Side Effects In Mcallgetproperty Opcode Not Accounted For" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5235-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.5.0. 
Security Fix(es): 
* Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code (CVE-2020-26951) 
* Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 (CVE-2020-26968) 
* Mozilla: Variable time processing of cross-origin images during drawImage calls (CVE-2020-16012) 
* Mozilla: Fullscreen could be enabled without displaying the security UI (CVE-2020-26953) 
* Mozilla: XSS through paste (manual and clipboard API) (CVE-2020-26956) 
* Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions (CVE-2020-26958) 
* Mozilla: Use-after-free in WebRequestService (CVE-2020-26959) 
* Mozilla: Potential use-after-free in uses of nsTArray (CVE-2020-26960) 
* Mozilla: DoH did not filter IPv4 mapped IP Addresses (CVE-2020-26961) 
* Mozilla: Software keyboards may have remembered typed passwords (CVE-2020-26965)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.5.0-1.el7_9.src.rpm" version="78.5.0"><filename>thunderbird-78.5.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">4aeda6a0fc5b123d030ff8d61dbe999dbc7911a850bd5ec4dc587824b0165205</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012" id="CVE-2020-16012" title="Mozilla: Variable Time Processing Of Cross-Origin Images During Drawimage Calls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951" id="CVE-2020-26951" title="Mozilla: Parsing Mismatches Could Confuse And Bypass Security Sanitizer For Chrome Privileged Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953" id="CVE-2020-26953" title="Mozilla: Fullscreen Could Be Enabled Without Displaying The Security Ui" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956" id="CVE-2020-26956" title="Mozilla: Xss Through Paste (Manual And Clipboard Api)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958" id="CVE-2020-26958" title="Mozilla: Requests Intercepted Through Serviceworkers Lacked Mime Type Restrictions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959" id="CVE-2020-26959" title="Mozilla: Use-After-Free In Webrequestservice" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960" id="CVE-2020-26960" title="Mozilla: Potential Use-After-Free In Uses Of Nstarray" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961" id="CVE-2020-26961" title="Mozilla: Doh Did Not Filter Ipv4 Mapped Ip Addresses" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965" id="CVE-2020-26965" title="Mozilla: Software Keyboards May Have Remembered Typed Passwords" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968" id="CVE-2020-26968" title="Mozilla: Memory Safety Bugs Fixed In Firefox 83 And Firefox Esr 78.5" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5235" id="RHSA-2020:5235-1" title="Rhsa-2020:5235-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898731" id="1898731" title="Mozilla: Parsing Mismatches Could Confuse And Bypass Security Sanitizer For Chrome Privileged Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898732" id="1898732" title="Mozilla: Variable Time Processing Of Cross-Origin Images During Drawimage Calls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898733" id="1898733" title="Mozilla: Fullscreen Could Be Enabled Without Displaying The Security Ui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898734" id="1898734" title="Mozilla: Xss Through Paste (Manual And Clipboard Api)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898735" id="1898735" title="Mozilla: Requests Intercepted Through Serviceworkers Lacked Mime Type Restrictions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898736" id="1898736" title="Mozilla: Use-After-Free In Webrequestservice" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898737" id="1898737" title="Mozilla: Potential Use-After-Free In Uses Of Nstarray" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898738" id="1898738" title="Mozilla: Doh Did Not Filter Ipv4 Mapped Ip Addresses" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898739" id="1898739" title="Mozilla: Software Keyboards May Have Remembered Typed Passwords" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898741" id="1898741" title="Mozilla: Memory Safety Bugs Fixed In Firefox 83 And Firefox Esr 78.5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5239-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.5.0 ESR. 
Security Fix(es): 
* Mozilla: Parsing mismatches could confuse and bypass security sanitizer for chrome privileged code (CVE-2020-26951) 
* Mozilla: Memory safety bugs fixed in Firefox 83 and Firefox ESR 78.5 (CVE-2020-26968) 
* Mozilla: Variable time processing of cross-origin images during drawImage calls (CVE-2020-16012) 
* Mozilla: Fullscreen could be enabled without displaying the security UI (CVE-2020-26953) 
* Mozilla: XSS through paste (manual and clipboard API) (CVE-2020-26956) 
* Mozilla: Requests intercepted through ServiceWorkers lacked MIME type restrictions (CVE-2020-26958) 
* Mozilla: Use-after-free in WebRequestService (CVE-2020-26959) 
* Mozilla: Potential use-after-free in uses of nsTArray (CVE-2020-26960) 
* Mozilla: DoH did not filter IPv4 mapped IP Addresses (CVE-2020-26961) 
* Mozilla: Software keyboards may have remembered typed passwords (CVE-2020-26965)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-11-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.5.0-1.el7_9.src.rpm" version="78.5.0"><filename>firefox-78.5.0-1.el7_9.i686.rpm</filename><sum type="sha256">a01136ebd107e00f13819a1ff47a00f4cbfeb618cdbf488899e2a52c75436684</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.5.0-1.el7_9.src.rpm" version="78.5.0"><filename>firefox-78.5.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">2a9ea789628f4859bab83c8ccf1e5fb214ddecae7f670f550109871358f6f0c0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16012" id="CVE-2020-16012" title="Mozilla: Variable Time Processing Of Cross-Origin Images During Drawimage Calls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26951" id="CVE-2020-26951" title="Mozilla: Parsing Mismatches Could Confuse And Bypass Security Sanitizer For Chrome Privileged Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26953" id="CVE-2020-26953" title="Mozilla: Fullscreen Could Be Enabled Without Displaying The Security Ui" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26956" id="CVE-2020-26956" title="Mozilla: Xss Through Paste (Manual And Clipboard Api)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26958" id="CVE-2020-26958" title="Mozilla: Requests Intercepted Through Serviceworkers Lacked Mime Type Restrictions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26959" id="CVE-2020-26959" title="Mozilla: Use-After-Free In Webrequestservice" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26960" id="CVE-2020-26960" title="Mozilla: Potential Use-After-Free In Uses Of Nstarray" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26961" id="CVE-2020-26961" title="Mozilla: Doh Did Not Filter Ipv4 Mapped Ip Addresses" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26965" id="CVE-2020-26965" title="Mozilla: Software Keyboards May Have Remembered Typed Passwords" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26968" id="CVE-2020-26968" title="Mozilla: Memory Safety Bugs Fixed In Firefox 83 And Firefox Esr 78.5" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5239" id="RHSA-2020:5239-1" title="Rhsa-2020:5239-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898731" id="1898731" title="Mozilla: Parsing Mismatches Could Confuse And Bypass Security Sanitizer For Chrome Privileged Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898732" id="1898732" title="Mozilla: Variable Time Processing Of Cross-Origin Images During Drawimage Calls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898733" id="1898733" title="Mozilla: Fullscreen Could Be Enabled Without Displaying The Security Ui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898734" id="1898734" title="Mozilla: Xss Through Paste (Manual And Clipboard Api)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898735" id="1898735" title="Mozilla: Requests Intercepted Through Serviceworkers Lacked Mime Type Restrictions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898736" id="1898736" title="Mozilla: Use-After-Free In Webrequestservice" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898737" id="1898737" title="Mozilla: Potential Use-After-Free In Uses Of Nstarray" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898738" id="1898738" title="Mozilla: Doh Did Not Filter Ipv4 Mapped Ip Addresses" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898739" id="1898739" title="Mozilla: Software Keyboards May Have Remembered Typed Passwords" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898741" id="1898741" title="Mozilla: Memory Safety Bugs Fixed In Firefox 83 And Firefox Esr 78.5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5350-1</id><title>Net-Snmp</title><description>Security Fix(es): 
* net-snmp: Improper Privilege Management in EXTEND MIB may lead to privileged commands execution (CVE-2020-15862)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="net-snmp" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">5f6a4f07a16a430a5b5bfba0cdb49f4bfc4d1e82080aea19d098c9b941d9dbe5</sum></package><package arch="x86_64" epoch="1" name="net-snmp-libs" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-libs-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">6413cc63e27157a63f2213d9d33f8c3d0dd24d69c57973a0c5c54bcd2b35419c</sum></package><package arch="i686" epoch="1" name="net-snmp-devel" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-devel-5.7.2-49.el7_9.1.i686.rpm</filename><sum type="sha256">28dff9113f62a657c99729c6b0820921088723d1e2e36f196f4397e59ea9ba16</sum></package><package arch="x86_64" epoch="1" name="net-snmp-perl" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-perl-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">aacc4173eeb02c57b5cc603e87ff09dc3a4ef9e0a2a56b1c222d24ffe71d0378</sum></package><package arch="x86_64" epoch="1" name="net-snmp-gui" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-gui-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">0ef72584b2f56c25f567db0b159846d0faf805414aa22a99d0a2a9124df784a2</sum></package><package arch="i686" epoch="1" name="net-snmp-libs" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-libs-5.7.2-49.el7_9.1.i686.rpm</filename><sum type="sha256">5784605d171bbbd0bd502566b65fcf1fd6a7fcd2f265986217732a1a38dbee40</sum></package><package arch="x86_64" epoch="1" name="net-snmp-python" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-python-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">8bf9e96031cfb8602feea8e199798171335e163802f8142bb6de4eadfcc732ae</sum></package><package arch="x86_64" epoch="1" name="net-snmp-agent-libs" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-agent-libs-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">4772c5fea319e3ef852b4455691ab029d4376fada1b836c313b524699f279811</sum></package><package arch="x86_64" epoch="1" name="net-snmp-devel" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-devel-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">4db5985d46f717d6201094c9d68072769154cfb8cf8ad20bd8ba5483aba0c9cb</sum></package><package arch="i686" epoch="1" name="net-snmp-agent-libs" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-agent-libs-5.7.2-49.el7_9.1.i686.rpm</filename><sum type="sha256">9844acef0228629f571c059899ca877686ded22a947c3273c28ce700a142a27d</sum></package><package arch="x86_64" epoch="1" name="net-snmp-utils" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-utils-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">583d10cddad6c1df718a9d6240aae5d363b041f98f6297f5db023169b5cd3b93</sum></package><package arch="x86_64" epoch="1" name="net-snmp-sysvinit" release="49.el7_9.1" src="net-snmp-5.7.2-49.el7_9.1.src.rpm" version="5.7.2"><filename>net-snmp-sysvinit-5.7.2-49.el7_9.1.x86_64.rpm</filename><sum type="sha256">51b05cd2c54b3e2bd5925721e2bb6fbe877dcf442c355aeb026b2ab7ef226f1a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15862" id="CVE-2020-15862" title="Net-Snmp: Improper Privilege Management In Extend Mib May Lead To Privileged Commands Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5350" id="RHSA-2020:5350-1" title="Rhsa-2020:5350-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1873038" id="1873038" title="Net-Snmp: Improper Privilege Management In Extend Mib May Lead To Privileged Commands Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5400-1</id><title>Thunderbird</title><description>Security Fix(es): 
* Mozilla: Stack overflow due to incorrect parsing of SMTP server response codes (CVE-2020-26970)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.5.1-1.el7_9.src.rpm" version="78.5.1"><filename>thunderbird-78.5.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">7204232e5916e30474537b49e8e3c380d323cb508133e2a3f272e2675f6c6b17</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5400" id="RHSA-2020:5400-1" title="Rhsa-2020:5400-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5402-1</id><title>Libexif</title><description>Security Fix(es): 
* libexif: out of bounds write due to an integer overflow in exif-entry.c (CVE-2020-0452)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libexif" release="2.el7_9" src="libexif-0.6.22-2.el7_9.src.rpm" version="0.6.22"><filename>libexif-0.6.22-2.el7_9.x86_64.rpm</filename><sum type="sha256">efbb1fc8a925b088d782730b192f4f3261c241540dbc16525fda27d7fef82897</sum></package><package arch="i686" name="libexif-devel" release="2.el7_9" src="libexif-0.6.22-2.el7_9.src.rpm" version="0.6.22"><filename>libexif-devel-0.6.22-2.el7_9.i686.rpm</filename><sum type="sha256">2074ac598018d8710f20fde5efeef22a67981e962c305d38de81c36dfbe22cde</sum></package><package arch="i686" name="libexif" release="2.el7_9" src="libexif-0.6.22-2.el7_9.src.rpm" version="0.6.22"><filename>libexif-0.6.22-2.el7_9.i686.rpm</filename><sum type="sha256">6dc932c606a8b0b97108d1313fe5d3b59706d7feaa9d4ea4404b25eed3b2422e</sum></package><package arch="x86_64" name="libexif-devel" release="2.el7_9" src="libexif-0.6.22-2.el7_9.src.rpm" version="0.6.22"><filename>libexif-devel-0.6.22-2.el7_9.x86_64.rpm</filename><sum type="sha256">390e5bc8b3656b1360b772fd168205e8632a1bbe2c3c20340e617ee5d4f9ef2d</sum></package><package arch="x86_64" name="libexif-doc" release="2.el7_9" src="libexif-0.6.22-2.el7_9.src.rpm" version="0.6.22"><filename>libexif-doc-0.6.22-2.el7_9.x86_64.rpm</filename><sum type="sha256">037a55132984a0bd769eb3194ef66167ad9badf0f745e36d5cd34f40e88b48d5</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5402" id="RHSA-2020:5402-1" title="Rhsa-2020:5402-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5408-1</id><title>Xorg-X11-Server</title><description>Security Fix(es): 
* xorg-x11-server: Out-of-bounds access in XkbSetMap function (CVE-2020-14360) 
* xorg-x11-server: XkbSetDeviceInfo heap-based buffer overflow privilege escalation vulnerability (CVE-2020-25712) 
* xorg-x11-server: Leak of uninitialized heap memory from the X server to clients in AllocatePixmap of dix/pixmap.c (CVE-2020-14347)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-Xephyr" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">1dd324a9b38007b9921ab6ca548aef439afa6b55470d00a8549f6d93eb4c43f5</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">e0ac1be16eddcef7251eab2e5914fbe32fa46053d7e52c533a3529dbf537fdf1</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">bd4762bed5392c807dfe22257611857ae4ff9775f8864505a2c88f549d561f61</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">97c2405899a3c2cc2e38b12158a34ef817b67bc043c72a1da2b1aa67f6608699</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">b43f75f93755916cd7662809f920674ff0ee386549c0c1425cc08a180aef832b</sum></package><package arch="i686" name="xorg-x11-server-devel" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-15.el7_9.i686.rpm</filename><sum type="sha256">21aba054790d48f8b74cd55320fea0b6b2b8bd4afde2619f98143688b977283f</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">cccae5645a379eb7651f950e94e10ff2c9b9eb125ff58b3482125c9e41e461ec</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">b3c791887936cc4ae55234af68d275037b4d90c2f0823745aa024e7b6cc7b138</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-15.el7_9.x86_64.rpm</filename><sum type="sha256">ce9b2f9a96cb6f7e910bee5639099c84ce13bb87dc6a8d001c67dccb4195668d</sum></package><package arch="noarch" name="xorg-x11-server-source" release="15.el7_9" src="xorg-x11-server-1.20.4-15.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-15.el7_9.noarch.rpm</filename><sum type="sha256">28092e85516bb3ad3abaaa0a8b12b886194e9a4ab782b91d22231fecb2c2b59d</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5408" id="RHSA-2020:5408-1" title="Rhsa-2020:5408-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5434-1</id><title>Targetcli</title><description>Security Fix(es): 
* targetcli: weak permissions for /etc/target and backup files (CVE-2020-13867)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="targetcli" release="1.el7_9" src="targetcli-2.1.53-1.el7_9.src.rpm" version="2.1.53"><filename>targetcli-2.1.53-1.el7_9.noarch.rpm</filename><sum type="sha256">f1961207eea2a46a9b25e2d7d57195737a0fe1065b3b41498db025f6c36b0b49</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5434" id="RHSA-2020:5434-1" title="Rhsa-2020:5434-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5435-1</id><title>Python-Rtslib</title><description>Security Fix(es): 
* python-rtslib: weak permissions for /etc/target/saveconfig.json (CVE-2020-14019)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-rtslib-doc" release="1.el7_9" src="python-rtslib-2.1.74-1.el7_9.src.rpm" version="2.1.74"><filename>python-rtslib-doc-2.1.74-1.el7_9.noarch.rpm</filename><sum type="sha256">38c2d69ce491410d16dcc623d71d2ba6d7cd30792f3efd20768cbe67df54f372</sum></package><package arch="noarch" name="python-rtslib" release="1.el7_9" src="python-rtslib-2.1.74-1.el7_9.src.rpm" version="2.1.74"><filename>python-rtslib-2.1.74-1.el7_9.noarch.rpm</filename><sum type="sha256">34ed38fcd5a5d16bf9c664b9a92f7daf7464ec726c1e79df4b99d50df1737d45</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5435" id="RHSA-2020:5435-1" title="Rhsa-2020:5435-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5437-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt (CVE-2020-14385) 
* kernel: The flow_dissector feature allows device tracking (CVE-2019-18282) 
* kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned. (CVE-2020-10769) 
* kernel: buffer uses out of index in ext3/4 filesystem (CVE-2020-14314) 
* kernel: umask not applied on filesystem without ACL support (CVE-2020-24394) 
* kernel: TOCTOU mismatch in the NFS client code (CVE-2020-25212) 
* kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow (CVE-2020-25643)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kernel-abi-whitelists" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.11.1.el7.noarch.rpm</filename><sum type="sha256">8c4901a1254d52706a8026f9afa5b964c896fa61d871a47079c886e5434978bb</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">074a2ca70735365ae82e9859c9fb8820f3d264b5eebd7f7384fddb980c8d44be</sum></package><package arch="x86_64" name="perf" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">3e60b1603a251cb4af8f03c0bc08ef03504dda7ef9e0d50efc34f888cb7bc920</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">f3984b7e00b733ed304ad9d2d1ad2c6d9030b3e8a3cc5430f7cf112a2ff1ce12</sum></package><package arch="x86_64" name="kernel-tools" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">0756af1a558d435b5a1b5788bba4d62c3ce18384bea6d923907834a4d391ca89</sum></package><package arch="x86_64" name="kernel-headers" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">18f207344f466c5b6e74407601a61ea3185e644570f53fdb7df45290e5857e99</sum></package><package arch="x86_64" name="bpftool" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">613af626396059c1078e7f852972e17b69faf1df7b048d6b581f4298a67460f3</sum></package><package arch="x86_64" name="python-perf" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">f074050a3bde5f5f20b5402b58a3aab71f9cb94edbd5bef991c127e9f463bde7</sum></package><package arch="x86_64" name="kernel" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">cf318a19af37dcd5a560f417ec291a5766a60ec24e9eb2d762f936beb26e6a47</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">91db286c495fd0f265c5bc0289268239c2d0303c21844bf1415b0310ca867a66</sum></package><package arch="noarch" name="kernel-doc" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.11.1.el7.noarch.rpm</filename><sum type="sha256">4b790062be5b1197903241e00a4ce71a06e3b3952ee700a67880eebdd161b388</sum></package><package arch="x86_64" name="kernel-debug" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">01b2018f24bebe98aa6e01b7c5459bf12743278485212b48fe8f9bddd59eb947</sum></package><package arch="x86_64" name="kernel-devel" release="1160.11.1.el7" src="kernel-3.10.0-1160.11.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.11.1.el7.x86_64.rpm</filename><sum type="sha256">01b394eb16a7a6be9c376e088f71a0c44eb4249a28c05fe9a72d53631fb08a81</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5437" id="RHSA-2020:5437-1" title="Rhsa-2020:5437-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5439-1</id><title>Samba</title><description>Security Fix(es): 
* samba: Netlogon elevation of privilege vulnerability (Zerologon) (CVE-2020-1472) 
* samba: Missing handle permissions check in SMB1/2/3 ChangeNotify (CVE-2020-14318) 
* samba: Unprivileged user can crash winbind (CVE-2020-14323)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libwbclient-devel" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">b076a9f33db35192bbe69ddc9517f2144661cb2756de1d628b5de2ab5a334c7b</sum></package><package arch="noarch" name="samba-pidl" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-pidl-4.10.16-9.el7_9.noarch.rpm</filename><sum type="sha256">3a45929ff73f086c20b0a688e69ef39579cf32ef1e9c5c96c7710496c79ffadb</sum></package><package arch="i686" name="samba-test-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">440286e7959b0a2cf2a559cfc8bf7c5842d258b6f43a0b2a02247cb90f44d6a1</sum></package><package arch="x86_64" name="samba-common-tools" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-common-tools-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">00c9de7f1cee8e94b586633ba12a1646f89d9575bfc324aa6e9893adbd412b8c</sum></package><package arch="i686" name="samba-winbind-modules" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">2efb086f89ba6912cef4104107b9dc01431fdfa669245c1fc061a97749b406b4</sum></package><package arch="i686" name="libwbclient-devel" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">e86d831cbb14eea16e57267c13a3bfdf06cdec971de24c476e14371a01006b89</sum></package><package arch="x86_64" name="samba-devel" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">38f0416a4ecb0e7ebb6bb334f9a75709e2c8e2188270fefea9966db2e6a69ffb</sum></package><package arch="x86_64" name="ctdb" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>ctdb-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">612a9671a5afdfbb3e174a8b747bf1c96e2c5bfb515bf7a93df196c71d5d139b</sum></package><package arch="x86_64" name="samba-krb5-printing" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-krb5-printing-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">d78679a5aa74bcda36d9974620f0b8cfedec6e1f47a91fbce65ae5e23d5b3490</sum></package><package arch="x86_64" name="samba-test-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">0b91a59f9c5d32bae9d04b11b50595a48e404f15b4028c9dae01329507923dd8</sum></package><package arch="i686" name="samba-python" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">40217003284ac87071f9769e54b664943c738205ae94df6c9f13321692a77a04</sum></package><package arch="x86_64" name="samba" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">abf987af637efa73be4eac3641569c7bc4cfee8b251450d6a1370756a74cb1d2</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-krb5-locator-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">031218649908fa353e5a8c2af61e9054cb39ffcfc8264ee8ac7a677440b4d9d4</sum></package><package arch="x86_64" name="samba-test" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-test-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">3ab1e89086f913190e3587876a6da9484d97916ccc0302bd04884a9913c55919</sum></package><package arch="i686" name="samba-client-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">f80fded3dda885bdf26417baaa147b6d4d7961990adc48677e2e419d3a5b56c2</sum></package><package arch="x86_64" name="samba-winbind-clients" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-clients-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">e4fab9053b7ba9b38722867bfdfb42fe7c990e577baaedefe6b50c7e0c75dfd0</sum></package><package arch="x86_64" name="samba-winbind" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">e3ea6c53cd4e4a8dd2ad0a380c0d55f72d28c563ff59e6cdb5464de51951d18d</sum></package><package arch="i686" name="libsmbclient-devel" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">4db73018e1489cf37ea5ed6abdfc1250946046971a05741eb565a17d513c4471</sum></package><package arch="x86_64" name="samba-common-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">46407be156046b26ccbcf0cf131c8a692ce20c4fbfd186d31939e623f5defb39</sum></package><package arch="i686" name="samba-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">519e0a4e6bb18214cfa971b232228ff43feda3f36ed123c177ff2ce00feb5b52</sum></package><package arch="x86_64" name="ctdb-tests" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>ctdb-tests-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">b5ecc1bc7a4e2f1a0c2083725d83c7e9d14a464e2d5fe429bb516da24a5e7b6e</sum></package><package arch="i686" name="samba-common-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">a9501b4b0918e9be3d9fef799513020f2f61a6dac411d9c87427d70b1df1b002</sum></package><package arch="x86_64" name="samba-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">3920df3a2074dcb6633966fda57013415d63549b3a51e8fa993c57af2d8b0e19</sum></package><package arch="x86_64" name="samba-dc" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">f271d4c8fc59778b3b8546be5c012d971833fff265e96060c707ea6a9cb543ab</sum></package><package arch="i686" name="libsmbclient" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">56efcdcd4fe1755029a174cb76499b2bfece3ec8f226435265a7b1d18f3444be</sum></package><package arch="noarch" name="samba-common" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-common-4.10.16-9.el7_9.noarch.rpm</filename><sum type="sha256">8042e4e4498238bd6f4eeeef17522327228b39708be95839399d54209c0cf126</sum></package><package arch="i686" name="libwbclient" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">bfae295faf35a3784d08fd0cc0e76ab928dfe85a67e8542b97318740b7ac5cc2</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-vfs-glusterfs-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">3132857bdc0fcec518e8acb2b76662447c28bc201249fa6acb401b75da54dad6</sum></package><package arch="x86_64" name="libwbclient" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">facd100d567679a5e3aa45f595cedbfa4197d17c4521c3fb59dd58696491aaa1</sum></package><package arch="x86_64" name="samba-winbind-modules" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">efe3852c88c046489eecb30a7b8a61e8fc9f02b0115a70f058721293394c21ac</sum></package><package arch="x86_64" name="samba-client-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">e326f21e78e4f94efcd3c3d83cfc199c4e73af0b5feb4a2726c784fa11b409aa</sum></package><package arch="x86_64" name="samba-python" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">e8cca8a7f801b65b906a85bf563bb92a26cd1f1cea813b09c411a24a6825c2de</sum></package><package arch="x86_64" name="samba-dc-libs" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-libs-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">2909b4efe04c93c004227897e2fb7a63a02d8bf698b8ced94d01c672d69cde93</sum></package><package arch="x86_64" name="samba-python-test" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-python-test-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">2a3764105780fcec87cfc7bfd12f80e964d091148cc161ec6f2e8b8d5c6a50af</sum></package><package arch="x86_64" name="samba-client" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-client-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">66843da5bf400fc5a2b51436f14a76168fe62e236105023477f2de19c4110b8d</sum></package><package arch="x86_64" name="libsmbclient" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">9ffb0c883afdde797002ba30d19b5e199cbbe4c7606cbabe8b1822cb3a6d131b</sum></package><package arch="i686" name="samba-devel" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-9.el7_9.i686.rpm</filename><sum type="sha256">090851bfc72aebe18ed191ca16a3cc57251a653a9381c485872cea5f58232254</sum></package><package arch="x86_64" name="libsmbclient-devel" release="9.el7_9" src="samba-4.10.16-9.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-9.el7_9.x86_64.rpm</filename><sum type="sha256">3358e17bd6642a2f9ca9247da03aaf13d2b635b0c225a12a5a25064c0b5c8f15</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5439" id="RHSA-2020:5439-1" title="Rhsa-2020:5439-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5443-1</id><title>Gd</title><description>Security Fix(es): 
* gd: Integer overflow in _gd2GetHeader() resulting in heap overflow (CVE-2016-5766)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gd-devel" release="27.el7_9" src="gd-2.0.35-27.el7_9.src.rpm" version="2.0.35"><filename>gd-devel-2.0.35-27.el7_9.x86_64.rpm</filename><sum type="sha256">649bdfb3f448048e424b079817af7ac828e5133323f87bd84aeea5fac6c348ca</sum></package><package arch="x86_64" name="gd" release="27.el7_9" src="gd-2.0.35-27.el7_9.src.rpm" version="2.0.35"><filename>gd-2.0.35-27.el7_9.x86_64.rpm</filename><sum type="sha256">8b22d155263ae48053312e120ad698f6691a26cbdcb53a29352683ed3c58ef31</sum></package><package arch="i686" name="gd-devel" release="27.el7_9" src="gd-2.0.35-27.el7_9.src.rpm" version="2.0.35"><filename>gd-devel-2.0.35-27.el7_9.i686.rpm</filename><sum type="sha256">6098eaf3c89f9adc5feb38e58ebc2cbd2740ba4e3fc45e79edb50c313ff4fe77</sum></package><package arch="x86_64" name="gd-progs" release="27.el7_9" src="gd-2.0.35-27.el7_9.src.rpm" version="2.0.35"><filename>gd-progs-2.0.35-27.el7_9.x86_64.rpm</filename><sum type="sha256">c1a23e3027865afcf15a1d2e06244f0b21f0ce8db329622b8d14e7e81704db26</sum></package><package arch="i686" name="gd" release="27.el7_9" src="gd-2.0.35-27.el7_9.src.rpm" version="2.0.35"><filename>gd-2.0.35-27.el7_9.i686.rpm</filename><sum type="sha256">b6a019ac8d2811b6eb3296ab2c7e6a72c0bb66a0c848d53764d54111c462c601</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5443" id="RHSA-2020:5443-1" title="Rhsa-2020:5443-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5453-1</id><title>Pacemaker</title><description>Security Fix(es): 
* pacemaker: ACL restrictions bypass (CVE-2020-25654)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2020-12-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pacemaker" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">ae3bba33a30bb03d79e842d929b208994522c37c9977689e76b884755b38dec6</sum></package><package arch="x86_64" name="pacemaker-cts" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-cts-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">f7ab16be28c957f828ec50d955adfb38bfe761e1227191b1d0f81dd5f2ed8eb8</sum></package><package arch="x86_64" name="pacemaker-cli" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-cli-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">d0087929e1f47f53190f5fbf4d8fe27e38a25bc761ca9ba9588ea414ba4d7657</sum></package><package arch="x86_64" name="pacemaker-libs-devel" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-libs-devel-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">7cec82a8fa695ce95c8dc6a9afd2a81953378a288b588f3bc9625de7919da188</sum></package><package arch="i686" name="pacemaker-libs-devel" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-libs-devel-1.1.23-1.el7_9.1.i686.rpm</filename><sum type="sha256">e31001032b9a817b564d4c6c391c732fcce21415a6286678668fef5a87b0e9ea</sum></package><package arch="x86_64" name="pacemaker-remote" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-remote-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">51d1edcf063c3879e8ab0eea384d56bed87768ca583037f2be802612ead7bf59</sum></package><package arch="x86_64" name="pacemaker-doc" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-doc-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">993efca7ba035e125ad01223a8b75047cf4db2c60a2d463655c1cbecc8e38725</sum></package><package arch="x86_64" name="pacemaker-nagios-plugins-metadata" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-nagios-plugins-metadata-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">e0bba6c20f230d4333a2b050b2fc240886d29b28aca71b1675efe08397bd4a10</sum></package><package arch="i686" name="pacemaker-libs" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-libs-1.1.23-1.el7_9.1.i686.rpm</filename><sum type="sha256">02d2eb1cf8b91bb2e0c736fafd47e28f0f2f721980e93a7f3ac7d7ca85e10075</sum></package><package arch="i686" name="pacemaker-cluster-libs" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-cluster-libs-1.1.23-1.el7_9.1.i686.rpm</filename><sum type="sha256">b323aa8453cb317274a80e53f4b62ad3a90fc6aa19354a9f555e9c8656cacd90</sum></package><package arch="x86_64" name="pacemaker-libs" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-libs-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">a0ea29234910e70b9d1fa10fd7f12dab0a432c90dd75fc5c556e5e83c131253f</sum></package><package arch="x86_64" name="pacemaker-cluster-libs" release="1.el7_9.1" src="pacemaker-1.1.23-1.el7_9.1.src.rpm" version="1.1.23"><filename>pacemaker-cluster-libs-1.1.23-1.el7_9.1.x86_64.rpm</filename><sum type="sha256">83b6faf7f1326a0139ff3b89a28d8e314962a83618d819a1fd9033638c3b020a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5453" id="RHSA-2020:5453-1" title="Rhsa-2020:5453-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5561-1</id><title>Firefox</title><description>Security Fix(es): 
* chromium-browser: Uninitialized Use in V8 (CVE-2020-16042) 
* Mozilla: Heap buffer overflow in WebGL (CVE-2020-26971) 
* Mozilla: CSS Sanitizer performed incorrect sanitization (CVE-2020-26973) 
* Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use-after-free (CVE-2020-26974) 
* Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6 (CVE-2020-35113) 
* Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2020-26978) 
* Mozilla: The proxy.onRequest API did not catch view-source URLs (CVE-2020-35111)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.6.0-1.el7_9.src.rpm" version="78.6.0"><filename>firefox-78.6.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">0d6c4bd288c7d0a631ae8312388c5237d3f3d49d362067931f0c964cbac8b520</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.6.0-1.el7_9.src.rpm" version="78.6.0"><filename>firefox-78.6.0-1.el7_9.i686.rpm</filename><sum type="sha256">5c1c1f487c0ee722a18c9d0a2d1773a488d2035cd91be329429dfc49017c2fff</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2020:5561" id="RHSA-2020:5561-1" title="Rhsa-2020:5561-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5566-1</id><title>Openssl</title><description>Security Fix(es): 
* openssl: EDIPARTYNAME NULL pointer de-reference (CVE-2020-1971)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl-libs" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-21.el7_9.x86_64.rpm</filename><sum type="sha256">4ab783a4b56a43eaa048038f945673f33909a21827029d5ee93b4c81b2f4d92e</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-21.el7_9.i686.rpm</filename><sum type="sha256">2f99416e28a3c658927d78ec90fccfc640eb34bc303f9fa15688a0f049acfb86</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-21.el7_9.x86_64.rpm</filename><sum type="sha256">25730dc215dab87a5e0cba02d8dc32feb2ad2b924d97e568eb75d86c2377ab8d</sum></package><package arch="x86_64" epoch="1" name="openssl" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-1.0.2k-21.el7_9.x86_64.rpm</filename><sum type="sha256">4099de643d8ffb0d9d7adfd5fcd3b57be8aa259b40a444e71e2bdbfe398ec449</sum></package><package arch="i686" epoch="1" name="openssl-static" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-21.el7_9.i686.rpm</filename><sum type="sha256">5324134a3422bb4d2e370d8fd60b425f256ffce1ca7b2f9b5f1766915a5ae87b</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-21.el7_9.i686.rpm</filename><sum type="sha256">6b0eba3b5d8c40fc55a6cbb70138d15c50baf2325cf5f637ff2696afcda2d7a0</sum></package><package arch="x86_64" epoch="1" name="openssl-devel" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-21.el7_9.x86_64.rpm</filename><sum type="sha256">2ff54248f85df13efadba6fe2669cfb9cbc7cfd6901218fb56f02821dc6255c7</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="21.el7_9" src="openssl-1.0.2k-21.el7_9.src.rpm" version="1.0.2k"><filename>openssl-perl-1.0.2k-21.el7_9.x86_64.rpm</filename><sum type="sha256">d3f15aa14d37b7458ce9c8f81ad92b40434161a838e064006949813cadecffc1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1971" id="CVE-2020-1971" title="Openssl: Edipartyname Null Pointer De-Reference" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5566" id="RHSA-2020:5566-1" title="Rhsa-2020:5566-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1903409" id="1903409" title="Openssl: Edipartyname Null Pointer De-Reference" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2020:5618-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.6.0. 
Security Fix(es): 
* chromium-browser: Uninitialized Use in V8 (CVE-2020-16042) 
* Mozilla: Heap buffer overflow in WebGL (CVE-2020-26971) 
* Mozilla: CSS Sanitizer performed incorrect sanitization (CVE-2020-26973) 
* Mozilla: Incorrect cast of StyleGenericFlexBasis resulted in a heap use- after-free (CVE-2020-26974) 
* Mozilla: Memory safety bugs fixed in Firefox 84 and Firefox ESR 78.6 (CVE-2020-35113) 
* Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2020-26978) 
* Mozilla: The proxy.onRequest API did not catch view-source URLs (CVE-2020-35111)</description><severity>important</severity><release>Scientific Linux</release><issued date="2020-12-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.6.0-1.el7_9.src.rpm" version="78.6.0"><filename>thunderbird-78.6.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">24422101a4101285534840c54c1008ac45327f0e93b99ebec74e41c60d009b27</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16042" id="CVE-2020-16042" title="Chromium-Browser: Uninitialized Use In V8" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26971" id="CVE-2020-26971" title="Mozilla: Heap Buffer Overflow In Webgl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26973" id="CVE-2020-26973" title="Mozilla: Css Sanitizer Performed Incorrect Sanitization" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26974" id="CVE-2020-26974" title="Mozilla: Incorrect Cast Of Stylegenericflexbasis Resulted In A Heap Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26978" id="CVE-2020-26978" title="Mozilla: Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35111" id="CVE-2020-35111" title="Mozilla: The Proxy.Onrequest Api Did Not Catch View-Source Urls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35113" id="CVE-2020-35113" title="Mozilla: Memory Safety Bugs Fixed In Firefox 84 And Firefox Esr 78.6" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2020:5618" id="RHSA-2020:5618-1" title="Rhsa-2020:5618-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1904515" id="1904515" title="Chromium-Browser: Uninitialized Use In V8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908022" id="1908022" title="Mozilla: Heap Buffer Overflow In Webgl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908023" id="1908023" title="Mozilla: Css Sanitizer Performed Incorrect Sanitization" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908024" id="1908024" title="Mozilla: Incorrect Cast Of Stylegenericflexbasis Resulted In A Heap Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908025" id="1908025" title="Mozilla: Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908027" id="1908027" title="Mozilla: The Proxy.Onrequest Api Did Not Catch View-Source Urls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908029" id="1908029" title="Mozilla: Memory Safety Bugs Fixed In Firefox 84 And Firefox Esr 78.6" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0024-1</id><title>Imagemagick</title><description>Security Fix(es): 
* ImageMagick: Shell injection via PDF password could result in arbitrary code execution (CVE-2020-29599)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-01-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ImageMagick-perl" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-perl-6.9.10.68-5.el7_9.x86_64.rpm</filename><sum type="sha256">35ed20c4a1405b7be51394d2770f8a6cb1ce8727ae75d6d3dd7e11d21181344b</sum></package><package arch="i686" name="ImageMagick-devel" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-devel-6.9.10.68-5.el7_9.i686.rpm</filename><sum type="sha256">38a5bc8854084aea0e436621674b7342c734829122be1f2058521c6a81b1df89</sum></package><package arch="x86_64" name="ImageMagick-c++-devel" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-devel-6.9.10.68-5.el7_9.x86_64.rpm</filename><sum type="sha256">c2557d70027530bb4e624c9789ba066907eb63145e00bcc4191d80800f6f14a9</sum></package><package arch="x86_64" name="ImageMagick-devel" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-devel-6.9.10.68-5.el7_9.x86_64.rpm</filename><sum type="sha256">263a8c54000db5a2c00dc0d1c8c6eb6c498857eaa6dfcc32979da35f66bdbaa7</sum></package><package arch="x86_64" name="ImageMagick-doc" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-doc-6.9.10.68-5.el7_9.x86_64.rpm</filename><sum type="sha256">1902faa24f58f417c8470021e076e97d10952b55e960a365d261c3badc438d29</sum></package><package arch="x86_64" name="ImageMagick" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-6.9.10.68-5.el7_9.x86_64.rpm</filename><sum type="sha256">007a874cbb5e96e0ec9d091dc1e1375f5163bc7b51fb924b588b4a9e89693d33</sum></package><package arch="i686" name="ImageMagick-c++-devel" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-devel-6.9.10.68-5.el7_9.i686.rpm</filename><sum type="sha256">b456d51876febb32c76dac09baa9c049c2a05189e8faf5b3b031170cf506b943</sum></package><package arch="i686" name="ImageMagick" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-6.9.10.68-5.el7_9.i686.rpm</filename><sum type="sha256">962a00fd6dd0394c38fa745e7b153b4fc4604d16450524ee89d4c89d2c4ae7df</sum></package><package arch="i686" name="ImageMagick-c++" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-6.9.10.68-5.el7_9.i686.rpm</filename><sum type="sha256">8c7cb49693f69f88cfce4cee36178f33bbb1569e4f2b33f3c279dfffc162bf40</sum></package><package arch="x86_64" name="ImageMagick-c++" release="5.el7_9" src="ImageMagick-6.9.10.68-5.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-6.9.10.68-5.el7_9.x86_64.rpm</filename><sum type="sha256">203e4810eb5b87904246399de6deec2bb5476e647432cc3fb3cb783a63f969f2</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2021:0024" id="RHSA-2021:0024-1" title="Rhsa-2021:0024-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0053-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.6.1 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk (CVE-2020-16044)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2021-01-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.6.1-1.el7_9.src.rpm" version="78.6.1"><filename>firefox-78.6.1-1.el7_9.i686.rpm</filename><sum type="sha256">4f8f75fe33d42ec9e805e56187ee91e42c099a99a22371bdd370f5acdf4717a0</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.6.1-1.el7_9.src.rpm" version="78.6.1"><filename>firefox-78.6.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">8b08548589ca2d090a5090b87ad796bc4b16114224126f9945f0c0f89a03a6de</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044" id="CVE-2020-16044" title="Mozilla: Use-After-Free Write When Handling A Malicious Cookie-Echo Sctp Chunk" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0053" id="RHSA-2021:0053-1" title="Rhsa-2021:0053-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1913503" id="1913503" title="Mozilla: Use-After-Free Write When Handling A Malicious Cookie-Echo Sctp Chunk" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0087-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.6.1. 
Security Fix(es): 
* Mozilla: Use-after-free write when handling a malicious COOKIE-ECHO SCTP chunk (CVE-2020-16044)</description><severity>critical</severity><release>Scientific Linux</release><issued date="2021-01-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.6.1-1.el7_9.src.rpm" version="78.6.1"><filename>thunderbird-78.6.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">a9297af8abb6b9ee3f7c109429da762fde47e129d27893f0aec68f2cfb840ce8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16044" id="CVE-2020-16044" title="Mozilla: Use-After-Free Write When Handling A Malicious Cookie-Echo Sctp Chunk" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0087" id="RHSA-2021:0087-1" title="Rhsa-2021:0087-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1913503" id="1913503" title="Mozilla: Use-After-Free Write When Handling A Malicious Cookie-Echo Sctp Chunk" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0153-1</id><title>Dnsmasq</title><description>Security Fix(es): 
* dnsmasq: loose address/port check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25684) 
* dnsmasq: loose query name check in reply_query() makes forging replies easier for an off-path attacker (CVE-2020-25685) 
* dnsmasq: multiple queries forwarded for the same name makes forging replies easier for an off-path attacker (CVE-2020-25686)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-01-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="dnsmasq" release="16.el7_9.1" src="dnsmasq-2.76-16.el7_9.1.src.rpm" version="2.76"><filename>dnsmasq-2.76-16.el7_9.1.x86_64.rpm</filename><sum type="sha256">6729ababc68f71a67e57ee1a7c0b81375a2804a4081a054fa0f8d03fcdcc046b</sum></package><package arch="x86_64" name="dnsmasq-utils" release="16.el7_9.1" src="dnsmasq-2.76-16.el7_9.1.src.rpm" version="2.76"><filename>dnsmasq-utils-2.76-16.el7_9.1.x86_64.rpm</filename><sum type="sha256">d6187f9c7b3e1aab9110e2fd2a764e32f9e4e46af3419d745a1c54aa6423e585</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25684" id="CVE-2020-25684" title="Dnsmasq: Loose Address/Port Check In Reply_Query() Makes Forging Replies Easier For An Off-Path Attacker" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25685" id="CVE-2020-25685" title="Dnsmasq: Loose Query Name Check In Reply_Query() Makes Forging Replies Easier For An Off-Path Attacker" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25686" id="CVE-2020-25686" title="Dnsmasq: Multiple Queries Forwarded For The Same Name Makes Forging Replies Easier For An Off-Path Attacker" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0153" id="RHSA-2021:0153-1" title="Rhsa-2021:0153-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1889686" id="1889686" title="Dnsmasq: Loose Address/Port Check In Reply_Query() Makes Forging Replies Easier For An Off-Path Attacker" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1889688" id="1889688" title="Dnsmasq: Loose Query Name Check In Reply_Query() Makes Forging Replies Easier For An Off-Path Attacker" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1890125" id="1890125" title="Dnsmasq: Multiple Queries Forwarded For The Same Name Makes Forging Replies Easier For An Off-Path Attacker" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0162-1</id><title>Xstream</title><description>Security Fix(es): 
* XStream: remote code execution due to insecure XML deserialization when relying on blocklists (CVE-2020-26217)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-01-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="xstream-javadoc" release="12.el7_9" src="xstream-1.3.1-12.el7_9.src.rpm" version="1.3.1"><filename>xstream-javadoc-1.3.1-12.el7_9.noarch.rpm</filename><sum type="sha256">d1c3984fcbe1a1b24baec7263e375eadc97b343c9a463f934c92e43a4e1cf0ff</sum></package><package arch="noarch" name="xstream" release="12.el7_9" src="xstream-1.3.1-12.el7_9.src.rpm" version="1.3.1"><filename>xstream-1.3.1-12.el7_9.noarch.rpm</filename><sum type="sha256">72fb816c08d0492a3c4beddb831f9b13718f36bd9c071a40576baebea1d75bfd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26217" id="CVE-2020-26217" title="Xstream: Remote Code Execution Due To Insecure Xml Deserialization When Relying On Blocklists" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0162" id="RHSA-2021:0162-1" title="Rhsa-2021:0162-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1898907" id="1898907" title="Xstream: Remote Code Execution Due To Insecure Xml Deserialization When Relying On Blocklists" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0221-1</id><title>Sudo</title><description>Security Fix(es): 
* sudo: Heap buffer overflow in argument parsing (CVE-2021-3156)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-01-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="sudo" release="10.el7_9.1" src="sudo-1.8.23-10.el7_9.1.src.rpm" version="1.8.23"><filename>sudo-1.8.23-10.el7_9.1.x86_64.rpm</filename><sum type="sha256">5423b800533b588b826b3262e43317d7483ded52bec632b31e2ad6a7196959a3</sum></package><package arch="x86_64" name="sudo-devel" release="10.el7_9.1" src="sudo-1.8.23-10.el7_9.1.src.rpm" version="1.8.23"><filename>sudo-devel-1.8.23-10.el7_9.1.x86_64.rpm</filename><sum type="sha256">70d08e1e1e5a472c05109310f94e7080642cb63861cf299c0c4461b4a0fdd814</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3156" id="CVE-2021-3156" title="Sudo: Heap Buffer Overflow In Argument Parsing" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0221" id="RHSA-2021:0221-1" title="Rhsa-2021:0221-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1917684" id="1917684" title="Sudo: Heap Buffer Overflow In Argument Parsing" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0290-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.7.0 ESR. 
Security Fix(es): 
* Mozilla: Cross-origin information leakage via redirected PDF requests (CVE-2021-23953) 
* Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements (CVE-2021-23954) 
* Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7 (CVE-2021-23964) 
* Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been (CVE-2020-26976) 
* Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC (CVE-2021-23960)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-01-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="2.el7_9" src="firefox-78.7.0-2.el7_9.src.rpm" version="78.7.0"><filename>firefox-78.7.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">aefb9ecf93045e1f02b4d18b8454ea6a069d36374d511813302be771e372b6ca</sum></package><package arch="i686" name="firefox" release="2.el7_9" src="firefox-78.7.0-2.el7_9.src.rpm" version="78.7.0"><filename>firefox-78.7.0-2.el7_9.i686.rpm</filename><sum type="sha256">fcf145cb6953a4256c0a7ee96f328579e3a0f81fc046931f75aabff454ec4dad</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976" id="CVE-2020-26976" title="Mozilla: Https Pages Could Have Been Intercepted By A Registered Service Worker When They Should Not Have Been" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953" id="CVE-2021-23953" title="Mozilla: Cross-Origin Information Leakage Via Redirected Pdf Requests" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954" id="CVE-2021-23954" title="Mozilla: Type Confusion When Using Logical Assignment Operators In Javascript Switch Statements" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960" id="CVE-2021-23960" title="Mozilla: Use-After-Poison For Incorrectly Redeclared Javascript Variables During Gc" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964" id="CVE-2021-23964" title="Mozilla: Memory Safety Bugs Fixed In Firefox 85 And Firefox Esr 78.7" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0290" id="RHSA-2021:0290-1" title="Rhsa-2021:0290-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920646" id="1920646" title="Mozilla: Cross-Origin Information Leakage Via Redirected Pdf Requests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920648" id="1920648" title="Mozilla: Type Confusion When Using Logical Assignment Operators In Javascript Switch Statements" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920649" id="1920649" title="Mozilla: Https Pages Could Have Been Intercepted By A Registered Service Worker When They Should Not Have Been" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920650" id="1920650" title="Mozilla: Use-After-Poison For Incorrectly Redeclared Javascript Variables During Gc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920651" id="1920651" title="Mozilla: Memory Safety Bugs Fixed In Firefox 85 And Firefox Esr 78.7" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0297-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.7.0. 
Security Fix(es): 
* Mozilla: Cross-origin information leakage via redirected PDF requests (CVE-2021-23953) 
* Mozilla: Type confusion when using logical assignment operators in JavaScript switch statements (CVE-2021-23954) 
* Mozilla: Memory safety bugs fixed in Firefox 85 and Firefox ESR 78.7 (CVE-2021-23964) 
* Mozilla: IMAP Response Injection when using STARTTLS (CVE-2020-15685) 
* Mozilla: HTTPS pages could have been intercepted by a registered service worker when they should not have been (CVE-2020-26976) 
* Mozilla: Use-after-poison for incorrectly redeclared JavaScript variables during GC (CVE-2021-23960)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-01-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.7.0-1.el7_9.src.rpm" version="78.7.0"><filename>thunderbird-78.7.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">da24d84fbba521a1fd1d55d856a97ac7be93b07dd9850ee602f76e37e112e419</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15685" id="CVE-2020-15685" title="Mozilla: Imap Response Injection When Using Starttls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26976" id="CVE-2020-26976" title="Mozilla: Https Pages Could Have Been Intercepted By A Registered Service Worker When They Should Not Have Been" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23953" id="CVE-2021-23953" title="Mozilla: Cross-Origin Information Leakage Via Redirected Pdf Requests" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23954" id="CVE-2021-23954" title="Mozilla: Type Confusion When Using Logical Assignment Operators In Javascript Switch Statements" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23960" id="CVE-2021-23960" title="Mozilla: Use-After-Poison For Incorrectly Redeclared Javascript Variables During Gc" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23964" id="CVE-2021-23964" title="Mozilla: Memory Safety Bugs Fixed In Firefox 85 And Firefox Esr 78.7" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0297" id="RHSA-2021:0297-1" title="Rhsa-2021:0297-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920646" id="1920646" title="Mozilla: Cross-Origin Information Leakage Via Redirected Pdf Requests" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920648" id="1920648" title="Mozilla: Type Confusion When Using Logical Assignment Operators In Javascript Switch Statements" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920649" id="1920649" title="Mozilla: Https Pages Could Have Been Intercepted By A Registered Service Worker When They Should Not Have Been" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920650" id="1920650" title="Mozilla: Use-After-Poison For Incorrectly Redeclared Javascript Variables During Gc" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920651" id="1920651" title="Mozilla: Memory Safety Bugs Fixed In Firefox 85 And Firefox Esr 78.7" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1921543" id="1921543" title="Mozilla: Imap Response Injection When Using Starttls" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0336-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: use-after-free in fs/block_dev.c (CVE-2020-15436) 
* kernel: Nfsd failure to clear umask after processing an open or create (CVE-2020-35513) 
Bug Fix(es): 
* double free issue in filelayout_alloc_commit_info 
* Regression: Plantronics Device SHS2355-11 PTT button does not work after update to 7.7 
* Openstack network node reports unregister_netdevice: waiting for qr- 3cec0c92-9a to become free. Usage count = 1 
* dlm: add ability to interrupt waiting for acquire POSIX lock 
* [Azure][SL7] soft lockups and performance loss occurring during final fsync with parallel dd writes to xfs filesystem in azure instance 
* Guest crashed when hotplug vcpus on booting kernel stage 
* soft lockup occurs while a thread group leader is waiting on tasklist_waiters in mm_update_next_owner() where a huge number of the thread group members are exiting and trying to take the tasklist_lock. 
* [DELL EMC 7.6 BUG] Kioxia CM6 NVMe drive fails to enumerate 
* [Hyper-V][SL7] Request to included a commit that adds a timeout to vmbus_wait_for_unload 
* Unable to discover the LUNs from new storage port 
* SL 7.9 Kernel panic at ceph_put_snap_realm+0x21 
* A hard lockup occurrs where one task is looping in an sk_lock spinlock that has been taken by another task running timespec64_add_ns(). 
* ethtool/mlx5_core provides incorrect SFP module info 
* SL7.7 - zcrypt: Fix ZCRYPT_PERDEV_REQCNT ioctl 
* SL7.7 - s390/dasd: Fix zero write for FBA devices 
* [Azure]IP forwarding issue in netvsc[7.9.z] 
* Security patch for CVE-2020-25212 breaks directory listings via 'ls' on NFS V4.2 shares mounted with selinux enabled labels 
Enhancement(s): 
* RFE : handle better ERRbaduid on SMB1</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-02-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-debug" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">4819a3eb9dca66f723dfa5c13d6373518d260cde9d2c6f060a94d0b1e77b0b3e</sum></package><package arch="x86_64" name="perf" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">90114f195d468dfecac0fb18a9ce5729b7d851a4cb0bcf939bf32d5a58dfdfcd</sum></package><package arch="x86_64" name="python-perf" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">641f97a285f424556bbe68a21bf178e0ef2ef20905b29aab3210af75d103fe47</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">fe660577b9eaf88827f03c8381566415ad8e1bb3f1650e927c13ecbec550cbd2</sum></package><package arch="x86_64" name="kernel-devel" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">6e2d1b4c71950f840f62fc5181b4b8896f0715df42b1776df145f66fc8807109</sum></package><package arch="x86_64" name="kernel-tools" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">011bf1357ed906b856da1da696aa34b0363f0eded1c76a912905c9eed2072391</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">e5e98d69d8bf787726353d7de45385c0473b6d619cfd0231181dd27fa36eb526</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">f68403ea1737e930fb238d3bf1366df3b6427cedc9549ee2d921d114ba1574df</sum></package><package arch="noarch" name="kernel-doc" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.15.2.el7.noarch.rpm</filename><sum type="sha256">a403da577d61eca9239b730a897039157a0631dcb86dca6f68feb8fdc21a0282</sum></package><package arch="x86_64" name="kernel-headers" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">366f98be9c759b1a0c83154a9e3a2de474e4afbf6600c12149628ed46f2e14a2</sum></package><package arch="x86_64" name="kernel" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">220521bb5eac456a87ce0f75842a5f6e283dd26f69ebc503e9a2fa145c185884</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.15.2.el7.noarch.rpm</filename><sum type="sha256">05e3ce588d2f58ff8b8657f7f34d05ae57d7c27621e6186af6ecf4ccc23e8566</sum></package><package arch="x86_64" name="bpftool" release="1160.15.2.el7" src="kernel-3.10.0-1160.15.2.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.15.2.el7.x86_64.rpm</filename><sum type="sha256">f157c6631d357e858553558139fb5cb505ca50b43e3602c2d0736df2c18bed82</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-15436" id="CVE-2020-15436" title="Kernel: Use-After-Free In Fs/Block_Dev.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35513" id="CVE-2020-35513" title="Kernel: Nfsd Failure To Clear Umask After Processing An Open Or Create" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0336" id="RHSA-2021:0336-1" title="Rhsa-2021:0336-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1901168" id="1901168" title="Kernel: Use-After-Free In Fs/Block_Dev.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1911309" id="1911309" title="Kernel: Nfsd Failure To Clear Umask After Processing An Open Or Create" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1917504" id="1917504" title="Security Patch For Cve-2020-25212 Breaks Directory Listings Via 'Ls' On Nfs V4.2 Shares Mounted With Selinux Enabled Labels" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0339-1</id><title>Linux-Firmware</title><description>Security Fix(es): 
* hardware: buffer overflow in bluetooth firmware (CVE-2020-12321)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-02-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="iwl6000g2b-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl6000g2b-firmware-18.168.6.1-80.el7_9.noarch.rpm</filename><sum type="sha256">61fac0b0aa5a70b9407d35efa59114947ff835794f071a1db6c66302b83e6115</sum></package><package arch="noarch" name="linux-firmware" release="80.git78c0348.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="20200421"><filename>linux-firmware-20200421-80.git78c0348.el7_9.noarch.rpm</filename><sum type="sha256">a04f0ec2d675e33d01959e1a83242c245a2d39a7a2c944c9ff1009cdf6e45167</sum></package><package arch="noarch" name="iwl6050-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="41.28.5.1"><filename>iwl6050-firmware-41.28.5.1-80.el7_9.noarch.rpm</filename><sum type="sha256">09990683afec4d460dac7bfe114f290ebc74fa8713f0ac58085a21e7f86c6998</sum></package><package arch="noarch" name="iwl5000-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="8.83.5.1_1"><filename>iwl5000-firmware-8.83.5.1_1-80.el7_9.noarch.rpm</filename><sum type="sha256">a7da327f21ce36292d130875344e0e8a29685864c119177b2416a80190b9efde</sum></package><package arch="noarch" name="iwl3160-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="25.30.13.0"><filename>iwl3160-firmware-25.30.13.0-80.el7_9.noarch.rpm</filename><sum type="sha256">b441c460e2aff73fff57433dc2c1a269499d061e7824dcc3a5f7e4776093ad9d</sum></package><package arch="noarch" name="iwl5150-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="8.24.2.2"><filename>iwl5150-firmware-8.24.2.2-80.el7_9.noarch.rpm</filename><sum type="sha256">1309fbd237fcad5bbaf316bc5374f2020ab43416535194e4fac7404730bd0895</sum></package><package arch="noarch" name="iwl6000g2a-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl6000g2a-firmware-18.168.6.1-80.el7_9.noarch.rpm</filename><sum type="sha256">4fa1b02c8567b22d22a9160f692c5bf1964b5b6ce2c69247a257dcb5e95848ac</sum></package><package arch="noarch" name="iwl7260-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="25.30.13.0"><filename>iwl7260-firmware-25.30.13.0-80.el7_9.noarch.rpm</filename><sum type="sha256">50f87a1a5e9d58a92daf1f05b74d1eb117127a54d0d2da5c7c507619612af72f</sum></package><package arch="noarch" epoch="1" name="iwl1000-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="39.31.5.1"><filename>iwl1000-firmware-39.31.5.1-80.el7_9.noarch.rpm</filename><sum type="sha256">c639d41f580e6ba17208031184ec07414e2e09241967dce78acfc1036386bab2</sum></package><package arch="noarch" name="iwl135-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl135-firmware-18.168.6.1-80.el7_9.noarch.rpm</filename><sum type="sha256">d7440a356a4d6c9feb4a573c817eb1e3dbcb37f4dc94dbdfeb6600e6f53f003c</sum></package><package arch="noarch" name="iwl2000-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl2000-firmware-18.168.6.1-80.el7_9.noarch.rpm</filename><sum type="sha256">b2376b69963be7591f80ee41efad20b6c7001d42d260ab5d229287d2ec8d3ae0</sum></package><package arch="noarch" name="iwl6000-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="9.221.4.1"><filename>iwl6000-firmware-9.221.4.1-80.el7_9.noarch.rpm</filename><sum type="sha256">bf625e797575121e1d90ab40d4487d83578daf2dc8ee043453b4bd44c8cfdb21</sum></package><package arch="noarch" name="iwl100-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="39.31.5.1"><filename>iwl100-firmware-39.31.5.1-80.el7_9.noarch.rpm</filename><sum type="sha256">707ce9d9cea1f66a7bb4e3c721711e9575cb5a927ec6644fedbbb30de12dd413</sum></package><package arch="noarch" name="iwl2030-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl2030-firmware-18.168.6.1-80.el7_9.noarch.rpm</filename><sum type="sha256">0ccc1eeceda14b1c43ec3ba8060a006c0baa36948c3b6c13f60ab3342c7bc2f0</sum></package><package arch="noarch" name="iwl105-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl105-firmware-18.168.6.1-80.el7_9.noarch.rpm</filename><sum type="sha256">6c35d887982d431759d462240adc49e8ee0cf75846a4cadbda700b42ea88d394</sum></package><package arch="noarch" name="iwl3945-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="15.32.2.9"><filename>iwl3945-firmware-15.32.2.9-80.el7_9.noarch.rpm</filename><sum type="sha256">359d7aad7d2f44daf6f9f5e8fb3a227f45b7aba607138f749fc647b09297c245</sum></package><package arch="noarch" name="iwl4965-firmware" release="80.el7_9" src="linux-firmware-20200421-80.git78c0348.el7_9.src.rpm" version="228.61.2.24"><filename>iwl4965-firmware-228.61.2.24-80.el7_9.noarch.rpm</filename><sum type="sha256">3ff0d2ff99bfb7b9d6e7ea6f3159545ee33521dea7558a0f2a8ffa9e75898c93</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12321" id="CVE-2020-12321" title="Hardware: Buffer Overflow In Bluetooth Firmware" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0339" id="RHSA-2021:0339-1" title="Rhsa-2021:0339-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1893914" id="1893914" title="Hardware: Buffer Overflow In Bluetooth Firmware" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0343-1</id><title>Perl</title><description>Security Fix(es): 
* perl: heap-based buffer overflow in regular expression compiler leads to DoS (CVE-2020-10543) 
* perl: corruption of intermediate language state of compiled regular expression due to integer overflow leads to DoS (CVE-2020-10878) 
* perl: corruption of intermediate language state of compiled regular expression due to recursive S_study_chunk() calls leads to DoS (CVE-2020-12723)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-02-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="4" name="perl-macros" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-macros-5.16.3-299.el7_9.x86_64.rpm</filename><sum type="sha256">a879c7b50bb471730f8ee371ff90439aa238254bacf7b8cd7873afbe3b42538b</sum></package><package arch="noarch" epoch="1" name="perl-Object-Accessor" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="0.42"><filename>perl-Object-Accessor-0.42-299.el7_9.noarch.rpm</filename><sum type="sha256">d64afc4f611b5fadf848454ebc5d24ba6d29fad9eceb01e1b1eb9ef47f82d186</sum></package><package arch="noarch" epoch="1" name="perl-IO-Zlib" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="1.10"><filename>perl-IO-Zlib-1.10-299.el7_9.noarch.rpm</filename><sum type="sha256">696a5ac2086dab867d43a0f6a9a8ed324d0887e3acf41c5a064c2c41122ac2b4</sum></package><package arch="x86_64" epoch="4" name="perl-devel" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-devel-5.16.3-299.el7_9.x86_64.rpm</filename><sum type="sha256">96de282bb6995063683f9a9e03302fcc8e3259ad67bf4023f8d20ab9793f6a02</sum></package><package arch="x86_64" epoch="4" name="perl" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-5.16.3-299.el7_9.x86_64.rpm</filename><sum type="sha256">8a1ebda5a8b0d73310ce9a196fa387435c6c86e2b570476b10f055c13481c86d</sum></package><package arch="noarch" epoch="1" name="perl-Pod-Escapes" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="1.04"><filename>perl-Pod-Escapes-1.04-299.el7_9.noarch.rpm</filename><sum type="sha256">068db7d933a580c661090d8a379621bcee2d174b33a1d8976f5317b2ff59df6e</sum></package><package arch="x86_64" epoch="4" name="perl-libs" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-libs-5.16.3-299.el7_9.x86_64.rpm</filename><sum type="sha256">04d5bc27c7b13d66e657fd814dcbbe926f96552aa5805972137ccec6b9a23965</sum></package><package arch="noarch" epoch="1" name="perl-Module-CoreList" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="2.76.02"><filename>perl-Module-CoreList-2.76.02-299.el7_9.noarch.rpm</filename><sum type="sha256">eb4fb6d9d0878452d5ffaeeec24440164ac1ad7ed67c47c6b0daaea384ebeeb6</sum></package><package arch="noarch" epoch="1" name="perl-Locale-Maketext-Simple" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="0.21"><filename>perl-Locale-Maketext-Simple-0.21-299.el7_9.noarch.rpm</filename><sum type="sha256">77c4bcc8c9ef5781b764dd9542a1596e8cf1b6a50edaaf11ca3a1b102aa2cc25</sum></package><package arch="i686" epoch="4" name="perl-devel" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-devel-5.16.3-299.el7_9.i686.rpm</filename><sum type="sha256">5ab0659408b632e1c380e0a22f046b28275a2ea546300491de5294deb3914044</sum></package><package arch="noarch" epoch="1" name="perl-Module-Loaded" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="0.08"><filename>perl-Module-Loaded-0.08-299.el7_9.noarch.rpm</filename><sum type="sha256">75b836eb19a38795869ec7bed3116c6ff0ffd00da7ca9ff9821e8ca47839b359</sum></package><package arch="noarch" epoch="1" name="perl-ExtUtils-CBuilder" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="0.28.2.6"><filename>perl-ExtUtils-CBuilder-0.28.2.6-299.el7_9.noarch.rpm</filename><sum type="sha256">85e6da0f6a6dd62d6dc5e93f54aadeb0132ce1a8be521478e0e0dc004bb20763</sum></package><package arch="noarch" epoch="1" name="perl-Package-Constants" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="0.02"><filename>perl-Package-Constants-0.02-299.el7_9.noarch.rpm</filename><sum type="sha256">c6625ac445d3b437ea31e7828492f99e7a9db3ab7edf9de0b9b24402756a989f</sum></package><package arch="noarch" name="perl-ExtUtils-Install" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="1.58"><filename>perl-ExtUtils-Install-1.58-299.el7_9.noarch.rpm</filename><sum type="sha256">37c2112c1518ee42c1df7e6f8fe87e262117d4f6ad41932686a04edc1b8ceea8</sum></package><package arch="x86_64" epoch="4" name="perl-tests" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-tests-5.16.3-299.el7_9.x86_64.rpm</filename><sum type="sha256">592b542b405321165353857c4695891647bc7a67673d5c68676e60b0fdcaa4c9</sum></package><package arch="x86_64" name="perl-core" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-core-5.16.3-299.el7_9.x86_64.rpm</filename><sum type="sha256">1da5c538c63a3ecaa62da94d0bdc5d44ecc3f690ec2dda0632e2590c28092edd</sum></package><package arch="i686" epoch="4" name="perl-libs" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="5.16.3"><filename>perl-libs-5.16.3-299.el7_9.i686.rpm</filename><sum type="sha256">ac2d5dac30d4a5ce7ba68f7945408344ab95816306be5e169da469e58c0d7c5c</sum></package><package arch="noarch" name="perl-CPAN" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="1.9800"><filename>perl-CPAN-1.9800-299.el7_9.noarch.rpm</filename><sum type="sha256">e3c5ea3f13c03a16f5e33e284e704abdb353679e0cc3a4efd49921c39b8d867f</sum></package><package arch="noarch" name="perl-ExtUtils-Embed" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="1.30"><filename>perl-ExtUtils-Embed-1.30-299.el7_9.noarch.rpm</filename><sum type="sha256">e89ea9809b4a2d6e54e5beff03ee40da52b44c48e659e0f85f239db2841bf276</sum></package><package arch="x86_64" name="perl-Time-Piece" release="299.el7_9" src="perl-5.16.3-299.el7_9.src.rpm" version="1.20.1"><filename>perl-Time-Piece-1.20.1-299.el7_9.x86_64.rpm</filename><sum type="sha256">43c6481cdb21258a36f8c8ecdb8a4512cb899ea3d99c5fd5709a1cee4e004463</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10543" id="CVE-2020-10543" title="Perl: Heap-Based Buffer Overflow In Regular Expression Compiler Leads To Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10878" id="CVE-2020-10878" title="Perl: Corruption Of Intermediate Language State Of Compiled Regular Expression Due To Integer Overflow Leads To Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12723" id="CVE-2020-12723" title="Perl: Corruption Of Intermediate Language State Of Compiled Regular Expression Due To Recursive S_Study_Chunk() Calls Leads To Dos" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0343" id="RHSA-2021:0343-1" title="Rhsa-2021:0343-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1837975" id="1837975" title="Perl: Heap-Based Buffer Overflow In Regular Expression Compiler Leads To Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1837988" id="1837988" title="Perl: Corruption Of Intermediate Language State Of Compiled Regular Expression Due To Integer Overflow Leads To Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1838000" id="1838000" title="Perl: Corruption Of Intermediate Language State Of Compiled Regular Expression Due To Recursive S_Study_Chunk() Calls Leads To Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0347-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* QEMU: loader: OOB access while loading registered ROM may lead to code execution (CVE-2020-13765) 
* QEMU: reachable assertion failure in net_tx_pkt_add_raw_fragment() in hw/net/net_tx_pkt.c (CVE-2020-16092) 
Bug Fix(es): 
* qemu-kvm FTBFS on rhel7.9</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-02-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="175.el7_9.3" src="qemu-kvm-1.5.3-175.el7_9.3.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-175.el7_9.3.x86_64.rpm</filename><sum type="sha256">3d983d02fae65d5d2d794245897da2c827f12948c7a4ee123f80ca80ae9acecc</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="175.el7_9.3" src="qemu-kvm-1.5.3-175.el7_9.3.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-175.el7_9.3.x86_64.rpm</filename><sum type="sha256">a5d343cba227c6c6f03908786c70e3da960559910b7c92460d14db8c2a4c0f2a</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="175.el7_9.3" src="qemu-kvm-1.5.3-175.el7_9.3.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-175.el7_9.3.x86_64.rpm</filename><sum type="sha256">c63f9feea8f5a3ed3c274cf5193209dd2390dbc612b647c2ea50e74c3442d4f2</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="175.el7_9.3" src="qemu-kvm-1.5.3-175.el7_9.3.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-175.el7_9.3.x86_64.rpm</filename><sum type="sha256">3e53c4a294b534c01ee62b3f8659b72b3f66297c9fef4145c78ffe5d9e5e2929</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13765" id="CVE-2020-13765" title="Qemu: Loader: Oob Access While Loading Registered Rom May Lead To Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-16092" id="CVE-2020-16092" title="Qemu: Reachable Assertion Failure In Net_Tx_Pkt_Add_Raw_Fragment() In Hw/Net/Net_Tx_Pkt.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0347" id="RHSA-2021:0347-1" title="Rhsa-2021:0347-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1842912" id="1842912" title="Qemu: Loader: Oob Access While Loading Registered Rom May Lead To Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1860283" id="1860283" title="Qemu: Reachable Assertion Failure In Net_Tx_Pkt_Add_Raw_Fragment() In Hw/Net/Net_Tx_Pkt.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1884997" id="1884997" title="Qemu-Kvm Ftbfs On Rhel7.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0348-1</id><title>Glibc</title><description>Security Fix(es): 
* glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding (CVE-2019-25013) 
* glibc: stack corruption from crafted input in cosl, sinl, sincosl, and tanl functions (CVE-2020-10029) 
* glibc: stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern (CVE-2020-29573) 
Bug Fix(es): 
* glibc: 64bit_strstr_via_64bit_strstr_sse2_unaligned detection fails with large device and inode numbers 
* glibc: Performance regression in ebizzy benchmark</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-02-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="glibc" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-2.17-322.el7_9.i686.rpm</filename><sum type="sha256">eacc8efa6a1535da6f99f937267659b1ec828fcc3fa4a56f47093a9a8315a0ca</sum></package><package arch="x86_64" name="glibc-utils" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-utils-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">a155c586e5c649ea52af5ef4ff5dc331be482d4a9e5c4ab76cf7a5288dd9b444</sum></package><package arch="x86_64" name="nscd" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>nscd-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">f75977b94de6357ed40a544a2303b9c7b8718902a93c2167721c2afcc9838949</sum></package><package arch="x86_64" name="glibc-headers" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-headers-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">08a987cadf27a5435d8396d0aab85bc190e0c769adebb5d12441a18c54f5a6ee</sum></package><package arch="x86_64" name="glibc" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">7313f96fbe52fdf0ebe11d6f4104839038daa082391d8cebd0ce2ea53feaf182</sum></package><package arch="x86_64" name="glibc-common" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-common-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">8cbea99ed186c6a595b589a89239605dbf2e938c91f7c4163a3048d4e1e74e96</sum></package><package arch="x86_64" name="glibc-static" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-static-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">15893bf07ed763152dc3095f86c85e9d53b6fa08a4b88bd34ec084179d8c9f9b</sum></package><package arch="i686" name="glibc-static" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-static-2.17-322.el7_9.i686.rpm</filename><sum type="sha256">c0ddb6b8b1d2c5a02c0430a5c0f7e13c771bdc14316e37090c97beaea11feeff</sum></package><package arch="x86_64" name="glibc-devel" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-devel-2.17-322.el7_9.x86_64.rpm</filename><sum type="sha256">c7e682d49ec90a9e70349e91dffb34b3e5542f8bde9305784e05b6e5988c9ea1</sum></package><package arch="i686" name="glibc-devel" release="322.el7_9" src="glibc-2.17-322.el7_9.src.rpm" version="2.17"><filename>glibc-devel-2.17-322.el7_9.i686.rpm</filename><sum type="sha256">f1012e0c66ae6b9a3d92cb167dd69f5096c1a450369f4bbdc677e3a52ffcfcf2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-25013" id="CVE-2019-25013" title="Glibc: Buffer Over-Read In Iconv When Processing Invalid Multi-Byte Input Sequences In The Euc-Kr Encoding" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10029" id="CVE-2020-10029" title="Glibc: Stack Corruption From Crafted Input In Cosl, Sinl, Sincosl, And Tanl Functions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29573" id="CVE-2020-29573" title="Glibc: Stack-Based Buffer Overflow If The Input To Any Of The Printf Family Of Functions Is An 80-Bit Long Double With A Non-Canonical Bit Pattern" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0348" id="RHSA-2021:0348-1" title="Rhsa-2021:0348-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1810670" id="1810670" title="Glibc: Stack Corruption From Crafted Input In Cosl, Sinl, Sincosl, And Tanl Functions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1905213" id="1905213" title="Glibc: Stack-Based Buffer Overflow If The Input To Any Of The Printf Family Of Functions Is An 80-Bit Long Double With A Non-Canonical Bit Pattern" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1912960" id="1912960" title="Glibc: Buffer Over-Read In Iconv When Processing Invalid Multi-Byte Input Sequences In The Euc-Kr Encoding" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0411-1</id><title>Flatpak</title><description>Security Fix(es): 
* flatpak: sandbox escape via spawn portal (CVE-2021-21261)</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-02-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="flatpak-devel" release="10.el7_9" src="flatpak-1.0.9-10.el7_9.src.rpm" version="1.0.9"><filename>flatpak-devel-1.0.9-10.el7_9.x86_64.rpm</filename><sum type="sha256">c61b58e307ac1e785724862fa5f80d57d397110acfe5376f714c6d64087cb797</sum></package><package arch="x86_64" name="flatpak" release="10.el7_9" src="flatpak-1.0.9-10.el7_9.src.rpm" version="1.0.9"><filename>flatpak-1.0.9-10.el7_9.x86_64.rpm</filename><sum type="sha256">d0145d8c5521f572cee69348e00b09664808dac4e662590d902cde19fa22dded</sum></package><package arch="x86_64" name="flatpak-builder" release="10.el7_9" src="flatpak-1.0.9-10.el7_9.src.rpm" version="1.0.0"><filename>flatpak-builder-1.0.0-10.el7_9.x86_64.rpm</filename><sum type="sha256">66b166ee3a30969fcbfd740f8798191aaf894a4056c4c2a7f7042a9669e71c5f</sum></package><package arch="x86_64" name="flatpak-libs" release="10.el7_9" src="flatpak-1.0.9-10.el7_9.src.rpm" version="1.0.9"><filename>flatpak-libs-1.0.9-10.el7_9.x86_64.rpm</filename><sum type="sha256">53e599519edd6b04990f2649ab7bf1bde929af36f047272d2e76b9b41697686b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21261" id="CVE-2021-21261" title="Flatpak: Sandbox Escape Via Spawn Portal" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0411" id="RHSA-2021:0411-1" title="Rhsa-2021:0411-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1917430" id="1917430" title="Flatpak: Sandbox Escape Via Spawn Portal" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0617-1</id><title>Xterm</title><description>Security Fix(es): 
* xterm: crash when processing combining characters (CVE-2021-27135) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-02-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xterm" release="3.el7_9.1" src="xterm-295-3.el7_9.1.src.rpm" version="295"><filename>xterm-295-3.el7_9.1.x86_64.rpm</filename><sum type="sha256">448e8b7f54e28e5c9703d5229aee2e63307a6bea9d70f84bd855c88859fc5a8c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27135" id="CVE-2021-27135" title="Xterm: Crash When Processing Combining Characters" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0617" id="RHSA-2021:0617-1" title="Rhsa-2021:0617-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1927559" id="1927559" title="Xterm: Crash When Processing Combining Characters" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0656-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.8.0 ESR. 
Security Fix(es): 
* Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23968) 
* Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23969) 
* Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8 (CVE-2021-23978) 
* Mozilla: MediaError message property could have leaked information about cross-origin resources (CVE-2021-23973) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>critical</severity><release>Scientific Linux</release><issued date="2021-02-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.8.0-1.el7_9.src.rpm" version="78.8.0"><filename>firefox-78.8.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">bffabc0d15725ce0f2db7e29a57216be2d3b29e90cf0e23635a246d57c21c2ca</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.8.0-1.el7_9.src.rpm" version="78.8.0"><filename>firefox-78.8.0-1.el7_9.i686.rpm</filename><sum type="sha256">538a8b1e2d4d02551f4ad78f403e7084b8f3fd3f64f30bc3365faba14fe7b146</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23968" id="CVE-2021-23968" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23969" id="CVE-2021-23969" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23973" id="CVE-2021-23973" title="Mozilla: Mediaerror Message Property Could Have Leaked Information About Cross-Origin Resources" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23978" id="CVE-2021-23978" title="Mozilla: Memory Safety Bugs Fixed In Firefox 86 And Firefox Esr 78.8" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0656" id="RHSA-2021:0656-1" title="Rhsa-2021:0656-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932109" id="1932109" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932110" id="1932110" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932111" id="1932111" title="Mozilla: Mediaerror Message Property Could Have Leaked Information About Cross-Origin Resources" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932112" id="1932112" title="Mozilla: Memory Safety Bugs Fixed In Firefox 86 And Firefox Esr 78.8" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0661-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.8.0. 
Security Fix(es): 
* Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23968) 
* Mozilla: Content Security Policy violation report could have contained the destination of a redirect (CVE-2021-23969) 
* Mozilla: Memory safety bugs fixed in Firefox 86 and Firefox ESR 78.8 (CVE-2021-23978) 
* Mozilla: MediaError message property could have leaked information about cross-origin resources (CVE-2021-23973) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-02-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.8.0-1.el7_9.src.rpm" version="78.8.0"><filename>thunderbird-78.8.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">1aa130714f02d6a5c556311988160f3c524434952a6b6e37c8b5523300e692e3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23968" id="CVE-2021-23968" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23969" id="CVE-2021-23969" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23973" id="CVE-2021-23973" title="Mozilla: Mediaerror Message Property Could Have Leaked Information About Cross-Origin Resources" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23978" id="CVE-2021-23978" title="Mozilla: Memory Safety Bugs Fixed In Firefox 86 And Firefox Esr 78.8" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0661" id="RHSA-2021:0661-1" title="Rhsa-2021:0661-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932109" id="1932109" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932110" id="1932110" title="Mozilla: Content Security Policy Violation Report Could Have Contained The Destination Of A Redirect" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932111" id="1932111" title="Mozilla: Mediaerror Message Property Could Have Leaked Information About Cross-Origin Resources" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1932112" id="1932112" title="Mozilla: Memory Safety Bugs Fixed In Firefox 86 And Firefox Esr 78.8" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0671-1</id><title>Bind</title><description>Security Fix(es): 
* bind: Buffer overflow in the SPNEGO implementation affecting GSSAPI security policy negotiation (CVE-2020-8625) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">9e5b6954ca3d6c7894e4f201dc81b3a44cc8cf313cb643ca80993250d9547edb</sum></package><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.4.noarch.rpm</filename><sum type="sha256">d81fadde04be1fafc43fab22dc897c12cbb19a14fc937003d8d95ba767f91843</sum></package><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">155fb158aedbbfa4309a2fc1adf9a9254c1e72832ec0430dbde5fd8000939dcb</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">38346b34188c8f02e33be391b9c1028daff131a0a07eb929d74946b40509a22c</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">b41e52f3edca20a46f973b6dd81fd78b02a2d0c135774557825a882f2af91f13</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">75de22a7c836f42186a20178c133abd0833d0c7f608cb1872a24ead5ae2b0596</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">3b21ac1132c5ac0564d420000174627746983bb56597497b7afa20ea1b190d44</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">ea67cc77ffa069331349999858a7be56379764c27f50aa00f11994ed1db6fa60</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">8ce0b348fce9caddf37e20278fe63d1e4bac52334a6403f1c4b4cb898d8d7eea</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">5f919bfe6e9caae3aeb37ac98f75fb8e1dd268d48a739a6f26e988f9cb5ffcdb</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">0e77cacde069f2e0f0d7cfd869a9bd2d68b63c6590cff598244fedf369b126ef</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">a5b9ea01e6d83a3239e98c5c2e8e6ca8197a99b540fd9892eadbac9228b5e94b</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">66663a2950103cfddb2b2f82893add4ddc1d4fb874136a91225bf566acb6d3ad</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">75a0b671d85195099bb672d52ce7bf7fb374f2def8985d6f2c8ad1be6185b8ac</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">3ddbdf296547fabaacae407f196f83ca4e63c7ce59bf70b98d7d54611641957e</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">0cb5b1e3f2f602e1b5303ccfc199c83effa19de2cecccb547d247f0c4184a099</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">e1645fffa1754662ae830cc70dea4f10d4b8bc0118a0418d0fb520dc4215eac5</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">c3863f0ffda833af04d3aabbb71c6855ecdb162552dbe1bb9a0909b2dd8d3a88</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">23d6d30f7a3e3d1a5ce04d5dca4b240fbac6e2ba56d0b5fc4f50706aa9f82cc7</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">82e44e5a3424840261903624d40dab0f3bef3083778f2b39620e718284f247f3</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">6ff982494cc963eca0c9b8829b0c2e54bb1c40f199bb66e79111c7f17169a152</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">b2c9ec7a5b017591dbec8b4ce004c08404f77f88b6b86bab6a7425de98e969b7</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.4.x86_64.rpm</filename><sum type="sha256">1fa6d5cfee562631a69c72c711493521bb2ee0ce0781c824a931813e133eb96e</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.4" src="bind-9.11.4-26.P2.el7_9.4.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.4.i686.rpm</filename><sum type="sha256">b6310e106c6c0a80ef9e0f873a5e7a774de6d8f5cba6ca65cb9e7abd23c62b60</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8625" id="CVE-2020-8625" title="Bind: Buffer Overflow In The Spnego Implementation Affecting Gssapi Security Policy Negotiation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0671" id="RHSA-2021:0671-1" title="Rhsa-2021:0671-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1928486" id="1928486" title="Bind: Buffer Overflow In The Spnego Implementation Affecting Gssapi Security Policy Negotiation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0699-1</id><title>Grub2</title><description>Security Fix(es): 
* grub2: acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled (CVE-2020-14372) 
* grub2: Use-after-free in rmmod command (CVE-2020-25632) 
* grub2: Out-of-bounds write in grub_usb_device_initialize() (CVE-2020-25647) 
* grub2: Stack buffer overflow in grub_parser_split_cmdline() (CVE-2020-27749) 
* grub2: cutmem command allows privileged user to remove memory regions when Secure Boot is enabled (CVE-2020-27779) 
* grub2: Heap out-of-bounds write in short form option parser (CVE-2021-20225) 
* grub2: Heap out-of-bounds write due to miscalculation of space required for quoting (CVE-2021-20233) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="grub2-efi-ia32-cdboot" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-efi-ia32-cdboot-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">211792b09de5351782267910616b09be86c67abe554507762bc029ab89f713ff</sum></package><package arch="noarch" epoch="1" name="grub2-efi-ia32-modules" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-efi-ia32-modules-2.02-0.87.sl7_9.2.noarch.rpm</filename><sum type="sha256">91c1cbec8dedb06f74858471953cc877a5897595d67ccdfcf76ec92f57f75a4c</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-extra" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-tools-extra-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">c999bc78e1c7d24ce12dff9c26b89727827463f3ee2f11ad6ad55695ac479321</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-efi-ia32-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">d9d357ee4502829702d4de4272c92a61df523bd845e715f0f95ba8a04b68357d</sum></package><package arch="noarch" epoch="1" name="grub2-common" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-common-2.02-0.87.sl7_9.2.noarch.rpm</filename><sum type="sha256">a610c089ce1abe1c02eb23d1a75f32d70130c8670f7e8e6b751b6f1d80988078</sum></package><package arch="x86_64" epoch="1" name="grub2-tools" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-tools-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">9be8073a973b51f8bf465f1ba7c590e9068250fd7379e83ca46bd83a52f5d2f3</sum></package><package arch="noarch" epoch="1" name="grub2-pc-modules" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-pc-modules-2.02-0.87.sl7_9.2.noarch.rpm</filename><sum type="sha256">af47dfa3848878a70d820bf584b6e27b477adfc7101a848e174f2a863fd0593d</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-efi-x64-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">bebee412feb48e7dd3053fe1436ae36d8dcb365da4e707c6e277d3510339dc66</sum></package><package arch="x86_64" epoch="1" name="grub2-pc" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-pc-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">f2b308408f69ad224c62a000f51ee6113a732caa79e13f048c6ca0dc3f3f9ec3</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64-cdboot" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-efi-x64-cdboot-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">b7e8bbde9b06adc5a0547bc1a3eeaf5fd036048fd4b3f69ac9a6b5b4f4cd94db</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-minimal" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-tools-minimal-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">bfd4e691d2d6adfe6486f9b58b48dad5c0f08ae2e264704e14be52fd9806a2ec</sum></package><package arch="x86_64" epoch="1" name="grub2" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-2.02-0.87.sl7_9.2.x86_64.rpm</filename><sum type="sha256">a5cce68e0bdd981b7e54b89917843063ffb01baa386511f618d6b3d3c7022d7b</sum></package><package arch="noarch" epoch="1" name="grub2-efi-x64-modules" release="0.87.sl7_9.2" src="grub2-2.02-0.87.sl7_9.2.src.rpm" version="2.02"><filename>grub2-efi-x64-modules-2.02-0.87.sl7_9.2.noarch.rpm</filename><sum type="sha256">0ff26046d5996a5ff945f544bbdf505d6c8486faa7944e7efefa2fa7fd15a66b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14372" id="CVE-2020-14372" title="Grub2: Acpi Command Allows Privileged User To Load Crafted Acpi Tables When Secure Boot Is Enabled" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25632" id="CVE-2020-25632" title="Grub2: Use-After-Free In Rmmod Command" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25647" id="CVE-2020-25647" title="Grub2: Out-Of-Bounds Write In Grub_Usb_Device_Initialize()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27749" id="CVE-2020-27749" title="Grub2: Stack Buffer Overflow In Grub_Parser_Split_Cmdline()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27779" id="CVE-2020-27779" title="Grub2: Cutmem Command Allows Privileged User To Remove Memory Regions When Secure Boot Is Enabled" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20225" id="CVE-2021-20225" title="Grub2: Heap Out-Of-Bounds Write In Short Form Option Parser" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20233" id="CVE-2021-20233" title="Grub2: Heap Out-Of-Bounds Write Due To Miscalculation Of Space Required For Quoting" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0699" id="RHSA-2021:0699-1" title="Rhsa-2021:0699-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1873150" id="1873150" title="Grub2: Acpi Command Allows Privileged User To Load Crafted Acpi Tables When Secure Boot Is Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1879577" id="1879577" title="Grub2: Use-After-Free In Rmmod Command" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1886936" id="1886936" title="Grub2: Out-Of-Bounds Write In Grub_Usb_Device_Initialize()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1899966" id="1899966" title="Grub2: Stack Buffer Overflow In Grub_Parser_Split_Cmdline()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1900698" id="1900698" title="Grub2: Cutmem Command Allows Privileged User To Remove Memory Regions When Secure Boot Is Enabled" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1924696" id="1924696" title="Grub2: Heap Out-Of-Bounds Write In Short Form Option Parser" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1926263" id="1926263" title="Grub2: Heap Out-Of-Bounds Write Due To Miscalculation Of Space Required For Quoting" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0742-1</id><title>Screen</title><description>Security Fix(es): 
* screen: crash when processing combining chars (CVE-2021-26937) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="screen" release="0.27.20120314git3c2946.el7_9" src="screen-4.1.0-0.27.20120314git3c2946.el7_9.src.rpm" version="4.1.0"><filename>screen-4.1.0-0.27.20120314git3c2946.el7_9.x86_64.rpm</filename><sum type="sha256">04b381686a62e297500b1341fea5c3bc9d8d3c2a9d9708a47b83290754881a02</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26937" id="CVE-2021-26937" title="Screen: Crash When Processing Combining Chars" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0742" id="RHSA-2021:0742-1" title="Rhsa-2021:0742-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1927062" id="1927062" title="Screen: Crash When Processing Combining Chars" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0808-1</id><title>Wpa_Supplicant</title><description>Security Fix(es): 
* wpa_supplicant: Use-after-free in P2P provision discovery processing (CVE-2021-27803) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="wpa_supplicant" release="12.el7_9.2" src="wpa_supplicant-2.6-12.el7_9.2.src.rpm" version="2.6"><filename>wpa_supplicant-2.6-12.el7_9.2.x86_64.rpm</filename><sum type="sha256">9dc31d95856d46cb6ea4112361e906f5810c2e5fb807ed3171c9959c5764c7ff</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27803" id="CVE-2021-27803" title="Wpa_Supplicant: Use-After-Free In P2P Provision Discovery Processing" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0808" id="RHSA-2021:0808-1" title="Rhsa-2021:0808-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1933361" id="1933361" title="Wpa_Supplicant: Use-After-Free In P2P Provision Discovery Processing" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0851-1</id><title>Pki-Core</title><description>Security Fix(es): 
* pki-core: Unprivileged users can renew any certificate (CVE-2021-20179) 
* pki-core: XSS in the certificate search results (CVE-2020-25715) 
* pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146) 
* pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179) 
* pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221) 
* pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Add KRA Transport and Storage Certificates profiles, audit for IPA</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="pki-server" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-server-10.5.18-12.el7_9.noarch.rpm</filename><sum type="sha256">27fbad63d48e3e5d745e3fa7226c4ff0c35826d1c159730c9dab129f41446f32</sum></package><package arch="x86_64" name="pki-symkey" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-symkey-10.5.18-12.el7_9.x86_64.rpm</filename><sum type="sha256">e8b4db9bf26442f9289a6ade6e8d75677b468c723c62a78555fef78dac9a052b</sum></package><package arch="x86_64" name="pki-tools" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-tools-10.5.18-12.el7_9.x86_64.rpm</filename><sum type="sha256">ecd82e0ce19a61c9f8e51befbcb13609b71dd3297b543dff15cd31a7c738bd75</sum></package><package arch="noarch" name="pki-base-java" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-base-java-10.5.18-12.el7_9.noarch.rpm</filename><sum type="sha256">b667db533d0b0466cd9a7f191ed2f46ff7b6343365895224fdc58b4ccfdf8dbb</sum></package><package arch="noarch" name="pki-javadoc" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-javadoc-10.5.18-12.el7_9.noarch.rpm</filename><sum type="sha256">bdd7527f205895ae73cada65090a85605f39ab7185d081b4d36572e13e0b01c2</sum></package><package arch="noarch" name="pki-kra" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-kra-10.5.18-12.el7_9.noarch.rpm</filename><sum type="sha256">7f670bc1e1e47d342b2576e33faa19251ea3b33eac328048705c167d0e486a4e</sum></package><package arch="noarch" name="pki-base" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-base-10.5.18-12.el7_9.noarch.rpm</filename><sum type="sha256">0650738faad52eaabc98983e443017fb63828e5b482060b4c112d7c239c9f00b</sum></package><package arch="noarch" name="pki-ca" release="12.el7_9" src="pki-core-10.5.18-12.el7_9.src.rpm" version="10.5.18"><filename>pki-ca-10.5.18-12.el7_9.noarch.rpm</filename><sum type="sha256">b25de0464afb617728604cf1bc4f9918c412182ca2720ef7f00193e098eaf5a4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10146" id="CVE-2019-10146" title="Pki-Core: Reflected Xss In 'Path Length' Constraint Field In Ca'S Agent Page" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10179" id="CVE-2019-10179" title="Pki-Core/Pki-Kra: Reflected Xss In Recoveryid Search Field At Kra'S Drm Agent Page In Authorize Recovery Tab" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10221" id="CVE-2019-10221" title="Pki-Core: Reflected Xss In Getcookies?Url= Endpoint In Ca" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1721" id="CVE-2020-1721" title="Pki-Core: Kra Vulnerable To Reflected Xss Via The Getpk12 Page" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25715" id="CVE-2020-25715" title="Pki-Core: Xss In The Certificate Search Results" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20179" id="CVE-2021-20179" title="Pki-Core: Unprivileged Users Can Renew Any Certificate" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0851" id="RHSA-2021:0851-1" title="Rhsa-2021:0851-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1695901" id="1695901" title="Pki-Core/Pki-Kra: Reflected Xss In Recoveryid Search Field At Kra'S Drm Agent Page In Authorize Recovery Tab" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1710171" id="1710171" title="Pki-Core: Reflected Xss In 'Path Length' Constraint Field In Ca'S Agent Page" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1732565" id="1732565" title="Pki-Core: Reflected Xss In Getcookies?Url= Endpoint In Ca" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1777579" id="1777579" title="Pki-Core: Kra Vulnerable To Reflected Xss Via The Getpk12 Page" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1883639" id="1883639" title="Add Kra Transport And Storage Certificates Profiles, Audit For Ipa" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1891016" id="1891016" title="Pki-Core: Xss In The Certificate Search Results" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1914379" id="1914379" title="Pki-Core: Unprivileged Users Can Renew Any Certificate" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0856-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: Local buffer overflow in ctnetlink_parse_tuple_filter in net/netfilter/nf_conntrack_netlink.c (CVE-2020-25211) 
* kernel: SCSI target (LIO) write to any block on ILO backstore (CVE-2020-28374) 
* kernel: locking issue in drivers/tty/tty_jobctrl.c can lead to an  use- after-free (CVE-2020-29661) 
* kernel: malicious USB devices can lead to multiple out-of-bounds write (CVE-2019-19532) 
* kernel: out-of-bounds reads in pinctrl subsystem. (CVE-2020-0427) 
* kernel: use-after-free in i915_ppgtt_close in drivers/gpu/drm/i915/i915_gem_gtt.c (CVE-2020-7053) 
* kernel: performance counters race condition use-after-free (CVE-2020-14351) 
* kernel: Geneve/IPsec traffic may be unencrypted between two Geneve endpoints (CVE-2020-25645) 
* kernel: use-after-free in read in vt_do_kdgkb_ioctl (CVE-2020-25656) 
* kernel: ICMP rate limiting can be used for DNS poisoning attack (CVE-2020-25705) 
* kernel: increase slab leak leads to DoS (CVE-2021-20265) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* BUG: scheduling while atomic: memory allocation under spinlock in scsi_register_device_handler() 
* WARNING in __iscsit_free_cmd during recovery Abort 
* lpfc does not issue adisc to fcp-2 devices, does not respond to nvme targer that send an adisc. 
* Panic in semctl_nolock.constprop.15+0x25b 
* [SL 7.7][md]Crash due to invalid pool workqueue pointer, work queue race 
* Guest crash on intel CPU with -cpu host,-spec-ctrl,+ibpb 
* SL7.9 - kernel/uv: handle length extension properly 
* Commit b144f013fc16a06d7a4b9a4be668a3583fafeda2 'i40e: don't report link up for a VF who hasn't enabled queues' introducing issues with VM using DPDK 
* writing to /sys/devices/(...)/net/eno49/queues/tx-16/xps_cpus triggers kernel panic 
* [Hyper-V][SL-7.9]video: hyperv_fb: Fix the cache type when mapping the VRAM Edit 
* kvm-rhel7.9 [AMD] - system crash observed while powering on virtual machine with attached VF interfaces. 
* kernel: nvme nvme7: Connect command failed, error wo/DNR bit: 2 
* dm-mirror crashes from assuming underlying storage will have a non-NULL merge_bvec_fn 
* watchdog: use nmi registers snapshot in hardlockup handler 
* [DELL EMC 7.9 BUG] - Intel E810 NIC interfaces are not functional in SL 7.9 on system with AMD Rome CPUs 
* [DELL EMC BUG] SL system log shows AMD-Vi error when system connected with Gen 4 NVMe drives.</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kernel-abi-whitelists" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.21.1.el7.noarch.rpm</filename><sum type="sha256">6094e9603b4da2bd6f6ba4f79b712d16a8d14b56191887cfcc8d668c5e2362d3</sum></package><package arch="x86_64" name="python-perf" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">038ef49230c56246614a9e976d4e48bf691c27dd1babf0c510652da1ecda040f</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">0100ae043f3b4577d767caf812e96a0c2347a2d109e71d143e3bc254b9b10ddb</sum></package><package arch="x86_64" name="kernel" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">ef252a2debd82692426f4c01bf78fbc47a5fd2373952a6843a3bb47333493e49</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">62d08da1cc34e06dd21140d6be0ca0f6e7869848011f83c5a23144333caf3a2e</sum></package><package arch="x86_64" name="kernel-tools" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">d48e0daae8ef795b5f3cf826a5881096543adf966c215e3388fa49de360c058f</sum></package><package arch="x86_64" name="bpftool" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">f4f24d0198c3147ef985fad6a6f613c5aa3129c52651d6c13beb40148b07493f</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">8f972059f758fb7bee95648c26a782e740d4fdfa4df401a6a1148e86a46d9871</sum></package><package arch="x86_64" name="perf" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">6ffd6ee9056d8b8f8c7239bb253fd49c4e0a57d1dce37430e7feb045b84e089b</sum></package><package arch="x86_64" name="kernel-debug" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">a287d94257eaa061dbe260bb586cba664091cb667304204191a35dd9db5978aa</sum></package><package arch="x86_64" name="kernel-devel" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">ff02f6293b776f7974a19d1df5e50d274398f2b81212892aa18f9004c1920919</sum></package><package arch="x86_64" name="kernel-headers" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.21.1.el7.x86_64.rpm</filename><sum type="sha256">9aaef01ecab63328e3ee79422bf5342559480ec96b42b3e1ebf609a58030336e</sum></package><package arch="noarch" name="kernel-doc" release="1160.21.1.el7" src="kernel-3.10.0-1160.21.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.21.1.el7.noarch.rpm</filename><sum type="sha256">adfcbf58602c4b3dbbd37b346c6368af906a4c0af87daa81824d1135b0976a3d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19532" id="CVE-2019-19532" title="Kernel: Malicious Usb Devices Can Lead To Multiple Out-Of-Bounds Write" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0427" id="CVE-2020-0427" title="Kernel: Out-Of-Bounds Reads In Pinctrl Subsystem." type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-14351" id="CVE-2020-14351" title="Kernel: Performance Counters Race Condition Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25211" id="CVE-2020-25211" title="Kernel: Local Buffer Overflow In Ctnetlink_Parse_Tuple_Filter In Net/Netfilter/Nf_Conntrack_Netlink.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25645" id="CVE-2020-25645" title="Kernel: Geneve/Ipsec Traffic May Be Unencrypted Between Two Geneve Endpoints" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25656" id="CVE-2020-25656" title="Kernel: Use-After-Free In Read In Vt_Do_Kdgkb_Ioctl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25705" id="CVE-2020-25705" title="Kernel: Icmp Rate Limiting Can Be Used For Dns Poisoning Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28374" id="CVE-2020-28374" title="Kernel: Scsi Target (Lio) Write To Any Block On Ilo Backstore" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29661" id="CVE-2020-29661" title="Kernel: Locking Issue In Drivers/Tty/Tty_Jobctrl.C Can Lead To An Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7053" id="CVE-2020-7053" title="Kernel: Use-After-Free In I915_Ppgtt_Close In Drivers/Gpu/Drm/I915/I915_Gem_Gtt.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20265" id="CVE-2021-20265" title="Kernel: Increase Slab Leak Leads To Dos" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0856" id="RHSA-2021:0856-1" title="Rhsa-2021:0856-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1781821" id="1781821" title="Kernel: Malicious Usb Devices Can Lead To Multiple Out-Of-Bounds Write" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1795624" id="1795624" title="Kernel: Use-After-Free In I915_Ppgtt_Close In Drivers/Gpu/Drm/I915/I915_Gem_Gtt.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1862849" id="1862849" title="Kernel: Performance Counters Race Condition Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1877571" id="1877571" title="Kernel: Local Buffer Overflow In Ctnetlink_Parse_Tuple_Filter In Net/Netfilter/Nf_Conntrack_Netlink.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1883988" id="1883988" title="Kernel: Geneve/Ipsec Traffic May Be Unencrypted Between Two Geneve Endpoints" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1888726" id="1888726" title="Kernel: Use-After-Free In Read In Vt_Do_Kdgkb_Ioctl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1894579" id="1894579" title="Kernel: Icmp Rate Limiting Can Be Used For Dns Poisoning Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1899804" id="1899804" title="Kernel: Scsi Target (Lio) Write To Any Block On Ilo Backstore" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1901064" id="1901064" title="Commit B144F013Fc16A06D7A4B9A4Be668A3583Fafeda2 'I40E: Don'T Report Link Up For A Vf Who Hasn'T Enabled Queues' Introducing Issues With Vm Using Dpdk" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1906525" id="1906525" title="Kernel: Locking Issue In Drivers/Tty/Tty_Jobctrl.C Can Lead To An Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1908827" id="1908827" title="Kernel: Increase Slab Leak Leads To Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1916589" id="1916589" title="Watchdog: Use Nmi Registers Snapshot In Hardlockup Handler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1919893" id="1919893" title="Kernel: Out-Of-Bounds Reads In Pinctrl Subsystem." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0860</id><title>Moderate: Ipa Security And Bug Fix Update</title><description>Red Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* jquery: Passing HTML containing &amp;lt;option&amp;gt; elements to manipulation methods could result in untrusted code execution (CVE-2020-11023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* cannot issue certs with multiple IP addresses corresponding to different hosts (BZ#1846349) * CA-less install does not set required permissions on KDC certificate (BZ#1863619) * IdM Web UI shows users as disabled (BZ#1884819) * Authentication and login times are over several seconds due to unindexed ipaExternalMember (BZ#1892793) * improve IPA PKI susbsystem detection by other means than a directory presence, use pki-server subsystem-find (BZ#1895197) * IPA WebUI inaccessible after upgrading to RHEL 8.3 - idoverride-memberof.js missing (BZ#1897253)
</description><severity>moderate</severity><issued date="2021-03-16 11:55:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ipa-client" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>ipa-client-4.6.8-5.sl7_9.4.x86_64.rpm</filename><sum type="sha256">1ed4bf14bd52dc244d62b6916df8470e09377e46366a271670570b0061ae62d0</sum></package><package arch="noarch" name="python2-ipaclient" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>python2-ipaclient-4.6.8-5.sl7_9.4.noarch.rpm</filename><sum type="sha256">9ff8b4cb8abe9ed22d2ccbc4fc24bf9f5c69da12e614592e1128d818280a7085</sum></package><package arch="noarch" name="ipa-python-compat" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>ipa-python-compat-4.6.8-5.sl7_9.4.noarch.rpm</filename><sum type="sha256">aeffe6fb3d8ef7a95f472e281a7cfdeede480ba3e6f5c08565584bb163a5f20d</sum></package><package arch="noarch" name="ipa-common" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>ipa-common-4.6.8-5.sl7_9.4.noarch.rpm</filename><sum type="sha256">d4febde3124992711419e10f72a60fed11bd033cab1c426a6b9cb7a0a862cc42</sum></package><package arch="x86_64" name="ipa-server" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>ipa-server-4.6.8-5.sl7_9.4.x86_64.rpm</filename><sum type="sha256">3bc5d8e6824bcb898657402f40baa86030f2ed3eff94f1ff0b806f58b69f9aaa</sum></package><package arch="noarch" name="python2-ipaserver" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>python2-ipaserver-4.6.8-5.sl7_9.4.noarch.rpm</filename><sum type="sha256">9b29cedcbaed715cc305adfb56233bfada6d59d95e46d69f348ea4f78c904993</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>ipa-server-trust-ad-4.6.8-5.sl7_9.4.x86_64.rpm</filename><sum type="sha256">b1ffa453b3b8caee571c289db11631bdcaf82a08b717da819c84bcfececb7493</sum></package><package arch="noarch" name="python2-ipalib" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>python2-ipalib-4.6.8-5.sl7_9.4.noarch.rpm</filename><sum type="sha256">8136719389c6e1ad756cefa0e711d90ed61d67b9d8957f5b473daf227e478eab</sum></package><package arch="noarch" name="ipa-client-common" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>ipa-client-common-4.6.8-5.sl7_9.4.noarch.rpm</filename><sum type="sha256">f22012aec24260700ec750141870e1af40568ead8cac252af493ae9124daf9b7</sum></package><package arch="noarch" name="ipa-server-dns" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>ipa-server-dns-4.6.8-5.sl7_9.4.noarch.rpm</filename><sum type="sha256">f915a15b5337d345c496b3db7f86bff99fb018766ed8a2892868bdcbfdc6f7e8</sum></package><package arch="noarch" name="ipa-server-common" release="5.sl7_9.4" src="ipa-4.6.8-5.sl7_9.4.src.rpm" version="4.6.8"><filename>ipa-server-common-4.6.8-5.sl7_9.4.noarch.rpm</filename><sum type="sha256">4f3b2a4c67baf3947332d06ac24edffb730353ea58514553191762376a3db5f5</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023" id="CVE-2020-11023" title="Cve-2020-11023" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0860" id="RHSA-2021:0860" title="Moderate: Ipa Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1846349" id="1846349" title="1846349 &#8211; Cannot Issue Certs With Multiple Ip Addresses Corresponding To Different Hosts [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1863619" id="1863619" title="1863619 &#8211; Ca-Less Install Does Not Set Required Permissions On Kdc Certificate [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1884819" id="1884819" title="1884819 &#8211; Idm Web Ui Shows Users As Disabled [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1892793" id="1892793" title="1892793 &#8211; Authentication And Login Times Are Over Several Seconds Due To Unindexed Ipaexternalmember [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1895197" id="1895197" title="1895197 &#8211; Improve Ipa Pki Susbsystem Detection By Other Means Than A Directory Presence, Use Pki-Server Subsystem-Find [Rhel-7.9.Z]" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1897253" id="1897253" title="1897253 &#8211; Ipa Webui Inaccessible After Upgrading To Rhel 8.3 - Idoverride-Memberof.Js Missing [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0992-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.9.0 ESR. 
Security Fix(es): 
* Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read (CVE-2021-23981) 
* Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9 (CVE-2021-23987) 
* Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2021-23982) 
* Mozilla: Malicious extensions could have spoofed popup information (CVE-2021-23984) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.9.0-1.el7_9.src.rpm" version="78.9.0"><filename>firefox-78.9.0-1.el7_9.i686.rpm</filename><sum type="sha256">449df14cbc360743a3ab34d43f07a97ec2ae373f63491b35c475434ecfb308c5</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.9.0-1.el7_9.src.rpm" version="78.9.0"><filename>firefox-78.9.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">ad40a8508cce4f79864e7962536bb3f03c4fabb32ecc482d6995b438af64895f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23981" id="CVE-2021-23981" title="Mozilla: Texture Upload Into An Unbound Backing Buffer Resulted In An Out-Of-Bound Read" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23982" id="CVE-2021-23982" title="Mozilla: Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23984" id="CVE-2021-23984" title="Mozilla: Malicious Extensions Could Have Spoofed Popup Information" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23987" id="CVE-2021-23987" title="Mozilla: Memory Safety Bugs Fixed In Firefox 87 And Firefox Esr 78.9" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0992" id="RHSA-2021:0992-1" title="Rhsa-2021:0992-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942783" id="1942783" title="Mozilla: Texture Upload Into An Unbound Backing Buffer Resulted In An Out-Of-Bound Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942785" id="1942785" title="Mozilla: Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942786" id="1942786" title="Mozilla: Malicious Extensions Could Have Spoofed Popup Information" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942787" id="1942787" title="Mozilla: Memory Safety Bugs Fixed In Firefox 87 And Firefox Esr 78.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:0996-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.9.0. 
Security Fix(es): 
* Mozilla: Texture upload into an unbound backing buffer resulted in an out-of-bound read (CVE-2021-23981) 
* Mozilla: Memory safety bugs fixed in Firefox 87 and Firefox ESR 78.9 (CVE-2021-23987) 
* Mozilla: Internal network hosts could have been probed by a malicious webpage (CVE-2021-23982) 
* Mozilla: Malicious extensions could have spoofed popup information (CVE-2021-23984) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="3.el7_9" src="thunderbird-78.9.0-3.el7_9.src.rpm" version="78.9.0"><filename>thunderbird-78.9.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">9166b8b1c37e08b4a4701b5003444858ecacb6bcdc9d9b193f7e4d3b351b924a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23981" id="CVE-2021-23981" title="Mozilla: Texture Upload Into An Unbound Backing Buffer Resulted In An Out-Of-Bound Read" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23982" id="CVE-2021-23982" title="Mozilla: Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23984" id="CVE-2021-23984" title="Mozilla: Malicious Extensions Could Have Spoofed Popup Information" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23987" id="CVE-2021-23987" title="Mozilla: Memory Safety Bugs Fixed In Firefox 87 And Firefox Esr 78.9" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:0996" id="RHSA-2021:0996-1" title="Rhsa-2021:0996-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942783" id="1942783" title="Mozilla: Texture Upload Into An Unbound Backing Buffer Resulted In An Out-Of-Bound Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942785" id="1942785" title="Mozilla: Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942786" id="1942786" title="Mozilla: Malicious Extensions Could Have Spoofed Popup Information" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942787" id="1942787" title="Mozilla: Memory Safety Bugs Fixed In Firefox 87 And Firefox Esr 78.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1002-1</id><title>Flatpak</title><description>Security Fix(es): 
* flatpak: "file forwarding" feature can be used to gain unprivileged access to files (CVE-2021-21381) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-03-29 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="flatpak-libs" release="11.el7_9" src="flatpak-1.0.9-11.el7_9.src.rpm" version="1.0.9"><filename>flatpak-libs-1.0.9-11.el7_9.x86_64.rpm</filename><sum type="sha256">a0c8d1985df717702a00c219b1dfd9411914253a7af93163f746b240db61095c</sum></package><package arch="x86_64" name="flatpak-builder" release="11.el7_9" src="flatpak-1.0.9-11.el7_9.src.rpm" version="1.0.0"><filename>flatpak-builder-1.0.0-11.el7_9.x86_64.rpm</filename><sum type="sha256">00b6c14edd3fba4506b7a3230dca8b89b5540cebc377e2a51f7db1bd3ca4597b</sum></package><package arch="x86_64" name="flatpak" release="11.el7_9" src="flatpak-1.0.9-11.el7_9.src.rpm" version="1.0.9"><filename>flatpak-1.0.9-11.el7_9.x86_64.rpm</filename><sum type="sha256">cf33c9234e001b7606a40cc1b452c7b75d25d06e6005bde9a65aa998a9ad0676</sum></package><package arch="x86_64" name="flatpak-devel" release="11.el7_9" src="flatpak-1.0.9-11.el7_9.src.rpm" version="1.0.9"><filename>flatpak-devel-1.0.9-11.el7_9.x86_64.rpm</filename><sum type="sha256">6521ddac74e82ae43234671eddc5f24b795a47e80b72b9e7a97ff01c824d8094</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21381" id="CVE-2021-21381" title="Flatpak: &quot;File Forwarding&quot; Feature Can Be Used To Gain Unprivileged Access To Files" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1002" id="RHSA-2021:1002-1" title="Rhsa-2021:1002-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1936985" id="1936985" title="Flatpak: &quot;File Forwarding&quot; Feature Can Be Used To Gain Unprivileged Access To Files" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1071-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: out-of-bounds read in libiscsi module (CVE-2021-27364) 
* kernel: heap buffer overflow in the iSCSI subsystem (CVE-2021-27365) 
* kernel: iscsi: unrestricted access to sessions and handles (CVE-2021-27363) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Customer testing eMMC sees and intermittent boot problem on 7.8+, was not  seen on 7.3 
* tcm loopback driver causes double-start of scsi command when work is delayed 
* [Azure][SL-7]Mellanox Patches To Prevent Kernel Hang In MLX4 
* A patch from upstream c365c292d059 causes us to end up leaving rt_nr_boosted in an inconsistent state, which causes a hard lockup. 
* [SL7.9.z] Add fix to update snd_wl1 in bulk receiver fast path</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-04-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">2a5af3560c0d2b58d3e92e072f21cbac7d005054e5669bb750df3ad80e342df9</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">cb76211b757a3cd464b24f2d7060fe2d0e72afa9d11fc8f3469391eb16fde71c</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">af70c25c4ef9a8ad37b20d2897f7284b9821b5f051e96e2323c73913435c71e1</sum></package><package arch="x86_64" name="kernel-debug" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">656c38db2453c891ad2c45f9cfb9e74539e60e77471f2bd16c7825c9ec494794</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">e8adb9705ab08223016f1a2d3f3bbe7cc9527178c1416d3e9701c563b42fc66d</sum></package><package arch="x86_64" name="kernel" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">8b02c778e6f475a8c05a6fd907f4a30cbf2b398de2db16b774c0e8f80dbf7639</sum></package><package arch="x86_64" name="kernel-devel" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">45e0d2a3eec5f01530801e319c16cf353c1f4f01e2f671899c1538957580233d</sum></package><package arch="x86_64" name="python-perf" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">2f2fd4117c14eeede25c4093b900d7201919a46389f10857579254ea0eff776b</sum></package><package arch="x86_64" name="kernel-headers" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">40794e52ae66c3260a991b1ec548f180df2c79ae3be19e9ae2469ce661494ff0</sum></package><package arch="noarch" name="kernel-doc" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.24.1.el7.noarch.rpm</filename><sum type="sha256">4e1999914ac5f99b35772588a3724ac771e06bf70bccb969b19a7f947346c40d</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.24.1.el7.noarch.rpm</filename><sum type="sha256">f1afb9b8996e3da3191f1c34adc71dc6a7647897dec1cfc5f1d92b0de7032716</sum></package><package arch="x86_64" name="bpftool" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">e8937433e163b569db4594a6ef9ca6282fc9d0a4c26320c2b8ad3fa4594bdc77</sum></package><package arch="x86_64" name="perf" release="1160.24.1.el7" src="kernel-3.10.0-1160.24.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.24.1.el7.x86_64.rpm</filename><sum type="sha256">aa3218f14b92997019671e64c7e60538305d57e6c18be05678bb7221b3a44707</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27363" id="CVE-2021-27363" title="Kernel: Iscsi: Unrestricted Access To Sessions And Handles" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27364" id="CVE-2021-27364" title="Kernel: Out-Of-Bounds Read In Libiscsi Module" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27365" id="CVE-2021-27365" title="Kernel: Heap Buffer Overflow In The Iscsi Subsystem" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1071" id="RHSA-2021:1071-1" title="Rhsa-2021:1071-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1930078" id="1930078" title="Kernel: Heap Buffer Overflow In The Iscsi Subsystem" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1930079" id="1930079" title="Kernel: Iscsi: Unrestricted Access To Sessions And Handles" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1930080" id="1930080" title="Kernel: Out-Of-Bounds Read In Libiscsi Module" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1072-1</id><title>Libldb</title><description>Security Fix(es): 
* samba: Out of bounds read in AD DC LDAP server (CVE-2021-20277) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-04-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libldb" release="2.el7_9" src="libldb-1.5.4-2.el7_9.src.rpm" version="1.5.4"><filename>libldb-1.5.4-2.el7_9.i686.rpm</filename><sum type="sha256">c8d61843617f2cb1f30708c3766acab28cf3322cd4463a6440845f80e58e0006</sum></package><package arch="x86_64" name="ldb-tools" release="2.el7_9" src="libldb-1.5.4-2.el7_9.src.rpm" version="1.5.4"><filename>ldb-tools-1.5.4-2.el7_9.x86_64.rpm</filename><sum type="sha256">5a30e6206b96aa941cf5bc0787be552ed795b37a5bcaa3a6c566e416ae0cdeac</sum></package><package arch="x86_64" name="libldb-devel" release="2.el7_9" src="libldb-1.5.4-2.el7_9.src.rpm" version="1.5.4"><filename>libldb-devel-1.5.4-2.el7_9.x86_64.rpm</filename><sum type="sha256">f075bcf6db662ef2ff6165da440e97f8d5daf699c0ca75a1429fc2ae623a0680</sum></package><package arch="i686" name="pyldb-devel" release="2.el7_9" src="libldb-1.5.4-2.el7_9.src.rpm" version="1.5.4"><filename>pyldb-devel-1.5.4-2.el7_9.i686.rpm</filename><sum type="sha256">49a598cb1f95a358da7e166ce9e7e42690b515c9300f27f66e3348c87bbccf6b</sum></package><package arch="i686" name="pyldb" release="2.el7_9" src="libldb-1.5.4-2.el7_9.src.rpm" version="1.5.4"><filename>pyldb-1.5.4-2.el7_9.i686.rpm</filename><sum type="sha256">592e2a51c0c0d2c9a8cbb6ec431564ac5672d3b5cf36c580ed538c146e63b7eb</sum></package><package arch="x86_64" name="libldb" release="2.el7_9" src="libldb-1.5.4-2.el7_9.src.rpm" version="1.5.4"><filename>libldb-1.5.4-2.el7_9.x86_64.rpm</filename><sum type="sha256">35c4dfcc466c55a684cde022968cfdc5ed8f6a7908615dacf8de89abead874b5</sum></package><package arch="x86_64" name="pyldb-devel" release="2.el7_9" src="libldb-1.5.4-2.el7_9.src.rpm" version="1.5.4"><filename>pyldb-devel-1.5.4-2.el7_9.x86_64.rpm</filename><sum type="sha256">0b05d33f911795ff1eed0b117ae6d8f659ca91a120a52db97b25120f8ad1055d</sum></package><package arch="x86_64" name="pyldb" release="2.el7_9" src="libldb-1.5.4-2.el7_9.src.rpm" version="1.5.4"><filename>pyldb-1.5.4-2.el7_9.x86_64.rpm</filename><sum type="sha256">81b3e1a7462a0ab7d801d10d06cdb7ed1bab30a7ecce8be02a42815c88acb34e</sum></package><package arch="i686" name="libldb-devel" release="2.el7_9" src="libldb-1.5.4-2.el7_9.src.rpm" version="1.5.4"><filename>libldb-devel-1.5.4-2.el7_9.i686.rpm</filename><sum type="sha256">459a9a0a10f37d4d5422f8b7bd6395b4812e62746ceb5112c9e4686a45100076</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20277" id="CVE-2021-20277" title="Samba: Out Of Bounds Read In Ad Dc Ldap Server" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1072" id="RHSA-2021:1072-1" title="Rhsa-2021:1072-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1941402" id="1941402" title="Samba: Out Of Bounds Read In Ad Dc Ldap Server" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1135-1</id><title>Squid</title><description>Security Fix(es): 
* squid: improper input validation may allow a trusted client to perform HTTP request smuggling (CVE-2020-25097) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-04-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="squid-migration-script" release="17.el7_9.6" src="squid-3.5.20-17.el7_9.6.src.rpm" version="3.5.20"><filename>squid-migration-script-3.5.20-17.el7_9.6.x86_64.rpm</filename><sum type="sha256">5f4efbb47e4ef8bbc123c76ee5739139033149ca48f605398cce3d283a615c5c</sum></package><package arch="x86_64" epoch="7" name="squid" release="17.el7_9.6" src="squid-3.5.20-17.el7_9.6.src.rpm" version="3.5.20"><filename>squid-3.5.20-17.el7_9.6.x86_64.rpm</filename><sum type="sha256">01e8917843e5d9f7a76ba9ed41ea78f043ea28b08aa9d34e1f89abae28a4f03c</sum></package><package arch="x86_64" epoch="7" name="squid-sysvinit" release="17.el7_9.6" src="squid-3.5.20-17.el7_9.6.src.rpm" version="3.5.20"><filename>squid-sysvinit-3.5.20-17.el7_9.6.x86_64.rpm</filename><sum type="sha256">51672f3d8d35b136ea56a3926eb0d200f56f7a2a7323edc37fb2a2367a10748e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25097" id="CVE-2020-25097" title="Squid: Improper Input Validation May Allow A Trusted Client To Perform Http Request Smuggling" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1135" id="RHSA-2021:1135-1" title="Rhsa-2021:1135-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1939925" id="1939925" title="Squid: Improper Input Validation May Allow A Trusted Client To Perform Http Request Smuggling" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1145-1</id><title>Nettle</title><description>Security Fix(es): 
* nettle: Out of bounds memory access in signature verification (CVE-2021-20305) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-04-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="nettle" release="9.el7_9" src="nettle-2.7.1-9.el7_9.src.rpm" version="2.7.1"><filename>nettle-2.7.1-9.el7_9.i686.rpm</filename><sum type="sha256">3a8ab2056c7e273d4f5e3b312f3cae6e1231f8f22fd6e4c7e7a7a47b33230b87</sum></package><package arch="i686" name="nettle-devel" release="9.el7_9" src="nettle-2.7.1-9.el7_9.src.rpm" version="2.7.1"><filename>nettle-devel-2.7.1-9.el7_9.i686.rpm</filename><sum type="sha256">a6ee2bc74687ca5ddc54502f97621d44d3b20108dc5bb3fce0b5199f5f156d72</sum></package><package arch="x86_64" name="nettle-devel" release="9.el7_9" src="nettle-2.7.1-9.el7_9.src.rpm" version="2.7.1"><filename>nettle-devel-2.7.1-9.el7_9.x86_64.rpm</filename><sum type="sha256">ed4b165b6393d04c01395bbffabde34c663918d165af9a17d15c8ffc49829fc9</sum></package><package arch="x86_64" name="nettle" release="9.el7_9" src="nettle-2.7.1-9.el7_9.src.rpm" version="2.7.1"><filename>nettle-2.7.1-9.el7_9.x86_64.rpm</filename><sum type="sha256">631114eff14ce13570db80ea06c014964225734de427b1f5ed72f06315e9985d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20305" id="CVE-2021-20305" title="Nettle: Out Of Bounds Memory Access In Signature Verification" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1145" id="RHSA-2021:1145-1" title="Rhsa-2021:1145-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942533" id="1942533" title="Nettle: Out Of Bounds Memory Access In Signature Verification" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1192-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.9.1. 
Security Fix(es): 
* Mozilla: An attacker may use Thunderbird's OpenPGP key refresh mechanism to poison an existing key (CVE-2021-23991) 
* Mozilla: A crafted OpenPGP key with an invalid user ID could be used to confuse the user (CVE-2021-23992) 
* Mozilla: Inability to send encrypted OpenPGP email after importing a crafted OpenPGP key (CVE-2021-23993) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-04-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.9.1-1.el7_9.src.rpm" version="78.9.1"><filename>thunderbird-78.9.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">15b668cdfd777d49d74ef2aa02560696e79393a9ea3435db1cd9eca0c1112f0a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23991" id="CVE-2021-23991" title="Mozilla: An Attacker May Use Thunderbird'S Openpgp Key Refresh Mechanism To Poison An Existing Key" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23992" id="CVE-2021-23992" title="Mozilla: A Crafted Openpgp Key With An Invalid User Id Could Be Used To Confuse The User" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23993" id="CVE-2021-23993" title="Mozilla: Inability To Send Encrypted Openpgp Email After Importing A Crafted Openpgp Key" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1192" id="RHSA-2021:1192-1" title="Rhsa-2021:1192-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1948393" id="1948393" title="Mozilla: An Attacker May Use Thunderbird'S Openpgp Key Refresh Mechanism To Poison An Existing Key" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1948394" id="1948394" title="Mozilla: A Crafted Openpgp Key With An Invalid User Id Could Be Used To Confuse The User" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1948395" id="1948395" title="Mozilla: Inability To Send Encrypted Openpgp Email After Importing A Crafted Openpgp Key" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1297-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (8249906) (CVE-2021-2163) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* JNI local refs exceeds capacity warning in NetworkInterface::getAll</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-04-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-devel-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">0034ea4bb6360a4195b2e893473abe05a4caa5d3fba1bb2f947031a3a0fb23bd</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-javadoc-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">a92890f9b8897ff784d2e09cde43a32bcefc529e957334f81ad717bdf0ef804a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">3ba7659fe7c21237ddda65067f9bb0890b009f76b99da806d44b95de2f97090d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-javadoc-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">80c07f488b277fe77a6804f464351a593c6eec64ccd99cc9625c423fa316d30c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">8c32b31903c528c50a3c9f314fc80503666bdde1e27c87f65b8f07b22fbe9558</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-demo-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">2eddd05a74f9ce62bca7c94ecb11d6e12d0625b51b7d497c3b1f0b24fb3b82d8</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-headless-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">b831a9d9f5307edb419c8930fd5099ddfbaaf35b776a30084af53e8cd977e1d8</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-devel-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">d5a59b97373234482ec6638e3c0f5b8e6634b1a516221f18411c301d78b93cf2</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">81ff8c66823e9f782647553c4a9813a7c6bfe157175608311fc2b820f514483b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-jmods-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">3b832771787ee5616db81159d8160c2730f7ffbb49acef711362ecf717af0062</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-jmods-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">063d70c16819779f8dd01c87fed8f1414af2f4e4e6170fa8589352be7a259200</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-src-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">dacfb2f2f25e11ffa8ee9bf607585542ad824f662579fdb8c497a98b80f7e706</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-static-libs-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">a8ad8dd549b80506f39dd78eb7a580a83f13b05f9e4e20b17746ffe9fb940ab6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">792639abaff2f0c400ac29f6632604909863bc86c812ffb374b0cdd78172eef7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-headless-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">2ad3fb50999eb4448ecaa27c4c74e591a26a89d8afb93a3664485d53d4265d48</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-src-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">4f998f3be20e475b38d401b610ce40fc3075b39248e60e4b0e45f67c11a6805b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-demo-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">2fd6b328021bbc7b816576def60e0caeb865777f0a739f8bf42ba154122d2340</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163" id="CVE-2021-2163" title="Openjdk: Incomplete Enforcement Of Jar Signing Disabled Algorithms (Libraries, 8249906)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1297" id="RHSA-2021:1297-1" title="Rhsa-2021:1297-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1937736" id="1937736" title="Jni Local Refs Exceeds Capacity Warning In Networkinterface::Getall" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951217" id="1951217" title="Openjdk: Incomplete Enforcement Of Jar Signing Disabled Algorithms (Libraries, 8249906)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1298</id><title>Moderate: Java-1.8.0-Openjdk Security Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (8249906) (CVE-2021-2163)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2021-04-21 07:43:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-debug-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">20f1ecd8e9bf9493f51e9e3e4ad46f03716f572e0d03aa6ed89bcb0422a736d5</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-devel-debug-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">b1707f74e24c39439f064c2c0608d13521966668120480c3a0e392511838f7d3</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-src-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">0497048dabe9d531c1ec54f14cdbcb011ac31893866ef21176a3776c93fc86b6</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-debug-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">c9ecdbedd7a440f9e6e1502dacbdd2ca61a677acc91882764ec9728f61020162</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">755ab6e8a59dc81a4d169f0795737c1eb5efa94ff5da876423486843206c50c0</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-headless-debug-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">90c0f00388fc9e9eac0870a6558600244a789e5527841d0441099baf08764adb</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">48bcc55e3c9f9449e580635946425f8e9913b40d6a1d772c01ee6bd8545145c0</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">6f1c618f7b579e38486cf7ef243f41eafce72022a794e139d8163c2abcb1f737</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-src-debug-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">7a37644b790d36eebc1a9ef0d0ddb8856db0c32523139b8be8cd1a31b9ccab1a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-src-debug-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">ca7ea3307804ce88ab2f3fccd44456f9cdc9828683df5cf677c636ac8d01ddb1</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">d12b1cb6a0c7d32067a6dfd14876769e23d5b384c6edadbce494b24eca63d328</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-demo-debug-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">3d7626bbf610ca3321dbbe2f152ce1080dda51c998b72bcbbdc9deedd3994f50</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.292.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">09cd33f2498b4600c66a4b50b804b380bf784fa1a8c0eb3f92ec6156b74e310e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-demo-debug-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">4e2b3380bfbe792c3dc17ec39c66108b64fd7d6268873a85c9507dc39c817823</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">025f84677045b1bc006ff4fb9b94d983e93bbafb5c5227c155801e50cee9a69f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">fe3d03c7aa5b25bbbba8bbfec4966633a33aa87bd64561c061609c0cd98cb7a1</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-static-libs-debug-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">d5a2b4ebf25305d2d76e406d8c7425458f422b7a082c2abe2542d5304fbb9f76</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">24e32f28858eac569e35cea1acfad83e9778475a851a563f6243ebf7583b8f78</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-jmods-debug-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">0d4f527254b81660e0c00bd87b366e7d938b953f30a37bc2a819f4a596a14dab</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">910eb565d7499e6844c58b3773f584cc6e0e2c05d3750de5452e9e2471a87507</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-headless-debug-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">ea7f20e35d355ba99ac2c946c02a7c2f8ce5a4d445825c5ad3929c0dac8138ea</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-debug-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">a2d0c0863c67920e8212c5175b77d34a9210a5febc07280fcbbc4f2b323d5a93</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">82ebb5ea88130b5baccde7fb30ab71a4ce8e87394a7fd4c09d94ea03590eee12</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">807f249ef9285c017d4dfee5c2e940521554d6c8378206c08d3cc4b1095b6aad</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-devel-debug-11.0.11.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">bca96f85c4ef034058789f509a0d5bb4b6677339dfdf275cdf1cfebf14239580</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.292.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">e8f5ec498e68ffd8e77385a6f7666685c600940e1b7c66a577294259d5a43066</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">1fb515ba0185aa49efac841b994ee51361d81257bc667d3674e4609211e715aa</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-jmods-debug-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">2bdcbc12db372cf829c93a6fa9cb4b88acf5e3a49d80a069d05213adc493bfe7</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">0a1c20ad5252902044a839f3c8263fff1d22f7ea5cf00046b9cc6491932c1408</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-src-debug-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">12a30ec6773dd5188740529f8a94d3fa98311a5609376c0f73a079eb63ef905a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.11.0.9-1.el7_9.src.rpm" version="11.0.11.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.11.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">1060c8a7f5760644787be8e5ee05857ff13a5300c3823256589628ca2a701d2f</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163" id="CVE-2021-2163" title="Cve-2021-2163" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1298" id="RHSA-2021:1298" title="Moderate: Java-1.8.0-Openjdk Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1298-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Incomplete enforcement of JAR signing disabled algorithms (8249906) (CVE-2021-2163) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-04-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-headless-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">6edeaf04168713d76c97ac60d7d99896e8c692e4aa5d0cd60229911165f2d729</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-devel-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">adbacd36f4f9b5815f023d1a88175b6c1e014528885323bd2d05bfb02ae9f28e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-accessibility-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">8f1e47839e3931532edd0952d2dd654a0ab2a021655e0ab0c01a2e0ab3c8e228</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-src-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">087265fadbbacc30a0aa9e3b485705ca587ead4d557bc9244d30c797c9b5b7fb</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-headless-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">7284648b1cfbdcf5702d0ae9bf0ecf10dd9128adcbdc0cf3b951b5ff24b9b064</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-javadoc-1.8.0.292.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">ca42c18ea84acad61b4d70f3092f9a7ece7183a707fdf308926585290aab5ddd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-demo-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">d03c8ce0b348dd6928c11d3dfb645d2a4657f44f170706201fc479d8a627cb42</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-accessibility-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">d77c4ada5fda9a0850e0d37927c004f34a5b595a9da58dcf9a3b432ff325a164</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-src-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">7213a69373655871bf60b0bc346bb499a8329615a5516b39f1daec67a15d1ebd</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">623d9d3fedf80e8038397f5569802131699c05b528dbec27d9893875c316c419</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.292.b10-1.el7_9.noarch.rpm</filename><sum type="sha256">adf23389a8a04651ea763f3883c9f77bc38564835bf1bb76599423a1071f66c2</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-demo-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">dcf161f4074c15ee5784e48bbe788ea29a66a3826a3d5f9fcc2a0100baceb2df</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.x86_64.rpm</filename><sum type="sha256">729ea2ffc7c834f188bd8afb5aacc960a453e5542edde397ac1eebc821ac7ab5</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.292.b10-1.el7_9.src.rpm" version="1.8.0.292.b10"><filename>java-1.8.0-openjdk-devel-1.8.0.292.b10-1.el7_9.i686.rpm</filename><sum type="sha256">a5bb2b2a2acf5261549aba3fa664dd82c550f31a4e3ffc8bbe1f1cb52ebd4a6a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2163" id="CVE-2021-2163" title="Openjdk: Incomplete Enforcement Of Jar Signing Disabled Algorithms (Libraries, 8249906)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1298" id="RHSA-2021:1298-1" title="Rhsa-2021:1298-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951217" id="1951217" title="Openjdk: Incomplete Enforcement Of Jar Signing Disabled Algorithms (Libraries, 8249906)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1350-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.10.0. 
Security Fix(es): 
* Mozilla: Out of bound write due to lazy initialization (CVE-2021-23994) 
* Mozilla: Use-after-free in Responsive Design Mode (CVE-2021-23995) 
* Mozilla: More internal network hosts could have been probed by a malicious webpage (CVE-2021-23961) 
* Mozilla: Secure Lock icon could have been spoofed (CVE-2021-23998) 
* Mozilla: Blob URLs may have been granted additional privileges (CVE-2021-23999) 
* Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL (CVE-2021-24002) 
* Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads (CVE-2021-29945) 
* Mozilla: Port blocking could be bypassed (CVE-2021-29946) 
* Mozilla: Race condition when reading from disk while verifying signatures  (CVE-2021-29948) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- 
SL7  x86_64  - thunderbird-78.10.0-1.el7_9.x86_64.rpm  - thunderbird-debuginfo-78.10.0-1.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-04-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.10.0-1.el7_9.src.rpm" version="78.10.0"><filename>thunderbird-78.10.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">27ff7bb70e8a0f52811bae4fed2444655d1143c8e82d93338a5c3a20588f2fc6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961" id="CVE-2021-23961" title="Mozilla: More Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994" id="CVE-2021-23994" title="Mozilla: Out Of Bound Write Due To Lazy Initialization" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995" id="CVE-2021-23995" title="Mozilla: Use-After-Free In Responsive Design Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998" id="CVE-2021-23998" title="Mozilla: Secure Lock Icon Could Have Been Spoofed" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999" id="CVE-2021-23999" title="Mozilla: Blob Urls May Have Been Granted Additional Privileges" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002" id="CVE-2021-24002" title="Mozilla: Arbitrary Ftp Command Execution On Ftp Servers Using An Encoded Url" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945" id="CVE-2021-29945" title="Mozilla: Incorrect Size Computation In Webassembly Jit Could Lead To Null-Reads" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946" id="CVE-2021-29946" title="Mozilla: Port Blocking Could Be Bypassed" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29948" id="CVE-2021-29948" title="Mozilla: Race Condition When Reading From Disk While Verifying Signatures" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1350" id="RHSA-2021:1350-1" title="Rhsa-2021:1350-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951364" id="1951364" title="Mozilla: Out Of Bound Write Due To Lazy Initialization" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951365" id="1951365" title="Mozilla: Use-After-Free In Responsive Design Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951366" id="1951366" title="Mozilla: Secure Lock Icon Could Have Been Spoofed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951367" id="1951367" title="Mozilla: More Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951368" id="1951368" title="Mozilla: Blob Urls May Have Been Granted Additional Privileges" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951369" id="1951369" title="Mozilla: Arbitrary Ftp Command Execution On Ftp Servers Using An Encoded Url" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951370" id="1951370" title="Mozilla: Incorrect Size Computation In Webassembly Jit Could Lead To Null-Reads" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951371" id="1951371" title="Mozilla: Port Blocking Could Be Bypassed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951381" id="1951381" title="Mozilla: Race Condition When Reading From Disk While Verifying Signatures" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1354-1</id><title>Xstream</title><description>Security Fix(es): 
* XStream: Unsafe deserizaliation of javax.sql.rowset.BaseRowSet (CVE-2021-21344) 
* XStream: Unsafe deserizaliation of com.sun.corba.se.impl.activation.ServerTableEntry (CVE-2021-21345) 
* XStream: Unsafe deserizaliation of sun.swing.SwingLazyValue (CVE-2021-21346) 
* XStream: Unsafe deserizaliation of com.sun.tools.javac.processing.JavacProcessingEnvironment NameProcessIterator (CVE-2021-21347) 
* XStream: Unsafe deserizaliation of com.sun.org.apache.bcel.internal.util.ClassLoader (CVE-2021-21350) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- 
SL7  noarch  - xstream-1.3.1-13.el7_9.noarch.rpm  - xstream-javadoc-1.3.1-13.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-04-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="xstream-javadoc" release="13.el7_9" src="xstream-1.3.1-13.el7_9.src.rpm" version="1.3.1"><filename>xstream-javadoc-1.3.1-13.el7_9.noarch.rpm</filename><sum type="sha256">2ecc7fa6ee2bb422a255f7346c1a40b982110351e3e3d93daa2dcbc7ec134fb2</sum></package><package arch="noarch" name="xstream" release="13.el7_9" src="xstream-1.3.1-13.el7_9.src.rpm" version="1.3.1"><filename>xstream-1.3.1-13.el7_9.noarch.rpm</filename><sum type="sha256">9002183ae963575c82637c92eaf93e240c2fae160ecf24a6e2913de1a5d8637d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21344" id="CVE-2021-21344" title="Xstream: Unsafe Deserizaliation Of Javax.Sql.Rowset.Baserowset" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21345" id="CVE-2021-21345" title="Xstream: Unsafe Deserizaliation Of Com.Sun.Corba.Se.Impl.Activation.Servertableentry" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21346" id="CVE-2021-21346" title="Xstream: Unsafe Deserizaliation Of Sun.Swing.Swinglazyvalue" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21347" id="CVE-2021-21347" title="Xstream: Unsafe Deserizaliation Of Com.Sun.Tools.Javac.Processing.Javacprocessingenvironment Nameprocessiterator" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21350" id="CVE-2021-21350" title="Xstream: Unsafe Deserizaliation Of Com.Sun.Org.Apache.Bcel.Internal.Util.Classloader" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1354" id="RHSA-2021:1354-1" title="Rhsa-2021:1354-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942554" id="1942554" title="Xstream: Unsafe Deserizaliation Of Javax.Sql.Rowset.Baserowset" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942558" id="1942558" title="Xstream: Unsafe Deserizaliation Of Com.Sun.Corba.Se.Impl.Activation.Servertableentry" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942578" id="1942578" title="Xstream: Unsafe Deserizaliation Of Sun.Swing.Swinglazyvalue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942629" id="1942629" title="Xstream: Unsafe Deserizaliation Of Com.Sun.Tools.Javac.Processing.Javacprocessingenvironment Nameprocessiterator" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942637" id="1942637" title="Xstream: Unsafe Deserizaliation Of Com.Sun.Org.Apache.Bcel.Internal.Util.Classloader" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1363-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.10.0 ESR. 
Security Fix(es): 
* Mozilla: Out of bound write due to lazy initialization (CVE-2021-23994) 
* Mozilla: Use-after-free in Responsive Design Mode (CVE-2021-23995) 
* Mozilla: More internal network hosts could have been probed by a malicious webpage (CVE-2021-23961) 
* Mozilla: Secure Lock icon could have been spoofed (CVE-2021-23998) 
* Mozilla: Blob URLs may have been granted additional privileges (CVE-2021-23999) 
* Mozilla: Arbitrary FTP command execution on FTP servers using an encoded URL (CVE-2021-24002) 
* Mozilla: Incorrect size computation in WebAssembly JIT could lead to null-reads (CVE-2021-29945) 
* Mozilla: Port blocking could be bypassed (CVE-2021-29946) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- 
SL7  x86_64  - firefox-78.10.0-1.el7_9.i686.rpm  - firefox-78.10.0-1.el7_9.x86_64.rpm  - firefox-debuginfo-78.10.0-1.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-04-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.10.0-1.el7_9.src.rpm" version="78.10.0"><filename>firefox-78.10.0-1.el7_9.i686.rpm</filename><sum type="sha256">dbeaf4541e0a177fed5c3a943650a1c55f6c5ca4be2278bf258e750e8da3258b</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.10.0-1.el7_9.src.rpm" version="78.10.0"><filename>firefox-78.10.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">668cd09b9146cfe77e64f0561ed96cc794dde90f1c701d4eaf63ae128e432131</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23961" id="CVE-2021-23961" title="Mozilla: More Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23994" id="CVE-2021-23994" title="Mozilla: Out Of Bound Write Due To Lazy Initialization" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23995" id="CVE-2021-23995" title="Mozilla: Use-After-Free In Responsive Design Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23998" id="CVE-2021-23998" title="Mozilla: Secure Lock Icon Could Have Been Spoofed" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23999" id="CVE-2021-23999" title="Mozilla: Blob Urls May Have Been Granted Additional Privileges" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24002" id="CVE-2021-24002" title="Mozilla: Arbitrary Ftp Command Execution On Ftp Servers Using An Encoded Url" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29945" id="CVE-2021-29945" title="Mozilla: Incorrect Size Computation In Webassembly Jit Could Lead To Null-Reads" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29946" id="CVE-2021-29946" title="Mozilla: Port Blocking Could Be Bypassed" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1363" id="RHSA-2021:1363-1" title="Rhsa-2021:1363-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951364" id="1951364" title="Mozilla: Out Of Bound Write Due To Lazy Initialization" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951365" id="1951365" title="Mozilla: Use-After-Free In Responsive Design Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951366" id="1951366" title="Mozilla: Secure Lock Icon Could Have Been Spoofed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951367" id="1951367" title="Mozilla: More Internal Network Hosts Could Have Been Probed By A Malicious Webpage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951368" id="1951368" title="Mozilla: Blob Urls May Have Been Granted Additional Privileges" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951369" id="1951369" title="Mozilla: Arbitrary Ftp Command Execution On Ftp Servers Using An Encoded Url" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951370" id="1951370" title="Mozilla: Incorrect Size Computation In Webassembly Jit Could Lead To Null-Reads" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951371" id="1951371" title="Mozilla: Port Blocking Could Be Bypassed" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1384-1</id><title>Nss</title><description>Security Fix(es): 
* nss: TLS 1.3 CCS flood remote DoS Attack (CVE-2020-25648) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* FTBFS: Paypal Cert expired 
* FTBFS: IKE CLASS_1563 fails gtest 
* Cannot compile code with nss headers and -Werror=strict-prototypes 
* CA HSM ncipher token disabled after SL-7.9 update 
--- 
SL7  x86_64  - nss-3.53.1-7.el7_9.i686.rpm  - nss-3.53.1-7.el7_9.x86_64.rpm  - nss-debuginfo-3.53.1-7.el7_9.i686.rpm  - nss-debuginfo-3.53.1-7.el7_9.x86_64.rpm  - nss-devel-3.53.1-7.el7_9.i686.rpm  - nss-devel-3.53.1-7.el7_9.x86_64.rpm  - nss-pkcs11-devel-3.53.1-7.el7_9.i686.rpm  - nss-pkcs11-devel-3.53.1-7.el7_9.x86_64.rpm  - nss-sysinit-3.53.1-7.el7_9.x86_64.rpm  - nss-tools-3.53.1-7.el7_9.x86_64.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-04-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-pkcs11-devel" release="7.el7_9" src="nss-3.53.1-7.el7_9.src.rpm" version="3.53.1"><filename>nss-pkcs11-devel-3.53.1-7.el7_9.x86_64.rpm</filename><sum type="sha256">9de797b2cfcdc8cc229ef47fb4ec244a8feaab780959d0be0ac2e754a7965709</sum></package><package arch="i686" name="nss-pkcs11-devel" release="7.el7_9" src="nss-3.53.1-7.el7_9.src.rpm" version="3.53.1"><filename>nss-pkcs11-devel-3.53.1-7.el7_9.i686.rpm</filename><sum type="sha256">2a04e2b686baf9f3095fb36281f181cac13d70033a54c2c6478cfcde3edd16b8</sum></package><package arch="x86_64" name="nss-tools" release="7.el7_9" src="nss-3.53.1-7.el7_9.src.rpm" version="3.53.1"><filename>nss-tools-3.53.1-7.el7_9.x86_64.rpm</filename><sum type="sha256">64916d0f417c88546d00651592a19f62947019455574ac2f7b04887a6934868d</sum></package><package arch="i686" name="nss" release="7.el7_9" src="nss-3.53.1-7.el7_9.src.rpm" version="3.53.1"><filename>nss-3.53.1-7.el7_9.i686.rpm</filename><sum type="sha256">46fa84cb2dca239707b5af9e20f16ccc5d9294315fe37e9b522bf89800dbcb3e</sum></package><package arch="i686" name="nss-devel" release="7.el7_9" src="nss-3.53.1-7.el7_9.src.rpm" version="3.53.1"><filename>nss-devel-3.53.1-7.el7_9.i686.rpm</filename><sum type="sha256">92efd45efbd9743b4c1338be321742f0ffc9b0c2f3dc9423d465909e0891587c</sum></package><package arch="x86_64" name="nss" release="7.el7_9" src="nss-3.53.1-7.el7_9.src.rpm" version="3.53.1"><filename>nss-3.53.1-7.el7_9.x86_64.rpm</filename><sum type="sha256">8a388e9732a15b191de402c4877cd8f4a610ae3f6b531180147ca991458310e4</sum></package><package arch="x86_64" name="nss-devel" release="7.el7_9" src="nss-3.53.1-7.el7_9.src.rpm" version="3.53.1"><filename>nss-devel-3.53.1-7.el7_9.x86_64.rpm</filename><sum type="sha256">c7e84f4e7bce7eaa95ae02f5ada3ca4674e75b25f31695be6fcc139129f18567</sum></package><package arch="x86_64" name="nss-sysinit" release="7.el7_9" src="nss-3.53.1-7.el7_9.src.rpm" version="3.53.1"><filename>nss-sysinit-3.53.1-7.el7_9.x86_64.rpm</filename><sum type="sha256">944e84dff5016a57957f4fd0e4f7ac40d2b03659d269083286aa3cc20749fabe</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25648" id="CVE-2020-25648" title="Nss: Tls 1.3 Ccs Flood Remote Dos Attack" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1384" id="RHSA-2021:1384-1" title="Rhsa-2021:1384-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1885321" id="1885321" title="Cannot Compile Code With Nss Headers And -Werror=Strict-Prototypes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1887319" id="1887319" title="Nss: Tls 1.3 Ccs Flood Remote Dos Attack" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1389-1</id><title>Openldap</title><description>Security Fix(es): 
* openldap: NULL pointer dereference for unauthenticated packet in slapd (CVE-2020-25692) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- 
SL7  x86_64  - openldap-2.4.44-23.el7_9.i686.rpm  - openldap-2.4.44-23.el7_9.x86_64.rpm  - openldap-clients-2.4.44-23.el7_9.x86_64.rpm  - openldap-debuginfo-2.4.44-23.el7_9.i686.rpm  - openldap-debuginfo-2.4.44-23.el7_9.x86_64.rpm  - openldap-devel-2.4.44-23.el7_9.i686.rpm  - openldap-devel-2.4.44-23.el7_9.x86_64.rpm  - openldap-servers-2.4.44-23.el7_9.x86_64.rpm  - openldap-servers-sql-2.4.44-23.el7_9.x86_64.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-04-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openldap-devel" release="23.el7_9" src="openldap-2.4.44-23.el7_9.src.rpm" version="2.4.44"><filename>openldap-devel-2.4.44-23.el7_9.x86_64.rpm</filename><sum type="sha256">c4ab39a53ed3b7bb4f40dc04dcb331d76549a4e65f7f0b133ce34c3ad4929f6d</sum></package><package arch="x86_64" name="openldap" release="23.el7_9" src="openldap-2.4.44-23.el7_9.src.rpm" version="2.4.44"><filename>openldap-2.4.44-23.el7_9.x86_64.rpm</filename><sum type="sha256">7d1b468fd544df1619789b5b84c2e9bbc652e6b5b28bdc697819b0d9cc7e94b8</sum></package><package arch="x86_64" name="openldap-clients" release="23.el7_9" src="openldap-2.4.44-23.el7_9.src.rpm" version="2.4.44"><filename>openldap-clients-2.4.44-23.el7_9.x86_64.rpm</filename><sum type="sha256">c8b54025ff6c00c6b495fc954f5b7df7858a05b302acd95c0e9898863aa85ac9</sum></package><package arch="i686" name="openldap" release="23.el7_9" src="openldap-2.4.44-23.el7_9.src.rpm" version="2.4.44"><filename>openldap-2.4.44-23.el7_9.i686.rpm</filename><sum type="sha256">fd10af55c5e2b360e0ee4415366c8a70c20d17bee41f8fba730521a9f5087ede</sum></package><package arch="x86_64" name="openldap-servers" release="23.el7_9" src="openldap-2.4.44-23.el7_9.src.rpm" version="2.4.44"><filename>openldap-servers-2.4.44-23.el7_9.x86_64.rpm</filename><sum type="sha256">a2a6a577481dfc70c41991fcd7fc83d5f9ef43bf8858b216813cf13e3bdd56d9</sum></package><package arch="x86_64" name="openldap-servers-sql" release="23.el7_9" src="openldap-2.4.44-23.el7_9.src.rpm" version="2.4.44"><filename>openldap-servers-sql-2.4.44-23.el7_9.x86_64.rpm</filename><sum type="sha256">85aecde5a653c61d7d092db4c474810a86c2a72839d3d618dcea9e943f0d568c</sum></package><package arch="i686" name="openldap-devel" release="23.el7_9" src="openldap-2.4.44-23.el7_9.src.rpm" version="2.4.44"><filename>openldap-devel-2.4.44-23.el7_9.i686.rpm</filename><sum type="sha256">148afb143da738103e79fa5ef8fd77a8967b0badc3662c6b1a0d0705527fb980</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25692" id="CVE-2020-25692" title="Openldap: Null Pointer Dereference For Unauthenticated Packet In Slapd" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1389" id="RHSA-2021:1389-1" title="Rhsa-2021:1389-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1894567" id="1894567" title="Openldap: Null Pointer Dereference For Unauthenticated Packet In Slapd" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1469-1</id><title>Bind</title><description>Security Fix(es): 
* bind: An assertion check can fail while answering queries for DNAME records that require the DNAME to be processed to resolve itself (CVE-2021-25215) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- 
SL7  x86_64  - bind-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-chroot-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-debuginfo-9.11.4-26.P2.el7_9.5.i686.rpm  - bind-debuginfo-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-devel-9.11.4-26.P2.el7_9.5.i686.rpm  - bind-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-export-devel-9.11.4-26.P2.el7_9.5.i686.rpm  - bind-export-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-export-libs-9.11.4-26.P2.el7_9.5.i686.rpm  - bind-export-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-libs-9.11.4-26.P2.el7_9.5.i686.rpm  - bind-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-libs-lite-9.11.4-26.P2.el7_9.5.i686.rpm  - bind-libs-lite-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-lite-devel-9.11.4-26.P2.el7_9.5.i686.rpm  - bind-lite-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-pkcs11-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-pkcs11-devel-9.11.4-26.P2.el7_9.5.i686.rpm  - bind-pkcs11-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-pkcs11-libs-9.11.4-26.P2.el7_9.5.i686.rpm  - bind-pkcs11-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-pkcs11-utils-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-sdb-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-sdb-chroot-9.11.4-26.P2.el7_9.5.x86_64.rpm  - bind-utils-9.11.4-26.P2.el7_9.5.x86_64.rpm 
noarch  - bind-license-9.11.4-26.P2.el7_9.5.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-04-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">5f12080002eed2b3d0a5fe0d6ba3ae0e493c0381fa9774ffdd5cee036061a661</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">774c99015bc2d7baa39bd1348801f0737353305e3111a2e54c4d246721f9b918</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">5ac89251e16484e5d8d51ec3ec74b8593b1f7e44421a4c2c2c12c739c424198a</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">04d776e8211418700d08b85c04ec9a87f114ad6aff51b5af0f8245a9bd0ebf4b</sum></package><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">52932470558a95a9898dd936150ba8d7d5d1494fd33b28e0fb7e3cc876e85827</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.5.i686.rpm</filename><sum type="sha256">e09f37081e387b39c847460852f1f063d2bf45b1eb51a5faa7b908e3b1692f17</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.5.i686.rpm</filename><sum type="sha256">93b73fa12dd56caed82ccac43a574078149254704f2bc72a0470c26dc276ac6d</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.5.i686.rpm</filename><sum type="sha256">da50831ec3b2b0082f6afb1063c471e85c72a7f9625e037f481a6ebd16df6ec8</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.5.i686.rpm</filename><sum type="sha256">2434d790ef2452f0887d8bb623d4e64057327d9b96e9fc87c347075ae9a31436</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.5.i686.rpm</filename><sum type="sha256">c1853aeb2a81d958cce56306aa4add20566b32e562c0d813dbd7a54c72265db0</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.5.i686.rpm</filename><sum type="sha256">dd979fdb8a371cfaf0e06724b90691e2dc742dab923870ca92f84600ac103a19</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">1ddb59ec131528bb776e435125a5117d5a42dbf4ccde72580fa129dc95b7f998</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">1adbfc28887c4de3d43e936db64d8e7b29ba01f03ad1087ae3b6ca4c2eb6a715</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">3519feefe599d74baeb7cc28541296e856f7c5ca3ba404acf4e8c0ae0f83a248</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">dd9591546ab81de27fd16f3f509dda1250c4eec929644d02aa9f3603f8116d81</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">7e0d29db6cb6308fe03e6db8b4701e2ee5d392a0d28a1bc266b4017a8af9ad62</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.5.i686.rpm</filename><sum type="sha256">65cd52b5f02b1cfbc2c72d324520e3e1c45762ba676522175fb1c889f682c0a2</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">1a54382277a41b4d57517df82f5ce170034b915e91f2e46349f10c019c3b35e6</sum></package><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.5.noarch.rpm</filename><sum type="sha256">937c00c41008fa6a8771e1b421b4fc0d85fd86dea954d9543eb489091019d111</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">1c2bc6b788dbd7703f88045376009b98493a97ca155af266dd3ffb8a6d80481e</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">3a08818423154fa939cc02b2acfb974d8fdd7d9a6bdeb3a98cf0ac1e6aa3efe6</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">51cea52e6d70ec317d51e8fe2e80f3b77cadb97ba8b32c168e190f9b1cc42df4</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.5.i686.rpm</filename><sum type="sha256">5c4745efc2fba02f614bc1d5f9e45ac28360f9033761a90666e03575e78c59f6</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.5" src="bind-9.11.4-26.P2.el7_9.5.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.5.x86_64.rpm</filename><sum type="sha256">7445a4d51ed6814795bc41931485e412959d1cf7e5ec5c73e6df210edb3df949</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25215" id="CVE-2021-25215" title="Bind: An Assertion Check Can Fail While Answering Queries For Dname Records That Require The Dname To Be Processed To Resolve Itself" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1469" id="RHSA-2021:1469-1" title="Rhsa-2021:1469-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1953857" id="1953857" title="Bind: An Assertion Check Can Fail While Answering Queries For Dname Records That Require The Dname To Be Processed To Resolve Itself" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:1512-1</id><title>Postgresql</title><description>Security Fix(es): 
* postgresql: Reconnection can downgrade connection security settings (CVE-2020-25694) 
* postgresql: Multiple features escape "security restricted operation" sandbox (CVE-2020-25695) 
* postgresql: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution (CVE-2019-10208) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- SL7  x86_64  - postgresql-9.2.24-6.el7_9.i686.rpm  - postgresql-9.2.24-6.el7_9.x86_64.rpm  - postgresql-contrib-9.2.24-6.el7_9.x86_64.rpm  - postgresql-debuginfo-9.2.24-6.el7_9.i686.rpm  - postgresql-debuginfo-9.2.24-6.el7_9.x86_64.rpm  - postgresql-devel-9.2.24-6.el7_9.i686.rpm  - postgresql-devel-9.2.24-6.el7_9.x86_64.rpm  - postgresql-docs-9.2.24-6.el7_9.x86_64.rpm  - postgresql-libs-9.2.24-6.el7_9.i686.rpm  - postgresql-libs-9.2.24-6.el7_9.x86_64.rpm  - postgresql-plperl-9.2.24-6.el7_9.x86_64.rpm  - postgresql-plpython-9.2.24-6.el7_9.x86_64.rpm  - postgresql-pltcl-9.2.24-6.el7_9.x86_64.rpm  - postgresql-server-9.2.24-6.el7_9.x86_64.rpm  - postgresql-static-9.2.24-6.el7_9.i686.rpm  - postgresql-static-9.2.24-6.el7_9.x86_64.rpm  - postgresql-test-9.2.24-6.el7_9.x86_64.rpm  - postgresql-upgrade-9.2.24-6.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-05-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="postgresql-server" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-server-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">13a43265d2a3f0399dbeb8650fd44ce7cf064a5082a1a13ee263a4e5b2f2017a</sum></package><package arch="x86_64" name="postgresql-devel" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-devel-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">a46b2709b9a06be227d0a9504dc34592f8c0cc5495d41a52ad85f67d3bb4cdc4</sum></package><package arch="x86_64" name="postgresql-pltcl" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-pltcl-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">deac119a80db8d2e3c3d75857be661445fc171e4bc4aaa76595a053295bd093f</sum></package><package arch="x86_64" name="postgresql-upgrade" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-upgrade-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">a1f9e294cf6a6b0dbf5472ffc42946c8eb7f6f6b999de851d7eb2f06b5b9848b</sum></package><package arch="i686" name="postgresql" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-9.2.24-6.el7_9.i686.rpm</filename><sum type="sha256">8b554d1337699f1a83589a30e426978094fc7483066b317095e3501bcca3453e</sum></package><package arch="i686" name="postgresql-devel" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-devel-9.2.24-6.el7_9.i686.rpm</filename><sum type="sha256">24e50e2bcbcd328ac72503f34bc8a23d9a680df300ad6b7c2c0feeeb4cf1129d</sum></package><package arch="x86_64" name="postgresql" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">b54b8faa628b7928240cc047de9648888f6834e88fd302e1ea19e4526df7b47d</sum></package><package arch="i686" name="postgresql-static" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-static-9.2.24-6.el7_9.i686.rpm</filename><sum type="sha256">35c129497e7c62242bdfe8cfd5ac8ce7b3341c94bcc30ce5931ab5dbeb375552</sum></package><package arch="x86_64" name="postgresql-docs" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-docs-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">88664b6db2f6bf2e9d987f0310bdf165b0b334591e5dcaa442ff7177a388de4e</sum></package><package arch="x86_64" name="postgresql-plpython" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-plpython-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">1dd1e6e73a83e66cd49691e2ff5d2bb0a78cafab2d756031de3a1357bfb3670e</sum></package><package arch="x86_64" name="postgresql-test" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-test-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">002be0d729f775fd923898a302d85600951ccbbeb44be32ad2a4839c726d6d26</sum></package><package arch="x86_64" name="postgresql-plperl" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-plperl-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">a7f95a93113c7bf49d560e2e2d7f25381263e9c3e8db95bde96f3b21d0fea763</sum></package><package arch="x86_64" name="postgresql-static" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-static-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">b4a8eb4283bfdae2206f4419c69bf49236f8358dc7cb7728882d30bfc3f8b7bb</sum></package><package arch="x86_64" name="postgresql-libs" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-libs-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">477b5f0b7e2864b6503c2f5fb08b852b34dbb7eceaa411e471235aaae2a64f8a</sum></package><package arch="i686" name="postgresql-libs" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-libs-9.2.24-6.el7_9.i686.rpm</filename><sum type="sha256">d929748c04c4fc3d85556033ca3b3b50e454fee4c67ee56bfbfb64d30371a0c3</sum></package><package arch="x86_64" name="postgresql-contrib" release="6.el7_9" src="postgresql-9.2.24-6.el7_9.src.rpm" version="9.2.24"><filename>postgresql-contrib-9.2.24-6.el7_9.x86_64.rpm</filename><sum type="sha256">ecc7664978f843392d0baeb80516fa54aad6913d69bf6e8b5cd69bc92061020f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10208" id="CVE-2019-10208" title="Postgresql: Type In Pg_Temp Executes Arbitrary Sql During Security Definer Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25694" id="CVE-2020-25694" title="Postgresql: Reconnection Can Downgrade Connection Security Settings" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25695" id="CVE-2020-25695" title="Postgresql: Multiple Features Escape &quot;Security Restricted Operation&quot; Sandbox" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:1512" id="RHSA-2021:1512-1" title="Rhsa-2021:1512-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1734416" id="1734416" title="Postgresql: Type In Pg_Temp Executes Arbitrary Sql During Security Definer Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1894423" id="1894423" title="Postgresql: Reconnection Can Downgrade Connection Security Settings" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1894425" id="1894425" title="Postgresql: Multiple Features Escape &quot;Security Restricted Operation&quot; Sandbox" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2032-1</id><title>Slapi-Nis</title><description>Security Fix(es): 
* slapi-nis: NULL dereference (DoS) with specially crafted Binding DN (CVE-2021-3480) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- 
SL7  x86_64  - slapi-nis-0.56.5-4.el7_9.x86_64.rpm  - slapi-nis-debuginfo-0.56.5-4.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-05-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="slapi-nis" release="4.el7_9" src="slapi-nis-0.56.5-4.el7_9.src.rpm" version="0.56.5"><filename>slapi-nis-0.56.5-4.el7_9.x86_64.rpm</filename><sum type="sha256">6dfcfec44b8eae028e7946736c04aa975f5c9a2b13e5400da680b1c9f9caf52b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3480" id="CVE-2021-3480" title="Slapi-Nis: Null Dereference (Dos) With Specially Crafted Binding Dn" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2032" id="RHSA-2021:2032-1" title="Rhsa-2021:2032-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1944640" id="1944640" title="Slapi-Nis: Null Dereference (Dos) With Specially Crafted Binding Dn" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2033-1</id><title>Xorg-X11-Server</title><description>Security Fix(es): 
* xorg-x11-server: XChangeFeedbackControl integer underflow leads to privilege escalation (CVE-2021-3472) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- 
SL7  x86_64  - xorg-x11-server-Xdmx-1.20.4-16.el7_9.x86_64.rpm  - xorg-x11-server-Xephyr-1.20.4-16.el7_9.x86_64.rpm  - xorg-x11-server-Xnest-1.20.4-16.el7_9.x86_64.rpm  - xorg-x11-server-Xorg-1.20.4-16.el7_9.x86_64.rpm  - xorg-x11-server-Xvfb-1.20.4-16.el7_9.x86_64.rpm  - xorg-x11-server-Xwayland-1.20.4-16.el7_9.x86_64.rpm  - xorg-x11-server-common-1.20.4-16.el7_9.x86_64.rpm  - xorg-x11-server-debuginfo-1.20.4-16.el7_9.i686.rpm  - xorg-x11-server-debuginfo-1.20.4-16.el7_9.x86_64.rpm  - xorg-x11-server-devel-1.20.4-16.el7_9.i686.rpm  - xorg-x11-server-devel-1.20.4-16.el7_9.x86_64.rpm  noarch  - xorg-x11-server-source-1.20.4-16.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-05-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-Xdmx" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-16.el7_9.x86_64.rpm</filename><sum type="sha256">6a2a64f392461a3b1798f2c302639c694ce80af3c9c8400fd6a4b48bd2d07f54</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-16.el7_9.x86_64.rpm</filename><sum type="sha256">ee7a8ed348dab7340c8d5207228f6e2bd64e0e046d079d7714ffc986001873d7</sum></package><package arch="i686" name="xorg-x11-server-devel" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-16.el7_9.i686.rpm</filename><sum type="sha256">0cddf15d75c07eb4495bafc2e68800bc009c65ec332c60b48f6cc11276437422</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-16.el7_9.x86_64.rpm</filename><sum type="sha256">3d263b42fd00a1bc625a17575b763e61b0e44d3770ddd403473adfa1f608602b</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-16.el7_9.x86_64.rpm</filename><sum type="sha256">93ed5a11123ff02f577e4714f6ee7b6948362b95c6cdae9501006c6de7567654</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-16.el7_9.x86_64.rpm</filename><sum type="sha256">ab7c5ecda7303df4af58245291daef6c585fb946a021a625899271b965112f8e</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-16.el7_9.x86_64.rpm</filename><sum type="sha256">20e2e6671dd40ce6f5709f9f9ca380787fee0a3b7a6c8a796bdf946b59258a58</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-16.el7_9.x86_64.rpm</filename><sum type="sha256">79a98194010cfed4a7a94c41206fedd321efa41aec8b350e841bcc81640e0388</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-16.el7_9.x86_64.rpm</filename><sum type="sha256">dba96725be36791a883264af65d73262f268d36501250f164888631570cfb6d4</sum></package><package arch="noarch" name="xorg-x11-server-source" release="16.el7_9" src="xorg-x11-server-1.20.4-16.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-16.el7_9.noarch.rpm</filename><sum type="sha256">ec17ae4c7d16c6c046921d42d4155b519290c9e019f112cc3165b805c7744778</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3472" id="CVE-2021-3472" title="Xorg-X11-Server: Xchangefeedbackcontrol Integer Underflow Leads To Privilege Escalation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2033" id="RHSA-2021:2033-1" title="Rhsa-2021:2033-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1944167" id="1944167" title="Xorg-X11-Server: Xchangefeedbackcontrol Integer Underflow Leads To Privilege Escalation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2147-1</id><title>Glib2</title><description>Security Fix(es): 
* glib: integer overflow in g_bytes_new function on 64-bit platforms due to  an implicit cast from 64 bits to 32 bits (CVE-2021-27219) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
----- 
SL7  x86_64  - glib2-2.56.1-9.el7_9.i686.rpm  - glib2-2.56.1-9.el7_9.x86_64.rpm  - glib2-debuginfo-2.56.1-9.el7_9.i686.rpm  - glib2-debuginfo-2.56.1-9.el7_9.x86_64.rpm  - glib2-devel-2.56.1-9.el7_9.i686.rpm  - glib2-devel-2.56.1-9.el7_9.x86_64.rpm  - glib2-fam-2.56.1-9.el7_9.x86_64.rpm  - glib2-static-2.56.1-9.el7_9.i686.rpm  - glib2-static-2.56.1-9.el7_9.x86_64.rpm  - glib2-tests-2.56.1-9.el7_9.x86_64.rpm  noarch  - glib2-doc-2.56.1-9.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-06-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="glib2-tests" release="9.el7_9" src="glib2-2.56.1-9.el7_9.src.rpm" version="2.56.1"><filename>glib2-tests-2.56.1-9.el7_9.x86_64.rpm</filename><sum type="sha256">02520b0ebb0cf7e0a5e9397fb4daa2545702764867693f2deeb5b132fa2cb0c8</sum></package><package arch="noarch" name="glib2-doc" release="9.el7_9" src="glib2-2.56.1-9.el7_9.src.rpm" version="2.56.1"><filename>glib2-doc-2.56.1-9.el7_9.noarch.rpm</filename><sum type="sha256">71008da68cdfc784b6dc939ea17a2de7e7e34db0694983f4e87dba4ae175bc3e</sum></package><package arch="i686" name="glib2" release="9.el7_9" src="glib2-2.56.1-9.el7_9.src.rpm" version="2.56.1"><filename>glib2-2.56.1-9.el7_9.i686.rpm</filename><sum type="sha256">7c88e4ba0edbbb2d5831e0d90860a239c1b0b104ca9558ad1c1524c8cb37ce9f</sum></package><package arch="i686" name="glib2-static" release="9.el7_9" src="glib2-2.56.1-9.el7_9.src.rpm" version="2.56.1"><filename>glib2-static-2.56.1-9.el7_9.i686.rpm</filename><sum type="sha256">e455d5f1b61eb74b40d4f9dcea43818954ec8e8bbb640101a6f382e56f118061</sum></package><package arch="x86_64" name="glib2-devel" release="9.el7_9" src="glib2-2.56.1-9.el7_9.src.rpm" version="2.56.1"><filename>glib2-devel-2.56.1-9.el7_9.x86_64.rpm</filename><sum type="sha256">c30ed59651df9ad80a6770b71379384b5efe926628fbf4692c2bd8e8c88e52c6</sum></package><package arch="x86_64" name="glib2" release="9.el7_9" src="glib2-2.56.1-9.el7_9.src.rpm" version="2.56.1"><filename>glib2-2.56.1-9.el7_9.x86_64.rpm</filename><sum type="sha256">7e8632f2c3557076b52c2bcd40f6e8c8799af61e4dd641a7a82a04074f453059</sum></package><package arch="x86_64" name="glib2-fam" release="9.el7_9" src="glib2-2.56.1-9.el7_9.src.rpm" version="2.56.1"><filename>glib2-fam-2.56.1-9.el7_9.x86_64.rpm</filename><sum type="sha256">f20e6e399f5ce60cb494f80096222050f02bc70e181261b2ba342171674e85fc</sum></package><package arch="x86_64" name="glib2-static" release="9.el7_9" src="glib2-2.56.1-9.el7_9.src.rpm" version="2.56.1"><filename>glib2-static-2.56.1-9.el7_9.x86_64.rpm</filename><sum type="sha256">97ce77b9c203931971627d4b79e4a79e618a5aed74a76f464ad4596e3cfaae3c</sum></package><package arch="i686" name="glib2-devel" release="9.el7_9" src="glib2-2.56.1-9.el7_9.src.rpm" version="2.56.1"><filename>glib2-devel-2.56.1-9.el7_9.i686.rpm</filename><sum type="sha256">f5b6e9f7130c9060ead03a9eccce33b0217f061be640ed896034f10f969290ec</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-27219" id="CVE-2021-27219" title="Glib: Integer Overflow In G_Bytes_New Function On 64-Bit Platforms Due To An Implicit Cast From 64 Bits To 32 Bits" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2147" id="RHSA-2021:2147-1" title="Rhsa-2021:2147-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1929858" id="1929858" title="Glib: Integer Overflow In G_Bytes_New Function On 64-Bit Platforms Due To An Implicit Cast From 64 Bits To 32 Bits" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2206-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.11.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11 (CVE-2021-29967) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- 
SL7  x86_64  - firefox-78.11.0-3.el7_9.i686.rpm  - firefox-78.11.0-3.el7_9.x86_64.rpm  - firefox-debuginfo-78.11.0-3.el7_9.x86_64.rpm</description><severity>critical</severity><release>Scientific Linux</release><issued date="2021-06-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="3.el7_9" src="firefox-78.11.0-3.el7_9.src.rpm" version="78.11.0"><filename>firefox-78.11.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">460e9b9d43dff32fec92291d72995fcc32837e1eff428ffaa799376b642c971c</sum></package><package arch="i686" name="firefox" release="3.el7_9" src="firefox-78.11.0-3.el7_9.src.rpm" version="78.11.0"><filename>firefox-78.11.0-3.el7_9.i686.rpm</filename><sum type="sha256">ffa44d31cf931ba3ee78db4b3eb806f2ecd97561508a84053ab3bf7897661fdb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29967" id="CVE-2021-29967" title="Mozilla: Memory Safety Bugs Fixed In Firefox 89 And Firefox Esr 78.11" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2206" id="RHSA-2021:2206-1" title="Rhsa-2021:2206-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1966831" id="1966831" title="Mozilla: Memory Safety Bugs Fixed In Firefox 89 And Firefox Esr 78.11" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2260-1</id><title>Libwebp</title><description>Security Fix(es): 
* libwebp: heap-based buffer overflow in PutLE16() (CVE-2018-25011) 
* libwebp: heap-based buffer overflow in WebPDecode*Into functions (CVE-2020-36328) 
* libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c (CVE-2020-36329) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64  - libwebp-0.3.0-10.el7_9.i686.rpm  - libwebp-0.3.0-10.el7_9.x86_64.rpm  - libwebp-debuginfo-0.3.0-10.el7_9.i686.rpm  - libwebp-debuginfo-0.3.0-10.el7_9.x86_64.rpm  - libwebp-devel-0.3.0-10.el7_9.i686.rpm  - libwebp-devel-0.3.0-10.el7_9.x86_64.rpm  - libwebp-java-0.3.0-10.el7_9.x86_64.rpm  - libwebp-tools-0.3.0-10.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libwebp-tools" release="10.el7_9" src="libwebp-0.3.0-10.el7_9.src.rpm" version="0.3.0"><filename>libwebp-tools-0.3.0-10.el7_9.x86_64.rpm</filename><sum type="sha256">c45e7e543b9e9122850a55e5e94f14c3c555539e4238d302d71509fb5c558c83</sum></package><package arch="x86_64" name="libwebp-devel" release="10.el7_9" src="libwebp-0.3.0-10.el7_9.src.rpm" version="0.3.0"><filename>libwebp-devel-0.3.0-10.el7_9.x86_64.rpm</filename><sum type="sha256">0e9dea5793b1620cf4b8947c70e5b15d5e56f4b10b342d9ff46bf9cad44aa3f7</sum></package><package arch="i686" name="libwebp" release="10.el7_9" src="libwebp-0.3.0-10.el7_9.src.rpm" version="0.3.0"><filename>libwebp-0.3.0-10.el7_9.i686.rpm</filename><sum type="sha256">c7c8944319977c15afb204ecae3b947eeaf258f7c7435675a6f8e7974029a5b2</sum></package><package arch="i686" name="libwebp-devel" release="10.el7_9" src="libwebp-0.3.0-10.el7_9.src.rpm" version="0.3.0"><filename>libwebp-devel-0.3.0-10.el7_9.i686.rpm</filename><sum type="sha256">ab915f9d617061e7465a1e70e84cc78e43359dce1e5a44fbcedbc1c3636dd0f0</sum></package><package arch="x86_64" name="libwebp" release="10.el7_9" src="libwebp-0.3.0-10.el7_9.src.rpm" version="0.3.0"><filename>libwebp-0.3.0-10.el7_9.x86_64.rpm</filename><sum type="sha256">eec5495efec86d0c336291e4b4a8529f0fc2c4b58c94dc9d397d3e20f261cf2f</sum></package><package arch="x86_64" name="libwebp-java" release="10.el7_9" src="libwebp-0.3.0-10.el7_9.src.rpm" version="0.3.0"><filename>libwebp-java-0.3.0-10.el7_9.x86_64.rpm</filename><sum type="sha256">3052051d8334ead45132328c82d330d98df5f11bd6919b90bbdde3ffaa08263d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25011" id="CVE-2018-25011" title="Libwebp: Heap-Based Buffer Overflow In Putle16()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36328" id="CVE-2020-36328" title="Libwebp: Heap-Based Buffer Overflow In Webpdecode*Into Functions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36329" id="CVE-2020-36329" title="Libwebp: Use-After-Free In Emitfancyrgb() In Dec/Io_Dec.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2260" id="RHSA-2021:2260-1" title="Rhsa-2021:2260-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1956829" id="1956829" title="Libwebp: Heap-Based Buffer Overflow In Webpdecode*Into Functions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1956843" id="1956843" title="Libwebp: Use-After-Free In Emitfancyrgb() In Dec/Io_Dec.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1956919" id="1956919" title="Libwebp: Heap-Based Buffer Overflow In Putle16()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2263-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.11.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 89 and Firefox ESR 78.11 (CVE-2021-29967) 
* Mozilla: Thunderbird stored OpenPGP secret keys without master password protection (CVE-2021-29956) 
* Mozilla: Partial protection of inline OpenPGP message not indicated (CVE-2021-29957) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64  - thunderbird-78.11.0-1.el7_9.x86_64.rpm  - thunderbird-debuginfo-78.11.0-1.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.11.0-1.el7_9.src.rpm" version="78.11.0"><filename>thunderbird-78.11.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">14a6750cef537a37e7a776f11d13460260cb59d4cdd01c5d92b8eaa134dc1b10</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29956" id="CVE-2021-29956" title="Mozilla: Thunderbird Stored Openpgp Secret Keys Without Master Password Protection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29957" id="CVE-2021-29957" title="Mozilla: Partial Protection Of Inline Openpgp Message Not Indicated" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29967" id="CVE-2021-29967" title="Mozilla: Memory Safety Bugs Fixed In Firefox 89 And Firefox Esr 78.11" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2263" id="RHSA-2021:2263-1" title="Rhsa-2021:2263-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1961503" id="1961503" title="Mozilla: Partial Protection Of Inline Openpgp Message Not Indicated" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1961504" id="1961504" title="Mozilla: Thunderbird Stored Openpgp Secret Keys Without Master Password Protection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1966831" id="1966831" title="Mozilla: Memory Safety Bugs Fixed In Firefox 89 And Firefox Esr 78.11" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2305-1</id><title>Microcode_Ctl</title><description>Security Fix(es): 
* hw: vt-d related privilege escalation (CVE-2020-24489) 
* hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511) 
* hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512) 
* hw: information disclosure on some Intel Atom processors (CVE-2020-24513) 
Bug Fix(es) and Enhancement(s): 
* Update Intel CPU microcode to microcode-20210525 release 
--- 
SL7  x86_64   microcode_ctl-2.1-73.9.el7_9.x86_64.rpm   microcode_ctl-debuginfo-2.1-73.9.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-06-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="73.9.el7_9" src="microcode_ctl-2.1-73.9.el7_9.src.rpm" version="2.1"><filename>microcode_ctl-2.1-73.9.el7_9.x86_64.rpm</filename><sum type="sha256">8a41f6c98891c5e2891129fbcaa9cc7ef5d648a0c4e84107665486b80a36c569</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489" id="CVE-2020-24489" title="Hw: Vt-D Related Privilege Escalation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511" id="CVE-2020-24511" title="Hw: Improper Isolation Of Shared Resources In Some Intel Processors" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512" id="CVE-2020-24512" title="Hw: Observable Timing Discrepancy In Some Intel Processors" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24513" id="CVE-2020-24513" title="Hw: Information Disclosure On Some Intel Atom Processors" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2305" id="RHSA-2021:2305-1" title="Rhsa-2021:2305-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1962650" id="1962650" title="Hw: Vt-D Related Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1962666" id="1962666" title="Hw: Information Disclosure On Some Intel Atom Processors" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1962702" id="1962702" title="Hw: Improper Isolation Of Shared Resources In Some Intel Processors" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1962722" id="1962722" title="Hw: Observable Timing Discrepancy In Some Intel Processors" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2313-1</id><title>Samba</title><description>Security Fix(es): 
* samba: Negative idmap cache entries can cause incorrect group entries in the Samba file server process token (CVE-2021-20254) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* smb.service stops when samba rpms are updated 
* samba printing dumps core 
--- SL7 x86_64 
libsmbclient-4.10.16-15.el7_9.i686.rpm libsmbclient-4.10.16-15.el7_9.x86_64.rpm libsmbclient-devel-4.10.16-15.el7_9.i686.rpm libsmbclient-devel-4.10.16-15.el7_9.x86_64.rpm libwbclient-4.10.16-15.el7_9.i686.rpm libwbclient-4.10.16-15.el7_9.x86_64.rpm libwbclient-devel-4.10.16-15.el7_9.i686.rpm libwbclient-devel-4.10.16-15.el7_9.x86_64.rpm samba-4.10.16-15.el7_9.x86_64.rpm samba-client-4.10.16-15.el7_9.x86_64.rpm samba-client-libs-4.10.16-15.el7_9.i686.rpm samba-client-libs-4.10.16-15.el7_9.x86_64.rpm samba-common-libs-4.10.16-15.el7_9.i686.rpm samba-common-libs-4.10.16-15.el7_9.x86_64.rpm samba-common-tools-4.10.16-15.el7_9.x86_64.rpm samba-dc-4.10.16-15.el7_9.x86_64.rpm samba-dc-libs-4.10.16-15.el7_9.x86_64.rpm samba-debuginfo-4.10.16-15.el7_9.i686.rpm samba-debuginfo-4.10.16-15.el7_9.x86_64.rpm samba-devel-4.10.16-15.el7_9.i686.rpm samba-devel-4.10.16-15.el7_9.x86_64.rpm samba-krb5-printing-4.10.16-15.el7_9.x86_64.rpm samba-libs-4.10.16-15.el7_9.i686.rpm samba-libs-4.10.16-15.el7_9.x86_64.rpm samba-python-4.10.16-15.el7_9.i686.rpm samba-python-4.10.16-15.el7_9.x86_64.rpm samba-python-test-4.10.16-15.el7_9.x86_64.rpm samba-test-4.10.16-15.el7_9.x86_64.rpm samba-test-libs-4.10.16-15.el7_9.i686.rpm samba-test-libs-4.10.16-15.el7_9.x86_64.rpm samba-vfs-glusterfs-4.10.16-15.el7_9.x86_64.rpm samba-winbind-4.10.16-15.el7_9.x86_64.rpm samba-winbind-clients-4.10.16-15.el7_9.x86_64.rpm samba-winbind-krb5-locator-4.10.16-15.el7_9.x86_64.rpm samba-winbind-modules-4.10.16-15.el7_9.i686.rpm samba-winbind-modules-4.10.16-15.el7_9.x86_64.rpm 
noarch samba-common-4.10.16-15.el7_9.noarch.rpm samba-pidl-4.10.16-15.el7_9.noarch.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libwbclient-devel" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">541d45d9952b27d8aae45dfee62461b9ef0522eb86c1c9a86b8c33c587869b9b</sum></package><package arch="i686" name="samba-python" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">3bf08c96289e6609050edc7e544893b1c9a5e09067ac53e9c6c4635bd3ffb766</sum></package><package arch="x86_64" name="samba-winbind-modules" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">a0077b3516a5ec8cef57b138f6161f2d1ac71edb9a0700dc84f990a5a0c93a6f</sum></package><package arch="i686" name="libwbclient-devel" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">fcb4911e26b223e9506ac04519eeb4e8a757270d4e51cc5f25a2de47ca037163</sum></package><package arch="x86_64" name="samba-client-libs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">5d04a03b32a375baf0ae04d00724f2f0f6b75995aa54c3dd03f94264517cf6f5</sum></package><package arch="x86_64" name="samba-common-libs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">9522acf0e649723e808fc7a15aa11f4047696074b59c08216271a8843bcd5da9</sum></package><package arch="x86_64" name="samba-python" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">1b4b8e88dc3795e20dcea916964ef368b00aa0f4de34fd51416dbb69135c0880</sum></package><package arch="i686" name="samba-libs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">8b27e9c6089087bd6f05226f64bab1d7a45403695e4c9fdfdabf89ceadd0e02d</sum></package><package arch="i686" name="samba-test-libs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">9b0fe9fb48ddda3ed0f438b7ba79a3b88b1154bb9971bf3e222b55cc26c30ca4</sum></package><package arch="x86_64" name="samba-winbind-clients" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-clients-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">42cc740c2b2a91a831f7bdc3230194787daa79abf26b1365e848d170de97ecba</sum></package><package arch="x86_64" name="samba-libs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">963af811ad5dba4265daa8f8a64eb47b8f4125e26ecaa248ac83546b80d8777c</sum></package><package arch="x86_64" name="samba-test-libs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">4693eda3daca745d78f4a07bc36c41d7d1cbc6113b521d604472a8675a6d43c4</sum></package><package arch="x86_64" name="samba-devel" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">4ea0d60644619ed6909a51a0d3872b005f554c96c57e86400dcb53c168ce0b65</sum></package><package arch="x86_64" name="samba-python-test" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-python-test-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">c02fa36775cde71f0544da4873695f57a7f8b3eab8db8159734475cc3011ba67</sum></package><package arch="noarch" name="samba-pidl" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-pidl-4.10.16-15.el7_9.noarch.rpm</filename><sum type="sha256">a91fbce57c5064ae71882789184f99f7243d33673cc2b408d18c7067b49c0f27</sum></package><package arch="x86_64" name="libwbclient" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">45f6edf64767adcab7ad34a3ad7c63d0c4719d398df338dc169219806e1d7018</sum></package><package arch="i686" name="samba-winbind-modules" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">1fa938d059993bfc45d595574c6999fd4f061684fdf951118a6e83020d1416ac</sum></package><package arch="i686" name="libwbclient" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">0027f30c8daa1b1244fb454bb207a937744c0fe26441cd9f202eb4aba5cb7e06</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-vfs-glusterfs-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">aa3617c92e2f894b6d62ade87fc696e02387bb5bc58a31accbc7ebce985ca9f0</sum></package><package arch="noarch" name="samba-common" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-common-4.10.16-15.el7_9.noarch.rpm</filename><sum type="sha256">4fb374a6298799a03fff8eab3a1b72575e00874d3de4eb9fb6902b8e34ea5bb0</sum></package><package arch="i686" name="samba-devel" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">5dcd901abf67c55779f7d66b45042221c291f91b06dcdd52987586c0a189b277</sum></package><package arch="x86_64" name="samba-winbind" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">8c73518a4061449bdcf6ea0a7b6068f710b2098d4ee1768dbc7f46ce97c33a1c</sum></package><package arch="i686" name="samba-client-libs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">5800750cc72e98dca3f66cffcd98de3cdc4956705b7d15defa356a15bd0c2ab0</sum></package><package arch="x86_64" name="libsmbclient-devel" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">13fca3c22d89f209c28012214df13cdc52972f9572afbb7da8bc1118d70edefd</sum></package><package arch="x86_64" name="samba-test" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-test-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">6fe9c97b1783752e9919df0798864794c9e8394b4f21566eeb0fc3e66194d19a</sum></package><package arch="x86_64" name="samba-client" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-client-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">c87e85699cd76dd6849214745a5bc836fdc9402ed58ccc7c5fd317505d1c7fb7</sum></package><package arch="x86_64" name="samba-dc" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">1bb49aca0d1c28f45c006f4481d6f3d2addcbcf2c03fb18da465a0c482a09a9d</sum></package><package arch="i686" name="libsmbclient" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">a1d617af8ba3c59a4c1374e93e31276ef7701468d90b52d93ca3a511476042f3</sum></package><package arch="x86_64" name="libsmbclient" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">38fcc3da40f8d15fffd50868e35dd44de40449b82a3133cf2c8ae6c624180f4d</sum></package><package arch="x86_64" name="samba-common-tools" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-common-tools-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">ecf340838f6a535449d829827da7ecaf25b83e51529a606f4754c8c4eb7d2f31</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-krb5-locator-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">077416a1636d36455d70022191d90ef391f7afb49da60fb87bba6c8fc0fe9fbc</sum></package><package arch="i686" name="samba-common-libs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">28fdbfa6a292b8f48ad831e6bfba4f6a7b16ba2c39c064679a1335d9201e6da7</sum></package><package arch="x86_64" name="samba" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">0199d755d8c5759035e92e83969a69b1bb0e6f70c63f61f61fa51d82d20f1bf3</sum></package><package arch="x86_64" name="samba-krb5-printing" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-krb5-printing-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">3086146d97fbd2fa391f0df8be69d3bb0bcb6558f8f0720e036a046f2b05a7e5</sum></package><package arch="x86_64" name="samba-dc-libs" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-libs-4.10.16-15.el7_9.x86_64.rpm</filename><sum type="sha256">5e97176ca96821cf7b2987ad6778852edeefa029247ea222f178224454936116</sum></package><package arch="i686" name="libsmbclient-devel" release="15.el7_9" src="samba-4.10.16-15.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-15.el7_9.i686.rpm</filename><sum type="sha256">41060951f6192311613b9ab0b609916c5704ea15f3d586f9f790133820855594</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20254" id="CVE-2021-20254" title="Samba: Negative Idmap Cache Entries Can Cause Incorrect Group Entries In The Samba File Server Process Token" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2313" id="RHSA-2021:2313-1" title="Rhsa-2021:2313-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1930747" id="1930747" title="[Rhel7.9] Smb.Service Stops When Samba Rpms Are Updated" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1937867" id="1937867" title="Samba Printing Dumps Core" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1949442" id="1949442" title="Samba: Negative Idmap Cache Entries Can Cause Incorrect Group Entries In The Samba File Server Process Token" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2314-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: Integer overflow in Intel(R) Graphics Drivers (CVE-2020-12362) 
* kernel: Use after free via PI futex state (CVE-2021-3347) 
* kernel: use-after-free in n_tty_receive_buf_common function in drivers/tty/n_tty.c (CVE-2020-8648) 
* kernel: Improper input validation in some Intel(R) Graphics Drivers (CVE-2020-12363) 
* kernel: Null pointer dereference in some Intel(R) Graphics Drivers (CVE-2020-12364) 
* kernel: Speculation on pointer arithmetic against bpf_context pointer (CVE-2020-27170) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* kernel crash when call the timer function (sctp_generate_proto_unreach_event) of sctp module 
* SCSI error handling process on HP P440ar controller gets stuck indefinitely in device reset operation 
* netfilter: reproducible deadlock on nft_log module autoload 
* netfilter: NULL pointer dereference in nf_tables_set_lookup() 
* [DELL EMC 7.9 Bug]: No acpi_pad threads on top command for "power cap policy equal to 0 watts" 
* A race between i40e_ndo_set_vf_mac() and i40e_vsi_clear() in the i40e driver causes a use after free condition of the kmalloc-4096 slab cache. 
* netxen driver performs poorly with RT kernel 
* gendisk-&gt;disk_part_tbl-&gt;last_lookup retains pointer after partition deletion 
* Kernel experiences panic in update_group_power() due to division error even with Bug 1701115 fix 
* SL7.9 - zfcp: fix handling of FCP_RESID_OVER bit in fcp ingress path 
* SL7.9 - mm/THP: do not access vma-&gt;vm_mm after calling handle_userfault 
* raid: wrong raid io account 
* qla2x00_status_cont_entry() missing upstream patch that prevents unnecessary ABRT/warnings 
* SL 7.9.z - System hang caused by workqueue stall in qla2xxx driver 
* selinux: setsebool can trigger a deadlock 
* [Hyper-V][SL-7] Cannot boot kernel 3.10.0-1160.21.1.el7.x86_64 on Hyper-V 
 --- 
SL7  x86_64  - bpftool-3.10.0-1160.31.1.el7.x86_64.rpm  - bpftool-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-debug-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-debuginfo-common-x86_64-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-tools-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm  - kernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm  - perf-3.10.0-1160.31.1.el7.x86_64.rpm  - perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm  - python-perf-3.10.0-1160.31.1.el7.x86_64.rpm  - python-perf-debuginfo-3.10.0-1160.31.1.el7.x86_64.rpm  noarch  - kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm  - kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-06-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">f146169c2e1e2682199b5c6bd03bbe577981645ee5d6b934fd9e1398b794d803</sum></package><package arch="x86_64" name="kernel-devel" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">001620ea5a1a14ea9a67858d93fdf75581592c8fb1b41b955ca9f515cd900840</sum></package><package arch="x86_64" name="kernel" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">33b83b872b03d304dffd44ca8c30ad2ae1b11a7eef719a275521dd71211c6368</sum></package><package arch="x86_64" name="kernel-headers" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">b20c4f7db9b6e2720919e918298cee1a16cde0d8bb7cf6d1e8b8bec836f3551a</sum></package><package arch="x86_64" name="python-perf" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">e3b8261de98a47a78985ee7c714b02bb06d4be508fdcca23466d188ca191cc05</sum></package><package arch="x86_64" name="kernel-debug" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">f43dec0a3daa151b602415f6509ac6b62c604bca386112bc506124a347208b71</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">0a87d41078aad213f57ca583375d11182452104cca0b6c0a889b1183605a791c</sum></package><package arch="x86_64" name="bpftool" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">19bb2ab022c1b5baa08e787b3b0491a830396095772e3535f8410cf775016cbb</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.31.1.el7.noarch.rpm</filename><sum type="sha256">15a4b566b7e4fb25a5d6f195d3301d27c7d69db5eaddf72dc0db5907a2aa903e</sum></package><package arch="x86_64" name="perf" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">ed9b20cf0449eec46adff1d83a44d964feec09ac1aea06b6eebd432a85ae4e0e</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">4de8770b19792d3525e3a44c54654d8e56a3c66606f4b8f6982673989e65de84</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.31.1.el7.x86_64.rpm</filename><sum type="sha256">2d242882671570f55531142c32916b7679bd8a6c8c8790de86ee3c86ae0c4bb5</sum></package><package arch="noarch" name="kernel-doc" release="1160.31.1.el7" src="kernel-3.10.0-1160.31.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.31.1.el7.noarch.rpm</filename><sum type="sha256">4d6aadaec334fc5b5f1cfce3ff588e6af061c3b86948b1201e7b1e282949bcc2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12362" id="CVE-2020-12362" title="Kernel: Integer Overflow In Intel(R) Graphics Drivers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12363" id="CVE-2020-12363" title="Kernel: Improper Input Validation In Some Intel(R) Graphics Drivers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12364" id="CVE-2020-12364" title="Kernel: Null Pointer Dereference In Some Intel(R) Graphics Drivers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27170" id="CVE-2020-27170" title="Kernel: Speculation On Pointer Arithmetic Against Bpf_Context Pointer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8648" id="CVE-2020-8648" title="Kernel: Use-After-Free In N_Tty_Receive_Buf_Common Function In Drivers/Tty/N_Tty.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3347" id="CVE-2021-3347" title="Kernel: Use After Free Via Pi Futex State" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2314" id="RHSA-2021:2314-1" title="Rhsa-2021:2314-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1802559" id="1802559" title="Kernel: Use-After-Free In N_Tty_Receive_Buf_Common Function In Drivers/Tty/N_Tty.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1922249" id="1922249" title="Kernel: Use After Free Via Pi Futex State" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1930246" id="1930246" title="Kernel: Integer Overflow In Intel(R) Graphics Drivers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1930249" id="1930249" title="Kernel: Improper Input Validation In Some Intel(R) Graphics Drivers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1930251" id="1930251" title="Kernel: Null Pointer Dereference In Some Intel(R) Graphics Drivers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1940627" id="1940627" title="Kernel: Speculation On Pointer Arithmetic Against Bpf_Context Pointer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1941841" id="1941841" title="[Hyper-V][Rhel-7] Cannot Boot Kernel 3.10.0-1160.21.1.El7.X86_64 On Hyper-V" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2318-1</id><title>Hivex</title><description>Security Fix(es): 
* hivex: Buffer overflow when provided invalid node key length (CVE-2021-3504) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7 x86_64 
hivex-1.3.10-6.11.el7_9.i686.rpm hivex-1.3.10-6.11.el7_9.x86_64.rpm hivex-debuginfo-1.3.10-6.11.el7_9.i686.rpm hivex-debuginfo-1.3.10-6.11.el7_9.x86_64.rpm hivex-devel-1.3.10-6.11.el7_9.i686.rpm hivex-devel-1.3.10-6.11.el7_9.x86_64.rpm ocaml-hivex-1.3.10-6.11.el7_9.x86_64.rpm ocaml-hivex-devel-1.3.10-6.11.el7_9.x86_64.rpm perl-hivex-1.3.10-6.11.el7_9.x86_64.rpm python-hivex-1.3.10-6.11.el7_9.x86_64.rpm ruby-hivex-1.3.10-6.11.el7_9.x86_64.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ruby-hivex" release="6.11.el7_9" src="hivex-1.3.10-6.11.el7_9.src.rpm" version="1.3.10"><filename>ruby-hivex-1.3.10-6.11.el7_9.x86_64.rpm</filename><sum type="sha256">70ff83bd89b3a516c62a82ca22036e00b35f6d738a21541f6cfb28c336321c50</sum></package><package arch="x86_64" name="ocaml-hivex-devel" release="6.11.el7_9" src="hivex-1.3.10-6.11.el7_9.src.rpm" version="1.3.10"><filename>ocaml-hivex-devel-1.3.10-6.11.el7_9.x86_64.rpm</filename><sum type="sha256">7922ba897f8ba607bf961263e17cea88351ded69ff9ffb523ddc3d7a6f5d5cef</sum></package><package arch="x86_64" name="hivex" release="6.11.el7_9" src="hivex-1.3.10-6.11.el7_9.src.rpm" version="1.3.10"><filename>hivex-1.3.10-6.11.el7_9.x86_64.rpm</filename><sum type="sha256">b4bc08184a6fcbfcf3fc701eae65c5401c847cbf052fed4c5036c7d49efdd443</sum></package><package arch="x86_64" name="perl-hivex" release="6.11.el7_9" src="hivex-1.3.10-6.11.el7_9.src.rpm" version="1.3.10"><filename>perl-hivex-1.3.10-6.11.el7_9.x86_64.rpm</filename><sum type="sha256">927ae1e774035bec849f0847ad3d315c9dfe5c5b859dbf4306b6ac603b45cec7</sum></package><package arch="i686" name="hivex-devel" release="6.11.el7_9" src="hivex-1.3.10-6.11.el7_9.src.rpm" version="1.3.10"><filename>hivex-devel-1.3.10-6.11.el7_9.i686.rpm</filename><sum type="sha256">a3ba7c6fbac4ec4872695e6a866e3e6e6a2f0c9ce3a0086e83fee3c06d9c38be</sum></package><package arch="x86_64" name="hivex-devel" release="6.11.el7_9" src="hivex-1.3.10-6.11.el7_9.src.rpm" version="1.3.10"><filename>hivex-devel-1.3.10-6.11.el7_9.x86_64.rpm</filename><sum type="sha256">774709ff3467b495de350f692372acc34009f17b08ef11a6b2a67cf4501f7dae</sum></package><package arch="x86_64" name="python-hivex" release="6.11.el7_9" src="hivex-1.3.10-6.11.el7_9.src.rpm" version="1.3.10"><filename>python-hivex-1.3.10-6.11.el7_9.x86_64.rpm</filename><sum type="sha256">cd86f76c5c12683ceb78941a9d1af7fd142bfac23d2eb19c789ffd56e416c23a</sum></package><package arch="x86_64" name="ocaml-hivex" release="6.11.el7_9" src="hivex-1.3.10-6.11.el7_9.src.rpm" version="1.3.10"><filename>ocaml-hivex-1.3.10-6.11.el7_9.x86_64.rpm</filename><sum type="sha256">9a4dc3d3fc98a74dc47aba35c26e4c41b17e28e5b0536ff2dcf64c4284a9fb8d</sum></package><package arch="i686" name="hivex" release="6.11.el7_9" src="hivex-1.3.10-6.11.el7_9.src.rpm" version="1.3.10"><filename>hivex-1.3.10-6.11.el7_9.i686.rpm</filename><sum type="sha256">a68119a2bc76e35331c85acf2974fbe9d0c93026c4c64174b1bca8e5fbb465ed</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3504" id="CVE-2021-3504" title="Hivex: Buffer Overflow When Provided Invalid Node Key Length" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2318" id="RHSA-2021:2318-1" title="Rhsa-2021:2318-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1949687" id="1949687" title="Hivex: Buffer Overflow When Provided Invalid Node Key Length" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2322-1</id><title>Qemu-Kvm</title><description>Security Fix(es): 
* QEMU: ide: atapi: OOB access while processing read commands (CVE-2020-29443) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- SL7 x86_64 
qemu-img-1.5.3-175.el7_9.4.x86_64.rpm qemu-kvm-1.5.3-175.el7_9.4.x86_64.rpm qemu-kvm-common-1.5.3-175.el7_9.4.x86_64.rpm qemu-kvm-debuginfo-1.5.3-175.el7_9.4.x86_64.rpm qemu-kvm-tools-1.5.3-175.el7_9.4.x86_64.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="10" name="qemu-kvm-common" release="175.el7_9.4" src="qemu-kvm-1.5.3-175.el7_9.4.src.rpm" version="1.5.3"><filename>qemu-kvm-common-1.5.3-175.el7_9.4.x86_64.rpm</filename><sum type="sha256">4aa234a0664bcf8dde65870311bce96b737b9220f914667bafe5ea22b5418114</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm-tools" release="175.el7_9.4" src="qemu-kvm-1.5.3-175.el7_9.4.src.rpm" version="1.5.3"><filename>qemu-kvm-tools-1.5.3-175.el7_9.4.x86_64.rpm</filename><sum type="sha256">e537aa8950b76e2290bc2ae1a8a1d399e59c2423bb14751ad1f6fe5c323dc692</sum></package><package arch="x86_64" epoch="10" name="qemu-kvm" release="175.el7_9.4" src="qemu-kvm-1.5.3-175.el7_9.4.src.rpm" version="1.5.3"><filename>qemu-kvm-1.5.3-175.el7_9.4.x86_64.rpm</filename><sum type="sha256">c9072966f802b13c51cc26cad520ba4de9a77f2725322d2c18cde51b47f50d0b</sum></package><package arch="x86_64" epoch="10" name="qemu-img" release="175.el7_9.4" src="qemu-kvm-1.5.3-175.el7_9.4.src.rpm" version="1.5.3"><filename>qemu-img-1.5.3-175.el7_9.4.x86_64.rpm</filename><sum type="sha256">364a06918e63444100221d6472bbda6129b9b69703f44e360c611d5e55f11106</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29443" id="CVE-2020-29443" title="Qemu: Ide: Atapi: Oob Access While Processing Read Commands" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2322" id="RHSA-2021:2322-1" title="Rhsa-2021:2322-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1917446" id="1917446" title="Qemu: Ide: Atapi: Oob Access While Processing Read Commands" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2323-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* 389-ds-base: information disclosure during the binding of a DN (CVE-2020-35518) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Add new access log keywords for time spent in work queue and actual operation time 
 --- SL7 x86_64 
389-ds-base-1.3.10.2-12.el7_9.x86_64.rpm 389-ds-base-debuginfo-1.3.10.2-12.el7_9.x86_64.rpm 389-ds-base-devel-1.3.10.2-12.el7_9.x86_64.rpm 389-ds-base-libs-1.3.10.2-12.el7_9.x86_64.rpm 389-ds-base-snmp-1.3.10.2-12.el7_9.x86_64.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-snmp" release="12.el7_9" src="389-ds-base-1.3.10.2-12.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-snmp-1.3.10.2-12.el7_9.x86_64.rpm</filename><sum type="sha256">bb65147d453338e7cca13421f947e9ebfc5949e1a34e3829745aafa0a071be5e</sum></package><package arch="x86_64" name="389-ds-base" release="12.el7_9" src="389-ds-base-1.3.10.2-12.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-1.3.10.2-12.el7_9.x86_64.rpm</filename><sum type="sha256">7b3d1df912cf00d8fc800b3f6caf477abfa0325dc1ff603b5a921cdda3c98533</sum></package><package arch="x86_64" name="389-ds-base-libs" release="12.el7_9" src="389-ds-base-1.3.10.2-12.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-libs-1.3.10.2-12.el7_9.x86_64.rpm</filename><sum type="sha256">d717f396ae302b7ca1392319957a4b31d2c9fa8253000a12ffe78743b8ceaa01</sum></package><package arch="x86_64" name="389-ds-base-devel" release="12.el7_9" src="389-ds-base-1.3.10.2-12.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-devel-1.3.10.2-12.el7_9.x86_64.rpm</filename><sum type="sha256">fbe5956bda164c7d8b150849c61601a3e104c3d7d63e15b8b3aa773a5da8ced1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-35518" id="CVE-2020-35518" title="389-Ds-Base: Information Disclosure During The Binding Of A Dn" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2323" id="RHSA-2021:2323-1" title="Rhsa-2021:2323-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1905565" id="1905565" title="389-Ds-Base: Information Disclosure During The Binding Of A Dn" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1953673" id="1953673" title="Add New Access Log Keywords For Time Spent In Work Queue And Actual Operation Time" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2328-1</id><title>Qt5-Qtimageformats</title><description>Security Fix(es): 
* libwebp: heap-based buffer overflow in PutLE16() (CVE-2018-25011) 
* libwebp: use of uninitialized value in ReadSymbol() (CVE-2018-25014) 
* libwebp: heap-based buffer overflow in WebPDecode*Into functions (CVE-2020-36328) 
* libwebp: use-after-free in EmitFancyRGB() in dec/io_dec.c (CVE-2020-36329) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- SL7 x86_64 
qt5-qtimageformats-5.9.7-2.el7_9.i686.rpm qt5-qtimageformats-5.9.7-2.el7_9.x86_64.rpm qt5-qtimageformats-debuginfo-5.9.7-2.el7_9.i686.rpm qt5-qtimageformats-debuginfo-5.9.7-2.el7_9.x86_64.rpm 
noarch qt5-qtimageformats-doc-5.9.7-2.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="qt5-qtimageformats" release="2.el7_9" src="qt5-qtimageformats-5.9.7-2.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtimageformats-5.9.7-2.el7_9.i686.rpm</filename><sum type="sha256">3ae2e559638d0781783b638233cef303a46eaf2dde1f2c7ba68ca6c4db3ab4a3</sum></package><package arch="noarch" name="qt5-qtimageformats-doc" release="2.el7_9" src="qt5-qtimageformats-5.9.7-2.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtimageformats-doc-5.9.7-2.el7_9.noarch.rpm</filename><sum type="sha256">682d1477d439225104ba4f3a5749071cebddefddb4119c83b6d896a4c18d6375</sum></package><package arch="x86_64" name="qt5-qtimageformats" release="2.el7_9" src="qt5-qtimageformats-5.9.7-2.el7_9.src.rpm" version="5.9.7"><filename>qt5-qtimageformats-5.9.7-2.el7_9.x86_64.rpm</filename><sum type="sha256">4fdab3f7df2e30a71dbc732a5be85d3dfda87518d11f8c37c3defcc6517e00e7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25011" id="CVE-2018-25011" title="Libwebp: Heap-Based Buffer Overflow In Putle16()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25014" id="CVE-2018-25014" title="Libwebp: Use Of Uninitialized Value In Readsymbol()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36328" id="CVE-2020-36328" title="Libwebp: Heap-Based Buffer Overflow In Webpdecode*Into Functions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36329" id="CVE-2020-36329" title="Libwebp: Use-After-Free In Emitfancyrgb() In Dec/Io_Dec.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2328" id="RHSA-2021:2328-1" title="Rhsa-2021:2328-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1956829" id="1956829" title="Libwebp: Heap-Based Buffer Overflow In Webpdecode*Into Functions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1956843" id="1956843" title="Libwebp: Use-After-Free In Emitfancyrgb() In Dec/Io_Dec.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1956919" id="1956919" title="Libwebp: Heap-Based Buffer Overflow In Putle16()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1956927" id="1956927" title="Libwebp: Use Of Uninitialized Value In Readsymbol()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2357</id><title>Important: Dhcp Security Update</title><description>The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.
Security Fix(es):
* dhcp: stack-based buffer overflow when parsing statements with colon-separated hex digits in config or lease files in dhcpd and dhclient (CVE-2021-25217)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2021-06-14 07:50:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="12" name="dhcp" release="83.sl7_9.1" src="dhcp-4.2.5-83.sl7_9.1.src.rpm" version="4.2.5"><filename>dhcp-4.2.5-83.sl7_9.1.x86_64.rpm</filename><sum type="sha256">b287c98b390f00cbb5ebc28a9d5389e387cd1b86e3ae24b20c907aa6e80e1811</sum></package><package arch="x86_64" epoch="12" name="dhcp-devel" release="83.sl7_9.1" src="dhcp-4.2.5-83.sl7_9.1.src.rpm" version="4.2.5"><filename>dhcp-devel-4.2.5-83.sl7_9.1.x86_64.rpm</filename><sum type="sha256">e4c7db95a5e4d4ca0c18209014b43b8c2d0dbcdafe4ca27e5e1c0ef8cc13bb4d</sum></package><package arch="i686" epoch="12" name="dhcp-devel" release="83.sl7_9.1" src="dhcp-4.2.5-83.sl7_9.1.src.rpm" version="4.2.5"><filename>dhcp-devel-4.2.5-83.sl7_9.1.i686.rpm</filename><sum type="sha256">bc9e52b40a91c46f225d2ef5033505d49d1ffbe9ea59353c7b7dc0695aa335ef</sum></package><package arch="x86_64" epoch="12" name="dhclient" release="83.sl7_9.1" src="dhcp-4.2.5-83.sl7_9.1.src.rpm" version="4.2.5"><filename>dhclient-4.2.5-83.sl7_9.1.x86_64.rpm</filename><sum type="sha256">8949ed6e47882dea0ea828752573794a630e70d8760ea7cb03323ceaac492d0e</sum></package><package arch="x86_64" epoch="12" name="dhcp-common" release="83.sl7_9.1" src="dhcp-4.2.5-83.sl7_9.1.src.rpm" version="4.2.5"><filename>dhcp-common-4.2.5-83.sl7_9.1.x86_64.rpm</filename><sum type="sha256">3d5dd700d355b3bdeb1501218cce589e0577778e0760e1814a4072a2cae8729f</sum></package><package arch="i686" epoch="12" name="dhcp-libs" release="83.sl7_9.1" src="dhcp-4.2.5-83.sl7_9.1.src.rpm" version="4.2.5"><filename>dhcp-libs-4.2.5-83.sl7_9.1.i686.rpm</filename><sum type="sha256">6aa8ea106a32c5eb0beaf64acae8951f4a0a12c7501069e3503d8d9b069db3a9</sum></package><package arch="x86_64" epoch="12" name="dhcp-libs" release="83.sl7_9.1" src="dhcp-4.2.5-83.sl7_9.1.src.rpm" version="4.2.5"><filename>dhcp-libs-4.2.5-83.sl7_9.1.x86_64.rpm</filename><sum type="sha256">c76788b9c008cf2b5b9542e4cedb2c9cbb5acd81eeae9cbf259cf1687a3566ef</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25217" id="CVE-2021-25217" title="Cve-2021-25217" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2357" id="RHSA-2021:2357" title="Important: Dhcp Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2397-1</id><title>Postgresql</title><description>Security Fix(es): 
* postgresql: Buffer overrun from integer overflow in array subscripting calculations (CVE-2021-32027) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- 
SL7  x86_64   postgresql-9.2.24-7.el7_9.i686.rpm   postgresql-9.2.24-7.el7_9.x86_64.rpm   postgresql-contrib-9.2.24-7.el7_9.x86_64.rpm   postgresql-debuginfo-9.2.24-7.el7_9.i686.rpm   postgresql-debuginfo-9.2.24-7.el7_9.x86_64.rpm   postgresql-devel-9.2.24-7.el7_9.i686.rpm   postgresql-devel-9.2.24-7.el7_9.x86_64.rpm   postgresql-docs-9.2.24-7.el7_9.x86_64.rpm   postgresql-libs-9.2.24-7.el7_9.i686.rpm   postgresql-libs-9.2.24-7.el7_9.x86_64.rpm   postgresql-plperl-9.2.24-7.el7_9.x86_64.rpm   postgresql-plpython-9.2.24-7.el7_9.x86_64.rpm   postgresql-pltcl-9.2.24-7.el7_9.x86_64.rpm   postgresql-server-9.2.24-7.el7_9.x86_64.rpm   postgresql-static-9.2.24-7.el7_9.i686.rpm   postgresql-static-9.2.24-7.el7_9.x86_64.rpm   postgresql-test-9.2.24-7.el7_9.x86_64.rpm   postgresql-upgrade-9.2.24-7.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-06-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="postgresql-libs" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-libs-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">3bf162c4a94a11e0b6ed4a37bf05afd25f7f0281ea35f708b088abff5cfd1c50</sum></package><package arch="i686" name="postgresql-libs" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-libs-9.2.24-7.el7_9.i686.rpm</filename><sum type="sha256">d6ebaeddc43cc67b36b83283043b378120e53eb79abfc77187671ed411226640</sum></package><package arch="x86_64" name="postgresql-server" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-server-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">3f94ec32306530e799b50ff670aaf6809399d1135a67a516498250689e1c8624</sum></package><package arch="x86_64" name="postgresql" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">f938f0b97b430cbd251a0f036e4214199df561c5dfd2f478143e5edd5bc12283</sum></package><package arch="x86_64" name="postgresql-plperl" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-plperl-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">926162483eb35a1d39e1c0e2b56b7c196697ade56bd8fb38870cff629baa3231</sum></package><package arch="x86_64" name="postgresql-test" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-test-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">c28b40c3f00cf23e22de580966ecd38e277a70732a7625e9da129475c056d4aa</sum></package><package arch="i686" name="postgresql" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-9.2.24-7.el7_9.i686.rpm</filename><sum type="sha256">f5515ecf51a202879d66c91312b10c4214cc3995591a34391b472d601aa12775</sum></package><package arch="x86_64" name="postgresql-pltcl" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-pltcl-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">fe84b2c10cc2ffc47245014647c21768c6ff7dbc3d9f0d9ac9e255700474c202</sum></package><package arch="x86_64" name="postgresql-docs" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-docs-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">4dd6a639a699788e8a6812c960e672544e99bad708395f8a188704004044347e</sum></package><package arch="i686" name="postgresql-static" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-static-9.2.24-7.el7_9.i686.rpm</filename><sum type="sha256">7c9e5ef8fb7eff7cb672225f57ed5c8762f3958652a4498f947e119bcc35783e</sum></package><package arch="x86_64" name="postgresql-plpython" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-plpython-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">835629aec9a254e10435f3c461b887e2a7f76e5aa91750febadffba0b0da188b</sum></package><package arch="x86_64" name="postgresql-static" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-static-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">74afa4f5df7a224a93ccb22c9d8f8e7358c965e69dccae53925f169486c5faf9</sum></package><package arch="x86_64" name="postgresql-upgrade" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-upgrade-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">b9ecb9b5b59a17c92985c06291051d1834f718be392b5c58f3f2aa58a1437173</sum></package><package arch="x86_64" name="postgresql-devel" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-devel-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">78a04399dfdcc47c4302e4cf573ee64a388a3bb57a39d1ed3fd0647fbf0d6182</sum></package><package arch="x86_64" name="postgresql-contrib" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-contrib-9.2.24-7.el7_9.x86_64.rpm</filename><sum type="sha256">d2b36cd2421c1d0cbf6d7d31daf716c8c32478593f4b1d1106cdb15afd8637ce</sum></package><package arch="i686" name="postgresql-devel" release="7.el7_9" src="postgresql-9.2.24-7.el7_9.src.rpm" version="9.2.24"><filename>postgresql-devel-9.2.24-7.el7_9.i686.rpm</filename><sum type="sha256">dbec064f8fdc17ab8c066186122b31b0648554619f7191ed7705d43596786098</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32027" id="CVE-2021-32027" title="Postgresql: Buffer Overrun From Integer Overflow In Array Subscripting Calculations" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2397" id="RHSA-2021:2397-1" title="Rhsa-2021:2397-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1956876" id="1956876" title="Postgresql: Buffer Overrun From Integer Overflow In Array Subscripting Calculations" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2417-1</id><title>Gupnp</title><description>Security Fix(es): 
* gupnp: allows DNS rebinding which could result in tricking browser into triggering actions against local UPnP services (CVE-2021-33516) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64   gupnp-1.0.2-6.el7_9.i686.rpm   gupnp-1.0.2-6.el7_9.x86_64.rpm   gupnp-debuginfo-1.0.2-6.el7_9.i686.rpm   gupnp-debuginfo-1.0.2-6.el7_9.x86_64.rpm   gupnp-devel-1.0.2-6.el7_9.i686.rpm   gupnp-devel-1.0.2-6.el7_9.x86_64.rpm  noarch   gupnp-docs-1.0.2-6.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-06-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="gupnp-devel" release="6.el7_9" src="gupnp-1.0.2-6.el7_9.src.rpm" version="1.0.2"><filename>gupnp-devel-1.0.2-6.el7_9.i686.rpm</filename><sum type="sha256">7f37ce90a108e6ee1e8079e3721e199777ec5a118f40cf4052e8e8f14021dc4f</sum></package><package arch="i686" name="gupnp" release="6.el7_9" src="gupnp-1.0.2-6.el7_9.src.rpm" version="1.0.2"><filename>gupnp-1.0.2-6.el7_9.i686.rpm</filename><sum type="sha256">2b8140194eac42849f0413eb49061b72f2bb83a3997b578451c551e39570b21a</sum></package><package arch="x86_64" name="gupnp-devel" release="6.el7_9" src="gupnp-1.0.2-6.el7_9.src.rpm" version="1.0.2"><filename>gupnp-devel-1.0.2-6.el7_9.x86_64.rpm</filename><sum type="sha256">c5a7092395429e4b142cb998cc71b239d7ba6018b75fe99366f3431b97faeb61</sum></package><package arch="noarch" name="gupnp-docs" release="6.el7_9" src="gupnp-1.0.2-6.el7_9.src.rpm" version="1.0.2"><filename>gupnp-docs-1.0.2-6.el7_9.noarch.rpm</filename><sum type="sha256">3ad612ae1e816a0cffcfc500d66b0de0598f332d4159db09e9acaab30343318f</sum></package><package arch="x86_64" name="gupnp" release="6.el7_9" src="gupnp-1.0.2-6.el7_9.src.rpm" version="1.0.2"><filename>gupnp-1.0.2-6.el7_9.x86_64.rpm</filename><sum type="sha256">588c939f7fe4121ee36f425753647b2bee628fcb30a0b919cfd00b1196ecf1fa</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33516" id="CVE-2021-33516" title="Gupnp: Allows Dns Rebinding Which Could Result In Tricking Browser Into Triggering Actions Against Local Upnp Services" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2417" id="RHSA-2021:2417-1" title="Rhsa-2021:2417-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1964091" id="1964091" title="Gupnp: Allows Dns Rebinding Which Could Result In Tricking Browser Into Triggering Actions Against Local Upnp Services" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2658-1</id><title>Linuxptp</title><description>Security Fix(es): 
* linuxptp: missing length check of forwarded messages (CVE-2021-3570) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64   - linuxptp-2.0-2.el7_9.1.x86_64.rpm   - linuxptp-debuginfo-2.0-2.el7_9.1.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-07-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="linuxptp" release="2.el7_9.1" src="linuxptp-2.0-2.el7_9.1.src.rpm" version="2.0"><filename>linuxptp-2.0-2.el7_9.1.x86_64.rpm</filename><sum type="sha256">cd19472fe3908a41310e91a23e649c7c8aa1c93c58af619542a150c80a6286f8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3570" id="CVE-2021-3570" title="Linuxptp: Missing Length Check Of Forwarded Messages" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2658" id="RHSA-2021:2658-1" title="Rhsa-2021:2658-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1966240" id="1966240" title="Linuxptp: Missing Length Check Of Forwarded Messages" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2683-1</id><title>Xstream</title><description>Security Fix(es): 
* XStream: remote command execution attack by manipulating the processed input stream (CVE-2021-29505) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  noarch  - xstream-1.3.1-14.el7_9.noarch.rpm  - xstream-javadoc-1.3.1-14.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-07-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="xstream" release="14.el7_9" src="xstream-1.3.1-14.el7_9.src.rpm" version="1.3.1"><filename>xstream-1.3.1-14.el7_9.noarch.rpm</filename><sum type="sha256">4c0d1e279f58b3c5fc61212ae542c273a87ad83e762cf82d968befffc234abc7</sum></package><package arch="noarch" name="xstream-javadoc" release="14.el7_9" src="xstream-1.3.1-14.el7_9.src.rpm" version="1.3.1"><filename>xstream-javadoc-1.3.1-14.el7_9.noarch.rpm</filename><sum type="sha256">5df6f91d53d3443b4aab2e3cf697e3d6a0e734dae4e6adea1b7540c6425285bc</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29505" id="CVE-2021-29505" title="Xstream: Remote Command Execution Attack By Manipulating The Processed Input Stream" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2683" id="RHSA-2021:2683-1" title="Rhsa-2021:2683-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1966735" id="1966735" title="Xstream: Remote Command Execution Attack By Manipulating The Processed Input Stream" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2725-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: size_t-to-int conversion vulnerability in the filesystem layer (CVE-2021-33909) 
* kernel: use-after-free in net/bluetooth/hci_event.c when destroying an hci_chan (CVE-2021-33034) 
* kernel: use-after-free in show_numa_stats function (CVE-2019-20934) 
* kernel: mishandles invalid descriptors in drivers/media/usb/gspca/xirlink_cit.c (CVE-2020-11668) 
* kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c (CVE-2021-33033) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* [SL7.9.z] n_tty_open: "BUG: unable to handle kernel paging request" 
* [ESXi][SL7.8]"qp_alloc_hypercall result = -20" / "Could not attach to queue pair with -20" with vSphere Fault Tolerance enabled 
* [SL7.9][s390x][Regression] Sino Nomine swapgen IBM z/VM emulated DASD with DIAG driver returns EOPNOTSUPP 
* False-positive hard lockup detected while processing the thread state information (SysRq-T) 
* SL7.9 zstream - s390x LPAR with NVMe SSD will panic when it has 32 or more IFL (pci) 
* The NMI watchdog detected a hard lockup while printing RCU CPU stall warning messages to the serial console 
* nvme hangs when trying to allocate reserved tag 
* [REGRESSION] "call into AER handling regardless of severity" triggers do_recovery() unnecessarily on correctable PCIe errors 
* Module nvme_core: A double free  of the kmalloc-512 cache between nvme_trans_log_temperature() and nvme_get_log_page(). 
* sctp - SCTP_CMD_TIMER_START queues active timer kernel BUG at kernel/timer.c:1000! 
* [Hyper-V][SL-7]When CONFIG_NET_POLL_CONTROLLER is set, mainline commit 2a7f8c3b1d3fee is needed 
* Kernel panic at cgroup_is_descendant 
* [Hyper-V][SL-7]Commits To Fix Kdump Failures 
* IGMPv2 JOIN packets incorrectly routed to loopback 
* [CKI kernel builds]: x86 binaries in non-x86 kernel rpms breaks systemtap  [7.9.z] 
* mlx4: Fix memory allocation in mlx4_buddy_init needed 
* incorrect assertion on pi_state-&gt;pi_mutex.wait_lock from pi_state_update_owner() 
 
 --- SL7 
x86_64 bpftool-3.10.0-1160.36.2.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.36.2.el7.x86_64.rpm kernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm kernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm perf-3.10.0-1160.36.2.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-3.10.0-1160.36.2.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.36.2.el7.x86_64.rpm 
noarch kernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm kernel-doc-3.10.0-1160.36.2.el7.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-07-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools-libs" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">7d8ecb4acaea932f0c8952ee9af2eacba520a527bfe920b669c922ce4c52d3a9</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.36.2.el7.noarch.rpm</filename><sum type="sha256">d693cdb4cf9f6b10fc9e8ed2d32390fc1d4d1a1874ab6e847afd0829cb96000a</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">d6ae76ca47e20b280316d8ff71851d7c3a20fa3cee111d25aa2a0dd0eff7cbcc</sum></package><package arch="noarch" name="kernel-doc" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.36.2.el7.noarch.rpm</filename><sum type="sha256">f8e09350909d363258cabab3a793867b6f775381e1653a0be9386ad2bc9daac0</sum></package><package arch="x86_64" name="kernel-debug" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">2aa5e3f4679a1935ddbf5185667ca13e950c2a02f8967b58f681108ca2c06314</sum></package><package arch="x86_64" name="perf" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">fc1a425560686ecd1aeda5561dd9e31caed3feb6d9ac2290016c5f13eecaae62</sum></package><package arch="x86_64" name="kernel-tools" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">417ba353631eb370a626496cf0124bda27d15332b74275b31f4d2b0250fb1396</sum></package><package arch="x86_64" name="python-perf" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">04dd3ebe74791e117d40c57d072cfc09cb1769bcfd9e12019543fc850cb8d73b</sum></package><package arch="x86_64" name="kernel-headers" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">e553a94a8a993338ae132e222b1046da227d9601de7743906d1faea33856aede</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">b49834e7c0c65269e6ad42c1fc17aa1fdd56d4e7d76bc15bcb1f5d1efe761b4c</sum></package><package arch="x86_64" name="kernel" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">b63017d77d981063372bbc92dc6423e9387c01668ee7c70963ff3d886ee46b19</sum></package><package arch="x86_64" name="bpftool" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">991736f4f2fe98ff1f6740177e2ce530640dc5f9e8f866280f8db303594e1edd</sum></package><package arch="x86_64" name="kernel-devel" release="1160.36.2.el7" src="kernel-3.10.0-1160.36.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.36.2.el7.x86_64.rpm</filename><sum type="sha256">4fb494afeb8ebe56bdd8add70251c529ab5b5772f941d4cd6e79f9033df73acd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20934" id="CVE-2019-20934" title="Kernel: Use-After-Free In Show_Numa_Stats Function" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11668" id="CVE-2020-11668" title="Kernel: Mishandles Invalid Descriptors In Drivers/Media/Usb/Gspca/Xirlink_Cit.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33033" id="CVE-2021-33033" title="Kernel: Use-After-Free In Cipso_V4_Genopt In Net/Ipv4/Cipso_Ipv4.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33034" id="CVE-2021-33034" title="Kernel: Use-After-Free In Net/Bluetooth/Hci_Event.C When Destroying An Hci_Chan" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33909" id="CVE-2021-33909" title="Kernel: Size_T-To-Int Conversion Vulnerability In The Filesystem Layer" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2725" id="RHSA-2021:2725-1" title="Rhsa-2021:2725-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1824792" id="1824792" title="Kernel: Mishandles Invalid Descriptors In Drivers/Media/Usb/Gspca/Xirlink_Cit.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1902788" id="1902788" title="Kernel: Use-After-Free In Show_Numa_Stats Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1961300" id="1961300" title="Kernel: Use-After-Free In Cipso_V4_Genopt In Net/Ipv4/Cipso_Ipv4.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1961305" id="1961305" title="Kernel: Use-After-Free In Net/Bluetooth/Hci_Event.C When Destroying An Hci_Chan" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1970273" id="1970273" title="Kernel: Size_T-To-Int Conversion Vulnerability In The Filesystem Layer" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2741-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.12.0 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free in accessibility features of a document (CVE-2021-29970) 
* Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 (CVE-2021-29976) 
* chromium-browser: Out of bounds write in ANGLE (CVE-2021-30547) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64  - firefox-78.12.0-1.el7_9.x86_64.rpm  - firefox-debuginfo-78.12.0-1.el7_9.x86_64.rpm  - firefox-78.12.0-1.el7_9.i686.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-07-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.12.0-1.el7_9.src.rpm" version="78.12.0"><filename>firefox-78.12.0-1.el7_9.i686.rpm</filename><sum type="sha256">5072673f08d52e0ced6ac477f677481000537be1557c181c8d3483adee4f3c43</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.12.0-1.el7_9.src.rpm" version="78.12.0"><filename>firefox-78.12.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">6bd823c34deaa1a1e06b0c6665122b3dc08984c22bb398d0ebbec8407e00709d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29970" id="CVE-2021-29970" title="Mozilla: Use-After-Free In Accessibility Features Of A Document" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29976" id="CVE-2021-29976" title="Mozilla: Memory Safety Bugs Fixed In Firefox 90 And Firefox Esr 78.12" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30547" id="CVE-2021-30547" title="Chromium-Browser: Out Of Bounds Write In Angle" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2741" id="RHSA-2021:2741-1" title="Rhsa-2021:2741-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1970109" id="1970109" title="Chromium-Browser: Out Of Bounds Write In Angle" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982013" id="1982013" title="Mozilla: Use-After-Free In Accessibility Features Of A Document" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982014" id="1982014" title="Mozilla: Memory Safety Bugs Fixed In Firefox 90 And Firefox Esr 78.12" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2784-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Incorrect comparison during range check elimination (Hotspot, 8264066) (CVE-2021-2388) 
* OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) (CVE-2021-2341) 
* OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) (CVE-2021-2369) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- SL7 
x86_64 java-11-openjdk-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-debuginfo-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-debuginfo-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-demo-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-demo-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-devel-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-devel-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-headless-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-headless-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-javadoc-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-javadoc-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-jmods-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-jmods-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-src-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-src-11.0.12.0.7-0.el7_9.x86_64.rpm java-11-openjdk-static-libs-11.0.12.0.7-0.el7_9.i686.rpm java-11-openjdk-static-libs-11.0.12.0.7-0.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-07-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">2cfbae8b8d3476eb614c43a6af638d7bc64cdeeb8dfe3afa59727780cbfc3dbe</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-jmods-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">ad15ee4fde1e323fd53ad78545605a445f954b03c5f105e5b1277a3a7afde34b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-devel-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">25687ef939eaf8b30fa0c0abbf000d50a7de09a91672fd87c0acc078480323ea</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">d6f8f6df281e2bcb246d37938461a2d8541f5b9288a859dbab42031c82a6c13e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-jmods-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">40ed18b4d88296b926addc5f3488e95a532af2616b339fb470ab89efe9b33978</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-demo-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">d1c61bdfaf082840c4a026ce0ca27e5060094208f3c94057873b29510fefac34</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-headless-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">580feb4e2aee7dc454c0d87c538e9940ec312de05a735fba275f9a8c8073e486</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-javadoc-zip-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">150df06bfcf5cf74bd9f22ae934021ae13d6fcd08072d6384ee375cab8df06dd</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-javadoc-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">746780768d85f21edc8db369296a7d42784cf171564bf91a58a9abcbf2bd3524</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-demo-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">6184086c04b7d5ae668b69ea271b49b1ff9356adc659f3eadbce14734e4a87b6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-src-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">4d750ffee5def8f1e7d24404502ed102a8d97ebfa149fdd56cf181143601b41b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-devel-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">187524191dca7a5b7755f688d53c427c6adfd6f9ee6e62f30dd05a9c970286ba</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-static-libs-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">b6a9d24c04f3d17ad62478855251401aa36facff2e016c9422088886e7f1b9c2</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-headless-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">2526e65ef5fe50f6864eaeebbfcc62e9010ec568c8d08efb4a466522cdaab033</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">1dbca9adc5784430935d62f33177b1aa29a37c6e8c592daa40f3af23eca1fcba</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-src-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">2c55847b071127c9c423665e36666ad4b0cc399fa8e157ae742a593d32f26999</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-javadoc-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">397dc94ccadf1cc07ed6b9eec704486ee3e120916bf81bf6301f464245b85f13</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341" id="CVE-2021-2341" title="Openjdk: Ftp Pasv Command Response Can Cause Ftpclient To Connect To Arbitrary Host (Networking, 8258432)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369" id="CVE-2021-2369" title="Openjdk: Incorrect Verification Of Jar Files With Multiple Manifest.Mf Files (Library, 8260967)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388" id="CVE-2021-2388" title="Openjdk: Incorrect Comparison During Range Check Elimination (Hotspot, 8264066)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2784" id="RHSA-2021:2784-1" title="Rhsa-2021:2784-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982874" id="1982874" title="Openjdk: Ftp Pasv Command Response Can Cause Ftpclient To Connect To Arbitrary Host (Networking, 8258432)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982879" id="1982879" title="Openjdk: Incorrect Verification Of Jar Files With Multiple Manifest.Mf Files (Library, 8260967)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1983075" id="1983075" title="Openjdk: Incorrect Comparison During Range Check Elimination (Hotspot, 8264066)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2845</id><title>Important: Java-1.8.0-Openjdk Security And Bug Fix Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: Incorrect comparison during range check elimination (Hotspot, 8264066) (CVE-2021-2388) * OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) (CVE-2021-2341) * OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) (CVE-2021-2369)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* JDK-8266279: 8u292 NoSuchAlgorithmException unrecognized algorithm name: PBEWithSHA1AndDESede (BZ#1960024)
</description><severity>important</severity><issued date="2021-07-26 16:08:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">503e87717a057cf98c785b42ef1384df5b43e070f134568c9763153dfdab5d51</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">259e7edd8a077d3d9ce857d1824f5b35ec233b0e3612791cdd16f353ff338365</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.302.b08-0.el7_9.noarch.rpm</filename><sum type="sha256">9fb2415f774c0bf1bf64e3ca720709260ba99b60591718237bcfbcf330134281</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-jmods-debug-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">b644e8d999f05d3ed440a9c478aade5487b180429bcfccda9c3d52d58b7c65ea</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-devel-debug-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">6941da52a5e6aeb5a9ca86d8e02521978761a2c026daea27977be3f54b37b769</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">541dfc3f577bd50b00f3f67b7a7ecadfaeabbef5d8016103c289ef48f2dd44c8</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-javadoc-zip-debug-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">a226ad0efd2ba486b68d189957ded0cfeda686213b2a9dc7cc8c484b476fdb26</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.302.b08-0.el7_9.noarch.rpm</filename><sum type="sha256">4deef6abdb8819c181e3e10bd2bc1435ce2d3ca77b1e543189d7780b4d42cffa</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-jmods-debug-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">2a668ff27d9a45507afe1c7daa7c2115814b968bcf1d54de45261aa379fa2476</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">b66530714e9689b2d24e88327a6116eece12fdfbb14e0a237e28595634cc2643</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-debug-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">5545de2e2433d0b52c06f627eef8279a858657c96b833013c9c704cbbfd42034</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">e9bca973fbcf25a83c3a27cef032e16a667633b886f58940d0129888264db818</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">a5dd961b429af5889ef9d24cc0c2ca22f97a260e4e2d06d09fec06babd6ddd6e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-debug-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">0c1e27807db8a30ef27d4000333703e9e134efc0ccd79de0845cf4fdc5db3307</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-src-debug-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">d1251ab40d2373fde3711c8dc81bd3fca599f1bffa6888ec1ab546723259bff1</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-src-debug-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">572292710adf20d1d3e3f646d3e469df5e23a2707f6969b99cad7eadba74ae0c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-demo-debug-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">82b8c2cf3276139d9c1e7009866560a1d932d1582c115b8c6ba832eb3a434f0d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-headless-debug-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">313bc9f9712f72a4998b928f92c3061c467de050947f6bb6d354070e7159a3a4</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-javadoc-debug-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">2fb087a780d001dd55ac9e2193645a69bd55386d1fc74fc3ae9e8d28919f3005</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">f2f4bf7e53f3bfefdc14a881813f261aae9ecd7b7e65e40ae410beb7ea6e6f40</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-javadoc-zip-debug-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">1d2354f323d57fe9229b7afa9293317af44c9ba4e5b5b289591ba50eb7e962a7</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">d6ae82ec8de7558797b089df7750c7d8043ff0fd895722fadce95d404a16e422</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-static-libs-debug-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">2b750a81c4d4f4daeb1ba6aa6a7deccd4325451b3d5736ad9ad981d8bdf54f7e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-demo-debug-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">a87d815fcd33fd6689134ad748c41768af50ed81f886369c84fb7a8ca248a8e8</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-devel-debug-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">95512f993250891c7b8d2bd6a28bce89ef846eac9aab79b6b9548aaeef057d63</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-headless-debug-11.0.12.0.7-0.el7_9.i686.rpm</filename><sum type="sha256">b84bed334da15fc88b6068df346078fe950ec81cf592cee0939e8d4edf4dd106</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="0.el7_9" src="java-11-openjdk-11.0.12.0.7-0.el7_9.src.rpm" version="11.0.12.0.7"><filename>java-11-openjdk-javadoc-debug-11.0.12.0.7-0.el7_9.x86_64.rpm</filename><sum type="sha256">e107bf56f04db02fae2ca8d6c7291540e124e4584ac0b79ece4e20ca22d47139</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">0c476704f8568af73f4fd8241fd3cf6717eb3984305f8da7e27cc0c9e813e1ba</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">c71f143b109dbc85c5c4a2574e09c4cde1039b780420e71eae2ccaceaa7c0764</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">45ab1bf63c939aae68e150fd5c785298bacd2f38655484d1377f65ce487cfa61</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">7f2476266ea1139f00956d3018d57d890711b16f79f7d1522d804bbb1bde309b</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341" id="CVE-2021-2341" title="Cve-2021-2341" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369" id="CVE-2021-2369" title="Cve-2021-2369" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388" id="CVE-2021-2388" title="Cve-2021-2388" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2845" id="RHSA-2021:2845" title="Important: Java-1.8.0-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1960024" id="1960024" title="1960024 &#8211; Jdk-8266279: 8U292 Nosuchalgorithmexception Unrecognized Algorithm Name: Pbewithsha1Anddesede" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2845-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Incorrect comparison during range check elimination (Hotspot, 8264066) (CVE-2021-2388) 
* OpenJDK: FTP PASV command response can cause FtpClient to connect to arbitrary host (Networking, 8258432) (CVE-2021-2341) 
* OpenJDK: Incorrect verification of JAR files with multiple MANIFEST.MF files (Library, 8260967) (CVE-2021-2369) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* JDK-8266279: 8u292 NoSuchAlgorithmException unrecognized algorithm name: PBEWithSHA1AndDESede 
--- SL7 
x86_64 java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-debuginfo-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-debuginfo-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9.x86_64.rpm java-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9.i686.rpm java-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9.x86_64.rpm 
noarch java-1.8.0-openjdk-javadoc-1.8.0.302.b08-0.el7_9.noarch.rpm java-1.8.0-openjdk-javadoc-zip-1.8.0.302.b08-0.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-07-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">7f3321a3d27853c3087f2e2bca65e30dcaabcbba6169ac009e11cecbda85b476</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">39f9af7346d534f2002887db9f4ff695de79b3ad2499d212e2a0e45eb9fb92bc</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">4cf1b2f740d587ce33a1a07625b21d3eb96a97cb3f66c14776a435fa3af479e5</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-javadoc-1.8.0.302.b08-0.el7_9.noarch.rpm</filename><sum type="sha256">28f81e124f6d9bb59da40a64297d73b483a577f19c24f1eeba78d08ca6e03146</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.302.b08-0.el7_9.noarch.rpm</filename><sum type="sha256">9c576e635bfce44eda493bd2d4537d0285dcf6e5ad65ec6921bdb827b568cd56</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">06df563cb9a22f4fb86978044e3ccd7fc77e0045f8d0b6bde77bf762d86ab6ee</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">fe7868ec6c87bbfa14b5dbcb2c0c2f62890dfe9bf9908960fdaad79c3309bc90</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-src-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">c421080fae04fe01329bad7393633aecec64a7007bca4156f48610dba07dde8f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">3964f8ce990919fe3aad915412fa4e49987fffd234eefc1564a40b1aace539b8</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">ed38b6dd0cdd0699af0fd65385edc050199398f3907f853a84a7b243aa4d7f52</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">72e7ced455969605907a30370a3ead4e2d3a45236aa28550ceff34ccabda5eac</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.302.b08-0.el7_9.i686.rpm</filename><sum type="sha256">e115f53dc308a75e1993d8ac0442465084d4f7798612b77bc490d389a5f53e61</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">5e8345b76c0310784eba308e4f94cfb60c33984b23bd62bde384e85997279035</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="0.el7_9" src="java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.src.rpm" version="1.8.0.302.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.302.b08-0.el7_9.x86_64.rpm</filename><sum type="sha256">b519d21b168768ab0745f0f53f5288f58bbb7f070944c8e7dce3d5a0be6bd5e4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2341" id="CVE-2021-2341" title="Openjdk: Ftp Pasv Command Response Can Cause Ftpclient To Connect To Arbitrary Host (Networking, 8258432)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2369" id="CVE-2021-2369" title="Openjdk: Incorrect Verification Of Jar Files With Multiple Manifest.Mf Files (Library, 8260967)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-2388" id="CVE-2021-2388" title="Openjdk: Incorrect Comparison During Range Check Elimination (Hotspot, 8264066)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2845" id="RHSA-2021:2845-1" title="Rhsa-2021:2845-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1960024" id="1960024" title="Jdk-8266279: 8U292 Nosuchalgorithmexception Unrecognized Algorithm Name: Pbewithsha1Anddesede" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982874" id="1982874" title="Openjdk: Ftp Pasv Command Response Can Cause Ftpclient To Connect To Arbitrary Host (Networking, 8258432)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982879" id="1982879" title="Openjdk: Incorrect Verification Of Jar Files With Multiple Manifest.Mf Files (Library, 8260967)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1983075" id="1983075" title="Openjdk: Incorrect Comparison During Range Check Elimination (Hotspot, 8264066)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2881-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.12.0. 
Security Fix(es): 
* Mozilla: IMAP server responses sent by a MITM prior to STARTTLS could be processed (CVE-2021-29969) 
* Mozilla: Use-after-free in accessibility features of a document (CVE-2021-29970) 
* Mozilla: Memory safety bugs fixed in Firefox 90 and Firefox ESR 78.12 (CVE-2021-29976) 
* chromium-browser: Out of bounds write in ANGLE (CVE-2021-30547) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64  - thunderbird-78.12.0-2.el7_9.x86_64.rpm  - thunderbird-debuginfo-78.12.0-2.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-07-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-78.12.0-2.el7_9.src.rpm" version="78.12.0"><filename>thunderbird-78.12.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">91806481c6fc65fcd2f5ae3c3fff8150b7982eb1f02226c2f8681d50cb369576</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29969" id="CVE-2021-29969" title="Mozilla: Imap Server Responses Sent By A Mitm Prior To Starttls Could Be Processed" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29970" id="CVE-2021-29970" title="Mozilla: Use-After-Free In Accessibility Features Of A Document" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29976" id="CVE-2021-29976" title="Mozilla: Memory Safety Bugs Fixed In Firefox 90 And Firefox Esr 78.12" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30547" id="CVE-2021-30547" title="Chromium-Browser: Out Of Bounds Write In Angle" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2881" id="RHSA-2021:2881-1" title="Rhsa-2021:2881-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1970109" id="1970109" title="Chromium-Browser: Out Of Bounds Write In Angle" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982013" id="1982013" title="Mozilla: Use-After-Free In Accessibility Features Of A Document" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982014" id="1982014" title="Mozilla: Memory Safety Bugs Fixed In Firefox 90 And Firefox Esr 78.12" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982015" id="1982015" title="Mozilla: Imap Server Responses Sent By A Mitm Prior To Starttls Could Be Processed" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:2989-1</id><title>Lasso</title><description>Security Fix(es): 
* lasso: XML signature wrapping vulnerability when parsing SAML responses (CVE-2021-28091) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 
--- SL7  x86_64  - lasso-2.5.1-8.el7_9.i686.rpm  - lasso-2.5.1-8.el7_9.x86_64.rpm  - lasso-debuginfo-2.5.1-8.el7_9.i686.rpm  - lasso-debuginfo-2.5.1-8.el7_9.x86_64.rpm  - lasso-devel-2.5.1-8.el7_9.i686.rpm  - lasso-devel-2.5.1-8.el7_9.x86_64.rpm  - lasso-python-2.5.1-8.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="lasso" release="8.el7_9" src="lasso-2.5.1-8.el7_9.src.rpm" version="2.5.1"><filename>lasso-2.5.1-8.el7_9.i686.rpm</filename><sum type="sha256">98e13a86c7880b2fbe273dfbf02fe9588b53ea0a7308376a53cd6989eda2f856</sum></package><package arch="x86_64" name="lasso" release="8.el7_9" src="lasso-2.5.1-8.el7_9.src.rpm" version="2.5.1"><filename>lasso-2.5.1-8.el7_9.x86_64.rpm</filename><sum type="sha256">cf2896c9af6e17896a050bac5d3866525ed0e43c7f50fd394c1d969edab0acc0</sum></package><package arch="x86_64" name="lasso-devel" release="8.el7_9" src="lasso-2.5.1-8.el7_9.src.rpm" version="2.5.1"><filename>lasso-devel-2.5.1-8.el7_9.x86_64.rpm</filename><sum type="sha256">682530e22a43541c96014fca60914ed9c36f229b28084a66b91e2cc6875ffc50</sum></package><package arch="x86_64" name="lasso-python" release="8.el7_9" src="lasso-2.5.1-8.el7_9.src.rpm" version="2.5.1"><filename>lasso-python-2.5.1-8.el7_9.x86_64.rpm</filename><sum type="sha256">bfefa00287b78344a058232d34d74688113e0715f55b2f550cd5b7989d83c7da</sum></package><package arch="i686" name="lasso-devel" release="8.el7_9" src="lasso-2.5.1-8.el7_9.src.rpm" version="2.5.1"><filename>lasso-devel-2.5.1-8.el7_9.i686.rpm</filename><sum type="sha256">619d5eda91dfad8c51da2b01d131aa662754e2d057ba75501cec5e9e572d32fd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-28091" id="CVE-2021-28091" title="Lasso: Xml Signature Wrapping Vulnerability When Parsing Saml Responses" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:2989" id="RHSA-2021:2989-1" title="Rhsa-2021:2989-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1940089" id="1940089" title="Lasso: Xml Signature Wrapping Vulnerability When Parsing Saml Responses" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3028-1</id><title>Microcode_Ctl</title><description>Security Fix(es): 
* hw: Special Register Buffer Data Sampling (SRBDS) (CVE-2020-0543) 
* hw: Vector Register Data Sampling (CVE-2020-0548) 
* hw: L1D Cache Eviction Sampling (CVE-2020-0549) 
* hw: vt-d related privilege escalation (CVE-2020-24489) 
* hw: improper isolation of shared resources in some Intel Processors (CVE-2020-24511) 
* hw: observable timing discrepancy in some Intel Processors (CVE-2020-24512) 
* hw: Information disclosure issue in Intel SGX via RAPL interface (CVE-2020-8695) 
* hw: Vector Register Leakage-Active (CVE-2020-8696) 
* hw: Fast forward store predictor (CVE-2020-8698) 
--- SL7  x86_64  - microcode_ctl-2.1-73.11.el7_9.x86_64.rpm  - microcode_ctl-debuginfo-2.1-73.11.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="2" name="microcode_ctl" release="73.11.el7_9" src="microcode_ctl-2.1-73.11.el7_9.src.rpm" version="2.1"><filename>microcode_ctl-2.1-73.11.el7_9.x86_64.rpm</filename><sum type="sha256">88a9b7faaa2f8bcfa45c883d79da8855fedf161b102a41ba91c8e7a8cda723db</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0543" id="CVE-2020-0543" title="Cve-2020-0543" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0548" id="CVE-2020-0548" title="Cve-2020-0548" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0549" id="CVE-2020-0549" title="Cve-2020-0549" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24489" id="CVE-2020-24489" title="Hw: Vt-D Related Privilege Escalation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24511" id="CVE-2020-24511" title="Hw: Improper Isolation Of Shared Resources In Some Intel Processors" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24512" id="CVE-2020-24512" title="Hw: Observable Timing Discrepancy In Some Intel Processors" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8695" id="CVE-2020-8695" title="Hw: Information Disclosure Issue In Intel Sgx Via Rapl Interface" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8696" id="CVE-2020-8696" title="Hw: Vector Register Leakage-Active" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8698" id="CVE-2020-8698" title="Hw: Fast Forward Store Predictor" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3028" id="RHSA-2021:3028-1" title="Rhsa-2021:3028-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788786" id="1788786" title="Cve-2020-0548 Hw: Vector Register Data Sampling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1788788" id="1788788" title="Cve-2020-0549 Hw: L1D Cache Eviction Sampling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1827165" id="1827165" title="Cve-2020-0543 Hw: Special Register Buffer Data Sampling (Srbds)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1828583" id="1828583" title="Hw: Information Disclosure Issue In Intel Sgx Via Rapl Interface" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1890355" id="1890355" title="Hw: Vector Register Leakage-Active" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1890356" id="1890356" title="Hw: Fast Forward Store Predictor" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1897684" id="1897684" title="[Rhel-7.9.Z] Re-Enable 06-5E-03 (Skl-H/S, Cpuid 0X506E3) Latest Microcode Updates" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1962650" id="1962650" title="Hw: Vt-D Related Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1962702" id="1962702" title="Hw: Improper Isolation Of Shared Resources In Some Intel Processors" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1962722" id="1962722" title="Hw: Observable Timing Discrepancy In Some Intel Processors" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3154-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.13.0 ESR. 
Security Fix(es): 
* Mozilla: Uninitialized memory in a canvas object could have led to memory  corruption (CVE-2021-29980) 
* Mozilla: Incorrect instruction reordering during JIT optimization (CVE-2021-29984) 
* Mozilla: Race condition when resolving DNS names could have led to memory  corruption (CVE-2021-29986) 
* Mozilla: Memory corruption as a result of incorrect style treatment (CVE-2021-29988) 
* Mozilla: Memory safety bugs fixed in Thunderbird 78.13 (CVE-2021-29989) 
* Mozilla: Use-after-free media channels (CVE-2021-29985) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="2.el7_9" src="firefox-78.13.0-2.el7_9.src.rpm" version="78.13.0"><filename>firefox-78.13.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">bc41b16a9bca16b2a8ce95bcdc37b7988f20720b9cd4f7c0f2e74ed0bd1803d2</sum></package><package arch="i686" name="firefox" release="2.el7_9" src="firefox-78.13.0-2.el7_9.src.rpm" version="78.13.0"><filename>firefox-78.13.0-2.el7_9.i686.rpm</filename><sum type="sha256">d8449a4c77bed4b52ed6429f3ec3079091b241740fd34a67fbf54e789db5c80a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29980" id="CVE-2021-29980" title="Mozilla: Uninitialized Memory In A Canvas Object Could Have Led To Memory Corruption" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29984" id="CVE-2021-29984" title="Mozilla: Incorrect Instruction Reordering During Jit Optimization" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29985" id="CVE-2021-29985" title="Mozilla: Use-After-Free Media Channels" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29986" id="CVE-2021-29986" title="Mozilla: Race Condition When Resolving Dns Names Could Have Led To Memory Corruption" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29988" id="CVE-2021-29988" title="Mozilla: Memory Corruption As A Result Of Incorrect Style Treatment" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29989" id="CVE-2021-29989" title="Mozilla: Memory Safety Bugs Fixed In Thunderbird 78.13" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3154" id="RHSA-2021:3154-1" title="Rhsa-2021:3154-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992417" id="1992417" title="Mozilla: Race Condition When Resolving Dns Names Could Have Led To Memory Corruption" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992419" id="1992419" title="Mozilla: Memory Corruption As A Result Of Incorrect Style Treatment" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992420" id="1992420" title="Mozilla: Incorrect Instruction Reordering During Jit Optimization" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992421" id="1992421" title="Mozilla: Uninitialized Memory In A Canvas Object Could Have Led To Memory Corruption" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992422" id="1992422" title="Mozilla: Use-After-Free Media Channels" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992423" id="1992423" title="Mozilla: Memory Safety Bugs Fixed In Thunderbird 78.13" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3158-1</id><title>Exiv2</title><description>Security Fix(es): 
* exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp (CVE-2021-31291) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="exiv2-libs" release="4.el7_8" src="exiv2-0.27.0-4.el7_8.src.rpm" version="0.27.0"><filename>exiv2-libs-0.27.0-4.el7_8.i686.rpm</filename><sum type="sha256">6e1655bac655b79fcef547510c9571d75eed3867a13c3c1df24e9ebb7f488e88</sum></package><package arch="x86_64" name="exiv2-libs" release="4.el7_8" src="exiv2-0.27.0-4.el7_8.src.rpm" version="0.27.0"><filename>exiv2-libs-0.27.0-4.el7_8.x86_64.rpm</filename><sum type="sha256">c80106ec40162ef5482829b34e6a1f488a5896145e62988f50069d3a7a3ca99d</sum></package><package arch="i686" name="exiv2-devel" release="4.el7_8" src="exiv2-0.27.0-4.el7_8.src.rpm" version="0.27.0"><filename>exiv2-devel-0.27.0-4.el7_8.i686.rpm</filename><sum type="sha256">4c33360ef1a27e17ecb897829b29dcc92ede55fed680d7ecae084ecf15a751f5</sum></package><package arch="x86_64" name="exiv2" release="4.el7_8" src="exiv2-0.27.0-4.el7_8.src.rpm" version="0.27.0"><filename>exiv2-0.27.0-4.el7_8.x86_64.rpm</filename><sum type="sha256">2ad983d2240087ea19daa9c8345c687256c2dfbd767739c4dac6868e3a2800cf</sum></package><package arch="noarch" name="exiv2-doc" release="4.el7_8" src="exiv2-0.27.0-4.el7_8.src.rpm" version="0.27.0"><filename>exiv2-doc-0.27.0-4.el7_8.noarch.rpm</filename><sum type="sha256">72bbcd2f72146fc524ea043f551cadd8cc7a3b6757fada666865e346171d71a3</sum></package><package arch="x86_64" name="exiv2-devel" release="4.el7_8" src="exiv2-0.27.0-4.el7_8.src.rpm" version="0.27.0"><filename>exiv2-devel-0.27.0-4.el7_8.x86_64.rpm</filename><sum type="sha256">6a7ed5be881d54c881fdb41359fa7b90c508fef7321cf4f588e72503777795e6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31291" id="CVE-2021-31291" title="Exiv2: Heap-Based Buffer Overflow Vulnerability In Jp2Image.Cpp" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3158" id="RHSA-2021:3158-1" title="Rhsa-2021:3158-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1990327" id="1990327" title="Exiv2: Heap-Based Buffer Overflow Vulnerability In Jp2Image.Cpp" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3160-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.13.0. 
Security Fix(es): 
* Mozilla: Uninitialized memory in a canvas object could have led to memory  corruption (CVE-2021-29980) 
* Mozilla: Incorrect instruction reordering during JIT optimization (CVE-2021-29984) 
* Mozilla: Race condition when resolving DNS names could have led to memory  corruption (CVE-2021-29986) 
* Mozilla: Memory corruption as a result of incorrect style treatment (CVE-2021-29988) 
* Mozilla: Memory safety bugs fixed in Thunderbird 78.13 (CVE-2021-29989) 
* Mozilla: Use-after-free media channels (CVE-2021-29985) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.13.0-1.el7_9.src.rpm" version="78.13.0"><filename>thunderbird-78.13.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">a1c089fd6ce1fef0bef27a525a9745cc2d310cf48d4b9483805b199e86ed5eda</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29980" id="CVE-2021-29980" title="Mozilla: Uninitialized Memory In A Canvas Object Could Have Led To Memory Corruption" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29984" id="CVE-2021-29984" title="Mozilla: Incorrect Instruction Reordering During Jit Optimization" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29985" id="CVE-2021-29985" title="Mozilla: Use-After-Free Media Channels" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29986" id="CVE-2021-29986" title="Mozilla: Race Condition When Resolving Dns Names Could Have Led To Memory Corruption" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29988" id="CVE-2021-29988" title="Mozilla: Memory Corruption As A Result Of Incorrect Style Treatment" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29989" id="CVE-2021-29989" title="Mozilla: Memory Safety Bugs Fixed In Thunderbird 78.13" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3160" id="RHSA-2021:3160-1" title="Rhsa-2021:3160-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992417" id="1992417" title="Mozilla: Race Condition When Resolving Dns Names Could Have Led To Memory Corruption" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992419" id="1992419" title="Mozilla: Memory Corruption As A Result Of Incorrect Style Treatment" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992420" id="1992420" title="Mozilla: Incorrect Instruction Reordering During Jit Optimization" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992421" id="1992421" title="Mozilla: Uninitialized Memory In A Canvas Object Could Have Led To Memory Corruption" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992422" id="1992422" title="Mozilla: Use-After-Free Media Channels" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1992423" id="1992423" title="Mozilla: Memory Safety Bugs Fixed In Thunderbird 78.13" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3233-1</id><title>Compat-Exiv2-026</title><description>Security Fix(es): 
* exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp (CVE-2021-31291) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE7 
--- SL7  x86_64  - compat-exiv2-026-0.26-3.el7_9.i686.rpm  - compat-exiv2-026-0.26-3.el7_9.x86_64.rpm  - compat-exiv2-026-debuginfo-0.26-3.el7_9.i686.rpm  - compat-exiv2-026-debuginfo-0.26-3.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="compat-exiv2-026" release="3.el7_9" src="compat-exiv2-026-0.26-3.el7_9.src.rpm" version="0.26"><filename>compat-exiv2-026-0.26-3.el7_9.i686.rpm</filename><sum type="sha256">9a34a4f44f655124edba74a73224379e4b27c9deb32651cf533c6a61f5086f19</sum></package><package arch="x86_64" name="compat-exiv2-026" release="3.el7_9" src="compat-exiv2-026-0.26-3.el7_9.src.rpm" version="0.26"><filename>compat-exiv2-026-0.26-3.el7_9.x86_64.rpm</filename><sum type="sha256">0033a683cc63d68e7a84dec2d25b02285145f3fb9df32a933ba26d0b87176ee6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31291" id="CVE-2021-31291" title="Exiv2: Heap-Based Buffer Overflow Vulnerability In Jp2Image.Cpp" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3233" id="RHSA-2021:3233-1" title="Rhsa-2021:3233-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1990327" id="1990327" title="Exiv2: Heap-Based Buffer Overflow Vulnerability In Jp2Image.Cpp" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3234-1</id><title>Compat-Exiv2-023</title><description>Security Fix(es): 
* exiv2: Heap-based buffer overflow vulnerability in jp2image.cpp (CVE-2021-31291) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE7 
 --- SL7  x86_64  - compat-exiv2-023-0.23-2.el7_9.i686.rpm  - compat-exiv2-023-0.23-2.el7_9.x86_64.rpm  - compat-exiv2-023-debuginfo-0.23-2.el7_9.i686.rpm  - compat-exiv2-023-debuginfo-0.23-2.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="compat-exiv2-023" release="2.el7_9" src="compat-exiv2-023-0.23-2.el7_9.src.rpm" version="0.23"><filename>compat-exiv2-023-0.23-2.el7_9.i686.rpm</filename><sum type="sha256">234b3ac49dc1dedc349059d07f01a8eabf9899d69b359b6979ecd193a1ebc096</sum></package><package arch="x86_64" name="compat-exiv2-023" release="2.el7_9" src="compat-exiv2-023-0.23-2.el7_9.src.rpm" version="0.23"><filename>compat-exiv2-023-0.23-2.el7_9.x86_64.rpm</filename><sum type="sha256">e99bc81d83364f6f684739c64f04bf3cece758e5bea3d7a2e61ddb943dae32cb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31291" id="CVE-2021-31291" title="Exiv2: Heap-Based Buffer Overflow Vulnerability In Jp2Image.Cpp" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3234" id="RHSA-2021:3234-1" title="Rhsa-2021:3234-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1990327" id="1990327" title="Exiv2: Heap-Based Buffer Overflow Vulnerability In Jp2Image.Cpp" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3295-1</id><title>Libsndfile</title><description>Security Fix(es): 
* libsndfile: Heap buffer overflow via crafted WAV file allows arbitrary code execution (CVE-2021-3246) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7 
x86_64 libsndfile-1.0.25-12.el7_9.1.i686.rpm libsndfile-1.0.25-12.el7_9.1.x86_64.rpm libsndfile-debuginfo-1.0.25-12.el7_9.1.i686.rpm libsndfile-debuginfo-1.0.25-12.el7_9.1.x86_64.rpm libsndfile-devel-1.0.25-12.el7_9.1.i686.rpm libsndfile-devel-1.0.25-12.el7_9.1.x86_64.rpm libsndfile-utils-1.0.25-12.el7_9.1.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libsndfile-devel" release="12.el7_9.1" src="libsndfile-1.0.25-12.el7_9.1.src.rpm" version="1.0.25"><filename>libsndfile-devel-1.0.25-12.el7_9.1.i686.rpm</filename><sum type="sha256">b3910769e141cfeeab716a19e97939dd241377aaf55821ec9c642af011d0c59c</sum></package><package arch="i686" name="libsndfile" release="12.el7_9.1" src="libsndfile-1.0.25-12.el7_9.1.src.rpm" version="1.0.25"><filename>libsndfile-1.0.25-12.el7_9.1.i686.rpm</filename><sum type="sha256">5bab9fed88e6b7fc23592c9da41f699d431160f44e271d4f2fb1b1f2865ba15c</sum></package><package arch="x86_64" name="libsndfile" release="12.el7_9.1" src="libsndfile-1.0.25-12.el7_9.1.src.rpm" version="1.0.25"><filename>libsndfile-1.0.25-12.el7_9.1.x86_64.rpm</filename><sum type="sha256">ac61969886fb56f38f2e298136eeb397bee1a22271feeefdb8aed0fbe2a47fea</sum></package><package arch="x86_64" name="libsndfile-devel" release="12.el7_9.1" src="libsndfile-1.0.25-12.el7_9.1.src.rpm" version="1.0.25"><filename>libsndfile-devel-1.0.25-12.el7_9.1.x86_64.rpm</filename><sum type="sha256">e117477a7875c688069d8b033df530da34e18628510e18d2921cf3760f13ef08</sum></package><package arch="x86_64" name="libsndfile-utils" release="12.el7_9.1" src="libsndfile-1.0.25-12.el7_9.1.src.rpm" version="1.0.25"><filename>libsndfile-utils-1.0.25-12.el7_9.1.x86_64.rpm</filename><sum type="sha256">d15484d0294af5ee8e1392da70f43fa812df27b7c642d79aa0ce936fea1678de</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3246" id="CVE-2021-3246" title="Libsndfile: Heap Buffer Overflow Via Crafted Wav File Allows Arbitrary Code Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3295" id="RHSA-2021:3295-1" title="Rhsa-2021:3295-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1984319" id="1984319" title="Libsndfile: Heap Buffer Overflow Via Crafted Wav File Allows Arbitrary Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3296-1</id><title>Libx11</title><description>Security Fix(es): 
* libX11: missing request length checks (CVE-2021-31535) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- SL7 
x86_64 libX11-1.6.7-4.el7_9.i686.rpm libX11-1.6.7-4.el7_9.x86_64.rpm libX11-debuginfo-1.6.7-4.el7_9.i686.rpm libX11-debuginfo-1.6.7-4.el7_9.x86_64.rpm libX11-devel-1.6.7-4.el7_9.i686.rpm libX11-devel-1.6.7-4.el7_9.x86_64.rpm 
noarch libX11-common-1.6.7-4.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libX11-devel" release="4.el7_9" src="libX11-1.6.7-4.el7_9.src.rpm" version="1.6.7"><filename>libX11-devel-1.6.7-4.el7_9.i686.rpm</filename><sum type="sha256">4f1dc1fb871116b82794ae3b0432e5ac521ed6811611740cac68e62621e8665e</sum></package><package arch="x86_64" name="libX11" release="4.el7_9" src="libX11-1.6.7-4.el7_9.src.rpm" version="1.6.7"><filename>libX11-1.6.7-4.el7_9.x86_64.rpm</filename><sum type="sha256">805486b69ea140fa070aa6e28a15a8eb5519e592811c4325acd906d695829340</sum></package><package arch="noarch" name="libX11-common" release="4.el7_9" src="libX11-1.6.7-4.el7_9.src.rpm" version="1.6.7"><filename>libX11-common-1.6.7-4.el7_9.noarch.rpm</filename><sum type="sha256">ff2dbbb2c0c4168eb25f248e7952404ca464f7fbd7974343f2412003abeefd84</sum></package><package arch="i686" name="libX11" release="4.el7_9" src="libX11-1.6.7-4.el7_9.src.rpm" version="1.6.7"><filename>libX11-1.6.7-4.el7_9.i686.rpm</filename><sum type="sha256">6ff763fc3c4042a91cdf2b63763bc28f35cea891d46a78da3f6198bfeb148d9d</sum></package><package arch="x86_64" name="libX11-devel" release="4.el7_9" src="libX11-1.6.7-4.el7_9.src.rpm" version="1.6.7"><filename>libX11-devel-1.6.7-4.el7_9.x86_64.rpm</filename><sum type="sha256">6be63062aaaf4e8d6329b503577de87342b48cc2acfe3cd690e80f83f1c465e9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31535" id="CVE-2021-31535" title="Libx11: Missing Request Length Checks" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3296" id="RHSA-2021:3296-1" title="Rhsa-2021:3296-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1961822" id="1961822" title="Libx11: Missing Request Length Checks" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3325-1</id><title>Bind</title><description>Security Fix(es): 
* bind: Broken inbound incremental zone update (IXFR) can cause named to terminate unexpectedly (CVE-2021-25214) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- SL7 
x86_64 bind-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-chroot-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-debuginfo-9.11.4-26.P2.el7_9.7.i686.rpm bind-debuginfo-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-devel-9.11.4-26.P2.el7_9.7.i686.rpm bind-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-export-devel-9.11.4-26.P2.el7_9.7.i686.rpm bind-export-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-export-libs-9.11.4-26.P2.el7_9.7.i686.rpm bind-export-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-libs-9.11.4-26.P2.el7_9.7.i686.rpm bind-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-libs-lite-9.11.4-26.P2.el7_9.7.i686.rpm bind-libs-lite-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-lite-devel-9.11.4-26.P2.el7_9.7.i686.rpm bind-lite-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-pkcs11-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.i686.rpm bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.i686.rpm bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-pkcs11-utils-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-sdb-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-sdb-chroot-9.11.4-26.P2.el7_9.7.x86_64.rpm bind-utils-9.11.4-26.P2.el7_9.7.x86_64.rpm 
noarch bind-license-9.11.4-26.P2.el7_9.7.noarch.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-08-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">0f664c4582d87086632bceea130dad5c9230205974fc1fd51d574d14c36ab72d</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.7.i686.rpm</filename><sum type="sha256">1cd8a4c5be34e924728330c8921f4c162287c484621027417858c3183977b943</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">40e8e2e47fe864b27bdff476ba1dad290b8b84e1d5e837d5a301928cd4e9b22d</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">99baf1d0b90af916bf4caabeadbbe04b73fd490b2a3d0b0d12dba8142c111475</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">ad423e367926bac84af867f8282f16fc859526a6d503174c675ce8daeb36ff20</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">e5a515e291fab1fa300a30f05511e81411bf61fffd47380944fe4ef5f4693f55</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">0253dfb5a08f373842c240c84f0c1eb9171f2ab8e08eeb5126ed3e70a8871921</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">fa207b6f9321b18c5f525bbb91903bcefa94e530f6c5f17a191925f8cca21681</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.7.i686.rpm</filename><sum type="sha256">ffb34baf93dc78b8c3204a0dfc3e40e5309b130a02aca8e9884ad591b9fd2b61</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">a6bdf31288be4ca1ee0031c86acb9a40d3258e3d5ba84c431ce77712557534c3</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.7.i686.rpm</filename><sum type="sha256">b28cab1232e3b1c4c311f24af1f39361f4226651a3061082343f922b856a78b6</sum></package><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">2cf14f362fac3cec4e32deaa2a6ddbcb64700936117dae0cdbbb64f007552d0c</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.7.i686.rpm</filename><sum type="sha256">f22a802c9f3559615c63df34546aec823b984569735e37463de73ccbfbe9c868</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">e50f60168b6033107d65d1dc2047d457f4aaa792d2c8ca4435aff8fb3d7f2395</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">99f00d3261d884dc7d8d6ebc32efa082e4187ecddb4ccfcf9231f9ac35560b64</sum></package><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.7.noarch.rpm</filename><sum type="sha256">422f7a25a275aa9ef9fe2d98e9f90d28648c8e18d6fb337841fd12b2e16a4f44</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.7.i686.rpm</filename><sum type="sha256">fdee061bae052b6d4d5a92910f14a1633cec37d16509a941cff19cb6e1930ffd</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.7.i686.rpm</filename><sum type="sha256">034fe87eea2d8b5a2124400aae03a472c9a0d622fb25800e6fbbcd5259e30557</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">193531fe7702ea7dda0cb4ef0d7b32d6a503d4d2a96b684a9b4859207e7e66f7</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">229169f1dcd87871c084babd1b0c907de4221b2ec3e89d5083a01689da89a197</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">327434f2010bf6e5d1eff08dcaaaa092d11d21299aa111e62ff028d204436379</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.7.i686.rpm</filename><sum type="sha256">fc2533dea2c78321b310a83c63524e905b24276818acd9ae171bb5b96cc1efdd</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.7.i686.rpm</filename><sum type="sha256">69df49b5752140ef781df58fd756fbba32875b4988a055c654dab339bbf8cacf</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.7" src="bind-9.11.4-26.P2.el7_9.7.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.7.x86_64.rpm</filename><sum type="sha256">8176d6c537943acedcdfa817652ed8ce382144a789085c0227d8563c6836cb37</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25214" id="CVE-2021-25214" title="Bind: Broken Inbound Incremental Zone Update (Ixfr) Can Cause Named To Terminate Unexpectedly" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3325" id="RHSA-2021:3325-1" title="Rhsa-2021:3325-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1953849" id="1953849" title="Bind: Broken Inbound Incremental Zone Update (Ixfr) Can Cause Named To Terminate Unexpectedly" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3327-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: out-of-bounds write in xt_compat_target_from_user() in net/netfilter/x_tables.c (CVE-2021-22555) 
* kernel: race condition for removal of the HCI controller (CVE-2021-32399) 
* kernel: powerpc: RTAS calls can be used to compromise kernel integrity (CVE-2020-27777) 
* kernel: Local privilege escalation due to incorrect BPF JIT branch displacement computation (CVE-2021-29154) 
* kernel: lack a full memory barrier upon the assignment of a new table value in net/netfilter/x_tables.c and include/linux/netfilter/x_tables.h may lead to DoS (CVE-2021-29650) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* SAN Switch rebooted and caused (?) OpenStack compute node to reboot 
* sysfs: cannot create duplicate filename '/class/mdio_bus/ixgbe-8100 
* XFS: read-only recovery does not update free space accounting in superblock 
* The memcg_params field of kmem_cache struct contains an old slab address that is to small for the current size of memcg_limited_groups_array_size. 
* Backport of upstream patch "net: Update window_clamp if SOCK_RCVBUF is set " into rhel-7 
* Kernel panic in init_cq_frag_buf 
* futex: futex_requeue can potentially free the pi_state structure twice 
* be_poll lockup doing ifenslave when netconsole using bond 
* OCP4.7 nodes panic at BUG_ON in nf_nat_setup_info() 
 --- SL7 
x86_64 bpftool-3.10.0-1160.41.1.el7.x86_64.rpm bpftool-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm kernel-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debug-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debug-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debug-devel-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm kernel-debuginfo-common-x86_64-3.10.0-1160.41.1.el7.x86_64.rpm kernel-devel-3.10.0-1160.41.1.el7.x86_64.rpm kernel-headers-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-libs-3.10.0-1160.41.1.el7.x86_64.rpm kernel-tools-libs-devel-3.10.0-1160.41.1.el7.x86_64.rpm perf-3.10.0-1160.41.1.el7.x86_64.rpm perf-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm python-perf-3.10.0-1160.41.1.el7.x86_64.rpm python-perf-debuginfo-3.10.0-1160.41.1.el7.x86_64.rpm 
noarch kernel-abi-whitelists-3.10.0-1160.41.1.el7.noarch.rpm kernel-doc-3.10.0-1160.41.1.el7.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-debug" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">5bcfdad599b44925e1230949969a60903487c392b6e40aa5c2d725271d6f82d3</sum></package><package arch="noarch" name="kernel-doc" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.41.1.el7.noarch.rpm</filename><sum type="sha256">c5910ab8910fff70be6016751415352f55198ccdc8e11735da61c6775f76b8ea</sum></package><package arch="x86_64" name="perf" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">53538846f19e0fecbbfc76ea664e44b0a60c548785d2d331086baf4ef3b998c9</sum></package><package arch="x86_64" name="bpftool" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">5115b684a64e594c10a8202c5e951f143eac59a7f75382e2d65c9104202df150</sum></package><package arch="x86_64" name="kernel-devel" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">f16c223fe64df7ea47ff1eed29a0833e150e50412c49e240397c13d1df363847</sum></package><package arch="x86_64" name="python-perf" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">d1df2230944d9712346af10fc36e683be7ed322084d36ca609f13f7c15bc4450</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">5a2b5d848316fbd08d1315a721b6875c2c9d367307e5b52ed148f2dfdb396b8a</sum></package><package arch="x86_64" name="kernel" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">324b80fdf429db9c8c98848d4d3c5e453165c7fa6e8860df88383454c6f60123</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">5a2fc8257aecdaf5d27f57952b69b2b1cd42f8472842e3647c5a3ac9e0ca1e6b</sum></package><package arch="x86_64" name="kernel-headers" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">7929926bcb7e8857a134ae7c4e173c7ff2387cad23370fecf0118c7351b545aa</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">5c891a7b590d142e84b1a975f57cc6192bc5e4f116fb485c5b7d1d367822a486</sum></package><package arch="x86_64" name="kernel-tools" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.41.1.el7.x86_64.rpm</filename><sum type="sha256">d250b4cdfb1d8ea7986d3dee2694eb112445103c3fd9f7e633ed1565034b8190</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.41.1.el7" src="kernel-3.10.0-1160.41.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.41.1.el7.noarch.rpm</filename><sum type="sha256">8d9bf7379a529f839def865bd2276337a3154d516043688b9669a388309e171d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27777" id="CVE-2020-27777" title="Kernel: Powerpc: Rtas Calls Can Be Used To Compromise Kernel Integrity" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22555" id="CVE-2021-22555" title="Kernel: Out-Of-Bounds Write In Xt_Compat_Target_From_User() In Net/Netfilter/X_Tables.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29154" id="CVE-2021-29154" title="Kernel: Local Privilege Escalation Due To Incorrect Bpf Jit Branch Displacement Computation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29650" id="CVE-2021-29650" title="Kernel: Lack A Full Memory Barrier Upon The Assignment Of A New Table Value In Net/Netfilter/X_Tables.C And Include/Linux/Netfilter/X_Tables.H May Lead To Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32399" id="CVE-2021-32399" title="Kernel: Race Condition For Removal Of The Hci Controller" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3327" id="RHSA-2021:3327-1" title="Rhsa-2021:3327-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1897576" id="1897576" title="San Switch Rebooted And Caused (?) Openstack Compute Node To Reboot" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1900844" id="1900844" title="Kernel: Powerpc: Rtas Calls Can Be Used To Compromise Kernel Integrity" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1945388" id="1945388" title="Kernel: Lack A Full Memory Barrier Upon The Assignment Of A New Table Value In Net/Netfilter/X_Tables.C And Include/Linux/Netfilter/X_Tables.H May Lead To Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1946684" id="1946684" title="Kernel: Local Privilege Escalation Due To Incorrect Bpf Jit Branch Displacement Computation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1970807" id="1970807" title="Kernel: Race Condition For Removal Of The Hci Controller" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1980101" id="1980101" title="Kernel: Out-Of-Bounds Write In Xt_Compat_Target_From_User() In Net/Netfilter/X_Tables.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3336-1</id><title>Sssd</title><description>Security Fix(es): 
* sssd: shell command injection in sssctl (CVE-2021-3621) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Memory leak in the simple access provider 
* id lookup is failing intermittently 
* SSSD is NOT able to contact the Global Catalog when local site is down 
* Missing search index for `originalADgidNumber` 
 --- SL7 
x86_64 libipa_hbac-1.16.5-10.el7_9.10.i686.rpm libipa_hbac-1.16.5-10.el7_9.10.x86_64.rpm libipa_hbac-devel-1.16.5-10.el7_9.10.i686.rpm libipa_hbac-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_autofs-1.16.5-10.el7_9.10.x86_64.rpm libsss_certmap-1.16.5-10.el7_9.10.i686.rpm libsss_certmap-1.16.5-10.el7_9.10.x86_64.rpm libsss_certmap-devel-1.16.5-10.el7_9.10.i686.rpm libsss_certmap-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_idmap-1.16.5-10.el7_9.10.i686.rpm libsss_idmap-1.16.5-10.el7_9.10.x86_64.rpm libsss_idmap-devel-1.16.5-10.el7_9.10.i686.rpm libsss_idmap-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_nss_idmap-1.16.5-10.el7_9.10.i686.rpm libsss_nss_idmap-1.16.5-10.el7_9.10.x86_64.rpm libsss_nss_idmap-devel-1.16.5-10.el7_9.10.i686.rpm libsss_nss_idmap-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_simpleifp-1.16.5-10.el7_9.10.i686.rpm libsss_simpleifp-1.16.5-10.el7_9.10.x86_64.rpm libsss_simpleifp-devel-1.16.5-10.el7_9.10.i686.rpm libsss_simpleifp-devel-1.16.5-10.el7_9.10.x86_64.rpm libsss_sudo-1.16.5-10.el7_9.10.x86_64.rpm python-libipa_hbac-1.16.5-10.el7_9.10.x86_64.rpm python-libsss_nss_idmap-1.16.5-10.el7_9.10.x86_64.rpm python-sss-1.16.5-10.el7_9.10.x86_64.rpm python-sss-murmur-1.16.5-10.el7_9.10.x86_64.rpm sssd-1.16.5-10.el7_9.10.x86_64.rpm sssd-ad-1.16.5-10.el7_9.10.x86_64.rpm sssd-client-1.16.5-10.el7_9.10.i686.rpm sssd-client-1.16.5-10.el7_9.10.x86_64.rpm sssd-common-1.16.5-10.el7_9.10.x86_64.rpm sssd-common-pac-1.16.5-10.el7_9.10.x86_64.rpm sssd-dbus-1.16.5-10.el7_9.10.x86_64.rpm sssd-debuginfo-1.16.5-10.el7_9.10.i686.rpm sssd-debuginfo-1.16.5-10.el7_9.10.x86_64.rpm sssd-ipa-1.16.5-10.el7_9.10.x86_64.rpm sssd-kcm-1.16.5-10.el7_9.10.x86_64.rpm sssd-krb5-1.16.5-10.el7_9.10.x86_64.rpm sssd-krb5-common-1.16.5-10.el7_9.10.x86_64.rpm sssd-ldap-1.16.5-10.el7_9.10.x86_64.rpm sssd-libwbclient-1.16.5-10.el7_9.10.x86_64.rpm sssd-libwbclient-devel-1.16.5-10.el7_9.10.i686.rpm sssd-libwbclient-devel-1.16.5-10.el7_9.10.x86_64.rpm sssd-polkit-rules-1.16.5-10.el7_9.10.x86_64.rpm sssd-proxy-1.16.5-10.el7_9.10.x86_64.rpm sssd-tools-1.16.5-10.el7_9.10.x86_64.rpm sssd-winbind-idmap-1.16.5-10.el7_9.10.x86_64.rpm 
noarch python-sssdconfig-1.16.5-10.el7_9.10.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-08-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="sssd-dbus" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-dbus-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">ebb500e796d30ffc9ae912ac078355a34859ccf1d9c9943c71bc45092fd12807</sum></package><package arch="x86_64" name="python-libipa_hbac" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>python-libipa_hbac-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">3e2050e95d1f3ebbb8271671852b412420ea280154df550e557cc7f7dec227a3</sum></package><package arch="x86_64" name="sssd-ipa" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-ipa-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">76508a713e696581eb1ee4c0ba6d0d9592f2b556016c9355fbc7bf70996c394f</sum></package><package arch="x86_64" name="sssd-ldap" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-ldap-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">7fb5e25b4f03d4489ec688e682425380885ba49c76de9e762c8a81eae88fdfc9</sum></package><package arch="i686" name="libsss_simpleifp-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_simpleifp-devel-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">8cdffd4f636e874abb4110c23062d2ebce093fd02f87da5a87475c850d4604e6</sum></package><package arch="x86_64" name="sssd-kcm" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-kcm-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">7245184b18feab0c075c6ca5d1d5079d2717f7b12750783548737d42b150b642</sum></package><package arch="i686" name="libsss_simpleifp" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_simpleifp-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">af1a1ac20c407907416e0be39c90ad91aedf44f51b44d33e60c6702d68a06a40</sum></package><package arch="x86_64" name="libsss_simpleifp-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_simpleifp-devel-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">bfefb570ae1a9957ca8e43705108387e0a14e3f7f4611f67b813db9c11a701df</sum></package><package arch="noarch" name="python-sssdconfig" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>python-sssdconfig-1.16.5-10.el7_9.10.noarch.rpm</filename><sum type="sha256">6b4d7c87a9ff71f3b8d1d4067556d7662ab771ac880d3b53f221709398d60844</sum></package><package arch="x86_64" name="sssd-krb5-common" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-krb5-common-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">bd26b00fcbb063337b26d054ad72e0cf9cb0796bed0c3ed6e5ac1eb641cc5bde</sum></package><package arch="x86_64" name="python-sss-murmur" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>python-sss-murmur-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">8d3cf5f00e6b887d17584b95d1664335f1d493f4719111f66504e4f365b57cf2</sum></package><package arch="x86_64" name="libsss_autofs" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_autofs-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">34810b9bfaf523bc510c3fde66eacd512f7f44639585db09c2fb5259edf6fc03</sum></package><package arch="i686" name="libipa_hbac-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libipa_hbac-devel-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">48bf468fa6075da60c140bae64400741d3c858f72cb9842f6a58b6683a80e119</sum></package><package arch="x86_64" name="python-sss" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>python-sss-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">6f0917b948a1f3cdd4653cc8b5cf7286eca4114dad2fb958e4a8f9c434bf7f59</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-devel-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">ce516026800a8ce723d4cb667c391e353f61fbe2415518d1274210ea72ae79a5</sum></package><package arch="x86_64" name="sssd-libwbclient-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-libwbclient-devel-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">9047dbc282b156b53582dc43090e0f8afe87cf64f53ba5525dc26b285f138fd0</sum></package><package arch="x86_64" name="sssd-winbind-idmap" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-winbind-idmap-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">99a3b8b9bff033a5bcdffa7cc798b359778a9e72a882843e4ab56335045499a4</sum></package><package arch="x86_64" name="sssd-common" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-common-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">cc88d2d2ec3ba8cabfd75a9664233edde6b813716e2f9c0ef0c1e181a806473c</sum></package><package arch="x86_64" name="sssd-common-pac" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-common-pac-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">0f1d572f4ca4496b4a6f74c90afd87bf42b343ff9f79a250754fc95a4af48de8</sum></package><package arch="x86_64" name="sssd" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">15cd608affb1ee07c97297add43aafc5c12fa8cee1d6ad26a618e3d72aaa3291</sum></package><package arch="x86_64" name="libsss_nss_idmap-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-devel-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">21634c7c16563a1ca96bebeff099b00a9b6cb46712fa13da41aa91dec1bfeed4</sum></package><package arch="x86_64" name="libsss_certmap" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_certmap-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">4e025c3b36f5b6f679e88cc79168c081cb78f1f235f10f1e8d37aed8602a634b</sum></package><package arch="x86_64" name="sssd-krb5" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-krb5-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">36a63b1132197ae7bd592a61dfb846cff68e23dcda1cc4623d84200c94d038d8</sum></package><package arch="i686" name="libipa_hbac" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libipa_hbac-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">807c8cc510ed682e3823d46990f8e72acecb1417e972c3e30c168060d13e6e2f</sum></package><package arch="x86_64" name="libsss_certmap-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_certmap-devel-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">de583697d68e9965964e9b776b04b04e5497fb7337c9df6803840102a27239a5</sum></package><package arch="i686" name="libsss_certmap" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_certmap-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">c84815e08ae58422387429c8933f097cdc4e277f386afcc44bab10a18fb59082</sum></package><package arch="x86_64" name="sssd-polkit-rules" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-polkit-rules-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">15ecfd87feb56508a001d086c9cab4cb011fef0349b3644bfa20aa190c9e2c5b</sum></package><package arch="x86_64" name="sssd-libwbclient" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-libwbclient-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">b3fb83eb2abe7d757f8b314a4507a8f738c3d40f6de155254c6feabfe35f2000</sum></package><package arch="x86_64" name="sssd-proxy" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-proxy-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">6d788f7682ea53cead8d82d111cab5a27d60169689d666156f5d2ad7b2cec3eb</sum></package><package arch="x86_64" name="libsss_sudo" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_sudo-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">408a18a3a1ccb71703651ac59e843baaf3085340c36ce4a70cf45103bfb2d2cc</sum></package><package arch="i686" name="libsss_certmap-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_certmap-devel-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">379d8186fb9607a0a36cd209d7704770971bea0dd0ef16f3d8fefe992109f4f0</sum></package><package arch="x86_64" name="libipa_hbac" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libipa_hbac-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">73855f072f1a2432c650112e27ca2bd1ed03371c2a2910a23a3b84ba863319d4</sum></package><package arch="i686" name="libsss_nss_idmap" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">28817330e3e6957966737b5798daa8bfa63a3992552f571539cd15fd298ae433</sum></package><package arch="i686" name="libsss_idmap-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_idmap-devel-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">11fc647330d60e502d86007060e468d67cff2a79c650936210e1603a791a9220</sum></package><package arch="i686" name="sssd-client" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-client-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">379b3eabff1bebbd09397d8b0516cea1c38d05c4e689db04882a8c2019983271</sum></package><package arch="x86_64" name="libsss_simpleifp" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_simpleifp-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">11cfb2cd085d2dc80886ae324e199be7f5b15dbd244a8526505e875de391782e</sum></package><package arch="x86_64" name="sssd-tools" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-tools-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">75cf819b5199bbd7cce944ba7023e307dd27b5fb5e85a0be1a3739f3f5f50e1c</sum></package><package arch="x86_64" name="sssd-client" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-client-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">2d916950378d815c659a2d9c847a7ba230752158d2ea248f0c981e110d8d2d76</sum></package><package arch="x86_64" name="python-libsss_nss_idmap" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>python-libsss_nss_idmap-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">67e116b5fdfdf6518a66aeb1a31fed3d6ca6c5257244b27f5a3f830011ee0926</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libipa_hbac-devel-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">7e0638a0bcf9fe4ef12289b5ded49df445de1cacb9468952f6ab74433d2352ed</sum></package><package arch="i686" name="sssd-libwbclient-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-libwbclient-devel-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">0e19ac9b1062ea74de9da9ec9b9563254e29e618e6a5d9ef638827fafa967191</sum></package><package arch="x86_64" name="libsss_idmap" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_idmap-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">4877e9a2a3274b5db35d2999ef1827fb03c941516b9f055c936f0797e659815e</sum></package><package arch="x86_64" name="libsss_nss_idmap" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">525085aee2a090f378c368427732381827fcd95155c317fa4e41b730e19a8fa2</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_idmap-devel-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">9868ad8377d3a7ea59527e8386e69e201eea9b7d4433abe3dee365061863798a</sum></package><package arch="x86_64" name="sssd-ad" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>sssd-ad-1.16.5-10.el7_9.10.x86_64.rpm</filename><sum type="sha256">7c1858cf98f7e0c684e8561240fe8b02219b8105a2a6ce8eeca431a157560750</sum></package><package arch="i686" name="libsss_idmap" release="10.el7_9.10" src="sssd-1.16.5-10.el7_9.10.src.rpm" version="1.16.5"><filename>libsss_idmap-1.16.5-10.el7_9.10.i686.rpm</filename><sum type="sha256">2d7c9988bdb0402e3052117ceccea2bb0f3d6143c34bfacf4c2f4981bc8fe7a7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3621" id="CVE-2021-3621" title="Sssd: Shell Command Injection In Sssctl" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3336" id="RHSA-2021:3336-1" title="Rhsa-2021:3336-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1964415" id="1964415" title="Memory Leak In The Simple Access Provider" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1968330" id="1968330" title="Id Lookup Is Failing Intermittently" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1975142" id="1975142" title="Sssd: Shell Command Injection In Sssctl" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3338-1</id><title>Hivex</title><description>Security Fix(es): 
* hivex: stack overflow due to recursive call of _get_children() (CVE-2021-3622) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7 
x86_64 hivex-1.3.10-6.12.el7_9.i686.rpm hivex-1.3.10-6.12.el7_9.x86_64.rpm hivex-debuginfo-1.3.10-6.12.el7_9.i686.rpm hivex-debuginfo-1.3.10-6.12.el7_9.x86_64.rpm hivex-devel-1.3.10-6.12.el7_9.i686.rpm hivex-devel-1.3.10-6.12.el7_9.x86_64.rpm ocaml-hivex-1.3.10-6.12.el7_9.x86_64.rpm ocaml-hivex-devel-1.3.10-6.12.el7_9.x86_64.rpm perl-hivex-1.3.10-6.12.el7_9.x86_64.rpm python-hivex-1.3.10-6.12.el7_9.x86_64.rpm ruby-hivex-1.3.10-6.12.el7_9.x86_64.rpm</description><severity>low</severity><release>Scientific Linux</release><issued date="2021-08-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="hivex" release="6.12.el7_9" src="hivex-1.3.10-6.12.el7_9.src.rpm" version="1.3.10"><filename>hivex-1.3.10-6.12.el7_9.i686.rpm</filename><sum type="sha256">1caee1ae63b7e789e9e44bbb1cd42157e6cfc808a461b98227f6c107cbd09c5d</sum></package><package arch="x86_64" name="hivex-devel" release="6.12.el7_9" src="hivex-1.3.10-6.12.el7_9.src.rpm" version="1.3.10"><filename>hivex-devel-1.3.10-6.12.el7_9.x86_64.rpm</filename><sum type="sha256">d228ff112d6a9331cbb0ffb928122eb5756419ec3aaee85fdcebc10b6f0e37b6</sum></package><package arch="x86_64" name="ocaml-hivex" release="6.12.el7_9" src="hivex-1.3.10-6.12.el7_9.src.rpm" version="1.3.10"><filename>ocaml-hivex-1.3.10-6.12.el7_9.x86_64.rpm</filename><sum type="sha256">1f3ef43f71673df625ca2714b1cfd8fd96af7bba80cc8d8c01e9cd5b9d3812ff</sum></package><package arch="x86_64" name="hivex" release="6.12.el7_9" src="hivex-1.3.10-6.12.el7_9.src.rpm" version="1.3.10"><filename>hivex-1.3.10-6.12.el7_9.x86_64.rpm</filename><sum type="sha256">42dc380b24339b64af4aa373ec67103bba53f1684c3eeb4c31e852135521d66e</sum></package><package arch="x86_64" name="python-hivex" release="6.12.el7_9" src="hivex-1.3.10-6.12.el7_9.src.rpm" version="1.3.10"><filename>python-hivex-1.3.10-6.12.el7_9.x86_64.rpm</filename><sum type="sha256">e3904da15f8fc7f82cabcb789626a88699cda81f2a0fd02eaeb9c91139e252f2</sum></package><package arch="x86_64" name="ruby-hivex" release="6.12.el7_9" src="hivex-1.3.10-6.12.el7_9.src.rpm" version="1.3.10"><filename>ruby-hivex-1.3.10-6.12.el7_9.x86_64.rpm</filename><sum type="sha256">aa2def395f6c510a1eac7868e33809287cd65c0d17d32dcf5784ea47c183cb2f</sum></package><package arch="x86_64" name="perl-hivex" release="6.12.el7_9" src="hivex-1.3.10-6.12.el7_9.src.rpm" version="1.3.10"><filename>perl-hivex-1.3.10-6.12.el7_9.x86_64.rpm</filename><sum type="sha256">0f51f73587a33aaf290265edb03d75c08b04d3b84f55871129c44fc4334b7050</sum></package><package arch="x86_64" name="ocaml-hivex-devel" release="6.12.el7_9" src="hivex-1.3.10-6.12.el7_9.src.rpm" version="1.3.10"><filename>ocaml-hivex-devel-1.3.10-6.12.el7_9.x86_64.rpm</filename><sum type="sha256">8019f3839747ef54278da82fc0bebc35dd32e461cbb7990ba3c54cb489aca7ba</sum></package><package arch="i686" name="hivex-devel" release="6.12.el7_9" src="hivex-1.3.10-6.12.el7_9.src.rpm" version="1.3.10"><filename>hivex-devel-1.3.10-6.12.el7_9.i686.rpm</filename><sum type="sha256">a3ecd9709faa50747e5115d83097da32e8d473787ef46e0fba22a07cf083738e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3622" id="CVE-2021-3622" title="Hivex: Stack Overflow Due To Recursive Call Of _Get_Children()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3338" id="RHSA-2021:3338-1" title="Rhsa-2021:3338-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1975489" id="1975489" title="Hivex: Stack Overflow Due To Recursive Call Of _Get_Children()" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3438-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: use-after-free in route4_change() in net/sched/cls_route.c (CVE-2021-3715) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* [SL 7.8][s390x][DASD]Crash in __list_del_entry, alias_pav_group list corrupt when running dasd_alias_remove_device() 
* EMBARGOED CVE-2021-3715 kernel: use-after-free in route4_change() in net/sched/cls_route.c 
 --- SL7 
x86_64  - bpftool-3.10.0-1160.42.2.el7.x86_64.rpm  - bpftool-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-debug-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-debug-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-debug-devel-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-debuginfo-common-x86_64-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-devel-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-headers-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-tools-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-tools-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-tools-libs-3.10.0-1160.42.2.el7.x86_64.rpm  - kernel-tools-libs-devel-3.10.0-1160.42.2.el7.x86_64.rpm  - perf-3.10.0-1160.42.2.el7.x86_64.rpm  - perf-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm  - python-perf-3.10.0-1160.42.2.el7.x86_64.rpm  - python-perf-debuginfo-3.10.0-1160.42.2.el7.x86_64.rpm 
noarch  - kernel-abi-whitelists-3.10.0-1160.42.2.el7.noarch.rpm  - kernel-doc-3.10.0-1160.42.2.el7.noarch.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-09-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">d54bdec26ae4df8b37939e59e6849e140a44e6b10116ae474f0610f1d67dc5dd</sum></package><package arch="x86_64" name="kernel-tools" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">0536a7838973ea4c7f8a98cbe918932752f68ccff105c5cb9a831b8530780e51</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">3bb0a406631f9d6f4c62895475c8500d34c7662730877d1e58be135a065631e5</sum></package><package arch="noarch" name="kernel-doc" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.42.2.el7.noarch.rpm</filename><sum type="sha256">fc6715e90285c83bf4bfacdd56b2a1290ab2ff4295c6b9947354b817500be560</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">82e800cfca360f81cefd59ca89458c715f091daa55f2f525f17e299544d13f51</sum></package><package arch="x86_64" name="kernel-headers" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">dcc57a5759566c840f2804d055b6aca5173e5ab30c1dce27cc5f0a92354990fa</sum></package><package arch="x86_64" name="python-perf" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">5f67cbf8f2b09ea18a760128f1e73c0df3e407707aaed177cd25529997a944f9</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.42.2.el7.noarch.rpm</filename><sum type="sha256">33196a3bce35e239045eaeaa537781170a5753215a4570d261b39d6c98042849</sum></package><package arch="x86_64" name="kernel" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">84b30ca068c91fe02952ba36a0dce83ba0e41c0ff77ebdb0df95ee3f69feaeaa</sum></package><package arch="x86_64" name="kernel-devel" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">411ac1452d7827e069b871ef3a260b1d98506eb9baa22c65cac994e99760f2d8</sum></package><package arch="x86_64" name="perf" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">12bbbe03c2e6eed4a5c5bd5de4d10abe7f59c1733fcd30e1491b77a4d439cad6</sum></package><package arch="x86_64" name="bpftool" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">126127eaeb11dd1e67eff118aebcc7b9606b8d20589fc270ad1a3b7199128a83</sum></package><package arch="x86_64" name="kernel-debug" release="1160.42.2.el7" src="kernel-3.10.0-1160.42.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.42.2.el7.x86_64.rpm</filename><sum type="sha256">c867dab9d6e5db66d4d046ab28da10a58620cf9ea6df3d1afc75fe089e79f01d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3715" id="CVE-2021-3715" title="Kernel: Use-After-Free In Route4_Change() In Net/Sched/Cls_Route.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3438" id="RHSA-2021:3438-1" title="Rhsa-2021:3438-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1993988" id="1993988" title="Kernel: Use-After-Free In Route4_Change() In Net/Sched/Cls_Route.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3494-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 78.14.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 (CVE-2021-38493) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64  - thunderbird-78.14.0-1.el7_9.x86_64.rpm  - thunderbird-debuginfo-78.14.0-1.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-09-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-78.14.0-1.el7_9.src.rpm" version="78.14.0"><filename>thunderbird-78.14.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">850f8afd9d801282a58ba0918d138946e44798cae9b087bb575ed7673eab6106</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38493" id="CVE-2021-38493" title="Mozilla: Memory Safety Bugs Fixed In Firefox 92, Firefox Esr 78.14 And Firefox Esr 91.1" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3494" id="RHSA-2021:3494-1" title="Rhsa-2021:3494-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2002119" id="2002119" title="Mozilla: Memory Safety Bugs Fixed In Firefox 92, Firefox Esr 78.14 And Firefox Esr 91.1" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3498-1</id><title>Firefox</title><description>This update upgrades Firefox to version 78.14.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 92, Firefox ESR 78.14 and Firefox ESR 91.1 (CVE-2021-38493) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64  - firefox-78.14.0-1.el7_9.i686.rpm  - firefox-78.14.0-1.el7_9.x86_64.rpm  - firefox-debuginfo-78.14.0-1.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-09-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-78.14.0-1.el7_9.src.rpm" version="78.14.0"><filename>firefox-78.14.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">c35becc58f8d5211ced2d834c117fa17e93125a0fcab7b44d9f8e96dcbeac3d3</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-78.14.0-1.el7_9.src.rpm" version="78.14.0"><filename>firefox-78.14.0-1.el7_9.i686.rpm</filename><sum type="sha256">5f1d800c81d82afb56f6c64e087f9fec6caebbb16d6d095f223dbc44403b55bb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38493" id="CVE-2021-38493" title="Mozilla: Memory Safety Bugs Fixed In Firefox 92, Firefox Esr 78.14 And Firefox Esr 91.1" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3498" id="RHSA-2021:3498-1" title="Rhsa-2021:3498-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2002119" id="2002119" title="Mozilla: Memory Safety Bugs Fixed In Firefox 92, Firefox Esr 78.14 And Firefox Esr 91.1" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3791-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.2.0 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free in MessageTask (CVE-2021-38496) 
* Mozilla: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2 (CVE-2021-38500) 
* Mozilla: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2 (CVE-2021-38501) 
* rust-crossbeam-deque: race condition may lead to double free (CVE-2021-32810) 
* Mozilla: Validation message could have been overlaid on another origin (CVE-2021-38497) 
* Mozilla: Use-after-free of nsLanguageAtomService object (CVE-2021-38498) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- SL7  x86_64   firefox-91.2.0-4.el7_9.i686.rpm   firefox-91.2.0-4.el7_9.x86_64.rpm   firefox-debuginfo-91.2.0-4.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-10-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="4.el7_9" src="firefox-91.2.0-4.el7_9.src.rpm" version="91.2.0"><filename>firefox-91.2.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">2108beff106b3a505077f48f3daaccbebe0cb5e0580119fbe631427f4a6e8ceb</sum></package><package arch="i686" name="firefox" release="4.el7_9" src="firefox-91.2.0-4.el7_9.src.rpm" version="91.2.0"><filename>firefox-91.2.0-4.el7_9.i686.rpm</filename><sum type="sha256">e75a8f263454f13e27fd080a3ff5eb5355a6cd833f60c361aae5b08c667f5c4a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32810" id="CVE-2021-32810" title="Rust-Crossbeam-Deque: Race Condition May Lead To Double Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38496" id="CVE-2021-38496" title="Mozilla: Use-After-Free In Messagetask" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38497" id="CVE-2021-38497" title="Mozilla: Validation Message Could Have Been Overlaid On Another Origin" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38498" id="CVE-2021-38498" title="Mozilla: Use-After-Free Of Nslanguageatomservice Object" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38500" id="CVE-2021-38500" title="Mozilla: Memory Safety Bugs Fixed In Firefox 93, Firefox Esr 78.15, And Firefox Esr 91.2" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38501" id="CVE-2021-38501" title="Mozilla: Memory Safety Bugs Fixed In Firefox 93 And Firefox Esr 91.2" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3791" id="RHSA-2021:3791-1" title="Rhsa-2021:3791-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1990342" id="1990342" title="Rust-Crossbeam-Deque: Race Condition May Lead To Double Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011097" id="2011097" title="Mozilla: Use-After-Free In Messagetask" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011098" id="2011098" title="Mozilla: Validation Message Could Have Been Overlaid On Another Origin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011099" id="2011099" title="Mozilla: Use-After-Free Of Nslanguageatomservice Object" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011100" id="2011100" title="Mozilla: Memory Safety Bugs Fixed In Firefox 93, Firefox Esr 78.15, And Firefox Esr 91.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011101" id="2011101" title="Mozilla: Memory Safety Bugs Fixed In Firefox 93 And Firefox Esr 91.2" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3798-1</id><title>Openssl</title><description>Security Fix(es): 
* openssl: integer overflow in CipherUpdate (CVE-2021-23840) 
* openssl: NULL pointer dereference in X509_issuer_and_serial_hash() (CVE-2021-23841) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-10-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl-libs" release="22.el7_9" src="openssl-1.0.2k-22.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-22.el7_9.x86_64.rpm</filename><sum type="sha256">d440e6dd5875b7f851b77504780b3d836c6046550d8d21a27057fc172c2e6d7e</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="22.el7_9" src="openssl-1.0.2k-22.el7_9.src.rpm" version="1.0.2k"><filename>openssl-perl-1.0.2k-22.el7_9.x86_64.rpm</filename><sum type="sha256">0896832e03341d76521c42f7b1b2e5353404a29cf1a7e0218e5130549352f670</sum></package><package arch="i686" epoch="1" name="openssl-static" release="22.el7_9" src="openssl-1.0.2k-22.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-22.el7_9.i686.rpm</filename><sum type="sha256">5a1bd652238c1bf6f4f249c115d9161468e9ff363d5bcd8e0241b5d77c3a1eae</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="22.el7_9" src="openssl-1.0.2k-22.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-22.el7_9.i686.rpm</filename><sum type="sha256">b8c85d6360fb785fac3bfc3aaf63442a5257a27325c3426b0d8d9fff2623b3e2</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="22.el7_9" src="openssl-1.0.2k-22.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-22.el7_9.i686.rpm</filename><sum type="sha256">326fe4fe4832c1312b334c1553e1c9623543ee6bbd1beb068276e6b5fa81f8e9</sum></package><package arch="x86_64" epoch="1" name="openssl-devel" release="22.el7_9" src="openssl-1.0.2k-22.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-22.el7_9.x86_64.rpm</filename><sum type="sha256">4ac584b2648ef5b2947325914d5bc645a4a4a4bc72ffa4f0d7ff4bd7f289da45</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="22.el7_9" src="openssl-1.0.2k-22.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-22.el7_9.x86_64.rpm</filename><sum type="sha256">6d732ebba370c1094b6bbcdfd0baa398c8f6e393d25ea7c5df63ef9e63e48345</sum></package><package arch="x86_64" epoch="1" name="openssl" release="22.el7_9" src="openssl-1.0.2k-22.el7_9.src.rpm" version="1.0.2k"><filename>openssl-1.0.2k-22.el7_9.x86_64.rpm</filename><sum type="sha256">625bcddd9f6faea4ca2dd3750620adcc5a77693e36d43026654c853cc40fb95d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840" id="CVE-2021-23840" title="Openssl: Integer Overflow In Cipherupdate" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23841" id="CVE-2021-23841" title="Openssl: Null Pointer Dereference In X509_Issuer_And_Serial_Hash()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3798" id="RHSA-2021:3798-1" title="Rhsa-2021:3798-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1930310" id="1930310" title="Openssl: Null Pointer Dereference In X509_Issuer_And_Serial_Hash()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1930324" id="1930324" title="Openssl: Integer Overflow In Cipherupdate" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3801-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: Improper handling of VM_IO|VM_PFNMAP vmas in KVM can bypass RO checks (CVE-2021-22543) 
* kernel: powerpc: KVM guest OS users can cause host OS memory corruption (CVE-2021-37576) 
* kernel: SVM nested virtualization issue in KVM (AVIC support) (CVE-2021-3653) 
* kernel: SVM nested virtualization issue in KVM (VMLOAD/VMSAVE) (CVE-2021-3656) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Kernel panic due to double fault with DLM reporting for socket error "sk_err=32/0" 
* "MFW indication via attention" message getting logged frequently after every 5 minutes 
* lpfc fails to discovery in pt2pt with "2754 PRLI failure DID:0000EF Status:x9/x91e00, data: x0" 
* pcpu_get_vm_areas using most memory from VmallocUsed 
* SL 7.9.z [qedf driver] Racing condition between qedf_cleanup_fcport and releasing command after timeout 
* [Azure] SL 7.9 reports GPU/IB topology incorrectly on some Azure SKUs 
* [stable guest ABI]Hot add CPU after migration cause guest hang 
* i40e driver crash at  RIP: i40e_config_vf_promiscuous_mode+0x165 
* [nfs] Performance issue since commit 5a4f6f11951e 
* [kernel] Indefinite waiting for RCU callback while removing cgroup 
 --- SL7  x86_64   bpftool-3.10.0-1160.45.1.el7.x86_64.rpm   bpftool-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpm   kernel-debug-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-debug-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-debug-devel-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-debuginfo-common-x86_64-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-devel-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-doc-3.10.0-1160.45.1.el7.noarch.rpm   kernel-headers-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-tools-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-tools-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-tools-libs-3.10.0-1160.45.1.el7.x86_64.rpm   kernel-tools-libs-devel-3.10.0-1160.45.1.el7.x86_64.rpm    perf-3.10.0-1160.45.1.el7.x86_64.rpm   perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm   python-perf-3.10.0-1160.45.1.el7.x86_64.rpm   python-perf-debuginfo-3.10.0-1160.45.1.el7.x86_64.rpm   noarch   kernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpm   kernel-doc-3.10.0-1160.45.1.el7.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-10-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-headers" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">867fdd6e332efbd4cea7bacdb32374f632ca50f3c27b115367c5bceaf950023a</sum></package><package arch="x86_64" name="perf" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">4ee7937dec998d123d775db2e2a905e3baff41861e97ef4835f4bd7f9b1d139e</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.45.1.el7.noarch.rpm</filename><sum type="sha256">ba563855289df621120ac2ff431b1a133af48779619476660eead751240e58d3</sum></package><package arch="x86_64" name="kernel" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">f10179e6528536565797b6977ef373f2bcc93de865490fd71c807743026e493b</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">0b3b808b3e34bd6a6a80f40cd0283e05c73143fc8134ba6a05a4204471bbfaf2</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">b86d2bcc3e17d97f11c8b38b05a6c48a62abdca41fa488cbe52c529344d71621</sum></package><package arch="noarch" name="kernel-doc" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.45.1.el7.noarch.rpm</filename><sum type="sha256">c0adc04226bfa29b938ad285aa99f5f2e153031beca278eb46f94b600e11e7fd</sum></package><package arch="x86_64" name="bpftool" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">525b3f26666c486a0870cb41de14c0ce3da96d1d688c62b63d45b74077bd9222</sum></package><package arch="x86_64" name="python-perf" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">6ee9f492b7ac9d6a9572dabbbe6e1ecf0fe2d1e2c7b571078795f900b19bba80</sum></package><package arch="x86_64" name="kernel-tools" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">b6778bbd766fab3ba47aeaffd8dfec93f818b50cf3bc2777a8f4a04a73fcbcbd</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">923405a988634c32c71fed69171e958b1c0c06b356b2ba0dd5efbef3366c3646</sum></package><package arch="x86_64" name="kernel-devel" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">8e8fee1867e2a9134f4323f10f6986eb549df5f416b503a3169784d72c582209</sum></package><package arch="x86_64" name="kernel-debug" release="1160.45.1.el7" src="kernel-3.10.0-1160.45.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.45.1.el7.x86_64.rpm</filename><sum type="sha256">484a818618e60b5d7cc3bdeb2f7f30cb261533f3eee672e0ab234d71713f7e2a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22543" id="CVE-2021-22543" title="Kernel: Improper Handling Of Vm_Io|Vm_Pfnmap Vmas In Kvm Can Bypass Ro Checks" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3653" id="CVE-2021-3653" title="Kernel: Svm Nested Virtualization Issue In Kvm (Avic Support)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3656" id="CVE-2021-3656" title="Kernel: Svm Nested Virtualization Issue In Kvm (Vmload/Vmsave)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37576" id="CVE-2021-37576" title="Kernel: Powerpc: Kvm Guest Os Users Can Cause Host Os Memory Corruption" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3801" id="RHSA-2021:3801-1" title="Rhsa-2021:3801-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1965461" id="1965461" title="Kernel: Improper Handling Of Vm_Io|Vm_Pfnmap Vmas In Kvm Can Bypass Ro Checks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1983686" id="1983686" title="Kernel: Svm Nested Virtualization Issue In Kvm (Avic Support)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1983988" id="1983988" title="Kernel: Svm Nested Virtualization Issue In Kvm (Vmload/Vmsave)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1986506" id="1986506" title="Kernel: Powerpc: Kvm Guest Os Users Can Cause Host Os Memory Corruption" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3807-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* 389-ds-base: CRYPT password hash with asterisk allows any bind attempt to  succeed (CVE-2021-3652) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* A plugin can create an index. Even if the index can be used immediately (for  searches) the index remains offline until further reindex 
* In some rare case, a replication connection may be treated as a regular connection and ACIs evaluated even if they should not. 
* A regular connection can be erroneously flagged replication connection 
 --- SL7   x86_64   389-ds-base-1.3.10.2-13.el7_9.x86_64.rpm   389-ds-base-debuginfo-1.3.10.2-13.el7_9.x86_64.rpm   389-ds-base-devel-1.3.10.2-13.el7_9.x86_64.rpm   389-ds-base-libs-1.3.10.2-13.el7_9.x86_64.rpm   389-ds-base-snmp-1.3.10.2-13.el7_9.x86_64.rpm</description><severity>low</severity><release>Scientific Linux</release><issued date="2021-10-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-devel" release="13.el7_9" src="389-ds-base-1.3.10.2-13.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-devel-1.3.10.2-13.el7_9.x86_64.rpm</filename><sum type="sha256">aec7abb1ea3f088e1fb0844c076f8a2b3a7f94ad9b2eed3384702f32ba7fa86a</sum></package><package arch="x86_64" name="389-ds-base-libs" release="13.el7_9" src="389-ds-base-1.3.10.2-13.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-libs-1.3.10.2-13.el7_9.x86_64.rpm</filename><sum type="sha256">9a701e7781a327bcf458ded4c0578fcec25e88ea744a5aaa40e74d5f93596929</sum></package><package arch="x86_64" name="389-ds-base" release="13.el7_9" src="389-ds-base-1.3.10.2-13.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-1.3.10.2-13.el7_9.x86_64.rpm</filename><sum type="sha256">e5b1cd1a816777e3910d687b4acc55ce2558fbce0e44e41f74223fd315f366a6</sum></package><package arch="x86_64" name="389-ds-base-snmp" release="13.el7_9" src="389-ds-base-1.3.10.2-13.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-snmp-1.3.10.2-13.el7_9.x86_64.rpm</filename><sum type="sha256">138cc1e3a0c9dfa5610aeed6db70927895f5acf90bcf3242054e5fad1caae504</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3652" id="CVE-2021-3652" title="389-Ds-Base: Crypt Password Hash With Asterisk Allows Any Bind Attempt To Succeed" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3807" id="RHSA-2021:3807-1" title="Rhsa-2021:3807-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1982782" id="1982782" title="389-Ds-Base: Crypt Password Hash With Asterisk Allows Any Bind Attempt To Succeed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2005399" id="2005399" title="Internal Unindexed Searches In Syncrepl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2005434" id="2005434" title="Acis Are Being Evaluated Against The Replication Manager Account In A Replication Context." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2005435" id="2005435" title="A Connection Can Be Erroneously Flagged As Replication Conn During Evaluation Of An Aci With Ip Bind Rule" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3810-1</id><title>Libxml2</title><description>Security Fix(es): 
* libxml2: Use after free via namespace node in XPointer ranges (CVE-2016-4658) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64   libxml2-2.9.1-6.el7_9.6.i686.rpm   libxml2-2.9.1-6.el7_9.6.x86_64.rpm   libxml2-debuginfo-2.9.1-6.el7_9.6.i686.rpm   libxml2-debuginfo-2.9.1-6.el7_9.6.x86_64.rpm   libxml2-devel-2.9.1-6.el7_9.6.i686.rpm   libxml2-devel-2.9.1-6.el7_9.6.x86_64.rpm   libxml2-python-2.9.1-6.el7_9.6.x86_64.rpm   libxml2-static-2.9.1-6.el7_9.6.i686.rpm   libxml2-static-2.9.1-6.el7_9.6.x86_64.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-10-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libxml2-static" release="6.el7_9.6" src="libxml2-2.9.1-6.el7_9.6.src.rpm" version="2.9.1"><filename>libxml2-static-2.9.1-6.el7_9.6.i686.rpm</filename><sum type="sha256">8a59d382b30319d0ff690e40222edb29c738c9ca34cf444404e96aa775067b80</sum></package><package arch="i686" name="libxml2-devel" release="6.el7_9.6" src="libxml2-2.9.1-6.el7_9.6.src.rpm" version="2.9.1"><filename>libxml2-devel-2.9.1-6.el7_9.6.i686.rpm</filename><sum type="sha256">aca8e9ea39cb10f330355ffc3f46dff2698f681dfdddda2ecf987339aaa73f66</sum></package><package arch="i686" name="libxml2" release="6.el7_9.6" src="libxml2-2.9.1-6.el7_9.6.src.rpm" version="2.9.1"><filename>libxml2-2.9.1-6.el7_9.6.i686.rpm</filename><sum type="sha256">f87f59a8af354ebd01bf4fe2763aa8ad246912a21c096ce4bc27b22f53d1f608</sum></package><package arch="x86_64" name="libxml2-devel" release="6.el7_9.6" src="libxml2-2.9.1-6.el7_9.6.src.rpm" version="2.9.1"><filename>libxml2-devel-2.9.1-6.el7_9.6.x86_64.rpm</filename><sum type="sha256">d9968fe93e5c1af2ccbe30d3a4cb1ae2523e454717b0d6dc762d01aacca2547b</sum></package><package arch="x86_64" name="libxml2-static" release="6.el7_9.6" src="libxml2-2.9.1-6.el7_9.6.src.rpm" version="2.9.1"><filename>libxml2-static-2.9.1-6.el7_9.6.x86_64.rpm</filename><sum type="sha256">66674b9b2caa4763602e3e5ae5cc79704358c65ac092fc65bfc153c54aa5a32b</sum></package><package arch="x86_64" name="libxml2-python" release="6.el7_9.6" src="libxml2-2.9.1-6.el7_9.6.src.rpm" version="2.9.1"><filename>libxml2-python-2.9.1-6.el7_9.6.x86_64.rpm</filename><sum type="sha256">8f07c25339c6fde873b15392514b0344ba7b22b46ca088cf46874535e1f906b7</sum></package><package arch="x86_64" name="libxml2" release="6.el7_9.6" src="libxml2-2.9.1-6.el7_9.6.src.rpm" version="2.9.1"><filename>libxml2-2.9.1-6.el7_9.6.x86_64.rpm</filename><sum type="sha256">f4c797e76f3851b1071a8583855370125721551c43ccc91477b77c7b06ad401a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4658" id="CVE-2016-4658" title="Libxml2: Use After Free Via Namespace Node In Xpointer Ranges" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3810" id="RHSA-2021:3810-1" title="Rhsa-2021:3810-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1384424" id="1384424" title="Libxml2: Use After Free Via Namespace Node In Xpointer Ranges" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3841-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.2.0. 
Security Fix(es): 
* Mozilla: Use-after-free in MessageTask (CVE-2021-38496) 
* Mozilla: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2 (CVE-2021-38500) 
* Mozilla: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2 (CVE-2021-38501) 
* Mozilla: Downgrade attack on SMTP STARTTLS connections (CVE-2021-38502) 
* rust-crossbeam-deque: race condition may lead to double free (CVE-2021-32810) 
* Mozilla: Validation message could have been overlaid on another origin (CVE-2021-38497) 
* Mozilla: Use-after-free of nsLanguageAtomService object (CVE-2021-38498) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64   thunderbird-91.2.0-1.el7_9.x86_64.rpm   thunderbird-debuginfo-91.2.0-1.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-10-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-91.2.0-1.el7_9.src.rpm" version="91.2.0"><filename>thunderbird-91.2.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">ca7ecb224d07e0dd1409860349eb0eb01188050739568942bf50e43875e78b75</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32810" id="CVE-2021-32810" title="Rust-Crossbeam-Deque: Race Condition May Lead To Double Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38496" id="CVE-2021-38496" title="Mozilla: Use-After-Free In Messagetask" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38497" id="CVE-2021-38497" title="Mozilla: Validation Message Could Have Been Overlaid On Another Origin" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38498" id="CVE-2021-38498" title="Mozilla: Use-After-Free Of Nslanguageatomservice Object" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38500" id="CVE-2021-38500" title="Mozilla: Memory Safety Bugs Fixed In Firefox 93, Firefox Esr 78.15, And Firefox Esr 91.2" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38501" id="CVE-2021-38501" title="Mozilla: Memory Safety Bugs Fixed In Firefox 93 And Firefox Esr 91.2" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38502" id="CVE-2021-38502" title="Mozilla: Downgrade Attack On Smtp Starttls Connections" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3841" id="RHSA-2021:3841-1" title="Rhsa-2021:3841-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1990342" id="1990342" title="Rust-Crossbeam-Deque: Race Condition May Lead To Double Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011097" id="2011097" title="Mozilla: Use-After-Free In Messagetask" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011098" id="2011098" title="Mozilla: Validation Message Could Have Been Overlaid On Another Origin" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011099" id="2011099" title="Mozilla: Use-After-Free Of Nslanguageatomservice Object" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011100" id="2011100" title="Mozilla: Memory Safety Bugs Fixed In Firefox 93, Firefox Esr 78.15, And Firefox Esr 91.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2011101" id="2011101" title="Mozilla: Memory Safety Bugs Fixed In Firefox 93 And Firefox Esr 91.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2013469" id="2013469" title="Mozilla: Downgrade Attack On Smtp Starttls Connections" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3856</id><title>Important: Httpd Security Update</title><description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_proxy: SSRF via a crafted request uri-path containing "unix:" (CVE-2021-40438)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2021-10-18 06:34:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="httpd-tools" release="97.sl7_9.1" src="httpd-2.4.6-97.sl7_9.1.src.rpm" version="2.4.6"><filename>httpd-tools-2.4.6-97.sl7_9.1.x86_64.rpm</filename><sum type="sha256">9581a172adb312e7e316a2f5ba812b21cdc7464e98af2e92ec9620f12d3bb4c6</sum></package><package arch="x86_64" name="mod_session" release="97.sl7_9.1" src="httpd-2.4.6-97.sl7_9.1.src.rpm" version="2.4.6"><filename>mod_session-2.4.6-97.sl7_9.1.x86_64.rpm</filename><sum type="sha256">7c721f5a5df540461d2710cce4802bd4b75820fd70ab4fb6f7d03991a5ef2214</sum></package><package arch="x86_64" epoch="1" name="mod_proxy_html" release="97.sl7_9.1" src="httpd-2.4.6-97.sl7_9.1.src.rpm" version="2.4.6"><filename>mod_proxy_html-2.4.6-97.sl7_9.1.x86_64.rpm</filename><sum type="sha256">6f5b0e6091bd251d553a697848d55e871eb7ca33a2d0ad8d6c3de18536e36b6a</sum></package><package arch="x86_64" name="httpd-devel" release="97.sl7_9.1" src="httpd-2.4.6-97.sl7_9.1.src.rpm" version="2.4.6"><filename>httpd-devel-2.4.6-97.sl7_9.1.x86_64.rpm</filename><sum type="sha256">29ecb6fcc01aba2a3d3a2d341fa19e2975d17fb725e5eaa3496b69cddcc55e97</sum></package><package arch="noarch" name="httpd-manual" release="97.sl7_9.1" src="httpd-2.4.6-97.sl7_9.1.src.rpm" version="2.4.6"><filename>httpd-manual-2.4.6-97.sl7_9.1.noarch.rpm</filename><sum type="sha256">1794f9ab5b5a11081fa9978bdd1af37ccf839681cf4bc003e56399f8458feb65</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="97.sl7_9.1" src="httpd-2.4.6-97.sl7_9.1.src.rpm" version="2.4.6"><filename>mod_ssl-2.4.6-97.sl7_9.1.x86_64.rpm</filename><sum type="sha256">dcd70d4f19c36d40e2a23a2227ba722e869141b9efdfcea1919dc921b3eca1e2</sum></package><package arch="x86_64" name="httpd" release="97.sl7_9.1" src="httpd-2.4.6-97.sl7_9.1.src.rpm" version="2.4.6"><filename>httpd-2.4.6-97.sl7_9.1.x86_64.rpm</filename><sum type="sha256">5fc596869c32f29d76b23ea0cd05e38c7cf75c7b9fa861431268266be6905a2c</sum></package><package arch="x86_64" name="mod_ldap" release="97.sl7_9.1" src="httpd-2.4.6-97.sl7_9.1.src.rpm" version="2.4.6"><filename>mod_ldap-2.4.6-97.sl7_9.1.x86_64.rpm</filename><sum type="sha256">a6adbd702164e543182a0a32f3b1a7f7a4fa75f4e43ec6a8048cc535de40631b</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40438" id="CVE-2021-40438" title="Cve-2021-40438" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3856" id="RHSA-2021:3856" title="Important: Httpd Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3889</id><title>Important: Java-1.8.0-Openjdk Security And Bug Fix Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) (CVE-2021-35565) * OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) (CVE-2021-35567) * OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) (CVE-2021-35550) * OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) (CVE-2021-35556) * OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) (CVE-2021-35559) * OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) (CVE-2021-35561) * OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) (CVE-2021-35564) * OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729) (CVE-2021-35578) * OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735) (CVE-2021-35586) * OpenJDK: Incomplete validation of inner class references in ClassFileParser (Hotspot, 8268071)
(CVE-2021-35588) * OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) (CVE-2021-35603)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* A defensive security change in an earlier OpenJDK update led to a performance degradation when using the Scanner class. This was due to the change being applied to many common cases that did not need this protection. With this update, we provide the original behaviour for these cases. (RHBZ#1862929)
</description><severity>important</severity><issued date="2021-10-20 18:03:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.312.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">b8e041ae56a3b6f55f91e35e550c91c79a5f7663521a4821b54286b5349d4587</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">185e6681a034b8fb8d4418f512e628f3b385294a5532ece494895abe7551cdfc</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">318dd320b0c51f88be77b97acf3d8c0c3aa22e410b3290fee5c7c860196ba162</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-javadoc-debug-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">f3f4387ab91c214f9dd86464a31e3414b74492361737b221816178c571941c48</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">fe3fc45668fa2d1e847ee3f529c8016bcf9e0bc66bc60e823b890407369a58b3</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">2c065ede1975c9b4714b4598a5ba351b0f5798441e3bf526a339f4ea04617faa</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-headless-debug-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">97eb31f1ef863866ea004512db55576c813f0d9ca733cdc02c73c15a72c3a264</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">613ca8a7e3e8c2af0b551f7f23b47fe6181517b3925ce98577d40bb76eaa88a0</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-devel-debug-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">c12fe1fbe90dcc0bd4be61d229ac2cbd97879d417447bf7f36440318c10d9681</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-headless-debug-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">2eeacab36ce271803ecfc626ed5b1855bfbae454c38aedc1d6c587c4a630267f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-javadoc-debug-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">e90a511e21be6f399a142c7c844768cf9cd5fbf3fe7c60eea4ca2a7e3bc31d32</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-javadoc-zip-debug-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">0c7554936b512c3be2b5f0072c3f419f5278b7c27a4d9140c049a8f0d9e3c051</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.312.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">6d49108d4429403240621882e8e762435eca92d61ec7ac01c4a7ecc2d3463301</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-devel-debug-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">f86980e699225cd91a39abe0a293a42179db3b72f366266539584c35cda107ca</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-jmods-debug-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">5a5972bf73572ba1ed7673b859557be68d9da5c91c0cd6b97f88e421e8059310</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">be18bb19a976d1fc42494fcb27a048dd7204bed976708e61d91e3171ae2506f9</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-debug-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">badbefa4886b2f0e02af3920674721ae6dd20cd40550b38fd6350778949da252</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-src-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">8650d36c04fb12c4e51aed57461a16733b7f785a43e2d7905679168cf742c93e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-src-debug-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">90eea65199aaf18e400556e0d11fc55978450bd3cf312b35b5c4630a42a32f83</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-src-debug-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">485a53dcbfce50300ce2b08423f653c90d91f068efcbd527b1d05443be6e758d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-debug-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">d2ef3fdae6a8002640cd022b6440975cea9f7bd2c5d50ef58609d37cc065a5de</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-javadoc-zip-debug-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">944c237e8e0efc48143d3a1f430cd3b3c316e143542a263dde4120d5594a9761</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-debug-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">2986a8d4690f34dd30e269cce43aeff99afc0f9c0d79794071bdd20840f1a0e0</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">06e676bb945720a776d4e3450adc46c75e0bc27e4b9d876a940be5be10633f05</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-demo-debug-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">e07bfd456b04754c02ed825e5dacd707f2ab07351552b940cf8a106122da4901</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">815bda03a742f2b7e1f10b785b398d227fee602872bdea6ea51d143348922521</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-src-debug-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">ca5e16a6456f3cb50263ff94a90ac206afddf4a8aeb5ef3a5dc7a467378f61ed</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-static-libs-debug-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">ccbff3e9c5546692b8ca43756439d1837893f6127de9635f490bae72668f7f4a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-jmods-debug-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">6dbb3dca7fa74b6378c7d8c1cb6e589d9c76cf90c4d69375eede2a4d1f32d37b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-demo-debug-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">a9ddfa9caef1859a580fff96b0d152ff2371b203894ea91c8e2eefbf6a20c951</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">87efefa8960f6579e5731b72101f67e7cf282f7f6a43d58b073c60d8f5a947cd</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" id="CVE-2021-35550" title="Cve-2021-35550" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" id="CVE-2021-35556" title="Cve-2021-35556" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" id="CVE-2021-35559" title="Cve-2021-35559" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" id="CVE-2021-35561" title="Cve-2021-35561" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" id="CVE-2021-35564" title="Cve-2021-35564" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" id="CVE-2021-35565" title="Cve-2021-35565" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" id="CVE-2021-35567" title="Cve-2021-35567" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" id="CVE-2021-35578" title="Cve-2021-35578" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" id="CVE-2021-35586" title="Cve-2021-35586" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35588" id="CVE-2021-35588" title="Cve-2021-35588" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" id="CVE-2021-35603" title="Cve-2021-35603" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3889" id="RHSA-2021:3889" title="Important: Java-1.8.0-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1862929" id="1862929" title="1862929 &#8211; Scanner Is Slower With Jdk 1.8.0_252 And Above" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3889-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) (CVE-2021-35565) 
* OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) (CVE-2021-35567) 
* OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) (CVE-2021-35550) 
* OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) (CVE-2021-35556) 
* OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) (CVE-2021-35559) 
* OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) (CVE-2021-35561) 
* OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) (CVE-2021-35564) 
* OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729)  (CVE-2021-35578) 
* OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735)  (CVE-2021-35586) 
* OpenJDK: Incomplete validation of inner class references in ClassFileParser (Hotspot, 8268071) (CVE-2021-35588) 
* OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) (CVE-2021-35603) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* A defensive security change in an earlier OpenJDK update led to a performance degradation when using the Scanner class. This was due to the change being applied to many common cases that did not need this protection. With this update, we provide the original behaviour for these cases. (RHBZ#1862929) 
 --- SL7 
x86_64 java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-debuginfo-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-debuginfo-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9.x86_64.rpm java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9.i686.rpm java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9.x86_64.rpm 
noarch java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9.noarch.rpm java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">96becc4df530dcbb300a3ee87e56d7d557d982f3a05a6e13bdf0f173c321ab98</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">8053e3d59d91fa2565831d5591d2bea43d763da33cf9d69e8205aa1c2563e506</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">08274409df9aa67ba85ec46e67c03b74360b3553d9b2d66921632e287b145223</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">7e5737cdd00f317e6fe853678e470966df3db388539749132381d3731894ab2f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-devel-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">dde358379e51deb289aecf16e04be1d2a7d803ae6c6e47b1969ab1cd425a30fb</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-headless-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">27ee4919633d5efccefc730781dc6bf03c1bdd255584f54640513fa3cf2408c5</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">06b10b389e6da269004a11f8c8e7d2c98a931309b739bb16d8bbf2e79031b9ff</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-javadoc-1.8.0.312.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">35d2a9fd1ecb1c7e2c93bbedf92a66bddef3fd81ef5bb8d52264eecb297cee41</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-accessibility-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">d1f3f237c4290a03682bb672e5a734917de05866edf597726e1be0ed77c43422</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">e7a0e52a0cc34f69a2c1e8f959fd064ac6770cbbe9114be3efef465def119cc0</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-demo-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">904e67fa5443bdcc8c1d21217e278c8c4ffd4f9f37e189b7acc46cbc4c514039</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.i686.rpm</filename><sum type="sha256">ac3569fd519415e34c1f9f87bfe90a825a1d2fada013b0e2667aa41a541f2f73</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.312.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">75c9b6a586b9e3d8e08bd1a9808ded2153d35a74d9ba19a418473f04fbbfcba7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.312.b07-1.el7_9.src.rpm" version="1.8.0.312.b07"><filename>java-1.8.0-openjdk-src-1.8.0.312.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">83d558c3b78820fb00cf5ca98fb3763617c578826bd25eb84ab77196ed330d8e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" id="CVE-2021-35550" title="Openjdk: Weak Ciphers Preferred Over Stronger Ones For Tls (Jsse, 8264210)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" id="CVE-2021-35556" title="Openjdk: Excessive Memory Allocation In Rtfparser (Swing, 8265167)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" id="CVE-2021-35559" title="Openjdk: Excessive Memory Allocation In Rtfreader (Swing, 8265580)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" id="CVE-2021-35561" title="Openjdk: Excessive Memory Allocation In Hashmap And Hashset (Utility, 8266097)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" id="CVE-2021-35564" title="Openjdk: Certificates With End Dates Too Far In The Future Can Corrupt Keystore (Keytool, 8266137)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" id="CVE-2021-35565" title="Openjdk: Loop In Httpsserver Triggered During Tls Session Close (Jsse, 8254967)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" id="CVE-2021-35567" title="Openjdk: Incorrect Principal Selection When Using Kerberos Constrained Delegation (Libraries, 8266689)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" id="CVE-2021-35578" title="Openjdk: Unexpected Exception Raised During Tls Handshake (Jsse, 8267729)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" id="CVE-2021-35586" title="Openjdk: Excessive Memory Allocation In Bmpimagereader (Imageio, 8267735)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35588" id="CVE-2021-35588" title="Openjdk: Incomplete Validation Of Inner Class References In Classfileparser (Hotspot, 8268071)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" id="CVE-2021-35603" title="Openjdk: Non-Constant Comparison During Tls Handshakes (Jsse, 8269618)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3889" id="RHSA-2021:3889-1" title="Rhsa-2021:3889-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1862929" id="1862929" title="Scanner Is Slower With Jdk 1.8.0_252 And Above" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2014508" id="2014508" title="Openjdk: Loop In Httpsserver Triggered During Tls Session Close (Jsse, 8254967)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2014515" id="2014515" title="Openjdk: Excessive Memory Allocation In Rtfparser (Swing, 8265167)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2014518" id="2014518" title="Openjdk: Excessive Memory Allocation In Rtfreader (Swing, 8265580)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2014524" id="2014524" title="Openjdk: Excessive Memory Allocation In Hashmap And Hashset (Utility, 8266097)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015061" id="2015061" title="Openjdk: Certificates With End Dates Too Far In The Future Can Corrupt Keystore (Keytool, 8266137)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015308" id="2015308" title="Openjdk: Excessive Memory Allocation In Bmpimagereader (Imageio, 8267735)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015311" id="2015311" title="Openjdk: Non-Constant Comparison During Tls Handshakes (Jsse, 8269618)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015648" id="2015648" title="Openjdk: Weak Ciphers Preferred Over Stronger Ones For Tls (Jsse, 8264210)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015653" id="2015653" title="Openjdk: Unexpected Exception Raised During Tls Handshake (Jsse, 8267729)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015658" id="2015658" title="Openjdk: Incorrect Principal Selection When Using Kerberos Constrained Delegation (Libraries, 8266689)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015659" id="2015659" title="Openjdk: Incomplete Validation Of Inner Class References In Classfileparser (Hotspot, 8268071)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3892-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE, 8254967) (CVE-2021-35565) 
* OpenJDK: Incorrect principal selection when using Kerberos Constrained Delegation (Libraries, 8266689) (CVE-2021-35567) 
* OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE, 8264210) (CVE-2021-35550) 
* OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167) (CVE-2021-35556) 
* OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580) (CVE-2021-35559) 
* OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) (CVE-2021-35561) 
* OpenJDK: Certificates with end dates too far in the future can corrupt keystore (Keytool, 8266137) (CVE-2021-35564) 
* OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729)  (CVE-2021-35578) 
* OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735)  (CVE-2021-35586) 
* OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618) (CVE-2021-35603) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Previously, uninstalling the OpenJDK RPMs attempted to remove a client directory that did not exist. This directory is no longer used in java-11-openjdk and all references to it have now been removed. (RHBZ#1698873) 
 
--- SL7 
x86_64 java-11-openjdk-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-debuginfo-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-debuginfo-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-demo-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-demo-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-devel-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-devel-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-headless-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-headless-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-jmods-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-jmods-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-src-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-src-11.0.13.0.8-1.el7_9.x86_64.rpm java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9.i686.rpm java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-10-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-demo-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">e33b167c32960ebe864e3298c0806fef44326dbf2e60f5fd6de9a64787630e47</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-src-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">605d9de79b1e7b66b8a678a32d3662f6024308b0d8efe4212832a6e3696c990f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-jmods-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">47f96da1d5218fca5cb8492684bc3375eb0562b5d3a2b9d4c04b86be92305609</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-headless-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">cc8f5858a5ef7c4e422c8ac9478b19571d12c9ea62b65b204afba187f834ad3f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">0818aa1117445013eb4f0ad45b312d1e54ac8c922ceffe90e7674a643eea5788</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">fc46580e7be7714628c10b0e0e9fb0ee34b25b3912fa5a599bf77715b069f65b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-static-libs-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">452cbaf81da20d0b10d5cc951fa527304a7e306f64193c11f9c28c9e60e74c4c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-jmods-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">f6fdc5145a6147d28ca9a6eba36ce56aac8e01286353c367a91c4cb2b14cbe31</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-demo-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">cf3f5bdb45ebfa36350f721c37429c0ec2b0e08e7fb8cd0835ad0b04831c170d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">04cdecef944c4d0caec49c21edb6897edeaee502b5aff9086123a3715ff51fd9</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-devel-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">67fc4f3c7e2f848a74b162d8b863b37d8f7198885a1c0642d27a0bf2e52e1e4b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-headless-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">378bee12136df9aa9fe80bff862d608232d45449a532cbf404db7357f3314623</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-javadoc-zip-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">3d3be31a498e5596c6ec12383fb0cbdbfe7d7577e3ad628f63325b34808717c7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">bebb84bedcb3c512d2a0bfeeb8b4db7b60ec32b5815d7de7edf819d3b2ffde24</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-devel-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">1d1b99c75a03c26401710fec1fa91024ab5f78e37a1a21c599ccea4061b052c7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-javadoc-11.0.13.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">2657fc9170f55acff762e78c6b324cbcf7671e37196f15cce4046d1d34570290</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.13.0.8-1.el7_9.src.rpm" version="11.0.13.0.8"><filename>java-11-openjdk-src-11.0.13.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">064608eff6a661e8ecd966c80bce8fa37071a8ea30c87741dd144573b073a1d9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35550" id="CVE-2021-35550" title="Openjdk: Weak Ciphers Preferred Over Stronger Ones For Tls (Jsse, 8264210)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35556" id="CVE-2021-35556" title="Openjdk: Excessive Memory Allocation In Rtfparser (Swing, 8265167)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35559" id="CVE-2021-35559" title="Openjdk: Excessive Memory Allocation In Rtfreader (Swing, 8265580)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35561" id="CVE-2021-35561" title="Openjdk: Excessive Memory Allocation In Hashmap And Hashset (Utility, 8266097)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35564" id="CVE-2021-35564" title="Openjdk: Certificates With End Dates Too Far In The Future Can Corrupt Keystore (Keytool, 8266137)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35565" id="CVE-2021-35565" title="Openjdk: Loop In Httpsserver Triggered During Tls Session Close (Jsse, 8254967)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35567" id="CVE-2021-35567" title="Openjdk: Incorrect Principal Selection When Using Kerberos Constrained Delegation (Libraries, 8266689)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35578" id="CVE-2021-35578" title="Openjdk: Unexpected Exception Raised During Tls Handshake (Jsse, 8267729)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35586" id="CVE-2021-35586" title="Openjdk: Excessive Memory Allocation In Bmpimagereader (Imageio, 8267735)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-35603" id="CVE-2021-35603" title="Openjdk: Non-Constant Comparison During Tls Handshakes (Jsse, 8269618)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3892" id="RHSA-2021:3892-1" title="Rhsa-2021:3892-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1698873" id="1698873" title="Warning: File /Usr/Lib/Jvm/Java-11-Openjdk-11.0.Ea.28-7.El7.X86_64/Lib/Client: Remove Failed: No Such File Or Directory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2014508" id="2014508" title="Openjdk: Loop In Httpsserver Triggered During Tls Session Close (Jsse, 8254967)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2014515" id="2014515" title="Openjdk: Excessive Memory Allocation In Rtfparser (Swing, 8265167)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2014518" id="2014518" title="Openjdk: Excessive Memory Allocation In Rtfreader (Swing, 8265580)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2014524" id="2014524" title="Openjdk: Excessive Memory Allocation In Hashmap And Hashset (Utility, 8266097)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015061" id="2015061" title="Openjdk: Certificates With End Dates Too Far In The Future Can Corrupt Keystore (Keytool, 8266137)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015308" id="2015308" title="Openjdk: Excessive Memory Allocation In Bmpimagereader (Imageio, 8267735)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015311" id="2015311" title="Openjdk: Non-Constant Comparison During Tls Handshakes (Jsse, 8269618)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015648" id="2015648" title="Openjdk: Weak Ciphers Preferred Over Stronger Ones For Tls (Jsse, 8264210)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015653" id="2015653" title="Openjdk: Unexpected Exception Raised During Tls Handshake (Jsse, 8267729)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2015658" id="2015658" title="Openjdk: Incorrect Principal Selection When Using Kerberos Constrained Delegation (Libraries, 8266689)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:3956-1</id><title>Xstream</title><description>Security Fix(es): 
* xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl (CVE-2021-39139) 
* xstream: Arbitrary code execution via unsafe deserialization of com.sun.xml.internal.ws.client.sei.* (CVE-2021-39141) 
* xstream: Arbitrary code execution via unsafe deserialization of sun.tracing.* (CVE-2021-39144) 
* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration (CVE-2021-39145) 
* xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue (CVE-2021-39146) 
* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapSearchEnumeration (CVE-2021-39147) 
* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.toolkit.dir.ContextEnumerator (CVE-2021-39148) 
* xstream: Arbitrary code execution via unsafe deserialization of com.sun.corba.* (CVE-2021-39149) 
* xstream: Server-side request forgery (SSRF) via unsafe deserialization of  com.sun.xml.internal.ws.client.sei.* (CVE-2021-39150) 
* xstream: Arbitrary code execution via unsafe deserialization of com.sun.jndi.ldap.LdapBindingEnumeration (CVE-2021-39151) 
* xstream: Server-side request forgery (SSRF) via unsafe deserialization of  jdk.nashorn.internal.runtime.Source$URLData (CVE-2021-39152) 
* xstream: Arbitrary code execution via unsafe deserialization of Xalan xsltc.trax.TemplatesImpl (CVE-2021-39153) 
* xstream: Arbitrary code execution via unsafe deserialization of javax.swing.UIDefaults$ProxyLazyValue (CVE-2021-39154) 
* xstream: Infinite loop DoS via unsafe deserialization of sun.reflect.annotation.AnnotationInvocationHandler (CVE-2021-39140) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
--- SL7  noarch   - xstream-1.3.1-16.el7_9.noarch.rpm   - xstream-javadoc-1.3.1-16.el7_9.noarch.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-10-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="xstream-javadoc" release="16.el7_9" src="xstream-1.3.1-16.el7_9.src.rpm" version="1.3.1"><filename>xstream-javadoc-1.3.1-16.el7_9.noarch.rpm</filename><sum type="sha256">721d4a42d6144450ca7a9d9a3346ea70c1c2cd3e659be4498547a45c905ad650</sum></package><package arch="noarch" name="xstream" release="16.el7_9" src="xstream-1.3.1-16.el7_9.src.rpm" version="1.3.1"><filename>xstream-1.3.1-16.el7_9.noarch.rpm</filename><sum type="sha256">18234f1e80c5362d2f18e4c98af1b3ad30f317728f614a810542f5013260471d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39139" id="CVE-2021-39139" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Xalan Xsltc.Trax.Templatesimpl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39140" id="CVE-2021-39140" title="Xstream: Infinite Loop Dos Via Unsafe Deserialization Of Sun.Reflect.Annotation.Annotationinvocationhandler" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39141" id="CVE-2021-39141" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Xml.Internal.Ws.Client.Sei.*" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39144" id="CVE-2021-39144" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Sun.Tracing.*" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39145" id="CVE-2021-39145" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Jndi.Ldap.Ldapbindingenumeration" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39146" id="CVE-2021-39146" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Javax.Swing.Uidefaults$Proxylazyvalue" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39147" id="CVE-2021-39147" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Jndi.Ldap.Ldapsearchenumeration" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39148" id="CVE-2021-39148" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Jndi.Toolkit.Dir.Contextenumerator" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39149" id="CVE-2021-39149" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Corba.*" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39150" id="CVE-2021-39150" title="Xstream: Server-Side Request Forgery (Ssrf) Via Unsafe Deserialization Of Com.Sun.Xml.Internal.Ws.Client.Sei.*" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39151" id="CVE-2021-39151" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Jndi.Ldap.Ldapbindingenumeration" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39152" id="CVE-2021-39152" title="Xstream: Server-Side Request Forgery (Ssrf) Via Unsafe Deserialization Of Jdk.Nashorn.Internal.Runtime.Source$Urldata" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39153" id="CVE-2021-39153" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Xalan Xsltc.Trax.Templatesimpl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39154" id="CVE-2021-39154" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Javax.Swing.Uidefaults$Proxylazyvalue" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:3956" id="RHSA-2021:3956-1" title="Rhsa-2021:3956-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997763" id="1997763" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Xalan Xsltc.Trax.Templatesimpl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997765" id="1997765" title="Xstream: Infinite Loop Dos Via Unsafe Deserialization Of Sun.Reflect.Annotation.Annotationinvocationhandler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997769" id="1997769" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Xml.Internal.Ws.Client.Sei.*" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997772" id="1997772" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Sun.Tracing.*" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997775" id="1997775" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Jndi.Ldap.Ldapbindingenumeration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997777" id="1997777" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Javax.Swing.Uidefaults$Proxylazyvalue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997779" id="1997779" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Jndi.Ldap.Ldapsearchenumeration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997781" id="1997781" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Jndi.Toolkit.Dir.Contextenumerator" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997784" id="1997784" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Corba.*" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997786" id="1997786" title="Xstream: Server-Side Request Forgery (Ssrf) Via Unsafe Deserialization Of Com.Sun.Xml.Internal.Ws.Client.Sei.*" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997791" id="1997791" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Com.Sun.Jndi.Ldap.Ldapbindingenumeration" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997793" id="1997793" title="Xstream: Server-Side Request Forgery (Ssrf) Via Unsafe Deserialization Of Jdk.Nashorn.Internal.Runtime.Source$Urldata" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997795" id="1997795" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Xalan Xsltc.Trax.Templatesimpl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1997801" id="1997801" title="Xstream: Arbitrary Code Execution Via Unsafe Deserialization Of Javax.Swing.Uidefaults$Proxylazyvalue" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4033-1</id><title>Binutils</title><description>Security Fix(es): 
* Developer environment: Unicode's bidirectional (BiDi) override characters  can cause trojan source attacks (CVE-2021-42574) 
The following changes were introduced in binutils in order to facilitate detection of BiDi Unicode characters: 
Tools which display names or strings (readelf, strings, nm, objdump) have a  new command line option --unicode / -U which controls how Unicode characters are handled. 
Using "--unicode=default" will treat them as normal for the tool. This is the default behaviour when --unicode option is not used.  Using "-- unicode=locale" will display them according to the current locale.  Using "--unicode=hex" will display them as hex byte values.  Using "-- unicode=escape" will display them as Unicode escape sequences.  Using "-- unicode=highlight" will display them as Unicode escape sequences highlighted in red, if supported by the output device. 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64  - binutils-2.27-44.base.el7_9.1.x86_64.rpm  - binutils-debuginfo-2.27-44.base.el7_9.1.i686.rpm  - binutils-debuginfo-2.27-44.base.el7_9.1.x86_64.rpm  - binutils-devel-2.27-44.base.el7_9.1.i686.rpm  - binutils-devel-2.27-44.base.el7_9.1.x86_64.rpm</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-11-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="binutils-devel" release="44.base.el7_9.1" src="binutils-2.27-44.base.el7_9.1.src.rpm" version="2.27"><filename>binutils-devel-2.27-44.base.el7_9.1.i686.rpm</filename><sum type="sha256">fb6f39677f4dfcd8081f6c7255d6b3290a7bb59c19bc49777ff53ab5d326d9f8</sum></package><package arch="x86_64" name="binutils" release="44.base.el7_9.1" src="binutils-2.27-44.base.el7_9.1.src.rpm" version="2.27"><filename>binutils-2.27-44.base.el7_9.1.x86_64.rpm</filename><sum type="sha256">f734e06cf2c45618f88fc22efa5888844a886d627cf2c73b505c16287fd0ef3f</sum></package><package arch="x86_64" name="binutils-devel" release="44.base.el7_9.1" src="binutils-2.27-44.base.el7_9.1.src.rpm" version="2.27"><filename>binutils-devel-2.27-44.base.el7_9.1.x86_64.rpm</filename><sum type="sha256">b86b196eb77c5dfcbd607eaea01c7b8cf538def86cc0c047c72004f9fecef54c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42574" id="CVE-2021-42574" title="Developer Environment: Unicode'S Bidirectional (Bidi) Override Characters Can Cause Trojan Source Attacks" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4033" id="RHSA-2021:4033-1" title="Rhsa-2021:4033-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2005819" id="2005819" title="Developer Environment: Unicode'S Bidirectional (Bidi) Override Characters Can Cause Trojan Source Attacks" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4044-1</id><title>Flatpak</title><description>Security Fix(es): 
* flatpak: Sandbox bypass via recent VFS-manipulating syscalls (CVE-2021-41133) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
 --- SL7  x86_64   -flatpak-1.0.9-12.el7_9.x86_64.rpm  - flatpak-builder-1.0.0-12.el7_9.x86_64.rpm  - flatpak-debuginfo-1.0.9-12.el7_9.x86_64.rpm  - flatpak-devel-1.0.9-12.el7_9.x86_64.rpm  - flatpak-libs-1.0.9-12.el7_9.x86_64.rpm</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-11-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="flatpak-libs" release="12.el7_9" src="flatpak-1.0.9-12.el7_9.src.rpm" version="1.0.9"><filename>flatpak-libs-1.0.9-12.el7_9.x86_64.rpm</filename><sum type="sha256">58e3c1f8dd1fa2e042593af0ee4e645190955b33c3399cf72ebb0a2eee668351</sum></package><package arch="x86_64" name="flatpak-builder" release="12.el7_9" src="flatpak-1.0.9-12.el7_9.src.rpm" version="1.0.0"><filename>flatpak-builder-1.0.0-12.el7_9.x86_64.rpm</filename><sum type="sha256">22067faaaeb7791e013f2978eaa4812a0c98185e7379c24d625cc3669e1c929e</sum></package><package arch="x86_64" name="flatpak-devel" release="12.el7_9" src="flatpak-1.0.9-12.el7_9.src.rpm" version="1.0.9"><filename>flatpak-devel-1.0.9-12.el7_9.x86_64.rpm</filename><sum type="sha256">1764362a0c1f11a79eeca38eeffc989f49059b37c95500454fda35278377b209</sum></package><package arch="x86_64" name="flatpak" release="12.el7_9" src="flatpak-1.0.9-12.el7_9.src.rpm" version="1.0.9"><filename>flatpak-1.0.9-12.el7_9.x86_64.rpm</filename><sum type="sha256">9eb7d9ef146c06f180f0b37e746cf2d2237d458853a34eb8f91d5914b96f3fbe</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41133" id="CVE-2021-41133" title="Flatpak: Sandbox Bypass Via Recent Vfs-Manipulating Syscalls" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4044" id="RHSA-2021:4044-1" title="Rhsa-2021:4044-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2012245" id="2012245" title="Flatpak: Sandbox Bypass Via Recent Vfs-Manipulating Syscalls" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4116-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.3.0 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free in HTTP2 Session object 
* Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 
* Mozilla: iframe sandbox rules did not apply to XSLT stylesheets (CVE-2021-38503) 
* Mozilla: Use-after-free in file picker dialog (CVE-2021-38504) 
* Mozilla: Firefox could be coaxed into going into fullscreen mode without notification or warning (CVE-2021-38506) 
* Mozilla: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports (CVE-2021-38507) 
* Mozilla: Permission Prompt could be overlaid, resulting in user confusion  and potential spoofing (CVE-2021-38508) 
* Mozilla: Javascript alert box could have been spoofed onto an arbitrary domain (CVE-2021-38509) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-11-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-91.3.0-1.el7_9.src.rpm" version="91.3.0"><filename>firefox-91.3.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">d240ca41ca7b893bf6dfe675cc0570479cd65e03efd623d8a49f34eaaa5e3b63</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-91.3.0-1.el7_9.src.rpm" version="91.3.0"><filename>firefox-91.3.0-1.el7_9.i686.rpm</filename><sum type="sha256">8c6d8cc7b4a69ef5cbd1426523aa2b250928f0c44478c8020e085e6333a1370c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38503" id="CVE-2021-38503" title="Mozilla: Iframe Sandbox Rules Did Not Apply To Xslt Stylesheets" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38504" id="CVE-2021-38504" title="Mozilla: Use-After-Free In File Picker Dialog" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38506" id="CVE-2021-38506" title="Mozilla: Firefox Could Be Coaxed Into Going Into Fullscreen Mode Without Notification Or Warning" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38507" id="CVE-2021-38507" title="Mozilla: Opportunistic Encryption In Http2 Could Be Used To Bypass The Same-Origin-Policy On Services Hosted On Other Ports" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38508" id="CVE-2021-38508" title="Mozilla: Permission Prompt Could Be Overlaid, Resulting In User Confusion And Potential Spoofing" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38509" id="CVE-2021-38509" title="Mozilla: Javascript Alert Box Could Have Been Spoofed Onto An Arbitrary Domain" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4116" id="RHSA-2021:4116-1" title="Rhsa-2021:4116-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019621" id="2019621" title="Mozilla: Iframe Sandbox Rules Did Not Apply To Xslt Stylesheets" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019622" id="2019622" title="Mozilla: Use-After-Free In File Picker Dialog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019624" id="2019624" title="Mozilla: Firefox Could Be Coaxed Into Going Into Fullscreen Mode Without Notification Or Warning" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019625" id="2019625" title="Mozilla: Opportunistic Encryption In Http2 Could Be Used To Bypass The Same-Origin-Policy On Services Hosted On Other Ports" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019626" id="2019626" title="Mozilla: Use-After-Free In Http2 Session Object" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019627" id="2019627" title="Mozilla: Permission Prompt Could Be Overlaid, Resulting In User Confusion And Potential Spoofing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019628" id="2019628" title="Mozilla: Javascript Alert Box Could Have Been Spoofed Onto An Arbitrary Domain" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019630" id="2019630" title="Mozilla: Memory Safety Bugs Fixed In Firefox 94 And Firefox Esr 91.3" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4134-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.3.0. 
Security Fix(es): 
* Mozilla: Use-after-free in HTTP2 Session object 
* Mozilla: Memory safety bugs fixed in Firefox 94 and Firefox ESR 91.3 
* Mozilla: iframe sandbox rules did not apply to XSLT stylesheets (CVE-2021-38503) 
* Mozilla: Use-after-free in file picker dialog (CVE-2021-38504) 
* Mozilla: Firefox could be coaxed into going into fullscreen mode without notification or warning (CVE-2021-38506) 
* Mozilla: Opportunistic Encryption in HTTP2 could be used to bypass the Same-Origin-Policy on services hosted on other ports (CVE-2021-38507) 
* Mozilla: Permission Prompt could be overlaid, resulting in user confusion  and potential spoofing (CVE-2021-38508) 
* Mozilla: Javascript alert box could have been spoofed onto an arbitrary domain (CVE-2021-38509) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-11-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-91.3.0-2.el7_9.src.rpm" version="91.3.0"><filename>thunderbird-91.3.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">4c8ed042fda855710d18116d76d222179772e50d5b378b3830c92bb8ddf6626a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38503" id="CVE-2021-38503" title="Mozilla: Iframe Sandbox Rules Did Not Apply To Xslt Stylesheets" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38504" id="CVE-2021-38504" title="Mozilla: Use-After-Free In File Picker Dialog" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38506" id="CVE-2021-38506" title="Mozilla: Firefox Could Be Coaxed Into Going Into Fullscreen Mode Without Notification Or Warning" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38507" id="CVE-2021-38507" title="Mozilla: Opportunistic Encryption In Http2 Could Be Used To Bypass The Same-Origin-Policy On Services Hosted On Other Ports" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38508" id="CVE-2021-38508" title="Mozilla: Permission Prompt Could Be Overlaid, Resulting In User Confusion And Potential Spoofing" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38509" id="CVE-2021-38509" title="Mozilla: Javascript Alert Box Could Have Been Spoofed Onto An Arbitrary Domain" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4134" id="RHSA-2021:4134-1" title="Rhsa-2021:4134-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019621" id="2019621" title="Mozilla: Iframe Sandbox Rules Did Not Apply To Xslt Stylesheets" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019622" id="2019622" title="Mozilla: Use-After-Free In File Picker Dialog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019624" id="2019624" title="Mozilla: Firefox Could Be Coaxed Into Going Into Fullscreen Mode Without Notification Or Warning" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019625" id="2019625" title="Mozilla: Opportunistic Encryption In Http2 Could Be Used To Bypass The Same-Origin-Policy On Services Hosted On Other Ports" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019626" id="2019626" title="Mozilla: Use-After-Free In Http2 Session Object" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019627" id="2019627" title="Mozilla: Permission Prompt Could Be Overlaid, Resulting In User Confusion And Potential Spoofing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019628" id="2019628" title="Mozilla: Javascript Alert Box Could Have Been Spoofed Onto An Arbitrary Domain" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019630" id="2019630" title="Mozilla: Memory Safety Bugs Fixed In Firefox 94 And Firefox Esr 91.3" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4619-1</id><title>Freerdp</title><description>Security Fix(es): 
* freerdp: improper client input validation for gateway connections allows to overwrite memory (CVE-2021-41159) 
* freerdp: improper region checks in all clients allow out of bound write to memory (CVE-2021-41160) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-11-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libwinpr" release="5.el7_9" src="freerdp-2.1.1-5.el7_9.src.rpm" version="2.1.1"><filename>libwinpr-2.1.1-5.el7_9.x86_64.rpm</filename><sum type="sha256">77239c60301bfd4569a632c262051c21eec79b1ea830b546779d5084aab7d084</sum></package><package arch="i686" name="freerdp-devel" release="5.el7_9" src="freerdp-2.1.1-5.el7_9.src.rpm" version="2.1.1"><filename>freerdp-devel-2.1.1-5.el7_9.i686.rpm</filename><sum type="sha256">00fac61464c5480ec91e302fb37991b75d4f2f69bdd93d0fbddd5e29dcf7fdd5</sum></package><package arch="x86_64" name="libwinpr-devel" release="5.el7_9" src="freerdp-2.1.1-5.el7_9.src.rpm" version="2.1.1"><filename>libwinpr-devel-2.1.1-5.el7_9.x86_64.rpm</filename><sum type="sha256">623433c0ea6efa7207d361905f8f4f211d28def2609e49c1fbc4745d35594620</sum></package><package arch="x86_64" name="freerdp" release="5.el7_9" src="freerdp-2.1.1-5.el7_9.src.rpm" version="2.1.1"><filename>freerdp-2.1.1-5.el7_9.x86_64.rpm</filename><sum type="sha256">425ec2b695d055f02fad6b19a925aefe72b42a728f5188beca945ea774551522</sum></package><package arch="i686" name="freerdp-libs" release="5.el7_9" src="freerdp-2.1.1-5.el7_9.src.rpm" version="2.1.1"><filename>freerdp-libs-2.1.1-5.el7_9.i686.rpm</filename><sum type="sha256">685bc3857c0a1c7357e7ed1e99a2c3943005b17e0f0ad29461b131cb283d3c75</sum></package><package arch="x86_64" name="freerdp-libs" release="5.el7_9" src="freerdp-2.1.1-5.el7_9.src.rpm" version="2.1.1"><filename>freerdp-libs-2.1.1-5.el7_9.x86_64.rpm</filename><sum type="sha256">16ff1cf1e8b791b72f404683e1b09ca183c1b923bfd7a40bde144c0a011097a0</sum></package><package arch="x86_64" name="freerdp-devel" release="5.el7_9" src="freerdp-2.1.1-5.el7_9.src.rpm" version="2.1.1"><filename>freerdp-devel-2.1.1-5.el7_9.x86_64.rpm</filename><sum type="sha256">f6315426a81bea92b151c19b92dd73abf7785c2c5f38326a7dd87edf9cebd623</sum></package><package arch="i686" name="libwinpr-devel" release="5.el7_9" src="freerdp-2.1.1-5.el7_9.src.rpm" version="2.1.1"><filename>libwinpr-devel-2.1.1-5.el7_9.i686.rpm</filename><sum type="sha256">4f0aa642e193199463b076ab85aa95c6471db5c0015ffec54a485eb2df6dce37</sum></package><package arch="i686" name="libwinpr" release="5.el7_9" src="freerdp-2.1.1-5.el7_9.src.rpm" version="2.1.1"><filename>libwinpr-2.1.1-5.el7_9.i686.rpm</filename><sum type="sha256">3ee37c0c201ef2fe982a344d953ffa8ea29a8c96200396163702500be4efe67a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41159" id="CVE-2021-41159" title="Freerdp: Improper Client Input Validation For Gateway Connections Allows To Overwrite Memory" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41160" id="CVE-2021-41160" title="Freerdp: Improper Region Checks In All Clients Allow Out Of Bound Write To Memory" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4619" id="RHSA-2021:4619-1" title="Rhsa-2021:4619-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2016403" id="2016403" title="Freerdp: Improper Client Input Validation For Gateway Connections Allows To Overwrite Memory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2016412" id="2016412" title="Freerdp: Improper Region Checks In All Clients Allow Out Of Bound Write To Memory" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4777-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: use-after-free in drivers/infiniband/core/ucma.c ctx  use-after- free (CVE-2020-36385) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* scsi: ibmvfc: Avoid link down on FS9100 canister reboot 
* crash in qla2x00_status_entry() because of corrupt srb 
* qedf driver: race condition between qedf's completion work task and another work item tearing down an fcport with qedf_cleanup_fcport 
* The kernel crashes in hv_pci_remove_slots() upon hv device removal. A possible race between hv_pci_remove_slots() and pci_devices_present_work(). 
* I/O delays incorrectly handled in the NVMe stack 
* Data corruption in NFS client reusing slotid/seqid due to an interrupted slot</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-11-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-devel" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">c59bd6ad8b0ba335b1a88bffbcf8ef268d3df29a96d7b7b995d30b8c305939de</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">6e4c1d649dde4da6699c3f05acb8e7ef57f58b8e98dd9d3f197804e05169011c</sum></package><package arch="x86_64" name="kernel-tools" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">76e9b04a0a7c47f25152f16f92dd7c8cb609e4558c0616d4f261870ac288b993</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">85effede8b93bcb34e01c1154c8bb0c9aefc896e7cd9c4809290bfde34d14e6f</sum></package><package arch="x86_64" name="kernel" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">aa36c535e415cd33f65a061cdef6ff3fb12a14214d7614ab7cc113412933ff4b</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">ae36099deb7aa92ef933e33052f63aa483b8755c5b63b0360840bc48f1914469</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.49.1.el7.noarch.rpm</filename><sum type="sha256">6c4f2476de1b18214e0d474570a7e21b0d4139c347b674cd0b78836ae5320907</sum></package><package arch="x86_64" name="bpftool" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">73b93162d0e202f228b3157df9b278ea9944b817dc7489af189b682b5f0dfd3d</sum></package><package arch="x86_64" name="kernel-debug" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">20261f01313111e42969541ffdb4b19cafd855d6294a3ac64481a5edeb8f2a50</sum></package><package arch="noarch" name="kernel-doc" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.49.1.el7.noarch.rpm</filename><sum type="sha256">82e0747f69c44a4d7b658707d6ee95cbb91f67f734e768d03dec121eec1624aa</sum></package><package arch="x86_64" name="kernel-headers" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">90f2afa509798753be07a36e1c0bca62c2a505ee3f9206d908fadfd437273edf</sum></package><package arch="x86_64" name="perf" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">4620413535aa12eddad10c9fa5e0468cd8a8bb4cd7b0523d27959c47fb896295</sum></package><package arch="x86_64" name="python-perf" release="1160.49.1.el7" src="kernel-3.10.0-1160.49.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.49.1.el7.x86_64.rpm</filename><sum type="sha256">255a4e7fe3d8b457d6e51b5df869cf53e6c73f383acdd0b1573161541c9c9ee1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36385" id="CVE-2020-36385" title="Kernel: Use-After-Free In Drivers/Infiniband/Core/Ucma.C Ctx Use-After-Free" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4777" id="RHSA-2021:4777-1" title="Rhsa-2021:4777-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1974319" id="1974319" title="Kernel: Use-After-Free In Drivers/Infiniband/Core/Ucma.C Ctx Use-After-Free" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4782-1</id><title>Openssh</title><description>Security Fix(es): 
* openssh: privilege escalation when AuthorizedKeysCommand or AuthorizedPrincipalsCommand are configured (CVE-2021-41617) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-11-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openssh-keycat" release="22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="7.4p1"><filename>openssh-keycat-7.4p1-22.el7_9.x86_64.rpm</filename><sum type="sha256">1335e1327219cdfad2139a4e7eaa935f3c4c420449714d6a512d2ad7e6a795bb</sum></package><package arch="x86_64" name="pam_ssh_agent_auth" release="2.22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="0.10.3"><filename>pam_ssh_agent_auth-0.10.3-2.22.el7_9.x86_64.rpm</filename><sum type="sha256">49828810f0d5030b8669f601621777242386c6f46b9bd24b8dd9e4ca8385d786</sum></package><package arch="x86_64" name="openssh-server-sysvinit" release="22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="7.4p1"><filename>openssh-server-sysvinit-7.4p1-22.el7_9.x86_64.rpm</filename><sum type="sha256">27656905c453087fb4326a46ae20f69ad6f7d15dc57ac689aebaa67cc3af2f94</sum></package><package arch="x86_64" name="openssh-askpass" release="22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="7.4p1"><filename>openssh-askpass-7.4p1-22.el7_9.x86_64.rpm</filename><sum type="sha256">75a95101038a61ef81f8bc905cca421e78a765ad8ec724b14df9f60dafa4100f</sum></package><package arch="x86_64" name="openssh-cavs" release="22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="7.4p1"><filename>openssh-cavs-7.4p1-22.el7_9.x86_64.rpm</filename><sum type="sha256">d30c8c5057e3ac699638dc6131d01513da36d2ff21ad586caf8b1db7245f854b</sum></package><package arch="i686" name="pam_ssh_agent_auth" release="2.22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="0.10.3"><filename>pam_ssh_agent_auth-0.10.3-2.22.el7_9.i686.rpm</filename><sum type="sha256">9a85d8a27fbec1addee6044fee82166d543cda136dd0f8fc573ca74c5603bab0</sum></package><package arch="x86_64" name="openssh-server" release="22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="7.4p1"><filename>openssh-server-7.4p1-22.el7_9.x86_64.rpm</filename><sum type="sha256">21c4cdb91e7b33fb22d39d57323aabd8e3c4fb3e247c96e350f6524439410552</sum></package><package arch="x86_64" name="openssh" release="22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="7.4p1"><filename>openssh-7.4p1-22.el7_9.x86_64.rpm</filename><sum type="sha256">09b902fcc03fa2ff326c9f6534af56d52092119319689489dffb5a5712b7c975</sum></package><package arch="x86_64" name="openssh-clients" release="22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="7.4p1"><filename>openssh-clients-7.4p1-22.el7_9.x86_64.rpm</filename><sum type="sha256">b9995430cbc9a2437eceddfaa6d5543cb9cbd27b88a6088bd12e826497f390ef</sum></package><package arch="x86_64" name="openssh-ldap" release="22.el7_9" src="openssh-7.4p1-22.el7_9.src.rpm" version="7.4p1"><filename>openssh-ldap-7.4p1-22.el7_9.x86_64.rpm</filename><sum type="sha256">56b9b8f33bd2f38acc39a956c5707e609a788f202e7bb1ef7bb1d94e97f0a875</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41617" id="CVE-2021-41617" title="Openssh: Privilege Escalation When Authorizedkeyscommand Or Authorizedprincipalscommand Are Configured" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4782" id="RHSA-2021:4782-1" title="Rhsa-2021:4782-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1999263" id="1999263" title="Frequent Sshd Segfaults" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2008291" id="2008291" title="Openssh: Privilege Escalation When Authorizedkeyscommand Or Authorizedprincipalscommand Are Configured" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4785-1</id><title>Rpm</title><description>Security Fix(es): 
* rpm: Signature checks bypass via corrupted rpm package (CVE-2021-20271) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-11-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="rpm" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-4.11.3-48.el7_9.x86_64.rpm</filename><sum type="sha256">f7034a7d37716143df45fce93a7db04674d4c0a11744c6eb7350d3e1a60eb9db</sum></package><package arch="x86_64" name="rpm-sign" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-sign-4.11.3-48.el7_9.x86_64.rpm</filename><sum type="sha256">2148e0ff7f1fb45bfbe7001dbe9999f9cc16425e4b449ed0f28ea41f97160d4b</sum></package><package arch="i686" name="rpm-libs" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-libs-4.11.3-48.el7_9.i686.rpm</filename><sum type="sha256">7c92bfe62ed2e6ef2cb5e34cf60d7b4aa3caf175bba0fe317879b73b083aae0f</sum></package><package arch="x86_64" name="rpm-plugin-systemd-inhibit" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-plugin-systemd-inhibit-4.11.3-48.el7_9.x86_64.rpm</filename><sum type="sha256">f3591c4301390b93035418fd9355051df0c9d22533775c0db02f26f09cfeb039</sum></package><package arch="i686" name="rpm-devel" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-devel-4.11.3-48.el7_9.i686.rpm</filename><sum type="sha256">6d05f18d940eead5c800f05dead657010bd1c5a78757f1f01327e008248045a0</sum></package><package arch="noarch" name="rpm-apidocs" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-apidocs-4.11.3-48.el7_9.noarch.rpm</filename><sum type="sha256">dc4d8039966f057bf378f252329a1b26c6ed9b5a59a03a821ec82d8bde9747fa</sum></package><package arch="x86_64" name="rpm-build-libs" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-build-libs-4.11.3-48.el7_9.x86_64.rpm</filename><sum type="sha256">e4ab10a468a9fcf6885626b9045f3268ef3701f891ba304325e720ce57edc005</sum></package><package arch="x86_64" name="rpm-devel" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-devel-4.11.3-48.el7_9.x86_64.rpm</filename><sum type="sha256">58728c0ff5dbe6ddf05dfe74e314a78fff2c53bad686f11f69bff0b570716884</sum></package><package arch="i686" name="rpm-build-libs" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-build-libs-4.11.3-48.el7_9.i686.rpm</filename><sum type="sha256">773c74a13a8be6aa2766b718b53e89e53c3775a190f09a90445d2f137ce8eea8</sum></package><package arch="x86_64" name="rpm-python" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-python-4.11.3-48.el7_9.x86_64.rpm</filename><sum type="sha256">6473424fa421cf2f447521a64a754fa76d07ca4d2690ec10f946d50a02507554</sum></package><package arch="noarch" name="rpm-cron" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-cron-4.11.3-48.el7_9.noarch.rpm</filename><sum type="sha256">cc1922c981027ee30335ca2191a223e6f40ecee1aa27e7947e200aba8cac9c80</sum></package><package arch="x86_64" name="rpm-build" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-build-4.11.3-48.el7_9.x86_64.rpm</filename><sum type="sha256">bfdfa81bef912c168e7a5e4efdb859656050c1d0919b9a919d4c220eff2a4a06</sum></package><package arch="x86_64" name="rpm-libs" release="48.el7_9" src="rpm-4.11.3-48.el7_9.src.rpm" version="4.11.3"><filename>rpm-libs-4.11.3-48.el7_9.x86_64.rpm</filename><sum type="sha256">d13ab2c849e7ef85d698c599f8393fe1b58c118eea4106a8822f496de2f3e097</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20271" id="CVE-2021-20271" title="Rpm: Signature Checks Bypass Via Corrupted Rpm Package" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4785" id="RHSA-2021:4785-1" title="Rhsa-2021:4785-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1934125" id="1934125" title="Rpm: Signature Checks Bypass Via Corrupted Rpm Package" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4788-1</id><title>Krb5</title><description>Security Fix(es): 
* krb5: NULL pointer dereference in process_tgs_req() in kdc/do_tgs_req.c via a FAST inner body that lacks server field (CVE-2021-37750) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-11-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libkadm5" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>libkadm5-1.15.1-51.el7_9.x86_64.rpm</filename><sum type="sha256">657875b63fe49b17f6d97ccfbd08597596af7bc12197093ebe1f5da0d1baf3b8</sum></package><package arch="x86_64" name="krb5-devel" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>krb5-devel-1.15.1-51.el7_9.x86_64.rpm</filename><sum type="sha256">ecdf5093b38c12d3549c5c3ac6069737e21d8645f28c6a7a47243443f5a9ecf9</sum></package><package arch="x86_64" name="krb5-libs" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>krb5-libs-1.15.1-51.el7_9.x86_64.rpm</filename><sum type="sha256">0b5693f5de9bae23654703f65e36c84e2787e104908f8c171faefffd3bf3caec</sum></package><package arch="i686" name="krb5-libs" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>krb5-libs-1.15.1-51.el7_9.i686.rpm</filename><sum type="sha256">8c4a640ef705264b41a8b8406ba75dac8812c740b23bacc3cb755b7db5d9e5d6</sum></package><package arch="i686" name="libkadm5" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>libkadm5-1.15.1-51.el7_9.i686.rpm</filename><sum type="sha256">8ecd0dda63f8fdef85f3be10611b669d2dc8f8820c41e51929957203919c59c6</sum></package><package arch="x86_64" name="krb5-server" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>krb5-server-1.15.1-51.el7_9.x86_64.rpm</filename><sum type="sha256">edbefd5f50c0ab6f8f347753a30e6cabb9e3a9a91e3edb0140a39c295c478976</sum></package><package arch="x86_64" name="krb5-server-ldap" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>krb5-server-ldap-1.15.1-51.el7_9.x86_64.rpm</filename><sum type="sha256">2736348c2e593224a35ad17d2baba550a0f3f9d925bb28687786378dafabf2ae</sum></package><package arch="x86_64" name="krb5-pkinit" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>krb5-pkinit-1.15.1-51.el7_9.x86_64.rpm</filename><sum type="sha256">e6ef83a4934b858afe592fb93a7365e981aafa924b55b6d515ce30fdd084bc99</sum></package><package arch="i686" name="krb5-devel" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>krb5-devel-1.15.1-51.el7_9.i686.rpm</filename><sum type="sha256">b17db7a9e0d3401fff1a6973e133a3b97a5a42ec6e9f4e54e4533c6d67dd503f</sum></package><package arch="x86_64" name="krb5-workstation" release="51.el7_9" src="krb5-1.15.1-51.el7_9.src.rpm" version="1.15.1"><filename>krb5-workstation-1.15.1-51.el7_9.x86_64.rpm</filename><sum type="sha256">518e643fae6225e2a0bf9f417845ac6057b93e97fd4db403cd1264f533781d7e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37750" id="CVE-2021-37750" title="Krb5: Null Pointer Dereference In Process_Tgs_Req() In Kdc/Do_Tgs_Req.C Via A Fast Inner Body That Lacks Server Field" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4788" id="RHSA-2021:4788-1" title="Rhsa-2021:4788-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1996834" id="1996834" title="Krb5: Null Pointer Dereference In Process_Tgs_Req() In Kdc/Do_Tgs_Req.C Via A Fast Inner Body That Lacks Server Field" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4904-1</id><title>Nss</title><description>Security Fix(es): 
* nss: Memory corruption in decodeECorDsaSignature with DSA signatures (and  RSA-PSS) (CVE-2021-43527) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>critical</severity><release>Scientific Linux</release><issued date="2021-12-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="nss" release="4.el7_9" src="nss-3.67.0-4.el7_9.src.rpm" version="3.67.0"><filename>nss-3.67.0-4.el7_9.i686.rpm</filename><sum type="sha256">8b39d7bbdd0b7c87e89fa90555935b23723b4de00bcb3c620b9244d895da45aa</sum></package><package arch="i686" name="nss-pkcs11-devel" release="4.el7_9" src="nss-3.67.0-4.el7_9.src.rpm" version="3.67.0"><filename>nss-pkcs11-devel-3.67.0-4.el7_9.i686.rpm</filename><sum type="sha256">d80c7a1e8ecfa6c65521a83cc7d8145ef3b8cf9624d3ccb14ffb2dd5a7d06b5f</sum></package><package arch="x86_64" name="nss" release="4.el7_9" src="nss-3.67.0-4.el7_9.src.rpm" version="3.67.0"><filename>nss-3.67.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">9fa543b38cbcd32000f90732cd5dc04f7e6bddcfeaf65b2e1563f345ed58a0bd</sum></package><package arch="x86_64" name="nss-sysinit" release="4.el7_9" src="nss-3.67.0-4.el7_9.src.rpm" version="3.67.0"><filename>nss-sysinit-3.67.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">b66372dc9a21d68aeaf19da7827403ad84fa245fa8e22058d891106701661d8b</sum></package><package arch="i686" name="nss-devel" release="4.el7_9" src="nss-3.67.0-4.el7_9.src.rpm" version="3.67.0"><filename>nss-devel-3.67.0-4.el7_9.i686.rpm</filename><sum type="sha256">96ac14ca35823c9a4ac7663af959bef6f678a125fd197e01b94d15df2335cfa4</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="4.el7_9" src="nss-3.67.0-4.el7_9.src.rpm" version="3.67.0"><filename>nss-pkcs11-devel-3.67.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">fd5c09387dabef2c766f98684d44e391053a13a1b9c4bfb7baa704ea908d3431</sum></package><package arch="x86_64" name="nss-devel" release="4.el7_9" src="nss-3.67.0-4.el7_9.src.rpm" version="3.67.0"><filename>nss-devel-3.67.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">e37be7a62e6a240e35e8b7fb7ac856bcdae43d435bf76244e80e800210210b1e</sum></package><package arch="x86_64" name="nss-tools" release="4.el7_9" src="nss-3.67.0-4.el7_9.src.rpm" version="3.67.0"><filename>nss-tools-3.67.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">b53f0ac22d348471aaf4297e58721ca11ae4f57122869e47dc1d51bababbcdaf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43527" id="CVE-2021-43527" title="Nss: Memory Corruption In Decodeecordsasignature With Dsa Signatures (And Rsa-Pss)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4904" id="RHSA-2021:4904-1" title="Rhsa-2021:4904-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2024370" id="2024370" title="Nss: Memory Corruption In Decodeecordsasignature With Dsa Signatures (And Rsa-Pss)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:4913-1</id><title>Mailman</title><description>Security Fix(es): 
* mailman: CSRF token bypass allows to perform CSRF attacks and account takeover (CVE-2021-42097) 
* mailman: CSRF token bypass allows to perform CSRF attacks and admin takeover (CVE-2021-44227) 
* mailman: CSRF protection missing in the user options page (CVE-2016-6893) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-12-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="3" name="mailman" release="30.el7_9.2" src="mailman-2.1.15-30.el7_9.2.src.rpm" version="2.1.15"><filename>mailman-2.1.15-30.el7_9.2.x86_64.rpm</filename><sum type="sha256">a6d403a8414332a58f7713c4db942ad7216a5f34f7c6a7e1d4dcfe28cb8bd819</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6893" id="CVE-2016-6893" title="Mailman: Csrf Protection Missing In The User Options Page" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42097" id="CVE-2021-42097" title="Mailman: Csrf Token Bypass Allows To Perform Csrf Attacks And Account Takeover" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44227" id="CVE-2021-44227" title="Mailman: Csrf Token Bypass Allows To Perform Csrf Attacks And Admin Takeover" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:4913" id="RHSA-2021:4913-1" title="Rhsa-2021:4913-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1370155" id="1370155" title="Mailman: Csrf Protection Missing In The User Options Page" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2020568" id="2020568" title="Mailman: Csrf Token Bypass Allows To Perform Csrf Attacks And Account Takeover" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2026862" id="2026862" title="Mailman: Csrf Token Bypass Allows To Perform Csrf Attacks And Admin Takeover" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:5014-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.4.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 
* Mozilla: URL leakage when navigating while executing asynchronous function (CVE-2021-43536) 
* Mozilla: Heap buffer overflow when using structured clone (CVE-2021-43537) 
* Mozilla: Missing fullscreen and pointer lock notification when requesting  both (CVE-2021-43538) 
* Mozilla: GC rooting failure when calling wasm instance methods (CVE-2021-43539) 
* Mozilla: External protocol handler parameters were unescaped (CVE-2021-43541) 
* Mozilla: XMLHttpRequest error codes could have leaked the existence of an  external protocol handler (CVE-2021-43542) 
* Mozilla: Bypass of CSP sandbox directive when embedding (CVE-2021-43543) 
* Mozilla: Denial of Service when using the Location API in a loop (CVE-2021-43545) 
* Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed (CVE-2021-43546) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-12-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-91.4.0-1.el7_9.src.rpm" version="91.4.0"><filename>firefox-91.4.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">74b34b94c0496a052d766ef75b3959f4f21d66d466f6f73698d6bb9397a1ea3b</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-91.4.0-1.el7_9.src.rpm" version="91.4.0"><filename>firefox-91.4.0-1.el7_9.i686.rpm</filename><sum type="sha256">47df76129a2edadd96529cb6ecc6a39c43c555f5ec0932f3f345fdca39a68cdd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43536" id="CVE-2021-43536" title="Mozilla: Url Leakage When Navigating While Executing Asynchronous Function" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43537" id="CVE-2021-43537" title="Mozilla: Heap Buffer Overflow When Using Structured Clone" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43538" id="CVE-2021-43538" title="Mozilla: Missing Fullscreen And Pointer Lock Notification When Requesting Both" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43539" id="CVE-2021-43539" title="Mozilla: Gc Rooting Failure When Calling Wasm Instance Methods" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43541" id="CVE-2021-43541" title="Mozilla: External Protocol Handler Parameters Were Unescaped" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43542" id="CVE-2021-43542" title="Mozilla: Xmlhttprequest Error Codes Could Have Leaked The Existence Of An External Protocol Handler" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43543" id="CVE-2021-43543" title="Mozilla: Bypass Of Csp Sandbox Directive When Embedding" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43545" id="CVE-2021-43545" title="Mozilla: Denial Of Service When Using The Location Api In A Loop" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43546" id="CVE-2021-43546" title="Mozilla: Cursor Spoofing Could Overlay User Interface When Native Cursor Is Zoomed" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:5014" id="RHSA-2021:5014-1" title="Rhsa-2021:5014-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030105" id="2030105" title="Mozilla: Url Leakage When Navigating While Executing Asynchronous Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030106" id="2030106" title="Mozilla: Heap Buffer Overflow When Using Structured Clone" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030109" id="2030109" title="Mozilla: Missing Fullscreen And Pointer Lock Notification When Requesting Both" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030110" id="2030110" title="Mozilla: Gc Rooting Failure When Calling Wasm Instance Methods" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030111" id="2030111" title="Mozilla: External Protocol Handler Parameters Were Unescaped" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030112" id="2030112" title="Mozilla: Xmlhttprequest Error Codes Could Have Leaked The Existence Of An External Protocol Handler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030113" id="2030113" title="Mozilla: Bypass Of Csp Sandbox Directive When Embedding" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030114" id="2030114" title="Mozilla: Denial Of Service When Using The Location Api In A Loop" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030115" id="2030115" title="Mozilla: Cursor Spoofing Could Overlay User Interface When Native Cursor Is Zoomed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030116" id="2030116" title="Mozilla: Memory Safety Bugs Fixed In Firefox 95 And Firefox Esr 91.4" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:5046-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.4.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 95 and Firefox ESR 91.4 
* Mozilla: URL leakage when navigating while executing asynchronous function (CVE-2021-43536) 
* Mozilla: Heap buffer overflow when using structured clone (CVE-2021-43537) 
* Mozilla: Missing fullscreen and pointer lock notification when requesting  both (CVE-2021-43538) 
* Mozilla: GC rooting failure when calling wasm instance methods (CVE-2021-43539) 
* Mozilla: External protocol handler parameters were unescaped (CVE-2021-43541) 
* Mozilla: XMLHttpRequest error codes could have leaked the existence of an  external protocol handler (CVE-2021-43542) 
* Mozilla: Bypass of CSP sandbox directive when embedding (CVE-2021-43543) 
* Mozilla: JavaScript unexpectedly enabled for the composition area (CVE-2021-43528) 
* Mozilla: Denial of Service when using the Location API in a loop (CVE-2021-43545) 
* Mozilla: Cursor spoofing could overlay user interface when native cursor is zoomed (CVE-2021-43546) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-12-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="3.el7_9" src="thunderbird-91.4.0-3.el7_9.src.rpm" version="91.4.0"><filename>thunderbird-91.4.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">6d5614c26c0384912aebe50dc573bc0865fb463afb90ed78e385c01d485f905e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43528" id="CVE-2021-43528" title="Mozilla: Javascript Unexpectedly Enabled For The Composition Area" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43536" id="CVE-2021-43536" title="Mozilla: Url Leakage When Navigating While Executing Asynchronous Function" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43537" id="CVE-2021-43537" title="Mozilla: Heap Buffer Overflow When Using Structured Clone" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43538" id="CVE-2021-43538" title="Mozilla: Missing Fullscreen And Pointer Lock Notification When Requesting Both" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43539" id="CVE-2021-43539" title="Mozilla: Gc Rooting Failure When Calling Wasm Instance Methods" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43541" id="CVE-2021-43541" title="Mozilla: External Protocol Handler Parameters Were Unescaped" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43542" id="CVE-2021-43542" title="Mozilla: Xmlhttprequest Error Codes Could Have Leaked The Existence Of An External Protocol Handler" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43543" id="CVE-2021-43543" title="Mozilla: Bypass Of Csp Sandbox Directive When Embedding" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43545" id="CVE-2021-43545" title="Mozilla: Denial Of Service When Using The Location Api In A Loop" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-43546" id="CVE-2021-43546" title="Mozilla: Cursor Spoofing Could Overlay User Interface When Native Cursor Is Zoomed" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:5046" id="RHSA-2021:5046-1" title="Rhsa-2021:5046-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030105" id="2030105" title="Mozilla: Url Leakage When Navigating While Executing Asynchronous Function" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030106" id="2030106" title="Mozilla: Heap Buffer Overflow When Using Structured Clone" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030109" id="2030109" title="Mozilla: Missing Fullscreen And Pointer Lock Notification When Requesting Both" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030110" id="2030110" title="Mozilla: Gc Rooting Failure When Calling Wasm Instance Methods" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030111" id="2030111" title="Mozilla: External Protocol Handler Parameters Were Unescaped" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030112" id="2030112" title="Mozilla: Xmlhttprequest Error Codes Could Have Leaked The Existence Of An External Protocol Handler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030113" id="2030113" title="Mozilla: Bypass Of Csp Sandbox Directive When Embedding" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030114" id="2030114" title="Mozilla: Denial Of Service When Using The Location Api In A Loop" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030115" id="2030115" title="Mozilla: Cursor Spoofing Could Overlay User Interface When Native Cursor Is Zoomed" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030116" id="2030116" title="Mozilla: Memory Safety Bugs Fixed In Firefox 95 And Firefox Esr 91.4" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030137" id="2030137" title="Mozilla: Javascript Unexpectedly Enabled For The Composition Area" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:5192</id><title>Important: Samba Security And Bug Fix Update</title><description>Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: Active Directory (AD) domain user could become root on domain members (CVE-2020-25717) * samba: SMB1 client connections can be downgraded to plaintext authentication (CVE-2016-2124)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Backport IDL changes to harden Kerberos communication (BZ#2021428)
</description><severity>important</severity><issued date="2021-12-17 11:16:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ctdb" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>ctdb-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">ca4344699b290998b563050811d67e398006832a01d730ad20eb66ca9aedccc6</sum></package><package arch="x86_64" name="ctdb-tests" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>ctdb-tests-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">8c8da384268bf5fccba4ff8f4c52f415a39ff3b3e604d09c753e64e63ed19f0b</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124" id="CVE-2016-2124" title="Cve-2016-2124" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717" id="CVE-2020-25717" title="Cve-2020-25717" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:5192" id="RHSA-2021:5192" title="Important: Samba Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2021428" id="2021428" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:5192-1</id><title>Samba</title><description>Security Fix(es): 
* samba: Active Directory (AD) domain user could become root on domain members (CVE-2020-25717) 
* samba: SMB1 client connections can be downgraded to plaintext authentication (CVE-2016-2124) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Backport IDL changes to harden Kerberos communication</description><severity>important</severity><release>Scientific Linux</release><issued date="2021-12-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="samba-winbind-krb5-locator" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-krb5-locator-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">fccd7fac0b4e430d2265335820d03a03444d1e394c6c12895b62940562f6325e</sum></package><package arch="x86_64" name="samba-krb5-printing" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-krb5-printing-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">76c22fc6f283b0abb8ce92e3a40f5caf50817a1dfcf37895835e1b5ed36900e2</sum></package><package arch="x86_64" name="libwbclient-devel" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">77f6e67d80e62266c9f6edc5a7c0eb4ac0abc20201b3b0cee0944a0eb661cdfe</sum></package><package arch="x86_64" name="samba-client" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-client-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">83f58f79e439d0f5d99de769d791288e5777785799f835f872bf72a6341ce621</sum></package><package arch="x86_64" name="samba-test" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-test-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">58ebd96e52fbc22359938a509237c70a35cd6cedcca2010c4dd62f96fa8acca9</sum></package><package arch="i686" name="samba-client-libs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">91ef15b825a8a5d761cfc6a0ddbf3e48758b34e51feaf904413244d9d7708562</sum></package><package arch="i686" name="libwbclient" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">40d1c0855c8259f9bbfd4f2f45b239b79c8d5101f2df884d86853c1abbf6af4b</sum></package><package arch="x86_64" name="samba" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">d3727b6c48f0a4f9d908e8b6e3427846e6a80c5377ef0e40301e5a9e7df0b642</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-vfs-glusterfs-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">e9f03c3e2696c8256a55a620360f0cd4c4a8b1e70b6b7d4e664648685f58c246</sum></package><package arch="i686" name="samba-devel" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">a56816dfaf5e2c393a7679576aeb6cc71251b81d1270e49c1f0f695c5cbe8e3b</sum></package><package arch="x86_64" name="samba-dc-libs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-libs-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">8b8242d3d2b9651ca69ed606b593554940a9da7af796f5e5866f0fda5b911185</sum></package><package arch="i686" name="samba-python" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">1c50d68275ae3e786b12ed0941a5c865dbcae209edfc6da0b1c4062fae0671aa</sum></package><package arch="x86_64" name="samba-dc" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">7a05cc305cfdb6a7a873e3293a8e8ecc20f0ce56143be6a169128e274fe98076</sum></package><package arch="i686" name="samba-common-libs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">40bde39bd1fa9e632258146bb71fa6fa62cb8bc173df3bbfc4fb3814230c232f</sum></package><package arch="x86_64" name="libsmbclient-devel" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">f2900e10160efa1fa6da0fd4cbb2306141c66e646a071c4429432aae2b178992</sum></package><package arch="x86_64" name="libsmbclient" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">d82ae98bd60973a99849a035947c743e3b1bdf17777141b2c91e4015b00d9444</sum></package><package arch="x86_64" name="samba-client-libs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">59b11d7dca5070f0ab7f07fe1e2d366d35e089ef6fde9e652920bce0784b6a14</sum></package><package arch="x86_64" name="samba-python" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">226f20e710f0dba58f76df93ede8175a3f7218e2a450678dcce302aa7a77568b</sum></package><package arch="x86_64" name="samba-test-libs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">8b9125573a1c10f278cafe10823e8638d0d6d3fa8721edff72ee250d1745ce7f</sum></package><package arch="x86_64" name="libwbclient" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">11aa4dd9f1070cdccbef45593aa5eb8d11820e0a343f0365224725c2ee6c6052</sum></package><package arch="x86_64" name="samba-devel" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">7451c9daf89660e83e84d2e64c25253c6c1eaa71907a8b9a084dfac0f83d1224</sum></package><package arch="noarch" name="samba-pidl" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-pidl-4.10.16-17.el7_9.noarch.rpm</filename><sum type="sha256">006b198f8d806c3728f5028d288a95f9a4929068b54635abc2aa1bb22bd2098c</sum></package><package arch="i686" name="samba-libs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">20421f25bfb9f83da767bc8bad49e16734ccea5cb08d6be240ecc216c1c13151</sum></package><package arch="i686" name="samba-test-libs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">d2cea758a40b3c562a7e1701a61791a582d91409b79cdc5bec48a26f4ab4ddba</sum></package><package arch="x86_64" name="samba-libs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">3cdbb5d29cf8a9de05a3ea1e3ed041f63ace5c469c6214e1a816a6962d9a5f16</sum></package><package arch="x86_64" name="samba-python-test" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-python-test-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">885931f0c44184190ab523e79e44757c7e4994ab059d8d66906a695fecc68691</sum></package><package arch="i686" name="libwbclient-devel" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">a993a893e2c3b713749c49f8fd13e03fe56eb514b45e6b84a7d608baf8248361</sum></package><package arch="x86_64" name="samba-common-tools" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-common-tools-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">37508a8a808cd8d930f62f8983ee6ee2e8543745cae73cf163d31fd448aa7906</sum></package><package arch="noarch" name="samba-common" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-common-4.10.16-17.el7_9.noarch.rpm</filename><sum type="sha256">0a5637aac7e2ebbbb6d8f624450c071ab61caa086eecec041becd1520c4cacde</sum></package><package arch="x86_64" name="samba-winbind" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">9a52b6824a9124e6c234bf305315ff6530e5057c88159a3306840461f7c19985</sum></package><package arch="x86_64" name="samba-winbind-clients" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-clients-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">71b55f6e1c2158774b901d97db832afc225ba2882d88b13945557ae7a2e820da</sum></package><package arch="i686" name="samba-winbind-modules" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">0a4d62969165153d51f06cbf88222fa0a88533589740e2e7b6da6a7395b1be82</sum></package><package arch="x86_64" name="samba-common-libs" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">91f4fae3ae01f88dd4c5667b02cbe12fc81ce1878891b1f39708aa228f3ca2a9</sum></package><package arch="x86_64" name="samba-winbind-modules" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-17.el7_9.x86_64.rpm</filename><sum type="sha256">dd3a2f088f535f905a65bea23360486fe6e6a11d2749465eeebbd0ccdc1bfc14</sum></package><package arch="i686" name="libsmbclient" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">aea5935636f86272694d14548ee666e2d1eba32ca6bf57b762132eff600405ec</sum></package><package arch="i686" name="libsmbclient-devel" release="17.el7_9" src="samba-4.10.16-17.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-17.el7_9.i686.rpm</filename><sum type="sha256">d2c8370a21a41827d547e2fb4461cc544a60eb49e696fb1f72367057fe00be37</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2124" id="CVE-2016-2124" title="Samba: Smb1 Client Connections Can Be Downgraded To Plaintext Authentication" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25717" id="CVE-2020-25717" title="Samba: Active Directory (Ad) Domain User Could Become Root On Domain Members" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:5192" id="RHSA-2021:5192-1" title="Rhsa-2021:5192-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019660" id="2019660" title="Samba: Smb1 Client Connections Can Be Downgraded To Plaintext Authentication" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2019672" id="2019672" title="Samba: Active Directory (Ad) Domain User Could Become Root On Domain Members" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:5195</id><title>Moderate: Ipa Security And Bug Fix Update</title><description>Red Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* samba: Samba AD DC did not always rely on the SID and PAC in Kerberos tickets (CVE-2020-25719)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* RHEL 8.6 IPA Replica Failed to configure PKINIT setup against a RHEL 7.9 IPA server (BZ#2025848)
</description><severity>moderate</severity><issued date="2021-12-17 11:16:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ipa-client-common" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>ipa-client-common-4.6.8-5.sl7_9.10.noarch.rpm</filename><sum type="sha256">ba3e65b75de0615b30f31251addbebf9a381c5752ce35c0c8a85890b19805a65</sum></package><package arch="noarch" name="ipa-server-dns" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>ipa-server-dns-4.6.8-5.sl7_9.10.noarch.rpm</filename><sum type="sha256">8a1a1d7f5a6a84ea98aedaa19e07359a51a29a38e53fcb4cf267c116c5935f31</sum></package><package arch="noarch" name="python2-ipaclient" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>python2-ipaclient-4.6.8-5.sl7_9.10.noarch.rpm</filename><sum type="sha256">dcd33ccebd465c4e937987026c0aac5c208598b470112e953f5a7741b41e54f6</sum></package><package arch="noarch" name="ipa-server-common" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>ipa-server-common-4.6.8-5.sl7_9.10.noarch.rpm</filename><sum type="sha256">b9172dd5d1dca7fe8e6849ebb3f238b45232c929509e28d9c9e7249fe8a7e1cb</sum></package><package arch="x86_64" name="ipa-client" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>ipa-client-4.6.8-5.sl7_9.10.x86_64.rpm</filename><sum type="sha256">4416f3ec1635682299d01ba62964a7f2eee00c3e1a9e659b724a44935cc91f2a</sum></package><package arch="noarch" name="python2-ipalib" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>python2-ipalib-4.6.8-5.sl7_9.10.noarch.rpm</filename><sum type="sha256">dfa9f7b90e8b4377d664998d7a0a31f0703626732069b265b202764c8ca2af1f</sum></package><package arch="noarch" name="ipa-common" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>ipa-common-4.6.8-5.sl7_9.10.noarch.rpm</filename><sum type="sha256">0fb158bf0f87a788649c85f3f6ee3c6e56d6139d057da35d182da389253ac3e2</sum></package><package arch="x86_64" name="ipa-server" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>ipa-server-4.6.8-5.sl7_9.10.x86_64.rpm</filename><sum type="sha256">e96afb955b6d688374ff418cd38f41fc4308c48b8b3fa2bd2ec2e00e78be45ea</sum></package><package arch="noarch" name="python2-ipaserver" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>python2-ipaserver-4.6.8-5.sl7_9.10.noarch.rpm</filename><sum type="sha256">b0562c5297aa37456cdcec9b40950cfadd9daac380e45107705d9b9faa4ac73a</sum></package><package arch="noarch" name="ipa-python-compat" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>ipa-python-compat-4.6.8-5.sl7_9.10.noarch.rpm</filename><sum type="sha256">d3e8bcdc368785fe79dc0c38fcd468781d6518e60ce4d76b62b2e335f834feb2</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="5.sl7_9.10" src="ipa-4.6.8-5.sl7_9.10.src.rpm" version="4.6.8"><filename>ipa-server-trust-ad-4.6.8-5.sl7_9.10.x86_64.rpm</filename><sum type="sha256">a253d56aeba91f49e9be09abdc6d8f19f1798d24adeb6e1d78400025bd5d965c</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25719" id="CVE-2020-25719" title="Cve-2020-25719" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:5195" id="RHSA-2021:5195" title="Moderate: Ipa Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2025848" id="2025848" title="2025848 &#8211; Rhel 8.6 Ipa Replica Failed To Configure Pkinit Setup Against A Rhel 7.9 Ipa Server" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2021:5206-1</id><title>Log4J</title><description>Security Fix(es): 
* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSAppender (CVE-2021-4104) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2021-12-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="log4j-javadoc" release="17.el7_4" src="log4j-1.2.17-17.el7_4.src.rpm" version="1.2.17"><filename>log4j-javadoc-1.2.17-17.el7_4.noarch.rpm</filename><sum type="sha256">7f8dcfcca0c95f2356405ffbe58f163d9ae1e29fe844c9c35cf72582717a9086</sum></package><package arch="noarch" name="log4j" release="17.el7_4" src="log4j-1.2.17-17.el7_4.src.rpm" version="1.2.17"><filename>log4j-1.2.17-17.el7_4.noarch.rpm</filename><sum type="sha256">51f4e6b324089f9d26b9d4c167770f5ae0f9302e00e36a9a1b7db5c7431ca091</sum></package><package arch="noarch" name="log4j-manual" release="17.el7_4" src="log4j-1.2.17-17.el7_4.src.rpm" version="1.2.17"><filename>log4j-manual-1.2.17-17.el7_4.noarch.rpm</filename><sum type="sha256">4ce766ab47665d246a4f108b603d6d797967629d900cf570617727d883ddd1a2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4104" id="CVE-2021-4104" title="Log4J: Remote Code Execution In Log4J 1.X When Application Is Configured To Use Jmsappender" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2021:5206" id="RHSA-2021:5206-1" title="Rhsa-2021:5206-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2031667" id="2031667" title="Log4J: Remote Code Execution In Log4J 1.X When Application Is Configured To Use Jmsappender" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0003-1</id><title>Xorg-X11-Server</title><description>Security Fix(es): 
* xorg-x11-server: SProcRenderCompositeGlyphs out-of-bounds access (CVE-2021-4008) 
* xorg-x11-server: SProcXFixesCreatePointerBarrier out-of-bounds access (CVE-2021-4009) 
* xorg-x11-server: SProcScreenSaverSuspend out-of-bounds access (CVE-2021-4010) 
* xorg-x11-server: SwapCreateRegister out-of-bounds access (CVE-2021-4011) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-01-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-devel" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-17.el7_9.x86_64.rpm</filename><sum type="sha256">98268e97294e5e61cd5ae9724a60f2d86fdb78bfad8b96a6d4cebe683dc5f506</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-17.el7_9.x86_64.rpm</filename><sum type="sha256">fbd34b80cced270b813bbef467a2d12255003967620e2c28bf4de0741c79225b</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-17.el7_9.x86_64.rpm</filename><sum type="sha256">2e1018a8d0bd51dff6d83ef948418f762c203d239f0020269fee7500538ab40d</sum></package><package arch="noarch" name="xorg-x11-server-source" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-17.el7_9.noarch.rpm</filename><sum type="sha256">7f5af24d0f6249d57137eb7f5f380a7f13c8aa5cfd9a914b8c5eff9df5c764d7</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-17.el7_9.x86_64.rpm</filename><sum type="sha256">fce562c16c7cdf9d0f147b567379b38071b0d934b574fa1d04007d19ddccc0b4</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-17.el7_9.x86_64.rpm</filename><sum type="sha256">efd6b680b414d75f5dee35c343ddf2e3ee2b0587adf5694202a130037cee4454</sum></package><package arch="i686" name="xorg-x11-server-devel" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-17.el7_9.i686.rpm</filename><sum type="sha256">d100a533e292e9d1465d3b4238aaadd6e2075b81b3500f467bb26ae697b23fe5</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-17.el7_9.x86_64.rpm</filename><sum type="sha256">b5e7aa52ca58da7977f27f333a17e9eacfc6fb54dd54d3390556009264f92652</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-17.el7_9.x86_64.rpm</filename><sum type="sha256">983e196d913b2396c61c6ac75d70687482dd096698a372f2f6ece8cd8f1cbeec</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="17.el7_9" src="xorg-x11-server-1.20.4-17.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-17.el7_9.x86_64.rpm</filename><sum type="sha256">b01cce56ff3e9feb30957a95d43de3e6e97a9a2181e69dbf4048888095225636</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4008" id="CVE-2021-4008" title="Xorg-X11-Server: Sprocrendercompositeglyphs Out-Of-Bounds Access" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4009" id="CVE-2021-4009" title="Xorg-X11-Server: Sprocxfixescreatepointerbarrier Out-Of-Bounds Access" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4010" id="CVE-2021-4010" title="Xorg-X11-Server: Sprocscreensaversuspend Out-Of-Bounds Access" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4011" id="CVE-2021-4011" title="Xorg-X11-Server: Swapcreateregister Out-Of-Bounds Access" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0003" id="RHSA-2022:0003-1" title="Rhsa-2022:0003-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2026059" id="2026059" title="Xorg-X11-Server: Sprocrendercompositeglyphs Out-Of-Bounds Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2026072" id="2026072" title="Xorg-X11-Server: Sprocxfixescreatepointerbarrier Out-Of-Bounds Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2026073" id="2026073" title="Xorg-X11-Server: Sprocscreensaversuspend Out-Of-Bounds Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2026074" id="2026074" title="Xorg-X11-Server: Swapcreateregister Out-Of-Bounds Access" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0059-1</id><title>Webkitgtk4</title><description>Security Fix(es): 
* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30858) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-01-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="webkitgtk4-devel" release="3.el7" src="webkitgtk4-2.28.2-3.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-devel-2.28.2-3.el7.i686.rpm</filename><sum type="sha256">2534a83763bd174b50e81a306838d5b1006a9b89f35e76680ee67f4df97cac7c</sum></package><package arch="x86_64" name="webkitgtk4-jsc" release="3.el7" src="webkitgtk4-2.28.2-3.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-jsc-2.28.2-3.el7.x86_64.rpm</filename><sum type="sha256">218df31a4ff2a0a7c341dc484c2c348e8a2205db49147ccd5448a78cb5e6d78d</sum></package><package arch="i686" name="webkitgtk4-jsc" release="3.el7" src="webkitgtk4-2.28.2-3.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-jsc-2.28.2-3.el7.i686.rpm</filename><sum type="sha256">ef77d62e815cf45cec69e28567cd8079f03beeb766ce1c1d846dafb56a016f2d</sum></package><package arch="noarch" name="webkitgtk4-doc" release="3.el7" src="webkitgtk4-2.28.2-3.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-doc-2.28.2-3.el7.noarch.rpm</filename><sum type="sha256">953e6f26fc29f36acfa9015d8c95a5e41f4cac5622b8b90ce20ddbdfd957da6f</sum></package><package arch="x86_64" name="webkitgtk4-jsc-devel" release="3.el7" src="webkitgtk4-2.28.2-3.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-jsc-devel-2.28.2-3.el7.x86_64.rpm</filename><sum type="sha256">ca992fdc96462b479e549876ac8e275a99e37a6add39225543c90ba2d0e27493</sum></package><package arch="i686" name="webkitgtk4" release="3.el7" src="webkitgtk4-2.28.2-3.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-2.28.2-3.el7.i686.rpm</filename><sum type="sha256">eda71bba7578ebc4415bbfd8c43813920c6be2f8bba1fbc14c0d39a8b5c3222b</sum></package><package arch="x86_64" name="webkitgtk4" release="3.el7" src="webkitgtk4-2.28.2-3.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-2.28.2-3.el7.x86_64.rpm</filename><sum type="sha256">643bdebe39d488dd7e5e47699ed2d8ae3227bd5f7d2a182385b9c73152180c5e</sum></package><package arch="i686" name="webkitgtk4-jsc-devel" release="3.el7" src="webkitgtk4-2.28.2-3.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-jsc-devel-2.28.2-3.el7.i686.rpm</filename><sum type="sha256">0e22c4a0c88f6a07e46cbb0c1b090888a8ceb611667f8cdba8d5f6303987644d</sum></package><package arch="x86_64" name="webkitgtk4-devel" release="3.el7" src="webkitgtk4-2.28.2-3.el7.src.rpm" version="2.28.2"><filename>webkitgtk4-devel-2.28.2-3.el7.x86_64.rpm</filename><sum type="sha256">6c3714b086b57365575f5ab43c8aa2a05af23e0346f9ec215cb71c79098d07b5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858" id="CVE-2021-30858" title="Webkitgtk: Use-After-Free Leading To Arbitrary Code Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0059" id="RHSA-2022:0059-1" title="Rhsa-2022:0059-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2006099" id="2006099" title="Webkitgtk: Use-After-Free Leading To Arbitrary Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0063-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: perf_event_parse_addr_filter memory (CVE-2020-25704) 
* kernel: fuse: fuse_do_getattr() calls make_bad_inode() in inappropriate situations (CVE-2020-36322) 
* kernel: Heap buffer overflow in firedtv driver (CVE-2021-42739) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
*    A gfs2 withdrawal occurs function = gfs2_setbit, file = fs/gfs2/rgrp.c, line = 109 
*    i40e SR-IOV TX driver issue detected on VF 7 - VF connectivity  loose after VF down/up duplicate ACK not sent when expected 
*    [kernel-debug] BUG: bad unlock balance detected! when running LTP read_all  *    Rudimentary support for AMD Milan - Call init_amd_zn() om Family 19h processors 
*    A VM with &lt;=8 CPUs handles all the Mellanox NIC interrupts on CPU0 only, causing low performance 
*    fix _PSD override quirk for AMD family 19h+ 
*    generic_file_aio_read returns 0 when interrupted early with a fatal signal</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-01-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">e1b4eb8495df8c8e404e29027bf75bfcf446e9c72f4cdce9e885ad4c0f84c74c</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">fc7930b80c5c957b3c11ca0a8fdc8253b5c592005218c195013b5af27ad52fe0</sum></package><package arch="x86_64" name="kernel" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">50fa58d82abc229771879df7ea1c31833d20c8e5648aaca94f796d4454ce47d9</sum></package><package arch="x86_64" name="kernel-devel" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">efe2465efe72478457ad7248132950834a973a31d7e32dd72bd6bb7a5af678d1</sum></package><package arch="x86_64" name="kernel-debug" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">b7cbee4f83236379820e3ad7c8c99517ac58062735b6b92fee460df377354e5a</sum></package><package arch="x86_64" name="perf" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">3bf6fe2ebcdec2cd7c6947ca654995807dbd5079be69a53f4dd4e83bbde2ce4a</sum></package><package arch="x86_64" name="kernel-headers" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">dd7cdc23048dcb8f3deb188047954c6e8a860ec543c1141af80401bcbb544cb9</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.53.1.el7.noarch.rpm</filename><sum type="sha256">a4e8fae7b13733df408e4e6b47ed996d16189f5d7fcad211b6cdbc1b3f21dfd0</sum></package><package arch="x86_64" name="kernel-tools" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">72148e3dc5d1b8f06e71978c4d49a61a9afb83ba56f2b1c4528c0fb9d07714ca</sum></package><package arch="x86_64" name="python-perf" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">5a97314cb3e63a379d542f48205763959151da815d6b1663057b2eda47725517</sum></package><package arch="noarch" name="kernel-doc" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.53.1.el7.noarch.rpm</filename><sum type="sha256">530aea97981d5feda154cd41631c4a1220b291e183601d7ab2456dae5d5dc721</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">d1e6c49f3b347b404269e242437ec0ca7f365b201170769917b0b0cc96a0e02a</sum></package><package arch="x86_64" name="bpftool" release="1160.53.1.el7" src="kernel-3.10.0-1160.53.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.53.1.el7.x86_64.rpm</filename><sum type="sha256">643ad950e55e74f544c41b24cd7c4a2e1baf65a5802de9e20573f45b31bb27d8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25704" id="CVE-2020-25704" title="Kernel: Perf_Event_Parse_Addr_Filter Memory" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36322" id="CVE-2020-36322" title="Kernel: Fuse: Fuse_Do_Getattr() Calls Make_Bad_Inode() In Inappropriate Situations" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42739" id="CVE-2021-42739" title="Kernel: Heap Buffer Overflow In Firedtv Driver" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0063" id="RHSA-2022:0063-1" title="Rhsa-2022:0063-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1895961" id="1895961" title="Kernel: Perf_Event_Parse_Addr_Filter Memory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1949560" id="1949560" title="Kernel: Fuse: Fuse_Do_Getattr() Calls Make_Bad_Inode() In Inappropriate Situations" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1951739" id="1951739" title="Kernel: Heap Buffer Overflow In Firedtv Driver" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0064-1</id><title>Openssl</title><description>Security Fix(es): 
* openssl: Read buffer overruns processing ASN.1 strings (CVE-2021-3712) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-01-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl" release="23.el7_9" src="openssl-1.0.2k-23.el7_9.src.rpm" version="1.0.2k"><filename>openssl-1.0.2k-23.el7_9.x86_64.rpm</filename><sum type="sha256">4b7e5233f1ef54c5a49a2e7ef776b6555b7cbb9d2b310f9697923d9b7c7f25fb</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="23.el7_9" src="openssl-1.0.2k-23.el7_9.src.rpm" version="1.0.2k"><filename>openssl-perl-1.0.2k-23.el7_9.x86_64.rpm</filename><sum type="sha256">e6618c1e128f8765d85a14ea2e693bc8fc06c837542ed5c30d7df96c37104bb7</sum></package><package arch="x86_64" epoch="1" name="openssl-devel" release="23.el7_9" src="openssl-1.0.2k-23.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-23.el7_9.x86_64.rpm</filename><sum type="sha256">f3f92393d8ac5d161e7460d7e50d01802e498cfe55855bcc1a7f58bab0580a3a</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="23.el7_9" src="openssl-1.0.2k-23.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-23.el7_9.i686.rpm</filename><sum type="sha256">93769ab70815d8a8cdc9f8edf4f90ad61eb40cee4bd092b8c89a511d0de01274</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="23.el7_9" src="openssl-1.0.2k-23.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-23.el7_9.i686.rpm</filename><sum type="sha256">fb34c957a261788fe6457be8bf0ce1f77c970e8132ab509e1dda887884c7b0d9</sum></package><package arch="x86_64" epoch="1" name="openssl-libs" release="23.el7_9" src="openssl-1.0.2k-23.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-23.el7_9.x86_64.rpm</filename><sum type="sha256">c39581eaf6d8a28a5b3af447d4a0a83cdf236803fecf60172074131740c9412c</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="23.el7_9" src="openssl-1.0.2k-23.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-23.el7_9.x86_64.rpm</filename><sum type="sha256">f40c92173b08ccc3db38d78bbeb03120d0b043bbb4deaa2d423b9e981c0490d0</sum></package><package arch="i686" epoch="1" name="openssl-static" release="23.el7_9" src="openssl-1.0.2k-23.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-23.el7_9.i686.rpm</filename><sum type="sha256">5f5d16a031e480a292463d7c1aa64a083d69f8ba617332518b5480af9e558384</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3712" id="CVE-2021-3712" title="Openssl: Read Buffer Overruns Processing Asn.1 Strings" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0064" id="RHSA-2022:0064-1" title="Rhsa-2022:0064-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1995634" id="1995634" title="Openssl: Read Buffer Overruns Processing Asn.1 Strings" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0124-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.5.0 ESR. 
Security Fix(es): 
* Mozilla: Iframe sandbox bypass with XSLT (CVE-2021-4140) 
* Mozilla: Race condition when playing audio files (CVE-2022-22737) 
* Mozilla: Heap-buffer-overflow in blendGaussianBlur (CVE-2022-22738) 
* Mozilla: Use-after-free of ChannelEventQueue::mOwner (CVE-2022-22740) 
* Mozilla: Browser window spoof using fullscreen mode (CVE-2022-22741) 
* Mozilla: Out-of-bounds memory access when inserting text in edit mode (CVE-2022-22742) 
* Mozilla: Browser window spoof using fullscreen mode (CVE-2022-22743) 
* Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5 (CVE-2022-22751) 
* Mozilla: Leaking cross-origin URLs through securitypolicyviolation event (CVE-2022-22745) 
* Mozilla: Spoofed origin on external protocol launch dialog (CVE-2022-22748) 
* Mozilla: Missing throttling on external protocol launch dialog (CVE-2022-22739) 
* Mozilla: Crash when handling empty pkcs7 sequence (CVE-2022-22747</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-01-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-91.5.0-1.el7_9.src.rpm" version="91.5.0"><filename>firefox-91.5.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">b24cd7262ae038465b552c404eea1adce86219ff96ba1b00bfde6c71fb4d708f</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-91.5.0-1.el7_9.src.rpm" version="91.5.0"><filename>firefox-91.5.0-1.el7_9.i686.rpm</filename><sum type="sha256">52541ab3a9f02cf7b7362cb6b02574c833e661eeb9c14539f3811c03c8b83738</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140" id="CVE-2021-4140" title="Mozilla: Iframe Sandbox Bypass With Xslt" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737" id="CVE-2022-22737" title="Mozilla: Race Condition When Playing Audio Files" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738" id="CVE-2022-22738" title="Mozilla: Heap-Buffer-Overflow In Blendgaussianblur" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739" id="CVE-2022-22739" title="Mozilla: Missing Throttling On External Protocol Launch Dialog" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740" id="CVE-2022-22740" title="Mozilla: Use-After-Free Of Channeleventqueue::Mowner" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741" id="CVE-2022-22741" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742" id="CVE-2022-22742" title="Mozilla: Out-Of-Bounds Memory Access When Inserting Text In Edit Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743" id="CVE-2022-22743" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745" id="CVE-2022-22745" title="Mozilla: Leaking Cross-Origin Urls Through Securitypolicyviolation Event" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747" id="CVE-2022-22747" title="Mozilla: Crash When Handling Empty Pkcs7 Sequence" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748" id="CVE-2022-22748" title="Mozilla: Spoofed Origin On External Protocol Launch Dialog" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751" id="CVE-2022-22751" title="Mozilla: Memory Safety Bugs Fixed In Firefox 96 And Firefox Esr 91.5" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0124" id="RHSA-2022:0124-1" title="Rhsa-2022:0124-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039561" id="2039561" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039563" id="2039563" title="Mozilla: Out-Of-Bounds Memory Access When Inserting Text In Edit Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039564" id="2039564" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039565" id="2039565" title="Mozilla: Use-After-Free Of Channeleventqueue::Mowner" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039566" id="2039566" title="Mozilla: Heap-Buffer-Overflow In Blendgaussianblur" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039567" id="2039567" title="Mozilla: Race Condition When Playing Audio Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039568" id="2039568" title="Mozilla: Iframe Sandbox Bypass With Xslt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039569" id="2039569" title="Mozilla: Spoofed Origin On External Protocol Launch Dialog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039570" id="2039570" title="Mozilla: Leaking Cross-Origin Urls Through Securitypolicyviolation Event" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039572" id="2039572" title="Mozilla: Crash When Handling Empty Pkcs7 Sequence" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039573" id="2039573" title="Mozilla: Missing Throttling On External Protocol Launch Dialog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039574" id="2039574" title="Mozilla: Memory Safety Bugs Fixed In Firefox 96 And Firefox Esr 91.5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0127-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.5.0. 
Security Fix(es): 
* Mozilla: Iframe sandbox bypass with XSLT (CVE-2021-4140) 
* Mozilla: Race condition when playing audio files (CVE-2022-22737) 
* Mozilla: Heap-buffer-overflow in blendGaussianBlur (CVE-2022-22738) 
* Mozilla: Use-after-free of ChannelEventQueue::mOwner (CVE-2022-22740) 
* Mozilla: Browser window spoof using fullscreen mode (CVE-2022-22741) 
* Mozilla: Out-of-bounds memory access when inserting text in edit mode (CVE-2022-22742) 
* Mozilla: Browser window spoof using fullscreen mode (CVE-2022-22743) 
* Mozilla: Memory safety bugs fixed in Firefox 96 and Firefox ESR 91.5 (CVE-2022-22751) 
* Mozilla: Leaking cross-origin URLs through securitypolicyviolation event (CVE-2022-22745) 
* Mozilla: Spoofed origin on external protocol launch dialog (CVE-2022-22748) 
* Mozilla: Missing throttling on external protocol launch dialog (CVE-2022-22739) 
* Mozilla: Crash when handling empty pkcs7 sequence (CVE-2022-22747)</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-01-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-91.5.0-1.el7_9.src.rpm" version="91.5.0"><filename>thunderbird-91.5.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">3cb0a76f2c45fa9cd11c3b908892dfb10fd1f7030c243a18fe0b6e92849b3352</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4140" id="CVE-2021-4140" title="Mozilla: Iframe Sandbox Bypass With Xslt" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22737" id="CVE-2022-22737" title="Mozilla: Race Condition When Playing Audio Files" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22738" id="CVE-2022-22738" title="Mozilla: Heap-Buffer-Overflow In Blendgaussianblur" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22739" id="CVE-2022-22739" title="Mozilla: Missing Throttling On External Protocol Launch Dialog" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22740" id="CVE-2022-22740" title="Mozilla: Use-After-Free Of Channeleventqueue::Mowner" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22741" id="CVE-2022-22741" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22742" id="CVE-2022-22742" title="Mozilla: Out-Of-Bounds Memory Access When Inserting Text In Edit Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22743" id="CVE-2022-22743" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22745" id="CVE-2022-22745" title="Mozilla: Leaking Cross-Origin Urls Through Securitypolicyviolation Event" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22747" id="CVE-2022-22747" title="Mozilla: Crash When Handling Empty Pkcs7 Sequence" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22748" id="CVE-2022-22748" title="Mozilla: Spoofed Origin On External Protocol Launch Dialog" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22751" id="CVE-2022-22751" title="Mozilla: Memory Safety Bugs Fixed In Firefox 96 And Firefox Esr 91.5" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0127" id="RHSA-2022:0127-1" title="Rhsa-2022:0127-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039561" id="2039561" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039563" id="2039563" title="Mozilla: Out-Of-Bounds Memory Access When Inserting Text In Edit Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039564" id="2039564" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039565" id="2039565" title="Mozilla: Use-After-Free Of Channeleventqueue::Mowner" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039566" id="2039566" title="Mozilla: Heap-Buffer-Overflow In Blendgaussianblur" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039567" id="2039567" title="Mozilla: Race Condition When Playing Audio Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039568" id="2039568" title="Mozilla: Iframe Sandbox Bypass With Xslt" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039569" id="2039569" title="Mozilla: Spoofed Origin On External Protocol Launch Dialog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039570" id="2039570" title="Mozilla: Leaking Cross-Origin Urls Through Securitypolicyviolation Event" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039572" id="2039572" title="Mozilla: Crash When Handling Empty Pkcs7 Sequence" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039573" id="2039573" title="Mozilla: Missing Throttling On External Protocol Launch Dialog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2039574" id="2039574" title="Mozilla: Memory Safety Bugs Fixed In Firefox 96 And Firefox Esr 91.5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0143</id><title>Important: Httpd Security Update</title><description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790) * httpd: mod_session: Heap overflow via a crafted SessionHeader value (CVE-2021-26691) * httpd: NULL pointer dereference via malformed requests (CVE-2021-34798) * httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2022-01-18 08:11:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="mod_session" release="97.sl7_9.4" src="httpd-2.4.6-97.sl7_9.4.src.rpm" version="2.4.6"><filename>mod_session-2.4.6-97.sl7_9.4.x86_64.rpm</filename><sum type="sha256">f6d50a70e34d90f430a16387e36ce6c3c58fe33c52432ccfc433c32203ade455</sum></package><package arch="noarch" name="httpd-manual" release="97.sl7_9.4" src="httpd-2.4.6-97.sl7_9.4.src.rpm" version="2.4.6"><filename>httpd-manual-2.4.6-97.sl7_9.4.noarch.rpm</filename><sum type="sha256">8a49f246b504b1bd850314a39faadadeaef3a6cfe23bb67c6774d71e3c5fb8e7</sum></package><package arch="x86_64" epoch="1" name="mod_proxy_html" release="97.sl7_9.4" src="httpd-2.4.6-97.sl7_9.4.src.rpm" version="2.4.6"><filename>mod_proxy_html-2.4.6-97.sl7_9.4.x86_64.rpm</filename><sum type="sha256">b0fd2d6d5a89ba32d563573c3bb8be4c58e28e13e3eed53052af8899509aa4ff</sum></package><package arch="x86_64" name="httpd-devel" release="97.sl7_9.4" src="httpd-2.4.6-97.sl7_9.4.src.rpm" version="2.4.6"><filename>httpd-devel-2.4.6-97.sl7_9.4.x86_64.rpm</filename><sum type="sha256">bd85ba1c0745e459eef961ae53126bb0796a3235ca3dd6539f089add38513004</sum></package><package arch="x86_64" name="httpd-tools" release="97.sl7_9.4" src="httpd-2.4.6-97.sl7_9.4.src.rpm" version="2.4.6"><filename>httpd-tools-2.4.6-97.sl7_9.4.x86_64.rpm</filename><sum type="sha256">4c7abdd81e62ca20befa0591ebeff2685f0aa76633a726a99e56fc7bd005b062</sum></package><package arch="x86_64" name="httpd" release="97.sl7_9.4" src="httpd-2.4.6-97.sl7_9.4.src.rpm" version="2.4.6"><filename>httpd-2.4.6-97.sl7_9.4.x86_64.rpm</filename><sum type="sha256">f2be60c4f22fff3a82e3b7d590f13ec8ccc695bdfbe7f949bd74d0bcf76ae197</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="97.sl7_9.4" src="httpd-2.4.6-97.sl7_9.4.src.rpm" version="2.4.6"><filename>mod_ssl-2.4.6-97.sl7_9.4.x86_64.rpm</filename><sum type="sha256">19c13172d628ab4ee8f43bbe35b7bcfcc2f7eaa13ce09c7699f0652025fe5ba1</sum></package><package arch="x86_64" name="mod_ldap" release="97.sl7_9.4" src="httpd-2.4.6-97.sl7_9.4.src.rpm" version="2.4.6"><filename>mod_ldap-2.4.6-97.sl7_9.4.x86_64.rpm</filename><sum type="sha256">f2d94441192f13f6930c986ef6b676ff097f35f978363b34e63829aaba93855a</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26691" id="CVE-2021-26691" title="Cve-2021-26691" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34798" id="CVE-2021-34798" title="Cve-2021-34798" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39275" id="CVE-2021-39275" title="Cve-2021-39275" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44790" id="CVE-2021-44790" title="Cve-2021-44790" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0143" id="RHSA-2022:0143" title="Important: Httpd Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0162-1</id><title>Gegl</title><description>Security Fix(es): 
* gegl: shell expansion via a crafted pathname (CVE-2021-45463) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-01-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="gegl-devel" release="19.el7_9.1" src="gegl-0.2.0-19.el7_9.1.src.rpm" version="0.2.0"><filename>gegl-devel-0.2.0-19.el7_9.1.i686.rpm</filename><sum type="sha256">1026ad809317760b0d4aabbe6b6e860534b665a242954df648017d26425f395a</sum></package><package arch="i686" name="gegl" release="19.el7_9.1" src="gegl-0.2.0-19.el7_9.1.src.rpm" version="0.2.0"><filename>gegl-0.2.0-19.el7_9.1.i686.rpm</filename><sum type="sha256">b1f3ba7fcda7b41faeac20f54e467969a03dff3c82d44d92e0b84c0b659c1140</sum></package><package arch="x86_64" name="gegl" release="19.el7_9.1" src="gegl-0.2.0-19.el7_9.1.src.rpm" version="0.2.0"><filename>gegl-0.2.0-19.el7_9.1.x86_64.rpm</filename><sum type="sha256">ef02317437aeae99e92e18ccacfeaf9171450113cc41ba989318f5fcc0c41436</sum></package><package arch="x86_64" name="gegl-devel" release="19.el7_9.1" src="gegl-0.2.0-19.el7_9.1.src.rpm" version="0.2.0"><filename>gegl-devel-0.2.0-19.el7_9.1.x86_64.rpm</filename><sum type="sha256">b6ac02e80d0cc53efc5d041e39652cef7a249221c39f729b7b8cd0d63ff85226</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45463" id="CVE-2021-45463" title="Gegl: Shell Expansion Via A Crafted Pathname" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0162" id="RHSA-2022:0162-1" title="Rhsa-2022:0162-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2035383" id="2035383" title="Gegl: Shell Expansion Via A Crafted Pathname" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0204</id><title>Moderate: Java-11-Openjdk Security Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) (CVE-2022-21248) * OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) (CVE-2022-21277) * OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) (CVE-2022-21282) * OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) (CVE-2022-21283) * OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) (CVE-2022-21291) * OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) (CVE-2022-21293) * OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) (CVE-2022-21294) * OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) (CVE-2022-21296) * OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) (CVE-2022-21299) * OpenJDK: Array indexing issues in LIRGenerator (Hotspot,
8272014) (CVE-2022-21305) * OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) (CVE-2022-21340) * OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) (CVE-2022-21341) * OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) (CVE-2022-21360) * OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) (CVE-2022-21365) * OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096) (CVE-2022-21366)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2022-01-28 09:29:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-devel-debug-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">54e94a49f94c000311fd8d9e5b97e53301facf3f4124087671061204158dd262</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">22abc18d93f07f90e6b42ddbd5093a801bf7e3f3015e8cd27f3c4e26c0da2eb7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-headless-debug-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">a2a1d79c7ddac04304f1eca9f9d18c82864f1870988c40e6528c4f9bf46d9b68</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-demo-debug-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">3a4aea36b0f4e25a3ed5cf94e0f7386ab5f1d45e3823fec31de7e02212022fad</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">4f2b655d843d01abe1db3f8e10e173d042dcb42d4bcbafbf32069ccf6cc12dad</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">250e0a7cad249a45617d83f6b5150b91cc908568fa58912282ccbf9e3614298d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">7a2935078143afd2685722413322ae84fb00eeb85c730ffaf5d8132439a0cae2</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-headless-debug-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">30a6882e26f722d5d52e51dfb475f44d6dd7c05e6ccc7be976994b6269a724d0</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-demo-debug-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">6369689fb71d5d00ec0736c4462b02d19376b3085ba45a70f2186224f30002d8</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">f040b3fff3cadbf5bba46359793f047aceec610db6b246d2d1495b575976b0c4</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">f74f241d8001846ea41a74f6e4fe447e3c5040739edfa4bede9d73a4e2acc064</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">96de0c2dc0c8db1c3b6d05d1d88021884e87016f30990a68b5081ae3a2dd34a2</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-src-debug-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">5afd5e147596a1d9397956bf9721329089d28bc928fdd47a1459ae4b6a3b6b5e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-debug-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">3fc46c2e0fbdb37e4e798254d1c5ed4d35d14efaea3c20a9401283ea9b068303</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-jmods-debug-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">2fc773b81c442f071e6ed161ff9836373741bf1ac45102c9a2c006d9c48b6641</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-src-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">e9ea555722da53401eb1acedccb6cee5093ffe0d923a857b4de4d4be2c090fee</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">428130bcc2525c6a036bbaf6da0788720b6e75aada9a50fcafe91585b4f28244</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.322.b06-1.el7_9.noarch.rpm</filename><sum type="sha256">fed1d5416135665f0d365e53c2821753658b58496601de12afe92b96e502b314</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">01d5ba12a84abfa92dc7a4bc18d4a833cc125ae5b52c5d8c3bf66e9347bb54f8</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.322.b06-1.el7_9.noarch.rpm</filename><sum type="sha256">91ded251200a705eb4c072c2044612331cd229e820328e0045319633269d704a</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-debug-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">ffead4c176d93aee9b77b4da35a516af4023a7ef83a1167d681970b9e1c1d1ce</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-jmods-debug-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">f86af909cc2f526fe18fd6535390085ec139b66b88863946cacb8e6ad68dbde7</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-src-debug-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">d08459c9eb22b8e5f9be6a280c5df29f72ad16bf6f83f22897aaabbea136e05b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-debug-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">f5e40ddaf84a7b9a91c9f819c7dd2af4ad5254788ef00c3e83dfba35eaeb80a7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-src-debug-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">4360d60400c097e9d840cd55ee4b32828b82afe859bd0acd2738aed6548b4839</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">44511b6ecb9daf9acc9d5e84a68d5ba9f06302ca652ae1f507c84e04a43edb75</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">106283358485a57311aa90a8b37fad25d1dd72f71a528ff64872f51ce8d27d32</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">419bd98f1f9c77fc6e63f6eff664dc3af238fcbf6916d4952c111e441f341af7</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-devel-debug-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">4fa67312ed6440d3808caf8bd033c095c3126c02c12ca3c8126e958b256550ab</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-static-libs-debug-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">fdbd1738c7a9a66b53d2744428dd69a7ff9129a8caa52042fa2ed080b1a7e705</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">be5ac853436da737779d848c36be1cdae8aa926fad8d6540b5b4b77f929652a2</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" id="CVE-2022-21248" title="Cve-2022-21248" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" id="CVE-2022-21277" title="Cve-2022-21277" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" id="CVE-2022-21282" title="Cve-2022-21282" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" id="CVE-2022-21283" title="Cve-2022-21283" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" id="CVE-2022-21291" title="Cve-2022-21291" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" id="CVE-2022-21293" title="Cve-2022-21293" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" id="CVE-2022-21294" title="Cve-2022-21294" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" id="CVE-2022-21296" title="Cve-2022-21296" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" id="CVE-2022-21299" title="Cve-2022-21299" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" id="CVE-2022-21305" title="Cve-2022-21305" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" id="CVE-2022-21340" title="Cve-2022-21340" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" id="CVE-2022-21341" title="Cve-2022-21341" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" id="CVE-2022-21360" title="Cve-2022-21360" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" id="CVE-2022-21365" title="Cve-2022-21365" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" id="CVE-2022-21366" title="Cve-2022-21366" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0204" id="RHSA-2022:0204" title="Moderate: Java-11-Openjdk Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0204-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) (CVE-2022-21248) 
* OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) (CVE-2022-21277) 
* OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) (CVE-2022-21282) 
* OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) (CVE-2022-21283) 
* OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) (CVE-2022-21291) 
* OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) (CVE-2022-21293) 
* OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) (CVE-2022-21294) 
* OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) (CVE-2022-21296) 
* OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) (CVE-2022-21299) 
* OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) (CVE-2022-21305) 
* OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) (CVE-2022-21340) 
* OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) (CVE-2022-21341) 
* OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756)  (CVE-2022-21360) 
* OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) (CVE-2022-21365) 
* OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096) (CVE-2022-21366) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-01-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-devel-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">cc0889f63874783c1587cdb2920dae9c9b22b654208212411a6675c559ae85bd</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-javadoc-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">77bd8cd3cb7b00b03f86de7d2ba8c94733b0cd0058cc898d318c83c6f2b3067e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">5144866cf38908fa899127f174a67b3913a2b873291b355067e0896da8eb4fe0</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-src-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">50eb4249160603431d7aab5d83df8bb7408102070f1e7f6b7b87c9cae987644b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-src-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">d6bf474547d1334de8d7640fc5126470cd0f84c08c92e2b005df87158e7dad39</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-jmods-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">52c47aeb85a00884f332349ad60e14bcfd2967dbf35901b99caa91a9c8874941</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">f2f7478230baa8b5a9dc38d0e718632d861b42d60326bccbcef0d80145ad246e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">ce7b0ad4461acf10115acbecf082ea2475952fd27c71530cf08d55d195153d3e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-demo-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">8f0a47867262db56e7790a717dd1ada48ae630a58e63875fdbafcbd99ce10b74</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-static-libs-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">75db03a8a5647d9c9327f479714bc74dfad20c0002ad9409ceab1e0c0ad09388</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-headless-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">bbf237389b53489037deab07f4eb170225ef1b113b38f7d175f9f5345ff792d9</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-headless-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">c69384d43f8be73c756b6b45ed9efdc142fc792d5988b8a7a7f2d81749e21768</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-demo-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">d19bdc3ab44387fbce45f62c463221c9788c0c63d0f9eea7a2bdb7eae77ad7cc</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-11.0.14.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">9459fcb48519274800a15bc286399d160a55ac9e4a14504ddc677e6cdca22371</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-javadoc-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">4100a9da94044e8a26c6fbbb8a155fcb3d346a0b999817f744a566e83af271dd</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-jmods-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">18e806660adc56368b07783d1dc706fc1574144c5a3c469baf58414b03134389</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.14.0.9-1.el7_9.src.rpm" version="11.0.14.0.9"><filename>java-11-openjdk-devel-11.0.14.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">d93618065592c206d65b10e92606933f6436cc175d919bf380acd07614d589d3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" id="CVE-2022-21248" title="Openjdk: Incomplete Deserialization Class Filtering In Objectinputstream (Serialization, 8264934)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21277" id="CVE-2022-21277" title="Openjdk: Incorrect Reading Of Tiff Files In Tiffnulldecompressor (Imageio, 8270952)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" id="CVE-2022-21282" title="Openjdk: Insufficient Uri Checks In The Xslt Transformerimpl (Jaxp, 8270492)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" id="CVE-2022-21283" title="Openjdk: Unexpected Exception Thrown In Regex Pattern (Libraries, 8268813)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21291" id="CVE-2022-21291" title="Openjdk: Incorrect Marking Of Writeable Fields (Hotspot, 8270386)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" id="CVE-2022-21293" title="Openjdk: Incomplete Checks Of Stringbuffer And Stringbuilder During Deserialization (Libraries, 8270392)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" id="CVE-2022-21294" title="Openjdk: Incorrect Identityhashmap Size Checks During Deserialization (Libraries, 8270416)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" id="CVE-2022-21296" title="Openjdk: Incorrect Access Checks In Xmlentitymanager (Jaxp, 8270498)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" id="CVE-2022-21299" title="Openjdk: Infinite Loop Related To Incorrect Handling Of Newlines In Xmlentityscanner (Jaxp, 8270646)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" id="CVE-2022-21305" title="Openjdk: Array Indexing Issues In Lirgenerator (Hotspot, 8272014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" id="CVE-2022-21340" title="Openjdk: Excessive Resource Use When Reading Jar Manifest Attributes (Libraries, 8272026)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" id="CVE-2022-21341" title="Openjdk: Insufficient Checks When Deserializing Exceptions In Objectinputstream (Serialization, 8272236)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" id="CVE-2022-21360" title="Openjdk: Excessive Memory Allocation In Bmpimagereader (Imageio, 8273756)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" id="CVE-2022-21365" title="Openjdk: Integer Overflow In Bmpimagereader (Imageio, 8273838)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21366" id="CVE-2022-21366" title="Openjdk: Excessive Memory Allocation In Tiff*Decompressor (Imageio, 8274096)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0204" id="RHSA-2022:0204-1" title="Rhsa-2022:0204-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041400" id="2041400" title="Openjdk: Unexpected Exception Thrown In Regex Pattern (Libraries, 8268813)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041417" id="2041417" title="Openjdk: Incomplete Checks Of Stringbuffer And Stringbuilder During Deserialization (Libraries, 8270392)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041427" id="2041427" title="Openjdk: Incorrect Identityhashmap Size Checks During Deserialization (Libraries, 8270416)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041435" id="2041435" title="Openjdk: Insufficient Uri Checks In The Xslt Transformerimpl (Jaxp, 8270492)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041439" id="2041439" title="Openjdk: Incorrect Access Checks In Xmlentitymanager (Jaxp, 8270498)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041472" id="2041472" title="Openjdk: Infinite Loop Related To Incorrect Handling Of Newlines In Xmlentityscanner (Jaxp, 8270646)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041479" id="2041479" title="Openjdk: Incorrect Reading Of Tiff Files In Tiffnulldecompressor (Imageio, 8270952)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041491" id="2041491" title="Openjdk: Excessive Memory Allocation In Bmpimagereader (Imageio, 8273756)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041785" id="2041785" title="Openjdk: Integer Overflow In Bmpimagereader (Imageio, 8273838)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041789" id="2041789" title="Openjdk: Excessive Memory Allocation In Tiff*Decompressor (Imageio, 8274096)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041801" id="2041801" title="Openjdk: Incomplete Deserialization Class Filtering In Objectinputstream (Serialization, 8264934)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041831" id="2041831" title="Openjdk: Incorrect Marking Of Writeable Fields (Hotspot, 8270386)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041878" id="2041878" title="Openjdk: Array Indexing Issues In Lirgenerator (Hotspot, 8272014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041884" id="2041884" title="Openjdk: Excessive Resource Use When Reading Jar Manifest Attributes (Libraries, 8272026)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041897" id="2041897" title="Openjdk: Insufficient Checks When Deserializing Exceptions In Objectinputstream (Serialization, 8272236)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0274-1</id><title>Polkit</title><description>Security Fix(es): 
* polkit: Local privilege escalation in pkexec due to incorrect handling of  argument vector (CVE-2021-4034) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-01-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="polkit" release="26.el7_9.1" src="polkit-0.112-26.el7_9.1.src.rpm" version="0.112"><filename>polkit-0.112-26.el7_9.1.i686.rpm</filename><sum type="sha256">a51c58a015ba9d4a24cd2892eff98c88780bc2faf647d7a2de964503062c9a9a</sum></package><package arch="x86_64" name="polkit-devel" release="26.el7_9.1" src="polkit-0.112-26.el7_9.1.src.rpm" version="0.112"><filename>polkit-devel-0.112-26.el7_9.1.x86_64.rpm</filename><sum type="sha256">9f5b87876726dd6f3222308cf4d835c0ea59184d38f0a6b9d63e7c31230f0e95</sum></package><package arch="x86_64" name="polkit" release="26.el7_9.1" src="polkit-0.112-26.el7_9.1.src.rpm" version="0.112"><filename>polkit-0.112-26.el7_9.1.x86_64.rpm</filename><sum type="sha256">68203be229c1f9cda0901c099d1c83d467c440273aeca0477beae5f4837bc9ce</sum></package><package arch="i686" name="polkit-devel" release="26.el7_9.1" src="polkit-0.112-26.el7_9.1.src.rpm" version="0.112"><filename>polkit-devel-0.112-26.el7_9.1.i686.rpm</filename><sum type="sha256">927f01258ae72316036787ef5c597fa6ab4b4d3b52f1d2a2247ccf1819f9dc84</sum></package><package arch="noarch" name="polkit-docs" release="26.el7_9.1" src="polkit-0.112-26.el7_9.1.src.rpm" version="0.112"><filename>polkit-docs-0.112-26.el7_9.1.noarch.rpm</filename><sum type="sha256">e60511f118ae805d5d7cb82c8a852b55454d27a21407581e71db6420d58adf90</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4034" id="CVE-2021-4034" title="Polkit: Local Privilege Escalation In Pkexec Due To Incorrect Handling Of Argument Vector" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0274" id="RHSA-2022:0274-1" title="Rhsa-2022:0274-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2025869" id="2025869" title="Polkit: Local Privilege Escalation In Pkexec Due To Incorrect Handling Of Argument Vector" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0306-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) (CVE-2022-21248) 
* OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) (CVE-2022-21282) 
* OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) (CVE-2022-21283) 
* OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) (CVE-2022-21293) 
* OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) (CVE-2022-21294) 
* OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) (CVE-2022-21296) 
* OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) (CVE-2022-21299) 
* OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) (CVE-2022-21305) 
* OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) (CVE-2022-21340) 
* OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) (CVE-2022-21341) 
* OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756)  (CVE-2022-21360) 
* OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) (CVE-2022-21365) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-01-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">9fc1c228bfdd6cd91ee00a1b85521b0bd9a1703c25bf371a3e170520718b254e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">04dc751224ddbbdfbf53fcc13646051e88de5a92cf81f9621ac4d26bd51adca4</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">d0d1db385d79c24b153a5e378d3557637b3262336aa5c670577218a9e1b07b79</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9.noarch.rpm</filename><sum type="sha256">3f9d342530e385ac09c2bccf9994f13b797fa7245a284d16e77cd44482175e00</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">cac72660b95e7de372e9c8863d0d577f6e66b21b019847201a6975aba535fc7c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">b6f8d11f1467b3341d0c1790239571e32e512cc2f9f57033a77c00984940715f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">c54c45e92dd9370bd5ec2cf4b94f9c4c2c5c8b23d4d460fc13e9312df9ec2f9d</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9.noarch.rpm</filename><sum type="sha256">d5fd399710a732268bba30410c30f68613bfdd0abdd174ddba84f2084c36ebb4</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">ea1964a5ac6c3ce7d23c0379adf67af3b9a6b324186b6f5a77c03dc41ea7e955</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">a138a9ff6d0a204d4954e21ce9bbfffe6cbc71cdfab9b7254ea8a1519ed38892</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">b0d2892f5361e65f6cf19ed8e55b374bca09237b7ffb47788dc94db5ed46d584</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">8930e7312515fb1b8ec206e11be265caf82649d498f28a7bd2664f7668cbfd79</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">1474e8e84cd3edee131374d943d7c5aaa650d46f2fbf2679902f1ee849009900</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm" version="1.8.0.322.b06"><filename>java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.i686.rpm</filename><sum type="sha256">abf6d38551de0d1441ff30ed1e5770c5f9402423d2c42944e003942abd8748aa</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21248" id="CVE-2022-21248" title="Openjdk: Incomplete Deserialization Class Filtering In Objectinputstream (Serialization, 8264934)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21282" id="CVE-2022-21282" title="Openjdk: Insufficient Uri Checks In The Xslt Transformerimpl (Jaxp, 8270492)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21283" id="CVE-2022-21283" title="Openjdk: Unexpected Exception Thrown In Regex Pattern (Libraries, 8268813)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21293" id="CVE-2022-21293" title="Openjdk: Incomplete Checks Of Stringbuffer And Stringbuilder During Deserialization (Libraries, 8270392)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21294" id="CVE-2022-21294" title="Openjdk: Incorrect Identityhashmap Size Checks During Deserialization (Libraries, 8270416)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21296" id="CVE-2022-21296" title="Openjdk: Incorrect Access Checks In Xmlentitymanager (Jaxp, 8270498)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21299" id="CVE-2022-21299" title="Openjdk: Infinite Loop Related To Incorrect Handling Of Newlines In Xmlentityscanner (Jaxp, 8270646)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21305" id="CVE-2022-21305" title="Openjdk: Array Indexing Issues In Lirgenerator (Hotspot, 8272014)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21340" id="CVE-2022-21340" title="Openjdk: Excessive Resource Use When Reading Jar Manifest Attributes (Libraries, 8272026)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21341" id="CVE-2022-21341" title="Openjdk: Insufficient Checks When Deserializing Exceptions In Objectinputstream (Serialization, 8272236)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21360" id="CVE-2022-21360" title="Openjdk: Excessive Memory Allocation In Bmpimagereader (Imageio, 8273756)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21365" id="CVE-2022-21365" title="Openjdk: Integer Overflow In Bmpimagereader (Imageio, 8273838)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0306" id="RHSA-2022:0306-1" title="Rhsa-2022:0306-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041400" id="2041400" title="Openjdk: Unexpected Exception Thrown In Regex Pattern (Libraries, 8268813)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041417" id="2041417" title="Openjdk: Incomplete Checks Of Stringbuffer And Stringbuilder During Deserialization (Libraries, 8270392)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041427" id="2041427" title="Openjdk: Incorrect Identityhashmap Size Checks During Deserialization (Libraries, 8270416)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041435" id="2041435" title="Openjdk: Insufficient Uri Checks In The Xslt Transformerimpl (Jaxp, 8270492)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041439" id="2041439" title="Openjdk: Incorrect Access Checks In Xmlentitymanager (Jaxp, 8270498)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041472" id="2041472" title="Openjdk: Infinite Loop Related To Incorrect Handling Of Newlines In Xmlentityscanner (Jaxp, 8270646)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041491" id="2041491" title="Openjdk: Excessive Memory Allocation In Bmpimagereader (Imageio, 8273756)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041785" id="2041785" title="Openjdk: Integer Overflow In Bmpimagereader (Imageio, 8273838)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041801" id="2041801" title="Openjdk: Incomplete Deserialization Class Filtering In Objectinputstream (Serialization, 8264934)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041878" id="2041878" title="Openjdk: Array Indexing Issues In Lirgenerator (Hotspot, 8272014)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041884" id="2041884" title="Openjdk: Excessive Resource Use When Reading Jar Manifest Attributes (Libraries, 8272026)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041897" id="2041897" title="Openjdk: Insufficient Checks When Deserializing Exceptions In Objectinputstream (Serialization, 8272236)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0328-1</id><title>Samba</title><description>Security Fix(es): 
* samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution (CVE-2021-44142) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Fix CVE-2020-25717 username map [script] advice 
* Fix Kerberos authentication on standalone server with MIT realm</description><severity>critical</severity><release>Scientific Linux</release><issued date="2022-01-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="samba-vfs-glusterfs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-vfs-glusterfs-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">df8d1340cb4aa6914bb9ea7874070288a8d22c55f39d645ad86ba5a31c259e2b</sum></package><package arch="x86_64" name="samba-common-libs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">ff89d32684ee759c454ef11b51ff31d4ab44179d46d5283cbf646999d16b2886</sum></package><package arch="x86_64" name="libwbclient-devel" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">bc9aa7dbffea68c98acbc88351a6327dc9ca500eb6a2479120737e1f96bd2ec2</sum></package><package arch="i686" name="samba-client-libs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">663812b7dfd973fdeb6b74305cf08921d5e8335ed5017c3df59727ebd535ea1e</sum></package><package arch="x86_64" name="samba-libs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">e0097d987e2824450c7a11ac3fa532ab06135fd15f38220e2dfaf8f077f038eb</sum></package><package arch="x86_64" name="ctdb" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>ctdb-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">f2202e2e9b18f5f5f4811a7c13559b3ac8af727e7527cb65d40c3e56e4dc8c0d</sum></package><package arch="i686" name="samba-common-libs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">358abe0a4f3d1cccee4cbfdba14e4b8e9f9b249b3be50719522a14fb86e950d0</sum></package><package arch="x86_64" name="samba-winbind-clients" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-clients-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">5d7f29a95b57203ec49238bd369911af9b72ba82f75a0622ea6163b35f3314b5</sum></package><package arch="x86_64" name="samba-client-libs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">73b297084b805368e9667009be2b75c17b73ad7f1f506494a49df3d35109a3be</sum></package><package arch="x86_64" name="samba-test" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-test-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">f7e01fd00edc4d62cd42ae41951abf4757e5ad7a1c1ed285a327907171b2ff11</sum></package><package arch="x86_64" name="samba-winbind" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">fab6ec8990130ff39e6b8f98593599f42697a5438d68800968033b83cc51e308</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-krb5-locator-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">a2bd52f053cd2c036687eebc3ea642bfc33aa5a38ab6f2cd55da9210d8d5516f</sum></package><package arch="x86_64" name="samba-common-tools" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-common-tools-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">3f52d9d7e060e7b709f26c6293aba4e0ef9d9bdadb5603dd61099716d381aaa9</sum></package><package arch="x86_64" name="samba" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">ced360cb043b91623e67bee09549903842831c2eede707e98d8ae900796afb51</sum></package><package arch="noarch" name="samba-common" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-common-4.10.16-18.el7_9.noarch.rpm</filename><sum type="sha256">32f942ee5738af20289aabd52b423162b6bd093c6be041a7071238080853b8e4</sum></package><package arch="x86_64" name="samba-krb5-printing" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-krb5-printing-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">01fc3a9e1c9a12f830b114d85d160f26074e02dd715a312951a1e2e5a57dc324</sum></package><package arch="x86_64" name="ctdb-tests" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>ctdb-tests-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">aa2e4e9aa51f6c1a5f3d4d911af3af5dce1f7d9e9baf676c7e5dd49b8790b0a7</sum></package><package arch="i686" name="samba-winbind-modules" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">875867d34e244fe641fff4e423d80b07242a8114b964f46d8557ff456311269d</sum></package><package arch="i686" name="libwbclient-devel" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">68d0c23f13c12c8c6f6a7b10575d1bad11b066bcf4b365a1a0431c771418402c</sum></package><package arch="x86_64" name="samba-test-libs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">a9b7a9efd81714e4c1dc7138b23388da7c3b85057317bcb52cbea650c5720897</sum></package><package arch="i686" name="libsmbclient" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">52006ab895f07fa144f6caf9f0108d798dc7686e992b97dc18c0a110b2f2f489</sum></package><package arch="x86_64" name="libsmbclient-devel" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">a6116873071d0e0e1a93f92da747594440df1661bab383785ab65bc054e78c8e</sum></package><package arch="i686" name="samba-devel" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">fc07d27a24cfb4bf3fa270fffe46819d19b7e4e847365548d7a6b7ec278da24a</sum></package><package arch="x86_64" name="samba-devel" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">ca6c55ccd41e72fed93e81bbc6fdde14ea7e8346f8fc14c7801372dba2104e65</sum></package><package arch="x86_64" name="samba-python-test" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-python-test-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">e6e02517c726e3d2c1b20b65f6d57c118d87f6af0d28492ede3bbbbef4c7ed40</sum></package><package arch="i686" name="libsmbclient-devel" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">8a522401f34868ed4780b40edfc1b2fa187e1edf154c390de8b9cba7be2074b1</sum></package><package arch="x86_64" name="samba-winbind-modules" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">0910ecae72d725b7e82afd842ef1fa185e4dc42011571109c4c238d91f97c8a5</sum></package><package arch="x86_64" name="samba-python" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">1110731afb343bcb0a24bb1093644864edd9c95fd2405668431271396b824fc3</sum></package><package arch="x86_64" name="samba-dc" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">e1085bfc77c7780cde712c509a36e2fedc60a70f6c10f8a7b92c77b2baf3211c</sum></package><package arch="i686" name="samba-libs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">822f845e292c216299de5833eeee71b674544aa92d36be06aa9a0f5c7d5abe4d</sum></package><package arch="noarch" name="samba-pidl" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-pidl-4.10.16-18.el7_9.noarch.rpm</filename><sum type="sha256">f8e815f2673098975c445e25da7c9888356919b0f110f82a04eb99f8e829b91a</sum></package><package arch="x86_64" name="samba-dc-libs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-libs-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">4e068894c52502219475e5eedff3ebafcb87de6e24b7d19b5f2a442fd8f0210e</sum></package><package arch="x86_64" name="libsmbclient" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">ade34f32e8b4638566cad1850941da3d52909303b61d17d40757a1f1b2d6e5c4</sum></package><package arch="i686" name="libwbclient" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">b18a8ec1660612b3ad53037f8ac744ee63d2b8a9ad2c26af2d6ed8e1b0c56b77</sum></package><package arch="i686" name="samba-python" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">d15237e0febd8fb7c185f336f4e8c1b4b5bf46db636e83fa5289b928c9ed0fb8</sum></package><package arch="i686" name="samba-test-libs" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-18.el7_9.i686.rpm</filename><sum type="sha256">2e289467abbb34185c8560a26d2cf8e48172772b3ebfd21da6cb9bbe7db22633</sum></package><package arch="x86_64" name="samba-client" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>samba-client-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">4ae012ffc048270196283c083ddc37e49cb6867ac416c766017cbb2518edc18e</sum></package><package arch="x86_64" name="libwbclient" release="18.el7_9" src="samba-4.10.16-18.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-18.el7_9.x86_64.rpm</filename><sum type="sha256">93c751bd215072f74bea32450991e179972a893d22670d3aa7734a20f8e284a4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44142" id="CVE-2021-44142" title="Samba: Out-Of-Bounds Heap Read/Write Vulnerability In Vfs Module Vfs_Fruit Allows Code Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0328" id="RHSA-2022:0328-1" title="Rhsa-2022:0328-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2034800" id="2034800" title="4.10.16-17 Regression For Idmap_Nss Due To Missing Patch" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2036595" id="2036595" title="Authentication With Kerberos Realm Not Working After Update To Samba-4.10.16-17" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2046146" id="2046146" title="Samba: Out-Of-Bounds Heap Read/Write Vulnerability In Vfs Module Vfs_Fruit Allows Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0442-1</id><title>Log4J</title><description>Log4j is a tool to help the programmer output log statements to a variety of output targets. 
Security Fix(es): 
* log4j: SQL injection in Log4j 1.x when application is configured to use JDBCAppender (CVE-2022-23305) 
* log4j: Unsafe deserialization flaw in Chainsaw log viewer (CVE-2022-23307) 
* log4j: Remote code execution in Log4j 1.x when application is configured to use JMSSink (CVE-2022-23302) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE </description><severity>important</severity><release>Scientific Linux</release><issued date="1969-12-31 18:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="log4j" release="18.el7_4" src="log4j-1.2.17-18.el7_4.src.rpm" version="1.2.17"><filename>log4j-1.2.17-18.el7_4.noarch.rpm</filename><sum type="sha256">9a9f3a9c0c0b3c903b3eaba362782c65a7fe0960c03569ceb943974feb8dc6a0</sum></package><package arch="noarch" name="log4j-javadoc" release="18.el7_4" src="log4j-1.2.17-18.el7_4.src.rpm" version="1.2.17"><filename>log4j-javadoc-1.2.17-18.el7_4.noarch.rpm</filename><sum type="sha256">b7bce1f231766d0932ad8e7a33358ec1e403446a4c9397b9c9420d4ca87605e6</sum></package><package arch="noarch" name="log4j-manual" release="18.el7_4" src="log4j-1.2.17-18.el7_4.src.rpm" version="1.2.17"><filename>log4j-manual-1.2.17-18.el7_4.noarch.rpm</filename><sum type="sha256">461d220a1b053f5423d08f9200f10c970665b4c01c355772b0494ab003236f85</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23302" id="CVE-2022-23302" title="Log4J: Remote Code Execution In Log4J 1.X When Application Is Configured To Use Jmssink" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23305" id="CVE-2022-23305" title="Log4J: Sql Injection In Log4J 1.X When Application Is Configured To Use Jdbcappender" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23307" id="CVE-2022-23307" title="Log4J: Unsafe Deserialization Flaw In Chainsaw Log Viewer" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0442" id="RHSA-2022:0442-1" title="Rhsa-2022:0442-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041949" id="2041949" title="Log4J: Remote Code Execution In Log4J 1.X When Application Is Configured To Use Jmssink" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041959" id="2041959" title="Log4J: Sql Injection In Log4J 1.X When Application Is Configured To Use Jdbcappender" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041967" id="2041967" title="Log4J: Unsafe Deserialization Flaw In Chainsaw Log Viewer" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0473-1</id><title>Aide</title><description>Security Fix(es): 
* aide: heap-based buffer overflow on outputs larger than B64_BUF (CVE-2021-45417) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-02-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="aide" release="13.el7_9.1" src="aide-0.15.1-13.el7_9.1.src.rpm" version="0.15.1"><filename>aide-0.15.1-13.el7_9.1.x86_64.rpm</filename><sum type="sha256">363dd087939f8af0acae1ac7e23f6450d17e61db25f0b1ba7fc788c90b4c8c9c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45417" id="CVE-2021-45417" title="Aide: Heap-Based Buffer Overflow On Outputs Larger Than B64_Buf" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0473" id="RHSA-2022:0473-1" title="Rhsa-2022:0473-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2041489" id="2041489" title="Aide: Heap-Based Buffer Overflow On Outputs Larger Than B64_Buf" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0514-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.6.0 ESR. 
Security Fix(es): 
* Mozilla: Extensions could have bypassed permission confirmation during update (CVE-2022-22754) 
* Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6 (CVE-2022-22764) 
* Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable (CVE-2022-22756) 
* Mozilla: Sandboxed iframes could have executed script if the parent appended elements (CVE-2022-22759) 
* Mozilla: Cross-Origin responses could be distinguished between script and  non-script content-types (CVE-2022-22760) 
* Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages (CVE-2022-22761) 
* Mozilla: Script Execution during invalid object state (CVE-2022-22763) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-02-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-91.6.0-1.el7_9.src.rpm" version="91.6.0"><filename>firefox-91.6.0-1.el7_9.i686.rpm</filename><sum type="sha256">006aa93e30bbb3f0008e6d0e66fd76bae445f9cceee651b211fc41064485b986</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-91.6.0-1.el7_9.src.rpm" version="91.6.0"><filename>firefox-91.6.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">02ae80929123f01f3766ad291f6c2fe454e161bf31ecb8405a78b352d9d5e857</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754" id="CVE-2022-22754" title="Mozilla: Extensions Could Have Bypassed Permission Confirmation During Update" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756" id="CVE-2022-22756" title="Mozilla: Drag And Dropping An Image Could Have Resulted In The Dropped Object Being An Executable" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759" id="CVE-2022-22759" title="Mozilla: Sandboxed Iframes Could Have Executed Script If The Parent Appended Elements" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760" id="CVE-2022-22760" title="Mozilla: Cross-Origin Responses Could Be Distinguished Between Script And Non-Script Content-Types" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761" id="CVE-2022-22761" title="Mozilla: Frame-Ancestors Content Security Policy Directive Was Not Enforced For Framed Extension Pages" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763" id="CVE-2022-22763" title="Mozilla: Script Execution During Invalid Object State" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764" id="CVE-2022-22764" title="Mozilla: Memory Safety Bugs Fixed In Firefox 97 And Firefox Esr 91.6" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0514" id="RHSA-2022:0514-1" title="Rhsa-2022:0514-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053236" id="2053236" title="Mozilla: Extensions Could Have Bypassed Permission Confirmation During Update" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053237" id="2053237" title="Mozilla: Drag And Dropping An Image Could Have Resulted In The Dropped Object Being An Executable" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053238" id="2053238" title="Mozilla: Cross-Origin Responses Could Be Distinguished Between Script And Non-Script Content-Types" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053239" id="2053239" title="Mozilla: Frame-Ancestors Content Security Policy Directive Was Not Enforced For Framed Extension Pages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053240" id="2053240" title="Mozilla: Script Execution During Invalid Object State" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053242" id="2053242" title="Mozilla: Sandboxed Iframes Could Have Executed Script If The Parent Appended Elements" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053243" id="2053243" title="Mozilla: Memory Safety Bugs Fixed In Firefox 97 And Firefox Esr 91.6" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0538-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.6.0. 
Security Fix(es): 
* Mozilla: Extensions could have bypassed permission confirmation during update (CVE-2022-22754) 
* Mozilla: Memory safety bugs fixed in Firefox 97 and Firefox ESR 91.6 (CVE-2022-22764) 
* Mozilla: Drag and dropping an image could have resulted in the dropped object being an executable (CVE-2022-22756) 
* Mozilla: Sandboxed iframes could have executed script if the parent appended elements (CVE-2022-22759) 
* Mozilla: Cross-Origin responses could be distinguished between script and  non-script content-types (CVE-2022-22760) 
* Mozilla: frame-ancestors Content Security Policy directive was not enforced for framed extension pages (CVE-2022-22761) 
* Mozilla: Script Execution during invalid object state (CVE-2022-22763) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-02-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-91.6.0-1.el7_9.src.rpm" version="91.6.0"><filename>thunderbird-91.6.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">4cb3af64b351c65ca34d5fdd03c25ef419d792314f77aa5e8f6f9fc14bd12537</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22754" id="CVE-2022-22754" title="Mozilla: Extensions Could Have Bypassed Permission Confirmation During Update" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22756" id="CVE-2022-22756" title="Mozilla: Drag And Dropping An Image Could Have Resulted In The Dropped Object Being An Executable" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22759" id="CVE-2022-22759" title="Mozilla: Sandboxed Iframes Could Have Executed Script If The Parent Appended Elements" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22760" id="CVE-2022-22760" title="Mozilla: Cross-Origin Responses Could Be Distinguished Between Script And Non-Script Content-Types" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22761" id="CVE-2022-22761" title="Mozilla: Frame-Ancestors Content Security Policy Directive Was Not Enforced For Framed Extension Pages" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22763" id="CVE-2022-22763" title="Mozilla: Script Execution During Invalid Object State" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22764" id="CVE-2022-22764" title="Mozilla: Memory Safety Bugs Fixed In Firefox 97 And Firefox Esr 91.6" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0538" id="RHSA-2022:0538-1" title="Rhsa-2022:0538-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053236" id="2053236" title="Mozilla: Extensions Could Have Bypassed Permission Confirmation During Update" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053237" id="2053237" title="Mozilla: Drag And Dropping An Image Could Have Resulted In The Dropped Object Being An Executable" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053238" id="2053238" title="Mozilla: Cross-Origin Responses Could Be Distinguished Between Script And Non-Script Content-Types" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053239" id="2053239" title="Mozilla: Frame-Ancestors Content Security Policy Directive Was Not Enforced For Framed Extension Pages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053240" id="2053240" title="Mozilla: Script Execution During Invalid Object State" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053242" id="2053242" title="Mozilla: Sandboxed Iframes Could Have Executed Script If The Parent Appended Elements" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2053243" id="2053243" title="Mozilla: Memory Safety Bugs Fixed In Firefox 97 And Firefox Esr 91.6" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0609-1</id><title>Python-Pillow</title><description>Security Fix(es): 
* python-pillow: PIL.ImageMath.eval allows evaluation of arbitrary expressions (CVE-2022-22817) 
* python-pillow: buffer over-read during initialization of ImagePath.Path in path_getbbox() in path.c (CVE-2022-22816) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-02-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-pillow-sane" release="23.gitd1c6db8.el7_9" src="python-pillow-2.0.0-23.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-sane-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">761ee37e931defd45f9d59ca37e3faf94f054114e2a73c335d20318a23c484a9</sum></package><package arch="i686" name="python-pillow-devel" release="23.gitd1c6db8.el7_9" src="python-pillow-2.0.0-23.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-devel-2.0.0-23.gitd1c6db8.el7_9.i686.rpm</filename><sum type="sha256">d249271ef57c9faae7cffe852c28a837b96ae8f6d1b4e330c1b9792f869adf53</sum></package><package arch="x86_64" name="python-pillow-tk" release="23.gitd1c6db8.el7_9" src="python-pillow-2.0.0-23.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-tk-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">8bc1039d9b77f4fd8c40f8b4a8dc0c4d1959420b8fd45beeb7ed77855c53268a</sum></package><package arch="x86_64" name="python-pillow-qt" release="23.gitd1c6db8.el7_9" src="python-pillow-2.0.0-23.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-qt-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">ca4d0a62c0744041d7f27f56718b6d7b22a22aecfa795edc5a968ed7e508e41d</sum></package><package arch="i686" name="python-pillow" release="23.gitd1c6db8.el7_9" src="python-pillow-2.0.0-23.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-2.0.0-23.gitd1c6db8.el7_9.i686.rpm</filename><sum type="sha256">f24f8203b4277f2c132fa1c7259c7f537836f050dd5a5b7b5c1267fac1d3e9a1</sum></package><package arch="x86_64" name="python-pillow-devel" release="23.gitd1c6db8.el7_9" src="python-pillow-2.0.0-23.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-devel-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">c10b296e79d6f98eecd23df8d0ab59797f6aaac7bb30bdc005023e234b01ed65</sum></package><package arch="x86_64" name="python-pillow-doc" release="23.gitd1c6db8.el7_9" src="python-pillow-2.0.0-23.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-doc-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">2620c143a4a87bd90be2f59117c2af3fc51383790dca3e0887c226cdbda8a851</sum></package><package arch="x86_64" name="python-pillow" release="23.gitd1c6db8.el7_9" src="python-pillow-2.0.0-23.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-2.0.0-23.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">60975a21b14fe34186e2217332ed40acd52bcb74f73d679fd61f81041a9d70bd</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22816" id="CVE-2022-22816" title="Python-Pillow: Buffer Over-Read During Initialization Of Imagepath.Path In Path_Getbbox() In Path.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22817" id="CVE-2022-22817" title="Python-Pillow: Pil.Imagemath.Eval Allows Evaluation Of Arbitrary Expressions" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0609" id="RHSA-2022:0609-1" title="Rhsa-2022:0609-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2042522" id="2042522" title="Python-Pillow: Buffer Over-Read During Initialization Of Imagepath.Path In Path_Getbbox() In Path.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2042527" id="2042527" title="Python-Pillow: Pil.Imagemath.Eval Allows Evaluation Of Arbitrary Expressions" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0620-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: use after free in eventpoll.c may lead to escalation of privilege  (CVE-2020-0466) 
* kernel: Use After Free in unix_gc() which could result in a local privilege escalation (CVE-2021-0920) 
* kernel: xfs: raw block device data leak in XFS_IOC_ALLOCSP IOCTL (CVE-2021-4155) 
* kernel: possible privileges escalation due to missing TLB flush (CVE-2022-0330) 
* kernel: failing usercopy allows for use-after-free exploitation (CVE-2022-22942) 
* kernel: out of bounds write in hid-multitouch.c may lead to escalation of  privilege (CVE-2020-0465) 
* kernel: double free in bluetooth subsystem when the HCI device initialization fails (CVE-2021-3564) 
* kernel: use-after-free in function hci_sock_bound_ioctl() (CVE-2021-3573) 
* kernel: possible use-after-free in bluetooth module (CVE-2021-3752) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Kernel with enabled BERT does not decode CPU fatal events correctly 
* SL 7.9 - Call trace seen during controller random reset on IB config 
* Infinite loop in blk_set_queue_dying() from blk_queue_for_each_rl() when another CPU races and modifies the queue's blkg_list 
* NFS client kernel crash in NFS4 backchannel transmit path - ftrace_raw_event_rpc_task_queued called from rpc_run_bc_task 
* SELinux is preventing / from mount access on the filesystem /proc</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-02-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="bpftool" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">4ddf7ebc316baa4753d705cc370c3345d8e2e3cea217dc81cf612a8ba3f92af2</sum></package><package arch="noarch" name="kernel-doc" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.59.1.el7.noarch.rpm</filename><sum type="sha256">946c0d5fcb9b4946fd34699fb2ef587e861ec95bc4468acce0c7422eb10425d5</sum></package><package arch="x86_64" name="kernel-tools" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">e747d7f2f10bff1b2ca5b681279af5885c2bb1d05885c2e98b9b6ccace3d3a03</sum></package><package arch="x86_64" name="kernel-headers" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">a22a4b3e94f5b811f45bf3495d738f76e4496f5ce9330f9720e19cab12fa77c0</sum></package><package arch="x86_64" name="kernel-devel" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">6e1694a9954433eabc31e5ce15ffbb9c21ff17193421ae9bb3cb180ed1b88e34</sum></package><package arch="x86_64" name="python-perf" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">82a02931a29454361303ab1ba2c02f228f0f17bf17b57b56343a8f6cab755296</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">463f7dda5c55c053351b111748e0bcfee9f51c9ea91ad6a93d3e43ce32563911</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.59.1.el7.noarch.rpm</filename><sum type="sha256">13ffd6cfe031fa7b7ce1e900387a4a4ba21b9c079f01e6c7727b8a1154fd2504</sum></package><package arch="x86_64" name="kernel" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">60245e7c95ddaa01b92e933a97e4a19b14691634789b4da69df74ef7f7ca3e03</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">82baafb6336e0df2607de6c8cae06e5f156a0468672396aae71a1d3c2e320016</sum></package><package arch="x86_64" name="kernel-debug" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">f3d5d25fdcfeeeb70b7f01ee947bf0905277a88b74fc90cd2218a08f9879f0cd</sum></package><package arch="x86_64" name="perf" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">05f73fd3364bb8792508c37d2a3c449f175e11e27884d797aacfcdba9495655b</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.59.1.el7" src="kernel-3.10.0-1160.59.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.59.1.el7.x86_64.rpm</filename><sum type="sha256">32309a82faf074334032b78dc644203d3d8cca45cb372d5b3b780391248a4504</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0465" id="CVE-2020-0465" title="Kernel: Out Of Bounds Write In Hid-Multitouch.C May Lead To Escalation Of Privilege" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-0466" id="CVE-2020-0466" title="Kernel: Use After Free In Eventpoll.C May Lead To Escalation Of Privilege" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-0920" id="CVE-2021-0920" title="Kernel: Use After Free In Unix_Gc() Which Could Result In A Local Privilege Escalation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3564" id="CVE-2021-3564" title="Kernel: Double Free In Bluetooth Subsystem When The Hci Device Initialization Fails" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3573" id="CVE-2021-3573" title="Kernel: Use-After-Free In Function Hci_Sock_Bound_Ioctl()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3752" id="CVE-2021-3752" title="Kernel: Possible Use-After-Free In Bluetooth Module" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4155" id="CVE-2021-4155" title="Kernel: Xfs: Raw Block Device Data Leak In Xfs_Ioc_Allocsp Ioctl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0330" id="CVE-2022-0330" title="Kernel: Possible Privileges Escalation Due To Missing Tlb  Flush" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22942" id="CVE-2022-22942" title="Kernel: Failing Usercopy Allows For Use-After-Free Exploitation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0620" id="RHSA-2022:0620-1" title="Rhsa-2022:0620-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920471" id="1920471" title="Kernel: Out Of Bounds Write In Hid-Multitouch.C May Lead To Escalation Of Privilege" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1920480" id="1920480" title="Kernel: Use After Free In Eventpoll.C May Lead To Escalation Of Privilege" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1964139" id="1964139" title="Kernel: Double Free In Bluetooth Subsystem When The Hci Device Initialization Fails" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1966578" id="1966578" title="Kernel: Use-After-Free In Function Hci_Sock_Bound_Ioctl()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1999544" id="1999544" title="Kernel: Possible Use-After-Free In Bluetooth Module" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2031930" id="2031930" title="Kernel: Use After Free In Unix_Gc() Which Could Result In A Local Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2034813" id="2034813" title="Kernel: Xfs: Raw Block Device Data Leak In Xfs_Ioc_Allocsp Ioctl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2042404" id="2042404" title="Kernel: Possible Privileges Escalation Due To Missing Tlb  Flush" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044809" id="2044809" title="Kernel: Failing Usercopy Allows For Use-After-Free Exploitation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0621-1</id><title>Openldap</title><description>Security Fix(es): 
* openldap: assertion failure in Certificate List syntax validation (CVE-2020-25709) 
* openldap: assertion failure in CSN normalization with invalid input (CVE-2020-25710) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-02-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="openldap-clients" release="25.el7_9" src="openldap-2.4.44-25.el7_9.src.rpm" version="2.4.44"><filename>openldap-clients-2.4.44-25.el7_9.x86_64.rpm</filename><sum type="sha256">05df5e99db0edc47544d7e762ad1ccc43a9e553280b133221c5bd62d14fe880d</sum></package><package arch="x86_64" name="openldap" release="25.el7_9" src="openldap-2.4.44-25.el7_9.src.rpm" version="2.4.44"><filename>openldap-2.4.44-25.el7_9.x86_64.rpm</filename><sum type="sha256">e9a2d83f26076ad4562fa60d1ae142d084bfdb8aa51f48827d6934385a26f72b</sum></package><package arch="x86_64" name="openldap-devel" release="25.el7_9" src="openldap-2.4.44-25.el7_9.src.rpm" version="2.4.44"><filename>openldap-devel-2.4.44-25.el7_9.x86_64.rpm</filename><sum type="sha256">97dd2cd507f6de48745ebc747fc1f4ef66077ec5b94c4052d0653c3ecfda9cba</sum></package><package arch="i686" name="openldap" release="25.el7_9" src="openldap-2.4.44-25.el7_9.src.rpm" version="2.4.44"><filename>openldap-2.4.44-25.el7_9.i686.rpm</filename><sum type="sha256">c09a5ae95c62121ac6673698e840713a44a367e395133e28ab063689d6ab80cd</sum></package><package arch="x86_64" name="openldap-servers" release="25.el7_9" src="openldap-2.4.44-25.el7_9.src.rpm" version="2.4.44"><filename>openldap-servers-2.4.44-25.el7_9.x86_64.rpm</filename><sum type="sha256">80759d70873b2db68b01b5378b4959847eed52f08191d3ac7adc649b860fdac0</sum></package><package arch="i686" name="openldap-devel" release="25.el7_9" src="openldap-2.4.44-25.el7_9.src.rpm" version="2.4.44"><filename>openldap-devel-2.4.44-25.el7_9.i686.rpm</filename><sum type="sha256">e7b7ce9bd1c91af747a625b85f9d9a3b92ad3db0145c679b6fa2094563a0edac</sum></package><package arch="x86_64" name="openldap-servers-sql" release="25.el7_9" src="openldap-2.4.44-25.el7_9.src.rpm" version="2.4.44"><filename>openldap-servers-sql-2.4.44-25.el7_9.x86_64.rpm</filename><sum type="sha256">0177d423dfdf9c911c709ed276d8a2fac763c9e586977f47df64187a75f64803</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25709" id="CVE-2020-25709" title="Openldap: Assertion Failure In Certificate List Syntax Validation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25710" id="CVE-2020-25710" title="Openldap: Assertion Failure In Csn Normalization With Invalid Input" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0621" id="RHSA-2022:0621-1" title="Rhsa-2022:0621-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1899675" id="1899675" title="Openldap: Assertion Failure In Certificate List Syntax Validation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1899678" id="1899678" title="Openldap: Assertion Failure In Csn Normalization With Invalid Input" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0628-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* 389-ds-base: double-free of the virtual attribute context in persistent search (CVE-2021-4091) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* CSN generator can adjust wrongly the local and remote offsets used to generate a CSN</description><severity>low</severity><release>Scientific Linux</release><issued date="2022-02-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-snmp" release="15.el7_9" src="389-ds-base-1.3.10.2-15.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-snmp-1.3.10.2-15.el7_9.x86_64.rpm</filename><sum type="sha256">ce77ae886569507d3d8a636881b4e0227124bb4ac73d40eac1f2a1966385e86f</sum></package><package arch="x86_64" name="389-ds-base-libs" release="15.el7_9" src="389-ds-base-1.3.10.2-15.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-libs-1.3.10.2-15.el7_9.x86_64.rpm</filename><sum type="sha256">ba9bb484a4c7dc68b007a7f520720b47331b793f36702702197405dbd144ca71</sum></package><package arch="x86_64" name="389-ds-base-devel" release="15.el7_9" src="389-ds-base-1.3.10.2-15.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-devel-1.3.10.2-15.el7_9.x86_64.rpm</filename><sum type="sha256">9dfdde8db3f0283a5d345af8176577a6fec3f27a965a496675311bf7424936de</sum></package><package arch="x86_64" name="389-ds-base" release="15.el7_9" src="389-ds-base-1.3.10.2-15.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-1.3.10.2-15.el7_9.x86_64.rpm</filename><sum type="sha256">8101f7625070f12f155e4c6d7f4cd2807d5b8e32274999474c2c41b1c5ef2eaf</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4091" id="CVE-2021-4091" title="389-Ds-Base: Double-Free Of The Virtual Attribute Context In Persistent Search" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0628" id="RHSA-2022:0628-1" title="Rhsa-2022:0628-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030307" id="2030307" title="389-Ds-Base: Double-Free Of The Virtual Attribute Context In Persistent Search" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2049812" id="2049812" title="Fix Csn Generator To Limit Time Skew Drift" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0666-1</id><title>Cyrus-Sasl</title><description>Security Fix(es): 
* cyrus-sasl: failure to properly escape SQL input allows an attacker to execute arbitrary SQL commands (CVE-2022-24407) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-02-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="cyrus-sasl-sql" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-sql-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">4a40ab6db225cb6ad07f8544edd60c2aee43d0d380300527cd9e9721b1aa5655</sum></package><package arch="i686" name="cyrus-sasl-gs2" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-gs2-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">b54b9528ae53f5495721c5f2c8adbebe1f1d1757fa21cb0997471353766c3b31</sum></package><package arch="i686" name="cyrus-sasl" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">967339b9fcb7b6167797be3b72d0d4ac420e9b86fe1cac909ad8c90007e11fef</sum></package><package arch="i686" name="cyrus-sasl-scram" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-scram-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">44780aad3b57cae08e6c6f2589d1dadd74ae23126c71398eb4e7c0dcf4661b1f</sum></package><package arch="i686" name="cyrus-sasl-md5" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-md5-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">54625b5af7df520aa30ec4be91f88aa4f021b99b420d85da3b0616076dd98ec3</sum></package><package arch="i686" name="cyrus-sasl-sql" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-sql-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">8904a5ee533579ee4ca9881e15f251c6de2eb088fcbace9481a4ad7adb46377d</sum></package><package arch="i686" name="cyrus-sasl-ldap" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-ldap-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">eea9f5dcf16322f440e908b8ff15b291d0d39e817c42673dae424714e236531d</sum></package><package arch="x86_64" name="cyrus-sasl-gssapi" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-gssapi-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">a83b5a1977b9c7b3538b2d3b624a9bdff4f7c505dcf42a0c31fb95aefd07aca0</sum></package><package arch="i686" name="cyrus-sasl-ntlm" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-ntlm-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">ccc7f7145072c2a6b4b86fc3df68c3763801dfcc27186be6ab680e26920dbc0b</sum></package><package arch="i686" name="cyrus-sasl-plain" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-plain-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">6b94a459b9b883c37968d0f20fb8600ba428e4ccfdf66d797b0a56a3b4083963</sum></package><package arch="x86_64" name="cyrus-sasl-scram" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-scram-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">a1ddbd0a6fd6f2e074c3df9a2c124bda9d81b9d7d605b0dd8805c215c9ae78db</sum></package><package arch="x86_64" name="cyrus-sasl" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">c0788227ddc4b5349fd59d2c921669ff2943c5a5b26986440b5d1f61b4c8ad16</sum></package><package arch="x86_64" name="cyrus-sasl-plain" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-plain-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">c4ab1f09bb0e4a614871d5c4266e4d18ae88d3df3d57c15772abe292c23d30aa</sum></package><package arch="x86_64" name="cyrus-sasl-lib" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-lib-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">2aba1129ef910065dc0a8e69295d1ad6bcd5b1f97ff2e3ac3f3be667594a3363</sum></package><package arch="x86_64" name="cyrus-sasl-devel" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-devel-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">0230c24753ea28baaaab7ff9b4f2dd408029bf893ea6aefab59034f0d2c5cf3f</sum></package><package arch="x86_64" name="cyrus-sasl-gs2" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-gs2-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">31a2440a98e41391a5fbab60a833229fa2e70ecaae47167d83359eeaa8b9a48e</sum></package><package arch="i686" name="cyrus-sasl-lib" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-lib-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">4853a8c3bdbd9490959789e6a00ef507002c7d2c16d8867c64dbc95fb0f7d430</sum></package><package arch="i686" name="cyrus-sasl-devel" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-devel-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">b30208f1a17274345596864583a4697e3110646204022787474b3351697d666c</sum></package><package arch="x86_64" name="cyrus-sasl-ntlm" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-ntlm-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">7d64db4096bcc01a8587a9d5aa2f22616c979dbeba0e1294b9345628a704ac5f</sum></package><package arch="i686" name="cyrus-sasl-gssapi" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-gssapi-2.1.26-24.el7_9.i686.rpm</filename><sum type="sha256">4bec982ea813540557f0a52138f8b3e09698020541719c8e783ad57eeacfcf3e</sum></package><package arch="x86_64" name="cyrus-sasl-ldap" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-ldap-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">fa614ba1acea9591194c1a17162400866c22b9f4a231e45166d352f0907915d6</sum></package><package arch="x86_64" name="cyrus-sasl-md5" release="24.el7_9" src="cyrus-sasl-2.1.26-24.el7_9.src.rpm" version="2.1.26"><filename>cyrus-sasl-md5-2.1.26-24.el7_9.x86_64.rpm</filename><sum type="sha256">c4202509cdb3a97da1c6aa221566733f33c1afc61e8c1067d5ad1f4c4bb6d742</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24407" id="CVE-2022-24407" title="Cyrus-Sasl: Failure To Properly Escape Sql Input Allows An Attacker To Execute Arbitrary Sql Commands" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0666" id="RHSA-2022:0666-1" title="Rhsa-2022:0666-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2055326" id="2055326" title="Cyrus-Sasl: Failure To Properly Escape Sql Input Allows An Attacker To Execute Arbitrary Sql Commands" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0824-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.7.0 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free in XSLT parameter processing (CVE-2022-26485) 
* Mozilla: Use-after-free in WebGPU IPC Framework (CVE-2022-26486) 
* expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code  execution (CVE-2022-25235) 
* expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236) 
* expat: Integer overflow in storeRawNames() (CVE-2022-25315) 
* Mozilla: Use-after-free in text reflows (CVE-2022-26381) 
* Mozilla: Browser window spoof using fullscreen mode (CVE-2022-26383) 
* Mozilla: iframe allow-scripts sandbox bypass (CVE-2022-26384) 
* Mozilla: Time-of-check time-of-use bug when verifying add-on signatures (CVE-2022-26387) 
* Mozilla: Temporary files downloaded to /tmp and accessible by other local  users (CVE-2022-26386) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Firefox 91.3.0-1 Language packs installed at /usr/lib64/firefox/langpacks  cannot be used any more</description><severity>critical</severity><release>Scientific Linux</release><issued date="2022-03-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="3.el7_9" src="firefox-91.7.0-3.el7_9.src.rpm" version="91.7.0"><filename>firefox-91.7.0-3.el7_9.i686.rpm</filename><sum type="sha256">17a6c0c6940f2d8c32861a0fc4523fd49af44c0790833f5ecef02ac63dd6a45d</sum></package><package arch="x86_64" name="firefox" release="3.el7_9" src="firefox-91.7.0-3.el7_9.src.rpm" version="91.7.0"><filename>firefox-91.7.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">96d651cc95589c55f2343d3ecd7a126c34b8e500a6666c5633ca1071f58c1547</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235" id="CVE-2022-25235" title="Expat: Malformed 2- And 3-Byte Utf-8 Sequences Can Lead To Arbitrary Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236" id="CVE-2022-25236" title="Expat: Namespace-Separator Characters In &quot;Xmlns[:Prefix]&quot; Attribute Values Can Lead To Arbitrary Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315" id="CVE-2022-25315" title="Expat: Integer Overflow In Storerawnames()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381" id="CVE-2022-26381" title="Mozilla: Use-After-Free In Text Reflows" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383" id="CVE-2022-26383" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384" id="CVE-2022-26384" title="Mozilla: Iframe Allow-Scripts Sandbox Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386" id="CVE-2022-26386" title="Mozilla: Temporary Files Downloaded To /Tmp And Accessible By Other Local Users" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387" id="CVE-2022-26387" title="Mozilla: Time-Of-Check Time-Of-Use Bug When Verifying Add-On Signatures" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26485" id="CVE-2022-26485" title="Mozilla: Use-After-Free In Xslt Parameter Processing" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26486" id="CVE-2022-26486" title="Mozilla: Use-After-Free In Webgpu Ipc Framework" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0824" id="RHSA-2022:0824-1" title="Rhsa-2022:0824-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2030190" id="2030190" title="Firefox 91.3.0-1 Language Packs Installed At /Usr/Lib64/Firefox/Langpacks Cannot Be Used Any More" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2056363" id="2056363" title="Expat: Integer Overflow In Storerawnames()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2056366" id="2056366" title="Expat: Malformed 2- And 3-Byte Utf-8 Sequences Can Lead To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2056370" id="2056370" title="Expat: Namespace-Separator Characters In &quot;Xmlns[:Prefix]&quot; Attribute Values Can Lead To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2061735" id="2061735" title="Mozilla: Use-After-Free In Webgpu Ipc Framework" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2061736" id="2061736" title="Mozilla: Use-After-Free In Xslt Parameter Processing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062220" id="2062220" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062221" id="2062221" title="Mozilla: Iframe Allow-Scripts Sandbox Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062222" id="2062222" title="Mozilla: Time-Of-Check Time-Of-Use Bug When Verifying Add-On Signatures" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062223" id="2062223" title="Mozilla: Use-After-Free In Text Reflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062224" id="2062224" title="Mozilla: Temporary Files Downloaded To /Tmp And Accessible By Other Local Users" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:0850-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.7.0. 
Security Fix(es): 
* Mozilla: Use-after-free in XSLT parameter processing (CVE-2022-26485) 
* Mozilla: Use-after-free in WebGPU IPC Framework (CVE-2022-26486) 
* expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code  execution (CVE-2022-25235) 
* expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236) 
* expat: Integer overflow in storeRawNames() (CVE-2022-25315) 
* Mozilla: Use-after-free in text reflows (CVE-2022-26381) 
* Mozilla: Browser window spoof using fullscreen mode (CVE-2022-26383) 
* Mozilla: iframe allow-scripts sandbox bypass (CVE-2022-26384) 
* Mozilla: Time-of-check time-of-use bug when verifying add-on signatures (CVE-2022-26387) 
* thunderbird: Crafted email could trigger an out-of-bounds write (CVE-2022-0566) 
* Mozilla: Temporary files downloaded to /tmp and accessible by other local  users (CVE-2022-26386) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-03-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-91.7.0-2.el7_9.src.rpm" version="91.7.0"><filename>thunderbird-91.7.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">86ae44e13f4bd6644c5f83d8e7149c802629dad4f6a1110dbb096a7fdcd2a9e9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0566" id="CVE-2022-0566" title="Thunderbird: Crafted Email Could Trigger An Out-Of-Bounds Write" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235" id="CVE-2022-25235" title="Expat: Malformed 2- And 3-Byte Utf-8 Sequences Can Lead To Arbitrary Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236" id="CVE-2022-25236" title="Expat: Namespace-Separator Characters In &quot;Xmlns[:Prefix]&quot; Attribute Values Can Lead To Arbitrary Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315" id="CVE-2022-25315" title="Expat: Integer Overflow In Storerawnames()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26381" id="CVE-2022-26381" title="Mozilla: Use-After-Free In Text Reflows" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26383" id="CVE-2022-26383" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26384" id="CVE-2022-26384" title="Mozilla: Iframe Allow-Scripts Sandbox Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26386" id="CVE-2022-26386" title="Mozilla: Temporary Files Downloaded To /Tmp And Accessible By Other Local Users" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26387" id="CVE-2022-26387" title="Mozilla: Time-Of-Check Time-Of-Use Bug When Verifying Add-On Signatures" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26485" id="CVE-2022-26485" title="Mozilla: Use-After-Free In Xslt Parameter Processing" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26486" id="CVE-2022-26486" title="Mozilla: Use-After-Free In Webgpu Ipc Framework" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:0850" id="RHSA-2022:0850-1" title="Rhsa-2022:0850-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2055591" id="2055591" title="Thunderbird: Crafted Email Could Trigger An Out-Of-Bounds Write" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2056363" id="2056363" title="Expat: Integer Overflow In Storerawnames()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2056366" id="2056366" title="Expat: Malformed 2- And 3-Byte Utf-8 Sequences Can Lead To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2056370" id="2056370" title="Expat: Namespace-Separator Characters In &quot;Xmlns[:Prefix]&quot; Attribute Values Can Lead To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2061735" id="2061735" title="Mozilla: Use-After-Free In Webgpu Ipc Framework" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2061736" id="2061736" title="Mozilla: Use-After-Free In Xslt Parameter Processing" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062220" id="2062220" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062221" id="2062221" title="Mozilla: Iframe Allow-Scripts Sandbox Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062222" id="2062222" title="Mozilla: Time-Of-Check Time-Of-Use Bug When Verifying Add-On Signatures" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062223" id="2062223" title="Mozilla: Use-After-Free In Text Reflows" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062224" id="2062224" title="Mozilla: Temporary Files Downloaded To /Tmp And Accessible By Other Local Users" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1045</id><title>Important: Httpd Security Update</title><description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: Errors encountered during the discarding of request body lead to HTTP request smuggling (CVE-2022-22720)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2022-03-24 18:33:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="mod_proxy_html" release="97.sl7_9.5" src="httpd-2.4.6-97.sl7_9.5.src.rpm" version="2.4.6"><filename>mod_proxy_html-2.4.6-97.sl7_9.5.x86_64.rpm</filename><sum type="sha256">61b42447228c8c4f96ca083fa8874f87393f20064bc6cd7702d5f287107eefc9</sum></package><package arch="x86_64" name="httpd-devel" release="97.sl7_9.5" src="httpd-2.4.6-97.sl7_9.5.src.rpm" version="2.4.6"><filename>httpd-devel-2.4.6-97.sl7_9.5.x86_64.rpm</filename><sum type="sha256">60c899c7fb2088fb25771d3a18c096b7e85fa343a21f99fde105751d5a78d593</sum></package><package arch="noarch" name="httpd-manual" release="97.sl7_9.5" src="httpd-2.4.6-97.sl7_9.5.src.rpm" version="2.4.6"><filename>httpd-manual-2.4.6-97.sl7_9.5.noarch.rpm</filename><sum type="sha256">53b457c68db12d30eacfe372d40554be842ac10db5568f6576574b28cb6b17d0</sum></package><package arch="x86_64" name="httpd-tools" release="97.sl7_9.5" src="httpd-2.4.6-97.sl7_9.5.src.rpm" version="2.4.6"><filename>httpd-tools-2.4.6-97.sl7_9.5.x86_64.rpm</filename><sum type="sha256">b7000fea8dd4c7ddfbcbf98b95ae7e20330fac2554404d59f1dae79ca3d7010c</sum></package><package arch="x86_64" name="httpd" release="97.sl7_9.5" src="httpd-2.4.6-97.sl7_9.5.src.rpm" version="2.4.6"><filename>httpd-2.4.6-97.sl7_9.5.x86_64.rpm</filename><sum type="sha256">0be74a09f7461ff46cf66401b9db4e4f429b1d4c55952455a8a7a012b728b7c5</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="97.sl7_9.5" src="httpd-2.4.6-97.sl7_9.5.src.rpm" version="2.4.6"><filename>mod_ssl-2.4.6-97.sl7_9.5.x86_64.rpm</filename><sum type="sha256">d03ed63db929825bd4f0f81df35f02c5cc4ad1a05c7693b42b125a8062a69e08</sum></package><package arch="x86_64" name="mod_ldap" release="97.sl7_9.5" src="httpd-2.4.6-97.sl7_9.5.src.rpm" version="2.4.6"><filename>mod_ldap-2.4.6-97.sl7_9.5.x86_64.rpm</filename><sum type="sha256">b01bda47f0ad5df1efa995409759bdaddba56709ca2790177a1a6aa5758086e2</sum></package><package arch="x86_64" name="mod_session" release="97.sl7_9.5" src="httpd-2.4.6-97.sl7_9.5.src.rpm" version="2.4.6"><filename>mod_session-2.4.6-97.sl7_9.5.x86_64.rpm</filename><sum type="sha256">6f9b6c8d39161243b4d782e6b55549de922d0e2d4a56d057373bb28a5577206c</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22720" id="CVE-2022-22720" title="Cve-2022-22720" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1045" id="RHSA-2022:1045" title="Important: Httpd Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1066-1</id><title>Openssl</title><description>Security Fix(es): 
* openssl: Infinite loop in BN_mod_sqrt() reachable when parsing certificates (CVE-2022-0778) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-03-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl-devel" release="25.el7_9" src="openssl-1.0.2k-25.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-25.el7_9.x86_64.rpm</filename><sum type="sha256">0cd7ba148b371e943111ce6eaafbd00eb24c265bbea3545e4cd8f77a4ae0f51a</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="25.el7_9" src="openssl-1.0.2k-25.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-25.el7_9.i686.rpm</filename><sum type="sha256">fb9d5a2a4777a3570d2826570ce98f67c3e75b01d06a859c7d6521ee75d229f8</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="25.el7_9" src="openssl-1.0.2k-25.el7_9.src.rpm" version="1.0.2k"><filename>openssl-perl-1.0.2k-25.el7_9.x86_64.rpm</filename><sum type="sha256">7a90aa94a06406b97cb00a55e2ecfbafb31d9967e76907ec7ad4f954a7f573cb</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="25.el7_9" src="openssl-1.0.2k-25.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-25.el7_9.i686.rpm</filename><sum type="sha256">e9318045f52dc83193ff047b76fee6f3d06ee2092cd7d6752fdb1a7577be3f42</sum></package><package arch="x86_64" epoch="1" name="openssl" release="25.el7_9" src="openssl-1.0.2k-25.el7_9.src.rpm" version="1.0.2k"><filename>openssl-1.0.2k-25.el7_9.x86_64.rpm</filename><sum type="sha256">da8f28a2c9b1940ce0ee2c745cda3f2774bcf3a426350a26903f29b40b9b2fc9</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="25.el7_9" src="openssl-1.0.2k-25.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-25.el7_9.x86_64.rpm</filename><sum type="sha256">9f0061c22cec08a203b08ecc08351efa083a2a438c995b153ae072748bad5263</sum></package><package arch="i686" epoch="1" name="openssl-static" release="25.el7_9" src="openssl-1.0.2k-25.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-25.el7_9.i686.rpm</filename><sum type="sha256">2c9af1aa25ed8e8d12035e176bd3bb1648e3ae05903620f768fd41c83a3cbc27</sum></package><package arch="x86_64" epoch="1" name="openssl-libs" release="25.el7_9" src="openssl-1.0.2k-25.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-25.el7_9.x86_64.rpm</filename><sum type="sha256">e58ebf01a83537b5b6979be59b9bad2552b07874b4ad317037287dbc9e127fd4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0778" id="CVE-2022-0778" title="Openssl: Infinite Loop In Bn_Mod_Sqrt() Reachable When Parsing Certificates" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1066" id="RHSA-2022:1066-1" title="Rhsa-2022:1066-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2062202" id="2062202" title="Openssl: Infinite Loop In Bn_Mod_Sqrt() Reachable When Parsing Certificates" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1069-1</id><title>Expat</title><description>Security Fix(es): 
* expat: Malformed 2- and 3-byte UTF-8 sequences can lead to arbitrary code  execution (CVE-2022-25235) 
* expat: Namespace-separator characters in "xmlns[:prefix]" attribute values can lead to arbitrary code execution (CVE-2022-25236) 
* expat: Integer overflow in storeRawNames() (CVE-2022-25315) 
* expat: Large number of prefixed XML attributes on a single tag can crash libexpat (CVE-2021-45960) 
* expat: Integer overflow in doProlog in xmlparse.c (CVE-2021-46143) 
* expat: Integer overflow in addBinding in xmlparse.c (CVE-2022-22822) 
* expat: Integer overflow in build_model in xmlparse.c (CVE-2022-22823) 
* expat: Integer overflow in defineAttribute in xmlparse.c (CVE-2022-22824) 
* expat: Integer overflow in lookup in xmlparse.c (CVE-2022-22825) 
* expat: Integer overflow in nextScaffoldPart in xmlparse.c (CVE-2022-22826) 
* expat: Integer overflow in storeAtts in xmlparse.c (CVE-2022-22827) 
* expat: Integer overflow in function XML_GetBuffer (CVE-2022-23852) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-03-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="expat" release="14.el7_9" src="expat-2.1.0-14.el7_9.src.rpm" version="2.1.0"><filename>expat-2.1.0-14.el7_9.i686.rpm</filename><sum type="sha256">db2260a5a84c3b7184b5bc609698720947e449b84b89688dabf5254d2cccfd5b</sum></package><package arch="x86_64" name="expat" release="14.el7_9" src="expat-2.1.0-14.el7_9.src.rpm" version="2.1.0"><filename>expat-2.1.0-14.el7_9.x86_64.rpm</filename><sum type="sha256">5257fbac66b901d8eb514bbc0d61e19302e6e789bf5666bed2840c6fdad50bab</sum></package><package arch="i686" name="expat-devel" release="14.el7_9" src="expat-2.1.0-14.el7_9.src.rpm" version="2.1.0"><filename>expat-devel-2.1.0-14.el7_9.i686.rpm</filename><sum type="sha256">91bc2f24c563682181148502aeee7002e20d1745a3fda375947d0b68298e6f9c</sum></package><package arch="x86_64" name="expat-devel" release="14.el7_9" src="expat-2.1.0-14.el7_9.src.rpm" version="2.1.0"><filename>expat-devel-2.1.0-14.el7_9.x86_64.rpm</filename><sum type="sha256">7a36b0bcb1c2ea46cf6c80ffe6d0f37a8767d514bfa2c8fdd27828766f1db9d5</sum></package><package arch="i686" name="expat-static" release="14.el7_9" src="expat-2.1.0-14.el7_9.src.rpm" version="2.1.0"><filename>expat-static-2.1.0-14.el7_9.i686.rpm</filename><sum type="sha256">d92b1587b263f4e350840712870cce1abf384381120b621f913f6d5dbb426c56</sum></package><package arch="x86_64" name="expat-static" release="14.el7_9" src="expat-2.1.0-14.el7_9.src.rpm" version="2.1.0"><filename>expat-static-2.1.0-14.el7_9.x86_64.rpm</filename><sum type="sha256">09fb4769dc9a2d5d253ffddaab86e4eccc87bb0b9fc7a551f5e0a68ea04526c6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45960" id="CVE-2021-45960" title="Expat: Large Number Of Prefixed Xml Attributes On A Single Tag Can Crash Libexpat" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46143" id="CVE-2021-46143" title="Expat: Integer Overflow In Doprolog In Xmlparse.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22822" id="CVE-2022-22822" title="Expat: Integer Overflow In Addbinding In Xmlparse.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22823" id="CVE-2022-22823" title="Expat: Integer Overflow In Build_Model In Xmlparse.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22824" id="CVE-2022-22824" title="Expat: Integer Overflow In Defineattribute In Xmlparse.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22825" id="CVE-2022-22825" title="Expat: Integer Overflow In Lookup In Xmlparse.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22826" id="CVE-2022-22826" title="Expat: Integer Overflow In Nextscaffoldpart In Xmlparse.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22827" id="CVE-2022-22827" title="Expat: Integer Overflow In Storeatts In Xmlparse.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23852" id="CVE-2022-23852" title="Expat: Integer Overflow In Function Xml_Getbuffer" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25235" id="CVE-2022-25235" title="Expat: Malformed 2- And 3-Byte Utf-8 Sequences Can Lead To Arbitrary Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25236" id="CVE-2022-25236" title="Expat: Namespace-Separator Characters In &quot;Xmlns[:Prefix]&quot; Attribute Values Can Lead To Arbitrary Code Execution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25315" id="CVE-2022-25315" title="Expat: Integer Overflow In Storerawnames()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1069" id="RHSA-2022:1069-1" title="Rhsa-2022:1069-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044451" id="2044451" title="Expat: Large Number Of Prefixed Xml Attributes On A Single Tag Can Crash Libexpat" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044455" id="2044455" title="Expat: Integer Overflow In Doprolog In Xmlparse.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044457" id="2044457" title="Expat: Integer Overflow In Addbinding In Xmlparse.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044464" id="2044464" title="Expat: Integer Overflow In Build_Model In Xmlparse.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044467" id="2044467" title="Expat: Integer Overflow In Defineattribute In Xmlparse.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044479" id="2044479" title="Expat: Integer Overflow In Lookup In Xmlparse.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044484" id="2044484" title="Expat: Integer Overflow In Nextscaffoldpart In Xmlparse.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044488" id="2044488" title="Expat: Integer Overflow In Storeatts In Xmlparse.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2044613" id="2044613" title="Expat: Integer Overflow In Function Xml_Getbuffer" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2056363" id="2056363" title="Expat: Integer Overflow In Storerawnames()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2056366" id="2056366" title="Expat: Malformed 2- And 3-Byte Utf-8 Sequences Can Lead To Arbitrary Code Execution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2056370" id="2056370" title="Expat: Namespace-Separator Characters In &quot;Xmlns[:Prefix]&quot; Attribute Values Can Lead To Arbitrary Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1198-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: use-after-free in RDMA listen() (CVE-2021-4028) 
* kernel: fget: check that the fd still exists after getting a ref to it (CVE-2021-4083) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Adding new kernel entry in grub configuration file only after generation of new initramfs 
* Cannot mount DFS shares on SL7 
* SL7.9 - zcrypt DD: Toleration for new IBM Z Crypto Hardware 
* kernel panic at skb_free_datagram_locked on 3.10.0-1160.45.1.el7 
* Lots of tasks are getting stuck in I/O wait waiting on the buffer_head locked by the task that is busy shrinking slab for freeing pages - 3 patches to fs/buffer.c 
* [SL 7.9 Bug] x86/platform/uv: Add more to secondary CPU kdump info 
* REGRESSION System panicking in __kmalloc+0x94 from a freelist issue introduced by a block patch. 
Enhancement(s): 
* SL7.9 - kernel: Add support for CPU-MF counter second version 7</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-04-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools-libs" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">406efbc3cf0166a399a7d123eed3829f0305f3888628008d5f289e23f55434ba</sum></package><package arch="x86_64" name="kernel-debug" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">80cd64455bb40e7230c5834ba674fd80d234e6325414d1543edf005b294e1eb5</sum></package><package arch="x86_64" name="kernel-headers" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">517ce9e691730d5103e7ebeb16e7d616d639f3412a4166060d58155d06914b65</sum></package><package arch="noarch" name="kernel-doc" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.62.1.el7.noarch.rpm</filename><sum type="sha256">472ce233645dedc0eebab070fbf54bae4b5148b689de439d1d25334317906ea1</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">61998c4bdf5a790273293189b472775556b614d1a70988f5d81351674a1ace67</sum></package><package arch="x86_64" name="kernel-tools" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">303b2a8f6f95bc0b6637d696f898944f6c027bfb04037d268485220bc1c94045</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">c85e6501cee65b1a7867aad8fc811600b899f71817e88c6369e8d15b949f42dd</sum></package><package arch="x86_64" name="python-perf" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">e63786d546be238c2b8da96134eb0cedf37afae465088eec5b916e839cc1d102</sum></package><package arch="x86_64" name="bpftool" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">e87ae6fa8c463e8a14daa06961a93b0f67bf3d0114b5293a66376a79d7827672</sum></package><package arch="x86_64" name="perf" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">189d3795653adaada253018e99cdf4046cbdf6e4cb50fec91aee8c705b1c9fe1</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.62.1.el7.noarch.rpm</filename><sum type="sha256">775ad768127a77f40b4feeeaffeff7bce31181bb02dedca2e3d3f02090e693f1</sum></package><package arch="x86_64" name="kernel" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">5f4b87416f08fe2293227436c3860a7b2ba649264a9c16c0113bb22067048556</sum></package><package arch="x86_64" name="kernel-devel" release="1160.62.1.el7" src="kernel-3.10.0-1160.62.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.62.1.el7.x86_64.rpm</filename><sum type="sha256">958f9f19d97851d8cb365895dc33e57e8611f9101896ae8f0485bd687711505d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4028" id="CVE-2021-4028" title="Kernel: Use-After-Free In Rdma Listen()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4083" id="CVE-2021-4083" title="Kernel: Fget: Check That The Fd Still Exists After Getting A Ref To It" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1198" id="RHSA-2022:1198-1" title="Rhsa-2022:1198-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2027201" id="2027201" title="Kernel: Use-After-Free In Rdma Listen()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2029923" id="2029923" title="Kernel: Fget: Check That The Fd Still Exists After Getting A Ref To It" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1284-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.8.0 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free in NSSToken objects (CVE-2022-1097) 
* Mozilla: Out of bounds write due to unexpected WebAuthN Extensions (CVE-2022-28281) 
* Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 (CVE-2022-28289) 
* Mozilla: Use-after-free after VR Process destruction (CVE-2022-1196) 
* Mozilla: Use-after-free in DocumentL10n::TranslateDocument (CVE-2022-28282) 
* Mozilla: Incorrect AliasSet used in JIT Codegen (CVE-2022-28285) 
* Mozilla: Denial of Service via complex regular expressions (CVE-2022-24713) 
* Mozilla: iframe contents could be rendered outside the border (CVE-2022-28286) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-04-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-91.8.0-1.el7_9.src.rpm" version="91.8.0"><filename>firefox-91.8.0-1.el7_9.i686.rpm</filename><sum type="sha256">9daf2e0220ee23c0eb4357894ba156262a6e09e3109e488ba28530e5f63b3b26</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-91.8.0-1.el7_9.src.rpm" version="91.8.0"><filename>firefox-91.8.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">e8b3036efd6a8b939ed121e073fb065f3518b7c43761e4d4610afd5f829b7422</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097" id="CVE-2022-1097" title="Mozilla: Use-After-Free In Nsstoken Objects" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196" id="CVE-2022-1196" title="Mozilla: Use-After-Free After Vr Process Destruction" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713" id="CVE-2022-24713" title="Mozilla: Denial Of Service Via Complex Regular Expressions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281" id="CVE-2022-28281" title="Mozilla: Out Of Bounds Write Due To Unexpected Webauthn Extensions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282" id="CVE-2022-28282" title="Mozilla: Use-After-Free In Documentl10N::Translatedocument" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285" id="CVE-2022-28285" title="Mozilla: Incorrect Aliasset Used In Jit Codegen" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286" id="CVE-2022-28286" title="Mozilla: Iframe Contents Could Be Rendered Outside The Border" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289" id="CVE-2022-28289" title="Mozilla: Memory Safety Bugs Fixed In Firefox 99 And Firefox Esr 91.8" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1284" id="RHSA-2022:1284-1" title="Rhsa-2022:1284-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072559" id="2072559" title="Mozilla: Use-After-Free In Nsstoken Objects" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072560" id="2072560" title="Mozilla: Out Of Bounds Write Due To Unexpected Webauthn Extensions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072561" id="2072561" title="Mozilla: Use-After-Free After Vr Process Destruction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072562" id="2072562" title="Mozilla: Use-After-Free In Documentl10N::Translatedocument" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072563" id="2072563" title="Mozilla: Incorrect Aliasset Used In Jit Codegen" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072564" id="2072564" title="Mozilla: Iframe Contents Could Be Rendered Outside The Border" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072565" id="2072565" title="Mozilla: Denial Of Service Via Complex Regular Expressions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072566" id="2072566" title="Mozilla: Memory Safety Bugs Fixed In Firefox 99 And Firefox Esr 91.8" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1302-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.8.0. 
Security Fix(es): 
* Mozilla: Use-after-free in NSSToken objects (CVE-2022-1097) 
* Mozilla: Out of bounds write due to unexpected WebAuthN Extensions (CVE-2022-28281) 
* Mozilla: Memory safety bugs fixed in Firefox 99 and Firefox ESR 91.8 (CVE-2022-28289) 
* Mozilla: Use-after-free after VR Process destruction (CVE-2022-1196) 
* Mozilla: OpenPGP revocation information was ignored (CVE-2022-1197) 
* Mozilla: Use-after-free in DocumentL10n::TranslateDocument (CVE-2022-28282) 
* Mozilla: Incorrect AliasSet used in JIT Codegen (CVE-2022-28285) 
* Mozilla: Denial of Service via complex regular expressions (CVE-2022-24713) 
* Mozilla: iframe contents could be rendered outside the border (CVE-2022-28286) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-04-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-91.8.0-1.el7_9.src.rpm" version="91.8.0"><filename>thunderbird-91.8.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">a8f369bab052fd85ca6c24f4845174873218547a34eca1081b7d1f7fbfd54a8e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1097" id="CVE-2022-1097" title="Mozilla: Use-After-Free In Nsstoken Objects" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1196" id="CVE-2022-1196" title="Mozilla: Use-After-Free After Vr Process Destruction" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1197" id="CVE-2022-1197" title="Mozilla: Openpgp Revocation Information Was Ignored" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24713" id="CVE-2022-24713" title="Mozilla: Denial Of Service Via Complex Regular Expressions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28281" id="CVE-2022-28281" title="Mozilla: Out Of Bounds Write Due To Unexpected Webauthn Extensions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28282" id="CVE-2022-28282" title="Mozilla: Use-After-Free In Documentl10N::Translatedocument" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28285" id="CVE-2022-28285" title="Mozilla: Incorrect Aliasset Used In Jit Codegen" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28286" id="CVE-2022-28286" title="Mozilla: Iframe Contents Could Be Rendered Outside The Border" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28289" id="CVE-2022-28289" title="Mozilla: Memory Safety Bugs Fixed In Firefox 99 And Firefox Esr 91.8" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1302" id="RHSA-2022:1302-1" title="Rhsa-2022:1302-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072559" id="2072559" title="Mozilla: Use-After-Free In Nsstoken Objects" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072560" id="2072560" title="Mozilla: Out Of Bounds Write Due To Unexpected Webauthn Extensions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072561" id="2072561" title="Mozilla: Use-After-Free After Vr Process Destruction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072562" id="2072562" title="Mozilla: Use-After-Free In Documentl10N::Translatedocument" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072563" id="2072563" title="Mozilla: Incorrect Aliasset Used In Jit Codegen" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072564" id="2072564" title="Mozilla: Iframe Contents Could Be Rendered Outside The Border" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072565" id="2072565" title="Mozilla: Denial Of Service Via Complex Regular Expressions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072566" id="2072566" title="Mozilla: Memory Safety Bugs Fixed In Firefox 99 And Firefox Esr 91.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2072963" id="2072963" title="Mozilla: Openpgp Revocation Information Was Ignored" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1440</id><title>Important: Java-11-Openjdk Security, Bug Fix, And Enhancement Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.15.0.9). (BZ#2047531)
Security Fix(es):
* OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) (CVE-2022-21476) * OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) (CVE-2022-21426) * OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) (CVE-2022-21434) * OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) (CVE-2022-21443) * OpenJDK: URI parsing inconsistencies (JNDI, 8278972) (CVE-2022-21496)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2022-04-25 15:24:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-jmods-debug-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">6454698240bf2414d9a427d50bfc9066d1309fdcbe3ce9fa46c08a34531f9bbd</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">8fa1db6e7c41fa21f266379f8373d0b5adc94af525b0575000f9170a7897a208</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-demo-debug-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">d61e76b91d98389d1d69d1f777395aee32f352d27aa5f69c3639b96170927768</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">98d063dd81a3e10cd455c9d22c4dc9842526ea4739341844b058af143868df19</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-debug-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">6d2bd0cca07b5da3a949c5ab58b8051ef22f9135c194bf6fda871c55252c2f07</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.332.b09-1.el7_9.noarch.rpm</filename><sum type="sha256">0b4e7241ab25be75d62adfd35cf567580d3d778a707cc2c392baad4c0de5d283</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">8d0531bfee4d52a9205fcbe8c1e3910652d26957d10214d8dc1720242cc418cb</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-src-debug-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">c9862419593933f057e7e52a04628c31a91afce54ca20a94e75eb7d8bd4a0c4e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-debug-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">a98dbfd8c7b4aa2d34e972234a01c35ec374d4a01453b24030c1e5700c1acbd7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-headless-debug-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">7ab27c142f078cd661ad9bc2986a25b0e965ed9c6c2954c9b727a4a57b770a70</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">a3536da9d95f234070c5588f129862e6f76e115ab6b9be0e0ed7abae77a491de</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-headless-debug-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">91e1ca80adf9e1c006a587215b8360444486c64e21a21595cd9570ee112d0e18</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">9a27c396f5c20920f4e3b2135d207f022048ac7d2c8e92a7cc7045804a36ff0a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-devel-debug-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">44882dc9edf6502327ae1d7483c4c5e94eaadef140eab876563e545cf588ef69</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">8f5bb8aedb103c83eb41e2cd01541e3745b3ce1c2d18a5fb4c96004573354d46</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">790a422311f4bf7e96ab4f70596e3b15081723e03c10ea5c91be361f32dd00c3</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-static-libs-debug-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">865c25db988d67ea0239d79eff5574b232513b88c54e86fde9768de3420f9849</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">29a58554a3c82b76a03f260483b39de964ed2434f54de298b631d7291f5f760a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-src-debug-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">a5f11cb569cd225057fbf7d36db853276edbdfdc8d4e95f8a3eb45dd816ede0c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">bab1d9c934572ad5e702d3f290c5c3be3db749006e8a4f19023d1d3b43195706</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-demo-debug-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">55b5258d010f86e7ef8ad2a49179e102cd71c4c281fba741c65ee9d72290c800</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">3c2d12a6fde5807197875fa4f3abab4b4b71c2fbedeebc8b74fa5a929612c5a7</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.332.b09-1.el7_9.noarch.rpm</filename><sum type="sha256">2fbc92e494e095f0bd519994a99ff2dfdef3fc82db35669b1e868e8797c27de2</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-src-debug-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">5c9a44c800e5518d218e575dd86612f06ec48a06d1a192896b8ad93b5432c46f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-debug-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">bf12e7ca8f7d3ee8b42c8fea4863251f25fd0688e622119a9e2d164965268b03</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-src-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">7ec8ac0d1a0ade3c045fdb70e701cdedaed51839fc794a6cb646da9d2b62542d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-devel-debug-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">e6070418b3a57822693d1ba54ab0835d412b97de8f31738d137e1a8affd67c06</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">5c4c150e5d70ef3e359f5cc3c001dd34c5aaa52972b76db6c0cf7f99c09e1480</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-jmods-debug-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">f79e6a2d077080d73e3d2e89419e063fed74e795be7eb14bd794be7b6251727f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">1be91c9ffdaf54ab97c3e8ca6e8f8cc761d71df030821976129d0b975e8fff74</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">1d5c0b1629cd24b0ef8772abd047e970432905649620632b32b5b45f33f397d8</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426" id="CVE-2022-21426" title="Cve-2022-21426" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434" id="CVE-2022-21434" title="Cve-2022-21434" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443" id="CVE-2022-21443" title="Cve-2022-21443" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476" id="CVE-2022-21476" title="Cve-2022-21476" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496" id="CVE-2022-21496" title="Cve-2022-21496" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1440" id="RHSA-2022:1440" title="Important: Java-11-Openjdk Security, Bug Fix, And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2047531" id="2047531" title="2047531 &#8211; Prepare For The Next Quarterly Openjdk Upstream Release (2022-04, 11.0.15) [Rhel-7]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1440-1</id><title>Java-11-Openjdk</title><description>The following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.15.0.9). 
Security Fix(es): 
* OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) (CVE-2022-21476) 
* OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) (CVE-2022-21426) 
* OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) (CVE-2022-21434) 
* OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151)  (CVE-2022-21443) 
* OpenJDK: URI parsing inconsistencies (JNDI, 8278972) (CVE-2022-21496) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-04-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-javadoc-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">dde57732b2c43cf4fdab923ca25a26111486754cfef4b0b7ca9ae4bcc59c8f03</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">dcf924eeb44ba991e6d0ffdc06e5f8ae80a9fefa7034a3c4866cf7a56ef3c8e3</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-jmods-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">29225e443a09ceaff69bc83a0172c0287a57389bdfb51b9f19e612e440bbc71a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-jmods-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">37e80356b5ec3561aa58ed22a4c8d39eaffc5111a7931dc05f8879fc880c2f66</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-devel-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">d13851971149cf7063229db1256e4079cd602a757bdc196b01db2a3eaf888f61</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">f941c1ab71d54b68b3cd2560fd5340cba62675deeffa9fac9cb2f663de30c5cd</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-src-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">89d22efd78517f02dbf39aea0f45dfa8d261012bd910d7059012cd53fc6ce28b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">54de3796cc3eb5b01d2b60bcc97b9c8fcf29dcc4a70a8c7031fe6f55cc0f8ec6</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-src-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">3bdef62cb5951dfd6d4561608d29e54e027eb399227e9d066e8ea0a7da7feb73</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-headless-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">85b1c49c7c73aa8d4fd021959cbe18c3ee1cdbc75268a0e7b212f1852f0db2d7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-demo-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">b5babd89afc050fb8e0be904f5fc61c9d551ed427a72d4a77d367e415776704d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">43425d585ac388ff95d0d6bcd4d5a80b9c13c0d6df3756a31d89fa50920fe4d9</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-headless-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">187b0eeca1aa3710529d42aec35f95d4cb2a0dadf7089b297512c4cc604a213c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-devel-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">7fcf28f2386c7cab99c5bfba993434b55e925ac83db8d627ccbcad6dfeff416f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-static-libs-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">abd20afa7d4d5874006ad51aafa8bb71c41048ac8be43642c5913d0f9f007bc7</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-demo-11.0.15.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">fd618325e092d5dbe7ad7e7e7c3178a8335f1d2c1d9a9fc05962f6703df8648c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="2.el7_9" src="java-11-openjdk-11.0.15.0.9-2.el7_9.src.rpm" version="11.0.15.0.9"><filename>java-11-openjdk-javadoc-11.0.15.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">b78a1c26e55cc35b94e51b14ef910876e24a17e7ddd20f0a9bd230ae6e72f3a1</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426" id="CVE-2022-21426" title="Openjdk: Unbounded Memory Allocation When Compiling Crafted Xpath Expressions (Jaxp, 8270504)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434" id="CVE-2022-21434" title="Openjdk: Improper Object-To-String Conversion In Annotationinvocationhandler (Libraries, 8277672)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443" id="CVE-2022-21443" title="Openjdk: Missing Check For Negative Objectidentifier (Libraries, 8275151)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476" id="CVE-2022-21476" title="Openjdk: Defective Secure Validation In Apache Santuario (Libraries, 8278008)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496" id="CVE-2022-21496" title="Openjdk: Uri Parsing Inconsistencies (Jndi, 8278972)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1440" id="RHSA-2022:1440-1" title="Rhsa-2022:1440-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075788" id="2075788" title="Openjdk: Unbounded Memory Allocation When Compiling Crafted Xpath Expressions (Jaxp, 8270504)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075793" id="2075793" title="Openjdk: Missing Check For Negative Objectidentifier (Libraries, 8275151)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075836" id="2075836" title="Openjdk: Improper Object-To-String Conversion In Annotationinvocationhandler (Libraries, 8277672)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075842" id="2075842" title="Openjdk: Defective Secure Validation In Apache Santuario (Libraries, 8278008)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075849" id="2075849" title="Openjdk: Uri Parsing Inconsistencies (Jndi, 8278972)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1487-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) (CVE-2022-21476) 
* OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) (CVE-2022-21426) 
* OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) (CVE-2022-21434) 
* OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151)  (CVE-2022-21443) 
* OpenJDK: URI parsing inconsistencies (JNDI, 8278972) (CVE-2022-21496) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-04-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">2fe3ed816e42aacabe3ccbe30a458b41470ed1419f25c24f07ea37c2faf16ed5</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-accessibility-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">3203b6dee98f8021866c807ba0389dcaa94cafdc001720e86135d61b1a826b4a</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">913f70c9c5bfb2b4c63dffc455ee70363bca51fed32a63bc552c3686c1f9c34f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">1a08683eeb8f7d7245725793b3ccc5011b5feb349ad97a59b6c1a0e096d56abc</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">c8caa6d338c2691c4c131f970d3a3bafbc26d9445e85f57ca905fa0635c2dbbf</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-accessibility-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">7555bf4db79a8e019a6757b8b3f7ade934a602a05f711d0ffbf0d17991047a1c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">a911a1eb974b106334d39bd84e8394b666788f50805e0b0bb675cf086a5e860e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">2d032b3722bef7b4fcc6722509f7c105c742079e69ed5a2ab9bce66e7d870c22</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el7_9.noarch.rpm</filename><sum type="sha256">4e216459910b462af79016c6fe77c7d44608501de95f10dd93bebc4968ad96e0</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-src-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">25e1e8033161283a58f8deaa404326d267095868935d1d9bb839a38c004046a7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-src-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">46fa43016dca217f7f31aec060edb30aaabaa1f50ae8a70ec3ec0508cb7d8aa7</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el7_9.noarch.rpm</filename><sum type="sha256">65ba24f4ef25a4833d1a39799602766dc85b2c018c8928d31ab4a2001c59b578</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.i686.rpm</filename><sum type="sha256">8b035e58f6ea351ea93babda6b4925d6cfe96b5e169f9548028831c8042ad0c1</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.332.b09-1.el7_9.src.rpm" version="1.8.0.332.b09"><filename>java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el7_9.x86_64.rpm</filename><sum type="sha256">982688a1575aa0bf1f4c1adaf81c61564d7a2dea3bd7394bcbccc2f8a6997719</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21426" id="CVE-2022-21426" title="Openjdk: Unbounded Memory Allocation When Compiling Crafted Xpath Expressions (Jaxp, 8270504)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21434" id="CVE-2022-21434" title="Openjdk: Improper Object-To-String Conversion In Annotationinvocationhandler (Libraries, 8277672)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21443" id="CVE-2022-21443" title="Openjdk: Missing Check For Negative Objectidentifier (Libraries, 8275151)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21476" id="CVE-2022-21476" title="Openjdk: Defective Secure Validation In Apache Santuario (Libraries, 8278008)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21496" id="CVE-2022-21496" title="Openjdk: Uri Parsing Inconsistencies (Jndi, 8278972)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1487" id="RHSA-2022:1487-1" title="Rhsa-2022:1487-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075788" id="2075788" title="Openjdk: Unbounded Memory Allocation When Compiling Crafted Xpath Expressions (Jaxp, 8270504)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075793" id="2075793" title="Openjdk: Missing Check For Negative Objectidentifier (Libraries, 8275151)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075836" id="2075836" title="Openjdk: Improper Object-To-String Conversion In Annotationinvocationhandler (Libraries, 8277672)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075842" id="2075842" title="Openjdk: Defective Secure Validation In Apache Santuario (Libraries, 8278008)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2075849" id="2075849" title="Openjdk: Uri Parsing Inconsistencies (Jndi, 8278972)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1541-1</id><title>Maven-Shared-Utils</title><description>Security Fix(es): 
* maven-shared-utils: Command injection via Commandline class (CVE-2022-29599) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-04-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="maven-shared-utils" release="4.el7_9" src="maven-shared-utils-0.4-4.el7_9.src.rpm" version="0.4"><filename>maven-shared-utils-0.4-4.el7_9.noarch.rpm</filename><sum type="sha256">635ca492b99ed733728a56d3d5882fc5a367ffcae2bcd0e5730ecba596d48a99</sum></package><package arch="noarch" name="maven-shared-utils-javadoc" release="4.el7_9" src="maven-shared-utils-0.4-4.el7_9.src.rpm" version="0.4"><filename>maven-shared-utils-javadoc-0.4-4.el7_9.noarch.rpm</filename><sum type="sha256">71ba926f15d5118380601b4e3c13e09b1aa51462571713302735e558c25aeb62</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29599" id="CVE-2022-29599" title="Maven-Shared-Utils: Command Injection Via Commandline Class" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1541" id="RHSA-2022:1541-1" title="Rhsa-2022:1541-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2066479" id="2066479" title="Maven-Shared-Utils: Command Injection Via Commandline Class" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1703-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.9.0 ESR. 
Security Fix(es): 
* Mozilla: Bypassing permission prompt in nested browsing contexts (CVE-2022-29909) 
* Mozilla: iframe Sandbox bypass (CVE-2022-29911) 
* Mozilla: Fullscreen notification bypass using popups (CVE-2022-29914) 
* Mozilla: Leaking browser history with CSS variables (CVE-2022-29916) 
* Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 (CVE-2022-29917) 
* Mozilla: Reader mode bypassed SameSite cookies (CVE-2022-29912) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-05-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-91.9.0-1.el7_9.src.rpm" version="91.9.0"><filename>firefox-91.9.0-1.el7_9.i686.rpm</filename><sum type="sha256">2848a8eb37faa0aa648b62965b19fa466dc4968ed927d3545154545215d52e98</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-91.9.0-1.el7_9.src.rpm" version="91.9.0"><filename>firefox-91.9.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">c11a6c9ed11495d188649eb84f2251a15dbf86228fce394a8c8b9fd278ddb811</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909" id="CVE-2022-29909" title="Mozilla: Bypassing Permission Prompt In Nested Browsing Contexts" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911" id="CVE-2022-29911" title="Mozilla: Iframe Sandbox Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912" id="CVE-2022-29912" title="Mozilla: Reader Mode Bypassed Samesite Cookies" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914" id="CVE-2022-29914" title="Mozilla: Fullscreen Notification Bypass Using Popups" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916" id="CVE-2022-29916" title="Mozilla: Leaking Browser History With Css Variables" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917" id="CVE-2022-29917" title="Mozilla: Memory Safety Bugs Fixed In Firefox 100 And Firefox Esr 91.9" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1703" id="RHSA-2022:1703-1" title="Rhsa-2022:1703-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081468" id="2081468" title="Mozilla: Fullscreen Notification Bypass Using Popups" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081469" id="2081469" title="Mozilla: Bypassing Permission Prompt In Nested Browsing Contexts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081470" id="2081470" title="Mozilla: Leaking Browser History With Css Variables" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081471" id="2081471" title="Mozilla: Iframe Sandbox Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081472" id="2081472" title="Mozilla: Reader Mode Bypassed Samesite Cookies" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081473" id="2081473" title="Mozilla: Memory Safety Bugs Fixed In Firefox 100 And Firefox Esr 91.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:1725-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.9.0. 
Security Fix(es): 
* Mozilla: Bypassing permission prompt in nested browsing contexts (CVE-2022-29909) 
* Mozilla: iframe Sandbox bypass (CVE-2022-29911) 
* Mozilla: Fullscreen notification bypass using popups (CVE-2022-29914) 
* Mozilla: Leaking browser history with CSS variables (CVE-2022-29916) 
* Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 (CVE-2022-29917) 
* Mozilla: Reader mode bypassed SameSite cookies (CVE-2022-29912) 
* Mozilla: Speech Synthesis feature not properly disabled (CVE-2022-29913) 
* Mozilla: Incorrect security status shown after viewing an attached email (CVE-2022-1520) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-05-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="3.el7_9" src="thunderbird-91.9.0-3.el7_9.src.rpm" version="91.9.0"><filename>thunderbird-91.9.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">806c8e4eebfcbbae90a9ac8a9d27e401ae2e6bc8bd1e64d871a4c55478605cc9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1520" id="CVE-2022-1520" title="Mozilla: Incorrect Security Status Shown After Viewing An Attached Email" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29909" id="CVE-2022-29909" title="Mozilla: Bypassing Permission Prompt In Nested Browsing Contexts" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29911" id="CVE-2022-29911" title="Mozilla: Iframe Sandbox Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29912" id="CVE-2022-29912" title="Mozilla: Reader Mode Bypassed Samesite Cookies" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29913" id="CVE-2022-29913" title="Mozilla: Speech Synthesis Feature Not Properly Disabled" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29914" id="CVE-2022-29914" title="Mozilla: Fullscreen Notification Bypass Using Popups" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29916" id="CVE-2022-29916" title="Mozilla: Leaking Browser History With Css Variables" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29917" id="CVE-2022-29917" title="Mozilla: Memory Safety Bugs Fixed In Firefox 100 And Firefox Esr 91.9" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:1725" id="RHSA-2022:1725-1" title="Rhsa-2022:1725-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081468" id="2081468" title="Mozilla: Fullscreen Notification Bypass Using Popups" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081469" id="2081469" title="Mozilla: Bypassing Permission Prompt In Nested Browsing Contexts" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081470" id="2081470" title="Mozilla: Leaking Browser History With Css Variables" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081471" id="2081471" title="Mozilla: Iframe Sandbox Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081472" id="2081472" title="Mozilla: Reader Mode Bypassed Samesite Cookies" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081473" id="2081473" title="Mozilla: Memory Safety Bugs Fixed In Firefox 100 And Firefox Esr 91.9" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2082037" id="2082037" title="Mozilla: Incorrect Security Status Shown After Viewing An Attached Email" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2082038" id="2082038" title="Mozilla: Speech Synthesis Feature Not Properly Disabled" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:2191-1</id><title>Gzip</title><description>Security Fix(es): 
* gzip: arbitrary-file-write vulnerability (CVE-2022-1271) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-05-12 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gzip" release="11.el7_9" src="gzip-1.5-11.el7_9.src.rpm" version="1.5"><filename>gzip-1.5-11.el7_9.x86_64.rpm</filename><sum type="sha256">31892df32fdf2c1c290d6e2f41169b2cd56ddbf8bb2635c07416c00979a4d59f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271" id="CVE-2022-1271" title="Gzip: Arbitrary-File-Write Vulnerability" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:2191" id="RHSA-2022:2191-1" title="Rhsa-2022:2191-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2073310" id="2073310" title="Gzip: Arbitrary-File-Write Vulnerability" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:2213-1</id><title>Zlib</title><description>Security Fix(es): 
* zlib: A flaw found in zlib when compressing (not decompressing) certain inputs (CVE-2018-25032) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-05-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="zlib-static" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>zlib-static-1.2.7-20.el7_9.x86_64.rpm</filename><sum type="sha256">59fbd7dba8ac257ebd36d9e43a3f1416134e2034c3c64053397dbe35092f29b1</sum></package><package arch="i686" name="zlib" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>zlib-1.2.7-20.el7_9.i686.rpm</filename><sum type="sha256">e2a8ad745347fbfb35c38b8084fa7d8918c8affc9387f5a45f9e60c32279597d</sum></package><package arch="i686" name="minizip-devel" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>minizip-devel-1.2.7-20.el7_9.i686.rpm</filename><sum type="sha256">c8243e2e7c06b397b7d8f8f5f6c0baa8b8a83a37618e96d4ee46974a0648dabe</sum></package><package arch="i686" name="zlib-static" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>zlib-static-1.2.7-20.el7_9.i686.rpm</filename><sum type="sha256">6edb526f889c296e32c1573d68fe243759299b4a8bd2a0b7a29328695ae05769</sum></package><package arch="i686" name="minizip" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>minizip-1.2.7-20.el7_9.i686.rpm</filename><sum type="sha256">cedb4974fde50c300966cefb68799eca467fa942ae921647be90c1e11a3df00f</sum></package><package arch="i686" name="zlib-devel" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>zlib-devel-1.2.7-20.el7_9.i686.rpm</filename><sum type="sha256">ce8da1a1626e6648d5557d6566ebc67e0c2b61e841c2c501e15f7bd867bb3236</sum></package><package arch="x86_64" name="minizip-devel" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>minizip-devel-1.2.7-20.el7_9.x86_64.rpm</filename><sum type="sha256">f9cb6bb4c9f5556c891e8eb177f3b35dbc5dd20ad58256f93e4e2a9a9bea0614</sum></package><package arch="x86_64" name="zlib-devel" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>zlib-devel-1.2.7-20.el7_9.x86_64.rpm</filename><sum type="sha256">ecb3672456577e44acfee7cb131be9acb9781ba1433f4e1fadb18f7d6dcd700c</sum></package><package arch="x86_64" name="zlib" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>zlib-1.2.7-20.el7_9.x86_64.rpm</filename><sum type="sha256">4a4de3032bfcef31be4e2cb07dc924293521d9ce6500d17c45e618af7d3f725a</sum></package><package arch="x86_64" name="minizip" release="20.el7_9" src="zlib-1.2.7-20.el7_9.src.rpm" version="1.2.7"><filename>minizip-1.2.7-20.el7_9.x86_64.rpm</filename><sum type="sha256">2e4eacbb6adc7522697701ef62afef3212274d563cf10b9e556fe8e2eb341577</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-25032" id="CVE-2018-25032" title="Zlib: A Flaw Found In Zlib When Compressing (Not Decompressing) Certain Inputs" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:2213" id="RHSA-2022:2213-1" title="Rhsa-2022:2213-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2067945" id="2067945" title="Zlib: A Flaw Found In Zlib When Compressing (Not Decompressing) Certain Inputs" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:4642-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: cgroups v1 release_agent feature may allow privilege escalation (CVE-2022-0492) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* kernel panic in mlx5_ib driver SL/CentOS 7.9 VM 
* [SL-7.9] Get Call Trace about "kernel/timer.c:1270 requeue_timers+0x15e/0x170" on specified AMD x86_64 system 
* kernel NULL pointer dereference while calling dma_pool_alloc from the mlx5_core module 
* Rhel 7.9 NFS Clients takes very long time to resume operations in an NFS Server failover scenario 
* perf stat shows unsupported counters for Intel IceLake cpu</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-05-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="perf" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">e35107177f0d41b11598d0eb6b700fcb26220351f583b2b7f5822f6e8c3362d6</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">c1c6d696b1cf50d8c90b8fc28de93bb4281a51a243e473fa57f0bcfe6868b343</sum></package><package arch="x86_64" name="kernel-debug" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">6d3e4617ed58016b72c8c1e794509f65512f2895935e7d5228b82fe0544f18dd</sum></package><package arch="x86_64" name="kernel-headers" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">69d183d419048a8f44a63d9c6ecefdc9c66a024a3fd1a977a52242a10d9a6c94</sum></package><package arch="noarch" name="kernel-doc" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.66.1.el7.noarch.rpm</filename><sum type="sha256">fb8d00a98dbf8ad64df3c2fc3bd71875f16f26f4bb63d75569f3b23119e1cf82</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.66.1.el7.noarch.rpm</filename><sum type="sha256">7f4a207a45581b1089c7584be3d0e47920eaa1daf4259f06c2f224b5ee6b89d4</sum></package><package arch="x86_64" name="kernel-devel" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">335d8182f93343fe1c06d24c240894cce9ff2641ae03e4be023af248320211b0</sum></package><package arch="x86_64" name="kernel" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">f9b73f3c142bad4396ca930a46fb0a9936ea56f78daee78c5a5567eef626765d</sum></package><package arch="x86_64" name="python-perf" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">d4df399b78ab27a497b8ba2cdda2b6c2429c137b5b75c0e9e7b7dda9aa1f7f5c</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">8213bb277061bfe1bd0374654b7af0c9bbe1fc417794613469281c45e94ad21a</sum></package><package arch="x86_64" name="kernel-tools" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">ba2389506b7fdd928f026feeaa2e7c45f63e70a263360669cd5246259d9b9c22</sum></package><package arch="x86_64" name="bpftool" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">ce07c0edcf1471992df12486aaab0ac6c59c962c91ec2488f8080eb5527c2895</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.66.1.el7" src="kernel-3.10.0-1160.66.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.66.1.el7.x86_64.rpm</filename><sum type="sha256">9f3f654ab1782eebfee4bdfa9ef84640016992e36a13770aae9d8e3a91d9f05f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0492" id="CVE-2022-0492" title="Kernel: Cgroups V1 Release_Agent Feature May Allow Privilege Escalation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:4642" id="RHSA-2022:4642-1" title="Rhsa-2022:4642-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2051505" id="2051505" title="Kernel: Cgroups V1 Release_Agent Feature May Allow Privilege Escalation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:4729-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.9.1 ESR. 
Security Fix(es): 
* Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution (CVE-2022-1529) 
* Mozilla: Prototype pollution in Top-Level Await implementation (CVE-2022-1802) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>critical</severity><release>Scientific Linux</release><issued date="2022-05-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-91.9.1-1.el7_9.src.rpm" version="91.9.1"><filename>firefox-91.9.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">80d46609a8cb319359dc3b90af371283b148cd4a302a84bd648bf361c9c9aea0</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-91.9.1-1.el7_9.src.rpm" version="91.9.1"><filename>firefox-91.9.1-1.el7_9.i686.rpm</filename><sum type="sha256">341d17218763d9e521c93047f4952bfec6d6c04b14f9ee0a68fa7349fb40c0e6</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529" id="CVE-2022-1529" title="Mozilla: Untrusted Input Used In Javascript Object Indexing, Leading To Prototype Pollution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802" id="CVE-2022-1802" title="Mozilla: Prototype Pollution In Top-Level Await Implementation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:4729" id="RHSA-2022:4729-1" title="Rhsa-2022:4729-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2089217" id="2089217" title="Mozilla: Prototype Pollution In Top-Level Await Implementation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2089218" id="2089218" title="Mozilla: Untrusted Input Used In Javascript Object Indexing, Leading To Prototype Pollution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:4730-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.9.1. 
Security Fix(es): 
* Mozilla: Untrusted input used in JavaScript object indexing, leading to prototype pollution (CVE-2022-1529) 
* Mozilla: Prototype pollution in Top-Level Await implementation (CVE-2022-1802) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>critical</severity><release>Scientific Linux</release><issued date="2022-05-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-91.9.1-1.el7_9.src.rpm" version="91.9.1"><filename>thunderbird-91.9.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">cdc32e32092757a426f9207dcc7a53db29fa5b0ed6c7fe4fe65314f3cefa263e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1529" id="CVE-2022-1529" title="Mozilla: Untrusted Input Used In Javascript Object Indexing, Leading To Prototype Pollution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1802" id="CVE-2022-1802" title="Mozilla: Prototype Pollution In Top-Level Await Implementation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:4730" id="RHSA-2022:4730-1" title="Rhsa-2022:4730-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#critical" id="critical" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2089217" id="2089217" title="Mozilla: Prototype Pollution In Top-Level Await Implementation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2089218" id="2089218" title="Mozilla: Untrusted Input Used In Javascript Object Indexing, Leading To Prototype Pollution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:4803-1</id><title>Rsyslog</title><description>Security Fix(es): 
* rsyslog: Heap-based overflow in TCP syslog server (CVE-2022-24903) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-06-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="rsyslog-snmp" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-snmp-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">e3b0542fcbf988eefd3b6ec087cdc45c6c1d06f14f3be8bade5e4f1c7e417672</sum></package><package arch="noarch" name="rsyslog-doc" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-doc-8.24.0-57.el7_9.3.noarch.rpm</filename><sum type="sha256">72657e2cc5db25197b8f643d0203f53eacd2005e6b211e2317675382eba39e4f</sum></package><package arch="x86_64" name="rsyslog-libdbi" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-libdbi-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">966ee3885d60b27edf283acd40da8dcb43f82fdf2e4b85775808e4b8c01a91a1</sum></package><package arch="x86_64" name="rsyslog-pgsql" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-pgsql-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">432a8f1b6e2be0243afc23f667afa34872e02b7b9f961628c3236a7b055798af</sum></package><package arch="x86_64" name="rsyslog-relp" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-relp-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">8d3db0683773333cd93c29adbc38376f2d4b47539b0e573028504b08227ea593</sum></package><package arch="x86_64" name="rsyslog-gnutls" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-gnutls-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">dbf02a5d0fc4e537ba4efc857f2665213c6d3dc3b84c5f62b6c3ad8978d8464a</sum></package><package arch="x86_64" name="rsyslog-udpspoof" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-udpspoof-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">5a6260ae1d9c425f4d0e094e01ceaec7a20afea7464ddd37219ce2d86bd42e06</sum></package><package arch="x86_64" name="rsyslog-crypto" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-crypto-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">35077c3289d295a5cc412a627a2b361607dd36c687b16a2bacdb2b21dc2e4f8a</sum></package><package arch="x86_64" name="rsyslog-mmnormalize" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-mmnormalize-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">644b8ec956e3eaf20423f42b6d09c3a84f1bb42e71e37bd362e0d61c078e75be</sum></package><package arch="x86_64" name="rsyslog-mysql" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-mysql-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">a9b52a799cc93dc6d8a1d9f9a194ab5e3dddc39cf22bdb4345a3b0d92c532bb7</sum></package><package arch="x86_64" name="rsyslog" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">79a351c99a2feaa59d46d57843b73a33626af0b2e0c02e36b4d1433b854eb632</sum></package><package arch="x86_64" name="rsyslog-mmsnmptrapd" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-mmsnmptrapd-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">111275aab2b392d0e2100b7b793077752a97d9753336c6bb69b6cc7692137d6a</sum></package><package arch="x86_64" name="rsyslog-mmjsonparse" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-mmjsonparse-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">46edf8d0738f0a3f00cf1a2780d87e0c6f0bcadc90cd137ecfc30e86571fd90c</sum></package><package arch="x86_64" name="rsyslog-gssapi" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-gssapi-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">af9469c429db2f02c98a5491498b5eeba67965d937b0accd39b9d6cb868dab10</sum></package><package arch="x86_64" name="rsyslog-mmaudit" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-mmaudit-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">04c51d5cf3f33a846a9791cd706b8f717e28c9d6d49c3ddf46901600b0250b60</sum></package><package arch="x86_64" name="rsyslog-elasticsearch" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-elasticsearch-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">fcd136bc321c3355d226340c99e3966a302f34476f045f5224335f637d397567</sum></package><package arch="x86_64" name="rsyslog-kafka" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-kafka-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">88d2d81c4c6f9f0eecb5f904d4ffbe92f99cf545734a558e3b44642c1185dd87</sum></package><package arch="x86_64" name="rsyslog-mmkubernetes" release="57.el7_9.3" src="rsyslog-8.24.0-57.el7_9.3.src.rpm" version="8.24.0"><filename>rsyslog-mmkubernetes-8.24.0-57.el7_9.3.x86_64.rpm</filename><sum type="sha256">00a56045395dda8d104195a547d518a18fbbb6b03cf23b40a1184906eef1ca51</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24903" id="CVE-2022-24903" title="Rsyslog: Heap-Based Overflow In Tcp Syslog Server" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:4803" id="RHSA-2022:4803-1" title="Rhsa-2022:4803-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081353" id="2081353" title="Rsyslog: Heap-Based Overflow In Tcp Syslog Server" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:4870-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.10.0 ESR. 
Security Fix(es): 
* Mozilla: Cross-Origin resource's length leaked (CVE-2022-31736) 
* Mozilla: Heap buffer overflow in WebGL (CVE-2022-31737) 
* Mozilla: Browser window spoof using fullscreen mode (CVE-2022-31738) 
* Mozilla: Register allocation problem in WASM on arm64 (CVE-2022-31740) 
* Mozilla: Uninitialized variable leads to invalid memory read (CVE-2022-31741) 
* Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 (CVE-2022-31747) 
* Mozilla: Querying a WebAuthn token with a large number of allowCredential  entries may have leaked cross-origin information (CVE-2022-31742) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-06-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-91.10.0-1.el7_9.src.rpm" version="91.10.0"><filename>firefox-91.10.0-1.el7_9.i686.rpm</filename><sum type="sha256">2c73cfaf9b93a6e35b7206601d3a4f4d633b93e520ced5f8479a6eaacad266e1</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-91.10.0-1.el7_9.src.rpm" version="91.10.0"><filename>firefox-91.10.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">f439b4056dcf344e92989d85360bc52336ce8ec8f3c89db5ab19f2b3688e3b3e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736" id="CVE-2022-31736" title="Mozilla: Cross-Origin Resource'S Length Leaked" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737" id="CVE-2022-31737" title="Mozilla: Heap Buffer Overflow In Webgl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738" id="CVE-2022-31738" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740" id="CVE-2022-31740" title="Mozilla: Register Allocation Problem In Wasm On Arm64" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741" id="CVE-2022-31741" title="Mozilla: Uninitialized Variable Leads To Invalid Memory Read" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742" id="CVE-2022-31742" title="Mozilla: Querying A Webauthn Token With A Large Number Of Allowcredential Entries May Have Leaked Cross-Origin Information" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747" id="CVE-2022-31747" title="Mozilla: Memory Safety Bugs Fixed In Firefox 101 And Firefox Esr 91.10" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:4870" id="RHSA-2022:4870-1" title="Rhsa-2022:4870-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092018" id="2092018" title="Mozilla: Cross-Origin Resource'S Length Leaked" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092019" id="2092019" title="Mozilla: Heap Buffer Overflow In Webgl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092021" id="2092021" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092023" id="2092023" title="Mozilla: Register Allocation Problem In Wasm On Arm64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092024" id="2092024" title="Mozilla: Uninitialized Variable Leads To Invalid Memory Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092025" id="2092025" title="Mozilla: Querying A Webauthn Token With A Large Number Of Allowcredential Entries May Have Leaked Cross-Origin Information" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092026" id="2092026" title="Mozilla: Memory Safety Bugs Fixed In Firefox 101 And Firefox Esr 91.10" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:4891-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.10.0. 
Security Fix(es): 
* Mozilla: Braille space character caused incorrect sender email to be shown for a digitally signed email (CVE-2022-1834) 
* Mozilla: Cross-Origin resource's length leaked (CVE-2022-31736) 
* Mozilla: Heap buffer overflow in WebGL (CVE-2022-31737) 
* Mozilla: Browser window spoof using fullscreen mode (CVE-2022-31738) 
* Mozilla: Register allocation problem in WASM on arm64 (CVE-2022-31740) 
* Mozilla: Uninitialized variable leads to invalid memory read (CVE-2022-31741) 
* Mozilla: Memory safety bugs fixed in Firefox 101 and Firefox ESR 91.10 (CVE-2022-31747) 
* Mozilla: Querying a WebAuthn token with a large number of allowCredential  entries may have leaked cross-origin information (CVE-2022-31742) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-06-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-91.10.0-1.el7_9.src.rpm" version="91.10.0"><filename>thunderbird-91.10.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">ba4945587137c1e9dc2da7e1bc1c6993113a8dac1a2b1af76a9b473672c62f6b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1834" id="CVE-2022-1834" title="Mozilla: Braille Space Character Caused Incorrect Sender Email To Be Shown For A Digitally Signed Email" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31736" id="CVE-2022-31736" title="Mozilla: Cross-Origin Resource'S Length Leaked" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31737" id="CVE-2022-31737" title="Mozilla: Heap Buffer Overflow In Webgl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31738" id="CVE-2022-31738" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31740" id="CVE-2022-31740" title="Mozilla: Register Allocation Problem In Wasm On Arm64" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31741" id="CVE-2022-31741" title="Mozilla: Uninitialized Variable Leads To Invalid Memory Read" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31742" id="CVE-2022-31742" title="Mozilla: Querying A Webauthn Token With A Large Number Of Allowcredential Entries May Have Leaked Cross-Origin Information" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31747" id="CVE-2022-31747" title="Mozilla: Memory Safety Bugs Fixed In Firefox 101 And Firefox Esr 91.10" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:4891" id="RHSA-2022:4891-1" title="Rhsa-2022:4891-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092018" id="2092018" title="Mozilla: Cross-Origin Resource'S Length Leaked" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092019" id="2092019" title="Mozilla: Heap Buffer Overflow In Webgl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092021" id="2092021" title="Mozilla: Browser Window Spoof Using Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092023" id="2092023" title="Mozilla: Register Allocation Problem In Wasm On Arm64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092024" id="2092024" title="Mozilla: Uninitialized Variable Leads To Invalid Memory Read" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092025" id="2092025" title="Mozilla: Querying A Webauthn Token With A Large Number Of Allowcredential Entries May Have Leaked Cross-Origin Information" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092026" id="2092026" title="Mozilla: Memory Safety Bugs Fixed In Firefox 101 And Firefox Esr 91.10" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092416" id="2092416" title="Mozilla: Braille Space Character Caused Incorrect Sender Email To Be Shown For A Digitally Signed Email" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:4930-1</id><title>Python-Twisted-Web</title><description>Security Fix(es): 
* python-twisted: possible http request smuggling (CVE-2022-24801) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-06-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-twisted-web" release="8.el7_9" src="python-twisted-web-12.1.0-8.el7_9.src.rpm" version="12.1.0"><filename>python-twisted-web-12.1.0-8.el7_9.x86_64.rpm</filename><sum type="sha256">45f5bb7fea6902e35eae90d069a93ba49ba7a7c8b0d7c6f2a34eca6fe131ad25</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24801" id="CVE-2022-24801" title="Python-Twisted: Possible Http Request Smuggling" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:4930" id="RHSA-2022:4930-1" title="Rhsa-2022:4930-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2073114" id="2073114" title="Python-Twisted: Possible Http Request Smuggling" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5052-1</id><title>Xz</title><description>Security Fix(es): 
* gzip: arbitrary-file-write vulnerability (CVE-2022-1271) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-06-15 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xz-lzma-compat" release="2.el7_9" src="xz-5.2.2-2.el7_9.src.rpm" version="5.2.2"><filename>xz-lzma-compat-5.2.2-2.el7_9.x86_64.rpm</filename><sum type="sha256">178be34e860e9391f07fb01816dc05a79e1d95a398f26b2c998d0ab621a3d073</sum></package><package arch="x86_64" name="xz-libs" release="2.el7_9" src="xz-5.2.2-2.el7_9.src.rpm" version="5.2.2"><filename>xz-libs-5.2.2-2.el7_9.x86_64.rpm</filename><sum type="sha256">c07f0cf3977e760679b6626d88a5d1b88ca2540ac6659c3fac74da5802341b2e</sum></package><package arch="i686" name="xz-devel" release="2.el7_9" src="xz-5.2.2-2.el7_9.src.rpm" version="5.2.2"><filename>xz-devel-5.2.2-2.el7_9.i686.rpm</filename><sum type="sha256">c3af6af75d9eb8a997dbf96539b8e37a276a8a0ffbcfef2f939c6a06fd427277</sum></package><package arch="x86_64" name="xz" release="2.el7_9" src="xz-5.2.2-2.el7_9.src.rpm" version="5.2.2"><filename>xz-5.2.2-2.el7_9.x86_64.rpm</filename><sum type="sha256">6e66b5705a7befffe0701195106d9d9638602fe7a80d54eaf4c8d1ffe1a694f8</sum></package><package arch="i686" name="xz-compat-libs" release="2.el7_9" src="xz-5.2.2-2.el7_9.src.rpm" version="5.2.2"><filename>xz-compat-libs-5.2.2-2.el7_9.i686.rpm</filename><sum type="sha256">ed52b79ebc47ec936fe2e8e2e44dbe888f3707ed6067f473b3b0a9d052a08823</sum></package><package arch="x86_64" name="xz-devel" release="2.el7_9" src="xz-5.2.2-2.el7_9.src.rpm" version="5.2.2"><filename>xz-devel-5.2.2-2.el7_9.x86_64.rpm</filename><sum type="sha256">c17801a5adcda0f76ceaa856dad0568a25406374520a3b96f926c24c5a265e58</sum></package><package arch="x86_64" name="xz-compat-libs" release="2.el7_9" src="xz-5.2.2-2.el7_9.src.rpm" version="5.2.2"><filename>xz-compat-libs-5.2.2-2.el7_9.x86_64.rpm</filename><sum type="sha256">50573e4a0c567e0c6000a558a5bcab49ffe16fba1444253b351a628eddefe282</sum></package><package arch="i686" name="xz-libs" release="2.el7_9" src="xz-5.2.2-2.el7_9.src.rpm" version="5.2.2"><filename>xz-libs-5.2.2-2.el7_9.i686.rpm</filename><sum type="sha256">4d87b16c5e91c6169ef120acd7f925bc140876fafc133af49bc086c190652862</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1271" id="CVE-2022-1271" title="Gzip: Arbitrary-File-Write Vulnerability" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5052" id="RHSA-2022:5052-1" title="Rhsa-2022:5052-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2073310" id="2073310" title="Gzip: Arbitrary-File-Write Vulnerability" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5162-1</id><title>Postgresql</title><description>Security Fix(es): 
* postgresql: Autovacuum, REINDEX, and others omit "security restricted operation" sandbox (CVE-2022-1552) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-06-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="postgresql-docs" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-docs-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">785f51347d3f6b380a212837cb270c0a462763304285d9b5438448c697e15cc4</sum></package><package arch="x86_64" name="postgresql-libs" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-libs-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">59a4789756e0cb29822cf7c8eedf629e9a67e43b2f7fdc5ace1c9e7fab1f80b1</sum></package><package arch="x86_64" name="postgresql-plpython" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-plpython-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">163973d9e3846607713d6a2ace3e29a9c00ae46a46253a9f27f59c85baf77f15</sum></package><package arch="x86_64" name="postgresql" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">2d2e7d29446e98fabe696c38228d61c6ac6e18ce1c0a79776cc4cef11974b3d0</sum></package><package arch="x86_64" name="postgresql-upgrade" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-upgrade-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">725c7494ff796b3c5e721187771a2307352f91738e5133e33f50b808b0086158</sum></package><package arch="i686" name="postgresql-libs" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-libs-9.2.24-8.el7_9.i686.rpm</filename><sum type="sha256">59efe390ae8c13b421732a56cac09f26690d633efe1e8259bfda1a3f1b9ddfe3</sum></package><package arch="x86_64" name="postgresql-test" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-test-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">288f93adc82232378274a624afc629b402d6c4c006626541c72b9a59371c424d</sum></package><package arch="i686" name="postgresql-static" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-static-9.2.24-8.el7_9.i686.rpm</filename><sum type="sha256">19a07b567067664944f2a8aa7df574c970184b11ff0949579e157421cdc9cbf0</sum></package><package arch="x86_64" name="postgresql-pltcl" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-pltcl-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">e18690e1d0d9ed6c6818e4198375da98920ad266acc9ec7e7f7b80a7672bde27</sum></package><package arch="i686" name="postgresql-devel" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-devel-9.2.24-8.el7_9.i686.rpm</filename><sum type="sha256">22a34c80bc19cdf540fb3a0900201c5cf18863efa3f38199343f68896bf238f0</sum></package><package arch="x86_64" name="postgresql-server" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-server-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">2214e31cdf76b0bb8a399a80ba4662ee4381140c1ea62320bf50df2b2791cacf</sum></package><package arch="x86_64" name="postgresql-static" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-static-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">46f46125b8d1815a091900c4fd80a0c838a8b68206c399563ceb3f43b871bb78</sum></package><package arch="x86_64" name="postgresql-plperl" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-plperl-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">d0df9bbf5eb5e754c22643007a07ccddaecc7096edfc03c2be248f79d3d004cf</sum></package><package arch="x86_64" name="postgresql-devel" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-devel-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">bd33822d9eab3ceb26128fb525db894fd6a9bdae21371c94d3db6ffdebb7f006</sum></package><package arch="x86_64" name="postgresql-contrib" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-contrib-9.2.24-8.el7_9.x86_64.rpm</filename><sum type="sha256">273899f72e24eb777a82216f169a06d18ff1c6c48f0e29b154863757c5bf84c9</sum></package><package arch="i686" name="postgresql" release="8.el7_9" src="postgresql-9.2.24-8.el7_9.src.rpm" version="9.2.24"><filename>postgresql-9.2.24-8.el7_9.i686.rpm</filename><sum type="sha256">a9e3e531f3c674b2e4ddf3502b6c32d4d2950af50c050ef968c76de7c353d803</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1552" id="CVE-2022-1552" title="Postgresql: Autovacuum, Reindex, And Others Omit &quot;Security Restricted Operation&quot; Sandbox" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5162" id="RHSA-2022:5162-1" title="Rhsa-2022:5162-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2081126" id="2081126" title="Postgresql: Autovacuum, Reindex, And Others Omit &quot;Security Restricted Operation&quot; Sandbox" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5232-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: race condition in perf_event_open leads to privilege escalation (CVE-2022-1729) 
* kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root (CVE-2022-1966) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* XFS inode cluster corruption 
* sock: sock_dequeue_err_skb() needs hard irq safety 
* libceph: fix potential use-after-free on linger ping and resends</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-06-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kernel-doc" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.71.1.el7.noarch.rpm</filename><sum type="sha256">1d77baa3d81ea83477d62c49e015be49732465ccd422059db318efc757ae8ecb</sum></package><package arch="x86_64" name="bpftool" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">7b066f7a2dc6af9f4b4060613ecd118b217cf11f81913b38bf5a654015dbde5c</sum></package><package arch="x86_64" name="kernel-headers" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">4f556e1061c61af28b9174b25e07f65c43819121efcec015882d984e8b49602d</sum></package><package arch="x86_64" name="kernel-devel" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">4db12f15fab31a6a5df99c09f89b5c62e83290fd0a61ac8ce5f9ee5e8a497421</sum></package><package arch="x86_64" name="kernel" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">3214a01be7fda555894dc93053890a4100c0aa1c4886e7842ab7cfed376144bb</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">d7e26d24d3a734275e8bc9ade31b1ae3adee803dd46db10d57b6d85660494a00</sum></package><package arch="x86_64" name="kernel-debug" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">ce17a9c6466362c175e0bddc060062332de9e637d4caafe8cc983a0a1e8be3c3</sum></package><package arch="x86_64" name="python-perf" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">1910321931f2f0a442171a982d11ef4f6be5450336c0eac6287f89f65c267cae</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">41aae026c1a9b1193e21d29b67d9c83918da3d7d027d6727b85a9c04c391c7a3</sum></package><package arch="x86_64" name="kernel-tools" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">2750f1392b10f38d70e95e3d8a78ab25c2518d9ca45d85bd30f300db19593d81</sum></package><package arch="x86_64" name="perf" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">2e5767fc21747cc1001ad9293110f8fa39ea33383d025c625bc65a026ba6166c</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.71.1.el7.x86_64.rpm</filename><sum type="sha256">72dd92debffef227aee347e7b48b4bd26a8154b7ccdefab4a2ded440a376859e</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.71.1.el7" src="kernel-3.10.0-1160.71.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.71.1.el7.noarch.rpm</filename><sum type="sha256">76398d724a76043908976a33be347fffb46febcf045b39309fde9250498c8d91</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1729" id="CVE-2022-1729" title="Kernel: Race Condition In Perf_Event_Open Leads To Privilege Escalation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1966" id="CVE-2022-1966" title="Kernel: A Use-After-Free Write In The Netfilter Subsystem Can Lead To Privilege Escalation To Root" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5232" id="RHSA-2022:5232-1" title="Rhsa-2022:5232-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2086753" id="2086753" title="Kernel: Race Condition In Perf_Event_Open Leads To Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2092427" id="2092427" title="Kernel: A Use-After-Free Write In The Netfilter Subsystem Can Lead To Privilege Escalation To Root" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5234-1</id><title>Python-Virtualenv</title><description>Security Fix(es): 
* python-pip: directory traversal in _download_http_url() function in src/pip/_internal/download.py (CVE-2019-20916) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-06-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="python-virtualenv" release="7.el7_9" src="python-virtualenv-15.1.0-7.el7_9.src.rpm" version="15.1.0"><filename>python-virtualenv-15.1.0-7.el7_9.noarch.rpm</filename><sum type="sha256">e91998c8834ef7665475ce23d9b11eab0bdc361c2c595c7bfd57fe9b5b07c32f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20916" id="CVE-2019-20916" title="Python-Pip: Directory Traversal In _Download_Http_Url() Function In Src/Pip/_Internal/Download.Py" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5234" id="RHSA-2022:5234-1" title="Rhsa-2022:5234-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1868135" id="1868135" title="Python-Pip: Directory Traversal In _Download_Http_Url() Function In Src/Pip/_Internal/Download.Py" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5235-1</id><title>Python</title><description>Security Fix(es): 
* python: CRLF injection via HTTP request method in httplib/http.client (CVE-2020-26116) 
* python-urllib3: CRLF injection via HTTP request method (CVE-2020-26137) 
* python: Stack-based buffer overflow in PyCArg_repr in _ctypes/callproc.c (CVE-2021-3177) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-06-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-devel" release="92.el7_9" src="python-2.7.5-92.el7_9.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-92.el7_9.x86_64.rpm</filename><sum type="sha256">3d67098ab806f5b36a32ad07f418c0c3f336177fecd3e69332aa47bc841b6a38</sum></package><package arch="x86_64" name="python-test" release="92.el7_9" src="python-2.7.5-92.el7_9.src.rpm" version="2.7.5"><filename>python-test-2.7.5-92.el7_9.x86_64.rpm</filename><sum type="sha256">9ca0cb5713f710cfc4281aca00b03121ceb3897e17d7ec58aa7f16223533b1e8</sum></package><package arch="x86_64" name="python-debug" release="92.el7_9" src="python-2.7.5-92.el7_9.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-92.el7_9.x86_64.rpm</filename><sum type="sha256">15793b35b8d9dd822f51a7b2890c5dd76e634259ba7abf19e7e9ad88d9976c66</sum></package><package arch="i686" name="python-libs" release="92.el7_9" src="python-2.7.5-92.el7_9.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-92.el7_9.i686.rpm</filename><sum type="sha256">722f37223adac9b05f452755a17f11db6e32a48fba2e9792e205b81b20544032</sum></package><package arch="x86_64" name="python-tools" release="92.el7_9" src="python-2.7.5-92.el7_9.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-92.el7_9.x86_64.rpm</filename><sum type="sha256">119abd1b66cb24e612fc399c80af7c5040169ac2078bac8446f57f81061f2ecc</sum></package><package arch="x86_64" name="tkinter" release="92.el7_9" src="python-2.7.5-92.el7_9.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-92.el7_9.x86_64.rpm</filename><sum type="sha256">75ff0121c4b61bdb679b3d1f5464a924ab6ba3e304da49651d948c557741b1b6</sum></package><package arch="x86_64" name="python" release="92.el7_9" src="python-2.7.5-92.el7_9.src.rpm" version="2.7.5"><filename>python-2.7.5-92.el7_9.x86_64.rpm</filename><sum type="sha256">d1d50f02f72bf047ef8fff0a6150e0eeb1eaee72a27fdf8ab41acb42f10b6915</sum></package><package arch="x86_64" name="python-libs" release="92.el7_9" src="python-2.7.5-92.el7_9.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-92.el7_9.x86_64.rpm</filename><sum type="sha256">a9b403e98099f7e6ff63ac8e5712b378ec290ce13c7357fe1704c302bac41f4b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26116" id="CVE-2020-26116" title="Python: Crlf Injection Via Http Request Method In Httplib/Http.Client" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26137" id="CVE-2020-26137" title="Python-Urllib3: Crlf Injection Via Http Request Method" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3177" id="CVE-2021-3177" title="Python: Stack-Based Buffer Overflow In Pycarg_Repr In _Ctypes/Callproc.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5235" id="RHSA-2022:5235-1" title="Rhsa-2022:5235-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1883014" id="1883014" title="Python: Crlf Injection Via Http Request Method In Httplib/Http.Client" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1883632" id="1883632" title="Python-Urllib3: Crlf Injection Via Http Request Method" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1918168" id="1918168" title="Python: Stack-Based Buffer Overflow In Pycarg_Repr In _Ctypes/Callproc.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5239-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* 389-ds-base: sending crafted message could result in DoS (CVE-2022-0918) 
* 389-ds-base: expired password was still allowed to access the database (CVE-2022-0996) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Log the Auto Member invalid regex rules in the LDAP errors log. 
Enhancement(s): 
* RFE - Provide an option to abort an Auto Member rebuild task.</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-06-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base-libs" release="16.el7_9" src="389-ds-base-1.3.10.2-16.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-libs-1.3.10.2-16.el7_9.x86_64.rpm</filename><sum type="sha256">2b6f8fd9d6c2d5d6a400605ebb49e89a22b1b307288eb098908b1cad691b2e17</sum></package><package arch="x86_64" name="389-ds-base-devel" release="16.el7_9" src="389-ds-base-1.3.10.2-16.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-devel-1.3.10.2-16.el7_9.x86_64.rpm</filename><sum type="sha256">d226bedc44c7f9d2cf5192e322e7e0a9cd1656c3b68aa8973ec6ed482f9264e5</sum></package><package arch="x86_64" name="389-ds-base-snmp" release="16.el7_9" src="389-ds-base-1.3.10.2-16.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-snmp-1.3.10.2-16.el7_9.x86_64.rpm</filename><sum type="sha256">748b47079f3d10641d78e5f1e3e63bc24b6e874fab0706073bc364f561147ab0</sum></package><package arch="x86_64" name="389-ds-base" release="16.el7_9" src="389-ds-base-1.3.10.2-16.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-1.3.10.2-16.el7_9.x86_64.rpm</filename><sum type="sha256">0ed083ae9c6791c4b9eee5fb1eb5e7cd1b22a74f433b86a1c7975cda5e9afcbb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0918" id="CVE-2022-0918" title="389-Ds-Base: Sending Crafted Message Could Result In Dos" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0996" id="CVE-2022-0996" title="389-Ds-Base: Expired Password Was Still Allowed To Access The Database" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5239" id="RHSA-2022:5239-1" title="Rhsa-2022:5239-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2018153" id="2018153" title="Rfe - Provide An Option To Abort An Auto Member Rebuild Task." type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2055815" id="2055815" title="389-Ds-Base: Sending Crafted Message Could Result In Dos" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2064769" id="2064769" title="389-Ds-Base: Expired Password Was Still Allowed To Access The Database" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5479-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.11 ESR. 
Security Fix(es): 
* Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (CVE-2022-34468) 
* Mozilla: Use-after-free in nsSHistory (CVE-2022-34470) 
* Mozilla: A popup window could be resized in a way to overlay the address bar with web content (CVE-2022-34479) 
* Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (CVE-2022-34484) 
* Mozilla: Undesired attributes could be set as part of prototype pollution  (CVE-2022-2200) 
* Mozilla: CSP bypass enabling stylesheet injection (CVE-2022-31744) 
* Mozilla: Unavailable PAC file resulted in OCSP requests being blocked (CVE-2022-34472) 
* Mozilla: Potential integer overflow in ReplaceElementsAt (CVE-2022-34481) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-07-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="2.el7_9" src="firefox-91.11.0-2.el7_9.src.rpm" version="91.11.0"><filename>firefox-91.11.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">5e83f5f9e9a731890b9ba7d60465f40904736502213b1f154fd5e104105844be</sum></package><package arch="i686" name="firefox" release="2.el7_9" src="firefox-91.11.0-2.el7_9.src.rpm" version="91.11.0"><filename>firefox-91.11.0-2.el7_9.i686.rpm</filename><sum type="sha256">6ff4fc0a21fa4e5fa5f25bc3c28d56596b6699302f3d9bc0ae2c5671b679e254</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200" id="CVE-2022-2200" title="Mozilla: Undesired Attributes Could Be Set As Part Of Prototype Pollution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744" id="CVE-2022-31744" title="Mozilla: Csp Bypass Enabling Stylesheet Injection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468" id="CVE-2022-34468" title="Mozilla: Csp Sandbox Header Without `Allow-Scripts` Can Be Bypassed Via Retargeted Javascript: Uri" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470" id="CVE-2022-34470" title="Mozilla: Use-After-Free In Nsshistory" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472" id="CVE-2022-34472" title="Mozilla: Unavailable Pac File Resulted In Ocsp Requests Being Blocked" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479" id="CVE-2022-34479" title="Mozilla: A Popup Window Could Be Resized In A Way To Overlay The Address Bar With Web Content" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481" id="CVE-2022-34481" title="Mozilla: Potential Integer Overflow In Replaceelementsat" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484" id="CVE-2022-34484" title="Mozilla: Memory Safety Bugs Fixed In Firefox 102 And Firefox Esr 91.11" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5479" id="RHSA-2022:5479-1" title="Rhsa-2022:5479-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102161" id="2102161" title="Mozilla: A Popup Window Could Be Resized In A Way To Overlay The Address Bar With Web Content" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102162" id="2102162" title="Mozilla: Use-After-Free In Nsshistory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102163" id="2102163" title="Mozilla: Csp Sandbox Header Without `Allow-Scripts` Can Be Bypassed Via Retargeted Javascript: Uri" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102164" id="2102164" title="Mozilla: Potential Integer Overflow In Replaceelementsat" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102165" id="2102165" title="Mozilla: Csp Bypass Enabling Stylesheet Injection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102166" id="2102166" title="Mozilla: Unavailable Pac File Resulted In Ocsp Requests Being Blocked" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102168" id="2102168" title="Mozilla: Undesired Attributes Could Be Set As Part Of Prototype Pollution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102169" id="2102169" title="Mozilla: Memory Safety Bugs Fixed In Firefox 102 And Firefox Esr 91.11" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5480-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.11. 
Security Fix(es): 
* Mozilla: CSP sandbox header without `allow-scripts` can be bypassed via retargeted javascript: URI (CVE-2022-34468) 
* Mozilla: Use-after-free in nsSHistory (CVE-2022-34470) 
* Mozilla: A popup window could be resized in a way to overlay the address bar with web content (CVE-2022-34479) 
* Mozilla: Memory safety bugs fixed in Firefox 102 and Firefox ESR 91.11 (CVE-2022-34484) 
* Mozilla: Undesired attributes could be set as part of prototype pollution  (CVE-2022-2200) 
* Mozilla: An email with a mismatching OpenPGP signature date was accepted as valid (CVE-2022-2226) 
* Mozilla: CSP bypass enabling stylesheet injection (CVE-2022-31744) 
* Mozilla: Unavailable PAC file resulted in OCSP requests being blocked (CVE-2022-34472) 
* Mozilla: Potential integer overflow in ReplaceElementsAt (CVE-2022-34481) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-07-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-91.11.0-2.el7_9.src.rpm" version="91.11.0"><filename>thunderbird-91.11.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">518b25f63fd9c1898cf7dbc477faf7330e4eeca94bbfaf5ce71233c8b0f46c1e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2200" id="CVE-2022-2200" title="Mozilla: Undesired Attributes Could Be Set As Part Of Prototype Pollution" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2226" id="CVE-2022-2226" title="Mozilla: An Email With A Mismatching Openpgp Signature Date Was Accepted As Valid" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31744" id="CVE-2022-31744" title="Mozilla: Csp Bypass Enabling Stylesheet Injection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34468" id="CVE-2022-34468" title="Mozilla: Csp Sandbox Header Without `Allow-Scripts` Can Be Bypassed Via Retargeted Javascript: Uri" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34470" id="CVE-2022-34470" title="Mozilla: Use-After-Free In Nsshistory" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34472" id="CVE-2022-34472" title="Mozilla: Unavailable Pac File Resulted In Ocsp Requests Being Blocked" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34479" id="CVE-2022-34479" title="Mozilla: A Popup Window Could Be Resized In A Way To Overlay The Address Bar With Web Content" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34481" id="CVE-2022-34481" title="Mozilla: Potential Integer Overflow In Replaceelementsat" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34484" id="CVE-2022-34484" title="Mozilla: Memory Safety Bugs Fixed In Firefox 102 And Firefox Esr 91.11" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5480" id="RHSA-2022:5480-1" title="Rhsa-2022:5480-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102161" id="2102161" title="Mozilla: A Popup Window Could Be Resized In A Way To Overlay The Address Bar With Web Content" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102162" id="2102162" title="Mozilla: Use-After-Free In Nsshistory" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102163" id="2102163" title="Mozilla: Csp Sandbox Header Without `Allow-Scripts` Can Be Bypassed Via Retargeted Javascript: Uri" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102164" id="2102164" title="Mozilla: Potential Integer Overflow In Replaceelementsat" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102165" id="2102165" title="Mozilla: Csp Bypass Enabling Stylesheet Injection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102166" id="2102166" title="Mozilla: Unavailable Pac File Resulted In Ocsp Requests Being Blocked" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102168" id="2102168" title="Mozilla: Undesired Attributes Could Be Set As Part Of Prototype Pollution" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102169" id="2102169" title="Mozilla: Memory Safety Bugs Fixed In Firefox 102 And Firefox Esr 91.11" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2102204" id="2102204" title="Mozilla: An Email With A Mismatching Openpgp Signature Date Was Accepted As Valid" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5542-1</id><title>Squid</title><description>Security Fix(es): 
* squid: DoS when processing gopher server responses (CVE-2021-46784) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="squid-sysvinit" release="17.el7_9.7" src="squid-3.5.20-17.el7_9.7.src.rpm" version="3.5.20"><filename>squid-sysvinit-3.5.20-17.el7_9.7.x86_64.rpm</filename><sum type="sha256">dbff6ab9c250e0f10dfca230a5f1170d86e8144eb1dd96909b41e1183ee5ecc0</sum></package><package arch="x86_64" epoch="7" name="squid" release="17.el7_9.7" src="squid-3.5.20-17.el7_9.7.src.rpm" version="3.5.20"><filename>squid-3.5.20-17.el7_9.7.x86_64.rpm</filename><sum type="sha256">000c8e8e89638b9035378a053890a009bf1912fce759f517f212187470ddb2b5</sum></package><package arch="x86_64" epoch="7" name="squid-migration-script" release="17.el7_9.7" src="squid-3.5.20-17.el7_9.7.src.rpm" version="3.5.20"><filename>squid-migration-script-3.5.20-17.el7_9.7.x86_64.rpm</filename><sum type="sha256">ab738d32e426a0b2aa73cb8c5d479f25edb1c03e00afda9adcc0cf661cf02b43</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46784" id="CVE-2021-46784" title="Squid: Dos When Processing Gopher Server Responses" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5542" id="RHSA-2022:5542-1" title="Rhsa-2022:5542-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2100721" id="2100721" title="Squid: Dos When Processing Gopher Server Responses" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5687</id><title>Important: Java-11-Openjdk Security, Bug Fix, And Enhancement Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). (BZ#2083258)
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169) * OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540) * OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2022-08-01 10:24:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-jmods-debug-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">ff485a031b7358e9a603019431d11ad49fe1c191b651a1ab4a966f3254434a36</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-src-debug-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">35b009867aeaec41a4101189c975ab32f52b96997c04179577e204fa7c953041</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-javadoc-debug-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">8fc0bd4b7300cd42b8c60f8301d2262a0e6ea85ca55bbc6191f423f8202351df</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-debug-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">f6277b5d6d7a9a104aa48ff42821bba76d39ea8109ca0ef184dd602386fdddec</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-javadoc-zip-debug-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">94355e3db0d1eeb216c439c8794e367d054b3c0f110445a51e122ff51efbe2b1</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-javadoc-debug-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">c0b7fa4b587e7c76e5b652246d91f417d05c21d031489d5f776db52c4554f81f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-jmods-debug-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">08d96bdd9b4331466d1c58221053dd24927fd80259e9e2cdc3edbf4c06b9e061</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-javadoc-zip-debug-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">c3ae470cc832c94dc93002679fe56a85f31e5988fafff3fa00b23e4c520d16b9</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-static-libs-debug-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">58260f8e9843800aa31099c7e4f7a6aa74597a915271959fc300c78fef0825d6</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-devel-debug-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">ead1acfec0163bef28a3971805467b337155d5ba67064a613dab2424f187a02c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-demo-debug-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">9c83e1948e56b5044f88c9a04eef39f63ec956fc54f29b023c752b62f71f73fb</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-debug-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">7c81e27141ef3886d8a41bc2d856be63ac236f2aa11c4782382e82d44ce2c221</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-headless-debug-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">07d0d9aedd58dc4d0bc84278ce0304fa2611a20ccc953e0719b2af733f5c95d1</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-src-debug-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">3e5b6dde1167f229003f25a94346f478c7386e8578b31da25f85940331851b92</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-headless-debug-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">37cafdda08da3a1ea4dad7b80777489a1e4f6117b828b5100e289e33088700c0</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-demo-debug-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">78fab0f72db34591ffdf639cdbe2205b7d7838e039c3a6132953943c67894bfb</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-devel-debug-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">3ab693276932133e379fdf8b4ba7d90d26dc330d6c7dd75a6fc03b150e18bd45</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540" id="CVE-2022-21540" title="Cve-2022-21540" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541" id="CVE-2022-21541" title="Cve-2022-21541" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169" id="CVE-2022-34169" title="Cve-2022-34169" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5687" id="RHSA-2022:5687" title="Important: Java-11-Openjdk Security, Bug Fix, And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2083258" id="2083258" title="2083258 &#8211; Prepare For The Next Quarterly Openjdk Upstream Release (2022-07, 11.0.16) [Rhel-7-9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5687-1</id><title>Java-11-Openjdk</title><description>The following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). 
Security Fix(es): 
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169) 
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540) 
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-demo-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">8611c379545049fb5145af947ade98d6a34982bc6b1bd6fdc81b844cbcb69d6a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-headless-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">144ea8e27c84507fcd45e26a346bceeb42afa3b2d10cc491ca6a313ad72d87fe</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-static-libs-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">4bb7d26c567fe11f583ff82d4e213651a0add391dc89c7ded87d18acabba77ec</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-demo-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">0dfbe0a0574ac807f4e74809bb73dad28f577fdd6f077cee0bb6aabd5dafaa3b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">31ab6b80b64db525f4350f5e232a4ad566c0a79970861d8029ea611644c5771f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-devel-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">db9ed77efbe929b28e593e4a21d6dded7aea5e80c7c9757c4e6d1fabe0c35720</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-headless-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">55746417c54be47dd7809c30d000e0b7df9c025cc5350cd3ded8aac7a7c27033</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">b16c911001ad580f4c2eca21d0924a8baade689e538df738b7f5e9c9f4253005</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-jmods-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">820cfd6ee3b4b8a3d26cd3492a4774099272260bd0d18dd554c2f131c707ac84</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-javadoc-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">1e4d28d9a9842eca02530b1c5663a51a039fc5e5e6920b447097fde9621ee2af</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-javadoc-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">a9676e773f4ab904e6df5340fd3ddebb1bd7150ade2b0dd4a3d6e48d83ad3203</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-src-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">dceaf6b3fa5f11e3c3090f103adc39c32ab3b78e19e0a0ec82e56054a2ae28ad</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-devel-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">30ecf4fca91c24ce852ef7d2c7f0ffe7d3c0cc2267a92963cfe5e3105225d811</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-11.0.16.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">aac17aa4e1897cc09e6e0e34dc6dfc05075cb0a119889610763865b5eb7c814d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">404c5774f8f9163e381965ffc6e739616efae6c6fa8a6bff1bc09627535c3c73</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-src-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">cb1b49986b19897e0457f122762c3a018f006826fc0b1270fe1e82c804c5c5f6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.16.0.8-1.el7_9.src.rpm" version="11.0.16.0.8"><filename>java-11-openjdk-jmods-11.0.16.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">c962abaf22b4a395efaf424f8c79ef7676507c16265a1f7253bfdcf794360ea2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540" id="CVE-2022-21540" title="Openjdk: Class Compilation Issue (Hotspot, 8281859)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541" id="CVE-2022-21541" title="Openjdk: Improper Restriction Of Methodhandle.Invokebasic() (Hotspot, 8281866)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169" id="CVE-2022-34169" title="Openjdk: Integer Truncation Issue In Xalan-J (Jaxp, 8285407)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5687" id="RHSA-2022:5687-1" title="Rhsa-2022:5687-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2108540" id="2108540" title="Openjdk: Class Compilation Issue (Hotspot, 8281859)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2108543" id="2108543" title="Openjdk: Improper Restriction Of Methodhandle.Invokebasic() (Hotspot, 8281866)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2108554" id="2108554" title="Openjdk: Integer Truncation Issue In Xalan-J (Jaxp, 8285407)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5698</id><title>Important: Java-1.8.0-Openjdk Security, Bug Fix, And Enhancement Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-1.8.0-openjdk (1.8.0.342.b07). (BZ#2083257)
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169) * OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540) * OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2022-08-01 10:24:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">5cfe245f019d5fc6308312b6a2c36a5b3816add572af41e5c6da2630b2a9bc9a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-src-debug-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">dd552247cc20b81cab5abc2ac39dc17703d58a53732fa2f6e0f11c51b8d1de95</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-src-debug-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">2d94cbaab9b7bf560be85fef61cec7970813cbcfb23a6293de86d10ffee052d0</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.342.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">eab54a41190cafaef99ff3f6d5539734a6c151d3868f78a326b549940284c43f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">e283c2ea3701cd6b330e1fb6c469a58905becb4687d6ddca1fdfcf5b6e24a173</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">5dede49755fef443561ec1294d59dddef1e977661dc8965744ea5b3eadaa82f7</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">fb412993684366151cc44711dd03669a328a34a78c0a6672f94f1a3f48e7dd8b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">e1592b2fdef08f1ac87ecb4356fe1a6667cc9a310a5eff04bc97fb67bead7846</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.342.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">49142f39946bf7ab738aeeeb04d894615267f95b7dc83a735c1aa75531c95599</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-debug-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">4d87c03704812f5de6e21624549dfee758efd582b6161854c671bb5c4671f2ff</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-debug-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">5ff4ae53a07a78eeca4ad20043caa10fb4f5ce90b73a6e102d2870d3a13fcf9a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">3fb8a14a48644a420ec20fd27537402eca63522a85023ab13bbcede16dc384ad</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">ff4d3843ce0896b873094b65d95ca7aecf1343ba1c948dbafa02de065c951154</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">e1bdd17a0490037142cdb6ae84a6ff45766880d6cb7e147f74b7ae01788f652d</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540" id="CVE-2022-21540" title="Cve-2022-21540" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541" id="CVE-2022-21541" title="Cve-2022-21541" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169" id="CVE-2022-34169" title="Cve-2022-34169" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5698" id="RHSA-2022:5698" title="Important: Java-1.8.0-Openjdk Security, Bug Fix, And Enhancement Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2083257" id="2083257" title="2083257 &#8211; Prepare For The Next Quarterly Openjdk Upstream Release (2022-07, 8U342) [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5698-1</id><title>Java-1.8.0-Openjdk</title><description>The following packages have been upgraded to a later upstream version: java-1.8.0-openjdk (1.8.0.342.b07). 
Security Fix(es): 
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169) 
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540) 
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-01 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-src-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">4ab7f27a38f56298c39e246c94d702d582ea7461cd0cda84ae19d6898080d863</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">4f5e91bda435dd90919ffa87bf89fdac660a7581c552c0c1a6e8bc8b729c694a</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">6e2bfd3f96c12846a098b7d01b6114c64b868638c083814e5a57facae46d4081</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">866c8ff926d25e5c119c13292f2bac934bb3e02a9b821123efdd85dd3b263135</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">b4006d90a56f38c63ef8522c0c97ad8a5963d5e50107985f0f758e39e03f5c27</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">6b3829da94a98f6ad1e9e4224796bf108eb0f15f1b6fea2a7be9cfd0b559767e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">7dabfb17f9d0efe22785ddeff0450c86fc99e0942e254911f3424cbaa1040dfd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">42b430ea26f1ca194196526b12c4dbac2d646081c4572cdcfc35e184fd9f491b</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">8ccac8e0148f92f0c7f079a592c2a7e62644b42c26d0c61b3b93b1c22454868e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">1fb56095e0db3a565698ac3a02327db2940983beb6cc358373da4dab1ef91c70</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">943ac0fd188f796e44f4173e92e2e6b7bfd67d0597bf42234b17463b1cd62a02</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-src-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">f25db7168bce97ee6e42b1605467a84b4aea3418c88cdf10131b453f9c700968</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">37005280cc568854374742f1509d56437f8e4a07ada84ab33b6eff370523036c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.342.b07-1.el7_9.src.rpm" version="1.8.0.342.b07"><filename>java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el7_9.i686.rpm</filename><sum type="sha256">ebfc9595270935485aa68afb4085c59d07730d26b097e9a9149993c98f89af98</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21540" id="CVE-2022-21540" title="Openjdk: Class Compilation Issue (Hotspot, 8281859)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21541" id="CVE-2022-21541" title="Openjdk: Improper Restriction Of Methodhandle.Invokebasic() (Hotspot, 8281866)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34169" id="CVE-2022-34169" title="Openjdk: Integer Truncation Issue In Xalan-J (Jaxp, 8285407)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5698" id="RHSA-2022:5698-1" title="Rhsa-2022:5698-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2108540" id="2108540" title="Openjdk: Class Compilation Issue (Hotspot, 8281859)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2108543" id="2108543" title="Openjdk: Improper Restriction Of Methodhandle.Invokebasic() (Hotspot, 8281866)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2108554" id="2108554" title="Openjdk: Integer Truncation Issue In Xalan-J (Jaxp, 8285407)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5773-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.12.0. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 (CVE-2022-2505) 
* Mozilla: Directory indexes for bundled resources reflected URL parameters  (CVE-2022-36318) 
* Mozilla: Mouse Position spoofing with CSS transforms (CVE-2022-36319) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-91.12.0-1.el7_9.src.rpm" version="91.12.0"><filename>thunderbird-91.12.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">25a5d69dab2c0d6e34baffa70a62cbf18dbce647a17972984ee25af215b4a716</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2505" id="CVE-2022-2505" title="Mozilla: Memory Safety Bugs Fixed In Firefox 103 And 102.1" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318" id="CVE-2022-36318" title="Mozilla: Directory Indexes For Bundled Resources Reflected Url Parameters" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319" id="CVE-2022-36319" title="Mozilla: Mouse Position Spoofing With Css Transforms" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5773" id="RHSA-2022:5773-1" title="Rhsa-2022:5773-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2111907" id="2111907" title="Mozilla: Mouse Position Spoofing With Css Transforms" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2111908" id="2111908" title="Mozilla: Directory Indexes For Bundled Resources Reflected Url Parameters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2111910" id="2111910" title="Mozilla: Memory Safety Bugs Fixed In Firefox 103 And 102.1" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5776-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.12.0 ESR. 
Security Fix(es): 
* Mozilla: Memory safety bugs fixed in Firefox 103 and 102.1 (CVE-2022-2505) 
* Mozilla: Directory indexes for bundled resources reflected URL parameters  (CVE-2022-36318) 
* Mozilla: Mouse Position spoofing with CSS transforms (CVE-2022-36319) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="2.el7_9" src="firefox-91.12.0-2.el7_9.src.rpm" version="91.12.0"><filename>firefox-91.12.0-2.el7_9.i686.rpm</filename><sum type="sha256">e807c37430e440a90e53af5e3858b6d52894389f35fa4361859e909c484328e8</sum></package><package arch="x86_64" name="firefox" release="2.el7_9" src="firefox-91.12.0-2.el7_9.src.rpm" version="91.12.0"><filename>firefox-91.12.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">ef66827a15fe99c87e24c7685945c40f106fa61acab0287487d7d79a8482bd4f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2505" id="CVE-2022-2505" title="Mozilla: Memory Safety Bugs Fixed In Firefox 103 And 102.1" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36318" id="CVE-2022-36318" title="Mozilla: Directory Indexes For Bundled Resources Reflected Url Parameters" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36319" id="CVE-2022-36319" title="Mozilla: Mouse Position Spoofing With Css Transforms" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5776" id="RHSA-2022:5776-1" title="Rhsa-2022:5776-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2111907" id="2111907" title="Mozilla: Mouse Position Spoofing With Css Transforms" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2111908" id="2111908" title="Mozilla: Directory Indexes For Bundled Resources Reflected Url Parameters" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2111910" id="2111910" title="Mozilla: Memory Safety Bugs Fixed In Firefox 103 And 102.1" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5905-1</id><title>Xorg-X11-Server</title><description>Security Fix(es): 
* xorg-x11-server: X.Org Server ProcXkbSetGeometry out-of-bounds access (CVE-2022-2319) 
* xorg-x11-server: out-of-bounds access in ProcXkbSetDeviceInfo request handler of the Xkb extension (CVE-2022-2320) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-Xorg" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-18.el7_9.x86_64.rpm</filename><sum type="sha256">f198d70d27d6f20b08719a5d875253fc44f9ea11146514d27c98c6ab8c12ee7a</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-18.el7_9.x86_64.rpm</filename><sum type="sha256">6b9a477b42d0bf923e2e2cfd4dce74d98748caa2f83b94a587514bc46102bf2c</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-18.el7_9.x86_64.rpm</filename><sum type="sha256">6e5c93deb4573a33358916269db7b17a0df2403364718318c5afe97b2806bc9c</sum></package><package arch="i686" name="xorg-x11-server-devel" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-18.el7_9.i686.rpm</filename><sum type="sha256">7aaefe51552cc5d7a9e2d6d51f58a94df47648dff8b4cefa9353ef3f54f1a813</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-18.el7_9.x86_64.rpm</filename><sum type="sha256">fcb5709e9084537571247640566e2680616a5db70de7491bd83278358e22a64d</sum></package><package arch="noarch" name="xorg-x11-server-source" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-18.el7_9.noarch.rpm</filename><sum type="sha256">ec086e923e6853c3f484c456df0a9428b87748d4c26a3b10befb8b5716219d86</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-18.el7_9.x86_64.rpm</filename><sum type="sha256">f8c10d3f4bfb44128472809afe964e52451f3b4534c0438ad07aeadd2e0e8356</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-18.el7_9.x86_64.rpm</filename><sum type="sha256">29f5d4a1af552ddb0093c15683f86e51d39d9a055bfc5209ba2a26200449b8d7</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-18.el7_9.x86_64.rpm</filename><sum type="sha256">a409484eb5a91f441cf24a219a3e24fb4a51587b5bf18385001d912889178772</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="18.el7_9" src="xorg-x11-server-1.20.4-18.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-18.el7_9.x86_64.rpm</filename><sum type="sha256">546ecc8a110ab6d2c1d3b0362e1ffd9dd0ac923bed363397d560eeab0f72b7c2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2319" id="CVE-2022-2319" title="Xorg-X11-Server: X.Org Server Procxkbsetgeometry Out-Of-Bounds Access" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2320" id="CVE-2022-2320" title="Xorg-X11-Server: Out-Of-Bounds Access In Procxkbsetdeviceinfo Request Handler Of The Xkb Extension" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5905" id="RHSA-2022:5905-1" title="Rhsa-2022:5905-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2106671" id="2106671" title="Xorg-X11-Server: X.Org Server Procxkbsetgeometry Out-Of-Bounds Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2106683" id="2106683" title="Xorg-X11-Server: Out-Of-Bounds Access In Procxkbsetdeviceinfo Request Handler Of The Xkb Extension" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:5937-1</id><title>Kernel</title><description>Security Fix(es): 
* Incomplete cleanup of multi-core shared buffers (aka SBDR) (CVE-2022-21123) 
* Incomplete cleanup of microarchitectural fill buffers (aka SBDS) (CVE-2022-21125) 
* Incomplete cleanup in specific special register write operations (aka DRPW) (CVE-2022-21166) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* SolarFlare sfc spurious TX completion 
* Page allocation failure on cryptsetup open 
* The kernel-rt crashes where one task is indefinitely looping in __start_cfs_bandwidth() with the cfs_b-&gt;lock spinlock being held 
* While using PTimekeeper the qede driver produces excessive log messages 
* The kernel crashes due to a GPF happens in mutex_spin_on_owner(). The known RDMA/cma bug that was introduced with a patch from upstream commit 722c7b2bfead is the possible cause. 
* Running LTP testcase creat09 fails showing related  to 'cve-2018-13405' 
* Crash when releasing inode which was on unmouted superblock</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-08-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-devel" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">eb6c6858ee108768f74cbf482648a1d7c1468dfd9c6c14df31c4faea745a3aaf</sum></package><package arch="x86_64" name="kernel-tools" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">737ff7b8680df3b857d3386e5e33fb441444da64f4bfe0e9996d943dcee11bdb</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">028e5f26d6cb86bc95b0a0583c97a367cd71cbf05b6115ec3aad3dff4c792aba</sum></package><package arch="x86_64" name="kernel-headers" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">ae37ab166a3132528ba33a244f4de1a9f8644f0df5d3ff424056c0df935046d5</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">96b836848019f779069f10177b6d425f351526684bbadcda46e1cc06aa2b006b</sum></package><package arch="noarch" name="kernel-doc" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.76.1.el7.noarch.rpm</filename><sum type="sha256">d102f7c09caf2f06e44a067310247b90109993c49a4f5fe2756ef40119c67723</sum></package><package arch="x86_64" name="kernel" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">ef75240138a948d9fdc8669cf50f5ca70e48f2a9217acd6559577ca782b666fa</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">d15c22331aa7656ad2f356b252b861f88a176d7a883bfa1c69c4e3098475777a</sum></package><package arch="x86_64" name="python-perf" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">b054c8924feb65a2322d77acaac5203839c1217149ece08fc0b5da3c618a60b4</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.76.1.el7.noarch.rpm</filename><sum type="sha256">f05cd8f070add9cd4fc3e2dde0412e2e6f220d5c7bdc8a37e377e49c41637f11</sum></package><package arch="x86_64" name="bpftool" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">bc87496d4e290c092d76890042f67cd51705320c826f03086ed3fabf4b4cb29d</sum></package><package arch="x86_64" name="perf" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">2ae7ad41b3cacbc8e843a4e3a0c6a2289ab9046e72cb3de23cdeb21488cdacd6</sum></package><package arch="x86_64" name="kernel-debug" release="1160.76.1.el7" src="kernel-3.10.0-1160.76.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.76.1.el7.x86_64.rpm</filename><sum type="sha256">10ebee491b5390dfd3a729a6195825d8dd9809bf8287f9cb321ebede65329e78</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21123" id="CVE-2022-21123" title="Hw: Cpu: Incomplete Cleanup Of Multi-Core Shared Buffers (Aka Sbdr)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21125" id="CVE-2022-21125" title="Hw: Cpu: Incomplete Cleanup Of Microarchitectural Fill Buffers (Aka Sbds)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21166" id="CVE-2022-21166" title="Hw: Cpu: Incomplete Cleanup In Specific Special Register Write Operations (Aka Drpw)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:5937" id="RHSA-2022:5937-1" title="Rhsa-2022:5937-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2090237" id="2090237" title="Hw: Cpu: Incomplete Cleanup Of Multi-Core Shared Buffers (Aka Sbdr)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2090240" id="2090240" title="Hw: Cpu: Incomplete Cleanup Of Microarchitectural Fill Buffers (Aka Sbds)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2090241" id="2090241" title="Hw: Cpu: Incomplete Cleanup In Specific Special Register Write Operations (Aka Drpw)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6160-1</id><title>Systemd</title><description>Security Fix(es): 
* systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c (CVE-2022-2526) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="systemd" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">2b08ea19b057824d23fbcee8bb677679b7502f5b0b0cd38d60b7547ede2616e5</sum></package><package arch="x86_64" name="systemd-libs" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-libs-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">3ed557aa85228f94cf8edce8c2bc89de8768a9ef050ee9928d68e6306501df1d</sum></package><package arch="x86_64" name="libgudev1-devel" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>libgudev1-devel-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">c7f3267ae4feb20d1d39d56a84a392e357db2ee1b34a6af2a7f7ffde61d30330</sum></package><package arch="i686" name="systemd-resolved" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-resolved-219-78.el7_9.7.i686.rpm</filename><sum type="sha256">17ccc70a4c6b0fd4e36f601dda974f4c5f0d9c9da5cb3c348c54ee0039e5c5a3</sum></package><package arch="x86_64" name="systemd-python" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-python-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">621c4981bdbb67e3c0183a129cd2a51c36d6fa7b7940ed5ae3326fdf2d43bb06</sum></package><package arch="i686" name="libgudev1" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>libgudev1-219-78.el7_9.7.i686.rpm</filename><sum type="sha256">a813ab9e45be45a76c35df5060d6a236e18fd15fb13b2dd55ebc4f48a87f2b47</sum></package><package arch="x86_64" name="systemd-resolved" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-resolved-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">e8fb0512bc5b5c66a605062cd97348245d57219d59f0fd14c5c12715017fe90e</sum></package><package arch="x86_64" name="libgudev1" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>libgudev1-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">02046f2acce4d5b8942b5e44d1fc5055a9e0e0f36e8463f3b17bc1a0155f4976</sum></package><package arch="i686" name="systemd-devel" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-devel-219-78.el7_9.7.i686.rpm</filename><sum type="sha256">2c5fc64cb5b0cb6df919385209c89eea049576a44a733ce2db2a119af579a726</sum></package><package arch="x86_64" name="systemd-networkd" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-networkd-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">774a53e5c24bc4ffbfa971d0686081c94f071eb3922e882ae90c82740f6c26df</sum></package><package arch="x86_64" name="systemd-sysv" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-sysv-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">3f89049498d61702206987358b0093989b9e8a226f794f03c941ede6b11b49d3</sum></package><package arch="i686" name="libgudev1-devel" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>libgudev1-devel-219-78.el7_9.7.i686.rpm</filename><sum type="sha256">3d2423fe28b482163248e160f4a471838e8c0a4f40308e6325cee4e2b4184e30</sum></package><package arch="x86_64" name="systemd-journal-gateway" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-journal-gateway-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">d00824b3b9831e98c7a22512c63df9e320b7ab2769d49159dba45f99c212d93c</sum></package><package arch="i686" name="systemd-libs" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-libs-219-78.el7_9.7.i686.rpm</filename><sum type="sha256">48338899941ad604d5b84c5610d198837179fde1a03eb8301038ba704c2bcb45</sum></package><package arch="x86_64" name="systemd-devel" release="78.el7_9.7" src="systemd-219-78.el7_9.7.src.rpm" version="219"><filename>systemd-devel-219-78.el7_9.7.x86_64.rpm</filename><sum type="sha256">791e864b91024b15cba4e60eea597d4261f1926cd7c8f7a24e8158d8a15ba699</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2526" id="CVE-2022-2526" title="Systemd-Resolved: Use-After-Free When Dealing With Dnsstream In Resolved-Dns-Stream.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6160" id="RHSA-2022:6160-1" title="Rhsa-2022:6160-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2109926" id="2109926" title="Systemd-Resolved: Use-After-Free When Dealing With Dnsstream In Resolved-Dns-Stream.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6169-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 91.13.0. 
Security Fix(es): 
* Mozilla: Address bar spoofing via XSLT error handling (CVE-2022-38472) 
* Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions (CVE-2022-38473) 
* Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 (CVE-2022-38477) 
* Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 (CVE-2022-38478) 
* Mozilla: Data race and potential use-after-free in PK11_ChangePW (CVE-2022-38476) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-91.13.0-1.el7_9.src.rpm" version="91.13.0"><filename>thunderbird-91.13.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">6d85633aab8f9d5e33b46d20c0cb450d8b929292c3d4ec57f5cc9c4b9e1ca949</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38472" id="CVE-2022-38472" title="Mozilla: Address Bar Spoofing Via Xslt Error Handling" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38473" id="CVE-2022-38473" title="Mozilla: Cross-Origin Xslt Documents Would Have Inherited The Parent'S Permissions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38476" id="CVE-2022-38476" title="Mozilla: Data Race And Potential Use-After-Free In Pk11_Changepw" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38477" id="CVE-2022-38477" title="Mozilla: Memory Safety Bugs Fixed In Firefox 104 And Firefox Esr 102.2" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38478" id="CVE-2022-38478" title="Mozilla: Memory Safety Bugs Fixed In Firefox 104, Firefox Esr 102.2, And Firefox Esr 91.13" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6169" id="RHSA-2022:6169-1" title="Rhsa-2022:6169-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120673" id="2120673" title="Mozilla: Address Bar Spoofing Via Xslt Error Handling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120674" id="2120674" title="Mozilla: Cross-Origin Xslt Documents Would Have Inherited The Parent'S Permissions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120678" id="2120678" title="Mozilla: Data Race And Potential Use-After-Free In Pk11_Changepw" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120695" id="2120695" title="Mozilla: Memory Safety Bugs Fixed In Firefox 104 And Firefox Esr 102.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120696" id="2120696" title="Mozilla: Memory Safety Bugs Fixed In Firefox 104, Firefox Esr 102.2, And Firefox Esr 91.13" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6170-1</id><title>Rsync</title><description>Security Fix(es): 
* rsync: remote arbitrary files write inside the directories of connecting peers (CVE-2022-29154) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="rsync" release="11.el7_9" src="rsync-3.1.2-11.el7_9.src.rpm" version="3.1.2"><filename>rsync-3.1.2-11.el7_9.x86_64.rpm</filename><sum type="sha256">0c488dacb9f63cc2330889b3748f363389f63ac0c34cad4588f23ef4afe550be</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29154" id="CVE-2022-29154" title="Rsync: Remote Arbitrary Files Write Inside The Directories Of Connecting Peers" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6170" id="RHSA-2022:6170-1" title="Rhsa-2022:6170-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2110928" id="2110928" title="Rsync: Remote Arbitrary Files Write Inside The Directories Of Connecting Peers" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6179-1</id><title>Firefox</title><description>This update upgrades Firefox to version 91.13.0 ESR. 
Security Fix(es): 
* Mozilla: Address bar spoofing via XSLT error handling (CVE-2022-38472) 
* Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions (CVE-2022-38473) 
* Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 (CVE-2022-38477) 
* Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 (CVE-2022-38478) 
* Mozilla: Data race and potential use-after-free in PK11_ChangePW (CVE-2022-38476) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-08-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-91.13.0-1.el7_9.src.rpm" version="91.13.0"><filename>firefox-91.13.0-1.el7_9.i686.rpm</filename><sum type="sha256">81039b2e705fbc6fb6c4ef61fcc0fc13592fb7a778009b300b41befb5500b044</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-91.13.0-1.el7_9.src.rpm" version="91.13.0"><filename>firefox-91.13.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">098f44ada05d0d9010b129d6c9f3b00921b8b94b3568a4b550bc6cbd07339c37</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38472" id="CVE-2022-38472" title="Mozilla: Address Bar Spoofing Via Xslt Error Handling" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38473" id="CVE-2022-38473" title="Mozilla: Cross-Origin Xslt Documents Would Have Inherited The Parent'S Permissions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38476" id="CVE-2022-38476" title="Mozilla: Data Race And Potential Use-After-Free In Pk11_Changepw" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38477" id="CVE-2022-38477" title="Mozilla: Memory Safety Bugs Fixed In Firefox 104 And Firefox Esr 102.2" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38478" id="CVE-2022-38478" title="Mozilla: Memory Safety Bugs Fixed In Firefox 104, Firefox Esr 102.2, And Firefox Esr 91.13" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6179" id="RHSA-2022:6179-1" title="Rhsa-2022:6179-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120673" id="2120673" title="Mozilla: Address Bar Spoofing Via Xslt Error Handling" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120674" id="2120674" title="Mozilla: Cross-Origin Xslt Documents Would Have Inherited The Parent'S Permissions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120678" id="2120678" title="Mozilla: Data Race And Potential Use-After-Free In Pk11_Changepw" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120695" id="2120695" title="Mozilla: Memory Safety Bugs Fixed In Firefox 104 And Firefox Esr 102.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2120696" id="2120696" title="Mozilla: Memory Safety Bugs Fixed In Firefox 104, Firefox Esr 102.2, And Firefox Esr 91.13" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6381-1</id><title>Open-Vm-Tools</title><description>Security Fix(es): 
* open-vm-tools: local root privilege escalation in the virtual machine (CVE-2022-31676) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-09-08 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="open-vm-tools" release="3.el7_9.4" src="open-vm-tools-11.0.5-3.el7_9.4.src.rpm" version="11.0.5"><filename>open-vm-tools-11.0.5-3.el7_9.4.x86_64.rpm</filename><sum type="sha256">2c7a540c07f75bbde969aab6fcd7643af51af971b6f2e604e30160fdf66c102b</sum></package><package arch="x86_64" name="open-vm-tools-desktop" release="3.el7_9.4" src="open-vm-tools-11.0.5-3.el7_9.4.src.rpm" version="11.0.5"><filename>open-vm-tools-desktop-11.0.5-3.el7_9.4.x86_64.rpm</filename><sum type="sha256">3736617d4ffbbee600bb2b187c796ea5a2e976c42a51bdc11310520b2a493cc7</sum></package><package arch="x86_64" name="open-vm-tools-devel" release="3.el7_9.4" src="open-vm-tools-11.0.5-3.el7_9.4.src.rpm" version="11.0.5"><filename>open-vm-tools-devel-11.0.5-3.el7_9.4.x86_64.rpm</filename><sum type="sha256">ff5657209dd6cdfe32980b90cd40eb61d77c1f1fd633a53137d8429890940660</sum></package><package arch="x86_64" name="open-vm-tools-test" release="3.el7_9.4" src="open-vm-tools-11.0.5-3.el7_9.4.src.rpm" version="11.0.5"><filename>open-vm-tools-test-11.0.5-3.el7_9.4.x86_64.rpm</filename><sum type="sha256">ae6fb0521fdab2fd20a14ffb493fd0e72863d59051fe1d16f2bacd95df27ec89</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31676" id="CVE-2022-31676" title="Open-Vm-Tools: Local Root Privilege Escalation In The Virtual Machine" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6381" id="RHSA-2022:6381-1" title="Rhsa-2022:6381-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2118714" id="2118714" title="Open-Vm-Tools: Local Root Privilege Escalation In The Virtual Machine" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6710-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.3.0. 
Security Fix(es): 
* Mozilla: Leaking of sensitive information when composing a response to an  HTML email with a META refresh tag (CVE-2022-3033) 
* Mozilla: Bypassing FeaturePolicy restrictions on transient pages (CVE-2022-40959) 
* Mozilla: Data-race when parsing non-UTF-8 URLs in threads (CVE-2022-40960) 
* Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3 (CVE-2022-40962) 
* Mozilla: Remote content specified in an HTML document that was nested inside an iframe's srcdoc attribute was not blocked (CVE-2022-3032) 
* Mozilla: An iframe element in an HTML email could trigger a network request (CVE-2022-3034) 
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to  denial-of- service attack (CVE-2022-36059) 
* Mozilla: Bypassing Secure Context restriction for cookies with __Host and  __Secure prefix (CVE-2022-40958) 
* Mozilla: Content-Security-Policy base-uri bypass (CVE-2022-40956) 
* Mozilla: Incoherent instruction cache when building WASM on ARM64 (CVE-2022-40957) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-09-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="3.el7_9" src="thunderbird-102.3.0-3.el7_9.src.rpm" version="102.3.0"><filename>thunderbird-102.3.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">5c158e57590300fc7fdc7642fadd46a5c062d8f1d3f5aaf87fc01b93f3110114</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3032" id="CVE-2022-3032" title="Mozilla: Remote Content Specified In An Html Document That Was Nested Inside An Iframe'S Srcdoc Attribute Was Not Blocked" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3033" id="CVE-2022-3033" title="Mozilla: Leaking Of Sensitive Information When Composing A Response To An Html Email With A Meta Refresh Tag" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3034" id="CVE-2022-3034" title="Mozilla: An Iframe Element In An Html Email Could Trigger A Network Request" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36059" id="CVE-2022-36059" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To Denial-Of-Service Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40956" id="CVE-2022-40956" title="Mozilla: Content-Security-Policy Base-Uri Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40957" id="CVE-2022-40957" title="Mozilla: Incoherent Instruction Cache When Building Wasm On Arm64" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40958" id="CVE-2022-40958" title="Mozilla: Bypassing Secure Context Restriction For Cookies With __Host And __Secure Prefix" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40959" id="CVE-2022-40959" title="Mozilla: Bypassing Featurepolicy Restrictions On Transient Pages" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40960" id="CVE-2022-40960" title="Mozilla: Data-Race When Parsing Non-Utf-8 Urls In Threads" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40962" id="CVE-2022-40962" title="Mozilla: Memory Safety Bugs Fixed In Firefox 105 And Firefox Esr 102.3" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6710" id="RHSA-2022:6710-1" title="Rhsa-2022:6710-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2123255" id="2123255" title="Mozilla: Remote Content Specified In An Html Document That Was Nested Inside An Iframe'S Srcdoc Attribute Was Not Blocked" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2123256" id="2123256" title="Mozilla: Leaking Of Sensitive Information When Composing A Response To An Html Email With A Meta Refresh Tag" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2123257" id="2123257" title="Mozilla: An Iframe Element In An Html Email Could Trigger A Network Request" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2123258" id="2123258" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To Denial-Of-Service Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128792" id="2128792" title="Mozilla: Bypassing Featurepolicy Restrictions On Transient Pages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128793" id="2128793" title="Mozilla: Data-Race When Parsing Non-Utf-8 Urls In Threads" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128794" id="2128794" title="Mozilla: Bypassing Secure Context Restriction For Cookies With __Host And __Secure Prefix" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128795" id="2128795" title="Mozilla: Content-Security-Policy Base-Uri Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128796" id="2128796" title="Mozilla: Incoherent Instruction Cache When Building Wasm On Arm64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128797" id="2128797" title="Mozilla: Memory Safety Bugs Fixed In Firefox 105 And Firefox Esr 102.3" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6711-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.3.0 ESR. 
Security Fix(es): 
* Mozilla: Bypassing FeaturePolicy restrictions on transient pages (CVE-2022-40959) 
* Mozilla: Data-race when parsing non-UTF-8 URLs in threads (CVE-2022-40960) 
* Mozilla: Memory safety bugs fixed in Firefox 105 and Firefox ESR 102.3 (CVE-2022-40962) 
* Mozilla: Bypassing Secure Context restriction for cookies with __Host and  __Secure prefix (CVE-2022-40958) 
* Mozilla: Content-Security-Policy base-uri bypass (CVE-2022-40956) 
* Mozilla: Incoherent instruction cache when building WASM on ARM64 (CVE-2022-40957) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-09-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="6.el7_9" src="firefox-102.3.0-6.el7_9.src.rpm" version="102.3.0"><filename>firefox-102.3.0-6.el7_9.x86_64.rpm</filename><sum type="sha256">16dfa4174101455cbdf4db85f950a31f77d7a7a7cf9fbb71aa501b68d60b6a48</sum></package><package arch="i686" name="firefox" release="6.el7_9" src="firefox-102.3.0-6.el7_9.src.rpm" version="102.3.0"><filename>firefox-102.3.0-6.el7_9.i686.rpm</filename><sum type="sha256">a90f01eb2e7fb81dada4d449816efb77b1bb64bffdf4774ddc2be5a93ff8d340</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40956" id="CVE-2022-40956" title="Mozilla: Content-Security-Policy Base-Uri Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40957" id="CVE-2022-40957" title="Mozilla: Incoherent Instruction Cache When Building Wasm On Arm64" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40958" id="CVE-2022-40958" title="Mozilla: Bypassing Secure Context Restriction For Cookies With __Host And __Secure Prefix" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40959" id="CVE-2022-40959" title="Mozilla: Bypassing Featurepolicy Restrictions On Transient Pages" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40960" id="CVE-2022-40960" title="Mozilla: Data-Race When Parsing Non-Utf-8 Urls In Threads" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40962" id="CVE-2022-40962" title="Mozilla: Memory Safety Bugs Fixed In Firefox 105 And Firefox Esr 102.3" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6711" id="RHSA-2022:6711-1" title="Rhsa-2022:6711-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128792" id="2128792" title="Mozilla: Bypassing Featurepolicy Restrictions On Transient Pages" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128793" id="2128793" title="Mozilla: Data-Race When Parsing Non-Utf-8 Urls In Threads" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128794" id="2128794" title="Mozilla: Bypassing Secure Context Restriction For Cookies With __Host And __Secure Prefix" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128795" id="2128795" title="Mozilla: Content-Security-Policy Base-Uri Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128796" id="2128796" title="Mozilla: Incoherent Instruction Cache When Building Wasm On Arm64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128797" id="2128797" title="Mozilla: Memory Safety Bugs Fixed In Firefox 105 And Firefox Esr 102.3" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6765-1</id><title>Bind</title><description>Security Fix(es): 
* bind: memory leak in ECDSA DNSSEC verification code (CVE-2022-38177) 
* bind: memory leaks in EdDSA DNSSEC verification code (CVE-2022-38178) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-10-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">8c8e95e6cc3d13d0a60fed32d2eb4c01f58f23a44d1ea1e09269db25a19f4b7d</sum></package><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">c3c174c51b49054fc568a401d3333d3f72d60eb844202e128a35d9f0cab01f6c</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">452a47e1a5c85d5284ca3f3e624f93f3030863d7c1a716ec87f17c07d71bc3b0</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">38640fd00904a57efd528c2c076063e966d23cc216db15d22ed891140254393d</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.10.i686.rpm</filename><sum type="sha256">a0032d922ee1ad824ece7bee12589cef936bea052cf91695a46f4d29d48d6950</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">e7245226cdf1bf2a601cfc69cd381ce021c02992837e33a08f03e0289d423f29</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">11614018e6fd0121a286ff84626820225434594f97ef7f85c052a069f293a302</sum></package><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.10.noarch.rpm</filename><sum type="sha256">f46466f6f10683fea611257b1f00763bd3f9441b97de721c19ff378e9104c901</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.10.i686.rpm</filename><sum type="sha256">262677c264df05452a69e4ef29c3b8b7136538cbde5e230c7c35518b233819f0</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.10.i686.rpm</filename><sum type="sha256">b50a3aa1d2f5d7ecf431a390f9d95312f338c75c847f9be2e3ce68616b9bae5f</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">886b312819904b985a31a29c6186a922989129eab0a7d539381e01dee30876a7</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">3f00161ab3c26341c8ab2d1bd5a22440d71ec8908dc5ed389f963a4050321ead</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.10.i686.rpm</filename><sum type="sha256">83aa7de54f47a6e325acc11254c9c3f447811ac6ec120e214288e278d72eff6c</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">46d8f6e86bf934a2a672fae81dc95c4652b050b2a98dd17b7e4d282992199671</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.10.i686.rpm</filename><sum type="sha256">9b4f8ba068b3891a277d4e4615ca3f8c882bad7fc9094d902267527fbf3c0b8e</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">3397207eef4b4b8230eb35d39e553433e864226d0f7dc4b0c8ecfa934e41c71d</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">214fd14b0d5694ca4ef19425be5f88df6e324ad67f5f416ff037ebfdba6cb2cc</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.10.i686.rpm</filename><sum type="sha256">63caf82f0c27722f3bcae22df946bb32b1042778da5ba76ce4f064abfa8d687a</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">1043d386988aa361c430fc5bcf99f0e719c54e69c93b9b97dfafdb46f874b3d6</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">7b348a7112ff4e203e64deec4f3d72909188f2302ab758dc02062c2d8f9e884e</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.10.i686.rpm</filename><sum type="sha256">f1713f6bb470b0d7457202d39cd42bb0d03db2b75ab696e5ee3eb58d714a7226</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">08fd5980cfa071b0029fcdc029d63ce1ca3649ef4a73d96a15a8a005ccfa9183</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.10.x86_64.rpm</filename><sum type="sha256">59d79cc06227b29ff85aad74c80d32ecf96007b4cf44413fc92d94beb89b51e6</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.10" src="bind-9.11.4-26.P2.el7_9.10.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.10.i686.rpm</filename><sum type="sha256">49ff2ab782cd64e6e4716f6fd496983a988cbe706f2edb2e903a3ea0b9184396</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38177" id="CVE-2022-38177" title="Bind: Memory Leak In Ecdsa Dnssec Verification Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38178" id="CVE-2022-38178" title="Bind: Memory Leaks In Eddsa Dnssec Verification Code" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6765" id="RHSA-2022:6765-1" title="Rhsa-2022:6765-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128601" id="2128601" title="Bind: Memory Leak In Ecdsa Dnssec Verification Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128602" id="2128602" title="Bind: Memory Leaks In Eddsa Dnssec Verification Code" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6815-1</id><title>Squid</title><description>Security Fix(es): 
* squid: buffer-over-read in SSPI and SMB authentication (CVE-2022-41318) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-10-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="squid" release="17.el7_9.8" src="squid-3.5.20-17.el7_9.8.src.rpm" version="3.5.20"><filename>squid-3.5.20-17.el7_9.8.x86_64.rpm</filename><sum type="sha256">c80eba4f4ea195535460958b789906d52c7dca95daf9b548071db9c6edb70a45</sum></package><package arch="x86_64" epoch="7" name="squid-sysvinit" release="17.el7_9.8" src="squid-3.5.20-17.el7_9.8.src.rpm" version="3.5.20"><filename>squid-sysvinit-3.5.20-17.el7_9.8.x86_64.rpm</filename><sum type="sha256">f5822f2cb2c244fb13fc93edc60a914c70a7e9f764dd7558f0e676e6cfd06275</sum></package><package arch="x86_64" epoch="7" name="squid-migration-script" release="17.el7_9.8" src="squid-3.5.20-17.el7_9.8.src.rpm" version="3.5.20"><filename>squid-migration-script-3.5.20-17.el7_9.8.x86_64.rpm</filename><sum type="sha256">41e3aa29f321f1a3db9d6b6b48288842b2e41f3f75a1640d0fa9cbfd0fca8ef7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41318" id="CVE-2022-41318" title="Squid: Buffer-Over-Read In Sspi And Smb Authentication" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6815" id="RHSA-2022:6815-1" title="Rhsa-2022:6815-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2129771" id="2129771" title="Squid: Buffer-Over-Read In Sspi And Smb Authentication" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6834-1</id><title>Expat</title><description>Security Fix(es): 
* expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-10-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="expat-devel" release="15.el7_9" src="expat-2.1.0-15.el7_9.src.rpm" version="2.1.0"><filename>expat-devel-2.1.0-15.el7_9.i686.rpm</filename><sum type="sha256">6d734ec2dfb8d067b0ed9e0044f6ef41e53fb641f894c40f01b89b2257ed032e</sum></package><package arch="i686" name="expat" release="15.el7_9" src="expat-2.1.0-15.el7_9.src.rpm" version="2.1.0"><filename>expat-2.1.0-15.el7_9.i686.rpm</filename><sum type="sha256">9d0a2ee25f9603e4c03758b57ad0bfcb35d6578381841c4235ff2ba9c8415dbe</sum></package><package arch="x86_64" name="expat-devel" release="15.el7_9" src="expat-2.1.0-15.el7_9.src.rpm" version="2.1.0"><filename>expat-devel-2.1.0-15.el7_9.x86_64.rpm</filename><sum type="sha256">1a55d904f7411d5734a35309c82dd5ef4d5f906ecb198aaccac3ba57c32cd8b2</sum></package><package arch="i686" name="expat-static" release="15.el7_9" src="expat-2.1.0-15.el7_9.src.rpm" version="2.1.0"><filename>expat-static-2.1.0-15.el7_9.i686.rpm</filename><sum type="sha256">2b51ea7bea1db7ec6ffe364e0e55f7483eeb02d2f8a0600bc4fc5ac14f12a70e</sum></package><package arch="x86_64" name="expat" release="15.el7_9" src="expat-2.1.0-15.el7_9.src.rpm" version="2.1.0"><filename>expat-2.1.0-15.el7_9.x86_64.rpm</filename><sum type="sha256">342e80ce03829aa81d520b4d1765e109818f6341d410bc9e4f6a2fdbc2909fef</sum></package><package arch="x86_64" name="expat-static" release="15.el7_9" src="expat-2.1.0-15.el7_9.src.rpm" version="2.1.0"><filename>expat-static-2.1.0-15.el7_9.x86_64.rpm</filename><sum type="sha256">c5e62aa01f2a9979cde445da233c0ce980eb6d2124036f0f3e83246ed36c80d0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40674" id="CVE-2022-40674" title="Expat: A Use-After-Free In The Docontent Function In Xmlparse.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6834" id="RHSA-2022:6834-1" title="Rhsa-2022:6834-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2130769" id="2130769" title="Expat: A Use-After-Free In The Docontent Function In Xmlparse.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6997-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.3.0 ESR. 
Security Fix(es): 
* expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-10-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="7.el7_9" src="firefox-102.3.0-7.el7_9.src.rpm" version="102.3.0"><filename>firefox-102.3.0-7.el7_9.i686.rpm</filename><sum type="sha256">e0034b680c6c69752f77043e773d5f536fd2346d3e56ad571c76cdd058167e88</sum></package><package arch="x86_64" name="firefox" release="7.el7_9" src="firefox-102.3.0-7.el7_9.src.rpm" version="102.3.0"><filename>firefox-102.3.0-7.el7_9.x86_64.rpm</filename><sum type="sha256">4881290a113ee0c15753bc4b63202747fcc727620c5089ba94fd2b563cfc69c9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40674" id="CVE-2022-40674" title="Expat: A Use-After-Free In The Docontent Function In Xmlparse.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6997" id="RHSA-2022:6997-1" title="Rhsa-2022:6997-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2130769" id="2130769" title="Expat: A Use-After-Free In The Docontent Function In Xmlparse.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:6998-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.3.0. 
Security Fix(es): 
* expat: a use-after-free in the doContent function in xmlparse.c (CVE-2022-40674) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-10-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="4.el7_9" src="thunderbird-102.3.0-4.el7_9.src.rpm" version="102.3.0"><filename>thunderbird-102.3.0-4.el7_9.x86_64.rpm</filename><sum type="sha256">94b25799df156b6c9c081860f77acd08ce9c5579d31716471499eed12aa9892a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40674" id="CVE-2022-40674" title="Expat: A Use-After-Free In The Docontent Function In Xmlparse.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:6998" id="RHSA-2022:6998-1" title="Rhsa-2022:6998-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2130769" id="2130769" title="Expat: A Use-After-Free In The Docontent Function In Xmlparse.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7002</id><title>Moderate: Java-1.8.0-Openjdk Security And Bug Fix Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 8u352) (BZ#2130371)
</description><severity>moderate</severity><issued date="2022-10-21 09:05:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">d56beb31d4ce3cb40cf06a3da3e78ecd7188dc0ef89bbeedb94fc05c0da906cc</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">4c8ef6112e9d00d3c6897a771b2774d74c339bbf0f83958034f4d72d835cd2d8</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.352.b08-2.el7_9.noarch.rpm</filename><sum type="sha256">6e34c23528db17618c9dd959117bb35918d8f396ab75fe755a6c734c75e7c2da</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">1be77c0923180bb6caffdaa7116b170fc598c54a75b6e745b6896909ba4e42b0</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">094e338d13280eafaa2a1d56c0f5adf1d3f81d8d1d598ed6c3040a4ecc5cd17a</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.352.b08-2.el7_9.noarch.rpm</filename><sum type="sha256">5c369b93e91db39be0f766c413578e7144f0d877463e12c8ed344fb2659ae60c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">4bfda19ee57fc0edbd38c9fb1dbfa2dcbd1acc677d17dea82b097a8dead97ce4</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">95a8274eacb0e615ccba63bfbe4f25693e055dee17e4c21aed7978ac968b5afb</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">dc22f9c7db829153bef1e0f454e626f978408ef1d954b33a4725accf8f502246</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">a7c2844adb412d23f0d44e2406a02168ad616ab6782ab507b23e4d630a4658da</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">393037559109238206721f2850b69dbfdc4d63c4b5e2049aff4a6c4593ea3120</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">eb968d4f78a6de548c383fc6057ce11701ee12320697f918a3d3c36db9c1a8b2</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">3a8ef487dc22dee957cb88c32af7efce732327055257cba68d755bd424e1c661</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">6efff0a7e6bf24d99c9292a1fab2cff2f82e77dcf81c55fa22b52b16117b5542</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619" id="CVE-2022-21619" title="Cve-2022-21619" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624" id="CVE-2022-21624" title="Cve-2022-21624" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626" id="CVE-2022-21626" title="Cve-2022-21626" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628" id="CVE-2022-21628" title="Cve-2022-21628" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7002" id="RHSA-2022:7002" title="Moderate: Java-1.8.0-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2130371" id="2130371" title="2130371 &#8211; Prepare For The Next Quarterly Openjdk Upstream Release (2022-10, 8U352) [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7002-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) 
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) 
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) 
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 8u352)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-10-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">045324cf39dd8d58706f6c90b421bbfe82dfbf1fa1bb614becf94af1bc5598fa</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el7_9.noarch.rpm</filename><sum type="sha256">5154bc849ea4faebc2df3ec151a2fff7e579d7bc8a0d6a92bc7ac3916e8eea85</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el7_9.noarch.rpm</filename><sum type="sha256">236fc0b6fe5e63a031d98dad0282a0005276e6457b19792171ae5751c4893b88</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-src-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">41b5cd44eeaf21dddc7a8fcab47c64a450d31c421149160feac0d58851312e23</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">2260ae4a9e1b4fbdc73d15c0eb9a3dcfed10e6602ba22c01363528045e961b90</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">005d42f99b2171c26982cc7d7311934935a2d5ef23bd81e748c826b7a70de691</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">a9bf6ced787401b1a48a4b41f761037e5e24b17ad998f1b2069c7b505a083177</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">34c31532c398cfcf388c394b3470d8cd2074534ee132f770cd1080c685bd2094</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">00123b9b7145ddc44227277d96a63acd537f393cd5183070bfb01762289c2419</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">7c587708770b27a9d455b30e4f3118d410595e4a047187a377f94a272a742edf</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">d723f61e6ce4a05c6683286586fb847941cafacb422bb68c40f35346c7b8e638</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el7_9.i686.rpm</filename><sum type="sha256">f2bba7fd17da0be94b52d99e7efa8b27dbf3fa40e964595c6cdb331544f0a2ed</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-src-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">5527a326f0fca48935071a78978625a171fbfa130ac8b939a086a633a8e9eb7f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.352.b08-2.el7_9.src.rpm" version="1.8.0.352.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">a85d45511bcc33ddbb1351d215ec9e16b644ecd45a8ef08c6c927cd4c8284f88</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619" id="CVE-2022-21619" title="Openjdk: Improper Handling Of Long Ntlm Client Hostnames (Security, 8286526)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624" id="CVE-2022-21624" title="Openjdk: Insufficient Randomization Of Jndi Dns Port Numbers (Jndi, 8286910)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626" id="CVE-2022-21626" title="Openjdk: Excessive Memory Allocation In X.509 Certificate Parsing (Security, 8286533)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628" id="CVE-2022-21628" title="Openjdk: Httpserver No Connection Count Limit (Lightweight Http Server, 8286918)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7002" id="RHSA-2022:7002-1" title="Rhsa-2022:7002-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133745" id="2133745" title="Openjdk: Improper Handling Of Long Ntlm Client Hostnames (Security, 8286526)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133753" id="2133753" title="Openjdk: Excessive Memory Allocation In X.509 Certificate Parsing (Security, 8286533)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133765" id="2133765" title="Openjdk: Insufficient Randomization Of Jndi Dns Port Numbers (Jndi, 8286910)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133769" id="2133769" title="Openjdk: Httpserver No Connection Count Limit (Lightweight Http Server, 8286918)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7008</id><title>Moderate: Java-11-Openjdk Security And Bug Fix Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) * OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) * OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) * OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) * OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) (BZ#2130373)
</description><severity>moderate</severity><issued date="2022-10-21 09:05:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-demo-debug-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">9b30e0b4114447ecba9284f9f8bdc7a7fad055bd25fa4d0f940b2445b6a19073</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-javadoc-zip-debug-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">3d3a96485558332be7609acf9e84226055ff1d14905e59a943ea18cbab036696</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-demo-debug-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">9c23f12f9a5495a548e1c9459308e84b9e9bc0ba240fa1dc77ea08baf93b2e62</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-devel-debug-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">c794784018586395306109eb35a4e7a2b0af066a1c512f075ad22511bcc300c4</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-javadoc-debug-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">0b5a939ef30c149d7c8bc37d653dba5e91cc9800a95b7105afb9d53461fc42ef</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-jmods-debug-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">1f9d95412225790c9ee7352e4f91df4e7802ba3277c8d8dd51b1739db7ad3664</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-headless-debug-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">d885ab7433ac56582a23b9ecd7d23131073867860a272dd26173cf376f16f65e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-javadoc-debug-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">65a4fae1ca173d02255c130907fcd50e78168bc5bc4135e20df69177bd56c619</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-devel-debug-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">a887b2c3dd2ffe619fdd61c8fb2ddc15918bda4b3ecdd06aace9b65e7f335952</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-jmods-debug-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">9f96cafc43c20dab9078c4fff5050241c0a92b28af68e4fab5160bed79580a44</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-src-debug-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">906dbfba89f53fba9d831aef188204c768faea406c5c6cac748650a2acd5b2dd</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-src-debug-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">be16072fc3b3928b5e29e9ac8de897e345b1e7c05bc5a3653394f190a516a935</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-static-libs-debug-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">d220f2012589f2cb3f6a2a35c2d450e9d046810cdfad7162041dbac644ee5a24</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-javadoc-zip-debug-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">873e1f41f194c4720c8b728c6fdca7682b625710ee7b6335f64734b3c5937f49</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-debug-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">01ed2ea371ef11fd32780c19716eb34a3b66e3eaf3a493095e65bf86f69521c5</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-debug-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">49bf2f5320e238c6aae952f0a51052ed5e6759fc81e272117e30c0e39b6ad55b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-headless-debug-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">26122d4e60e887d73eb597edad58173f18d3ca9cc960670b3ba34cfc89627058</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618" id="CVE-2022-21618" title="Cve-2022-21618" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619" id="CVE-2022-21619" title="Cve-2022-21619" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624" id="CVE-2022-21624" title="Cve-2022-21624" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626" id="CVE-2022-21626" title="Cve-2022-21626" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628" id="CVE-2022-21628" title="Cve-2022-21628" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399" id="CVE-2022-39399" title="Cve-2022-39399" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7008" id="RHSA-2022:7008" title="Moderate: Java-11-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2130373" id="2130373" title="2130373 &#8211; Prepare For The Next Quarterly Openjdk Upstream Release (2022-10, 11.0.17) [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7008-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS,  8286077) (CVE-2022-21618) 
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626) 
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628) 
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619) 
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624) 
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-10-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-headless-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">2e2f4282ea556b93790aa1f19bba98323f97261add22e01175952f7b54180271</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-devel-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">c6dac67cc14997f8bdd2dd3f7c17a5356cf1dfd544c537e4a4cb1be83e411dc5</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">f3eba0997d80fd02f0641cb91ef9d3e79154b864cb8ec725b3468e6772c85942</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">d68cb771bd42bb1114ef6559d8f7a51c2fd9e2ef435ad5a94dcb10744af7837f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">b68bc607c222aa7323545ccb3262e624a17ad28dd04cfe4f0575a0cd6a14b905</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-devel-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">15ab7a5216ed7697b80152e664dad4c0118228e2efbe7fde553627ef5d0fe1d6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">897a35cd9ecd8fe3605aeb9f800e834335b04aeeb756419b111fa6910fdbf20a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-src-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">4e1a6147713db1f4fafbd879be92ce02a46966b7dbf0474b43eed85ffbb4bdb7</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-jmods-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">85858b751048b26cad16d92415828e9468ee5835840e547c549c00e31fade5d3</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-src-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">5b6289d4a8c6cfb1938a28dc1a42b9849c012856d101f1ee0e69e621a979d06d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-javadoc-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">5f7eb56248f3f5eb23975d3b7bae6acb884bcc24aeab2c6d51c80277274f28e8</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-jmods-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">28fc66558d2ba55d75d14e50f8816694f309cb296e8ac95a22655364e2a0c176</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-javadoc-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">79f01ac42da78f71404bcac3d62dcc7c6f3d60100a33b8e1eff91f9c25d75210</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-demo-11.0.17.0.8-2.el7_9.i686.rpm</filename><sum type="sha256">a70dbda492c78313c14a7a84828fc160b387bb1a1ea3ebfc2901e4a1ada2c63c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-demo-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">bc21f6281a4762c1b3a272002479649491b01a68954c3962d4c7a75c38390c5c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-static-libs-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">de645229b378ac294b1976bb731ce4336a91191ebb1573bb8f042b109397b583</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="2.el7_9" src="java-11-openjdk-11.0.17.0.8-2.el7_9.src.rpm" version="11.0.17.0.8"><filename>java-11-openjdk-headless-11.0.17.0.8-2.el7_9.x86_64.rpm</filename><sum type="sha256">bbb34fc805b6ee57991a015d7ae9bbfd4de8f6f6685a0a5a6e8dafee0f0e24a7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21618" id="CVE-2022-21618" title="Openjdk: Improper Multibyte Conversion Can Lead To Buffer Overflow (Jgss, 8286077)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21619" id="CVE-2022-21619" title="Openjdk: Improper Handling Of Long Ntlm Client Hostnames (Security, 8286526)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21624" id="CVE-2022-21624" title="Openjdk: Insufficient Randomization Of Jndi Dns Port Numbers (Jndi, 8286910)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21626" id="CVE-2022-21626" title="Openjdk: Excessive Memory Allocation In X.509 Certificate Parsing (Security, 8286533)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21628" id="CVE-2022-21628" title="Openjdk: Httpserver No Connection Count Limit (Lightweight Http Server, 8286918)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39399" id="CVE-2022-39399" title="Openjdk: Missing Sni Caching In Http/2 (Networking, 8289366)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7008" id="RHSA-2022:7008-1" title="Rhsa-2022:7008-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133745" id="2133745" title="Openjdk: Improper Handling Of Long Ntlm Client Hostnames (Security, 8286526)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133753" id="2133753" title="Openjdk: Excessive Memory Allocation In X.509 Certificate Parsing (Security, 8286533)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133765" id="2133765" title="Openjdk: Insufficient Randomization Of Jndi Dns Port Numbers (Jndi, 8286910)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133769" id="2133769" title="Openjdk: Httpserver No Connection Count Limit (Lightweight Http Server, 8286918)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133776" id="2133776" title="Openjdk: Missing Sni Caching In Http/2 (Networking, 8289366)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133817" id="2133817" title="Openjdk: Improper Multibyte Conversion Can Lead To Buffer Overflow (Jgss, 8286077)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7069-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.4.0 ESR. 
Security Fix(es): 
* Mozilla: Same-origin policy violation could have leaked cross-origin URLs  (CVE-2022-42927) 
* Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) 
* Mozilla: Denial of Service via window.print (CVE-2022-42929) 
* Mozilla: Memory safety bugs fixed in Firefox 106 and Firefox ESR 102.4 (CVE-2022-42932) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-10-21 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-102.4.0-1.el7_9.src.rpm" version="102.4.0"><filename>firefox-102.4.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">0642373afde8eacc9aeeb43c40c54bcf7c9f3749c7a1a8ea40e35825d201482e</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-102.4.0-1.el7_9.src.rpm" version="102.4.0"><filename>firefox-102.4.0-1.el7_9.i686.rpm</filename><sum type="sha256">9acb24fcb2dfe02086a689c5392f6c45d84459580fd79b2d14ce0993dc21d96c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42927" id="CVE-2022-42927" title="Mozilla: Same-Origin Policy Violation Could Have Leaked Cross-Origin Urls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42928" id="CVE-2022-42928" title="Mozilla: Memory Corruption In Js Engine" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42929" id="CVE-2022-42929" title="Mozilla: Denial Of Service Via Window.Print" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42932" id="CVE-2022-42932" title="Mozilla: Memory Safety Bugs Fixed In Firefox 106 And Firefox Esr 102.4" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7069" id="RHSA-2022:7069-1" title="Rhsa-2022:7069-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2136156" id="2136156" title="Mozilla: Same-Origin Policy Violation Could Have Leaked Cross-Origin Urls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2136157" id="2136157" title="Mozilla: Memory Corruption In Js Engine" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2136158" id="2136158" title="Mozilla: Denial Of Service Via Window.Print" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2136159" id="2136159" title="Mozilla: Memory Safety Bugs Fixed In Firefox 106 And Firefox Esr 102.4" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7086-1</id><title>Pki-Core</title><description>Security Fix(es): 
* pki-core: When using the caServerKeygen_DirUserCert profile, user can get  certificates for other UIDs by entering name in Subject field (CVE-2022-2393) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-10-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="pki-server" release="23.el7_9" src="pki-core-10.5.18-23.el7_9.src.rpm" version="10.5.18"><filename>pki-server-10.5.18-23.el7_9.noarch.rpm</filename><sum type="sha256">09524799484444a63b913868881e250af4f0119140f1ca99fc6c4fbc468cac6b</sum></package><package arch="noarch" name="pki-kra" release="23.el7_9" src="pki-core-10.5.18-23.el7_9.src.rpm" version="10.5.18"><filename>pki-kra-10.5.18-23.el7_9.noarch.rpm</filename><sum type="sha256">f76d979333f8434d23757f3b6e1bb28343747049e0a10cb5252ebcfe5462802c</sum></package><package arch="noarch" name="pki-base-java" release="23.el7_9" src="pki-core-10.5.18-23.el7_9.src.rpm" version="10.5.18"><filename>pki-base-java-10.5.18-23.el7_9.noarch.rpm</filename><sum type="sha256">794c5cb52ab984ec7528d71a07eb08a8e2d93ef75e10ebf594d4c42cb40b248b</sum></package><package arch="noarch" name="pki-javadoc" release="23.el7_9" src="pki-core-10.5.18-23.el7_9.src.rpm" version="10.5.18"><filename>pki-javadoc-10.5.18-23.el7_9.noarch.rpm</filename><sum type="sha256">167f14b76c2519a957b28c4c1104739f821a2f2943f3b31f34437ebcd68f8bf9</sum></package><package arch="x86_64" name="pki-symkey" release="23.el7_9" src="pki-core-10.5.18-23.el7_9.src.rpm" version="10.5.18"><filename>pki-symkey-10.5.18-23.el7_9.x86_64.rpm</filename><sum type="sha256">49a97d887f18cea8d21db6e43d88473304c72347ec23df948a7058b2922e07c9</sum></package><package arch="x86_64" name="pki-tools" release="23.el7_9" src="pki-core-10.5.18-23.el7_9.src.rpm" version="10.5.18"><filename>pki-tools-10.5.18-23.el7_9.x86_64.rpm</filename><sum type="sha256">fd9f9a6b2d9168cf15bba41c981c54459bce435098ec52d0c4827685bcb01ea7</sum></package><package arch="noarch" name="pki-base" release="23.el7_9" src="pki-core-10.5.18-23.el7_9.src.rpm" version="10.5.18"><filename>pki-base-10.5.18-23.el7_9.noarch.rpm</filename><sum type="sha256">953ae5767d157d431e1c9bb90cd2151636d8e605ec23df90789c96372f8602dd</sum></package><package arch="noarch" name="pki-ca" release="23.el7_9" src="pki-core-10.5.18-23.el7_9.src.rpm" version="10.5.18"><filename>pki-ca-10.5.18-23.el7_9.noarch.rpm</filename><sum type="sha256">02068486401ee6b5051a65921893a41da030562b0a46be4f00fbd004f9119515</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2393" id="CVE-2022-2393" title="Pki-Core: When Using The Caserverkeygen_Dirusercert Profile, User Can Get Certificates For Other Uids By Entering Name In Subject Field" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7086" id="RHSA-2022:7086-1" title="Rhsa-2022:7086-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2101046" id="2101046" title="Pki-Core: When Using The Caserverkeygen_Dirusercert Profile, User Can Get Certificates For Other Uids By Entering Name In Subject Field" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7087-1</id><title>389-Ds-Base</title><description>Security Fix(es): 
* 389-ds-base: SIGSEGV in sync_repl (CVE-2022-2850) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Import may break replication because changelog starting csn may not be created</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-10-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base" release="17.el7_9" src="389-ds-base-1.3.10.2-17.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-1.3.10.2-17.el7_9.x86_64.rpm</filename><sum type="sha256">944f95622365738fafccebbf63316eac7d691e3e470ee9fc33d68fdba098b14f</sum></package><package arch="x86_64" name="389-ds-base-snmp" release="17.el7_9" src="389-ds-base-1.3.10.2-17.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-snmp-1.3.10.2-17.el7_9.x86_64.rpm</filename><sum type="sha256">d8d451f7a840ad2daf7160514343a7d0803e7f24b76086999548e5715fe5b085</sum></package><package arch="x86_64" name="389-ds-base-devel" release="17.el7_9" src="389-ds-base-1.3.10.2-17.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-devel-1.3.10.2-17.el7_9.x86_64.rpm</filename><sum type="sha256">6ec4b181ba625b39344fcbd044793356d3549213cbf7e94806dd06fc38d84a17</sum></package><package arch="x86_64" name="389-ds-base-libs" release="17.el7_9" src="389-ds-base-1.3.10.2-17.el7_9.src.rpm" version="1.3.10.2"><filename>389-ds-base-libs-1.3.10.2-17.el7_9.x86_64.rpm</filename><sum type="sha256">77db2d2adfa7d50b05eb1f3eb8f39fb488d0a6b36121d361057dff940ebd85d3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2850" id="CVE-2022-2850" title="389-Ds-Base: Sigsegv In Sync_Repl" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7087" id="RHSA-2022:7087-1" title="Rhsa-2022:7087-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2113056" id="2113056" title="Import May Break Replication Because Changelog Starting Csn May Not Be Created" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2118691" id="2118691" title="389-Ds-Base: Sigsegv In Sync_Repl" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7088-1</id><title>Libksba</title><description>Security Fix(es): 
* libksba: integer overflow may lead to remote code execution (CVE-2022-3515) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-10-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libksba" release="6.el7_9" src="libksba-1.3.0-6.el7_9.src.rpm" version="1.3.0"><filename>libksba-1.3.0-6.el7_9.x86_64.rpm</filename><sum type="sha256">7e11e6a81df1d6272e17a03009a28d7943a6cabd68bf3a923c6d89ead0769d2f</sum></package><package arch="x86_64" name="libksba-devel" release="6.el7_9" src="libksba-1.3.0-6.el7_9.src.rpm" version="1.3.0"><filename>libksba-devel-1.3.0-6.el7_9.x86_64.rpm</filename><sum type="sha256">673f0822ba542ac61ce573dca842da2c6661e75fb2de30e86bad51cb7a6237e3</sum></package><package arch="i686" name="libksba-devel" release="6.el7_9" src="libksba-1.3.0-6.el7_9.src.rpm" version="1.3.0"><filename>libksba-devel-1.3.0-6.el7_9.i686.rpm</filename><sum type="sha256">07a063e3cc370de7bb840c75e0f4ee06e5c777a7c18b843916c71c484ca8e943</sum></package><package arch="i686" name="libksba" release="6.el7_9" src="libksba-1.3.0-6.el7_9.src.rpm" version="1.3.0"><filename>libksba-1.3.0-6.el7_9.i686.rpm</filename><sum type="sha256">533730773bb7dfd38472b7e70e42eb7e2ffd62449d70aeca13d4019900e8f8b8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3515" id="CVE-2022-3515" title="Libksba: Integer Overflow May Lead To Remote Code Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7088" id="RHSA-2022:7088-1" title="Rhsa-2022:7088-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2135610" id="2135610" title="Libksba: Integer Overflow May Lead To Remote Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7184-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.4.0. 
Security Fix(es): 
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack by malicious server administrators (CVE-2022-39249) 
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a device verification attack (CVE-2022-39250) 
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to an impersonation attack (CVE-2022-39251) 
* Mozilla: Same-origin policy violation could have leaked cross-origin URLs  (CVE-2022-42927) 
* Mozilla: Memory Corruption in JS Engine (CVE-2022-42928) 
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to a data corruption issue (CVE-2022-39236) 
* Mozilla: Denial of Service via window.print (CVE-2022-42929) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.4 and Thunderbird 102.4 (CVE-2022-42932) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-10-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-102.4.0-1.el7_9.src.rpm" version="102.4.0"><filename>thunderbird-102.4.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">751d9af64cbed054e4ce9d25ba8de957cfca2e6b6bbc6e583f6bb7e955e8e702</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39236" id="CVE-2022-39236" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To A Data Corruption Issue" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39249" id="CVE-2022-39249" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To An Impersonation Attack By Malicious Server Administrators" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39250" id="CVE-2022-39250" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To A Device Verification Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39251" id="CVE-2022-39251" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To An Impersonation Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42927" id="CVE-2022-42927" title="Mozilla: Same-Origin Policy Violation Could Have Leaked Cross-Origin Urls" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42928" id="CVE-2022-42928" title="Mozilla: Memory Corruption In Js Engine" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42929" id="CVE-2022-42929" title="Mozilla: Denial Of Service Via Window.Print" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42932" id="CVE-2022-42932" title="Mozilla: Memory Safety Bugs Fixed In Firefox 106 And Firefox Esr 102.4" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7184" id="RHSA-2022:7184-1" title="Rhsa-2022:7184-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2135391" id="2135391" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To A Data Corruption Issue" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2135393" id="2135393" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To An Impersonation Attack By Malicious Server Administrators" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2135395" id="2135395" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To A Device Verification Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2135396" id="2135396" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To An Impersonation Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2136156" id="2136156" title="Mozilla: Same-Origin Policy Violation Could Have Leaked Cross-Origin Urls" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2136157" id="2136157" title="Mozilla: Memory Corruption In Js Engine" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2136158" id="2136158" title="Mozilla: Denial Of Service Via Window.Print" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2136159" id="2136159" title="Mozilla: Memory Safety Bugs Fixed In Firefox 106 And Firefox Esr 102.4" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7186-1</id><title>Device-Mapper-Multipath</title><description>Security Fix(es): 
* device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket (CVE-2022-41974) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-10-26 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="device-mapper-multipath-libs" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>device-mapper-multipath-libs-0.4.9-136.el7_9.x86_64.rpm</filename><sum type="sha256">c0417cd8fbd8cf0ebb675b89fe1472401299dbe36f3fe4832a6fd6f3d4820ee3</sum></package><package arch="x86_64" name="device-mapper-multipath-devel" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>device-mapper-multipath-devel-0.4.9-136.el7_9.x86_64.rpm</filename><sum type="sha256">fe3b267788d109ff4f28777fcc00dafaa6669cae749057415a1194fe94cabeec</sum></package><package arch="x86_64" name="libdmmp-devel" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>libdmmp-devel-0.4.9-136.el7_9.x86_64.rpm</filename><sum type="sha256">30ca5556be8eab6e7c22d594443e7627ddc1d414751cad4b31556d244787ce56</sum></package><package arch="x86_64" name="device-mapper-multipath" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>device-mapper-multipath-0.4.9-136.el7_9.x86_64.rpm</filename><sum type="sha256">55013cb7881446aa95631dfd591cde64b649c7a1b91c942d131bc49e117c0ff1</sum></package><package arch="x86_64" name="kpartx" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>kpartx-0.4.9-136.el7_9.x86_64.rpm</filename><sum type="sha256">0df134d6cc6152e6ee502a0590a4f10aeaabd870624486bcd1ecf804d0376e01</sum></package><package arch="i686" name="libdmmp-devel" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>libdmmp-devel-0.4.9-136.el7_9.i686.rpm</filename><sum type="sha256">7d73ab67bd157e7d42989546fe383af91118f2bb5afa94b5ac0ca82ce2d6d9b2</sum></package><package arch="x86_64" name="libdmmp" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>libdmmp-0.4.9-136.el7_9.x86_64.rpm</filename><sum type="sha256">859220b7a7116671fa883778eb026c73853085eb18dcdf85d37c6f13904a8b9b</sum></package><package arch="i686" name="libdmmp" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>libdmmp-0.4.9-136.el7_9.i686.rpm</filename><sum type="sha256">df30e350eaf3d5d7eff406c4e548aea30732ea9564ea84403018876c810e2664</sum></package><package arch="i686" name="device-mapper-multipath-libs" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>device-mapper-multipath-libs-0.4.9-136.el7_9.i686.rpm</filename><sum type="sha256">16b497a2a5748f83372ecd97c9a53caf6a56c5136e039a3ec351c7ac6074fa26</sum></package><package arch="x86_64" name="device-mapper-multipath-sysvinit" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>device-mapper-multipath-sysvinit-0.4.9-136.el7_9.x86_64.rpm</filename><sum type="sha256">125e697568c384f2b0e8b1e81a067b11d599fe7a078c7ac2347729e66a6b21e6</sum></package><package arch="i686" name="device-mapper-multipath-devel" release="136.el7_9" src="device-mapper-multipath-0.4.9-136.el7_9.src.rpm" version="0.4.9"><filename>device-mapper-multipath-devel-0.4.9-136.el7_9.i686.rpm</filename><sum type="sha256">be0f0cbdc39232617d8f56ea6b5c387a8e7a5fdc378e8379553adcca324e81f0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41974" id="CVE-2022-41974" title="Device-Mapper-Multipath: Authorization Bypass, Multipathd Daemon Listens For Client Connections On An Abstract Unix Socket" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7186" id="RHSA-2022:7186-1" title="Rhsa-2022:7186-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133988" id="2133988" title="Device-Mapper-Multipath: Authorization Bypass, Multipathd Daemon Listens For Client Connections On An Abstract Unix Socket" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7337-1</id><title>Kernel</title><description>Security Fix(es): 
* a use-after-free in cls_route filter implementation may lead to privilege  escalation (CVE-2022-2588) 
* RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-23816, CVE-2022-29900) 
* Branch Type Confusion (non-retbleed) (CVE-2022-23825) 
* Intel: Post-barrier Return Stack Buffer Predictions (CVE-2022-26373) 
* Intel: RetBleed Arbitrary Speculative Code Execution with Return Instructions (CVE-2022-29901) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* lpfc panics in lpfc_els_free_iocb() during port recovery 
* mlx5 reports error messages during shutdown then panic with mce 
* Kernel panic due to hard lockup caused by deadlock between tasklist_lock and k_itimer-&gt;it_lock 
* fix excess double put in nfs_prime_dcache</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-11-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-debug-devel" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">371b608b0e17311b77cbb5c189256e34e26616d68e63c2377d3cf2fff2738f6c</sum></package><package arch="noarch" name="kernel-doc" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.80.1.el7.noarch.rpm</filename><sum type="sha256">8ebb2c2be13c520a0bc08dd36c7d3f6986cb16e3999e3ef5e1a0405227ebaf19</sum></package><package arch="x86_64" name="perf" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">a45033d911a9951c719cbe1aff04fcf2216b4196f99c28010beb30b26f3366cb</sum></package><package arch="x86_64" name="kernel-tools" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">2d77fae8e1d3117d2bd2d48cbc79b5c3dcbf58c48a6f8b9be6a2681eee9d2806</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">4a71676849293f3c9f03b00e00d398df59415f2b4b2b146f74ae8f5583d347ef</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">aac2543f8b404cc85519fca1c32a189b44db191d78a4d19345e5b2963c531436</sum></package><package arch="x86_64" name="python-perf" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">059abb1c94a1beb4ff872ca8ea2dc9faf621c414a90dcfedfa5922eabf27bebe</sum></package><package arch="x86_64" name="kernel-devel" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">ddbdb5dffbf590e495a3f442dac24a81a3cc0ae681eb42fe5853a68d2ea2b6b0</sum></package><package arch="x86_64" name="kernel-debug" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">dccc8cb1637b56a31daafec03d0f5618c74aa0c35c407136d3c447b661adf7fc</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.80.1.el7.noarch.rpm</filename><sum type="sha256">0f478084fd9a6ac71bdfe4f6a6d68c360817fe8b8875cfc733e46165b5230a67</sum></package><package arch="x86_64" name="kernel" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">334bf15c70cbd6233c3b86e566248a9996c9e25a541f91113f6bc278a09ccf45</sum></package><package arch="x86_64" name="kernel-headers" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">e1b1fb5a43dba7bdcc17a379221e8dfe0084b0a62bf19934dd34a293e0cd6565</sum></package><package arch="x86_64" name="bpftool" release="1160.80.1.el7" src="kernel-3.10.0-1160.80.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.80.1.el7.x86_64.rpm</filename><sum type="sha256">5b1549f366029a1777a0a1672a63ecb1070ceef48b309f5f3315442f9c000764</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23816" id="CVE-2022-23816" title="Hw: Cpu: Amd: Retbleed Arbitrary Speculative Code Execution With Return Instructions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23825" id="CVE-2022-23825" title="Hw: Cpu: Amd: Branch Type Confusion (Non-Retbleed)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2588" id="CVE-2022-2588" title="Kernel: A Use-After-Free In Cls_Route Filter Implementation May Lead To Privilege Escalation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26373" id="CVE-2022-26373" title="Hw: Cpu: Intel: Post-Barrier Return Stack Buffer Predictions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29900" id="CVE-2022-29900" title="Hw: Cpu: Amd: Retbleed Arbitrary Speculative Code Execution With Return Instructions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29901" id="CVE-2022-29901" title="Hw: Cpu: Intel: Retbleed Arbitrary Speculative Code Execution With Return Instructions" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7337" id="RHSA-2022:7337-1" title="Rhsa-2022:7337-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2090226" id="2090226" title="Hw: Cpu: Amd: Retbleed Arbitrary Speculative Code Execution With Return Instructions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2103148" id="2103148" title="Hw: Cpu: Intel: Retbleed Arbitrary Speculative Code Execution With Return Instructions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2103153" id="2103153" title="Hw: Cpu: Amd: Branch Type Confusion (Non-Retbleed)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2114849" id="2114849" title="Kernel: A Use-After-Free In Cls_Route Filter Implementation May Lead To Privilege Escalation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2115065" id="2115065" title="Hw: Cpu: Intel: Post-Barrier Return Stack Buffer Predictions" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7340-1</id><title>Php-Pear</title><description>Security Fix(es): 
* Archive_Tar: allows an unserialization attack because phar: is blocked but PHAR: is not blocked (CVE-2020-28948) 
* Archive_Tar: improper filename sanitization leads to file overwrites (CVE-2020-28949) 
* Archive_Tar: directory traversal due to inadequate checking of symbolic links (CVE-2020-36193) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2022-11-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="php-pear" release="23.el7_9" src="php-pear-1.9.4-23.el7_9.src.rpm" version="1.9.4"><filename>php-pear-1.9.4-23.el7_9.noarch.rpm</filename><sum type="sha256">03d25f58bd03ae554728125a505e13150c6f9bc8eae411c41dc195bb34099c22</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28948" id="CVE-2020-28948" title="Archive_Tar: Allows An Unserialization Attack Because Phar: Is Blocked But Phar: Is Not Blocked" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28949" id="CVE-2020-28949" title="Archive_Tar: Improper Filename Sanitization Leads To File Overwrites" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36193" id="CVE-2020-36193" title="Archive_Tar: Directory Traversal Due To Inadequate Checking Of Symbolic Links" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7340" id="RHSA-2022:7340-1" title="Rhsa-2022:7340-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1904001" id="1904001" title="Archive_Tar: Allows An Unserialization Attack Because Phar: Is Blocked But Phar: Is Not Blocked" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1910323" id="1910323" title="Archive_Tar: Improper Filename Sanitization Leads To File Overwrites" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1942961" id="1942961" title="Archive_Tar: Directory Traversal Due To Inadequate Checking Of Symbolic Links" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:7343</id><title>Important: Pcs Security Update</title><description>The pcs packages provide a command-line configuration system for the Pacemaker and Corosync utilities.
Security Fix(es):
* rubygem-rack: crafted requests can cause shell escape sequences (CVE-2022-30123) * jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection (CVE-2019-11358)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2022-11-03 08:02:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pcs-snmp" release="3.sl7_9.3" src="pcs-0.9.169-3.sl7_9.3.src.rpm" version="0.9.169"><filename>pcs-snmp-0.9.169-3.sl7_9.3.x86_64.rpm</filename><sum type="sha256">390b97770cab2e1374c50ec3619000ebb7872e23a8419e960c92041cfff00a83</sum></package><package arch="x86_64" name="pcs" release="3.sl7_9.3" src="pcs-0.9.169-3.sl7_9.3.src.rpm" version="0.9.169"><filename>pcs-0.9.169-3.sl7_9.3.x86_64.rpm</filename><sum type="sha256">f8d9e60d0aa9c4ead385ae3725133bd8e1593e67285fa304ad0fc02bc6e3ef31</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358" id="CVE-2019-11358" title="Cve-2019-11358" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023" id="CVE-2020-11023" title="Cve-2020-11023" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30123" id="CVE-2022-30123" title="Cve-2022-30123" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:7343" id="RHSA-2022:7343" title="Important: Pcs Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:8491-1</id><title>Xorg-X11-Server</title><description>Security Fix(es): 
* xorg-x11-server: buffer overflow in _GetCountedString() in xkb/xkb.c (CVE-2022-3550) 
* xorg-x11-server: memory leak in ProcXkbGetKbdByName() in xkb/xkb.c (CVE-2022-3551) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-11-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-devel" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-19.el7_9.x86_64.rpm</filename><sum type="sha256">3e3432461e7d3bc68549c1872fde8eac9e22004155b343f0d5e98e0a96a6debd</sum></package><package arch="i686" name="xorg-x11-server-devel" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-19.el7_9.i686.rpm</filename><sum type="sha256">0fd6387e097cf045b57e24a56d2da4afee38e756dc8ed403e95263f6356547e0</sum></package><package arch="noarch" name="xorg-x11-server-source" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-19.el7_9.noarch.rpm</filename><sum type="sha256">9023b819fdd94631d36f8be6c4c146489ca13e1134cb7e713d0846a2190816f6</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-19.el7_9.x86_64.rpm</filename><sum type="sha256">24376753e027a21ae6fa8e7b389c76538157ed9e06b64e44fc9b89a99fc6c10b</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-19.el7_9.x86_64.rpm</filename><sum type="sha256">5618774205f6014628aeee0dcf61781f52a0f265211147dffb51967c92942fdc</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-19.el7_9.x86_64.rpm</filename><sum type="sha256">9ceb862a8744affd6ac8c2d38d756324460ad2cfe084621de13c075aad9590e2</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-19.el7_9.x86_64.rpm</filename><sum type="sha256">d0fcf4663345dc9465ef599962e37c0682546d1e76426a1e946245c0910ab558</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-19.el7_9.x86_64.rpm</filename><sum type="sha256">0e1d8fbdd9864e1c01862fa15e6d601e0b230ee758da7838f905cf728054aed5</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-19.el7_9.x86_64.rpm</filename><sum type="sha256">aef148d20647d6392ce3a307b6305368d22ba19d28efb86fe15f1a90f02466a6</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="19.el7_9" src="xorg-x11-server-1.20.4-19.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-19.el7_9.x86_64.rpm</filename><sum type="sha256">3472ac91cc88a2b629fb6dc03cee388c9e0d7bb8d3e476526b7074480d663b2b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3550" id="CVE-2022-3550" title="Xorg-X11-Server: Buffer Overflow In _Getcountedstring() In Xkb/Xkb.C" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3551" id="CVE-2022-3551" title="Xorg-X11-Server: Memory Leak In Procxkbgetkbdbyname() In Xkb/Xkb.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:8491" id="RHSA-2022:8491-1" title="Rhsa-2022:8491-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2140698" id="2140698" title="Xorg-X11-Server: Buffer Overflow In _Getcountedstring() In Xkb/Xkb.C" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2140701" id="2140701" title="Xorg-X11-Server: Memory Leak In Procxkbgetkbdbyname() In Xkb/Xkb.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:8552-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.5.0 ESR. 
Security Fix(es): 
* Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) 
* Mozilla: Fullscreen notification bypass (CVE-2022-45404) 
* Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) 
* Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) 
* Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) 
* Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) 
* Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) 
* Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) 
* Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) 
* Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) 
* Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) 
* Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) 
* Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-11-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-102.5.0-1.el7_9.src.rpm" version="102.5.0"><filename>firefox-102.5.0-1.el7_9.i686.rpm</filename><sum type="sha256">fbfdecd9b75c9285060bf545f775eec9d54c680f703ee44634b2d6892b5b62c6</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-102.5.0-1.el7_9.src.rpm" version="102.5.0"><filename>firefox-102.5.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">d9246fd451ec95c47e1faae3b828827c1a897d3a0447c57b2a79e744347c42d4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403" id="CVE-2022-45403" title="Mozilla: Service Workers Might Have Learned Size Of Cross-Origin Media Files" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404" id="CVE-2022-45404" title="Mozilla: Fullscreen Notification Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405" id="CVE-2022-45405" title="Mozilla: Use-After-Free In Inputstream Implementation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406" id="CVE-2022-45406" title="Mozilla: Use-After-Free Of A Javascript Realm" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408" id="CVE-2022-45408" title="Mozilla: Fullscreen Notification Bypass Via Windowname" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409" id="CVE-2022-45409" title="Mozilla: Use-After-Free In Garbage Collection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410" id="CVE-2022-45410" title="Mozilla: Serviceworker-Intercepted Requests Bypassed Samesite Cookie Policy" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411" id="CVE-2022-45411" title="Mozilla: Cross-Site Tracing Was Possible Via Non-Standard Override Headers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412" id="CVE-2022-45412" title="Mozilla: Symlinks May Resolve To Partially Uninitialized Buffers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416" id="CVE-2022-45416" title="Mozilla: Keystroke Side-Channel Leakage" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418" id="CVE-2022-45418" title="Mozilla: Custom Mouse Cursor Could Have Been Drawn Over Browser Ui" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420" id="CVE-2022-45420" title="Mozilla: Iframe Contents Could Be Rendered Outside The Iframe" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421" id="CVE-2022-45421" title="Mozilla: Memory Safety Bugs Fixed In Firefox 107 And Firefox Esr 102.5" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:8552" id="RHSA-2022:8552-1" title="Rhsa-2022:8552-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143197" id="2143197" title="Mozilla: Service Workers Might Have Learned Size Of Cross-Origin Media Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143198" id="2143198" title="Mozilla: Fullscreen Notification Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143199" id="2143199" title="Mozilla: Use-After-Free In Inputstream Implementation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143200" id="2143200" title="Mozilla: Use-After-Free Of A Javascript Realm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143201" id="2143201" title="Mozilla: Fullscreen Notification Bypass Via Windowname" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143202" id="2143202" title="Mozilla: Use-After-Free In Garbage Collection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143203" id="2143203" title="Mozilla: Serviceworker-Intercepted Requests Bypassed Samesite Cookie Policy" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143204" id="2143204" title="Mozilla: Cross-Site Tracing Was Possible Via Non-Standard Override Headers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143205" id="2143205" title="Mozilla: Symlinks May Resolve To Partially Uninitialized Buffers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143240" id="2143240" title="Mozilla: Keystroke Side-Channel Leakage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143241" id="2143241" title="Mozilla: Custom Mouse Cursor Could Have Been Drawn Over Browser Ui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143242" id="2143242" title="Mozilla: Iframe Contents Could Be Rendered Outside The Iframe" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143243" id="2143243" title="Mozilla: Memory Safety Bugs Fixed In Firefox 107 And Firefox Esr 102.5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:8555-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.5.0. 
Security Fix(es): 
* Mozilla: Service Workers might have learned size of cross-origin media files (CVE-2022-45403) 
* Mozilla: Fullscreen notification bypass (CVE-2022-45404) 
* Mozilla: Use-after-free in InputStream implementation (CVE-2022-45405) 
* Mozilla: Use-after-free of a JavaScript Realm (CVE-2022-45406) 
* Mozilla: Fullscreen notification bypass via windowName (CVE-2022-45408) 
* Mozilla: Use-after-free in Garbage Collection (CVE-2022-45409) 
* Mozilla: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5 (CVE-2022-45421) 
* Mozilla: ServiceWorker-intercepted requests bypassed SameSite cookie policy (CVE-2022-45410) 
* Mozilla: Cross-Site Tracing was possible via non-standard override headers (CVE-2022-45411) 
* Mozilla: Symlinks may resolve to partially uninitialized buffers (CVE-2022-45412) 
* Mozilla: Keystroke Side-Channel Leakage (CVE-2022-45416) 
* Mozilla: Custom mouse cursor could have been drawn over browser UI (CVE-2022-45418) 
* Mozilla: Iframe contents could be rendered outside the iframe (CVE-2022-45420) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-11-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-102.5.0-2.el7_9.src.rpm" version="102.5.0"><filename>thunderbird-102.5.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">aa6b87752deb674efc6faf9d021e36523a29be598aba27f9627d9118f480c8aa</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45403" id="CVE-2022-45403" title="Mozilla: Service Workers Might Have Learned Size Of Cross-Origin Media Files" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45404" id="CVE-2022-45404" title="Mozilla: Fullscreen Notification Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45405" id="CVE-2022-45405" title="Mozilla: Use-After-Free In Inputstream Implementation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45406" id="CVE-2022-45406" title="Mozilla: Use-After-Free Of A Javascript Realm" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45408" id="CVE-2022-45408" title="Mozilla: Fullscreen Notification Bypass Via Windowname" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45409" id="CVE-2022-45409" title="Mozilla: Use-After-Free In Garbage Collection" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45410" id="CVE-2022-45410" title="Mozilla: Serviceworker-Intercepted Requests Bypassed Samesite Cookie Policy" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45411" id="CVE-2022-45411" title="Mozilla: Cross-Site Tracing Was Possible Via Non-Standard Override Headers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45412" id="CVE-2022-45412" title="Mozilla: Symlinks May Resolve To Partially Uninitialized Buffers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45416" id="CVE-2022-45416" title="Mozilla: Keystroke Side-Channel Leakage" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45418" id="CVE-2022-45418" title="Mozilla: Custom Mouse Cursor Could Have Been Drawn Over Browser Ui" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45420" id="CVE-2022-45420" title="Mozilla: Iframe Contents Could Be Rendered Outside The Iframe" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45421" id="CVE-2022-45421" title="Mozilla: Memory Safety Bugs Fixed In Firefox 107 And Firefox Esr 102.5" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:8555" id="RHSA-2022:8555-1" title="Rhsa-2022:8555-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143197" id="2143197" title="Mozilla: Service Workers Might Have Learned Size Of Cross-Origin Media Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143198" id="2143198" title="Mozilla: Fullscreen Notification Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143199" id="2143199" title="Mozilla: Use-After-Free In Inputstream Implementation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143200" id="2143200" title="Mozilla: Use-After-Free Of A Javascript Realm" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143201" id="2143201" title="Mozilla: Fullscreen Notification Bypass Via Windowname" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143202" id="2143202" title="Mozilla: Use-After-Free In Garbage Collection" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143203" id="2143203" title="Mozilla: Serviceworker-Intercepted Requests Bypassed Samesite Cookie Policy" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143204" id="2143204" title="Mozilla: Cross-Site Tracing Was Possible Via Non-Standard Override Headers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143205" id="2143205" title="Mozilla: Symlinks May Resolve To Partially Uninitialized Buffers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143240" id="2143240" title="Mozilla: Keystroke Side-Channel Leakage" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143241" id="2143241" title="Mozilla: Custom Mouse Cursor Could Have Been Drawn Over Browser Ui" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143242" id="2143242" title="Mozilla: Iframe Contents Could Be Rendered Outside The Iframe" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2143243" id="2143243" title="Mozilla: Memory Safety Bugs Fixed In Firefox 107 And Firefox Esr 102.5" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:8560-1</id><title>Hsqldb</title><description>Security Fix(es): 
* hsqldb: Untrusted input may lead to RCE attack (CVE-2022-41853) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-11-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="hsqldb-demo" release="15.el7_9" src="hsqldb-1.8.1.3-15.el7_9.src.rpm" version="1.8.1.3"><filename>hsqldb-demo-1.8.1.3-15.el7_9.noarch.rpm</filename><sum type="sha256">52afec8b8d834a50847f845c3d07024d94af6ecde1019872ddfd1b8f7ae27ca6</sum></package><package arch="noarch" epoch="1" name="hsqldb" release="15.el7_9" src="hsqldb-1.8.1.3-15.el7_9.src.rpm" version="1.8.1.3"><filename>hsqldb-1.8.1.3-15.el7_9.noarch.rpm</filename><sum type="sha256">227ca9d80bccfb61a5790605ed02ff16da540572df48e3705884964262444a56</sum></package><package arch="noarch" epoch="1" name="hsqldb-javadoc" release="15.el7_9" src="hsqldb-1.8.1.3-15.el7_9.src.rpm" version="1.8.1.3"><filename>hsqldb-javadoc-1.8.1.3-15.el7_9.noarch.rpm</filename><sum type="sha256">a27b384f2e00296902b1a0fc4191f3ba7316a3fafd968e944e37f19a4d7151f6</sum></package><package arch="noarch" epoch="1" name="hsqldb-manual" release="15.el7_9" src="hsqldb-1.8.1.3-15.el7_9.src.rpm" version="1.8.1.3"><filename>hsqldb-manual-1.8.1.3-15.el7_9.noarch.rpm</filename><sum type="sha256">d37aa571bfe6d88ad8c91d832ce9b4681a923db382482dd0c616e245e37ed2c2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41853" id="CVE-2022-41853" title="Hsqldb: Untrusted Input May Lead To Rce Attack" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:8560" id="RHSA-2022:8560-1" title="Rhsa-2022:8560-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2136141" id="2136141" title="Hsqldb: Untrusted Input May Lead To Rce Attack" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:8640-1</id><title>Krb5</title><description>Security Fix(es): 
* krb5: integer overflow vulnerabilities in PAC parsing (CVE-2022-42898) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-11-29 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="krb5-workstation" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>krb5-workstation-1.15.1-55.el7_9.x86_64.rpm</filename><sum type="sha256">632e08ca81c5804305ea37d3a31eb3043c022e5f3f5477ad7dfd0fa39ee52e83</sum></package><package arch="i686" name="libkadm5" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>libkadm5-1.15.1-55.el7_9.i686.rpm</filename><sum type="sha256">88bb67fe414e2b7cb835e8232d313bf8ca0a6cfeb75b7e572f7752d8edec8c64</sum></package><package arch="x86_64" name="krb5-server-ldap" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>krb5-server-ldap-1.15.1-55.el7_9.x86_64.rpm</filename><sum type="sha256">fdd36b73b8525fafedd6d7583da11d48fed0c3152cb1f6781efc425b05152380</sum></package><package arch="x86_64" name="krb5-devel" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>krb5-devel-1.15.1-55.el7_9.x86_64.rpm</filename><sum type="sha256">7c2e5c8e65ee6cc4042785a0ed36f99435254246f07260981f47b848921e61f2</sum></package><package arch="x86_64" name="krb5-server" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>krb5-server-1.15.1-55.el7_9.x86_64.rpm</filename><sum type="sha256">5c22318fd10f1e807a87454ab210b4f1c3e5681fb931becfd7a866a37476808a</sum></package><package arch="i686" name="krb5-devel" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>krb5-devel-1.15.1-55.el7_9.i686.rpm</filename><sum type="sha256">0a98cd60d216e78afb2bfd8c25bf46c2aeeaa1b4412b3000c702a8c4db02bf32</sum></package><package arch="x86_64" name="krb5-pkinit" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>krb5-pkinit-1.15.1-55.el7_9.x86_64.rpm</filename><sum type="sha256">67b71dd1972f73c992e99e75c2204ca00ebc4d6979e0f833c9c14125ff4b7229</sum></package><package arch="x86_64" name="krb5-libs" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>krb5-libs-1.15.1-55.el7_9.x86_64.rpm</filename><sum type="sha256">94051fb415c683c99563089edd3efdc1c89803c3a5dd6a5d552d6fc0e302e3f7</sum></package><package arch="x86_64" name="libkadm5" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>libkadm5-1.15.1-55.el7_9.x86_64.rpm</filename><sum type="sha256">09c4105398d0ebfda101c5733482baba1a78c10c09214d066630e4b93b368142</sum></package><package arch="i686" name="krb5-libs" release="55.el7_9" src="krb5-1.15.1-55.el7_9.src.rpm" version="1.15.1"><filename>krb5-libs-1.15.1-55.el7_9.i686.rpm</filename><sum type="sha256">1f711a5526449ed91253280ae45242d477b1abc458cc6d2cbac38ad0ae33cf20</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898" id="CVE-2022-42898" title="Krb5: Integer Overflow Vulnerabilities In Pac Parsing" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:8640" id="RHSA-2022:8640-1" title="Rhsa-2022:8640-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2140960" id="2140960" title="Krb5: Integer Overflow Vulnerabilities In Pac Parsing" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:8799-1</id><title>Pki-Core</title><description>Security Fix(es): 
* pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-12-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pki-symkey" release="24.el7_9" src="pki-core-10.5.18-24.el7_9.src.rpm" version="10.5.18"><filename>pki-symkey-10.5.18-24.el7_9.x86_64.rpm</filename><sum type="sha256">3763d3b06fa5adf88b1d856ec6e4df9ca072e85bb4c81802e242f92a276ff808</sum></package><package arch="noarch" name="pki-base-java" release="24.el7_9" src="pki-core-10.5.18-24.el7_9.src.rpm" version="10.5.18"><filename>pki-base-java-10.5.18-24.el7_9.noarch.rpm</filename><sum type="sha256">dec3a16ca4abc10365d37dd7f5b56d884f68dbd6daf866b94879a8791d0a7e07</sum></package><package arch="x86_64" name="pki-tools" release="24.el7_9" src="pki-core-10.5.18-24.el7_9.src.rpm" version="10.5.18"><filename>pki-tools-10.5.18-24.el7_9.x86_64.rpm</filename><sum type="sha256">0ab55652836140beb57a6c63f61647209cab3de7150476eb35cc8dadbb914db0</sum></package><package arch="noarch" name="pki-base" release="24.el7_9" src="pki-core-10.5.18-24.el7_9.src.rpm" version="10.5.18"><filename>pki-base-10.5.18-24.el7_9.noarch.rpm</filename><sum type="sha256">18901f2122cb5943d0653f02b4c62053e7f560ed6ea4b756c5423076d84d3234</sum></package><package arch="noarch" name="pki-server" release="24.el7_9" src="pki-core-10.5.18-24.el7_9.src.rpm" version="10.5.18"><filename>pki-server-10.5.18-24.el7_9.noarch.rpm</filename><sum type="sha256">56e94336222080a7ff07384101ee0283b3bd10c37c4f2a80c0829109bdad74ba</sum></package><package arch="noarch" name="pki-kra" release="24.el7_9" src="pki-core-10.5.18-24.el7_9.src.rpm" version="10.5.18"><filename>pki-kra-10.5.18-24.el7_9.noarch.rpm</filename><sum type="sha256">f9f6a70b5fce40e571b34548f86c5a4c3396d08b883a8cc489278f380a075b20</sum></package><package arch="noarch" name="pki-ca" release="24.el7_9" src="pki-core-10.5.18-24.el7_9.src.rpm" version="10.5.18"><filename>pki-ca-10.5.18-24.el7_9.noarch.rpm</filename><sum type="sha256">2e0f47fdb4abae43cd3dfed8b80839aa1d2a766c0251406381fe380f81392d07</sum></package><package arch="noarch" name="pki-javadoc" release="24.el7_9" src="pki-core-10.5.18-24.el7_9.src.rpm" version="10.5.18"><filename>pki-javadoc-10.5.18-24.el7_9.noarch.rpm</filename><sum type="sha256">e5f1fc8f795dc8659b0e65e19d84f650ff31d2784ff1fe8a16f794d5ec3b3847</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2414" id="CVE-2022-2414" title="Pki-Core: Access To External Entities When Parsing Xml Can Lead To Xxe" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:8799" id="RHSA-2022:8799-1" title="Rhsa-2022:8799-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2104676" id="2104676" title="Pki-Core: Access To External Entities When Parsing Xml Can Lead To Xxe" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:8900-1</id><title>Grub2</title><description>Security Fix(es): 
* grub2: Integer underflow in grub_net_recv_ip4_packets (CVE-2022-28733) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-12-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="grub2-efi-x64" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-efi-x64-2.02-0.87.sl7_9.11.x86_64.rpm</filename><sum type="sha256">99f13a06930fd8354a1ce96c33a6259dc91161f7b09891410980dc420ccabe97</sum></package><package arch="x86_64" epoch="1" name="grub2" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-2.02-0.87.sl7_9.11.x86_64.rpm</filename><sum type="sha256">c2dcf0ed508fe4acc3f214e50869ff48cf0886c74714a2577e2b67d762855fc2</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32-cdboot" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-efi-ia32-cdboot-2.02-0.87.sl7_9.11.x86_64.rpm</filename><sum type="sha256">5918876ca7da16670b153194d5a341cb7761ae6492372e7072ddbdcbaa42b5a8</sum></package><package arch="x86_64" epoch="1" name="grub2-tools" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-tools-2.02-0.87.sl7_9.11.x86_64.rpm</filename><sum type="sha256">f30b3c3195f950bd75b2d21900762fcea27dab83ae1e850266e2850f25457554</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64-cdboot" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-efi-x64-cdboot-2.02-0.87.sl7_9.11.x86_64.rpm</filename><sum type="sha256">4cd257f520e9638b7cb458d48fd0d283e107960078011156a3a8f36c9974390f</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-minimal" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-tools-minimal-2.02-0.87.sl7_9.11.x86_64.rpm</filename><sum type="sha256">9c6b61af8090eac77335eb6d8ba3ad60833940748bdf74b499bb951f9894f65a</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-extra" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-tools-extra-2.02-0.87.sl7_9.11.x86_64.rpm</filename><sum type="sha256">71306d978b90994b31c82c9d7f9b4af1f9ebbe05b1359243d83f10b9ee71c6cf</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-efi-ia32-2.02-0.87.sl7_9.11.x86_64.rpm</filename><sum type="sha256">4ab89cd7a4d82eb2be1409e571f0e0f0f84c29a5a46305d549fcdac72816dbe2</sum></package><package arch="x86_64" epoch="1" name="grub2-pc" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-pc-2.02-0.87.sl7_9.11.x86_64.rpm</filename><sum type="sha256">ae59cc1a85e6dbfbef53c30ebefb1e2fbc1ecf5ea64dd5e219acdadc8d54d936</sum></package><package arch="noarch" epoch="1" name="grub2-common" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-common-2.02-0.87.sl7_9.11.noarch.rpm</filename><sum type="sha256">be8001b8070d239f5aa659ba3935f0f12f041c36098d269c6d3d646e3d909995</sum></package><package arch="noarch" epoch="1" name="grub2-efi-ia32-modules" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-efi-ia32-modules-2.02-0.87.sl7_9.11.noarch.rpm</filename><sum type="sha256">dde4f7b829f72d95ab2c64758b3984d14e513648d5e16960635f19b9dc224db0</sum></package><package arch="noarch" epoch="1" name="grub2-pc-modules" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-pc-modules-2.02-0.87.sl7_9.11.noarch.rpm</filename><sum type="sha256">d7305826250898110bd4c2b6011ec147aa73f2c34cb7264f62528928a896b020</sum></package><package arch="noarch" epoch="1" name="grub2-efi-x64-modules" release="0.87.sl7_9.11" src="grub2-2.02-0.87.sl7_9.11.src.rpm" version="2.02"><filename>grub2-efi-x64-modules-2.02-0.87.sl7_9.11.noarch.rpm</filename><sum type="sha256">797f457079572c3ba99445cb9db9c3650c7144d48d2f65ded3f11256a3524432</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28733" id="CVE-2022-28733" title="Grub2: Integer Underflow In Grub_Net_Recv_Ip4_Packets" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:8900" id="RHSA-2022:8900-1" title="Rhsa-2022:8900-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2083339" id="2083339" title="Grub2: Integer Underflow In Grub_Net_Recv_Ip4_Packets" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:8958-1</id><title>Bcel</title><description>Security Fix(es): 
* Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing (CVE-2022-42920) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-12-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="bcel" release="19.el7_9" src="bcel-5.2-19.el7_9.src.rpm" version="5.2"><filename>bcel-5.2-19.el7_9.noarch.rpm</filename><sum type="sha256">e0cca685fe9940435681041174b6a4030eb581bc4e5308f7b587e3d4d1a0beff</sum></package><package arch="noarch" name="bcel-javadoc" release="19.el7_9" src="bcel-5.2-19.el7_9.src.rpm" version="5.2"><filename>bcel-javadoc-5.2-19.el7_9.noarch.rpm</filename><sum type="sha256">7a618a7aa2a41af5da430d391a804277066289904fbe29cd4ea8fd0354b7774f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42920" id="CVE-2022-42920" title="Apache-Commons-Bcel: Arbitrary Bytecode Produced Via Out-Of-Bounds Writing" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:8958" id="RHSA-2022:8958-1" title="Rhsa-2022:8958-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2142707" id="2142707" title="Apache-Commons-Bcel: Arbitrary Bytecode Produced Via Out-Of-Bounds Writing" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:9072-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.6.0 ESR. 
Security Fix(es): 
* Mozilla: Arbitrary file read from a compromised content process (CVE-2022-46872) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 (CVE-2022-46878) 
* Mozilla: Use-after-free in WebGL (CVE-2022-46880) 
* Mozilla: Memory corruption in WebGL (CVE-2022-46881) 
* Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions (CVE-2022-46874) 
* Mozilla: Use-after-free in WebGL (CVE-2022-46882) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-12-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-102.6.0-1.el7_9.src.rpm" version="102.6.0"><filename>firefox-102.6.0-1.el7_9.i686.rpm</filename><sum type="sha256">e520550281c9f7c97655685cc5ab1c53c4a4958a2cba6c34d6294d78b179cbeb</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-102.6.0-1.el7_9.src.rpm" version="102.6.0"><filename>firefox-102.6.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">aa5d2fc2abac7f2b6755b0d75ad9e00a5b88aa7f311c0f4be1cb30c09bf76cc0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872" id="CVE-2022-46872" title="Mozilla: Arbitrary File Read From A Compromised Content Process" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874" id="CVE-2022-46874" title="Mozilla: Drag And Dropped Filenames Could Have Been Truncated To Malicious Extensions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878" id="CVE-2022-46878" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 102.6 And Thunderbird 102.6" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880" id="CVE-2022-46880" title="Mozilla: Use-After-Free In Webgl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881" id="CVE-2022-46881" title="Mozilla: Memory Corruption In Webgl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882" id="CVE-2022-46882" title="Mozilla: Use-After-Free In Webgl" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:9072" id="RHSA-2022:9072-1" title="Rhsa-2022:9072-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153441" id="2153441" title="Mozilla: Arbitrary File Read From A Compromised Content Process" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153449" id="2153449" title="Mozilla: Drag And Dropped Filenames Could Have Been Truncated To Malicious Extensions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153454" id="2153454" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 102.6 And Thunderbird 102.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153463" id="2153463" title="Mozilla: Use-After-Free In Webgl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153466" id="2153466" title="Mozilla: Memory Corruption In Webgl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153467" id="2153467" title="Mozilla: Use-After-Free In Webgl" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2022:9079-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.6.0. 
Security Fix(es): 
* Mozilla: Arbitrary file read from a compromised content process (CVE-2022-46872) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 (CVE-2022-46878) 
* Mozilla: Use-after-free in WebGL (CVE-2022-46880) 
* Mozilla: Memory corruption in WebGL (CVE-2022-46881) 
* Mozilla: Quoting from an HTML email with certain tags will trigger network requests and load remote content, regardless of a configuration to block remote content (CVE-2022-45414) 
* Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions (CVE-2022-46874) 
* Mozilla: Use-after-free in WebGL (CVE-2022-46882) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2022-12-16 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-102.6.0-2.el7_9.src.rpm" version="102.6.0"><filename>thunderbird-102.6.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">42b9264f75fcbd01966a937d569bd365f98c1c7bf4d83596b2bda5b8f060f137</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-45414" id="CVE-2022-45414" title="Mozilla: Quoting From An Html Email With Certain Tags Will Trigger Network Requests And Load Remote Content, Regardless Of A Configuration To Block Remote Content" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46872" id="CVE-2022-46872" title="Mozilla: Arbitrary File Read From A Compromised Content Process" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46874" id="CVE-2022-46874" title="Mozilla: Drag And Dropped Filenames Could Have Been Truncated To Malicious Extensions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46878" id="CVE-2022-46878" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 102.6 And Thunderbird 102.6" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46880" id="CVE-2022-46880" title="Mozilla: Use-After-Free In Webgl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46881" id="CVE-2022-46881" title="Mozilla: Memory Corruption In Webgl" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46882" id="CVE-2022-46882" title="Mozilla: Use-After-Free In Webgl" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2022:9079" id="RHSA-2022:9079-1" title="Rhsa-2022:9079-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2149868" id="2149868" title="Mozilla: Quoting From An Html Email With Certain Tags Will Trigger Network Requests And Load Remote Content, Regardless Of A Configuration To Block Remote Content" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153441" id="2153441" title="Mozilla: Arbitrary File Read From A Compromised Content Process" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153449" id="2153449" title="Mozilla: Drag And Dropped Filenames Could Have Been Truncated To Malicious Extensions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153454" id="2153454" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 102.6 And Thunderbird 102.6" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153463" id="2153463" title="Mozilla: Use-After-Free In Webgl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153466" id="2153466" title="Mozilla: Memory Corruption In Webgl" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2153467" id="2153467" title="Mozilla: Use-After-Free In Webgl" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0045-1</id><title>Tigervnc</title><description>Security Fix(es): 
* xorg-x11-server: X.Org Server XkbGetKbdByName use-after-free (CVE-2022-4283) 
* xorg-x11-server: X.Org Server XTestSwapFakeInput stack overflow (CVE-2022-46340) 
* xorg-x11-server: X.Org Server XIPassiveUngrab out-of-bounds access (CVE-2022-46341) 
* xorg-x11-server: X.Org Server XvdiSelectVideoNotify use-after-free (CVE-2022-46342) 
* xorg-x11-server: X.Org Server ScreenSaverSetAttributes use-after-free (CVE-2022-46343) 
* xorg-x11-server: X.Org Server XIChangeProperty out-of-bounds access (CVE-2022-46344) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-01-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="tigervnc" release="23.el7_9" src="tigervnc-1.8.0-23.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-1.8.0-23.el7_9.x86_64.rpm</filename><sum type="sha256">dd3017d51e87041cf20c76409022f16c604d3db82fea92764bea0ddf3064c1b1</sum></package><package arch="x86_64" name="tigervnc-server" release="23.el7_9" src="tigervnc-1.8.0-23.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-1.8.0-23.el7_9.x86_64.rpm</filename><sum type="sha256">8ba2077105eacdd811c769c72a7a9834e55b37f61af9aa7a754fe0f5349b81d8</sum></package><package arch="x86_64" name="tigervnc-server-minimal" release="23.el7_9" src="tigervnc-1.8.0-23.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-minimal-1.8.0-23.el7_9.x86_64.rpm</filename><sum type="sha256">1ba07a8cbf1e41a0a31c664a7bcdb64fb1a5c15aaf675dfbee04f9eeadb76ed1</sum></package><package arch="noarch" name="tigervnc-license" release="23.el7_9" src="tigervnc-1.8.0-23.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-license-1.8.0-23.el7_9.noarch.rpm</filename><sum type="sha256">d4918406587f5ee86cb34b02ced600c4cebc2d49094803a34f912ac6eca5f403</sum></package><package arch="noarch" name="tigervnc-server-applet" release="23.el7_9" src="tigervnc-1.8.0-23.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-applet-1.8.0-23.el7_9.noarch.rpm</filename><sum type="sha256">3ce399d5291dfe9f6ea5866ca916bcc44ba1327dffe7d42ff380a8f88cc519f5</sum></package><package arch="x86_64" name="tigervnc-server-module" release="23.el7_9" src="tigervnc-1.8.0-23.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-module-1.8.0-23.el7_9.x86_64.rpm</filename><sum type="sha256">f749036b2eec25233c9739ba858271abbc5c050abba51fb05efa087350fc4b77</sum></package><package arch="noarch" name="tigervnc-icons" release="23.el7_9" src="tigervnc-1.8.0-23.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-icons-1.8.0-23.el7_9.noarch.rpm</filename><sum type="sha256">e06f8c903c7c8f2a55c2d691f7635c0450f53b242cc4ca08b2e927dc07d534c4</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283" id="CVE-2022-4283" title="Xorg-X11-Server: X.Org Server Xkbgetkbdbyname Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340" id="CVE-2022-46340" title="Xorg-X11-Server: X.Org Server Xtestswapfakeinput Stack Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341" id="CVE-2022-46341" title="Xorg-X11-Server: X.Org Server Xipassiveungrab Out-Of-Bounds Access" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342" id="CVE-2022-46342" title="Xorg-X11-Server: X.Org Server Xvdiselectvideonotify Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343" id="CVE-2022-46343" title="Xorg-X11-Server: X.Org Server Screensaversetattributes Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344" id="CVE-2022-46344" title="Xorg-X11-Server: X.Org Server Xichangeproperty Out-Of-Bounds Access" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0045" id="RHSA-2023:0045-1" title="Rhsa-2023:0045-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151755" id="2151755" title="Xorg-X11-Server: X.Org Server Xtestswapfakeinput Stack Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151756" id="2151756" title="Xorg-X11-Server: X.Org Server Xipassiveungrab Out-Of-Bounds Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151757" id="2151757" title="Xorg-X11-Server: X.Org Server Xvdiselectvideonotify Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151758" id="2151758" title="Xorg-X11-Server: X.Org Server Screensaversetattributes Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151760" id="2151760" title="Xorg-X11-Server: X.Org Server Xichangeproperty Out-Of-Bounds Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151761" id="2151761" title="Xorg-X11-Server: X.Org Server Xkbgetkbdbyname Use-After-Free" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0046-1</id><title>Xorg-X11-Server</title><description>Security Fix(es): 
* xorg-x11-server: X.Org Server XkbGetKbdByName use-after-free (CVE-2022-4283) 
* xorg-x11-server: X.Org Server XTestSwapFakeInput stack overflow (CVE-2022-46340) 
* xorg-x11-server: X.Org Server XIPassiveUngrab out-of-bounds access (CVE-2022-46341) 
* xorg-x11-server: X.Org Server XvdiSelectVideoNotify use-after-free (CVE-2022-46342) 
* xorg-x11-server: X.Org Server ScreenSaverSetAttributes use-after-free (CVE-2022-46343) 
* xorg-x11-server: X.Org Server XIChangeProperty out-of-bounds access (CVE-2022-46344) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-01-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-common" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-21.el7_9.x86_64.rpm</filename><sum type="sha256">79d53e5d5cb651278f2afcb1294f9b7f02c9247a3adaca45560400fc0b570f88</sum></package><package arch="i686" name="xorg-x11-server-devel" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-21.el7_9.i686.rpm</filename><sum type="sha256">b225aa56a8ca3c634abadd18923c8556e372e00b4f2048ef8e8d024f00048859</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-21.el7_9.x86_64.rpm</filename><sum type="sha256">3b2ce032e3823928c8c7b39a8f3485b7f98ff75c1d93d5522b13f387742cbcc1</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-21.el7_9.x86_64.rpm</filename><sum type="sha256">b2b56bdddd55759d19fe1cda40eef9a558d83177e52e4d4febb2674bd11183c4</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-21.el7_9.x86_64.rpm</filename><sum type="sha256">d55a20b8c13216c9b26bbf8bfa3968a8ec696e167a952acd479fc8c88a25a143</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-21.el7_9.x86_64.rpm</filename><sum type="sha256">31d5dcfa4b14c22d9148fc0343746d4e468c267bbc21e3beb4b573c099e60c48</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-21.el7_9.x86_64.rpm</filename><sum type="sha256">579384683f9a00c1f779d2d356627975bbffb7fb22b45183c7cd129615eeccd5</sum></package><package arch="noarch" name="xorg-x11-server-source" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-21.el7_9.noarch.rpm</filename><sum type="sha256">51c813defbae680877830c3caba839f053ef6b7004088f7358c28d288113e7c5</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-21.el7_9.x86_64.rpm</filename><sum type="sha256">a47e375d2cf9f34c2ccc30d20c6f94d619c492ccc51715729c75b314e3f58d67</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="21.el7_9" src="xorg-x11-server-1.20.4-21.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-21.el7_9.x86_64.rpm</filename><sum type="sha256">18862f831a03ed2aefa268c9c5bbdce8b7b977d0010a4d6a2f547d37b1c2e861</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4283" id="CVE-2022-4283" title="Xorg-X11-Server: X.Org Server Xkbgetkbdbyname Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46340" id="CVE-2022-46340" title="Xorg-X11-Server: X.Org Server Xtestswapfakeinput Stack Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46341" id="CVE-2022-46341" title="Xorg-X11-Server: X.Org Server Xipassiveungrab Out-Of-Bounds Access" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46342" id="CVE-2022-46342" title="Xorg-X11-Server: X.Org Server Xvdiselectvideonotify Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46343" id="CVE-2022-46343" title="Xorg-X11-Server: X.Org Server Screensaversetattributes Use-After-Free" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46344" id="CVE-2022-46344" title="Xorg-X11-Server: X.Org Server Xichangeproperty Out-Of-Bounds Access" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0046" id="RHSA-2023:0046-1" title="Rhsa-2023:0046-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151755" id="2151755" title="Xorg-X11-Server: X.Org Server Xtestswapfakeinput Stack Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151756" id="2151756" title="Xorg-X11-Server: X.Org Server Xipassiveungrab Out-Of-Bounds Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151757" id="2151757" title="Xorg-X11-Server: X.Org Server Xvdiselectvideonotify Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151758" id="2151758" title="Xorg-X11-Server: X.Org Server Screensaversetattributes Use-After-Free" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151760" id="2151760" title="Xorg-X11-Server: X.Org Server Xichangeproperty Out-Of-Bounds Access" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151761" id="2151761" title="Xorg-X11-Server: X.Org Server Xkbgetkbdbyname Use-After-Free" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0195</id><title>Moderate: Java-11-Openjdk Security And Bug Fix Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18) (BZ#2150192)
</description><severity>moderate</severity><issued date="2023-01-23 09:39:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-javadoc-zip-debug-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">4fcccdefc071d921599a1e7c4bc3a4f5fa074bef39e0504866e93dc5f91f2531</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-demo-debug-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">5721c7753a72eac303fe3255b37283d95fcd94c7376c2d4ebbeeedff3a096af1</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-javadoc-zip-debug-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">51b99f58322d567cddd042efbc869f373b52e933383e45a66c97ae8cc45e1f63</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-headless-debug-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">6a258f5f2f99e2e656619c7f5f3b6b7f2023b8f901c0a0334873b94fdc941b29</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-src-debug-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">8ad97a2c2b6319d5cc2fcb597087eaa62c042f2225f2217708cab3fa727c7744</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-javadoc-debug-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">7bceae79f301a98f2b175728c26b4dc0ddd2049e5aba176fe774f0afd219a1ae</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-javadoc-debug-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">42e0fc8733f5c586bb78b49b5a2de5bd09258b51af47a92b6e8712bf03ba76d1</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-demo-debug-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">52fe117f3dc1637a5bce91dbbbf262cb3426d5ba229fdb5be195fb49de0dead5</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-static-libs-debug-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">46ada50a9aa614b885d0dd4a7015ee5d1fb06d7f490904fa30e1ce6957236953</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-devel-debug-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">2c9d49a68aa09f02258351c91f555f6b0211de901645235f7d0f31f232115963</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-headless-debug-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">b3f024c8c0309215dd310fdc7d20f9e854ff1793fcd79f7cbdf51565a692ccbd</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-src-debug-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">ce46f933757568cd5b7eba35845c701fcc3e4ed15e922ded40398265ee427211</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-debug-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">3c359c9afd7dfd0a006e9b23d4ad5f1036df5508873b104ab0f05b5b5bbc60fa</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-jmods-debug-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">bce1e0dc45399bdbee0b5b70b9596f99c175ca68a14454e8de229887bdfbff18</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-devel-debug-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">1872c8712dccd991aa136cce3c2e86875a3b2643acc896bec68c3b083507125e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-jmods-debug-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">1915fcb1e7116b4b935440e911a85d10923bd50e9c924c70aeaea617e26ab15c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-debug-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">88c6d0144ec63fe83ba7762cd6bb68ba4d04c150859d27d78d0a1c5858b78b4b</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835" id="CVE-2023-21835" title="Cve-2023-21835" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843" id="CVE-2023-21843" title="Cve-2023-21843" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0195" id="RHSA-2023:0195" title="Moderate: Java-11-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2150192" id="2150192" title="2150192 &#8211; Prepare For The Next Quarterly Openjdk Upstream Release (2023-01, 11.0.18) [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0195-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) (CVE-2023-21835) 
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 11.0.18)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2023-01-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-demo-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">3bc1d3cae89a9b43428bc5b056d83be87f802edd3b625132919a4179e3636b00</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">f843f7100c0e05db141e5711b463151f6f84edc518e26801f642781dadadca7c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-javadoc-zip-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">748d1bbacd06da97f2aee6b4cc956921ed77d1686c9ecc216e3fbefdc764d37b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-static-libs-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">842ad0e3202d29c2ab7d4a0da2ffd7ad60553b79dbc38a04e365248634c6de44</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-headless-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">271de5dce775c818dd0b07bb8f270955529619164be4339e950d85d38733b777</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-headless-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">954bed46277a5d12619ace7f32279515c2a98ffda3733e187797f19460113d75</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-devel-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">135f5bac306fd312a6d7a5ed81c4922953d0ef8b2459fd5df8ce47ef3e275595</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-javadoc-zip-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">1977afedf027ab6b36f6bb4701372b22ed6891ccb86921ec144da42de29f9a09</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-demo-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">bdeda4ae3c3d1558414becfd75b3df7cef33576f702a1a1d3997c638d07b75fa</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">1e1ee682659151ffc7e9622e46fc4a5385da0c847855c692fb300b454fe95038</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-src-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">61e30fd23ae2c3e0fbbb70ee6995a7e608dd52710ded594d9ea8b9ff71f6dff2</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-javadoc-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">1b9d27cbbe2e7a6823e56922b743ce76e738da8af3281699337a61f2df134024</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-src-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">973dea4ab545a00f6aac1ce0b55b22df5a5bbb2d9071f77ce4b98f0ea0997a7c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-jmods-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">b89892b3f9e18cd038d05dd81498d044c33b301dc2e42bf4a8a7e9eef50d4d9a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-jmods-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">27e633ba219e5a22027e01f848a8a16d84316b68f7cd97929c42fce46a887983</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-javadoc-11.0.18.0.10-1.el7_9.i686.rpm</filename><sum type="sha256">8962445f55696819dfe7c47f475c2b53cc0d96e5ff73bc5d645d6b61edbb7deb</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.18.0.10-1.el7_9.src.rpm" version="11.0.18.0.10"><filename>java-11-openjdk-devel-11.0.18.0.10-1.el7_9.x86_64.rpm</filename><sum type="sha256">145f8da2a5bc486a8421b1e7cb57363db2e0f2b18f9349f21546ce6b8312f0af</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21835" id="CVE-2023-21835" title="Openjdk: Handshake Dos Attack Against Dtls Connections (Jsse, 8287411)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843" id="CVE-2023-21843" title="Openjdk: Soundbank Url Remote Loading (Sound, 8293742)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0195" id="RHSA-2023:0195-1" title="Rhsa-2023:0195-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2160421" id="2160421" title="Openjdk: Handshake Dos Attack Against Dtls Connections (Jsse, 8287411)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2160475" id="2160475" title="Openjdk: Soundbank Url Remote Loading (Sound, 8293742)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0203</id><title>Moderate: Java-1.8.0-Openjdk Security And Bug Fix Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) * OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362) (BZ#2150191)
</description><severity>moderate</severity><issued date="2023-01-24 14:35:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">d67f5f2319f6ff0a3b5de8d2d807ee5c67e926c7a8dcacaf2e28e8e9bc6b2238</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">c43fcee935ee49480526fac1e2080c2036252474816bd997f9ec6418f4add8e9</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">17fab252cbef0c6091cc5b79ee41edf7247454269c7672890c234175a9eb1f03</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">8a61d12f78f3795ac2cf62406286a5f37c7deead7dd6c3a02dd4c1e889ef8900</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.362.b08-1.el7_9.noarch.rpm</filename><sum type="sha256">cea11c3b85836b654b96bf42c4a8d3325d4d9db3c17277871f917965165aec3a</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">59b237e3ae54ab4415241c247e5d3d42a352e2b81960c848cd8ec07d91fe1fb3</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">8b9addb29a05d1fd51e24843f9c9ff233ffefa529185561466b7c7d5f244b5e2</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">eafcc7b9ea13057aec5c7b0ebe6f10882c24d023883a27a2e2509bef8e8e1179</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">ef2f54dfcec1be271424d6a3a0a362c9a3af74a93f52ef43402d1912c781729b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">af40a2cfda64966d5a427c2eea862ea30d618567d401078c4c0c448bf9432df6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">51112771c749d39cf0184f0bb26636af59c40d88eee15751b02ce8f719f10a37</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.362.b08-1.el7_9.noarch.rpm</filename><sum type="sha256">5fbd504305174e6bfb203b14e45aa9fee36c3da9f73d7c810733d9600fcdda54</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">394b99e5dad56c6b475922a65576ff8f622be890d773b2f61800985c335daae3</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">d23676057675490f4089eab52482b9cd0e7878e5a2f3cf9c9d113207478d0751</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21830" id="CVE-2023-21830" title="Cve-2023-21830" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843" id="CVE-2023-21843" title="Cve-2023-21843" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0203" id="RHSA-2023:0203" title="Moderate: Java-1.8.0-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2150191" id="2150191" title="2150191 &#8211; Prepare For The Next Quarterly Openjdk Upstream Release (2023-01, 8U362) [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0203-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830) 
* OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Prepare for the next quarterly OpenJDK upstream release (2023-01, 8u362)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2023-01-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b08-1.el7_9.noarch.rpm</filename><sum type="sha256">05b6ccceb390b74f5a4dfc27aa6f6100d7bce12dc245e3c52e0ccc7fe1d642bf</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-javadoc-1.8.0.362.b08-1.el7_9.noarch.rpm</filename><sum type="sha256">d7b36f402fb5e3cb164069a19de48997180a7acbf656960bb8395de371279098</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">653e348b4a040d8fade666eb0133836bd40c9973dd7ff739b24337dfbdc2c892</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">752180dbb579f396c985a1d7de2f8b79440096ebe4240c8b16a011eeab0557bc</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">e5eeba85072f8947cb295251e39a59f2387fb3bdcb75fab7446b3319262313d6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">591856a5e8fa2aca76194cf466f2c7a8e0ee74bea747b9a9618e4b5b51b24ab7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">8502fc7913dce12d4b6782a1b1bd06573cf1e0f3b87026a84fbf391584632705</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">febf86745e38c1a80182668de2e367ad6870206ed182ff455aa67cea0a450222</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">4c48921b8d693ebe70aea1f02ad0281c6bf7ad5343dd8286014421164bc60053</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">77908458f8b22121d9d5d237ba5df39a2d013502b35c14bb51f7efecb23c2159</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-src-1.8.0.362.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">29e7e96ad8580b7ad6a47a627b381b7af105f9d1ffd99ed38cb9eae25ccc3768</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">165e46dc7a8d05f83a894dd20c23d60abc3c1887ecfa1c5254049ff044d73fc0</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-src-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">4c06915a71f9f8f77fc3224a3befd6978484aa94fa0fbc6fc388db7463a24e22</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.362.b08-1.el7_9.src.rpm" version="1.8.0.362.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el7_9.i686.rpm</filename><sum type="sha256">8b4df27fdadbb0e8f1d2d251fbbe1659a597ab959926c96a03963d71d1631039</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21830" id="CVE-2023-21830" title="Openjdk: Improper Restrictions In Corba Deserialization (Serialization, 8285021)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21843" id="CVE-2023-21843" title="Openjdk: Soundbank Url Remote Loading (Sound, 8293742)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0203" id="RHSA-2023:0203-1" title="Rhsa-2023:0203-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2160475" id="2160475" title="Openjdk: Soundbank Url Remote Loading (Sound, 8293742)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2160490" id="2160490" title="Openjdk: Improper Restrictions In Corba Deserialization (Serialization, 8285021)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0291-1</id><title>Sudo</title><description>Security Fix(es): 
* sudo: arbitrary file write with privileges of the RunAs user (CVE-2023-22809) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-01-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="sudo-devel" release="10.el7_9.3" src="sudo-1.8.23-10.el7_9.3.src.rpm" version="1.8.23"><filename>sudo-devel-1.8.23-10.el7_9.3.x86_64.rpm</filename><sum type="sha256">b509e056243c05835de134363455b1f06feb4a168d8589a349ba2c8e83eddd47</sum></package><package arch="x86_64" name="sudo" release="10.el7_9.3" src="sudo-1.8.23-10.el7_9.3.src.rpm" version="1.8.23"><filename>sudo-1.8.23-10.el7_9.3.x86_64.rpm</filename><sum type="sha256">cac42c69a281a8b043ad8439ea382ef1189f033ae73996f6ee04a369fd8db073</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22809" id="CVE-2023-22809" title="Sudo: Arbitrary File Write With Privileges Of The Runas User" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0291" id="RHSA-2023:0291-1" title="Rhsa-2023:0291-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2161142" id="2161142" title="Sudo: Arbitrary File Write With Privileges Of The Runas User" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0296-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.7.0 ESR. 
Security Fix(es): 
* Mozilla: libusrsctp library out of date (CVE-2022-46871) 
* Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) 
* Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) 
* Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) 
* Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) 
* Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) 
* Mozilla: Fullscreen notification bypass (CVE-2022-46877) 
* Mozilla: Calls to &lt;code&gt;console.log&lt;/code&gt; allowed bypasing Content Security Policy via format directive (CVE-2023-23603) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-01-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-102.7.0-1.el7_9.src.rpm" version="102.7.0"><filename>firefox-102.7.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">11b23f5cd514cc8129706f30b58ad4a5ff362d3ef32d278e706ec529245f2128</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-102.7.0-1.el7_9.src.rpm" version="102.7.0"><filename>firefox-102.7.0-1.el7_9.i686.rpm</filename><sum type="sha256">6dcb5e50c1d0aeda1e6b048bb06d3b39cc58c23a5c108108eaefc4fe586d4027</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871" id="CVE-2022-46871" title="Mozilla: Libusrsctp Library Out Of Date" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877" id="CVE-2022-46877" title="Mozilla: Fullscreen Notification Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598" id="CVE-2023-23598" title="Mozilla: Arbitrary File Read From Gtk Drag And Drop On Linux" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23599" id="CVE-2023-23599" title="Mozilla: Malicious Command Could Be Hidden In Devtools Output" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601" id="CVE-2023-23601" title="Mozilla: Url Being Dragged From Cross-Origin Iframe Into Same Tab Triggers Navigation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602" id="CVE-2023-23602" title="Mozilla: Content Security Policy Wasn'T Being Correctly Applied To Websockets In Webworkers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603" id="CVE-2023-23603" title="Mozilla: Calls To &lt;Code&gt;Console.Log&lt;/Code&gt; Allowed Bypasing Content Security Policy Via Format Directive" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605" id="CVE-2023-23605" title="Mozilla: Memory Safety Bugs Fixed In Firefox 109 And Firefox Esr 102.7" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0296" id="RHSA-2023:0296-1" title="Rhsa-2023:0296-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162336" id="2162336" title="Mozilla: Libusrsctp Library Out Of Date" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162338" id="2162338" title="Mozilla: Arbitrary File Read From Gtk Drag And Drop On Linux" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162339" id="2162339" title="Mozilla: Malicious Command Could Be Hidden In Devtools Output" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162340" id="2162340" title="Mozilla: Url Being Dragged From Cross-Origin Iframe Into Same Tab Triggers Navigation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162341" id="2162341" title="Mozilla: Content Security Policy Wasn'T Being Correctly Applied To Websockets In Webworkers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162342" id="2162342" title="Mozilla: Fullscreen Notification Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162343" id="2162343" title="Mozilla: Calls To &lt;Code&gt;Console.Log&lt;/Code&gt; Allowed Bypasing Content Security Policy Via Format Directive" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162344" id="2162344" title="Mozilla: Memory Safety Bugs Fixed In Firefox 109 And Firefox Esr 102.7" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0377</id><title>Important: Libxpm Security Update</title><description>The libXpm packages contain the X Pixmap parser library.
Security Fix(es):
* libXpm: compression commands depend on $PATH (CVE-2022-4883)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-01-24 14:35:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libXpm-devel" release="2.el7_9" src="libXpm-3.5.12-2.el7_9.src.rpm" version="3.5.12"><filename>libXpm-devel-3.5.12-2.el7_9.i686.rpm</filename><sum type="sha256">b198deb123820a78c48009ba17ad5cbd90c0c33aa6bb09c392370a38599b7ae3</sum></package><package arch="x86_64" name="libXpm" release="2.el7_9" src="libXpm-3.5.12-2.el7_9.src.rpm" version="3.5.12"><filename>libXpm-3.5.12-2.el7_9.x86_64.rpm</filename><sum type="sha256">df039c15386f0ccaf4d4ecec2af6f54b1d698240cadbf324d7327d67ec92f365</sum></package><package arch="x86_64" name="libXpm-devel" release="2.el7_9" src="libXpm-3.5.12-2.el7_9.src.rpm" version="3.5.12"><filename>libXpm-devel-3.5.12-2.el7_9.x86_64.rpm</filename><sum type="sha256">60c812c275867820f98e75f4b0067b0b5ab76e52b5f95ecf26a2831b8e97a6e8</sum></package><package arch="i686" name="libXpm" release="2.el7_9" src="libXpm-3.5.12-2.el7_9.src.rpm" version="3.5.12"><filename>libXpm-3.5.12-2.el7_9.i686.rpm</filename><sum type="sha256">2f0d3e0e9abe5bb42ef048af825a38deda1b5ead99875ab9e4f2063a51766714</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4883" id="CVE-2022-4883" title="Cve-2022-4883" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0377" id="RHSA-2023:0377" title="Important: Libxpm Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0399-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: memory corruption in AX88179_178A based USB ethernet device. (CVE-2022-2964) 
* hw: cpu: LFENCE/JMP Mitigation Update for CVE-2017-5715 (CVE-2021-26401) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Prevent unnecessary resets - Avoid leaving shost-&gt;last_reset with stale value if EH does not run 
* i40e: Request to backport upstream commit 2e5a20573a92 
* disable VMA-based swap-in readahead on PowerPC</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-01-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="kernel-abi-whitelists" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.83.1.el7.noarch.rpm</filename><sum type="sha256">98e7e92cd04b875945fd4cb335412bf8c24a4e439ce39aabc1d795c46c4298d5</sum></package><package arch="x86_64" name="perf" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">d33cbb5d8ad58c6e4c876a306ec93179871e9a2a84123c97d3793b0a8404dbe9</sum></package><package arch="x86_64" name="kernel" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">03e614e31ff2f223881b8542d50a59e0360117c66c4663fea606ad019dc574ac</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">6c11f35cc47ff1a43b18c0506fabc9a3f3d3b0b2f5c8c15470c443c7828450e9</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">1366cd9ad0a75cb819e32ab8e99f2e59afe5fa863832725e38334f2a1c8af63d</sum></package><package arch="x86_64" name="kernel-debug" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">1a49e659075919d95f7ebd2fd2bc6689cb2f475d1274496c971e44e0899014c1</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">ace7dd6fc95f571358580c4a373531a643070b7b59571908ea809c31dca21b76</sum></package><package arch="noarch" name="kernel-doc" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.83.1.el7.noarch.rpm</filename><sum type="sha256">863a86b1705c39a0d3f84cadcc501337fd023cfc5cf517d71611b513a24100af</sum></package><package arch="x86_64" name="bpftool" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">ad4a6345606050446ad16b770f6d3d27852dda942ddfd3a0f06c0b2f551f89d0</sum></package><package arch="x86_64" name="kernel-devel" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">6e0ef358ba023ff734894a30f88fa4cbf5d4a0639c70323c8881bb083a2dc6e7</sum></package><package arch="x86_64" name="kernel-tools" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">7d96c648f1ecdb2a7a013c40c3eb09397ab8d091ad9a1edebff4a55348d0a1a0</sum></package><package arch="x86_64" name="kernel-headers" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">0b6671b29f4ad5264592b71ad0eddc45a9ae36cf0b6f270e02743487c3fa0bda</sum></package><package arch="x86_64" name="python-perf" release="1160.83.1.el7" src="kernel-3.10.0-1160.83.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.83.1.el7.x86_64.rpm</filename><sum type="sha256">68b80d5f1ee488ce0fe8bf9e7f6d996325fe03c11fa6180f2491c6daa84d0920</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-26401" id="CVE-2021-26401" title="Hw: Cpu: Lfence/Jmp Mitigation Update For Cve-2017-5715" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2964" id="CVE-2022-2964" title="Kernel: Memory Corruption In Ax88179_178A Based Usb Ethernet Device." type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0399" id="RHSA-2023:0399-1" title="Rhsa-2023:0399-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2061700" id="2061700" title="Hw: Cpu: Lfence/Jmp Mitigation Update For Cve-2017-5715" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2067482" id="2067482" title="Kernel: Memory Corruption In Ax88179_178A Based Usb Ethernet Device." type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0402-1</id><title>Bind</title><description>Security Fix(es): 
* bind: DNS forwarders - cache poisoning vulnerability (CVE-2021-25220) 
* bind: processing large delegations may severely degrade resolver performance (CVE-2022-2795) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2023-01-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.i686.rpm</filename><sum type="sha256">eb7454c91c0c0229c5c42b7b39da752e86f3a8d3178430deb6a1b44c96881f8d</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">0f56a8eb01c837fa298d23a19ab0440f1c384d578326e75deb4f079ab3d879e1</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">ab10c3e78d6034f2aaa0c8b4ebf6d7be3407f1357101e822c318cf17ea861d63</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.13.i686.rpm</filename><sum type="sha256">a2a4d81888ef9d2d40a9925b76a4810877a2d2c652f56690282bdea89262089c</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.13.i686.rpm</filename><sum type="sha256">ab7659bf414b34d38f29bb3c339e7ef7227ab6029c09aea0d9796f3b16617074</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">f4a664d35029d85dd179c384f40480a3428f7812dc5451815f570169ad5772b6</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">1ced88f817c5c9b837c0f30d5716d0170451c17cb76f2aafae9f38ec7d4eb2b7</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">043c7ab8699a0c632fbcf86503a81e396117e945c9b688fbc3dd8ebf74bf130a</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">bc654c846cc7b0cf207acabf543674bb337c2d00834b8a1642d20f1f876c7913</sum></package><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">4da9b800ab814fad0c507e1fbbcd24e87046e12f6a114208a20735d11ca050dd</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">6cb479ea7e8351c0e798e4bba3b420e8f8527767c75c387558d04ccc176131fb</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.i686.rpm</filename><sum type="sha256">bd749319924fd015a69e9e0b46bbe2f1372885887dcae418439f0ac76ce4c217</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">8d3f4431c5eeca4e4d989d494d1e9fa35e5315c146e2ee097b18e46d125ac0a2</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">776572692e3ee2fa60f1b3ec56e69ee16c4229730f7845cbc3fa135dab5c3c91</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.13.i686.rpm</filename><sum type="sha256">329962f999d5f845da95aaac1b0236c6c12ab50763a353458b0563949e9241cb</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.13.i686.rpm</filename><sum type="sha256">b388afda1b0ac50faedaaa336b839370c6edc9e37fc2bf2e444f8ffdd839e878</sum></package><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.13.noarch.rpm</filename><sum type="sha256">f9aef2500b2b1ed6c3206607d73157246a3b0ea6fda944b02706154b00b4e979</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">1eb2074549612b1cff2a28627e5f3b2a4d236566d5adaa99b4674405697d2598</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">4e09efb17c23f9971cf3c42854c641011561dace108198a272befdfefe2ebace</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">4003d60867abb79d5c6e609204461ae25f64ccd2b1fd3738b72b12b440325bcc</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">a6ec6b932f762a7869a3550209b49a275b111bf37ee2995818965911c54deb94</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.13.x86_64.rpm</filename><sum type="sha256">46774dcafc058b1dd4cfc9a640d0d0a446467d300bcee59a7bda88a1b53e8c01</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.13.i686.rpm</filename><sum type="sha256">34830638859ee62e60bc47dda6f0383455e839436448de55706892203e9fd909</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.13" src="bind-9.11.4-26.P2.el7_9.13.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.13.i686.rpm</filename><sum type="sha256">42ca2439d41c12224fb12b8bda8ef7a3e260ceb64d79f0b6054eaec655cc7644</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-25220" id="CVE-2021-25220" title="Bind: Dns Forwarders - Cache Poisoning Vulnerability" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2795" id="CVE-2022-2795" title="Bind: Processing Large Delegations May Severely Degrade Resolver Performance" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0402" id="RHSA-2023:0402-1" title="Rhsa-2023:0402-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2064512" id="2064512" title="Bind: Dns Forwarders - Cache Poisoning Vulnerability" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2128584" id="2128584" title="Bind: Processing Large Delegations May Severely Degrade Resolver Performance" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0403-1</id><title>Sssd</title><description>Security Fix(es): 
* sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters (CVE-2022-4254) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* smartcards: special characters must be escaped when building search filter</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-01-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libsss_nss_idmap" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">16bc4d0557dde9b46a1c9897345a621b49b790c90c07141860cfc9e93df55ee2</sum></package><package arch="x86_64" name="libipa_hbac" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libipa_hbac-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">529d2d8d22c5c0b309ba3e79c1e410e0fcfc53987eb9322c862b6840a8675584</sum></package><package arch="x86_64" name="sssd-ldap" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-ldap-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">84b915877ab3a0f4fd324e69005f330e06b2a0e8f5787a2d0bba23d2b76ca9b2</sum></package><package arch="x86_64" name="sssd-ipa" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-ipa-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">8e8ec7152e1511103ce96db1be110b5010660c65698b467c470a980b0af99201</sum></package><package arch="x86_64" name="sssd-client" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-client-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">2fdc8cec74266f2a85a55c6d3b6b0307458d0a20476e5749c76aef33c6151225</sum></package><package arch="i686" name="libipa_hbac" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libipa_hbac-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">ec9e2f79eb49a0a505bc4258a16c40fdb4513d3ee2a915987ad1dbcb12a32a4a</sum></package><package arch="x86_64" name="sssd-krb5-common" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-krb5-common-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">d7b2acb1b193cfdfdca7c54d169497cd58ee5e57e76980ed7868446d8b90cfda</sum></package><package arch="i686" name="libsss_nss_idmap" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">8759698f9478c1aeb33c8ea981a0a6439202f6066cdb70c2682e1100320cbb42</sum></package><package arch="x86_64" name="libipa_hbac-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libipa_hbac-devel-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">4fbb6253c7180e83a4b2bb828bd2a6cd24014d28a0055d2fcfc2fb5fc706f78c</sum></package><package arch="x86_64" name="libsss_certmap" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_certmap-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">388a3fc9d5274d70d776671716eb893b82d5e832890dae1d7ba2cf2d0484f3fc</sum></package><package arch="i686" name="libipa_hbac-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libipa_hbac-devel-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">56cb20370288a226781598ee1d8dd41707ba4d2e6374a2b2a4505d2302357279</sum></package><package arch="x86_64" name="sssd-tools" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-tools-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">255fd956b96970e4286710242848e4e2ea03d870037cdcfb4eb601449a82a13e</sum></package><package arch="x86_64" name="libsss_simpleifp-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_simpleifp-devel-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">5cb5f1d47f0a70fb927abe487e444b4bdc44504b78e7be135573e6800a33c3b6</sum></package><package arch="x86_64" name="sssd-libwbclient-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-libwbclient-devel-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">af6072ecffe9de1b96a4a2d046fde800d16199ed23fa9a5562fafd798ba0d812</sum></package><package arch="x86_64" name="sssd-krb5" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-krb5-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">fad79434fd51546a0fbee2de76ce712bfa0688711c140b1dc07c9a8c0b64c782</sum></package><package arch="x86_64" name="python-sss-murmur" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>python-sss-murmur-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">938cc193a64aae61f740e346a6cc07d91159b2bd59beb7e708126467fa3f9ae0</sum></package><package arch="x86_64" name="libsss_sudo" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_sudo-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">dd638f04c9746d12804f8f6832b0d7ba71bbbf274bea2c9e47208bba79340e8d</sum></package><package arch="i686" name="libsss_nss_idmap-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-devel-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">36c1eaaa24852833dc15e6e2d9001115d52559f8216da22719195690cbb84937</sum></package><package arch="x86_64" name="libsss_simpleifp" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_simpleifp-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">18c60954981fe89a687102c7ade27f8460765feb6a5dc041b1af83a2b4559bce</sum></package><package arch="x86_64" name="sssd-common-pac" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-common-pac-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">e7d7f28cfe133469d32a76816d268647e82f76efcc19bf23c656497e1ca0b219</sum></package><package arch="i686" name="libsss_certmap-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_certmap-devel-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">e13ef52f86fd527281433977507ec7c903aa1509fc320351a8333674b0296ae3</sum></package><package arch="i686" name="libsss_simpleifp" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_simpleifp-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">f9c666658668dd42ba5dc5d4a6d5cd92c1fd810366eebfaa8d213fc523e85374</sum></package><package arch="x86_64" name="sssd-winbind-idmap" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-winbind-idmap-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">3f7f3f823469bc5e778a4a7d7c8f78fe28de7ab4f08ef9e4e18e0d2c3a4d3671</sum></package><package arch="x86_64" name="libsss_nss_idmap-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_nss_idmap-devel-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">5b0b124649901239d68533cd1160d197a6664fba2b04a6e577b271a1ff520458</sum></package><package arch="x86_64" name="python-libipa_hbac" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>python-libipa_hbac-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">1268d17249eabc1d72f4f7d4e532006684674dd6e1ddb7fb61f27eb5925e1cee</sum></package><package arch="x86_64" name="libsss_idmap-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_idmap-devel-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">d110b98cc9817c35bb3de61a1d32a7d730f929d01030553b2c9cfd185d8882e1</sum></package><package arch="x86_64" name="sssd-ad" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-ad-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">917491496fe70b0202e6f01082eadc5e8f1a995664b299843c829cc6dcfd6f77</sum></package><package arch="i686" name="libsss_idmap-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_idmap-devel-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">388765451b6fe56a237844e7bf42c6b96e04ed258ee5db463defffc2a96fa39b</sum></package><package arch="i686" name="sssd-libwbclient-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-libwbclient-devel-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">348326d8bac6c34c68273d1e15767b70bbb787dc04b2928ebfc3e3f00409ef39</sum></package><package arch="i686" name="libsss_certmap" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_certmap-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">b69296ad05824787abe7334c0802db70c802318dbc071fed8e0e1f2103c17738</sum></package><package arch="x86_64" name="sssd-libwbclient" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-libwbclient-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">91f4a3ad5d10e03c211e30e14045c82c014392c9e3a4e8340a736662f4955792</sum></package><package arch="x86_64" name="python-sss" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>python-sss-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">20e31c810deb0e0829a6b056f2952375a95bbd973af4acba096a481902c2a263</sum></package><package arch="x86_64" name="sssd-dbus" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-dbus-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">b76094d7cc0b6c9d867a24911850af375df7342d2d5027fa01aad2a1831e8932</sum></package><package arch="i686" name="libsss_idmap" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_idmap-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">fc62a7d175109d6eac959a24e9c66eac882b75e167c102b169f0167c5053e1bf</sum></package><package arch="x86_64" name="python-libsss_nss_idmap" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>python-libsss_nss_idmap-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">a39774f4d0d89e596fa26fdd71180c15fc10f775827c9111f0ef263bfbda2393</sum></package><package arch="x86_64" name="libsss_autofs" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_autofs-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">c94c5b0f3138667df29e2276c9953e660d6fae4084fee8c13de93d44c1ce243b</sum></package><package arch="i686" name="sssd-client" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-client-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">19a7dc1be7ab7889c11f1bb537e695576a8ddaad71b6a98494dff5b95320734b</sum></package><package arch="x86_64" name="sssd-common" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-common-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">fba7a3b126e91c9453e4dab4e6d664e867f750f02852cc9ea52727d81a0d47b5</sum></package><package arch="i686" name="libsss_simpleifp-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_simpleifp-devel-1.16.5-10.el7_9.15.i686.rpm</filename><sum type="sha256">39e740f102af4b6235a1428d0985cf18cbc14301443b4efdcbc587d897d3ee97</sum></package><package arch="x86_64" name="libsss_certmap-devel" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_certmap-devel-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">d4967b404147f7103003cd1d643edeea8b827e201cae7e5df4e7320e25f6c381</sum></package><package arch="noarch" name="python-sssdconfig" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>python-sssdconfig-1.16.5-10.el7_9.15.noarch.rpm</filename><sum type="sha256">d9917b941c40b174fe3288f491f5a5c27432162520eee3e9802d08c5906bdc22</sum></package><package arch="x86_64" name="sssd-polkit-rules" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-polkit-rules-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">612d622be4d58ea8063b0f9fae21db3e244b111bb3b1cebc3d6b0de80893c6be</sum></package><package arch="x86_64" name="libsss_idmap" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>libsss_idmap-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">67a758c68ca0ad65538bedcefb3878c38a204eec2805bcd3766399204f22f60d</sum></package><package arch="x86_64" name="sssd-kcm" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-kcm-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">c1ba20a5876ef78cd463c30044c1f803c7c4a6522934f7593eb61e0d60f8dbfd</sum></package><package arch="x86_64" name="sssd-proxy" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-proxy-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">3e0a62b4beb3d82c57a1b105f5e3a2b331cb6e33d45e87beaf7c2c6da1e7c078</sum></package><package arch="x86_64" name="sssd" release="10.el7_9.15" src="sssd-1.16.5-10.el7_9.15.src.rpm" version="1.16.5"><filename>sssd-1.16.5-10.el7_9.15.x86_64.rpm</filename><sum type="sha256">b7915ce2844a91d5c646615b010658b2441d16532459bea87c6c18669f83ee9f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4254" id="CVE-2022-4254" title="Sssd: Libsss_Certmap Fails To Sanitise Certificate Data Used In Ldap Filters" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0403" id="RHSA-2023:0403-1" title="Rhsa-2023:0403-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2149894" id="2149894" title="Sssd: Libsss_Certmap Fails To Sanitise Certificate Data Used In Ldap Filters" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0456-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.7.1. 
Security Fix(es): 
* Mozilla: libusrsctp library out of date (CVE-2022-46871) 
* Mozilla: Arbitrary file read from GTK drag and drop on Linux (CVE-2023-23598) 
* Mozilla: Memory safety bugs fixed in Firefox 109 and Firefox ESR 102.7 (CVE-2023-23605) 
* Mozilla: Malicious command could be hidden in devtools output (CVE-2023-23599) 
* Mozilla: URL being dragged from cross-origin iframe into same tab triggers navigation (CVE-2023-23601) 
* Mozilla: Content Security Policy wasn't being correctly applied to WebSockets in WebWorkers (CVE-2023-23602) 
* Mozilla: Fullscreen notification bypass (CVE-2022-46877) 
* Mozilla: Calls to &lt;code&gt;console.log&lt;/code&gt; allowed bypasing Content Security Policy via format directive (CVE-2023-23603) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-01-27 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-102.7.1-1.el7_9.src.rpm" version="102.7.1"><filename>thunderbird-102.7.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">f8eb0f48dc455b82381081db3cba0b2c75a0d885b8582ab5b17e418aa4d3ba27</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46871" id="CVE-2022-46871" title="Mozilla: Libusrsctp Library Out Of Date" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46877" id="CVE-2022-46877" title="Mozilla: Fullscreen Notification Bypass" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23598" id="CVE-2023-23598" title="Mozilla: Arbitrary File Read From Gtk Drag And Drop On Linux" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23599" id="CVE-2023-23599" title="Mozilla: Malicious Command Could Be Hidden In Devtools Output" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23601" id="CVE-2023-23601" title="Mozilla: Url Being Dragged From Cross-Origin Iframe Into Same Tab Triggers Navigation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23602" id="CVE-2023-23602" title="Mozilla: Content Security Policy Wasn'T Being Correctly Applied To Websockets In Webworkers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23603" id="CVE-2023-23603" title="Mozilla: Calls To &lt;Code&gt;Console.Log&lt;/Code&gt; Allowed Bypasing Content Security Policy Via Format Directive" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23605" id="CVE-2023-23605" title="Mozilla: Memory Safety Bugs Fixed In Firefox 109 And Firefox Esr 102.7" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0456" id="RHSA-2023:0456-1" title="Rhsa-2023:0456-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162336" id="2162336" title="Mozilla: Libusrsctp Library Out Of Date" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162338" id="2162338" title="Mozilla: Arbitrary File Read From Gtk Drag And Drop On Linux" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162339" id="2162339" title="Mozilla: Malicious Command Could Be Hidden In Devtools Output" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162340" id="2162340" title="Mozilla: Url Being Dragged From Cross-Origin Iframe Into Same Tab Triggers Navigation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162341" id="2162341" title="Mozilla: Content Security Policy Wasn'T Being Correctly Applied To Websockets In Webworkers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162342" id="2162342" title="Mozilla: Fullscreen Notification Bypass" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162343" id="2162343" title="Mozilla: Calls To &lt;Code&gt;Console.Log&lt;/Code&gt; Allowed Bypasing Content Security Policy Via Format Directive" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162344" id="2162344" title="Mozilla: Memory Safety Bugs Fixed In Firefox 109 And Firefox Esr 102.7" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0530-1</id><title>Libksba</title><description>Security Fix(es): 
* libksba: integer overflow to code executiona (CVE-2022-47629) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-01-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libksba-devel" release="7.el7_9" src="libksba-1.3.0-7.el7_9.src.rpm" version="1.3.0"><filename>libksba-devel-1.3.0-7.el7_9.i686.rpm</filename><sum type="sha256">eb11ecb88f45499e516fc9e39454fc4ba8fae8176cb3dce87bf18faab092f0a0</sum></package><package arch="x86_64" name="libksba-devel" release="7.el7_9" src="libksba-1.3.0-7.el7_9.src.rpm" version="1.3.0"><filename>libksba-devel-1.3.0-7.el7_9.x86_64.rpm</filename><sum type="sha256">132171720846a1714489518d30207780d5c838a872d48d262b805519d967b8bd</sum></package><package arch="x86_64" name="libksba" release="7.el7_9" src="libksba-1.3.0-7.el7_9.src.rpm" version="1.3.0"><filename>libksba-1.3.0-7.el7_9.x86_64.rpm</filename><sum type="sha256">f4ed855d1c9f63d62bdc83eb52442a7350bd5202af24fded086e59ebee4b677d</sum></package><package arch="i686" name="libksba" release="7.el7_9" src="libksba-1.3.0-7.el7_9.src.rpm" version="1.3.0"><filename>libksba-1.3.0-7.el7_9.i686.rpm</filename><sum type="sha256">7e5903cb864a99118df2cb87a56afcb8a7cb92feb4a5c9480748323a2cb32752</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-47629" id="CVE-2022-47629" title="Libksba: Integer Overflow To Code Execution" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0530" id="RHSA-2023:0530-1" title="Rhsa-2023:0530-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2161571" id="2161571" title="Libksba: Integer Overflow To Code Execution" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0600-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.7.1. 
Security Fix(es): 
* Mozilla: Revocation status of S/Mime signature certificates was not checked (CVE-2023-0430) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-02-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-102.7.1-2.el7_9.src.rpm" version="102.7.1"><filename>thunderbird-102.7.1-2.el7_9.x86_64.rpm</filename><sum type="sha256">a3d1eadfa0d5aa89a22b7885e85c547dd7cf96d832158506919f52bbaa19c73a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0430" id="CVE-2023-0430" title="Mozilla: Revocation Status Of S/Mime Signature Certificates Was Not Checked" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0600" id="RHSA-2023:0600-1" title="Rhsa-2023:0600-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2166591" id="2166591" title="Mozilla: Revocation Status Of S/Mime Signature Certificates Was Not Checked" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0675-1</id><title>Tigervnc And Xorg-X11-Server</title><description>X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. 
Security Fix(es): 
* xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege  elevation (CVE-2023-0494) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-02-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-Xorg" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-22.el7_9.x86_64.rpm</filename><sum type="sha256">8694f038496e5948c3a3783ab51176edef29d8d95296ef79e3a5eb686ae2adbe</sum></package><package arch="x86_64" name="tigervnc-server" release="24.el7_9" src="tigervnc-1.8.0-24.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-1.8.0-24.el7_9.x86_64.rpm</filename><sum type="sha256">6aa9ebde340d047d4bb706b83dd28cd6e8e46bf5d0eb54d18709a4ba11d386cc</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-22.el7_9.x86_64.rpm</filename><sum type="sha256">f107aadb4473d707bd74c370f8b2f70af9211609c2f2ca64bd31913946f5bf70</sum></package><package arch="x86_64" name="tigervnc" release="24.el7_9" src="tigervnc-1.8.0-24.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-1.8.0-24.el7_9.x86_64.rpm</filename><sum type="sha256">c17da119f457426264bb1dab2c7feb6d4f81f6b5dd406f66f3b178fa9cc93ae0</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-22.el7_9.x86_64.rpm</filename><sum type="sha256">04dfa49a820630082a4de59f0b63b9ede317888a4a402388cd2011fe72aa1154</sum></package><package arch="x86_64" name="tigervnc-server-minimal" release="24.el7_9" src="tigervnc-1.8.0-24.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-minimal-1.8.0-24.el7_9.x86_64.rpm</filename><sum type="sha256">ec701a0f8060564f5fa9b234242f61975328a64589a23ec4b85ceaa9771a13ff</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-22.el7_9.x86_64.rpm</filename><sum type="sha256">0e34f2713da8012f8f2843474faeb2c7815a3c3fef7d8af01eeb8c4986f7c6b5</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-22.el7_9.x86_64.rpm</filename><sum type="sha256">b9e16048bd8c405251a93c584bc5c873bb527d29e2543447fab2403870734950</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-22.el7_9.x86_64.rpm</filename><sum type="sha256">40b038aea93bb116a76856958fb9e757a0873c454edce402c48fe248c320fe2a</sum></package><package arch="noarch" name="tigervnc-icons" release="24.el7_9" src="tigervnc-1.8.0-24.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-icons-1.8.0-24.el7_9.noarch.rpm</filename><sum type="sha256">9f0328e2dbec5856c753c1d131e04d04d5a54b76d76d0125a89bc8a56747b824</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-22.el7_9.x86_64.rpm</filename><sum type="sha256">2c8c222a89dc9210b033711127ff969b3f2736e74b92bf24bcc4fc37c6d6fe6d</sum></package><package arch="i686" name="xorg-x11-server-devel" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-22.el7_9.i686.rpm</filename><sum type="sha256">a7529527d02d8baa8ebc8f416af1e48201c10b85225714068a80945799233b08</sum></package><package arch="x86_64" name="tigervnc-server-module" release="24.el7_9" src="tigervnc-1.8.0-24.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-module-1.8.0-24.el7_9.x86_64.rpm</filename><sum type="sha256">bd0288bb6da3f80c87d9dda13a62173ff0173a96693015cd8f4885bc16c2ac34</sum></package><package arch="noarch" name="tigervnc-server-applet" release="24.el7_9" src="tigervnc-1.8.0-24.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-applet-1.8.0-24.el7_9.noarch.rpm</filename><sum type="sha256">b17d08a619cffba382ede4c812adc1d4788651daae8cdb25c2fd90982d8cc2c0</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-22.el7_9.x86_64.rpm</filename><sum type="sha256">8a1c4e5f7e823dfd628bcc73ee45c65382b0fc7f92bf0e76c24197ba79348334</sum></package><package arch="noarch" name="tigervnc-license" release="24.el7_9" src="tigervnc-1.8.0-24.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-license-1.8.0-24.el7_9.noarch.rpm</filename><sum type="sha256">6fe8f2e3641dd29b7d3e9d68132f5e885a7801e0ee1d9123718b320655d6ac27</sum></package><package arch="noarch" name="xorg-x11-server-source" release="22.el7_9" src="xorg-x11-server-1.20.4-22.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-22.el7_9.noarch.rpm</filename><sum type="sha256">d92e9b25809b714f3f04f31f7eb8b49e26d3002dacd39d7f0e9b337f15b632e3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0494" id="CVE-2023-0494" title="Xorg-X11-Server: Deepcopypointerclasses Use-After-Free Leads To Privilege Elevation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0675" id="RHSA-2023:0675-1" title="Rhsa-2023:0675-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2165995" id="2165995" title="Xorg-X11-Server: Deepcopypointerclasses Use-After-Free Leads To Privilege Elevation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0812-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.8.0 ESR. 
Security Fix(es): 
* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) 
* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) 
* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) 
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) 
* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) 
* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) 
* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) 
* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) 
* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) 
* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) 
* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-02-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="2.el7_9" src="firefox-102.8.0-2.el7_9.src.rpm" version="102.8.0"><filename>firefox-102.8.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">a3877ec0d3d9b26a2d922f57130ad636c80eaad56ac034af6a842d93be7f7fbf</sum></package><package arch="i686" name="firefox" release="2.el7_9" src="firefox-102.8.0-2.el7_9.src.rpm" version="102.8.0"><filename>firefox-102.8.0-2.el7_9.i686.rpm</filename><sum type="sha256">6758c75f205d4e4c74069d30d41135040e340c0941cd2aa36d065b46bb22e491</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767" id="CVE-2023-0767" title="Mozilla: Arbitrary Memory Write Via Pkcs 12 In Nss" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728" id="CVE-2023-25728" title="Mozilla: Content Security Policy Leak In Violation Reports Using Iframes" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729" id="CVE-2023-25729" title="Mozilla: Extensions Could Have Opened External Schemes Without User Knowledge" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730" id="CVE-2023-25730" title="Mozilla: Screen Hijack Via Browser Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732" id="CVE-2023-25732" title="Mozilla: Out Of Bounds Memory Write From Encodeinputstream" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735" id="CVE-2023-25735" title="Mozilla: Potential Use-After-Free From Compartment Mismatch In Spidermonkey" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737" id="CVE-2023-25737" title="Mozilla: Invalid Downcast In Svgutils::Setupstrokegeometry" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739" id="CVE-2023-25739" title="Mozilla: Use-After-Free In Mozilla::Dom::Scriptloadcontext::~Scriptloadcontext" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742" id="CVE-2023-25742" title="Mozilla: Web Crypto Importkey Crashes Tab" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25743" id="CVE-2023-25743" title="Mozilla: Fullscreen Notification Not Shown In Firefox Focus" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744" id="CVE-2023-25744" title="Mozilla: Memory Safety Bugs Fixed In Firefox 110 And Firefox Esr 102.8" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746" id="CVE-2023-25746" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 102.8" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0812" id="RHSA-2023:0812-1" title="Rhsa-2023:0812-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170374" id="2170374" title="Mozilla: Content Security Policy Leak In Violation Reports Using Iframes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170375" id="2170375" title="Mozilla: Screen Hijack Via Browser Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170376" id="2170376" title="Mozilla: Fullscreen Notification Not Shown In Firefox Focus" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170377" id="2170377" title="Mozilla: Arbitrary Memory Write Via Pkcs 12 In Nss" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170378" id="2170378" title="Mozilla: Potential Use-After-Free From Compartment Mismatch In Spidermonkey" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170379" id="2170379" title="Mozilla: Invalid Downcast In Svgutils::Setupstrokegeometry" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170381" id="2170381" title="Mozilla: Use-After-Free In Mozilla::Dom::Scriptloadcontext::~Scriptloadcontext" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170382" id="2170382" title="Mozilla: Extensions Could Have Opened External Schemes Without User Knowledge" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170383" id="2170383" title="Mozilla: Out Of Bounds Memory Write From Encodeinputstream" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170390" id="2170390" title="Mozilla: Web Crypto Importkey Crashes Tab" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170391" id="2170391" title="Mozilla: Memory Safety Bugs Fixed In Firefox 110 And Firefox Esr 102.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170402" id="2170402" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 102.8" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0817-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.8.0. 
Security Fix(es): 
* Mozilla: Arbitrary memory write via PKCS 12 in NSS (CVE-2023-0767) 
* Mozilla: Content security policy leak in violation reports using iframes (CVE-2023-25728) 
* Mozilla: Screen hijack via browser fullscreen mode (CVE-2023-25730) 
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-25735) 
* Mozilla: Invalid downcast in SVGUtils::SetupStrokeGeometry (CVE-2023-25737) 
* Mozilla: Use-after-free in mozilla::dom::ScriptLoadContext::~ScriptLoadContext (CVE-2023-25739) 
* Mozilla: Fullscreen notification not shown in Firefox Focus (CVE-2023-25743) 
* Mozilla: Memory safety bugs fixed in Firefox 110 and Firefox ESR 102.8 (CVE-2023-25744) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 102.8 (CVE-2023-25746) 
* Mozilla: Extensions could have opened external schemes without user knowledge (CVE-2023-25729) 
* Mozilla: Out of bounds memory write from EncodeInputStream (CVE-2023-25732) 
* Mozilla: User Interface lockup with messages combining S/MIME and OpenPGP  (CVE-2023-0616) 
* Mozilla: Web Crypto ImportKey crashes tab (CVE-2023-25742) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-02-20 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-102.8.0-2.el7_9.src.rpm" version="102.8.0"><filename>thunderbird-102.8.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">84f11997de0cca1fbbb42d12ae5ab748e6a2b12da62075e83ff0313820b63696</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0616" id="CVE-2023-0616" title="Mozilla: User Interface Lockup With Messages Combining S/Mime And Openpgp" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767" id="CVE-2023-0767" title="Mozilla: Arbitrary Memory Write Via Pkcs 12 In Nss" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25728" id="CVE-2023-25728" title="Mozilla: Content Security Policy Leak In Violation Reports Using Iframes" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25729" id="CVE-2023-25729" title="Mozilla: Extensions Could Have Opened External Schemes Without User Knowledge" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25730" id="CVE-2023-25730" title="Mozilla: Screen Hijack Via Browser Fullscreen Mode" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25732" id="CVE-2023-25732" title="Mozilla: Out Of Bounds Memory Write From Encodeinputstream" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25735" id="CVE-2023-25735" title="Mozilla: Potential Use-After-Free From Compartment Mismatch In Spidermonkey" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25737" id="CVE-2023-25737" title="Mozilla: Invalid Downcast In Svgutils::Setupstrokegeometry" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25739" id="CVE-2023-25739" title="Mozilla: Use-After-Free In Mozilla::Dom::Scriptloadcontext::~Scriptloadcontext" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25742" id="CVE-2023-25742" title="Mozilla: Web Crypto Importkey Crashes Tab" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25743" id="CVE-2023-25743" title="Mozilla: Fullscreen Notification Not Shown In Firefox Focus" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25744" id="CVE-2023-25744" title="Mozilla: Memory Safety Bugs Fixed In Firefox 110 And Firefox Esr 102.8" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25746" id="CVE-2023-25746" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 102.8" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0817" id="RHSA-2023:0817-1" title="Rhsa-2023:0817-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170374" id="2170374" title="Mozilla: Content Security Policy Leak In Violation Reports Using Iframes" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170375" id="2170375" title="Mozilla: Screen Hijack Via Browser Fullscreen Mode" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170376" id="2170376" title="Mozilla: Fullscreen Notification Not Shown In Firefox Focus" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170377" id="2170377" title="Mozilla: Arbitrary Memory Write Via Pkcs 12 In Nss" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170378" id="2170378" title="Mozilla: Potential Use-After-Free From Compartment Mismatch In Spidermonkey" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170379" id="2170379" title="Mozilla: Invalid Downcast In Svgutils::Setupstrokegeometry" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170381" id="2170381" title="Mozilla: Use-After-Free In Mozilla::Dom::Scriptloadcontext::~Scriptloadcontext" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170382" id="2170382" title="Mozilla: Extensions Could Have Opened External Schemes Without User Knowledge" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170383" id="2170383" title="Mozilla: Out Of Bounds Memory Write From Encodeinputstream" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170390" id="2170390" title="Mozilla: Web Crypto Importkey Crashes Tab" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170391" id="2170391" title="Mozilla: Memory Safety Bugs Fixed In Firefox 110 And Firefox Esr 102.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170402" id="2170402" title="Mozilla: Memory Safety Bugs Fixed In Firefox Esr 102.8" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2171397" id="2171397" title="Mozilla: User Interface Lockup With Messages Combining S/Mime And Openpgp" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:0978-1</id><title>Git</title><description>Security Fix(es): 
* git: gitattributes parsing integer overflow (CVE-2022-23521) 
* git: Heap overflow in `git archive`, `git log --format` leading to RCE (CVE-2022-41903) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-02-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="git" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-1.8.3.1-24.el7_9.x86_64.rpm</filename><sum type="sha256">b26c2f0f9afecaae81c7a39acc8f66dfaa9b6d2e49f58370d1fa43425ab328bd</sum></package><package arch="noarch" name="git-instaweb" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-instaweb-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">5cbf8d6cd4c5f1ca050dcd4c99fbd2d7a90861ed38de876cc168ff0019cb08b8</sum></package><package arch="x86_64" name="git-daemon" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-daemon-1.8.3.1-24.el7_9.x86_64.rpm</filename><sum type="sha256">edca8227e635ecf93dfeeff500d4314b8271777dbda7a4c5e0df88d87c66b773</sum></package><package arch="noarch" name="gitweb" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>gitweb-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">e0e2d826925d442e35ea871ca3bc35a2e82aa2df5f09c48a80b18e9b86badf81</sum></package><package arch="noarch" name="emacs-git" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>emacs-git-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">c9a516c4f2cc89e203a84a70ce903cdb388014a187d43a178bd163f78e454942</sum></package><package arch="noarch" name="git-cvs" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-cvs-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">fa461440d71427a33bed73c62219fc4d2c1e37b73a3141e82a773c037d20dae5</sum></package><package arch="noarch" name="git-all" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-all-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">bd063bcbd94dcfaaf21fa3fce44019ecb9e49baefbad3f82846c5b018678159e</sum></package><package arch="x86_64" name="git-gnome-keyring" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-gnome-keyring-1.8.3.1-24.el7_9.x86_64.rpm</filename><sum type="sha256">33829bca4c6cf3140c450f2ec4a8bfa8d6a9b7fc0d7ecbaa68ad73be9fc9d37f</sum></package><package arch="noarch" name="git-p4" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-p4-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">30fc2f9f292da5a4e7ee3ce8ca7baef2911973d72c856e81763596d3758208e8</sum></package><package arch="x86_64" name="git-svn" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-svn-1.8.3.1-24.el7_9.x86_64.rpm</filename><sum type="sha256">2cb056134b6bf424851bf959c25e17968f87dac0995c4faf5d09c4389f971a97</sum></package><package arch="noarch" name="git-hg" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-hg-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">ffd7e91f163eaedf85059bf5ac67d4ffae3414f915f891a4b1ab0fdf18c655e8</sum></package><package arch="noarch" name="git-email" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-email-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">67ef252f653719b74cb97466d1aab0f27249c1748ef5ced8337696376b5b39fd</sum></package><package arch="noarch" name="git-gui" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-gui-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">5d2c34d5b8486e3b27d65917b33fe782b5a858375fc1b0cb093ee114cbd04214</sum></package><package arch="noarch" name="emacs-git-el" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>emacs-git-el-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">99de28fe34035a00e4e9f90dc525e53058ea287ce4d1bbae965f044f73cd33bc</sum></package><package arch="noarch" name="git-bzr" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>git-bzr-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">b58ab51d4051ea420f870ecb5fb3f399a77cdccbd2066e06cdf87136255e5d9b</sum></package><package arch="noarch" name="perl-Git" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>perl-Git-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">17f47c2a2714359e706cabb37c903cf05449cc6538a9698bd63635f09889d4c9</sum></package><package arch="noarch" name="gitk" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>gitk-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">512cf3658af83e990041688730807c342d960053723e696fdceee8c635b0d509</sum></package><package arch="noarch" name="perl-Git-SVN" release="24.el7_9" src="git-1.8.3.1-24.el7_9.src.rpm" version="1.8.3.1"><filename>perl-Git-SVN-1.8.3.1-24.el7_9.noarch.rpm</filename><sum type="sha256">66077fc18291ae304da279d1f97ed77a1306bcc07629cbf9bfe5fa8f24525a46</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521" id="CVE-2022-23521" title="Git: Gitattributes Parsing Integer Overflow" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903" id="CVE-2022-41903" title="Git: Heap Overflow In `Git Archive`, `Git Log --Format` Leading To Rce" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:0978" id="RHSA-2023:0978-1" title="Rhsa-2023:0978-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162055" id="2162055" title="Git: Gitattributes Parsing Integer Overflow" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2162056" id="2162056" title="Git: Heap Overflow In `Git Archive`, `Git Log --Format` Leading To Rce" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1090</id><title>Important: Samba Security Update</title><description>Samba is an open-source implementation of the Server Message Block (SMB) protocol and the related Common Internet File System (CIFS) protocol, which allow PC-compatible machines to share files, printers, and various information.
Security Fix(es):
* samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided (CVE-2022-38023)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-03-07 10:48:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="ctdb" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>ctdb-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">fddfbde281170a2350208c846e02cb2f735ee2da692388dfe592d3b6f2221315</sum></package><package arch="x86_64" name="ctdb-tests" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>ctdb-tests-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">0586c7e2c9783848bfc7fd8d069049645fcb9addf7f29a3405028b6f8fa6f8ce</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38023" id="CVE-2022-38023" title="Cve-2022-38023" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1090" id="RHSA-2023:1090" title="Important: Samba Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1090-1</id><title>Samba</title><description>Security Fix(es): 
* samba: RC4/HMAC-MD5 NetLogon Secure Channel is weak and should be avoided  (CVE-2022-38023) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-03-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="samba-devel" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">500ff04ad16fa32c36af15b5e3c1b80492ddb2605c8831333fe699144e1b5585</sum></package><package arch="i686" name="samba-common-libs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">3a506031708a60521c1ce26d7b25b7d33f871448efee490754aaa11f238bf6c5</sum></package><package arch="i686" name="samba-test-libs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">aa14ab7a6819597c7179bf43a2612e93e65cdf60b588a47c90c5f69fc3a0a01e</sum></package><package arch="x86_64" name="samba-libs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">fb4328a23ff9c6f3f1338e8ab0b640f49b135346019b3bf09ce2b9c125282814</sum></package><package arch="x86_64" name="samba-client" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-client-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">9817baee22eb3d09944be83b09843d8c5c0002914ba9dde8184f3ceedecfd53e</sum></package><package arch="i686" name="samba-winbind-modules" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">fd638a33e01ee122966a262131400c851d4b2cb82898af5ed06cbae1e88de1aa</sum></package><package arch="x86_64" name="samba-winbind" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">eb8c266f6f5019fc5b2c600965b45d57087e8d635aa5952361e28edb3ebaccdc</sum></package><package arch="x86_64" name="samba-dc" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">2c381f7d0617036e73e5636546c62c420822537f69456921c6adab74ad4cb3f0</sum></package><package arch="x86_64" name="libwbclient" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">645fc6268dcb2bed6534f8e588b76b142e19a03a8e99db58fab3962305542881</sum></package><package arch="x86_64" name="samba-dc-libs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-dc-libs-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">162e40109413dc22aa30db63c52aca3cd022e563f8813efe5afbb1ec654c1bbe</sum></package><package arch="x86_64" name="samba-winbind-krb5-locator" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-krb5-locator-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">3ccc9f9326d8b4602a3ef3e389f23d593140ad6dda7893ead58d258aa2ed35ab</sum></package><package arch="x86_64" name="samba-client-libs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">7570e96a1288f733237327dc3da948701b33ec973a909820d25f28864a63127e</sum></package><package arch="i686" name="libwbclient-devel" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">4006301818a57799b4760db07835dfa52580c8ed26037adff4a8f7fa12750105</sum></package><package arch="x86_64" name="samba" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">2259a55556e9766fcc56db5372bf17847a469ee86031509c485a20e6926d9c78</sum></package><package arch="x86_64" name="samba-python" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">70674e86b6f31bad41417cefb7aaa003a98dfc3700094b1767d5c6336c80c664</sum></package><package arch="noarch" name="samba-common" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-common-4.10.16-24.el7_9.noarch.rpm</filename><sum type="sha256">599601a6ec8dbd3ea3f75be569b375fb9854c9c06123c08d9e4f36869e83f17a</sum></package><package arch="x86_64" name="samba-winbind-clients" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-clients-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">8c48cc5d15e8aa111c148bd4654ee35ef9d477e89b3f8b70659c58500d1a4a89</sum></package><package arch="x86_64" name="samba-test-libs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-test-libs-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">fad10520ae3cc31e6aa868f6385b027985464857673faaf5490291b40bde0843</sum></package><package arch="i686" name="samba-python" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-python-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">fc81d3283b08cf0a13ee1a3dc32c648956df0d797e19dc438229706f80874e9d</sum></package><package arch="i686" name="samba-libs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-libs-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">ece27d16977a89a859fb38d509053ef6487ccd79f432777da058a9ed83f2115c</sum></package><package arch="i686" name="samba-client-libs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-client-libs-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">e284f006353619c61dc1b3995028031745e0c51ab673aac7df9d47af3ffeab58</sum></package><package arch="i686" name="libsmbclient" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">36482c21714fff9ecea78bfd9b60f4818a077034f7ae65d7975a0d1305988565</sum></package><package arch="i686" name="libsmbclient-devel" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">0ed2103a8eb2ee8ae24bc01c4a16685ac33614bb0ae0db7f22e6ed515fd6d335</sum></package><package arch="x86_64" name="libsmbclient" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">38054eae1a74d2b95eeb8896b5985b5b6d7a189724c60d2a2d29b5fe2fd4a350</sum></package><package arch="x86_64" name="samba-vfs-glusterfs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-vfs-glusterfs-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">2fbe9e1eeab8b46c0a07951c9de7af55591df294d580fbc4f35b622750ab5c54</sum></package><package arch="noarch" name="samba-pidl" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-pidl-4.10.16-24.el7_9.noarch.rpm</filename><sum type="sha256">60e72d724b225ce033d0c9ab75ece967b47edceb53f35338a94d8e5bf3dd44e2</sum></package><package arch="x86_64" name="samba-devel" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-devel-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">481f7fdb19fa20bbbdaace15be52182a64ea6017bad6c8a3e7073c0477d659bb</sum></package><package arch="x86_64" name="samba-python-test" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-python-test-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">ee6083c33c8dea339c7dfdbcea143aa161f3efbab2c5b7605a4be8ec853f2667</sum></package><package arch="x86_64" name="samba-winbind-modules" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-winbind-modules-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">794419b4cdfaddb314cfe6da06baa77bf8b2de66a2405373276d8b4a9283b1ac</sum></package><package arch="x86_64" name="samba-test" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-test-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">a95cfb5c67cb83fa714c978bc63bb89c4558c29c5d33ab551e8a9f447a24516f</sum></package><package arch="i686" name="libwbclient" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-4.10.16-24.el7_9.i686.rpm</filename><sum type="sha256">b4b4c731d0e5e3c42bb147a1f50523d98b0fba7418f05feeb1e60803e4cbb852</sum></package><package arch="x86_64" name="samba-common-libs" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-common-libs-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">7da197a0d57e411be6d6b01650265d280532834d8a384a544f3c5660b7bbe626</sum></package><package arch="x86_64" name="libwbclient-devel" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>libwbclient-devel-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">f5cfea82a73d3008884adeeb93d6b6e82a67a0c69f6ccedf3a9d72e2152a2b0e</sum></package><package arch="x86_64" name="samba-krb5-printing" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-krb5-printing-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">4597f10df0c826ef51647d1bc615be93c0616512ecaf577ecc51aa7c4cd4b7a8</sum></package><package arch="x86_64" name="libsmbclient-devel" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>libsmbclient-devel-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">0b6dd455d26f75fe2b0015e954e9a9f7d40adc1511e366d64bd70694d1dc4232</sum></package><package arch="x86_64" name="samba-common-tools" release="24.el7_9" src="samba-4.10.16-24.el7_9.src.rpm" version="4.10.16"><filename>samba-common-tools-4.10.16-24.el7_9.x86_64.rpm</filename><sum type="sha256">5e105eee330f72edd154260e9b5abaeaff92e26a8c7bbf599a0d5943ebc1788c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-38023" id="CVE-2022-38023" title="Samba: Rc4/Hmac-Md5 Netlogon Secure Channel Is Weak And Should Be Avoided" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1090" id="RHSA-2023:1090-1" title="Rhsa-2023:1090-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2154362" id="2154362" title="Samba: Rc4/Hmac-Md5 Netlogon Secure Channel Is Weak And Should Be Avoided" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1091-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: stack overflow in do_proc_dointvec and proc_skip_spaces (CVE-2022-4378) 
* kernel: use-after-free related to leaf anon_vma double reuse (CVE-2022-42703) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Regression - SAS3416 card works on SL 7.7 and below, does not work on SL 7.8 or 7.9 
* use-after-free in sctp_do_8_2_transport_strike 
* SL7.9 - [Regression] Kernel test failed during CPU polarization test - lscpu, chcpu - LPAR 
* SL 7, block: Crash in blk_mq_rq_timed_out() when dereferencing NULL request-&gt;q pointer 
* qla2xxx: Qlogic double completion races during error handling are still not fixed and this will also  be a SL8+ exposure 
* kernel 3.10.0-1160.80.1.el7.x86_64 on Xeon E55xx crashes upon KVM startup 
* Guest's time jumped forward by 12 minutes _after_ live-migration completes (in 30 seconds) 
* SL7: target crashes if a malicious initiator sends a logout immediately after a login command 
* SL7.9 - LTP testcase creat09 fails related to 'CVE-2018-13405' and 'CVE-2021-4037`</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-03-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="perf" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">2994a6e723cfacabd813dac1ea31a94b3d7335b015d5d9f5bb91dc450ca04154</sum></package><package arch="x86_64" name="kernel-headers" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">f0fabded1573afeafbdea88dabaa33d9a5b25eb6a2e8da0b0741d98b82ee39cd</sum></package><package arch="x86_64" name="bpftool" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">bd2b9606716ea103edfeade341a514508e78e2ebb20de46917c58714075b19a8</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">18196694a675b25665410c3c9d44a2e98d1ca5bd946987e609612e8cfbdaa3e7</sum></package><package arch="x86_64" name="python-perf" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">fa3a944b73812f9848fd6a8a3f5db3bad17e75c3964713e8358f699734a3cd58</sum></package><package arch="x86_64" name="kernel-devel" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">847e8c99f83ffa5657b05ef11a8200d47838d7625d4daaae8176b24efc86c852</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.88.1.el7.noarch.rpm</filename><sum type="sha256">3e5a1430d717b710a581e948c0be5a661f549ba1dffb627801476755b4df5ca8</sum></package><package arch="x86_64" name="kernel" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">5c64944b3c8e0a4b1b489a49fae4eca1e0e11230199314410617969ceea45b7c</sum></package><package arch="x86_64" name="kernel-debug" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">23b0e945e1397bfc990f1f366e451335a0934428a9149bc85d47fae479dc9bf5</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">7675927d96955b743696d9e8314b6f78d61132e2e7b916df89a67d4f497f88df</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">32cd28ab0db8bea7fab5947760340fce5ac55dcf5ed47134de5501479e5e82ad</sum></package><package arch="x86_64" name="kernel-tools" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.88.1.el7.x86_64.rpm</filename><sum type="sha256">86e80c491ce804d47f821e7ea6aa2ebc03421f81a13821e0fd94708e34a345b3</sum></package><package arch="noarch" name="kernel-doc" release="1160.88.1.el7" src="kernel-3.10.0-1160.88.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.88.1.el7.noarch.rpm</filename><sum type="sha256">ba8643984b51511422db80b0ce8a7c820c0d691c260480f7e6e245f4de156a53</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42703" id="CVE-2022-42703" title="Kernel: Use-After-Free Related To Leaf Anon_Vma Double Reuse" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4378" id="CVE-2022-4378" title="Kernel: Stack Overflow In Do_Proc_Dointvec And Proc_Skip_Spaces" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1091" id="RHSA-2023:1091-1" title="Rhsa-2023:1091-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2133483" id="2133483" title="Kernel: Use-After-Free Related To Leaf Anon_Vma Double Reuse" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2152548" id="2152548" title="Kernel: Stack Overflow In Do_Proc_Dointvec And Proc_Skip_Spaces" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1093-1</id><title>Pesign</title><description>Security Fix(es): 
* pesign: Local privilege escalation on pesign systemd service (CVE-2022-3560) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-03-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="pesign" release="11.el7_9" src="pesign-0.109-11.el7_9.src.rpm" version="0.109"><filename>pesign-0.109-11.el7_9.x86_64.rpm</filename><sum type="sha256">818e3c6565f79af164f8deb035916daf2318eda8901ce99140df3d0f6cbc9fd3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3560" id="CVE-2022-3560" title="Pesign: Local Privilege Escalation On Pesign Systemd Service" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1093" id="RHSA-2023:1093-1" title="Rhsa-2023:1093-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2135420" id="2135420" title="Pesign: Local Privilege Escalation On Pesign Systemd Service" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1095-1</id><title>Zlib</title><description>Security Fix(es): 
* zlib: heap-based buffer over-read and overflow in inflate() in inflate.c via a large gzip header extra field (CVE-2022-37434) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2023-03-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="zlib" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>zlib-1.2.7-21.el7_9.x86_64.rpm</filename><sum type="sha256">b906a4671893fe9fcf39156ba4033ba9bcd43627435e8b82217568f5d3b997d5</sum></package><package arch="i686" name="minizip-devel" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>minizip-devel-1.2.7-21.el7_9.i686.rpm</filename><sum type="sha256">28334f56db86508ed18a210c742977186328cae7b5472f6f12d4808b65b8192c</sum></package><package arch="x86_64" name="minizip-devel" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>minizip-devel-1.2.7-21.el7_9.x86_64.rpm</filename><sum type="sha256">6ab923ac4a54450364d194e1cedac2302f3c78a3f7d7c7560eb26a03b2565c59</sum></package><package arch="x86_64" name="zlib-devel" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>zlib-devel-1.2.7-21.el7_9.x86_64.rpm</filename><sum type="sha256">bc81ee36a9b0f222e5fca10b578453b8e6981ed0868012df60ab15105629244d</sum></package><package arch="i686" name="zlib-static" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>zlib-static-1.2.7-21.el7_9.i686.rpm</filename><sum type="sha256">520f6ed819c571b365246297f7f7beef2d9d9db1f424556aad8844cefc98eb8e</sum></package><package arch="x86_64" name="zlib-static" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>zlib-static-1.2.7-21.el7_9.x86_64.rpm</filename><sum type="sha256">328f1fe6e08399d03326a68f542ad89ddcb416dfabf1757c67ee372a4c6a8d71</sum></package><package arch="i686" name="minizip" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>minizip-1.2.7-21.el7_9.i686.rpm</filename><sum type="sha256">7620d3f8bd2161803e83754acde308b4b76f47fd13b7a35f4d14973e89b363c1</sum></package><package arch="i686" name="zlib" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>zlib-1.2.7-21.el7_9.i686.rpm</filename><sum type="sha256">4ebd12869bda437316581c42b39b035604ff470992e069d213283e17b7f3acff</sum></package><package arch="i686" name="zlib-devel" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>zlib-devel-1.2.7-21.el7_9.i686.rpm</filename><sum type="sha256">949c7905f39fc96d1c159336a55f1c0e9e22efe2ed5584cb759e7206750f80b3</sum></package><package arch="x86_64" name="minizip" release="21.el7_9" src="zlib-1.2.7-21.el7_9.src.rpm" version="1.2.7"><filename>minizip-1.2.7-21.el7_9.x86_64.rpm</filename><sum type="sha256">afc722f2c605a07221685863675ef9f6607275561c1a95ecd42aeea6d157c357</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37434" id="CVE-2022-37434" title="Zlib: Heap-Based Buffer Over-Read And Overflow In Inflate() In Inflate.C Via A Large Gzip Header Extra Field" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1095" id="RHSA-2023:1095-1" title="Rhsa-2023:1095-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2116639" id="2116639" title="Zlib: Heap-Based Buffer Over-Read And Overflow In Inflate() In Inflate.C Via A Large Gzip Header Extra Field" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1332-1</id><title>Nss</title><description>Security Fix(es): 
* nss: Arbitrary memory write via PKCS 12 (CVE-2023-0767) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-03-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="nss-devel" release="5.el7_9" src="nss-3.79.0-5.el7_9.src.rpm" version="3.79.0"><filename>nss-devel-3.79.0-5.el7_9.x86_64.rpm</filename><sum type="sha256">34ce3134bee9eb51fe1920ee90371c3f8580d7acd476b5fdea6cf12bd7600ec0</sum></package><package arch="x86_64" name="nss-tools" release="5.el7_9" src="nss-3.79.0-5.el7_9.src.rpm" version="3.79.0"><filename>nss-tools-3.79.0-5.el7_9.x86_64.rpm</filename><sum type="sha256">0d669b9c5f62827ce1be6a066d8f5ab4881ecb66c4e37940865e839b6f386029</sum></package><package arch="i686" name="nss-devel" release="5.el7_9" src="nss-3.79.0-5.el7_9.src.rpm" version="3.79.0"><filename>nss-devel-3.79.0-5.el7_9.i686.rpm</filename><sum type="sha256">a19367f29460d9ca333423ed010bc7bd5cc91c05ce4ffaa8affc9e190e2a9b86</sum></package><package arch="i686" name="nss" release="5.el7_9" src="nss-3.79.0-5.el7_9.src.rpm" version="3.79.0"><filename>nss-3.79.0-5.el7_9.i686.rpm</filename><sum type="sha256">ee56b00c8b952b66513a703df2001a2cb80a22f8a70b9e09b7005c756220d4c2</sum></package><package arch="x86_64" name="nss" release="5.el7_9" src="nss-3.79.0-5.el7_9.src.rpm" version="3.79.0"><filename>nss-3.79.0-5.el7_9.x86_64.rpm</filename><sum type="sha256">f2520c6f279918a8a25d0af46886654a0fee295452dc01d2b314e0fd78b6fb4f</sum></package><package arch="x86_64" name="nss-sysinit" release="5.el7_9" src="nss-3.79.0-5.el7_9.src.rpm" version="3.79.0"><filename>nss-sysinit-3.79.0-5.el7_9.x86_64.rpm</filename><sum type="sha256">d15a95b44c4bf2c0539039b14df3f1144bb6b0ed81735081b3ee6e623d4322ea</sum></package><package arch="i686" name="nss-pkcs11-devel" release="5.el7_9" src="nss-3.79.0-5.el7_9.src.rpm" version="3.79.0"><filename>nss-pkcs11-devel-3.79.0-5.el7_9.i686.rpm</filename><sum type="sha256">1c017b19a750ad2def22e07bd3316737c87d2e82808a8b929203e91ed8583767</sum></package><package arch="x86_64" name="nss-pkcs11-devel" release="5.el7_9" src="nss-3.79.0-5.el7_9.src.rpm" version="3.79.0"><filename>nss-pkcs11-devel-3.79.0-5.el7_9.x86_64.rpm</filename><sum type="sha256">ddfe69109a54ff7b19f4751269ccaeb77bd7defa8b4aa0f975056110c82dbafe</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0767" id="CVE-2023-0767" title="Mozilla: Arbitrary Memory Write Via Pkcs 12 In Nss" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1332" id="RHSA-2023:1332-1" title="Rhsa-2023:1332-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2170377" id="2170377" title="Mozilla: Arbitrary Memory Write Via Pkcs 12 In Nss" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1333-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.9.0 ESR. 
Security Fix(es): 
* Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751) 
* Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176) 
* Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752) 
* Mozilla: Invalid downcast in Worklets (CVE-2023-28162) 
* Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-03-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="3.el7_9" src="firefox-102.9.0-3.el7_9.src.rpm" version="102.9.0"><filename>firefox-102.9.0-3.el7_9.x86_64.rpm</filename><sum type="sha256">a427a7a88bbd42133b1aaaf4008c3fcc07dbad9616aed631c0f49726b156fce8</sum></package><package arch="i686" name="firefox" release="3.el7_9" src="firefox-102.9.0-3.el7_9.src.rpm" version="102.9.0"><filename>firefox-102.9.0-3.el7_9.i686.rpm</filename><sum type="sha256">59d53797253f44aaf180d6cbb4edbcc6eaa79d72c43b37363ecdce3cbdfe6829</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25751" id="CVE-2023-25751" title="Mozilla: Incorrect Code Generation During Jit Compilation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25752" id="CVE-2023-25752" title="Mozilla: Potential Out-Of-Bounds When Accessing Throttled Streams" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28162" id="CVE-2023-28162" title="Mozilla: Invalid Downcast In Worklets" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28164" id="CVE-2023-28164" title="Mozilla: Url Being Dragged From A Removed Cross-Origin Iframe Into The Same Tab Triggered Navigation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28176" id="CVE-2023-28176" title="Mozilla: Memory Safety Bugs Fixed In Firefox 111 And Firefox Esr 102.9" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1333" id="RHSA-2023:1333-1" title="Rhsa-2023:1333-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178458" id="2178458" title="Mozilla: Incorrect Code Generation During Jit Compilation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178460" id="2178460" title="Mozilla: Potential Out-Of-Bounds When Accessing Throttled Streams" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178466" id="2178466" title="Mozilla: Invalid Downcast In Worklets" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178470" id="2178470" title="Mozilla: Url Being Dragged From A Removed Cross-Origin Iframe Into The Same Tab Triggered Navigation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178472" id="2178472" title="Mozilla: Memory Safety Bugs Fixed In Firefox 111 And Firefox Esr 102.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1335-1</id><title>Openssl</title><description>Security Fix(es): 
* openssl: X.400 address type confusion in X.509 GeneralName (CVE-2023-0286) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-03-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="openssl" release="26.el7_9" src="openssl-1.0.2k-26.el7_9.src.rpm" version="1.0.2k"><filename>openssl-1.0.2k-26.el7_9.x86_64.rpm</filename><sum type="sha256">2e31d503681d6e51ffe1b515f01f0dc727f815ff16c44c30e151d1369dea38df</sum></package><package arch="x86_64" epoch="1" name="openssl-static" release="26.el7_9" src="openssl-1.0.2k-26.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-26.el7_9.x86_64.rpm</filename><sum type="sha256">c77c9e6ac83fe42c8effcc805dec484f68e057d40e2dc5357da3239d6c87596f</sum></package><package arch="i686" epoch="1" name="openssl-devel" release="26.el7_9" src="openssl-1.0.2k-26.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-26.el7_9.i686.rpm</filename><sum type="sha256">29934cbf30d318a3c22bf8df0ee8321131d2dafaf96e68ffce5981c2b7a00dde</sum></package><package arch="x86_64" epoch="1" name="openssl-perl" release="26.el7_9" src="openssl-1.0.2k-26.el7_9.src.rpm" version="1.0.2k"><filename>openssl-perl-1.0.2k-26.el7_9.x86_64.rpm</filename><sum type="sha256">5fc16fc71da41b06defadfb576ac263d32ec4d632810feaec2c8797ad169d9ba</sum></package><package arch="x86_64" epoch="1" name="openssl-devel" release="26.el7_9" src="openssl-1.0.2k-26.el7_9.src.rpm" version="1.0.2k"><filename>openssl-devel-1.0.2k-26.el7_9.x86_64.rpm</filename><sum type="sha256">496511b8e774088eb9316cf3f6844619ba665ec80b90e46bd86cf08d75182828</sum></package><package arch="i686" epoch="1" name="openssl-static" release="26.el7_9" src="openssl-1.0.2k-26.el7_9.src.rpm" version="1.0.2k"><filename>openssl-static-1.0.2k-26.el7_9.i686.rpm</filename><sum type="sha256">79b9820ed1c1acdf7cb580cffbfc22a4da3a575ac4a63a00341a0013206b86e7</sum></package><package arch="x86_64" epoch="1" name="openssl-libs" release="26.el7_9" src="openssl-1.0.2k-26.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-26.el7_9.x86_64.rpm</filename><sum type="sha256">2bd1f18958c502d555455c93beae0ecbfb201ca20e3a33f94fddf624f95efbc8</sum></package><package arch="i686" epoch="1" name="openssl-libs" release="26.el7_9" src="openssl-1.0.2k-26.el7_9.src.rpm" version="1.0.2k"><filename>openssl-libs-1.0.2k-26.el7_9.i686.rpm</filename><sum type="sha256">05c3ac671b481f99d8127e80e8ef27d40f3d417f7116726e6ad2bf036cd51ee3</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286" id="CVE-2023-0286" title="Openssl: X.400 Address Type Confusion In X.509 Generalname" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1335" id="RHSA-2023:1335-1" title="Rhsa-2023:1335-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2164440" id="2164440" title="Openssl: X.400 Address Type Confusion In X.509 Generalname" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1401-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.9.0. 
Security Fix(es): 
* Mozilla: Incorrect code generation during JIT compilation (CVE-2023-25751) 
* Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 (CVE-2023-28176) 
* Mozilla: Potential out-of-bounds when accessing throttled streams (CVE-2023-25752) 
* Mozilla: Invalid downcast in Worklets (CVE-2023-28162) 
* Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation (CVE-2023-28164) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-03-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-102.9.0-1.el7_9.src.rpm" version="102.9.0"><filename>thunderbird-102.9.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">aaef7ae5f3ff0fe550f70ff6757c567713337f61bb126f5909ff9ad5de04e06e</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25751" id="CVE-2023-25751" title="Mozilla: Incorrect Code Generation During Jit Compilation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25752" id="CVE-2023-25752" title="Mozilla: Potential Out-Of-Bounds When Accessing Throttled Streams" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28162" id="CVE-2023-28162" title="Mozilla: Invalid Downcast In Worklets" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28164" id="CVE-2023-28164" title="Mozilla: Url Being Dragged From A Removed Cross-Origin Iframe Into The Same Tab Triggered Navigation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28176" id="CVE-2023-28176" title="Mozilla: Memory Safety Bugs Fixed In Firefox 111 And Firefox Esr 102.9" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1401" id="RHSA-2023:1401-1" title="Rhsa-2023:1401-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178458" id="2178458" title="Mozilla: Incorrect Code Generation During Jit Compilation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178460" id="2178460" title="Mozilla: Potential Out-Of-Bounds When Accessing Throttled Streams" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178466" id="2178466" title="Mozilla: Invalid Downcast In Worklets" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178470" id="2178470" title="Mozilla: Url Being Dragged From A Removed Cross-Origin Iframe Into The Same Tab Triggered Navigation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2178472" id="2178472" title="Mozilla: Memory Safety Bugs Fixed In Firefox 111 And Firefox Esr 102.9" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1593</id><title>Important: Httpd Security Update</title><description>The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: HTTP request splitting with mod_rewrite and mod_proxy (CVE-2023-25690)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-04-04 08:38:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="httpd-manual" release="98.sl7_9.7" src="httpd-2.4.6-98.sl7_9.7.src.rpm" version="2.4.6"><filename>httpd-manual-2.4.6-98.sl7_9.7.noarch.rpm</filename><sum type="sha256">10e663ffe1d3b93bec8607a8ed2cef51586ae7574113e23ea5b168df1ba5fb7f</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690" id="CVE-2023-25690" title="Cve-2023-25690" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1593" id="RHSA-2023:1593" title="Important: Httpd Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1593-1</id><title>Httpd</title><description>Security Fix(es): 
* httpd: HTTP request splitting with mod_rewrite and mod_proxy (CVE-2023-25690) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-04-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="httpd-tools" release="98.sl7_9.7" src="httpd-2.4.6-98.sl7_9.7.src.rpm" version="2.4.6"><filename>httpd-tools-2.4.6-98.sl7_9.7.x86_64.rpm</filename><sum type="sha256">b6cf4199858267e8f9762451385d46f87e8ceb75bac0b2de7fe032732fb06203</sum></package><package arch="x86_64" name="httpd" release="98.sl7_9.7" src="httpd-2.4.6-98.sl7_9.7.src.rpm" version="2.4.6"><filename>httpd-2.4.6-98.sl7_9.7.x86_64.rpm</filename><sum type="sha256">3d4bc97a92e7c0bb5425a938a84c21101f25b7b53e825193af04e1fd8892d0df</sum></package><package arch="x86_64" name="mod_session" release="98.sl7_9.7" src="httpd-2.4.6-98.sl7_9.7.src.rpm" version="2.4.6"><filename>mod_session-2.4.6-98.sl7_9.7.x86_64.rpm</filename><sum type="sha256">1ce891dabde1836b2b362c14de6e3aafdcd7c8d5f6de73e64e7f878ccd7d96a2</sum></package><package arch="x86_64" epoch="1" name="mod_ssl" release="98.sl7_9.7" src="httpd-2.4.6-98.sl7_9.7.src.rpm" version="2.4.6"><filename>mod_ssl-2.4.6-98.sl7_9.7.x86_64.rpm</filename><sum type="sha256">49f6fa7cfc5629f66b01e3a18ec3e558dc6722839a3766fc7d2cbe4fc1195b63</sum></package><package arch="x86_64" name="mod_ldap" release="98.sl7_9.7" src="httpd-2.4.6-98.sl7_9.7.src.rpm" version="2.4.6"><filename>mod_ldap-2.4.6-98.sl7_9.7.x86_64.rpm</filename><sum type="sha256">6e05444ce8d8bf1e3a91639b23bf7d128e584646f26949bb215f1446e1837820</sum></package><package arch="x86_64" epoch="1" name="mod_proxy_html" release="98.sl7_9.7" src="httpd-2.4.6-98.sl7_9.7.src.rpm" version="2.4.6"><filename>mod_proxy_html-2.4.6-98.sl7_9.7.x86_64.rpm</filename><sum type="sha256">1a650a8e1ea9a7d69c3d00dbeb59bb17e6a5c94df65dcb21cf3714c2859f781b</sum></package><package arch="x86_64" name="httpd-devel" release="98.sl7_9.7" src="httpd-2.4.6-98.sl7_9.7.src.rpm" version="2.4.6"><filename>httpd-devel-2.4.6-98.sl7_9.7.x86_64.rpm</filename><sum type="sha256">ecc06f45c96a7758b84341f2d60318bf7b28ff3b318304a73b4dbeccad3249f2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25690" id="CVE-2023-25690" title="Httpd: Http Request Splitting With Mod_Rewrite And Mod_Proxy" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1593" id="RHSA-2023:1593-1" title="Rhsa-2023:1593-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2176209" id="2176209" title="Httpd: Http Request Splitting With Mod_Rewrite And Mod_Proxy" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1594-1</id><title>Tigervnc And Xorg-X11-Server</title><description>X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon. 
Security Fix(es): 
* xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability (CVE-2023-1393) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-04-04 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-Xdmx" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-23.el7_9.x86_64.rpm</filename><sum type="sha256">97bf7b3f2bb37ae6d3e7a4efa36851013f8dc9b4cec489c2764768a14f8a0790</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-23.el7_9.x86_64.rpm</filename><sum type="sha256">5c4766340029b5da5b87e44f14c9ff40b4d7e939beb439ae4fd922ead3a5a401</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-23.el7_9.x86_64.rpm</filename><sum type="sha256">834e599ec8cf47884775633fa718683d390a944447405f8ff7b99ea05aec1f12</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-23.el7_9.x86_64.rpm</filename><sum type="sha256">62f517a3a48adb938f85b62f362149acdd6be710767e7770a46c37215f66a172</sum></package><package arch="x86_64" name="tigervnc" release="25.el7_9" src="tigervnc-1.8.0-25.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-1.8.0-25.el7_9.x86_64.rpm</filename><sum type="sha256">04671427d8346c9647f78cbdd0268fa1e5f699536f69d5cee4c769baee9b150b</sum></package><package arch="x86_64" name="tigervnc-server" release="25.el7_9" src="tigervnc-1.8.0-25.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-1.8.0-25.el7_9.x86_64.rpm</filename><sum type="sha256">9a0971a52bce35c9630a41c85f52bffcf44546cfbd79cacb99b735206b946f5c</sum></package><package arch="noarch" name="tigervnc-license" release="25.el7_9" src="tigervnc-1.8.0-25.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-license-1.8.0-25.el7_9.noarch.rpm</filename><sum type="sha256">983db28d51982dbfde3db1e7b05dc7702c97f51977ec27ec7b9d3b55d7761d5b</sum></package><package arch="noarch" name="tigervnc-server-applet" release="25.el7_9" src="tigervnc-1.8.0-25.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-applet-1.8.0-25.el7_9.noarch.rpm</filename><sum type="sha256">ebd8ed160da00171c32afe1429bd9d8ceaf34a91af5369bad46fc75d121bb3b2</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-23.el7_9.x86_64.rpm</filename><sum type="sha256">5a14ef83b13c887c9537e214da940725b07ca8b45a50fd17ff63cf4580b45d00</sum></package><package arch="noarch" name="xorg-x11-server-source" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-23.el7_9.noarch.rpm</filename><sum type="sha256">35176bd63454bd00d5b1f0cf5abca716a2d9027dff58a39a1dab81b73a93b091</sum></package><package arch="i686" name="xorg-x11-server-devel" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-23.el7_9.i686.rpm</filename><sum type="sha256">14244e03dbef775e3f5c6518c5ed08869205d39aa9411935fc4c007f9fc9120e</sum></package><package arch="noarch" name="tigervnc-icons" release="25.el7_9" src="tigervnc-1.8.0-25.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-icons-1.8.0-25.el7_9.noarch.rpm</filename><sum type="sha256">f088e39a19cae65c421134424e007808080e02f5479f8c8ab224e3fab6b53aae</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-23.el7_9.x86_64.rpm</filename><sum type="sha256">17d6256f633f77185934d41b63fef31042c96aa996dad9c1e0d65fdf2a861969</sum></package><package arch="x86_64" name="tigervnc-server-module" release="25.el7_9" src="tigervnc-1.8.0-25.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-module-1.8.0-25.el7_9.x86_64.rpm</filename><sum type="sha256">13a0791a7fe89474cd82503b3d573f393f9440dde33dc3e651684b8b25aab271</sum></package><package arch="x86_64" name="tigervnc-server-minimal" release="25.el7_9" src="tigervnc-1.8.0-25.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-minimal-1.8.0-25.el7_9.x86_64.rpm</filename><sum type="sha256">91cf15c11dd54d4faa4450cf63008a4747524ec1cedf6c89ecb9e41b8bcc717f</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-23.el7_9.x86_64.rpm</filename><sum type="sha256">3467bf8a152e43b9bef7a27bd16715c5e3fa540e59fb5a33fb4b6aa4bc6e71b7</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="23.el7_9" src="xorg-x11-server-1.20.4-23.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-23.el7_9.x86_64.rpm</filename><sum type="sha256">e46d1a09f68e8b9c5c3fc265d0444d94ca0247c6f795ade8ffa4e2f3063d3d93</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1393" id="CVE-2023-1393" title="Xorg-X11-Server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1594" id="RHSA-2023:1594-1" title="Rhsa-2023:1594-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2180288" id="2180288" title="Xorg-X11-Server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1791-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.10.0 ESR. 
Security Fix(es): 
* MFSA-TMP-2023-0001 Mozilla: Double-free in libwebp 
* Mozilla: Fullscreen notification obscured (CVE-2023-29533) 
* Mozilla: Potential Memory Corruption following Garbage Collector compaction (CVE-2023-29535) 
* Mozilla: Invalid free from JavaScript code (CVE-2023-29536) 
* Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 (CVE-2023-29550) 
* Mozilla: Memory Corruption in Safe Browsing Code (CVE-2023-1945) 
* Mozilla: Content-Disposition filename truncation leads to Reflected File Download (CVE-2023-29539) 
* Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux (CVE-2023-29541) 
* Mozilla: Incorrect optimization result on ARM64 (CVE-2023-29548) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-04-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-102.10.0-1.el7_9.src.rpm" version="102.10.0"><filename>firefox-102.10.0-1.el7_9.i686.rpm</filename><sum type="sha256">4b88e59f89bd15b2d7dffa6ae1fd994a9adc1906332c85530f2d93a4739498d6</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-102.10.0-1.el7_9.src.rpm" version="102.10.0"><filename>firefox-102.10.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">1971c8dd433daf282cc606e06d8148c6771731090d0fd0c3345fcae01055ac8b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1945" id="CVE-2023-1945" title="Mozilla: Memory Corruption In Safe Browsing Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29533" id="CVE-2023-29533" title="Mozilla: Fullscreen Notification Obscured" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29535" id="CVE-2023-29535" title="Mozilla: Potential Memory Corruption Following Garbage Collector Compaction" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29536" id="CVE-2023-29536" title="Mozilla: Invalid Free From Javascript Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29539" id="CVE-2023-29539" title="Mozilla: Content-Disposition Filename Truncation Leads To Reflected File Download" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29541" id="CVE-2023-29541" title="Mozilla: Files With Malicious Extensions Could Have Been Downloaded Unsafely On Linux" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29548" id="CVE-2023-29548" title="Mozilla: Incorrect Optimization Result On Arm64" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29550" id="CVE-2023-29550" title="Mozilla: Memory Safety Bugs Fixed In Firefox 112 And Firefox Esr 102.10" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1791" id="RHSA-2023:1791-1" title="Rhsa-2023:1791-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186101" id="2186101" title="Mozilla: Fullscreen Notification Obscured" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186102" id="2186102" title="Mfsa-Tmp-2023-0001 Mozilla: Double-Free In Libwebp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186103" id="2186103" title="Mozilla: Potential Memory Corruption Following Garbage Collector Compaction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186104" id="2186104" title="Mozilla: Invalid Free From Javascript Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186105" id="2186105" title="Mozilla: Content-Disposition Filename Truncation Leads To Reflected File Download" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186106" id="2186106" title="Mozilla: Files With Malicious Extensions Could Have Been Downloaded Unsafely On Linux" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186109" id="2186109" title="Mozilla: Memory Corruption In Safe Browsing Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186110" id="2186110" title="Mozilla: Incorrect Optimization Result On Arm64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186111" id="2186111" title="Mozilla: Memory Safety Bugs Fixed In Firefox 112 And Firefox Esr 102.10" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1806-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.10.0. 
Security Fix(es): 
* Thunderbird: Revocation status of S/Mime recipient certificates was not checked (CVE-2023-0547) 
* Mozilla: Matrix SDK bundled with Thunderbird vulnerable to  denial-of- service attack (CVE-2023-28427) 
* Mozilla: Fullscreen notification obscured (CVE-2023-29533) 
* Mozilla: Potential Memory Corruption following Garbage Collector compaction (CVE-2023-29535) 
* Mozilla: Invalid free from JavaScript code (CVE-2023-29536) 
* Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 (CVE-2023-29550) 
* Mozilla: Memory Corruption in Safe Browsing Code (CVE-2023-1945) 
* Thunderbird: Hang when processing certain OpenPGP messages (CVE-2023-29479) 
* Mozilla: Content-Disposition filename truncation leads to Reflected File Download (CVE-2023-29539) 
* Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux (CVE-2023-29541) 
* Mozilla: Incorrect optimization result on ARM64 (CVE-2023-29548) 
* MFSA-TMP-2023-0001 Mozilla: Double-free in libwebp 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-04-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-102.10.0-2.el7_9.src.rpm" version="102.10.0"><filename>thunderbird-102.10.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">1c30a55a7773ed392b56df4f614bf0542653fd91f7a7b5b2a648d2912dd559a9</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0547" id="CVE-2023-0547" title="Thunderbird: Revocation Status Of S/Mime Recipient Certificates Was Not Checked" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1945" id="CVE-2023-1945" title="Mozilla: Memory Corruption In Safe Browsing Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28427" id="CVE-2023-28427" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To Denial-Of-Service Attack" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29479" id="CVE-2023-29479" title="Thunderbird: Hang When Processing Certain Openpgp Messages" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29533" id="CVE-2023-29533" title="Mozilla: Fullscreen Notification Obscured" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29535" id="CVE-2023-29535" title="Mozilla: Potential Memory Corruption Following Garbage Collector Compaction" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29536" id="CVE-2023-29536" title="Mozilla: Invalid Free From Javascript Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29539" id="CVE-2023-29539" title="Mozilla: Content-Disposition Filename Truncation Leads To Reflected File Download" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29541" id="CVE-2023-29541" title="Mozilla: Files With Malicious Extensions Could Have Been Downloaded Unsafely On Linux" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29548" id="CVE-2023-29548" title="Mozilla: Incorrect Optimization Result On Arm64" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29550" id="CVE-2023-29550" title="Mozilla: Memory Safety Bugs Fixed In Firefox 112 And Firefox Esr 102.10" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1806" id="RHSA-2023:1806-1" title="Rhsa-2023:1806-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2183278" id="2183278" title="Mozilla: Matrix Sdk Bundled With Thunderbird Vulnerable To Denial-Of-Service Attack" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186101" id="2186101" title="Mozilla: Fullscreen Notification Obscured" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186102" id="2186102" title="Mfsa-Tmp-2023-0001 Mozilla: Double-Free In Libwebp" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186103" id="2186103" title="Mozilla: Potential Memory Corruption Following Garbage Collector Compaction" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186104" id="2186104" title="Mozilla: Invalid Free From Javascript Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186105" id="2186105" title="Mozilla: Content-Disposition Filename Truncation Leads To Reflected File Download" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186106" id="2186106" title="Mozilla: Files With Malicious Extensions Could Have Been Downloaded Unsafely On Linux" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186109" id="2186109" title="Mozilla: Memory Corruption In Safe Browsing Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186110" id="2186110" title="Mozilla: Incorrect Optimization Result On Arm64" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186111" id="2186111" title="Mozilla: Memory Safety Bugs Fixed In Firefox 112 And Firefox Esr 102.10" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186734" id="2186734" title="Thunderbird: Revocation Status Of S/Mime Recipient Certificates Was Not Checked" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186735" id="2186735" title="Thunderbird: Hang When Processing Certain Openpgp Messages" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1875</id><title>Important: Java-11-Openjdk Security Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-04-20 13:33:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-demo-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">ca044ee07327b954b4aff68d9abf78d153a77c58f605be2b722e8cabb54ebee0</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-jmods-debug-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">df4208141f7ba687db292f880890b548ad5137f1723d26c58d134421dfd3f484</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-src-debug-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">893b77a830554f328e04b4b4175516ae2cecfed146daac80e6d21c01f28fc631</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-demo-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">5ce3e0b5c15c5a458d1ab4b0aed61ebe2ca8f6f5d90183675c3534d3acd7c0a4</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-src-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">0521427a43634e0bcb5235a172a09ce2938c3ff33f4d03fe660e33078b9249a2</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-headless-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">1bcd0ac8c3c793004a05e1a20a23b19127a964e7ee34ec57570abb2cfd25897a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">3eff7cecbe2e857bec3fdaf3911f021eb8731c6023da45671d315bad6510b25b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-jmods-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">14339f857ef1c2eeb77945e298c3fa4762a10fb16fef2bbe9d8c39ee6304e2e9</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-javadoc-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">8d3f8771540dc157c943f36685da8ee39f5f8a4fbfb6b9544164a255feab788d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-devel-debug-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">368f46f7268fafdb3c579111305d4f7ec7ec3c1ce938aa01312c9ffa2b8ea772</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-demo-debug-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">966c80b7f3c3e97c3be19ab2e037202e5a530518918897217e55a0d2eda58b5b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-debug-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">5d3ad55933a600443139b9639e74211c56e605e5dc5ddcd3f34a992c254f57fe</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-devel-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">c945c271b8a7fa135263b37a727bcb633fbad9901a9b253d7feb2a380c0b8bb0</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">ce9ed1c9d3076c33543fda913bdea950b7892a007bca45953cc54b34dbd4d7c7</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-headless-debug-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">ce7b0839a2ee5e74efd3b5ec54c0456afdd51a5cc82947087b4c4c7b735443b7</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-javadoc-zip-debug-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">697d64355c9693a6bb54d851d774c842bf46b5da410b241aa89fab6e9b27d86e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-javadoc-debug-11.0.19.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">e27543f31898a2b72dc1687122ea3677eceabe93f618d77567dbec358d34cef5</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930" id="CVE-2023-21930" title="Cve-2023-21930" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937" id="CVE-2023-21937" title="Cve-2023-21937" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938" id="CVE-2023-21938" title="Cve-2023-21938" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939" id="CVE-2023-21939" title="Cve-2023-21939" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954" id="CVE-2023-21954" title="Cve-2023-21954" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967" id="CVE-2023-21967" title="Cve-2023-21967" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968" id="CVE-2023-21968" title="Cve-2023-21968" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1875" id="RHSA-2023:1875" title="Important: Java-11-Openjdk Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1899-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) 
* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) 
* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) 
* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) 
* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) 
* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) 
* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-04-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-javadoc-debug-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">e7d7dcca1e81bf498dd349ae60f174446b068ce267e7ad6f503ef9b4954c2fa3</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-static-libs-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">3da89a9ffafce0f76610f0d5ff3b3ddaaaa7b0602106f6be67a1957f829bd8c6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-src-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">783b5a5ace4eabbc26c765569f31ff4863e83c81b48696a728bf9e4ee4534556</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">d13185ac7d38f202463ddf655a25d02cef85b71d59acbe56ed0f7d40dc70d2c7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-javadoc-zip-debug-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">79d88f962c73afceafa92655367a00510eb84da07b69f2e773d60208e62034d5</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-static-libs-debug-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">ddeb619b8bb2023b0ebe9bcf192a72ac70be99ce02964f925d14aae0adeda89d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-devel-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">b200923f06dfd3a841c63f1be22c6ee30274787ab0b6ef93865a0531a2796d47</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-javadoc-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">1460d071feb21ff6bc669df2c59314a558d6ae377a0129be52b7f722aa21b591</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-debug-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">f4db844a3283adb1a688769e5489614dcf2a25663a77f0943dadc08676d2a5dc</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-jmods-debug-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">60ffc85fbd4b6440b246fa7f6c7ca08db70bc89dd26c97ce6f2a238b2304944d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-headless-debug-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">2f9282054eaaf1e0966ca3c79fb01604b52b6a736cc18100b48f4f207ac026a1</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-src-debug-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">2c449d2a8bc39812577a9fd2179d4d190a242b7544548665792ab1957319326c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">ff4bac6396cc6032ef5235e742d2901140529240aaca67794b38f123b3e55584</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-demo-debug-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">42589b275de9ea6b01352701fa670321f4ff8ab8097a0cf0c939309ef833d45b</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-headless-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">b98fefbf36becafb610464da95ed028209814f32571e7edbe9747f7538bd2e91</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-devel-debug-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">47443f3d369fa4eb622bf76975a3c62ad614321efbabaf6319bebf02386aa668</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.19.0.7-1.el7_9.src.rpm" version="11.0.19.0.7"><filename>java-11-openjdk-jmods-11.0.19.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">285b1cd3daa192966c20725f318f343e0e93f85e370570a5be2f553ac021b397</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930" id="CVE-2023-21930" title="Openjdk: Improper Connection Handling During Tls Handshake (8294474)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937" id="CVE-2023-21937" title="Openjdk: Missing String Checks For Null Characters (8296622)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938" id="CVE-2023-21938" title="Openjdk: Incorrect Handling Of Null Characters In Processbuilder (8295304)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939" id="CVE-2023-21939" title="Openjdk: Swing Html Parsing Issue (8296832)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954" id="CVE-2023-21954" title="Openjdk: Incorrect Enqueue Of References In Garbage Collector (8298191)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967" id="CVE-2023-21967" title="Openjdk: Certificate Validation Issue In Tls Session Negotiation (8298310)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968" id="CVE-2023-21968" title="Openjdk: Missing Check For Slash Characters In Uri-To-Path Conversion (8298667)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1899" id="RHSA-2023:1899-1" title="Rhsa-2023:1899-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187435" id="2187435" title="Openjdk: Improper Connection Handling During Tls Handshake (8294474)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187441" id="2187441" title="Openjdk: Incorrect Enqueue Of References In Garbage Collector (8298191)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187704" id="2187704" title="Openjdk: Certificate Validation Issue In Tls Session Negotiation (8298310)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187724" id="2187724" title="Openjdk: Swing Html Parsing Issue (8296832)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187758" id="2187758" title="Openjdk: Incorrect Handling Of Null Characters In Processbuilder (8295304)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187790" id="2187790" title="Openjdk: Missing String Checks For Null Characters (8296622)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187802" id="2187802" title="Openjdk: Missing Check For Slash Characters In Uri-To-Path Conversion (8298667)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1904</id><title>Important: Java-1.8.0-Openjdk Security And Bug Fix Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) * OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) * OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) * OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) * OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) * OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) * OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Native code within the OpenJDK code base attempted to call close() on a file descriptor repeatedly if it returned the error code, EINTR. However, the close() native call is not restartable and this caused the virtual machine to crash. The close() call is now only made once. (RHBZ#2159458)
</description><severity>important</severity><issued date="2023-04-25 08:38:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.372.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">646768d83d6251c8eedf888f3915c573c053176902179b5f5a69cc8d37b1ebfa</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">806a3a0b17335ea6d9d1b8c53042e8bae1916f06e1ef5400e97827ef34bfb15f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">1bd2264d72db55590781bac0667f09114c7868d31a9353148fb4740b21934245</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-src-debug-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">d3cf33cd94a93d63544a4fbf673759b44f22933337b3f3b18ee5b8b81aa33606</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-debug-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">b1ff189ca269ee49847a9265cf0988dc998b33e92927fcf811f0c61afe6e8ba1</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">4a97194520016f53ff2f66ec138b36bf53ce65cad09bbe01d96bd386e7293861</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">3ca61ef2ecfbce5403113d58ef935a7c8b9b2b95a247ecda8d58dbcd347397e3</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.372.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">f2aabab9fbc0ef81ca5da7a6ea4e2caa6473df13dd9121e0c021bbfe916fa16b</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930" id="CVE-2023-21930" title="Cve-2023-21930" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937" id="CVE-2023-21937" title="Cve-2023-21937" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938" id="CVE-2023-21938" title="Cve-2023-21938" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939" id="CVE-2023-21939" title="Cve-2023-21939" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954" id="CVE-2023-21954" title="Cve-2023-21954" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967" id="CVE-2023-21967" title="Cve-2023-21967" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968" id="CVE-2023-21968" title="Cve-2023-21968" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1904" id="RHSA-2023:1904" title="Important: Java-1.8.0-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2159458" id="2159458" title="2159458 &#8211; Do Not Restart Close If Errno Is Eintr [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1904-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930) 
* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939) 
* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954) 
* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967) 
* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937) 
* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938) 
* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Native code within the OpenJDK code base attempted to call close() on a file descriptor repeatedly if it returned the error code, EINTR. However, the close() native call is not restartable and this caused the virtual machine to crash. The close() call is now only made once. (RHBZ#2159458)</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-04-25 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">3970da71dbb7d4387ffda5541026805c6155773aa068f9aa2c50f7c1635f40ef</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">b8f5a08a2517c86193fdff4312d88df661c2d1366d5694d5e8d8dd1f4908cfb4</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">1b9c9d2c00fa1860c1a335735c066903dbb2fcb5d535fc757759f4abb3128b24</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">5c509a7695f34dc1ca8aa721bd41db8f1768b9cbb5639571b0554c15244c6361</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">21617911170f00001069a2338b7c3b9a5b6dd725074040579da1eb78a80e96a6</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">df2eec75f6a7373e61d2a3b5a1f2b39ce61d77160466ad77bd1e1fcfc27888ae</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">7c1d3c628dc2aa8ba5868c8503584323e6a85cb243ceab78b237eb8a55110a6e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">44c0732528921c3523825792eb390055db12f5f0dfcfc951e29200853e8a2888</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">9fbac8c8d22e94f89554d198252d5e8603d7627e7ef794466d86b2569cd03e5f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">2805bc614336ff529007801b092c3b638899290d57d3ede83686b5af7ecc797d</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">4cff91774c6f91e91384e2faf2141154e8f52123e68c7cc5bcd5d996df383a6d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-src-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">c3ab8dfc60523f0a92429fd8d33a70da029b9de871be58b8a819a10facad0c2e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">0e7b61f122111dd61463033d0391ff4ba07ca13ba4517ceffec740aca8f79454</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">b81940212cfd79f445033cabe563daeb3596757fd22446f6e61df8541562a0cd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">74da510bb8b01ead3f0dd393642a3632d4de354042276f8759912951838b5540</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">3b0f1a5bb573bbb35d00485b3fd963351cf346d7c39fe4817a8d63c9492fe91c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-src-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">157a01cf2f7272493df845a357a7c4c1386b1656203880886448576c23ef6775</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el7_9.noarch.rpm</filename><sum type="sha256">a2facdb5600ce337d1ade1b1f902d8dd669cdff38f4cfda163c61239ec6b905b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.372.b07-1.el7_9.x86_64.rpm</filename><sum type="sha256">d5bfcfe020159faf6beb324035ef036ea4871292bd296df6e5472bb392d31528</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.372.b07-1.el7_9.src.rpm" version="1.8.0.372.b07"><filename>java-1.8.0-openjdk-src-1.8.0.372.b07-1.el7_9.i686.rpm</filename><sum type="sha256">bc2adc4d0f284b275ed81058992d4c4355c126850d61a8ab0a9a66ac4ce08949</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21930" id="CVE-2023-21930" title="Openjdk: Improper Connection Handling During Tls Handshake (8294474)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21937" id="CVE-2023-21937" title="Openjdk: Missing String Checks For Null Characters (8296622)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21938" id="CVE-2023-21938" title="Openjdk: Incorrect Handling Of Null Characters In Processbuilder (8295304)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21939" id="CVE-2023-21939" title="Openjdk: Swing Html Parsing Issue (8296832)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21954" id="CVE-2023-21954" title="Openjdk: Incorrect Enqueue Of References In Garbage Collector (8298191)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21967" id="CVE-2023-21967" title="Openjdk: Certificate Validation Issue In Tls Session Negotiation (8298310)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-21968" id="CVE-2023-21968" title="Openjdk: Missing Check For Slash Characters In Uri-To-Path Conversion (8298667)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1904" id="RHSA-2023:1904-1" title="Rhsa-2023:1904-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187435" id="2187435" title="Openjdk: Improper Connection Handling During Tls Handshake (8294474)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187441" id="2187441" title="Openjdk: Incorrect Enqueue Of References In Garbage Collector (8298191)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187704" id="2187704" title="Openjdk: Certificate Validation Issue In Tls Session Negotiation (8298310)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187724" id="2187724" title="Openjdk: Swing Html Parsing Issue (8296832)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187758" id="2187758" title="Openjdk: Incorrect Handling Of Null Characters In Processbuilder (8295304)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187790" id="2187790" title="Openjdk: Missing String Checks For Null Characters (8296622)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2187802" id="2187802" title="Openjdk: Missing Check For Slash Characters In Uri-To-Path Conversion (8298667)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:1987-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: memory corruption in usbmon driver (CVE-2022-43750) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* NFSv4.1 : state manager loop TEST_STATEID/OPEN</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2023-04-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-debug-devel" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">de36d46b2412c28856e2a4670ceab1138e88f088b02f688b09d6a4f47dcd1f2c</sum></package><package arch="x86_64" name="kernel" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">23abdf98822a301faf51002e5cd3df3b237663599b54512bf5b3a704d2133f7e</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">5209696d1b9d02fda70665d0c33b8f42a0c2867c8c091ca0fa7ac187092dc610</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">f912c4a8afbb5370c90d0f75f8ec48eadebda3e00a7c8cb3c812a4004121ec00</sum></package><package arch="x86_64" name="perf" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">1f03dbba96d8c0aacd2c650617f689be28fc8fb500504203c7a6afc7e72f337d</sum></package><package arch="noarch" name="kernel-doc" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.90.1.el7.noarch.rpm</filename><sum type="sha256">6c4fd3efe53de4ae2e3efc49baecdca84f4f5bccfa0d7cb2c5e05ef082b42e36</sum></package><package arch="x86_64" name="bpftool" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">f59bfe8f6576b3594181ee0b78c833cebdb4c7ec6f5ea3950a4d863261708de4</sum></package><package arch="x86_64" name="kernel-tools" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">1b51f9afb4bbf819af7e9945ea1bc83859f238da61968c3595e15b9438ef7fd7</sum></package><package arch="x86_64" name="kernel-devel" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">dc586da04a325769bd63167a147befbe92ef90bf73a3b6c62483a33f3eabe18b</sum></package><package arch="x86_64" name="kernel-debug" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">e391d30656de06da5d4f1f021e84b75e97907824f27654997d7e1b6e6d56006d</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.90.1.el7.noarch.rpm</filename><sum type="sha256">c7bf8b4514eb48baae5bf8d71f0f5769459e0e0f2a6ea82b228dbd14afbaae93</sum></package><package arch="x86_64" name="kernel-headers" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">4922ad2e5a87275be7d464a3b2983caf86c777941081f96271a65d66c068018b</sum></package><package arch="x86_64" name="python-perf" release="1160.90.1.el7" src="kernel-3.10.0-1160.90.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.90.1.el7.x86_64.rpm</filename><sum type="sha256">287afd725862c75b3bc9b5a2a6bd6f032963e86c856224219a7a7ab71d3b7987</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43750" id="CVE-2022-43750" title="Kernel: Memory Corruption In Usbmon Driver" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:1987" id="RHSA-2023:1987-1" title="Rhsa-2023:1987-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2151270" id="2151270" title="Kernel: Memory Corruption In Usbmon Driver" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:2077-1</id><title>Libwebp</title><description>Security Fix(es): 
* Mozilla: libwebp: Double-free in libwebp (CVE-2023-1999) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-05-02 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="libwebp-tools" release="11.el7" src="libwebp-0.3.0-11.el7.src.rpm" version="0.3.0"><filename>libwebp-tools-0.3.0-11.el7.x86_64.rpm</filename><sum type="sha256">69ad43f31cdd66bae7427ae8e7675a2473f8ec82a42d9ccc18f3fb8b147f23bc</sum></package><package arch="x86_64" name="libwebp-devel" release="11.el7" src="libwebp-0.3.0-11.el7.src.rpm" version="0.3.0"><filename>libwebp-devel-0.3.0-11.el7.x86_64.rpm</filename><sum type="sha256">d0f7746496279510d8d9349af1eedf768d6a9f6728b052b90c745128df1dc164</sum></package><package arch="i686" name="libwebp-devel" release="11.el7" src="libwebp-0.3.0-11.el7.src.rpm" version="0.3.0"><filename>libwebp-devel-0.3.0-11.el7.i686.rpm</filename><sum type="sha256">acc9073bac4c34b94140c41c00723439d7f8bdb27affd320ba2f6c0f6110a03a</sum></package><package arch="i686" name="libwebp" release="11.el7" src="libwebp-0.3.0-11.el7.src.rpm" version="0.3.0"><filename>libwebp-0.3.0-11.el7.i686.rpm</filename><sum type="sha256">fde748bfb7fb2f89d217f1ce683817d6111d46d5961c517d98af764ae8598aea</sum></package><package arch="x86_64" name="libwebp" release="11.el7" src="libwebp-0.3.0-11.el7.src.rpm" version="0.3.0"><filename>libwebp-0.3.0-11.el7.x86_64.rpm</filename><sum type="sha256">28f595642a9bf838e0c24a74f183e3fe24bb477ecb200018354951c31784f6b2</sum></package><package arch="x86_64" name="libwebp-java" release="11.el7" src="libwebp-0.3.0-11.el7.src.rpm" version="0.3.0"><filename>libwebp-java-0.3.0-11.el7.x86_64.rpm</filename><sum type="sha256">15ac95abcbc2b845c4bef4bba6549f898899e7f7c9df1c5eda18011ea7d24406</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1999" id="CVE-2023-1999" title="Mozilla: Libwebp: Double-Free In Libwebp" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:2077" id="RHSA-2023:2077-1" title="Rhsa-2023:2077-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2186102" id="2186102" title="Mfsa-Tmp-2023-0001 Mozilla: Double-Free In Libwebp" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3137-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.11.0 ESR. 
Security Fix(es): 
* Mozilla: Browser prompts could have been obscured by popups (CVE-2023-32205) 
* Mozilla: Crash in RLBox Expat driver (CVE-2023-32206) 
* Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-32207) 
* Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11 (CVE-2023-32215) 
* Mozilla: Content process crash due to invalid wasm code (CVE-2023-32211) 
* Mozilla: Potential spoof due to obscured address bar (CVE-2023-32212) 
* Mozilla: Potential memory corruption in FileReader::DoReadData() (CVE-2023-32213) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-05-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="2.el7_9" src="firefox-102.11.0-2.el7_9.src.rpm" version="102.11.0"><filename>firefox-102.11.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">e2c2a1d54b202b045157a98bc48bef2d9e30b1946e632dd97f9d3f1eb32e031d</sum></package><package arch="i686" name="firefox" release="2.el7_9" src="firefox-102.11.0-2.el7_9.src.rpm" version="102.11.0"><filename>firefox-102.11.0-2.el7_9.i686.rpm</filename><sum type="sha256">217731f4536be9805e2c725616e4be6b623c1506a35bb55b2086030fcbc2b4e2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205" id="CVE-2023-32205" title="Mozilla: Browser Prompts Could Have Been Obscured By Popups" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206" id="CVE-2023-32206" title="Mozilla: Crash In Rlbox Expat Driver" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207" id="CVE-2023-32207" title="Mozilla: Potential Permissions Request Bypass Via Clickjacking" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211" id="CVE-2023-32211" title="Mozilla: Content Process Crash Due To Invalid Wasm Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212" id="CVE-2023-32212" title="Mozilla: Potential Spoof Due To Obscured Address Bar" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213" id="CVE-2023-32213" title="Mozilla: Potential Memory Corruption In Filereader::Doreaddata()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215" id="CVE-2023-32215" title="Mozilla: Memory Safety Bugs Fixed In Firefox 113 And Firefox Esr 102.11" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3137" id="RHSA-2023:3137-1" title="Rhsa-2023:3137-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196736" id="2196736" title="Mozilla: Browser Prompts Could Have Been Obscured By Popups" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196737" id="2196737" title="Mozilla: Crash In Rlbox Expat Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196738" id="2196738" title="Mozilla: Potential Permissions Request Bypass Via Clickjacking" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196740" id="2196740" title="Mozilla: Content Process Crash Due To Invalid Wasm Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196741" id="2196741" title="Mozilla: Potential Spoof Due To Obscured Address Bar" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196742" id="2196742" title="Mozilla: Potential Memory Corruption In Filereader::Doreaddata()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196753" id="2196753" title="Mozilla: Memory Safety Bugs Fixed In Firefox 113 And Firefox Esr 102.11" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3145-1</id><title>Apr-Util</title><description>Security Fix(es): 
* apr-util: out-of-bounds writes in the apr_base64 (CVE-2022-25147) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-05-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="apr-util-mysql" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-mysql-1.5.2-6.el7_9.1.x86_64.rpm</filename><sum type="sha256">ecbec100c816c813f091b250f8d4472ca80d76347e483adc7f48d49aa224e480</sum></package><package arch="x86_64" name="apr-util-nss" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-nss-1.5.2-6.el7_9.1.x86_64.rpm</filename><sum type="sha256">7df19e8165bbd56b4351b225ece0d4a43893a10dd5bcbf4acb5db7dba6d4f76b</sum></package><package arch="i686" name="apr-util-devel" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-devel-1.5.2-6.el7_9.1.i686.rpm</filename><sum type="sha256">77cee88e27df38a0c49fbe92f4b392e924026cf18b9fef8cbe7accdaf2d6de64</sum></package><package arch="x86_64" name="apr-util-odbc" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-odbc-1.5.2-6.el7_9.1.x86_64.rpm</filename><sum type="sha256">6ff109d36706fc3357c18c1b1d96e6b19233ea875101a8a3a7553c35b322f02a</sum></package><package arch="i686" name="apr-util" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-1.5.2-6.el7_9.1.i686.rpm</filename><sum type="sha256">a10bfc1aff922fa7c434500ada8fe75f96726a33e8a55c4e6e71b02885860dcc</sum></package><package arch="x86_64" name="apr-util-ldap" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-ldap-1.5.2-6.el7_9.1.x86_64.rpm</filename><sum type="sha256">e25308894da281c3d546aca086e3a57f0428e8d01bdf83792fe0036da195439b</sum></package><package arch="x86_64" name="apr-util" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-1.5.2-6.el7_9.1.x86_64.rpm</filename><sum type="sha256">b9dcf09c4b5bb5cb5c8db172f981b3c8043fd17aac07c4e1aed8af74f7284dbf</sum></package><package arch="x86_64" name="apr-util-openssl" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-openssl-1.5.2-6.el7_9.1.x86_64.rpm</filename><sum type="sha256">8a5ece8be05a373617dd4137d523928c8d3a789a142e17b132669e0a80629fb0</sum></package><package arch="x86_64" name="apr-util-devel" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-devel-1.5.2-6.el7_9.1.x86_64.rpm</filename><sum type="sha256">29b315ff9cdfd835b84e0a733d12f6e6bcda0ee7f46ff9aaf9530bea4db0e538</sum></package><package arch="x86_64" name="apr-util-sqlite" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-sqlite-1.5.2-6.el7_9.1.x86_64.rpm</filename><sum type="sha256">9934b4db3804226ad60d97ef34095433b3b413806f877b2eff7fcdee6c4b4e49</sum></package><package arch="x86_64" name="apr-util-pgsql" release="6.el7_9.1" src="apr-util-1.5.2-6.el7_9.1.src.rpm" version="1.5.2"><filename>apr-util-pgsql-1.5.2-6.el7_9.1.x86_64.rpm</filename><sum type="sha256">ccbb8d25374e3a3b0ac4d6a4f53d75abb82e10b611965c16a761907a95e3297b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25147" id="CVE-2022-25147" title="Apr-Util: Out-Of-Bounds Writes In The Apr_Base64" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3145" id="RHSA-2023:3145-1" title="Rhsa-2023:3145-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2169652" id="2169652" title="Apr-Util: Out-Of-Bounds Writes In The Apr_Base64" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3151-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.11.0. 
Security Fix(es): 
* Mozilla: Browser prompts could have been obscured by popups (CVE-2023-32205) 
* Mozilla: Crash in RLBox Expat driver (CVE-2023-32206) 
* Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-32207) 
* Mozilla: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11 (CVE-2023-32215) 
* Mozilla: Content process crash due to invalid wasm code (CVE-2023-32211) 
* Mozilla: Potential spoof due to obscured address bar (CVE-2023-32212) 
* Mozilla: Potential memory corruption in FileReader::DoReadData() (CVE-2023-32213) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-05-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-102.11.0-1.el7_9.src.rpm" version="102.11.0"><filename>thunderbird-102.11.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">83950be333d1640567c94fc1a971c081442598d46e203d365aee10ce5b49e3f8</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32205" id="CVE-2023-32205" title="Mozilla: Browser Prompts Could Have Been Obscured By Popups" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32206" id="CVE-2023-32206" title="Mozilla: Crash In Rlbox Expat Driver" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32207" id="CVE-2023-32207" title="Mozilla: Potential Permissions Request Bypass Via Clickjacking" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32211" id="CVE-2023-32211" title="Mozilla: Content Process Crash Due To Invalid Wasm Code" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32212" id="CVE-2023-32212" title="Mozilla: Potential Spoof Due To Obscured Address Bar" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32213" id="CVE-2023-32213" title="Mozilla: Potential Memory Corruption In Filereader::Doreaddata()" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32215" id="CVE-2023-32215" title="Mozilla: Memory Safety Bugs Fixed In Firefox 113 And Firefox Esr 102.11" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3151" id="RHSA-2023:3151-1" title="Rhsa-2023:3151-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196736" id="2196736" title="Mozilla: Browser Prompts Could Have Been Obscured By Popups" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196737" id="2196737" title="Mozilla: Crash In Rlbox Expat Driver" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196738" id="2196738" title="Mozilla: Potential Permissions Request Bypass Via Clickjacking" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196740" id="2196740" title="Mozilla: Content Process Crash Due To Invalid Wasm Code" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196741" id="2196741" title="Mozilla: Potential Spoof Due To Obscured Address Bar" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196742" id="2196742" title="Mozilla: Potential Memory Corruption In Filereader::Doreaddata()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2196753" id="2196753" title="Mozilla: Memory Safety Bugs Fixed In Firefox 113 And Firefox Esr 102.11" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3263-1</id><title>Git</title><description>Security Fix(es): 
* git: by feeding specially crafted input to `git apply --reject`, a path outside the working tree can be overwritten with partially controlled contents (CVE-2023-25652) 
* git: arbitrary configuration injection when renaming or deleting a section from a configuration file (CVE-2023-29007) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-05-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="perl-Git" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>perl-Git-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">c7b6358ffc05927f5d9a35c27857311630ebd75e9ef07749f33777b29b3d3d52</sum></package><package arch="noarch" name="git-email" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-email-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">97899af62ee4b49b14b3423aae26390a143e6c3bce6ae55155d2faa133fc486e</sum></package><package arch="noarch" name="git-gui" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-gui-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">294d6e517fc935fa5f592e1e91673aa0016f9d1d8a319ebd4c649f971eeaec3b</sum></package><package arch="noarch" name="git-cvs" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-cvs-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">8010fe9f7a9f769ce948649f91321b0f50c10454b8ea402522e89b05b59681c0</sum></package><package arch="x86_64" name="git-gnome-keyring" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-gnome-keyring-1.8.3.1-25.el7_9.x86_64.rpm</filename><sum type="sha256">78438f3c27a923f51e56b7a7b1d3cb53e65697751b833fd7e2f8a8a7a7f98080</sum></package><package arch="noarch" name="git-all" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-all-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">efa5741496687d523e89c33aa496a53e2e81c5f1f739f0890ba0e60fa02915d3</sum></package><package arch="noarch" name="emacs-git-el" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>emacs-git-el-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">0ab9001313770b6d4639542725fe6fe273360ba834f514b6d47e19e7a73b85ca</sum></package><package arch="noarch" name="git-p4" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-p4-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">e22b37264ccb2453f57e7d3f90c9a51f91fc95a312c06e94fffdda160ce0d998</sum></package><package arch="noarch" name="gitweb" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>gitweb-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">ccac8cdd7f8d8e0471b9b486349cd02e2c5e8a38dc886d8e3970a784a105c3fe</sum></package><package arch="x86_64" name="git-daemon" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-daemon-1.8.3.1-25.el7_9.x86_64.rpm</filename><sum type="sha256">4a7893c0ccb2136cef96a3a42d1c976c4708baae1006ab0401e236184119f805</sum></package><package arch="noarch" name="gitk" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>gitk-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">e756ea7f5b1836048bf353e2852378e1d28076550c1e611dbec1753e0c391526</sum></package><package arch="noarch" name="git-bzr" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-bzr-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">88099b0b0b0eac62df45f49512eee7277d55011dd5e1ebe315d4482e92118238</sum></package><package arch="noarch" name="emacs-git" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>emacs-git-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">204e0a02b8a7cb91e7ff10fc3c57ea2e69f3531aa62b2fe30f2a1b7922d0a20b</sum></package><package arch="noarch" name="git-instaweb" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-instaweb-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">3e83eeab3a710c7be5655e2df71272688ff9f0af44b02f2ce1a06bc46bd733d0</sum></package><package arch="x86_64" name="git" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-1.8.3.1-25.el7_9.x86_64.rpm</filename><sum type="sha256">75e09efa67ede28fa48fc303a4b64f88ef0767c7a57862ba207b6c542a8c5129</sum></package><package arch="noarch" name="git-hg" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-hg-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">7dbe6883a220246b72b07b0883b4d5cc6a6394d76fdd54ea15ceb7b968c005cb</sum></package><package arch="noarch" name="perl-Git-SVN" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>perl-Git-SVN-1.8.3.1-25.el7_9.noarch.rpm</filename><sum type="sha256">5dd193a55fb659b5d314001e1658f8a453cb21ee5e08c6bdd3dd5cacdb018290</sum></package><package arch="x86_64" name="git-svn" release="25.el7_9" src="git-1.8.3.1-25.el7_9.src.rpm" version="1.8.3.1"><filename>git-svn-1.8.3.1-25.el7_9.x86_64.rpm</filename><sum type="sha256">58d5775c300153c42aaee661185813841751bf363ed31cf0603f16fcd891f5df</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25652" id="CVE-2023-25652" title="Git: By Feeding Specially Crafted Input To `Git Apply --Reject`, A Path Outside The Working Tree Can Be Overwritten With Partially Controlled Contents" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29007" id="CVE-2023-29007" title="Git: Arbitrary Configuration Injection When Renaming Or Deleting A Section From A Configuration File" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3263" id="RHSA-2023:3263-1" title="Rhsa-2023:3263-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2188333" id="2188333" title="Git: By Feeding Specially Crafted Input To `Git Apply --Reject`, A Path Outside The Working Tree Can Be Overwritten With Partially Controlled Contents" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2188338" id="2188338" title="Git: Arbitrary Configuration Injection When Renaming Or Deleting A Section From A Configuration File" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3481-1</id><title>Emacs</title><description>Security Fix(es): 
* emacs: command injection vulnerability in htmlfontify.el (CVE-2022-48339) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2023-06-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="emacs" release="23.el7_9.1" src="emacs-24.3-23.el7_9.1.src.rpm" version="24.3"><filename>emacs-24.3-23.el7_9.1.x86_64.rpm</filename><sum type="sha256">16429ed85d33e15b552460c1b67de5294986c29daaa3d2c348e33ed9b1915302</sum></package><package arch="noarch" epoch="1" name="emacs-terminal" release="23.el7_9.1" src="emacs-24.3-23.el7_9.1.src.rpm" version="24.3"><filename>emacs-terminal-24.3-23.el7_9.1.noarch.rpm</filename><sum type="sha256">e6304cdcc84e2f3b192eb747f376b7c28385031751e7f32ce62087cd4a4cc996</sum></package><package arch="noarch" epoch="1" name="emacs-el" release="23.el7_9.1" src="emacs-24.3-23.el7_9.1.src.rpm" version="24.3"><filename>emacs-el-24.3-23.el7_9.1.noarch.rpm</filename><sum type="sha256">cd07bf3dce1867952ff000c38af14043a31e2e230afd103c843157a81b64c7ce</sum></package><package arch="noarch" epoch="1" name="emacs-filesystem" release="23.el7_9.1" src="emacs-24.3-23.el7_9.1.src.rpm" version="24.3"><filename>emacs-filesystem-24.3-23.el7_9.1.noarch.rpm</filename><sum type="sha256">52c8fb406a8e2b782b38536fe5e61ce36c031c3824cb32ce88b6bd2e9e6562d8</sum></package><package arch="x86_64" epoch="1" name="emacs-nox" release="23.el7_9.1" src="emacs-24.3-23.el7_9.1.src.rpm" version="24.3"><filename>emacs-nox-24.3-23.el7_9.1.x86_64.rpm</filename><sum type="sha256">379d8bbcd19407c44dc6b00af52973afecf4488c0b57609032725948563c02a3</sum></package><package arch="x86_64" epoch="1" name="emacs-common" release="23.el7_9.1" src="emacs-24.3-23.el7_9.1.src.rpm" version="24.3"><filename>emacs-common-24.3-23.el7_9.1.x86_64.rpm</filename><sum type="sha256">77e5977105cc0b7645f5141a684adc2845813a0205881e1d0239961910937217</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48339" id="CVE-2022-48339" title="Emacs: Command Injection Vulnerability In Htmlfontify.El" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3481" id="RHSA-2023:3481-1" title="Rhsa-2023:3481-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2171989" id="2171989" title="Emacs: Command Injection Vulnerability In Htmlfontify.El" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3555-1</id><title>Python</title><description>Security Fix(es): 
* python: urllib.parse url blocklisting bypass (CVE-2023-24329) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-test" release="93.el7_9" src="python-2.7.5-93.el7_9.src.rpm" version="2.7.5"><filename>python-test-2.7.5-93.el7_9.x86_64.rpm</filename><sum type="sha256">1c508a26d568ab252f09be0a5a9844febd340580a46f9959c8ea9b7bd643c879</sum></package><package arch="i686" name="python-libs" release="93.el7_9" src="python-2.7.5-93.el7_9.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-93.el7_9.i686.rpm</filename><sum type="sha256">74a2f37e515525613a58e2d2e48cdef939554c6e985b556022f7a2fc3da193ba</sum></package><package arch="x86_64" name="python" release="93.el7_9" src="python-2.7.5-93.el7_9.src.rpm" version="2.7.5"><filename>python-2.7.5-93.el7_9.x86_64.rpm</filename><sum type="sha256">c2b14b2623f7080d71a784a26cc0e0917c121879174aed1d7498702cd5f58e48</sum></package><package arch="x86_64" name="python-tools" release="93.el7_9" src="python-2.7.5-93.el7_9.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-93.el7_9.x86_64.rpm</filename><sum type="sha256">a141c7be5f16cb7d79c86a7d217c3c26170f59892f3d8449f155c95ef6bc7163</sum></package><package arch="x86_64" name="python-devel" release="93.el7_9" src="python-2.7.5-93.el7_9.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-93.el7_9.x86_64.rpm</filename><sum type="sha256">c69106bbfeff385d12c48f00f9111f5e9551607cadaed31f7cea6303c465419c</sum></package><package arch="x86_64" name="tkinter" release="93.el7_9" src="python-2.7.5-93.el7_9.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-93.el7_9.x86_64.rpm</filename><sum type="sha256">2af896618aad06c74e7d6aa51f936cd1def6ff4c2cdde61ad56f6c07dc53e989</sum></package><package arch="x86_64" name="python-libs" release="93.el7_9" src="python-2.7.5-93.el7_9.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-93.el7_9.x86_64.rpm</filename><sum type="sha256">a9911b8402a76fb873d4f8954d6ad8c3335a940617273561485f7ac44a10f3d3</sum></package><package arch="x86_64" name="python-debug" release="93.el7_9" src="python-2.7.5-93.el7_9.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-93.el7_9.x86_64.rpm</filename><sum type="sha256">6a649dc6a6ed2a55d9dda6498f1f6fc0aea0e9e059c76f1ca4dcec9415f19cc2</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329" id="CVE-2023-24329" title="Python: Urllib.Parse Url Blocklisting Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3555" id="RHSA-2023:3555-1" title="Rhsa-2023:3555-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2173917" id="2173917" title="Python: Urllib.Parse Url Blocklisting Bypass" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3556-1</id><title>Python3</title><description>Security Fix(es): 
* python: urllib.parse url blocklisting bypass (CVE-2023-24329) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-06-09 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="python3-idle" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-19.el7_9.i686.rpm</filename><sum type="sha256">c3213042d778d496f5b48723f2f16e839754e53017944827b719eba596409007</sum></package><package arch="x86_64" name="python3-libs" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-19.el7_9.x86_64.rpm</filename><sum type="sha256">acc5dc6879fcb54764b1982a828c7bd0d818e94ffa4b7656abf8bac9d2311cc0</sum></package><package arch="i686" name="python3-tkinter" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-19.el7_9.i686.rpm</filename><sum type="sha256">082e297fda5b60c723bf4d11eaf47f2eaf9ffbf10b10e1809432a722d32e4d28</sum></package><package arch="x86_64" name="python3-idle" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-19.el7_9.x86_64.rpm</filename><sum type="sha256">abdbe62fff672d7c8c674af61906edf5de7a1fa2eafcf6ffc991bb4f61c01955</sum></package><package arch="x86_64" name="python3-test" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-19.el7_9.x86_64.rpm</filename><sum type="sha256">9b4d40db2ba3248732de180ffd339f822c98eaab3dc446a63c83e244d3fdf998</sum></package><package arch="i686" name="python3-debug" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-19.el7_9.i686.rpm</filename><sum type="sha256">1d9a91b8ff0dda6a911e2cc7d89c7520736632c95fca8785cbd9e7c937f3c62b</sum></package><package arch="x86_64" name="python3-debug" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-19.el7_9.x86_64.rpm</filename><sum type="sha256">aeabd980724b1d01314f93ee5368b188ace49f641ced64cb03f50c3daf80463e</sum></package><package arch="x86_64" name="python3-devel" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-19.el7_9.x86_64.rpm</filename><sum type="sha256">06c47f05308ffd3e781f031941cf7e06cc0fd06ffb9dffe8191ab667bf295690</sum></package><package arch="i686" name="python3" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-3.6.8-19.el7_9.i686.rpm</filename><sum type="sha256">b403cec0cf4d82052b1f34eab7ee866f48b4a38c847736a878041b92c9274b27</sum></package><package arch="x86_64" name="python3-tkinter" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-19.el7_9.x86_64.rpm</filename><sum type="sha256">3fd7dd673a988c986805ed4ced6f19dc47d44f81aee291626dfcc9ae8f00fb27</sum></package><package arch="i686" name="python3-libs" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-19.el7_9.i686.rpm</filename><sum type="sha256">85efb8f32cb59dd05a7a21f48cc2abe7711b7f2f1d19997cf4328a54e7b12d7b</sum></package><package arch="x86_64" name="python3" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-3.6.8-19.el7_9.x86_64.rpm</filename><sum type="sha256">eb546d5fe026dc6902621e56f6bc958568a1880997534d56ed5fe6b1f0ba3a1c</sum></package><package arch="i686" name="python3-test" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-19.el7_9.i686.rpm</filename><sum type="sha256">d6c13b289c5b6793a34b0b67f88ab0730fb99b111e10adf77ad54e09cbc26358</sum></package><package arch="i686" name="python3-devel" release="19.el7_9" src="python3-3.6.8-19.el7_9.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-19.el7_9.i686.rpm</filename><sum type="sha256">ba765447ce9209db237e4814f289ef966e50753d880e591b84ea9dc9eb8b9032</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24329" id="CVE-2023-24329" title="Python: Urllib.Parse Url Blocklisting Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3556" id="RHSA-2023:3556-1" title="Rhsa-2023:3556-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2173917" id="2173917" title="Python: Urllib.Parse Url Blocklisting Bypass" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3563-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.12.0. 
Security Fix(es): 
* Mozilla: Click-jacking certificate exceptions through rendering lag (CVE-2023-34414) 
* Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 (CVE-2023-34416) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-06-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-102.12.0-1.el7_9.src.rpm" version="102.12.0"><filename>thunderbird-102.12.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">3d6ef4a4906929928258405965ed74368e1a192aa83d0105bc4f25fa1f799885</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414" id="CVE-2023-34414" title="Mozilla: Click-Jacking Certificate Exceptions Through Rendering Lag" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416" id="CVE-2023-34416" title="Mozilla: Memory Safety Bugs Fixed In Firefox 114 And Firefox Esr 102.12" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3563" id="RHSA-2023:3563-1" title="Rhsa-2023:3563-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2212841" id="2212841" title="Mozilla: Click-Jacking Certificate Exceptions Through Rendering Lag" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2212842" id="2212842" title="Mozilla: Memory Safety Bugs Fixed In Firefox 114 And Firefox Esr 102.12" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3579-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.12.0 ESR. 
Security Fix(es): 
* Mozilla: Click-jacking certificate exceptions through rendering lag (CVE-2023-34414) 
* Mozilla: Memory safety bugs fixed in Firefox 114 and Firefox ESR 102.12 (CVE-2023-34416) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-06-14 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-102.12.0-1.el7_9.src.rpm" version="102.12.0"><filename>firefox-102.12.0-1.el7_9.i686.rpm</filename><sum type="sha256">85dd0bd1ea66050ffc9257d0c70173cc9db885ea8ca48b309c830c62eccb0f7e</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-102.12.0-1.el7_9.src.rpm" version="102.12.0"><filename>firefox-102.12.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">b0eda21f63d6600d82d0eea6f78452939b615447a11748b6d3ff9dfca96df831</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34414" id="CVE-2023-34414" title="Mozilla: Click-Jacking Certificate Exceptions Through Rendering Lag" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34416" id="CVE-2023-34416" title="Mozilla: Memory Safety Bugs Fixed In Firefox 114 And Firefox Esr 102.12" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3579" id="RHSA-2023:3579-1" title="Rhsa-2023:3579-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2212841" id="2212841" title="Mozilla: Click-Jacking Certificate Exceptions Through Rendering Lag" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2212842" id="2212842" title="Mozilla: Memory Safety Bugs Fixed In Firefox 114 And Firefox Esr 102.12" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3741-1</id><title>C-Ares</title><description>Security Fix(es): 
* c-ares: 0-byte UDP payload Denial of Service (CVE-2023-32067) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-06-22 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="c-ares-devel" release="3.el7_9.1" src="c-ares-1.10.0-3.el7_9.1.src.rpm" version="1.10.0"><filename>c-ares-devel-1.10.0-3.el7_9.1.i686.rpm</filename><sum type="sha256">4810d2e56485882183e34a8ddb72425fc96df44ff0690bc1d0acb024f9cfcc3c</sum></package><package arch="x86_64" name="c-ares" release="3.el7_9.1" src="c-ares-1.10.0-3.el7_9.1.src.rpm" version="1.10.0"><filename>c-ares-1.10.0-3.el7_9.1.x86_64.rpm</filename><sum type="sha256">2767f9710da7c66679b27ee4c75b0eb4430dcb4a9d7d505a2a4a651218216a7e</sum></package><package arch="x86_64" name="c-ares-devel" release="3.el7_9.1" src="c-ares-1.10.0-3.el7_9.1.src.rpm" version="1.10.0"><filename>c-ares-devel-1.10.0-3.el7_9.1.x86_64.rpm</filename><sum type="sha256">c682f4cea6d4ae48a03518f7d4722b960bfb476a6edf9e96e80c3d43606fbe4b</sum></package><package arch="i686" name="c-ares" release="3.el7_9.1" src="c-ares-1.10.0-3.el7_9.1.src.rpm" version="1.10.0"><filename>c-ares-1.10.0-3.el7_9.1.i686.rpm</filename><sum type="sha256">3bd881548e05c652d368e63a5a8e5487da80fb4dc7e9d59e8489f037d8214c1f</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32067" id="CVE-2023-32067" title="C-Ares: 0-Byte Udp Payload Denial Of Service" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3741" id="RHSA-2023:3741-1" title="Rhsa-2023:3741-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2209502" id="2209502" title="C-Ares: 0-Byte Udp Payload Denial Of Service" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:3944-1</id><title>Open-Vm-Tools</title><description>Security Fix(es): 
* open-vm-tools: authentication bypass vulnerability in the vgauth module (CVE-2023-20867) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* [ESXi] [SL7] vmtoolsd task is blocked in the uninterruptible state while attempting to delete (unlink) the file 'quiesce_manifest.xml' 
* [ESXi][SL7.9][open-vm-tools] Snapshot of the SL7 guest on the VMWare ESXi hypervisor failed vm hangs</description><severity>low</severity><release>Scientific Linux</release><issued date="2023-06-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="open-vm-tools-desktop" release="3.el7_9.6" src="open-vm-tools-11.0.5-3.el7_9.6.src.rpm" version="11.0.5"><filename>open-vm-tools-desktop-11.0.5-3.el7_9.6.x86_64.rpm</filename><sum type="sha256">583a5c038ff4273c49f1bbaedd4c4fe343c81f9d4ddffcca1ac64a27cba33b63</sum></package><package arch="x86_64" name="open-vm-tools-devel" release="3.el7_9.6" src="open-vm-tools-11.0.5-3.el7_9.6.src.rpm" version="11.0.5"><filename>open-vm-tools-devel-11.0.5-3.el7_9.6.x86_64.rpm</filename><sum type="sha256">e50c2f59eebd90a27a7c4b05f3ea63a278ef1587a393736a4a46837a2240e6e7</sum></package><package arch="x86_64" name="open-vm-tools-test" release="3.el7_9.6" src="open-vm-tools-11.0.5-3.el7_9.6.src.rpm" version="11.0.5"><filename>open-vm-tools-test-11.0.5-3.el7_9.6.x86_64.rpm</filename><sum type="sha256">dd3dbeab07c3601f04fd9276645e4d879bfb2591dbf218106a4679bc3f2d0e8f</sum></package><package arch="x86_64" name="open-vm-tools" release="3.el7_9.6" src="open-vm-tools-11.0.5-3.el7_9.6.src.rpm" version="11.0.5"><filename>open-vm-tools-11.0.5-3.el7_9.6.x86_64.rpm</filename><sum type="sha256">d91ad175421f9064d2b465745ffb5522d929f0ac6931a66fa5c9a45dcd359603</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20867" id="CVE-2023-20867" title="Open-Vm-Tools: Authentication Bypass Vulnerability In The Vgauth Module" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:3944" id="RHSA-2023:3944-1" title="Rhsa-2023:3944-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#low" id="low" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=1994590" id="1994590" title="[Esxi][Rhel7.9][Open-Vm-Tools] Snapshot Of The Rhel7 Guest On The Vmware Esxi Hypervisor Failed Vm Hangs" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2213087" id="2213087" title="Open-Vm-Tools: Authentication Bypass Vulnerability In The Vgauth Module" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4062-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.13.0. 
Security Fix(es): 
* Mozilla: Use-after-free in WebRTC certificate generation (CVE-2023-37201) 
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-37202) 
* Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and  Thunderbird 102.13 (CVE-2023-37211) 
* Mozilla: Fullscreen notification obscured (CVE-2023-37207) 
* Mozilla: Lack of warning when opening Diagcab files (CVE-2023-37208) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-07-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-102.13.0-2.el7_9.src.rpm" version="102.13.0"><filename>thunderbird-102.13.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">457011a565fd0d609ffafae8889642b0098c1782e64d391a7ec242f940aff6ac</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201" id="CVE-2023-37201" title="Mozilla: Use-After-Free In Webrtc Certificate Generation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202" id="CVE-2023-37202" title="Mozilla: Potential Use-After-Free From Compartment Mismatch In Spidermonkey" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207" id="CVE-2023-37207" title="Mozilla: Fullscreen Notification Obscured" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208" id="CVE-2023-37208" title="Mozilla: Lack Of Warning When Opening Diagcab Files" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211" id="CVE-2023-37211" title="Mozilla: Memory Safety Bugs Fixed In Firefox 115, Firefox Esr 102.13, And Thunderbird 102.13" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4062" id="RHSA-2023:4062-1" title="Rhsa-2023:4062-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219747" id="2219747" title="Mozilla: Use-After-Free In Webrtc Certificate Generation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219748" id="2219748" title="Mozilla: Potential Use-After-Free From Compartment Mismatch In Spidermonkey" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219749" id="2219749" title="Mozilla: Fullscreen Notification Obscured" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219750" id="2219750" title="Mozilla: Lack Of Warning When Opening Diagcab Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219751" id="2219751" title="Mozilla: Memory Safety Bugs Fixed In Firefox 115, Firefox Esr 102.13, And Thunderbird 102.13" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4079-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.13.0 ESR. 
Security Fix(es): 
* Mozilla: Use-after-free in WebRTC certificate generation (CVE-2023-37201) 
* Mozilla: Potential use-after-free from compartment mismatch in SpiderMonkey (CVE-2023-37202) 
* Mozilla: Memory safety bugs fixed in Firefox 115, Firefox ESR 102.13, and  Thunderbird 102.13 (CVE-2023-37211) 
* Mozilla: Fullscreen notification obscured (CVE-2023-37207) 
* Mozilla: Lack of warning when opening Diagcab files (CVE-2023-37208) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-07-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="2.el7_9" src="firefox-102.13.0-2.el7_9.src.rpm" version="102.13.0"><filename>firefox-102.13.0-2.el7_9.i686.rpm</filename><sum type="sha256">52525c06ded84e0af82ad1bb583015b6dd976b15c200a89929aea7970ebf182a</sum></package><package arch="x86_64" name="firefox" release="2.el7_9" src="firefox-102.13.0-2.el7_9.src.rpm" version="102.13.0"><filename>firefox-102.13.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">7d5b42ef904a7638edaf85655b8848a9b55128200dc6514220839294a292259a</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37201" id="CVE-2023-37201" title="Mozilla: Use-After-Free In Webrtc Certificate Generation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37202" id="CVE-2023-37202" title="Mozilla: Potential Use-After-Free From Compartment Mismatch In Spidermonkey" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37207" id="CVE-2023-37207" title="Mozilla: Fullscreen Notification Obscured" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37208" id="CVE-2023-37208" title="Mozilla: Lack Of Warning When Opening Diagcab Files" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37211" id="CVE-2023-37211" title="Mozilla: Memory Safety Bugs Fixed In Firefox 115, Firefox Esr 102.13, And Thunderbird 102.13" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4079" id="RHSA-2023:4079-1" title="Rhsa-2023:4079-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219747" id="2219747" title="Mozilla: Use-After-Free In Webrtc Certificate Generation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219748" id="2219748" title="Mozilla: Potential Use-After-Free From Compartment Mismatch In Spidermonkey" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219749" id="2219749" title="Mozilla: Fullscreen Notification Obscured" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219750" id="2219750" title="Mozilla: Lack Of Warning When Opening Diagcab Files" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2219751" id="2219751" title="Mozilla: Memory Safety Bugs Fixed In Firefox 115, Firefox Esr 102.13, And Thunderbird 102.13" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4151-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: use-after-free caused by l2cap_reassemble_sdu() in net/bluetooth/l2cap_core.c (CVE-2022-3564) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* perf record -ag does not capture user space stack frames on s390x 
* SL7.9 - kernel: handle new reply code FILTERED_BY_HYPERVISOR</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-07-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="grub2" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-2.02-0.87.sl7_9.11.0.x86_64.rpm</filename><sum type="sha256">02fdac07bcfcd70a44e58b2b66eacfb4b878d5021d85e5f6121f77a9328b5667</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-extra" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-tools-extra-2.02-0.87.sl7_9.11.0.x86_64.rpm</filename><sum type="sha256">6251a806574027dfd31c399144e35a259a698a3a28c3b2eaa54e6a0f188107f2</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-minimal" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-tools-minimal-2.02-0.87.sl7_9.11.0.x86_64.rpm</filename><sum type="sha256">51a9101328612f9d71fe72c145879aba98a2b5afbdf08e04f5f427f5f3597a1d</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.95.1.el7.noarch.rpm</filename><sum type="sha256">13ddb32f504cbe0194aeead1151afc046b34cace7c5bc5193aed6bea6d4072c0</sum></package><package arch="x86_64" name="fwupdate-efi" release="6.sl7_9" src="fwupdate-12-6.sl7_9.src.rpm" version="12"><filename>fwupdate-efi-12-6.sl7_9.x86_64.rpm</filename><sum type="sha256">b0363c1d769a27dd112cf4beed6f9537c150bb34e384b45e97e90c2a347d4ee2</sum></package><package arch="x86_64" name="kernel-devel" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">d427f4027b89aa13cbc836bcafb6b69a7c335d37b84efc738b9aef1c30395e72</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-efi-ia32-2.02-0.87.sl7_9.11.0.x86_64.rpm</filename><sum type="sha256">acaf931aae56735cabdefc5d99313cac4725e5a2211b19f15562856065856345</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">aa994b7f8e6f91bc84e63169d2c518b4435aef54a487d99b3edea56719ccea1c</sum></package><package arch="x86_64" name="shim-ia32" release="3.sl7" src="shim-signed-15.6-3.sl7.src.rpm" version="15.6"><filename>shim-ia32-15.6-3.sl7.x86_64.rpm</filename><sum type="sha256">39185186a7f6cb0cefcc2c1d26d1dda21996afa9106651c290f8c41b0421abea</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-efi-x64-2.02-0.87.sl7_9.11.0.x86_64.rpm</filename><sum type="sha256">183ae7eb980f05ea13f48d4e2f41c90d34dc8b23817fc19969ca0ef69feb718e</sum></package><package arch="x86_64" name="fwupdate" release="6.sl7_9" src="fwupdate-12-6.sl7_9.src.rpm" version="12"><filename>fwupdate-12-6.sl7_9.x86_64.rpm</filename><sum type="sha256">f05fee0dca5f4736b736d99beec247af393b5f3920e668a98800e582159f24bb</sum></package><package arch="x86_64" name="kernel" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">6ae9d35124a1f80a46ab4f8ad9ad4a4c6237452120f67f04881a22b7cf579e1b</sum></package><package arch="x86_64" name="fwupdate-libs" release="6.sl7_9" src="fwupdate-12-6.sl7_9.src.rpm" version="12"><filename>fwupdate-libs-12-6.sl7_9.x86_64.rpm</filename><sum type="sha256">d01c9c211a1f3d7a0beba4f69ba33a6285d11dbc8477c2a44590600a2644bb2a</sum></package><package arch="noarch" epoch="1" name="grub2-efi-ia32-modules" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-efi-ia32-modules-2.02-0.87.sl7_9.11.0.noarch.rpm</filename><sum type="sha256">31fe7931059e9be7e6bdad1a83a200f77593f86750de08e65fc1b8af0cc6a34a</sum></package><package arch="x86_64" name="python-perf" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">306970c6e447bbeb126a7e99d4524b45a0cc580e5bdd05b30c60bf497ba1b516</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">646b38c30483557716b7a9addd2326eb8be8c30c972d830094895917b94ee58c</sum></package><package arch="x86_64" name="bpftool" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">94cc896650fb6c867857693598868f7e90d7dff12ea92cb57d97c491e5e61482</sum></package><package arch="x86_64" epoch="1" name="grub2-tools" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-tools-2.02-0.87.sl7_9.11.0.x86_64.rpm</filename><sum type="sha256">1f2405d5161a7e40d572c69b539a588a86c5b52608a8040c76236783c25fc617</sum></package><package arch="noarch" epoch="1" name="grub2-common" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-common-2.02-0.87.sl7_9.11.0.noarch.rpm</filename><sum type="sha256">dd912b0a96c6f9aac8dd2c44c40a7a57030b9096745740f69fa71baa2e3a2699</sum></package><package arch="noarch" epoch="1" name="grub2-efi-x64-modules" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-efi-x64-modules-2.02-0.87.sl7_9.11.0.noarch.rpm</filename><sum type="sha256">d26326bb671444d05e22b08e86c63b1efb22eb88e56b619103e09c497c8226e0</sum></package><package arch="noarch" name="kernel-doc" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.95.1.el7.noarch.rpm</filename><sum type="sha256">e917b958908bfe5251fbdee329eea5285e1986be0982e74170ee9beda0630d9d</sum></package><package arch="x86_64" name="shim-x64" release="3.sl7" src="shim-signed-15.6-3.sl7.src.rpm" version="15.6"><filename>shim-x64-15.6-3.sl7.x86_64.rpm</filename><sum type="sha256">37566ff2a06fd123d9213bb8a80c355ec75811dcd769220ff04bb2496db58147</sum></package><package arch="x86_64" name="kernel-debug" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">acc68d033ea9e974d2f6f2041224aff5f46859c6e45c0b97997949bf6add434d</sum></package><package arch="x86_64" name="fwupdate-devel" release="6.sl7_9" src="fwupdate-12-6.sl7_9.src.rpm" version="12"><filename>fwupdate-devel-12-6.sl7_9.x86_64.rpm</filename><sum type="sha256">76179cf91bf69a5f79b595984e40b0a455c76f97779731b2280fed8d72eefd6d</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">f1fceb068c5b4818015623b6b3e87d91effa4ec9d972bf8f01efe5212616907e</sum></package><package arch="x86_64" name="shim-unsigned-x64" release="3.sl7" src="shim-15.6-3.sl7.src.rpm" version="15.6"><filename>shim-unsigned-x64-15.6-3.sl7.x86_64.rpm</filename><sum type="sha256">bdb026643e0ca5cacf8acb7778bb5dc9b09fe7c866ee8f14ccd1ece10450a61e</sum></package><package arch="x86_64" name="kernel-tools" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">32fdbe756f8ed96b782df457240816cd884b0705447ee0a2c0495b7c7d763830</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32-cdboot" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-efi-ia32-cdboot-2.02-0.87.sl7_9.11.0.x86_64.rpm</filename><sum type="sha256">50b51f12a760777c9387ad0e1191da8716f876f3065c894fa52cd0829f8fd131</sum></package><package arch="noarch" epoch="1" name="grub2-pc-modules" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-pc-modules-2.02-0.87.sl7_9.11.0.noarch.rpm</filename><sum type="sha256">d8a8f3c36a67551c955b05eede25d191e50c555f8ac86438772a6db95a0c530d</sum></package><package arch="x86_64" name="shim-unsigned-ia32" release="3.sl7" src="shim-15.6-3.sl7.src.rpm" version="15.6"><filename>shim-unsigned-ia32-15.6-3.sl7.x86_64.rpm</filename><sum type="sha256">2f1541a06e65a2d86848aca2d79f1640955593a7a68eec7a03a5a47d30f3ff76</sum></package><package arch="x86_64" name="kernel-headers" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">dd68286b55ee763dd8fc678c44f263ec5d96c35a4c9fe9786e7cd0cbe153e1ab</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64-cdboot" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-efi-x64-cdboot-2.02-0.87.sl7_9.11.0.x86_64.rpm</filename><sum type="sha256">2db99f7c06c5210819d5f9eb42c9abe0b8d9655d0b77f07ef73c4dae95d96175</sum></package><package arch="x86_64" epoch="1" name="grub2-pc" release="0.87.sl7_9.11.0" src="grub2-2.02-0.87.sl7_9.11.0.src.rpm" version="2.02"><filename>grub2-pc-2.02-0.87.sl7_9.11.0.x86_64.rpm</filename><sum type="sha256">1681e6f273f637765446f401f3eb14c0d731bada9d85f03251efc8804bc51157</sum></package><package arch="x86_64" name="perf" release="1160.95.1.el7" src="kernel-3.10.0-1160.95.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.95.1.el7.x86_64.rpm</filename><sum type="sha256">0376e3997d60d170fce182e5cf2799f5ecb39f38e863b4913c5a993031e684f5</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3564" id="CVE-2022-3564" title="Kernel: Use-After-Free Caused By L2Cap_Reassemble_Sdu() In Net/Bluetooth/L2Cap_Core.C" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4151" id="RHSA-2023:4151-1" title="Rhsa-2023:4151-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2150999" id="2150999" title="Kernel: Use-After-Free Caused By L2Cap_Reassemble_Sdu() In Net/Bluetooth/L2Cap_Core.C" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4152-1</id><title>Bind</title><description>Security Fix(es): 
* bind: named's configured cache size limit can be significantly exceeded (CVE-2023-2828) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-07-18 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">29acbdd8ef76126617364b40e3f2b7329905520c0fc2997cca1943ade2e2f170</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">7b6ad4d11d5f58c4b785a685817819d9887e90dbf5b5ef896f2edfc520d31e44</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.14.i686.rpm</filename><sum type="sha256">66a6af922faa347aaf91e64655d56f5d5b5e0d92890a2ae56f02c70c4864c95e</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">7e5d0f76854bfcfbe47690bb640b238c30e97e54e939c22322536c9d3f1faab0</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.14.i686.rpm</filename><sum type="sha256">6ddd097023193aacaa88687e1a4c37c905a7d9941541c80818654a584728e67f</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.14.i686.rpm</filename><sum type="sha256">a5d4544e806cf573de6fb927d2bb437679f2696a34fa5f792d2b76af32bb0fdb</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">2fb0d462a1b1db1a2725e1e0baf84fb76417bf2856005d9bd57c42907b8f5944</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">9d0985c47e21159f2ecc9df5c8ea8d2d70f5a56bd05aa6ed00ff25b36197c5e0</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">5390ad1a5f2685596965712efe2d275bed051f57873af3ebc42b4c416539c908</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">4a989308307618115dab799fbd00aee4a7f6fe5d19f641b5e77430d452959540</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.14.i686.rpm</filename><sum type="sha256">2bce489aca7599245223ffae177480f2dc3b14e16c637f40a5a0c0890534a3b9</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">7ff549d1ea4277b8cf04054cc499a2ef031e3bc53062ab740d612d3516fc5a20</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">bb0eaaa881ed826216814d893c4ba525c373dd290e9eb74f24da46f40a43cfc4</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">bae52c0b8227daab9989105f72a3a74c7f75cceabd06b9b47d5bb4971eb6e7ab</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.14.i686.rpm</filename><sum type="sha256">0b226d71c582c942d56ca8f9a799ebe69c336b8f097905bfb1fdbaa487202bac</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.14.i686.rpm</filename><sum type="sha256">2846839473093619718e8ea04cd84b4d4f27feb87cfb515d70fa32df7c2d74de</sum></package><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.14.noarch.rpm</filename><sum type="sha256">718ac5e100a00cf62b780e12da17fbdb95ea1e171c609c2f38db53b9aa319d6a</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">aca48ff6d1d75402d11355ed6f532fef4a349812937782dee155e1eca0610460</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">840cda41fd97e0bc0d1665a201486780fde37112cb891fe0b94062ab0f5714da</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">9029c343cea2748a44100b3b0b89315ab0007e45171f7be07d3d0f50d093003c</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.14.i686.rpm</filename><sum type="sha256">9bca8849fb777e9b638fcccb73d988d3b34353f26ce5efc93f02b31fb81f1926</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">574c4f30fafb93115de42de08603fa9bd6f0189f2f06247cb806b0cd4de33392</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.14.i686.rpm</filename><sum type="sha256">e75f71ee6da51243433b0b1e77fbca1b79b3205e1068775255f44eafffc1b966</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.14" src="bind-9.11.4-26.P2.el7_9.14.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.14.x86_64.rpm</filename><sum type="sha256">482ef3dbadd5c64e229c46f6548fc0573e6931d61e126f5be2ff411f6a8af5e0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2828" id="CVE-2023-2828" title="Bind: Named'S Configured Cache Size Limit Can Be Significantly Exceeded" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4152" id="RHSA-2023:4152-1" title="Rhsa-2023:4152-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2216227" id="2216227" title="Bind: Named'S Configured Cache Size Limit Can Be Significantly Exceeded" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4166</id><title>Moderate: Java-1.8.0-Openjdk Security And Bug Fix Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) * OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-07, 8u382) (BZ#2217708)
</description><severity>moderate</severity><issued date="2023-07-21 08:30:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">7c3395ba0672303eeacd383463317845324c1aac2030233d7fea9558fff90549</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-src-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">abfdc2d0ba965927ba438926b19bfddef818fa2ca21eac00c883a8503c092d1b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">0acdfddd0a7621da52715ba0b8b239c1f5f0ee2dd1a5c773c835ca249e20bf0f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-src-debug-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">2ddc1ee4b77ec9cc6bceb4a1e2ea40fe0f47deb48bfd326e384c36ac9d4e409d</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.382.b05-1.el7_9.noarch.rpm</filename><sum type="sha256">aeb291eb0b50c6df8df73995e0d169b30d8cf97bf536fa903e1482fb69575ee7</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.382.b05-1.el7_9.noarch.rpm</filename><sum type="sha256">5de760604ddd497ea668ecf2f0f19d63f3d41595ed6ccbed0d890e6840626418</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">06ed414d6eb74d917f79c66135606b847e084b887f2e7aaec07907cc1ce898d7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">3ff546cd8366a57d4613b8b3329c4002bb5521633b5497eb89a8fa4339cf2073</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">6b4b98b46d82621ea627ea494bcde7a01d57c52f499a3251a2026c7f45e1f5c8</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-debug-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">d5cca96d47139cb3c734101fc7d16eb5da6b8791594b76cc9cb311c0d77b8436</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">bb19016336ad1ffef6ccc598a796d2259b59ba46531c2a4e8ba765475158f440</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">0c8b6ce7646a1b634638dabc81d075cfcb4eddc5f6776f6d7cd2bf7103e358ff</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">1f710135ab14b8921155c51224f1620959c92342f5ed6c4f9e8405eb1fec8ea8</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">324fc8fe94286881f47638b6e0fd83bcd142875e7620d79ce20d80bf130ac238</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045" id="CVE-2023-22045" title="Cve-2023-22045" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049" id="CVE-2023-22049" title="Cve-2023-22049" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4166" id="RHSA-2023:4166" title="Moderate: Java-1.8.0-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2217708" id="2217708" title="2217708 &#8211; Prepare For The Next Quarterly Openjdk Upstream Release (2023-07, 8U382) [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4166-1</id><title>Java-1.8.0-Openjdk</title><description>Security Fix(es): 
* OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) 
* OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Prepare for the next quarterly OpenJDK upstream release (2023-07, 8u382)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2023-07-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-src-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">be2517d7192e20c4080fe95929dfae8a9aea42cab14e7e51c138f6c266d5055c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-headless-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">246498ddacd857113797505382a16215d170259474f568de21cdf337ff0f53ef</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-demo-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">9c426e1a4c65a49038792a46eda61db38172a58b637f04a031cb8dc4de8cd1ca</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-devel-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">b5b7073955ddd948e0c276da88d014744e6e2f2fd6ee40b993eff6af81b8a4fd</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.382.b05-1.el7_9.noarch.rpm</filename><sum type="sha256">93929cce2fa47a2f63ccc5d1e84aa2cb89ffcac2fd09fe915b0e4d2f33145645</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">9ce39f54dfaeec78b581d0b325a8412dd482468778bca0f96a755e38f80736ed</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-accessibility-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">bb44623d2ee60580b7a1a7816d0351bd036210246f3e3fee58c3cfe8719eae06</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-javadoc-1.8.0.382.b05-1.el7_9.noarch.rpm</filename><sum type="sha256">b5d809bd49184057cfaa02919c8737f8ae3c3d2a9bdcb764ac4e19bb9c1cf322</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-src-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">ca822420f5631ceffa2d5652b7666c8c2acde9aaae3d32837dc2295c8a4e1716</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-accessibility-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">61ba3d584fa8f470ae66e0853c79997ae4939c3e81ac78e8e782b29cd7143e60</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-demo-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">e5be3aeb37544ea9645bd3ea4ef068cd56baa4982faba21298ec5db94b461cf1</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-headless-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">c9db4e28c818f4caf37c8ebf7d4db06219799d5bc58f51989d93edefd4ffea8c</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-devel-1.8.0.382.b05-1.el7_9.i686.rpm</filename><sum type="sha256">20fa5eebb058c93de0e25304267aeb15993df86f8e712172fb49e325dd4b2380</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.src.rpm" version="1.8.0.382.b05"><filename>java-1.8.0-openjdk-1.8.0.382.b05-1.el7_9.x86_64.rpm</filename><sum type="sha256">8fea289176fabde82dcb29089c11467714e6a9abf9507fdd3cd6f86f0f658177</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045" id="CVE-2023-22045" title="Openjdk: Array Indexing Integer Overflow Issue (8304468)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049" id="CVE-2023-22049" title="Openjdk: Improper Handling Of Slash Characters In Uri-To-Path Conversion (8305312)" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4166" id="RHSA-2023:4166-1" title="Rhsa-2023:4166-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2221645" id="2221645" title="Openjdk: Array Indexing Integer Overflow Issue (8304468)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2221647" id="2221647" title="Openjdk: Improper Handling Of Slash Characters In Uri-To-Path Conversion (8305312)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4233</id><title>Moderate: Java-11-Openjdk Security And Bug Fix Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: ZIP file parsing infinite loop (8302483) (CVE-2023-22036) * OpenJDK: weakness in AES implementation (8308682) (CVE-2023-22041) * OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) * harfbuzz: OpenJDK: O(n^2) growth via consecutive marks (CVE-2023-25193) * OpenJDK: HTTP client insufficient file name validation (8302475) (CVE-2023-22006) * OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2023-07, 11.0.20) (BZ#2217709)
</description><severity>moderate</severity><issued date="2023-07-21 08:30:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-jmods-debug-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">79edb96529d10ef16a14e2daf18ca1395d47fa641003d863f312355ea68f741e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-debug-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">c8be48c9d252511eec2ccf4cd7fc3fcf707e8d216f95966a6d70f958affc667e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-javadoc-zip-debug-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">20371f5b12456cb60bdeb50594787a9915571aeb4bed66acd480282d857a7deb</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-javadoc-debug-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">f9ae10bed9a2bf684c6e270d4e7462952312530edc183bd7a0c09962419cba8c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-devel-debug-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">a53b63613af856ef8200398dc244c8afa4d2cff0f22263536599d752979620a6</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-debug-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">bb113cc3ec5a057138fb0938f2778346db9a4855c6c6a4a6b46f3e5bebe2c81e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-static-libs-debug-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">3bb27392b418c7c8899fc2e0856d3088e204b078c4dd1dc42cba2533e6055080</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-src-debug-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">28344a7fd67e264329c9b07f5dcd8610dd66e448e5034ce1cf2fa55fcd234b92</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-devel-debug-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">27fddb078f6eb1a9cf97d83adca5712bce9b19d61c0f9f261094530b0daac735</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-src-debug-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">33dc461e2082675b6e346795f300a91acdefa485e9233d3cf39f39b66e1fdae3</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-demo-debug-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">8d383e463fb3b251593c23148d5c2ea67bdc3ba64601dd4ee6b8c2c249a85396</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-headless-debug-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">de3b19406174e17155461c16bbb7ab46d6bab3ea373d9314d96cfbb7b5dea026</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-demo-debug-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">e71b46bf3b51c008b27b18cf8f8b4ab68e8fc6698382531f49ff66caebc79586</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-javadoc-zip-debug-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">b45ea9aee2c7cbf87cf5e1a036fdaff5fc324eb0625524ea8333725f0c3f585f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-headless-debug-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">bfd172cc6c3047b7f2eaf10420625983b90ee8e61e0081b2db7b24e80cea299e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-jmods-debug-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">f931e5668f419210f43e2b6024127623b3fd6428cdb9dc043cb0a1aa036ca660</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-javadoc-debug-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">4718a60737d866d51134e1997539125b97ffe020138b1154e117738222266221</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006" id="CVE-2023-22006" title="Cve-2023-22006" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036" id="CVE-2023-22036" title="Cve-2023-22036" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041" id="CVE-2023-22041" title="Cve-2023-22041" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045" id="CVE-2023-22045" title="Cve-2023-22045" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049" id="CVE-2023-22049" title="Cve-2023-22049" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25193" id="CVE-2023-25193" title="Cve-2023-25193" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4233" id="RHSA-2023:4233" title="Moderate: Java-11-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2217709" id="2217709" title="2217709 &#8211; Prepare For The Next Quarterly Openjdk Upstream Release (2023-07, 11.0.20) [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4233-1</id><title>Java-11-Openjdk</title><description>Security Fix(es): 
* OpenJDK: ZIP file parsing infinite loop (8302483) (CVE-2023-22036) 
* OpenJDK: weakness in AES implementation (8308682) (CVE-2023-22041) 
* OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) 
* harfbuzz: OpenJDK: O(n^2) growth via consecutive marks (CVE-2023-25193) 
* OpenJDK: HTTP client insufficient file name validation (8302475) (CVE-2023-22006) 
* OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* Prepare for the next quarterly OpenJDK upstream release (2023-07, 11.0.20)</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2023-07-24 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-jmods-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">6b81768fbdd28e1f6d21396d5c56c492566e171f0b3ba69d6a53c6899d8e7669</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-devel-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">44d5bb2962cf95018188e0e9322f1cb0749559717925095f014860d9a2d52a51</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-javadoc-zip-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">181fec129c7d9092535329e8c13b10738f5b458b4bfc8e2b35f3d7a849fbf9e8</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-javadoc-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">8d254b5dd60cc5ae65759c71124065eebeadf32795a13e6e6b4c19d3453c5734</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-jmods-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">9fd0134a61497cef62d71c58e257c28984fe6754e417330cc4d3f196e800f4a9</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-devel-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">0c514dc36635d32c240308ef4dfc2b015bcc3c7223d010cf7ddf81ace4f6c9ef</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-javadoc-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">28f51f4e0c1d3b94b428e29c38ff7cde48854235795a347f7bce25e3fc1a011e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-src-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">27a31b28a2db95c6db0a33da9d25fcdf6f29d7a3c8a6c2fbf3a265bebec66a22</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">256fef34638e88b726b4a2f1c25fe1c25f3b9f780bfbf76cd7707df050945ace</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-headless-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">5eee4ef43ef2ae522c24da2c9567c7a10a8e69c762b7388de5a44a094fdc31f4</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-demo-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">e8ccbd4e99b30c1b578777648ae4a22f2925f73051c06ce99f714f6b60bbe707</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-src-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">e4a4b80fd40168ee4be8d2d45724d4732b643a3109f88120835280019c5d1ccb</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-demo-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">fb47826b6a6845ad11f4df022362b11cc86f8f707603371872e06ecc2a338833</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">4277755e41d7df46ee4f348b36b869e49d17408bb01b498245bebd9ead246923</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-javadoc-zip-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">58c77950e50ddc6351ef578222b43c1629ac54bd5dfb8e1739807702af220c16</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-static-libs-11.0.20.0.8-1.el7_9.x86_64.rpm</filename><sum type="sha256">07ef48a92d0025a97f2a3ba7d19df6dbc2e00facba809f2d5dba5d74f097473d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.20.0.8-1.el7_9.src.rpm" version="11.0.20.0.8"><filename>java-11-openjdk-headless-11.0.20.0.8-1.el7_9.i686.rpm</filename><sum type="sha256">8187223a55a7d29c536ef088992487a98eb5d02f73701a501a5b0a5a9973cb4c</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22006" id="CVE-2023-22006" title="Openjdk: Http Client Insufficient File Name Validation (8302475)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22036" id="CVE-2023-22036" title="Openjdk: Zip File Parsing Infinite Loop (8302483)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22041" id="CVE-2023-22041" title="Openjdk: Weakness In Aes Implementation (8308682)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22045" id="CVE-2023-22045" title="Openjdk: Array Indexing Integer Overflow Issue (8304468)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22049" id="CVE-2023-22049" title="Openjdk: Improper Handling Of Slash Characters In Uri-To-Path Conversion (8305312)" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25193" id="CVE-2023-25193" title="Harfbuzz: Allows Attackers To Trigger O(N^2) Growth Via Consecutive Marks" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4233" id="RHSA-2023:4233-1" title="Rhsa-2023:4233-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2167254" id="2167254" title="Harfbuzz: Allows Attackers To Trigger O(N^2) Growth Via Consecutive Marks" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2221619" id="2221619" title="Openjdk: Font Processing Denial Of Service Vulnerability (8301998)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2221626" id="2221626" title="Openjdk: Http Client Insufficient File Name Validation (8302475)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2221634" id="2221634" title="Openjdk: Zip File Parsing Infinite Loop (8302483)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2221645" id="2221645" title="Openjdk: Array Indexing Integer Overflow Issue (8304468)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2221647" id="2221647" title="Openjdk: Improper Handling Of Slash Characters In Uri-To-Path Conversion (8305312)" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2223207" id="2223207" title="Openjdk: Weakness In Aes Implementation (8308682)" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4326-1</id><title>Iperf3</title><description>Security Fix(es): 
* iperf3: memory allocation hazard and crash (CVE-2023-38403) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-07-31 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="iperf3-devel" release="3.el7_9" src="iperf3-3.1.7-3.el7_9.src.rpm" version="3.1.7"><filename>iperf3-devel-3.1.7-3.el7_9.x86_64.rpm</filename><sum type="sha256">e53c0d01885458be4adac152217cf53d799662878939bc5fc691966f389e2f0f</sum></package><package arch="x86_64" name="iperf3" release="3.el7_9" src="iperf3-3.1.7-3.el7_9.src.rpm" version="3.1.7"><filename>iperf3-3.1.7-3.el7_9.x86_64.rpm</filename><sum type="sha256">10a02c97f06d7be475a801b26dd8e756dbe815448697365a2aadfaa1deb0132f</sum></package><package arch="i686" name="iperf3" release="3.el7_9" src="iperf3-3.1.7-3.el7_9.src.rpm" version="3.1.7"><filename>iperf3-3.1.7-3.el7_9.i686.rpm</filename><sum type="sha256">cfceef3822daabf5924b978c72905b741df7d00aaff0701b93f98cbe3c29aed7</sum></package><package arch="i686" name="iperf3-devel" release="3.el7_9" src="iperf3-3.1.7-3.el7_9.src.rpm" version="3.1.7"><filename>iperf3-devel-3.1.7-3.el7_9.i686.rpm</filename><sum type="sha256">3ec8a3704f101c48bf5e1ebb5799a8c4bbab428be5d54c451cae8049349698cb</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38403" id="CVE-2023-38403" title="Iperf3: Memory Allocation Hazard And Crash" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4326" id="RHSA-2023:4326-1" title="Rhsa-2023:4326-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2222204" id="2222204" title="Iperf3: Memory Allocation Hazard And Crash" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4382-1</id><title>Openssh</title><description>Security Fix(es): 
* openssh: Remote code execution in ssh-agent PKCS#11 support (CVE-2023-38408) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-08-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="pam_ssh_agent_auth" release="2.23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="0.10.3"><filename>pam_ssh_agent_auth-0.10.3-2.23.el7_9.i686.rpm</filename><sum type="sha256">15137695c53e2f504a6425d916c4e8d918cde6ea488c14a409e5bea6d383234b</sum></package><package arch="x86_64" name="openssh-server-sysvinit" release="23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="7.4p1"><filename>openssh-server-sysvinit-7.4p1-23.el7_9.x86_64.rpm</filename><sum type="sha256">533d76891a4fd3af080647599d3de4aa93943e29dd2ba22e6cb2099e9297fc57</sum></package><package arch="x86_64" name="openssh-server" release="23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="7.4p1"><filename>openssh-server-7.4p1-23.el7_9.x86_64.rpm</filename><sum type="sha256">e49f21aa861a841c7277185e4773533fdf824307c3bd2a190dbf6a4993534f4e</sum></package><package arch="x86_64" name="openssh-clients" release="23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="7.4p1"><filename>openssh-clients-7.4p1-23.el7_9.x86_64.rpm</filename><sum type="sha256">42ff6594a5706664e867dec3f55c7c5f2f781a76387b4b0fbdd61dc761c122cf</sum></package><package arch="x86_64" name="pam_ssh_agent_auth" release="2.23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="0.10.3"><filename>pam_ssh_agent_auth-0.10.3-2.23.el7_9.x86_64.rpm</filename><sum type="sha256">5f5a93beb057f9d2bd3fc6809afa4bde65bc5cf9e2777ff6ad037b47524bb0d9</sum></package><package arch="x86_64" name="openssh-askpass" release="23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="7.4p1"><filename>openssh-askpass-7.4p1-23.el7_9.x86_64.rpm</filename><sum type="sha256">99e3fab2ddbf75dc3fe4eec47c13b108bcc5f86943ae40c64600b06a5ca13894</sum></package><package arch="x86_64" name="openssh" release="23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="7.4p1"><filename>openssh-7.4p1-23.el7_9.x86_64.rpm</filename><sum type="sha256">46560001f786099f2c23e67c61af9ada89ce46dee0a69c0ab2d9c8fec4928e18</sum></package><package arch="x86_64" name="openssh-keycat" release="23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="7.4p1"><filename>openssh-keycat-7.4p1-23.el7_9.x86_64.rpm</filename><sum type="sha256">c40d827906c9369a9cec60464f73dccca0c426665c52635a716cfdced2f9757b</sum></package><package arch="x86_64" name="openssh-ldap" release="23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="7.4p1"><filename>openssh-ldap-7.4p1-23.el7_9.x86_64.rpm</filename><sum type="sha256">9668bcfc1a63f462660cc217d76fb0cfb95877ffabac224267198051dc9fb002</sum></package><package arch="x86_64" name="openssh-cavs" release="23.el7_9" src="openssh-7.4p1-23.el7_9.src.rpm" version="7.4p1"><filename>openssh-cavs-7.4p1-23.el7_9.x86_64.rpm</filename><sum type="sha256">e4eb00f6b5814dad2c715cfb2570de1665b13cddf60578f8a644b88fb470b02b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38408" id="CVE-2023-38408" title="Openssh: Remote Code Execution In Ssh-Agent Pkcs#11 Support" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4382" id="RHSA-2023:4382-1" title="Rhsa-2023:4382-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2224173" id="2224173" title="Openssh: Remote Code Execution In Ssh-Agent Pkcs#11 Support" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4461-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.14.0 ESR. 
Security Fix(es): 
* Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045) 
* Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046) 
* Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047) 
* Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048) 
* Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049) 
* Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050) 
* Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056) 
* Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057) 
* Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-08-03 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-102.14.0-1.el7_9.src.rpm" version="102.14.0"><filename>firefox-102.14.0-1.el7_9.i686.rpm</filename><sum type="sha256">46d3174db667a468ed9cb3879dbbefb56ba6a15111095d9f94cf9309b018a57d</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-102.14.0-1.el7_9.src.rpm" version="102.14.0"><filename>firefox-102.14.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">773c59b1f0ce9ec001ca836d4986d4ec85972700c21e51b94e5f149abd14b401</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" id="CVE-2023-4045" title="Mozilla: Offscreen Canvas Could Have Bypassed Cross-Origin Restrictions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" id="CVE-2023-4046" title="Mozilla: Incorrect Value Used During Wasm Compilation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" id="CVE-2023-4047" title="Mozilla: Potential Permissions Request Bypass Via Clickjacking" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" id="CVE-2023-4048" title="Mozilla: Crash In Domparser Due To Out-Of-Memory Conditions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" id="CVE-2023-4049" title="Mozilla: Fix Potential Race Conditions When Releasing Platform Objects" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" id="CVE-2023-4050" title="Mozilla: Stack Buffer Overflow In Storagemanager" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" id="CVE-2023-4055" title="Mozilla: Cookie Jar Overflow Caused Unexpected Cookie Jar State" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" id="CVE-2023-4056" title="Mozilla: Memory Safety Bugs Fixed In Firefox 116, Firefox Esr 115.1, Firefox Esr 102.14, Thunderbird 115.1, And Thunderbird 102.14" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4057" id="CVE-2023-4057" title="Mozilla: Memory Safety Bugs Fixed In Firefox 116, Firefox Esr 115.1, And Thunderbird 115.1" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4461" id="RHSA-2023:4461-1" title="Rhsa-2023:4461-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228360" id="2228360" title="Mozilla: Offscreen Canvas Could Have Bypassed Cross-Origin Restrictions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228361" id="2228361" title="Mozilla: Incorrect Value Used During Wasm Compilation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228362" id="2228362" title="Mozilla: Potential Permissions Request Bypass Via Clickjacking" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228363" id="2228363" title="Mozilla: Crash In Domparser Due To Out-Of-Memory Conditions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228364" id="2228364" title="Mozilla: Fix Potential Race Conditions When Releasing Platform Objects" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228365" id="2228365" title="Mozilla: Stack Buffer Overflow In Storagemanager" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228367" id="2228367" title="Mozilla: Cookie Jar Overflow Caused Unexpected Cookie Jar State" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228370" id="2228370" title="Mozilla: Memory Safety Bugs Fixed In Firefox 116, Firefox Esr 115.1, Firefox Esr 102.14, Thunderbird 115.1, And Thunderbird 102.14" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228371" id="2228371" title="Mozilla: Memory Safety Bugs Fixed In Firefox 116, Firefox Esr 115.1, And Thunderbird 115.1" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4495-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.14.0. 
Security Fix(es): 
* Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions (CVE-2023-4045) 
* Mozilla: Incorrect value used during WASM compilation (CVE-2023-4046) 
* Mozilla: Potential permissions request bypass via clickjacking (CVE-2023-4047) 
* Mozilla: Crash in DOMParser due to out-of-memory conditions (CVE-2023-4048) 
* Mozilla: Fix potential race conditions when releasing platform objects (CVE-2023-4049) 
* Mozilla: Stack buffer overflow in StorageManager (CVE-2023-4050) 
* Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 (CVE-2023-4056) 
* Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 (CVE-2023-4057) 
* thunderbird: File Extension Spoofing using the Text Direction Override Character (CVE-2023-3417) 
* Mozilla: Cookie jar overflow caused unexpected cookie jar state (CVE-2023-4055) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-08-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-102.14.0-1.el7_9.src.rpm" version="102.14.0"><filename>thunderbird-102.14.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">90d4ca466a0c27ff92aa361e83fef3d2ad2a24f8ea729dc3ec89a46aab27f924</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3417" id="CVE-2023-3417" title="Thunderbird: File Extension Spoofing Using The Text Direction Override Character" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4045" id="CVE-2023-4045" title="Mozilla: Offscreen Canvas Could Have Bypassed Cross-Origin Restrictions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4046" id="CVE-2023-4046" title="Mozilla: Incorrect Value Used During Wasm Compilation" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4047" id="CVE-2023-4047" title="Mozilla: Potential Permissions Request Bypass Via Clickjacking" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4048" id="CVE-2023-4048" title="Mozilla: Crash In Domparser Due To Out-Of-Memory Conditions" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4049" id="CVE-2023-4049" title="Mozilla: Fix Potential Race Conditions When Releasing Platform Objects" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4050" id="CVE-2023-4050" title="Mozilla: Stack Buffer Overflow In Storagemanager" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4055" id="CVE-2023-4055" title="Mozilla: Cookie Jar Overflow Caused Unexpected Cookie Jar State" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4056" id="CVE-2023-4056" title="Mozilla: Memory Safety Bugs Fixed In Firefox 116, Firefox Esr 115.1, Firefox Esr 102.14, Thunderbird 115.1, And Thunderbird 102.14" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4057" id="CVE-2023-4057" title="Mozilla: Memory Safety Bugs Fixed In Firefox 116, Firefox Esr 115.1, And Thunderbird 115.1" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4495" id="RHSA-2023:4495-1" title="Rhsa-2023:4495-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2225325" id="2225325" title="Thunderbird: File Extension Spoofing Using The Text Direction Override Character" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228360" id="2228360" title="Mozilla: Offscreen Canvas Could Have Bypassed Cross-Origin Restrictions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228361" id="2228361" title="Mozilla: Incorrect Value Used During Wasm Compilation" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228362" id="2228362" title="Mozilla: Potential Permissions Request Bypass Via Clickjacking" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228363" id="2228363" title="Mozilla: Crash In Domparser Due To Out-Of-Memory Conditions" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228364" id="2228364" title="Mozilla: Fix Potential Race Conditions When Releasing Platform Objects" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228365" id="2228365" title="Mozilla: Stack Buffer Overflow In Storagemanager" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228367" id="2228367" title="Mozilla: Cookie Jar Overflow Caused Unexpected Cookie Jar State" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228370" id="2228370" title="Mozilla: Memory Safety Bugs Fixed In Firefox 116, Firefox Esr 115.1, Firefox Esr 102.14, Thunderbird 115.1, And Thunderbird 102.14" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2228371" id="2228371" title="Mozilla: Memory Safety Bugs Fixed In Firefox 116, Firefox Esr 115.1, And Thunderbird 115.1" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4701</id><title>Moderate: Subscription-Manager Security Update</title><description>The subscription-manager packages provide programs and libraries to allow users to manage subscriptions and yum repositories from the Red Hat entitlement platform.
Security Fix(es):
* subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration (CVE-2023-3899)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2023-08-23 08:36:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="subscription-manager-cockpit" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>subscription-manager-cockpit-1.24.52-2.sl7_9.noarch.rpm</filename><sum type="sha256">d4dce8973007bffbdb590385324bb6fd624bdf3bf42f093cc1011ce33043d590</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3899" id="CVE-2023-3899" title="Cve-2023-3899" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4701" id="RHSA-2023:4701" title="Moderate: Subscription-Manager Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4701-1</id><title>Subscription-Manager</title><description>Security Fix(es): 
* subscription-manager: inadequate authorization of com.redhat.RHSM1 D-Bus interface allows local users to modify configuration (CVE-2023-3899) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>moderate</severity><release>Scientific Linux</release><issued date="2023-08-23 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="subscription-manager-plugin-ostree" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>subscription-manager-plugin-ostree-1.24.52-2.sl7_9.x86_64.rpm</filename><sum type="sha256">3aef89a2e5aa34e5153b964de89ed8dc97536a4197eca875550277ba3a329df9</sum></package><package arch="x86_64" name="subscription-manager-initial-setup-addon" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>subscription-manager-initial-setup-addon-1.24.52-2.sl7_9.x86_64.rpm</filename><sum type="sha256">d004be8aedd432c0ea079c964d307e81a2899951816394458e645f88c5466994</sum></package><package arch="x86_64" name="python-syspurpose" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>python-syspurpose-1.24.52-2.sl7_9.x86_64.rpm</filename><sum type="sha256">ac777cf7e2eec23ec0e63b8c373ba4673dfdb5c5667d99d1fee87b23fff2d13f</sum></package><package arch="x86_64" name="subscription-manager-rhsm-certificates" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>subscription-manager-rhsm-certificates-1.24.52-2.sl7_9.x86_64.rpm</filename><sum type="sha256">59bac61f4807e35bfe6ffc7571678a2d01c64c5ac838510fa8f318f58ac36bb1</sum></package><package arch="x86_64" name="subscription-manager-gui" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>subscription-manager-gui-1.24.52-2.sl7_9.x86_64.rpm</filename><sum type="sha256">6fb9aebcc5c57bd532ba287e48d4c86f54096c54d01da06ca6779a2cbc601385</sum></package><package arch="x86_64" name="subscription-manager" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>subscription-manager-1.24.52-2.sl7_9.x86_64.rpm</filename><sum type="sha256">dc72bb7a68002ce37e74d434c63040b2ee393b29fcf70bdbb4dd9c7a7ccd1570</sum></package><package arch="x86_64" name="rhsm-gtk" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>rhsm-gtk-1.24.52-2.sl7_9.x86_64.rpm</filename><sum type="sha256">d039aca531355bf6b59cbfe5391109d27d7b4cbf5d60e0c1abbd7b352cf62671</sum></package><package arch="x86_64" name="subscription-manager-rhsm" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>subscription-manager-rhsm-1.24.52-2.sl7_9.x86_64.rpm</filename><sum type="sha256">65df3cd12882609a31cb34e044827a64bb72e46c7f0a99ec5a9b62a36431d403</sum></package><package arch="x86_64" name="subscription-manager-plugin-container" release="2.sl7_9" src="subscription-manager-1.24.52-2.sl7_9.src.rpm" version="1.24.52"><filename>subscription-manager-plugin-container-1.24.52-2.sl7_9.x86_64.rpm</filename><sum type="sha256">e9b395154b73f1f202917516bbfa4775d16da753e3ba2ec3deafc44316153c7d</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3899" id="CVE-2023-3899" title="Subscription-Manager: Inadequate Authorization Of Com.Redhat.Rhsm1 D-Bus Interface Allows Local Users To Modify Configuration" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4701" id="RHSA-2023:4701-1" title="Rhsa-2023:4701-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#moderate" id="moderate" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2225407" id="2225407" title="Subscription-Manager: Inadequate Authorization Of Com.Redhat.Rhsm1 D-Bus Interface Allows Local Users To Modify Configuration" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4766-1</id><title>Cups</title><description>Security Fix(es): 
* cups: Information leak through Cups-Get-Document operation (CVE-2023-32360) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-08-28 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="cups-devel" release="52.el7_9" src="cups-1.6.3-52.el7_9.src.rpm" version="1.6.3"><filename>cups-devel-1.6.3-52.el7_9.x86_64.rpm</filename><sum type="sha256">7c3cbf4cc374bdfd8015361637a8b8a867b5d1fa69bb7beff755640f23f6c0cc</sum></package><package arch="i686" epoch="1" name="cups-devel" release="52.el7_9" src="cups-1.6.3-52.el7_9.src.rpm" version="1.6.3"><filename>cups-devel-1.6.3-52.el7_9.i686.rpm</filename><sum type="sha256">5504cec28cb1a1e19235afb9c2c56e02ba69aff292d6eef5d78f8d969419ce01</sum></package><package arch="i686" epoch="1" name="cups-libs" release="52.el7_9" src="cups-1.6.3-52.el7_9.src.rpm" version="1.6.3"><filename>cups-libs-1.6.3-52.el7_9.i686.rpm</filename><sum type="sha256">88297a55377748d2933fc8de089f795e27b3865d49e549e260b3fac7215498c2</sum></package><package arch="x86_64" epoch="1" name="cups-client" release="52.el7_9" src="cups-1.6.3-52.el7_9.src.rpm" version="1.6.3"><filename>cups-client-1.6.3-52.el7_9.x86_64.rpm</filename><sum type="sha256">95ca623b83f86e463b49c79bbb19ccec5cf0199fa1ed2271a0e9a2f67148c76a</sum></package><package arch="x86_64" epoch="1" name="cups" release="52.el7_9" src="cups-1.6.3-52.el7_9.src.rpm" version="1.6.3"><filename>cups-1.6.3-52.el7_9.x86_64.rpm</filename><sum type="sha256">5741a6d72fe6c707106827df879c07eb365b69af9fd6eda0c6234f9136df517e</sum></package><package arch="noarch" epoch="1" name="cups-filesystem" release="52.el7_9" src="cups-1.6.3-52.el7_9.src.rpm" version="1.6.3"><filename>cups-filesystem-1.6.3-52.el7_9.noarch.rpm</filename><sum type="sha256">5d1fd0decc17e7916b5d62739789604e57922d2c7b52fd4b12ad62288f188d3f</sum></package><package arch="x86_64" epoch="1" name="cups-ipptool" release="52.el7_9" src="cups-1.6.3-52.el7_9.src.rpm" version="1.6.3"><filename>cups-ipptool-1.6.3-52.el7_9.x86_64.rpm</filename><sum type="sha256">ad6a544566561c17ed080bcdc740b00c63bc540a587e056c9285079b223826d0</sum></package><package arch="x86_64" epoch="1" name="cups-lpd" release="52.el7_9" src="cups-1.6.3-52.el7_9.src.rpm" version="1.6.3"><filename>cups-lpd-1.6.3-52.el7_9.x86_64.rpm</filename><sum type="sha256">8e901dc27343fab9c1d7dcc25456b2817c574fd7e5fee0e00f157ce6e0b1621b</sum></package><package arch="x86_64" epoch="1" name="cups-libs" release="52.el7_9" src="cups-1.6.3-52.el7_9.src.rpm" version="1.6.3"><filename>cups-libs-1.6.3-52.el7_9.x86_64.rpm</filename><sum type="sha256">0485f21088d13e839a97117b8bdbc2430f5d0d9120cde06179f95bbc56802dff</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32360" id="CVE-2023-32360" title="Cups: Information Leak Through Cups-Get-Document Operation" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4766" id="RHSA-2023:4766-1" title="Rhsa-2023:4766-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2230495" id="2230495" title="Cups: Information Leak Through Cups-Get-Document Operation" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4819-1</id><title>Kernel</title><description>Security Fix(es): 
* kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt() (CVE-2023-35788) 
* hw: amd: Cross-Process Information Leak (CVE-2023-20593) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE 
Bug Fix(es): 
* nf_conntrack causing nfs to stall 
* Request to backport upstream commit 5e2d2cc2588b, 26a8b12747c9, and e98fa02c4f2e for SL 7.9.z 
* Fix soft lockup happens in gfs2_dir_get_hash_table()</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-08-30 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">75fddc94eff778849051cd727cde8d2e2eab9f0dbe25819a1d54dea474ba2419</sum></package><package arch="x86_64" name="kernel-headers" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">9480fa13131dc355affd38b22afae1755613b3600b7dfe14699c4747410c227d</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">28326695252bb7d55df1dbaf43cc0761341058093df41ddfb46502f704eeb00b</sum></package><package arch="x86_64" name="kernel-debug" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">fc472728cc201ee91ac0fce414ac4907d6c1ece852952923855f7af882ec7ad9</sum></package><package arch="x86_64" name="perf" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">abce41dd1aee77f661942497306545ac92cb95691348aa373cb66d2ba7ff333e</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.99.1.el7.noarch.rpm</filename><sum type="sha256">9e4dfeb66bac590bd33a26a3790dd3dfddf021f04c63cb11861c56569690d705</sum></package><package arch="x86_64" name="kernel" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">823739028f271b72b7c0eb70e840c904a8b2c7fe1a757ebe819051befaac9a4b</sum></package><package arch="x86_64" name="python-perf" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">4a3bc0876b9b50589d39ff0880f73c65154e7a10a4e70b2c23dee84821f34b77</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">60f1ab6f6adb06f4d334331206fa7a46354fb75c8c10b467c569acdcd60356f0</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">7547e301ec4b71ab1cd94b53e76d74b88fcc61a279c782d4e4184374ab2db0ce</sum></package><package arch="noarch" name="kernel-doc" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.99.1.el7.noarch.rpm</filename><sum type="sha256">40076f29ea2adeb4fc645a3173cce4ffbd86b82d3feb16cdb794d8db0df3e4f6</sum></package><package arch="x86_64" name="bpftool" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">3337d4a5bc9064ab0ff906f5ef8ce2a5f97898ed0755a9d76b507f6797caad8c</sum></package><package arch="x86_64" name="kernel-devel" release="1160.99.1.el7" src="kernel-3.10.0-1160.99.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.99.1.el7.x86_64.rpm</filename><sum type="sha256">cd25d361321788c310c1156e50d2441ae63062eedaf5210068a9261acff274ed</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593" id="CVE-2023-20593" title="Hw: Amd: Cross-Process Information Leak" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35788" id="CVE-2023-35788" title="Kernel: Cls_Flower: Out-Of-Bounds Write In Fl_Set_Geneve_Opt()" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4819" id="RHSA-2023:4819-1" title="Rhsa-2023:4819-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2215768" id="2215768" title="Kernel: Cls_Flower: Out-Of-Bounds Write In Fl_Set_Geneve_Opt()" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2217845" id="2217845" title="Hw: Amd: Cross-Process Information Leak" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:4945-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.15.0. 
Security Fix(es): 
* Mozilla: Memory corruption in IPC CanvasTranslator (CVE-2023-4573) 
* Mozilla: Memory corruption in IPC ColorPickerShownCallback (CVE-2023-4574) 
* Mozilla: Memory corruption in IPC FilePickerShownCallback (CVE-2023-4575) 
* Mozilla: Memory corruption in JIT UpdateRegExpStatics (CVE-2023-4577) 
* Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 (CVE-2023-4584) 
* Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2 (CVE-2023-4585) 
* Mozilla: Full screen notification obscured by file open dialog (CVE-2023-4051) 
* Mozilla: Full screen notification obscured by external program (CVE-2023-4053) 
* Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception (CVE-2023-4578) 
* Mozilla: Push notifications saved to disk unencrypted (CVE-2023-4580) 
* Mozilla: XLL file extensions were downloadable without warnings (CVE-2023-4581) 
* Mozilla: Browsing Context potentially not cleared when closing Private Window (CVE-2023-4583) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-09-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-102.15.0-1.el7_9.src.rpm" version="102.15.0"><filename>thunderbird-102.15.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">46e739eeccfcee1be1adafb14c695e142b04362af9b6817cbffaed4730cfd694</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4051" id="CVE-2023-4051" title="Mozilla: Full Screen Notification Obscured By File Open Dialog" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4053" id="CVE-2023-4053" title="Mozilla: Full Screen Notification Obscured By External Program" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573" id="CVE-2023-4573" title="Mozilla: Memory Corruption In Ipc Canvastranslator" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574" id="CVE-2023-4574" title="Mozilla: Memory Corruption In Ipc Colorpickershowncallback" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575" id="CVE-2023-4575" title="Mozilla: Memory Corruption In Ipc Filepickershowncallback" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4577" id="CVE-2023-4577" title="Mozilla: Memory Corruption In Jit Updateregexpstatics" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4578" id="CVE-2023-4578" title="Mozilla: Error Reporting Methods In Spidermonkey Could Have Triggered An Out Of Memory Exception" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4580" id="CVE-2023-4580" title="Mozilla: Push Notifications Saved To Disk Unencrypted" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581" id="CVE-2023-4581" title="Mozilla: Xll File Extensions Were Downloadable Without Warnings" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4583" id="CVE-2023-4583" title="Mozilla: Browsing Context Potentially Not Cleared When Closing Private Window" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584" id="CVE-2023-4584" title="Mozilla: Memory Safety Bugs Fixed In Firefox 117, Firefox Esr 102.15, Firefox Esr 115.2, Thunderbird 102.15, And Thunderbird 115.2" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4585" id="CVE-2023-4585" title="Mozilla: Memory Safety Bugs Fixed In Firefox 117, Firefox Esr 115.2, And Thunderbird 115.2" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:4945" id="RHSA-2023:4945-1" title="Rhsa-2023:4945-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236071" id="2236071" title="Mozilla: Memory Corruption In Ipc Canvastranslator" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236072" id="2236072" title="Mozilla: Memory Corruption In Ipc Colorpickershowncallback" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236073" id="2236073" title="Mozilla: Memory Corruption In Ipc Filepickershowncallback" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236075" id="2236075" title="Mozilla: Memory Corruption In Jit Updateregexpstatics" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236076" id="2236076" title="Mozilla: Full Screen Notification Obscured By File Open Dialog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236077" id="2236077" title="Mozilla: Error Reporting Methods In Spidermonkey Could Have Triggered An Out Of Memory Exception" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236078" id="2236078" title="Mozilla: Full Screen Notification Obscured By External Program" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236079" id="2236079" title="Mozilla: Push Notifications Saved To Disk Unencrypted" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236080" id="2236080" title="Mozilla: Xll File Extensions Were Downloadable Without Warnings" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236082" id="2236082" title="Mozilla: Browsing Context Potentially Not Cleared When Closing Private Window" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236084" id="2236084" title="Mozilla: Memory Safety Bugs Fixed In Firefox 117, Firefox Esr 102.15, Firefox Esr 115.2, Thunderbird 102.15, And Thunderbird 115.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236086" id="2236086" title="Mozilla: Memory Safety Bugs Fixed In Firefox 117, Firefox Esr 115.2, And Thunderbird 115.2" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5019-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.15.0 ESR. 
Security Fix(es): 
* Mozilla: Memory corruption in IPC CanvasTranslator (CVE-2023-4573) 
* Mozilla: Memory corruption in IPC ColorPickerShownCallback (CVE-2023-4574) 
* Mozilla: Memory corruption in IPC FilePickerShownCallback (CVE-2023-4575) 
* Mozilla: Memory corruption in JIT UpdateRegExpStatics (CVE-2023-4577) 
* Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2 (CVE-2023-4584) 
* Mozilla: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2 (CVE-2023-4585) 
* Mozilla: Full screen notification obscured by file open dialog (CVE-2023-4051) 
* Mozilla: Full screen notification obscured by external program (CVE-2023-4053) 
* Mozilla: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception (CVE-2023-4578) 
* Mozilla: Push notifications saved to disk unencrypted (CVE-2023-4580) 
* Mozilla: XLL file extensions were downloadable without warnings (CVE-2023-4581) 
* Mozilla: Browsing Context potentially not cleared when closing Private Window (CVE-2023-4583) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-09-07 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-102.15.0-1.el7_9.src.rpm" version="102.15.0"><filename>firefox-102.15.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">61891cfbf073416bacb946e6277177b91a65036cbce448a4d9487b556e7962f4</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-102.15.0-1.el7_9.src.rpm" version="102.15.0"><filename>firefox-102.15.0-1.el7_9.i686.rpm</filename><sum type="sha256">a877db6eca1e072036ca6240b94335741438f65df125fbeb18d97deb9d69bd51</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4051" id="CVE-2023-4051" title="Mozilla: Full Screen Notification Obscured By File Open Dialog" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4053" id="CVE-2023-4053" title="Mozilla: Full Screen Notification Obscured By External Program" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4573" id="CVE-2023-4573" title="Mozilla: Memory Corruption In Ipc Canvastranslator" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4574" id="CVE-2023-4574" title="Mozilla: Memory Corruption In Ipc Colorpickershowncallback" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4575" id="CVE-2023-4575" title="Mozilla: Memory Corruption In Ipc Filepickershowncallback" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4577" id="CVE-2023-4577" title="Mozilla: Memory Corruption In Jit Updateregexpstatics" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4578" id="CVE-2023-4578" title="Mozilla: Error Reporting Methods In Spidermonkey Could Have Triggered An Out Of Memory Exception" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4580" id="CVE-2023-4580" title="Mozilla: Push Notifications Saved To Disk Unencrypted" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4581" id="CVE-2023-4581" title="Mozilla: Xll File Extensions Were Downloadable Without Warnings" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4583" id="CVE-2023-4583" title="Mozilla: Browsing Context Potentially Not Cleared When Closing Private Window" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4584" id="CVE-2023-4584" title="Mozilla: Memory Safety Bugs Fixed In Firefox 117, Firefox Esr 102.15, Firefox Esr 115.2, Thunderbird 102.15, And Thunderbird 115.2" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4585" id="CVE-2023-4585" title="Mozilla: Memory Safety Bugs Fixed In Firefox 117, Firefox Esr 115.2, And Thunderbird 115.2" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5019" id="RHSA-2023:5019-1" title="Rhsa-2023:5019-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236071" id="2236071" title="Mozilla: Memory Corruption In Ipc Canvastranslator" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236072" id="2236072" title="Mozilla: Memory Corruption In Ipc Colorpickershowncallback" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236073" id="2236073" title="Mozilla: Memory Corruption In Ipc Filepickershowncallback" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236075" id="2236075" title="Mozilla: Memory Corruption In Jit Updateregexpstatics" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236076" id="2236076" title="Mozilla: Full Screen Notification Obscured By File Open Dialog" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236077" id="2236077" title="Mozilla: Error Reporting Methods In Spidermonkey Could Have Triggered An Out Of Memory Exception" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236078" id="2236078" title="Mozilla: Full Screen Notification Obscured By External Program" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236079" id="2236079" title="Mozilla: Push Notifications Saved To Disk Unencrypted" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236080" id="2236080" title="Mozilla: Xll File Extensions Were Downloadable Without Warnings" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236082" id="2236082" title="Mozilla: Browsing Context Potentially Not Cleared When Closing Private Window" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236084" id="2236084" title="Mozilla: Memory Safety Bugs Fixed In Firefox 117, Firefox Esr 102.15, Firefox Esr 115.2, Thunderbird 102.15, And Thunderbird 115.2" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236086" id="2236086" title="Mozilla: Memory Safety Bugs Fixed In Firefox 117, Firefox Esr 115.2, And Thunderbird 115.2" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5191-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 102.15.1. 
Security Fix(es): 
* libwebp: Heap buffer overflow in WebP Codec (CVE-2023-4863) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-09-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-102.15.1-1.el7_9.src.rpm" version="102.15.1"><filename>thunderbird-102.15.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">ba267354f3ea78058c39dc9a97779e0b13a6b2171755048856938aa03992073b</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863" id="CVE-2023-4863" title="Libwebp: Heap Buffer Overflow In Webp Codec" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5191" id="RHSA-2023:5191-1" title="Rhsa-2023:5191-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2238431" id="2238431" title="Libwebp: Heap Buffer Overflow In Webp Codec" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5197-1</id><title>Firefox</title><description>This update upgrades Firefox to version 102.15.1 ESR. 
Security Fix(es): 
* libwebp: Heap buffer overflow in WebP Codec (CVE-2023-4863) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-09-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-102.15.1-1.el7_9.src.rpm" version="102.15.1"><filename>firefox-102.15.1-1.el7_9.i686.rpm</filename><sum type="sha256">85ef44035e869811a3f97325047aea5e33af2c1caabda824e7776c13b5ad9d4e</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-102.15.1-1.el7_9.src.rpm" version="102.15.1"><filename>firefox-102.15.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">b4551ac8b815861793286454e211a169412783791af0ba5c020e2a9e36f12a88</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4863" id="CVE-2023-4863" title="Libwebp: Heap Buffer Overflow In Webp Codec" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5197" id="RHSA-2023:5197-1" title="Rhsa-2023:5197-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2238431" id="2238431" title="Libwebp: Heap Buffer Overflow In Webp Codec" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5217-1</id><title>Open-Vm-Tools</title><description>Security Fix(es): 
* open-vm-tools: SAML token signature bypass (CVE-2023-20900) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-09-19 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="open-vm-tools-test" release="3.el7_9.7" src="open-vm-tools-11.0.5-3.el7_9.7.src.rpm" version="11.0.5"><filename>open-vm-tools-test-11.0.5-3.el7_9.7.x86_64.rpm</filename><sum type="sha256">823f5bcaaa0eb97d719b79e3db244c2dd67d202054be1d9caef4383f73acc19f</sum></package><package arch="x86_64" name="open-vm-tools-desktop" release="3.el7_9.7" src="open-vm-tools-11.0.5-3.el7_9.7.src.rpm" version="11.0.5"><filename>open-vm-tools-desktop-11.0.5-3.el7_9.7.x86_64.rpm</filename><sum type="sha256">6abe1fc243914c55f8b9c4a529ee935f0c75fb9d8249afd6de81c1b72b9c160d</sum></package><package arch="x86_64" name="open-vm-tools" release="3.el7_9.7" src="open-vm-tools-11.0.5-3.el7_9.7.src.rpm" version="11.0.5"><filename>open-vm-tools-11.0.5-3.el7_9.7.x86_64.rpm</filename><sum type="sha256">5a7d14bd74c028a57867ba8c1d1ba693c9dd4a71176b504fe402adceae895764</sum></package><package arch="x86_64" name="open-vm-tools-devel" release="3.el7_9.7" src="open-vm-tools-11.0.5-3.el7_9.7.src.rpm" version="11.0.5"><filename>open-vm-tools-devel-11.0.5-3.el7_9.7.x86_64.rpm</filename><sum type="sha256">b9640d3d9d1264d159ccd03d4dc2a7ebd04170172e455b679e8c2046765becb7</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20900" id="CVE-2023-20900" title="Open-Vm-Tools: Saml Token Signature Bypass" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5217" id="RHSA-2023:5217-1" title="Rhsa-2023:5217-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2236542" id="2236542" title="Open-Vm-Tools: Saml Token Signature Bypass" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5461-1</id><title>Imagemagick</title><description>Security Fix(es): 
* ImageMagick: Division by zero in ReadEnhMetaFile lead to DoS (CVE-2021-40211) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-10-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="ImageMagick" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-6.9.10.68-7.el7_9.i686.rpm</filename><sum type="sha256">88d53e3471be404073aacd2022f843d43aa504f504e01aaa542f1dfce7c30ef4</sum></package><package arch="x86_64" name="ImageMagick-c++" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-6.9.10.68-7.el7_9.x86_64.rpm</filename><sum type="sha256">f1ef8a6d1457af646a1c6dc6f4c946a41d36b8fc073c2f40982be49691898167</sum></package><package arch="i686" name="ImageMagick-devel" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-devel-6.9.10.68-7.el7_9.i686.rpm</filename><sum type="sha256">b6bf0c4cc6844c9403adc6d56117609c51ee7422f0d38ee24b914f721b7208a9</sum></package><package arch="i686" name="ImageMagick-c++-devel" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-devel-6.9.10.68-7.el7_9.i686.rpm</filename><sum type="sha256">1935210bdf75f03b17edbea60aafce80c36c751efbd7e710642bb3f47338a94c</sum></package><package arch="x86_64" name="ImageMagick" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-6.9.10.68-7.el7_9.x86_64.rpm</filename><sum type="sha256">7aed22ca7f0431ae1c663475b14a974c97ff1c8acd8be1903ed9e103c637f3a2</sum></package><package arch="x86_64" name="ImageMagick-perl" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-perl-6.9.10.68-7.el7_9.x86_64.rpm</filename><sum type="sha256">fb473c30a12109a02292af2b0109fa82b076c6c1868be07bedc1bb9fb743c208</sum></package><package arch="x86_64" name="ImageMagick-doc" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-doc-6.9.10.68-7.el7_9.x86_64.rpm</filename><sum type="sha256">e66939f63c2e5a10e45ff7583c0f6a5e66a7f2b92e8cf14ac6ef2a3b552b46d7</sum></package><package arch="x86_64" name="ImageMagick-devel" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-devel-6.9.10.68-7.el7_9.x86_64.rpm</filename><sum type="sha256">9bd618b50bc740fe658ac25a4e8f4a2d683ccd4104c8c0f84652b388c2b5a03d</sum></package><package arch="i686" name="ImageMagick-c++" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-6.9.10.68-7.el7_9.i686.rpm</filename><sum type="sha256">2ceb28d62d9233df28ab04ede1331fc5e70c2e1a400e8c179b1a0486b14774d3</sum></package><package arch="x86_64" name="ImageMagick-c++-devel" release="7.el7_9" src="ImageMagick-6.9.10.68-7.el7_9.src.rpm" version="6.9.10.68"><filename>ImageMagick-c++-devel-6.9.10.68-7.el7_9.x86_64.rpm</filename><sum type="sha256">554f282b8a2f8ecda2b76fa9b51b4b9e2121579f5e4ca9ff1aeea6576a298136</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40211" id="CVE-2021-40211" title="Imagemagick: Division By Zero In Readenhmetafile Lead To Dos" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5461" id="RHSA-2023:5461-1" title="Rhsa-2023:5461-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2235480" id="2235480" title="Imagemagick: Division By Zero In Readenhmetafile Lead To Dos" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5475-1</id><title>Thunderbird</title><description>This update upgrades Thunderbird to version 115.3.1. 
Security Fix(es): 
* firefox: use-after-free in workers (CVE-2023-3600) 
* Mozilla: Out-of-bounds write in PathOps (CVE-2023-5169) 
* Mozilla: Use-after-free in Ion Compiler (CVE-2023-5171) 
* Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 (CVE-2023-5176) 
* libvpx: Heap buffer overflow in vp8 encoding in libvpx (CVE-2023-5217) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-10-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-115.3.1-1.el7_9.src.rpm" version="115.3.1"><filename>thunderbird-115.3.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">8cab323b2f5657da63859e1c00c841e58c2d089d5cf0fa15633f5065c28579de</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3600" id="CVE-2023-3600" title="Firefox: Use-After-Free In Workers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169" id="CVE-2023-5169" title="Mozilla: Out-Of-Bounds Write In Pathops" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171" id="CVE-2023-5171" title="Mozilla: Use-After-Free In Ion Compiler" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176" id="CVE-2023-5176" title="Mozilla: Memory Safety Bugs Fixed In Firefox 118, Firefox Esr 115.3, And Thunderbird 115.3" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217" id="CVE-2023-5217" title="Libvpx: Heap Buffer Overflow In Vp8 Encoding In Libvpx" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5475" id="RHSA-2023:5475-1" title="Rhsa-2023:5475-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2222652" id="2222652" title="Firefox: Use-After-Free In Workers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2240893" id="2240893" title="Mozilla: Out-Of-Bounds Write In Pathops" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2240894" id="2240894" title="Mozilla: Use-After-Free In Ion Compiler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2240896" id="2240896" title="Mozilla: Memory Safety Bugs Fixed In Firefox 118, Firefox Esr 115.3, And Thunderbird 115.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2241191" id="2241191" title="Libvpx: Heap Buffer Overflow In Vp8 Encoding In Libvpx" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5477-1</id><title>Firefox</title><description>This update upgrades Firefox to version 115.3.1 ESR. 
Security Fix(es): 
* firefox: use-after-free in workers (CVE-2023-3600) 
* Mozilla: Out-of-bounds write in PathOps (CVE-2023-5169) 
* Mozilla: Use-after-free in Ion Compiler (CVE-2023-5171) 
* Mozilla: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 (CVE-2023-5176) 
* libvpx: Heap buffer overflow in vp8 encoding in libvpx (CVE-2023-5217) 
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-10-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.3.1-1.el7_9.src.rpm" version="115.3.1"><filename>firefox-115.3.1-1.el7_9.i686.rpm</filename><sum type="sha256">7f4e2228d5d9d2949d16d30256d62fd9bf0ba6b0a2e2d47fe78ce28140e53ef0</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.3.1-1.el7_9.src.rpm" version="115.3.1"><filename>firefox-115.3.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">a4a269e22d3ff050ca22f748f613c9a75f87601b4c6f69dd657bb3e7bef41aa0</sum></package></collection></pkglist><references><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3600" id="CVE-2023-3600" title="Firefox: Use-After-Free In Workers" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169" id="CVE-2023-5169" title="Mozilla: Out-Of-Bounds Write In Pathops" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171" id="CVE-2023-5171" title="Mozilla: Use-After-Free In Ion Compiler" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176" id="CVE-2023-5176" title="Mozilla: Memory Safety Bugs Fixed In Firefox 118, Firefox Esr 115.3, And Thunderbird 115.3" type="cve" /><reference href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217" id="CVE-2023-5217" title="Libvpx: Heap Buffer Overflow In Vp8 Encoding In Libvpx" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5477" id="RHSA-2023:5477-1" title="Rhsa-2023:5477-1" type="self" /><reference href="https://access.redhat.com/security/updates/classification/#important" id="important" title="Issue Severity Classification" type="other" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2222652" id="2222652" title="Firefox: Use-After-Free In Workers" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2240893" id="2240893" title="Mozilla: Out-Of-Bounds Write In Pathops" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2240894" id="2240894" title="Mozilla: Use-After-Free In Ion Compiler" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2240896" id="2240896" title="Mozilla: Memory Safety Bugs Fixed In Firefox 118, Firefox Esr 115.3, And Thunderbird 115.3" type="bugzilla" /><reference href="https://bugzilla.redhat.com/show_bug.cgi?id=2241191" id="2241191" title="Libvpx: Heap Buffer Overflow In Vp8 Encoding In Libvpx" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5615</id><title>Moderate: Libssh2 Security Update</title><description>The libssh2 packages provide a library that implements the SSH2 protocol.
Security Fix(es):
* libssh2: use-of-uninitialized-value in _libssh2_transport_read (CVE-2020-22218)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2023-10-11 11:43:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libssh2-devel" release="4.el7_9.1" src="libssh2-1.8.0-4.el7_9.1.src.rpm" version="1.8.0"><filename>libssh2-devel-1.8.0-4.el7_9.1.i686.rpm</filename><sum type="sha256">009dbbbfdc6c1bbc675cce7495a9e81969032fc5c5ae59d06f1e05bd10769440</sum></package><package arch="x86_64" name="libssh2-devel" release="4.el7_9.1" src="libssh2-1.8.0-4.el7_9.1.src.rpm" version="1.8.0"><filename>libssh2-devel-1.8.0-4.el7_9.1.x86_64.rpm</filename><sum type="sha256">ceafa4b990b4ff47b9232a9544bc5b7396e6d9300a0c4bcdeca6ba4ce1371521</sum></package><package arch="x86_64" name="libssh2" release="4.el7_9.1" src="libssh2-1.8.0-4.el7_9.1.src.rpm" version="1.8.0"><filename>libssh2-1.8.0-4.el7_9.1.x86_64.rpm</filename><sum type="sha256">6f0a7a53236ae0d600edfd672bc8d32fae6195edefd1680fd75ef358115faf10</sum></package><package arch="noarch" name="libssh2-docs" release="4.el7_9.1" src="libssh2-1.8.0-4.el7_9.1.src.rpm" version="1.8.0"><filename>libssh2-docs-1.8.0-4.el7_9.1.noarch.rpm</filename><sum type="sha256">650f40d7ebbeca8d4c1ac5d73e0e22f5a985ad0880700d6681a2bd5ac77d5a87</sum></package><package arch="i686" name="libssh2" release="4.el7_9.1" src="libssh2-1.8.0-4.el7_9.1.src.rpm" version="1.8.0"><filename>libssh2-1.8.0-4.el7_9.1.i686.rpm</filename><sum type="sha256">5a3128e54547a71535b164de231c5b3027ed4ca833aab74478d77d773b81b146</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-22218" id="CVE-2020-22218" title="Cve-2020-22218" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5615" id="RHSA-2023:5615" title="Moderate: Libssh2 Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5616</id><title>Important: Python-Reportlab Security Update</title><description>Python-reportlab is a library used for generation of PDF documents.
Security Fix(es):
* python-reportlab: code injection in paraparser.py allows code execution (CVE-2019-19450)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-10-11 11:43:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-reportlab" release="11.el7_9" src="python-reportlab-2.5-11.el7_9.src.rpm" version="2.5"><filename>python-reportlab-2.5-11.el7_9.x86_64.rpm</filename><sum type="sha256">6aa94a449302c953ce792df4055fc1a3f90f43a4331b8f20449ad3cf5b7372ff</sum></package><package arch="x86_64" name="python-reportlab-docs" release="11.el7_9" src="python-reportlab-2.5-11.el7_9.src.rpm" version="2.5"><filename>python-reportlab-docs-2.5-11.el7_9.x86_64.rpm</filename><sum type="sha256">cb7cee39beb801352402cce7e897d37a3dd27f7214894296337b6406712eec8a</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-19450" id="CVE-2019-19450" title="Cve-2019-19450" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5616" id="RHSA-2023:5616" title="Important: Python-Reportlab Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5622</id><title>Important: Kernel Security And Bug Fix Update</title><description>The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails (CVE-2023-3609) * kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation (CVE-2023-32233) * kernel: nf_tables: stack-out-of-bounds-read in nft_byteorder_eval() (CVE-2023-35001)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Low memory deadlock with md devices and external (imsm) metadata handling (BZ#1703180) * cifs: memory leak in smb2_query_symlink (BZ#2166706) * bnxt_en: panic in bnxt_tx_int Redux (BZ#2175062) * NFS client loop in BIND_CONN_TO_SESSION (BZ#2219604)
</description><severity>important</severity><issued date="2023-10-11 11:43:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-perf" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">a575dc41a38b86ba6a5810695c921e7619e1e2f3cc851b7191772556c8445fc6</sum></package><package arch="x86_64" name="perf" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">e13f03ef1dbecc2f0401b1d2d37cf13112668a74de4528e3699c9162e000fce7</sum></package><package arch="x86_64" name="kernel" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">8456ae2be668b8c01e3404760d5c5c20101fe93cc7e475a9add9e165bcb8744d</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">955dfd4ad62fbde7414671c80983250683118e07db34d953eb2b2728dacb38ef</sum></package><package arch="noarch" name="kernel-doc" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.102.1.el7.noarch.rpm</filename><sum type="sha256">5c92588d3271e91f0d85560f158e9b6e7b04446a911c436632f0518e2d136901</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">c8586683d09e71c02c70d426ef7e7968c7685ed3df97d3ae02e6476bac054c26</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">7a4a9eba9ac8bcd99d3892f35744aa1687f3d631a3841e2e8eb62ed0bfd4874e</sum></package><package arch="x86_64" name="kernel-devel" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">2b3eac029ce5cc3ebe613fd987c2cc5755ed4b779f64aff27e1dfdfb8651771c</sum></package><package arch="x86_64" name="bpftool" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">f2ecdcd661c5d2880bc243b18d61eade1612a0fa12d1e2b646f53fc4c481f458</sum></package><package arch="x86_64" name="kernel-tools" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">394b4a4157f66ce62e0972a0a55cce0f9d2db44d925e09490d2810081f0b0d5e</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.102.1.el7.noarch.rpm</filename><sum type="sha256">7b4094d89b5e84246ea6c31607f1f362da35b5932c63d97df6dd14b608238b9e</sum></package><package arch="x86_64" name="kernel-debug" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">7ee96c98d694bbd669f5882f922b4b663d951d2fcfe07d7831e4e2e96e9cd8f9</sum></package><package arch="x86_64" name="kernel-headers" release="1160.102.1.el7" src="kernel-3.10.0-1160.102.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.102.1.el7.x86_64.rpm</filename><sum type="sha256">fac89ec17332ba89ae0a8080edf732968ba6e1e16be9254c43f7a771fce7a164</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32233" id="CVE-2023-32233" title="Cve-2023-32233" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35001" id="CVE-2023-35001" title="Cve-2023-35001" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3609" id="CVE-2023-3609" title="Cve-2023-3609" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5622" id="RHSA-2023:5622" title="Important: Kernel Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=1703180" id="1703180" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2166706" id="2166706" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2175062" id="2175062" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2219604" id="2219604" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5691</id><title>Important: Bind Security Update</title><description>The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Security Fix(es):
* bind: stack exhaustion in control channel code may lead to DoS (CVE-2023-3341)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-10-23 17:45:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.15.noarch.rpm</filename><sum type="sha256">1f2d553f8f24279612612680dbafddface901a6d1452b5d34a6ad88af38757f1</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.15.i686.rpm</filename><sum type="sha256">95f585ef51d565420ddfe4b9dfce1622d3792cbf10af8d2c3f548d9b63d2eb8e</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">58471fb7e9d0ccf639ac4ebeddc9b966a23875505b5bbf4368e9080cf8c0ae39</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.15.i686.rpm</filename><sum type="sha256">5df9ba6db0f2f8cc95f80fe842f43c409bd92b8c1a2d765ebfe2c0c6d50701ff</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">a168ea75edb8a7b39c15699c8febed2520ea1d99df02fa2d5440beaedaceeaff</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">b32d0d507b984496b55516e0ec02eeae22030905f6ef8b74080722f0adde637b</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.15.i686.rpm</filename><sum type="sha256">e6650a58dc11021770d67bb32617b4c04540d9df62c721351acc7726ece9d3bb</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">4eed10bb667dfc4971c95d9d93ade897fe93c4e7d221b8393462eee7501e150c</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">a705ea82b76f5ecd7c4632abc398745bad874d9cf14e0a674fe2cb9e1e1d6644</sum></package><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">ba891837c78bb03773d1b1e143a6769cefab02d2de47807948e69b783a397df4</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">6513a176e8b138a53fceecbe776c3b65ea4f31f8335eb485cb3334f05093fcb6</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">06992c1c6d9fa589d842073956eee1be92738fbd0b353a7e3b67774051cb42d3</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">b10a650abea629a5b6e188287df5a45bc11e4147ea40dd087fe5d7c498183260</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.15.i686.rpm</filename><sum type="sha256">e1502396e3614ad3a8c7e51b30ad949380482473a8260a9391252c04c20c200e</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.15.i686.rpm</filename><sum type="sha256">4d7662bc5de69a43871484c65c73012998fb326d2e1cc770fb35ae5fffd5e995</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">35fbd8117dfd541a110aaa5a30912cd15872f4701d9ce9e1e4dad76ad0f6d6bb</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">ff3504db59f1af9765994d69f88c383447c70bf6ba23d3775d061be66e631191</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">1b044d428ce288b1b20083566f75f11524349db9fd060aae6b4ea7df2dc3ff4f</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.15.i686.rpm</filename><sum type="sha256">6f4720e6664eab7dc8c0b9d43b52c1c577e2bcee1336234ab36079cefb81a7ca</sum></package><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">076d2419997ecf088330d9c732e699549026def60522c69730109edc94bb4f2e</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.15.i686.rpm</filename><sum type="sha256">715efff7432a568ce183f654b9f4c69350cd92adaec5bef9ddebb74d29a9de10</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">bfac0bd5c2364efc678b08c266cee4929ec9b582f7c50a80ace8ffb28ac46738</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.15.i686.rpm</filename><sum type="sha256">51bfe6c18c927b4aa3922c703401d708be836b3bbb7d485f136e374abf132a67</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.15" src="bind-9.11.4-26.P2.el7_9.15.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.15.x86_64.rpm</filename><sum type="sha256">9bc7a0fda0b7aad5df7f421582b7fe6f585daf922054aecccb961c1122878d2a</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3341" id="CVE-2023-3341" title="Cve-2023-3341" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5691" id="RHSA-2023:5691" title="Important: Bind Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5736</id><title>Moderate: Java-11-Openjdk Security And Bug Fix Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: certificate path validation issue during client authentication (8309966) (CVE-2023-22081)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* Additional validity checks in the handling of Zip64 files, JDK-8302483, were introduced in the 11.0.20 release of OpenJDK, causing the use of some valid zip files to now fail with an error. This release, 11.0.20.1, allows for zero-length headers and additional padding produced by some Zip64 creation tools. With both releases, the checks can be disabled using -Djdk.util.zip.disableZip64ExtraFieldValidation=true. (RHBZ#2236229) * A maximum signature file size property, jdk.jar.maxSignatureFileSize, was introduced in the 11.0.20 release of OpenJDK by JDK-8300596, with a default of 8 MB. This default proved to be too small for some JAR files. This release, 11.0.20.1, increases it to 16 MB. (RHEL-13217) * The serviceability agent would print an exception when encountering null addresses while producing thread dumps. These null values are now handled appropriately. (JDK-8243210) * The /usr/bin/jfr alternative is now owned by the java-11-openjdk package (RHEL-11320) * The jcmd tool is now
provided by the java-11-openjdk-headless package, rather than java-1.8.0-openjdk-devel, to make it more accessible (RHEL-13227)
</description><severity>moderate</severity><issued date="2023-10-23 17:45:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-debug-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">852d5ebdda7e6e0a361e70d04a503a6103768771503e8bfd5106681681622faa</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-devel-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">31573a285a0ce978a16cd2c795a604c932b450d1b870ff837c33674d71d21c44</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-devel-debug-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">d5958af0dfdc7c5b371b50cbbc421223629494c767cd923987398b82b7dd5a47</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-jmods-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">83585a3bbadda28e6c98442d96aeb494f16729be4b77d8c9e5d25bbafdf96187</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-javadoc-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">65299f6ccbee7059e1542ca7db8d3e8f4885c2e26734d3a3a1ccb76529d2cd64</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-src-debug-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">99a2016d3f40a3ccd73128756b22f143a8b9cfcf585acb5ed46b81468717af8c</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-headless-debug-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">2f1424773b3bf97109decbfbce83982ef90361700ca9bcd4e6c483ff7abfdd65</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-headless-debug-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">867892df7b5ab9817c033f87d563690c8decdd9907f0932f66ad4827115b8394</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-devel-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">eef4f88bea160aa6f3c213e3a3f8ffb7505ba8deacbde9871ea272046d1770d9</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-jmods-debug-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">2b789ee027e297e9f6070c80624d1710aa44a1186f3d9ea81156ba947af7c62f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">c87e82c8da8b407bd91a6b8c354ad494e4866a636fc9d58b6f5b7888279aaa53</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">7dd0a1317bb451d71bf25e6898de171800448281ad5865fac3aba2361ab4797e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-src-debug-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">ef60fc8284635089a6a4e90a3daa4f7568066e984c8a935e3b4c7911df3fe7e4</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-static-libs-debug-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">73236b4177b331b6182ded512b3964293092c169af420ff89e0d1ea0c0894d5e</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-demo-debug-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">83b5369cb37704d4e8c55b13b69c71835e5cc208df9b266211dcff06d9dd8010</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-src-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">3fbd264abeb17ed7058526340788bdd44ed40eee3cd6a3c2d9b66a2dcb3fe4ad</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">ca02127332588becfad797011fbeee87663499d1d05caea52f61697392e69cf8</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">9b7f0e8d335fd74f8cda722e4cc0e1fc3c7afc98c03dae7b7982cb1fede98301</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-jmods-debug-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">27fe7c8fa43755c6207dfb71ab365fdba13452d5d08a16b8282eeaaac791eacb</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-devel-debug-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">79d52c2faa70d6c36fe8db4c76d02c669be81949390abb2bbb2eec606adfc1f1</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-static-libs-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">cbdd1d4c981960e812db20fc18392044094608c8aa47d1797342dc1fbaf647dc</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-demo-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">17b85cd96008ab269b824ad60eb2387310af37ef49ff057620299647190fd6ca</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">f7a2f24c0a950cd6be1535aefb47f15088778c8a20a4323b69874539a109fcf0</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-jmods-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">532b08c6ba673d428336e8cad5d42ce0de15065f218a93190949fddf858060ff</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">70170123103b1590d4a9330b995f642a10d677ec34ca872adb927d829bdcebbd</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-debug-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">88a4f0f227ded151ac7a1aa4ab1e538f2cc8314eef93b08bc14681e148db3732</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-javadoc-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">f5cf09cf91f67fa17b9023ea064e84edb5915a6e5958cfb3450b5a77ac2c9d49</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-src-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">e602c08e8604c159064411ae0655ee92d7b6422abbef5c7a13e27fc2ee92dc8e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">a16956c879fd4befa343beb4eb1af596f2925cdaa0a5b6fb03a364593a9ed314</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-headless-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">0569be2009302b5f1b9d2728285d563a1d031340591b2054384502482a17e1a5</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-demo-debug-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">d6469bf88d85c6c3a1e20039bda579eec4957c26e68e223d554cb82bbf0774f7</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">451678b8e4f2b5e8f619def5c5b2f079f2e68683c07db695bddccfa0200f0e71</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-headless-11.0.21.0.9-1.el7_9.i686.rpm</filename><sum type="sha256">b9c4db2d2ae4a6d14d207725a0914da14ad214c0ca4081436debbf9441af8011</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.21.0.9-1.el7_9.src.rpm" version="11.0.21.0.9"><filename>java-11-openjdk-demo-11.0.21.0.9-1.el7_9.x86_64.rpm</filename><sum type="sha256">6b64894d3055d23192b286d5a29f1dbaa42b94c0639a14aee9e48e6d908067bf</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081" id="CVE-2023-22081" title="Cve-2023-22081" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5736" id="RHSA-2023:5736" title="Moderate: Java-11-Openjdk Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2236229" id="2236229" title="2236229 &#8211; Update To 11.0.20.1 Interim Release To Fix Regression In Zip64 Handling [Rhel-7.9.Z]" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:5761</id><title>Moderate: Java-1.8.0-Openjdk Security Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: IOR deserialization issue in CORBA (8303384) (CVE-2023-22067) * OpenJDK: certificate path validation issue during client authentication (8309966) (CVE-2023-22081)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* A maximum signature file size property, jdk.jar.maxSignatureFileSize, was introduced in the 11.0.20 release of OpenJDK by JDK-8300596, with a default of 8 MB. This default proved to be too small for some JAR files. This release, 11.0.20.1, increases it to 16 MB. (RHEL-13576) * The /usr/bin/jfr alternative is now owned by the java-1.8.0-openjdk package (RHEL-11319)
</description><severity>moderate</severity><issued date="2023-10-23 17:45:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">6d4e5f1ff90bc3c870c319b24b7cdbd0581bf1884eeee55a3a867103989da885</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">7b531fc824bc53d0abb38ba0e791591b64025ea9089eaa65ff216419a6197b46</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">4b7ee7cb710573dbea4fb24a1c749a2b9434f35bb36626d86a8a59ecc96fdf70</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">8951375cb2e20465100207c6130e226777bfce5762d57b3223467d98f2aedaa7</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">0ff901d0c87829836df0499cc8f050a7c78aab35a06ed4bdeb4822feea48ec25</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.392.b08-2.el7_9.noarch.rpm</filename><sum type="sha256">8bde934721aa324b5b9764220e0c1b962de3f0855fe5e23b3a5dbd585bd704e3</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">2efe8409b7d03beac4ebd8b78af58260d081ba1ff32fac107cf0ff2d4ead4c67</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">26d16630cfa11ac24776e2b350acda9a0a37b984a14d9fe092f79a94e23e691b</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.392.b08-2.el7_9.noarch.rpm</filename><sum type="sha256">634b546eed00b6c45a2840094ba4420ec53b8c3de17c653d20d8a988dc9b84c7</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">3c97d5503a057f4f3c9b0f824ba80233b203a547b12643351a388d5cfc8ca5ef</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-src-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">2b7ca53c76ffc6276f180e58660b5ac5001598d6c8065f75813d0623850e353b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">5cd42567e4d7a4f162c012cf15c361cc029ea6600566e5d92133824af9c4cdbc</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">c60dba6b1acc4e87d7e438c23c5c580b6eb35568518b8b4e85cd5150ac9aa13b</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-src-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">79007f62ab4acc856f5c43abe124c3bfaa357cb9a3eddf7a495e20b322a61d54</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">519a0eb6d8b1904eb1654b9d3629bf6602005d4f48cb753c5b3f7f1030d4b0be</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">8bcb60f5f3ae465e3b17b6909719e446f3d8adaba73bfed62cd66c95ec743b91</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.392.b08-2.el7_9.noarch.rpm</filename><sum type="sha256">f4362e1341e135258824db551a80726f36017494058809085f93b2c69db69449</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">4f87d75a902f3896ae48e19f294116d334a09d032d925c4377cebf534b7c3bb0</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">d5ed498c8a3b53ec876d437bf2b245542e10de259dd96b786e1d91a0b4229873</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">47777a46061d05d7fc4a847b92468c40a80dcd64e4f8568e50c4cd67eaa60a31</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">ac9c0d53c1758d6d034d7f7239a2880d166ae8826ed99ea84d6ee622894f58e6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">f506e6ef5df5605321d537f68ff40d42d711a6f209d68556661d5e2a3c719eaa</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-javadoc-1.8.0.392.b08-2.el7_9.noarch.rpm</filename><sum type="sha256">d6086529ae7184f6ec7febbe66827324e584b18ad408731b120628934aab753b</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">929ca13dd5b34103354a198b3a1734d85fb4db61b2e3e4f1025a2fc4baefb9c0</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">d634bf2b90dd1b8177b18892fdb09d02ba538cf1810c5ec84d01aa5170293661</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">ff953990d41ff63f07054e8d929eb6e417835271f48fa6e9c67eb22bc65928f4</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.392.b08-2.el7_9.x86_64.rpm</filename><sum type="sha256">4083134d733b18d2b411902de71ee6684bdd9f719b2bab0e490ba3810f0e8acb</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="2.el7_9" src="java-1.8.0-openjdk-1.8.0.392.b08-2.el7_9.src.rpm" version="1.8.0.392.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.392.b08-2.el7_9.i686.rpm</filename><sum type="sha256">5117393083e60828018763fbccd46a6ec79b4761d11e92c2927edf5a9817a79a</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22067" id="CVE-2023-22067" title="Cve-2023-22067" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-22081" id="CVE-2023-22081" title="Cve-2023-22081" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:5761" id="RHSA-2023:5761" title="Moderate: Java-1.8.0-Openjdk Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:6162</id><title>Important: Firefox Security Update</title><description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.4.0 ESR.
Security Fix(es):
* Mozilla: Queued up rendering could have allowed websites to clickjack (CVE-2023-5721) * Mozilla: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4 (CVE-2023-5730) * libvpx: crash related to VP9 encoding in libvpx (CVE-2023-44488) * Mozilla: Large WebGL draw could have led to a crash (CVE-2023-5724) * Mozilla: WebExtensions could open arbitrary URLs (CVE-2023-5725) * Mozilla: Improper object tracking during GC in the JavaScript engine could have led to a crash. (CVE-2023-5728) * Mozilla: Address bar spoofing via bidirectional characters (CVE-2023-5732)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-10-30 13:10:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.4.0-1.el7_9.src.rpm" version="115.4.0"><filename>firefox-115.4.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">a2818ee16f2bfb49528f3b587a82a53d82d9f516d64e9f27e4e63949ed6ead0c</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.4.0-1.el7_9.src.rpm" version="115.4.0"><filename>firefox-115.4.0-1.el7_9.i686.rpm</filename><sum type="sha256">c464ce10d380ecde30caa7b063c2748fa296105fd15a56027d421fafe3f01c5d</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44488" id="CVE-2023-44488" title="Cve-2023-44488" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721" id="CVE-2023-5721" title="Cve-2023-5721" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724" id="CVE-2023-5724" title="Cve-2023-5724" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725" id="CVE-2023-5725" title="Cve-2023-5725" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728" id="CVE-2023-5728" title="Cve-2023-5728" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730" id="CVE-2023-5730" title="Cve-2023-5730" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732" id="CVE-2023-5732" title="Cve-2023-5732" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:6162" id="RHSA-2023:6162" title="Important: Firefox Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:6193</id><title>Important: Thunderbird Security Update</title><description>Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.4.1.
Security Fix(es):
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-10-31 10:15:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-115.4.1-1.el7_9.src.rpm" version="115.4.1"><filename>thunderbird-115.4.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">4f12854f23f8507d9d17cd74099d024209bb120fc19de04179bb106de2b5f4fd</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44488" id="CVE-2023-44488" title="Cve-2023-44488" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5721" id="CVE-2023-5721" title="Cve-2023-5721" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5724" id="CVE-2023-5724" title="Cve-2023-5724" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5725" id="CVE-2023-5725" title="Cve-2023-5725" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5728" id="CVE-2023-5728" title="Cve-2023-5728" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5730" id="CVE-2023-5730" title="Cve-2023-5730" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5732" id="CVE-2023-5732" title="Cve-2023-5732" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:6193" id="RHSA-2023:6193" title="Important: Thunderbird Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:6802</id><title>Important: Xorg-X11-Server Security Update</title><description>X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-11-09 09:26:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-Xnest" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-24.el7_9.x86_64.rpm</filename><sum type="sha256">8b3af76b71595eafb3bc9e2357ae8f623eb7423afb54d8d73e655cf62dd808ab</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-24.el7_9.x86_64.rpm</filename><sum type="sha256">f9b4df66849c9cc337987ce2622fa0ab9a8c46dda81aefd4d0ea9aa97c307c7e</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-24.el7_9.x86_64.rpm</filename><sum type="sha256">1c89d6eb315ad483c31508533e687d1886a5ac9f57027d6c3c4cb64f2bcedf88</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-24.el7_9.x86_64.rpm</filename><sum type="sha256">dd61c82ae5cdd1ef658d696d111e1924727a8253be6b5905944ae86e34381783</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-24.el7_9.x86_64.rpm</filename><sum type="sha256">85a7f65d174bf3a9d3be9759e63fa4770c1d49af7c2b2e821c07b370e766d381</sum></package><package arch="i686" name="xorg-x11-server-devel" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-24.el7_9.i686.rpm</filename><sum type="sha256">75848218f62955bc8d5de3dea78d57d0c7e8a363d2126c2fa154ee40db68ac9f</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-24.el7_9.x86_64.rpm</filename><sum type="sha256">a7658c5cc062175358e0b62294a8999b0327f5d1f60ff76b58c4684e489fb916</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-24.el7_9.x86_64.rpm</filename><sum type="sha256">b529043f249d8d59b71689536112144a2b460d400e0eabf614db73c2f90c30eb</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-24.el7_9.x86_64.rpm</filename><sum type="sha256">08309adbef8892114d0d25caccb90286fb43ff27a8c8c93d53e71ac76c6b5a93</sum></package><package arch="noarch" name="xorg-x11-server-source" release="24.el7_9" src="xorg-x11-server-1.20.4-24.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-24.el7_9.noarch.rpm</filename><sum type="sha256">1846a73cc6684722f4bfcf6da7d2b6658bf132ac87414e2432e8d25b86ca5505</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367" id="CVE-2023-5367" title="Cve-2023-5367" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:6802" id="RHSA-2023:6802" title="Important: Xorg-X11-Server Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:6805</id><title>Critical: Squid Security Update</title><description>Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: Denial of Service in HTTP Digest Authentication (CVE-2023-46847)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>critical</severity><issued date="2023-11-09 09:26:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="squid-sysvinit" release="17.el7_9.9" src="squid-3.5.20-17.el7_9.9.src.rpm" version="3.5.20"><filename>squid-sysvinit-3.5.20-17.el7_9.9.x86_64.rpm</filename><sum type="sha256">215cd76ccdf876aba2684bea20ee92b1b8e95e92e092dbb9eb2e24cd2d61cb9d</sum></package><package arch="x86_64" epoch="7" name="squid" release="17.el7_9.9" src="squid-3.5.20-17.el7_9.9.src.rpm" version="3.5.20"><filename>squid-3.5.20-17.el7_9.9.x86_64.rpm</filename><sum type="sha256">d9400d537dffeb41d81419bb5a6de65cceac4c2cfcafcbcc36519e0880e4a60f</sum></package><package arch="x86_64" epoch="7" name="squid-migration-script" release="17.el7_9.9" src="squid-3.5.20-17.el7_9.9.src.rpm" version="3.5.20"><filename>squid-migration-script-3.5.20-17.el7_9.9.x86_64.rpm</filename><sum type="sha256">693170496ba38a2921ad1cb175cf751dc80ec6fb94e7f444747e6e6aa866cf66</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46847" id="CVE-2023-46847" title="Cve-2023-46847" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:6805" id="RHSA-2023:6805" title="Critical: Squid Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:6823</id><title>Important: Python3 Security Update</title><description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.
Security Fix(es):
* python: TLS handshake bypass (CVE-2023-40217)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-11-09 09:10:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="python3" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-3.6.8-21.el7_9.i686.rpm</filename><sum type="sha256">fdcc1331f8c544a07788a0de89bf6181901458deac5b6eb506282f8637672f5c</sum></package><package arch="x86_64" name="python3-test" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-21.el7_9.x86_64.rpm</filename><sum type="sha256">003c6c9c7020b4c7692c2c1c69cca45f48cf8a3c25e191b468b87bee36d73ca7</sum></package><package arch="x86_64" name="python3-devel" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-21.el7_9.x86_64.rpm</filename><sum type="sha256">44c4e07a148f340dd3fc28d49493897663eb3f715ca54d8bcfaf17b4098106d9</sum></package><package arch="x86_64" name="python3" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-3.6.8-21.el7_9.x86_64.rpm</filename><sum type="sha256">399a05764db67bc42803f45bb1b1b9133ebec0ea4140a6592d811e787f5eafc8</sum></package><package arch="i686" name="python3-tkinter" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-21.el7_9.i686.rpm</filename><sum type="sha256">7911bfb953c2e1231eee3b516010f4dbefb5bff7d05dde735b844d64744b0f1b</sum></package><package arch="x86_64" name="python3-libs" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-21.el7_9.x86_64.rpm</filename><sum type="sha256">07b358ba123d2092e863ad59356750f8a6b69242c2941651e6e05f65070ecf1b</sum></package><package arch="i686" name="python3-devel" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-devel-3.6.8-21.el7_9.i686.rpm</filename><sum type="sha256">0a91791ffb00ea9c47b1ff8e4611adf9887a58dc50276b6f60770f0cc764fad5</sum></package><package arch="x86_64" name="python3-debug" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-21.el7_9.x86_64.rpm</filename><sum type="sha256">d9e4f392ed5495d446a99746a8dcb296d542ab66f9b30892168b1ff0a841c1e0</sum></package><package arch="x86_64" name="python3-idle" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-21.el7_9.x86_64.rpm</filename><sum type="sha256">f20da14ddb766b44e71d481c3d622a541f9d744d2e2f4886e78f3e6fea63706d</sum></package><package arch="i686" name="python3-idle" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-idle-3.6.8-21.el7_9.i686.rpm</filename><sum type="sha256">d7db2cdbb53476bcd10b225cf13884b9c299ef8fb5193a3abbf719e9fcd1e5c5</sum></package><package arch="x86_64" name="python3-tkinter" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-tkinter-3.6.8-21.el7_9.x86_64.rpm</filename><sum type="sha256">cb7dc766ba29afe689685ec4027d4218f2f3741409027162e8b129617942fd08</sum></package><package arch="i686" name="python3-libs" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-libs-3.6.8-21.el7_9.i686.rpm</filename><sum type="sha256">4c538f38c63d09975be3e3665a9eb615a5ba026664e6904beebcb6cdad32439f</sum></package><package arch="i686" name="python3-debug" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-debug-3.6.8-21.el7_9.i686.rpm</filename><sum type="sha256">7d01ff505a3b881128ff44ad0e889ac1be03d859366fb033096dfa17438fc063</sum></package><package arch="i686" name="python3-test" release="21.el7_9" src="python3-3.6.8-21.el7_9.src.rpm" version="3.6.8"><filename>python3-test-3.6.8-21.el7_9.i686.rpm</filename><sum type="sha256">f751495dad7bae107ae8919706d9e764fdb53654e81a5f33aca49726c6ef2d54</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217" id="CVE-2023-40217" title="Cve-2023-40217" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:6823" id="RHSA-2023:6823" title="Important: Python3 Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:6885</id><title>Python</title><description>Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. 
Security Fix(es): 
* python: TLS handshake bypass (CVE-2023-40217) 
--- This content is derived from https://access.redhat.com/errata/SLSA-2023:6885</description><severity>important</severity><release>Scientific Linux</release><issued date="2023-11-13 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-devel" release="94.el7_9" src="python-2.7.5-94.el7_9.src.rpm" version="2.7.5"><filename>python-devel-2.7.5-94.el7_9.x86_64.rpm</filename><sum type="sha256">7c8420d15e676e7537aa0c3a8583b385f774ca4f3d4b672d9375ad456373beb3</sum></package><package arch="x86_64" name="python-debug" release="94.el7_9" src="python-2.7.5-94.el7_9.src.rpm" version="2.7.5"><filename>python-debug-2.7.5-94.el7_9.x86_64.rpm</filename><sum type="sha256">6237b6e4118e2a52df74dab852be4a7bdb1939ad74bb4dcd67047203cd1fbdff</sum></package><package arch="x86_64" name="python-test" release="94.el7_9" src="python-2.7.5-94.el7_9.src.rpm" version="2.7.5"><filename>python-test-2.7.5-94.el7_9.x86_64.rpm</filename><sum type="sha256">52990a46e591ce98221560cfe2f7a892b9569c43b81c27e4d5b3ac8cb9711ae8</sum></package><package arch="x86_64" name="python-libs" release="94.el7_9" src="python-2.7.5-94.el7_9.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-94.el7_9.x86_64.rpm</filename><sum type="sha256">4cc413074240bc16ce253acf8d95c1b13cb2488bb26346231fc3608c3518c367</sum></package><package arch="x86_64" name="tkinter" release="94.el7_9" src="python-2.7.5-94.el7_9.src.rpm" version="2.7.5"><filename>tkinter-2.7.5-94.el7_9.x86_64.rpm</filename><sum type="sha256">b5b12bc491c983056da3d1bdf7a91feaa35bfa4efd8a905df65b2b9d575cb3e8</sum></package><package arch="x86_64" name="python-tools" release="94.el7_9" src="python-2.7.5-94.el7_9.src.rpm" version="2.7.5"><filename>python-tools-2.7.5-94.el7_9.x86_64.rpm</filename><sum type="sha256">92eb690460d473bc548c0e792d41f57cf478f33857589c4f9d3d53abfa40fd30</sum></package><package arch="x86_64" name="python" release="94.el7_9" src="python-2.7.5-94.el7_9.src.rpm" version="2.7.5"><filename>python-2.7.5-94.el7_9.x86_64.rpm</filename><sum type="sha256">3dc36426859b8749f3533a2417d688a30c7046388dc97788081ee1d3a862fa50</sum></package><package arch="i686" name="python-libs" release="94.el7_9" src="python-2.7.5-94.el7_9.src.rpm" version="2.7.5"><filename>python-libs-2.7.5-94.el7_9.i686.rpm</filename><sum type="sha256">1036daab80d95a984294968dd161f04ef98733546f39e22485bdfaa75a905b48</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40217" id="CVE-2023-40217" title="Cve-2023-40217" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:6885" id="RHSA-2023:6885" title="Important: Python Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:6886</id><title>Important: Plexus-Archiver Security Update</title><description>The Plexus project provides a full software stack for creating and executing software projects. Based on the Plexus container, the applications can utilise component-oriented programming to build modular, reusable components that can easily be assembled and reused. The plexus-archiver component provides functions to create and extract archives.
Security Fix(es):
* plexus-archiver: Arbitrary File Creation in AbstractUnArchiver (CVE-2023-37460)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-11-13 11:35:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="plexus-archiver" release="6.el7_9" src="plexus-archiver-2.4.2-6.el7_9.src.rpm" version="2.4.2"><filename>plexus-archiver-2.4.2-6.el7_9.noarch.rpm</filename><sum type="sha256">d4c40b7fcd518ff9c13322420bd4e38055be3009a0bc846abb5e604a27abddce</sum></package><package arch="noarch" name="plexus-archiver-javadoc" release="6.el7_9" src="plexus-archiver-2.4.2-6.el7_9.src.rpm" version="2.4.2"><filename>plexus-archiver-javadoc-2.4.2-6.el7_9.noarch.rpm</filename><sum type="sha256">427b6286b12481cfd22c1f1d8857aee030e72469a4d5e1343b77fd0bf028e2c4</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37460" id="CVE-2023-37460" title="Cve-2023-37460" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:6886" id="RHSA-2023:6886" title="Important: Plexus-Archiver Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:7279</id><title>Important: Open-Vm-Tools Security Update</title><description>The Open Virtual Machine Tools are the open source implementation of the VMware Tools. They are a set of guest operating system virtualization components that enhance performance and user experience of virtual machines.
Security Fix(es):
* open-vm-tools: SAML token signature bypass (CVE-2023-34058) * open-vm-tools: file descriptor hijack vulnerability in the vmware-user-suid-wrapper (CVE-2023-34059)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-11-17 09:11:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="open-vm-tools-test" release="3.el7_9.9" src="open-vm-tools-11.0.5-3.el7_9.9.src.rpm" version="11.0.5"><filename>open-vm-tools-test-11.0.5-3.el7_9.9.x86_64.rpm</filename><sum type="sha256">d3c481bf0ca3f463f9c194381f37b1aa29795ae5b2a16d6bf93066b1dcc3e299</sum></package><package arch="x86_64" name="open-vm-tools-desktop" release="3.el7_9.9" src="open-vm-tools-11.0.5-3.el7_9.9.src.rpm" version="11.0.5"><filename>open-vm-tools-desktop-11.0.5-3.el7_9.9.x86_64.rpm</filename><sum type="sha256">a8808cfcef5c51215d5a6859ac8970fece174ce74b28d00b3fdb3b9b4c5fddb7</sum></package><package arch="x86_64" name="open-vm-tools" release="3.el7_9.9" src="open-vm-tools-11.0.5-3.el7_9.9.src.rpm" version="11.0.5"><filename>open-vm-tools-11.0.5-3.el7_9.9.x86_64.rpm</filename><sum type="sha256">d178a2ea870f10652fcbe438a7d80518b3e263596e90e6e3ac78ce786c60162e</sum></package><package arch="x86_64" name="open-vm-tools-devel" release="3.el7_9.9" src="open-vm-tools-11.0.5-3.el7_9.9.src.rpm" version="11.0.5"><filename>open-vm-tools-devel-11.0.5-3.el7_9.9.x86_64.rpm</filename><sum type="sha256">b894408477d4d6e9d7bbf1ac573dd8ce2b91745916e216fa276749d9bb15c816</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34058" id="CVE-2023-34058" title="Cve-2023-34058" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34059" id="CVE-2023-34059" title="Cve-2023-34059" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:7279" id="RHSA-2023:7279" title="Important: Open-Vm-Tools Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:7423</id><title>Important: Kernel Security Update</title><description>The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead (CVE-2023-3611) * kernel: net/sched: cls_fw component can be exploited as result of failure in tcf_change_indev function (CVE-2023-3776) * kernel: net/sched: Use-after-free vulnerabilities in the net/sched classifiers: cls_fw, cls_u32 and cls_route (CVE-2023-4128, CVE-2023-4206, CVE-2023-4207, CVE-2023-4208) * hw: Intel: Gather Data Sampling (GDS) side channel vulnerability (CVE-2022-40982)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-11-28 10:11:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">2626b9dfed1509c5d518ab7f6c6aafdc2ac1003e85a7a341680dbf082eb675de</sum></package><package arch="noarch" name="linux-firmware" release="81.git78c0348.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="20200421"><filename>linux-firmware-20200421-81.git78c0348.el7_9.noarch.rpm</filename><sum type="sha256">df92d3c5083d8aa8892d0c60397f4e5ed92f19b8e1cb20967370262dc6513906</sum></package><package arch="x86_64" name="kernel" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">17f6ff299f9ee45086367edcb5312448b91b08287558b87397e3adda04189482</sum></package><package arch="x86_64" name="kernel-debug" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">529ccc3acba2d1f77afe89b0e91415cf2df73c41a2fc65cf81cd93e6412f4dd2</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">e0d906e1caf586eeb54910cd1ab6941fc9188f6f87644ca7e944614102be189d</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">ef9efb4624b6383bf095ea126f9c83db7e2d75c24641d224f821f315e1ce52b9</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">6c01fddfc2f36476e1615b0037ab28f12c8b23d55570d44fd276f09ba30c9806</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.105.1.el7.noarch.rpm</filename><sum type="sha256">91b1b60b76eed2a552f5780def812b0b560ac6053d08ce4de2f200898c4506f6</sum></package><package arch="x86_64" name="python-perf" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">59b5a6771869a09d85d43c7899cdd647e6d6f1a44d252c140747089c1d7c9e6f</sum></package><package arch="x86_64" name="kernel-devel" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">6dbe2b4a6bbc85bc3526043ccc99b836dc91f22c4f70b35ce9177f908a219f0f</sum></package><package arch="x86_64" name="perf" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">44f8e68a25de3ca31ab898319a0768308bf36a22ebe83aa04855d0f77f572249</sum></package><package arch="noarch" name="kernel-doc" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.105.1.el7.noarch.rpm</filename><sum type="sha256">d9a95a80164f06a428809429fc003aa85748cdcd17e4d2df6d5e56ebe7104470</sum></package><package arch="x86_64" name="bpftool" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">194c7f40dbdce9e5ad2d9e9ac561404c7e38531b1de65216289fefaf22857bf0</sum></package><package arch="x86_64" name="kernel-headers" release="1160.105.1.el7" src="kernel-3.10.0-1160.105.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.105.1.el7.x86_64.rpm</filename><sum type="sha256">5ade4d77f73184c7baf9df4f1a6bf22a1a19813ebcff5c24561c9631c104611f</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40982" id="CVE-2022-40982" title="Cve-2022-40982" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-31436" id="CVE-2023-31436" title="Cve-2023-31436" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3611" id="CVE-2023-3611" title="Cve-2023-3611" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3776" id="CVE-2023-3776" title="Cve-2023-3776" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4128" id="CVE-2023-4128" title="Cve-2023-4128" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4206" id="CVE-2023-4206" title="Cve-2023-4206" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4207" id="CVE-2023-4207" title="Cve-2023-4207" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4208" id="CVE-2023-4208" title="Cve-2023-4208" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:7423" id="RHSA-2023:7423" title="Important: Kernel Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:7428</id><title>Important: Tigervnc Security Update</title><description>Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367) * xorg-x11-server: Use-after-free bug in DestroyWindow (CVE-2023-5380)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-11-28 10:11:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="tigervnc" release="26.el7_9" src="tigervnc-1.8.0-26.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-1.8.0-26.el7_9.x86_64.rpm</filename><sum type="sha256">998439e463a45278039ae8c8d47baeaf104aadf5ae3e203f1e6e63dd74787c64</sum></package><package arch="x86_64" name="tigervnc-server-minimal" release="26.el7_9" src="tigervnc-1.8.0-26.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-minimal-1.8.0-26.el7_9.x86_64.rpm</filename><sum type="sha256">7b1cdc67c45fb5b81f7323467f567268cea46b944ecc148c8fd33ba14cd59cea</sum></package><package arch="x86_64" name="tigervnc-server" release="26.el7_9" src="tigervnc-1.8.0-26.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-1.8.0-26.el7_9.x86_64.rpm</filename><sum type="sha256">1d138a871600959bbe9892e61b525cfa71389c2e40afb487bffe47c94cba0450</sum></package><package arch="noarch" name="tigervnc-icons" release="26.el7_9" src="tigervnc-1.8.0-26.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-icons-1.8.0-26.el7_9.noarch.rpm</filename><sum type="sha256">ef6956ab3eaa71c40204278fba657f27c0e11df730a3f7847c3c640946ce5e72</sum></package><package arch="noarch" name="tigervnc-server-applet" release="26.el7_9" src="tigervnc-1.8.0-26.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-applet-1.8.0-26.el7_9.noarch.rpm</filename><sum type="sha256">996d53bf0fdc75fd9c57dc7de4e7147fc276b8554bad6d70847605d3abcd1565</sum></package><package arch="noarch" name="tigervnc-license" release="26.el7_9" src="tigervnc-1.8.0-26.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-license-1.8.0-26.el7_9.noarch.rpm</filename><sum type="sha256">2aa6154d19d1ed9182e8c3b9d302b06424744ff0679ec404402d90d42ec0dc59</sum></package><package arch="x86_64" name="tigervnc-server-module" release="26.el7_9" src="tigervnc-1.8.0-26.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-module-1.8.0-26.el7_9.x86_64.rpm</filename><sum type="sha256">382433626ff6aebd55f5916957ee588933b97e128b2426a81a0bc9879d476b12</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5367" id="CVE-2023-5367" title="Cve-2023-5367" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5380" id="CVE-2023-5380" title="Cve-2023-5380" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:7428" id="RHSA-2023:7428" title="Important: Tigervnc Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:7505</id><title>Important: Thunderbird Security Update</title><description>Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.5.0.
Security Fix(es):
* Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer (CVE-2023-6204) * Mozilla: Use-after-free in MessagePort::Entangled (CVE-2023-6205) * Mozilla: Clickjacking permission prompts using the fullscreen transition (CVE-2023-6206) * Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer (CVE-2023-6207) * Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 (CVE-2023-6212) * Mozilla: Using Selection API would copy contents into X11 primary selection. (CVE-2023-6208) * Mozilla: Incorrect parsing of relative URLs starting with "///" (CVE-2023-6209)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-11-28 10:11:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-115.5.0-1.el7_9.src.rpm" version="115.5.0"><filename>thunderbird-115.5.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">5db75bde8daaf46ff7868d3752016f4d526c9070257c816e496b8b854328f66f</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204" id="CVE-2023-6204" title="Cve-2023-6204" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205" id="CVE-2023-6205" title="Cve-2023-6205" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206" id="CVE-2023-6206" title="Cve-2023-6206" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207" id="CVE-2023-6207" title="Cve-2023-6207" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208" id="CVE-2023-6208" title="Cve-2023-6208" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209" id="CVE-2023-6209" title="Cve-2023-6209" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212" id="CVE-2023-6212" title="Cve-2023-6212" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:7505" id="RHSA-2023:7505" title="Important: Thunderbird Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:7509</id><title>Important: Firefox Security Update</title><description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.5.0 ESR.
Security Fix(es):
* Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer (CVE-2023-6204) * Mozilla: Use-after-free in MessagePort::Entangled (CVE-2023-6205) * Mozilla: Clickjacking permission prompts using the fullscreen transition (CVE-2023-6206) * Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer (CVE-2023-6207) * Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5 (CVE-2023-6212) * Mozilla: Using Selection API would copy contents into X11 primary selection. (CVE-2023-6208) * Mozilla: Incorrect parsing of relative URLs starting with "///" (CVE-2023-6209)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-11-28 10:11:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.5.0-1.el7_9.src.rpm" version="115.5.0"><filename>firefox-115.5.0-1.el7_9.i686.rpm</filename><sum type="sha256">58b1191d09f569ca50c90861a01fcc770c6b2e028dc183df026135250539e2d1</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.5.0-1.el7_9.src.rpm" version="115.5.0"><filename>firefox-115.5.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">ba1012b0871603647ec5923b92aab013438b1e5103c8071e806fda840e612157</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6204" id="CVE-2023-6204" title="Cve-2023-6204" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6205" id="CVE-2023-6205" title="Cve-2023-6205" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6206" id="CVE-2023-6206" title="Cve-2023-6206" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6207" id="CVE-2023-6207" title="Cve-2023-6207" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6208" id="CVE-2023-6208" title="Cve-2023-6208" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6209" id="CVE-2023-6209" title="Cve-2023-6209" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6212" id="CVE-2023-6212" title="Cve-2023-6212" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:7509" id="RHSA-2023:7509" title="Important: Firefox Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:7513</id><title>Moderate: Linux-Firmware Security Update</title><description>The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
Security Fix(es):
* hw amd: Return Address Predictor vulnerability leading to information disclosure (CVE-2023-20569) * hw: amd: Cross-Process Information Leak (CVE-2023-20593)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2023-11-28 10:11:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="iwl2030-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl2030-firmware-18.168.6.1-81.el7_9.noarch.rpm</filename><sum type="sha256">c80b56035c2231f62f39e828347adff98e06df09a972f4abe7ea09ec48259624</sum></package><package arch="noarch" epoch="1" name="iwl1000-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="39.31.5.1"><filename>iwl1000-firmware-39.31.5.1-81.el7_9.noarch.rpm</filename><sum type="sha256">0f34e9c6569a174840bda606a5788431fc09bd24adf91d82b80c4d1f2eb54dd7</sum></package><package arch="noarch" name="iwl135-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl135-firmware-18.168.6.1-81.el7_9.noarch.rpm</filename><sum type="sha256">e5e3bab7f8f5589ee6a17eb313d12254953c3c21f63a08826d85ec2020d55284</sum></package><package arch="noarch" name="iwl5000-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="8.83.5.1_1"><filename>iwl5000-firmware-8.83.5.1_1-81.el7_9.noarch.rpm</filename><sum type="sha256">fc1ce06c78cdd48debb695745efea63eaad5284f2699eefc719d12c167fb2fd9</sum></package><package arch="noarch" name="iwl105-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl105-firmware-18.168.6.1-81.el7_9.noarch.rpm</filename><sum type="sha256">b879c2d7580862a690a51ae3a181e5d5776ac19aa212b674d0f807623a296ee5</sum></package><package arch="noarch" name="iwl4965-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="228.61.2.24"><filename>iwl4965-firmware-228.61.2.24-81.el7_9.noarch.rpm</filename><sum type="sha256">d03d86d600173989e9041041e9a468b2290325fbaf25ffd822609e233931fc8a</sum></package><package arch="noarch" name="iwl6000-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="9.221.4.1"><filename>iwl6000-firmware-9.221.4.1-81.el7_9.noarch.rpm</filename><sum type="sha256">162f3331cb3d5e64a061141c3a9e2f322f6fbb1e12d0b1a9fd931a5a9fee4e16</sum></package><package arch="noarch" name="iwl2000-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl2000-firmware-18.168.6.1-81.el7_9.noarch.rpm</filename><sum type="sha256">ae840c8717376e1d523b22f2386ec667ca1b635aba1fb6e20ae732da6869d05a</sum></package><package arch="noarch" name="iwl3160-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="25.30.13.0"><filename>iwl3160-firmware-25.30.13.0-81.el7_9.noarch.rpm</filename><sum type="sha256">41525ac7e6724bd4c9ea6831ded4b7866e8af5eaa7d0159d2517aa687d477209</sum></package><package arch="noarch" name="iwl5150-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="8.24.2.2"><filename>iwl5150-firmware-8.24.2.2-81.el7_9.noarch.rpm</filename><sum type="sha256">1e9c0a37d2b6a5b32105e6b1de05ed59d775eb38340533b2b6c71774c38d6460</sum></package><package arch="noarch" name="iwl100-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="39.31.5.1"><filename>iwl100-firmware-39.31.5.1-81.el7_9.noarch.rpm</filename><sum type="sha256">8a7bf5a100adddff48301066d9cf50ba07dc49e8fe3e878c051ea4f2615fb170</sum></package><package arch="noarch" name="iwl6000g2a-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl6000g2a-firmware-18.168.6.1-81.el7_9.noarch.rpm</filename><sum type="sha256">723dba92e8f1c1c00498793b267d9c14e7e556ec0e01c597782dd1c8db999ddb</sum></package><package arch="noarch" name="iwl3945-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="15.32.2.9"><filename>iwl3945-firmware-15.32.2.9-81.el7_9.noarch.rpm</filename><sum type="sha256">face3fe8de08de6afc25fb51bd5b178813993c0a452d2767363b9ac2ae652f71</sum></package><package arch="noarch" name="iwl6000g2b-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl6000g2b-firmware-18.168.6.1-81.el7_9.noarch.rpm</filename><sum type="sha256">600345a505c735c250632a3d57da21b4e200e7a2f44e42edb6d58ab796366391</sum></package><package arch="noarch" name="iwl6050-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="41.28.5.1"><filename>iwl6050-firmware-41.28.5.1-81.el7_9.noarch.rpm</filename><sum type="sha256">b4f6feadde05b546328da0e0f2eb3559b34308e6170986220ff367fd99a12f54</sum></package><package arch="noarch" name="iwl7260-firmware" release="81.el7_9" src="linux-firmware-20200421-81.git78c0348.el7_9.src.rpm" version="25.30.13.0"><filename>iwl7260-firmware-25.30.13.0-81.el7_9.noarch.rpm</filename><sum type="sha256">a23ab5114a38337497f7bf572b518395bb7f162859fbdef592c104cacb74004a</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20569" id="CVE-2023-20569" title="Cve-2023-20569" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20593" id="CVE-2023-20593" title="Cve-2023-20593" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:7513" id="RHSA-2023:7513" title="Moderate: Linux-Firmware Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:7743</id><title>Low: Curl Security Update</title><description>The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP.
Security Fix(es):
* curl: Use-after-free triggered by an HTTP proxy deny response (CVE-2022-43552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>low</severity><issued date="2023-12-13 08:35:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="libcurl-devel" release="59.el7_9.2" src="curl-7.29.0-59.el7_9.2.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-59.el7_9.2.i686.rpm</filename><sum type="sha256">498441bce0334939d92470989ef0bf8e02a2083d5797b49d89fc415356ca0cfe</sum></package><package arch="i686" name="libcurl" release="59.el7_9.2" src="curl-7.29.0-59.el7_9.2.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-59.el7_9.2.i686.rpm</filename><sum type="sha256">c7e5a1ff315c48a648de2d245401e7fec04c6eb5a9b8eb59a726d1e8c90de1cf</sum></package><package arch="x86_64" name="libcurl-devel" release="59.el7_9.2" src="curl-7.29.0-59.el7_9.2.src.rpm" version="7.29.0"><filename>libcurl-devel-7.29.0-59.el7_9.2.x86_64.rpm</filename><sum type="sha256">b3aa7055b00066c3754a1704e4ef12dae91b8b2e25ab5e8e9d27459db17d0036</sum></package><package arch="x86_64" name="curl" release="59.el7_9.2" src="curl-7.29.0-59.el7_9.2.src.rpm" version="7.29.0"><filename>curl-7.29.0-59.el7_9.2.x86_64.rpm</filename><sum type="sha256">b1d71a1adf87744cfbd15084b3f7a06e72d51c58118ed7b6224ae5b4505723aa</sum></package><package arch="x86_64" name="libcurl" release="59.el7_9.2" src="curl-7.29.0-59.el7_9.2.src.rpm" version="7.29.0"><filename>libcurl-7.29.0-59.el7_9.2.x86_64.rpm</filename><sum type="sha256">c52b5493c22bcb5e3b7995c1aebf4ba1b005ac1d65a61f4074146b2b03779792</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-43552" id="CVE-2022-43552" title="Cve-2022-43552" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:7743" id="RHSA-2023:7743" title="Low: Curl Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2023:7783</id><title>Important: Postgresql Security Update</title><description>PostgreSQL is an advanced object-relational database management system (DBMS).
Security Fix(es):
* postgresql: Buffer overrun from integer overflow in array modification (CVE-2023-5869)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2023-12-13 12:19:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="postgresql-contrib" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-contrib-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">741a1dae7293037727b600dba20c327722f4b1df3b95c135b03aefcbebd87a3c</sum></package><package arch="i686" name="postgresql-libs" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-libs-9.2.24-9.el7_9.i686.rpm</filename><sum type="sha256">5c4ad860099c03846bee5ca107b5d0f6a2a6e91a82ab2b09bc9f1dee0e44117e</sum></package><package arch="x86_64" name="postgresql-plpython" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-plpython-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">44d0882ae7e3b0682c6b3abd5a980a150f2938d1aa1dae66e1119e429cd09124</sum></package><package arch="x86_64" name="postgresql-test" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-test-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">9845a8aaad4bceea3ee21d571fc84ecd3aa61f1308260c42cf0954c4c519a0bd</sum></package><package arch="x86_64" name="postgresql-libs" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-libs-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">5588f9ad921a40763be94440941d88fceb1d546fc6f7137bfe104067579780dd</sum></package><package arch="x86_64" name="postgresql-docs" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-docs-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">9086c9558b5b164b54dbf963a0237d3bab03a30db662d100adcfb72bd267f211</sum></package><package arch="i686" name="postgresql" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-9.2.24-9.el7_9.i686.rpm</filename><sum type="sha256">a48fad0888f1b99f77b9983c25cf914cedc9362001926489cb57f56b1973b3ba</sum></package><package arch="x86_64" name="postgresql-upgrade" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-upgrade-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">5abaf994b9145b83697a417448faeb7c2c20ddbbaceedc8812cb00ad1700c22f</sum></package><package arch="i686" name="postgresql-devel" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-devel-9.2.24-9.el7_9.i686.rpm</filename><sum type="sha256">6ec387d40f42de7229a454500fd0f493f4956913fa46145a94a2f14ab56fd910</sum></package><package arch="x86_64" name="postgresql-devel" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-devel-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">c3fa01e3b69d1d1b5f321eac8f16188fe5eb3ae4964a6a283b9bdff9c1a326db</sum></package><package arch="x86_64" name="postgresql" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">c902d80d63e50b7a4a56cf08053e31dd8de500fbc8e082238408279fb29b99fc</sum></package><package arch="i686" name="postgresql-static" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-static-9.2.24-9.el7_9.i686.rpm</filename><sum type="sha256">cbb2f795ef8f7fb625aa63da0a311b8e3bd52639d904af9f34460aba44b87460</sum></package><package arch="x86_64" name="postgresql-static" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-static-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">295fc83d94836a9f03421dd47666204ed6588016a9b4bf408d1a48654d1ac0dd</sum></package><package arch="x86_64" name="postgresql-plperl" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-plperl-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">4b5f50ad4677c2daccaea86737614f874b91ceaf618230c20994385917400679</sum></package><package arch="x86_64" name="postgresql-server" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-server-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">10d7427c5a7f618ab4a37ec4235346c5b67e05a6c31907c37a10f657aa028a9c</sum></package><package arch="x86_64" name="postgresql-pltcl" release="9.el7_9" src="postgresql-9.2.24-9.el7_9.src.rpm" version="9.2.24"><filename>postgresql-pltcl-9.2.24-9.el7_9.x86_64.rpm</filename><sum type="sha256">be26b19fd4a14836d1b1c60182ef90ae89674923226c04056ef27806cfb3a7a7</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5869" id="CVE-2023-5869" title="Cve-2023-5869" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2023:7783" id="RHSA-2023:7783" title="Important: Postgresql Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0006</id><title>Important: Tigervnc Security Update</title><description>Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377) * xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-02 09:16:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="tigervnc" release="28.el7_9" src="tigervnc-1.8.0-28.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-1.8.0-28.el7_9.x86_64.rpm</filename><sum type="sha256">d878ad53279d73a821eef6745e41475a13bf6423283929db83f80053934f9d91</sum></package><package arch="x86_64" name="tigervnc-server" release="28.el7_9" src="tigervnc-1.8.0-28.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-1.8.0-28.el7_9.x86_64.rpm</filename><sum type="sha256">4bf2bbb9e4b440fd8038341ae34a1568265ca33bf972538d5ae62c87fcf8bb57</sum></package><package arch="x86_64" name="tigervnc-server-minimal" release="28.el7_9" src="tigervnc-1.8.0-28.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-minimal-1.8.0-28.el7_9.x86_64.rpm</filename><sum type="sha256">f6d8b483b8f323a5d4421ef6ba62d6e49197813c5f80678794eff811746353bf</sum></package><package arch="noarch" name="tigervnc-server-applet" release="28.el7_9" src="tigervnc-1.8.0-28.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-applet-1.8.0-28.el7_9.noarch.rpm</filename><sum type="sha256">67ceb09f8df51f16ab3fd644f1786a7b852bcb3aa254778657d553de5ba6da21</sum></package><package arch="x86_64" name="tigervnc-server-module" release="28.el7_9" src="tigervnc-1.8.0-28.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-module-1.8.0-28.el7_9.x86_64.rpm</filename><sum type="sha256">a3860b641fa0d7eab0e113b080bd00faaf4be3d0aa40bdac4931ada911042945</sum></package><package arch="noarch" name="tigervnc-license" release="28.el7_9" src="tigervnc-1.8.0-28.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-license-1.8.0-28.el7_9.noarch.rpm</filename><sum type="sha256">725cfd357b9e8cc80ab130a699df3de04f5e9f4d928e0b1894aeef8eda1b49ac</sum></package><package arch="noarch" name="tigervnc-icons" release="28.el7_9" src="tigervnc-1.8.0-28.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-icons-1.8.0-28.el7_9.noarch.rpm</filename><sum type="sha256">a3c23f2b1a100a6c51e6b64162508b88c19f746dd453419871ef026be260547d</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377" id="CVE-2023-6377" title="Cve-2023-6377" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478" id="CVE-2023-6478" title="Cve-2023-6478" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0006" id="RHSA-2024:0006" title="Important: Tigervnc Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0009</id><title>Important: Xorg-X11-Server Security Update</title><description>X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: out-of-bounds memory reads/writes in XKB button actions (CVE-2023-6377) * xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-02 09:31:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-Xephyr" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-25.el7_9.x86_64.rpm</filename><sum type="sha256">cee49abea6f49e118f90cc707b18ae33b6dc79604abbca789e699da46987d0dd</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-25.el7_9.x86_64.rpm</filename><sum type="sha256">840305e25a4a9e6849ed74c7c0abe5ff8f18eec807b11356bba40ba959498f2b</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-25.el7_9.x86_64.rpm</filename><sum type="sha256">6d7a7c45531423fa11b19377c136e5b5762df48fa0f7c0fcb47e9ddb26c63a36</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-25.el7_9.x86_64.rpm</filename><sum type="sha256">042254433f043342a8daffc045a0f1baf62ef247337be8a01ecbc28fe0fae13d</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-25.el7_9.x86_64.rpm</filename><sum type="sha256">32e6a01863c31a84c3203c98f3d8c5b75c4b42c18369d2e2002e17ea646d9476</sum></package><package arch="i686" name="xorg-x11-server-devel" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-25.el7_9.i686.rpm</filename><sum type="sha256">89731ae94097e917ae4b164b58a0a9bb7bc739e427f6e5fdfe4347fdcc913ed9</sum></package><package arch="noarch" name="xorg-x11-server-source" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-25.el7_9.noarch.rpm</filename><sum type="sha256">9f08f449f6688a64c204989c7e636b14856398128f86df97b31a841c4c4f01d5</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-25.el7_9.x86_64.rpm</filename><sum type="sha256">3c3e3412caaef346ee605ffd15be54c3cf9de01db7e37f13c9cd36d9869ad100</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-25.el7_9.x86_64.rpm</filename><sum type="sha256">57b02626f21e3385750bbd68a73ca20b32fa8b5cd788d343fecd6e7b556c38e2</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="25.el7_9" src="xorg-x11-server-1.20.4-25.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-25.el7_9.x86_64.rpm</filename><sum type="sha256">e2f0a21015a38018eab2cf043f99c0c0dfcac6555a729c866ae1ae4167bef845</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6377" id="CVE-2023-6377" title="Cve-2023-6377" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6478" id="CVE-2023-6478" title="Cve-2023-6478" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0009" id="RHSA-2024:0009" title="Important: Xorg-X11-Server Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0013</id><title>Important: Gstreamer1-Plugins-Bad-Free Security Update</title><description>GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer1-plugins-bad-free package contains a collection of plug-ins for GStreamer.
Security Fix(es):
* gstreamer: MXF demuxer use-after-free vulnerability (CVE-2023-44446)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-02 09:16:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="gstreamer1-plugins-bad-free-devel" release="4.el7_9" src="gstreamer1-plugins-bad-free-1.10.4-4.el7_9.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-bad-free-devel-1.10.4-4.el7_9.x86_64.rpm</filename><sum type="sha256">1c7679ecfb7c3e30c43580ee577edd1f7a4bebced66fa7cc49cf45894f055a02</sum></package><package arch="x86_64" name="gstreamer1-plugins-bad-free" release="4.el7_9" src="gstreamer1-plugins-bad-free-1.10.4-4.el7_9.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-bad-free-1.10.4-4.el7_9.x86_64.rpm</filename><sum type="sha256">98e891ff0ba2d212f81e6fcffe2f6ac670c72919a71da83c6a71dea4663473dd</sum></package><package arch="i686" name="gstreamer1-plugins-bad-free-devel" release="4.el7_9" src="gstreamer1-plugins-bad-free-1.10.4-4.el7_9.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-bad-free-devel-1.10.4-4.el7_9.i686.rpm</filename><sum type="sha256">0422289588e8fbc4fcea0da7706e2b1d7b67f4b1e0ae8f5ac894434016837713</sum></package><package arch="x86_64" name="gstreamer1-plugins-bad-free-gtk" release="4.el7_9" src="gstreamer1-plugins-bad-free-1.10.4-4.el7_9.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-bad-free-gtk-1.10.4-4.el7_9.x86_64.rpm</filename><sum type="sha256">b2d48cf4954af8b2f90c0022a13d3e4d6fd0c9244562d721e1131bfe226e9b99</sum></package><package arch="i686" name="gstreamer1-plugins-bad-free" release="4.el7_9" src="gstreamer1-plugins-bad-free-1.10.4-4.el7_9.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-bad-free-1.10.4-4.el7_9.i686.rpm</filename><sum type="sha256">c23b206afed8176086ea06f99b1fd0ce60b41b7fc61fbbc04f903eb0a29df041</sum></package><package arch="i686" name="gstreamer1-plugins-bad-free-gtk" release="4.el7_9" src="gstreamer1-plugins-bad-free-1.10.4-4.el7_9.src.rpm" version="1.10.4"><filename>gstreamer1-plugins-bad-free-gtk-1.10.4-4.el7_9.i686.rpm</filename><sum type="sha256">b61e9981b5e312b3704c1e020036b8de4a1707248a2e1ac1587687067a7c2da9</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44446" id="CVE-2023-44446" title="Cve-2023-44446" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0013" id="RHSA-2024:0013" title="Important: Gstreamer1-Plugins-Bad-Free Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0026</id><title>Important: Firefox Security Update</title><description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.6.0 ESR.
Security Fix(es):
* Mozilla: Heap-buffer-overflow affecting WebGL &amp;lt;code&amp;gt;DrawElementsInstanced&amp;lt;/code&amp;gt; method with Mesa VM driver (CVE-2023-6856) * Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 (CVE-2023-6864) * Mozilla: Potential exposure of uninitialized data in &amp;lt;code&amp;gt;EncryptingOutputStream&amp;lt;/code&amp;gt; (CVE-2023-6865) * Mozilla: Symlinks may resolve to smaller than expected buffers (CVE-2023-6857) * Mozilla: Heap buffer overflow in &amp;lt;code&amp;gt;nsTextFragment&amp;lt;/code&amp;gt; (CVE-2023-6858) * Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859) * Mozilla: Potential sandbox escape due to &amp;lt;code&amp;gt;VideoBridge&amp;lt;/code&amp;gt; lack of texture validation (CVE-2023-6860) * Mozilla: Heap buffer overflow affected &amp;lt;code&amp;gt;nsWindow::PickerOpen(void)&amp;lt;/code&amp;gt; in headless mode (CVE-2023-6861) * Mozilla: Use-after-free in &amp;lt;code&amp;gt;nsDNSService&amp;lt;/code&amp;gt; (CVE-2023-6862) * Mozilla: Clickjacking permission prompts using the popup transition (CVE-2023-6867) * Mozilla: Undefined behavior in
&amp;lt;code&amp;gt;ShutdownObserver()&amp;lt;/code&amp;gt; (CVE-2023-6863)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-02 09:31:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.6.0-1.el7_9.src.rpm" version="115.6.0"><filename>firefox-115.6.0-1.el7_9.i686.rpm</filename><sum type="sha256">69c640581c71c0fcbcc844e1c7ab75ce5967a37ef63077b83e49b20fe2262066</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.6.0-1.el7_9.src.rpm" version="115.6.0"><filename>firefox-115.6.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">4537288ea302f365b22fa97445e724ca45ecdd860cffc10bd515a0bb469ff0d4</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" id="CVE-2023-6856" title="Cve-2023-6856" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" id="CVE-2023-6857" title="Cve-2023-6857" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" id="CVE-2023-6858" title="Cve-2023-6858" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" id="CVE-2023-6859" title="Cve-2023-6859" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" id="CVE-2023-6860" title="Cve-2023-6860" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" id="CVE-2023-6861" title="Cve-2023-6861" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" id="CVE-2023-6862" title="Cve-2023-6862" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" id="CVE-2023-6863" title="Cve-2023-6863" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" id="CVE-2023-6864" title="Cve-2023-6864" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6865" id="CVE-2023-6865" title="Cve-2023-6865" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6867" id="CVE-2023-6867" title="Cve-2023-6867" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0026" id="RHSA-2024:0026" title="Important: Firefox Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0027</id><title>Important: Thunderbird Security Update</title><description>Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.6.0.
Security Fix(es):
* Mozilla: Heap-buffer-overflow affecting WebGL &amp;lt;code&amp;gt;DrawElementsInstanced&amp;lt;/code&amp;gt; method with Mesa VM driver (CVE-2023-6856) * Mozilla: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6 (CVE-2023-6864) * Mozilla: S/MIME signature accepted despite mismatching message date (CVE-2023-50761) * Mozilla: Truncated signed text was shown with a valid OpenPGP signature (CVE-2023-50762) * Mozilla: Symlinks may resolve to smaller than expected buffers (CVE-2023-6857) * Mozilla: Heap buffer overflow in &amp;lt;code&amp;gt;nsTextFragment&amp;lt;/code&amp;gt; (CVE-2023-6858) * Mozilla: Use-after-free in PR_GetIdentitiesLayer (CVE-2023-6859) * Mozilla: Potential sandbox escape due to &amp;lt;code&amp;gt;VideoBridge&amp;lt;/code&amp;gt; lack of texture validation (CVE-2023-6860) * Mozilla: Heap buffer overflow affected &amp;lt;code&amp;gt;nsWindow::PickerOpen(void)&amp;lt;/code&amp;gt; in headless mode (CVE-2023-6861) * Mozilla: Use-after-free in &amp;lt;code&amp;gt;nsDNSService&amp;lt;/code&amp;gt; (CVE-2023-6862) * Mozilla: Undefined behavior in &amp;lt;code&amp;gt;ShutdownObserver()&amp;lt;/code&amp;gt;
(CVE-2023-6863)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-02 09:31:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-115.6.0-1.el7_9.src.rpm" version="115.6.0"><filename>thunderbird-115.6.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">85c44c0c883e100578a0a631f899fed79f62dbec9ab43577a196f35601ce6491</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50761" id="CVE-2023-50761" title="Cve-2023-50761" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50762" id="CVE-2023-50762" title="Cve-2023-50762" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6856" id="CVE-2023-6856" title="Cve-2023-6856" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6857" id="CVE-2023-6857" title="Cve-2023-6857" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6858" id="CVE-2023-6858" title="Cve-2023-6858" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6859" id="CVE-2023-6859" title="Cve-2023-6859" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6860" id="CVE-2023-6860" title="Cve-2023-6860" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6861" id="CVE-2023-6861" title="Cve-2023-6861" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6862" id="CVE-2023-6862" title="Cve-2023-6862" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6863" id="CVE-2023-6863" title="Cve-2023-6863" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6864" id="CVE-2023-6864" title="Cve-2023-6864" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0027" id="RHSA-2024:0027" title="Important: Thunderbird Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0145</id><title>Moderate: Ipa Security Update</title><description>Red Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* ipa: Invalid CSRF protection (CVE-2023-5455)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2024-01-12 08:01:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ipa-python-compat" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>ipa-python-compat-4.6.8-5.sl7_9.16.noarch.rpm</filename><sum type="sha256">afcf62d93d9c6a91c28564972d424fe96ecaeeb9ed15257c86cfaa7012870c73</sum></package><package arch="noarch" name="python2-ipalib" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>python2-ipalib-4.6.8-5.sl7_9.16.noarch.rpm</filename><sum type="sha256">56e0cc913272d59c7bac25811815868a011c1fc23ace80a1dfb2e3b33e7e270a</sum></package><package arch="noarch" name="ipa-server-common" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>ipa-server-common-4.6.8-5.sl7_9.16.noarch.rpm</filename><sum type="sha256">96243f825077947b9477fcc8b7a86ab5c4e9b866cfa4d1dbf347a5f72c5f3eb9</sum></package><package arch="x86_64" name="ipa-server" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>ipa-server-4.6.8-5.sl7_9.16.x86_64.rpm</filename><sum type="sha256">f03862146dd4db15a83b169823cf14d89da885a51ac03510e7a08c5d5b30ac50</sum></package><package arch="noarch" name="python2-ipaclient" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>python2-ipaclient-4.6.8-5.sl7_9.16.noarch.rpm</filename><sum type="sha256">d7449b964ca0d93bd691b3924ebd4597c3b8facd93bf8a73d9cf9054d24e9a8f</sum></package><package arch="noarch" name="ipa-client-common" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>ipa-client-common-4.6.8-5.sl7_9.16.noarch.rpm</filename><sum type="sha256">f2091a24905e839d934bdaf36f89f52383937115fb0d809400ea63c071a3c41d</sum></package><package arch="noarch" name="ipa-common" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>ipa-common-4.6.8-5.sl7_9.16.noarch.rpm</filename><sum type="sha256">8fea5b8c00ef9078db6c29ef767d003d4a5da6740b0db0d89644e69bb3af8321</sum></package><package arch="noarch" name="ipa-server-dns" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>ipa-server-dns-4.6.8-5.sl7_9.16.noarch.rpm</filename><sum type="sha256">e2e99bf84ccba419a2df4125eba8aed8e354faa2708417d7700e9d12a8d55e95</sum></package><package arch="x86_64" name="ipa-client" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>ipa-client-4.6.8-5.sl7_9.16.x86_64.rpm</filename><sum type="sha256">da0d5ed9a7a6dfe1a4e0b203e502ae5b9e8e775b3d6cd40ea148201e26240d71</sum></package><package arch="noarch" name="python2-ipaserver" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>python2-ipaserver-4.6.8-5.sl7_9.16.noarch.rpm</filename><sum type="sha256">9bd9a40c83b465f0f89ca7f784244c957a9c600914737dad342867a9296e32b8</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="5.sl7_9.16" src="ipa-4.6.8-5.sl7_9.16.src.rpm" version="4.6.8"><filename>ipa-server-trust-ad-4.6.8-5.sl7_9.16.x86_64.rpm</filename><sum type="sha256">d7f66d4c07be14d31442e011c376c15eeafb0c8133224eeb4d6836e36fcc446f</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5455" id="CVE-2023-5455" title="Cve-2023-5455" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0145" id="RHSA-2024:0145" title="Moderate: Ipa Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0223</id><title>Important: Java-1.8.0-Openjdk Security And Bug Fix Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) (CVE-2024-20918) * OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) (CVE-2024-20952) * OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) (CVE-2024-20919) * OpenJDK: range check loop optimization issue (8314307) (CVE-2024-20921) * OpenJDK: arbitrary Java code execution in Nashorn (8314284) (CVE-2024-20926) * OpenJDK: logging of digital signature private keys (8316976) (CVE-2024-20945)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* In the previous release in October 2023 (8u392), the RPMs were changed to use Provides for java, jre, java-headless, jre-headless, java-devel and java-sdk which included the full RPM version. This prevented the Provides being used to resolve a dependency on Java 1.8.0 (for example, "Requires: java-headless 1:1.8.0"). This change has now been reverted to the old "1:1.8.0" value. (RHEL-19630)
</description><severity>important</severity><issued date="2024-01-19 16:35:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-src-debug-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">dde02384d8965b1b5d6ac02d5562395e8fe7d3f32b169d0b51cc0f2dfb631fbb</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.402.b06-1.el7_9.noarch.rpm</filename><sum type="sha256">7361b0a79cea7ab301e84e9020b9b80196032be58382076647de5d2b948e49f3</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">e853059da15e811a901a2457d3f4e76c1b27a5373c129ad9f86bf0eddf06fc49</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">c519dc68deaa751bc3dcbbc630673277ddb8f59797ed806b82fd67e85f786fef</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">620c3d2bb18afd18943ed7b931a59c98ce4e51172dc10098177bb7103f182343</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">52a2a65f175019a84d92d4e7bd10f7d4a2a1620549121bd84bd693877805471e</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">e43196032476954d2186cde0d31f0d67a9370dee47e19b264e92180af5a684d6</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">c339e64ff249c0a41c74e0d45b4b815bab631775f0e020b764e158578ae46c1b</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-src-debug-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">085e1ecffc8fa3229546ab90c2832c853b65822ac6f0fe89e7ebfb780eaf654d</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.402.b06-1.el7_9.noarch.rpm</filename><sum type="sha256">9aa443b30c29acafad890abd5905f52b22ba1b164609c1acedfc98b9ce4d5352</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">00ebf212d95b5f39a4d75a7a276972e1d57a8f069205ad78137c2b4234c9fe9c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">74553d6272ba331071b0a8aa47bd77d1b45c025546a41fbe983d2afa1b8706d9</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-headless-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">889e875141b1f5df42a57d5c71f58a8548998bfb66863a2a03b5d1c5a8ad52d0</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">8b162f48db9c44de048a8cfadcf5c0d85378b8ee263bb29bfbc3ab366ca1dae3</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-debug-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">dac003986595c8b61e70b30a52b004ca526cb97e301b427cbed01379cdedb2bd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-demo-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">68d1d750ab3b071cdbbb360cc5ddc03e0ebadbabcc1f2638539fc1d5956a4313</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">8fb9d89cb92135c8fc87718624113eddd9147d572168cc7d2caab086bd6693f4</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">fa1ee407187fa3705573e8fb1c7d2667ff9e0cd286f3c00bb74fcad74cc54d5b</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-src-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">2eb2056b396149fceec9129c4f5d2384b123f0b519d48435af4f64f3119bcf26</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">eca089b02540431718b5f4ef73a50cece50caac23128e11c39153f3ee3f7ebb1</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.402.b06-1.el7_9.noarch.rpm</filename><sum type="sha256">ffc2d73db443bdc8c362d206da1484d0cf3f1563ca371a9c05ef734371ad962d</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">8d37d5dadbd56eefc491794e0a76f2299ab8ae87610534eea0bac073170a5091</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.402.b06-1.el7_9.x86_64.rpm</filename><sum type="sha256">08934624c43913ef01469cdb07033cb665925dc6b56d56924292e8cc8e584d6f</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-debug-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">15db9a206370da709910dbb60050fc3e3d0a02caaba117531056355b9c0c0c02</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-devel-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">6d4d26428da44b62bf2a54be4e62df24b42d6c7296d9edd6c637b7bcf5d487fd</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-accessibility-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">2d2672bbf31410f48b8ea2820549fef9e3f3e7a657a6f11e5d93e68ce947b92a</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-javadoc-1.8.0.402.b06-1.el7_9.noarch.rpm</filename><sum type="sha256">32af6a7462dc10af31dab9f263885d789bbc4584699f3f005605131fd1d83a41</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.402.b06-1.el7_9.src.rpm" version="1.8.0.402.b06"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.402.b06-1.el7_9.i686.rpm</filename><sum type="sha256">fc441b4c2acf427b4df871fde7a41cdcc91ada1fa9366ea47279e04f1b9bbcf2</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918" id="CVE-2024-20918" title="Cve-2024-20918" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919" id="CVE-2024-20919" title="Cve-2024-20919" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921" id="CVE-2024-20921" title="Cve-2024-20921" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926" id="CVE-2024-20926" title="Cve-2024-20926" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945" id="CVE-2024-20945" title="Cve-2024-20945" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952" id="CVE-2024-20952" title="Cve-2024-20952" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0223" id="RHSA-2024:0223" title="Important: Java-1.8.0-Openjdk Security And Bug Fix Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0232</id><title>Important: Java-11-Openjdk Security Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) (CVE-2024-20918) * OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) (CVE-2024-20952) * OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) (CVE-2024-20919) * OpenJDK: range check loop optimization issue (8314307) (CVE-2024-20921) * OpenJDK: arbitrary Java code execution in Nashorn (8314284) (CVE-2024-20926) * OpenJDK: logging of digital signature private keys (8316976) (CVE-2024-20945)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-19 16:35:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-demo-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">95576be2076e94f321be597b82c012c86361c5356cf844f86619cc6dd62c5e53</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-demo-debug-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">b77dab4d298a73238d6e19e59114793eb49ccc4b03f8b3745f88f663a258b461</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-headless-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">1c8872e428cd92d18a092ac69b51494d8b91985e7bc91f71bb692468fe0a2efe</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-headless-debug-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">6d197aafe764af0160b0da23049f3ccc5fdf7770a7dc473499cb49f1877e0556</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-javadoc-debug-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">5f505af6d49f833135800b8034e962058f24a2cdc6fd6e2416e6dd1c5a33416a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">44871757e5397e5f0ff59df1eb7d11c5e476976427db8a992bfe76678a5ef976</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">0621d1509b6394e973480a59b6cab842c967101d2f8142acd7992a5835b7abf6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-javadoc-zip-debug-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">117319bd032a4ef64d49cb6a3414626071a4db2c0a48675251aa76d58ef0ef45</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-jmods-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">7d94af7086999a9b14e8120cbe8b493fc641a3f9a85ac573050754b086ca4983</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-demo-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">0a870fe20b25057c5548716e32ce90d1cf6b9b48b62ddd5897ff858d015a1241</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-demo-debug-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">f379918409d5321ce1d3e56701ae947f73fd7de655c676ef1ebb481da5dc4d0a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-src-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">4d8de6773a7251746e3e975e65506206690bb5076927eb54b75b4f88586da265</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-headless-debug-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">270bc9bd8a9e1788d554e01da8e07b794033669407fe0dc1b634c4e83abe9016</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-debug-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">14c0faebea0f99195f73da800562e386075b28e459a8625e3e201d8e63402563</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-headless-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">6f3305d38383c213fd8a31bf5e7e1e16283a81f3742f6eb3bf2767ac8c7f063a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-static-libs-debug-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">b52efc2014e5e6f6d00b9da4f106a7de1d850bf2760d565d8b28636016bc67ba</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-javadoc-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">a864487011f9047034551d8e309d9d5ff322b53faf35a191a2288ce5843af83b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-src-debug-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">9e08bbbe35f812b16a16638c2d1fef2f52f8e61e61b2019485ceceac51e22c70</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-devel-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">9042cb7ac96e9b3ee54b2247c2a1460f0a681ba4d518cec61cf4b2faddb8676a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-jmods-debug-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">7fa496f97aeb3506611bc0a20c3d5fa84c17ae51a859d73309f751503ffba7d5</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-javadoc-zip-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">c4ed4a0b8d0e7c33b78a5c12d4401bb736d56959dd573c5e26515307bb64a057</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-javadoc-zip-debug-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">fd710de29dcdf89cf4e6a233122b7f1b405b370f13681049f6783212255b7829</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-javadoc-zip-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">9faa8250912a2be04d4498daa3fc0b40eacde1c144076c6837ae5e359414f50d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-static-libs-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">16b90f808a79a23246d661893064bea524dda0549caddd283e53cdc6fe06e110</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-javadoc-debug-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">63aa077fca3bd0309ad6339aa8b14d691f4a9b755adf23584a99e68160085564</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-jmods-debug-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">93a3522634768c262c2df5da341d0091fd8fe113222a0ce5ffaded281821fece</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-devel-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">ceccfdbf84e12de9260cf94520f64154cdc6d1360fa74a1c89b232487d28280a</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-devel-debug-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">c7dbfe21bc4a71451e335a05a632b07cc1adb551e534c024a5132c93a9a77ce6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-src-debug-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">4f78d38cc22c0000c60437b76a9dd1ace7e0119b374a855849814b98a96d438c</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-src-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">61b2000c37c25a6f56e4b7a88453ac8e857d9ed505827d272dee685fb1d498e7</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-jmods-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">4febd8135ba4cbcfab1e3fa238eaf5fceb4953c4a302af5d76a0db173b025779</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-debug-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">9e92a308ae9678956078aa4a638cf58cc7fe992fba72cc9ff3a922dd6a31faa0</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-devel-debug-11.0.22.0.7-1.el7_9.x86_64.rpm</filename><sum type="sha256">f69b67b651639c1296a154fc500e02fc359a0e90c11e825ae415abfcf8ff130e</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="1.el7_9" src="java-11-openjdk-11.0.22.0.7-1.el7_9.src.rpm" version="11.0.22.0.7"><filename>java-11-openjdk-javadoc-11.0.22.0.7-1.el7_9.i686.rpm</filename><sum type="sha256">0cbc4940043b1c9dded3f2e731211cf11c11667c64c68e2cc825b580799f0525</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20918" id="CVE-2024-20918" title="Cve-2024-20918" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20919" id="CVE-2024-20919" title="Cve-2024-20919" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20921" id="CVE-2024-20921" title="Cve-2024-20921" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20926" id="CVE-2024-20926" title="Cve-2024-20926" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20945" id="CVE-2024-20945" title="Cve-2024-20945" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20952" id="CVE-2024-20952" title="Cve-2024-20952" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0232" id="RHSA-2024:0232" title="Important: Java-11-Openjdk Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0279</id><title>Important: Gstreamer-Plugins-Bad-Free Security Update</title><description>GStreamer is a streaming media framework based on graphs of filters which operate on media data. The gstreamer-plugins-bad-free package contains a collection of plug-ins for GStreamer.
Security Fix(es):
* gstreamer: MXF demuxer use-after-free vulnerability (CVE-2023-44446)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-19 15:21:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="gstreamer-plugins-bad-free" release="24.el7_9" src="gstreamer-plugins-bad-free-0.10.23-24.el7_9.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-0.10.23-24.el7_9.i686.rpm</filename><sum type="sha256">46c922e1d24d8284170b98e0f142a0e17802842adc3da065bd8330dd6c081de8</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free" release="24.el7_9" src="gstreamer-plugins-bad-free-0.10.23-24.el7_9.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-0.10.23-24.el7_9.x86_64.rpm</filename><sum type="sha256">0934f97f08c806631a7f63644847e920c09a8f047d70e4dd76a35325a5af8bfc</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free-devel" release="24.el7_9" src="gstreamer-plugins-bad-free-0.10.23-24.el7_9.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-devel-0.10.23-24.el7_9.x86_64.rpm</filename><sum type="sha256">1802aadbbbf0087d8e2cce0dea743ecbcfb25e897183784bc0d88b004d3ec389</sum></package><package arch="x86_64" name="gstreamer-plugins-bad-free-devel-docs" release="24.el7_9" src="gstreamer-plugins-bad-free-0.10.23-24.el7_9.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-devel-docs-0.10.23-24.el7_9.x86_64.rpm</filename><sum type="sha256">8bb33140410d396a3c1e09e1e7636cfad5641d474c614dc8ee90434eab1ff9e8</sum></package><package arch="i686" name="gstreamer-plugins-bad-free-devel" release="24.el7_9" src="gstreamer-plugins-bad-free-0.10.23-24.el7_9.src.rpm" version="0.10.23"><filename>gstreamer-plugins-bad-free-devel-0.10.23-24.el7_9.i686.rpm</filename><sum type="sha256">5a20bfc364ce0109eb22d83a993604bbec573e15b5e42800f244dc945aaaeae5</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44446" id="CVE-2023-44446" title="Cve-2023-44446" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0279" id="RHSA-2024:0279" title="Important: Gstreamer-Plugins-Bad-Free Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0320</id><title>Important: Xorg-X11-Server Security Update</title><description>X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816) * xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229) * xorg-x11-server: SELinux unlabeled GLX PBuffer (CVE-2024-0408) * xorg-x11-server: SELinux context corruption (CVE-2024-0409) * xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885) * xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-22 11:41:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-Xvfb" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-27.el7_9.x86_64.rpm</filename><sum type="sha256">6778e751e0074379445b1d618d7fb380c5b8271870391f2b1986b1bd1fe67941</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-27.el7_9.x86_64.rpm</filename><sum type="sha256">cd1e3e50fd368947479e8e5a01613c78f88daba8f7e94234e7a486955b0f9c82</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-27.el7_9.x86_64.rpm</filename><sum type="sha256">aa8c44d5d0f90ec0e98953a3b942cbe1f5b3ef92c45406d0567237ab7aa01731</sum></package><package arch="x86_64" name="xorg-x11-server-devel" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-27.el7_9.x86_64.rpm</filename><sum type="sha256">85adcaa8f4a114ef75b8f463a7f43cec7a4b0338b5d93d8113ad76b98f8a1647</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-27.el7_9.x86_64.rpm</filename><sum type="sha256">f798bbfc8b5c38c89aa7580f8fcd9736d7fd8ea62cd463bde9226f0a81377da5</sum></package><package arch="noarch" name="xorg-x11-server-source" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-27.el7_9.noarch.rpm</filename><sum type="sha256">b91c387e09a82405d1b5936f85986ce2291a9efad65f4748183f9a74f9dfcdca</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-27.el7_9.x86_64.rpm</filename><sum type="sha256">ea9f77b8cd412fc9783b1337bffef758dfcb3f7c91723c38b1d9489afe87ce20</sum></package><package arch="i686" name="xorg-x11-server-devel" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-27.el7_9.i686.rpm</filename><sum type="sha256">217bf7588963dcd2af78b1400a42ec3855b517a4b1add62c3dc961e707cdf8ec</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-27.el7_9.x86_64.rpm</filename><sum type="sha256">18d38bc6740bc3142d0035dc752c5df83be63f5fc7378db267c809bfdc988e38</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="27.el7_9" src="xorg-x11-server-1.20.4-27.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-27.el7_9.x86_64.rpm</filename><sum type="sha256">d97635105ed33d28798a218a9f1c3d98e74c9b36553f9b7786954b83e3f66984</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816" id="CVE-2023-6816" title="Cve-2023-6816" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229" id="CVE-2024-0229" title="Cve-2024-0229" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0408" id="CVE-2024-0408" title="Cve-2024-0408" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0409" id="CVE-2024-0409" title="Cve-2024-0409" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885" id="CVE-2024-21885" title="Cve-2024-21885" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886" id="CVE-2024-21886" title="Cve-2024-21886" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0320" id="RHSA-2024:0320" title="Important: Xorg-X11-Server Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0343</id><title>Moderate: Libraw Security Update</title><description>LibRaw is a library for reading RAW files obtained from digital photo cameras (CRW/CR2, NEF, RAF, DNG, and others).
Security Fix(es):
* LibRaw: stack buffer overflow in LibRaw_buffer_datastream::gets() in src/libraw_datastream.cpp (CVE-2021-32142)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2024-01-23 14:02:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="LibRaw-static" release="2.el7_9" src="LibRaw-0.19.4-2.el7_9.src.rpm" version="0.19.4"><filename>LibRaw-static-0.19.4-2.el7_9.i686.rpm</filename><sum type="sha256">c07f0c388d53ef358304fbf5a890c8ed27ae53ac3562bf722810321531fd361e</sum></package><package arch="i686" name="LibRaw-devel" release="2.el7_9" src="LibRaw-0.19.4-2.el7_9.src.rpm" version="0.19.4"><filename>LibRaw-devel-0.19.4-2.el7_9.i686.rpm</filename><sum type="sha256">afe924b0d2eb987ea4ed17a7c86e6ce9a2aaa2203672a0e501e8f4542ce26df2</sum></package><package arch="x86_64" name="LibRaw-devel" release="2.el7_9" src="LibRaw-0.19.4-2.el7_9.src.rpm" version="0.19.4"><filename>LibRaw-devel-0.19.4-2.el7_9.x86_64.rpm</filename><sum type="sha256">9be290004a20cff637d7db3a166196299147d69eb4cfb37827fa64eb33766220</sum></package><package arch="i686" name="LibRaw" release="2.el7_9" src="LibRaw-0.19.4-2.el7_9.src.rpm" version="0.19.4"><filename>LibRaw-0.19.4-2.el7_9.i686.rpm</filename><sum type="sha256">21fa8b7b6ecf815d8cbcb1a7a3246c238e96be77a9b0fbc6df94b230dd376b04</sum></package><package arch="x86_64" name="LibRaw-static" release="2.el7_9" src="LibRaw-0.19.4-2.el7_9.src.rpm" version="0.19.4"><filename>LibRaw-static-0.19.4-2.el7_9.x86_64.rpm</filename><sum type="sha256">2efa6f2fff664a9e8d805395dd44f71dfb756e1fca4e1de635ea410afe69d9fd</sum></package><package arch="x86_64" name="LibRaw" release="2.el7_9" src="LibRaw-0.19.4-2.el7_9.src.rpm" version="0.19.4"><filename>LibRaw-0.19.4-2.el7_9.x86_64.rpm</filename><sum type="sha256">2cd76b61d30079714ab546a2d5d8270a6da702c9b19f6b947fec49d03fed2b96</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32142" id="CVE-2021-32142" title="Cve-2021-32142" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0343" id="RHSA-2024:0343" title="Moderate: Libraw Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0345</id><title>Moderate: Python-Pillow Security Update</title><description>The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.
Security Fix(es):
* python-pillow: uncontrolled resource consumption when textlength in an ImageDraw instance operates on a long text argument (CVE-2023-44271)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2024-01-23 14:02:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-pillow" release="24.gitd1c6db8.el7_9" src="python-pillow-2.0.0-24.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">81413d6b0956aff03a592b4b9dda1e107ea340a40c841e9f49fc0b8dcb778a61</sum></package><package arch="x86_64" name="python-pillow-sane" release="24.gitd1c6db8.el7_9" src="python-pillow-2.0.0-24.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-sane-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">7df5cda96de4345301564233d4f73210ecc6f5d4774f993730f56f7757b5ba0b</sum></package><package arch="x86_64" name="python-pillow-devel" release="24.gitd1c6db8.el7_9" src="python-pillow-2.0.0-24.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-devel-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">54388931d055924d06b0cd6dd8873d868143563199de035e45c51b6037afd611</sum></package><package arch="i686" name="python-pillow" release="24.gitd1c6db8.el7_9" src="python-pillow-2.0.0-24.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-2.0.0-24.gitd1c6db8.el7_9.i686.rpm</filename><sum type="sha256">9f082ca45e31f71798f6cd9e202c15f116b73edcdb1e89449c37c22cecd24e1c</sum></package><package arch="x86_64" name="python-pillow-qt" release="24.gitd1c6db8.el7_9" src="python-pillow-2.0.0-24.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-qt-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">754ea3a6ce7134fbc594c534a2a81bf845b369423871c9ad49f9afe6c9782099</sum></package><package arch="x86_64" name="python-pillow-doc" release="24.gitd1c6db8.el7_9" src="python-pillow-2.0.0-24.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-doc-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">5d329a9892fb932b1b2024236976baad22bd5ca3d6432851931ec97869baa662</sum></package><package arch="x86_64" name="python-pillow-tk" release="24.gitd1c6db8.el7_9" src="python-pillow-2.0.0-24.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-tk-2.0.0-24.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">f871880a43e6660c4103602b302e99e38455494651f2e6bb410535f45868d30c</sum></package><package arch="i686" name="python-pillow-devel" release="24.gitd1c6db8.el7_9" src="python-pillow-2.0.0-24.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-devel-2.0.0-24.gitd1c6db8.el7_9.i686.rpm</filename><sum type="sha256">b3a8eb943b033ae352a9449ade64acf785c669c3036d1f0bd7ad5e90e1208ecf</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44271" id="CVE-2023-44271" title="Cve-2023-44271" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0345" id="RHSA-2024:0345" title="Moderate: Python-Pillow Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0346</id><title>Important: Kernel Security And Bug Fix Update</title><description>The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* kernel: netfilter: potential slab-out-of-bound access due to integer underflow (CVE-2023-42753)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* gfs2: kernel BUG at fs/gfs2/lops.c:135 (BZ#2196280) * ax88179_178a 2-6:1.0 (unregistered net_device) (uninitialized): Failed to read reg index 0x0006: -71 (RHEL-6302)
</description><severity>important</severity><issued date="2024-01-24 10:57:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-tools" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">8ed03cdee3c6f96583e0d7213404eabcc01aea6a0df53bad7b20cb96666838f6</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.108.1.el7.noarch.rpm</filename><sum type="sha256">e199f6b0dda918678870e94fd82b6509db5d1d81c304e2ec7ad19b2a8fbd12c2</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">4d46be2e7f1aea69880cfb02c600953d0f848c3a5ea502388989bd44584e1956</sum></package><package arch="x86_64" name="bpftool" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">5babb17a292aa655c2458056ebb1073456db49e369a7d1f10786a4bcc4acaf86</sum></package><package arch="x86_64" name="kernel" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">8a44907d63ba2c431265cc97f497ed4998d58b0d716422b81ddfd3afbf936ba7</sum></package><package arch="x86_64" name="python-perf" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">0e68ec2adb0238e252e1999ecac0efb5b3bcfa1bf4994bd14f075785357dc109</sum></package><package arch="x86_64" name="kernel-devel" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">43098b52ac40ae5c5f3080ff5a42fc09262e882a822cb5e5947ced3dbdc2c2f4</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">43586f28a7c20ebfba8ae2fcf35a91780bf656a7a7a1207260a8d4b40891ad73</sum></package><package arch="x86_64" name="kernel-debug" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">b8fd50e3df21e313479ea3dbd5a21d07fa1b057b799a1b8ada709fcaceebeb7d</sum></package><package arch="x86_64" name="kernel-headers" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">d7d0b7a0b00169816abd24f0536b7af24067e2f68be53d15db85556474e0b6e8</sum></package><package arch="x86_64" name="perf" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">afa2282ea672e08045f6e7e20b3f52587719e7a0c403ccdfb3ac75513028615b</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.108.1.el7.x86_64.rpm</filename><sum type="sha256">1ae9bb5868083ed0ac71b848de353773db99073a37d54e27867400e1dbb9c0a5</sum></package><package arch="noarch" name="kernel-doc" release="1160.108.1.el7" src="kernel-3.10.0-1160.108.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.108.1.el7.noarch.rpm</filename><sum type="sha256">4cdc3a356924241aae99ad3debebaa1c8e2294e2eb6a86c96c94fe7694ab834f</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42753" id="CVE-2023-42753" title="Cve-2023-42753" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0346" id="RHSA-2024:0346" title="Important: Kernel Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2196280" id="2196280" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0600</id><title>Important: Firefox Security Update</title><description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.7.0 ESR.
Security Fix(es):
* Mozilla: Out of bounds write in ANGLE (CVE-2024-0741) * Mozilla: Failure to update user input timestamp (CVE-2024-0742) * Mozilla: Crash when listing printers on Linux (CVE-2024-0746) * Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set (CVE-2024-0747) * Mozilla: Phishing site popup could show local origin in address bar (CVE-2024-0749) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2024-0750) * Mozilla: Privilege escalation through devtools (CVE-2024-0751) * Mozilla: HSTS policy on subdomain could bypass policy of upper domain (CVE-2024-0753) * Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 (CVE-2024-0755)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-30 14:07:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.7.0-1.el7_9.src.rpm" version="115.7.0"><filename>firefox-115.7.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">ea22ef001519caa8ff417d9c87f6b375b1082727fcec2747802342a6e993b3b4</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.7.0-1.el7_9.src.rpm" version="115.7.0"><filename>firefox-115.7.0-1.el7_9.i686.rpm</filename><sum type="sha256">07313088232c6184aaa18e6cd5f3a64d0bf5a4373276de8e6b05ec4a1a1c03e6</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" id="CVE-2024-0741" title="Cve-2024-0741" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" id="CVE-2024-0742" title="Cve-2024-0742" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" id="CVE-2024-0746" title="Cve-2024-0746" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" id="CVE-2024-0747" title="Cve-2024-0747" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" id="CVE-2024-0749" title="Cve-2024-0749" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" id="CVE-2024-0750" title="Cve-2024-0750" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" id="CVE-2024-0751" title="Cve-2024-0751" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" id="CVE-2024-0753" title="Cve-2024-0753" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" id="CVE-2024-0755" title="Cve-2024-0755" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0600" id="RHSA-2024:0600" title="Important: Firefox Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0601</id><title>Important: Thunderbird Security Update</title><description>Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.7.0.
Security Fix(es):
* Mozilla: Out of bounds write in ANGLE (CVE-2024-0741) * Mozilla: Failure to update user input timestamp (CVE-2024-0742) * Mozilla: Crash when listing printers on Linux (CVE-2024-0746) * Mozilla: Bypass of Content Security Policy when directive unsafe-inline was set (CVE-2024-0747) * Mozilla: Phishing site popup could show local origin in address bar (CVE-2024-0749) * Mozilla: Potential permissions request bypass via clickjacking (CVE-2024-0750) * Mozilla: Privilege escalation through devtools (CVE-2024-0751) * Mozilla: HSTS policy on subdomain could bypass policy of upper domain (CVE-2024-0753) * Mozilla: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7 (CVE-2024-0755)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-01-30 14:07:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-115.7.0-1.el7_9.src.rpm" version="115.7.0"><filename>thunderbird-115.7.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">a8d93b2a5cfc9fd072a7304a659f1c3fdec5ad7756d516d0fc2b9aa00d0fbb79</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0741" id="CVE-2024-0741" title="Cve-2024-0741" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0742" id="CVE-2024-0742" title="Cve-2024-0742" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0746" id="CVE-2024-0746" title="Cve-2024-0746" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0747" id="CVE-2024-0747" title="Cve-2024-0747" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0749" id="CVE-2024-0749" title="Cve-2024-0749" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0750" id="CVE-2024-0750" title="Cve-2024-0750" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0751" id="CVE-2024-0751" title="Cve-2024-0751" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0753" id="CVE-2024-0753" title="Cve-2024-0753" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0755" id="CVE-2024-0755" title="Cve-2024-0755" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0601" id="RHSA-2024:0601" title="Important: Thunderbird Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0629</id><title>Important: Tigervnc Security Update</title><description>Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816) * xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229) * xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885) * xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-02-02 08:09:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="tigervnc-server-minimal" release="31.el7_9" src="tigervnc-1.8.0-31.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-minimal-1.8.0-31.el7_9.x86_64.rpm</filename><sum type="sha256">b63f27490a21ca002b9b142c768efef20e9c395d54e892057bb58608cc204fa8</sum></package><package arch="x86_64" name="tigervnc" release="31.el7_9" src="tigervnc-1.8.0-31.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-1.8.0-31.el7_9.x86_64.rpm</filename><sum type="sha256">4b100d9b5c7636dfdfdfe41a637d0526490bce975df2325af3d0922939dd67ca</sum></package><package arch="x86_64" name="tigervnc-server" release="31.el7_9" src="tigervnc-1.8.0-31.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-1.8.0-31.el7_9.x86_64.rpm</filename><sum type="sha256">ba082c4d938772188057ad42edcce544b2dcecc2a610d34c61c4ee758d772ed3</sum></package><package arch="noarch" name="tigervnc-icons" release="31.el7_9" src="tigervnc-1.8.0-31.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-icons-1.8.0-31.el7_9.noarch.rpm</filename><sum type="sha256">07a9abca01452eaa3c9dbfd9c5f9fb66ddcdef37278b8e4443d44e3fe33b27ca</sum></package><package arch="noarch" name="tigervnc-server-applet" release="31.el7_9" src="tigervnc-1.8.0-31.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-applet-1.8.0-31.el7_9.noarch.rpm</filename><sum type="sha256">1d4bb14474a252b9009725af3d0853209f7723cdaf3892644aef511b9cb15578</sum></package><package arch="noarch" name="tigervnc-license" release="31.el7_9" src="tigervnc-1.8.0-31.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-license-1.8.0-31.el7_9.noarch.rpm</filename><sum type="sha256">160eddd328e690a5339dd325e0dd8209d4a6cf237f8895dbf0be2052411960a6</sum></package><package arch="x86_64" name="tigervnc-server-module" release="31.el7_9" src="tigervnc-1.8.0-31.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-module-1.8.0-31.el7_9.x86_64.rpm</filename><sum type="sha256">b0ca8ac5f2622ea90ff9de469ead08695c1b43cdcce2779c53ea534521fc95de</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6816" id="CVE-2023-6816" title="Cve-2023-6816" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0229" id="CVE-2024-0229" title="Cve-2024-0229" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21885" id="CVE-2024-21885" title="Cve-2024-21885" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21886" id="CVE-2024-21886" title="Cve-2024-21886" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0629" id="RHSA-2024:0629" title="Important: Tigervnc Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0753</id><title>Moderate: Linux-Firmware Security Update</title><description>The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
Security Fix(es):
* (RCVE-2023-20592)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2024-02-09 16:22:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="iwl6050-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="41.28.5.1"><filename>iwl6050-firmware-41.28.5.1-82.el7_9.noarch.rpm</filename><sum type="sha256">bede749692b47135cac3d83f3811deaaa856821d340a49e23c281a4da586f3bc</sum></package><package arch="noarch" name="iwl6000g2b-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl6000g2b-firmware-18.168.6.1-82.el7_9.noarch.rpm</filename><sum type="sha256">141487a55bbc7dbdf9f830b07f80cbf8e2d34c75aac27fb2ac98237e6f2ab244</sum></package><package arch="noarch" epoch="1" name="iwl1000-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="39.31.5.1"><filename>iwl1000-firmware-39.31.5.1-82.el7_9.noarch.rpm</filename><sum type="sha256">54b17ad5fd3c9c574dfcefefb2a8834656fdd82cf152caf8b9ba308cebf7d1bd</sum></package><package arch="noarch" name="iwl5150-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="8.24.2.2"><filename>iwl5150-firmware-8.24.2.2-82.el7_9.noarch.rpm</filename><sum type="sha256">b7c434a206a59763ca232a0bb8e49701aa018d93b0d1cc041814e6d94bf50c4b</sum></package><package arch="noarch" name="iwl6000g2a-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl6000g2a-firmware-18.168.6.1-82.el7_9.noarch.rpm</filename><sum type="sha256">0d692533b2a5ed4ed28868c7bb8334525076497de50353ad813da6fe07734284</sum></package><package arch="noarch" name="iwl135-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl135-firmware-18.168.6.1-82.el7_9.noarch.rpm</filename><sum type="sha256">95bfaba9b5653a83e20c9932b2930eb6bda85d510059a5c43cf550a53ae448e7</sum></package><package arch="noarch" name="linux-firmware" release="82.git78c0348.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="20200421"><filename>linux-firmware-20200421-82.git78c0348.el7_9.noarch.rpm</filename><sum type="sha256">a8777329c0b6e715eac602ff58a6429bca76e76ac70603206312441bf247a2ad</sum></package><package arch="noarch" name="iwl7260-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="25.30.13.0"><filename>iwl7260-firmware-25.30.13.0-82.el7_9.noarch.rpm</filename><sum type="sha256">e64a97d5c671efc4fa415bd4c532464a6262f62b1a9fa98a799c03487433ad0d</sum></package><package arch="noarch" name="iwl105-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl105-firmware-18.168.6.1-82.el7_9.noarch.rpm</filename><sum type="sha256">3d0b10f45e5f0c5ae891adcb8584696e241ebe689ac0cfa747f6fccf7a5849ac</sum></package><package arch="noarch" name="iwl3160-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="25.30.13.0"><filename>iwl3160-firmware-25.30.13.0-82.el7_9.noarch.rpm</filename><sum type="sha256">af80422a01927bfdb8b5205ef9d97360eaa757c898688dc506466eca6f067406</sum></package><package arch="noarch" name="iwl2000-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl2000-firmware-18.168.6.1-82.el7_9.noarch.rpm</filename><sum type="sha256">af3ed29b25df5c8a78f4b10a974cdd2ebc5dbfc7a3ee9e2d5ef010fe20851f30</sum></package><package arch="noarch" name="iwl6000-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="9.221.4.1"><filename>iwl6000-firmware-9.221.4.1-82.el7_9.noarch.rpm</filename><sum type="sha256">dc0489d581ae27ffc1ce06e394aab2912de78a3f6f3bce244e7bab0692373006</sum></package><package arch="noarch" name="iwl2030-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl2030-firmware-18.168.6.1-82.el7_9.noarch.rpm</filename><sum type="sha256">77d06de2dc9b5b81939baafdb9150ec3b9a5f407cb384ee53d17e1d0596d3aa5</sum></package><package arch="noarch" name="iwl5000-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="8.83.5.1_1"><filename>iwl5000-firmware-8.83.5.1_1-82.el7_9.noarch.rpm</filename><sum type="sha256">e02af43fa4eead018ef3b96bc5e13b1753bfaad664429845c0aef433765ef060</sum></package><package arch="noarch" name="iwl100-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="39.31.5.1"><filename>iwl100-firmware-39.31.5.1-82.el7_9.noarch.rpm</filename><sum type="sha256">91f90c313410f56aed94e461a0e925b6df6d91a3a93d1376dbcddc7e7e0fd5ad</sum></package><package arch="noarch" name="iwl4965-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="228.61.2.24"><filename>iwl4965-firmware-228.61.2.24-82.el7_9.noarch.rpm</filename><sum type="sha256">da898bc4b4e3150cf1460c4eeda3405a39f7ce8892e7094414c529d30a296422</sum></package><package arch="noarch" name="iwl3945-firmware" release="82.el7_9" src="linux-firmware-20200421-82.git78c0348.el7_9.src.rpm" version="15.32.2.9"><filename>iwl3945-firmware-15.32.2.9-82.el7_9.noarch.rpm</filename><sum type="sha256">097176fa2cb3c3f5caf9d1fa228090fd6d5c9dd78f8d212fcdc96ecf711a55cd</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20592" id="CVE-2023-20592" title="Cve-2023-20592" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0753" id="RHSA-2024:0753" title="Moderate: Linux-Firmware Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0857</id><title>Important: Python-Pillow Security Update</title><description>The python-pillow packages contain a Python image processing library that provides extensive file format support, an efficient internal representation, and powerful image-processing capabilities.
Security Fix(es):
* pillow: Arbitrary Code Execution via the environment parameter (CVE-2023-50447)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-02-20 10:35:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-pillow-tk" release="25.gitd1c6db8.el7_9" src="python-pillow-2.0.0-25.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-tk-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">15ae81d0c24e554168f090c91b0bc2b5581f0d142a5bef76c9e770d4a7c29802</sum></package><package arch="i686" name="python-pillow" release="25.gitd1c6db8.el7_9" src="python-pillow-2.0.0-25.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-2.0.0-25.gitd1c6db8.el7_9.i686.rpm</filename><sum type="sha256">791474fa898b4d6fa0ebdb548ed5799c07682da9ada08418be98c027169e4f32</sum></package><package arch="x86_64" name="python-pillow-devel" release="25.gitd1c6db8.el7_9" src="python-pillow-2.0.0-25.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-devel-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">0e5b6de2c1553be4d41141f38ee00540dee7f7bac9856cd13e3a5577bc44e79d</sum></package><package arch="x86_64" name="python-pillow-doc" release="25.gitd1c6db8.el7_9" src="python-pillow-2.0.0-25.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-doc-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">7913772aeb3a93c0c8f76445b344a0e683bd79d3a9d15080fdb4a08d22c57993</sum></package><package arch="i686" name="python-pillow-devel" release="25.gitd1c6db8.el7_9" src="python-pillow-2.0.0-25.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-devel-2.0.0-25.gitd1c6db8.el7_9.i686.rpm</filename><sum type="sha256">38a8568a5a6917fed7d4ca98920d155a2a4391e7172ea37054f73fe7c4afdb1e</sum></package><package arch="x86_64" name="python-pillow-sane" release="25.gitd1c6db8.el7_9" src="python-pillow-2.0.0-25.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-sane-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">bc9b15bb3548fca39106e1dd305aafcfecdddb850043ac44e12acaa19d73175d</sum></package><package arch="x86_64" name="python-pillow-qt" release="25.gitd1c6db8.el7_9" src="python-pillow-2.0.0-25.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-qt-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">4d006721fe89a5c6fa877246ae5304b6c0c98ca697495886f0d15e4cb52d2ace</sum></package><package arch="x86_64" name="python-pillow" release="25.gitd1c6db8.el7_9" src="python-pillow-2.0.0-25.gitd1c6db8.el7_9.src.rpm" version="2.0.0"><filename>python-pillow-2.0.0-25.gitd1c6db8.el7_9.x86_64.rpm</filename><sum type="sha256">4e40b851a547086a74959ca0b2a31dfa750e1882e98dd5a8a56534c2f033e53a</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50447" id="CVE-2023-50447" title="Cve-2023-50447" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:0857" id="RHSA-2024:0857" title="Important: Python-Pillow Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0957</id><title>Important: Thunderbird Security Update</title><description>Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.8.0.
Security Fix(es):
* Mozilla: Out-of-bounds memory read in networking channels (CVE-2024-1546) * Mozilla: Alert dialog could have been spoofed on another site (CVE-2024-1547) * Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8 (CVE-2024-1553) * Mozilla: Fullscreen Notification could have been hidden by select element (CVE-2024-1548) * Mozilla: Custom cursor could obscure the permission dialog (CVE-2024-1549) * Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants (CVE-2024-1550) * Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts (CVE-2024-1551) * Mozilla: Incorrect code generation on 32-bit ARM devices (CVE-2024-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><issued date="2024-02-26 13:23:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-115.8.0-1.el7_9.src.rpm" version="115.8.0"><filename>thunderbird-115.8.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">b93f4388564d33caa2064835d37d025d08c1b8d66e51e872a3921bc0f40645d6</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2024:0957" id="RHSA-2024:0957" title="Important: Thunderbird Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:0976</id><title>Important: Firefox Security Update</title><description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.8.0 ESR.
Security Fix(es):
* Mozilla: Out-of-bounds memory read in networking channels (CVE-2024-1546) * Mozilla: Alert dialog could have been spoofed on another site (CVE-2024-1547) * Mozilla: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8 (CVE-2024-1553) * Mozilla: Fullscreen Notification could have been hidden by select element (CVE-2024-1548) * Mozilla: Custom cursor could obscure the permission dialog (CVE-2024-1549) * Mozilla: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants (CVE-2024-1550) * Mozilla: Multipart HTTP Responses would accept the Set-Cookie header in response parts (CVE-2024-1551) * Mozilla: Incorrect code generation on 32-bit ARM devices (CVE-2024-1552)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><issued date="2024-02-26 13:23:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.8.0-1.el7_9.src.rpm" version="115.8.0"><filename>firefox-115.8.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">19645f18638c73e54e5a9ab313bc9cd6fd7f9324afe5a071c4b777a21e1ad939</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.8.0-1.el7_9.src.rpm" version="115.8.0"><filename>firefox-115.8.0-1.el7_9.i686.rpm</filename><sum type="sha256">f08e3beb43fee16a6bce5a10defd482ad304f42980b9ca9b7be65555bce9fc2a</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2024:0976" id="RHSA-2024:0976" title="Important: Firefox Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1249</id><title>Important: Kernel Security And Bug Fix Update</title><description>The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security Fix(es):
* (CVE-2024-26602, ?) * kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c (CVE-2022-42896) * kernel: use-after-free in sch_qfq network scheduler (CVE-2023-4921) * kernel: IGB driver inadequate buffer size for frames larger than MTU (CVE-2023-45871) * kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment (CVE-2023-38409) * kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init() function (CVE-2024-1086)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* [rhel-7] INFO: possible circular locking dependency detected: store+0x70/0xe0 kernfs_fop_write+0xe3/0x190 (BZ#2161654) * qedf: Reading /sys/kernel/debug/qedf/hostX/stop_io_on_error can cause panic (BZ#2224973)
</description><severity>important</severity><issued date="2024-03-21 08:28:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="python-perf" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">6219ccf626b63bfab99d033de385dba6b35d64154246c6fd87812ec21e8e9567</sum></package><package arch="x86_64" name="kernel-devel" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">fda8c918fc3432c34e4268978b46c786654968f2a0601c6abdfe2d643733f990</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">203be60922d3278b1b6d9471c79cab6f9bfa2a0fd05b05dc5fdca7042aa6fb6e</sum></package><package arch="x86_64" name="kernel-headers" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">0a74334fadf5e361e000cdfd3914bab8064753102fdf58527a4c1f18e88ed0ea</sum></package><package arch="x86_64" name="perf" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">b5912c34f83560f9865f6f1fba4f654f7eea21409398c0b15be377e95e45cf5b</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">791452b00d72645b5e5c89f1f04b9d21efbce3b90009de08924f5b4797d8903b</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">a76baaa0c86b21c117e3b32b9378a3dc132095b00cba8c207c9c0293b4cba73d</sum></package><package arch="x86_64" name="bpftool" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">a734e79d3bc421f931d2d82589a7103260a56804728153892a0411b268848840</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.114.2.el7.noarch.rpm</filename><sum type="sha256">8451aa49628585a9f0906f5104d7d6ba5087251161b07861149fa5a68f34f516</sum></package><package arch="x86_64" name="kernel-debug" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">6d80eb63b24244233b797ebcb16866ce03198e8bd8d097de606bad6f046bac58</sum></package><package arch="noarch" name="kernel-doc" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.114.2.el7.noarch.rpm</filename><sum type="sha256">3d9873984d98e433540c1af5b1d24fed7014cee60c834f5793708a0f651dd30d</sum></package><package arch="x86_64" name="kernel-tools" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">8a07d2f79c4bbcf23b91292c704d658bd4ea30c4d82402774a36dbd95a172f0b</sum></package><package arch="x86_64" name="kernel" release="1160.114.2.el7" src="kernel-3.10.0-1160.114.2.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.114.2.el7.x86_64.rpm</filename><sum type="sha256">49c52b78daffac4caa1ac6602573916787864be7bb05d7a94416bfb7544b3922</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42896" id="CVE-2022-42896" title="Cve-2022-42896" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38409" id="CVE-2023-38409" title="Cve-2023-38409" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45871" id="CVE-2023-45871" title="Cve-2023-45871" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4921" id="CVE-2023-4921" title="Cve-2023-4921" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1086" id="CVE-2024-1086" title="Cve-2024-1086" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26602" id="CVE-2024-26602" title="Cve-2024-26602" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1249" id="RHSA-2024:1249" title="Important: Kernel Security And Bug Fix Update" type="self" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2161654" id="2161654" title="Bug Access Denied" type="bugzilla" /><reference href="https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=2224973" id="2224973" title="Bug Access Denied" type="bugzilla" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1486</id><title>Critical: Firefox Security Update</title><description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.9.1 ESR.
Security Fix(es):
* nss: timing attack against RSA decryption (CVE-2023-5388) * Mozilla: Crash in NSS TLS method (CVE-2024-0743) * Mozilla: JIT code failed to save return registers on Armv7-A (CVE-2024-2607) * Mozilla: Integer overflow could have led to out of bounds write (CVE-2024-2608) * Mozilla: Improve handling of out-of-memory conditions in ICU (CVE-2024-2616) * Mozilla: Improper handling of html and body tags enabled CSP nonce leakage (CVE-2024-2610) * Mozilla: Clickjacking vulnerability could have led to a user accidentally granting permissions (CVE-2024-2611) * Mozilla: Self referencing object could have potentially led to a use-after-free (CVE-2024-2612) * Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9 (CVE-2024-2614) * Mozilla: Privileged JavaScript Execution via Event Handlers (CVE-2024-29944)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>critical</severity><issued date="2024-03-26 10:07:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.9.1-1.el7_9.src.rpm" version="115.9.1"><filename>firefox-115.9.1-1.el7_9.x86_64.rpm</filename><sum type="sha256">f288a71162f7c339c59ad0bdca178fcb27e415e0866b00db0cd176c57dbd1706</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.9.1-1.el7_9.src.rpm" version="115.9.1"><filename>firefox-115.9.1-1.el7_9.i686.rpm</filename><sum type="sha256">9518d749a87e95259d1331d59693d6a74d7e9eee033f5a31d1676c914155d44b</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388" id="CVE-2023-5388" title="Cve-2023-5388" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743" id="CVE-2024-0743" title="Cve-2024-0743" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607" id="CVE-2024-2607" title="Cve-2024-2607" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608" id="CVE-2024-2608" title="Cve-2024-2608" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610" id="CVE-2024-2610" title="Cve-2024-2610" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611" id="CVE-2024-2611" title="Cve-2024-2611" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612" id="CVE-2024-2612" title="Cve-2024-2612" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614" id="CVE-2024-2614" title="Cve-2024-2614" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2616" id="CVE-2024-2616" title="Cve-2024-2616" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-29944" id="CVE-2024-29944" title="Cve-2024-29944" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1486" id="RHSA-2024:1486" title="Critical: Firefox Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1498</id><title>Moderate: Thunderbird Security Update</title><description>Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.9.0.
Security Fix(es):
* nss: timing attack against RSA decryption (CVE-2023-5388) * Mozilla: Crash in NSS TLS method (CVE-2024-0743) * Mozilla: Leaking of encrypted email subjects to other conversations  (CVE-2024-1936) * Mozilla: JIT code failed to save return registers on Armv7-A (CVE-2024-2607) * Mozilla: Integer overflow could have led to out of bounds write
(CVE-2024-2608)
* Mozilla: Improper handling of html and body tags enabled CSP nonce leakage
(CVE-2024-2610)
* Mozilla: Clickjacking vulnerability could have led to a user accidentally
granting permissions (CVE-2024-2611)
* Mozilla: Self referencing object could have potentially led to a
use-after-free (CVE-2024-2612)
* Mozilla: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and
Thunderbird 115.9 (CVE-2024-2614)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2024-03-26 10:07:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-115.9.0-1.el7_9.src.rpm" version="115.9.0"><filename>thunderbird-115.9.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">633ac61bf649cbb0a8af1fe19bf02629b6aa72b06a1f7bc010f3e0191c081bf1</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5388" id="CVE-2023-5388" title="Cve-2023-5388" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0743" id="CVE-2024-0743" title="Cve-2024-0743" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1936" id="CVE-2024-1936" title="Cve-2024-1936" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2607" id="CVE-2024-2607" title="Cve-2024-2607" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2608" id="CVE-2024-2608" title="Cve-2024-2608" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2610" id="CVE-2024-2610" title="Cve-2024-2610" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2611" id="CVE-2024-2611" title="Cve-2024-2611" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2612" id="CVE-2024-2612" title="Cve-2024-2612" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2614" id="CVE-2024-2614" title="Cve-2024-2614" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1498" id="RHSA-2024:1498" title="Moderate: Thunderbird Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1785</id><title>Important: X.Org Server Security Update</title><description>X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.
Security Fix(es):
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080) * xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081) * xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-04-12 11:20:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="xorg-x11-server-devel" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-29.el7_9.x86_64.rpm</filename><sum type="sha256">9cd2ecb63df9fb22b407d4985082354910087069eb12747b1a3c8dbd91a376c8</sum></package><package arch="x86_64" name="xorg-x11-server-Xephyr" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xephyr-1.20.4-29.el7_9.x86_64.rpm</filename><sum type="sha256">36081c9b9c87022032141d87cee179ca1e4bb24b8e3cec5f810f3ab3292b9879</sum></package><package arch="x86_64" name="xorg-x11-server-common" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-common-1.20.4-29.el7_9.x86_64.rpm</filename><sum type="sha256">ae83d82858bf83da7eb37ddae61f71b588879adba1aee004ba37fa6c2d6d282e</sum></package><package arch="x86_64" name="xorg-x11-server-Xnest" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xnest-1.20.4-29.el7_9.x86_64.rpm</filename><sum type="sha256">a8f92d3db45455d068361ebaa8af64275d656af1a44d0d7cf1c3db6e0ed91e53</sum></package><package arch="x86_64" name="xorg-x11-server-Xwayland" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xwayland-1.20.4-29.el7_9.x86_64.rpm</filename><sum type="sha256">3f71c6f0a460e254f7fa38a4f70022c2c16b0434b7420d55c85b95c33edfe2ca</sum></package><package arch="x86_64" name="xorg-x11-server-Xvfb" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xvfb-1.20.4-29.el7_9.x86_64.rpm</filename><sum type="sha256">75f7bf39ae5ecfa5c37a5fda81409b7a747e3ea195240253b07e5e2fbde9fbde</sum></package><package arch="x86_64" name="xorg-x11-server-Xorg" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xorg-1.20.4-29.el7_9.x86_64.rpm</filename><sum type="sha256">0592fe7d3f6d6942ecef2e6f48163fac7cf59b2d760479fb6110f81b240b650f</sum></package><package arch="i686" name="xorg-x11-server-devel" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-devel-1.20.4-29.el7_9.i686.rpm</filename><sum type="sha256">f7a93733b242167bb472f01c0d7ba503dbfa21a96eca2e2707ab2967e47c3791</sum></package><package arch="noarch" name="xorg-x11-server-source" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-source-1.20.4-29.el7_9.noarch.rpm</filename><sum type="sha256">b575bab4e5c503acc122713aa952b48ec27c1f2e2d71abe1d9a7e2e310d01e87</sum></package><package arch="x86_64" name="xorg-x11-server-Xdmx" release="29.el7_9" src="xorg-x11-server-1.20.4-29.el7_9.src.rpm" version="1.20.4"><filename>xorg-x11-server-Xdmx-1.20.4-29.el7_9.x86_64.rpm</filename><sum type="sha256">3387269f61804f0b2b7a9606c3a1344123086b21b9ae3e253996b289b54daa30</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080" id="CVE-2024-31080" title="Cve-2024-31080" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081" id="CVE-2024-31081" title="Cve-2024-31081" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083" id="CVE-2024-31083" title="Cve-2024-31083" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1785" id="RHSA-2024:1785" title="Important: X.Org Server Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1787</id><title>Important: Squid Security Update</title><description>Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects.
Security Fix(es):
* squid: denial of service in HTTP header parser (CVE-2024-25617) * squid: denial of service in HTTP request parsing (CVE-2023-50269) * squid: Buffer over-read in the HTTP Message processing feature (CVE-2023-49285) * squid: Incorrect Check of Function Return Value In Helper Process management (CVE-2023-49286) * squid: NULL pointer dereference in the gopher protocol code (CVE-2023-46728) * squid: Denial of Service in SSL Certificate validation (CVE-2023-46724)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-04-12 11:20:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="7" name="squid" release="17.el7_9.10" src="squid-3.5.20-17.el7_9.10.src.rpm" version="3.5.20"><filename>squid-3.5.20-17.el7_9.10.x86_64.rpm</filename><sum type="sha256">535a00517c6bfbc2eca005ca05996bec350f327132f69dc9810e100b756d33b9</sum></package><package arch="x86_64" epoch="7" name="squid-migration-script" release="17.el7_9.10" src="squid-3.5.20-17.el7_9.10.src.rpm" version="3.5.20"><filename>squid-migration-script-3.5.20-17.el7_9.10.x86_64.rpm</filename><sum type="sha256">1e1ad8c5ac62df286ba1a1efb4176f3191425f71477815589b05339e2df1d1a2</sum></package><package arch="x86_64" epoch="7" name="squid-sysvinit" release="17.el7_9.10" src="squid-3.5.20-17.el7_9.10.src.rpm" version="3.5.20"><filename>squid-sysvinit-3.5.20-17.el7_9.10.x86_64.rpm</filename><sum type="sha256">5730d09504f1aece6838c90069bffc2f453f55cf5381b7ff8a93a4031c6f26ee</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46724" id="CVE-2023-46724" title="Cve-2023-46724" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46728" id="CVE-2023-46728" title="Cve-2023-46728" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49285" id="CVE-2023-49285" title="Cve-2023-49285" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49286" id="CVE-2023-49286" title="Cve-2023-49286" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-50269" id="CVE-2023-50269" title="Cve-2023-50269" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25617" id="CVE-2024-25617" title="Cve-2024-25617" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1787" id="RHSA-2024:1787" title="Important: Squid Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1817</id><title>Moderate: Java-1.8.0-Openjdk Security Update</title><description>The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
* OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085) * OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2024-04-17 09:17:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">dd01fc33cf37f8a54346df5d03f247bc4d1c8065d17be7e0dc44bce99c32630e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">b76d6c84c2a51474607dd5b89ad367198739336bf4d0d717fe379a4b107a1194</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-javadoc-zip-1.8.0.412.b08-1.el7_9.noarch.rpm</filename><sum type="sha256">51d609b53a3edd23c2b078777e77bd319dc039533ad3a208bfb16b3a29af2c38</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">6233de7740a123225cfc809c5dd0ca69df02afbd5c4c3617ab65430c0f91fbb8</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">8b7774447a244305f377bfb98fb92dccf701eb683776599a2c434451bed39e4e</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-javadoc-debug-1.8.0.412.b08-1.el7_9.noarch.rpm</filename><sum type="sha256">32bc114411b39d13ebf0af4da7ce0d616d3d468dcb79216083faf5c157b03574</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">d6d71f3df48a3ed75ac0a571754ead18c5bc889da18c3ac6e7cec74bbc25e110</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-devel-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">4b8f078d24919936a039b9a6a20ae2eb785df559b2768b8bd03f9f2e75cc75ce</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-demo-debug-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">6929e42135cc5b3160118cca0a986785bcd307dd581a4e9ebf6fde91bb59e5e6</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc-zip-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.412.b08-1.el7_9.noarch.rpm</filename><sum type="sha256">94cfa62d890d71ee0423d68a84ca416efa73088f89fd28aa08bd254071ea0dc8</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-devel-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-devel-debug-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">bb8720a43b0770f702a2a69d7eb270cdb045e73007fce293a10345e250c09917</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-src-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">88c0c30ef0a8545ceb2fca04440af566161c59dbf80592eaf32fd279a6d96057</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-src-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">5523d2b121cb76c5a23a0d7a0dd3e9fd938e5f25a5b398b79077570f0915a36e</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">c0a1975cbe1fe4c1361671feeb62ec6b042b7857ffc6c16fdd3a44afe6f7cd99</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-accessibility-debug-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">db697d3e8d1962d53c672af785b1660088386812b6283f7e4411faead1501646</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">d3f92ce1c50bcb1f3d2f20321ee32cebcacaccac3d641d2ba4f557c28bc47dc4</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">1e18f402b9c193cdbb34f248883971b11cc93698b212a6939e9a39804a76785c</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-demo" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-demo-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">502e113cb2543a3a4799877c200a64611d442bb8fffb7bcd44e50689866ce726</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-accessibility" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-accessibility-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">a9d12d3814fde3710d495b3aa7014690427bdf0048df08200fa30df1cc9af6cd</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-headless-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">8a95eeea1fb14c5468160dd9015fd10e7323043f5cdee0eb301e88d8baaa3a6d</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">80e519bed885acf426e7abafe523f22b410a4738b99d422abcad3e1f121f799f</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">4c8d2f27d85e9b6b854a7845dfd33dd362e517a68898ff465e7a7fd13eaa80ef</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">86f31659058f688c5d9fb31cb83b1e8a61a0f1609448613d7b58f2aad6025143</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-headless-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-headless-debug-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">1894fd71dfa3138964caa76cbbfaf358a833d2897d72d6500ebc32a799320362</sum></package><package arch="i686" epoch="1" name="java-1.8.0-openjdk" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.i686.rpm</filename><sum type="sha256">b61062c1696adf1365012cdb2d60c4557f7b54b96b6b07f3a0c987cb7cad38c3</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-src-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-src-debug-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">dc6dc3d2a74a97e5c60ab5e0175706aa7b0e2f9b8d74159d7965cc12479a1fff</sum></package><package arch="noarch" epoch="1" name="java-1.8.0-openjdk-javadoc" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-javadoc-1.8.0.412.b08-1.el7_9.noarch.rpm</filename><sum type="sha256">fae992f04223ed32dcc4c439a82ab270df358fe5e7f95ca14ea9d6f3b8c9234a</sum></package><package arch="x86_64" epoch="1" name="java-1.8.0-openjdk-debug" release="1.el7_9" src="java-1.8.0-openjdk-1.8.0.412.b08-1.el7_9.src.rpm" version="1.8.0.412.b08"><filename>java-1.8.0-openjdk-debug-1.8.0.412.b08-1.el7_9.x86_64.rpm</filename><sum type="sha256">ec52dc8077894df0b9eafe9b63a0f6478081b8ffc6b5a01cc48aab78106833b8</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011" id="CVE-2024-21011" title="Cve-2024-21011" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068" id="CVE-2024-21068" title="Cve-2024-21068" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085" id="CVE-2024-21085" title="Cve-2024-21085" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094" id="CVE-2024-21094" title="Cve-2024-21094" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1817" id="RHSA-2024:1817" title="Moderate: Java-1.8.0-Openjdk Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1821</id><title>Moderate: Java-11-Openjdk Security Update</title><description>The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011) * OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068) * OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085) * OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) (CVE-2024-21094) * OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2024-04-22 17:37:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">83bf9c4398525ee7235519d471d34273b1eab0a40c397efbb926105051049d04</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-src-debug-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">433671636d3ff2ed55052ae80016a5bf3cc10113b000be4e054d38340c1fa348</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-headless-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">4fcec7872a4167f05a2253652cd1080227bb44714c997916cc428c7dfeb7e72b</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">2287b02610b5ca856eef97c4399a7c05098956fe60f54c163b81bbd72d046135</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-static-libs-debug-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">76348cd9945afc43080010a400c33dbe2f3caae0a92f79c52e4dd89a660fb45a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-demo-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">4d62abd5413d28dec9654b5538b1a048c9bfa1143edb7b9dfbbfd0027246a157</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">66d7708d57587d0bbb7f3aa5da321a292b9a3ece5bc795f8a93ca187888a4f39</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-headless-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-headless-debug-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">f54a1040f9ff05f7c90bfd476058e20983715f79fe14e709ecb98fb8dcf8eee6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-devel-debug-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">ddf698e9510fc5f9ebe182220b487f28838d9f0643f0d672f8205d4c081fb571</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-jmods-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">8e8db98b1336dc22e9f6260200f7cf67fe6e41ab873dabe2d6da8233a5af5eb0</sum></package><package arch="i686" epoch="1" name="java-11-openjdk" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">c816cdd66389a18294ccd7d1f7daaf4e76e70c652ab59649ce25c61bff610cf1</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-demo-debug-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">256ac25644e7dd3d70c4780b8ab3cbf37551086087ce78b6a20c5189b202f309</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-javadoc-debug-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">c4840f9613e6ed3d1e856759f8ae2b64c39dadc5a6a0796a955744b1326c84c0</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-src" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-src-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">73fcd8c65d03fd78b26fb9a5b37dfde0bb13a7536216b3cddd40d4f4d47401c2</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc-zip-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-javadoc-zip-debug-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">0a63ee84ae817929cab3f49b5d8695161dba65b7afdaba91c208c647089b0a3d</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-demo" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-demo-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">275f3d258d3d6ec26e355436793272b83dd2333fcf504d9c954e6b5bf68ab735</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-javadoc-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">93b23fbbf28a017c1ce8b6adc2d68f6af0707cb664887246c334caa9c194701f</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-demo-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-demo-debug-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">b1b6ee1e6944ff30f1b9fb7115caed23f4763fb38f08db5bd0389715532592a6</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-javadoc-zip" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-javadoc-zip-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">8db4502addde63a3d96670c3a5c036dc93285bd28634f1d10d28d4d0f519295f</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-headless-debug-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">b92fafe1e4203272638d4871d2d5c87b17a94af5560426e97deb419dacb882c6</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-debug-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">28d755e9c43b1d35a38ee0be97dc1383047b60341a0f054cca72ba9054d952e3</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-devel" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-devel-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">81c86fe4a514adee5f88ec8459181b1de99df7ed6982e9ed2c8dce31be634357</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-jmods-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-jmods-debug-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">e3893ad0cc9afa1d48812473113d15b0a69b9091e83c1bc1462589fef73b8cc8</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-devel-debug-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">b78ba6a368741f19c8d8e34add033eb125d3146948b4e7fd6541b82e1dffbf0a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-debug-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">42e0262d4474aaf0389974ee13fa2d981e491bbb07683f7b4c6329edf6557d83</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-headless" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-headless-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">d6ad00980db65031bf41c48fa478db9c382eb95e54302a445595034f1730aa0d</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-jmods-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">d8dfa59d0f2dd9a44a3631795e37ab959edcb3877fbf631dc5a9ef2f99a76df6</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-devel" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-devel-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">9c9120e36d54a44510c9d8861582a75d6e6aad532ed4d28f57d2a960448564c9</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-src-debug-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">40d48da8a29c49d1fa3e7bfe26af46afc08a5af9feeff7a65050876117edbbc3</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-static-libs" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-static-libs-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">44d581cf158533a72118a6461a310d4da57a5b45aed55b41e97c27a29e277e7a</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">7bb1431fad617ee085a71171ba969888296b01db0f3fde4bbbc0178bad08ccce</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-javadoc" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-javadoc-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">7e33c0ced954204da3edbf3fe83aa47c1a89367b01943da62947679f686e75ca</sum></package><package arch="i686" epoch="1" name="java-11-openjdk-src" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-src-11.0.23.0.9-2.el7_9.i686.rpm</filename><sum type="sha256">da5a45e8546769c6a9fb143e6392357a5b7219676762c3314699251c92d6b958</sum></package><package arch="x86_64" epoch="1" name="java-11-openjdk-jmods-debug" release="2.el7_9" src="java-11-openjdk-11.0.23.0.9-2.el7_9.src.rpm" version="11.0.23.0.9"><filename>java-11-openjdk-jmods-debug-11.0.23.0.9-2.el7_9.x86_64.rpm</filename><sum type="sha256">c15a40f868117eb65143aef6ce9a4dd5e62a2848fbe4ceef0ad576ae4233329f</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21011" id="CVE-2024-21011" title="Cve-2024-21011" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21012" id="CVE-2024-21012" title="Cve-2024-21012" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21068" id="CVE-2024-21068" title="Cve-2024-21068" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21085" id="CVE-2024-21085" title="Cve-2024-21085" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-21094" id="CVE-2024-21094" title="Cve-2024-21094" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1821" id="RHSA-2024:1821" title="Moderate: Java-11-Openjdk Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1910</id><title>Important: Firefox Security Update</title><description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.10.0 ESR.
Security Fix(es):
* GetBoundName in the JIT returned the wrong object (CVE-2024-3852) * Out-of-bounds-read after mis-optimized switch statement (CVE-2024-3854) * Incorrect JITting of arguments led to use-after-free during garbage collection (CVE-2024-3857) * Permission prompt input delay could expire when not in focus (CVE-2024-2609) * Integer-overflow led to out-of-bounds-read in the OpenType sanitizer (CVE-2024-3859) * Potential use-after-free due to AlignedBuffer self-move (CVE-2024-3861) * Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 (CVE-2024-3864)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-04-18 12:27:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.10.0-1.el7_9.src.rpm" version="115.10.0"><filename>firefox-115.10.0-1.el7_9.i686.rpm</filename><sum type="sha256">7aa2b7e271c8808b35f2e8c47723c3842c4604ae0ebbeec74b2b64f89c658cbb</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.10.0-1.el7_9.src.rpm" version="115.10.0"><filename>firefox-115.10.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">d474c789af4e006b84209b179f4e0c6be2a1a86df34b65a9c1b4b4944eba55a1</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609" id="CVE-2024-2609" title="Cve-2024-2609" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302" id="CVE-2024-3302" title="Cve-2024-3302" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852" id="CVE-2024-3852" title="Cve-2024-3852" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854" id="CVE-2024-3854" title="Cve-2024-3854" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857" id="CVE-2024-3857" title="Cve-2024-3857" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859" id="CVE-2024-3859" title="Cve-2024-3859" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861" id="CVE-2024-3861" title="Cve-2024-3861" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864" id="CVE-2024-3864" title="Cve-2024-3864" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1910" id="RHSA-2024:1910" title="Important: Firefox Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1935</id><title>Low: Thunderbird Security Update</title><description>Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 115.10.0.
Security Fix(es):
* Mozilla: Denial of Service using HTTP/2 CONTINUATION frames (CVE-2024-3302)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>low</severity><issued date="2024-04-22 13:06:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="2.el7_9" src="thunderbird-115.10.0-2.el7_9.src.rpm" version="115.10.0"><filename>thunderbird-115.10.0-2.el7_9.x86_64.rpm</filename><sum type="sha256">3696d5d5fb5df0d910ac63a3812b6b8dcbd4f73d94a8e492276e66cd49d1d3a1</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609" id="CVE-2024-2609" title="Cve-2024-2609" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302" id="CVE-2024-3302" title="Cve-2024-3302" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852" id="CVE-2024-3852" title="Cve-2024-3852" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854" id="CVE-2024-3854" title="Cve-2024-3854" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857" id="CVE-2024-3857" title="Cve-2024-3857" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859" id="CVE-2024-3859" title="Cve-2024-3859" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861" id="CVE-2024-3861" title="Cve-2024-3861" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864" id="CVE-2024-3864" title="Cve-2024-3864" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1935" id="RHSA-2024:1935" title="Low: Thunderbird Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:1959</id><title>Important: Shim Security Update</title><description>The shim package contains a first-stage UEFI boot loader that handles chaining to a trusted full boot loader under secure boot environments.
Security Fix(es):
* shim: RCE in http boot support may lead to Secure Boot bypass (CVE-2023-40547) * shim: Interger overflow leads to heap buffer overflow in verify_sbat_section on 32-bits systems (CVE-2023-40548) * shim: Out-of-bounds read printing error messages (CVE-2023-40546) * shim: Out-of-bounds read in verify_buffer_authenticode() malformed PE file (CVE-2023-40549) * shim: Out-of-bound read in verify_buffer_sbat() (CVE-2023-40550) * shim: out of bounds read when parsing MZ binaries (CVE-2023-40551)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
IMPORTANT: The new shim revokes ALL VERSIONS of GRUB2 before grub2-2.02-0.87.el7_9.14. Therefore GRUB2 MUST be updated to the latest version: grub2-2.02-0.87.el7_9.14 BEFORE or SIMULTANEOUSLY with this shim in order for Secure Boot to continue to work. Failure to update GRUB2 will result in an UNBOOTABLE system.
</description><severity>important</severity><issued date="2024-04-23 13:44:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="shim-unsigned-ia32" release="3.el7" src="shim-15.8-3.el7.src.rpm" version="15.8"><filename>shim-unsigned-ia32-15.8-3.el7.x86_64.rpm</filename><sum type="sha256">e205f2d8305e0b78da2a23ae1ec4d74aab02e8666f7ac0573866fdbf52ca7d5d</sum></package><package arch="x86_64" name="shim-ia32" release="1.el7" src="shim-signed-15.8-1.el7.src.rpm" version="15.8"><filename>shim-ia32-15.8-1.el7.x86_64.rpm</filename><sum type="sha256">f9b40dc9c290d5b52191e1ee291cb54f54bd2decf7caff9846910f154d7a87d3</sum></package><package arch="x86_64" name="shim-unsigned-x64" release="3.el7" src="shim-15.8-3.el7.src.rpm" version="15.8"><filename>shim-unsigned-x64-15.8-3.el7.x86_64.rpm</filename><sum type="sha256">1960322489956f7c9e0fee46c0b1f582aa9f8f421121d9bb40fdee4ef68191bb</sum></package><package arch="x86_64" name="shim-x64" release="1.el7" src="shim-signed-15.8-1.el7.src.rpm" version="15.8"><filename>shim-x64-15.8-1.el7.x86_64.rpm</filename><sum type="sha256">22cbf183fedbf7bd3f9d2d686e657129a007b4d766f3498f6633df7de49997c7</sum></package><package arch="x86_64" name="mokutil" release="1.el7" src="shim-signed-15.8-1.el7.src.rpm" version="15.8"><filename>mokutil-15.8-1.el7.x86_64.rpm</filename><sum type="sha256">c0381e57fd3d566a9d884ed245c28a97fb5db1c6f56b62d93a63077d718a1caa</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40546" id="CVE-2023-40546" title="Cve-2023-40546" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40547" id="CVE-2023-40547" title="Cve-2023-40547" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40548" id="CVE-2023-40548" title="Cve-2023-40548" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40549" id="CVE-2023-40549" title="Cve-2023-40549" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40550" id="CVE-2023-40550" title="Cve-2023-40550" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40551" id="CVE-2023-40551" title="Cve-2023-40551" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:1959" id="RHSA-2024:1959" title="Important: Shim Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:2002</id><title>Moderate: Grub2 Security Update</title><description>The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Security Fix(es):
* grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass (CVE-2022-2601)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>moderate</severity><issued date="2024-04-24 08:12:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" epoch="1" name="grub2-pc-modules" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-pc-modules-2.02-0.87.sl7_9.14.noarch.rpm</filename><sum type="sha256">de553d66e74eb6e3b7291f750da30dbb325c1c4eb33c4503ee423eebfa6049d4</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-efi-x64-2.02-0.87.sl7_9.14.x86_64.rpm</filename><sum type="sha256">5f59ec5b5ba3c614f0f6472378271d2b953a6a574efee9bc5bd3eca363cb01ed</sum></package><package arch="x86_64" epoch="1" name="grub2-pc" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-pc-2.02-0.87.sl7_9.14.x86_64.rpm</filename><sum type="sha256">108388534ab5669c827705a133cc30f5e1641a6ecfbc597074fe1c98fd198215</sum></package><package arch="noarch" epoch="1" name="grub2-efi-x64-modules" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-efi-x64-modules-2.02-0.87.sl7_9.14.noarch.rpm</filename><sum type="sha256">abb1623323af16e8fd73f12c1dba456f6b92b4a57d94672fc75150a79e8045dd</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-minimal" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-tools-minimal-2.02-0.87.sl7_9.14.x86_64.rpm</filename><sum type="sha256">9f04dd1ad4933b1c0e401399052fe39d4c87fa9af4983150928cd5dcc7f4d77f</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-x64-cdboot" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-efi-x64-cdboot-2.02-0.87.sl7_9.14.x86_64.rpm</filename><sum type="sha256">5de060c344853637840847f2dd6643619fb84110543232a75b7bbbff64326da4</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-efi-ia32-2.02-0.87.sl7_9.14.x86_64.rpm</filename><sum type="sha256">b0752bb4a2a765df6f934dc5e17464bca7e00f5f5815c029c145afa6986c9641</sum></package><package arch="x86_64" epoch="1" name="grub2-tools-extra" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-tools-extra-2.02-0.87.sl7_9.14.x86_64.rpm</filename><sum type="sha256">8a17558cb3dc6d0c38515fb2f16fefc7a0e1ed8b825c0f1ee8477bf43adbc06e</sum></package><package arch="noarch" epoch="1" name="grub2-efi-ia32-modules" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-efi-ia32-modules-2.02-0.87.sl7_9.14.noarch.rpm</filename><sum type="sha256">72fe341a890b11586020e592b63e0ec987d05506b3f1a23b53418e605a7f5d96</sum></package><package arch="x86_64" epoch="1" name="grub2-efi-ia32-cdboot" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-efi-ia32-cdboot-2.02-0.87.sl7_9.14.x86_64.rpm</filename><sum type="sha256">92183c4ed0632506a9dfa50d34fac96dc53b4ebdb641d69e1f705377fdf5db16</sum></package><package arch="x86_64" epoch="1" name="grub2" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-2.02-0.87.sl7_9.14.x86_64.rpm</filename><sum type="sha256">516bae7d6c7518b69717c806a9cf27281aee56cfa3e37be492ebdd3c1db09675</sum></package><package arch="noarch" epoch="1" name="grub2-common" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-common-2.02-0.87.sl7_9.14.noarch.rpm</filename><sum type="sha256">9c52b9c63bdce728d5bf47d2c8c7a1de03c87359b8da295581efdce3ac56b976</sum></package><package arch="x86_64" epoch="1" name="grub2-tools" release="0.87.sl7_9.14" src="grub2-2.02-0.87.sl7_9.14.src.rpm" version="2.02"><filename>grub2-tools-2.02-0.87.sl7_9.14.x86_64.rpm</filename><sum type="sha256">926e8500cb90ae1aa6ae3931f1d2990822c04cb72f6a3a68ef2e735796469767</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2601" id="CVE-2022-2601" title="Cve-2022-2601" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:2002" id="RHSA-2024:2002" title="Moderate: Grub2 Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:2004</id><title>Important: Kernel Security And Bug Fix Update</title><description>The kernel packages contain the Linux kernel, the core of any Linux operating system.
Security fixes:
* kernel: use after free in unix_stream_sendpage (CVE-2023-4622) * Kernel: bluetooth: Unauthorized management command execution (CVE-2023-2002) * kernel: irdma: Improper access control (CVE-2023-25775) * kernel: net/sched: sch_hfsc UAF (CVE-2023-4623) * kernel: race condition in VT_RESIZEX ioctl when vc_cons[i].d is already NULL leading to NULL pointer dereference (CVE-2020-36558)
This update also fixes the following bugs:
* NFS client closes active connection (RHEL-22193) * kernel panic at __list_del_entry from smb2_reconnect_server (RHEL-26301) * kernel: race condition when call to VT_RESIZEX ioctl and vc_cons[i].d is already NULL, causing a NULL pointer dereference. (RHEL-28639) * kernel: net/sched: sch_hfsc UAF (RHEL-16458) * kernel: irdma: Improper access control (RHEL-6299) * The message in RHEL 7 ?stack-protector: Kernel stack is corrupted in:? is triggered because perf_trace_buf_prepare() does not verify that per_cpu array perf_trace_buf has allocated per_cpu buffers in it. (RHEL-18052) * [rhel7] gfs2: Invalid metadata access in punch_hole (RHEL-28785) * UDP packets dropped due to SELinux denial (RHEL-27751) * Boot fails with kernel panic at acpi_device_hid+0x6 (RHEL-8721)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-04-24 08:12:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="kernel-devel" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-devel-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">85c7c3767f97a197245c84b2d5d239e52a212f765679a2013ff68f6b5660fc0a</sum></package><package arch="x86_64" name="kernel" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">a215bf9176ac171af3703f8c45d6e6621d6f6d2ce4c2ea29341a7493e621608a</sum></package><package arch="x86_64" name="bpftool" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>bpftool-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">17c07e3477c895a66bb5c88501f56574d18b9212f014105fb2699c78b52ed894</sum></package><package arch="x86_64" name="kernel-headers" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-headers-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">1f1abf69033db1dd3be82b519f1fae78b9df2de0ed9ae8ddb293a58726748b72</sum></package><package arch="x86_64" name="kernel-tools" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">e7c74b0039e8ab1b1bbb5ea76ca60ac8fcf39cc7cae5be1c8a2e402d110eb944</sum></package><package arch="x86_64" name="kernel-tools-libs-devel" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-devel-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">f679408054e52eef048fa610a3e07716247e545532cc89f912203db8407a7e92</sum></package><package arch="x86_64" name="kernel-debug-devel" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-devel-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">5faa45f1201c00caf00a824b5d0bef925ca3036d4cf259aec024b0ce5450c54d</sum></package><package arch="x86_64" name="python-perf" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>python-perf-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">88255385c921df551bea5f3d19750b17a2eee06689d6b91a3f89eccf45f89913</sum></package><package arch="x86_64" name="kernel-tools-libs" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-tools-libs-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">6a15f0c30a63a29a9fb0bcabab646c9d9ee1b32fd92514e6b5a68a2b1b3e8dc9</sum></package><package arch="x86_64" name="perf" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>perf-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">cf3cc9c6705a2cbe65cd973ed0addde6d273fcac8437cecf5351a2ffbc98c213</sum></package><package arch="noarch" name="kernel-doc" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-doc-3.10.0-1160.118.1.el7.noarch.rpm</filename><sum type="sha256">9b4424bfbc18595a30c25a73762427674af6836540345ff342cd74a998cb3d1a</sum></package><package arch="noarch" name="kernel-abi-whitelists" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-abi-whitelists-3.10.0-1160.118.1.el7.noarch.rpm</filename><sum type="sha256">7d8361f62fafbcfaa2d6ec717398c300db78c693c85387ed4351ead083beb4bb</sum></package><package arch="x86_64" name="kernel-debug" release="1160.118.1.el7" src="kernel-3.10.0-1160.118.1.el7.src.rpm" version="3.10.0"><filename>kernel-debug-3.10.0-1160.118.1.el7.x86_64.rpm</filename><sum type="sha256">7a1fb05bbeaaa66ba9f9f65a88b7cfb485dada88626e074b6fccf90b5e194406</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-36558" id="CVE-2020-36558" title="Cve-2020-36558" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2002" id="CVE-2023-2002" title="Cve-2023-2002" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25775" id="CVE-2023-25775" title="Cve-2023-25775" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4622" id="CVE-2023-4622" title="Cve-2023-4622" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4623" id="CVE-2023-4623" title="Cve-2023-4623" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:2004" id="RHSA-2024:2004" title="Important: Kernel Security And Bug Fix Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:2080</id><title>Important: Tigervnc Security Update</title><description>Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.
Security Fix(es):
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents
(CVE-2024-31080)
* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice
(CVE-2024-31081)
* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-04-29 08:58:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="tigervnc-icons" release="33.el7_9" src="tigervnc-1.8.0-33.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-icons-1.8.0-33.el7_9.noarch.rpm</filename><sum type="sha256">fbb4c6d0df2b7888ffdd23d8b5619d0ac83f946c8b39084b08b95cdf80de40fe</sum></package><package arch="x86_64" name="tigervnc-server" release="33.el7_9" src="tigervnc-1.8.0-33.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-1.8.0-33.el7_9.x86_64.rpm</filename><sum type="sha256">39886431c1b102e3aef949be9fe7107c0710a22ca042910dfe6462ced503dcb1</sum></package><package arch="x86_64" name="tigervnc-server-minimal" release="33.el7_9" src="tigervnc-1.8.0-33.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-minimal-1.8.0-33.el7_9.x86_64.rpm</filename><sum type="sha256">a9dd08cdddf52dae3391416ea2ee088e60c58672abf9cb11b5c4ac55d735bc47</sum></package><package arch="noarch" name="tigervnc-server-applet" release="33.el7_9" src="tigervnc-1.8.0-33.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-applet-1.8.0-33.el7_9.noarch.rpm</filename><sum type="sha256">fdaa2953aba5d18d06f8d606541a1b2ec1b74cfef56f022ee0bc02f60c18889d</sum></package><package arch="noarch" name="tigervnc-license" release="33.el7_9" src="tigervnc-1.8.0-33.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-license-1.8.0-33.el7_9.noarch.rpm</filename><sum type="sha256">194bd13249ee6ad299694362025856b55fe23b4054243b1c4e68abcb55cdbbd9</sum></package><package arch="x86_64" name="tigervnc-server-module" release="33.el7_9" src="tigervnc-1.8.0-33.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-server-module-1.8.0-33.el7_9.x86_64.rpm</filename><sum type="sha256">d7aa613f092e0e42839c77c6b97cb2a2a75091b3bbd0d42b00ef1cd14817735f</sum></package><package arch="x86_64" name="tigervnc" release="33.el7_9" src="tigervnc-1.8.0-33.el7_9.src.rpm" version="1.8.0"><filename>tigervnc-1.8.0-33.el7_9.x86_64.rpm</filename><sum type="sha256">940566e6ba4ba98b4c9ed8c06be7ed68d2471417c41d545b2f6e5854198ede2c</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31080" id="CVE-2024-31080" title="Cve-2024-31080" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31081" id="CVE-2024-31081" title="Cve-2024-31081" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-31083" id="CVE-2024-31083" title="Cve-2024-31083" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:2080" id="RHSA-2024:2080" title="Important: Tigervnc Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:2881</id><title>Important: Firefox Security Update</title><description>This update upgrades Firefox to version 115.11.0 ESR.
Security Fix(es):
* firefox: Arbitrary JavaScript execution in PDF.js (CVE-2024-4367) * firefox: IndexedDB files retained in private browsing mode (CVE-2024-4767) * firefox: Potential permissions request bypass via clickjacking (CVE-2024-4768) * firefox: Cross-origin responses could be distinguished between script and
non-script content-types (CVE-2024-4769)
* firefox: Use-after-free could occur when printing to PDF (CVE-2024-4770) * firefox: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and
Thunderbird 115.11 (CVE-2024-4777)
</description><severity>important</severity><issued date="2024-05-16 18:43:11" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.11.0-1.el7_9.src.rpm" version="115.11.0"><filename>firefox-115.11.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">55b3f7841e4098f37f5a346f303ee689395bc9be8e5efe3b0e96a1e5ccb54f3a</sum></package><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.11.0-1.el7_9.src.rpm" version="115.11.0"><filename>firefox-115.11.0-1.el7_9.i686.rpm</filename><sum type="sha256">fcb8f9aa002e42dfc510d097a721581620a8463d40e7b727bff2e5e03f417f29</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367" id="CVE-2024-4367" title="Cve-2024-4367" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767" id="CVE-2024-4767" title="Cve-2024-4767" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768" id="CVE-2024-4768" title="Cve-2024-4768" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769" id="CVE-2024-4769" title="Cve-2024-4769" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770" id="CVE-2024-4770" title="Cve-2024-4770" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777" id="CVE-2024-4777" title="Cve-2024-4777" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:2881" id="RHSA-2024:2881" title="Important: Firefox Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:2913</id><title>Important: Thunderbird Security Update</title><description>
This update upgrades Thunderbird to version 115.11.0.

Security Fix(es):

    firefox: Arbitrary JavaScript execution in PDF.js (CVE-2024-4367)
    firefox: IndexedDB files retained in private browsing mode (CVE-2024-4767)
    firefox: Potential permissions request bypass via clickjacking (CVE-2024-4768)
    firefox: Cross-origin responses could be distinguished between script and non-script content-types (CVE-2024-4769)
    firefox: Use-after-free could occur when printing to PDF (CVE-2024-4770)
    firefox: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11 (CVE-2024-4777)</description><severity>important</severity><issued date="2024-05-20 10:43:11" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="thunderbird" release="1.el7_9" src="thunderbird-115.11.0-1.el7_9.src.rpm" version="115.11.0"><filename>thunderbird-115.11.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">f95888eca1b9df9142fbc591b71f10682ab0ffd6264ed25f746e3f2d612ba572</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367" id="CVE-2024-4367" title="Cve-2024-4367" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767" id="CVE-2024-4767" title="Cve-2024-4767" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768" id="CVE-2024-4768" title="Cve-2024-4768" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769" id="CVE-2024-4769" title="Cve-2024-4769" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770" id="CVE-2024-4770" title="Cve-2024-4770" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777" id="CVE-2024-4777" title="Cve-2024-4777" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:2913" id="RHSA-2024:2913" title="Rhsa-2024:2913 - Security Advisory" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:3304</id><title>Important: Libreoffice Security Fix Update</title><description>LibreOffice is an open source, community-developed office productivity suite. It includes key desktop applications, such as a word processor, a spreadsheet, a presentation manager, a formula editor, and a drawing program. LibreOffice replaces OpenOffice and provides a similar but enhanced and extended office suite.
Security Fix(es):
* libreoffice: Improper Input Validation leading to arbitrary gstreamer plugin execution (CVE-2023-6185)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><issued date="2024-05-24 08:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="1" name="libreoffice-langpack-bg" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-bg-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">ef9622f9bd1d4eb951525595543a22050bba30dc1e3d0089bea6fa58065dd567</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-st" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-st-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">b5b2d90f8468a6c8fc833cb41acb323728f26727ebac7a27350abf013cfc35c6</sum></package><package arch="noarch" epoch="1" name="autocorr-de" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-de-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">a3b47cac2b8fb9f3d0f229138c054be941af5c5381759fd1cce395d3f27ac166</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-sv" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-sv-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">25bb9c3bb53e3675929599cb36b225fbee3073d6d44a1af01d4cf9821b3c1a65</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-nn" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-nn-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">67f5137567d9ad9d16fb01a97f0c8fd8f17d171e9934bfd17f751675eb113678</sum></package><package arch="noarch" epoch="1" name="autocorr-sk" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-sk-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">24f444d6954d85cd78c3fb489ce745f252fedcce1ab8892d8b1f5d8bc49ed5aa</sum></package><package arch="noarch" epoch="1" name="autocorr-fi" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-fi-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">30db863d976679c99cb04ef3c7b435a0736c70b30795e3dba6909028a72f5169</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nl-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">bb2257b24f1427cd0565223008ee7e702ff516159428db37349d2610cb37c3e7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ru" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ru-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">8f82f7a62de024c68b823355e638d6b8f64e351974c45d0d83d1a3372b03684f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-de" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-de-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">80005d57bd471955774fec5d0e74152e3453f581711d2ef418c947727899cabb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-bn" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-bn-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">d6c44cae2de2955fc1496abc321fd8c5d1462105e14f363bca7c69546aa0fd92</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gdb-debug-support" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-gdb-debug-support-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">2cb747b449861a615682d21f10a6a55152455dc5a3f662c6769b4ca583b506fb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-postgresql" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-postgresql-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">459cb7ef55e54282a337cffe2e8118286c4a267d2d253348d9b9c59ab9b40b79</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-et" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-et-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">a97a3949effcb6229a2e286d6e1a02d3458134353143dfa5f53b2e524ded6ffe</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-da" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-da-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">3eaa1fb335f4572b3bb75bbc744805f61fd173248a97384aed2f2c99695c7a71</sum></package><package arch="noarch" epoch="1" name="autocorr-sv" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-sv-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">f54dae95768f650fbe80910d4d8fa72ebed2e95279d2b5bc475f6637c4d2dc5a</sum></package><package arch="x86_64" epoch="1" name="libreofficekit" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreofficekit-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">9132367e34cb94680daabaca9391e60997147e2ad4274a5ae752cb695d394882</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-de" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-de-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">770e2a95f0cdc63a3a98368378cd40a82e8d8cab2b63851b8a0502b9e2446b58</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-pl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-pl-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">74d441b41d8b72166b9f635fc0c57ca0eb0a64a636707e5a32fdcbcd466133ab</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ta" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ta-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">3a9e919d0f16df1ed3c5212d2151a8f1d71a5c81ab6c7f6ec5e5ab4fb527e5f1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ts" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ts-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">f00644d6bb6ef121a6be50f319bc7267f48a81c43f1026c0a86270e3b6b74fa8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-en" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-en-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">01e0851ef4d5e5d558b8830384cc22e7b4485d35dd2ad557f2f418277dcc19a8</sum></package><package arch="noarch" epoch="1" name="autocorr-da" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-da-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">503abfb816613a202f375dc0a186b136efbb56583be231d4c47bde605ab2ff2b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-fi" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-fi-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">feb8a5c95863c1607a74cf9f9f8d34b0aac63f0516c7318e4c0636f094a97e29</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-nb" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-nb-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">ccd149e01dbddbd8561581401786f22fb5abf8d17d89ccdbe98fb8e7567ca0e9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ta" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ta-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">fc6876fc64f592dbef2a82fcedcb89ff128940d1f1d3efb158cec7d8dfdfb546</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gu" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-gu-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">33f07e83cc97c56b8afb6f778a1d2726549addc0465442ff19a5dbccae35046c</sum></package><package arch="x86_64" epoch="1" name="libreoffice" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">b3c9af8786aec0e834aa04e420696eb699c249d7c6ae5ec500b000ac6b32170e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zu" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-zu-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">e8da43cee532d8081c9b6429803b745ef2870a64f3c21ede5df42bbfe4c59152</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-pt-PT" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-pt-PT-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">8ec1f5d1872b8993b1e272c5aab60966468c9700a052111915f7f0327d88d841</sum></package><package arch="noarch" epoch="1" name="autocorr-zh" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-zh-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">9cc018b9c6e5a082f269bbc697500c07efc76b269ce60d0dc2eb311071174349</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-es" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-es-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">995ba00e29d88d777c737afb75a7d72c6a52e6cebf777749fc359c4e2e7394e1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-gl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-gl-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">c34ef81db96a84c9b660d5328a9a1547568c819d286f6e20096bb41a032d805b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-eu" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-eu-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">2f9062dc7c74b65d1fe46a6aa16bff321ceef6cdf8709230296b2aa0b90f1edf</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nso" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nso-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">8d40d448b472cf9ebf321e7bb72e9c352281913a7925249b3677f8650d71101f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ca" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ca-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">89c2d9397d0860f1cb5b554751bbe3f2dafd7334570e85f302bba63cd0d8494b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ko" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ko-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">7a2ec1147fba8a3ec5e7e20e808062f31b5cabfd9762063a29faa8f7b0f76e03</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-uk" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-uk-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">b85f75b2fdefaab2dc7d9717cca1706b118ac8fb7167627feeb249f5cf9ddf34</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tn" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-tn-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">e9256b8f39feb3541a0672034d4d310d1bbd973d23cdb977a4cf21b111f0530a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-rhino" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-rhino-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">75732ab688cfa9f7989cacbadd50a0b5174f23b9dbf5f241beb5b8800232e244</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-he" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-he-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">0692fe12d41bd5b23726291d7d1469bb765abb3dcb9f4bce4f6c33309c406d72</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-hr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-hr-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">5cac849c307b75917fca18076120b5ca54640dedffa241b68af804ee27f1c638</sum></package><package arch="noarch" epoch="1" name="autocorr-pl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-pl-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">e43f3b46401a800a651b87d46da09b528d7d5a186cf162e0a550176dd22115ae</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-lt" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-lt-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">f5e99e8e1e3b2ae179f644ec4dfda2548d01a48bd36c9b4f0684b0536eaa0ac0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-hr-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">952f84efdbdfdac386ed99332b7bae48a7b8362ab556d4b3c6ee8cb37fb1d1ac</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hu" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-hu-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">d1d86d10eab53d20db4f444912c986720d6975803fead8fc0b1ae5354cb35f42</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-xh" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-xh-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">e4d2182982dc57b03a81af5110930d01e8a2bfd0457226049a258b31f8742061</sum></package><package arch="noarch" epoch="1" name="autocorr-sl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-sl-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">1a5e3e534c20ed4a998986e5c76b18f5ae726a403b63bd9c348bb5bb07455cbe</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gtk2" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-gtk2-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">835c40cb3c82c537695f4f0560535b6f7351422b17726f8b1d77b789d0cac57c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-filters" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-filters-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">bee9125a5a79fd5187b4db55de62b35eefea3633f51ebaaaad641c60d5655177</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-cs" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-cs-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">eced567a62efb7becdae271e06bd653ac2982d6d4cbf4eef3e5029ce99e938a7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-writer" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-writer-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">6d7855be03d7d7b110eeafcb94398cd9c02027580411502df9b8371986b4fbeb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-da" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-da-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">12b4ece3442cb939c0656517f906c8f84fda97be5a329555806c249c58f8e2e1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-officebean" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-officebean-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">35f836a30502d60be98021719b9b0e1b24685e3c00cf5d0c668a95b120086c57</sum></package><package arch="noarch" epoch="1" name="autocorr-bg" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-bg-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">263fa0cbe9f9c0e1be623195c1e7735ffda6bc58d705c8191ff8f429ba6e4c7e</sum></package><package arch="noarch" epoch="1" name="autocorr-ko" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-ko-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">f0884bafc9de29300689a3114fbfc8ab4836bd65896fc37b9f39f25d90aeec44</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-te" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-te-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">a4cad8fba4738a8c92a2721c93676bc60ccbb9767d400a1492c2097f31e005be</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nb" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nb-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">4d252c52077a4288157f9d320970da33401a5a01e75a0f82af9741993d2d85a3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ve" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ve-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">eb589da6e7c4f3654fb12401fde271ce537768915b27b470e9039bad20348b3f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-sl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-sl-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">8f006eebe057cc3e00d8fe40be12661d8dcab825f1fa39caa96d8a07329445b0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-uk" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-uk-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">8f6e2a26dd16041ca5bdb463039b6a4ee48896b1abbb2118359b59e9b3d37d4a</sum></package><package arch="noarch" epoch="1" name="autocorr-fa" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-fa-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">3a22bc47f4d7d964cdd0d40e7c9918b3c6af71b5cefd9fd26204fbfddcaf7c9a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nr-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">3c2d060d95957da026eedcf0df7fbe78d18f9ff8d8b935f985c9cd4d7afe536c</sum></package><package arch="noarch" epoch="1" name="autocorr-ga" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-ga-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">f87bbbec6c230a2543c8673dee70f84d13c2898857703047c9fa1b547ef42438</sum></package><package arch="noarch" epoch="1" name="autocorr-en" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-en-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">0e385e4782a6e3c95d5da3a50811c48d9420ac033626956d5ccfc3004710c1f7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ar" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ar-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">5c7cb5980bf2fd2a93526a0c34d31c822b8c95b61289a1fa08c489ec7e4bd974</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-sk" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-sk-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">8df067fa0f0f155a2517b52a8f39dff9fdf58146ac3b1d4c919deeafd62e3814</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-bn" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-bn-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">ee199201fb21b69e8e25b9c29526e40ee4bd652e4b9fe6a6c65801be41c079cf</sum></package><package arch="noarch" epoch="1" name="libreoffice-officebean-common" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-officebean-common-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">334f80ce2aab0f6c0f33e3f1f2b9bf05f6e0ad655703244ba6e3d4ef97890219</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hans" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-zh-Hans-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">ec9274963208072c1f6c4470df6218e8b4ea9ac14737ceff7dd740ae4637085e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-tr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-tr-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">f5a010af43e703876c4a74f30c3ee7af4a0c3991938ee093998e4f875b9748f6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ure" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-ure-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">48854e4dc8f6413a9f690cc09c49b28206647460b08a37a6e33fa57fb9bcbc4a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ja" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ja-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">81f10f5b9362393c38f4f74862b43e409ffbba4d54abae792ed40da4b2be054a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-br" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-br-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">d332519afe269f839027e500eed27758f17f7b4eac67572a6cee419fa23b2a3f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-BR" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pt-BR-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">333d7fbf850c543ac052c68dda2215ba101649262c2806ea36a79adfff503836</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-it" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-it-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">41b57fac5e159ac5690d69197802663581feedb27870b12c8c82ab2054c82423</sum></package><package arch="noarch" epoch="1" name="autocorr-lb" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-lb-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">db63268d90efacc2f86247c92ab4c488eb43177c046719bb6584426319e6f24d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-nn" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-nn-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">ec645e165a51e39ee0435ecdd7a697235e3c9ac9e880837f6c9eeff36ec8a8d9</sum></package><package arch="noarch" epoch="1" name="autocorr-is" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-is-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">ff4ef613698619f75c15a019e09c690f64ea2d1a1ebd795f75d3c6262271d589</sum></package><package arch="x86_64" epoch="1" name="libreoffice-gtk3" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-gtk3-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">3687079db1ff18a60b37e231b27bdf87d5d3a7f71fa66c23aef0443ad4525089</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-mr-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">1fd217d63028a4ef826e52d84c1fd8dad8c5fc3c0c24687bb57fb732e5b2677e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-et" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-et-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">288ceb03920fc5f0a86b05912f10672773c2a1fc254875ff2e2beee0cfd6c1dc</sum></package><package arch="noarch" epoch="1" name="autocorr-ru" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-ru-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">25c50dd0bb305a7ece72c2df068c383cdfc037ea996211f31326c2c9c4616b96</sum></package><package arch="noarch" epoch="1" name="autocorr-ca" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-ca-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">21be9612e49226d7289f16ff17af4bc3e1a12631a2508c136be57e66c4be8c0e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-calc" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-calc-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">1a17f28e96cdde37d2ad0fa5ee0c326f282ce2b88271e9ea79f60d57f2328ad1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ja" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ja-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">6687646ea51414a2551f2c7a0d744ccfdca6a61697545afd6abd187eae26cdf9</sum></package><package arch="noarch" epoch="1" name="libreoffice-data" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-data-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">00efa97a7fe7c760f897a3cb717062501892d5dc992b3b7038c07035ca53274c</sum></package><package arch="noarch" epoch="1" name="autocorr-mn" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-mn-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">4b257004d48893b2a2abeeeaaeddbc5c85dcf157d1ae583e3f51ea9f9a7115b0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-id" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-id-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">36716fca79c44542452d4129d51873cf51d0ed9a8ef1d57b7cd5adc4d85f46c5</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-zh-Hant" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-zh-Hant-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">824536c5233463106a41b7b722f583086968eec27528fe875797cb5c7cf51f9c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kk" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-kk-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">d78dbe6fc27e8c6548bd63a233a1b730ba4dcc886535395617a20fae00062e0c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-el" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-el-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">62d5df20e227175ae561ec2ce7ddd47092664842dbf122f9723b642c08ab4502</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-pt-BR" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-pt-BR-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">d2d74225259875f0673655306938564bab0fae9fd84cf62608b3d78359663a22</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-fr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-fr-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">46f22749f99bc1581165da3234e3cb3b1ca323691c86b5fd1c37851ea273aa06</sum></package><package arch="noarch" epoch="1" name="autocorr-tr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-tr-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">54183d51af640e75658296d35bb8f066eab608baf98ae60fd1e2baed646ae44e</sum></package><package arch="noarch" epoch="1" name="autocorr-ro" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-ro-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">fb0b63ce7c88d76be88f892e27ce54d77c8b1615e78480007d24dabd833341d0</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-af" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-af-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">6110c4ebca1618ddf81ae018ea17daa41f706aef71d980a7234489dee4989739</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-hu" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-hu-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">0cde7a2b19ddc7fd5e1182cd683be4b8a057a8c7798c52eb3099c4f169b11d9e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-mai" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-mai-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">523b178440946fad18b97182bab88fe329e09b5066e99e2e290eb7cec888733d</sum></package><package arch="noarch" epoch="1" name="autocorr-hr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-hr-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">3dfbd19ff767da26f4d39f2bc17138451560210143eb01929feb4c03c37fa572</sum></package><package arch="noarch" epoch="1" name="autocorr-es" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-es-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">ba23453b2fc17a40dec5b4369c25cc18c051dd885c686a87fdc31389cb2922d3</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-or" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-or-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">a5761c8380a85423d4ccfd9f76e9576a3b36ca188d3b049c8572d67eb42caad9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cs" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-cs-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">1a8c71e08c7ec16b62edac787e5a4811fa0a816d9f93a6fa7b46cd6c8b958770</sum></package><package arch="noarch" epoch="1" name="autocorr-nl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-nl-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">6e89ea348468878aa44181b4960d1a000db0a9508f07409cfc497c74beb28b00</sum></package><package arch="noarch" epoch="1" name="autocorr-hu" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-hu-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">03a142f4d6c65427bee84e6d0c2183368347c16c102f5a1bd502ffb32243f487</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-lv" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-lv-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">e3eae24e2368fc10c93aa3c362971ac4de8cfebb765406901df5731a6d941720</sum></package><package arch="noarch" epoch="1" name="autocorr-vi" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-vi-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">ae4097650f241639b5c19eff8de2aa1a21476787f7827e816652130261870ed7</sum></package><package arch="noarch" epoch="1" name="autocorr-fr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-fr-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">d851171b4adec774afb0e2e51cc1bac0bdeb284b1152b8201f7ef1083f6d4238</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ga" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ga-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">bd903c8d3132bbb7d6560c03135ee372cdf94191e9c0532f0e93f071573554c8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fa" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-fa-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">900eeac9034f995c1167ff5d923325719fbfdcc3658a59b30746decad89ca707</sum></package><package arch="noarch" epoch="1" name="libreoffice-ure-common" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-ure-common-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">fea4a0314953a510d994c065168bb8232ef9c8b59ccc51b7812c7d97bc597a7c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lt" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-lt-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">0b07524e0d217876e66e60cf4da6ee8044e2970986a4b292d43eee1b5e45850f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-fr-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">fcd175d83ea8b1a746990f1122f38c0bca2e24e3c263f2252378d515276f0647</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-gu" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-gu-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">34bb7c1405956a5ef18327b95c1ee5f50c3193f56d763463f56a34490a683dcf</sum></package><package arch="x86_64" epoch="1" name="libreoffice-ogltrans" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-ogltrans-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">08576a8f22c052528909f8c2c353ddac1b7be69eff91b43f774ca5388c61accd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-x11" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-x11-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">6b13eb1ba3ec8391015d8f7449445978c3a7dd78e36b832e57a2401a7903eed8</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pyuno" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-pyuno-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">f5103765444de86e1f0ae5ac0ad0151c8a677276a8040102c2ac60b1dab72a04</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-as" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-as-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">3e13d987ab00908acc8acc301757c292c99a39fee6338cc62e20a3c02ca6cc66</sum></package><package arch="x86_64" epoch="1" name="libreoffice-impress" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-impress-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">2d83d8093b8a33ac201107a1033384681084230f96c2a0fb3c5c04e6e73bc465</sum></package><package arch="x86_64" epoch="1" name="libreoffice-core" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-core-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">e2dbc3f59ac23d790170a212d1ecd32479264af09f8c861d497dbc4bd4b3f99a</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-el" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-el-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">52b51d96924f8dda4101302a14e2c5d4235396446bbb83bc649ec96056b6e623</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-id" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-id-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">273ed25018114ade0859ecba406f22f583eb45d97e4c04069da6b36bcf82430e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pt-PT" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pt-PT-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">9c32f7dcb80371360a266b61a8c079b3056068ae280d702a05ce1134060a918b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-kn" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-kn-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">40210b470382e6a8e8a735f0f46dbfeed39baddcb4cd42ff28dfbb6d7411e347</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-cy" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-cy-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">c74f06e24587429d98cc8061bef080838afeceb9f7716813418740ebd8273e18</sum></package><package arch="x86_64" epoch="1" name="libreofficekit-devel" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreofficekit-devel-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">0a878b76c7266a437493e95de61d472ed74f376777149100fba53a328e75dd89</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-nl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-nl-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">e745e70ab7050fd535b37d8519da0c9593a94139c9e932f189937276cb86fba6</sum></package><package arch="noarch" epoch="1" name="autocorr-it" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-it-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">19a45ccd5f50ed266d11730b04ee76ac2a82d08aaba1934c0fd1e1ac6886ab81</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ro" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ro-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">c9d2c929ba2e6f77324b8a0d0000286e9d2f5b35cb8672be20580b367e3f7d07</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-he" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-he-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">66ef1a83208d83739a80d830c0784cdf31e1b3adc85b268d53600cdfd8e459b5</sum></package><package arch="noarch" epoch="1" name="autocorr-af" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-af-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">9f0aee2ce44078eece54d5efedf9472cdd17e5b721083bd24a68fae7b8077489</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-hi" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-hi-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">10a8d0d0c113f8ed3ea7c7eb8de006e306d4b8125fbc7dbc0c161088466acaf2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-bsh" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-bsh-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">0b03509e72ea4609309321ec64ff1daf6239cb5159594ade10aa4916fe9f26bc</sum></package><package arch="noarch" epoch="1" name="autocorr-sr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-sr-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">eabeb1624e04b2e8e1e4b026c3db53592eafbc89510834ba9358386e8fbb4070</sum></package><package arch="noarch" epoch="1" name="autocorr-lt" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-lt-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">adc1951c23af6b856d8e53a934536c42f522cc21ff6579c0275579db8c77302b</sum></package><package arch="x86_64" epoch="1" name="libreoffice-nlpsolver" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-nlpsolver-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">7d6c23a3e0b5848db9023e790378fbb7d0f3bad8a1b2eb1df1023dc513da33de</sum></package><package arch="x86_64" epoch="1" name="libreoffice-emailmerge" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-emailmerge-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">2c58cb593f2e801b523a884e5117defd8eff181fd3a037b2baa3ade8c26a93c2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-bg" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-bg-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">66b7e7596c7ab3df5f3fd0182811b11837f5e84a0f96febc44857a0a69bcbe73</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ko" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ko-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">57379ba16ce0de4f414f07417310bbe575380bed1a5defe9541c2680da83cfe6</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pa" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pa-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">f2df0d8663d1f81b965e1f07f86905fe33316b436161bbfffec1a0e3c6634839</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-sdk-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">dca5a1fe45d1658c1d892adf7f350cd423a7696fd70add7c2852195e8f7291ad</sum></package><package arch="x86_64" epoch="1" name="libreoffice-graphicfilter" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-graphicfilter-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">b061cbb168be3d761ccec90bacacc8685a405796b5abc8edb8193565b56e4164</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-zh-Hant" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-zh-Hant-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">4c1723f66ce9ac592922eda9c8b22365c37037afd020126589f6abf841c9a8d1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-hi" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-hi-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">28713067ec261e59919feb54b5daf1f59d89629cb8ebbcc31d69e997642a2b7f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ru" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ru-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">bae1548b3606ea5073e3f08868648bdbe8843445fee75b0a2403920b1a1d5501</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ml" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ml-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">f333b058fab1f284630e34b82048d54f948c7673b8ed7ff2c7ed224aefe0f977</sum></package><package arch="x86_64" epoch="1" name="libreoffice-xsltfilter" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-xsltfilter-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">23d2b26cdcc91af44ce506930636e784e6f2b2b8c3f5b8152e7fca8698faaf18</sum></package><package arch="x86_64" epoch="1" name="libreoffice-wiki-publisher" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-wiki-publisher-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">fd29596b851b2930224e5f6e17976d821074ac141da6c47ae9091c434a16f990</sum></package><package arch="noarch" epoch="1" name="autocorr-ja" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-ja-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">adbc8344ba0e583dd7bcd01b3831888f371e5c3bf21269cb8a408791051bc82e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-pdfimport" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-pdfimport-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">d0c3a8418d14b6826a4c4fbcb183b38591e6e7b9e381e25a2a7adcb1eac9ecad</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sr-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">e897a412b36520ab68996404bed0c71f8a4153fb957b2a8af8b6aa8d5e086ba9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-zh-Hans" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-zh-Hans-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">7be137e30909aae32b7c166c9b0f98c1b4153d97c36400873a7638a8c2670448</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-fi" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-fi-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">d0157252bf2cedcc0bb2222319be3c75bb0064b6d84a0789a01db6c65186800d</sum></package><package arch="x86_64" epoch="1" name="libreoffice-librelogo" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-librelogo-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">dc83fdcb2f43ca05652f7927cf00cf5f6143438152da7a408bac3fe583081161</sum></package><package arch="x86_64" epoch="1" name="libreoffice-base" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-base-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">887102cc2db652b08fd0f58637b3d369f3473e5153b02f0588a0ee19f3db95d9</sum></package><package arch="noarch" epoch="1" name="autocorr-cs" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-cs-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">013be391bb6fa2f2ffa93f94dbfa4edd4bfbd491dd9d831e43b8c3479a76d565</sum></package><package arch="x86_64" epoch="1" name="libreoffice-sdk-doc" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-sdk-doc-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">67bc2d543bc622a9d633fe99e1c936b18e06509fbeffdb4594da4b7626ee16a7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-dz" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-dz-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">0c2a60070ad1da0e058dd41256e27533a983e224bb2887557bec928fbd239dc2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-math" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-math-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">ab630ec793f92a7f88a219094c8e04cedde06f7bb94cc05d1dce8f2c76c928e4</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-it" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-it-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">68e2261a2d676040bb18a21c6829562ef86f6f9cbc74410f58b80bd9e4b92bf6</sum></package><package arch="noarch" epoch="1" name="autocorr-pt" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>autocorr-pt-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">d0f87aef7a5feff20056de6819f24b2eb47cd8e396051492b8e74eeb209a7cfe</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-si" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-si-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">66706e23d5e356fbabbd9b1dd9c69cd5f1f2a0ec0ef8d7bba31cc5a9b55c9c79</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-tr" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-tr-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">3151bae8d9e845b8820b79764f22bd2fa9d6426540586d098077eba36ca9d5e2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-glade" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-glade-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">d75a3342f47bff83ee73c8ea1b59026981c96f5eabf176581448a89a95b264cb</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-lv" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-lv-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">231063843eecf371187f6a93f64da1fd64da0be46047094e24df3c84f18e87a1</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sl-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">66c768f7007f7c7d414b7296ce61e0296937fae21c8a2039c9f63c2e56956991</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ca" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ca-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">0e4a2ffcb832c103935da256e7d70f9489649921a15c0c19b3590afcef2831ea</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-dz" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-dz-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">d6e5eef25576f02eeeb978707eb21b89801b277e69c36ec7867bd831af1d280e</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ar" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ar-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">12fe3abfa03244318f8987e03b81a3caafe523b68877ef3edbdc88be7348bcd2</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-eu" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-eu-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">2cf8ba3b420635ef922c4cb00f529b801a17d195c54ae12ec4b6251f9a18fecd</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sk" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sk-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">0b3f57772f97dbd58e94bba840fb36fd0e24e2931be45ab5f977f6eb20491cb9</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-gl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-gl-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">52ef4f9297e0e368c60f0ab98566fc36d9626232fb4f236e3e3ed98709e96654</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-pl" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-pl-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">6e2085402b65195e469936a84c4e0ada2df03470098fa406ef14cb3d7abebaea</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-sv" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-sv-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">aae7c8bf2edf349a3121d67bbd605f2d6b47e16b9fc02bff54bd75a1d9260c2c</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-si" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-si-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">733aa7715ca452e249242ef23a771ed3ed5a0e5c3c0af55bab664e084ee98699</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-th" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-th-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">7a02caf1b3e27b52f981aeeaf0b0fd23e83a9f73df7088d0a3421fca44026bd1</sum></package><package arch="noarch" epoch="1" name="libreoffice-opensymbol-fonts" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-opensymbol-fonts-5.3.6.1-26.el7_9.noarch.rpm</filename><sum type="sha256">c05ffb252ef26f4f92684828b6202a25c5e78218e4ad55c12973406bf1cd3d45</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-es" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-es-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">c43335de3d14ae55f043111782317c055cf2cf8cbb5fd533f7c1c83daa2aed35</sum></package><package arch="x86_64" epoch="1" name="libreoffice-draw" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-draw-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">8fe78c5ec0028bd7e8a0862c9d4cf290fbf3f61f17b5644e82849ee8ba375ca7</sum></package><package arch="x86_64" epoch="1" name="libreoffice-help-ro" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-help-ro-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">5be883281076f9071937161c50a136b6553ffb46c4a0a268b0309f952936272f</sum></package><package arch="x86_64" epoch="1" name="libreoffice-langpack-ss" release="26.el7_9" src="libreoffice-5.3.6.1-26.el7_9.src.rpm" version="5.3.6.1"><filename>libreoffice-langpack-ss-5.3.6.1-26.el7_9.x86_64.rpm</filename><sum type="sha256">9b1a8e7376040cef9dd8ead12ad46b24787373cac049a6da2aa84a908657ac87</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6185" id="CVE-2023-6185" title="Cve-2023-6185" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:3304" id="RHSA-2024:3304" title="Important: Libreoffice Security Fix Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:3588</id><title>Important: Glibc Security Update</title><description>The glibc packages provide the standard C libraries (libc), POSIX thread libraries (libpthread), standard math libraries (libm), and the name service cache daemon (nscd) used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly.
Security Fix(es):
* glibc: Out of bounds write in iconv may lead to remote code execution
(CVE-2024-2961)
* glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599) * glibc: null pointer dereferences after failed netgroup cache insertion
(CVE-2024-33600)
* glibc: netgroup cache may terminate daemon on memory allocation failure
(CVE-2024-33601)
* glibc: netgroup cache assumes NSS callback uses in-buffer strings
(CVE-2024-33602)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-06-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="glibc-headers" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>glibc-headers-2.17-326.el7_9.3.x86_64.rpm</filename><sum type="sha256">843dd0d3534fe6de4d95ad59b4e49ed8ec36148e16a5be1024bd64c62a17db0d</sum></package><package arch="i686" name="glibc-static" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>glibc-static-2.17-326.el7_9.3.i686.rpm</filename><sum type="sha256">d39f99534f379dd0ec18247727d0a01ec9251de985d75d9f63f200337cfbebcc</sum></package><package arch="x86_64" name="glibc-utils" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>glibc-utils-2.17-326.el7_9.3.x86_64.rpm</filename><sum type="sha256">7665222bf18b4e0b158a3e9bb6a4da884f20ef0e0c8db284bf10b7c5d0d89c5f</sum></package><package arch="x86_64" name="glibc-static" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>glibc-static-2.17-326.el7_9.3.x86_64.rpm</filename><sum type="sha256">7670b83eefa3e11179becdbcb635147df98cc1c0331612d2b4f2d40317b738e4</sum></package><package arch="i686" name="glibc-devel" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>glibc-devel-2.17-326.el7_9.3.i686.rpm</filename><sum type="sha256">bb730c521722df672043b2b40f49625768e9bad4ffd700790e09bd63900d8500</sum></package><package arch="x86_64" name="nscd" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>nscd-2.17-326.el7_9.3.x86_64.rpm</filename><sum type="sha256">bc1c535d0db6187e128a5af7965d1346c3cf0492045602b3cb2ecdb083bfed64</sum></package><package arch="x86_64" name="glibc-devel" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>glibc-devel-2.17-326.el7_9.3.x86_64.rpm</filename><sum type="sha256">4ab00831127885d667821613eae4e2dbed1d7eebb1287325c0c1fdc4dda42819</sum></package><package arch="i686" name="glibc" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>glibc-2.17-326.el7_9.3.i686.rpm</filename><sum type="sha256">c8c61117617e6794ebadc6510b43c5e721fae3f77a1aea9fbb7e2b6a531e98b5</sum></package><package arch="x86_64" name="glibc-common" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>glibc-common-2.17-326.el7_9.3.x86_64.rpm</filename><sum type="sha256">6e7f04ad6991bc8f7a6b8fb30137c2ca7760aba5f7d81572a2fb1d0a3cd560a9</sum></package><package arch="x86_64" name="glibc" release="326.el7_9.3" src="glibc-2.17-326.el7_9.3.src.rpm" version="2.17"><filename>glibc-2.17-326.el7_9.3.x86_64.rpm</filename><sum type="sha256">8a4fd18dc3dae3f8f3c6f2595feb00b528d2cc3fd8104e7e8c794f5fff8e1c26</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2961" id="CVE-2024-2961" title="Cve-2024-2961" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33599" id="CVE-2024-33599" title="Cve-2024-33599" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33600" id="CVE-2024-33600" title="Cve-2024-33600" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33601" id="CVE-2024-33601" title="Cve-2024-33601" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-33602" id="CVE-2024-33602" title="Cve-2024-33602" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:3588" id="RHSA-2024:3588" title="Important: Glibc Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:3591</id><title>Important: 389-Ds-Base Security Update</title><description>389 Directory Server is an LDAP version 3 (LDAPv3) compliant server. The base packages include the Lightweight Directory Access Protocol (LDAP) server and command-line utilities for server administration.
Security Fix(es):
* 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request (CVE-2024-3657) * 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c (CVE-2024-2199)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-06-05 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="389-ds-base" release="5.el7_9" src="389-ds-base-1.3.11.1-5.el7_9.src.rpm" version="1.3.11.1"><filename>389-ds-base-1.3.11.1-5.el7_9.x86_64.rpm</filename><sum type="sha256">4bb008c67054c254644ed9a188102cb4b1b0fd7db5f89b1abd1eaee2e7447aba</sum></package><package arch="x86_64" name="389-ds-base-snmp" release="5.el7_9" src="389-ds-base-1.3.11.1-5.el7_9.src.rpm" version="1.3.11.1"><filename>389-ds-base-snmp-1.3.11.1-5.el7_9.x86_64.rpm</filename><sum type="sha256">2f6a187729fd8008655829d30a03a9815705703d6e6542300457e3c7c01cb463</sum></package><package arch="x86_64" name="389-ds-base-devel" release="5.el7_9" src="389-ds-base-1.3.11.1-5.el7_9.src.rpm" version="1.3.11.1"><filename>389-ds-base-devel-1.3.11.1-5.el7_9.x86_64.rpm</filename><sum type="sha256">c248d741ee208387787d00e8fc5b6495693ccb0ebf51e284d6e4da368a2e4dca</sum></package><package arch="x86_64" name="389-ds-base-libs" release="5.el7_9" src="389-ds-base-1.3.11.1-5.el7_9.src.rpm" version="1.3.11.1"><filename>389-ds-base-libs-1.3.11.1-5.el7_9.x86_64.rpm</filename><sum type="sha256">4243aa3daf6677e330b5d5070f6a23bc08189c76f4c7f7045d6572533a1dfbd5</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2199" id="CVE-2024-2199" title="Cve-2024-2199" type="cve" /><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3657" id="CVE-2024-3657" title="Cve-2024-3657" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:3591" id="RHSA-2024:3591" title="Important: 389-Ds-Base Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:3669</id><title>Important: Less Security Update</title><description>The "less" utility is a text file browser that resembles "more", but allows users to move backwards in the file as well as forwards. Since "less" does not read the entire input file at startup, it also starts more quickly than ordinary text editors.
Security Fix(es):
* less: OS command injection (CVE-2024-32487)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-06-06 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" name="less" release="10.el7_9" src="less-458-10.el7_9.src.rpm" version="458"><filename>less-458-10.el7_9.x86_64.rpm</filename><sum type="sha256">7d95fae06c53a8ff59f8d569fe46081129eecf1d791b94d9ff3b6d46c8c9bd04</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32487" id="CVE-2024-32487" title="Cve-2024-32487" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:3669" id="RHSA-2024:3669" title="Important: Less Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:3741</id><title>Important: Bind, Bind-Dyndb-Ldap, And Dhcp Security Update</title><description>The Berkeley Internet Name Domain (BIND) is an implementation of the Domain Name System (DNS) protocols. BIND includes a DNS server (named); a resolver library (routines for applications to use when interfacing with DNS); and tools for verifying that the DNS server is operating correctly.
Bind-dyndb-ldap provides an LDAP back-end plug-in for BIND. It features support for dynamic updates and internal caching, to lift the load off of your LDAP server.
The Dynamic Host Configuration Protocol (DHCP) is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network.
Security Fix(es):
* bind: KeyTrap - Extreme CPU consumption in DNSSEC validator (CVE-2023-50387) * bind: Preparing an NSEC3 closest encloser proof can exhaust CPU resources (CVE-2023-50868) * bind: Parsing large DNS messages may cause excessive CPU load (CVE-2023-4408)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><issued date="2024-06-10 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="x86_64" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">b044f5a4c39d1dd29ce2ccff898f9ca792351959be1c08b4610acba6a1fe58b9</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.i686.rpm</filename><sum type="sha256">d24c1e0b80bd65c8251468edf20361dce51914038ea58a76b78af3b36dd78f06</sum></package><package arch="x86_64" epoch="32" name="bind-utils" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-utils-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">fcef407deaff523bd33246988e7b8a225328b4b994edd029ab00d44294eaf4cd</sum></package><package arch="x86_64" epoch="32" name="bind-sdb" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-sdb-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">fce5eb3650a9d7c2521368afbb5e605bc03375bf094563d2cd77d8ca45833e40</sum></package><package arch="i686" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.16.i686.rpm</filename><sum type="sha256">7239f50fe947c5ac7f39c1a01075306f971286044c9218e9d58f3cc101e0ca08</sum></package><package arch="i686" epoch="12" name="dhcp-libs" release="83.sl7_9.2" src="dhcp-4.2.5-83.sl7_9.2.src.rpm" version="4.2.5"><filename>dhcp-libs-4.2.5-83.sl7_9.2.i686.rpm</filename><sum type="sha256">e0dff60c3ed7241a26409728873c760de880266ba724ce8142520a1ad5b1fee1</sum></package><package arch="x86_64" epoch="32" name="bind-lite-devel" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-lite-devel-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">0534337fe5307e8d85d0625084b5f624ce304d777f48191c12c50146f66853ee</sum></package><package arch="x86_64" epoch="32" name="bind" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">bd5e70a0212accd5936d046ed9fb4c5a8d2dddd4fa7ad8b75af8e091fb5bb8d2</sum></package><package arch="x86_64" epoch="32" name="bind-chroot" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-chroot-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">8643b0b2c5e2f71c4df53fe6211e994ea852a88f631f910949dbbe2a58ee796c</sum></package><package arch="i686" epoch="12" name="dhcp-devel" release="83.sl7_9.2" src="dhcp-4.2.5-83.sl7_9.2.src.rpm" version="4.2.5"><filename>dhcp-devel-4.2.5-83.sl7_9.2.i686.rpm</filename><sum type="sha256">c3303bca874a8ac6dab1fb338cada5e9a2dbf59fedbe101cf48b2a4d1a5595fe</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-pkcs11-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">1b8aede2173ffa6bd9289d4bc77a420238c59d11b0ea3d1da9f66045c8e01805</sum></package><package arch="x86_64" epoch="32" name="bind-export-libs" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">a8311e89008970b7f435d37d08840003edc0485ca9452f3b9080062f4eec04ca</sum></package><package arch="x86_64" epoch="12" name="dhclient" release="83.sl7_9.2" src="dhcp-4.2.5-83.sl7_9.2.src.rpm" version="4.2.5"><filename>dhclient-4.2.5-83.sl7_9.2.x86_64.rpm</filename><sum type="sha256">8c2ff2529378c6abf141528f974b617367815d0197f11598a09ac8820edddde4</sum></package><package arch="i686" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.i686.rpm</filename><sum type="sha256">c40153a8d482a16f43689a92dd75bb0c130ebd094c294e7981c4f0a2292933c6</sum></package><package arch="noarch" epoch="32" name="bind-license" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-license-9.11.4-26.P2.el7_9.16.noarch.rpm</filename><sum type="sha256">3c6cfe6a108e6d941d432f6ebae3078f9325041699498eafc1ad3035185eacc7</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-utils" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-pkcs11-utils-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">9f9e9992dcbcbd5720ced850ac16d28a0326a39ef42f9669e3e80df4280cd525</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-libs" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-pkcs11-libs-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">56a99c96032ac99d323a9f83823a4917122ac100ab4bc6e1616cf78ce9f58928</sum></package><package arch="i686" epoch="32" name="bind-export-devel" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.16.i686.rpm</filename><sum type="sha256">853121aefeeb2034ab53a9ba2fd9767de727d4e93183f3ababf92334c7c38d43</sum></package><package arch="x86_64" epoch="32" name="bind-export-devel" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-export-devel-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">321f572da23c12f51a046c20862ecf1d7d0844778c944b9ba1d52e4e17335918</sum></package><package arch="x86_64" epoch="12" name="dhcp-common" release="83.sl7_9.2" src="dhcp-4.2.5-83.sl7_9.2.src.rpm" version="4.2.5"><filename>dhcp-common-4.2.5-83.sl7_9.2.x86_64.rpm</filename><sum type="sha256">53490b53a48f1d43b8016ace88b6fb33690e6d0c2695f9670886c5c9db6dd9fe</sum></package><package arch="i686" epoch="32" name="bind-export-libs" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-export-libs-9.11.4-26.P2.el7_9.16.i686.rpm</filename><sum type="sha256">76cca9b75645f52f5edb6ed39fc5a1d160a5aad3a6970ae56df01dcb84e7260b</sum></package><package arch="x86_64" epoch="12" name="dhcp-libs" release="83.sl7_9.2" src="dhcp-4.2.5-83.sl7_9.2.src.rpm" version="4.2.5"><filename>dhcp-libs-4.2.5-83.sl7_9.2.x86_64.rpm</filename><sum type="sha256">20f7d3db9eff4dc2ca1e7980bff380be5b4715f98b6bc2d7cfb5320f0f86607b</sum></package><package arch="i686" epoch="32" name="bind-libs" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.16.i686.rpm</filename><sum type="sha256">92c35f94753224ecbff8cd57f0dbf638a730c5c1eed246974f29c64e04bbce95</sum></package><package arch="i686" epoch="32" name="bind-libs-lite" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-libs-lite-9.11.4-26.P2.el7_9.16.i686.rpm</filename><sum type="sha256">bf6c365df6a147fd248a08810bdc4ff6b818bfa957010fca0bbddab55cc9c485</sum></package><package arch="x86_64" epoch="32" name="bind-sdb-chroot" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-sdb-chroot-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">3f058a758221e6b4a7fa74f29406c9779766f8f38a9828a1302a45caf9724a30</sum></package><package arch="i686" epoch="32" name="bind-devel" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.16.i686.rpm</filename><sum type="sha256">031585ec8dc96c4fd5dfe1ce220340a60a557ae2bf7899df13c5be3d6f5a2ce5</sum></package><package arch="x86_64" epoch="12" name="dhcp" release="83.sl7_9.2" src="dhcp-4.2.5-83.sl7_9.2.src.rpm" version="4.2.5"><filename>dhcp-4.2.5-83.sl7_9.2.x86_64.rpm</filename><sum type="sha256">834691aae0477a2f149b66ae29c42bd7b3066b4240836acaa5d5ef8719f24d68</sum></package><package arch="x86_64" epoch="12" name="dhcp-devel" release="83.sl7_9.2" src="dhcp-4.2.5-83.sl7_9.2.src.rpm" version="4.2.5"><filename>dhcp-devel-4.2.5-83.sl7_9.2.x86_64.rpm</filename><sum type="sha256">807f6702ae1bde7cdbb67ff748525b2209ae5497a2947cae53b9d9471758dd83</sum></package><package arch="x86_64" epoch="32" name="bind-devel" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-devel-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">5adaafa30648022229bc65fd33b6676c658482a11aa919f733fa5ac68903656d</sum></package><package arch="x86_64" epoch="32" name="bind-pkcs11-devel" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-pkcs11-devel-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">a78b617d9ea3cc0d893b0ab2c12fb4606e1bec7a1153d6c2174312a57e55f907</sum></package><package arch="x86_64" name="bind-dyndb-ldap" release="7.el7_9.1" src="bind-dyndb-ldap-11.1-7.el7_9.1.src.rpm" version="11.1"><filename>bind-dyndb-ldap-11.1-7.el7_9.1.x86_64.rpm</filename><sum type="sha256">891a2dd866f20045a500b99c2e15b34d8d0f3c71ad6f27a26df9f03d4fabf1d0</sum></package><package arch="x86_64" epoch="32" name="bind-libs" release="26.P2.el7_9.16" src="bind-9.11.4-26.P2.el7_9.16.src.rpm" version="9.11.4"><filename>bind-libs-9.11.4-26.P2.el7_9.16.x86_64.rpm</filename><sum type="sha256">1ce23641aec877c25ea87627b60d907e1882bf8b51fe4eca4d6f72be97445686</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2024:3741" id="RHSA-2024:3741" title="Important: Bind, Bind-Dyndb-Ldap, And Dhcp Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:3760</id><title>Important: Ipa Security Update</title><description>Red Hat Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.
Security Fix(es):
* ipa: user can obtain a hash of the passwords of all domain users and perform offline brute force (CVE-2024-3183)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><severity>important</severity><issued date="2024-06-11 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="ipa-client-common" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>ipa-client-common-4.6.8-5.sl7_9.17.noarch.rpm</filename><sum type="sha256">7821701b54f781b31921062f9fe63e974a21123e9190ede8f5187a67d586d982</sum></package><package arch="x86_64" name="ipa-client" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>ipa-client-4.6.8-5.sl7_9.17.x86_64.rpm</filename><sum type="sha256">93a87fc0e2212cf1e31ad00298ea392d9ad94739874fad14c04b0f2b7fb6410b</sum></package><package arch="noarch" name="ipa-common" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>ipa-common-4.6.8-5.sl7_9.17.noarch.rpm</filename><sum type="sha256">fa2f9dd34d8046319715933616a82e39bae58008145c5c3492de1a296c2e1384</sum></package><package arch="noarch" name="python2-ipalib" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>python2-ipalib-4.6.8-5.sl7_9.17.noarch.rpm</filename><sum type="sha256">068d077c2c07089fe3edecc5e44ff8fb5aa2766136207a0ddb0473bae25ed422</sum></package><package arch="noarch" name="ipa-server-common" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>ipa-server-common-4.6.8-5.sl7_9.17.noarch.rpm</filename><sum type="sha256">8d67fb74ee961ff0b2f415baae48692945350964f9516117a217449423fa4d3a</sum></package><package arch="x86_64" name="ipa-server-trust-ad" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>ipa-server-trust-ad-4.6.8-5.sl7_9.17.x86_64.rpm</filename><sum type="sha256">3b0f0ad7a2147d1f1f10d932152de92d1dcb357df6730254e2e9559580d7733b</sum></package><package arch="x86_64" name="ipa-server" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>ipa-server-4.6.8-5.sl7_9.17.x86_64.rpm</filename><sum type="sha256">36f137526fceb17fe43af9a0ac6eab125cdb4df6c80c7c486ab8c74298d04a31</sum></package><package arch="noarch" name="ipa-python-compat" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>ipa-python-compat-4.6.8-5.sl7_9.17.noarch.rpm</filename><sum type="sha256">8f54bcec34e770e33290bd3059dc06d38d3f315c93587a5693525c28dfdf5285</sum></package><package arch="noarch" name="python2-ipaclient" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>python2-ipaclient-4.6.8-5.sl7_9.17.noarch.rpm</filename><sum type="sha256">36c75ccabfcc8b38143e63be8041ee675af3c9cd2f5dabfd72ec0fecda00a3fd</sum></package><package arch="noarch" name="python2-ipaserver" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>python2-ipaserver-4.6.8-5.sl7_9.17.noarch.rpm</filename><sum type="sha256">f763230923cb440bc060d9ac2280a90d77795a1ee5e26b7b7f06ea8219b6709f</sum></package><package arch="noarch" name="ipa-server-dns" release="5.sl7_9.17" src="ipa-4.6.8-5.sl7_9.17.src.rpm" version="4.6.8"><filename>ipa-server-dns-4.6.8-5.sl7_9.17.noarch.rpm</filename><sum type="sha256">91f72ff9818e271628763b73470d0af7890196d4878118288e30b18bd07be825</sum></package></collection></pkglist><references><reference href="http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3183" id="CVE-2024-3183" title="Cve-2024-3183" type="cve" /><reference href="https://access.redhat.com/errata/RHSA-2024:3760" id="RHSA-2024:3760" title="Important: Ipa Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:3939</id><title>Important: Linux-Firmware Security Update</title><description>The linux-firmware packages contain all of the firmware files that are required by various devices to operate.
Security Fix(es):
* hw: intel: Protection mechanism failure for some Intel(R) PROSet/Wireless WiFi (CVE-2022-46329) * hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi (CVE-2022-27635) * hw: intel: Improper access control for some Intel(R) PROSet/Wireless WiFi (CVE-2022-40964) * hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi (CVE-2022-36351) * hw: intel: Improper input validation in some Intel(R) PROSet/Wireless WiFi (CVE-2022-38076)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><issued date="2024-06-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="noarch" name="iwl5000-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="8.83.5.1_1"><filename>iwl5000-firmware-8.83.5.1_1-83.el7_9.noarch.rpm</filename><sum type="sha256">971551d77a561506a1454c441d5127fc64f1e0ad7f40b39072602d9e3b4145d4</sum></package><package arch="noarch" name="linux-firmware" release="83.git78c0348.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="20200421"><filename>linux-firmware-20200421-83.git78c0348.el7_9.noarch.rpm</filename><sum type="sha256">ca8cb0dbabae917a72b4843c4d4f884cc381e8176bd65e0969b3665c96aa8312</sum></package><package arch="noarch" name="iwl135-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl135-firmware-18.168.6.1-83.el7_9.noarch.rpm</filename><sum type="sha256">dcf942aa2f2faf0e6a3b6ef4f1052dadc381159cb4ef4629b15c8a54db33feba</sum></package><package arch="noarch" name="iwl7260-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="25.30.13.0"><filename>iwl7260-firmware-25.30.13.0-83.el7_9.noarch.rpm</filename><sum type="sha256">946714c1fa268dbb4e08437b0300a82d7502b214f2fbce77802fa5628d326b13</sum></package><package arch="noarch" name="iwl6050-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="41.28.5.1"><filename>iwl6050-firmware-41.28.5.1-83.el7_9.noarch.rpm</filename><sum type="sha256">9f166724d8478f203194ac63efeab50449daa38d0cd0cc994dddee9511878cdf</sum></package><package arch="noarch" name="iwl3160-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="25.30.13.0"><filename>iwl3160-firmware-25.30.13.0-83.el7_9.noarch.rpm</filename><sum type="sha256">e7177f501675aab4fac5cfc957f315fd4f80df283ee5460f2a95cddcf623a8be</sum></package><package arch="noarch" name="iwl100-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="39.31.5.1"><filename>iwl100-firmware-39.31.5.1-83.el7_9.noarch.rpm</filename><sum type="sha256">da392ebb2385ed063ab4c8fbd17f3a9396ef72fb9d2a441bd5b4bdd8f6c31b9c</sum></package><package arch="noarch" name="iwl4965-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="228.61.2.24"><filename>iwl4965-firmware-228.61.2.24-83.el7_9.noarch.rpm</filename><sum type="sha256">cd2b70ee45202cacd7ded2c6904c3931cd2f665f4468d19d3046ed9d4b48d699</sum></package><package arch="noarch" epoch="1" name="iwl1000-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="39.31.5.1"><filename>iwl1000-firmware-39.31.5.1-83.el7_9.noarch.rpm</filename><sum type="sha256">b70316faf331baff817139200b7d02fb64bd6f60f7997af330bcd58c619c9367</sum></package><package arch="noarch" name="iwl6000g2a-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl6000g2a-firmware-18.168.6.1-83.el7_9.noarch.rpm</filename><sum type="sha256">1b433786cc7bf5829a3993953d376776a484893a76868b102e92de20f58e53d3</sum></package><package arch="noarch" name="iwl3945-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="15.32.2.9"><filename>iwl3945-firmware-15.32.2.9-83.el7_9.noarch.rpm</filename><sum type="sha256">39dfe518a7de51399501c7b8d8d35c6e9dfc54ac4bbfb69128a3cf98f3db34e1</sum></package><package arch="noarch" name="iwl6000g2b-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl6000g2b-firmware-18.168.6.1-83.el7_9.noarch.rpm</filename><sum type="sha256">4d77048815d0695d8f291972a83a9aed8b31382cafcab4fbc914a5b5987743f8</sum></package><package arch="noarch" name="iwl105-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl105-firmware-18.168.6.1-83.el7_9.noarch.rpm</filename><sum type="sha256">a95c72b8a7a95e1382045ce454596ffeaaa69489565da2965939ae25b857fd49</sum></package><package arch="noarch" name="iwl6000-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="9.221.4.1"><filename>iwl6000-firmware-9.221.4.1-83.el7_9.noarch.rpm</filename><sum type="sha256">4f7099c4686c0a5e23b3a3aba6637a67680ac60ddf0357fcf2325d465d87dda5</sum></package><package arch="noarch" name="iwl2000-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl2000-firmware-18.168.6.1-83.el7_9.noarch.rpm</filename><sum type="sha256">a6f9f3d124b68eaa5cd65e78dce1cecca07fe5fed3042426dfc5a1db16f30554</sum></package><package arch="noarch" name="iwl2030-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="18.168.6.1"><filename>iwl2030-firmware-18.168.6.1-83.el7_9.noarch.rpm</filename><sum type="sha256">c9de442c37261b41d340289a80d0a501999d78517f39e35cf3fa4ea9b955a6c5</sum></package><package arch="noarch" name="iwl5150-firmware" release="83.el7_9" src="linux-firmware-20200421-83.git78c0348.el7_9.src.rpm" version="8.24.2.2"><filename>iwl5150-firmware-8.24.2.2-83.el7_9.noarch.rpm</filename><sum type="sha256">9bed3e483a07f2f8106eba69a19f6ef97f370094cec44d03ef022392219a7d5b</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2024:3939" id="RHSA-2024:3939" title="Important: Linux-Firmware Security Update" type="self" /></references></update><update from="SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV" status="final" type="security" version="2.0"><id>SLSA-2024:3951</id><title>Important: Firefox Security Update</title><description>Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 115.12.0 ESR.
Security Fix(es):
* firefox: Use-after-free in networking (CVE-2024-5702) * firefox: Use-after-free in JavaScript object transplant (CVE-2024-5688) * firefox: External protocol handlers leaked by timing attack (CVE-2024-5690) * firefox:  Sandboxed iframes were able to bypass sandbox restrictions to open a new window (CVE-2024-5691) * firefox: Cross-Origin Image leak via Offscreen Canvas (CVE-2024-5693) * firefox: Memory Corruption in Text Fragments (CVE-2024-5696) * firefox: Memory safety bugs fixed in Firefox 127, Firefox ESR 115.12, and Thunderbird 115.12 (CVE-2024-5700)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
</description><issued date="2024-06-17 00:00:00" /><pkglist><collection short="SL7"><name>Scientific Linux 7</name><package arch="i686" name="firefox" release="1.el7_9" src="firefox-115.12.0-1.el7_9.src.rpm" version="115.12.0"><filename>firefox-115.12.0-1.el7_9.i686.rpm</filename><sum type="sha256">41e8de5dbaf7edd561b02da9f156216c5982e2f4326644467119227a823fdae3</sum></package><package arch="x86_64" name="firefox" release="1.el7_9" src="firefox-115.12.0-1.el7_9.src.rpm" version="115.12.0"><filename>firefox-115.12.0-1.el7_9.x86_64.rpm</filename><sum type="sha256">2feb1182f4e9c3847308dc41f7149bbe823c5079ed219674ceec70caf01b8355</sum></package></collection></pkglist><references><reference href="https://access.redhat.com/errata/RHSA-2024:3951" id="RHSA-2024:3951" title="Important: Firefox Security Update" type="self" /></references></update></updates>
